Documents to the People

Total Page:16

File Type:pdf, Size:1020Kb

Documents to the People DttP Documents to the People Summer 2007 | Volume 35, No. 2 ISSN 0091-2085 In This Issue ■ Government Information Policy and Secrecy ■ Chat Software ■ Official Languages and Delegated Legislation in Canada ■ Interview with the Incoming GODORT Chair What you don’t know ca n h u rt yo u . The State of Public Access to Federal Government I n f o r m a t i o n , written by Patrice McDermott, Ph.D., helps readers assess the impact of various trends and forces on the public’s ability to find, obtain, and use federal government information. This book: • Presents and addresses the recent history of withdrawn a c c e s s . Item No.: BP0500 April 2007. Paperback. • Looks at the controls imposed on public access in a ISBN-13: 9781598880502 variety of arenas. $ 2 4 . 9 5 • Explores the tension between the government’s efforts to provide meaningful public access in non-security related areas, and the concerns of the private sector New Title! about the impact of such efforts. • Provides an analysis of the current state of public access to federal government information from the perspective of anyone who wants to understand what the government is doing, how to interact with it, how to engage in public policy decision-making, and how to hold the government and those who act on its behalf or under its regulation accountable. Only an expert can help you maximize access to federal government information kept under lock and key. With years of relevant experience and credentials, that authority i s Patrice McDermott, Ph.D. She is the: • D i rect or of O pe nTheGov ern m e n t . o r g • Former Deputy Director of the American Library Association’s O ffice of Government Relations • Senior Information Policy Analyst for OMB Watch, a government watchdog organization. Call 1-800-865-3457 or visit www.bernan.com to reserve your copy of The State of Public Access to Federal Government Information! B e rn an is the premier re s o u rce for publications, data, and re f e rence material f rom the U.S. government and international organizations. Bernan has provided quality content and outstanding service to the library and professional markets for more than 50 years. DttP: Documents to the People (ISSN: 0091-2085) is the official publica- tion of the Government Docu ments Round Table (GODORT) of the American Library Association (ALA). DttP is published quarterly in spring, summer, fall, and winter. DttP features articles on local, state, national, and international govern- ment information and government activities and documents the profes- sional activities of GODORT. The opinions expressed by its contributors are their own and do not necessarily represent those of GODORT. DttP Editorial Staff Please see the web site for full contact information: www.ala.org/ala/ Documents to the People godort/dttp/aboutdttp.htm. Summer 2007 | Volume 35, No. 2 Lead Editor: Andrea Sevetson, PO 10835, Colesville, MD 20914; (301) 951-4749; [email protected] Editors: Jackie Druery, Queen’s University; (613) 533-6401; drueryj@post. Columns queensu.ca Editor’s Corner . 4 Chuck Eckman, UC Berkeley; (510) 642-7999; fax (510) 643-8179; From the Chair . 5 [email protected] 5 Julie Linden, Yale University, (203) 432-3310; fax: (203) 432-3214; From the Chair-Elect. [email protected] On the Range . 5 Helen M. Sheehy, Pennsylvania State University Libraries; Washington Report . 6 (814) 863-1347; fax: (814) 863-1403 [email protected] News from the North . 9 Contributions Editor: Ben Amata, CSU Sacramento; State & Local Documents Roundup . 12 (916) 278-5672; fax: (916) 278-7089; [email protected] 14 Reviews Editor: Susan Tulis, Southern Illinois University, Morris Tech Watch . Library, Mailcode 6632, 605 Agriculture Dr., Carbondale, IL 62901, (618) 453-2522, fax: (618) 453-3440; [email protected] Articles Advertising Editor: Sherry DeDecker, Davidson Library, University of 17 California, Santa Barbara, CA 93106-9010, 805-893-3713, fax: 805- Government Information Policy and Secrecy . 893-4676, [email protected] An Introduction Advertising: Inquries about advertising may be addressed to the Adver- Ben Amata tising Editor. Please see www.ala.org/ala/godort/dttp/adrates for rates and publication schedule. DttP accepts advertising to inform readers I’ve Got a Secret of products and services. DttP will adhere to all ethical and commonly Government Information Availability and Secrecy. 18 accepted advertising practices and will make every effort to ensure that its practices in relation to advertising are consistent with those of the Rhonda E. Fowler other Association publications. DttP reserves the right to reject any Current Government Information Policy and Secrecy . .24 advertisement deemed not relevant or consistent to the above or to the Patrice McDermott aims and policies of ALA. Documents, Leaks, and the Boundaries of Expression . .30 Distribution Manager: ALA Subscription Department, 50 E. Huron St., Chicago, IL 60611. 