1 Introduction: Intelligence Cooperation and Professionalization
Total Page:16
File Type:pdf, Size:1020Kb
Notes 1 Introduction: Intelligence Cooperation and Professionalization 1. Quoted in ‘Douglas Waller’s “Wild Bill Donovan,” on the OSS spymaster’, WP, 27 February 2011. 2. R. Heslop, ‘The modern professionals’, Jane’s Police Review Community, 29 October 2010. 3. See also sources, e.g., ‘“Narrative verdict” at Linda Norgrove inquest’, BBC, and J. Healy, ‘Popular Rage Is Met With Violence in Mideast’, NYT, 15/17 February 2011; ‘England riots: Police could get wider curfew powers’, BBC, 16 August 2011; ‘Foreign Secretary publishes review of consular evacuation procedures’, FCO.gov.uk, 21 February 2012. 4. See also UK Association of Chief Police Officers (ACPO), ‘Introduction to Intelligence- Led Policing’, ACPO Practice Advice, 2007; ‘Intelligence, Tips Drive Operations in Afghanistan’, US DoD, 17 September 2010; ‘Key role of intelli- gence’ in A. Nicoll (ed.), ‘US intensifies drone strikes in Pakistan’, IISS_SC, 16, 36, October 2010; ‘U.S. Kills bin Laden in Intelligence- driven Operation’ and ‘Brigade Leaders Cite Value of Intelligence’, Defense.gov, 2 May 2011. 5. Naturally a huge body of literature can be referenced here, especially as ‘professionalization’ or ‘professionalism’ elements, or at least strives to those ‘ends’, constitute such a large focus of several business studies texts. Notable examples of most relevant texts for this study, with a strong influence on ‘liai- son’-related concerns, are cited; see also ‘Government to Overhaul Anti- Terror Training By Spring’, WB, 8 December 2011. 6. A. MacVean, ‘What is a professional?’, Jane’s Police Review Community, 18 September 2009; see also ‘Editorial: Police leadership presents a bleak and depressing spectacle’, TO, 11 March 2012. 7. Heslop, ‘The modern professionals’. 8. L. Sherman, ‘On the evidence’, Jane’s Police Review Community, 3 December 2010. 9. See also ‘Spooks Get New Workout Routine… For Their Minds’, WB, 7 June 2011. 2 Contributing towards the professionalization of intelligence cooperation 1. See also ‘Legal Attachés’ (or ‘legats’) US FBI agents based abroad in US embas- sies to ‘liaise with foreign law enforcement agencies’ and to assist with crimi- nal investigations concerning the US in the host country – FBI, Legal Attaché Program, March 2004; US DIA, ‘Instructions for DIA Meeting with Soviet Attaché’, Undated/c. 1977–78, accessed on 13/06/2007 via US Declassified Documents Reference System (DDRS) in Georgetown University Library; 163 164 Notes ‘William Hague: Axing small embassies “false economy”’, BBC, 8 September 2010; for Sweden, ‘Budget cuts to force embassy closures: Bildt’, TL, 10 December 2010; F. Hanson, ‘The Digital Revolution Meets Diplomacy’, ISN, 11 January 2011; M. Mazzetti, ‘U.S. Expands Role of Diplomats in Spying’, NYT, 28 November 2010; ‘New Pentagon Intel Office to Target Nuclear, Extremist Threats’, GSN, 24 April 2012. 2. See also G. Corera, ‘Book tells of MI5’s secret past’, BBC, 5 October 2009; B. Porter, ‘Other People’s Mail’, LRB, 31, 22, 19 November 2009, pp. 15–17; G. Corera, ‘“Mole-hunter” breaks 30-year silence’, BBC, 26 January 2010; see also the other related texts cited throughout this study. 