Open Source Intelligence (OSINT) on the Public Internet and on the Open Source Information System (OSIS)

Total Page:16

File Type:pdf, Size:1020Kb

Open Source Intelligence (OSINT) on the Public Internet and on the Open Source Information System (OSIS) UNCLASSIFIED Warning Intelligence on the Internet Review (WIIR) No. 107—Special Issue 2 January 2002 Published every other Wednesday, the WIIR presents unclassified English-language global threat intelligence found on the public Internet. It is prepared under contract by Interaction Systems Incorporated (ISI) for the National Intelligence Officer for Warning and the National Intelligence Council. Issues of the WIIR are posted online on NICOLE, Intelink, and the Open Source Information System. The summaries and quoted excerpts in WIIR issues are intended for the use of members of the U.S. intelligence community in furtherance of their professional duties—and the summaries and quoted excerpts are subject to the copyright protections associated with the original sources. Please provide questions, comments, and websites for future Internet review to Dr. James Arnold Miller, Chairman, ISI, at [email protected], 703-938-1774, and fax 703-938-1727. Open Source Intelligence (OSINT) on the Public Internet and on the Open Source Information System (OSIS) By James Arnold Miller, Ph.D. Mining Online Open Sources Given the horrendous terrorist attack on the United States on 11 September 2001 and the ensuing war against global terrorism, unclassified or open source intelligence (OSINT) is more important than ever. And this means exploiting not just information on the public Internet but also, very importantly, what is and becomes available on the federal government’s online Open Source Information System (OSIS). The dedicated facilitators in the Community Open Source Program (COSP) and their OSIS practitioners in Washington and around the globe have been working hard for years to promote and enable the use of OSINT in intelligence research and analysis. Our nation’s warfighters— pilots, sailors, special operations commandos, or cops and other first responders at home—need all the help they can get in the intelligence area. There has never been a greater need for quality OSINT. Having said that, where can we find quality OSINT? In the more than two years since we’ve been preparing the WIIR, we’ve found a great many websites on the public Internet that have proven to be valuable sources of warning-related and other open source intelligence. But since we obtained access in early 2001 to OSIS we have come to realize that often the unclassified information available through OSIS exceeds or matches information on the public Internet. Many hundreds of intelligence professionals in and out of government today are persistently and increasingly effectively collecting (often at substantial dollar cost), synthesizing, analyzing, and disseminating quality open source information relating to homeland security and the global war on terrorism. The primary purpose of this special issue of the WIIR is to try to assist all of those OSINT “warfighters.” For we believe that the first line of defense as well as offense in the war against terrorism is intelligence, and we also believe that the job can’t be done without maximum collection and exploitation of OSINT. In several of our previous issues of the WIIR, which began publication in November 1999, we presented lists of information providers on the public Internet. Now that we are regular exploiters of the information resources on OSIS, we present below a listing of online OSINT resources available on OSIS and/or the public Internet. While clearly oversimplifying greatly, we have assigned each of the OSIS and public Internet websites to a regional or functional topic. Our goal is to present “starting points” for readers interested in finding OSINT resources relating to broad categories of interest. Regional and Functional Topics for Organizing Regional and Functional Topics Regional Topics Functional Topics More Functional Topics Africa Chemical and Biological Warfare (CBW) Human Rights Asia-Pacific Conflicts Intelligence Canada Countries International (catch-all category) Europe Crime News Latin America Cyberwarfare Open Source Intelligence (OSINT) Middle East Defense Reference Russia-CIS Disasters Terrorism Environment Weapons of Mass Destruction (WMD) Homeland Security (HLS) We have tried to verify the accuracy/currency of all website addresses (Uniform Resource Locators, or URLs) cited below and apologize for any errors. While you are online within OSIS you of course can gain access to the associated websites by pointing and clicking—but we include below the URLs of OSIS websites in the event you want to “bookmark” any of these sites. Please let us know if you have any problems or questions—and also if you can suggest any other websites that we should be aware of. We did exclude a few otherwise recently useful websites on OSIS and on the public Internet that we were unable to access during the last several days. We are grateful for any and all feedback on our website listings and on the substantive reporting in the WIIR. Please let us know at [email protected] how we can help you make your OSIS and public Internet mining more productive. We face the tremendous challenge of better using OSINT to help meet the pressing and growing intelligence needs of homeland defense and the war on terrorism. All the best for 2002 personally and professionally! Jim Miller 2 Open Source Intelligence (OSINT) on the Public Internet and on the Open Source Information System (OSIS): Organized by Regional and Functional Topics NOTE: In the grid presented below in the fourth or right hand column labeled “A” (for Access”) a “P’ means that the