1 Introduction: Intelligence Cooperation and Professionalization
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Dragon Magazine Within the Last Cherie Knull Tually Has Been with Us Since Last October, Year
January 1981 Dragon 1 Dragon Vol. V, No. 7 Vol. V, No. 7 January 1981 Publisher. E. Gary Gygax Editor. Jake Jaquet Assistant editor. Kim Mohan Good-bye 1980, hello 1981. And hello to a tain aspects of role-playing and the benefits Editorial staff . Bryce Knorr couple of new (and pretty, I might add, if I derived therefrom. He and his wife, who is Marilyn Mays won’t get accused of sexism) faces here at the typist and a behind-the-scenes collab- Sales & Circulation . Debbie Chiusano Dragon Publishing. New, or at least rela- orator, have been responsible for more Corey Koebernick tively new, to our sales and circulation de- than a dozen short articles and stories pub- Office staff . Dawn Pekul partment is Debbie Chiusano—Debbie ac- lished in Dragon magazine within the last Cherie Knull tually has been with us since last October, year. Roger’s name is on the alchemist and Roger Raupp but this has been our first opportunity to astrologer NPC articles in this issue, and in Contributing editors . Roger Moore formally welcome her in print. The most Dragon issue #44 he became the first Ed Greenwood recent addition to our organization is author to have two creatures featured in Marilyn Mays, added just last month to our Dragon’s Bestiary in the same magazine. editorial staff. Let’s hear it for the new kids This month’s contributing artists: on the block! With the start of a new year, it seems appro- Morrissey Jeff Lanners priate to reflect a bit on the past year and Roger Raupp Kenneth Rahman We’re also happy to welcome two other look ahead a little to the future. -
Volume X, Issue 2 April 2016 PERSPECTIVES on TERRORISM Volume 10, Issue 2
ISSN 2334-3745 Volume X, Issue 2 April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 Table of Contents Welcome from the Editor 1 I. Articles ‘Gonna Get Myself Connected’: The Role of Facilitation in Foreign Fighter Mobilizations 2 by Timothy Holman II. Special Correspondence to Perspectives on Terrorism Why Has The Islamic State Changed its Strategy and Mounted the Paris-Brussels Attacks? 24 by David C. Rapoport III. Research Notes Analysing the Processes of Lone-Actor Terrorism: Research Findings 33 by Clare Ellis, Raffaello Pantucci, Jeanine de Roy van Zuijdewijn, Edwin Bakker, Melanie Smith, Benoît Gomis and Simon Palombi Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations 42 by Jeanine de Roy van Zuijdewijn and Edwin Bakker Evaluating CVE: Understanding the Recent Changes to the United Kingdom’s Implementation of Prevent 50 by Caitlin Mastroe In Conversation with Mubin Shaikh: From Salafi Jihadist to Undercover Agent inside the “Toronto 18” Terrorist Group 61 Interview by Stefano Bonino IV. Resources Bibliography: Terrorism Research Literature (Part 2) 73 Compiled and selected by Judith Tinnes V. Book Reviews Counterterrorism Bookshelf: 30 Books on Terrorism & Counter-Terrorism-Related Subjects 103 Reviewed by Joshua Sinai ISSN 2334-3745 i April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 VI. Notes from the Editor Op-Ed: Competing Perspectives on Countering ISIS 118 by Hashim Al-Ribaki Conference Announcement and Call for Proposals 120 About Perspectives on Terrorism 122 ISSN 2334-3745 ii April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 Welcome from the Editor Dear Reader, We are pleased to announce the release of Volume X, Issue 2 (April 2016) of Perspectives on Terrorism at www.terrorismanalysts.com. -
The Ethics of Intelligence Collection Ross W. Bellaby
What’s the Harm? The Ethics of Intelligence Collection Ross W. Bellaby Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University June 13th, 2011 DECLARATION This work has not previously been accepted in substance for any degree and is not being concurrently submitted in candidature for any degree. Signed ...................................................................... (Ross W. Bellaby) Date ........................................................................ STATEMENT 1 This thesis is the result of my own investigations, except where otherwise stated. Where *correction services have been used, the extent and nature of the correction is clearly marked in a footnote(s). Other sources are acknowledged by footnotes giving explicit references. A bibliography is appended. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ [*this refers to the extent to which the text has been corrected by others] STATEMENT 2 I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter- library loan, and for the title and summary to be made available to outside organisations. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ I hereby give consent for my thesis, if accepted, to be available for photocopying -
Darpa Starts Sleuthing out Disloyal Troops
