Outsourcing US Intelligence : Contractors and Government Accountability

Outsourcing US Intelligence : Contractors and Government Accountability

by Damien Van Puyvelde
English | 2019 | ISBN: 1474450229 | 281 Pages | PDF | 1.74 MB

In the 21st century, more than any other time, US agencies have relied on contractors to conduct core intelligence functions. This book charts the swell of intelligence outsourcing in the context of American political culture and considers what this means for the relationship between the state, its national security apparatus and accountability within a liberal democracy. Through analysis of a series of case studies, recently declassified documents and exclusive interviews with national security experts in the public and private sectors, the book provides an in-depth and illuminating appraisal of the evolving accountability regime for intelligence contractors.

"This is an important and timely book because it broadens Intelligence Studies' traditional concentration on state intelligence agencies and their oversight (or lack thereof) by examining the position of private contractors in US intelligence governance. There was little concern until post-9/11 scandals erupted around the abuse of detainees at Abu Ghraib in Iraq and raised the question of whether government officials can uphold the public interest in national security when intelligence is outsourced. Conceptually, the author draws on the principal-agent model to develop his analytical framework of the accountability process. [...] This is an important book establishing the groundwork for future research and scholarship in this critical public-private area of Intelligence Studies." - Peter Gill, University of Leicester, The International Journal of Intelligence, Security, and Public Affairs, 2019

Download

http://longfiles.com/mp9aaubsqb57/Outsourcing_US_Intelligence_Contractors_and_Government_Accountability.pdf.html

[Fast Download] Outsourcing US Intelligence : Contractors and Government Accountability


Related eBooks:
Terrorist Deradicalisation in Global Contexts : Success, Failure and Continuity
CCSK Cert Prep: 1 Cloud Architecture
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Data Security in Internet of Things Based RFID and WSN Systems Applications
Online Social Networks Security: Principles, Algorithm, Applications, and Perspectives
Managing Security Services in Heterogenous Networks
The Rhineland 1945
ICT Systems Security and Privacy Protection
Smart Cards, Tokens, Security and Applications
Hacker Techniques, Tools, and Incident Handling
National Technology and Industrial Base Integration : How to Overcome Barriers and Capitalize on Coo
Peter Engebretson, "Les bases du hacking"
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.