Airpower Journal, Published Quarterly, Is the Professional Journal of the United States Air Force

Total Page:16

File Type:pdf, Size:1020Kb

Airpower Journal, Published Quarterly, Is the Professional Journal of the United States Air Force Wínter 1994 JOURNAL rrM . Lü 1 Secretary of the Air Force Dr Sheila E. Widnall Air Force Chief of Staff Gen Ronald R. Fogleman Commander, Air Education and Training Command Gen Henry Viccellio, Jr. Commander, Air University Lt Gen Jay W. Kelley Commander, College of Aerospace Doctrine, Research, and Education Col Leroy Barnidge, Jr. Editor Col Thomas M. Kearney Associate Editor Maj John M. Poti Professional Staff Hugh Richardson, Contributing Editor Marvin W. Bassett, Contributing Editor Steven C. Garst, Director ofArt and Production Daniel M. Armstrong, Illustrator L. Susan Fair, Illustrator Thomas L. Howell, Prepress Production Manager The Airpower Journal, published quarterly, is the professional journal of the United States Air Force. It is designed to serve as an open forum for the presentation and stimulation of innovative think- ing on military doctrine, strategy, tactics, force structure, readiness, and other matters of national defense. The views and opinions expressed or im- plied in the Journal are those of the authors and should not be construed as carrying the official sanction of the Department of Defense, the Air Force, Air Education and Training Command, Air University, or other agencies or departments of the US government. Articles in this edition may be reproduced in whole or in part without permission. If they are reproduced, the Airpower Journal requests a cour- tesy line. JOURNAL Wlnter 1994. Vol. Vlll. No. 4 AJRP 101 Editorial 2 Desert Storm: The First Inform ation W ar? Col Edward Mann, USAF 4 M ilitary Ethics Col Richaxd Szafranski, USAF Dr James H. Toner lst Lt William D. Casebeer, USAF 15 N onlethal Concepts: Im plications for Air Force Intelligence Capt Edward F. 0 ,Connell, USAF lst Lt John T. Dillaplain. USAF 26 Inform ation W arfare: Principies of Third-W ave W ar Col Owen E. Jensen USAF 35 H eavy Bom bers Holding the Line Maj David W. Schneider, USAf 45 Ricochets Letten 3 Net Avsessment Reviews of Current Uterature 56 Index 84 Contributo» 95 tor paul nibwription Information, sec page 52 For hasis of issue and official dlstribution Information, w page 44 answer two questions: What do we do? and EDITORIAL What should we do? The answers to these questions keep an organization focused on its purpose and its goals. If the two answers don't match, it is time for change. When we asked the questions at APJ, the responses var- Changes: Faces and Fòcus ied more than expected. There was general agreement on the first answer: We publish a hange may be the only constant. Some- journal for midcareer personnel that focuses Ctimes it happens so slowly we don't see on air power at the operational levei. That it until it's moved past us. At other times wasn't surprising since it has been editorial we see it coming and don't even have time policy for over seven years. What did sur- to duck. For the past few months, we've ex- prise us was the range of things people perienced more of the latter. We have new thought we "should" be doing. After all the faces behind the desks and beginning with voices had been heard, the answer to the sec- the Spring issue, we will have a greatly ex- ond question is, We should produce a jour- panded focus for the Journal. nal that focuses on air power at the If you've been in the Air Force for more operational and strategic leveis. than a month, you've seen new faces arrive I can't pinpoint the moment our focus and familiar faces depart. It's a way of life needed to be broadened. Maybe it was when and it's something we all come to expect. the Berlin Wall fell. Maybe we should have Part of that expectation encompasses a belief changed course when the collapse of the So- that the process is managed. We never ex- viet Union highlighted our singular position pect all the experienced people to rotate at as the world's only aerospace power. A rea- the same time, but it sometimes happens. sonable argument can be made that the piv- In July, our new associate editor, Maj John otal moment occurred when Desert Storm Poti, arrived a few days before his predeces- finally gave substance to Giulio Douhet. sor departed. He grabbed the stick, asked Perhaps the specific instant doesn't matter some questions, and started to work. Just as all that much. Let's simply say that in 1987 we started to adjust, we got word that our the APJ had an intentionally narrowed focus editor was moving to his next assignment that best advanced the understanding of air earlier than expected but that his replace- power, and this issue marks the end of that ment, Lt Col Bill Spencer, wouldn't arrive era. until November. So in August I took charge, Beginning with