UNCLASSIFIED (U) FBI Tampa Division CI Strategic Partnership Newsletter JANUARY 2012 (U) Administrative Note: This product reflects the views of the FBI- Tampa Division and has not been vetted by FBI Headquarters. (U) Handling notice: Although UNCLASSIFIED, this information is property of the FBI and may be distributed only to members of organizations receiving this bulletin, or to cleared defense contractors. Precautions should be taken to ensure this information is stored and/or destroyed in a manner that precludes unauthorized access. 10 JAN 2012 (U) The FBI Tampa Division Counterintelligence Strategic Partnership Newsletter provides a summary of previously reported US government press releases, publications, and news articles from wire services and news organizations relating to counterintelligence, cyber and terrorism threats. The information in this bulletin represents the views and opinions of the cited sources for each article, and the analyst comment is intended only to highlight items of interest to organizations in Florida. This bulletin is provided solely to inform our Domain partners of news items of interest, and does not represent FBI information. In the JANUARY 2012 Issue: Article Title Page NATIONAL SECURITY THREAT NEWS FROM GOVERNMENT AGENCIES: American Jihadist Terrorism: Combating a Complex Threat p. 2 Authorities Uncover Increasing Number of United States-Based Terror Plots p. 3 Chinese Counterfeit COTS Create Chaos For The DoD p. 4 DHS Releases Cyber Strategy Framework p. 6 COUNTERINTELLIGENCE/ECONOMIC ESPIONAGE THREAT ITEMS FROM THE PRESS: United States Homes In on China Spying p. 6 Opinion: China‟s Spies Are Catching Up p. 8 Canadian Politician‟s Chinese Crush Likely „Sexpionage,‟ Former Spies Say p. -
Covert Networks a Comparative Study Of
COVERT NETWORKS A COMPARATIVE STUDY OF INTELLIGENCE TECHNIQUES USED BY FOREIGN INTELLIGENCE AGENCIES TO WEAPONIZE SOCIAL MEDIA by Sarah Ogar A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts Baltimore, Maryland December 2019 2019 Sarah Ogar All Rights Reserved Abstract From the Bolshevik Revolution to the Brexit Vote, the covert world of intelligence has attempted to influence global events with varying degrees of success. In 2016, one of the most brazen manifestations of Russian intelligence operations was directed against millions of Americans when they voted to elect a new president. Although this was not the first time that Russia attempted to influence an American presidential election, it was undoubtedly the largest attempt in terms of its scope and the most publicized to date. Although much discussion has followed the 2016 election, there have not been much concerted historical analysis which situates the events of 2016 within the global timeline of foreign intelligence collection. This paper argues that the onset of social media has altered intelligence collection in terms of its form, but not in terms of its essence. Using the case study method, this paper illustrates how three different nations apply classical intelligence techniques to the modern environment of social media. This paper examines how China has utilized classical agent recruitment techniques through sites like LinkedIn, how Iran has used classical honey trap techniques through a combination of social media sites, and how Russia has employed the classical tactics of kompromat, forgery, agents of influence and front groups in its modern covert influence campaigns. -
National Security Reform: Problems, Progress, and Prospects
STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S. Army War College and is the strategic level study agent for issues related to national security and military strategy with emphasis on geostrate- gic analysis. The mission of SSI is to use independent analysis to conduct strategic studies that develop policy recommendations on: • Strategy, planning and policy for joint and combined employment of military forces; • Regional strategic appraisals; • The nature of land warfare; • Matters affecting the Army’s future; • The concepts, philosophy, and theory of strategy; and • Other issues of importance to the leadership of the Army. Studies produced by civilian and military analysts concern topics having strategic implications for the Army, the Department of De- fense, and the larger national security community. In addition to its studies, SSI publishes special reports on topics of special or immediate interest. These include edited proceedings of conferences and topically-oriented roundtables, expanded trip re- ports, and quick reaction responses to senior Army leaders. The Institute provides a valuable analytical capability within the Army to address strategic and other issues in support of Army par- ticipation in national security policy formulation. RETHINKING LEADERSHIP AND “WHOLE OF GOVERNMENT” NATIONAL SECURITY REFORM: PROBLEMS, PROGRESS, AND PROSPECTS Joseph R. Cerami Jeffrey A. Engel Editors May 2010 Visit our website for other free publication downloads http://www.StrategicStudiesInstitute.army.mil/ To rate this publication click here. The views expressed in this report are those of the au- thors and do not necessarily reflect the official policy or position of the Department of the Army, the De- partment of Defense, or the U.S. -
