

Author: Matei Mihaela Niţu Ionel
Publisher: Routledge Ltd
ISSN: 1521-0561
Source: International Journal of Intelligence and Counterintelligence, Vol.25, Iss.4, 2012-12, pp. : 700-726
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Critical Thinking in Intelligence Analysis
International Journal of Intelligence and Counterintelligence, Vol. 21, Iss. 4, 2008-12 ,pp. :




The Challenges of Intelligence Sharing in Romania
Intelligence and National Security, Vol. 24, Iss. 4, 2009-08 ,pp. :




By Odom William
Intelligence and National Security, Vol. 23, Iss. 3, 2008-06 ,pp. :