the Spring 1995 issue, the destined to become the shortest-lived editor APJ will broaden its coverage of air power of the APJ. and encourage authors to submit articles Although -challenging, the changes dis- that deal with strategy and policy issues. cussed thus far are ones of circumstance This fundamental change in direction will rather than substance. As such, it is unlikely help ensure a more comprehensive under- that they will be of Iasting import except to standing of air power. But in the final those directly concerned. But when we en- analysis, a comprehensive understanding of counter change of substance, we expect air power will require authors who can ar- broader effects. The decision to realign the ticulate all sides of an issue—and, more im- focus of the APJ is a change of substance, portant, readers who challenge assumptions, mandated by self-reflection. attack inconsistencies, and force debate. APJ Every once in a while it's probably a good will provide the court and the bali. It's your idea for the members of an organization to serve. TK 2 We encourage your comments via letters to the editor is long overdue. 1 believe the demise of the ex- or comment cards. Alt correspondence should be ad- cellent Air University Review in 1987 was indica- dressed to the Editor, Airpower Journal, 401 Chen- tive of what Earl Tilford—the last editor of the old nault Circle, Maxwell AFB AL 36112-6428. You can joumal—called "the Air Force's unilateral disar- also send your comments by E-mail to mament in the war of ideas." Let me explain. Spences=James%ARJ%CADRE@ Chicago. AFWC.AF. From 1987 to 1991 I taught strategy at the MIL We reserve the right to edil lhe material for over- Army Command and General Staff College and all length. then joined the faculty at the Air War College. While I found all of my Air Force students ex- CORE VALUES tremely intelligent and many plainly brilliant, In his aiticle "Core Values in a Quality Air Force: their overall understanding of strategy and na- The Leadership Challenge" (Summer 1994), Chap- tional policy in Air War College seminars was less lain, Lt Col Alexander B. Roberts describes the than that found among the captains and majors at values that are important to a quality Air Force. the Army Command and General Staff College. At He then addresses the challenge facing Air Force the sênior Service schools, this gap widens. For the leadership to raise leveis of commitment to these Army War College, the contribution of criticai, values and makes some recommendations con- unencumbered strategic debate in Parameters and ceming achieving this goal. The values are, as the publications of the Strategic Studies Institute Colonel Roberts States, core values; that is, they is clear. are subservient to other character aspects, espe- Currently, the Air Force excels at "inside the cially one's morality. Beltway" politics and the operational levei of war. Core values in the Air Force underlie the more Many Air Force officers also have a sophisticated fundamental values of love of God and country. grasp of national security strategy and world af- My commitment to Air Force core values grows fairs, but they have developed this through indi- out of patriotism, and my patriotism stems in vidual effort, more in spite of the Air Force's large part from the degree to which our country perspective and values rather than because of allows freedom of worship and the degree to them. While it would be only a very small step in which our national laws and actions mirror Chris- a wider transformation of institutional attitudes, tian morality. Integrity, competence, courage, te- the Air Force needs a strategic journal. Long live nacity, and Service all need to have a foundation Airpower Journal, but bring back Air University Re- in something larger than simply an organization. view! There is not only room for both, but in this In my case, God's law is the basis of my morality; time of dramatic strategic transformation, there is my moral principies determine my character; and also a pressing need. my character results in actions which exhibit what Colonel Roberts calls core Air Force values. Steven Metz Colonel Roberts suggests that transformational Carlisle Barracks, Pennsylvania leaders proclaim the real meaning of our organi- zation, the Air Force. I suggest that without other meaning and higher commitments in life, this REBUFF cannot be accomplished. The critique in "Ricochets" (Summer 1994) of the Lt Col Steven T. Lofgren, USAF mystery author's article "A New Defense Indus- Beavercreek, Ohio trial Strategy" (Fali 1993) was remarkable for three reasons. First was its insistence that the STRATEGIC JOURNAL costs of doing depot business are "their" fault— "their" being, variously, the threat, the Congress, Kudos on your devotion of the recent special edi- tion of Airpower Journal to strategic issues.
