This document summarizes the proceedings from a conference on teaching intelligence at colleges and universities held on June 18, 1999. It includes the program agenda, remarks from those who welcomed participants and introduced speakers, and transcripts of the keynote addresses delivered by General Samuel V. Wilson and Lloyd Salvetti. The document provides information on the structure and goals of the conference, which aimed to discuss the current state and future of teaching intelligence as an academic discipline at higher education institutions.
Information Gathering in Intelligence AgenciesNora A. Rahim
Information gathering and sharing between agencies is critical for preventing threats like terrorism, yet involvement of classified information makes studying the relationship between information science and intelligence work difficult. The document discusses the differences between information and intelligence, the intelligence cycle of collecting, analyzing and using information to produce finished intelligence for policymakers, and various types of intelligence including current, estimative, warning, research, and scientific/technical intelligence. It concludes by recommending better information retrieval and an understanding of information science to provide timely intelligence while reducing pressure on analysts.
This document discusses various aspects of intelligence collection and analysis. It begins by outlining different types of instruments used in foreign policy, including military force, economic tools, and cultural influence. It then focuses on intelligence collection and analysis, discussing the Presidential Daily Briefing (PDB), which provides daily summaries of national security issues to the President. The document also outlines the structure of the intelligence community, including the various directorates within the CIA and the types of intelligence collected, such as human intelligence and signals intelligence. It discusses the role of intelligence analysts and considers some issues, such as the politicization of intelligence.
Chapter 4 the intelligence process a macro look who does what for whomDoing What I Do
The document discusses the intelligence process from identifying requirements to feedback. It consists of 7 phases: 1) Identifying requirements, 2) Collection, 3) Processing and exploitation, 4) Analysis and production, 5) Dissemination, 6) Consumption, 7) Feedback. Each phase is described in detail, highlighting issues and tensions that can arise such as an imbalance between collection and processing. The process is depicted as non-linear, with the potential to return to earlier phases based on new information or changing needs.
Chapter 5 collection and the collection disciplinesDoing What I Do
The United States uses multiple collection disciplines (INTs) including imagery, signals, measurement and signatures, and human intelligence to collect intelligence. These collection methods each have strengths and weaknesses and there are ongoing debates around resource prioritization and development of new collection systems. Additionally, greater emphasis on collection over analysis processing has also been an issue. The document then discusses various collection methods and issues around balancing collection capabilities with protecting sources and methods.
This document summarizes and analyzes concepts related to intelligence analysis. It discusses a 2008 book that assesses the state of US intelligence analysis after 9/11 and proposes improvements. It also explains the intelligence cycle of planning, collection, processing, analysis, and dissemination. Additionally, it covers sources of intelligence like OSINT, HUMINT, SIGINT, GEOINT, and MASINT. Key aspects of analysis like denial and deception, the counterintelligence function, and applying the intelligence cycle to competitive business intelligence are also summarized.
This document discusses various challenges and best practices related to intelligence analysis. It notes that the core function of intelligence is producing timely, objective reports and analysis to inform policy decisions. However, it also outlines issues like mirror-imaging, clientism, and conveying uncertainty that analysts must guard against. The document advocates training analysts to recognize biases, establishing review processes, and using precise language to communicate the level of confidence in assessments.
The document summarizes the U.S. national security policy process and the role of intelligence in supporting policymakers. It describes the main components of the policy process including the president, national security departments and agencies, the National Security Council, Congress, and the intelligence community. It discusses how these groups have varying interests and perspectives. It also outlines the intelligence cycle of planning and directing collection needs, collecting information, processing and analyzing the data, and disseminating intelligence reports to policymakers. The document notes both the importance of intelligence in informing policies, and the limitations of intelligence in the policymaking process.
This document provides an overview of executive and congressional oversight of the U.S. intelligence community. It discusses key issues in executive oversight including the President's Foreign Intelligence Advisory Board and its subset the President's Intelligence Oversight Board. It also covers congressional oversight authorities like budgets, investigations, and reporting requirements. Challenges in congressional oversight are explored such as balancing security needs with transparency, and internal dynamics like committee turf and the impact of external factors.
Information Gathering in Intelligence AgenciesNora A. Rahim
Information gathering and sharing between agencies is critical for preventing threats like terrorism, yet involvement of classified information makes studying the relationship between information science and intelligence work difficult. The document discusses the differences between information and intelligence, the intelligence cycle of collecting, analyzing and using information to produce finished intelligence for policymakers, and various types of intelligence including current, estimative, warning, research, and scientific/technical intelligence. It concludes by recommending better information retrieval and an understanding of information science to provide timely intelligence while reducing pressure on analysts.
This document discusses various aspects of intelligence collection and analysis. It begins by outlining different types of instruments used in foreign policy, including military force, economic tools, and cultural influence. It then focuses on intelligence collection and analysis, discussing the Presidential Daily Briefing (PDB), which provides daily summaries of national security issues to the President. The document also outlines the structure of the intelligence community, including the various directorates within the CIA and the types of intelligence collected, such as human intelligence and signals intelligence. It discusses the role of intelligence analysts and considers some issues, such as the politicization of intelligence.
Chapter 4 the intelligence process a macro look who does what for whomDoing What I Do
The document discusses the intelligence process from identifying requirements to feedback. It consists of 7 phases: 1) Identifying requirements, 2) Collection, 3) Processing and exploitation, 4) Analysis and production, 5) Dissemination, 6) Consumption, 7) Feedback. Each phase is described in detail, highlighting issues and tensions that can arise such as an imbalance between collection and processing. The process is depicted as non-linear, with the potential to return to earlier phases based on new information or changing needs.
Chapter 5 collection and the collection disciplinesDoing What I Do
The United States uses multiple collection disciplines (INTs) including imagery, signals, measurement and signatures, and human intelligence to collect intelligence. These collection methods each have strengths and weaknesses and there are ongoing debates around resource prioritization and development of new collection systems. Additionally, greater emphasis on collection over analysis processing has also been an issue. The document then discusses various collection methods and issues around balancing collection capabilities with protecting sources and methods.
This document summarizes and analyzes concepts related to intelligence analysis. It discusses a 2008 book that assesses the state of US intelligence analysis after 9/11 and proposes improvements. It also explains the intelligence cycle of planning, collection, processing, analysis, and dissemination. Additionally, it covers sources of intelligence like OSINT, HUMINT, SIGINT, GEOINT, and MASINT. Key aspects of analysis like denial and deception, the counterintelligence function, and applying the intelligence cycle to competitive business intelligence are also summarized.
This document discusses various challenges and best practices related to intelligence analysis. It notes that the core function of intelligence is producing timely, objective reports and analysis to inform policy decisions. However, it also outlines issues like mirror-imaging, clientism, and conveying uncertainty that analysts must guard against. The document advocates training analysts to recognize biases, establishing review processes, and using precise language to communicate the level of confidence in assessments.
The document summarizes the U.S. national security policy process and the role of intelligence in supporting policymakers. It describes the main components of the policy process including the president, national security departments and agencies, the National Security Council, Congress, and the intelligence community. It discusses how these groups have varying interests and perspectives. It also outlines the intelligence cycle of planning and directing collection needs, collecting information, processing and analyzing the data, and disseminating intelligence reports to policymakers. The document notes both the importance of intelligence in informing policies, and the limitations of intelligence in the policymaking process.
This document provides an overview of executive and congressional oversight of the U.S. intelligence community. It discusses key issues in executive oversight including the President's Foreign Intelligence Advisory Board and its subset the President's Intelligence Oversight Board. It also covers congressional oversight authorities like budgets, investigations, and reporting requirements. Challenges in congressional oversight are explored such as balancing security needs with transparency, and internal dynamics like committee turf and the impact of external factors.
The document analyzes the 2001 cyber attacks between the United States and China following a collision between a U.S. plane and Chinese fighter jet. Chinese hackers began attacking U.S. websites in protest, and U.S. hackers retaliated, launching a 7-day cyber battle. The attacks involved web defacement, viruses, and DDoS attacks targeting government websites. Both sides were motivated by patriotism and tensions between the countries. The U.S. responded defensively while China took a more offensive approach. The attacks exposed vulnerabilities in how each country approached cyber defense and deterrence at the time.
This document provides information about the Journal of Information Warfare, including the journal staff, editorial board, scope, subscription information, and contents of the upcoming Volume 14, Issue 2. It discusses that the journal aims to provide a forum for academics and practitioners in information warfare/operations to discuss topics ranging from destruction of information systems to psychological aspects of information use. The upcoming issue will feature 9 articles covering key areas related to information assurance and cybersecurity such as cyber operations and defense, training cyber forces, understanding co-evolution of cyber defenses and attacks, and defending cyberspace with software-defined networks.
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
This presentation will analyze the Information Warfare scenarios, technical and legal backgrounds, highlighting as well the importance of the terminologies and bringing to the audience real-life examples and known incidents. The last part of the talk will focus on two theorical case studies and on one, very special, theorical case study.
This document discusses the need to establish an Integrated National Security Professional system to develop interagency national security professionals for the 21st century strategic environment. It analyzes the current system's gaps and recommends a new system with centralized management, leadership, and funding. The new system would designate National Security Professionals across government who receive integrated training and can rotate to roles outside their home agencies. It would include military, state, and local personnel and have four implementation stages. The document argues this approach is necessary for the complex problems facing the US and would improve on the current fragmented system.
This document discusses cyber security threats including cyber warfare, cyber crime, cyber terrorism, and cyber espionage. It outlines India's steps to secure cyberspace such as establishing the National Cyber Security Policy and National Critical Information Infrastructure Protection Centre. The document also analyzes how the "Clausewitzian Trinity" of the people, military, and government of a nation are increasingly dependent on information systems, making these elements susceptible to strategic cyber attacks that could paralyze a victim nation. It asserts that cyberspace has become the "fifth domain of war" alongside land, air, sea and space, compelling countries to develop cyber attack and defense capabilities.
MASINT (Measurement and Signature Intelligence) uses scientific and technical methods to collect strategic and tactical intelligence. It builds models to aid decision-making but can be complicated to apply quickly. In 2004, President Bush established the Commission on Intelligence Capabilities to review intelligence functions after 9/11. The commission found 74 areas needing reform, and 71 were addressed in the 2004 Intelligence Reform and Terrorism Prevention Act. This act established a director of national intelligence and improved information sharing. MASINT now plays a role in countering global terrorism by tracking networks and using enemies' own technology against them.
The document discusses the United States' current cyber strategy and whether it supports offensive cyber operations. It analyzes several scholarly articles on cyber warfare doctrine and strategy. While the articles provide examples of states conducting offensive cyber attacks, the document's hypothesis is that the US cyber strategy focuses on defense and does not explicitly support offensive computer network attacks to achieve national security objectives. The purpose is to examine US cyber strategy and determine if it should incorporate offensive operations to help achieve national goals.
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
In July 2016, the ATM heist of Taiwan First bank is based on well-known Carberp malware family. The threat of cybercrime is becoming increasingly complex and diverse on putting citizen’s data or money in danger. Cybercrime threats are often originating from trusted, malicious, or negligent insiders, who have excessive access privileges to sensitive data. The analysis of ATM heist threats presents many opportunities for improving the quality and value of digital evidence. This talk will introduce some OSINT methods that can help investigators to perform a cybercrime investigation process in a forensically sound and timely fashion manner. This talk further points out cybercrime investigation, digital forensics, and ICT governance for fighting against cybercrime issues. It requires the sincere examination of all available data volumes at a crime scene or in a lab to present digital evidence in a court of law.
The document discusses different types of cyberwarfare attacks that range from minor web vandalism to more dangerous attacks like equipment disruption and targeting critical infrastructure. It also covers the use of smart weapons guided by GPS for precision targeting and how combat training is increasingly using virtual simulations. Precision of satellite-guided weapons relies on the accuracy of the GPS coordinates provided for the target.
This document is a thesis submitted to American Public University examining the justification for the NSA's domestic bulk data collection and surveillance program. It provides background on the NSA's origins and mission, as well as the laws governing domestic surveillance. It discusses the controversy around the NSA's activities following the Snowden leaks, debating whether the national security benefits outweigh civil liberty costs. The thesis conducts a qualitative analysis of sources on both sides and aims to determine if the current legal framework requires reform while still protecting national security within the Constitution.
This document provides an overview of national security intelligence as a discipline. It aims to impart an understanding of the secret government agencies that provide security-related information to policymakers and carry out covert operations. The field of national security intelligence study has grown significantly since the 1970s, stimulated by intelligence scandals and failures in the US. This handbook seeks to map out the discipline and suggest future research agendas, drawing on the expertise of contributors from various countries and backgrounds. The goal of intelligence is to provide accurate and timely information to help policymakers make more effective decisions.
Over the history of warfare, we've seen the exposure radius of collateral damage expand. Stuxnet, Duqu and other acts of cyberwar require us to rethink the concept of collateral damage as they dramatically extend the potential damage radius to distant victims. In this presentation, given at Naval Leadership Weekend 2014, I discuss the concept of collateral damage in a cyberwarfare environment.
The document discusses a roundtable meeting between intelligence professionals and policymakers regarding the relationship between the intelligence community and policymakers. Some key points discussed include:
- There was debate around how to define "policymaker" as the audience for intelligence, with differing views on whether that included tactical-level military or just senior civilian and military leadership.
- Policymakers want both substantive intelligence to inform their decisions as well as political and bureaucratic support from the intelligence community.
- However, policymakers' approaches to and styles of interacting with intelligence analysts can vary significantly from being skeptical of intelligence to being overly reliant on it.
- Ensuring intelligence assessments are unbiased and addressing the real policy questions, not just the
Exam notes for the Certified in Homeland Security -- Level IIDavid Sweigert
The document provides an overview of key concepts for the Certified in Homeland Security – Level II exam, including risk management and intelligence processes. It discusses risk analysis, risk assessment, risk management, and the DHS risk management cycle. It also outlines the six steps of the intelligence community process - requirements, planning/direction, collection, processing, analysis/production, and dissemination. Additionally, it defines violent non-state actors and provides examples such as warlords, militias, insurgencies, terrorist organizations, and criminal organizations.
