Espionage and Intelligence. Debra A. Miller, Book Editor

Size: px
Start display at page:

Download "Espionage and Intelligence. Debra A. Miller, Book Editor"

Transcription

1 Espionage and Intelligence Debra A. Miller, Book Editor

2 Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system was not created until after the December 7, 1941, Japanese attack on Pearl Harbor. Intelligence information needed by the president and policy makers to conduct foreign policy and protect the United States from its enemies has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system was not created until after the December 7, 1941, Japanese attack on Pearl Harbor. The surprise attack revealed major flaws in U.S. intelligence capabilities, brought the United States into World War II, and spurred the United States to develop a much larger and more coordinated intelligence community. Indeed, even during the war, the United States moved to improve its intelligence system. The army, navy, and marines each conducted intelligence operations, and the United States created the Office of Strategic Services (OSS) under the Joint Chiefs of Staff, a military advisory group, to analyze all national security information. All of these intelligence efforts were successful during the war, producing critical intelligence that helped America win the conflict. After the war, President Harry S. Truman closed down the OSS, but the Soviet Union s postwar decision to expand its influence in Europe caused him to rethink the need for intelligence. Numerous independent and congressional investigations recommended a variety of approaches to intelligence. One of the major issues considered was whether the military should retain control of intelligence or whether a civilian intelligence agency should be created. 16

3 The end result of these investigations was the passing of the National Security Act of 1947, a law that created the framework for today s national security and intelligence system. Under the act, a civilian Central Intelligence Agency (CIA), headed by a director of central intelligence, was established to handle all national intelligence gathering and to advise the president. In addition, a National Security Council (NSC) was created to coordinate national security policy; the army, the navy, and the newly created air force were unified under a new cabinet position, the secretary of defense; and the Joint Chiefs of Staff were charged solely with providing military advice to the president and the secretary of defense. This CIA-run intelligence system became one of the key features of the Cold War the decades-long period of tension and threats between the United States and the Soviet Union that ended only with the economic and political collapse of the latter in During the Cold War, all of the CIA s operations were designed to counteract Soviet activities that U.S. officials believed constituted a threat to the United States and world security. As a result, the CIA focused on sending spies to various locations to extract secrets about the Soviet military buildup and on protecting the U.S. military establishment from Soviet espionage efforts. This period also witnessed a large escalation in the use of satellites and other technological devices for detecting Soviet military intentions and activities. Many intelligence analysts and employees became experts on the Soviet Union, with little knowledge of other parts of the world. When the Cold War ended, however, this intelligence system suddenly seemed obsolete. The system s failure to predict or prevent the terrorist attacks on September 11, 2001, together with the lack of weapons of mass destruction (WMDs) found in Iraq after the George W. Bush administration used the threat of WMDs as the underpinning for the Iraq war, led to calls for intelligence reform. These events caused many policy makers and intelligence experts to conclude that the 17

4 Espionage and Intelligence U.S. intelligence community was not properly configured to develop accurate information about terrorism, nuclear weapons proliferation, and other modern threats. This conclusion was bolstered by the findings of two independent commissions created by the government the National Commission on Terrorist Attacks upon the United States (the 9/11 Commission ) and the Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (the WMD Commission ). In 2004, Congress passed legislation that, together with some previous reforms, provided for a series of major changes in the organization of the U.S. intelligence system. Today s U.S. intelligence community is composed of a group of sixteen federal agencies and organizations under the control of the executive branch. The CIA continues to be a principal intelligence agency, together with the Federal Bureau of Investigation (FBI), two components of the Department of Homeland Security (DHS), and a growing number of intelligence entities within the Department of Defense (such as the Defense Intelligence Agency (DIA), the National Security Agency (NSA) and the National Reconnaissance Office (NRO)). Recent reforms, however, created the position of Director of National Intelligence (DNI) to oversee all intelligence activities throughout the government, taking this responsibility away from the director of the CIA. Reforms also added the Drug Enforcement Administration (DEA) to the list of intelligence agencies, and established two new national centers the National Counterterrorism Center (NCTC) and the Weapons Intelligence, Nonproliferation, and Arms Control Center (WINPAC) to encourage collaboration among intelligence agencies on these specific national security concerns. As these reforms suggest, the work of the intelligence community now includes collecting information not only on the activities of foreign governments and their agents, but also on weapons proliferation around the globe, international narcotics activities, and potential terrorist threats. 18

