CHRISTOPHER (CHRIS) POWELL Executive Leadership and Proven Operations Management Lufkin, TX 75904 [email protected] 9366450886

Total Page:16

File Type:pdf, Size:1020Kb

CHRISTOPHER (CHRIS) POWELL Executive Leadership and Proven Operations Management Lufkin, TX 75904 Christopher.L.Powell19@Gmail.Com 9366450886 CHRISTOPHER (CHRIS) POWELL Executive Leadership and Proven Operations Management Lufkin, TX 75904 [email protected] 9366450886 I am a retired US Army combat veteran with a proven and respected record of Senior Leadership and Operations Management; expert counterintelligence, security, and reconnaissance. As a Senior Leader and Operations Manager, I maintained responsibility for the assessment and selection process of new hires, fiscal year budget, mentorship and training program, as well as operational advisement to the executive leadership. While balancing effectiveness and efficiency, I sustained the operational tempo of more than 40 counterintelligence agents and their direct support to combat operations and investigations worldwide. As a Senior Counterintelligence Special Agent, the focus was directed at insider threat neutralization and education, counterespionage, and counterterrorism operations, as well as threat, vulnerability, and damage assessments. Furthermore, I required in-depth knowledge of counterintelligence analysis, signature reduction, counterintelligence screening and vetting, operational security measures (up to and including Special Access Programs), surveillance, countersurveillance, elicitation, and reconnaissance. #readytowork Authorized to work in the US for any employer WORK EXPERIENCE Recruitment Operations Officer | Enrollment & Scholarship Advisor Stephen F. Austin State University, Department of Military Assignment - Nacogdoches, TX May 2020 to Present • Identifies, assesses, and selects of top candidates for the US Army's Reserve Officer Training Corps (ROTC). Provides enrollment and advisory services to scholarship applicants and awardees. Maintains the marketing budget, as well as the social media and advertisement strategy. The liaison between the university's major departments' Academic Advisors and the ROTC cadets. Assists and advises the Professor of Military Science on daily operations, US Army Cadet Command recruitment goals and incentives, scholarship updates, the mission set projections, and marketing analysis. Conducts event planning and organization for all high schools and junior colleges within the East Texas region. Founder | President HomeFront ISC - Lufkin, TX January 2020 to Present • HomeFront ISC is dedicated to the creation of effective security profiles for educational institutions, emergency services, and religious facilities; promoting proactive initiatives for combating Insider Threats and External Dangers. • HomeFront ISC provides consultation and training for Leadership development, as well as onsite Operations Management for an organizational balance of efficiency and effectiveness. Director Boys & Girls Clubs of America November 2018 to February 2019 • Facilities Director was responsible for daily operations and program implementation for the Boys & Girls Clubs of America - Diboll, Texas. Mentored, coached, and managed six staff members for after-school programs and special projects. Daily attendance exceeded 60 children ranging in ages from 5 years to 18 years; children were provided educational and emotional support through a focused program, which afforded the best opportunity for success in life. • Responsible for the quarterly budget, marketing, and program selection of the club; included community networking events and program updates to the city council, heads of the school district, and foundation executives. Operations Manager / Project Officer U.S. Army September 2016 to October 2018 • Mentored and prepared more than 40 counterintelligence special agents to execute sensitive intelligence operations within semi and non-permissive environments. These agents were required to function within a small team or lone agent. Evaluated and assessed the agent’s level of competence, and provided remote assistance to their global operations. Furthermore, I maintained fiscal responsibility for the unit’s $750,000.00 annual training budget. Supplied external training and evaluation for over 200 Department of Defense personnel on the use of Operations Security (OPSEC) mechanisms, street-craft, and signature reduction. • Performed a variety of highly sensitive assessments on Special Access Programs (SAP), which consisted of damage, threat, and signature reduction for various agencies within the United States and worldwide. These assignments required briefings to senior and executive level pentagon personnel on current and projected security threats, intelligence matters, with recommended countermeasures. • Hand-selected as the sole Task Force Counterintelligence Officer for direct support to special operations in Afghanistan, Iraq, and Syria. Engineered and implemented robust security programs for insider threat countermeasures, resulting in the neutralization of numerous insider threats; safeguarding American and foreign personnel, as well as their equipment. Crafted adaptable tactics and techniques for conducting intelligence operations in high threat environments, and the execution of sensitive site exploitation and tactical questioning. Senior Enlisted Advisor / Operations Manager U.S. Army September 2015 to September 2016 • Appointed as the senior enlisted advisor to the commander on all matters of the organization. These matters ranged from training, readiness, administration, discipline, professional development, personnel accountability and the morale of 40 Soldiers, 39 Civilians, and 11 Contractors. • Led and managed the Army's only