Though it lags behind the privatization of military services, the privatization of intelligence has expanded dramatically with the growth in intelligence activities following the 11 September 2001 attacks on the United States. The recent confirmation by the Director of the CIA that contractors have probably participated in waterboarding of detainees at CIA interrogation facilities has sparked a renewed debate over what activities it is appropriate to delegate to contractors, and what activities should remain ‘inherently governmental’. The article surveys outsourcing in electronic surveillance, rendition, and interrogation, as well as the growing reliance on private actors for analysis. It then turns to three challenges to accountability: th...
This article considers the growing parliamentary scrutiny of the intelligence and security agencies....
Controversial cases such as the aborted coup in Equatorial Guinea and the employment of private cont...
Over the last twenty years, revolutions in data capture and analysis have given enforcement and secu...
The increased intelligence support required for the global war on terrorism has led to exponential g...
As the United States government collects personal and private information about each of us, the gove...
Private contractors have played key roles in recent high-profile scandals. These scandals hint at th...
The Snowden revelations of mass online surveillance have provided unprecedented information on state...
The paper deals with the combination of two emerging topics in militarization and the conduct of war...
As technology advances businesses are being called upon to take an active role in helping protect na...
Antiterrorism intelligence sharing across national borders has been trumpeted as one of the most pro...
International audienceThe paper makes a literal interpretation of Jean-Paul Brodeur's response to th...
This is an Accepted Manuscript of an article published by Taylor & Francis in West European Politics...
This Article will focus on the narrower questions of whether obtaining secret intelligence-that is, ...
For the last two decades, near-blanket CIA secrecy has gone largely unchecked, principally because o...
This article posits that most classified intelligence activities of representative democracies may b...
This article considers the growing parliamentary scrutiny of the intelligence and security agencies....
Controversial cases such as the aborted coup in Equatorial Guinea and the employment of private cont...
Over the last twenty years, revolutions in data capture and analysis have given enforcement and secu...
The increased intelligence support required for the global war on terrorism has led to exponential g...
As the United States government collects personal and private information about each of us, the gove...
Private contractors have played key roles in recent high-profile scandals. These scandals hint at th...
The Snowden revelations of mass online surveillance have provided unprecedented information on state...
The paper deals with the combination of two emerging topics in militarization and the conduct of war...
As technology advances businesses are being called upon to take an active role in helping protect na...
Antiterrorism intelligence sharing across national borders has been trumpeted as one of the most pro...
International audienceThe paper makes a literal interpretation of Jean-Paul Brodeur's response to th...
This is an Accepted Manuscript of an article published by Taylor & Francis in West European Politics...
This Article will focus on the narrower questions of whether obtaining secret intelligence-that is, ...
For the last two decades, near-blanket CIA secrecy has gone largely unchecked, principally because o...
This article posits that most classified intelligence activities of representative democracies may b...
This article considers the growing parliamentary scrutiny of the intelligence and security agencies....
Controversial cases such as the aborted coup in Equatorial Guinea and the employment of private cont...
Over the last twenty years, revolutions in data capture and analysis have given enforcement and secu...