Recommended publications
  • Mein Nachbar
    Das deutsche Nachrichten-Magazin Leitartikel Partner und Gegner zugleich Warum der SPIEGEL weitere geheime Dokumente über die NSA-Affäre enthüllt as Verhältnis Deutschlands zu den USA in Zeiten der Die Bundesregierung hat die Selbstherrlichkeit der Welt- NSA-Affäre gleicht dem Ritt auf einer Schiffschaukel: macht lange hingenommen. Sie hat manches geahnt, vieles DAus luftigen Höhen geht es atemberaubend in die verdrängt und einiges über die Allgegenwart der NSA gewusst, Tiefe. Im Sommer vergangenen Jahres, als die ersten Snowden- weil der Bundesnachrichtendienst bei den Operationen mit- Enthüllungen bekannt wurden, erklärte die Regierung Merkel mischt. Dass der BND mit der NSA intensiv kooperiert, nicht die Affäre schon für beendet, bevor sie ihre Wucht entfaltete. nur bei der Terrorbekämpfung, sondern auch bei der unter- Im Herbst aber, als bekannt wurde, das private Handy der schiedslosen Massenüberwachung globaler Kommunikations- Bundeskanzlerin sei überwacht worden, erreichte das Ver- ströme, belegen die neuen Snowden-Dokumente. Die Deut- hältnis einen Tiefpunkt. Nun war von Konsequenzen die Rede, schen sind Partner und Gegner zugleich. von einem anderen Umgang unter Verbündeten. Die Bundeskanzlerin hat einen Amtseid auf das Grund- Dann reiste die Kanzlerin nach Washington, und wieder gesetz geschworen. Spionage gegen Deutschland ist nach kehrte Friede ein. Seither würden Transatlantiker wie Sicher- dem Strafgesetz verboten. Die Grundrechte der Bürger sind heitsbehörden am liebsten zum normalen Geschäft übergehen, also keine flexible Größe, abhängig davon, wie es um das Ver- bei dem die Aufgaben verteilt hältnis Deutschlands zu den sind: Die NSA ist der omnipo- USA gerade bestellt sein mag. tente Weltgeheimdienst, die Entweder haben die ameri- Deutschen sind der verständ- kanische und die deutsche nisvolle, hilfreiche Bündnis- Regierung miteinander ab - partner.
    [Show full text]
  • Penetrate, Exploit, Disrupt, Destroy: the Rise of Computer Network Operations As a Major Military Innovation
    PENETRATE, EXPLOIT, DISRUPT, DESTROY: THE RISE OF COMPUTER NETWORK OPERATIONS AS A MAJOR MILITARY INNOVATION by Craig J. Wiener A Dissertation Submitted to the Graduate Faculty of George Mason University in Partial Fulfillment of The Requirements for the Degree of Doctor of Philosophy Biodefense Committee: _______________________________________ Gregory Koblentz, Chair _______________________________________ A. Trevor Thrall _______________________________________ Stuart Malawer _______________________________________ Gregory Koblentz, Program Director _______________________________________ Mark J. Rozell, Dean Date: __________________________________ Fall Semester 2016 George Mason University Fairfax, VA Penetrate, Exploit, Disrupt, Destroy: The Rise of Computer Network Operations as a Major Military Innovation A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at George Mason University By Craig J. Wiener Master of Science George Mason University, 2010 Bachelor of Arts New York University 1992 Director: Gregory Koblentz, Associate Professor Schar School of Policy and Government Fall Semester 2016 George Mason University Fairfax, VA Copyright 2016 Craig J. Wiener All Rights Reserved ii DISCLAIMER Any errors herein are solely those of the author. Additionally, the views expressed herein are those of the author. iii DEDICATION To Betty: I wish you were here. iv ACKNOWLEDGEMENTS I have a tremendous number of people to thank who have helped me throughout my Master of Science and PhD studies, leading to the submission of my dissertation. It literally took a village, and although I cannot thank everyone here, please know the depth of my gratitude is significant and ongoing. I would like to thank the faculty and staff of the George Mason School of Policy, Government and International Affairs, and the Graduate School of Public and International Affairs for giving me an opportunity to pursue my studies in national security.