5 Making this transition into the twenty-first century of intelligence gathering is the focus of many of the selections in Current Controversies: Espionage and Intelligence. The authors in this volume discuss a variety of issues, including the severity and nature of the intelligence failures relating to 9/11 and Iraq, the effectiveness of recent reforms, and suggestions for additional improvements. In addition, authors provide their perspectives on whether recent intelligence activities may be impinging on important civil and human rights. As all of these selections suggest, creating an intelligence system that fits America s needs in the post Cold War period is one of the nation s biggest challenges. 19

US Intelligence Community. 2005-6 Thomas Patrick Carroll 1

US Intelligence Community. 2005-6 Thomas Patrick Carroll 1 US Intelligence Community 2005-6 Thomas Patrick Carroll 1 Policy (defn): (a) General course of action, selected from among alternatives, intended to guide present and future decisions. (b) A highlevel

More information

Foreign Affairs and National Security

Foreign Affairs and National Security Foreign Affairs and National Security Objectives: TLW understand and explain the following questions as it relates to the Foreign affairs of the American Government What is foreign policy? What is the

More information

CAREER OPPORTUNITIES

CAREER OPPORTUNITIES Wherever you serve within the Intelligence Community (IC), you will be working to defeat terrorism at home and abroad, prevent and counter the spread of weapons of mass destruction, protect the health

More information

Note: This compilation of the National Security Act of 1947 reflects amendments enacted into law through Public Law 110 53 (August 3, 2007).

Note: This compilation of the National Security Act of 1947 reflects amendments enacted into law through Public Law 110 53 (August 3, 2007). Note: This compilation of the National Security Act of 1947 reflects amendments enacted into law through Public Law 110 53 (August 3, 2007). These materials are not official evidence of the laws set forth

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Domestic Intelligence Eric Rosenbach and Aki J. Peritz Domestic Intelligence Unlike many nations, the United States does not have

More information

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Synopsis Seminar #3 : Domestic Information Challenges and Tactical vs. National Requirements Who Should Do Domestic

More information

Statement for the Record by. Dr. Donald M. Kerr. Director, National Reconnaissance Office, Nominee for the Position of

Statement for the Record by. Dr. Donald M. Kerr. Director, National Reconnaissance Office, Nominee for the Position of Statement for the Record by Dr. Donald M. Kerr Director, National Reconnaissance Office, Nominee for the Position of Principal Deputy Director of National Intelligence, before the Senate Select Committee

More information

Alaska Elevation Data Collection Update National Geospatial Advisory Committee

Alaska Elevation Data Collection Update National Geospatial Advisory Committee Alaska Elevation Data Collection Update National Geospatial Advisory Committee 22 June 2010 Steve Wallach NGA GEOINT Information Executive 1 2 3 AK Elevation Data - Contract Status Contributing partners

More information

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak March 22, 2004 OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak The Bush Administration s fiscal year (FY) 2005 budget request includes $47.4 billion for homeland

More information

One Hundred Twelfth Congress of the United States of America

One Hundred Twelfth Congress of the United States of America S. 3454 One Hundred Twelfth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday, the third day of January, two thousand and twelve An Act

More information

o n H o m e l a n d S e c u r i t y

o n H o m e l a n d S e c u r i t y H o u s e C o m m i t t e e o n H o m e l a n d S e c u r i t y I n t e l l i g e n c e G a t h e r i n g R e f o r m D i r e c t o r : M a r i n a S h u t y 2008 Institute for Domestic & International

More information

Brief Documentary History of the Department of Homeland Security

Brief Documentary History of the Department of Homeland Security Brief Documentary History of the Department of Homeland Security 2001 2008 History Office Table of Contents Introductory Note... 2 Homeland Security Before September 11... 3 The Office of Homeland Security...

