The Italian Intelligence Establishment: a Time for Reform, 21 Penn St
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Economic Intelligence As National Security Issue
Economic Intelligence as National Security Issue A Brief Study Lorenzo Bonucci Introduction The fall of Berlin Wall marks the end of the Cold War system. That system, where the world was divided in two “blocks”. The USA and the USSR was the major powerful nations, and they fought for pursue, most of all, the military, technologic and economic supremacy. With the end of this contrast, it ends also the “scenario characterized by elegants simplicity” as emeritus president Francesco Cossiga said. Today everything changes, war, or better, conflicts, fights in more fronts: the financial-economic is acquiring great importance, because the actors, that attacks, are not just States; there are sovereign wealth funds, multinationals, NGOs, banks and corporations. The effects of attacks is amplified if combined with the manipulation of information, made possible by the globalization.1 In this new world order, where Intelligence has a fundamental role (as it used to have in the old order). Alongside the traditional Intelligence discipline, is developping another one: the Economic Intelligence. In the contemporary version, the economic Intelligence has attention on business intelligence or environmental scanning or competitive intelligence. Briefly, it is the theory of 1 Cfr. Giuseppe Griscioli, “Competizione Economico-finanziaria, ruolo dell’Intelligence e Sicurezza Nazionale”. Aracne Editrice, 2013. p. 10 1 strategic choices for achieve competitive advantages over competitors.2 In fact, a lot of States have created some institutions for strategical research in financial and economic field. First of all, France. In France has been founded a School of Economic Warfare (Ecole de Guerre Economique) with teachings that are based on strategical military logicals. -
Title Items-In-Visits of Heads of States and Foreign Ministers
UN Secretariat Item Scan - Barcode - Record Title Page Date 15/06/2006 Time 4:59:15PM S-0907-0001 -01 -00001 Expanded Number S-0907-0001 -01 -00001 Title items-in-Visits of heads of states and foreign ministers Date Created 17/03/1977 Record Type Archival Item Container s-0907-0001: Correspondence with heads-of-state 1965-1981 Print Name of Person Submit Image Signature of Person Submit •3 felt^ri ly^f i ent of Public Information ^ & & <3 fciiW^ § ^ %•:£ « Pres™ s Sectio^ n United Nations, New York Note Ko. <3248/Rev.3 25 September 1981 KOTE TO CORRESPONDENTS HEADS OF STATE OR GOVERNMENT AND MINISTERS TO ATTEND GENERAL ASSEMBLY SESSION The Secretariat has been officially informed so far that the Heads of State or Government of 12 countries, 10 Deputy Prime Ministers or Vice- Presidents, 124 Ministers for Foreign Affairs and five other Ministers will be present during the thirty-sixth regular session of the General Assembly. Changes, deletions and additions will be available in subsequent revisions of this release. Heads of State or Government George C, Price, Prime Minister of Belize Mary E. Charles, Prime Minister and Minister for Finance and External Affairs of Dominica Jose Napoleon Duarte, President of El Salvador Ptolemy A. Reid, Prime Minister of Guyana Daniel T. arap fcoi, President of Kenya Mcussa Traore, President of Mali Eeewcosagur Ramgoolare, Prime Minister of Haur itius Seyni Kountche, President of the Higer Aristides Royo, President of Panama Prem Tinsulancnda, Prime Minister of Thailand Walter Hadye Lini, Prime Minister and Kinister for Foreign Affairs of Vanuatu Luis Herrera Campins, President of Venezuela (more) For information media — not an official record Office of Public Information Press Section United Nations, New York Note Ho. -
CIA Best Practices in Counterinsurgency
CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the -
MILITARY INTELLIGENCE PB 34-04-4 Volume 30 Number 4 October-December 2004 STAFF: FEATURES Commanding General Major General Barbara G
MILITARY INTELLIGENCE PB 34-04-4 Volume 30 Number 4 October-December 2004 STAFF: FEATURES Commanding General Major General Barbara G. Fast 8 Tactical Intelligence Shortcomings in Iraq: Restructuring Deputy Commanding General Battalion Intelligence to Win Brigadier General Brian A. Keller by Major Bill Benson and Captain Sean Nowlan Deputy Commandant for Futures Jerry V. Proctor Director of Training Development 16 Measuring Anti-U.S. Sentiment and Conducting Media and Support Analysis in The Republic of Korea (ROK) Colonel Eileen M. Ahearn by Major Daniel S. Burgess Deputy Director/Dean of Training Development and Support 24 Army’s MI School Faces TRADOC Accreditation Russell W. Watson, Ph.D. by John J. Craig Chief, Doctrine Division