1 Introduction: Intelligence Cooperation and Professionalization

Total Page:16

File Type:pdf, Size:1020Kb

1 Introduction: Intelligence Cooperation and Professionalization Notes 1 Introduction: Intelligence Cooperation and Professionalization 1. Quoted in ‘Douglas Waller’s “Wild Bill Donovan,” on the OSS spymaster’, WP, 27 February 2011. 2. R. Heslop, ‘The modern professionals’, Jane’s Police Review Community, 29 October 2010. 3. See also sources, e.g., ‘“Narrative verdict” at Linda Norgrove inquest’, BBC, and J. Healy, ‘Popular Rage Is Met With Violence in Mideast’, NYT, 15/17 February 2011; ‘England riots: Police could get wider curfew powers’, BBC, 16 August 2011; ‘Foreign Secretary publishes review of consular evacuation procedures’, FCO.gov.uk, 21 February 2012. 4. See also UK Association of Chief Police Officers (ACPO), ‘Introduction to Intelligence- Led Policing’, ACPO Practice Advice, 2007; ‘Intelligence, Tips Drive Operations in Afghanistan’, US DoD, 17 September 2010; ‘Key role of intelli- gence’ in A. Nicoll (ed.), ‘US intensifies drone strikes in Pakistan’, IISS_SC, 16, 36, October 2010; ‘U.S. Kills bin Laden in Intelligence- driven Operation’ and ‘Brigade Leaders Cite Value of Intelligence’, Defense.gov, 2 May 2011. 5. Naturally a huge body of literature can be referenced here, especially as ‘professionalization’ or ‘professionalism’ elements, or at least strives to those ‘ends’, constitute such a large focus of several business studies texts. Notable examples of most relevant texts for this study, with a strong influence on ‘liai- son’-related concerns, are cited; see also ‘Government to Overhaul Anti- Terror Training By Spring’, WB, 8 December 2011. 6. A. MacVean, ‘What is a professional?’, Jane’s Police Review Community, 18 September 2009; see also ‘Editorial: Police leadership presents a bleak and depressing spectacle’, TO, 11 March 2012. 7. Heslop, ‘The modern professionals’. 8. L. Sherman, ‘On the evidence’, Jane’s Police Review Community, 3 December 2010. 9. See also ‘Spooks Get New Workout Routine… For Their Minds’, WB, 7 June 2011. 2 Contributing towards the professionalization of intelligence cooperation 1. See also ‘Legal Attachés’ (or ‘legats’) US FBI agents based abroad in US embas- sies to ‘liaise with foreign law enforcement agencies’ and to assist with crimi- nal investigations concerning the US in the host country – FBI, Legal Attaché Program, March 2004; US DIA, ‘Instructions for DIA Meeting with Soviet Attaché’, Undated/c. 1977–78, accessed on 13/06/2007 via US Declassified Documents Reference System (DDRS) in Georgetown University Library; 163 164 Notes ‘William Hague: Axing small embassies “false economy”’, BBC, 8 September 2010; for Sweden, ‘Budget cuts to force embassy closures: Bildt’, TL, 10 December 2010; F. Hanson, ‘The Digital Revolution Meets Diplomacy’, ISN, 11 January 2011; M. Mazzetti, ‘U.S. Expands Role of Diplomats in Spying’, NYT, 28 November 2010; ‘New Pentagon Intel Office to Target Nuclear, Extremist Threats’, GSN, 24 April 2012. 2. See also G. Corera, ‘Book tells of MI5’s secret past’, BBC, 5 October 2009; B. Porter, ‘Other People’s Mail’, LRB, 31, 22, 19 November 2009, pp. 15–17; G. Corera, ‘“Mole-hunter” breaks 30-year silence’, BBC, 26 January 2010; see also the other related texts cited throughout this study. 3. See also R. Norton- Taylor, ‘The secret servants’, GU, 11 July 2009; ‘Petraeus to officially retire to take CIA job’, CNN, 31 August 2011; ‘Police database will share data on 15 million people’, BBC, 22 June 2011; P. Dunleavy, ‘Intelligence versus evidence-gathering’, WT, 30 August 2011; ‘“Give police access to snoop agency intel”’, TL (Sweden), 8 December 2011; A. Goldman and M. Apuzzo, ‘Spy games come to New York for UN General Assembly’, AP, 4 October 2011; ‘Arab sanctions target Syrian leaders, intelligence’, Reuters, 1 December 2011; J. Lewis, ‘Syria releases the 7/7 “mastermind”’, DT, 4 February 2012. 