The Glamorization of Espionage in the International Spy Museum
W&M ScholarWorks Undergraduate Honors Theses Theses, Dissertations, & Master Projects 5-2015 Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum Melanie R. Wiggins College of William and Mary Follow this and additional works at: https://scholarworks.wm.edu/honorstheses Part of the American Film Studies Commons, American Material Culture Commons, American Popular Culture Commons, Other American Studies Commons, and the Sociology of Culture Commons Recommended Citation Wiggins, Melanie R., "Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum" (2015). Undergraduate Honors Theses. Paper 133. https://scholarworks.wm.edu/honorstheses/133 This Honors Thesis is brought to you for free and open access by the Theses, Dissertations, & Master Projects at W&M ScholarWorks. It has been accepted for inclusion in Undergraduate Honors Theses by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum A thesis submitted in partial fulfillment of the requirement for the degree of Bachelor of Arts in American Studies from The College of William and Mary by Melanie Rose Wiggins Accepted for____________________________________________________ (Honors, High Honors, Highest Honors) _________________________________________________________ Alan Braddock, Director _________________________________________________________ Charlie McGovern _________________________________________________________ -
Unclassified Unclassified
UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED Evidence Number Name E23 Pagoda PR E24 Paul Flynn MP E25 PCRC (Political and Constitutional Reform Committee) E26 PLMR (Political Lobbying and Media Relations Ltd) E27 Political Intelligence E28 PRCA (Public Relations Consultants Association) E29 Ranelagh International Ltd E30 Rowan Public Affairs E31 (SPA) Society of Parliamentary Agents E32 (TPA) TaxPayers’ Alliance E33 Transparency International UK E34 UKPAC E35 Unlock Democracy E36 William Dinan and David Miller UNCLASSIFIED UNCLASSIFIED E23: Pagoda PR 1. Is there any reason to think that lobbying per se is a problem; and is there any evidence that abuse of lobbying is widespread or systemic, as opposed to exceptional behaviour by a few? Not in itself, although recent evidence would indicate that some parliamentarians may be susceptible to influence on the basis of inappropriate inducements. This does, as the paper suggests, damage the reputation of lobbying and parliamentary engagement more widely. In this respect, there is a risk that efforts to encourage more lobbying/campaigning from wider sections of society – especially young people – are undermined. We need to proactively promote the positive achievements of lobbying if we are to secure the confidence and participation of the next generation, who will otherwise view Parliament with cynicism. Politicians could do more to say when they have been persuaded by well run, well evidenced and transparent lobbying campaigns. 2. How wide should the definition of lobbying be? What activities should be excluded from the definition? This is extremely difficult because the current definitions rely on determining an attempt to ‘influence’. In many cases such intent is very difficult to determine. -
New Hybrid Connectivity Based Approaches
Appendix C: Hamiltonian Paths with Double Pheromone Ant Colony System Optimisation This appendix contains the full list of topics of the hamiltonian path identified by the algorithm presented on the PhD thesis of David M.S. Rodrigues Reading the news through their structure: new hybrid connectivity based approaches. This appendix is available in digital format at http://www.davidrodrigues.org/pdfs/phd/ and on the accompanying CD delivered with the printed copy of the thesis. As news follow a hamiltonian path the first news in the following list is connected to the last news of the list to complete the path. • Eurozone debt crisis live: Italian senate passes austerity law | Business | guardian.co.uk • Greek leaders agree to unity government as future hangs in balance | World news | guardian.co.uk • Lucas Papademos to lead Greece’s interim coalition government | World news | guardian.co.uk • The euro will survive – and Britain will join, says Michael Heseltine | World news | guardian.co.uk • Eurozone bailout fund falls short of e1 trillion target | Business | The Guardian • Euro debt crisis: Greek PM George Papandreou to resign | World news | guardian.co.uk • Chaos in Greece amid battle to form a ’government of national salvation’ | World news | The Observer • Eurozone debt crisis: EU members line up to demand ECB intervention | Business | The Guardian 1 • Italy passes austerity measures – clearing way for Berlusconi to quit | Business | guardian.co.uk • European debt crisis live: pressure mounts as finance ministers meet | Business | guardian.co.uk -
Decision Advantage, Decision Confidence
