Cyber, Intelligence, and Security

Total Page:16

File Type:pdf, Size:1020Kb

Cyber, Intelligence, and Security Cyber, Intelligence, and Security Volume 1 | No. 1 | January 2017 Jointness in Intelligence Organizations: Theory Put into Practice Kobi Michael, David Siman-Tov, and Oren Yoeli The United States’ Cyber Warfare History: Implications on Modern Cyber Operational Structures and Policymaking Omry Haizler Lessons Learned from the “Viral Caliphate”: Viral Effect as a New PSYOPS Tool? Miron Lakomy An Intelligence Civil War: “HUMINT’” vs. “TECHINT” Matthew Crosston and Frank Valli Israeli Cyberspace Regulation: A Conceptual Framework, Inherent Challenges, and Normative Recommendations Gabi Siboni and Ido Sivan-Sevilla Artificial Intelligence in Cybersecurity Nadine Wirkuttis and Hadas Klein Pedal to the Metal? The Race to Develop Secure Autonomous Cars Andrew Tabas Cyber, Intelligence, and Security Volume 1 | No. 1 | January 2017 Contents Editor’s Foreword | 3 Jointness in Intelligence Organizations: Theory Put into Practice | 5 Kobi Michael, David Siman-Tov, and Oren Yoeli The United States’ Cyber Warfare History: Implications on Modern Cyber Operational Structures and Policymaking | 31 Omry Haizler Lessons Learned from the “Viral Caliphate”: Viral E"ect as a New PSYOPS Tool? | 47 Miron Lakomy An Intelligence Civil War: “HUMINT’” vs. “TECHINT” | 67 Matthew Crosston and Frank Valli Israeli Cyberspace Regulation: A Conceptual Framework, Inherent Challenges, and Normative Recommendations | 83 Gabi Siboni and Ido Sivan-Sevilla Arti#cial Intelligence in Cybersecurity | 103 Nadine Wirkuttis and Hadas Klein Pedal to the Metal? The Race to Develop Secure Autonomous Cars | 121 Andrew Tabas The purpose of Cyber, Intelligence, and Security is to stimulate Cyber, and enrich the public debate on related issues. Intelligence, Cyber, Intelligence, and Security is a refereed journal published and Security three times a year within the framework of the Cyber Security Program at the Institute for National Security Studies. Articles are written by INSS researchers and guest contributors. The views presented here are those of the authors alone. The Institute for National Security Studies is a public bene"t company. Editor in Chief: Amos Yadlin Editor: Gabi Siboni Journal Coordinator: Hadas Klein Asst. Coordinator: Gal Perl Finkel Editorial Advisory Board • Myriam Dunn Cavelty, Swiss Federal • Je#rey A. Larsen, Science Applications Institute of Technology Zurich, Switzerland International Corporation, US • Frank J. Cillu#o, George Washington • James Lewis, Center for Strategic and University, US International Studies, US • Stephen J. Cimbala, Penn State • Theo Neethling, University of the Free University, US State, South Africa • Rut Diamint, Universidad Torcuato Di • John Nomikos, Research Institute for Tella, Argentina European and American Studies, Greece • Maria Raquel