4. See also Air Vice Marshal S. Hillier, ‘Information Superiority – the Vision’, RUSI Defence Systems, 13, 3, Spring 2011, pp. 56–57. 5. See also M. Rosen, ‘How English evolved into a global language’, BBC, 20 December 2010; for modern translation applications, see e.g., ‘NetBase Taps Basis Technology to Expand Foreign Language Capabilities in Its Enterprise Social Intelligence Platform’, MarketWatch, 14 March 2012. 6. ‘History of Security Monitoring: WWI to 1955’, declassified by the NSA 21/4/1982, PDF, p. 001; M. Streetly, ‘Alive and kicking: ground- based SIGINT proves its adaptability’, JIDR, 1 September 2006; ‘Iraq rebels “hack into US drones”’, BBC, 17 December 2009; Ferris (2010); N. Perlroth, ‘Traveling Light in a Time of Digital Thievery’, NYT, 10 February 2012. 7. ‘History of Security Monitoring: WWI to 1955’, p. 007. 8. Wade’s book is part of the ‘Gale & Polden training series’, located in the special Bowen collection held at Georgetown University; ‘Strong Intelligence Material Housed at Georgetown’, Georgetown University News, 26 October 2010. 9. P. Heap, ‘Comment: The truth behind the MI6 façade’, GU, 20 October 2003; J. Stein, ‘British spy chief fretted over U.S. intelligence leaks’, SpyTalk, September 2010; M. Chulov, ‘SAS and MI6 officers released by Libya’s rebel commanders’, GU, 7 March 2011. 10. See also G. Corera, ‘How vital were Cold War spies?’, BBC, 5 August 2009. 11. For the documents released, see ‘Declassified UKUSA Signals Intelligence Agreement Documents Available’, NSA Press Release, and ‘UKUSA Agreement Release 1940–1956’, NSA/CSS website, 24 June 2010; ‘Newly released GCHQ files: UKUSA Agreement’, The (UK) National Archives, June 2010; see also G. Corera, ‘Details of secret US- UK “spying pact” released’, BBC, and R. Norton- Taylor, ‘Not so secret: deal at the heart of UK- US intelligence’, GU, and R.G. Satter, ‘Details of Cold War intelligence pact published’, AP, 25 June 2010; R. Aldrich, ‘Allied code- breakers co- operate – but not always’, GU, 24 June 2010. 12. See also P. Hennessy, ‘The Secret State: Preparing for the Worst, 1945–2010’, CH, 15 September 2010. Notes 165 13. See also K. O’Brien, ‘International: Managing information overload’, JIR, 1 March 2000; G. Witte, J. Markon and S. Hussain, ‘Terrorist recruiters lever- age the Web’, WP, T.L. Friedman, ‘www.jihad.com’, NYT, and M. Nance, ‘How al Qaeda Dupes Its Followers’, FP, 13/16/15 December 2009; P. Buxbaum, ‘Countering the Internet Jihad’, ISN_SW, and A.J. Rubin, ‘Taliban Overhaul Image in Bid to Win Allies’, NYT, 21 January 2010; ‘Extremist websites “sky- rocketing” says Interpol’, JIW, 22 September 2010; J. Wolf, ‘Britain urges U.S. to take down extremist websites’, Reuters, 28 October 2010; J.F. Burns and M. Helft, ‘YouTube Withdraws Cleric’s Videos’, NYT, 3 November 2010; E. Nakashima, ‘Google to enlist NSA to help it ward off cyberattacks’, WP, and T. Claburn, ‘U.S. “Severely Threatened” By Cyber Attacks’, InformationWeek, 4/2 February 2010; ‘Over 5 billion mobile phone connections worldwide’, BBC, 9 July 2010; ‘Bin Laden’s low- tech lair belies al-Qaida’s sophisticated Internet campaign’, AP, 15 May 2011; E. Bumiller and T. Shanker, ‘War Evolves With Drones, Some Tiny as Bugs’, NYT, 19 June 2011; R. Norton- Taylor, ‘Menwith Hill eavesdropping base undergoes massive expansion’, GU, 1 March 2012. 14. See also F. Dyson, ‘How We Know’, NYRB, 10 March 2011; J. Lanier, ‘The First Church of Robotics’, NYT, 9 August 2010; ‘Northrop Grumman unveils new intelligence aircraft that can be flown unmanned or by pilot’, AP, 9 May 2011; A. Heller, ‘Israeli security head says authorities having tough time keeping up with tech- savvy terrorists’, CP, 2 November 2010; T. Espiner, ‘CESG: Government risks breaches through patchy audits’, ZDNet, 25 January 2011; ‘Hague: UK is under cyber-attack’, BBC, 4 February 2011; ‘“Investing in People is Key” at Cyber Command’, Defense.gov, 17 March 2011; ‘Technology Extends Stratcom’s Priorities’, Defense.gov, 30 March 2011; E. Dou, ‘Is Europe ready to put its data in the clouds?’, Reuters, and ‘Cloud computing’s growing pains: Break- ins and breakdowns’, Economist, 26/28 April 2011; A. Hudson, ‘Are there criminals in the cloud?’, BBC Click, 8 May 2011; M. Shiels, ‘Cisco predicts internet device boom’, BBC, 1 June 2011; ‘Armed Forces Minister – national security in the digital age’, UK MoD, 5 July 2011; N. Shachtman, ‘A crime wave in cyberspace’, WP, and P. Mason, ‘Murdoch: the network defeats the hierarchy’, BBC Blog, 23/10 July 2011; ‘NATO plan to set up online app store’, JDW, 26 August 2011; K.L. Jackson, ‘It’s Official! US Intelligence Community Is Moving To The Cloud!’, Forbes, 17 October 2011; E. Nakashima, ‘Cybersecurity bill promotes exchange of data…’, WP, 1 December 2011; R. Gottemoeller, ‘From Telegraph to Twitter: Arms Control Diplomacy in the Information Age’, State.gov, 17 January 2012; D. Barrie, ‘A signal of ongoing cooperation’, IISS Voices, C. Young, ‘Military Intelligence Redefined: Big Data in the Battlefield’, forbes.com, and E. Montalbano, ‘Army Tests Menu Of Battlefield Intelligence Apps’, InformationWeek, 7/12/14 March 2012; ‘UK “must be ready to deploy cyber weapons”’, JIR, 19 April 2012. 15. See also M. Ballard, ‘Government iPhone ban blamed on Apple secrecy’, ComputerWeekly.com, 22 December 2010; B. Wheeler, ‘How much privacy can smartphone owners expect?’, BBC, C. Williams, ‘Apple iTunes flaw “allowed government spying for 3 years”’, DT, and K. Wagstaff, ‘Will Your Mall Be Tracking Your Cellphone Today?’, TIME, 22–25 November 2011; T. Espiner, ‘CESG: How UK defends against cyberattacks’, ZDNet, 26 April 2011; ‘Regional cybercrime hubs launched across England’, BBC, 8 February 2012. 166 Notes 16. See also ‘Canada’s Participation in the Wideband Global Satellite Communications System’, Backgrounder: forces.gc.ca, 17 January 2012; C. Freeze, ‘Spy case could have done “grave injury” to Canada’s ties with allies’, G&M, 14 March 2012. 17. See also D.T. Dortch, ‘Being smart about intelligence careers’, WP, 12 May 2011. 18. Several further sources exist: P. Hess, ‘U.S. turns to contractors to fill intel- ligence gaps’, AP, 30 August 2008; ‘OSCE Centre supports meeting to promote public- private partnerships in Kyrgyzstan’s fight against terrorism, extremism and radicalisation’, OSCE, 13 August 2009; R.J.
Recommended publications
  • Dragon Magazine Within the Last Cherie Knull Tually Has Been with Us Since Last October, Year
    January 1981 Dragon 1 Dragon Vol. V, No. 7 Vol. V, No. 7 January 1981 Publisher. E. Gary Gygax Editor. Jake Jaquet Assistant editor. Kim Mohan Good-bye 1980, hello 1981. And hello to a tain aspects of role-playing and the benefits Editorial staff . Bryce Knorr couple of new (and pretty, I might add, if I derived therefrom. He and his wife, who is Marilyn Mays won’t get accused of sexism) faces here at the typist and a behind-the-scenes collab- Sales & Circulation . Debbie Chiusano Dragon Publishing. New, or at least rela- orator, have been responsible for more Corey Koebernick tively new, to our sales and circulation de- than a dozen short articles and stories pub- Office staff . Dawn Pekul partment is Debbie Chiusano—Debbie ac- lished in Dragon magazine within the last Cherie Knull tually has been with us since last October, year. Roger’s name is on the alchemist and Roger Raupp but this has been our first opportunity to astrologer NPC articles in this issue, and in Contributing editors . Roger Moore formally welcome her in print. The most Dragon issue #44 he became the first Ed Greenwood recent addition to our organization is author to have two creatures featured in Marilyn Mays, added just last month to our Dragon’s Bestiary in the same magazine. editorial staff. Let’s hear it for the new kids This month’s contributing artists: on the block! With the start of a new year, it seems appro- Morrissey Jeff Lanners priate to reflect a bit on the past year and Roger Raupp Kenneth Rahman We’re also happy to welcome two other look ahead a little to the future.