technical counterintelligence battalion headquarters element in support of Counterintelligence Cyber Operations; responsible for the operational sustainment and accountability of $1.1 million worth of equipment. Operations Manager / Senior Counterintelligence Agent U.S. Army October 2009 to September 2015 • Conducted espionage and antiterrorism investigations, intelligence collections, and joint agency operations spanning 20 states. This included bilateral terrorism investigations and antiterrorism operations with the Federal Bureau of Investigations - Kansas City Joint Terrorism Task Force. • Provided subject matter expertise on the application of physical surveillance, insider threat indicators and education to the Command and General Staff College; subsequently appointed as the liaison between the college and the Defense Intelligence Agency for increased operational security on special projects. • Executed counterintelligence operations and investigations within the semi-permissive environment of Kuwait and along its borders. Established a vigorous security initiative, which culminated with a dedicated counterintelligence support apparatus for five base camps within northern Kuwait; drastically reduced the agent response time by 50%. Enabled a proactive operational security approach for US military elements preparing for combat operations within Iraq, and upon their return. Section Leader / Team Leader U.S. Army August 1998 to September 2009 • Led a small reconnaissance team during the commencement of the 2003 Iraq invasion. Commanded countless combat missions consisting of nighttime raids on high-value targets, personal protection details, and a plethora of counterinsurgency operations. Simultaneously trained and mentored 18 other scouts in mission essential tasks in support of close quarter combat, counterinsurgency tactics, asset and executive protection, and all phases of reconnaissance. • Selected as an instructor for the US Army’s Basic Officer Leader’s Course – Armor/Cavalry. Taught classroom instruction on counterinsurgency and reconnaissance operations in an urban environment, while certifying student officer’s combat leadership during live environment training scenarios. Recruiter U.S. Army January 2005 to February 2008 • Performed market share analysis, prospecting, contracting, and transportation of qualified US Army applicants throughout five zip codes within East Texas. These actions were fostered through community relations, adaptive advertisement, and salesmanship. Efforts resulted in the battalion’s lowest attrition rate for 36 months, never exceeding 1%. EDUCATION 103 Semester Hours in Strategic Military Intelligence Operations Cochise College - Sierra Vista, AZ 12 Semester Hours in Criminal Justice and Law Enforcement Administration Angelina College - Lufkin, TX SKILLS • Access Control Procedures (Physical) (9 years) • Classified Information and Materials Security (9 years) • Crime Prevention Techniques (10+ years) • Driving Experience / Maneuvering Skills (10+ years) • Equal Opportunity Programs (10+ years) • Exercise Planning (10+ years) • Fire & Hazardous Material Protection Techniques (10+ years) • Human Resources (10+ years) • Instructional Design (10+ years) • Intelligence Analysis (10+ years) • Intelligence Experience (10+ years) • Investigations (9 years) • Logistics (10+ years) • Loss Prevention (9 years) • Messaging (10+ years) • Process Improvement (10+ years) • Project Management (10+ years) • Program Management (10+ years) • Proofreading (10+ years) • Risk Management (10+ years) • Safety Management (10+ years) • Surveillance (10+ years) • Technical Writing (10+ years) • Special Operations • Operations Management • Counterintelligence • Senior Leadership • DoD Experience LINKS http://www.linkedin.com/in/homefrontisc MILITARY SERVICE Branch: United States Army Rank: Sergeant First Class (Senior Counterintelligence Special Agent) August 1998 to January 2019 Commendations: Bronze Star Medal Meritorious Service Medal (2nd Award) Joint Service Commendation Medal Army Commendation Medal
Recommended publications
  • Emergency Operations Center How-To Quick Reference Guide August 2021
    National Incident Management System Emergency Operations Center How-To Quick Reference Guide August 2021 This page intentionally left blank Table of Contents Introduction .................................................................................................................................. 9 1. Purpose ...................................................................................................................................... 9 1.1. NIMS Compliance and Integration ................................................................................. 9 What Is an EOC? ........................................................................................................................ 10 1. Hallmarks of an EOC ............................................................................................................... 10 Preliminary Assessments .......................................................................................................... 12 1. Hazard and Vulnerability Assessment .................................................................................... 12 2. Resilience Analysis and Planning Tool ................................................................................... 12 3. Capability Assessment ............................................................................................................ 13 3.1. Interagency Coordination ............................................................................................. 13 3.2. Multiagency Coordination Groups ..............................................................................