Freire, University of • T.V. Paul, McGill University, Canada Coimbra, Portugal • Glen Segell, Securitatem Vigilate, Ireland • Peter Viggo Jakobson, Royal Danish • Bruno Tertrais, Fondation pour la Defence College, Denmark Recherché Strategique, France • Sunjoy Joshi, Observer Research • James J. Wirtz, Naval Postgraduate Foundation, India School, US • Efraim Karsh, King’s College London, • Ricardo Israel Zipper, Universidad United Kingdom Autónoma de Chile, Chile • Kai Michael Kenkel, Ponti"cal Catholic • Daniel Zirker, University of Waikato, University of Rio de Janeiro, Brazil New Zealand Graphic Design: Michal Semo-Kovetz, Yael Bieber, Tel Aviv University Graphic Design Studio Printing: Elinir The Institute for National Security Studies (INSS) 40 Haim Levanon • POB 39950 • Tel Aviv 6997556 • Israel Tel: +972-3-640-0400 • Fax: +972-3-744-7590 • E-mail: [email protected] Cyber, Intelligence, and Security is published in English and Hebrew. The full text is available on the Institute’s website: www.inss.org.il © 2017. All rights reserved. ISSN 2519-6677 (print) • E-ISSN 2519-6685 (online) Editor’s Foreword Dear Readers, The periodical Cyberspace, Intelligence, and Security is proud to present LWV¿UVWLVVXH,WLVDGLUHFWFRQWLQXDWLRQRI Military and Strategic Affairs , ZKLFKWKH,QVWLWXWHIRU1DWLRQDO6HFXULW\6WXGLHVKDVSXEOLVKHGIRUWKHODVW HLJKW\HDUV7KHQHZMRXUQDOLVDLPHGDWZULWHUVDQGUHDGHUVLQWHUHVWHGRU ZRUNLQJLQWKHPDQ\¿HOGVRIF\EHUVSDFHLQFOXGLQJDFDGHPLDSROLF\PDNLQJ DQGJRYHUQPHQWWKHDUP\LQWHOOLJHQFHDJHQFLHVHFRQRPLFVODZDQGRI FRXUVHWKRVHZKRDUHGHYHORSLQJDQGSURYLGLQJVROXWLRQVWRF\EHUVSDFH SUREOHPVDVZHOODVWKHSDUWLHVLQLQGXVWU\ZKRUHSUHVHQWWKHFXVWRPHUVRI WKRVHVROXWLRQV 7KHQHZMRXUQDOZLOOGHDOZLWKDUDQJHRIWRSLFVLQFOXGLQJJOREDOSROLF\ DQGVWUDWHJ\LQF\EHUVSDFHUHJXODWLRQRIF\EHUVSDFHVDIHJXDUGLQJQDWLRQDO UHVLOLHQFHLQF\EHUVSDFHDQGGHIHQVHRIFULWLFDOQDWLRQDOLQIUDVWUXFWXUHV7KH MRXUQDOZLOODOVRGHYRWHVSDFHWRWRSLFVUHODWHGWRF\EHUIRUFHFRQVWUXFWLRQ VXFKDVWKHKXPDQUHVRXUFHVPHDQVRIZDUIDUHGRFWULQHRUJDQL]DWLRQ WUDLQLQJDQGFRPPDQGDVZHOODVDVSHFWVRIGHIHQVLYHDQGRIIHQVLYHF\EHUZDU 7KHMRXUQDOZLOOLQYLWHH[SHUWVWRFRQWULEXWHDUWLFOHVLQOHJDODQGHWKLFDO LVVXHVSULYDF\SURWHFWLRQLQDGGLWLRQWRUHODWLRQVEHWZHHQVWDWHVDQGWKH JOREDOWHFKQRORJLFDOJLDQWVRIF\EHUVSDFH6SHFLDOLVWVZLOOEHFDOOHGXSRQWR ZULWHDERXWVWUDWHJLFDQGPLOLWDU\WKRXJKWWKHGHSOR\PHQWRIPLOLWDU\IRUFH LQF\EHUVSDFHSURSDJDQGDRSHUDWLRQVDQDO\VLVRIF\EHULQFLGHQWVDQGWKHLU UDPL¿FDWLRQVDVZHOODVWKHEDODQFHRIGHWHUUHQFHDQDO\VLVRIF\EHUWKUHDWV DQGULVNVLQWHOOLJHQFHLQIRUPDWLRQVKDULQJDQGSXEOLFSULYDWHSDUWQHUVKLSV DLPHGDWLPSURYLQJF\EHUGHIHQVH7HFKQRORJLFDOH[SHUWVZLOOEHHQFRXUDJHG WRZULWHDERXWWHFKQRORJLFDOGHYHORSPHQWVFDVHVWXGLHVUHVHDUFKPHWKRGV DQGWKHGHYHORSPHQWRISURFHVVHVFRQQHFWHGWRF\EHUVSDFH $FDOOIRUSDSHUVDQGZULWLQJLQVWUXFWLRQVZLOOEHDSSHQGHGWRHYHU\LVVXH RIWKHMRXUQDODQGZLOOEHDYDLODEOHDWWKH,166ZHEVLWH ,KRSH\RXZLOO¿QGWKLVMRXUQDODQLPSRUWDQWIRUXPIRUOHDUQLQJDQG GHYHORSLQJNQRZOHGJHDERXWF\EHUVSDFHLQWHOOLJHQFHDQGVHFXULW\ 