    [Show full text]
  • Volume X, Issue 2 April 2016 PERSPECTIVES on TERRORISM Volume 10, Issue 2
    ISSN 2334-3745 Volume X, Issue 2 April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 Table of Contents Welcome from the Editor 1 I. Articles ‘Gonna Get Myself Connected’: The Role of Facilitation in Foreign Fighter Mobilizations 2 by Timothy Holman II. Special Correspondence to Perspectives on Terrorism Why Has The Islamic State Changed its Strategy and Mounted the Paris-Brussels Attacks? 24 by David C. Rapoport III. Research Notes Analysing the Processes of Lone-Actor Terrorism: Research Findings 33 by Clare Ellis, Raffaello Pantucci, Jeanine de Roy van Zuijdewijn, Edwin Bakker, Melanie Smith, Benoît Gomis and Simon Palombi Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations 42 by Jeanine de Roy van Zuijdewijn and Edwin Bakker Evaluating CVE: Understanding the Recent Changes to the United Kingdom’s Implementation of Prevent 50 by Caitlin Mastroe In Conversation with Mubin Shaikh: From Salafi Jihadist to Undercover Agent inside the “Toronto 18” Terrorist Group 61 Interview by Stefano Bonino IV. Resources Bibliography: Terrorism Research Literature (Part 2) 73 Compiled and selected by Judith Tinnes V. Book Reviews Counterterrorism Bookshelf: 30 Books on Terrorism & Counter-Terrorism-Related Subjects 103 Reviewed by Joshua Sinai ISSN 2334-3745 i April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 VI. Notes from the Editor Op-Ed: Competing Perspectives on Countering ISIS 118 by Hashim Al-Ribaki Conference Announcement and Call for Proposals 120 About Perspectives on Terrorism 122 ISSN 2334-3745 ii April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 Welcome from the Editor Dear Reader, We are pleased to announce the release of Volume X, Issue 2 (April 2016) of Perspectives on Terrorism at www.terrorismanalysts.com.
    [Show full text]
  • The Ethics of Intelligence Collection Ross W. Bellaby
    What’s the Harm? The Ethics of Intelligence Collection Ross W. Bellaby Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University June 13th, 2011 DECLARATION This work has not previously been accepted in substance for any degree and is not being concurrently submitted in candidature for any degree. Signed ...................................................................... (Ross W. Bellaby) Date ........................................................................ STATEMENT 1 This thesis is the result of my own investigations, except where otherwise stated. Where *correction services have been used, the extent and nature of the correction is clearly marked in a footnote(s). Other sources are acknowledged by footnotes giving explicit references. A bibliography is appended. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ [*this refers to the extent to which the text has been corrected by others] STATEMENT 2 I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter- library loan, and for the title and summary to be made available to outside organisations. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ I hereby give consent for my thesis, if accepted, to be available for photocopying
    [Show full text]
  • Darpa Starts Sleuthing out Disloyal Troops
    UNCLASSIFIED (U) FBI Tampa Division CI Strategic Partnership Newsletter JANUARY 2012 (U) Administrative Note: This product reflects the views of the FBI- Tampa Division and has not been vetted by FBI Headquarters. (U) Handling notice: Although UNCLASSIFIED, this information is property of the FBI and may be distributed only to members of organizations receiving this bulletin, or to cleared defense contractors. Precautions should be taken to ensure this information is stored and/or destroyed in a manner that precludes unauthorized access. 10 JAN 2012 (U) The FBI Tampa Division Counterintelligence Strategic Partnership Newsletter provides a summary of previously reported US government press releases, publications, and news articles from wire services and news organizations relating to counterintelligence, cyber and terrorism threats. The information in this bulletin represents the views and opinions of the cited sources for each article, and the analyst comment is intended only to highlight items of interest to organizations in Florida. This bulletin is provided solely to inform our Domain partners of news items of interest, and does not represent FBI information. In the JANUARY 2012 Issue: Article Title Page NATIONAL SECURITY THREAT NEWS FROM GOVERNMENT AGENCIES: American Jihadist Terrorism: Combating a Complex Threat p. 2 Authorities Uncover Increasing Number of United States-Based Terror Plots p. 3 Chinese Counterfeit COTS Create Chaos For The DoD p. 4 DHS Releases Cyber Strategy Framework p. 6 COUNTERINTELLIGENCE/ECONOMIC ESPIONAGE THREAT ITEMS FROM THE PRESS: United States Homes In on China Spying p. 6 Opinion: China‟s Spies Are Catching Up p. 8 Canadian Politician‟s Chinese Crush Likely „Sexpionage,‟ Former Spies Say p.