website is accessible through the public Internet whereas an “O” means that the website is accessible only via OSIS. Topics Websites Website Addresses (Uniform Resource Locators, or URLs) A Africa Africa Confidential http://www.africa-confidential.com [London newsletter—for-fee but P back issues are accessible for free] Africa Africa Daily http://www.africadaily.com P Africa Africa Index http://www.afrika.no/index [maintained by the Norwegian Council for P Africa—daily e-mails are available] Africa Africa News Now http://www.africanewsnow.com/index.html P Africa Africa Policy http://africapolicy.org [links on African issues and U.S. policy] P Information Center Africa Africa Server http://www.africaserver.nl [Netherlands-based gateway] P Africa African Studies http://www.sas.upenn.edu/African_Studies [from the home page go to P Center/University of Country-Specific Pages and to Selected Web Links] Pennsylvania Africa AllAfrica.com http://allafrica.com [maintained by AllAfrica, Inc., previously Africa P News Service and Africa News Online—hundreds of new stories daily mostly from African news organizations] Africa New Africa.com http://newafrica.com and http://newafrica.com/maps [for maps] P Africa World Wide Web http://www.columbia.edu/cu/lweb/indiv/africa/cuvl [gateway to many P Virtual Library-Africa information resources] Asia-Pacific Asia Week http://www.asiaweek.com/asiaweek P Asia-Pacific Asia-Pacific Center for http://www.apcss.org [U.S. Department of Defense research and P Security Studies conference center in Honolulu, HI—includes country background information and links to other organizations] Asia-Pacific Australia http://ns.au.osis.org [Open Source Information System-Australia is an O activity of Australia’s Defence Intelligence Organization] Asia-Pacific COSP Monitor- http://www.cosp.osis.gov/Monitor/Afghanistan/index.htm [numerous O Afghanistan recent articles organized by sub-topics] Asia-Pacific COSP Monitor-China- http://www.cosp.osis.gov/mis/ChinaStrait/straitmain/index.htm O Taiwan [numerous recent articles organized by sub-topics] Asia-Pacific COSP Monitor- http://www.cosp.osis.gov/mis/pak/index.htm [numerous recent articles O Pakistan organized by sub-topics] Asia-Pacific COSP Monitor- http://web.dia.osis.gov/Philippines [archived articles focusing on O Philippines terrorism in the Philippines] Asia-Pacific Far Eastern Economic http://www.feer.com [Hong Kong-based—free access to articles on P Review economic, military, and political developments] Asia-Pacific Inside China Today http://www.insidechina.com [focus on China, Hong Kong, and P Taiwan—by European Internet Network] Asia-Pacific Institute for Defence http://www.idsa-india.org [India-based—publisher of the journal P Studies and Analyses “Strategic Analysis”] Asia-Pacific National Bureau of http://www.nbr.org [Seattle-based—publications, databases, and links] P Asian Research Asia-Pacific Nautilus Institute for http://www.nautilus.org [prolific source of reports and current news— P Security and sends e-mails with links to full reports—Asia-Pacific topics treated Sustainable include arms control, ballistic missile defense, defense, environment, Development and WMD] Asia-Pacific Pacific Command, http://www.pacom.osis.gov [useful leads to OSIS and public Internet] O U.S. 3 Asia-Pacific South China Morning http://www.scmp.com [based in Hong Kong] P Post Asia-Pacific World Wide Web http://www.vlib.org/AsianStudies.html [gateway to many information P Virtual Library-Asia- resources] Pacific Asia-Pacific World Wide Web http://coombs.anu.edu.au/WWWVL-PacificStudies.html [gateway to P Virtual Library-Pacific many information resources] Asia-Pacific Zama Home Page http://zama-osis.army.mil [features Pacific Rim Open Source Service— O maintained by the U.S. Army’s Military Intelligence Battalion of the 500 Military Intelligence Group—based at Camp Zama in Japan] Canada Canada http://maple.osis.org [the MAPLE Canadian OSIS-I [international] O website, operated by the Canadian Security Intelligence Service] Canada
Recommended publications
  • Air Force Glossary
    AIR FORCE GLOSSARY Air Force Doctrine Document 1-2 11 January 2007 This document supplements the terminology in Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms ACCESSIBILITY: Publications are available on the e-Publishing website at www.e-publishing.af.mil for downloading. RELEASABILITY: There are no releasability restrictions on this publication BY ORDER OF THE AIR FORCE DOCTRINE DOCUMENT 1-2 SECRETARY OF THE AIR FORCE 11 JANUARY 2007 NOTICE: This publication is available on the AFDPO WWW site at http://www.e-publishing.af.mil SUMMARY OF CHANGES Since the 8 June 2006 version the following publications have been revised or developed: AFDD 2 Operations and Organization, AFDD 2-2 Space Operations, AFDD 2-1.3 Counterland Operations, and AFDD 2-1.9 Targeting. NOTE: The Air Force Glossary is accessible on-line at https://www.doctrine.af.mil/Main.asp (fourth selection from bottom left). As terminology changes are published in doctrine they are added to the internet version, making the internet version of the Air Force Glossary more up-to- date. Supersedes: AFDD 1-2, 8 June 2006 OPR: HQ AFDC/DD Certified by: HQ AFDC/DD (Col Jon Wolfe) Pages: 77 Accessibility: Available on the e-publishing website at www.e-publishing.af.mil for downloading Releasability: There are no releasability restrictions on this publication Approved by: Allen G. Peck, Major General, USAF Commander, Air Force Doctrine Center FOREWORD Warfighters require a common lexicon of unique military terms essential to explaining, understanding, and writing doctrine. This common lexicon, reached by familiar definitions, is fundamental to conducting efficient and effective air, space, and cyberspace operations.