'U*DEL6LERQL Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017 3 Jointness in Intelligence Organizations: Theory Put into Practice Kobi Michael, David Siman-Tov, and Oren Yoeli Jointness—a concept popular in recent decades in military, intelligence, and civilian systems—represents a change in the way organizations function in a complex and challenging environment, which is characterized by a networked structure, or multiple connections among various entities. The most striking difference between cooperation and jointness is the process of fusion, which is typical of jointness. While cooperation preserves distinct organizational settings, authority, and areas of responsibility, in jointness we see new organizational formats, which represent a synergy that is greater than the sum of all the existing capabilities. This essay focuses on jointness in intelligence. New ways of thinking over the past years have led to the breakdown of the compartmentalizing of intelligence organizations and have given rise to models of jointness within intelligence organizations, military forces, and civilian entities so that they can carry out complex missions. This essay surveys the theoretical and practical development of the concept of jointness and presents four archetypes of jointness, based on several Israeli and American case histories. These case histories indicate that jointness has not always been applied accurately. The success of jointness depends upon several essential components that may be defined as its ecology. The most prominent is organizational freedom, which provides the space where it is possible and, indeed, recommended to provide autonomy to Dr. Kobi Michael is a senior research fellow at INSS. David Siman-Tov is a research fellow at INSS. Oren Yoeli is an intern at INSS. Cyber, Intelligence, and Security | Volume 1 | No. 1 | January 2017 5 KOBI MICHAEL, DAVID SIMAN$TOV, AND OREN YOELI | JOINTNESS IN INTELLIGENCE ORGANIZATIONS 6 various working echelons; this autonomy allows for flexibility and creativity even if it deviates from familiar modes of action. Keywords: jointness, the intelligence community, intel, learning processes Introduction 7KHFRQFHSWRIMRLQWQHVVSRSXODULQUHFHQWGHFDGHVLQPLOLWDU\LQWHOOLJHQFH | Volume 1 | No. 1 | January 2017 2017 January | 1 No. | 1 Volume | DQGFLYLOLDQV\VWHPVUHSUHVHQWVDFKDQJHLQWKHZD\RUJDQL]DWLRQVRSHUDWHLQ DFRPSOH[DQGFKDOOHQJLQJHQYLURQPHQW7KLVHQYLURQPHQWLVFKDUDFWHUL]HG E\DQHWZRUNHGVWUXFWXUHWKDWLVPXOWLSOHFRQQHFWLRQVDPRQJHQWLWLHV -RLQWQHVVLVGLVWLQJXLVKHGIURPFRRSHUDWLRQE\WKHSURFHVVRIIXVLRQ:KLOH FRRSHUDWLRQSUHVHUYHVGLVWLQFWRUJDQL]DWLRQDOVHWWLQJVDXWKRULW\DQGDUHDV RIUHVSRQVLELOLW\LQFRQWUDVWWKHSURFHVVRIIXVLRQLQMRLQWQHVVFUHDWHVQHZ RUJDQL]DWLRQDOIRUPDWVDQGV\QHUJ\WKDWLVJUHDWHUWKDQWKHVXPRIDOOWKH Cyber, Intelligence, and Security Security and Intelligence, Cyber, H[LVWLQJFDSDELOLWLHV*HQHUDOO\VSHDNLQJRUJDQL]DWLRQVVK\DZD\IURP