    [Show full text]
  • International Spy Museum
    International Spy Museum Searchable Master Script, includes all sections and areas Area Location, ID, Description Labels, captions, and other explanatory text Area 1 – Museum Lobby M1.0.0.0 ΚΑΤΆΣΚΟΠΟΣ SPY SPION SPIJUN İSPİYON SZPIEG SPIA SPION ESPION ESPÍA ШПИОН Language of Espionage, printed on SCHPION MAJASUSI windows around entrance doors P1.1.0.0 Visitor Mission Statement For Your Eyes Only For Your Eyes Only Entry beyond this point is on a need-to-know basis. Who needs to know? All who would understand the world. All who would glimpse the unseen hands that touch our lives. You will learn the secrets of tradecraft – the tools and techniques that influence battles and sway governments. You will uncover extraordinary stories hidden behind the headlines. You will meet men and women living by their wits, lurking in the shadows of world affairs. More important, however, are the people you will not meet. The most successful spies are the unknown spies who remain undetected. Our task is to judge their craft, not their politics – their skill, not their loyalty. Our mission is to understand these daring professionals and their fallen comrades, to recognize their ingenuity and imagination. Our goal is to see past their maze of mirrors and deception to understand their world of intrigue. Intelligence facts written on glass How old is spying? First record of spying: 1800 BC, clay tablet from Hammurabi regarding his spies. panel on left side of lobby First manual on spy tactics written: Over 2,000 years ago, Sun Tzu’s The Art of War. 6 video screens behind glass panel with facts and images.
    [Show full text]
  • Surveillant Individualism in an Era of Relentless Visibility
    International Journal of Communication 10(2016), 164–177 1932–8036/20160005 Managing Surveillance: Surveillant Individualism in an Era of Relentless Visibility SHIV GANESH1 Massey University, New Zealand Contemporary surveillance occurs in the context of communicative abundance, where visibility is not only easy but relentless: never ending, far reaching, and ceaseless. Managing surveillance therefore has considerable implications for democratic politics, workplace control, economic practices, cultural politics, and individual subjectivity. This article identifies surveillant individualism, or the pivotal role that individuals play in surveillance and countersurveillance, as a major feature of contemporary surveillance management. It seeks to clarify current research trajectories on digital surveillance management and to chart a course for organizational research on surveillant individualism. Keywords: countersurveillance, relentless visibility, sousveillance, surveillant individualism The rise of surveillance needs foremost to be contextualized with visibility as a major 21st century trope. It is not a stretch to claim that visibility is now a central concern of social and organizational theory, and scholars from multiple theoretical traditions and disciplines have traced how myriad forms of sociality and organizing have been modernized and rationalized, rendered knowable, and made transparent and accessible (Brighenti, 2007, 2010). Others have argued that the 21st century is characterized by a “new visibility,” a powerful new force facilitated
    [Show full text]
  • 7133 Trouble V4.Pdf
    HOW TO LOOK FOR TROUBLE A STRATFOR Guide to Protective Intelligence S t r at for Global Intelligence STRATFOR 700 Lavaca Street, Suite 900 Austin, Texas 78701 Copyright © 2010 by STRATFOR All rights reserved, including the right of reproduction in whole or in part Printed in the United States of America The contents of this book originally appeared as analyses on STRATFOR’s subscription Web site. ISBN: [?] EAN-13: [?] Publisher: Grant Perry Editor: Michael McCullar Project Coordinator: Robert Inks Designer: TJ Lensing COntenTs Introduction v ANoteonContent ix CHapter 1: PrinCiples and CHallengEs TheProblemoftheLoneWolf 1 TheSecretsofCountersurveillance 8 Threats,SituationalAwarenessandPerspective 14 IntelligenceasaProactiveTool 19 CounterterrorismFunding:OldFearsandCyclical Lulls 25 AQAP:ParadigmShiftsandLessonsLearned 31 Counterterrorism:Shiftingfromthe‘Who’tothe ‘How’ 39 Profiling:SketchingtheFaceofJihadism 46 CHapter 2: The Art of SurvEillance Surveillance:ForGood—andEvil 53 TheSpreadofTechnicalSurveillance 55 PhysicalSurveillance:TailingSomeoneontheMove 57 PhysicalSurveillance:TheArtofBlendingIn 60 TurningtheTablesonSurveillants 62 iii Table of Contents CHapter 3: Protecting People Bhutto’sDeath:FatalFactors 67 India:AKidnappingCaseStudy 70 China:SecurityAspectsoftheDalaiLama’sTravels 73 TheU.S.ElectionSeason:SecurityChallengesand ConventionalWisdom 75 Mexico:ExaminingtheCartelWarThrougha ProtectiveLens 80 Mexico:TacticalImplicationsoftheLabastida Killing 87 Mexico:TheThirdWar 89 CHapter 4: SafegUaRding Places CorporateSecurity:TheTechnologyCrutch
