Art 2.0

Art La Flamme says amazing things sometimes

×

Reference, Useful and Interesting Books

  • Lowenthal, M. M. Intelligence: from secrets to policy. Washington, D.C.: CQ Press, 2012.
  • Betts, Richard K. 2007. Enemies of intelligence: knowledge and power in American national security. New York: Columbia University Press, 2007.
  • Taleb, N. N. (2007). The black swan : the impact of the highly improbable. New York: Random House, 2007.
  • Omand D. (2010) Securing The State. New York: Columbia University Press, 2010.
  • Rolington, A. (2013). Strategic Intelligence for the 21st Century: The Mosaic Method. Oxford: Oxford University Press.
  • Drew, D. M., & Snow, D. M. (2006). Making twenty-first-century strategy: an introduction to modern national security processes and problems. Maxwell Air Force Base, Ala.: Air University Press.
  • ANTICIPATING SURPRISE – Analysis for Strategic Warning (Cynthia M. Grabo). [link]
  • Heuer, R. J. (1999). Psychology of intelligence analysis. [Washington, D.C.] : Center for the Study of Intelligence, Central Intelligence Agency, 1999. [Link]
  • Handel, M. I. (2004). Intelligence and military operations. Abingdon, Oxon : Frank Cass, 2004.
  • Hitchcock, W. T. (1991). The intelligence revolution : a historical perspective : proceedings of the Thirteenth Military History Symposium, U.S. Air Force Academy, Colorado Springs, Colorado, October 12-14, 1988. Washington, DC : U.S. Air Force Academy, Office of Air Force History, United States Air Force, 1991. [Link]
  • Beebe, S. M., & Pherson, R. H. (2014). Cases in intelligence analysis : structured analytic techniques in action. Thousand Oaks, Calif. : CQ Press, [2014].
  • Galula, D. (2006). Pacification in Algeria, 1956-1958. RAND Corporation. [Link]
  • Trinquier, R. (1985). Modern warfare : a French view of counterinsurgency / by Roger Trinquier. Fort Leavenworth, Kan. : U.S. Army Command and General Staff College, Combat Studies Institute, [1985]. [Link]
  • Turabian, K. L. (2018). Manual for Writers of Research Papers, Theses, & Dissertations. Chicago: The University of Chicago Press.
  • Machi, L. A., & McEvoy, B. T. (2012). The Literature Review: Six Steps to Success. Third Edition. Thousand Oaks: Corwin.
  • Pillar, P. R. (2011). Intelligence and U.S. foreign policy : Iraq, 9/11, and misguided reform. New York: Columbia University Press, 2011.
  • Robyn Winder & Charlie Speight (April 19, 2013). “Untangling the Web: A Guide to Internet Research.” National Security Agency. Accessed 07 April 2019. [link]
  • George, R. Z., & Bruce, J. B. (2008). Analyzing intelligence : origins, obstacles, and innovations. Washington D.C.: Georgetown University, 2008.
  • Clark, R. M. Intelligence analysis: a target-centric approach. Thousand Oaks: Sage, 2013.
  • House of Representatives. Final Report of the Select Committee on the Events Surrounding the 2012 Terrorist Attack in Benghazi. Washington, DC: Government Print Office, 2016. 
  • Kahn, David. The codebreakers: the story of secret writing. New York: Macmillan Publishing Company, 1967.
  • Haynes, John Earl, and Harvey Klehr. (1999). Venona: Decoding Soviet Espionage in America. New Haven, Conn.: Yale University Press.
  • Shane, Scott. (2015). Objective Troy: A Terrorist, a President, and the Rise of the Drone. Random House Inc.
  • Drogin, Bob. Curveball. New York: Random House, 2007.
  • Crist, David. (2012). The Twilight War : The Secret History of America’s Thirty-Year Conflict with Iran. Penguin Press.
  • Pedlow, Gregory, The Central Intelligence Agency and Overhead Reconnaissance; The U-2 and OXCART Programs, 1954-1974. Washington DC: CIA, 1962. [Link]
  • Wrixon, Fred B. Codes, ciphers, secrets and cryptic communication. New York: Black Dog & Leventhal, 2005.
  • Yardley, Herbert O. The Chinese black chamber: an adventure in espionage. Boston: Houghton Mifflin, 1983.
  • Boone, J. V. A brief history of cryptology. Annapolis: Naval Institute Press, 2005.
  • Builta, J. A., & Heller, E. N. (2011). Reflections on 10 Years of Counterterrorism Analysis. Center for the Study of Intelligence, Central Intelligence Agency ; Washington, DC : Library of Congress Photoduplication Service [distributor : [Supt. of Docs., U.S. G.P.O., distributor] ; Springfield, Va. : National Technical Information Service [distributor], 2011.
  • Clapper, J. Intelligence Community Standard 203, Analytic Standards. Office of the Director of National Intelligence: Washington, DC. 02 January 2015. [Link]
  • Clapper, J. Intelligence Community Standard 204, National Intelligence Priorities Framework. Office of the Director of National Intelligence: Washington, DC. 22 January 2015. [Link]
  • Clapper, J. Intelligence Community Standard 206, Sourcing Requirements for Disseminated Analytic Products. Office of the Director of National Intelligence: Washington, DC. 22 January 2015. [Link]
  • Clapper, J. Intelligence Community Standard 208, Maximizing the Utility of Analytic Products. Office of the Director of National Intelligence: Washington, DC. 09 January 2017. [Link]
  • Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community
    [Text] [Video – below]