    [Show full text]
  • Trend Analysis the Israeli Unit 8200 an OSINT-Based Study CSS
    CSS CYBER DEFENSE PROJECT Trend Analysis The Israeli Unit 8200 An OSINT-based study Zürich, December 2019 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Trend analysis: The Israeli Unit 8200 – An OSINT-based study Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group, Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, S. (2019). Trend Analysis: The Israeli Unit 8200 – An OSINT-based study. Center for Security Studies (CSS), ETH Zürich. 1 Trend analysis: The Israeli Unit 8200 – An OSINT-based study . Table of Contents 1 Introduction 4 2 Historical Background 5 2.1 Pre-independence intelligence units 5 2.2 Post-independence unit: former capabilities, missions, mandate and techniques 5 2.3 The Yom Kippur War and its consequences 6 3 Operational Background 8 3.1 Unit mandate, activities and capabilities 8 3.2 Attributed and alleged operations 8 3.3 International efforts and cooperation 9 4 Organizational and Cultural Background 10 4.1 Organizational structure 10 Structure and sub-units 10 Infrastructure 11 4.2 Selection and training process 12 Attractiveness and motivation 12 Screening process 12 Selection process 13 Training process 13 Service, reserve and alumni 14 4.3 Internal culture 14 5 Discussion and Analysis 16 5.1 Strengths 16 5.2 Weaknesses 17 6 Conclusion and Recommendations 18 7 Glossary 20 8 Abbreviations 20 9 Bibliography 21 2 Trend analysis: The Israeli Unit 8200 – An OSINT-based study selection tests comprise a psychometric test, rigorous Executive Summary interviews, and an education/skills test.
    [Show full text]
  • Development of Surveillance Technology and Risk of Abuse of Economic Information
    ∋(9(/230(172)6859(,//∃1&( 7(&+12/2∗<∃1∋5,6.2)∃%86( 2)(&2120,&,1)250∃7,21 9ΡΟ 7ΚΗςΗΡΙΚΗΥΛΘΦΡΠΠΞΘΛΦΛΡΘς ,ΘΗΟΟΛϑΗΘΦΗ&20,17ΡΙΞΡΠ∆ΗΓΣΥΡΦΗςςΛΘϑΙΡΥΛΘΗΟΟΛϑΗΘΦΗΣΞΥΣΡςΗς ΡΙΛΘΗΥΦΗΣΗΓΕΥΡΓΕΘΓΠΞΟΛΟΘϑΞϑΗΟΗςΗΓΡΥΦΡΠΠΡΘΦΥΥΛΗΥ ς∴ςΗΠςΘΓΛςΣΣΟΛΦΕΛΟΛ∴Ρ&20,17ΥϑΗΛΘϑΘΓςΗΟΗΦΛΡΘ ΛΘΦΟΞΓΛΘϑςΣΗΗΦΚΥΗΦΡϑΘΛΛΡΘ :ΡΥΝΛΘϑΓΡΦΞΠΗΘΙΡΥΚΗ672∃3ΘΗΟ /Ξ[ΗΠΕΡΞΥϑ2ΦΡΕΗΥ 3(9ΡΟ &ΟΡϑΞΛΘϑΓ 7ΛΟΗ 3∆Υ7ΚΗςΗΡΙΚΗΥΛΘΦΡΠΠΞΘΛΦΛΡΘς ,ΘΗΟΟΛϑΗΘΦΗ&20,17ΡΙΞΡΠ∆ΗΓΣΥΡΦΗςςΛΘϑΙΡΥ ΛΘΗΟΟΛϑΗΘΦΗΣΞΥΣΡςΗςΡΙΛΘΗΥΦΗΣΗΓΕΥΡΓΕΘΓΞΟΛ ΟΘϑΞϑΗΟΗςΗΓΡΥΦΡΠΠΡΘΦΥΥΛΗΥς∴ςΗΠςΘΓΛς ΣΣΟΛΦΕΛΟΛ∴Ρ&20,17ΥϑΗΛΘϑΘΓςΗΟΗΦΛΡΘ ΛΘΦΟΞΓΛΘϑςΣΗΗΦΚΥΗΦΡϑΘΛΛΡΘ :ΡΥΝΣΟΘ5ΗΙ (3,9%672∃ 3ΞΕΟΛςΚΗΥ (ΞΥΡΣΗΘ3ΥΟΛΠΗΘ ∋ΛΥΗΦΡΥΗ∗ΗΘΗΥΟΙΡΥ5ΗςΗΥΦΚ ∋ΛΥΗΦΡΥΗ∃ 7ΚΗ672∃3ΥΡϑΥ∆ΠΠΗ ∃ΞΚΡΥ ∋ΞΘΦΘ&ΠΣΕΗΟΟ,379/ΩΓ(ΓΛΘΕΞΥϑΚ (ΓΛΡΥ 0Υ∋ΛΦΝ+2/∋6:257+ +ΗΓΡΙ672∃8ΘΛ ∋Η 2ΦΡΕΗΥ 3(ΘΞΠΕΗΥ 3(9ΡΟ 7ΚΛςΓΡΦΞΠΗΘΛςΖΡΥΝΛΘϑ∋ΡΦΞΠΗΘΙΡΥΚΗ672∃3ΘΗΟ,ΛςΘΡΘΡΙΙΛΦΛΟΣΞΕΟΛΦΛΡΘΡΙ672∃ 7ΚΛςΓΡΦΞΠΗΘΓΡΗςΘΡΘΗΦΗςςΥΛΟ∴ΥΗΣΥΗςΗΘΚΗΨΛΗΖςΡΙΚΗ(ΞΥΡΣΗΘ3ΥΟΛΠΗΘ I nterception Capabilities 2000 Report to the Director General for Research of the European Parliament (Scientific and Technical Options Assessment programme office) on the development of surveillance technology and risk of abuse of economic information. This study considers the state of the art in Communications intelligence (Comint) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems, and its applicability to Comint targeting and selection, including speech recognition. I nterception Capabilities 2000 Cont ent s SUMMARY .............................................................................................................................................................................................
    [Show full text]
  • Development of Surveillance Technology and Risk of Abuse of Economic Information
    6&,(17,),&∃1∋7(&+12/2∗,&∃/237,216∃66(660(17 672∃ ∋(9(/230(172)6859(,//∃1&( 7(&+12/2∗<∃1∋5,6.2)∃%86( 2)(&2120,&,1)250∃7,21 9ΡΟ 3ΥΗςΗΘΛΡΘΘΓ∃ΘΟ∴ςΛς 3ΥΗςΗΘΛΡΘΡΙΚΗΙΡΞΥςΞΓΛΗς ∃ΘΟ∴ςΛς∋ΣΥΡΗΦΛΡΘΘΓΚΞΠΘΥΛϑΚςΛΘΚΗ(ΞΥΡΣΗΘ8ΘΛΡΘΘΓΚΗ ΥΡΟΗΡΙΚΗ(ΞΥΡΣΗΘ3ΥΟΛΠΗΘ ∋ΡΦΞΠΗΘΓΗΥΨΛΟΣΡΞΥΟΗ3ΘΗΟ672∃ /Ξ[ΗΠΕΡΞΥϑ∋ΗΦΗΠΕΗΥ 3(9ΡΟ(1 QA-ST-OA-132-EN-N &ΟΡϑΞΛΘϑΓ 7ΛΟΗ 9ΡΟ3ΥπςΗΘΛΡΘΗΘΟ∴ςΗ 3ΥπςΗΘΛΡΘΓΗςΤΞ∆ΥΗπΞΓΗς ∃ΘΟ∴ςΗΣΥΡΗΦΩΛΡΘΓΗςΓΡΘΘπΗςΗΩ∋ΥΡΛΓΗΟ+ΡΠΠΗΓΘς Ο 8ΘΛΡΘ(ΞΥΡΣπΗΘΘΗΗΥ{ΟΗΓΞ3∆ΥΟΗΠΗΘ(ΞΥΡΣπΗΘ :ΡΥΝΣΟΘ5ΗΙ (3,9%672∃ 3ΞΕΟΛςΚΗΥ (ΞΥΡΣΗΘ 3ΥΟΛΠΗΘ ∋ΛΥΗΦΡΥΗ ∗ΗΘΗΥΟΙΡΥ5ΗςΗΥΦΚ ∋ΛΥΗΦΡΥΗ ∃ 7ΚΗ672∃3ΥΡϑΥ∆ΠΠΗ ∃ΞΚΡΥ 3Ηϑϑ∴%ΗΦΝΗΥΨΛςΛΛΘϑΥΗςΗ∆ΥΦΚΗΥ 8ΘΓΗΥΚΗςΞΣΗΥΨΛςΛΡΘΡΙ∋ΛΦΝ+ΡΟΓςΖΡΥΚ +ΗΓ ΡΙΩΚΗ672∃7ΗΠ (ΓΛΡΥ0Υ ∋ΛΦΝ+2/∋6:257+ +ΗΓΡΙ672∃8ΘΛ ∋Η 2ΦΡΕΥΗ 3(ΘΞΠΕΗΥ 3(9ΡΟ(1 7ΚΛςΓΡΦΞΠΗΘΛςΖΡΥΝΛΘϑ∋ΡΦΞΠΗΘΙΡΥΚΗ672∃3ΘΗΟ,ΩΛςΘΡΘΡΙΙΛΦΛΟΣΞΕΟΛΦΛΡΘΡΙ 672∃ 7ΚΛςΓΡΦΞΠΗΘΓΡΗςΘΡΘΗΦΗςςΥΛΟ∴ΥΗΣΥΗςΗΘΚΗΨΛΗΖςΡΙΚΗ(ΞΥΡΣΗΘ3ΥΟΛΠΗΘ &217(176 3ϑΗ ,ΘΥΡΓΞΦΛΡΘ 3∆Υ2ΘΗ 3ΥΗςΗΘΛΡΘΡΙΚΗΙΡΞΥςΞΓΛΗς 6ΞΓ∴2ΘΗ 7ΚΗςΩΗΡΙΚΗ∆ΥΛΘ&ΡΠΠΞΘΛΦ∆ΛΡΘς,ΘΗΟΟΛϑΗΘΦΗ &20,17ΡΙ ∆ΞΡΠΗΓΣΥΡΦΗςςΛΘϑΙΡΥΛΘΗΟΟΛϑΗΘΦΗΣΞΥΣΡςΗςΡΙΛΘΗΥΦΗΣΗΓ ΕΥΡΓΕΘΓΠΞΟΛΟΘϑΞϑΗΟΗ∆ςΗΓΡΥΦΡΠΠΡΘΦ∆ΥΥΛΗΥς∴ςΗΠςΘΓΛς ΣΣΟΛΦΕΛΟΛ∴Ρ&20,17ΥϑΗΛΘϑΘΓςΗΟΗΦΛΡΘΛΘΦΟΞΓΛΘϑςΣΗΗΦΚ ΥΗΦΡϑΘΛΛΡΘ 6ΞΓ∴7ΖΡ (ΘΦΥ∴ΣΛΡΘΘΓΦΥ∴ΣΡς∴ςΗΠςΛΘΗΟΗΦΩΥΡΘΛΦςΞΥΨΗΛΟΟΘΦΗ∆ςΞΥΨΗ∴ΡΙ ΚΗΗΦΚΘΡΟΡϑ∴ςςΗςςΠΗΘΛςςΞΗς 6ΞΓ∴7ΚΥΗΗ 7ΚΗΟΗϑ∆ΟΛ∴ΡΙΚΗΛΘΗΥΦΗΣΛΡΘΡΙΗΟΗΦΩΥΡΘΛΦΦΡΠΠΞΘΛΦ∆ΛΡΘς ΦΡΘΦΛςΗςΞΥΨΗ∴ΡΙΚΗΣΥΛΘΦΛΣΟΟΗϑ∆ΟΛςςΞΗςΘΓΛΘςΥΞΠΗΘςΞΘΓΗΥ ΛΘΗΥΘΛΡΘΟ(ΞΥΡΣΗΘΘΓΘΛΡΘΟΟΖ 6ΞΓ∴)ΡΞΥ 7ΚΗΣΗΥΦΗΣΛΡΘΡΙΗΦΡΘΡΠΛΦΥΛςΝςΥΛςΛΘϑΙΥΡΠΚΗΣΡΗΘΛΟ ΨΞΟΘΗΥΕΛΟΛ∴ΡΙΗΟΗΦΥΡΘΛΦΦΡΠΠΗΥΦΛ∆ΟΠΗΓΛΡΛΘΗΥΦΗΣΛΡΘ 3∆Υ7ΖΡ ∃ΘΟ∴ςΛς±∋ΣΥΡΗΦΛΡΘΘΓΚΞΠΘΥΛϑΚςΛΘΚΗ(ΞΥΡΣΗΘ8ΘΛΡΘΘΓΚΗ
    [Show full text]
  • Airpower and the Environment
