NIAC Intelligence Information Sharing Study

Total Page:16

File Type:pdf, Size:1020Kb

NIAC Intelligence Information Sharing Study National Infrastructure Advisory Council Intelligence Information Sharing Final Report and Recommendations January 10, 2012 Alfred R. Berkeley, III Wesley Bush Philip G. Heasley Former Chairman Chairman, President and President and Chief Pipeline Trading Systems, LLC Chief Executive Officer Executive Officer Northrop Grumman ACI Worldwide James B. Nicholson James A. Reid Michael J. Wallace President and Chief President Former Vice-Chairman and Executive Officer CBRE Group, LLC Chief Operating Officer PVS Chemicals, Inc. Eastern Division Constellation Energy Table of Contents Executive Summary ........................................................................................................... ES-1 1.0 Study Overview: Challenges and Approach ..................................................................... 1 1.1 The Challenge of Sharing Intelligence in Complex Systems .......................................................... 2 1.2 Study Approach ............................................................................................................................. 3 2.0 Study Context ................................................................................................................. 6 2.1 Federal Authority and Policy ......................................................................................................... 7 2.2 Critical Infrastructure: Now a Customer and Provider of Intelligence Information ................... 10 3.0 Findings ........................................................................................................................ 15 3.1 Five Concerns about Current Public-Private Information Sharing .............................................. 15 3.2 Specific Findings .......................................................................................................................... 16 3.2.1 Authority and Policy ........................................................................................................ 21 3.2.2 Implementation of Authority .......................................................................................... 23 3.2.3 Leveraging the Capability of the Private Sector to Reduce Risk ..................................... 29 3.2.4 Information Content ....................................................................................................... 32 3.2.5 Information Delivery ....................................................................................................... 35 3.2.6 Counterintelligence/Counterterrorism ........................................................................... 39 3.2.7 Fusion Centers ................................................................................................................. 41 4.0 Recommendations ....................................................................................................... 43 4.1 Assert the Priority of Infrastructure Protection and Resilience in National Security ................. 44 4.2 Improve the Implementation and Accountability of Existing Authorities .................................. 44 4.3 Improve Information Content by Leveraging Partner Capabilities ............................................. 46 4.4 Improve the Value of Information Products to Industry Risk-Management Practices .............. 48 4.5 Build Accepted Practices for Timely Information Delivery ......................................................... 48 4.6 Capitalize on Private Sector Capabilities for Counterterrorism Solutions .................................. 49 4.7 Enhance Fusion Center Capabilities as One Alternative Mechanism for Sharing ....................... 49 4.8 Develop an Action Plan to Implement Accepted Recommendations ......................................... 50 Appendix A. Acknowledgements ........................................................................................ A-1 Appendix B. Case Study: Banking and Finance Sector .......................................................... B-1 Appendix C. Case Study: Chemical Sector ............................................................................ C-1 Appendix D. Case Study: Commercial Facilities Sector ......................................................... D-1 Appendix E. Case Study: Healthcare and Public Health Sector ............................................. E-1 Appendix F. Case Study: Oil and Natural Gas Sector ............................................................ F-1 Appendix G. Other Pertinent Studies on Information Sharing .............................................. G-1 Appendix H. DHS Authorities in Intelligence Information Sharing ........................................ H-1 Intelligence Information Sharing i Appendix I. The Federal Structure for Intelligence Information Sharing ................................ I-1 Appendix J. The DHS Structure for Infrastructure Protection ................................................ J-1 Appendix K. Federal Programs and Processes ..................................................................... K-1 Appendix L. Homeland Security Information Network – Critical Sectors .............................. L-1 Appendix M. Fusion Centers and their Role in Intelligence Sharing with the Private Sector ................................................................................................................................ M-1 Appendix N. Examples of Effective Practices Cited in Case Studies....................................... N-1 Appendix O. Sources...........................................................................................................O-1 Intelligence Information Sharing ii About the NIAC The National Infrastructure Advisory Council (NIAC) provides the President of the United States with advice on the security and resilience of the 18 Critical Infrastructure and Key Resources (CIKR) sectors and their supporting information systems. These critical infrastructure sectors span the U.S. economy and include the Food and Agriculture, Banking and Finance, Transportation, Commercial Facilities, Critical Manufacturing, Dams, Defense Industrial Base, Nuclear, Government Facilities, Postal and Shipping, Communications, Information Technology, Healthcare and Public Health, Water, Energy, and Emergency Services Sectors. The NIAC also advises the lead Federal agencies that have critical infrastructure responsibilities. Specifically, the Council has been charged with making recommendations to: • Enhance cooperation between the public and private sectors in protecting critical infrastructures and their information systems, which includes security and their resilience, and providing reports on this issue to the President through the Secretary of Homeland Security, as appropriate; • Propose and develop ways to encourage private industry to perform periodic risk assessments; • Monitor the development and operations of private sector coordinating councils and their information sharing mechanisms and provide recommendations to the President through the Secretary of Homeland Security on how these organizations can best foster improved cooperation among the sectors, the Department of Homeland Security, and other Federal Government entities; • Report to the President through the Secretary of Homeland Security who shall ensure appropriate coordination with the Assistant to the President for Homeland Security and Counterterrorism, the Assistant to the President for Economic Policy, and the Assistant to the President for National Security Affairs; and • Advise sector specific agencies with critical infrastructure responsibilities, to include issues pertaining to sector and government coordinating councils and their information sharing mechanisms. Intelligence Information Sharing iii Executive Summary The National Infrastructure Advisory Council (NIAC) set out to determine whether the right people are receiving the right intelligence information at the right time to support robust protection and resilience of the Nation’s critical infrastructure. More than 200 interviews and extensive open-source research uncovered a wealth of insights on this complex problem. First, there have been marked improvements in the sharing of intelligence information within the Federal Intelligence Community, and between the Federal Government and regions, States, and municipalities. However, this level of improvement has not been matched in the sharing of intelligence information between the Federal Government and private sector owners and operators of critical infrastructure. Despite some notable successes, this bi- directional sharing is still relatively immature, leaving a large gap between current practices and an optimal system of effective public-private intelligence information sharing. We observe that trust is the essential glue to make this public-private system work. Trust results when partner capabilities are understood and valued, processes are tailored to leverage these capabilities, and these processes are tested and proven valuable to all partners. When breakdowns in information sharing occur, it erodes trust and is counterproductive to risk management. Information sharing is perhaps the most important factor in the protection and resilience of critical infrastructure. Information on threats to infrastructure and their likely impact underlies nearly every security decision made by owners and operators, including which assets to protect, how to make operations more resilient, how to plan for potential disasters, when to ramp up to higher
Recommended publications
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Pakistan Response Towards Terrorism: a Case Study of Musharraf Regime
    PAKISTAN RESPONSE TOWARDS TERRORISM: A CASE STUDY OF MUSHARRAF REGIME By: SHABANA FAYYAZ A thesis Submitted to the University of Birmingham For the degree of DOCTOR OF PHILOSOPHY Department of Political Science and International Studies The University of Birmingham May 2010 University of Birmingham Research Archive e-theses repository This unpublished thesis/dissertation is copyright of the author and/or third parties. The intellectual property rights of the author or third parties in respect of this work are as defined by The Copyright Designs and Patents Act 1988 or as modified by any successor legislation. Any use made of information contained in this thesis/dissertation must be in accordance with that legislation and must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the permission of the copyright holder. ABSTRACT The ranging course of terrorism banishing peace and security prospects of today’s Pakistan is seen as a domestic effluent of its own flawed policies, bad governance, and lack of social justice and rule of law in society and widening gulf of trust between the rulers and the ruled. The study focused on policies and performance of the Musharraf government since assuming the mantle of front ranking ally of the United States in its so called ‘war on terror’. The causes of reversal of pre nine-eleven position on Afghanistan and support of its Taliban’s rulers are examined in the light of the geo-strategic compulsions of that crucial time and the structural weakness of military rule that needed external props for legitimacy. The flaws of the response to the terrorist challenges are traced to its total dependence on the hard option to the total neglect of the human factor from which the thesis develops its argument for a holistic approach to security in which the people occupy a central position.
    [Show full text]
  • Considerations for Fusion Center and Emergency Operations Center Coordination
    Considerations for Fusion Center and Emergency Operations Center Coordination Comprehensive Preparedness Guide (CPG) 502 May 2010 Preface Fusion centers and emergency operations centers (EOCs) should become familiar with each others’ roles and capabilities to facilitate successful interfacing and cooperation between them. In addition, it is imperative that the two develop a solid relationship in order to effectively work together to achieve their respective objectives. The relationships forged between these two entities will allow them to have continuous, meaningful contacts, which will enhance their ability to share information and intelligence regardless of the activation status of the EOC. Mutual trust and respect must guide interagency collaboration policies and protocols, allowing for effective and consistent collaboration during the steady state or during an emergency. In addition to addressing the relationship in a concept of operations (CONOPS) and standard operating procedures (SOPs), memorandums of understanding (MOUs) should be created, reviewed and updated to define roles during both periods of activation and non-activation. SOPs and MOUs also define how information will be shared between the two entities. Comprehensive Planning Guide (CPG) 502 focuses on this critical partnership and the exchange of information between these entities. Partnerships Effective prevention, protection, response and recovery efforts depend on the ability of all levels and sectors of government, as well as the private sector, to collect, analyze, disseminate and use homeland security- and crime-related information and intelligence. In support of this, the National Strategy for Information Sharing calls for a national information sharing capability through the establishment of a national integrated network of fusion centers. To facilitate the development of a national fusion center capability, the U.S.
    [Show full text]
  • Terrorism in Afghanistan: a Joint Threat Assessment
    Terrorism in Afghanistan: A Joint Threat Assessment Terrorism in Afghanistan: A Joint Threat Assessment Introduction 7 Chapter I: Afghanistan’s Security Situation and Peace Process: Comparing U.S. and Russian Perspectives (Barnett R. Rubin) 9 Chapter II: Militant Terrorist Groups in, and Connected to, Afghanistan (Ekaterina Stepanova and Javid Ahmad) 24 Chapter III: Afghanistan in the Regional Security Interplay Context (Andrey Kazantsev and Thomas F. Lynch III) 41 Major Findings and Conclusions 67 Appendix A: Protecting Afghanistan’s Borders: U.S. and Russia to Lead in a Regional Counterterrorism Effort (George Gavrilis) 72 Appendix B: Arms Supplies for Afghan Militants and Terrorists (Vadim Kozyulin) 75 Appendix C: Terrorism Financing: Understanding Afghanistan’s Specifics (Konstantin Sorokin and Vladimir Ivanov) 79 Acronyms 83 Terrorism in Afghanistan Joint U.S.-Russia Working Group on Counterterrorism in Afghanistan Working Group Experts: Javid Ahmad1 Senior Fellow, Atlantic Council Sher Jan Ahmadzai Director, Center for Afghanistan Studies, University of Nebraska at Omaha Robert Finn Former Ambassador of the United States to Afghanistan George Gavrilis Fellow, Center for Democracy, Toleration, and Religion, University of California, Berkeley Andrey Kazantsev Director, Center for Central Asian and Afghan Studies, Moscow State Institute of International Relations (MGIMO University) Kirill Koktysh Associate Professor, Moscow State Institute of International Relations (MGIMO University) Member, Expert Council, State Duma Committee of Nationalities Mikhail Konarovsky Former Ambassador of the Russian Federation to Afghanistan Col. (Ret.) Oleg V. Kulakov* Professor of Area Studies, Military University, Ministry of Defence of the Russian Federation Vadim Kozyulin Member, PIR Center Executive Board Researcher, Diplomatic Academy, Ministry of Foreign Affairs of the Russian Federation Thomas F.
    [Show full text]
  • An Introduction to Pakistan's Military
    An Introduction to Pakistan’s Military July 2011 Belfer Center for Science and International Affairs Harvard Kennedy School 79 JFK Street Cambridge, MA 02138 Fax: (617) 495-8963 Email: [email protected] Website: http://belfercenter.org Design and Layout Tim Duffy Copyright 2011 President and Fellows of Harvard College Printed in the United States of America Contents Introduction 4 Pakistan’s Strategic Challenges: Traditional Threats and New Adversaries 8 External Threats, Inconsistent Partners 8 Internal Threats 19 A Short History of Pakistan’s Military 22 Indian Partition, Kashmir, and the Use of Proxies 22 US Military Aid, the First Military Regime, and the 1965 War 23 The 1971 War and a Return to Civilian Rule 24 Islamization, the Mujahideen, and Nuclear Stumbling Blocks 25 A Return to Civilian Rule 26 Musharraf and Kargil 27 The Post-September 11 World 27 Conventional Capabilities 30 Army 30 Air Force 31 Navy 32 Proxies 32 Nuclear Strategy and Security 34 Command and Control 35 Nuclear Doctrine 36 Key Concerns About Pakistan’s Nuclear Program 36 Counterinsurgency 38 Appendices 40 Acronyms 41 Endnotes 42 Introduction Pakistan’s military is a central actor in many of today’s most pressing security challenges, and few institutions face such extreme pressures from such diverse forces. In recent years the military has been asked to simultaneously combat a vicious internal insurgency, suppress international terror- ist groups, and respond to Pakistan’s worst floods in eighty years, all while squaring off against a much larger rival in one of the most strategically complex regions in the world. Pakistan’s armed forces are not only an instrument of the state’s foreign policy, but also the most influential actor in the country’s internal politics.
    [Show full text]
  • Synergy Journal Print Publication 2016
    Synergy The Journal of Contemporary Asian Studies Volume 1 Academic Articles, Op-Eds and Event Reports about East, 2016 Southeast and South Asia Volume 1, 2016 Daniel C. Park edited by Gloria Liu Sameen Zehra Layout and Timothy Law Design by Cathy Nguyen Synergy: The Journal of Contemporary Asian Studies Copyright © 2016 Synergy: The Journal of Contemporary Asian Studies, Asian Institute, Munk School of Global Afairs, University of Toronto All rights reserved. No part of this book may be reproduced in any form or by any means without permission from the publisher. Brief passages may be quoted for review. ISSN 2369-8209 Key Title: Synergy (Toronto. 2016. Print) Variant title: Journal of Contemporary Asian Studies Contact Us If you have any questions regarding the contents, submissions, and or Synergy Journal’s operations, please contact us at: [email protected] or 416-738-7769 www.utsynergyjournal.org Our mailing address is: Synergy Journal, Asian Institute, Munk School of Global Afairs, University of Toronto 1 Devonshire Place Toronto, ON M5S 3K7 Canada i Synergy Editorial Committee 2016-2017 Core Editorial Committee Editor-in-Chief Daniel C. Park PhD Advisors Steven C. Denny Pushpa R. Acharya Associate Editor-in-Chief Gloria Liu Lead Editor Gloria Liu East Asia Lead Editor Southeast Asia Arthur Lui Lead Editor South Asia Sameen Zehra Design & Layout Managing Editor Timothy Law Associate Design & Layout Managing Editor Cathy Nguyen South Asia section Southeast Asia section Deputy Lead Editor Saniya Rashid Event Reporters
    [Show full text]
  • Human Intelligence Collector Operations, FM 2-22.3
    *FM 2-22.3 (FM 34-52) Field Manual Headquarters No. 2-22.3 Department of the Army Washington, DC, 6 September 2006 Human Intelligence Collector Operations Contents Page PREFACE vi PART ONE HUMINT SUPPORT, PLANNING, AND MANAGEMENT Chapter 1 INTRODUCTION 1-1 Intelligence Battlefield Operating System 1-1 Intelligence Process 1-1 Human Intelligence 1-4 HUMINT Source 1-4 HUMINT Collection and Related Activities 1-7 Traits of a HUMINT Collector 1-1 0 Required Areas of Knowledge 1-12 Capabilities and Limitations 1-13 Chapter 2 HUMAN INTELLIGENCE STRUCTURE 2-1 Organization and Structure 2-1 HUMINT Control Organizations 2-2 HUMINT Analysis and Production Organizations 2-6 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. NOTE: All previous versions of this manual are obsolete. This document is identical in content to the version dated 6 September 2006. All previous versions of this manual should be destroyed in accordance with appropriate Army policies and reyulations. 'This publication supersedeJyM 34-52, 28 September 1992, and ST 2-22.7, Tactical Human Intelligence and Counterintelligence Operations, April 2002. PENTAGON LmRARY \" "j MrtlTARY OOCUMENTI WASHINGTON, DC 20310 6 September 2006 FM 2-22.3 FM 2-22.3 ------------­ Chapter 3 HUMINT IN SUPPORT OF ARMY OPERATIONS 3-1 Offensive Operations ...............................•............................................................ 3-1 Defensive Operations 3-2 Stability and Reconstruction Operations 3-3 Civil Support Operations 3-7 Military Operations in Urban Environment.. 3-8 HUMINT Collection Environments 3-8 EAC HUMINT 3-9 Joint, Combined, and DOD HUMINT Organizations 3-10 Chapter 4 HUMINT OPERATIONS PLANNING AND MANAGEMENT .4-1 HUMINT and the Operations Process .4-1 HUMINT Command and Control .4-3 Technical Control.
    [Show full text]
  • Download Full
    JSSA Winter 2018 Volume IV, Number 2 NSG Expansion for Non-NPT States: Criteria and Candidacy Dr. Zafar Khan Is the United States sll the World's only Superpower Dr. Kenneth Holland Regional Security Complex Theory Dr. Lubna Sunawar Nexus between Climate Change and Human Insecurity: Implicaons for Pakistan Adeel Mukhtar Islamic State in Afghanistan: Challenges for Pakistan Asad Ullah Khan & Arhama Siddiqua Ballisc Missile Defence and Mulple Independently Targetable Re-entry Vehicles: Nuclear Deterrence in South Asia Ahyousha Khan Journal of Winter 2018 Volume IV, Number 2 S. Sadia Kazmi Dr. M. Anjum Sarfraz Beenish Altaf Prof. Dr. Marvin Weinbaum, Professor Emeritus of Political Science at the University of Illinois at Urbana-Champaign and is currently a scholar-in-residence at the Middle East Institute in Washington DC. Dr. Kenneth Holland, President of the American University of Afghanistan. Dr. Dale Walton, Assoc. Prof. of International Relations at Lindenwold University, Missouri, United States. Dr. Tariq Rauf, Director, Disarmament, Arms Control and Non-Proliferation Program, Stockholm International Peace Research Institute, Sweden. Dr. Bruno Tertrais, Director Adjoint (Deputy Director) Foundation for Strategic Research, Paris, France. Dr. Zulfqar Khan, Head of Dept, Department of Strategic Studies, National Defence University, Islamabad. Dr. Adil Sultan, Visiting Research Fellow, Department of War Studies, King's College London. Dr. Zafar Nawaz Jaspal, Professor, School of Politics and International Relations, Quaid-i-Azam University, Islamabad. Dr. Rizwana Abbasi, Associate Professor, Department of Humanities & Social Sciences, Bahria University, Islamabad. Lt Gen. (retd) Khalid Naeem Lodhi, Former Defence Minister, BE (Civil), M.Sc War Studies, MA International Relations, Freelance Writer, Defence Analyst.
    [Show full text]
  • Critical Infrastructure Threat Information Sharing Framework a Reference Guide for the Critical Infrastructure Community
    Critical Infrastructure Threat Information Sharing Framework A Reference Guide for the Critical Infrastructure Community October 2016 CRITICAL INFRASTRUCTURE THREAT INFORMATION SHARING FRAMEWORK Page intentionally left blank. CRITICAL INFRASTRUCTURE THREAT INFORMATION SHARING FRAMEWORK Contents Quick Reference Guide for Critical Infrastructure Owners and Operators, .................................. iii Report Threats and Incidents ...................................................................................................... iii Report Suspicious Activity ...................................................................................................... iii Report Suspected or Known Cyber Incidents .......................................................................... iv Report Physical Infrastructure Incidents .................................................................................. iv Become a Partner in the “If You See Something, Say Something™” Campaign ................... iv Receive Threat Information Relevant to Your Sector ................................................................ iv Access Threat Prevention and Protection Related Training and Exercises .............................. v Executive Summary ........................................................................................................................ 1 1 Introduction ............................................................................................................................... 3 1.1 Background ........................................................................................................................
    [Show full text]
  • For One Tooth, the Entire Jaw: Cross-Border Extremism, Coercive Diplomacy, and the India- Pakistan Security Dyad
    For One Tooth, the Entire Jaw: Cross-Border Extremism, Coercive Diplomacy, and the India- Pakistan Security Dyad Aateeb Khan, advised by Bruce Jentleson, PhD A thesis submitted to the Public Policy Department for Honors Duke University Durham, North Carolina 2018 Khan: For One Tooth, The Entire Jaw Table of Contents 1. Introduction: “A Tooth for a Jaw” 4 a. Literature Review 5 b. The Kargil War 14 c. Method 22 2. Case Study I: The Twin Peaks Crisis (2001) 26 a. Contextual Factors 27 b. Strategic Decision-making During Conflict 31 3. Case Study II: The Mumbai Attacks (2008) 40 a. Contextual Factors 41 b. Strategic Decision-making During Conflict 45 4. Case Study III: The Uri Incident (2016) 51 a. Contextual Factors 52 b. Strategic Decision-making During Conflict 5. Analysis 61 a. Coercive Diplomacy and Third Party Diplomacy 61 b. Deterrence by Denial and Deterrence by Punishment 66 c. Nuclear Posturing and Pakistan’s Nuclear Umbrella 70 6. Conclusion 74 7. Works Cited 76 Abstract 2 Khan: For One Tooth, The Entire Jaw This thesis analyzes the factors that affect the stability of the current security dilemma between India and Pakistan. In particular, it develops a strong link between the advent of cross-border militant attacks and the potential for escalation to nuclear-level conflict. A survey of three major case studies—the 2001 “Twin Peaks” crisis, the 2008 Mumbai attacks, and the 2016 Uri incident—suggests that a number of changing contextual and strategic factors contribute to the increasing destabilization of the status quo. These factors are as follows: Pakistan’s acquisition/posturing of tactical nuclear warheads, India’s shift from a strategy of coercive diplomacy to persuasive compellance, and the growing internal security threat that violent extremists pose within Pakistan.
    [Show full text]
  • Federal-Provincial Coordination Framework
    Contents NACTA Federal-Provincial Coordination Framework ................................................................1 Context/Purpose................................................................................................................ 1 Board of Governors ............................................................................................................ 1 Key Functions .................................................................................................................... 2 Key Stakeholders ............................................................................................................... 2 Strategic Approach to Counter -Terrorism and Extremism ................................................... 4 Basic Framework of Coordination between NACTA and its Stakeholders ............................. 8 NACTA's Specific Coordination Measures for Enhancing National Efficiency Against Terrorism/Extremism ......................................................................................................... 9 NACTA: Model of Operations ............................................................................................... 10 Appendix 1 .......................................................................................................................... 11 Key Stakeholders by NACTA Functions .............................................................................. 11 Appendix 2 .........................................................................................................................
    [Show full text]
  • Inculcating Professionalism in Defence for National Development: the Pakistan Perspective
    Proceedings of 8th International Research Conference, KDU, Published November 2015 Inculcating Professionalism in Defence for National Development: The Pakistan Perspective Major General Noel Khokhar Director General, Institute for Strategic Studies Research and Analysis, National Defence University, Pakistan [email protected] Abstract-The evolving security environment today, pose multiple challenges to the armed forces insofar, For optimum professionalism excellence in each of these substantive changes in threat matrix and expansion in fields is essential. It is acquired at different stages of their roles, tasks and national expectations are professional life of a soldier and each stage leads to concerned. Inculcating professionalism for national amelioration in standards. Progressively pushing military development, provides a perspective to understand the leaders closer to excellence with very step in career impact of this interplay. In the recent past, Armed Forces advancement. of Pakistan have experienced full spectrum impact of such changes, ranging from external to internal threats, Optimum professionalism is achieved through a punctuated frequently by assistance to civil combined use of the expertise acquired in these fields administration for disaster management. Pakistan Armed and then their application according to the context. The Forces adapted efficaciously to combat these challenges ultimate test of professionalism lies in accomplishment effectively, while maintaining high degree of of the assigned task in a cost effective manner. professionalism and contributing meaningfully towards The term professionalism in all its attributes captures national security and development. what it means to be a professional soldier, what is expected of him and for today’s focus how this can be In the context of today’s topic, Inculcating inculcated to generate effects in the field of national Professionalism in Defence and National Development, I development.
    [Show full text]