More information

TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE

TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE Select Committee on Homeland Security U.S. House of Representatives "Information Sharing

More information

Counterintelligence Awareness Glossary

Counterintelligence Awareness Glossary Counterintelligence Awareness Glossary Access: The ability and opportunity to obtain knowledge of classified information. Anomaly: Activity r knowledge, outside the norm, that suggests a foreign entity

More information

Balancing Privacy & Security: The Role of Privacy and Civil Liberties in the Information Sharing Environment

Balancing Privacy & Security: The Role of Privacy and Civil Liberties in the Information Sharing Environment Balancing Privacy & Security: The Role of Privacy and Civil Liberties in the Information Sharing Environment IAPP Conference 2010 Samuel P. Jenkins Director for Privacy, Defense Privacy & Civil Liberties

More information

BGS Managing Director Michael Allen s Book, Blinking Red, is Reviewed By The Center for the Study of Intelligence

BGS Managing Director Michael Allen s Book, Blinking Red, is Reviewed By The Center for the Study of Intelligence BGS Managing Director Michael Allen s Book, Blinking Red, is Reviewed By The Center for the Study of Intelligence Blinking Red Book Review March 2014 Reviewed by Roger Z. George The far-reaching intelligence

More information

INTELLIGENCE AND ANALYSIS

INTELLIGENCE AND ANALYSIS OFFICE OF INTELLIGENCE AND ANALYSIS U.S. DEPARTMENT OF THE TREASURY WORKING AT OIA OIA S MISSION POSITION DESCRIPTIONS BENEFITS & CONTACT INFORMATION working at oia OIA officers support the formulation

More information

The Need to Share: The U.S. Intelligence Community and Law Enforcement

The Need to Share: The U.S. Intelligence Community and Law Enforcement The Need to Share: The U.S. Intelligence Community and Law Enforcement A White Paper prepared by the AFCEA Intelligence Committee April 2007 Serving Intelligence Professionals and their Community The Need

More information

Chapter 18 Practice Exam

Chapter 18 Practice Exam Chapter 18 Practice Exam Which of the following accurately describes the United Nations? o The UN, an international organization formed after World War I in an effort to avoid another world war, has always

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

http://www.washingtontimes.com/news/2015/sep/21/danielgallington-the-chinese-hack-of-opm/

http://www.washingtontimes.com/news/2015/sep/21/danielgallington-the-chinese-hack-of-opm/ Daniel J. Gallington Daniel J. Gallington is Adjunct Professor of Law at the University of Illinois College of Law in Champaign-Urbana, Illinois, where he teaches National Security Law. Mr. Gallington

More information

Intelligence Analysis for Homeland Security RPAD 557

Intelligence Analysis for Homeland Security RPAD 557 Intelligence Analysis for Homeland Security RPAD 557 Instructor: Dr. James E. Steiner Public Service Professor Rockefeller College SUNY Albany 518-708-4183 Office hours: by appointment 423 State Street

More information

The War on Terror in Classrooms and Clinics: An Inventory

The War on Terror in Classrooms and Clinics: An Inventory 480 Journal of Legal Education The War on Terror in Classrooms and Clinics: An Inventory Editors Note: As part of this symposium issue on the impact of the war on terror on legal education, the Journal

More information

Introduction. YOU BREAK IN? Perhaps you have spent countless hours trying to figure out how you fit into an

Introduction. YOU BREAK IN? Perhaps you have spent countless hours trying to figure out how you fit into an Introduction The field of intelligence is a vast and continuously growing entity, comprised of a myriad of government agencies, private firms, and non-profit organizations. The growth and trajectory of

More information

HOW THE US GOVERNMENT WORKS HOW THE US SECURITY AGENCIES WORK. by Allan B. Cobb. Core Library