    Airpower and the Environment e Ecological Implications of Modern Air Warfare E J H Air University Press Air Force Research Institute Maxwell Air Force Base, Alabama July 2013 Airpower and the Environment e Ecological Implications of Modern Air Warfare E J H Air University Press Air Force Research Institute Maxwell Air Force Base, Alabama July 2013 Library of Congress Cataloging-in-Publication Data Airpower and the environment : the ecological implications of modern air warfare / edited by Joel Hayward. p. cm. Includes bibliographical references and index. ISBN 978-1-58566-223-4 1. Air power—Environmental aspects. 2. Air warfare—Environmental aspects. 3. Air warfare—Case studies. I. Hayward, Joel S. A. UG630.A3845 2012 363.739’2—dc23 2012038356 Disclaimer Opinions, conclusions, and recommendations expressed or implied within are solely those of the author and do not necessarily represent the views of Air University, the United States Air Force, the Department of Defense, or any other US government agency. Cleared for public release; distribution unlimited. AFRI Air Force Research Institute Air University Press Air Force Research Institute 155 North Twining Street Maxwell AFB, AL 36112-6026 http://aupress.au.af.mil ii Contents About the Authors v Introduction: War, Airpower, and the Environment: Some Preliminary Thoughts Joel Hayward ix 1 The mpactI of War on the Environment, Public Health, and Natural Resources 1 Victor W. Sidel 2 “Very Large Secondary Effects”: Environmental Considerations in the Planning of the British Strategic Bombing Offensive against Germany, 1939–1945 9 Toby Thacker 3 The Environmental Impact of the US Army Air Forces’ Production and Training Infrastructure on the Great Plains 25 Christopher M.
    [Show full text]
  • The Buildup of Forces for IDF Underground Warfare
    The Buildup of Forces for IDF Underground Warfare Israel’s successful response to the underground threat has significantly limited the strategic abilities of its enemies, just as Israel has severely hampered the efficiency and purposefulness of rocket launches by terrorist organizations. This affords Israel room to maneuver if and when it decides to launch a wide-scale military operation in the Gaza Strip or Lebanon. Omer Dostri 9.1.2019 https://jiss.org.il/en/dostri-idf-underground-warfare By using underground terrain, terrorist organizations can reduce the superiority enjoyed by regular armies that possess technological and firepower advantages. For the terrorist organizations, these tunnels are an important way of diversifying warfare and launching surprise attacks against states, at different levels: defense, attack, intelligence and logistics. The underground challenge has two categories: attack and defensive tunnels. The tunnel threat may be classified at two different operational levels: routine security and