"What's Wrong with American Spies?" (April 2003) 06/25/2006 06:48 PM
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The People's Liberation Army in the Land of Elusive Sheen
No. 38 SEPTEMBER 2001 The People’s Liberation Army in the Land of Elusive Sheen Edward B. Atkeson The People’s Liberation Army in the Land of Elusive Sheen by Edward B. Atkeson The Land Warfare Papers No. 38 September 2001 A National Security Affairs Paper Published on Occasion by The Institute of Land Warfare ASSOCIATION OF THE UNITED STATES ARMY AN AUSA INSTITUTE OF LAND WARFARE PAPER The purpose of the Institute of Land Warfare is to extend the educational work of AUSA by sponsoring scholarly publications, to include books, monographs and essays on key defense issues, as well as workshops and symposia. A work selected for publication as a Land Warfare Paper represents research by the author which, in the opinion of the editorial board, will contribute to a better understanding of a particular defense or national security issue. Publication as an Institute of Land Warfare Paper does not indicate that the Association of the United States Army agrees with everything in the paper, but does suggest that the Association believes the paper will stimulate the thinking of AUSA members and others concerned about important defense issues. LAND WARFARE PAPER NO. 38, SEPTEMBER 2001 The People’s Liberation Army in the Land of Elusive Sheen by Edward B. Atkeson Major General Edward B. Atkeson, USA Ret., is a senior fellow with AUSA’s Institute of Land Warfare and a senior associate at the Center for Strategic and International Studies. During his military service he was appointed Deputy Chief of Staff for Intelligence, U.S. Army Europe, and was later a member of the National Intelligence Council under the Director of Central Intelligence. -
Cryptography
Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. -
What Role for the Cia's General Counsel
Sed Quis Custodiet Ipsos Custodes: The CIA’s Office of General Counsel? A. John Radsan* After 9/11, two officials at the Central Intelligence Agency (CIA) made decisions that led to major news. In 2002, one CIA official asked the Justice Department’s Office of Legal Counsel (OLC) to clarify how aggressive CIA interrogators could be in questioning al Qaeda operatives held overseas.1 This request led to the August 2002 memorandum, later leaked, in which John Yoo argued that an interrogator crosses the line into torture only by inflicting pain on a par with organ failure.2 Yoo further suggested that interrogators would have many defenses, justifications, and excuses if they faced possible criminal charges.3 One commentator described the advice as that of a “mob lawyer to a mafia don on how to skirt the law and stay out of prison.”4 To cool the debate about torture, the Bush administration retracted the memorandum and replaced it with another.5 The second decision was made in 2003, when another CIA official asked the Justice Department to investigate possible misconduct in the disclosure to the media of the identity of a CIA employee. The employee was Valerie Plame, a covert CIA analyst and the wife of Ambassador Joseph Wilson. * Associate Professor of Law, William Mitchell College of Law. The author was a Justice Department prosecutor from 1991 until 1997, and Assistant General Counsel at the Central Intelligence Agency from 2002 until 2004. He thanks Paul Kelbaugh, a veteran CIA lawyer in the Directorate of Operations, for thoughtful comments on an early draft, and Erin Sindberg Porter and Ryan Check for outstanding research assistance. -
Intelligence System
The U.S. Intelligence System https://www.youtube.com/watch?v=OFIG6k4B3zg What is Intelligence? Intelligence – information that meets needs of policy makers and has been collected and processed to meet those needs; all intelligence is information, not all information is intelligence National Intelligence – three subjects -foreign, domestic, and homeland security Intelligence is – a process, product, and a form of organization The Development of U.S. Intelligence National intelligence – didn’t exist until about 1940 CHRONOLOGY -1940-41 – COI (Coordinator of Info) -OSS (Office of Strategic Services) -1941 – Pearl Harbor –mirror imaging/lack of info sharing -1947 – National Security Act – conveyed the legal basis for the intel community; created the SECDEF & National Security Council -cold war influence- countering Soviet Union & stopping the growth of communism -1972- ABM Treaty & SALT I Accord National Technical Means- satellites & other technical collectors (used to verify adherence) Verification- to ensure treaty agreements are honored Monitoring- the means for verification 1975-1976 – created congressional oversight committees ‘cos of violations of law and intel abuses 1989-1991- failure to foresee Soviet collapse (intel failure); minimized Soviet threat 2001- 911 attacks; Patriot Act- allows greater latitude regarding domestic intel gathering Render- delivery of suspected terrorists to a 3rd country that can incarcerate & interrogate with fewer limitations Key judgments- the primary findings of an overall intel estimate that can be -