HOW THE US GOVERNMENT WORKS HOW THE US SECURITY AGENCIES WORK. by Allan B. Cobb. Core Library HOW THE HOW THE US GOVERNMENT WORKS US SECURITY AGENCIES WORK by Allan B. Cobb Core Library HOW THE US GOVERNMENT WORKS HOW THE US SECURITY AGENCIES by Allan B. Cobb WORK Content Consultant Dr. Lamont

More information

HOMELAND SECURITY INTELLIGENCE RPAD 556

HOMELAND SECURITY INTELLIGENCE RPAD 556 HOMELAND SECURITY INTELLIGENCE RPAD 556 Dr. James E. Steiner Public Service Professor Rockefeller College The University at Albany, SUNY 423 State Street 518 708 4183 Office hours: by appointment Course

More information

The Design of an Undergraduate Program In Homeland Security

The Design of an Undergraduate Program In Homeland Security VOLUME 6, NUMBER 1, 2012 The Design of an Undergraduate Program In Homeland Security Jon E. Travis Professor Director, Higher Ed Doctoral Program Director, Center for Community College Education Department

More information

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C.

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C. CATO HANDBOOK FOR CONGRESS POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS Washington, D.C. 6. Homeland Security Congress should monitor closely the implementation of the new Department of Homeland Security

More information

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency

More information

Guide to Graduate Programs. Master of Arts Degrees Certificates of Graduate Study

Guide to Graduate Programs. Master of Arts Degrees Certificates of Graduate Study Guide to Graduate Programs Master of Arts Degrees Certificates of Graduate Study The Institute of World Politics is a graduate school of national security and international affairs, dedicated to developing

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST

More information

Introduction to Special Edition on University Nonproliferation Education and Training

Introduction to Special Edition on University Nonproliferation Education and Training Introduction to Special Edition on University Nonproliferation Education and Training PNNL-SA-50159 Nonproliferation, like many aspects of security, has not played out as many expected following the end

More information

JOHN DAVIDSON WOODWARD, JR.

JOHN DAVIDSON WOODWARD, JR. JOHN DAVIDSON WOODWARD, JR. Professor of the Practice of International Relations The Frederick S. Pardee School of Global Studies, Boston University 152 Bay State Road, Boston, MA 02215 E-mail: jdwjr@bu.edu

More information

The National Counterintelligence Strategy of the United States

The National Counterintelligence Strategy of the United States The National Counterintelligence Strategy of the United States Office of the National Counterintelligence Executive March 2005 National Counterintelligence Strategy of the United States PREFACE The Counterintelligence

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21283 Updated August 6, 2003 CRS Report for Congress Received through the CRS Web Homeland Security: Intelligence Support Richard A. Best, Jr. Specialist in National Defense Foreign Affairs,

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

Bureau of Industry and Security

Bureau of Industry and Security Bureau of Industry and Security The mission of the Bureau of Industry and Security (BIS) is to advance U.S. national security, foreign policy, and economic objectives by ensuring an effective export control

More information

National Security Adjudicator Training Program

National Security Adjudicator Training Program DIRECTOR OF NATIONAL INTELLIGENCE WASHINGTON, DC 20511 E/S 00530 MEMORANDUM FOR: SUBJECT: Distribution National Security Adjudicator Training Program In my role as Security Executive Agent pursuant to

More information

ADDRESS 001 UNITED STATES SENATE 002 U.S. HOUSE OF REPRESENTATIVES 003 COMMISSION SECURITY & COOPERATION IN EUROPE 006 U.S. CAPITOL POLICE+D32

ADDRESS 001 UNITED STATES SENATE 002 U.S. HOUSE OF REPRESENTATIVES 003 COMMISSION SECURITY & COOPERATION IN EUROPE 006 U.S. CAPITOL POLICE+D32 ADDRESS KEY 001 UNITED STATES SENATE NAME 002 U.S. HOUSE OF REPRESENTATIVES 003 COMMISSION SECURITY & COOPERATION IN EUROPE 006 U.S. CAPITOL POLICE+D32 010 ARCHITECT OF THE CAPITOL 015 U.S. BOTANICAL GARDEN

More information

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference.