a state of emergency. For routine security, dealing with the underground threat focuses on the tunnels used for smuggling goods and firearms, capturing soldiers, launching terror attacks and maneuvering. Dealing with the tunnels in a state of emergency becomes a bigger challenge because the fighting forces are forced to wage face-to-face, underground battle against the enemy. The regular army is required to deal with the underground challenge by designing and developing advanced intelligence, technological, engineering and operational (maneuvers) capabilities which will enable the fighting forces to locate, capture, hold and destroy the tunnels. The Israeli public became aware of the underground threat following Operation Protective Edge when Hamas used the tunnels to defend itself from IDF soldiers in the Gaza Strip, to infiltrate Israeli territory, to kill or kidnap soldiers and to carry out a strategic attack against civilians.
    [Show full text]
  • Korean Peninsula Military Modernization Trends
    Korean Peninsula Military Modernization AHCFIN 20 September 2016 1 Korean Peninsula Military Modernization Trends By Anthony H. Cordesman With the assistance of Joseph Kendall and Charles Ayers Working Draft: September 20, 2016 Please provide comments to [email protected] Cover: Eighth Army via Flickr Korean Peninsula Military Modernization AHCFIN 20 September 2016 2 KOREAN PENINSULA MILITARY MODERNIZATION TRENDS ..................................................................................... 3 DPRK ......................................................................................................................................................... 3 DPRK Modernization Priorities ............................................................................................................. 4 Key DPRK Force Upgrades .................................................................................................................... 8 ROK ......................................................................................................................................................... 13 ROK Modernization Plans ................................................................................................................... 13 A Series of Defense Reform Plans and Modernization Efforts: 2005 Onwards .................................. 14 Revised Plans, More Modernization and Key Force Upgrades: 2010-2014 ....................................... 18 Modernization and Key Force Upgrades: 2014-2015 ........................................................................