3. See also R. Norton- Taylor, ‘The secret servants’, GU, 11 July 2009; ‘Petraeus to officially retire to take CIA job’, CNN, 31 August 2011; ‘Police database will share data on 15 million people’, BBC, 22 June 2011; P. Dunleavy, ‘Intelligence versus evidence-gathering’, WT, 30 August 2011; ‘“Give police access to snoop agency intel”’, TL (Sweden), 8 December 2011; A. Goldman and M. Apuzzo, ‘Spy games come to New York for UN General Assembly’, AP, 4 October 2011; ‘Arab sanctions target Syrian leaders, intelligence’, Reuters, 1 December 2011; J. Lewis, ‘Syria releases the 7/7 “mastermind”’, DT, 4 February 2012. 4. See also Air Vice Marshal S. Hillier, ‘Information Superiority – the Vision’, RUSI Defence Systems, 13, 3, Spring 2011, pp. 56–57. 5. See also M. Rosen, ‘How English evolved into a global language’, BBC, 20 December 2010; for modern translation applications, see e.g., ‘NetBase Taps Basis Technology to Expand Foreign Language Capabilities in Its Enterprise Social Intelligence Platform’, MarketWatch, 14 March 2012. 6. ‘History of Security Monitoring: WWI to 1955’, declassified by the NSA 21/4/1982, PDF, p. 001; M. Streetly, ‘Alive and kicking: ground- based SIGINT proves its adaptability’, JIDR, 1 September 2006; ‘Iraq rebels “hack into US drones”’, BBC, 17 December 2009; Ferris (2010); N. Perlroth, ‘Traveling Light in a Time of Digital Thievery’, NYT, 10 February 2012. 7. ‘History of Security Monitoring: WWI to 1955’, p. 007. 8. Wade’s book is part of the ‘Gale & Polden training series’, located in the special Bowen collection held at Georgetown University; ‘Strong Intelligence Material Housed at Georgetown’, Georgetown University News, 26 October 2010. 9. P. Heap, ‘Comment: The truth behind the MI6 façade’, GU, 20 October 2003; J. Stein, ‘British spy chief fretted over U.S. intelligence leaks’, SpyTalk, September 2010; M. Chulov, ‘SAS and MI6 officers released by Libya’s rebel commanders’, GU, 7 March 2011. 10. See also G. Corera, ‘How vital were Cold War spies?’, BBC, 5 August 2009. 11. For the documents released, see ‘Declassified UKUSA Signals Intelligence Agreement Documents Available’, NSA Press Release, and ‘UKUSA Agreement Release 1940–1956’, NSA/CSS website, 24 June 2010; ‘Newly released GCHQ files: UKUSA Agreement’, The (UK) National Archives, June 2010; see also G. Corera, ‘Details of secret US- UK “spying pact” released’, BBC, and R. Norton- Taylor, ‘Not so secret: deal at the heart of UK- US intelligence’, GU, and R.G. Satter, ‘Details of Cold War intelligence pact published’, AP, 25 June 2010; R. Aldrich, ‘Allied code- breakers co- operate – but not always’, GU, 24 June 2010. 12. See also P. Hennessy, ‘The Secret State: Preparing for the Worst, 1945–2010’, CH, 15 September 2010. Notes 165 13. See also K. O’Brien, ‘International: Managing information overload’, JIR, 1 March 2000; G. Witte, J. Markon and S. Hussain, ‘Terrorist recruiters lever- age the Web’, WP, T.L. Friedman, ‘www.jihad.com’, NYT, and M. Nance, ‘How al Qaeda Dupes Its Followers’, FP, 13/16/15 December 2009; P. Buxbaum, ‘Countering the Internet Jihad’, ISN_SW, and A.J. Rubin, ‘Taliban Overhaul Image in Bid to Win Allies’, NYT, 21 January 2010; ‘Extremist websites “sky- rocketing” says Interpol’, JIW, 22 September 2010; J. Wolf, ‘Britain urges U.S. to take down extremist websites’, Reuters, 28 October 2010; J.F. Burns and M. Helft, ‘YouTube Withdraws Cleric’s Videos’, NYT, 3 November 2010; E. Nakashima, ‘Google to enlist NSA to help it ward off cyberattacks’, WP, and T. Claburn, ‘U.S. “Severely Threatened” By Cyber Attacks’, InformationWeek, 4/2 February 2010; ‘Over 5 billion mobile phone connections worldwide’, BBC, 9 July 2010; ‘Bin Laden’s low- tech lair belies al-Qaida’s sophisticated Internet campaign’, AP, 15 May 2011; E. Bumiller and T. Shanker, ‘War Evolves With Drones, Some Tiny as Bugs’, NYT, 19 June 2011; R. Norton- Taylor, ‘Menwith Hill eavesdropping base undergoes massive expansion’, GU, 1 March 2012. 