    [Show full text]
  • National Incident Management System: Intelligence/Investigations
    NATIONAL INCIDENT MANAGEMENT SYSTEM Intelligence/Investigations Function Guidance and Field Operations Guide October 2013 NIMS: Intelligence/Investigations Function Guidance and Field Operations Guide Table of Contents Intelligence/Investigations Function Guidance ................................................................ 1 Introduction.................................................................................................................................... 3 Intelligence/Investigations Function ............................................................................................ 7 Use and Organization of Groups .................................................................................................. 8 Use and Organization of Branches ............................................................................................... 9 Summary ...................................................................................................................................... 10 Intelligence/Investigations Function Field Operations Guide ....................................... 11 Intelligence/Investigations Functional Overview ...................................................................... 12 Groups and Structure within the Intelligence/Investigations Section .................................... 19 List of Abbreviations and Glossary of Key Terms ......................................................... 31 List of Abbreviations ..................................................................................................................
    [Show full text]
  • MCWP 2-14 Counterintelligence CI Support to the Combat Service Support Element and Rear Area Operations
    MCWP 2-14 Counterintelligence U.S. Marine Corps 5 September 2000 PCN 143 000084 00 To Our Readers Changes: Readers of this publication are encouraged to submit suggestions and changes that will improve it. Recommendations may be sent directly to Commanding General, Marine Corps Combat Development Command, Doctrine Division (C 42), 3300 Russell Road, Suite 318A, Quantico, VA 22134-5021 or by fax to 703-784-2917 (DSN 278-2917) or by E-mail to [email protected]. Recommendations should include the following information: l Location of change Publication number and title Current page number Paragraph number (if applicable) Line number Figure or table number (if applicable) l Nature of change Add, delete Proposed new text, preferably double-spaced and typewritten l Justification and/or source of change Additional copies: A printed copy of this publication may be obtained from Marine Corps Logistics Base, Albany, GA 31704-5001, by following the instructions in MCBul 5600, Marine Corps Doctrinal Publications Status. An electronic copy may be obtained from the Doctrine Division, MCCDC, world wide web home page which is found at the following uni- versal reference locator: http://www.doctrine.usmc.mil. Unless otherwise stated, whenever the masculine gender is used, both men and women are included. DEPARTMENT OF THE NAVY Headquarters United States Marine Corps Washington, D.C. 20380-1775 5 September 2000 FOREWORD Marine Corps Doctrinal Publication (MCDP) 2, Intelligence, and Marine Corps Warfighting Publication (MCWP) 2-1, Intelligence Operations, provide the doctrine and higher order tactics, techniques, and procedures for intelligence operations. MCWP 2-14, Counterintelligence, complements and expands on this information by detailing doctrine, tactics, techniques, and procedures for the conduct of counterintelligence (CI) operations in support of the Marine air- ground task force (MAGTF).