MRLQWQHVV\HWLQDUHDOLW\FKDUDFWHUL]HGE\FULVHVDQGFRPSHWLWLRQLQZKLFK RUJDQL]DWLRQV¿QGWKHPVHOYHVWKUHDWHQHGDQGYXOQHUDEOHWRIDLOWKHLULQDELOLW\ WRSURGXFHDQHIIHFWLYHUHVSRQVHWRWKHWKUHDWVDQGFKDOOHQJHVXOWLPDWHO\ VWUHQJWKHQVWKHLUZLOOLQJQHVVWRHQJDJHLQMRLQWQHVV 7KLVHVVD\IRFXVHVRQMRLQWQHVVLQLQWHOOLJHQFHKDYLQJGHYHORSHGDVQHZ DSSURDFKHVFROODSVHGWKHERXQGDULHVDQGVHSDUDWLRQEHWZHHQLQWHOOLJHQFH RUJDQL]DWLRQVZKLFK²DORQJVLGHKLVWRULFDOULYDOULHVRYHUSUHVWLJHDQG FRPSHWLWLYHQHVV²KDGEHHQWKHKDOOPDUNRIWKHLUUHODWLRQVLQWKHSDVW7KHVH QHZDSSURDFKHVKDYHDOVROHGWRWKHGHYHORSPHQWRIPRGHOVRIMRLQWQHVV EHWZHHQLQWHOOLJHQFHRUJDQL]DWLRQVDQGWKHPLOLWDU\VRWKDWWKH\FDQFDUU\RXW FRPSOH[PLVVLRQVDQGDOVREHWZHHQRUJDQL]DWLRQVLQWKHFLYLOLDQVHFWRU7KLV HVVD\DGGUHVVHVWKHFRQFHSWRIMRLQWQHVVDQGVHHNVWRDQVZHUWKHIROORZLQJ TXHVWLRQV:KDWLVMRLQWQHVVDQGZKDWOHGWRWKHQHHGIRULW":KDWDUHWKH LQWHUUHODWLRQVEHWZHHQWKHIHDWXUHVRIMRLQWQHVV":KDWDUHWKHFRQGLWLRQV IRUDQGREVWDFOHVWRUHDOL]LQJMRLQWQHVV"+RZLVMRLQWQHVVPDQLIHVWHGLQ WKHLQWHOOLJHQFHFRPPXQLW\DQGZKDWDUHWKHYDULRXVMRLQWQHVVPRGHOVLQ
Recommended publications
  • Counter-Terrorism 1 Counter-Terrorism
    Counter-terrorism 1 Counter-terrorism WARNING: Article could not be rendered - ouputting plain text. Potential causes of the problem are: (a) a bug in the pdf-writer software (b) problematic Mediawiki markup (c) table is too wide United States Coast GuardCoast Guard on counter-terrorism patrol in Upper New York Bay. Verrazano-Narrows Bridge in distance spanning The Narrows between Brooklyn (left) and Staten Island (right).TerrorismDefinitions of terrorismDefinitionsHistory of terrorismHistoryList of terrorist incidentsIncidents Counter-terrorism (also spelled counterterrorism) incorporates the practices, Military tacticstactics, techniques, and strategies that governments, militarymilitaries, police departments and corporations adopt to attack terrorist threats and/or acts, both real and imputed.The tactic of terrorism is available to insurgencyinsurgents and governments. Not all insurgents use Fearterror as a tactic, and some choose not to use it because other tactics work better for them in a particular context. Individuals, such as Timothy McVeigh, may also engage in terrorist acts such as the Oklahoma City bombing. If the terrorism is part of a broader insurgency, counter-terrorism may also form a part of a counter-insurgency doctrine, but political, economic, and other measures may focus more on the insurgency than the specific acts of terror. Foreign internal defense (FID) is a term used for programs either to suppress insurgency, or reduce the conditions under which insurgency could develop. Counter-terrorism includes both the detection of potential acts and the response to related events. PlanningUnited States Customs and Border Protection officers, fully armed and armored for a counter-terrorism operationMost counter-terrorism strategies involve an increase in standard police and domestic intelligence.