    [Show full text]
  • Cyber Center for Education & Innovation
    VISION FOR THE NEW CYBER CENTER FOR EDUCATION & INNOVATION Home of the National Cryptologic Museum A PUBLIC-PRIVATE PARTNERSHIP WITH UNPARALLELED CYBER DEFENSE EXPERTISE. PLEASE JOIN US AND GET INVOLVED! The Cyber Center and our participation, volunteer Yleadership and support are urgently Museum Master needed to help us conceptualize, Plan includes: capitalize and construct the new Cyber Center for Education & Innovation, n A new state-of-the-art Home of the National Cryptologic Museum. Join us now! Museum To discuss your interest in supporting our efforts to create n The Conference Center this vital new resource, please contact: n Vigilance Air Park MGEN Roderick J. Isler, USA (Ret) n Classroom facilities Vice President, Cyber Center for Education & Innovation, New Museum Project Campaign n World class research National Cryptologic Museum Foundation and rare books library P.O. Box 1563 Millersville, MD 21108 n A comprehensive site and Office: 443-292-0091 land use concept Cell: 301-785-0896 Continued strong private and [email protected] public leadership is needed to realize this challenging vision. 1 CCEI-NCM Parking 498 Spaces 2 CCEI-NCM 3 Museum and Conference Center Drop-off 4 Service Road/ Loading Dock 5 Existing Museum 6 National Vigilance Park 7 Security Check Point 8 Colony Seven Road 9 Current NSA Parking (N1) 10 Current NSA Parking (N10) 11 Future VCP-1 12 86 foot Security Set Back 13 Entrance Signage PROPOSED SITE PLAN HELP US BUILD AND COMPLETE THIS NEW NATIONAL TREASURE. THE CYBER CENTER FOR EDUCATION & INNOVATION, HOME OF THE NATIONAL CRYPTOLOGIC MUSEUM is envisioned to be an integrated multi-purpose facility serving public and private stakeholders.
    [Show full text]
  • Historical Dictionary of International Intelligence Second Edition
    The historical dictionaries present essential information on a broad range of subjects, including American and world history, art, business, cities, countries, cultures, customs, film, global conflicts, international relations, literature, music, philosophy, religion, sports, and theater. Written by experts, all contain highly informative introductory essays on the topic and detailed chronologies that, in some cases, cover vast historical time periods but still manage to heavily feature more recent events. Brief A–Z entries describe the main people, events, politics, social issues, institutions, and policies that make the topic unique, and entries are cross- referenced for ease of browsing. Extensive bibliographies are divided into several general subject areas, providing excellent access points for students, researchers, and anyone wanting to know more. Additionally, maps, pho- tographs, and appendixes of supplemental information aid high school and college students doing term papers or introductory research projects. In short, the historical dictionaries are the perfect starting point for anyone looking to research in these fields. HISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE Jon Woronoff, Series Editor Israeli Intelligence, by Ephraim Kahana, 2006. Russian and Soviet Intelligence, by Robert W. Pringle, 2006. Cold War Counterintelligence, by Nigel West, 2007. World War II Intelligence, by Nigel West, 2008. Sexspionage, by Nigel West, 2009. Air Intelligence, by Glenmore S. Trenear-Harvey, 2009. Middle Eastern Intelligence, by Ephraim Kahana and Muhammad Suwaed, 2009. German Intelligence, by Jefferson Adams, 2009. Ian Fleming’s World of Intelligence: Fact and Fiction, by Nigel West, 2009. Naval Intelligence, by Nigel West, 2010. Atomic Espionage, by Glenmore S. Trenear-Harvey, 2011. Chinese Intelligence, by I. C.