Chinese Proliferation of Weapons of Mass Destruction: Background and Analysis
Order Code 96-767 F CRS Report for Congress Received through the CRS Web Chinese Proliferation of Weapons of Mass Destruction: Background and Analysis September 13, 1996 (name redacted) Analyst in Foreign Affairs Foreign Affairs and National Defense Division Congressional Research Service ˜ The Library of Congress Chinese Proliferation of Weapons of Mass Destruction: Background and Analysis Summary To assist congressional deliberations, this report sets forth the background on and analysis of Chinese technology transfers suspected of contributing to the proliferation of weapons of mass destruction. For a discussion of policy options and approaches, see the related Issue Brief 92056, Chinese Proliferation of Weapons of Mass Destruction: Current Policy Issues. The issue of Chinese proliferation involves three aspects: China’s support for nonproliferation efforts, China’s transfers that promote proliferation, and vertical proliferation (modernization of China’s WMD and missile programs). Since 1992, China has responded to U.S. and other pressures to participate in some parts of international nonproliferation regimes. China promised to abide by the Missile Technology Control Regime (MTCR), which is not a treaty, but a set of guidelines. China also acceded to the Nuclear Nonproliferation Treaty (NPT) and signed the Chemical Weapons Convention (CWC). However, it is not a member of the MTCR, Zangger Committee, Nuclear Suppliers Group, Australia Group, or the Wassenaar Arrangement. The pressures to join nonproliferation efforts that China faced in the early 1990s have weakened, while its commitment to nonproliferation is unclear. Chinese missile-related transfers have not violated any international treaties, since the MTCR is not a treaty, but have violated Chinese pledges and U.S. -
Book Reviews
Journal of Strategic Security Volume 3 Number 1 Volume 3, No. 1: March 2010 Article 8 Book Reviews Timothy Hsia Sheldon Greaves Donald J. Goldstein Henley-Putnam University Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 71-78 Recommended Citation Hsia, Timothy; Greaves, Sheldon; and Goldstein, Donald J.. "Book Reviews." Journal of Strategic Security 3, no. 1 (2010) : 71-78. DOI: http://dx.doi.org/10.5038/1944-0472.3.1.7 Available at: https://scholarcommons.usf.edu/jss/vol3/iss1/8 This Book Review is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Book Reviews This book review is available in Journal of Strategic Security: https://scholarcommons.usf.edu/jss/ vol3/iss1/8 Hsia et al.: Book Reviews Book Reviews The History of Camp Tracy: Japanese WWII POWs and the Future of Strategic Interrogation. By Alexander D. Corbin. Fort Belvoir, VA: Ziedon Press, 2009. ISBN: 978-0-578-02979- 5. Maps. Photographs. Notes. Bibliography. Index. Pp. 189. $15.95. The History of Camp Tracy, which received the Joint Chiefs of Staff His- tory Office's Fleet Admiral Chester W. Nimitz Archival Research Award, is an illuminating and educating read. The book is written by Alexander Corbin, an intelligence officer in the U.S. -
Hidden Arena: Cyber Competition and Conflict in Indo-Pacific Asia James Lewis Prepared for the Lowy Institute Macarthur Asia Security Project
Hidden Arena: Cyber Competition and Conflict in Indo-Pacific Asia James Lewis Prepared for the Lowy Institute MacArthur Asia Security Project Executive summary Cyber infrastructure is critical to the global economy. Yet it is badly secured, worse governed, and a place of interstate competition and potential conflict. There is widespread concern among states over strategic competition in cyberspace, including cyber espionage and cyber attack. Asia, with its political tensions, vigorous economies, and lack of strong multilateral institutions, is a focal point for this competition. The rise of China and its extensive cyber capabilities defines strategic competition in both Asia and in cyberspace globally. The cyber domain is better understood in terms of competition than of war. The possession of advanced cyber attack capabilities has tended to instill caution in nations. Still, because of the newness of technology, lack of agreement on norms, and potential to mistake cyber espionage for military action, cyber competition can increase risks of miscalculation, conflict and escalation during wider interstate tension. The strategic cyber challenge in Asia should be addressed in multiple ways. Cooperation in cyber defence between the United States and its allies can proceed in tandem with greater efforts at US-China dialogue and reassurance. Cooperative approaches worth pursuing include agreement on norms for responsible state behavior in cyberspace and reaching common agreement on the applicability of international laws of war in cyberspace. Overview The internet shrinks distance and make borders more porous. It is part of a set of new technologies that form a man-made environment called cyberspace. Cyberspace connects nations more closely than ever before. -