1-800-545-2433, press 5; fax: (312) 280-1538; Government Whistleblowing in an Over Classifi ed Age [email protected] Susan Nevelow Mart Subscriptions/Claims: DttP is sent free to ALA/GODORT mem- No Secrets @ your library®. .38 bers on a per volume (annual) basis. For subscriptions, prepayment is required in the amount of $35 in North America, $45 else- How Government Secrecy Affects Libraries where. Checks or money orders should be made payable to “ALA/ Gwen Sinclair GODORT” and sent to the Distri bu tion Manager. Changes of address and claims six months of the date of issue should be sent to the Dis- Beyond the Library . .46 tribution Manager. To purchase back issues, write to: UMI, 300 North Uncovering Users’ Needs and Marketing Your Expertise Zeeb Rd., Ann Arbor, MI 48106. POSTMASTER: Send address changes to DttP, 50 E. Huron St., Chicago, IL 60611. Periodicals postage is pend- Jesse Silva and Sherry DeDecker ing at Chicago, Illinois, and additional mailing offices. Tips from Tim . 51 Contributions: Articles, news items, letters, and other information “Available from NTIS” and Other Technical Report Horror Stories intended for publication in DttP should be submitted to the Lead Editor. All submitted material is subject to editorial review. Please see the web Tim Byrne site for additional information, above. Interview with Incoming GODORT Chair, Bill Sleeman . .55 Indexing: Indexed in Library Literature 19, no. 1 (1991) and CSA World- wide Political Science Abstracts 33, no. 1 (2005). Editorial Production: ALA Production Services—Troy D. Linker, Angela Hanshaw; Angela Gwizdala, and Christopher Keech. Columnists: Geospatial News On the Range Marcy M. Allen Brian Rossmann Western Illinois University About the cover: The cover image is a poster from the War Montana State Univ. [email protected] Information Office. It was printed in 1943 by the U.S. G.P.O. [email protected] Washington Report International Documents Roundup Mary Mallory (SuDoc No. PR 32.5015:39) and is part of the University of North James Church Univ. of Illinois, Texas (UNT) Libraries Digital Collections (digital.library.unt.edu/ Univ. of California, Berkeley Urbana-Champaign [email protected] [email protected] permalink/meta-dc-193). Our thanks to the UNT Government State and Local Documents By the Numbers Documents and Digital Projects Departments for their assistance Roundup Stephen Woods Kris Kasianovitz Pennsylvania State Univ. selecting and obtaining the image. Univ. of California, Los Angeles [email protected] [email protected] News from the North Tech Watch Lindsay Johnston Valerie Glenn Univ. of Alberta University of Alabama [email protected] [email protected] Amy West University of Minnesota [email protected] Copyright © 2007 ALA/GODORT Editor’sEditor's Corner ations we find ourselves in when editing DttP. Probably one Editor’s Corner of the more interesting opportunities that comes up is when people offer to write for DttP but don’t have a topic in mind. I On My Reading List don’t keep a list of topics or assignments, so unless you’ve got something in the back of your mind, I’m not a huge help. Andrea Sevetson If you want to write professionally, what are your options? The most important thing is to write about some- One of the side benefits of being the DttP editor is that I get thing that interests you. By your sheer passion for the subject copies of the other journals produced by ALA. Sometimes you can interest people in it. A really interesting reference there isn’t a lot there to excite me, but other times I think query that sent you in all kinds of directions can spark an about my readings quite a bit. interesting article about sources for particular types of mate- Tops on my list right now . Ann Pechacek, “I Can’t rial, or it could spark your interest in the topic as a whole, Live without My . Teens’ Top Ten High-Tech Gadgets leading to a different type of article. and Web Sites,” Young Adult Library Services 5, no. 2 (Winter One of the biggest issues we face is working with first- 2007): 9, 16. This is because the top ten gadgets listed were: time authors. Getting started writing for professional journals computer, cell phone, iPod/MP3 player, digital camera, can be intimidating! When I started I just knew my reviewers game systems, flash drive, television, TiVo, DVD player, and were long-time librarians who knew much more than I did microwave. Being a bit past the teen years, I keep thinking on any topic. And I was convinced they were all reading my about my ten. Certainly, unlike a teenager, I don’t need all text and laughing hysterically. I think my best move was to of these things to live.