Stephen B. Leeder 25 USAIC&FH Observations, Insights, and Lessons Learned Managing Editor (OIL) Process Sterilla A. Smith by Dee K. Barnett, Command Sergeant Major (Retired) Editor Elizabeth A. McGovern 27 Brigade Combat Team (BCT) Intelligence Operations Design Director SSG Sharon K. Nieto by Michael A. Brake Associate Design Director and Administration 29 North Korean Special Operations Forces: 1996 Kangnung Specialist Angiene L. Myers Submarine Infiltration Cover Photographs: by Major Harry P. Dies, Jr. Courtesy of the U.S. Army Cover Design: 35 Deconstructing The Theory of 4th Generation Warfare Specialist Angiene L. Myers by Del Stewart, Chief Warrant Officer Three (Retired) Purpose: The U.S. Army Intelli- gence Center and Fort Huachuca (USAIC&FH) publishes the Military DEPARTMENTS Intelligence Professional Bulle- tin quarterly under provisions of AR 2 Always Out Front 58 Language Action 25-30. MIPB disseminates mate- rial designed to enhance individu- 3 CSM Forum 60 Professional Reader als’ knowledge of past, current, and emerging concepts, doctrine, materi- 4 Technical Perspective 62 MIPB 2004 Index al, training, and professional develop- ments in the MI Corps. -
0714685003.Pdf
CONTENTS Foreword xi Acknowledgements xiv Acronyms xviii Introduction 1 1 A terrorist attack in Italy 3 2 A scandal shocks Western Europe 15 3 The silence of NATO, CIA and MI6 25 4 The secret war in Great Britain 38 5 The secret war in the United States 51 6 The secret war in Italy 63 7 The secret war in France 84 8 The secret war in Spain 103 9 The secret war in Portugal 114 10 The secret war in Belgium 125 11 The secret war in the Netherlands 148 12 The secret war in Luxemburg 165 ix 13 The secret war in Denmark 168 14 The secret war in Norway 176 15 The secret war in Germany 189 16 The secret war in Greece 212 17 The secret war in Turkey 224 Conclusion 245 Chronology 250 Notes 259 Select bibliography 301 Index 303 x FOREWORD At the height of the Cold War there was effectively a front line in Europe. Winston Churchill once called it the Iron Curtain and said it ran from Szczecin on the Baltic Sea to Trieste on the Adriatic Sea. Both sides deployed military power along this line in the expectation of a major combat. The Western European powers created the North Atlantic Treaty Organization (NATO) precisely to fight that expected war but the strength they could marshal remained limited. The Soviet Union, and after the mid-1950s the Soviet Bloc, consistently had greater numbers of troops, tanks, planes, guns, and other equipment. This is not the place to pull apart analyses of the military balance, to dissect issues of quantitative versus qualitative, or rigid versus flexible tactics. -
An Unfinished Debate on NATO's Cold War Stay-Behind Armies
The British Secret Service in Neutral Switzerland: An Unfinished Debate on NATO’s Cold War Stay-behind Armies DANIELE GANSER In 1990, the existence of a secret anti-Communist stay-behind army in Italy, codenamed ‘Gladio’ and linked to NATO, was revealed. Subsequently, similar stay-behind armies were discovered in all NATO countries in Western Europe. Based on parliamentary and governmental reports, oral history, and investigative journalism, the essay argues that neutral Switzerland also operated a stay-behind army. It explores the role of the British secret service and the reactions of the British and the Swiss governments to the discovery of the network and investigates whether the Swiss stay-behind army, despite Swiss neutrality, was integrated into the International NATO stay-behind network. INTRODUCTION During the Cold War, secret anti-Communist stay-behind armies existed in all countries in Western Europe. Set up after World War II by the US foreign intelligence service CIA and the British foreign intelligence service MI6, the stay-behind network was coordinated by two unorthodox warfare centres of the North Atlantic Treaty Organisation (NATO), the ‘Clandestine Planning Committee’ (CPC) and the ‘Allied Clandestine Committee’ (ACC). Hidden within the national military secret services, the stay-behind armies operated under numerous codenames such as ‘Gladio’ in Italy, ‘SDRA8’ in Belgium, ‘Counter-Guerrilla’ in Turkey, ‘Absalon’ in Denmark, and ‘P-26’ in Switzerland. These secret soldiers had orders to operate behind enemy lines in -
“We Will Crush You”