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. The following pages intend to guide you in the research of the topics that will be debated at MMUN

More information

Earn a Bachelor or Master of Science Degree (BS/MS) in Intelligence Management at Henley-Putnam, a Leader in Intelligence Studies Education

Earn a Bachelor or Master of Science Degree (BS/MS) in Intelligence Management at Henley-Putnam, a Leader in Intelligence Studies Education Student and Faculty Login The University Request Information Sitemap Read Our Expert Guide To: Potential for obtaining intelligence jobs is enhanced by focus in intelligence studies Earn a Bachelor or

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Eric Rosenbach and Aki J. Peritz Confrontation or Collaboration? Congress and the Intelligence Community Eric Rosenbach and Aki

More information

Guideline for Identifying an Information System as a National Security System

Guideline for Identifying an Information System as a National Security System NIST Special Publication 800-59 Guideline for Identifying an Information System as a National Security System William C. Barker I N F O R M A T I O N S E C U R I T Y Computer Security Division Information

More information

Counterterrorism and Cybersecurity

Counterterrorism and Cybersecurity Newton Lee Counterterrorism and Cybersecurity Total Information Awareness Spri Part I Counterterrorism in Retrospect: Then and Now 1 September 11 Attacks 3 1.1 September 3 Disney's Responses to the Attacks

More information

A BRIEF HISTORY OF THE INFORMATION SHARING ENVIRONMENT (ISE)

A BRIEF HISTORY OF THE INFORMATION SHARING ENVIRONMENT (ISE) A BRIEF HISTORY OF THE INFORMATION SHARING ENVIRONMENT (ISE) As the nation enters the second decade following the terrorist attacks of September 11, 2001, our information sharing challenges are maturing.

More information

Table of Contents. Tab 3: Requirements, Planning, and Direction What Intelligence Can (and Cannot) Do...39 Who Uses U.S. Intelligence?...

Table of Contents. Tab 3: Requirements, Planning, and Direction What Intelligence Can (and Cannot) Do...39 Who Uses U.S. Intelligence?... i ii Table of Contents Tab 1: Intelligence Overview Defining and Using Intelligence...7 What is the Intelligence Community?...7 The Six Steps in the Intelligence Cycle...10 Tab 2: Intelligence Community

More information

CBO. Federal Funding for Homeland Security: An Update. What Is Homeland Security?

CBO. Federal Funding for Homeland Security: An Update. What Is Homeland Security? CBO A series of issue summaries from the Congressional Budget Office JULY 20, 2005 Federal Funding for Homeland Security: An Update The terrorist attacks of September 11, 2001, heightened Congressional

More information

Appendix -- Homeland Security Mission Funding by Agency and Budget Account (budget authority in millions of dollars)

Appendix -- Homeland Security Mission Funding by Agency and Budget Account (budget authority in millions of dollars) Department of Agriculture 508.8-528.6-603.6 Agricultural Research Service/ Buildings and Facilities/005-18-1401 - - 45.0-113.7 Protecting Critical Infrastructure and Key Assets - - 45.0-113.7 Agricultural

More information

Course Principles of GPA. Unit III Implementation of the Three Branches of Government

Course Principles of GPA. Unit III Implementation of the Three Branches of Government Course Principles of GPA Unit III Implementation of the Three Branches of Government Essential Question What are the structure and functions of the executive branch of the government, including the constitutional

More information

The Role of Intelligence

The Role of Intelligence The Role of Intelligence WITH the end of the Cold War and the reduced need to focus on the former Soviet Union, many observers believed that the Intelligence Community was looking for new missions to justify

More information

Parliamentary monitoring mechanism on intelligence agencies in selected places

Parliamentary monitoring mechanism on intelligence agencies in selected places RP06/07-08 30 May 2008 Prepared by Thomas WONG Research and Library Services Division Legislative Council Secretariat 5th Floor, Citibank Tower, 3 Garden Road, Central, Hong Kong Telephone : (852) 2869

