Books on the topic 'Australian Security and Intelligence Organisation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Australian Security and Intelligence Organisation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Blesing, Meena. Was your dad a Russian spy?: The personal story of the Combe/Ivanov affair by David Combe's wife. South Melbourne, Australia: Sun Books, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1954-, Bergin Anthony, Hall Robert A. 1947-, and Australian Defence Studies Centre, eds. Intelligence: And Australian national security. Canberra, A.C.T: Australian Defence Studies Centre, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Marsden, Hope Robert, ed. Report on the Australian Security Intelligence Organization, December 1984. Canberra: Aust. Govt. Publ. Service, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Flood, Philip. Report of the inquiry into Australian intelligence agencies. Canberra: Dept. of the Prime Minister and Cabinet, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cain, Frank. Terrorism & intelligence in Australia: A history of ASIO and national surveillance. North Melbourne, Vic: Australian Scholarly Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tubbs, Michael. ASIO: The enemy within. Croyden Park, NSW: M. Tubbs, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gobert, Wayne. The origins of Australian diplomatic intelligence in Asia, 1933-1941. Canberra, Australia: Strategic and Defence Studies Centre, Research School of Pacific Studies, Australian National University, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cain, Frank. Terrorism & intelligence in Australia: A history of ASIO and national surveillance. North Melbourne, Vic: Australian Scholarly Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sasson, Molly J. More cloak than dagger: One woman's career in secret intelligence. Ballarat, Vic: Connor Court Publishing, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wesley, Michael. Between probity and proficiency: Challenge and change within the Australian intelligence community = Probité et compétence : défis et changements au sein de l'appareil australien du renseignement. Ottawa, Ont: Canadian Security Intelligence Service = Service canadien du renseignement de sécurité, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Capp, Fiona. Writers defiled. Ringwood, Vic: McPhee Gribble, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

David, McKnight. Australia's spies and their secrets. St. Leonards, NSW, Australia: Allen & Unwin, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hocking, Jenny. Terror laws: ASIO, counter-terrorism and the threat to democracy. Sydney, NSW, Australia: UNSW Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

McNab, Claire. Murder undercover: A Denise Cleever thriller. Tallahassee, Fla: Naiad Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Jacobsen, Hans Adolf. The Nazi Party and the German Foreign Office. New York: Routledge, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

National Commission on Terrorist Attacks upon the United States. The 9/11 Commission report: Final report of the National Commission on Terrorist Attacks upon the United States. New York: Norton, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Benjamin, Daniel. The next attack: The failure of the war on terror and a strategy for getting it right. New York: Owl Books/Henry Holt, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

H, Kean Thomas, and Hamilton Lee, eds. The 9/11 Commission report: Final report of the National Commission on Terrorist Attacks upon the United States. Washington, DC: National Commission on Terrorist Attacks upon the United States, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

H, Kean Thomas, and Hamilton Lee, eds. The 9/11 Commission report: Final report of the National Commission on Terrorist Attacks Upon the United States. New York: W.W. Norton, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

National Commission on Terrorist Attacks upon the United States. The 9/11 Commission report: Final report of the National Commission on Terrorist Attacks upon the United States. New York: Norton, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

National Commission on Terrorist Attacks upon the United States. 11-S, el informe: Extracto del informe final de los atentados terroristas contra Estados Unidos. Barcelona: Paidós, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Svantesson, Dan Jerker B., and Rebecca Azzopardi. Systematic Government Access to Private-Sector Data in Australia. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190685515.003.0010.

Full text
Abstract:
The chapter provides a summary of Australian privacy law including the Privacy Act and the Australian Privacy Principles. After describing the national legal context and fundamental principles governing Australia’s federal system of government with power distributed among six states, two territories, and the federal government, it describes laws separately governing law enforcement and intelligence agencies, including the Australian Security Intelligence Organisation (ASIO). The authors suggest that, although the Australian government has a range of powers to obtain private-sector data, those powers appear primarily aimed at obtaining specific data for specific purposes. Little was found by way of direct unmediated access by the government to private-sector data or government access to private-sector data in bulk.
APA, Harvard, Vancouver, ISO, and other styles
23

Cain, Frank. The Australian Security Intelligence Organization. Routledge, 2012. http://dx.doi.org/10.4324/9780203043752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Australian Security Intelligence Organization: An Unofficial History. Routledge, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Cain, Frank. Australian Security Intelligence Organization: An Unofficial History. Taylor & Francis Group, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Cain, Frank. Australian Security Intelligence Organization: An Unofficial History. Taylor & Francis Group, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

The Australian Security Intelligence Organization: An unofficial history. Richmond, Vic: Spectrum Publications, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

The Australian Security Intelligence Organization: An unofficial history. London, England: F. Cass, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Ottens, Reinhard W., Harald Olschok, and Stephan Landrock. Recht und Organisation privater Sicherheitsdienste in Europa. Boorberg, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Cain, Frank. The Australian Security Intelligence Organization: An Unofficial History (Cass Series : Studies in Intelligence). Routledge, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Cain, Frank. The Australian Security Intelligence Organization: An Unofficial History (Cass Series: Studies in Intelligence). Routledge, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Tale of the scorpion. Sydney: Allen & Unwin, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Die Nachrichtendienste im Regelwerk der deutschen Sicherheitsverwaltung: Legitimation, Organisation und Abgrenzungsfragen. Berlin: Duncker & Humblot, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Terrorism & intelligence in Australia: A history of ASIO and national surveillance. North Melbourne, Vic: Australian Scholarly Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