    [Show full text]
  • 1 Ethics of Nuclear Weapons and National Security Intelligence
    1 Ethics of Nuclear Weapons and National Security Intelligence Michael Andregg, University of St. Thomas in St. Paul, MN, USA, [email protected] for Presentation to the International Ethics Section of the ISA, San Francisco, April 6, 2013 Introduction From the beginning of the nuclear age there have been fears that we may have invented a weapon that will destroy us all. J. Robert Oppenheimer, who helped build the first fission bombs, commented often on this (1). Albert Einstein, whose letter to then President Franklin Roosevelt helped convince him to fund them, talked about the imperative to seek peace and new ways of thinking about everything as he neared death (2). Bertrand Russell coauthored a Manifesto with Einstein (and nine others) to warn the world that everything had changed (3). Yet thousands of thoughtful people still felt compelled by the urgencies of World War II to make nuclear weapons and to use two of them against other human beings. To end the war, they said to each other, and perhaps to show the Soviets who would be the big dog following. But then what? Another arms race had begun, and bigger, badder WMDs would be developed soon. As soon as more than one nation had nuclear weapons, some strategy had to be conceived for their use. Mutual Assured Destruction was the main result, and millions learned the irony of a “MAD” strategy, where safety was to be assured by capabilities and declared will to destroy human civilization if we were frightened enough by any enemy. Those we terrified produced similar weapons and strategies.
    [Show full text]
  • Severn House Paperbacks Spring 2021
    SEVERN HOUSE PUBLISHERS Hitmen I Have Known Bill James In the 35th installment of the popular Harpur and Iles police procedural series, tensions in the community are mounting following the gruesome deaths of two men. Alarmingly, suspicion falls on Assistant Chief Constable Iles. He seems at ease with the accusations, as are his superiors in the police f... Summary Assistant Chief Constable Iles finds himself suspected of murder in the fast-paced 35th installment of the popular Harpur and Iles police procedural series. Tensions in the community are mounting following the gruesome deaths of two men, both of whom were accused yet acquitted of the murder of an undercover police officer. It looks like vigilante justice, but who is responsible? Alarmingly, suspicion falls on Assistant Chief Constable Iles. Severn House Publishers 9781847519900 Matters escalate when a TV show investigating the murders is aired, further implicating Iles. Iles seems at Pub Date: 1/26/21 ease with the accusations, as are his superiors in the police force. But others are not feeling so secure. $17.95 USD/$19.95 CAD Trade Paperback Local crime bosses Ralph Ember and Mansel Shale fear reprisals against Iles will result in their own businesses 192 Pages Carton Qty: 38 suffering. And so they begin to plan how to remove potential troublemakers from their path . Fiction / Mystery & Detective Contributor Bio FIC022020 Critically acclaimed crime writer Bill James is a former journalist who wrote for The Sunday Times, Daily Series: A Harpur and Iles Mirror, Spectator, New Review and Punch. Married with four children, he lives in Wales.