More information

The National Security Policy Process: The National Security Council and Interagency System

The National Security Policy Process: The National Security Council and Interagency System The National Security Policy Process: The National Security Council and Interagency System By Alan G. Whittaker, Ph.D Shannon A. Brown, Ph.D Frederick C. Smith, and Ambassador Elizabeth McKune Annual Update:

More information

2003 INNOVATIONS AWARDS PROGRAM Application Form

2003 INNOVATIONS AWARDS PROGRAM Application Form 2003 INNOVATIONS AWARDS PROGRAM Application Form 1. Program Name New York State Office of Public Security Counter-Terrorism Network 2. Administering Agency New York State Office of Public Security 3. Contact

More information

working group on foreign policy and grand strategy

working group on foreign policy and grand strategy A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established

More information

Graduate Certificate in Global Security Studies. Brandon Prins Political Science UTK

Graduate Certificate in Global Security Studies. Brandon Prins Political Science UTK Graduate Certificate in Global Security Studies Brandon Prins Political Science UTK Purpose of Certificate Program Training Increase understanding of salient security issues, such as the proliferation

More information

News on the Internet: Information and Citizenship in the 21st Century

News on the Internet: Information and Citizenship in the 21st Century Oxford Scholarship Online You are looking at 1-10 of 25 items for: keywords : Quantum Information Science polcom polame News on the Internet: Information and Citizenship in the 21st Century Item type:

More information

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE 9/11 Steven Kosiak, Director of Budget Studies, Center for Strategic & Budgetary Assessments Since the terrorist

More information

INTELLIGENCE: PRACTICES, PROBLEMS & PROSPECTS. Syllabus. 17.951, Spring 2006 R. Vickers, B. Posen Thursday, 10:30 a.m. 12:30 p.m.

INTELLIGENCE: PRACTICES, PROBLEMS & PROSPECTS. Syllabus. 17.951, Spring 2006 R. Vickers, B. Posen Thursday, 10:30 a.m. 12:30 p.m. INTELLIGENCE: PRACTICES, PROBLEMS & PROSPECTS Syllabus 17.951, Spring 2006 R. Vickers, B. Posen Thursday, 10:30 a.m. 12:30 p.m., E51-057 This course will explore the organization and functions of the U.S.

More information

CRS Report for Congress Received through the CRS Web

CRS Report for Congress Received through the CRS Web CRS Report for Congress Received through the CRS Web Order Code RS20243 Updated July 23, 1999 DOE Security: Protecting Nuclear Material and Information Zachary S. Davis Specialist Resources, Science, and

More information

Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett

Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett Issue Paper Center for Strategic Leadership, U.S. Army War College May 2003 Volume 04-03 Wargaming Homeland Security and Army Reserve Component Issues By Professor Michael Pasquarett Background The President

More information

Security Studies MA. Your entry in to the World of National Security DESIGNED FOR THE REAL WORLD SECURITY JOB MARKET:

Security Studies MA. Your entry in to the World of National Security DESIGNED FOR THE REAL WORLD SECURITY JOB MARKET: Security Studies MA Your entry in to the World of National Security POTENTIAL CAREERS: Intelligence Analysis Counterterrorism Intelligence Operations Military Careers Risk Analysis Diplomacy Consulting

More information

JOSEPH E. BAILER Curriculum Vita

JOSEPH E. BAILER Curriculum Vita JOSEPH E. BAILER Curriculum Vita 2018 Fort Bragg Road Suite 116 B Fayetteville, NC 28306 Phone (910) 964-2206 joebailer@embarqmail.com May 2014 Education: Master of Science in Criminal Justice Fayetteville

More information

Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports

Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports 2005 SRI International SRI International Company Proprietary Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports Presented to: 10 th Annual Harbor Safety

More information

HOMELAND SECURITY INTERNET SOURCES

HOMELAND SECURITY INTERNET SOURCES I&S Internet Sources I&S HOMELAND SECURITY INTERNET SOURCES USEFUL SITES, PORTALS AND FORUMS Homeland Security Home Page http://www.whitehouse.gov/homeland/ A federal agency whose primary mission is to