Recommended publications
  • Retroactively Classified Documents, the First Amendment, and the Power to Make Secrets out of the Public Record
    ARTICLE DO YOU HAVE TO KEEP THE GOVERNMENT’S SECRETS? RETROACTIVELY CLASSIFIED DOCUMENTS, THE FIRST AMENDMENT, AND THE POWER TO MAKE SECRETS OUT OF THE PUBLIC RECORD JONATHAN ABEL† INTRODUCTION ............................................................................ 1038 I. RETROACTIVE CLASSIFICATION IN PRACTICE AND THEORY ... 1042 A. Examples of Retroactive Classification .......................................... 1043 B. The History of Retroactive Classification ....................................... 1048 C. The Rules Governing Retroactive Classification ............................. 1052 1. Retroactive Reclassification ............................................... 1053 2. Retroactive “Original” Classification ................................. 1056 3. Retroactive Classification of Inadvertently Declassified Documents .................................................... 1058 II. CAN I BE PROSECUTED FOR DISOBEYING RETROACTIVE CLASSIFICATION? ............................................ 1059 A. Classified Documents ................................................................. 1059 1. Why an Espionage Act Prosecution Would Fail ................. 1061 2. Why an Espionage Act Prosecution Would Succeed ........... 1063 3. What to Make of the Debate ............................................. 1066 B. Retroactively Classified Documents ...............................................1067 1. Are the Threats of Prosecution Real? ................................. 1067 2. Source/Distributor Divide ...............................................
    [Show full text]
  • British Intelligence, Counter-Subversion, and ‘Informal Empire’ in the Middle East
    British Intelligence, Counter-Subversion, and ‘Informal Empire’ in the Middle East, 1949-63 CHIKARA HASHIMOTO This thesis is submitted for the degree of Doctor of Philosophy September 2013 DECLARATION This work has not previously been accepted in substance for any degree and is not being concurrently submitted in candidature for any degree. Signed ...................................................................... (candidate) Date ........................................................................ STATEMENT 1 This thesis is the result of my own investigations, except where otherwise stated. Where *correction services have been used, the extent and nature of the correction is clearly marked in a footnote(s). Other sources are acknowledged by footnotes giving explicit references. A bibliography is appended. Signed ..................................................................... (candidate) Date ........................................................................ [*this refers to the extent to which the text has been corrected by others] STATEMENT 2 I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter-library loan, and for the title and summary to be made available to outside organisations. Signed ..................................................................... (candidate) Date ........................................................................ 2 SUMMARY This thesis is a history of a hitherto unexplored dimension of Britain’s engagement with the post-war Middle East with
    [Show full text]
  • Strategic Latency: Red, White, and Blue Managing the National and International Security Consequences of Disruptive Technologies Zachary S
    Strategic Latency: Red, White, and Blue Managing the National and International Security Consequences of Disruptive Technologies Zachary S. Davis and Michael Nacht, editors Center for Global Security Research Lawrence Livermore National Laboratory February 2018 Disclaimer: This document was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor Lawrence Livermore National Security, LLC, nor any of their employees makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States government or Lawrence Livermore National Security, LLC. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC, and shall not be used for advertising or product endorsement purposes. LLNL-BOOK-746803 Strategic Latency: Red, White, and Blue: Managing the National and International Security Consequences of Disruptive Technologies Zachary S. Davis and Michael Nacht, editors Center for Global Security Research Lawrence Livermore National Laboratory February
    [Show full text]
  • 2013 Annual Report