Prognosis of Theories of Intelligence in Counter Terrorism The Case of the No...YogeshIJTSRD
The Northern West part of Nigeria is faced with several security challenges that have threatened the existence of peace and security in the region. These threats to public safety and regional security have greatly undermined the governments primary responsibility of guaranteeing public safety and national security. This work, therefore, is on the prognosis of theories of intelligence in counterterrorism The case of North Western Nigeria. The study utilised primary and secondary data sources. The Primary data sources were from questionnaires administered physically and electronically via emails while, secondary data came from published books, journals, articles, lecture guides and videos. Acquired data were statistically analysed using simple percentage and Chi Square statistics. Sequel to the statistical results, findings revealed that there is a significant relationship between intelligence gathering and terrorism in Nort West, Nigeria. The study recommends that there should be training and retraining of personnel of the intelligence community to be able to meet up with the current trends and changes in the contemporary Nigerian environments for the effective gathering of intelligence and the ability to utilize it for productive law enforcement. Jonjon, Emmanuel "Prognosis of Theories of Intelligence in Counter-Terrorism: The Case of the Northwestern Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40057.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/sociology/40057/prognosis-of-theories-of-intelligence-in-counterterrorism-the-case-of-the-northwestern-nigeria/jonjon-emmanuel
This document discusses how Sun Tzu's classic work The Art of War can provide a framework for understanding cyber warfare, though it is not a perfect fit. It summarizes key concepts from The Art of War related to strategic thinking, cultivating success on defense, and gaining foreknowledge of adversaries. While cyber warfare is an unconventional threat, nations should still make strategic preparations and investments in network security to prevent being caught off guard by attacks.
China has developed extensive cyber warfare capabilities since the mid-1990s. They have intelligence and military organizations dedicated to cyber warfare and conduct frequent exercises. These capabilities include penetrating other networks and planting viruses. However, China's own networks remain vulnerable. As a result, China has adopted a pre-emptive cyber strategy of unleashing its capabilities at the start of potential conflicts to disrupt enemy systems, though these are still relatively unsophisticated. It is difficult to attribute many Chinese cyber activities to official agencies due to use of private actors.
The document discusses the need for a revolution in intelligence affairs (RIA) based on changes in the intelligence environment. It analyzes the intelligence community's structure, process, skill sets, and effectiveness using questions adapted from those used to identify previous revolutions. The analysis finds that developments have changed how intelligence is developed and used, requiring changes to structure, skills, and threatening countries that do not adapt. A new intelligence paradigm is needed to solve mysteries in addition to puzzles using classified, open source, and trusted information from global partners. Embracing an RIA will provide advantages over relying solely on traditional practices.
The article describes how the U.S. Army Europe Joint Multinational Readiness Center supported training Ukrainian armed forces in intelligence preparation for antiterrorism operations. It discusses how the traditional intelligence preparation process was inadequate, so the training team adapted it using the concept of "complex intelligence preparation of the battlefield" or "complex IPB". Complex IPB takes a more holistic approach analyzing the interactions between groups and how individual decisions collectively influence behavior. The training exercise applied this to Ukraine's conflict areas and was effective at understanding the separatist movement and considering how proposed military and non-military actions could impact behaviors.
This summary provides an overview of Jennifer Ng's background as a mid-level intelligence analyst with over 7 years of experience. She has a Master's in Intelligence Studies and served as an Intelligence Officer in the U.S. Air Force, conducting analysis on regions in East Asia, Southeast Asia, and South America. Her experience includes directing analysis teams, producing intelligence reports, briefing leaders, and supporting military operations. She is proficient in analysis tools and seeks new opportunities to utilize her skills.
The document analyzes the 2001 cyber attacks between the United States and China following a collision between a U.S. plane and Chinese fighter jet. Chinese hackers began attacking U.S. websites in protest, and U.S. hackers retaliated, launching a 7-day cyber battle. The attacks involved web defacement, viruses, and DDoS attacks targeting government websites. Both sides were motivated by patriotism and tensions between the countries. The U.S. responded defensively while China took a more offensive approach. The attacks exposed vulnerabilities in how each country approached cyber defense and deterrence at the time.
This document provides information about the Journal of Information Warfare, including the journal staff, editorial board, scope, subscription information, and contents of the upcoming Volume 14, Issue 2. It discusses that the journal aims to provide a forum for academics and practitioners in information warfare/operations to discuss topics ranging from destruction of information systems to psychological aspects of information use. The upcoming issue will feature 9 articles covering key areas related to information assurance and cybersecurity such as cyber operations and defense, training cyber forces, understanding co-evolution of cyber defenses and attacks, and defending cyberspace with software-defined networks.
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
This presentation will analyze the Information Warfare scenarios, technical and legal backgrounds, highlighting as well the importance of the terminologies and bringing to the audience real-life examples and known incidents. The last part of the talk will focus on two theorical case studies and on one, very special, theorical case study.
This document discusses the need to establish an Integrated National Security Professional system to develop interagency national security professionals for the 21st century strategic environment. It analyzes the current system's gaps and recommends a new system with centralized management, leadership, and funding. The new system would designate National Security Professionals across government who receive integrated training and can rotate to roles outside their home agencies. It would include military, state, and local personnel and have four implementation stages. The document argues this approach is necessary for the complex problems facing the US and would improve on the current fragmented system.
This document discusses cyber security threats including cyber warfare, cyber crime, cyber terrorism, and cyber espionage. It outlines India's steps to secure cyberspace such as establishing the National Cyber Security Policy and National Critical Information Infrastructure Protection Centre. The document also analyzes how the "Clausewitzian Trinity" of the people, military, and government of a nation are increasingly dependent on information systems, making these elements susceptible to strategic cyber attacks that could paralyze a victim nation. It asserts that cyberspace has become the "fifth domain of war" alongside land, air, sea and space, compelling countries to develop cyber attack and defense capabilities.
MASINT (Measurement and Signature Intelligence) uses scientific and technical methods to collect strategic and tactical intelligence. It builds models to aid decision-making but can be complicated to apply quickly. In 2004, President Bush established the Commission on Intelligence Capabilities to review intelligence functions after 9/11. The commission found 74 areas needing reform, and 71 were addressed in the 2004 Intelligence Reform and Terrorism Prevention Act. This act established a director of national intelligence and improved information sharing. MASINT now plays a role in countering global terrorism by tracking networks and using enemies' own technology against them.
The document discusses the United States' current cyber strategy and whether it supports offensive cyber operations. It analyzes several scholarly articles on cyber warfare doctrine and strategy. While the articles provide examples of states conducting offensive cyber attacks, the document's hypothesis is that the US cyber strategy focuses on defense and does not explicitly support offensive computer network attacks to achieve national security objectives. The purpose is to examine US cyber strategy and determine if it should incorporate offensive operations to help achieve national goals.
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
In July 2016, the ATM heist of Taiwan First bank is based on well-known Carberp malware family. The threat of cybercrime is becoming increasingly complex and diverse on putting citizen’s data or money in danger. Cybercrime threats are often originating from trusted, malicious, or negligent insiders, who have excessive access privileges to sensitive data. The analysis of ATM heist threats presents many opportunities for improving the quality and value of digital evidence. This talk will introduce some OSINT methods that can help investigators to perform a cybercrime investigation process in a forensically sound and timely fashion manner. This talk further points out cybercrime investigation, digital forensics, and ICT governance for fighting against cybercrime issues. It requires the sincere examination of all available data volumes at a crime scene or in a lab to present digital evidence in a court of law.
The document discusses different types of cyberwarfare attacks that range from minor web vandalism to more dangerous attacks like equipment disruption and targeting critical infrastructure. It also covers the use of smart weapons guided by GPS for precision targeting and how combat training is increasingly using virtual simulations. Precision of satellite-guided weapons relies on the accuracy of the GPS coordinates provided for the target.
This document is a thesis submitted to American Public University examining the justification for the NSA's domestic bulk data collection and surveillance program. It provides background on the NSA's origins and mission, as well as the laws governing domestic surveillance. It discusses the controversy around the NSA's activities following the Snowden leaks, debating whether the national security benefits outweigh civil liberty costs. The thesis conducts a qualitative analysis of sources on both sides and aims to determine if the current legal framework requires reform while still protecting national security within the Constitution.
This document provides an overview of national security intelligence as a discipline. It aims to impart an understanding of the secret government agencies that provide security-related information to policymakers and carry out covert operations. The field of national security intelligence study has grown significantly since the 1970s, stimulated by intelligence scandals and failures in the US. This handbook seeks to map out the discipline and suggest future research agendas, drawing on the expertise of contributors from various countries and backgrounds. The goal of intelligence is to provide accurate and timely information to help policymakers make more effective decisions.
Over the history of warfare, we've seen the exposure radius of collateral damage expand. Stuxnet, Duqu and other acts of cyberwar require us to rethink the concept of collateral damage as they dramatically extend the potential damage radius to distant victims. In this presentation, given at Naval Leadership Weekend 2014, I discuss the concept of collateral damage in a cyberwarfare environment.
The document discusses a roundtable meeting between intelligence professionals and policymakers regarding the relationship between the intelligence community and policymakers. Some key points discussed include:
- There was debate around how to define "policymaker" as the audience for intelligence, with differing views on whether that included tactical-level military or just senior civilian and military leadership.
- Policymakers want both substantive intelligence to inform their decisions as well as political and bureaucratic support from the intelligence community.
- However, policymakers' approaches to and styles of interacting with intelligence analysts can vary significantly from being skeptical of intelligence to being overly reliant on it.
- Ensuring intelligence assessments are unbiased and addressing the real policy questions, not just the
Exam notes for the Certified in Homeland Security -- Level IIDavid Sweigert
The document provides an overview of key concepts for the Certified in Homeland Security – Level II exam, including risk management and intelligence processes. It discusses risk analysis, risk assessment, risk management, and the DHS risk management cycle. It also outlines the six steps of the intelligence community process - requirements, planning/direction, collection, processing, analysis/production, and dissemination. Additionally, it defines violent non-state actors and provides examples such as warlords, militias, insurgencies, terrorist organizations, and criminal organizations.
Prognosis of Theories of Intelligence in Counter Terrorism The Case of the No...YogeshIJTSRD
The Northern West part of Nigeria is faced with several security challenges that have threatened the existence of peace and security in the region. These threats to public safety and regional security have greatly undermined the governments primary responsibility of guaranteeing public safety and national security. This work, therefore, is on the prognosis of theories of intelligence in counterterrorism The case of North Western Nigeria. The study utilised primary and secondary data sources. The Primary data sources were from questionnaires administered physically and electronically via emails while, secondary data came from published books, journals, articles, lecture guides and videos. Acquired data were statistically analysed using simple percentage and Chi Square statistics. Sequel to the statistical results, findings revealed that there is a significant relationship between intelligence gathering and terrorism in Nort West, Nigeria. The study recommends that there should be training and retraining of personnel of the intelligence community to be able to meet up with the current trends and changes in the contemporary Nigerian environments for the effective gathering of intelligence and the ability to utilize it for productive law enforcement. Jonjon, Emmanuel "Prognosis of Theories of Intelligence in Counter-Terrorism: The Case of the Northwestern Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40057.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/sociology/40057/prognosis-of-theories-of-intelligence-in-counterterrorism-the-case-of-the-northwestern-nigeria/jonjon-emmanuel
This document discusses how Sun Tzu's classic work The Art of War can provide a framework for understanding cyber warfare, though it is not a perfect fit. It summarizes key concepts from The Art of War related to strategic thinking, cultivating success on defense, and gaining foreknowledge of adversaries. While cyber warfare is an unconventional threat, nations should still make strategic preparations and investments in network security to prevent being caught off guard by attacks.
China has developed extensive cyber warfare capabilities since the mid-1990s. They have intelligence and military organizations dedicated to cyber warfare and conduct frequent exercises. These capabilities include penetrating other networks and planting viruses. However, China's own networks remain vulnerable. As a result, China has adopted a pre-emptive cyber strategy of unleashing its capabilities at the start of potential conflicts to disrupt enemy systems, though these are still relatively unsophisticated. It is difficult to attribute many Chinese cyber activities to official agencies due to use of private actors.
The document discusses the need for a revolution in intelligence affairs (RIA) based on changes in the intelligence environment. It analyzes the intelligence community's structure, process, skill sets, and effectiveness using questions adapted from those used to identify previous revolutions. The analysis finds that developments have changed how intelligence is developed and used, requiring changes to structure, skills, and threatening countries that do not adapt. A new intelligence paradigm is needed to solve mysteries in addition to puzzles using classified, open source, and trusted information from global partners. Embracing an RIA will provide advantages over relying solely on traditional practices.
The article describes how the U.S. Army Europe Joint Multinational Readiness Center supported training Ukrainian armed forces in intelligence preparation for antiterrorism operations. It discusses how the traditional intelligence preparation process was inadequate, so the training team adapted it using the concept of "complex intelligence preparation of the battlefield" or "complex IPB". Complex IPB takes a more holistic approach analyzing the interactions between groups and how individual decisions collectively influence behavior. The training exercise applied this to Ukraine's conflict areas and was effective at understanding the separatist movement and considering how proposed military and non-military actions could impact behaviors.
This summary provides an overview of Jennifer Ng's background as a mid-level intelligence analyst with over 7 years of experience. She has a Master's in Intelligence Studies and served as an Intelligence Officer in the U.S. Air Force, conducting analysis on regions in East Asia, Southeast Asia, and South America. Her experience includes directing analysis teams, producing intelligence reports, briefing leaders, and supporting military operations. She is proficient in analysis tools and seeks new opportunities to utilize her skills.
Military_Intelligence_Professional_Bulletin_OCT_DEC_2015Victor R. Morris
This document provides information about subscriptions and reprints for the Military Intelligence Professional Bulletin (MIPB). Free electronic subscriptions are available by emailing the editor and providing contact information. Notification should be provided when units move or deploy to ensure continuous receipt of the bulletin. Material in the MIPB is not copyrighted and can be reprinted while crediting the MIPB and authors. The document also lists leadership and staff positions for the MIPB as well as information on themes, submissions, and contacting the editor.
Military_Intelligence_Professional_Bulletin_APR_JUN_2015Victor R. Morris
The document outlines how to subscribe to the Military Intelligence Professional Bulletin for free and provides publication details such as submission deadlines and themes for upcoming issues. It also lists the leadership and staff of the U.S. Army Intelligence Center of Excellence who produce the bulletin on a quarterly basis.