More information

The main object of my research is :

The main object of my research is : The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is

More information

THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM

THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 09-36 September 2009 THE FEDERAL

More information

GAO. COMBATING TERRORISM Federal Agencies Efforts to Implement National Policy and Strategy. Report to Congressional Requesters

GAO. COMBATING TERRORISM Federal Agencies Efforts to Implement National Policy and Strategy. Report to Congressional Requesters GAO United States General Accounting Office Report to Congressional Requesters September 1997 COMBATING TERRORISM Federal Agencies Efforts to Implement National Policy and Strategy GAO/NSIAD-97-254 GAO

More information

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Subject: Critical Infrastructure Identification, Prioritization, and Protection For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;

More information

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

December 17, 2003 Homeland Security Presidential Directive/Hspd-7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

Threat Intelligence: Friend of the Enterprise

Threat Intelligence: Friend of the Enterprise SECURELY ENABLING BUSINESS Threat Intelligence: Friend of the Enterprise Danny Pickens Principal Intelligence Analyst MSS FishNet Security DANNY PICKENS Principal Intelligence Analyst, FishNet Security

More information

GAO COMBATING TERRORISM. Issues in Managing Counterterrorist Programs. Testimony

GAO COMBATING TERRORISM. Issues in Managing Counterterrorist Programs. Testimony GAO For Release on Delivery Expected at 2:00 p.m. Thursday, April 6, 2000 United States General Accounting Office Testimony Before the Subcommittee on Oversight, Investigations, and Emergency Management,

More information

How safe is the American homeland?

How safe is the American homeland? The Oxford Council on Good Governance OCGG Security Section Advice Program US Foreign, Security, and Defence Policy Governance Area US Security Policy You may not be interested in war, but war is interested

More information

WORLD WAR 2 Political and economic conditions in Europe and throughout the world after World War 1 led directly to World War 2:

WORLD WAR 2 Political and economic conditions in Europe and throughout the world after World War 1 led directly to World War 2: Political and economic conditions in Europe and throughout the world after World War 1 led directly to World War 2: 1. The Treaty of Versailles, ending World War 1, was particularly harsh on Germany and

More information

Research Note Engaging in Cyber Warfare

Research Note Engaging in Cyber Warfare Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines

More information

U.S. DoD Physical Security Market

U.S. DoD Physical Security Market U.S. DoD Physical Security Market Technologies Used for DoD Applications June 2011 Table of Contents Executive Summary 7 Introduction 8 Definitions and Scope 9-11 Percentage of FY 2010 Total Budget Request

More information

Three Branches of Government. Lesson 2

Three Branches of Government. Lesson 2 Three Branches of Government The Executive Branch The President of the United States is the leader of the executive branch. The President s duties are to: Enforce federal laws and recommend new ones Serve

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5545.04 April 7, 2011 USD(P&R) SUBJECT: Policy on the Congressional Reporting Process for Military Educational Institutions Seeking to Establish, Modify, or Redesignate

More information

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT) Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction

More information

Challenging the Red Line between Intelligence and Policy

Challenging the Red Line between Intelligence and Policy INSTITUTE FOR THE STUDY OF DIPLOMACY Edmund A. Walsh School of Foreign Service GEORGETOWN UNIVERSITY Red Line between Prepared by Dr. James E. Steiner OVERVIEW The red line is a warning to intelligence

More information

Subject: National Preparedness

Subject: National Preparedness For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-8 Subject: National Preparedness Purpose (1) This directive establishes

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

ANSER and AMERICAN MILITARY UNIVERSITY. Homeland Security Education

ANSER and AMERICAN MILITARY UNIVERSITY. Homeland Security Education ANSER and AMERICAN MILITARY UNIVERSITY Homeland Security Education AGENDA Introduction Program Administration: AMU Content Administration: ANSER Homeland Security Courses Academic Degree Integration Options