    [Show full text]
  • Book Reviews
    Journal of Strategic Security Volume 3 Number 1 Volume 3, No. 1: March 2010 Article 8 Book Reviews Timothy Hsia Sheldon Greaves Donald J. Goldstein Henley-Putnam University Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 71-78 Recommended Citation Hsia, Timothy; Greaves, Sheldon; and Goldstein, Donald J.. "Book Reviews." Journal of Strategic Security 3, no. 1 (2010) : 71-78. DOI: http://dx.doi.org/10.5038/1944-0472.3.1.7 Available at: https://scholarcommons.usf.edu/jss/vol3/iss1/8 This Book Review is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Book Reviews This book review is available in Journal of Strategic Security: https://scholarcommons.usf.edu/jss/ vol3/iss1/8 Hsia et al.: Book Reviews Book Reviews The History of Camp Tracy: Japanese WWII POWs and the Future of Strategic Interrogation. By Alexander D. Corbin. Fort Belvoir, VA: Ziedon Press, 2009. ISBN: 978-0-578-02979- 5. Maps. Photographs. Notes. Bibliography. Index. Pp. 189. $15.95. The History of Camp Tracy, which received the Joint Chiefs of Staff His- tory Office's Fleet Admiral Chester W. Nimitz Archival Research Award, is an illuminating and educating read. The book is written by Alexander Corbin, an intelligence officer in the U.S.
    [Show full text]
  • Carleton University Winter 2000
    Carleton University Winter 2012 Department of Political Science PSCI 4008B NATIONAL SECURITY AND INTELLIGENCE IN THE MODERN STATE Tuesday 14:35 - 17:25 Please confirm location on Carleton Central Instructor: A. Bartley Office: B643 Loeb Building E-mail: [email protected] Office Hours: 5:30-6:00 p.m. Tuesday Phone: 613 520-2600 x 3214 (no voicemail) (or by appointment) Course Description: This is primarily a research seminar where students examine issues of national security and intelligence in the modern, democratic state. The course is designed to provide an overview of the intelligence process, the role of intelligence in government and the management of intelligence policy in democratic societies. The course has five themes: the nature and structure of the intelligence process, the role of intelligence in national security, a survey of intelligence institutions in modern democracies, the instruments and institutions modern states use to manage their intelligence communities and the evolving threat environment. There will be reference to current issues in intelligence and national security including: intelligence theory and practice, intelligence policy development, terrorism and law enforcement, individual privacy, human rights and state rights. Requirements: The major course requirement is a critical essay examining one specific issue or concept related to topics raised in lectures or readings. Essay proposals are to be submitted in writing (maximum 400 words) not later than Tuesday, Feb. 14. Proposals will be graded and returned at the next class. The essay is to be a maximum 25 pages in length (double-spaced, using a generally accepted scholarly style). Papers are due not later than 4 p.m., Tuesday, April 3.
    [Show full text]
  • Can Technology Prevent Leaks?
    CAN TECHNOLOGY PREVENT LEAKS? Nathan Alexander Sales* The past decade has witnessed an unprecedented explosion in leak prosecutions. Since 2005, the government has charged leakers with violating the Espionage Act of 1917—which makes it a crime for government employees to reveal national defense information to persons not entitled to receive it1—ten times, including no fewer than nine prosecutions since President Obama took office in 2009. This prosecutorial surge stands in sharp contrast to the two Espionage Act cases brought in three quarters of a century after Congress enacted that World War I-era statute. Yet this dramatic jump in prosecutions does not appear to have corresponded with a comparably dramatic decline in the number of leaks that have occurred or in their severity. Government officials at all levels continue to reveal highly classified information routinely, from the senior administration officials who disclosed President Obama’s personal role in selecting targets for drone strikes to low-level employees like Bradley (now Chelsea) Manning and Edward Snowden who exfiltrated huge troves of diplomatic, military, and intelligence documents. “[L]eaking classified information occurs so regularly in Washington” that it has become “a routine method of communication about government.”2 Why? Part of the answer, I think, is that criminal prohibitions on leaking are fairly modest deterrents, especially for ideologically motivated leakers who seek to disclose large tranches of classified documents. The law attempts to deter undesirable conduct through commands backed by threats of punishment; the greater the magnitude of the sanctions, and the greater the probability those sanctions will be imposed, the less likely it is that people will commit the proscribed offense.