The document discusses trends that will shape the operational environment between 2010-2025, including increasing globalization, shifting demographics, and emerging technologies. Key characteristics of future operations will include conducting operations among unfamiliar local populations, in urban or remote areas, against hybrid threats employing both conventional and unconventional tactics, and under intense media scrutiny. The era will be defined by persistent, ongoing conflicts that blur the lines between war and peace. Adversaries will increasingly employ adaptive "hybrid" strategies combining regular and irregular capabilities to limit U.S. access and gain advantage.
The document discusses the intelligence cycle, which is the process through which intelligence is obtained, produced, and made available to users. It involves the key steps of direction, collection, production/analysis, and dissemination. The cycle feeds back upon itself to ensure intelligence stays up-to-date and responds to the commander's needs.
Rethinking the intelligence cycle using social mediaAugust Jackson
Social media inside and outside the enterprise changes every stage of the traditional intelligence cycle. Social media moves more quickly than traditional media, gives us a two-way intimacy with sources and stakeholders and upends long-standing assumptions about secrecy. Technology and platforms change quickly, and CI professionals must develop an ability to experiment and adapt to these changes.
Using the Internet to Research Private Companies for Competitive IntelligenceAugust Jackson
These slides describe my process and methods for using readily-available resources on the Internet to quickly and inexpensively research private companies.
Covert action is defined as an activity undertaken by the US government to influence political, economic, or military conditions abroad in a way that does not reveal the US role. While secret, covert actions are meant to advance policy goals rather than just maintain secrecy. There has been debate over terminology used for covert actions, with euphemisms like "special activity" and "third option" employed at times instead of "covert action." Covert action became an increasingly used tool during the Cold War but questions remain about its continued relevance today outside of situations involving threats like proliferation, terrorism, or drug trafficking.
The document summarizes the three branches of the Philippine government according to the 1987 Constitution: the legislative, executive, and judicial branches. It describes the principle of separation of powers and checks and balances between the branches. Specifically regarding the legislative and executive branches:
The legislative branch is bicameral, consisting of the Senate and House of Representatives. The executive branch is headed by the President, who is both head of state and head of government, and assisted by the Vice President. Qualifications, terms of office, powers, and impeachment processes are outlined for the President, Vice President, and members of Congress.
The document defines covert action as activities by the US government to influence conditions abroad without publicly acknowledging its role. It then outlines the goals and key topics to be covered, including defining covert action, describing its various forms, discussing issues it raises, and providing historical examples. The document proceeds to explain different types of covert action and discuss key related concepts, laws, oversight mechanisms, and historical operations to provide context around this topic.
Pivotal role of intelligence analysis in ILPdalened
This is a presentation I delivered at a "Intelligence Strategies for Law Enforcement" conference in March 2010 in Pretoria. The focus was what analysts\' role is and what contribution they can make to the fight against crime. I represented the International Association for Law Enforcement Intelligence Analysts (IALEIA). You might find slide 5 with the 4 steps in the Intel cycle useful to describe to your colleagues what they can expect from you in all phases of the Intel process. I was a bit disappointed with the conference, as the organizers have definitely not done research to understand the topic themselves or get speakers that understand even the basics of intelligence.... However, I got some good feedback after the conference, but it looks as if we still have a very long struggle ahead of us to establish Intel-led policing in SA...
Information Fusion Methods for Location Data AnalysisAlket Cecaj
This document outlines a thesis on using data fusion methods for location data analysis. The thesis will examine using aggregated call detail records and social media data to detect and describe events in urban areas. It will also analyze re-identifying anonymized call detail records by fusing them with social network data. The document discusses different location data types, outlier detection methods, evaluating event detection precision and recall, and improving results by combining datasets. It also covers calculating user uniqueness from mobility data and the probabilistic approach to re-identification.
The document discusses competitive intelligence analysis tools for economic development. It introduces competitive intelligence and why analysis is important. It then describes the top 5 analysis tools: SWOT analysis, competitor profile, STEEP analysis, Porter's Five Forces model, and SPACE matrix. For each tool, it provides a description, objective, and details on the type of information needed to conduct the analysis. It concludes by offering some tips to remember and providing information about Intelegia, the company discussing the tools.
pranešimas Lietuvos akademinių bibliotekų informacinės infrastruktūros mokslui ir studijoms palaikymo ir plėtros konsorciumo seminare
„Išmanioji informacijos paieška“
2013.11.20 d. VU MKIC
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Puneet Kukreja
Puneet Kukreja of Deloitte gave a presentation at the ISF's 26th Annual World Congress on implementing threat intelligence systems. He discussed defining threat intelligence, the threat landscape facing organizations, and challenges in threat intelligence. Kukreja also covered the threat intelligence lifecycle, standards like STIX and TAXII, using cases studies and attributes to measure threat intelligence effectiveness. The presentation emphasized that threat intelligence requires integration across security operations and is one part of an overall security strategy.
1. The CIA was formed after World War 2 to centralize US intelligence gathering and analysis in response to failures like the Pearl Harbor attack.
2. The CIA was established by the National Security Act of 1947 to replace the OSS and analyze intelligence from all sources to brief policymakers.
3. The main roles of intelligence agencies like the CIA are to collect foreign intelligence, give early warning of crises, and inform policies and operations related to national security while protecting their sources and methods.
Many leaders believe that once a directive is given, the job of communicating to the organization is complete. When the results do not match what was anticipated, a natural response is to add more specificity to the directive and tighten controls. Unfortunately, this response is often counterproductive – slowing down and underutilizing the intelligence of teams while simultaneously creating the conditions for poor Executive decision-making and burn-out. The problem intensifies as organizations become larger and more dynamic.
Luckily, there is a solution to this dilemma through practices honed by military organizations. This presentation outlines the steps for achieving alignment and what should go into an effective strategic directive. The highly recommended source for this material is Stephen Bungay’s The Art of Action: How Leaders Close the Gap Between Plans, Actions and Results.
This document provides an agenda and biographies for speakers at a symposium on the Directors of Central Intelligence held at George Mason University on September 13, 2012. The agenda includes a keynote speech by General Michael Hayden and panels on the personal perspectives of former DCIs and the relationship between the DCI, White House and Congress. Speaker biographies are provided for Louis Fisher, Porter Goss, General Michael Hayden and others involved in intelligence and national security. The event aimed to increase understanding of the history and role of the DCI position.
Washington DC Area Chapter of IAFIE Spring 2016 NewsletterDavid Jimenez
This newsletter from the Washington DC Area Chapter of IAFIE provides updates on recent conferences and events:
1) They partnered with other organizations for an event featuring a speaker discussing the role of deception in military planning and operations based on a book about learning curves of military deception planners.
2) At another event, a former CIA director discussed his book about intelligence in the age of terror and the need for public understanding of intelligence roles.
3) Upcoming, the chapter plans an event at the National Cryptologic Foundation museum with a speaker during July 2016.
This passage describes the author's return to Vietnam in January 1968 to resume his duties as a CORDS advisor in Hue. Upon arriving in Danang, he encountered signs that sappers had penetrated the base's perimeter. After a delay, he took a short flight on a Pilatus Porter to Hue, where he was met by a friend. Unbeknownst to the author at the time, the communist forces were preparing to launch the Tet Offensive, during which they would seize Hue in a major attack, contradicting the assumption that both sides had spared the city from fighting out of respect for its historical and cultural significance.
A federal government has three levels: national, state, and local. It has a written constitution that divides power between the central and regional governments. A bicameral parliament makes laws at the national level. Citizens elect representatives to the parliament through free and fair elections. This structure aims to protect individual liberties while allowing for self-governance at multiple levels.
The Battle of Beersheba in October 1917 was a pivotal battle in the British campaign in Palestine during World War I. British intelligence capabilities had greatly improved by 1917, allowing for effective integration of spy networks, communications intercepts, reconnaissance, and deception. This provided a major advantage over the Ottoman forces. The timing of the Battle of Beersheba was determined by developments on other fronts that freed up Ottoman troops and threatened British positions in Mesopotamia. The battle was the British army's third attempt that year to breach the Ottoman defensive line between Gaza and Beersheba. Through effective use of intelligence, including deception operations, the British were successful in taking Beersheba, a key step towards capturing Jerusalem
George H.W. Bush was a model intelligence consumer who deeply appreciated the efforts of intelligence officers. He received the President's Daily Brief every day as Vice President and President from 1981-1993. Bush ensured intelligence officers knew their work was valued through personal notes of thanks. He also had a good sense of humor, adding a "Signs of the Times" section to lighten the mood and showing interest in foreign leaders' activities by occasionally calling them. Bush maintained relationships with intelligence officers after leaving office, demonstrating his care for people through concern and encouragement. His appreciation of intelligence stands out among those who briefed him over many years.
George H.W. Bush was a model intelligence consumer who deeply appreciated the efforts of intelligence officers. He received the President's Daily Brief every day as Vice President and President from 1981-1993. Bush ensured intelligence officers knew their work was valued through personal notes of thanks. He also made the briefings more informal with humor, adding a "Signs of the Times" section and discussing foreign leaders' activities. Bush demonstrated care for intelligence officers on a personal level, even years after leaving office. His appreciation of intelligence work shaped a generation of officers and established him as an exemplary consumer of intelligence.
The document outlines the complexities involved in writing an outline for an essay on "Essay Outline," including balancing structure and flexibility, specificity and generality, and requiring an in-depth understanding of the topic. It states that creating such an outline requires careful consideration but can
This editorial discusses the relationship between oncology research and the shifting political climate in the United States over time. It notes that President Nixon's signing of the National Cancer Act in 1971 was considered progressive at the time, though few today recognize the political implications. The authors reflect on how political views in the U.S. tend to operate around a central point and can drive major changes through subtle shifts left or right. Oncology research must be aware of and adapt to changes in societal values and standards of ethical research as influenced by the pendulum of American democracy.
This photographic essay depicts CIA officers serving in war through portraits and artifacts. It begins with the OSS in WWII and continues through present-day conflicts. The subjects reflect on acts of heroism, difficult missions, notifying families of loss, and coping with the horrors and complexities of war. Their service highlights both the personal toll of duty and the resilience of CIA people.
How to Structure a Theory of Knowledge Essay. Theory of Knowledge Essay - International Baccalaureate Theory of .... Theory of Knowledge Essay | TKS1 - Theory of Knowledge - Tees | Thinkswap. Theory of knowledge essay. Theory of knowledge essay outline - International Baccalaureate Theory .... Theory-of-Knowledge-Essay-Outline-For-Mr-rnyta5 | Essay outline, Essay .... Theory of Knowledge, IB Essay … - ncufoundation.x.fc2.com. Theory of knowledge essay requirements for penn.
Hunter Killer Teams Attacking Enemy Safe Havens 2010CIARO
This document discusses hunter-killer teams and their role in attacking enemy safe havens. It provides background on hunter-killer operations and safe havens. It examines the historical American experience with hunter-killer operations and identifies principles for employing hunter-killer teams against safe havens. The author argues that hunter-killer teams should be routinely established as part of special operations forces and their use included in counterinsurgency doctrine.
This document discusses the importance of human intelligence (HUMINT) in combating current and future threats like terrorism and a nuclear Iran. It argues that while other intelligence methods provide useful information, only HUMINT can reveal an adversary's intentions and plans by directly gathering information from human sources. The document cites examples from the Cold War and hunt for Osama Bin Laden to show how HUMINT has proven effective over time in addressing major national security crises. It concludes that the US must make HUMINT a central part of its intelligence gathering efforts to gain an advantage in the war on terror and understand Iran's nuclear ambitions.
How to Get Your Community Service Essay Crafted | Pro Essay Help. Community Service Essay Contest | Greenwich, CT Patch. 002 Community Service Essay Sample On Nadia Get Image .... What to Say in Your Community Service Essay for College - How to write .... Many Benefits Of Community Service Essay - The Benefits Of Community .... Benefits of community service essay experience - friendshipthesis.web .... Essay on community service in high school / silkstudio.com.au. SOLUTION: Community Service Essay - Studypool. 020 Why Is Community Service Important Essay ~ Thatsnotus. Argumentative Essay Community Service - ARGUMENT ESSAY ON IMPORTANCE OF .... Sample Community Service Essays. 013 Essay Example Community Service Student Essays ~ Thatsnotus. Compulsory Community Service Essay Example | Topics and Well Written .... Essays on community service - College Homework Help and Online Tutoring.. Community service essay example by hisated - Issuu. Community Service for Students Essay Example | Topics and Well Written .... Sample Essay About Community Service. 005 Essay Example Community Service Student Essays ~ Thatsnotus.
This document provides a summary of a keynote speech given at the Edward V. Badolato Distinguished Speaker Series on homeland security in 2011. The speech reflected on the 10 years since 9/11 and the creation of the Department of Homeland Security. It discussed the history and structure of DHS, including the agencies originally merged to form DHS. It also summarized the impacts of DHS on employment, procurement contracts, and industry growth in Maryland. Finally, it introduced the keynote speaker, Dr. Lenora Gant from the Office of the Director of National Intelligence, to discuss cyber security issues.
Why Football (Soccer) Is So Popular Essay Example (500 Words .... The Rules and Process of Soccer - Free Essay Example | PapersOwl.com. My Favourite Game Football Essay. National football league essay. Essay On My Favourite Game Football For Class 7. Essay on Football in English for Class 1st to 12th Students 2024. ️ Football topics for essay. Football essays. 2019-02-22. Soccer Literacy Essay | PDF | Literacy | Association Football. Write an essay on Football | Essay Writing | English - YouTube. How to play soccer essay in 2021 | Essay, Play soccer, Application letters. Football - essay - Engelsk - Opgaver.com. Essay writing on football - inhisstepsmo.web.fc2.com. A Football Match Free Essay Example. Unbelievable Soccer Essay ~ Thatsnotus. Soccer Demonstration Speech Essay Free Essay Example. Essays About Soccer. Football Essay – Telegraph. Football Essay in English for Students | Pakilminfo.com. Ssurvivor: Football Information In English Essay. Football Definition Essay - Best Essay. Facts About Soccer - Free Essay Example | PapersOwl.com. Soccer Informative Essay - Free Essay Example | PapersOwl.com. Write a short essay on Football | Essay Writing | English - YouTube. Argumentative essay about soccer by ericiehvs - Issuu. Business paper: Essay on soccer. Essay about football. My favourite football team essay in 2021 | Essay, Novel writing .... Essay on Football | Football Essay for Students and Children in English .... Write an essay on'My favourite games football' - Brainly.in. Essay On Soccer – Telegraph. EnglishGrammarSoft - Page 5 of 41 - Learn English Grammar. Soccer Essay Help - Soccer Essay Examples. Top Essay On Football ~ Thatsnotus Essays On Soccer
Germanys Chosen Path-Domestic Security Institutions in the Berlin Republic 19...Courtney W. Paul
This document summarizes a master's thesis on Germany's chosen path regarding domestic security institutions since reunification in 1990. The thesis analyzes how institutions like the Basic Law, Innere Fuhrung policy, and stance on weapons of mass destruction restrict the use of military force and support the "culture of reticence" view, as opposed to allowing a "return to normality." It examines how some institutions like conscription and training have changed to reflect the post-Cold War environment, while organizational capabilities still focus on main defense missions. The thesis concludes that Germany's actions follow a liberal international relations paradigm rather than neo-realism, ensuring military force remains avoided as a tool of foreign policy.