More information

DEPARTMENT OF DEFENSE

DEPARTMENT OF DEFENSE DEPARTMENT OF DEFENSE Funding Highlights: Provides $553 billion for the base budget, an increase of $22 billion above the 2010 appropriation. This reflects continued investment in national security priorities

More information

Pros, Cons and Opportunities

Pros, Cons and Opportunities National Security Watch 31 January 2003 NSW 03-1 Department of Homeland Security: Pros, Cons and Opportunities This series is designed to provide news and analysis on pertinent national security issues

More information

United States Counterintelligence

United States Counterintelligence Global Security Studies, Fall 2014, Volume 5, Issue 4 United States Counterintelligence Benjamin York Campbell University Buies Creek, NC 27506 bbyork0506@email.campbell.edu Abstract Counterintelligence

More information

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. . SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote

More information

QUICKSTART RULES Turn Order Rolling Dice 10s Damage Number Caps

QUICKSTART RULES Turn Order Rolling Dice 10s Damage Number Caps QUICKSTART RULES The actual rules of Terror Network are a little more involved, but here is a simplified rules section to get you started. Terror Network puts you into the role of a counter-terrorism agent.

More information

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the

More information

Department of Homeland Security Information Sharing Strategy

Department of Homeland Security Information Sharing Strategy Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction

More information

Intelligence as a Career

Intelligence as a Career Intelligence as a Career Is It Right For You and Are You Right For It? Association of Former Intelligence Officers 7700 Leesburg Pike Ste 324, Falls Church, VA 22043 www.afio.com Updated January 2013 B

More information

Homeland Security Presidential Directive/HSPD-5 1

Homeland Security Presidential Directive/HSPD-5 1 For Immediate Release Office of the Press Secretary February 28, 2003 Homeland Security Presidential Directive/HSPD-5 1 Subject: Management of Domestic Incidents Purpose (1) To enhance the ability of the

More information

Emerging Threats and Challenges for Homeland Air Security

Emerging Threats and Challenges for Homeland Air Security Emerging Threats and Challenges for Homeland Air Security Presentation to National Defense Industrial Association (NDIA) Missile Defense RADM Mike Mathis, Lt. Col., Carey Briefer Director, Joint Air and

More information

20, 1994. Service on Feb. 20, 1994.

20, 1994. Service on Feb. 20, 1994. DEPARTMENT OF AGRICULTURE Agricultural Cooperative Service Agricultural Marketing Service Agricultural Research Service Agricultural Stabilization & Conservation Service Animal & Plant Health Inspection

More information

Report to Congress on The Role of the Department of Defense in Supporting Homeland Security. September 2003

Report to Congress on The Role of the Department of Defense in Supporting Homeland Security. September 2003 Report to Congress on The Role of the Department of Defense in Supporting Homeland Security September 2003 Pursuant to Section 1404 of the National Defense Authorization Act for Fiscal Year 2003 Table

More information

The Crisis Management System in Germany

The Crisis Management System in Germany The Crisis Management System in Germany www.bmi.bund.de Last update: January 2010 Contents Preliminary remarks... 5 1. Background... 5 2. Legal framework... 8 3. Crisis management at the federal level..

More information

CRS Report for Congress

CRS Report for Congress Order Code RL32816 CRS Report for Congress Received through the CRS Web The National Counterterrorism Center: Implementation Challenges and Issues for Congress March 16, 2005 Todd M. Masse Specialist in

More information

Insider s Guide to Careers in Intelligence Analysis. hosted by Tom Hunter, MA, M.Litt. (Former DIA Senior Intelligence Analyst)

Insider s Guide to Careers in Intelligence Analysis. hosted by Tom Hunter, MA, M.Litt. (Former DIA Senior Intelligence Analyst) Insider s Guide to Careers in Intelligence Analysis hosted by Tom Hunter, MA, M.Litt. (Former DIA Senior Intelligence Analyst) December 17, 2009 Overview Presenter s Background Overview of Intelligence

More information