    [Show full text]
  • THE VULNERABLE Our Military Problems and How to Fix Them
    AMERICA THE VULNERABLE Our Military Problems And How To Fix Them EDITED BY JOHN F. LEHMAN AND HARVEY SICHERMAN FOREIGN POLICY RESEARCH INSTITUTE PHILADELPHIA Dedication On a sad note, Colonel Harry G. Summers Jr., U.S. Army (ret.), who penned the article dealing with operations, procurement, and the defense industrial base and sat as a panelist for our second conference, passed away on November 14, 1999. Colonel Summers, a veteran of the Korean and Vietnam Wars, was the recipient of two Legions of Merit, the Silver Star, three Bronze Stars, two Purple Hearts, two Air Medals, and two awards of the Combat Infantryman’s Badge, and also authored numerous books, articles, and columns. He was, in short, the quintessential soldier- scholar. We dedicate this volume to his memory. TABLE OF CONTENTS Preface vii John H. Ball America the Vulnerable 1 John F. Lehman and Harvey Sicherman Roles and Missions 12 Donald Kagan Superpowers Don’t Do Windows 27 John Hillen The U.S. Presumption of Quick, Costless Wars 48 Andrew P. N. Erdmann Operations, Procurement, and Industrial Base 73 Harry G. Summers Jr. Civil-Military Relations 84 Eliot A. Cohen The U.S. Military Must Find Its Voice 96 Sam C. Sarkesian An Uninformed Debate on Military Culture 115 Don M. Snider Does Military Culture Matter? 134 Williamson Murray Must U.S. Military Culture Reform? 152 John Hillen The Case for National Missile Defense 171 Keith B. Payne v AMERICA THE VULNERABLE Rethinking Bio-Chemical Dangers 182 Henry Sokolski PREFACE Bad Medicine for Biological Terror 196 Andrew J. Bacevich Asymmetrical Adversaries 215 In 1996, the Foreign Policy Research Institute convened a Defense Winn Schwartau Task Force composed of distinguished scholars and practitioners The Risks of a Networked Military 225 to examine the increasingly important debates over U.S.
    [Show full text]
  • NSA-FOIACASELOG-2016.Pdf
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 100503A 4 April 2017 JOHN GREENEWALD Dear Mr. Greenewald: This responds to your Freedom of Information Act (FOIA) request dated 1 January 2017 which was received by this office on 2 January 2017, for "a copy of the FOIA case log for calendar year 2016." For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. Since processing fees were minimal, no fees were assessed. Your request has been processed under the FOIA, and the logs for calendar year 2016 are enclosed, along with a FOIA Case Dispositions reference sheet that explains the final case dispositions. Please be advised that the logs do not contain the number of pages released. They contain a final disposition if the case was closed at the time the logs were created. If there is no final disposition, the case was still pending at the time the logs were created. Certain information has been deleted from the enclosures.
    [Show full text]
  • State Intervention in Cross-Border Mergers and Acquisitions
    Balancing Power without Weapons Why do states block some foreign direct investment on national security grounds even when it originates from within their own security com- munity? Government intervention into foreign takeovers of domestic companies is on the rise, and many observers find it surprising that states engage in such behavior not only against their strategic and mil- itary competitors, but also against their closest allies. Ashley Thomas Lenihan argues that such puzzling behavior can be explained by recog- nizing that states use intervention into cross-border mergers and acqui- sitions as a tool of statecraft to internally balance the economic and military power of other states through non-military means. This book tests this theory using quantitative and qualitative analysis of transac- tions in the United States, Russia, China, and fifteen European Union states. It deepens our understanding of why states intervene in foreign takeovers, the relationship between interdependence and conflict, the limits of globalization, and how states are balancing power in new ways. ashley thomas lenihan is a fellow at the Centre for Inter- national Studies at the London School of Economics and Political Science, and a term member of the Council on Foreign Relations. Her research focuses on the relationship between state power and foreign direct investment from an international relations perspective. Balancing Power without Weapons State Intervention into Cross-Border Mergers and Acquisitions Ashley Thomas Lenihan London School of Economics and Political Science University Printing House, Cambridge CB2 8BS, United Kingdom One Liberty Plaza, 20th Floor, New York, NY 10006, USA 477 Williamstown Road, Port Melbourne, VIC 3207, Australia 314–321, 3rd Floor, Plot 3, Splendor Forum, Jasola District Centre, New Delhi - 110025, India 79 Anson Road, #06-04/06, Singapore 079906 Cambridge University Press is part of the University of Cambridge.