The Art of the Deal for North Korea: the Unexplored Parallel Between Bush and Trump Foreign Policy*
International Journal of Korean Unification Studies Vol. 26, No. 1, 2017, 53–86. The Art of the Deal for North Korea: The Unexplored Parallel between Bush and Trump Foreign Policy* Soohoon Lee ‘Make America Great Again,’ has been revived while ‘America First’ and ‘peace through strength,’ have been revitalized by the Trump admin istration. Americans and the rest of the world were shocked by the dramatic transformation in U.S. foreign policy. In the midst of striking changes, this research analyzes the first hundred days of the Trump administration’s foreign policy and aims to forecast its prospects for North Korea. In doing so, the George W. Bush administration’s foreign policy creeds, ‘American exceptionalism’ and ‘peace through strength,’ are revisited and compared with that of Trump’s. Beyond the similarities and differences found between the two administrations, the major finding of the analysis is that Trump’s profitoriented nature, through which he operated the Trump Organization for nearly a half century, has indeed influenced the interest- oriented nature in his operating of U.S. foreign policy. The prospects for Trump’s policies on North Korea will be examined through a business sensitive lens. Keywords: Donald Trump, U.S Foreign Policy, North Korea, America First, Peace through Strength Introduction “We are so proud of our military. It was another successful event… If you look at what’s happened over the eight weeks and compare that to what’s happened over the last eight years, you'll see there’s a tremen * This work was supported by a National Research Foundation of Korea Grant funded by the Korean Government (NRF2016S1A3A2924968). -
The Strange Rebirth of Missile Defense
The Strange Rebirth of Missile Defense: Why Republicans Resurrected Reagan’s Dream Paul Musgrave Introduction National missile defense, even in its stripped-down, post-Reagan version, died in 1993. The Clinton administration killed it; shifting funding from research on “Star Wars”-like projects to missile defense systems like the Patriot. Instead of building a shield that would protect all of America, the United States would henceforth try to construct only limited defenses that could protect troops deployed in a future battleground. Yet ten years later, the George W. Bush administration has broken ground on new testing sites for a planned national missile defense, and billions of dollars annually are flowing into research and construction of a nationwide missile shield. The Bush administration could claim, were it so inclined, that it was merely following its predecessors; the basic parts of the Bush system are the same as those President Clinton proposed to use in his national missile defense. Why did U.S. policy toward missile defenses shift so dramatically? How did National Missile Defense survive its apparent death in 1993? These questions are important. National missile defense, in all of its guises and architectures, is among the most complex technical challenges humans have ever attempted to solve. It is also among the most costly, with some estimates placing the total cost of a missile defense system at nearly a trillion dollars. Understanding the sources of NMD’s resurrection is critical to a deeper comprehension of American security policy in the early years of the twenty-first century. The rebirth of missile defense came from two sources. -
Download Economic Battle Plan