    The National Security Archive The George Washington University Phone: 202/994-7000 Gelman Library, Suite 701 Fax: 202/994-7005 2130 H Street, N.W. www. nsarchive.org Washington, D.C. 20037 [email protected] Annual Report for 2013 The following statistics provide a performance index of the Archive’s work in 2013: Freedom of Information and declassification requests filed – 1,167 Freedom of Information and declassification appeals filed – 219 Pages of U.S. government documents released as the result of Archive requests – 82,537 including such news-making revelations as the first official acknowledgement of the legendary “Area 51” secret base in Nevada; U.S. intelligence’s detection in December 1995 of activities at the Indian nuclear test site that suggested underground test preparations; U.S. and British records relating to Canadian intelligence’s discovery in 1964 that Israel had contracted with Argentina to purchase over 80 tons of “yellow cake,” with virtually nonexistent safeguards; CIA materials officially acknowledging the agency’s direct role in the 1953 Iran coup; and documentary evidence of the collusion of Mexican officials with the Zeta drug cartel in the 2010 San Fernando massacre of 72 migrants attempting to reach the United States. Pages of declassified documents delivered to publisher – 23,819 in one reference collection: Mexico-United States Counternarcotics Policy, 1969-2013. Evidence delivered to truth commissions and human rights investigators – 2,000 documents to United Nations High Commissioner for Human Rights
    [Show full text]
  • Martin Luther King, Muhammad Ali, Art Buchwald, Frank Church, Et Al
    Prominent Critics of Vietnam War Targeted by NSA: Martin Luther King, Muhammad Ali, Art Buchwald, Frank Church, et al. By Matthew M. Aid and William Burr Region: USA Global Research, September 27, 2013 Theme: History, Intelligence, US NATO War The National Security Archive 25 September Agenda 2013 During the height of the Vietnam War protest movements in the late 1960s and early 1970s, the National Security Agency tapped the overseas communications of selected prominent Americans, most of whom were critics of the war, according to a recently declassified NSA history. For years those names on the NSA’s watch list were secret, but thanks to the decision of an interagency panel, in response to an appeal by the National Security Archive, the NSA has released them for the first time. The names of the NSA’s targets are eye- popping. Civil rights leaders Dr. Martin Luther King and Whitney Young were on the watch list, as were the boxer Muhammad Ali,New York Times journalist Tom Wicker, and veteran Washington Post humor columnist Art Buchwald. Also startling is that the NSA was tasked with monitoring the overseas telephone calls and cable traffic of two prominent members of Congress, Senators Frank Church (D-Idaho) and Howard Baker (R-Tennessee). The NSA history, American Cryptology during the Cold War, is a multi-volume study that covers the intersection of secret communications intelligence with Cold War history. The National Security Archive filed the initial mandatory declassification review request for the histories in 2006. The next year, when the NSA denied significant information from the histories the Archive filed an appeal.
    [Show full text]
  • NSA-FOIACASELOG-2016.Pdf
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 100503A 4 April 2017 JOHN GREENEWALD Dear Mr. Greenewald: This responds to your Freedom of Information Act (FOIA) request dated 1 January 2017 which was received by this office on 2 January 2017, for "a copy of the FOIA case log for calendar year 2016." For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. Since processing fees were minimal, no fees were assessed. Your request has been processed under the FOIA, and the logs for calendar year 2016 are enclosed, along with a FOIA Case Dispositions reference sheet that explains the final case dispositions. Please be advised that the logs do not contain the number of pages released. They contain a final disposition if the case was closed at the time the logs were created. If there is no final disposition, the case was still pending at the time the logs were created. Certain information has been deleted from the enclosures.
    [Show full text]
  • Full Autumn 2010 Issue the .SU
    Naval War College Review Volume 63 Article 1 Number 4 Autumn 2010 Full Autumn 2010 Issue The .SU . Naval War College Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Naval War College, The .SU . (2010) "Full Autumn 2010 Issue," Naval War College Review: Vol. 63 : No. 4 , Article 1. Available at: https://digital-commons.usnwc.edu/nwc-review/vol63/iss4/1 This Full Issue is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Naval War College: Full Autumn 2010 Issue NAVAL WAR C OLLEG EREVIEW NAVAL WAR COLLEGE REVIEW Autumn 2010 Volume 63, Number 4 Autumn 2010 Autumn Published by U.S. Naval War College Digital Commons, 2010 1 _Cover.indd 1 8/9/2010 1:14:21 PM Naval War College Review, Vol. 63 [2010], No. 4, Art. 1 Cover Details from the “Black Ship scrolls,” created in Japan soon after the visits of Commodore Matthew Calbraith Perry’s squadron in 1853 and 1854. Digitized copies of the original scrolls, on long-term loan from the Preserva- tion Society of Newport County, Rhode Island, are on display at the Naval War College Museum. They appear in an attractive new exhibit space on the fi rst fl oor produced by moving the Naval War College Foundation’s Museum Store to an expanded site in the Museum’s fi rst-fl oor west wing.