This document outlines challenges in communicating science to policymakers and ways scientists can enhance the role of science in policymaking. It discusses the different cultures of science and policy, how policymakers learn about science, and challenges like relevance and certainty. The document recommends separating science from policy, addressing advisory panel processes, increasing transparency of scientific reviews, and strengthening peer review. Scientists can get involved through letters, visits, internships, fellowships and advisory committees to become more policy-savvy.
This document provides an introduction to the concept of strategic latency and how technology is changing concepts of security. It discusses how advances in science and technology can produce threats to national security that remain latent until utilized by an adversary. The document highlights emerging dual-use technologies like synthetic biology that are accessible not just by great powers but also medium powers and non-state actors. It argues that the complexity of today's international system combined with the spread of advanced technology requires new thinking about security concepts. The goal is to understand how strategic latency can arise from technological changes and how it might be addressed.
The document discusses the design of magnetic sail (magsail) systems for spacecraft propulsion. It describes a proposed demonstrator magsail with a 200m radius and 25.7kg mass, and an operational magsail with 20,000m radius and 7,060 metric tonne mass. The operational design could accelerate at 0.003185 m/s^2 and deliver over 100,000kg payloads to Mars or Saturn. Future advances in superconductors could enable magsails to deliver payloads of over 400,000kg to Jupiter and millions of kilograms to the outer planets.
I. X-ray astronomy will play an increasingly important role in studies of the early universe and large scale structure, but these studies are ultimately limited by sparse photon numbers. There is a need to develop progressively larger collecting area telescopes under increasingly severe mass constraints.
II. The challenge is greater in the X-ray band than optical, as X-ray telescopes reflect X-rays twice, requiring reflectors two orders of magnitude larger than the effective aperture. Large mass is currently problematic for Constellation-X mission.
III. Looking beyond Constellation, a radically different approach is needed based on super lightweight reflectors and perhaps in situ assembly of the telescope. This could enable an ultra high throughput X-
This document discusses the concept of an X-ray interferometer called MAXIM that could achieve micro-arcsecond resolution. It would consist of an optics spacecraft holding multiple flat mirrors in formation with a detector spacecraft to form interference patterns. The goal is to image phenomena like black hole accretion disks and supernovae with much higher resolution than current telescopes. A pathfinder mission is proposed with 100 microarcsecond resolution using two spacecraft separated by 1.4 meters as a technology demonstration.
USAF intercepted a report of a Cuban pilot's encounter with a UFO. In the 1970s, reliable military personnel sighted unidentified aerial objects near nuclear weapons facilities. Though the Air Force said these were isolated incidents, an Air Force document revealed they implemented increased security measures. Newly declassified documents from the CIA, FBI and other agencies indicate unidentified flying objects exist and some pose a threat to national security by demonstrating technologies beyond present human capability. However, the government has misled the public about the true nature and implications of the UFO phenomenon.
This document summarizes the agenda for the NIAC Phase I Fellows Meeting held on October 23-24, 2002. It provides an overview of the presentations and speakers, including status reports on various advanced aerospace concepts from NIAC fellows, as well as keynote speeches from experts in the fields of aerial robotics and the search for extraterrestrial intelligence.
The document discusses the possibility of controlling global weather through small, precise perturbations to the atmosphere. It describes how the chaotic nature of the atmosphere implies sensitivity to small changes and suggests a series of small perturbations may control weather evolution. It outlines components a global weather control system may have, including advanced numerical weather prediction, satellite sensing, and methods to introduce perturbations. It also presents an experiment using data assimilation to calculate perturbations needed to slightly alter a hurricane's track as a proof of concept.
The document discusses observations of various amphibian and reptile species' behavior in microgravity during a flight experiment. It was found that none of the animals vomited, possibly because they did not eat before the flight or because amphibians and reptiles have a weaker vomiting response than mammals. Different species reacted variably based on their ecology and phylogeny. Flexible limbed lizards tended to roll more, while geckos commonly displayed a "skydiving posture" related to their arboreal ancestry. Overall reactions to microgravity varied significantly between species based on both ecology and evolutionary history.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise has also been shown to boost self-esteem and can serve as a healthy way to manage stress.
This document describes an operational analysis conducted as part of the Air Force 2025 study to identify
high-value future air and space system concepts and their enabling technologies. A value model called
Foundations 2025 was developed to quantify and compare different system concepts. Various futuristic
systems and technologies were identified, described, and scored using the model. The analysis determined
the most valuable system concepts and technologies that could enhance future air and space capabilities.
This document discusses a research paper presented to Air Force 2025 that argues the US Air Force should transition from being an atmospheric force to an infospheric force focused on controlling information and the battlespace. It proposes three new missions for the Air Force in the 21st century: extended information dominance to empower allies, global transparency to deter potential adversaries, and strategic defense. The paper advocates for the Air Force to develop a "metasystem" to integrate information and capabilities from all services and envisions the Air Force guiding the development and maintenance of this system.
This document summarizes potential paths to the extinction of the US Air Force by 2025. Externally, extinction could occur through the ascendancy of other military services, economic constraints, changes in strategic environment/policy, technological changes, or the rise of jointness. Internally, extinction could result from losing its vision/mission, mismanaging people/programs, choosing wrong future paths, being too effective at strategic war, or failing to adapt. The document argues the USAF risks becoming extinct unless it reverses trends threatening its viability and ability to evolve appropriately on external and internal challenges.
This document presents a research paper on Planetary Defense, which proposes establishing a system to protect Earth from catastrophic impacts by asteroids and comets. It discusses the threat posed by near-Earth objects, the social, economic and political implications of impacts, and recommends developing a three-tiered Planetary Defense System. The system would include detection subsystems to find threats, command and control systems, and mitigation subsystems to deflect objects, including kinetic impactors, mass drivers, solar sails and nuclear devices. It argues such a system could help ensure humanity's survival and have dual-use benefits from related technologies.
This document presents a research paper on space operations and a potential future system called the Global Area Strike System (GASS). It discusses issues around space operations in 2025, including manned vs unmanned systems and military vs cooperative operations. It then outlines the required capabilities for GASS, including timeliness, responsiveness, flexibility, and precision. It proposes an integrated system-of-systems for GASS using various weapon platforms and classes, including directed energy weapons, projectile weapons, and a transatmospheric vehicle. It concludes with concept of operations and recommendations.
This document provides a historical overview of unmanned aerial vehicles (UAVs) and their use by various militaries. It discusses early UAV development in the 1950s-1960s for reconnaissance and weapons delivery missions. During the Vietnam War, UAVs conducted thousands of reconnaissance missions with a high recovery rate. Experimental armed UAVs were also tested. Later, UAVs were used effectively by Israel in the 1970s-1980s and by the US during the Gulf War for reconnaissance. Following the Gulf War, the US began developing longer endurance UAVs like the Predator and Global Hawk to address reconnaissance needs. The document suggests expanding UAVs' role beyond reconnaissance to include lethal strike missions.
This document proposes an integrated hypersonic weapons platform called the S3 concept to fulfill three broad missions for US air and space forces in 2025: deliver decisive early blows, provide cost-effective in-theater dominance, and maintain access to space. The S3 concept involves three vehicles: the SHAAFT hypersonic attack aircraft, the SHMAC standoff hypersonic missile, and the SCREMAR reusable spaceplane. The SHAAFT would use a zero-stage flying wing to stage to Mach 3.5 and then cruise at Mach 12, able to launch the SHMAC missile or SCREMAR spaceplane. Together these vehicles aim to provide global reach, in-theater dominance, and access to space with
This document summarizes a research paper presented to Air Force 2025 that outlines special operations forces capabilities needed to conduct precision operations against weapons of mass destruction, high-value targets, and assets in the hypothetical world of 2025. The paper identifies communications, mobility, and destruction/neutralization as the top three enabling capabilities required for these missions. It then proposes various futuristic technologies that could fulfill requirements for these capabilities by 2025, such as stealth airlifters, extraction rockets, and targeting systems, to allow special operations forces to accomplish their missions with zero tolerance for error.
This document proposes a concept for Special Operations Regional Engagement (SORE) forces in 2025. The core capability of SORE forces would be engaging in less developed, first- and second-wave nations while not disrupting their evolution. SORE forces would exploit third-wave technology to operate effectively in these environments without introducing advanced technology prematurely. The proposed concept of operations involves SORE forces conducting defensive and offensive operations like training, advising, and assisting host nations. To enable these operations, the document outlines key tasks for SORE forces including recruitment, training, observation, communication, decision-making, countermeasures, and sustainment. It argues that SORE forces will need systems and technologies to complete these tasks while
This document proposes concepts and technologies for counterspace operations in 2025, including space detection, anti-satellite weapons, space interdiction nets, miniaturized satellites, satellite cloaking, kinetic and directed energy weapons. It outlines offensive and defensive counterspace architectures and recommends further analysis of miniaturization, stealth, detection and targeting concepts as well as kinetic and directed energy weapons. The goal is to maintain US space superiority as space becomes increasingly vital to national security and more countries and commercial entities access space.
1. Joint Military Intelligence College
TEACHING INTELLIGENCE
AT
COLLEGES AND UNIVERSITIES
Conference Proceedings
18 June 1999
April 1998
JOINT MIL ITARY INTELLIGENCE C OLLE GE
1962
2. Availability of Papers Prepared for this Conference
Readers of these conference Proceedings should be aware that papers prepared for the
Conference on
Teaching Intelligence Studies at Colleges and Universities
are available in JMIC Occasional Paper
Number Five,
A Flourishing Craft.
This paper and others in the series are available through the
National Technical Information Service (see
www.ntis.gov
) and for individuals in the Intelligence Com-munity
at
www.dia.ic.gov/proj/JMIC/occasional.html.
0
4. Lloyd Salvetti, Director of the Center for the Study of Intelligence; LTG Samuel V. Wilson, USA (Ret.),
President of Hampden-Sydney College and former Director, Defense Intelligence Agency; A. Denis
Clift, President of the Joint Military Intelligence College.
ii
7. Joint Military Intelligence College
Conference on Teaching Intelligence Studies at
Colleges and Universities
Friday, 18 June 1999
Defense Intelligence Analysis Center, Tighe Auditorium
CONFERENCE PROGRAM
0700-0830 Registration DIAC Lobby
0830-0845 Welcome A. Denis Clift, President, JMIC
0845-0930 Address LTG Samuel V. Wilson, U.S. Army (Ret.), Presi-dent,
Hampden-Sydney College; Introduction by
CPT Matthew Goodrich, JMIC
0930-0945 Break Refreshments
0945-1145 Presentation of Papers Moderator: Thomas Fields, JMIC
Mr. Mark Marshall, JMIC, “Teaching Vision”
Dr. Katherine Shelfer, Drexel University, “Struc-ture
and Core Competencies of the Drexel Univer-sity
Competitive Intelligence Certification
Program”
Dr. Mark Lowenthal, Open Source Solutions
(USA), Discussant
1145-1300 No-Host Luncheon Conference Attendee Reserved Seating Available
in the DIAC Dining Room
1300-1345 Address Mr. Lloyd Salvetti, Director, Center for the Study of
Intelligence, CIA; Introduction by Ann Toll, JMIC
1345-1400 Break Refreshments
1400-1500 Presentation of Paper Moderator: Robert Mirabello, JMIC
Dr. Davis Bobrow and Michael Rattie, University
of Pittsburgh, “Outsiders and Outside Informa-tion:
Toward Systematic Assessment”
Dr. H. Bradford Westerfield, Yale University,
Discussant
1500-1515 Refreshments
v
8. 1515-1630 Presentation of Paper Dr. Perry L. Pickert, JMIC, with Ms. Lilia
Vazquez, UN Secretariat, David Traystman, U.S.
Mission to the UN, and LtCol Peter Vercruysse
(USMC), Joint Warfighting Center, “A Virtual UN
Security Council: Educating for Multilateral
Strategic Decisionmaking”
Dr. H. Bradford Westerfield, Discussant
1630-1640 Closing Remarks Dr. Ronald Garst, Provost, JMIC
1640-1800 Reception DIA Patio
vi
9. REMARKS OF WELCOME
“Teaching of Intelligence Conference”
18 June l999
A. DENIS CLIFT
President
Joint Military Intelligence College
“Had I been present at the creation I would have given some useful hints for the better
ordering of the universe.” Dean Acheson borrowed from these words of Alfonso X the
Learned, King of Spain, for the title of his post-World War II State Department memoirs,
Present at the Creation
. Sherman Kent, one of the Intelligence Community’s founding
fathers, might well have chosen that title for his 1949 Princeton University Press opus,
Strategic Intelligence for American World Policy
1
.
“Intelligence work,” Kent wrote, “remains the simple, natural endeavor to get the sort
of knowledge upon which a successful course of action can be rested. And strategic intel-ligence,”
he wrote, “we might call the knowledge upon which our nation’s foreign rela-tions,
in war and peace, must rest.”
The teaching of intelligence flows from such scholarship as it flows from more pre-cisely
defined research, historical examination, and from assessments and explorations of
avenues for future advancement. We are honored to have among the scholars and practi-tioners
with us this morning pre-eminent teachers and leaders in the field, Dr. Anthony
Oettinger of Harvard University and Dr. Bradford Westerfield of Yale University, mem-bers
of the Joint Military Intelligence College’s Board of Visitors.
We welcome you. We welcome all in attendance this morning from colleges and uni-versities
across the United States, from the intelligence and national security communi-ties,
from the media, and from other nations in this hemisphere and overseas. We
welcome the authors of the papers published in
A Flourishing Craft: Teaching Intelli-gence
Studies,
which each of you has in your conference folder.