From AFIO's Intelligencer Journal, Vol. 21, No. 3, Fall/Winter 2015. www.afio.com ©2015 Guide to Study of Intelligence is true whether the decision-maker is a head of state making critical choices in foreign policy, a combatant commander planning details of offense or defense, a drug smuggler looking for an opening in the border, or a financial official making decisions about long term investments. Certainly, some decisions must be made without any contribution from intelligence, in Decision Advantage, which case the decision-maker could be blind. But if significant intelligence is available in support of Decision Confidence decision-making, it can provide a decision advantage so the decision-maker is better informed and under- The Why of Intelligence stands more aspects of an issue in ways that would not be possible without the intelligence. This decision advantage can be especially critical when adversaries by John MacGaffin and Peter Oleson or competitors do not possess the same insights or do not know what the opposing decision-maker does. hy have an intelligence service? If one It is also important to recognize that the deci- believes that intelligence is the world’s sion advantage that comes as a result of pertinent, second oldest profession, obviously the accurate intelligence is always accompanied by a cor- W responding disadvantage to an adversary, competitor or need for intelligence has long been recognized. One should note that many rely on intelligence for various others involved. The advantage-disadvantage dynamic reasons. Nations have used intelligence since ancient represents a zero-sum situation. The offsetting dis- times.1 But others do too.2 Intelligence is important advantage may sometimes be unintended, but most to law enforcement and the private sector. -
The Henry Jackson Society and the Degeneration of British
Tom Griffin Hilary Aked David Miller Sarah Marusek THE HENRY JACKSON SOCIETY AND THE DEGENERATION JUNE 2015 OF BRITISH NEOCONSERVATISM: LIBERAL INTERVENTIONISM, ISLAMOPHOBIA AND THE ‘WAR ON TERROR’ Sponsored by: ISBN 978-0-9570274-4-2 AUTHOR PROFILES David Miller is Professor of Sociology in the Department of Social and Policy Sciences at the University of Bath. He is an RCUK Global Uncertainties Leader- ship Fellow (2013-15) conducting Tom Griffin is a freelance writer and a project to examine the construc- researcher and a doctoral candidate tion, use and impact of expertise on at the University of Bath. He is a ‘terrorism’. He has written widely on contributing editor of OpenDemoc- propaganda, spin and lobbying and racy’s OurKingdom blog and writes for was co-founder of Public Interest Investigations a non profit Spinwatch. He is a former executive company of which Spinwatch and Powerbase are projects. editor and political correspondent of Recent publications include: A Century of Spin: How Public the Irish World. Relations Became the Cutting Edge of Corporate Power (Pluto Press, 2008, co-author); Neoliberal Scotland (Cam- bridge Scholars, 2010, co-editor); Critical Terrorism Studies Dr Sarah Marusek is a freelance since 11 September 2001. What has been learned? (Rout- researcher and writer. She has a PhD in ledge, 2014, co-editor). Researching the Powerful: Public social science from the Maxwell School Sociology in Action (Routledge, forthcoming, co-editor). of Syracuse University. Her doctoral research focused on Islamic activism in Lebanon and was funded by the gener- Hilary Aked is a freelance researcher ous support of the Mellon Foundation. -
Assessing Al-Qaeda's Chemical Threat
ISSN 1988-5237 AthenaIntelligence.org Assessing al-Qaeda’s Chemical T hreat René Pita Athena Paper, Vol. 2, No 2 Article 3/5 April 17, 2007 www.athenaintelligence.org 27 ISSN 1988-5237 AthenaIntelligence.org Introduction After the 11 September 2001 (9/11) terrorist attacks in the United States, there is a high perception of risk of possible attacks with chemical weapons (CW ), especially by groups affiliated or associated with the al-Qaeda terrorist network. Earlier, in 1994 and 1995, Aum Shinrikyo, a religious organization in Japan, used sarin, a nerve chemical warfare agent, in attacks in Matsumoto City and on the Tokyo subway, causing a large number of casualties. These terrorist attacks had a big impact on the chemical defence and intelligence communities but not on other circles, perhaps because a chemical attack by a religious organization in Japan seemed something far removed from the reality of the rest of the world. But this changed after 9/11 when the mailing of letters containing anthrax spores, accompanied by images of the attacks on the W orld Trade Center towers, increased the concern about weapons of mass destruction (W MD) attacks, including by CW . As a religious terrorist group, al-Qaeda does not fit the assumption made by Brian Jenkins in 1975 that “terrorists want a lot of people watching and a lot of people listening, and not a lot of people dead.”1 This statement fits better with secular terrorist groups. But for religious terrorist groups like al-Qaeda, “divine duty” results in disappearance of moral restraints that would justify “a lot of people dead” in their terrorist attacks,2 such as the 9/11 ones.