    [Show full text]
  • Amdocs and the NSA =Go to NFU Pages
    NewsFollowUp NewsFollowUp.com search Franklin Scandal Omaha Obama sitemap home Amdocs Amdocs and the NSA =go to NFU pages News for the 99% ...................................Refresh F5...archive home 50th Anniversary of JFK assassination "Event of a Lifetime" at the Fess Parker Double Tree Inn. JFKSantaBarbara. Mossad, 9/11 Israeli Art Students Amdocs employee bailed out an 'Israeli art student' Gerald Shea, Memorandum to 9/11 Commission NFU MOST ACTIVE PA MP3 file of Fox News, Israeli Art Students, Amdocs Story Go to Alphabetic list Academic Freedom FOX NEWS CARL CAMERON FOUR-PART Conference REPORT: Fox News Series On Israeli Spying In Obama Death List Rothschild Timeline Bush / Clinton Body Count Narus / NSA / Boeing -- John O'neil , FBI agent killed on 9/11 Warrantless data mining ? in the WTC was investigating the Israeli Art Students, Amdocs Amdocs complicity Flight 77, Pentagon, 9/11? Amdocs / Narus / NSA 9/11 WTC art students Amdocs links DEA wire tap Fox News / Carl Cameron, Amdocs DEA / Amdocs links Whitehouse Telephone System Israeli art students / Amdocs Senate Select Committee on Intelligence Corporate Espionage John O'Neil, FBI, Israeli art students Israeli art students, 9/11 DEA, Amdocs, Israeli art students Fox News / Carl Cameron Report Amdocs and the NSA PROGRESSIVE REFERENCE CONSERVATIVE* AfroCubaWeb Israel Actions in the Americas Amdocs search: Narus AntiWar News: AMDOCS Dov Baharav, CEO Ron Moskovitz , CFO Antiwar pdf file art students, Israeli spies. Suspicious Rense 2001 All US Phone Call Records Michael Blum , Division Pres of Financial Services activities involving Israeli art students at DEA And Billing Done In Israel - Part 2 Carl Thomas G.
    [Show full text]
  • NSA Hacks China, NSA Leaker Snowden Claims - CNN.Com
    6/12/13 NSA hacks China, NSA leaker Snowden claims - CNN.com You've selected the U.S. Edition. Would you like to make this your default edition? Yes | No Close SET EDITION: U.S. INTERNATIONAL MÉXICO ARABIC Sign up Log in TV: CNN CNNi CNN en Español HLN Home TV & Video CNN Trends U.S. World Politics Justice Entertainment Tech Health Living Travel Opinion iReport Money Sports NSA hacks China, NSA leaker Snowden SHARE THIS Print claims Email By Jethro Mullen and Michael Pearson, CNN More sharing Recommend 1.6k updated 4:05 PM EDT, Wed June 12, 2013 Former intelligence worker Edward Snowden revealed himself as the source of documents outlining a massive effort by the NSA to track cell phone calls and monitor the e- mail and Internet traffic of virtually all Americans. Snowden, 29, fled to Hong Kong after copying the last set of documents. He says he just wanted the public to know what the government was doing. "Even if you're not doing anything wrong you're being watched and recorded," he said. The Justice Department has begun a preliminary investigation into what it called "the unauthorized disclosure of Part of complete cov erage on classified information by an Data mining & privacy individual with authorized access." HIDE CAPTION Notable leakers and whistle-blowers Who is Edward Snowden? updated 9:32 AM EDT, Mon June 10, 2013 He's a high school dropout << < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 > >> w ho w orked his w ay into the most secretive computers in U.S.
    [Show full text]
  • The Changing Face of the NCMF
    The Link BULLETIN OF THE NATIONAL CRYPTOLOGIC MUSEUM FOUNDATION, INC. VOLUMES 9, NO. 3 - , NO. 2, COMPOSITE Summer 2008 THe CHANGING FAce of THe NCMF Events of the past year have moved too quickly for the slow pace of publication of The Link. Issues intended for publication covering Fall 2006 and Winter 2006-2007 have, accordingly, been “pulled back” from the printer and – to adopt the term recently applied to military action in Iraq – we are “surging” by consolidating about a year and a half of content into a single composite issue. That requires a great deal of compression and omission, even to “hit the highlights.” We apologize in advance for the omitted coverage. In return, we plan next to introduce a new look, with color photographs, as the beginning of some further experiments to improve our communication with you, our members and readers. We thank our ambidextrous colleague, John Garcia, and his associates and corporate sponsors for the interim issuance of the occasional “NCMF Newsletter,” mailed to you. Our webmaster, Bob Bowie, Bill Saadi, our website coordinator, and others are pondering changes in the NCMF web site. Thanks also go to occasional Link contributors Ray Schmidt, David Hamer, “cub reporter” Mary Faletto, Kirsten Eland, Jim Boone, Prof. Mark Sommer, and others whose by-lines have appeared. They represent the vanguard of what we hope will be a plethora of “new” (and familiar) names as we invite others of you to remember (as we reminded you in Volume 1, Number 1 ten years ago) that, by our old definition, a “link” should go both ways.