The teaching of intelligence at growing numbers of our colleges and universities — the
teaching of its place, structure and practice in our democracy — offers the welcome prospect
that growing numbers of young Americans will become attracted to the field. It offers the
prospect that, increasingly, the very best of the coming generation’s talents and capabilities
will participate in the contributions of intelligence to the survival, security and well-being of
the Nation. Indeed — if you will bear with a parochial aside — that once in the field, we will
have occasion to welcome them to their professional, graduate studies at this college.
Today’s program, and the conference papers available to you as contributions to the
program, will give us a look at where the teaching of intelligence is today and where it is
tending in the future. The product from today’s presentations and discussions, the pro-ceedings
flowing from this work, should increase our understanding of how better to nur-ture
this phenomenon so as to bring the very finest young American men and women into
the intelligence ranks — national, theater and tactical — in the years ahead.
10. KEYNOTE ADDRESS
LTG Samuel V. Wilson USA (Ret.)
President, Hampden-Sydney College and
Former Director, Defense Intelligence Agency
2
INTRODUCTION
At the outset, I would like seriously to salute the aims of this conference. It is a good
thing you do, for many reasons. For one, never has sound, responsive and timely intelli-gence
been more essential to foreign and national security policy decisionmaking, formula-tion
and planning than now, as we stand at the gates of a new century and a new
millennium and face a future laden with unknowns. Further, our citizenry are playing a
more important role and bringing greater influence to bear on the process of governance.
For this reason, it is highly essential that they understand — to the extent that they can —
the dynamics of relationships, cooperation and competition, in a modern world of nation-states,
and that they strive to know the issues and take a stand on them. Teaching the basics
of national intelligence to selected students in our colleges and universities is one way of
helping to ensure that a vital segment of the
body
publique
is at least partially informed.
PURPOSE OF PRESENTATION
Having said this, I would like to relate how one individual, an old, long-in-the-tooth
“Huminter,” endeavors to teach the subject of intelligence to a small, select group of
undergraduate students. I ask you to remember while I talk that I have been at one part or
another of the intelligence business for almost 60 years, beginning as point man for a rifle
squad in 1940. I was introduced to problems of intelligence and guerrilla warfare with the
Office of Strategic Services in 1942; I have fought behind enemy lines in WWII; I have
worked as an intelligence staff officer, writing analyses and estimates; I have spotted,
recruited, trained and dispatched paramilitary agents behind the Iron Curtain during the
Cold War; I have conducted intricate and dangerous political action and grey and black
propaganda programs for the Central Intelligence Agency during that same era; I have run
spies, have served as a clandestine asset myself, have been surveilled for weeks at a time,
have been arrested, detained, and I have been seduced — in the best interests of my coun-try,
of course. In short, I ask you to believe I know what the hell I am talking about.
CONCEPT OF LECTURE
My approach will be to cover the history and goals of a simple 15-week undergraduate
course, entitled “An Overview of U.S. National Intelligence,” to describe the structure and
methodology employed and summarize learning outcomes.
BACKGROUND
The institution in question is Hampden-Sydney College in Southside, Virginia, the
oldest men’s college in the Nation and the 10th-oldest overall. Students in this particular
11. 3
course are selected seniors with high
grade point averages, some of them
interested in intelligence as a possible
career.
First, a word on how this particular
academic endeavor evolved. I began
teaching as an adjunct professor of
Political Science at Hampden-Sydney
several years after military retirement to
my farm, located conveniently 12 miles
from the College. My first course was
somewhat pretentiously entitled “U.S.
Foreign Policy and National Security
LTG Wilson presents Conference keynote address.
1982-2000: Threats, Issues and Responses.” The teaching approach involved a rather
large seminar (15-25 students), and the course was heavily over-subscribed from the
beginning. I relied upon my own background as a primary resource, using anecdotes and
illustrations from my experience in World War II and the Cold War as an intelligence
officer, special operations practitioner and (reserve) Foreign Service officer. A significant
segment of this initial course on foreign policy was quite logically devoted to U.S.
foreign intelligence. Largely because of strong student interest, I expanded this
intelligence segment into a separate, interdisciplinary course entitled “An Overview of
U.S. National Intelligence.” Both courses have attracted far more student interest than we
have been able to accommodate.
I believe it is relevant for me to take a moment to tell you where I’m coming from
and to show you at the same time how I endeavor to use stories to enliven and illustrate
major teaching points. One way or the other, I have been involved in intelligence and
related special operations since 1940-that’s 59 years exactly, this June. I began my
career in the old brown-shoe Army (Virginia National Guard) wearing wrapped leg-gings,
the soldier’s version of the Sam Browne belt and that old flat, WWI dishpan-shaped
helmet. To my distress, I was initially assigned as the company bugler because
of my musical background. It took me several months to work my way out of that job; I
had first to recruit, then train my replacement. My early Christmas present in late fall
1940 was to be promoted to PFC and assigned as lead scout in a rifle squad. Anybody
here ever have that nerve-wracking job?—rifle at high port in sweaty palms, creeping
forward softly on the balls of your feet, eyes squinted sharply in all directions, ear balls
straining for the slightest sound, watching squad leader out of the corner of one’s eye
for controlling signals and feedback (“collection guidance”), sniffing the wind for any
unusual smells (and wondering if they emanate from your own sour, fear-induced
sweat), and what is this signal? “Enemy in sight, over there.” “A whole
bunch of them”! This is indications and warning of the first order! The whole eight
steps of the intelligence cycle, from requirements to feedback, represented in one man
— one lonely, frightened man, a one-man intelligence agency — the lead scout in a rifle
squad.
12. 4
And from that I learned...
The true importance of timely and effective indications and warning intelli-gence;
That good intelligence operations always entail some calculated risk;
That it is vital always to keep your eye on your customer; he’s the reason you’re
there in the first place.
Then some 3 years later, I found myself in North Burma as a 19-year-old first lieuten-ant,
intelligence and reconnaissance platoon leader — the point man—in essence, the
chief reconnaissance officer, in the 5307th Composite Unit (Provisional), popularly
known as “Merrill’s Marauders.” The initial challenge for the 3,000-man, all-volunteer
light-infantry unit was to find a way to infiltrate into the enemy’s rear area, to get well
behind his front lines. While on a rather dicey deep patrol job to probe the Japanese tacti-cal
dispositions in the Hukawng Valley, I found a thinly patrolled gap and sneaked
through it successfully. Unable to raise Merrill on the radio, I then left my men in place at
a patrol base in enemy territory and returned on horseback some 30 miles at night back
through enemy lines in the jungle to Merrill’s command post to report my findings. Act-ing
promptly on this intelligence, Merrill was thus enabled to force-march his entire com-mand
to a location deep in the enemy’s rear and thus begin his very first engagement on
highly favorable terms for the Marauders. This incident is said to mark the turning point
of the Marauder’s initial campaign. (I refer you to Charlton Ogburn Jr.’s
The Marauders
(New York: Harper and Brothers, 1959), 101-110.
And from that I learned...
The importance of reporting intelligence in a timely manner;
Again, that good intelligence operations always entail some calculated risk;
That for intelligence to have real value, it must be acted on, sometimes quite
promptly and decisively; otherwise, it can be about as useful as warm spit,
regardless of how romantic or dramatic it may sound.
As an aside, I can trace my ultimately becoming a Foreign Area Officer and a specialist
on the Soviet Union from the North Burma Campaign. During brief lulls in action—and
there always are lulls in war—we would sometimes rig up our mule-packed radio (for
some reason we called this radio “Becky”) in a more wide-band listening mode, especially
if we were high up in the mountains at night. By experimenting with the orientation of the
antenna, we frequently could pick up major broadcasts from great distances, such as BBC,
Radio Australia, Radio Calcutta, Japanese-sponsored Radio Free Rangoon, and on occa-sion
strange-sounding newscasts of a program called “Govorit Moskva.” One of my mule-skinners,
who was of Russian parentage, would interpret these Soviet battle communiques
for me. Even the knowledge that these broadcasts were at least in part propaganda,
designed to raise and maintain home-front morale, could not disguise the fact that on the
Soviet-German Front the war was taking place on a scope and scale and creating a level of
human devastation and suffering that we could hardly imagine where we were. It was then
that I said to my little band that when the war was over, I intended to study Russian, go to
13. Moscow as an Army Attache Captain, and find out
5
why
these people were fighting and
dying so bravely.
Slightly over three years later, in fall 1947, I entered Columbia University’s Russian
Institute as a member of the Army’s Foreign Area Specialist Training Program/Russian
(FAST-R, now FAOP/R) and launched my subsequent career as a Russian linguist and
HUMINT specialist in Soviet affairs, a long, twisting, dangerous, sometimes hilarious,
sometimes nightmarish, always fascinating 30-year trail that led through a bewildering
variety of intelligence and special operations assignments and ultimately to the director-ship
of this Agency.
You may be beginning to wonder why I have gone into such detail concerning my own
background. I have done so in order that you might perceive the extent to which my intel-ligence
course today is deeply flavored and influenced by personal experience and subjec-tive
interpretations.
H-SC INDS 465:
“AN OVERVIEW OF U.S. NATIONAL INTELLIGENCE”
Now that we are finished with our brief historical excursions, let’s look at the goals and
methodology of the Hampden-Sydney College intelligence course itself, following which
we will examine an outline summary of the course’s highlights.
In essence, there are five basic objectives for this course:
To provide an overall understanding of the U.S. National Foreign Intelligence
institution and its activities;
To help raise the level of individual student interest in current happenings of
intelligence import and to assist in developing critical newsreading habits (to
include using television and the Internet as a resource), especially where matters
of U.S. foreign policy and national security are concerned;
To provide an introduction to basic techniques involved in intelligence collection
and analysis (pre-intelligence career course);
To help the student further in learning how to apply individual reasoning facul-ties
(problem solving);
To give additional practice in oral and written presentations (intelligence briefing
techniques).
As to structure and methodology, a deliberate effort is made to restrict the size of the
class to a number conducive to the seminar approach, ideal size being about 15 students.
The semester is broken down into 15 3-hour sessions, conducted once weekly in the
evening. Significant emphasis is placed on practical work: Students are assigned real-world
intelligence requirements, either as collectors or analysts. To carry out these tasks,
they must make recourse to available daily, weekly, and monthly journals and news mag-azines,
as well as to radio and television newscasts and to the Internet. Required readings
are assigned for each session, most of them from Jeffrey T. Richelson’s
The Intelligence
14. . Each student is required to accomplish a book report, both orally and in writ-ing,
6
Community
and there is a further requirement for a 10-page paper on an assigned intelligence
topic to be rendered orally in class and then submitted to the instructor for review.
The chronological outline for the course itself breaks down as follows, using the
course for Fall 1998 as a model:
An Overview of U.S. National Intelligence
“Intelligence is information plus analysis. Its primary purpose is helping the commander/policymaker to
reach informed, reasoned and timely decisions and — above all — to avoid being surprised.”
This course provides a basic overview of the history, current organization and missions of the U.S. National
Foreign Intelligence establishment (the “Intelligence Community”) and its various programs and activities in
support of U.S. foreign policy and national security goals and objectives in the closing years of the 20th
Century. Central themes include the critical need for sound and timely intelligence in the formulation and
conduct of U.S. foreign policy and national security undertakings; the historical evolution of U.S. intelligence
from colonial times to the present; principles for effective intelligence operations; moral and legal
constraints imposed upon the intelligence institution in an open, democratic society; guidelines for
preparing for a professional career in intelligence, with emphasis on the value of a broadly-based, liberal
arts education. Extensive use is made of the case study approach for illustrative purposes. Each student is
required to prepare and present an intelligence analysis on a potential threat to U.S. foreign policy
interests.
Lecture Titles:
1.
An Introduction to Intelligence (Give diagnostic test; collect biographic data; discuss syllabus)
Introduction to intelligence as an institution, process, product, and profession; definitions, purpose,
organizational principles; types and categories of intelligence; counterintelligence and counterespionage;
security classifications; intelligence collection disciplines — SIGINT, IMINT/PHOTINT/HUMINT — and their
subdisciplines; methods of evaluation; intelligence cycle.
2.
History of Intelligence (Assign papers and book reports) A history of American intelligence from colonial
times to the present, with emphasis on basic principles for effective intelligence and examples of recurring
problems and issues.
3.
The U.S. Intelligence Institution. The U.S. Intelligence Community — players and relationships;
mechanisms for formulating intelligence policy and requirements, for coordinating collection operations and
the estimative process; planning, programming and resource allocation.
4.
The Current World Setting. A summary description of the foreign policy and national security world
context within which today’s intelligence activities take place.
5.
The Changing Face of War. The evolving nature of human conflict from ancient times to the present with
emphasis on the quantum leap effects of technological revolutions; comparisons of nuclear wars with
conventional conflicts (World War II, Korea, the Gulf War), with revolutionary wars and “Wars of National
Liberation” (Vietnam); characteristics of post-Cold War conflicts between cultures (Yugoslavia).
15. An Overview of U.S. National Intelligence
7
(continued)
6.
U.S. Intelligence Collection Operations. Nature and purpose of intelligence collection operations; Driving
role of requirements in the collection process; handling the intelligence tasking process; particularized
capabilities in the separate collection disciplines and their respective subdisciplines; HUMINT as the senior
discipline — advantages and disadvantages; use of open sources in HUMINT; observers versus spies; role
of attaches; clandestine and covert collection; types of agents; motivational considerations and recruitment
techniques; principles and examples of clandestine tradecraft; technology in support of HUMINT.
7.
Intelligence Analyses and Estimates. Role and functions of the intelligence analyst and the estimator;
requisite skills, qualifications and personal characteristics of an effective analyst (if the collector is
functional James Bond, then analysis is Sherlock Holmes); description of working environment; typical
examples of problems and questions requiring analysis; processing —“bottleneck syndrome” between
collection and analytical phases of intelligence cycle; intelligence estimates — purpose and process;
estimative terminology; role of National Intelligence Council; historical examples of estimates. Separate
squib on psychic research in the Soviet Union and the People’s Republic of China as reported in open
sources. Mid-term, take-home exam.
8.
Intelligence, Security, Counterintelligence (CI) and Covert Action. Protecting intelligence; personnel,
physical and document security; classification categories and procedures; Freedom of Information Act and
policies for downgrading and release of intelligence; critical importance of protecting sources and methods.