    [Show full text]
  • Covert Networks a Comparative Study Of
    COVERT NETWORKS A COMPARATIVE STUDY OF INTELLIGENCE TECHNIQUES USED BY FOREIGN INTELLIGENCE AGENCIES TO WEAPONIZE SOCIAL MEDIA by Sarah Ogar A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts Baltimore, Maryland December 2019 2019 Sarah Ogar All Rights Reserved Abstract From the Bolshevik Revolution to the Brexit Vote, the covert world of intelligence has attempted to influence global events with varying degrees of success. In 2016, one of the most brazen manifestations of Russian intelligence operations was directed against millions of Americans when they voted to elect a new president. Although this was not the first time that Russia attempted to influence an American presidential election, it was undoubtedly the largest attempt in terms of its scope and the most publicized to date. Although much discussion has followed the 2016 election, there have not been much concerted historical analysis which situates the events of 2016 within the global timeline of foreign intelligence collection. This paper argues that the onset of social media has altered intelligence collection in terms of its form, but not in terms of its essence. Using the case study method, this paper illustrates how three different nations apply classical intelligence techniques to the modern environment of social media. This paper examines how China has utilized classical agent recruitment techniques through sites like LinkedIn, how Iran has used classical honey trap techniques through a combination of social media sites, and how Russia has employed the classical tactics of kompromat, forgery, agents of influence and front groups in its modern covert influence campaigns.
    [Show full text]
  • National Security Reform: Problems, Progress, and Prospects
    STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S. Army War College and is the strategic level study agent for issues related to national security and military strategy with emphasis on geostrate- gic analysis. The mission of SSI is to use independent analysis to conduct strategic studies that develop policy recommendations on: • Strategy, planning and policy for joint and combined employment of military forces; • Regional strategic appraisals; • The nature of land warfare; • Matters affecting the Army’s future; • The concepts, philosophy, and theory of strategy; and • Other issues of importance to the leadership of the Army. Studies produced by civilian and military analysts concern topics having strategic implications for the Army, the Department of De- fense, and the larger national security community. In addition to its studies, SSI publishes special reports on topics of special or immediate interest. These include edited proceedings of conferences and topically-oriented roundtables, expanded trip re- ports, and quick reaction responses to senior Army leaders. The Institute provides a valuable analytical capability within the Army to address strategic and other issues in support of Army par- ticipation in national security policy formulation. RETHINKING LEADERSHIP AND “WHOLE OF GOVERNMENT” NATIONAL SECURITY REFORM: PROBLEMS, PROGRESS, AND PROSPECTS Joseph R. Cerami Jeffrey A. Engel Editors May 2010 Visit our website for other free publication downloads http://www.StrategicStudiesInstitute.army.mil/ To rate this publication click here. The views expressed in this report are those of the au- thors and do not necessarily reflect the official policy or position of the Department of the Army, the De- partment of Defense, or the U.S.