14. See also F. Dyson, ‘How We Know’, NYRB, 10 March 2011; J. Lanier, ‘The First Church of Robotics’, NYT, 9 August 2010; ‘Northrop Grumman unveils new intelligence aircraft that can be flown unmanned or by pilot’, AP, 9 May 2011; A. Heller, ‘Israeli security head says authorities having tough time keeping up with tech- savvy terrorists’, CP, 2 November 2010; T. Espiner, ‘CESG: Government risks breaches through patchy audits’, ZDNet, 25 January 2011; ‘Hague: UK is under cyber-attack’, BBC, 4 February 2011; ‘“Investing in People is Key” at Cyber Command’, Defense.gov, 17 March 2011; ‘Technology Extends Stratcom’s Priorities’, Defense.gov, 30 March 2011; E. Dou, ‘Is Europe ready to put its data in the clouds?’, Reuters, and ‘Cloud computing’s growing pains: Break- ins and breakdowns’, Economist, 26/28 April 2011; A. Hudson, ‘Are there criminals in the cloud?’, BBC Click, 8 May 2011; M. Shiels, ‘Cisco predicts internet device boom’, BBC, 1 June 2011; ‘Armed Forces Minister – national security in the digital age’, UK MoD, 5 July 2011; N. Shachtman, ‘A crime wave in cyberspace’, WP, and P. Mason, ‘Murdoch: the network defeats the hierarchy’, BBC Blog, 23/10 July 2011; ‘NATO plan to set up online app store’, JDW, 26 August 2011; K.L. Jackson, ‘It’s Official! US Intelligence Community Is Moving To The Cloud!’, Forbes, 17 October 2011; E. Nakashima, ‘Cybersecurity bill promotes exchange of data…’, WP, 1 December 2011; R. Gottemoeller, ‘From Telegraph to Twitter: Arms Control Diplomacy in the Information Age’, State.gov, 17 January 2012; D. Barrie, ‘A signal of ongoing cooperation’, IISS Voices, C. Young, ‘Military Intelligence Redefined: Big Data in the Battlefield’, forbes.com, and E. Montalbano, ‘Army Tests Menu Of Battlefield Intelligence Apps’, InformationWeek, 7/12/14 March 2012; ‘UK “must be ready to deploy cyber weapons”’, JIR, 19 April 2012. 15. See also M. Ballard, ‘Government iPhone ban blamed on Apple secrecy’, ComputerWeekly.com, 22 December 2010; B. Wheeler, ‘How much privacy can smartphone owners expect?’, BBC, C. Williams, ‘Apple iTunes flaw “allowed government spying for 3 years”’, DT, and K. Wagstaff, ‘Will Your Mall Be Tracking Your Cellphone Today?’, TIME, 22–25 November 2011; T. Espiner, ‘CESG: How UK defends against cyberattacks’, ZDNet, 26 April 2011; ‘Regional cybercrime hubs launched across England’, BBC, 8 February 2012. 166 Notes 16. See also ‘Canada’s Participation in the Wideband Global Satellite Communications System’, Backgrounder: forces.gc.ca, 17 January 2012; C. Freeze, ‘Spy case could have done “grave injury” to Canada’s ties with allies’, G&M, 14 March 2012. 17. See also D.T. Dortch, ‘Being smart about intelligence careers’, WP, 12 May 2011. 18. Several further sources exist: P. Hess, ‘U.S. turns to contractors to fill intel- ligence gaps’, AP, 30 August 2008; ‘OSCE Centre supports meeting to promote public- private partnerships in Kyrgyzstan’s fight against terrorism, extremism and radicalisation’, OSCE, 13 August 2009; R.J.