Counterintelligence — the “shadow world” of intelligence; definition of CI and listing of its four major
functions; case histories involving KGB and U.S. services; moral issues. Separate brief examination of
covert political action and covert paramilitary undertakings by U.S. clandestine services.
9.
Deception. Definition, purposes, concepts, categories and levels of deception; case studies from history
of successful deception operations; relationships between deception, psychological operations and covert
action; roles of intelligence and special operations forces in deception; principles and guidelines for
deception planning.
10.
Terrorism. Primer on modern terrorism — definitions, goals and antecedents, tactics and techniques;
factors influencing selection of targets by terrorists; influence and effects of technology (especially in
weapons and explosives, as well as in transportation and communications); terrorist exploitation of public
media; some do’s and don’ts for counter-terrorist programs.
11.
Foreign Intelligence Services and Operations. A descriptive survey of selected Allied and friendly
intelligence organizations and consideration of the pluses and minuses of sharing intelligence; discussion
of former Soviet intelligence services — KGB and GRU — their missions, characteristics and major
activities and operations. Student book reports.
12.
Crisis Management. Exercise; student book reports.
13.
Intelligence Policy and Management — Problems and Issues; Intelligence Oversight. The dilemma of
secret intelligence in a free society — secrecy in government versus the public’s right to know, the costs of
sensitive “leaks” to the public media; moral issues in intelligence — do the “ends justify the means?”;
examples of intelligence excesses; do’s and don’ts for effective oversight.
14.
Student Presentations. Oral presentations covering intelligence analyses by separate students on
selected subjects of current interest and relevance.
15.
Final Exam. In class.
16. Every effort is expended to make the course interesting and lively. During the fall of
1991, students were assigned intelligence collection requirements and analytical respon-sibilities
on the Persian Gulf. Because of the dynamics of that rapidly developing situa-tion,
they were able to determine very quickly for themselves whether their findings and
prognoses had merit. The following year, to take advantage of the Presidential election in
the fall of 1992, students were notionally identified as foreign intelligence officers and
assigned in teams of five each in a number of foreign embassies in Washington (Russian,
Chinese, British, French, German, Israeli, Japanese) and tasked to follow the progress of
the campaign and provide political intelligence reporting back to the national intelligence
directorates in their respective national capitals. I should note that, because of the strident
student clamor to be enrolled in this particular class, I allowed it to swell in size to 35 stu-dents.
8
I will not be doing this again.
And every lesson carries at least one war story, similar to the ones I used in the begin-ning
of this presentation. Some of them are “pencils down” stories, like the references I
am about to make.
As hinted earlier, I invested roughly 5 years in the late 1940s and early 1950s as an
Army Captain and Major acquiring the Russian language and becoming a specialist on the
Soviet Union. Three years of this period were spent as a student in Europe, involving not
only intensive language and area studies but also a number of interesting extra-curricular
diversions and special projects, such as serving as a part-time diplomatic courier and travel-ling
in particular to and within the Soviet Union and throughout the Iron Curtain countries
as well as visiting other countries on the periphery of the USSR. I also served as a liaison
officer and in an escort officer capacity with elements of the Group of Soviet Forces in
Eastern Austria, and later with the Group of Soviet Forces/Germany (GSFG), living, work-ing
and travelling with them.
And what did I learn from that? I have never learned so much in one period of time in
my life.
No matter how many books you read, lectures you attend, or papers you write,
there is no substitute for being on the ground itself, walking the streets, seeing
the sights, eating the food, rubbing elbows with the people, conversing, debating,
arguing. That is why, years later, I set up the Analyst Travel Program in DIA. I
did not want analysts to be writing about countries they had never seen.
How little we know about how other people think!
I also learned that while engaged in these activities I could be useful to some of
our own operational intelligence friends by talking to them once in a while and
finding out something about their priority interests and concerns. It is sometimes
surprising how much you can see and hear and learn if you know what is impor-tant
to look for. I didn’t know it at the time, but I was setting myself up for some
interesting future assignments.
By the mid-1950s I had already served a stint as a general staff officer in Army Intelli-gence
in the Pentagon, a brief period as a consultant on Soviet affairs in the Pentagon, a
17. similarly brief time on what is now the National Security Council staff, and was working
as a Case Officer in the Clandestine Services of the Central Intelligence Agency. Clearly
one of the most fascinating periods of my life.
West Berlin 1955-56—a green island in a red sea, reminded me a little of the Maraud-ers
in North Burma and a patrol base deep in enemy territory, except this time it was much
more complicated. By our count, there were 29 competing intelligence agencies in Berlin,
all of them seemingly on opposite sides, snarling, growling, and working against each
other—my first real encounter with the phenomenon of intelligence turf wars, this time
in an international setting. Later I would encounter the same vicious bureaucratic in-fight-ing
in Washington, only that would be major league stuff. In Berlin, we—the United
States, the Brits, the French, and the West Germans spent so much time one-upping each
other and stealing each other’s operations that the Soviet GRU and the KGB had a field
day. It was a wonder we ever got anything done of real intelligence value.
In my assignment the primary target was the GSFG and behind it the Soviet military in
general. The requirements were many and difficult, and there were many and varied oper-ational
approaches. One of them for me included running a small platoon of ladies of the
night (at one time 18 of them) with the priority target—the command structure of the
GSFG. At times we had notable successes, the kind they write popular screen plays about;
sometimes we had failures—and the failures were horrible. I still have nightmares.
9
And from that I learned:
In intelligence discord is deadly, especially when you combine it with cut-throat
competition.
And when reminiscing about 18 brave, dedicated ladies of the night who were
fighting the Cold War with the only weapon at their disposal and the successes
they sometimes enjoyed, I am reminded that men are never so vulnerable as
when they are in the grips of testosterone-driven passion.
CONCLUSION
Perhaps the most substantively important and topically relevant instructional unit of
this entire course is the one that gets the shortest shrift. It pertains to intelligence policy
and management, with primary emphasis on problems and issues, many of long standing,
and to the vital function of intelligence oversight. Here we are talking about the dilemma
posed by secret intelligence in a free society — secrecy in government versus the public’s
right to know, the costs of sensitive “leaks” to the public media; moral issues in
intelligence—do the ends justify the means?; examples of intelligence excesses; do’s and
don’ts for effective intelligence oversight. This concluding unit of the course admittedly
raises more questions than it answers, but it could well be that sensitizing young college
students to intelligence quandaries that affect the long-term health and viability of the
Republic is one of the most valuable outcomes of this academic undertaking.
Thank you. May I have your questions?
18. BIOGRAPHY
LTG Samuel V. Wilson, USA (Ret.)
Lieutenant General Samuel V. Wilson, a native of Southside Virginia, retired from active
military service in 1977, having served during his 37-year career in every enlisted and com-missioned
rank from infantry Private to Lieutenant General. In addition to his World War II
service described in this address, General Wilson’s career highlights included a tour as an
intelligence staff officer in the Pentagon, a CIA field case officer, a Special Forces Group
Commander, Assistant for Special Operations, Assistant Division Command (Operations)
of the 82nd Airborne Division, U.S. Defense Attache/Moscow, Deputy to the Director of
Central Intelligence, and Director of DIA. Assignments to Vietnam were with the U.S.
Agency for International Development as Associate Director for Field Operations, and sub-sequently
in the U.S. Embassy as U.S. AID Mission Coordinator. In the latter position, he
received a Presidential Appointment to the personal rank of Minister.
General Wilson is a graduate of the Infantry Officers Advanced Course, the Army Com-mand
and General Staff College and the Air War College. His decorations include the Dis-tinguished
Service Cross, Defense Distinguished Service Medal, Army Distinguished
Service Medal with two Oak Leaf Clusters, National Intelligence Distinguished Service
Medal, Silver Star with Oak Leaf Cluster, Legion of Merit with Oak Leaf Cluster, Bronze
Star for Valor with Oak Leaf Cluster, Army Commendation Medal with two Oak Leaf Clus-ters,
Purple Heart, Vietnamese Gallantry Cross with Palm, and the Vietnamese National
Administration Medal for Exemplary Service.
10
Tighe Auditorium audience.
19. Mark Lowenthal, President and Chief Operating Officer of Open Source Solutions (USA), discusses
papers from the morning session. At his right, Katherine Shelfer, Drexel University, and Mark
Marshall, JMIC Faculty.
German liaison officer Colonel Klaus Euler visits with JMIC Academic Operations Dean John Robinson;
Colonel Jurgen Eigenbrod, Commander, German Armed Forces Intelligence School; and Joint Military
Intelligence College President A. Denis Clift.
11
20. TEACHING INTELLIGENCE:
WORKING TOGETHER TO BUILD A DISCIPLINE
Lloyd D. Salvetti
Director, Center for the Study of Intelligence
Central Intelligence Agency
A colleague told me that speaking here in the JMIC auditorium reminded him of the
Dienbienphu school of architecture— “place the speaker on the low ground and fire down
on him.” Standing here, I understand the comparison.
Before we get started, I would like to poll you on the following question: How many of
you were teaching an intelligence course in 1985? 1990? 1995? Today? We are making
progress, but we have still some distance to go, in my view.
We have had a full morning of presentations and discussions. General Wilson’s
remarks on his experience in teaching intelligence created an excellent foundation for the
rest of this morning’s sessions, and the agenda for this afternoon promises to be stimulat-ing
as well. I hope I can contribute to the dialogue.
I want to compliment Denis Clift, President of the Joint Military Intelligence College,
for organizing this event. The last conference of this sort, of which I am aware—occurred
in 1993 and was sponsored by the institution I represent, CIA’s Center for the Study of
Intelligence. I think we ought to have such a conference about every five years to take a
measure of how we are doing, and what we must do to enhance this particular niche of
academic research, writing and teaching.
I know that we have participants from several nations at this conference. They enrich
the quality of the dialogue on teaching intelligence for all of us. We need to increase the
representation of foreign scholars and teachers at these conferences. Debate, discussion,
research, and writing on the history, practice, and the proper role of intelligence in a
democracy should be promoted in every way possible. To underscore this point, we prac-titioners
in this country need to heed the words of former Director of Central Intelligence,
the late William Colby, who in his 1978 memoir wrote:
Whatever may have been the tradition of the past, [i]t is... essential that the
relationship of the people to our intelligence apparatus be redefined and
made appropriate to modern America... Intelligence must accept the end of
its special status in the American government, and take on the task of
informing the public of its nature and its activities as any other department
or agency. ...Thus, the public must be informed of what intelligence is
doing in its name and how this contributes to the general welfare of the
Nation. Excerpt from:
Honorable Men: My Life in the CIA
12
(New York:
Simon and Schuster, 1978), 459-460.
21. I believe the intent of his reflection on the importance of communicating to the Ameri-can
public the purpose and role of intelligence in the American system of government
applies equally to the need to foster and support the teaching of intelligence at U.S. aca-demic
institutions. Moreover, we ought to promote and support the debate, discussion,
research, and writing on the history, practice and the proper role of intelligence in a
democracy in other countries. Inviting foreign scholars and representatives of foreign
governments to conferences of this sort is an important step in that direction. We in the
Center for the Study of intelligence welcome opportunities to support and collaborate
with academic institutions and think tanks in the U.S. and overseas interested in sponsor-ing
such conferences.
As you have heard, I am a practitioner of the craft of intelligence, having served in posi-tions
ranging from intelligence collector to intelligence analyst to intelligence consumer. I
am a career operations officer who took over the helm at the Center in October of last year.
I have served in the United States and overseas, in a variety of senior management position
in CIA, and in policy support positions. My practitioner experience has been in two areas:
intelligence collection operations and covert action—the latter including the design and
operational control of some of the larger covert action programs of the Reagan years in
Washington and in managing the policy process of covert action in President Bush’s NSC.
I have taught and continue to teach intelligence at the National War College and I have lec-tured
on intelligence at various universities. It is from that perspective that I welcome the
opportunity to discuss teaching the American system of intelligence with you.
Before I do that, however, I would like to acquaint you with CSI in the hope that we
can become a resource for those of you teaching about the craft of intelligence. For those
of you unfamiliar with CSI, we are essentially the Agency’s “think tank” on intelligence
issues. In this capacity:
13
We produce the classified and unclassified history of CIA—the CIA History
Staff is in CSI;
We support the State Department’s production of the
Foreign Relations of the
United States
volumes;
We sponsor and conduct classified and unclassified research on intelligence pro-grams
and activities by active duty and retired Agency officers;
We publish
Studies in Intelligence
—the journal of record of the intelligence
profession;
We write and publish books and monographs;
We host conferences and symposia; and,
We coordinate several academic outreach programs and activities.
I hope some of you are familiar with our recent work. Let me cite a few examples:
Last September, CSI hosted, in collaboration with the U.S. Air Force, the National
Reconnaissance Office, and three aerospace firms (Lockheed-Martin, Raytheon,
and Kodak) a very successful conference on the past, present and future of the U-2
program. As part of the conference, we published
The CIA and the U-2 Program
,
22. , the CIA’s now-declassified internal history of the U-2 program. It is
14
1954-1974
the only history of the program based upon both full access to CIA records and
extensive classified interviews with many of its participants.
In 1996, we organized, in cooperation with the National Security Agency, the
Venona conference and published concomitantly the volume,
Venona: Soviet
. As you know, Venona was
Espionage and the American Response, 1939-1957
the codeword for the program that sought to read and exploit Soviet intelligence
messages collected in the 1940s. The book contains important declassified U.S.
Government documents outlining the U.S. response to Soviet espionage, as well
as 99 of the most significant and revealing Soviet messages translated by West-ern
analysts.
This year we are sponsoring two additional conferences:
In September, we will collaborate with the German Allied Museum on our first
overseas conference, to be held in Berlin. The conference, entitled “Berlin: The
Intelligence War (1946-1961),” will bring together Cold War intelligence veter-ans
from both sides of the Iron curtain, academics, and authors to discuss the
intelligence dimensions of some of the pivotal events of the early Cold War, from
the Berlin Blockade to the famous tank standoff at checkpoint Charlie in 1961.