    [Show full text]
  • THE TWILIGHT of the BRITISH EMPIRE British Intelligence and Counter- Subversion in the Middle East, 1948−63
    Intelligence, Surveillance and Secret Warfare THE TWILIGHT OF THE BRITISH EMPIRE British Intelligence and Counter- Subversion in the Middle East, 1948−63 Chikara Hashimoto The Twilight of the British Empire Intelligence, Surveillance and Secret Warfare Series editors: Richard J. Aldrich, Rory Cormac, Michael S. Goodman and Hugh Wilford Published and forthcoming titles The Arab World and Western Intelligence: Analysing the Middle East, 1956–1981 Dina Rezk Chile, the CIA and the Cold War: A Transatlantic Perspective James Lockhart The CIA and the Pursuit of Security: History, Documents and Contexts Huw Dylan, David Gioe and Michael S. Goodman www.edinburghuniversitypress.com/series/isasw The Twilight of the British Empire British Intelligence and Counter- Subversion in the Middle East, 1948–63 Chikara Hashimoto Edited by Rory Cormac Edinburgh University Press is one of the leading university presses in the UK. We publish academic books and journals in our selected subject areas across the humanities and social sciences, combining cutting- edge scholarship with high editorial and production values to produce academic works of lasting importance. For more information visit our website: edinburghuniversitypress.com © Chikara Hashimoto, 2017 Edinburgh University Press Ltd The Tun – Holyrood Road 12(2f) Jackson’s Entry Edinburgh EH8 8PJ Typeset in 11/14 Sabon by Servis Filmsetting Ltd, Stockport, Cheshire printed and bound in Great Britain by CPI Group (UK) Ltd, Croydon CR0 4YY A CIP record for this book is available from the British Library ISBN 978 1 4744 1045 8 (hardback) ISBN 978 1 4744 1046 5 (webready PDF) ISBN 978 1 4744 1047 2 (epub) The right of Chikara Hashimoto to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988, and the Copyright and Related Rights Regulations 2003 (SI No.
    [Show full text]
  • Uncovering No Such Agency—The Secret Sentry: the Untold History of the National Security Agency
    Naval War College Review Volume 63 Article 13 Number 4 Autumn 2010 Uncovering No Such Agency—The ecrS et Sentry: The nU told History of the National Security Agency John R. Schindler Matthew M. Aid Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Schindler, John R. and Aid, Matthew M. (2010) "Uncovering No Such Agency—The eS cret Sentry: The nU told History of the National Security Agency," Naval War College Review: Vol. 63 : No. 4 , Article 13. Available at: https://digital-commons.usnwc.edu/nwc-review/vol63/iss4/13 This Article is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Color profile: Generic CMYK printer profile Composite Default screen Schindler and Aid: Uncovering No Such Agency—The Secret Sentry: The Untold History o REVIEW ESSAYS UNCOVERING NO SUCH AGENCY John R. Schindler Aid, Matthew M. The Secret Sentry: The Untold History of the National Security Agency. New York: Bloomsbury, 2009. 432pp. $30 The National Security Agency (NSA) has been for decades America’s largest, best-funded, and most secretive intelligence service. Since its establishment in 1952 as an independent agency under the Department of Defense (DoD), charged with providing signals intelligence (SIGINT) and information security for the U.S. government, NSA has operated essentially in silence. The wall of secrecy surrounding nearly all that the agency does has deterred most scholarly inquiry.