“We Will Crush You” The Restriction of Political Space in the Democratic Republic of Congo Copyright © 2008 Human Rights Watch All rights reserved. Printed in the United States of America ISBN: 1-56432-405-2 Cover design by Rafael Jimenez Human Rights Watch 350 Fifth Avenue, 34th floor New York, NY 10118-3299 USA Tel: +1 212 290 4700, Fax: +1 212 736 1300 [email protected] Poststraße 4-5 10178 Berlin, Germany Tel: +49 30 2593 06-10, Fax: +49 30 2593 0629 [email protected] Avenue des Gaulois, 7 1040 Brussels, Belgium Tel: + 32 (2) 732 2009, Fax: + 32 (2) 732 0471 [email protected] 64-66 Rue de Lausanne 1202 Geneva, Switzerland Tel: +41 22 738 0481, Fax: +41 22 738 1791 [email protected] 2-12 Pentonville Road, 2nd Floor London N1 9HF, UK Tel: +44 20 7713 1995, Fax: +44 20 7713 1800 [email protected] 27 Rue de Lisbonne 75008 Paris, France Tel: +33 (1)43 59 55 35, Fax: +33 (1) 43 59 55 22 [email protected] 1630 Connecticut Avenue, N.W., Suite 500 Washington, DC 20009 USA Tel: +1 202 612 4321, Fax: +1 202 612 4333 [email protected] Web Site Address: http://www.hrw.org November 2008 1-56432-405-2 “We Will Crush You” The Restriction of Political Space in the Democratic Republic of Congo Map of the Democratic Republic of Congo ................................................................ 1 I. Summary ............................................................................................................... 2 Methodology ....................................................................................................... 7 II. Recommendations ............................................................................................... 9 To the Congolese Government ............................................................................. 9 To the Congolese National Assembly and Senate .............................................. 10 To International Donors ..................................................................................... 10 To MONUC and the Office of the High Commissioner for Human Rights (OHCHR) 10 III. -
Defense Primer: National and Defense Intelligence
Updated December 30, 2020 Defense Primer: National and Defense Intelligence The Intelligence Community (IC) is charged with providing Intelligence Program (NIP) budget appropriations, which insight into actual or potential threats to the U.S. homeland, are a consolidation of appropriations for the ODNI; CIA; the American people, and national interests at home and general defense; and national cryptologic, reconnaissance, abroad. It does so through the production of timely and geospatial, and other specialized intelligence programs. The apolitical products and services. Intelligence products and NIP, therefore, provides funding for not only the ODNI, services result from the collection, processing, analysis, and CIA and IC elements of the Departments of Homeland evaluation of information for its significance to national Security, Energy, the Treasury, Justice and State, but also, security at the strategic, operational, and tactical levels. substantially, for the programs and activities of the Consumers of intelligence include the President, National intelligence agencies within the DOD, to include the NSA, Security Council (NSC), designated personnel in executive NGA, DIA, and NRO. branch departments and agencies, the military, Congress, and the law enforcement community. Defense intelligence comprises the intelligence organizations and capabilities of the Joint Staff, the DIA, The IC comprises 17 elements, two of which are combatant command joint intelligence centers, and the independent, and 15 of which are component organizations military services that address strategic, operational or of six separate departments of the federal government. tactical requirements supporting military strategy, planning, Many IC elements and most intelligence funding reside and operations. Defense intelligence provides products and within the Department of Defense (DOD). -
Conversations with Francesco Cossiga
Bulletin of Italian Politics Vol. 2, No. 2, 2010, 141-162 Conversations with Francesco Cossiga Alison Jamieson The article is an extract from five exclusive interviews, recorded over several months in 2009, with former Italian president, Francesco Cossiga, who died on 17 August 2010. Born in 1928 in Sardinia, Cossiga was a life Senator in the Italian parliament, to which he was first elected for the Christian Democratic Party in 1958. His second cousin, Enrico Berlinguer, was secretary of the Italian Communist party from 1972 until his death in 1984. Cossiga held the offices of interior minister, prime minister, speaker of the Senate and president of the republic. He resigned as interior minister on 9 May 1978 after the murder of Aldo Moro, but returned as prime minister from August 1979 till October 1980. Considered a specialist in the areas of intelligence and security, Cossiga was proud of his association with the secret Stay Behind network known as Gladio, and took credit for setting up Italy’s anti-terrorist rapid response units. Church and State The first of five recorded conversations with President Cossiga occurred on the thirty-fifth anniversary of the divorce referendum. I began by asking him about the political significance of the vote, which had returned a large majority in favour of retaining divorce. The victories of the Christian Democratic party in 1947 and 1948 were erroneously seen as those of the Catholic Church and of Catholicism. The victories were due to a more complex series of factors: many non-believers voted DC, most Italian Jews voted DC while the others voted for the Republican Party. -
