1. Environmental Security. Minneapolis, MN: University of Minnesota Press, 2002.
Krause, Environmental Change & Security Project Report 9 (2003), sees Dalby's work as "a serious attempt to grapple with the broader issues that arise from any attempt to understand modern society's relationship to the environment, and to the threats and insecurities emeging from the complex ... interaction of man and nature."
2. Security and Environmental Change. Cambridge, UK: Polity, 2009.
Salehyan, Perspectives on Politics 9.1 (Mar. 2011), says that this work "presents a comprehensive overview of the ways that environmental challenges affect human security at multiple levels, including individuals, countries, and the planet as a whole."
3. "Jousting with Malthus' Ghost: Environment and Conflict after the Cold War." Geopolitics 5, no. 1 (2000): 165-175.
4. "The Politics of Environmental Security." In Green Security or Militarized Environment? ed. Jyrki Käkönen, 25-54. Brookfield: Dartmouth Publishing Co., 1994.
5. "Security and Ecology in the Age of Globalization." Environmental Change & Security Project Report 8 (Summer 2002): 95-108.
6. "Security, Intelligence, the National Interest and the Global Environment." Intelligence and National Security 10, no. 4 (Oct. 1995): 175-197.
"[I]f one takes the global situation of burgeoning environmental degradation and global change seriously, then it is clear that security agencies need substantial reform to incorporate a focus on 'domestic' sources of insecurity in the form of unsustainable economic activities and on the international dangers of continued 'development' as it has been practiced for the last half century."
Dale, Catherine. National Security Professionals and Interagency Reform: Proposals, Recent Experience, and Issues for Congress. Washington, DC: Congressional Research Service, Library of Congress, 26 Sep. 2011. [Available at: http://www.fas.org/sgp/crs/natsec/RL34565.pdf]
The focus here is "on analyzing key issues that Members ... may wish to consider in evaluating existing or proposed NSP [national security professionals] initiatives, including the fundamental purpose; the concept of integration; the scope of participation; practical modalities for making the program work; the role of centralized oversight; incentive structures for individuals and agencies; recruiting; and congressional oversight. For context, the report also describes early NSP proposals; U.S. government strategic guidance; the experiences of the NSPD [National Security Professional Development] program to date; and significant congressional initiatives."
Dale, Catherine Marie. Operation Iraqi Freedom: Strategies, Approaches, Results, and Issues for Congress. Washington, DC: Congressional Research Service, Library of Congress, 2 Apr. 2009. [Available at: http://www.fas.org/sgp/crs/natsec/RL34387.pdf]
Daley, Suzanne. "An Electronic Spy Scare Is Alarming Europe." New York Times, 24 Feb. 2000. [http://www.nytimes.com]
"Fears that the United States, Britain and other English-speaking countries are using a cold-war eavesdropping network to gain a commercial edge roused passions across Europe [on 23 February 2000], even after Washington and London roundly denied the notion."
Daley, Suzanne. "South African Links Top Spy to the Slaying of Olof Palme." New York Times, 27 Sep. 1996, A10.
Dallin, Alexander. Black Box: KAL 007 and the Superpowers. Berkeley, CA: University of California Press, 1985.
Miller, IJI&C 1.1: Dallin "attempts to reconstruct the incident. In addition, he reviews various hypotheses regarding the Soviet Air Defense Command and 'insofar as it is relevant,' agencies of the United States. Finally he deduces some lessons concerning the behavior patterns of the two superpowers in the managing of international crises.... [He] essentially conclude[s] that the 007 flight was planned by U.S. intelligence ... [but] is quite circumspect and cautious."
Dallin, David J. "Operation Kidnap: Berlin's Soviet Underworld." American Mercury 74 (May 1952): 55-62.
Accuses Russians of kidnapping anti-Soviet dissidents and calls for West to do more to stop such activity.
Dallin, David J. Soviet Espionage. New Haven, CT: Yale University Press, 1955. London: Oxford University Press, 1956.
Pforzheimer calls Dallin an "authoritative source" who presents "one of the most comprehensive treatments of the subject"; the book is "limited to [the] period prior to the mid-fifties." To Chambers, the book is the "first rigorous Western look at the Soviet intelligence services -- the ultimate reference on the period before the use of the term KGB." Constantinides notes that the perspective of time has diminished the importance of this early effort on this subject.
Dalrymple, William. Return of a King: The Battle for Afghanistan, 1839-42. New York: Knopf, 2013.
Peake, Studies 57.4 (Dec. 2013), says the author "does a magnificent job of describing the intricacies of 19th century Afghan tribal politics and what would today be called their insurgency approach to warfare. He demonstrates what can happen when these factors are ignored by politicians."
Dalton, Hugh. The Fateful Years -- Memoirs, 1931-1945. London: F. Muller, 1957.
Dalton was appointed Minister of Economic Warfare in 1940, was instrumental in establishing SOE, and later served on the PWE executive committee.
Daly, Judith A., and Stephen J. Andriole. "The Use of Events/Interaction Research by the Intelligence Community." Policy Sciences 12, no. 2 (Aug. 1980): 215-228.
A heavily "political sciency" article that argues for applying academic quantitative research to early warning operational activities.
Dalzel-Job, Patrick. From Arctic Snow to Dust of Normandy. London: Lionel Leventhal, 1992.
Thuermer, FILS 11.6: "This intelligence bell-ringer is a can't-put- it-down book."
Dam, Kenneth W, and Herbert S. Lin, eds. Cryptography's Role in Securing the Information Society. Washington, DC: National Academy of Sciences Press, 1996.
Cooper, FA 76.2 (Mar.-Apr. 1996), identifies this as the work of a 16-member committee, which airs "all aspects of public policy toward cryptography.... The committee argues for much more general availability and much greater use of cryptography." The report "contains a wealth of information."
Damaskin, Igor, and Geoffrey Elliott. Kitty Harris: The Spy with Seventeen Names. London: St. Ermin's, 2001.
Unsinger, IJI&C 17.1, finds that the authors "use Kitty Harris's life to explain a great deal about the USSR's International Department and its personnel." The Soviet files used by the authors "describe Harris not as a case officer, but simply a cutout for [Earl] Browder [from 1923 to 1929], doing his courier work." During World Warr II, "she began doing work in support of Soviet espionage efforts in the atomic energy sphere, in her usual capacity as courier and cutout." The book "is somewhat of a disappointment," in that it has "just a few quotes from papers in the KGB's Harris files."
D'Amato, Alfonse M., and Antonia M. Greenman. "The Freedom of Information Act and the CIA: How S. 1235 Will Enhance Our Nation's Security." Journal of Legislation 9 (Summer 1982): 179-193 .
Damrosh, Lori F. "Covert Operations." American Journal of International Law 83 (Oct. 1989): 795-805.
Expresses the belief that Congress needs to play a more active oversight role with regard to covert activities.
Return to D Table of Contents
Return to Alphabetical Table of Contents