    [Show full text]
  • The Jonathan Jay Pollard Espionage Case: a Damage Assessment ~
    MORI DociD: 1346933 .. · ,. I Key to Exemptions 1. Executive Order 13526 section 3.3 (b)(l) 2. Executive Order 13526 section 3.3 (b)(6) 3. Central Intelligence Agency Act of 1949 (50 U.S.C., section 403g) 4. 5 U.S.C. section 522 (b)(3), the Freedom oflnformation Act 5. 5 U.S.C. section 522 (b)(6) 6. 5 U.S.C. section 522 (b)(7)(C) 7. 5 U.S.C. section 522 (b)(7)(E) DECLASSIFIED UNDER AUTHORITY OF THE INTERAGENCY SECURITY CLASSIFICATION APPEALS PANEL. E.O. 13526, SECTION 5.3(b)(3) ISCAP No. L b t11- 0 \ ~ , document j__ I I i . i. I I I I I . i --! MORI DociD: 1346933 :-: T13P SSSPET I I 1 II DIRECTOR OF CENTRAL INTELLIGENCE Foreign Denial and Deception Analysis Committee 30 October 1987 f THE JONATHAN JAY POLLARD ESPIONAGE CASE: A DAMAGE ASSESSMENT ~ Study Director, j L_--~----~------------~----~ AND ~I MORI DociD: 1346933 Jj Preface This study, the Foreign Denial and Deception of the. Director of of two assessments of damage a result of Jonathan Pollard's espionage on behalf of 1984-85, which are being issued almost simultaneously. The other is an assessment prepared for the Department of Defense by the Office of Naval Intelligence and the · Naval Investiqative Service, Naval Security and Investigative · Command, where Pollard was employed during his espionage career. The principal drafters consulted closely during preparation of the two studies. Although they differ somewhat in detail and emphasis, there is mutual agreement concerning their findings. ~ · ~ . The Study Director gratefully acknowledges the valu&Ple assistance of contributors from throughout the Intelligence Community to the project.
    [Show full text]
  • Foreign Affairs - Written Evidence
    House of Commons - Foreign Affairs - Written Evidence Search Advanced Search Home Glossary Index Contact Us Parliament Live Session 2002-03 Publications on the internet Foreign Affairs Committee Publications House of Commons Foreign Affairs - Written Evidence[Back to Report] Here you can browse the Written Evidence ordered by the House of Commons to be printed 3 July 2003. CONTENTS Memorandum from Rt Hon Robin Cook MP Memorandum from Dr Thomas David Inch Memorandum from Terence Taylor, International Institute for Strategic Studies-US Memorandum from Andrew Wilkie Memorandum from Alastair Campbell Supplementary memorandum from Alastair Campbell Memorandum from Gareth Howell Memorandum from Laura Quillia Memorandum from Peter Jones Memorandum from the Public Affairs Unit, Church of England Memorandum from Richard Heller Memorandum submitted by Edward Hibbert Memorandum from Mr A Qavi Memorandum from Philip Miller Memorandum from Dr Martha Mundy Memorandum from the Oxford Research Group Memorandum from Dr Glen Rangwala Memorandum from Dr Kamil Mahdi Memorandum from BASIC and Saferworld Memorandum submitted by Olivia Bosch, former UNSCOM Inspector in Iraq Memorandum from Greenpeace UK Memorandum from Paul McGowan Memorandum from the Office of National Assessments, Government of Australia http://www.publications.parliament.uk/pa/cm200203/cmselect/cmfaff/813/813we01.htm (1 von 2) [18.07.2003 19:57:06] House of Commons - Foreign Affairs - Written Evidence Memorandum from the BBC Memorandum from Dr David Morrison Correspondence between the Chairman
    [Show full text]
  • SECRET // N0F031H // MR J SAIG-IO SUBJECT: Quarterly Intelligence Oversight Activities Report (1Ri Quarter, FY 08) (U) J. (U) AR
    mm hi SECRET // N0F031H // MR j SAIG-IO SUBJECT: Quarterly Intelligence Oversight Activities Report (1ri Quarter, FY 08) (U) J. (U) AR 381-20, The Army Counterintelligence Program, 15 November 1993. 2. (U) SCOPE OF REPORT: fr> accordance with (IAW) the references listed above, this report provides Information on: a. (U) Questionable Intelligence Activities {QIAs) reported to the Intelligence Oversight Division, US Army Inspector General Agency (DAIG-IO), during 1* Quarter, Fiscal Year 2008; b. (U) Updates to QIAs previously reported; c. (U) Results of intelligence oversight (iO) inspections and other actions conducted by DAIG-IO during 1* Quarter, Fiscal Year 2008; d. (U) Summary of substantive changes to the Army IO program during Quarter, Fiscal Year 2008; and e. (U) Summary of any changes to Intelligence, counterintelligence (CI), and intelligence- related policies during 1 * Quarter, Fiscal Year 2008. 3, (U) NEW QIA REPORTS; Nine new reports of QIAs were reported during 1st Quarter, Fiscal Year 2008. a. (U) QAK3 Case No. 08-001:. l/ mi ^MMWUBH (2) (U) DAIG-IO notes a tack of clarity with regard to approval authority poficy and standard operating procedure for US Army Intelligence organizations, other than the intelligence and Security Command (INSCOM) and the 65Q01 Mi Group (MIG), to obtain NAIA, as currently outlined JAW AR 381-10 and the classified memo mentioned above. Additionally, there appears to be an ability for Army intelligence organizations to obtain NAIA through the DNI ClO's browsing service, which may conflict with required approvals in documents referenced above. DAIG-IO recommended that the Deputy Chief of Staff (DCS) G2 examine the existing policy guidance Tor obtaining NAIA to ensure consistency and clarity and provide a report of findings.