Russian Intelligence Services and Special Forces
BRIEFING PAPER Number CBP 8430, 30 October 2018 Russian intelligence By Ben Smith services and special forces Contents: 1. KGB reborn? 2. GRU 3. Spetsnaz 4. What’s new? www.parliament.uk/commons-library | intranet.parliament.uk/commons-library | [email protected] | @commonslibrary 2 Russian intelligence services and special forces Contents Summary 3 1. KGB reborn? 4 1.1 FSB 4 1.2 SVR 5 1.3 FSO and GUSP 5 2. GRU 7 Cyber warfare 7 NCSC Review 8 3. Spetsnaz 9 4. What’s new? 12 Cover page image copyright: Special operations forces of the Russian Federation by Ministry of Defence of the Russian Federation (Mil.ru). Licensed under the Creative Commons Attribution 4.0 International license / image cropped. 3 Commons Library Briefing, 30 October 2018 Summary The Salisbury incident and its aftermath brought the Russian secret services into the spotlight. Malcolm Chalmers of Royal United Services Institute said Russian security services were going well beyond normal spying practice: “By launching disruptive operations that threaten life in target societies, they blur the line between war and peace”. The main domestic service, the FSB, is a successor to the Communist-era KGB. It is responsible for counter-terrorism and counter espionage and Russian information security. Critics say that it continues the KGB’s work of persecution of ‘dissidents’ and is guilty of torture and other human rights violations, and of extortion and corruption. One estimate put its staff complement at 200,000, and it has grown in power, particularly since the election of Vladimir Putin as President of Russia. -
Impersonal Names Index Listing for the INSCOM Investigative Records Repository, 2010
Description of document: US Army Intelligence and Security Command (INSCOM) Impersonal Names Index Listing for the INSCOM Investigative Records Repository, 2010 Requested date: 07-August-2010 Released date: 15-August-2010 Posted date: 23-August-2010 Title of document Impersonal Names Index Listing Source of document: Commander U.S. Army Intelligence & Security Command Freedom of Information/Privacy Office ATTN: IAMG-C-FOI 4552 Pike Road Fort George G. Meade, MD 20755-5995 Fax: (301) 677-2956 Note: The IMPERSONAL NAMES index represents INSCOM investigative files that are not titled with the name of a person. Each item in the IMPERSONAL NAMES index represents a file in the INSCOM Investigative Records Repository. You can ask for a copy of the file by contacting INSCOM. The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. -
Sismi-Telecom» Trial
Geographic Information Systems Conference and Exhibition “GIS ODYSSEY 2016”, 5th to 9th of September 2016, Perugia, Italy Conference proceedings CYBER-SECURITY IN ITALY: ON LEGAL ASPECTS OF THE «SISMI-TELECOM» TRIAL Giovanni Luca Bianco, Ph.D. Ionian Departament of Law Economics and Environment University of Bari e-mail: [email protected] Bari, Italy Abstract «SISMI-Telecom scandal», as it is known in Italy, is illegal phone tapping by some people in charge of security at the Telecom Italia Company. The case became common knowledge in September 2006 because 34 people were indicted and there were 21 provisional arrests among many employees at Telecom Italia, among national police and members of the Carabinieri Corps (paramilitary police of the Italian Armed Forces) and of the Guardia di Finanza (Inland Revenue Police)». In 2010, some journalists revealed what was happening and stated that thousands of people had been secretly put under unauthorised surveillance by Telecom Italia and illegal dossiers had been created. People’s lives were monitored as well as their bank accounts; even the data banks of the Italian Ministry of the Interior were accessed. Ultimately, the SISMI-Telecom trial ended with very mild sentences between settlements and state secrets. Yet, in the information age, the SISMI-Telecom scandal can be considered “dead” only from a procedural point of view. According to the interpretation of some experts on the case, the famous law that has destroyed and ordered the destruction of those dossiers, is a suicide law because those files were all in electronic format, and of course continue to circulate and keep producing poisons.