Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Jamieson, Allison
.
Cooperation between Organized Crime Groups around the World
. Research Institute for the Study of Conflict and Terrorism, 1999.
Svendsen, Adam D. M.
.
"
Connecting Intelligence and Theory: Intelligence Liaison and International Relations
."
Intelligence and National Security
24, no. 5 (2009): 700-729.
Kent, Sherman
.
"
The Need for an Intelligence Literature
."
Studies in Intelligence
4 (1955).
Memorandum of Cooperation between the Mediterranean Council for Intelligence Studies (MCIS) and with the Center for Intelligence Studies, University of Calabria, Italy
. RIEAS, 2010.
Luna, David M.
.
Fighting Networks with Networks
In
Center for Complex Operations
. National Defense University Press, 2013.
Strategy to Combat Transnational Organised Crime. Addressing Converging Threats to National Security
. White House Administration, 2011.
Miklaucic, Michael
, and
Jacqueline Brewer
.
Illicit Networks and National Security in the Age of Globalization
. Center for Complex Operations (National Defense University Press), 2013.
Peterson, Marilyn
.
Intelligence-Led Policing: The New Intelligence Architecture
. Bureau of Justice Assistance, Department of Justice, 2005.
Abadinsky, Howard
.
Organized Crime
. Cengage Learning, 2010.
EU Nations Developing Cyber 'Capabilities' to Infiltrate Government, Private Targets
. EurActiv, 2013.
Best Practices Paper. Sharing among Domestic Competent Authorities. Information Related to the Financing of Proliferation
. The Financial Action Task Force, 2012.
Bell, Peter
.
"
Communication Interception Technology (CIT) and its use in the Fight against Transnational Organised Crime (TOC) in Australia: A Review of the Literature
."
International Journal of Social Science Research
59 (2014).
Rifkind, Malcolm
.
Access to Communications Data by the Intelligence and Security Agencies
. Intelligence and Security Committee, British Parliament, 2013.
Howard, Russell D.
.
Intelligence in Denied Areas: New Concepts for a Changing Security Environment
. The Joint Special Operations University Press, 2007.
Allen, Craig H.
.
Maritime Counterproliferation Operations and the Rule of Law
. Westport, CT: Praeger Publishers, 2007.
Europol Activities (Agreements)
. EUROPOL.
EUROJUST-US Agreement
. EUROJUST, 2006.
Cross, Maia K. Davies
.
A European Transgovernmental Intelligence Network and the Role of IntCen
In
Perspectives on European Politics and Society
. ARENA Centre for European Studies, 2014.
EUROPOL-INTERPOL Agreement
. EUROPOL, 2011.
Rosenbach, Eric
, and
Aki J. Peritz
.
Confrontation or Collaboration? Congress and the Intelligence Community. Background Memos on the Intelligence Community Report
. Belfer Center for Science and International Affairs, Harvard Kennedy School, 2009.
Magee, Aden C.
.
"
Countering Nontraditional HUMINT Collection Threats
."
International Journal of Intelligence and CounterIntelligence
23, no. 3 (2010): 509-520.
Lefebvre, Stephane
.
"
The Difficulties and Dilemmas of International Intelligence Cooperation
."
International Journal of Intelligence and CounterIntelligence
16, no. 4 (2003): 527-542.
Rudner, Martin
.
"
UK SIGINT Alliance Strategy's Transatlantic and European Connections
."
Intelligence and National Security
(2004): 577.
Lefebvre, Stephane
, and
Roger N. McDermott
.
"
Russia and the Intelligence Services of Central Asia
."
International Journal of Intelligence and CounterIntelligence
21, no. 2 (2008): 251-301.
Clarke, Richard A.
,
Michael J. Morell
,
Geoffrey R. Stone
,
Cass R. Sunstein
, and
Peter Swire
.
"
Liberty and Security in a Changing World
."
Report and Recommendations of The President’s Review Group on Intelligence and Communications Technologies
(2013): 81.
Pages
« първа
‹ предишна
…
48
49
50
51
52
53
54
55
56
…
следваща ›
последна »
374447 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance