UGAMUNC XXI U.S. Intelligence Community 1 Honored Delegates

Total Page:16

File Type:pdf, Size:1020Kb

UGAMUNC XXI U.S. Intelligence Community 1 Honored Delegates UGAMUNC XXI U.S. Intelligence Community Honored Delegates, 1 UGAMUNC XXI U.S. Intelligence Community Honored Delegates, Welcome to the 2015 University of Georgia Model United Nations Conference and specifically to one of the most exciting committees of this year’s competition: The U.S. Intelligence Community. My name is Anna Nordnes Helgøy, and I will be chairing the committee along with my fantastic Co-Chair, Nicole Garcia. We are both thrilled to host what we expect to be an engaging and intriguing debate about some of the most profound questions of modern society; how far will the intelligence community be willing to go before the American (or foreign, for that matter) public protests? Before I go further into the background of the committee, I would like to assure you that you are in good hands for this competition by further introducing my Co-Chair and myself. I was born in Bremen, Germany, and I grew up in Bergen, Norway. In other words, English is not my native language, and I am easily impressed by articulation. I am a junior political science and public relations double major at UGA. This is my third year on the UGA Model UN team and my first year as a member of the Model UN Secretariat, as its PR Officer. I have previously co-chaired our SPECPOL committee and last year’s joint crisis committee of the Obama/McCain 2008 Election. I have competed at three collegiate conferences with the team and participated in mostly crisis committees. I know crisis might be new to you, but I assure you that I will move forward with the committee in a clean and clear way, and I will include detailed information on how the competition will be run in this background guide. I encourage you to read it carefully. My Co-Chair is Nicole Garcia, a freshman from Evans, Georgia. She is currently majoring in Business with a minor in Spanish. She participated in Model United Nations all four years of high school, competing at many different conferences and participating in many different committees, including the African Union, GA 1st, and the Security Council, even attending UGAMUNC herself as a delegate in the Security Council. With having been in all of your shoes before, she knows firsthand the caliber of UGAMUNC delegates and is extremely eager to see the ideas and enthusiasm that each one of you will bring to this special crisis committee to make it as enjoyable and successful as possible for everyone involved. As you dive into your research of the U.S. Intelligence Community and what they do, I highly encourage you to read through the Notes on How the Committee will be Run part of the background guide. If you have not been in a crisis committee before, this information will help you understand what you’re in for. Additionally, just in case you don’t read all the details of this background guide, I want you to take note of one thing: we have established a blog for this committee at www.usintelligencecommunity.wordpress.com that will be used during UGAMUNC weekend for crisis updates. However, Nicole and I will post interesting related articles and perhaps some additional tips and information on a running basis until February 6th. Feel free to make use of that if you feel so inclined. Another matter of interest to you is that this committee requires position papers. This means that unless you turn in a position paper before or at the beginning of the conference, you may not be eligible for an award. The paper should include some 2 UGAMUNC XXI U.S. Intelligence Community research on your character and the agency you represent in the committee, as well as your position on the opening scenario and other events you foresee happening in the committee. Furthermore, you can refer to our questions to consider listed after the description of the opening scenario for some guiding questions regarding your position paper. We expect it to be about two typed pages, but most importantly, it should just be a good paper. You can either bring a printed version of the position paper to the first committee session or you can email it to our committee’s email address listed below. I hope you feel excited after reading this background guide. I, along with Nicole and the rest of the UGA Model UN team, cannot wait to meet you and see what you are capable of in February. Until then, feel free to contact Nicole or me via our committee’s email ([email protected]) if you have any questions at all. Best, Anna Helgøy Chair, U.S. Intelligence Community 3 UGAMUNC XXI U.S. Intelligence Community Notes on How the Committee will be Run This committee is a crisis committee, as opposed to a General Assembly committee. That means that the competition will not follow standard parliamentary procedure. Now, don’t freak out – a crisis committee is also more fast-paced, fun, and a very real insight into how college Model UN competitions work. There are some rules in our UGAMUNC rulebook that still apply to our committee, so I do encourage you to still be aware of those. However, here are a few basic rules of thumb for crisis committees: 1. There will be no speaker’s list. Think about the sessions as a constant moderated caucus (although you are allowed to motion for unmoderated caucuses as well.) 2. You will not be writing resolutions. In general assembly committees, you would spend a lot of time formulating long solutions to the issue at hand, called resolutions, to be passed by the General Assembly. In a crisis committee, these don’t exist. Instead, you’ll be writing directives; these are short and precise descriptions of actions you wish the committee to take. They are usually brought to a vote immediately, without a long voting process. This is due to the fact that in a committee like this, new things are constantly happening, and you will want to pass directives as soon as a new crisis is introduced. 3. Personal directives. In addition to committee directives that are described above, you will want to try to move through crises unilaterally on the side. As you walk into the first committee session, you will be handed a portfolio with information about your personal connections, available monetary funds and military troops if applicable, etc. Everyone will have something up his or her sleeve, and everyone should reflect on what is best for the agency you are representing. To pass personal directives, simply write a note labeled clearly with “personal directive” and send the note to crisis staff or the co-chair of your committee. You will receive a personal response from crisis on whether or not the action is feasible. Within reasonable limits, I encourage you to establish your personal objectives for the committee and use the tool of personal directives. If you do this successfully, you are able to control the direction of the crises to some extent. However, I do remind you that everything that happens is at the chairs’ and crisis staff’s discretion. Things will not always go your way, and that is part of crisis – no matter how well articulated your notes are. 4. Communiqués. As mentioned above, you will be informed of certain personal connections you have in your portfolio. In order to contact these people or organizations, write a note and label it “communiqué” and hand it to a staff member or your co-chair. You will receive a personal response from staff. 5. Be prepared to improvise and think on your feet. Unlike a General Assembly committee, you will not be completely aware of what is going to happen at any point in time. We are providing you with a starting scenario. This can change or escalate very quickly. Do your research as much as you can, but be aware that all topics that apply to the U.S. Intelligence Community are fair game and can be introduced by the chair or crisis staff in various ways throughout the session. 6. Committee technology. For the purpose of this specific committee, we will take use of certain technology tools. We will not allow for you to bring your own 4 UGAMUNC XXI U.S. Intelligence Community private laptops or use personal electronic devices during committee sessions, but we will have a laptop somewhere in the room for you to make Twitter updates through passed directives to the public. We see this as an interesting and applicable tool for this committee, specifically because a lot of what you do has to be presented in a certain way to the public in order to avoid upheavals. This aspect of your debate is one of the reasons why the U.S. Secretary of State and the White House Press Secretary will be present in the committee along with the heads of the security agencies. In addition to a Twitter account, the committee has a corresponding blog. This is for the use of crisis staff and chairs only and will solely be used to portray crisis updates during the committee sessions. However, until UGAMUNC weekend, you may be able to find interesting articles and additional research opportunities of our committees, as well as this background guide and bios of your chairs on the following web address: www.usintelligencecommunity.com 7. Get excited. We guarantee you a weekend full of surprises and fun, as well as a great debate. 5 UGAMUNC XXI U.S. Intelligence Community Background: The U.S.
Recommended publications
  • I,St=-Rn Endorsedb~ Chief, Policy, Information, Performance, and Exports
    NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY 2-4 Issue Date: IO May 20 I 9 Revised: HANDLING OF REQUESTS FOR RELEASE OF U.S. IDENTITIES PURPOSE AND SCOPE This policy, developed in consultation with the Director of National Intelligence (DNI), the Attorney General, and the Secretary of Defense, implements Intelligence Community Policy Guidance I 07 .1 , "Requests for Identities of U.S. Persons in Disseminated Intelligence Reports" (Reference a), and prescribes the policy, procedures, and responsibilities for responding to a requesting entity, other than NSA/CSS, for post-publication release and dissemination of masked US person idenlity information in disseminated serialized NSA/CSS reporting. This policy applies exclusively to requests from a requesting entity, other than NSA/CSS, for post-publication release and dissemination of nonpublic US person identity information that was masked in a disseminated serialized NSA/CSS report. This policy does not apply in circumstances where a U.S. person has consented to the dissemination of communications to, from, or about the U.S. person. This policy applies to all NSA/CSS personnel and to all U.S. Cryptologic System Government personnel performing an NSA/CSS mission. \ This policy does not affect any minimization procedures established pursuant to the Foreign Intelligence Surveillance Act of 1978 (Reference b), Executive Order 12333 (Reference £), or other provisions of law. This policy does not affect the requirements established in Annex A, "Dissemination of Congressional Identity Information," of Intelligence Community Directive 112, "Congressional Notification" (Reference d). ~A General, U.S. Army Director, NSA/Chief, CSS i,st=-rn Endorsedb~ Chief, Policy, Information, Performance, and Exports NSA/CSS Policy 2-4 is approved for public release.
    [Show full text]
  • Utah Data Center, As Well As Any Search Results Pages
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 84688A 2 May 2017 JOHN GREENEWALD Dear Mr. Greenewald : This responds to your Freedom of Information Act (FOIA) request of 14 June 2016 for Intellipedia pages on Boundless Information and/or BOUNDLESS INFORMANT and/or Bull Run and/or BULLRUN and/or Room 641A and/ or Stellar Wind and/ or Tailored Access Operations and/ or Utah Data Center, as well as any search results pages. A copy of your request is enclosed. As stated in our previous response, dated 15 June 2016, your request was assigned Case Number 84688. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. There are no assessable fees for this request. Your request has been processed under the FOIA. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD.
    [Show full text]
  • Speaker Bios
    Intelligence Reform and Counterterrorism after a Decade: Are We Smarter and Safer? October 16 – 18, 2014 University of Texas at Austin THURSDAY, OCTOBER 16 Blanton Museum, UT Campus 4:00-5:00pm Welcome Remarks and Discussion: Admiral William McRaven (ret.) Admiral McRaven is the ninth commander of United States Special Operations Command (USSOCOM), headquartered at MacDill Air Force Base, Fla. USSOCOM ensures the readiness of joint special operations forces and, as directed, conducts operations worldwide. McRaven served from June 2008 to June 2011 as the 11th commander of Joint Special Operations Command (JSOC) headquartered at Fort Bragg, N.C. JSOC is charged to study special operations requirements and techniques, ensure interoperability and equipment standardization, plan and conduct special operations exercises and training, and develop joint special operations tactics. He served from June 2006 to March 2008 as commander, Special Operations Command Europe (SOCEUR). In addition to his duties as commander, SOCEUR, he was designated as the first director of the NATO Special Operations Forces Coordination Centre where he was charged with enhancing the capabilities and interoperability of all NATO Special Operations Forces. McRaven has commanded at every level within the special operations community, including assignments as deputy commanding general for Operations at JSOC; commodore of Naval Special Warfare Group One; commander of SEAL Team Three; task group commander in the U.S. Central Command area of responsibility; task unit commander during Desert Storm and Desert Shield; squadron commander at Naval Special Warfare Development Group; and SEAL platoon commander at Underwater Demolition Team 21/SEAL Team Four. His diverse staff and interagency experience includes assignments as the director for Strategic Planning in the Office of Combating Terrorism on the National Security Council Staff; assessment director at USSOCOM, on the staff of the Chief of Naval Operations, and the chief of staff at Naval Special Warfare Group One.
    [Show full text]
  • Ensuring Language Capability in the Intelligence Community What Factors Affect the Best Mix of Military, Civilians, and Contractors?
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Purchase this document TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Defense Research Institute View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation technical report series. Reports may include research findings on a specific topic that is limited in scope; present discussions of the methodology employed in research; provide literature reviews, survey instru- ments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; or deliver preliminary findings. All RAND reports un- dergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.
    [Show full text]
  • NSA) Office of Inspector General (OIG), 2003-2006
    Description of document: Semi-annual reports for Congress produced by the National Security Agency (NSA) Office of Inspector General (OIG), 2003-2006 Requested date: 14-April-2008 Release date: 09-March-2020 Posted date: 30-March-2020 Source of document: FOIA Request National Security Agency Attn: FOIA/PA Office 9800 Savage Road, Suite 6932 Ft. George G. Meade, MD 20755-6932 Fax: 443-479-3612 Online FOIA Request Form The governmentattic.org web site (“the site”) is a First Amendment free speech web site, and is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. ,. NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE I~ FORT GEORGE G.
    [Show full text]
  • The Role of European States in Us Drone Strikes
    DEADLY ASSISTANCE: THE ROLE OF EUROPEAN STATES IN US DRONE STRIKES Amnesty International is a global movement of more than 7 million people who campaign for a world where human rights are enjoyed by all. Our vision is for every person to enjoy all the rights enshrined in the Universal Declaration of Human Rights and other international human rights standards. We are independent of any government, political ideology, economic interest or religion and are funded mainly by our membership and public donations. © Amnesty International 2018 Cover: Women walk past a graffiti, denouncing strikes by US drones in Yemen, painted Except where otherwise noted, content in this document is licensed on a wall in Sana'a, the capital of Yemen. © REUTERS/Khaled Abdullah under a Creative Commons (attribution, non-commercial, no derivatives, international 4.0) licence. https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode For more information please visit the permissions page on our website: www.amnesty.org Where material is attributed to a copyright owner other than Amnesty International this material is not subject to the Creative Commons licence. First published in 2018 by Amnesty International Ltd Peter Benenson House, 1 Easton Street, London WC1X 0DW, UK Index: ACT 30/8151/2018 Original language: English amnesty.org CONTENTS EXECUTIVE SUMMARY 2 METHODOLOGY 10 1. THE US LETHAL DRONE PROGRAMME: A CONTROVERSIAL AND SECRET HISTORY 11 2. THE US LETHAL DRONE PROGRAMME UNDER THE OBAMA AND TRUMP ADMINISTRATIONS 14 3. US DRONE STRIKES UNDER INTERNATIONAL LAW 21 4. INTERNATIONAL LEGAL FRAMEWORK ON ASSISTANCE 28 5. ASSISTANCE PROVIDED BY THE UNITED KINGDOM 36 6.
    [Show full text]
  • Alliances and Partnerships in American National Security
    FOURTH ANNUAL TEXAS NATIONAL SECURITY FORUM ALLIANCES AND PARTNERSHIPS IN AMERICAN NATIONAL SECURITY ETTER-HARBIN ALUMNI CENTER THE UNIVERSITY OF TEXAS AT AUSTIN OCTOBER 12, 2017 8:30 AM - 8:45 AM Welcome by William Inboden, Executive Director of the Clements Center for National Security, and Robert Chesney, Director of the Robert Strauss Center for International Security and Law 8:45 AM - 10:00 AM • Panel One: Defense Perspectives Moderator: Aaron O’Connell, Clements Center and Department of History Aaron O'Connell is an Associate Professor of History at the University of Texas at Austin and Faculty Fellow at the Clements Center. Previously, he served as Director for Defense Policy & Strategy on the National Security Council at the White House, where he worked on a range of national security matters including security cooperation and assistance, defense matters in Africa, significant military exercises, landmine and cluster munitions policy, and high-technology matters affecting the national defense, such as autonomy in weapon systems. Dr. O’Connell is also the author of Underdogs: The Making of the Modern Marine Corps, which explores how the Marine Corps rose from relative unpopularity to become the most prestigious armed service in the United States. He is also the editor of Our Latest Longest War: Losing Hearts and Minds in Afghanistan, which is a critical account of U.S. efforts in Afghanistan since 2001. He has also authored a number of articles and book chapters on military affairs and the representations of the military in U.S. popular culture in the 20th century. His commentary has appeared in The New York Times, The Washington Post, Foreign Affairs, and The Chronicle of Higher Education.
    [Show full text]
  • Uk-Menwith-Hill-Lifting-The-Lid.Pdf
    Lifting the lid on Menwith Hill... The Strategic Roles & Economic Impact of the US Spy Base in Yorkshire A Yorkshire CND Report 2012 About this report... Anyone travelling along the A59 to Skipton demonstrations, court actions and parliamentary cannot fail to notice the collection of large white work. Similar issues have been taken up by spheres spread over many acres of otherwise various members of the UK and European green fields just outside Harrogate. Some may Parliaments but calls for further action have know that these ‘golfballs’, as they are often been smothered by statements about concerns called, contain satellite receiving dishes, but few for security and the importance of counter will know much more than that. In fact, it’s terrorism. extremely difficult to find out very much more because this place – RAF Menwith Hill – is the However, it is not the purpose of this report to largest secret intelligence gathering system write a history of the protest movement around outside of the US and it is run, not by the RAF the base. The object was originally to investigate (as its name would suggest) but by the National the claims made by the US and UK govern- Security Agency of America. ments of the huge financial benefits (rising to over £160 million in 2010) that the base brings Such places always attract theories about what to the local and wider communities. In doing so, they are involved in and Menwith Hill is no it was necessary to develop a clearer under- exception – but over the years it has also been standing of what the base does, how it operates the subject of careful investigation and analysis and how much national and local individuals, by a number of individuals and groups.
    [Show full text]
  • National Security Agency/Central Security Service
    Description of document: National Security Agency/Central Security Service (NSA/CSS) United States Cryptologic History, Special Series Crisis Collection Volume 2, The Suez Crisis: A Brief Comint History, 1988 Interagency Security Classification Appeals Panel (ISCAP) appeal 2013 ISCAP release date: 05-March-2018 Posted date: 14-May-2018 Source of document: Mandatory Declassification Review Request National Security Agency NSC/CSS MDR Appeal Authority DJ5 National Security Agency 9800 Savage Road STE 6881 Fort George G. Meade, MD 20755-6881 The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. Interagency Security Classification Appeals Panel EXECUTIVE SECRETARY MEMBERS c/o Infonnation Security Oversight Office 700 Pennsylvania Avenue, N .W., Room 100 Mark A.