    [Show full text]
  • Inteligência
    Dossiê Temático Nº06/2009 Inteligência Bolsistas Responsáveis: Luciana Ghiggi Sílvia Sebben Porto Alegre, Setembro/2009 NERINT | 1 Sumário A – Documentos Acadêmicos ................................................................................................... 3 Inteligência e Políticas Públicas: dinâmicas operacionais e condições de legitimação .......... 3 The Study of Intelligence in Theory and Practice ................................................................ 18 B – Clipping de Notícias .......................................................................................................... 40 C – Clipping de Notícias (Colômbia) ........................................................................................ 67 D – Leituras Recomendadas ................................................................................................... 77 E – Anexos .............................................................................................................................. 78 TABELA: Casos Nacionais – separação organizacional do sistema de inteligência, regime político, gastos públicos (% PIB) e PIB ............................................................................... 78 GRÁFICO: Distribuição de regimes políticos entre os 35 casos nacionais ........................... 79 GRÁFICO: Separação Organizacional X Regime Político ...................................................... 79 GRÁFICO: Separação Organizacional X Gastos Públicos (% PIB) ......................................... 80 NERINT | 2 A – DOCUMENTOS
    [Show full text]
  • 2006 Annual Report
    The National Security Archive The George Washington University Phone: 202/994-7000 Gelman Library, Suite 701 Fax: 202/994-7005 2130 H Street, N.W. www.nsarchive.org Washington, D.C. 20037 [email protected] Annual Report for 2006 The following statistics provide a performance index of the Archive’s work in 2006: ♦ Freedom of Information and declassification requests filed – 2,233 ♦ Freedom of Information and declassification appeals filed – 549 ♦ Pages of U.S. government documents released as the result of Archive requests – 89,153, including such newsmaking revelations as the unjustifiable reclassification of the long-public numbers of U.S. strategic bombers and missiles deployed during the 1960s and 1970s; documents that reveal that the Nixon administration came to a nuclear understanding with Golda Meir and ended American pressure for Israel to end its nuclear program; a declassified After Action report from the April 1999 Desert Crossing war games concluding that an invasion and post-war administration of Iraq would require 400,000 troops to stabilize the country following the removal of Saddam Hussein; and Veterans Administration reports indicate 1 in 4 veterans of the Iraq and Afghanistan wars are filing disability claims. ♦ Pages of declassified documents delivered to publisher – 8,386, in one reference collection: U.S. Intelligence on Weapons of Mass Destruction: From World War II to Iraq (Ann Arbor, Michigan: ProQuest Information & Learning/ Chadwyck-Healey, 2006) ♦ Books published by Archive staff and fellows–6 From Solidarity to Martial Law: The Polish Crisis of 1980-1981 by Andrzej Paczkowski and Malcolm Byrne (Budapest, Hungary: Central European University Press, 2006, 548 pp.); Spying on the Bomb: American Nuclear Intelligence from Nazi Germany to Iran and North Korea by Jeffrey T.
    [Show full text]
  • Intelligence Cooperation and the War on Terror
    Intelligence Cooperation and the War on Terror This book provides an in-depth analysis of UK–US intelligence cooperation in the post-9/11 world. Seeking to connect an analysis of intelligence liaison with the wider realm of Anglo-American Relations, the book draws on a wide range of interviews and consultations with key actors in both countries. The book is centred around two critical and empirical case studies, focusing on the interactions on the key issues of counterterrorism and weapons of mass destruction (WMD) counter-proliferation. These case studies provide substantive insights into a range of interactions such as 9/11, the 7/7 London bombings, the A.Q. Khan nuclear network, the prelude to the 2003 Iraq War, extraordinary renditions and Special Forces deployments. Drawing on over 60 interviews conducted in the United Kingdom and United States with prominent decision-makers and practitioners, these issues are exam- ined in the contemporary historical context, with the main focus being on the years 2000–5. This book will be of much interest to students of intelligence studies, foreign policy, security studies and International Relations in general. Adam D.M. Svendsen has a PhD in International History from the University of Warwick. He has been a Visiting Scholar at the Center for Peace and Security Studies, Georgetown University, and has contributed to the International Secur- ity Programme at Chatham House and to the work of IISS, London. Studies in intelligence series General Editors: Richard J. Aldrich and Christopher Andrew ISSN: 1368–9916 British Military Intelligence in the TET 1968 Palestine Campaign 1914–1918 Understanding the surprise Yigal Sheffy Ronnie E.
    [Show full text]