By Keith A. Hansen, Thomas Graham Jr.

Combating disaster is written by means of authors who're skilled "Washington arms" and who comprehend the interaction among intelligence and policymaking. either were in my opinion concerned, within the usa and abroad, in pursuing nationwide and foreign measures to forestall the proliferation of guns of mass destruction. Their large adventure is obvious during this booklet, which places the Iraqi WMD factor in right point of view, explains the problem of tracking small clandestine courses, and explains how the trouble to avoid terrorist acquisition and use of WMD differs from fighting their acquisition and use by way of state states. while, the authors may be able to make a posh topic comprehensible to non-technical specialists, making this ebook an invaluable instructing device, in particular in case you have very little wisdom or adventure in US nationwide safety choice making."National intelligence and overseas inspections are essential to create self belief that violations of non-proliferation commitments are detected in time to allow applicable motion. either has to be pursued with professionalism and important minds heading off terrible intelligence or beauty inspections. the problems studied completely and with logic during this welcome quantity through Graham and Hansen have been intensely arguable relating to Iraq yet stay significant to foreign counter-proliferation efforts."—Hans Blix, govt Chairman of the guns of Mass Destruction fee

Show description

Read or Download Preventing Catastrophe: The Use and Misuse of Intelligence in Efforts to Halt the Proliferation of Weapons of Mass Destruction (Stanford Security Studies) PDF

Best intelligence & espionage books

Courting Disaster: How the CIA Kept America Safe and How Barack Obama Is Inviting the Next Attack

White condo speechwriter Marc Thiessen was once locked in a safe room and given entry to the main delicate intelligence while he was once tasked to put in writing President George W. Bush’s 2006 speech explaining the CIA’s interrogation software and why Congress should still authorize it. Few recognize extra approximately those CIA operations than Thiessen, and in his new e-book, relationship catastrophe, he records simply how powerful the CIA’s interrogations have been in foiling assaults on the US, penetrating al-Qaeda’s excessive command, and offering our army with actionable intelligence.

The Only Thing Worth Dying For: How Eleven Green Berets Forged a New Afghanistan

On a moonless evening simply weeks after September eleven, 2001, U. S. precise Forces group ODA 574 infiltrates the mountains of southern Afghanistan with a likely most unlikely challenge: to foment a tribal rebel and strength the Taliban to give up. Armed completely with the apparatus they could keep it up their backs, shockingly scant intelligence, and their mastery of guerrilla war, Captain Jason Amerine and his males don't have any selection yet to belief their in basic terms best friend, a little-known Pashtun statesman named Hamid Karzai who has again from exile and is being hunted by way of the Taliban as he travels the nation-state elevating a armed forces.

Operation Snow: How a Soviet Mole in FDR's White House Triggered Pearl Harbor

Lately declassified facts and never-before-translated records inform the true tale of the day that FDR memorably declared may reside in infamy, exploring how Joseph Stalin and the KGB used an unlimited community of double brokers and communist sympathizers—most significantly Harry Dexter White—to lead Japan into battle opposed to the us, providing Soviet involvement in the back of the bombing of Pearl Harbor.

Intelligence and Intelligence Analysis

This ebook tracks publish 11th of September advancements in nationwide protection and policing intelligence and their relevance to new rising components of intelligence perform reminiscent of: corrections, biosecurity, inner most and regulatory environments. advancements are explored thematically throughout 3 wide sections: using intelligence realizing constructions constructing a self-discipline.

Additional resources for Preventing Catastrophe: The Use and Misuse of Intelligence in Efforts to Halt the Proliferation of Weapons of Mass Destruction (Stanford Security Studies)

Sample text

At times, intelligence combines what is publicly available or what is learned through diplomatic channels with clandestinely acquired information to confirm, clarify, or perhaps contradict what otherwise might be taken as an accurate understanding of a given situation. To produce relevant and timely intelligence the Intelligence Community normally conducts collection, processing, analysis, production, and dissemination activities—all in response to the requirements of policymakers in the executive and legislative branches of government.

Saddam Hussein used sophisticated concealment and denial measures to hide his nuclear, biological, and chemical weapons programs from the United States and international inspectors. Other proliferators, such as North Korea, Iran, and Syria, have done the same. Following the exposure of Iran’s undeclared nuclear activities by an opposition group, Tehran has undertaken extensive efforts to provide false cover stories and to conceal, bury deeply underground, and sanitize its nuclear infrastructure against snooping satellites and forensic environmental sampling by IAEA inspectors.

Other proliferators, such as North Korea, Iran, and Syria, have done the same. Following the exposure of Iran’s undeclared nuclear activities by an opposition group, Tehran has undertaken extensive efforts to provide false cover stories and to conceal, bury deeply underground, and sanitize its nuclear infrastructure against snooping satellites and forensic environmental sampling by IAEA inspectors. Along similar lines, Syria tried to conceal its nuclear reactor at Al-Kibar with a false façade (hiding the reactor inside an ordinary-looking building with no external cables or other indicators of ongoing nuclear activity, such as a telltale cooling tower) both before Israeli aircraft destroyed the facility and then afterward by removing indicators of the reactor before IAEA inspectors could arrive.

Download PDF sample

Rated 4.55 of 5 – based on 4 votes