    [Show full text]
  • Dodi 8523.01, "Communications Security," January 6, 2021
    DOD INSTRUCTION 8523.01 COMMUNICATIONS SECURITY Originating Component: Office of the DoD Chief Information Officer Effective: January 6, 2021 Releasability: Cleared for public release. Available on the Directives Division Website at https://www.esd.whs.mil/DD/. Reissues and Cancels: DoD Instruction 8523.01, “Communications Security (COMSEC),” April 22, 2008 Approved by: Dana Deasy, DoD Chief Information Officer Purpose: In accordance with the authority in DoD Directive 5144.02, DoD Instruction 8500.01, and the Committee on National Security Systems Policy (CNSSP) No. 1, this issuance establishes policy, assigns responsibilities, and provides procedures for managing communications security (COMSEC). DoDI 8523.01, January 6, 2021 TABLE OF CONTENTS SECTION 1: GENERAL ISSUANCE INFORMATION .............................................................................. 3 1.1. Applicability. .................................................................................................................... 3 1.2. Policy. ............................................................................................................................... 3 SECTION 2: RESPONSIBILITIES ......................................................................................................... 4 2.1. DoD Chief Information Officer (DoD CIO). .................................................................... 4 2.2. Director, Defense Information Systems Agency. ............................................................. 4 2.3. Director, Defense Counterintelligence
    [Show full text]
  • Congressional Record United States Th of America PROCEEDINGS and DEBATES of the 112 CONGRESS, SECOND SESSION
    E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 112 CONGRESS, SECOND SESSION Vol. 158 WASHINGTON, TUESDAY, JULY 31, 2012 No. 115 Senate The Senate met at 10 a.m. and was appoint the Honorable CHRISTOPHER A. significant, are down, and it is a cha- called to order by the Honorable CHRIS- COONS, a Senator from the State of Dela- otic place. There are 600 million people TOPHER A. COONS, a Senator from the ware, to perform the duties of the Chair. in India who are without electricity. State of Delaware. DANIEL K. INOUYE, As we have been told time and time President pro tempore. again, the most important issue we PRAYER Mr. COONS thereupon assumed the have facing this country today for se- The Chaplain, Dr. Barry C. Black, of- chair as Acting President pro tempore. curity is cyber. We have been told that fered the following prayer: f by the Joint Chiefs of Staff and by the head of the CIA. We have been told Let us pray. RECOGNITION OF THE MAJORITY Creator God, who has nurtured us that by Democrats and Republicans. It LEADER throughout the seasons of our sojourn, is an issue that is important, and we give to the Members of this body the The ACTING PRESIDENT pro tem- have been told it is something we can love, strength, and wisdom to do Your pore. The majority leader is recog- prevent. will. Keep them walking in the paths of nized. If we don’t do this bill, it is not a question of if there will be a cyber at- righteousness and let them feel Your f abiding presence in times of joy and tack that will be devastating to our sadness.
    [Show full text]
  • Covert Action and Cyber Offensive Operations: Revisiting Traditional Approaches in Light of New Technology
    Covert Action and Cyber Offensive Operations: Revisiting Traditional Approaches in Light of New Technology WILLIAM ROBERT CARRUTHERS Submitted in Partial Fulfilment of the Requirements of the Degree of Doctor of Philosophy University of Salford, School of Arts and Media 2018 TABLE OF CONTENTS FIGURE LIST ______________________________________________________ VI ACKNOWLEDGMENTS ____________________________________________ VII ABSTRACT ______________________________________________________ VIII INTRODUCTION ____________________________________________________ 1 RESEARCH AIMS ____________________________________________________ 8 LITERATURE REVIEW _________________________________________________ 9 METHODOLOGY AND SOURCES ________________________________________ 15 Interviews ______________________________________________________ 19 Newspaper Articles _______________________________________________ 21 Official Primary Documents: Contemporary and Archived ________________ 23 Leaks __________________________________________________________ 24 Cyber Security Reports ____________________________________________ 28 STRUCTURE OF THE THESIS ___________________________________________ 28 CYBER OFFENSIVE OPERATIONS AND COVERT ACTION ______________ 31 CYBER OFFENSIVE OPERATIONS ARE NOT CYBER WAR. _____________________ 32 UNDERSTANDING COVERT ACTION _____________________________________ 50 CYBER OFFENSIVE OPERATIONS AND COVERT ACTION: A COMPARISON ________ 54 CONCLUSION ______________________________________________________ 60 COVERT ACTION AND CYBER
    [Show full text]