The Petrov affair. Melbourne, Australia: Text, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Manne, Robert. Petrov Affair: Politics and Espionage. Elsevier Science & Technology Books, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Man of Intelligence: The Life of Captain Eric Nave, Code Breaker Extraordinary. ReadHowYouWant.com, Limited, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Pfennigwerth, Ian. Man of Intelligence: The Life of Captain Theodore Eric Nave, Australian Codebreaker Extraordinary. Rosenberg Publishing Pty, Limited, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Man of Intelligence: The Life of Captain Theodore Eric Nave, Australian Codebreaker Extraordinary. ReadHowYouWant.com, Limited, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

A Man of Intelligence: The Life of Captain Eric Nave, Australian Codebreaker Extraordinary. Rosenberg Publishing, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Confronting "the Enemy Within": Security Intelligence, the Police, and Counterterrorism in Four Democracies. RAND Corporation, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Moorhouse, Frank. Australia under surveillance: How should we act? 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Dirty secrets: Our ASIO files. Sydney, New South Wales: NewSouth, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Protest Years: The Official History of Asio, 1963-1975. Allen & Unwin, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Protest Years: The Official History of ASIO, 1963-1975. Allen & Unwin, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

McNab, Claire. Murder Undercover. Bella Books, Incorporated, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

de Werd, Peter. US Intelligence and Al Qaeda. Edinburgh University Press, 2020. http://dx.doi.org/10.3366/edinburgh/9781474478069.001.0001.

Full text
Abstract:
The book provides insights on three levels. First, it examines how Al Qaeda and US narratives in the 1990s were of great importance to the formation of Al Qaeda as organisation, network and ideology. Second, it instructively details the analysis by contrasting narratives (ACN) methodology of identifying, analysing and contrasting relevant security-related macro and micro narratives. Third, it thereby fills a lacuna in intelligence studies by translating insights from discourse analysis, critical theory and security studies to enrich the practice of intelligence analysis and its study. In doing so it also contributes to ongoing debate on securitization in security studies. Rather than seeking to identify successful instances of securitization and their effects, securitization efforts in macro narratives are studied and adopted as conceptual lens. Critical micro narratives are added to highlight tensions and inconsistencies in macro narratives. This can lead to reconsider their consistency and hence the appropriateness of the level of analysis. How contested, divided or pragmatic was ‘Al Qaeda’? By comparing and contrasting narratives, engaging in reflexive ‘narrative net assessment’, the study of Al Qaeda and US narratives has revealed how defining an enemy and attempting to counter terrorist threats also contributed to the manifestation of the threat. In articulating other and self, and acting upon it, processes of identification among members and supporters of adversarial entities were strengthened.
APA, Harvard, Vancouver, ISO, and other styles
48

Dylan, Huw, David Gioe, and Michael S. Goodman. The CIA and the Pursuit of Security. Edinburgh University Press, 2020. http://dx.doi.org/10.3366/edinburgh/9781474428842.001.0001.

Full text
Abstract:
Taking declassified and publicly available sources this book provides an insight into the evolution of the Central Intelligence Agency from 1947 to the Trump Presidency. Focusing on a mix of case studies historic case studies such as The Berlin Tunnel, and The Cuban Missile Crisis. As well as discussing the internal changes and evolution of the organisation from planning covert actions, to adapting to, using and developing technology to aid in intelligence collection and analysis. The book also talks to key individuals that have shaped the organisation at different points in its history as well as how different Presidents have used the Agency to deliver political decisions. The book is balanced in its presentation of successes and failures, the latter often times more well known: Iraq being perhaps the best known example. The use of declassified documentation elevates this from being another history of the Central Intelligence Agency, into an insightful window into a famous yet secret organisation with a global brand.
APA, Harvard, Vancouver, ISO, and other styles
49

Ward, Robert, David Blundell, Caroline Stone, and Karl Laird, eds. National Security Law, Procedure and Practice. 2nd ed. Oxford University PressOxford, 2024. http://dx.doi.org/10.1093/oso/9780198895282.001.0001.

Full text
Abstract:
Abstract This book considers national security law with reference to the use, protection, and disclosure of intelligence and other secret material. It analyses the substantive law relating to national security, its practice, and related procedures, and the background to national security law in the UK, its development, and the constitutional issues to which it gives rise. It covers the work of the intelligence agencies, their oversight, and accountability. It focuses on the main types of executive measures taken by the government on national security grounds, for example, deportation; deprivation of citizenship; refusal of naturalisation; exclusions; the Terrorism Prevention and Investigation Measures Act 2011; the state threats, prevention and investigation measures framework; temporary exclusion orders; and proscription. It covers related legal proceedings, including Closed material proceedings, in specialist tribunals such as the Special Immigration Appeals Commission, the Prescribed Organisation Appeals Commission, and the Security Vetting Appeals Panel, as well as civil proceedings involving national security issues. The book covers sanctions and the increasingly important field of responses to state threats, for example, through measures taken under the National Security and Investment Act 2021, and deals with security issues in the criminal arena, the main offences under the Terrorism Acts and the National Security Act 2023, the approach of the criminal courts to national security matters, the impact of national security issues in inquests and public inquiries, and treatment of national security issues in education, employment, and family law, finally covering freedom of information and data protection.
APA, Harvard, Vancouver, ISO, and other styles
50

Simon, Steven, Daniel Benjamin, and Simon Steven Jr. Next Attack: The Failure of the War on Terror and a Strategy for Getting It Right. Holt & Company, Henry, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography