{"title":"Accountability for covert action in the United States and the United Kingdom","authors":"M. Regan, Michele A. Poole","doi":"10.4324/9781003164197-20","DOIUrl":"https://doi.org/10.4324/9781003164197-20","url":null,"abstract":"","PeriodicalId":217139,"journal":{"name":"National Security Intelligence and Ethics","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130786330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital sleeper cells and the ethics of risk management","authors":"Kevin Macnish","doi":"10.4324/9781003164197-9","DOIUrl":"https://doi.org/10.4324/9781003164197-9","url":null,"abstract":"","PeriodicalId":217139,"journal":{"name":"National Security Intelligence and Ethics","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121213560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reflections on the future of intelligence","authors":"Gregory F. Treverton","doi":"10.4324/9781003164197-24","DOIUrl":"https://doi.org/10.4324/9781003164197-24","url":null,"abstract":"","PeriodicalId":217139,"journal":{"name":"National Security Intelligence and Ethics","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115460204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GEOINT and the post-secret world","authors":"R. Cardillo","doi":"10.4324/9781003164197-22","DOIUrl":"https://doi.org/10.4324/9781003164197-22","url":null,"abstract":"","PeriodicalId":217139,"journal":{"name":"National Security Intelligence and Ethics","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129223036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligence and the just war tradition","authors":"Ross W. Bellaby","doi":"10.4324/9781003164197-3","DOIUrl":"https://doi.org/10.4324/9781003164197-3","url":null,"abstract":"","PeriodicalId":217139,"journal":{"name":"National Security Intelligence and Ethics","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127649915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ethics in the recruiting and handling of espionage agents1","authors":"D. Perry","doi":"10.4324/9781003164197-7","DOIUrl":"https://doi.org/10.4324/9781003164197-7","url":null,"abstract":"","PeriodicalId":217139,"journal":{"name":"National Security Intelligence and Ethics","volume":" 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115211136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}