We also have begun organizing for a conference in collaboration with the George
Bush School of Government and Public Service, and the Center for Presidential
Studies at Texas AM University on the “Role of Intelligence in the End of the
Cold War.” President George Bush will participate in several events at the con-ference,
as will former Secretary of State James Baker, former Secretary of
Defense Richard Cheney, former Advisor to the President for National Security
Affairs Brent Scowcroft, and former DCI Judge William Webster. Former DCI
and Assistant to the President Bob Gates will be the keynote speaker. For release
at the conference, we are preparing a collection of declassified national intelli-gence
estimates on the Soviet Union and Eastern Europe that were written dur-ing
the closing months of the Cold War and the collapse of Communism in the
Soviet Union.
Let me also mention some of the books our Center has recently published:
Earlier this year, The Society for History in the Federal Government bestowed
one of its most prestigious awards, the George Pendleton Prize for the best major
manuscript on a U.S. Government program, on a book CSI published:
CIA and
the Vietnam Policymakers
by Hal Ford. The book is a candid and scholarly
account of how the U.S. Intelligence Community, particularly the CIA, provided
wartime intelligence support to the Kennedy and Johnson Administrations —
and how U.S. policymakers, at times, brought great pressure to bear on analysts
to treat controversial aspects of the problem in ways more favorable to Adminis-tration
war aims and how analysts resisted the pressure. More often than not the
CIA got it right in Vietnam.
23. 15
Our newest book is by Doug MacEachin, a former CIA Deputy Director for
Intelligence, who has written
The Final Months of the War with Japan: Signals
Intelligence, U.S. Invasion Planning, and the A-Bomb Decision.
This book uses
newly discovered, declassified SIGINT to show that the Japanese were dramati-cally
expanding their defensive forces in the area chosen as the invasion point on
the Japanese home islands by U.S. planners, thereby likely ensuring heavy U.S.
casualties if an invasion had taken place.
Let me also say a word about our journal,
. It has been
Studies in Intelligence
published since 1955, but the first unclassified edition did not appear until 1992.
The publication is the U.S. Government’s journal of the intelligence profession.
Our objective in publishing
Studies in Intelligence
is to capture historical, opera-tional,
or doctrinal aspects of intelligence for students of the intelligence profes-sion
(unclassified edition) and for practitioners (the classified edition). I believe
Studies
would be a valuable resource for teachers and students about various
intelligence issues. For example, the latest unclassified issue carries articles on
such subjects as:
“Calling the Sino-Soviet Split: The CIA and Double Demonology,” which
chronicles the debate within the Intelligence Community on the nature of
the Sino-Soviet relationship to 1963, by which time the estrangement had
become public.
“Planning Satellite Reconnaissance to Support Military Operations,” an
article proposing a new doctrine for reconnaissance operations.
All of these materials and more are available to you as intelligence scholars. I have
brought copies of the latest issues of the unclassified
Studies
and other unclassified mate-rials
published by CSI for those of you desiring a copy. They are on a table at the entrance
to the Conference Hall for you to pick up at the end of the session. If you do not now
receive our publications, please complete one of the forms on the publications table and
we will add you to our mailing list. You can also gain access to our unclassified materials
on the CSI home page on the CIA Internet site. Additionally, next year we are committed
to producing a compendium of intelligence course syllabi, and we invite each of you to
submit yours for inclusion in this publication. We also want to serve as a bridge between
you and the rest of the CIA, locating speakers for you, placing your students in touch with
our recruiters, and so on. Finally, I urge you to invite CSI officers, especially our histori-ans,
to lecture in your classes and participate in your seminars and colloquia.
Let me just say a few words about our History Staff. It consists of six superb historians
led by Gerry Haines, the CIA Chief Historian. They produce a steady stream of classified
and unclassified monographs, articles, and books, which are consistently recognized for
the quality of their scholarship and writing. Our historians hold PhDs in history or politi-cal
science, have extensive “line” experience within the Agency, as analysts or operations
officers, and are experienced lecturers.
To underscore the unique role played by CIA historians, I am pleased to announce that
we have recently begun a program that will help us capture more fully the history of CIA: a
systematic oral history program. We understand, of course, that not every historian is an
24. enthusiastic supporter of oral history. But in our organization, in particular, in which the
details of sensitive operations are frequently captured in a variety of documents with limited
dissemination or even not written down, as was the practice in some of the most sensitive
operations in the 1950s, we think an oral history program will make an important contribu-tion
to our understanding of history and the evolution of the intelligence profession.
So that is my offer to you. If you are teaching a course on intelligence and would like
our support, be it in securing copies of our publications or in requesting a guest speaker,
call us. We will do everything we can to help you. We would like to be your guide to
unclassified and declassified resources in CIA and the rest of the Intelligence Community
that might benefit you in your courses.
What can we bring to the table? To answer that question, let me quote something Pro-fessor
Ernest May of Harvard’s John F. Kennedy school said at a CIA-sponsored sympo-sium
on teaching intelligence earlier this decade:
Access to documents is only part of what scholars need from the Intelligence
Community. ... Scholars need orientation to the world from which the documents
emerge so they can understand and evaluate the documents, make informed
guesses about the extent to which the essential record is complete or incomplete,
and cross-question memoirs and testimony.
To illustrate his point, May related the following anecdote:
Some years ago, an eminent and exceedingly able scholar presented at the Woo-drow
Wilson Center a paper dealing with postwar planning during World War II
by the Joint Chiefs of Staff. (JCS) The paper made much of some memoranda
issuing from a JCS committee composed of very senior officers. General Andrew
Goodpaster [Eisenhower’s personal secretary] commented on the paper. Though
with characteristic tact, General Goodpaster made the point that those particular
senior officers were not ones in whose judgment the Chiefs of Staff placed great
trust. ‘If you are looking for the memoranda to which General Marshall paid
attention,’ General Goodpaster said, ‘find those with the initials GAL for Col.
George A. Lincoln. That was the person Marshall respected.’
The basic point is one that any academic should appreciate. ... To thread one’s
way through the immense volume of papers in any modern government agency,
scholars need the kind of guidance that General Goodpaster offered—about
whose initials mattered to whom. That information has to come from people who
where there.
— From
Symposium
on Teaching Intelligence:
October 1-2, 1993 (Washington, DC:
16
CSI, April 1994), 7-8.
My point is:
Let us be your guide.
We want to be a resource to you.
25. To facilitate communications between you and the Center, I have named Dr. John Hed-ley
to be CSI’s Academic Referent. John just recently retired after a distinguished 33-year
career with the Agency. Among his many important assignments, John taught a graduate
course on intelligence and wrote several articles for academic journals from 1993 to 1995.
He continues to teach intelligence courses at Georgetown, and is on the editorial board of
the
International Journal of Intelligence and CounterIntelligence.
17
I would like John to be
in frequent correspondence with you — via the telephone, the Internet or the post office. I
would like to see him making visits to your campuses to observe and participate in your
courses and seminars. I hope you will view him as
your
resource.
I am sure some of you will be asking yourselves, “Why? Why is he proposing this?” I
can assure you that it is not because we want to put a pro-CIA spin on intelligence history.
I can assure you that our historians are ready, willing and able to call them as they see
them. They have no need to fear for their careers when they produce works that are criti-cal
of the Agency.
No, I want to help you because I believe it is important. It is important that the public
be given a realistic and historically accurate picture of the intelligence profession—its
successes and its failures; its strengths and its weaknesses. It is no longer adequate to have
the history of intelligence written by journalists and malcontents. It is no longer accept-able
to have an intelligence agency, or the Intelligence Community as a whole, unneces-sarily
or inappropriately isolated from the citizens from whom it draws its funding, its
recruits, its political support—indeed for whom it works.
If I may quote former DCI Bob Gates,
The purpose of greater openness is to make CIA and the intelligence process
more visible and understandable. We must try to help people understand better
what CIA does and how we do it. Our... approach grows out of the belief that it is
important that CIA should be accountable to the American people—both
directly and through the Congress—as a law-abiding organization [comprising]
talented people of integrity who have a critical role in supporting national secu-rity
policymakers in a complex and often dangerous world. We are under no illu-sions
that CIA, whatever the level of its efforts, will be able to win recognition as
an ‘open’ institution. What we hope to do is all we can do to be as forthcoming,
candid, informative, and helpful as possible to the public, the media, and aca-demia
consistent with our mission and the protection of sources and methods.
— From “CIA and Openness,” address by DCI Gates to Oklahoma Press Association,
21 February 1992.
In my view, the time is well past for moving public knowledge of the intelligence pro-fession
beyond the image it has received in countless pieces of pulp fiction and Holly-wood
adventure movies, in which intelligence professionals are regularly either
demonized or treated as omniscient and omnipotent superheroes. No one who bases his
understanding of intelligence on
The Hunt for Red October,
for example, would have the
26. slightest idea what role an intelligence analyst plays, or how the intelligence process as a
whole works, for that matter.
In fact, our experience has been that even many experienced military officers and civil-ian
employees in national security agencies frequently have a limited understanding of
what we do or how we do it. To help remedy that situation, I believe we need to explore
creation of a National Intelligence University that would more fully inform professional
military officers and civilian government employees about the capabilities and processes
of the Intelligence Community. Our University would not necessarily have a campus, but
rather would consist of coordinated course offerings that would be taught by the Intelli-gence
Community members. For example, NSA could offer a course on SIGINT collec-tion
and analysis; CIA could teach HUMINT collection; NRO and the National Imagery
and Mapping Agency could teach imagery; DIA could offer a course on military and tac-tical
intelligence and so on. The model for such a National Intelligence University is right
in this building. I believe the Joint Military Intelligence College is the foundation for such
a university.
Similarly, I believe the way to close the gap between intelligence professionals and the
citizens they work for is to promote the serious academic study of, and research into, the
intelligence profession. I think many of you would agree that courses on intelligence are
badly underrepresented at American universities. We can all list our favorite reasons for
that. Some might point out that it is for the same reason that such subjects as military his-tory
are underrepresented: such courses are simply out of favor in the prevailing socio-political
climate on campuses and within disciplines today. Some might mention the
James Bond syndrome as a cause: the derring-do of secret agents surely can’t be seriously
discussed as an academic topic. Some might point out that intelligence studies have
largely been captured by the larger field of diplomatic history, where the tendency seems
to be to treat intelligence as a minor sideshow whose contributions have been largely
unimportant in the vast sweep of the foreign policy process. There is, however, another,
important reason that I am sure many of you are thinking about.
I suspect many of you might mention the limited availability of source material as a
reason for the lack of courses on intelligence. After all, you can’t teach it if you can’t first
research it. And you can’t research it if the source material isn’t available. Perhaps just as
importantly, if you can see only some of the material on a given subject and not all of it,
how can you trust what you see? The matter of mistrust looms large in all this, and it is
focused on the CIA much more so than on any other government agency involved in intel-ligence
18
activities.
At this point, the “D” word stares us right in the face:
DECLASSIFICATION!
Is the
CIA doing all that it could to declassify records, the release of which would no longer
harm the national security? Before going any further let me hasten to note that I am not in
charge of the Agency’s declassification programs. But I can say a few words about DCI
George Tenet’s commitment to declassification.
27. In July 1998, he issued a statement on declassification that reads in part as follows:
Although much of our work must be done in secrecy, we have a responsibility to
the American people, and to history, to account for our actions and the quality of
our work. Accordingly, I have made a serious commitment to the public release
of information that with the passage of time no longer needs to be protected
under our security classification system.
19
http://www.odci.gov/cia/public_affairs/
press_release/archives/1998/ps071598.html
To achieve his declassification goals, little more than a year ago, the DCI created the
Office of Information Management (OIM) to consolidate the operations and management
of the various information review and release functions at CIA. During this brief period of
time, OIM has made substantial progress in meeting the demands of the public and com-plying
with a multitude of legislative mandates. Let me mention just a few of our accom-plishments
last year:
CIA released more than one million pages of records under the 25-year declassi-fication
requirements of Executive Order 12958. This year, we expect to review
five million pages, and eight million or more pages a year thereafter.
We closed in excess of 7,000 Freedom of Information Act (FOIA)/Privacy Act
(PA) requests, 2,000 more cases than the prior year and a record for the program,
which began in 1975. As a result, we were able to reduce the backlog of FOIA/
PA requests by over 1,000 cases — a drop of about 20 percent.
We reviewed for classified information and approved in a timely manner more
than 300 manuscripts—over 20,000 pages—by current and former employees
for publication in newspapers, books, journals, and the like.
We released well over 200,000 pages of JFK assassination records in full com-pliance
with federal legislation mandating the review and release of these
materials.
Having cited those statistics, let me quote again from DCI Tenet’s July 1998 statement:
None of this is easy. There are no shortcuts here. It takes experienced, knowl-edgeable
people sitting down with each document and going over it page by
page, line by line. There is no alternative. We take our obligation to protect those
who have worked with us in the past very seriously. We also have to consider the
impact of release on our ongoing diplomatic and intelligence relationships. A
mistake on our part can put a life in danger or jeopardize a bilateral relationship
integral to our security.
Suffice it to say, the demands for declassification review far exceed the capabili-ties
of the personnel who are available under current budgetary limitations to
perform it. This forces us to make choices in terms of what information will be
reviewed first. In setting these priorities, the Agency is guided by its responsibil-ities
under the law and Executive Order, as well as by policies established by the
DCI.
28. In fact, CIA now has the equivalent of over 350 people working full time declassifying
documents. I can assure you that this number compares very favorably to the number of
employees the Agency has assigned to several of its most important core missions.
I would also like to express my hope that our greater openness in recent years has con-tributed
to the expansion of intelligence literature that has taken place in the last few
years. In 1994-95, there were only 215 intelligence books listed in
20
Books in Print;
today,
there are 813. There is a great deal of material publicly available to support courses in
intelligence, material to support research and writing on all the elements of the intelli-gence
profession, and material available to write new books on all aspects of intelligence.
I do not imagine that this will satisfy those of you who are suspicious of us or those
who are simply impatient with us. Nor do I want to give the impression that I am saying,
“Trust us.” I only want to emphasize that I personally believe the CIA and DCI George
Tenet have a serious commitment to declassifying and releasing documents, consistent
with our mission responsibilities, just as quickly as possible.
My objective is to communicate that we are trying to do the right thing. But it would be
disingenuous of me to stand here and try to use these data to infer that the dam on the
release of the full range of intelligence documents—operational cables, source files, the
detail of espionage operations and similar documentation will be breached. Analytical
products that deal with the gamut of issues addressed by CIA and the Intelligence Commu-nity
will be declassified
unless
in their declassification we endanger a source, expose a
method, or have the potential to seriously damage our relations with a foreign government.