    [Show full text]
  • Tactical Deception (TAC-D) Policy (Including Camouflage, Countersurveillance, and Concealment)
    Army Regulation 525–21 Military Operations Tactical Deception (TAC–D) Policy (Including Camouflage, Countersurveillance, and Concealment) Headquarters Department of the Army Washington, DC 15 June 1982 UNCLASSIFIED SUMMARY of CHANGE AR 525–21 Tactical Deception (TAC–D) Policy (Including Camouflage, Countersurveillance, and Concealment) This regulation-- o Sets forth the Army’s tactical deception (TAC-D) policy; o Describes the role of TAC-D in combat operations, and identifies objectives and assigns responsibilities for TAC-D. Headquarters Army Regulation 525–21 Department of the Army Washington, DC 15 June 1982 Effective 15 July 1982 Military Operations Tactical Deception (TAC–D) Policy (Including Camouflage, Countersurveillance, and Concealment) assigned operational missions effectively copy of each to the next higher headquar- in all elements of the US Army. ters. Applicability. This regulation applies to t h e A c t i v e A r m y , t h e A r m y N a t i o n a l I n t e r i m c h a n g e s . I n t e r i m c h a n g e s t o Guard (ARNG), and the US Army Re- this regulation are not official unless they serve (USAR). are authenticated by The Adjutant Gener- Proponent and exception authority. al. Users will destroy interim changes on The proponent agency for this regulation their expiration dates unless sooner super- is the Office of the Deputy Chief of Staff seded or rescinded. for Operations and Plans. Army management control process. Suggested Improvements. Users are This regulation contains management con- invited to send comments and suggested trol provisions but does not identify key improvements on DA Form 2028 (Recom- management controls that must be evalu- m e n d e d C h a n g e s t o P u b l i c a t i o n s a n d ated.
    [Show full text]
  • US Technology Companies and State Surveillance in the Post-Snowden Context: Between Cooperation and Resistance Félix Tréguer
    US Technology Companies and State Surveillance in the Post-Snowden Context: Between Cooperation and Resistance Félix Tréguer To cite this version: Félix Tréguer. US Technology Companies and State Surveillance in the Post-Snowden Context: Be- tween Cooperation and Resistance. [Research Report] CERI. 2018. halshs-01865140 HAL Id: halshs-01865140 https://halshs.archives-ouvertes.fr/halshs-01865140 Submitted on 30 Aug 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License UTIC Deliverable 5 US Technology Companies and State Surveillance in the Post-Snowden Context: Between Cooperation and Resistance Author: Félix Tréguer (CERI-SciencesPo) 1 tech Executive Summary This deliverable looks at the growing hybridization between public and private actors in the field of communications surveillance for national security purposes. Focusing on US-based multinationals dominating the digital economy globally which became embroiled in the post-Snowden debates (companies like Google, Apple, Facebook, Microsoft, Yahoo), the report aims at understanding the impact of the Snowden scandal on the strategies of these companies in relation to state Internet surveillance. To that end, the report identifies seven factors that are likely to influence the stance of a given company and its evolution depending on the changing context and constraints that it faces across time and space.
    [Show full text]
  • Chapter 19 * September 2008
    DoD2B 7000.14-R Financial Management Regulation Volume 2B, Chapter 19 * September 2008 VOLUME 2B, CHAPTER 19: “OTHER SPECIAL ANALYSES” SUMMARY OF MAJOR CHANGES All changes are denoted by blue font. Substantive revisions are denoted by an * symbol preceding the section, paragraph, table, or figure that includes the revision. Unless otherwise noted, chapters referenced are contained in this volume. Hyperlinks are denoted by bold, italic, blue, and underlined font. The previous version dated July 2007 is archived. PARAGRAPH EXPLANATION OF CHANGE/REVISION PURPOSE Overall Formatting and room location changes. Refresh 19-76 Removed Troop Strength column from PB-18. Update Update PB-28 Exhibit to included manpower, education and 19-90/91 Update training. Update PB-28 Exhibit to include Environmental Management 19-92/93 Update Systems. 19-1 DoD2B 7000.14-R Financial Management Regulation Volume 2B, Chapter 19 * September 2008 Table of Contents VOLUME 2B, CHAPTER 19. “OTHER SPECIAL ANALYSES .....................................................1 1901 GENERAL ..................................................................................................................................5 190101. Purpose………………………………………………………………………………...5 190102. Submission Requirements………………………………………………………….….5 190103. Preparation of Material………………………………………………………………..5 190104. References…..………………………………………………………………………....5 1902 COMBATING TERRORISM .....................................................................................................6 190201. Purpose………………………………………………………………………………...6
    [Show full text]
  • CFATS Risk-Based Performance Standards
    Risk-Based Performance Standards Guidance Chemical Facility Anti-Terrorism Standards May 2009 Department of Homeland Security Office of Infrastructure Protection Infrastructure Security Compliance Division Mail Stop 8100 Washington, DC 20528 Website: www.dhs.gov/chemicalsecurity 2 Note: This document is a “guidance document” and does not establish any legally enforceable requirements. All security measures, practices, and metrics contained herein simply are possible, nonexclusive examples for facilities to consider as part of their overall strategy to address the risk-based performance standards under the Chemical Facility Anti Terrorism Standards and are not prerequisites to regulatory compliance. Table of Contents Disclaimer Notice............................................................................................................................. 7 Overview.......................................................................................................................................... 8 Inquiries on RBPS Guidance or Other CFATS Issues..................................................................... 9 CFATS Risk-Based Performance Standards ...................................................................................... 10 How to Use this Guidance Document ............................................................................................ 13 General Considerations for Selecting Security Measures to Comply with CFATS...............................................................................................................................