    [Show full text]
  • The Glamorization of Espionage in the International Spy Museum
    W&M ScholarWorks Undergraduate Honors Theses Theses, Dissertations, & Master Projects 5-2015 Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum Melanie R. Wiggins College of William and Mary Follow this and additional works at: https://scholarworks.wm.edu/honorstheses Part of the American Film Studies Commons, American Material Culture Commons, American Popular Culture Commons, Other American Studies Commons, and the Sociology of Culture Commons Recommended Citation Wiggins, Melanie R., "Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum" (2015). Undergraduate Honors Theses. Paper 133. https://scholarworks.wm.edu/honorstheses/133 This Honors Thesis is brought to you for free and open access by the Theses, Dissertations, & Master Projects at W&M ScholarWorks. It has been accepted for inclusion in Undergraduate Honors Theses by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum A thesis submitted in partial fulfillment of the requirement for the degree of Bachelor of Arts in American Studies from The College of William and Mary by Melanie Rose Wiggins Accepted for____________________________________________________ (Honors, High Honors, Highest Honors) _________________________________________________________ Alan Braddock, Director _________________________________________________________ Charlie McGovern _________________________________________________________
    [Show full text]
  • Unclassified Unclassified
    UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED Evidence Number Name E23 Pagoda PR E24 Paul Flynn MP E25 PCRC (Political and Constitutional Reform Committee) E26 PLMR (Political Lobbying and Media Relations Ltd) E27 Political Intelligence E28 PRCA (Public Relations Consultants Association) E29 Ranelagh International Ltd E30 Rowan Public Affairs E31 (SPA) Society of Parliamentary Agents E32 (TPA) TaxPayers’ Alliance E33 Transparency International UK E34 UKPAC E35 Unlock Democracy E36 William Dinan and David Miller UNCLASSIFIED UNCLASSIFIED E23: Pagoda PR 1. Is there any reason to think that lobbying per se is a problem; and is there any evidence that abuse of lobbying is widespread or systemic, as opposed to exceptional behaviour by a few? Not in itself, although recent evidence would indicate that some parliamentarians may be susceptible to influence on the basis of inappropriate inducements. This does, as the paper suggests, damage the reputation of lobbying and parliamentary engagement more widely. In this respect, there is a risk that efforts to encourage more lobbying/campaigning from wider sections of society – especially young people – are undermined. We need to proactively promote the positive achievements of lobbying if we are to secure the confidence and participation of the next generation, who will otherwise view Parliament with cynicism. Politicians could do more to say when they have been persuaded by well run, well evidenced and transparent lobbying campaigns. 2. How wide should the definition of lobbying be? What activities should be excluded from the definition? This is extremely difficult because the current definitions rely on determining an attempt to ‘influence’. In many cases such intent is very difficult to determine.
    [Show full text]
  • New Hybrid Connectivity Based Approaches
    Appendix C: Hamiltonian Paths with Double Pheromone Ant Colony System Optimisation This appendix contains the full list of topics of the hamiltonian path identified by the algorithm presented on the PhD thesis of David M.S. Rodrigues Reading the news through their structure: new hybrid connectivity based approaches. This appendix is available in digital format at http://www.davidrodrigues.org/pdfs/phd/ and on the accompanying CD delivered with the printed copy of the thesis. As news follow a hamiltonian path the first news in the following list is connected to the last news of the list to complete the path. • Eurozone debt crisis live: Italian senate passes austerity law | Business | guardian.co.uk • Greek leaders agree to unity government as future hangs in balance | World news | guardian.co.uk • Lucas Papademos to lead Greece’s interim coalition government | World news | guardian.co.uk • The euro will survive – and Britain will join, says Michael Heseltine | World news | guardian.co.uk • Eurozone bailout fund falls short of e1 trillion target | Business | The Guardian • Euro debt crisis: Greek PM George Papandreou to resign | World news | guardian.co.uk • Chaos in Greece amid battle to form a ’government of national salvation’ | World news | The Observer • Eurozone debt crisis: EU members line up to demand ECB intervention | Business | The Guardian 1 • Italy passes austerity measures – clearing way for Berlusconi to quit | Business | guardian.co.uk • European debt crisis live: pressure mounts as finance ministers meet | Business | guardian.co.uk
    [Show full text]
  • Decision Advantage, Decision Confidence
    From AFIO's Intelligencer Journal, Vol. 21, No. 3, Fall/Winter 2015. www.afio.com ©2015 Guide to Study of Intelligence is true whether the decision-maker is a head of state making critical choices in foreign policy, a combatant commander planning details of offense or defense, a drug smuggler looking for an opening in the border, or a financial official making decisions about long term investments. Certainly, some decisions must be made without any contribution from intelligence, in Decision Advantage, which case the decision-maker could be blind. But if significant intelligence is available in support of Decision Confidence decision-making, it can provide a decision advantage so the decision-maker is better informed and under- The Why of Intelligence stands more aspects of an issue in ways that would not be possible without the intelligence. This decision advantage can be especially critical when adversaries by John MacGaffin and Peter Oleson or competitors do not possess the same insights or do not know what the opposing decision-maker does. hy have an intelligence service? If one It is also important to recognize that the deci- believes that intelligence is the world’s sion advantage that comes as a result of pertinent, second oldest profession, obviously the accurate intelligence is always accompanied by a cor- W responding disadvantage to an adversary, competitor or need for intelligence has long been recognized. One should note that many rely on intelligence for various others involved. The advantage-disadvantage dynamic reasons. Nations have used intelligence since ancient represents a zero-sum situation. The offsetting dis- times.1 But others do too.2 Intelligence is important advantage may sometimes be unintended, but most to law enforcement and the private sector.