    [Show full text]
  • 2013 USAF Almanac
    May 2013/$8 May 2013 USAF Almanac AIR FORCE MAGAZINE MAY 2013 ALMANAC WWW.AIRFORCEMAG.COM Sensing Effects C4I Training & Logistics Cyber MISSION: MODERNIZE WITHOUT COMPROMISE Raytheon’s drop-in, plug-and-play technology is turning older aircraft into cutting-edge fi ghters, allowing countries to maximize their fl eets even in a time of tighter budgets. By enhancing pilot awareness and empowering platforms, we’re enabling tomorrow’s missions, today. See how RACR is bringing plug-and-play, state-of-the-art performance to today’s fi ghter jets at: Raytheon.com © 2013 Raytheon Company. All rights reserved. “Customer Success Is Our Mission” is a registered trademark of Raytheon Company. 13SAS243_MISSIONModern_AFAlam_May2013.indd 1 3/21/13 11:40 AM Sensing Effects C4I Training & Logistics Cyber MISSION: MODERNIZE WITHOUT COMPROMISE Raytheon’s drop-in, plug-and-play technology is turning older aircraft into cutting-edge fi ghters, allowing countries to maximize their fl eets even in a time of tighter budgets. By enhancing pilot awareness and empowering platforms, we’re enabling tomorrow’s missions, today. See how RACR is bringing plug-and-play, state-of-the-art performance to today’s fi ghter jets at: Raytheon.com © 2013 Raytheon Company. All rights reserved. “Customer Success Is Our Mission” is a registered trademark of Raytheon Company. 13SAS243_MISSIONModern_AFAlam_May2013.indd 1 3/21/13 11:40 AM 2013 USAF Almanac May 2013, Vol. 96, No. 5 May 2013, Vol. 96, No. 5 6 Editorial: How to Lose a Sprint and a Marathon Publisher By Adam J. Hebert Craig R. McKinley Under sequestration, readiness is no longer assured.
    [Show full text]
  • The Network Left Behind After the U.S
    Click here for Full Issue of EIR Volume 15, Number 23, June 3, 1988 staffdirector of the Senate Foreign Relations Subcommittee on Near Eastern and South Asian Affairs. Like Perle, Bryen escaped prosecution. While serving as Perle's assistant at the Defense Depart­ ment, Bryen formed the Technology Transfer Center, with oversight over the smuggling of strategic technology. Bryen hired Pollard's reported handler, Yossef Bodansky, to serve at the center, as well as Michael Ledeen's wife, Barbara The network left Ledeen. Frank Gaffney, Jr. Now based at Herman Kahn's Hud­ son Institute, Gaffney was deputy assistant secretary of de­ the US. arrest of fense for nuclear forces under Perle, and was slated to be his replacement until his resignation from government last No­ vember. Like Perle, Gaffney got his start working for Sen. by Joseph Brewda Scoop Jackson, and has often been described as a Perle pro­ tege. Since his resignation, Gaffney has loudly criticized the INF treaty, whose worst features Perle masterminded. He Shortly after U.S. Naval Intelligence analyst Jonathan Jay has not broken with Perle, however, and co-authored a loyal Pollardwas arrested for Israeli espionage in November 1985, "critique" of the treaty with Perle in February. a network within the highest levels of the D.S. government Douglas J. Feith. At his own Washington law firmsince and policy circles launched an international mobilization to 1986, Feith served as Perle's deputy in varying capacities at suppress every important feature of the case. The reason for Defense since 1982, most recently as deputy assistant secre­ this campaign, which has continued to the present date, is tary for negotiations policy.
    [Show full text]