    [Show full text]
  • The Evolution of Cyber Intelligence
    Association of Former Intelligence Officers 7700 Leesburg Pike Ste 324 Falls Church, Virginia 22043 From AFIO's The Intelligencer Web: www.afio.com , E-mail: [email protected] Journal of U.S. Intelligence Studies Volume 21 • Number 1 • $15 single copy price Winter 2014-15 by several people simultaneously, often from remote locations using modems2 over telephone lines. As this occurred, cyber efforts broadened to include modem intercepts and techniques for stealing passwords to gain access to the systems. Guide to the Study of Intelligence During the 1980s, as computers started to be connected into networks, access to each computer was granted to a much wider community, often A Guide to Cyber Intelligence worldwide. This presented new opportunities to intelligence services for clandestinely accessing com- puters remotely via a network. An early example was by Douglas R. Price the KGB-sponsored German hackers who penetrated several hundred computer systems connected to the US Military’s MILNET networks.3 The Evolution of Cyber Intelligence Another event that occurred during the 1980s and greatly affected the world of cyber espionage was the omputers came into widespread use in the introduction of the personal computer (PC). IBM intro- late 1960s and were used typically for large duced their floppy disk-based PC in 1981, followed by scientific studies, military planning, and large the PC XT in 1983, which came with a hard disk drive. C Intel introduced the 32-bit 386 microprocessor in 1985, scale business applications, such as personnel records, payroll, accounting, and data storage. Since such and a number of vendors cropped up to produce a computers often contained information of interest wide variety of “IBM compatible” personal computer they became an intelligence target.
    [Show full text]
  • A Counterintelligence Reader, Volume 4 Chapter 3
    CHAPTER 3 INTRODUCTION In its 1998 report entitled “Technology Collection Spying by other nations within the United States Trends in the US Defense Industry,” the Defense also came to the surface during this period. The Security Agency (DSS) reported that the number of most notable of which was Cuba when it suffered suspected industrial intelligence-gathering attempts setbacks with the arrest of seven members of its against the US defense industry tripled since Wasp Spy network in Florida, its spy within the US 1995. It also said that 37 nations were engaged in Defense Intelligence Agency, and another in the US industrial espionage to gain information about US Customs Service. Five Americans were also arrested Department of Defense technology. In its 2001 for selling or trying to sell US classifi ed information report, the number of countries had grown to 63. to foreign intelligence services or nations. While the DSS study focused on foreign Collection by the National Security Agency (NSA) collection of classifi ed or sensitive information came under the foreign microscope when the on US weapons systems, emerging technologies European Parliament alleged that NSA operates an with military applications, and related technical international SIGINT collection effort—identifi ed methods, intelligence collection against US as ECHELON—that intercepts communications economic, commercial, and proprietary information worldwide to provide economic intelligence to continues vigorously. This collection effort allows US corporations. On 5 July 2000, the European foreign nations and corporations to obtain shortcuts Parliament voted to launch a further investigation to industrial development and to improve their of ECHELON; the resultant draft report on competitiveness against US corporations in the ECHELON was made public on 18 May 2001.
    [Show full text]