Bill Gertz - Deceiving the Sky 2.60 [Economic Battle PlanTM points: 75) Background Briefing: Bill Gertz joins the Economic War Room to discuss our intelligence failures with China through 20 years of in-depth investigative reporting. Topics covered include China’s real world view, the mistakes we made integrating our economy with China, and the solutions going forward. It is time for all of America to wake up to the reality of what is happening. Historically, our intelligence analysts have been aligned with the Chinese. Now, that may be changing! ”In the 1990’s, I was with the director of the Defense Intelligence Agency. And what he was saying was that China was not a threat. And my response was, “Why do you think that?” And his answer, to paraphrase it, was “Because the Chinese told us.” And I was totally shocked. But it became very clear to me within a very few years when a major spy was uncovered inside the Defense Intelligence Agency. His name was Ron Montaperto. He was a Defense Intelligence Agency analyst. And he was eventually convicted of passing classified information to Chinese and military intelligence at the Chinese embassy in Washington.” – Bill Gertz Best Selling Author, National Security Insider and Investigative Reporter Our intelligence community, our policy community, and our academic community has all been kind of infiltrated with these pro-China analysts. In some cases they were even infiltrated with Chinese spies. Your Mission: To understand the China threat and help enforce political change in DC that protects America’s national security. page 1 Bill Gertz - Deceiving the Sky 2.60 [Economic Battle PlanTM points: 75) FUN FACT: Former Defense secretary Rumsfeld said that Bill Gertz got information in the Pentagon faster than he did as Defense Secretary. -
Spy Lingo — a Secret Eye
A Secret Eye SpyLingo A Compendium Of Terms Used In The Intelligence Trade — July 2019 — A Secret Eye . blog PUBLISHER'S NOTICE: Although the authors and publisher have made every eort to ensure that the information in this book was correct at press time, the authors and publisher do not assume and hereby disclaim any liability to any party for any loss, damage, or disruption caused by errors or omissions, whether such errors or omissions result from negligence, TEXTUAL CONTENT: Textual Content can be reproduced for all non-commercial accident, or any other cause. purposes as long as you provide attribution to the author / and original source where available. CONSUMER NOTICE: You should assume that the author of this document has an aliate relationship and/or another material connection to the providers of goods and services mentioned in this report THIRD PARTY COPYRIGHT: and may be compensated when you purchase from a To the extent that copyright subsists in a third party it provider. remains with the original owner. Content compiled and adapted by: Vincent Hardy & J-F Bouchard © Copyright 9218-0082 Qc Inc July 2019 — Spy Lingo — A Secret Eye Table Of Contents INTRODUCTION 4 ALPHA 5 Ab - Ai 5 Al - As 6 Au - Av 7 Bravo 8 Ba - Bl 8 Bl - Bre 9 Bri - Bu 10 CHARLIE 11 C3 - Can 11 Car - Chi 12 Cho - Cl 13 Cn - Com 14 Comp - Cou 15 Cov 16 Cu 17 DELTA 18 Da - De 18 De - Di 19 Di - Dru 20 Dry - Dz 21 Echo 22 Ea - Ex 22 Ey 23 FOXTROT 24 Fa - Fi 24 Fl - For 25 Fou - Fu 26 GOLF 27 Ga - Go 27 Gr - Gu 28 HOTEL 29 Ha - Hoo 29 Hou - Hv 30 INDIA 31 Ia -
Espionage and Intelligence Gathering Other Books in the Current Controversies Series
Espionage and Intelligence Gathering Other books in the Current Controversies series: The Abortion Controversy Issues in Adoption Alcoholism Marriage and Divorce Assisted Suicide Medical Ethics Biodiversity Mental Health Capital Punishment The Middle East Censorship Minorities Child Abuse Nationalism and Ethnic Civil Liberties Conflict Computers and Society Native American Rights Conserving the Environment Police Brutality Crime Politicians and Ethics Developing Nations Pollution The Disabled Prisons Drug Abuse Racism Drug Legalization The Rights of Animals Drug Trafficking Sexual Harassment Ethics Sexually Transmitted Diseases Family Violence Smoking Free Speech Suicide Garbage and Waste Teen Addiction Gay Rights Teen Pregnancy and Parenting Genetic Engineering Teens and Alcohol Guns and Violence The Terrorist Attack on Hate Crimes America Homosexuality Urban Terrorism Illegal Drugs Violence Against Women Illegal Immigration Violence in the Media The Information Age Women in the Military Interventionism Youth Violence Espionage and Intelligence Gathering Louise I. Gerdes, Book Editor Daniel Leone,President Bonnie Szumski, Publisher Scott Barbour, Managing Editor Helen Cothran, Senior Editor CURRENT CONTROVERSIES San Diego • Detroit • New York • San Francisco • Cleveland New Haven, Conn. • Waterville, Maine • London • Munich © 2004 by Greenhaven Press. Greenhaven Press is an imprint of The Gale Group, Inc., a division of Thomson Learning, Inc. Greenhaven® and Thomson Learning™ are trademarks used herein under license. For more information, contact Greenhaven Press 27500 Drake Rd. Farmington Hills, MI 48331-3535 Or you can visit our Internet site at http://www.gale.com ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced or used in any form or by any means—graphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution or information storage retrieval systems—without the written permission of the publisher.