    [Show full text]
  • The Henry Jackson Society and the Degeneration of British
    Tom Griffin Hilary Aked David Miller Sarah Marusek THE HENRY JACKSON SOCIETY AND THE DEGENERATION JUNE 2015 OF BRITISH NEOCONSERVATISM: LIBERAL INTERVENTIONISM, ISLAMOPHOBIA AND THE ‘WAR ON TERROR’ Sponsored by: ISBN 978-0-9570274-4-2 AUTHOR PROFILES David Miller is Professor of Sociology in the Department of Social and Policy Sciences at the University of Bath. He is an RCUK Global Uncertainties Leader- ship Fellow (2013-15) conducting Tom Griffin is a freelance writer and a project to examine the construc- researcher and a doctoral candidate tion, use and impact of expertise on at the University of Bath. He is a ‘terrorism’. He has written widely on contributing editor of OpenDemoc- propaganda, spin and lobbying and racy’s OurKingdom blog and writes for was co-founder of Public Interest Investigations a non profit Spinwatch. He is a former executive company of which Spinwatch and Powerbase are projects. editor and political correspondent of Recent publications include: A Century of Spin: How Public the Irish World. Relations Became the Cutting Edge of Corporate Power (Pluto Press, 2008, co-author); Neoliberal Scotland (Cam- bridge Scholars, 2010, co-editor); Critical Terrorism Studies Dr Sarah Marusek is a freelance since 11 September 2001. What has been learned? (Rout- researcher and writer. She has a PhD in ledge, 2014, co-editor). Researching the Powerful: Public social science from the Maxwell School Sociology in Action (Routledge, forthcoming, co-editor). of Syracuse University. Her doctoral research focused on Islamic activism in Lebanon and was funded by the gener- Hilary Aked is a freelance researcher ous support of the Mellon Foundation.
    [Show full text]
  • Assessing Al-Qaeda's Chemical Threat
    ISSN 1988-5237 AthenaIntelligence.org Assessing al-Qaeda’s Chemical T hreat René Pita Athena Paper, Vol. 2, No 2 Article 3/5 April 17, 2007 www.athenaintelligence.org 27 ISSN 1988-5237 AthenaIntelligence.org Introduction After the 11 September 2001 (9/11) terrorist attacks in the United States, there is a high perception of risk of possible attacks with chemical weapons (CW ), especially by groups affiliated or associated with the al-Qaeda terrorist network. Earlier, in 1994 and 1995, Aum Shinrikyo, a religious organization in Japan, used sarin, a nerve chemical warfare agent, in attacks in Matsumoto City and on the Tokyo subway, causing a large number of casualties. These terrorist attacks had a big impact on the chemical defence and intelligence communities but not on other circles, perhaps because a chemical attack by a religious organization in Japan seemed something far removed from the reality of the rest of the world. But this changed after 9/11 when the mailing of letters containing anthrax spores, accompanied by images of the attacks on the W orld Trade Center towers, increased the concern about weapons of mass destruction (W MD) attacks, including by CW . As a religious terrorist group, al-Qaeda does not fit the assumption made by Brian Jenkins in 1975 that “terrorists want a lot of people watching and a lot of people listening, and not a lot of people dead.”1 This statement fits better with secular terrorist groups. But for religious terrorist groups like al-Qaeda, “divine duty” results in disappearance of moral restraints that would justify “a lot of people dead” in their terrorist attacks,2 such as the 9/11 ones.
    [Show full text]