At the end of the day, the choice for us is clear—as is required by law and our
conscience—we are going to protect those men and women who choose to secretly work
for the U.S. Government against terrorists, rogue states, proliferators of mass destruction
weapons and anyone else who seeks to harm U.S. citizens or U.S. interests.
Earlier, I tried to answer the question: Why is he proposing this? There is another rea-son
I feel strongly it is important to study the history and role of U.S. intelligence. There
are 77 stars inscribed on the wall at CIA Headquarters for the men and women who gave
their last full measure of devotion to their country. Of those 77 stars, 38 are not identified
because they died in secrecy, under cover, anonymous to the world but heroes to those of
us privileged to have served with them. They sought to protect America and Americans
from those who threatened our freedoms and our way of life. We owe it to them to study
the profession in which they served their country and to tell their story as fully and com-pletely
as possible.
Let me turn now to some other steps the Center is taking to promote the teaching and
study of intelligence in our universities.
Many of you will be familiar with our Officer in Residence Program, in which we
sponsor CIA offices for two-year tours on the faculties of participating colleges and
universities, such as we did with John Hedley at Georgetown. The CIA officers are vis-iting
faculty members. They teach, conduct research, and act as a resource for faculty
29. colleagues and students. Each assignment is tailored to the individual and the institu-tion.
Many Offices-in-Residence speak to community groups and lecture at other,
21
nearby academic institutions as well.
Second, I believe we need to do more to promote research and writing on intelligence
topics at the undergraduate and graduate levels. To promote such research and writing, I
would like to announce here that the Center is creating an annual award, which will be pre-sented
to the undergraduate or graduate student who writes the best essay on an intelligence
topic at an American university. The competition will be judged by the editorial board of
Studies in Intelligence,
and the winning paper each year will be published in
Studies.
Third, CIA sponsors the Harvard University Intelligence and Policy Project, which
supports research and training on how intelligence is actually used, or not used, by gov-ernment
officials devising national security policies. The research culminates in the prep-aration
of case studies on particular policy episodes. The project was founded in 1987 to
help those who prepare assessments of foreign events, and those who make foreign policy
decisions, better understand one another’s needs, interests, cultures and perspectives. The
program has produced 18 case studies, on such topics as
The SS-9 Controversy: Intelli-gence
as Political Football, The Fall of the Shah of Iran,
and
The CIA and the Fall of the
Soviet Empire: The Politics of ‘Getting It Right’.
We hope you make use of these cases
and the new cases that will be written with our support.
Finally, I would like to point to the compendiums of declassified documents with his-torical
commentary that we produce in conjunction with our conferences. These unique
volumes make fine starting points for professors seeking source material for courses on
the Agency or the intelligence profession. In addition to the volumes I mentioned earlier,
let me mention several others that are available to you:
The CIA under Harry Truman;
Assessing the Soviet Threat: The Early Cold War Years;
Corona: America’s First Satellite Program;
These volumes combine an interpretive historical essay with selective, representative
declassified documents.
So what should we be teaching in our courses on intelligence? I’m sure each of you
has your own strongly held views on this subject which I hope you will share with me in
the course of this conference, but I thought I might close out my presentation here today
by giving you a summary of the major themes I think are important in understanding the
intelligence process today. These are in no particular order.
First, the growth in importance of technology, especially technical means of col-lection.
In the mid-1950s, perhaps the most important event in the history of
American intelligence took place: the joining of government (in the form of the
CIA and the Air Force), academia (in the person of such intellectual giants as
James Killian of MIT), and business (Lockheed, Kodak, Polaroid, etc.) to produce
30. the technical systems that finally allowed the U.S. to keep tabs on the strategic
threat from the Soviet Union, which had proven largely impervious to the classi-cal
methods of HUMINT. The question for today, it seems to me, “Can this trium-virate,
which is already strained, continue to provide the United States with
technological superiority in the intelligence field?”
Second, the growth of oversight, especially Congressional oversight, but also
more generally, public scrutiny as evidenced by the far more intensive press cov-erage
that intelligence activities receive, closer attention from the Executive
Branch, and also from the Judiciary. It would be hard for me to exaggerate the
sea-change the Congressional investigation of the 1970s and the subsequent for-mation
of the oversight committees caused in the Agency’s culture and practices.
As some of you may know, there were occasions in the 1950s when the Congress
would pass the Agency’s budget without even holding hearings on it, and one or
two powerful Senators and Representatives, such as Richard Russell and Clar-ence
Cannon, would carefully limit the access of other members of Congress to
Agency briefings. The change in the relationship is illustrated in the following
statistic: Last year, Agency officers briefed members or staffers on 1,350 occa-sions,
or an average of five times per working day.
Third, the influence of intelligence on policy, and concomitantly, the influence of
politics and policymakers on intelligence. What has been the impact of intelli-gence
in the broader foreign policy formulation process? Under what circum-stances
do policymakers use intelligence? Ignore intelligence? Try to influence
intelligence? What causes certain Presidents, like John Kennedy, to regularly
read intelligence, and others, like Lyndon Johnson, to remain almost completely
uninterested?
And does it matter? Sherman Kent, the Chairman of the Board of National Estimates
22
from 1952 to 1967, once famously said,
A certain amount of all this worrying we do about influence upon policy is off
the mark. For in many cases, no matter what we tell the policymakers, and no
matter how right we are and how convincing, he will upon occasion disregard
the thrust of our findings for reasons beyond our ken. If influence cannot be our
goal, what should it be? Two things. It should be relevant within the area of our
competence, and above all it should be credible.
Is, therefore, the search for signs of influence a feckless endeavor? Kent himself came
to the conclusion that, “In the last analysis, if the [National Intelligence Estimates] did
nothing else, they contributed to a higher level of discourse in matters affecting the secu-rity
of the country.”
A fourth theme is the importance of the DCI as leader, administrator, and intelli-gence
advisor to the President. What makes a successful DCI? Which DCIs have
been successful and why? George Tenet is the fifth DCI to lead CIA and the Intelli-gence
Community in this decade. The average tenure of DCIs in the 1990s has been
about 19 months, and given the many and lengthy nomination and confirmation
31. processes for all the DCI nominees, the Agency was without a DCI for more than
one year of the last nine years. What has caused this trend, and what will be its
impact? Can it continue in the future without doing great harm to the Agency, the
Community, and the Nation?
Fifth, the use of covert action by administrations through history. How have U.S.
presidents used covert action as an instrument of statecraft since the founding of
the republic? What was the role of covert action during the Cold War? Was it a
surrogate for conflict between military forces of the United States and the Soviet
Union? Was it a “quick fix” for problems administrations could not otherwise
solve? How important has covert action been as a policy tool? And what are the
costs to the Agency for undertaking politically unpopular covert actions at presi-dential
23
direction?
Sixth, the relevancy of secret intelligence in the Information Age. Have the clas-sical
methods of intelligence collection, analysis, and dissemination been made
nearly obsolete by the multiplicity of information sources that policymakers now
have at their disposal? What role is left for these traditional methods? What con-tributions
have they made in the past, and does the velocity at which information
moves today make it possible for them to make similar contributions in the
future? Can intelligence be used to harness the promise of the Information Age?
Another theme could be the partnership of intelligence with law enforcement and
the military. What is the proper relationship between law enforcement and intel-ligence?
How closely should CIA and the FBI collaborate in their respective
missions? What should be the role of intelligence and the military in addressing
such transnational issues as counternarcotics, counterterrorism, and international
organized crime?
Eighth, the fundamental question of the role of a secret intelligence organization
in a democratic society. What should be the role of CIA in the new millennium?
In what circumstances should we conduct espionage? What is the ethical basis
for espionage? What are the ethical challenges in producing all-source analysis
for policymakers?
Finally, successes and failures. The most important question of all: Have the
American people gotten their money’s worth out of the Intelligence Community?
Just what is an “intelligence failure?” Are things simply right or wrong in the
intelligence business? Or is success measured more accurately along a contin-uum,
in which we should strive to be mostly right most of the time? Is perfect
knowledge possible?
I am sure many of you could come up with an equally interesting list just as long as
this one, and that is why I want to urge you to submit your syllabus to us for inclusion in
the compendium of intelligence syllabi that we intend to produce next year. We can all
learn from each other.
In conclusion, I would like to suggest that we can form a very successful partnership to
advance the study of intelligence in our universities. I hope that I have been able to con-vince
you of our genuine commitment to this goal. I have tried to outline for you what we
32. are doing to foster the growth of intelligence studies at present and what we plan to do in
the near future. I have even, perhaps somewhat presumptuously, suggested some of the
themes we think it is important to address in classes on intelligence.
Rest assured, we will be “out there,” lecturing, discussing, and presenting papers about
intelligence. But in the end, there are many more of you than there are of us, and it is you
and your colleagues who are in the best position to advance the field from its present sta-tus
as something of a curiosity taught in a relative handful of universities to a more
broadly accepted academic subject that will be offered as a standard part of most universi-ties’
curricula. It is you who will have to endow it with the conceptual and theoretical
framework that will give the subject greater academic legitimacy. It is you who will have
to attract the students, you who will have to do the research, write the papers, organize the
conferences, and do the dozens of other things that will be required to ensure that the
study of intelligence grows as a legitimate field of study.
We at the Center for the Study of Intelligence stand ready to help you. Together, I am
24
confident we can do it.
33. BIOGRAPHY
Lloyd D. Salvetti
Mr. Lloyd D. Salvetti was appointed Director of CIA’s Center for the Study of Intelli-gence
in August 1998, following a tour of duty at the National War College, where he was
a faculty member in the Department of National Security Policy. A veteran CIA opera-tions
officer, Mr. Salvetti has served in a variety of commands and other positions both
abroad and domestically, including senior management posts in the Operations Director-ate.
Prior to his National War College assignment, he was Chief of Staff for the Deputy
25
Director for Operations.
Mr. Salvetti served in 1989-1990 as Director of Intelligence Programs on the National
Security Council staff. Before joining CIA in 1970, he managed a congressional office for
two years. He was an active duty officer in the U.S. Air Force for four years in the 1960s,
after which he served in intelligence positions as an Air Force Reservist. Mr. Salvetti
received a B.A. from Tufts University and did postgraduate work at George Washington
University, American University, and the Harvard Business School.
Panel on academic and Intelligence Community competitive assessments: Discussant H. Bradford
Westerfield, Yale University; Davis Bobrow and Michael Rattie, University of Pittsburgh; and
moderator Robert Mirabello, JMIC Faculty Member.
34. 26
JMIC Faculty Member Perry Pickert
introduces the panel on United Nations
online documentation.
Panel on United Nations documents: Ms. Lilia Vazquez, David Traystman, LtCol Peter Vercruysse
(USMC) and Dr. H. Bradford Westerfield, Discussant.
35. CLOSING REMARKS
Dr. Ronald D. Garst
Provost, Joint Military Intelligence College
Our discussions today lead me to the conclusion that the teaching of intelligence has
reached a new level of maturity. At one time, many of the course offerings on intelligence
focused on the flashy part of the business—counterintelligence and covert operations.
Today, those teaching intelligence generally avoid the sensational and focus on the role of
intelligence in the national security of the United States and more broadly, global security.
I am pleased to see a growing number of professors, proud of their association with the
Intelligence Community, aiming their courses at those young people who wish to pursue
careers in intelligence. In doing so, they are offering academic excellence with practical
experience.
Teaching is facilitated by a growing body of intelligence literature. Serious scholars of
intelligence, many of them with experience in the Intelligence Community, are writing
about the activity and products of intelligence in an insightful and responsible manner.
The dialog that started 50 years ago, in 1949, with the publication of Sherman Kent’s
Strategic Intelligence for American World Policy, continues today with Mark Lowenthal’s
soon-to-be-published Intelligence: From Secrets to Policy. Thanks to those in our midst
who have been willing to put pen-to-paper, or in this cyber era, fingers-to-the-keyboard,
professors have the factual, thoughtful and discerning material needed to teach intelli-gence
to those who might aspire to join us. To those who today have shared their syllabi,
teaching methods and lessons learned, we are grateful for your ideas.
Lloyd Salvetti noted that the JMIC is already the de facto core of a National
Intelligence College or University. Let me suggest that, just as public schools often
become the glue that holds today’s diverse communities together, so can this College
become the prime mover in orchestrating the evolution toward a more well-integrated
Intelligence Community. For example, the new Occasional Paper by recent MSSI
graduate Lisa Krizan, Intelligence Essentials for Everyone, melds together diverse views
on the government intelligence cycle and further, in the spirit of openness fostered by an
academic institution within the Community, extends her findings to those in the Nation’s
private sector businesses who have an interest in the principles and practices of
information management for the security of their own operations.
This morning both Mark Marshall and Katherine Shelfer invited us to see some aspects
of the intelligence business in a more revealing way than usual. We all took a step toward
a deeper understanding of intelligence production based on the visual arts, and of the
intricacies of tradeoffs between timeliness and accuracy in business information manage-ment,
in the world of competitive intelligence. This afternoon, the issue of whether and
how to structure tests of competing teams of “inside” and “outside” estimative analysts
brought some sharp debate and some thoughtful rebuttals.
27
36. The team that just now brought us the story of how the United Nations is making even
its draft documents available for academic debate by scholars-in-formation in the world’s
classrooms illustrates that linkages are becoming quite common between institutions that
create public policy and those of us anywhere who can help provide informed debate.
That is to say, the voices of well-informed individuals, mediated through group discus-sion,
are being welcomed in at least some policy circles. When we realize that these
voices are adding value to information, the worlds of academicians, intelligence analysts,
and public officials acting on our behalf will be approaching a “meeting of the minds” in
a way similar to what we have experienced here today.
During this conference I have witnessed a number of exchanges of business cards and
e-mail addresses. As people get to know each other, I am sure the Internet will facilitate
increased collaboration and cooperation in the teaching of intelligence. This is important
for I suspect that many of you feel like lone wolves—teaching in an area little known by
your colleagues, and viewed with suspicion by many. I urge you to persist. Invite the
skeptics to your classes. They too will learn that this is an important, serious and extraor-dinarily
28
interesting business.
In 1993 the CIA’s Center for the Study of Intelligence hosted a symposium on the
release of material essential to understanding the role of intelligence in U.S. policymak-ing.
Today the College has sponsored a conference on the teaching of intelligence. Some-time
in the middle years of the next decade, if not before, we trust some organization will
host another conference such as this so that we may have another benchmark of our
progress.