    [Show full text]
  • Presidential Transition 2001: NSA Briefs a New Administration" Reviewed for Declassification
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com 1111111111111111111111111111111111 UNCLASSIFIED 1111111111111111111111 Request 10: 0000954449 TRANSMITTAL OF MATERIAL Type: OMAL 1111111111111111111111 Submitted- 20190130 TO FROM (RETURN ADDRESS) MR. JOHN GREENEWALD, JR. DEPARTMENT OF DEFENSE This transmittal may NOT be downgraded upon removal of the 27305 W. LIVE OAK ROAD NATIONAL SECURITY AGENCY enclosure(s). SUITE #1203 9800 SAVAGE ROAD This transmittal may NOT be declassified upon removal of the CASTAIC, CA 91384 FORT MEADE MARYLAND 20755-6000 enclosurejs). PHN#: (800)456-2228 ATTN : RAMSEY,VICKI LYNN WRAPPED COMSEC SUBMITTED SUITE: 6881 lRlu Os Do DYES IRl NO 20190130 SHIPPING MODE PACKAGE CT USPS - First Class 1 of 1 LN# UNCLASSIFIED TITLEIDESCRIPTION OF ITEM QTY TOT COST MFG SERIAL# BARCODE CLASS. OF ITEM 1 SERIAL: MDR-103569, DATED 28 JANUARY L 0 UNCLASSIFIED 2019 SERIAL: MDR-103570, DATED 29 JANUARY 2019 DESIG ACCT TYPE PAS STATEMENT APPROVAL CPODIR NO NA Not Applicable SPECIAL HANDLING INSTRUCTIONS (UNCLASSIFIED) ~ REQUESTED BY ORG PHONE RAMSEY,VICKI LYNN (VLRAMSE) SI\flf1; 1?i1MiJlb P133 (301)688-7785 UNCLASSIFIED v U. DO NOT STAMP RECEIPT PORTION WITH CLASSIFICATION f---------- ­ - -----------------­ - -­ -----­ RECEIPT 1111111111111111111111111111111111 (Please sign and return immediately. Avoid tracer action) 1111111111111111111111 ReauestlO: 0000954449 Tvee: OMAL RETURN TO FROM Receipt is hereby acknowledged for the material or documents listed under DEPARTMENT OF DEFENSE MR .
    [Show full text]
  • Presidential Transition 2001: NSA Briefs a New Administration
    2004 TOP Sl!CR:E'ft/COMINT/tX1 eclassified and approved for release by NSA and CIA on 04-16-2013 ursuantto E.O. 13526. MDR-68585 .' ·'' DOCID: 4045841 TOP SECR!T/fCOMINT//X1 (U) Presidential Transition 2001: NSA Briefs a New Administration David A. Hatch (U) INTRODUCTION gence. She or he may also require briefings on the capabilities of the various intelligence organiza­ (U) The American electoral process retains tions. It was (and is) important that a new presi­ many vestiges reflecting its eighteenth century dent learn what the intelligence community will origins. In the age of supersonic transport and e­ be able to do for her or him - and what it will not. mail, U.S. citizens select their national leadership on a timetable derived from the speed of carriages (U) Two senior CIA officials who were and town criers. involved with more than one presidential transi­ tion commented drolly, "Our experience with a (U) The most contentious vestige in the number of administrations was that they started process is the electoral college, a scheme which with the expectation that intelligence could solve allots votes to each state on the basis of popula­ every problem, or that it could not do anything tion; the actual determinant of a presidential right, and then moved to the opposite view. Then election is not the nation's popular vote, but the they settled down and vacillated from one votes of the electoral college. extreme to the other."1 (U) In addition to a lengthy period of pre-elec­ (U) The officials of a new administration get tion campaigning, the process is marked by a two "bombarded" with information - a lot of it and and one-half month gap between election day and quickly presented.
    [Show full text]