    [Show full text]
  • Journal of Strategic Security
    JOURNAL OF STRATEGIC SECURITY Vol. III, No. 1 March 2010 Editor Jeremy Tamsett, M.A. Associate Editors Gary Ackerman, M.A. Randy Borum, Ph.D. Monte Bullard, Ph.D. Denise Greaves, Ph.D. Edward J. Hagerty, Ph.D. Tom Hunter, M.A, M.Litt. Kim Lewis, M.I.M. Vincent Pollard, Ph.D. Ed Urie, M.S. Published Quarterly by Henley-Putnam University Press www.henley-putnam.edu Copyright © 2010 by Henley-Putnam University All rights reserved. No part of this publication shall be reproduced, stored in a retrieval system, or transmitted by any means electronic, mechanical, photocopying, recording, or otherwise without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this publication, the publisher and author(s) assume no responsibility for errors or omissions. Neither is any liability assumed for damages resulting from the use of the information contained herein. Paperback ISSN: 1944-0464 eBook ISSN: 1944-0472 Warning and Disclaimer Every effort has been made to make this publication as complete and as accurate as possible, but no warranty of fitness is implied. The informa- tion provided is on an "as is" basis. The authors and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this publication. ii Editorial Advisory Board Major General Craig Bambrough, USA (ret.) Dr. Donald Goldstein, Institute for Defense Analyses Dr. Richard J. Kilroy Jr., Virginia Military Institute Dr.
    [Show full text]
  • Introduction to Intelligence
    COURSE OUTLINE INTRODUCTION TO INTELLIGENCE Teacher: David CHUTER Academic year 2018/2019: Paris School of International Affairs – Fall Semester BIOGRAPHICAL INFORMATION David Chuter spent more than thirty years in two governments, international organizations and think-tanks. A specialist in international issues, he has been involved in defence and security issues around the world. His last job was as Special Adviser to the Policy Director of the French Ministry of Defence from 2005 to 2008. After that job he took early retirement to become an independent author, lecturer and consultant, based in Paris. He is the author of four books and many articles, on subjects ranging from the organization of the security sector to African security issues, transitional justice and the relationship between security and development. COURSE OUTLINE Session 1: (title) Introduction: what intelligence is and why it matters Recommended readings: Two good general introductions by former government officials are: • Michael Herman, Intelligence Power in Peace and War, Cambridge University Press, 1996 • David Omand, Securing the State, C Hurst, 2010 • A short but useful discussion of definitions by a distinguished intelligence historian is Michael Warner, “Wanted: A definition of ‘intelligence’ “ Studies in Intelligence, Vol 46, No 3, (2002) • Christopher Andrew, Richard J. Aldrich and Wesley K. Wark (eds), Secret Intelligence: A Reader, Routledge 2008, brings together a large number of essays on intelligence-related subjects. The essays are of varying quality, and some are too focused on Anglo-American style intelligence issues, but a number are of considerable value. All the essays were published elsewhere, and, where cited here, are given first with their original publication details.
    [Show full text]
  • Prepublication Review in the Intelligence Community
    TILL DEATH DO US PART: PREPUBLICATION REVIEW IN THE INTELLIGENCE COMMUNITY Kevin Casey* As a condition of access to classified information, most employees of the U.S. intelligence community are required to sign nondisclosure agreements that mandate lifetime prepublication review. In essence, these agreements require employees to submit any works that discuss their experiences working in the intelligence community---whether writ- ten or oral, fiction or nonfiction---to their respective agencies and receive approval before seeking publication. Though these agreements constitute an exercise of prior restraint, the Supreme Court has held them constitu- tional. This Note does not argue fororagainsttheconstitutionality of prepublication review; instead, it explores how prepublication review is actually practiced by agencies and concludes that thecurrentsystem, which lacks executive-branch-wide guidance, grants too much discretion to individual agencies. It compares the policies of individual agencies with the experiences of actual authors who have clashed with prepublication-review boards to argue that agencies conduct review in a manner that is inconsistent at best, and downright biased and discriminatory at worst. The level of secrecy shrouding intelligence agencies and the concomitant dearth of publicly available information about their activi- ties make it difcult to evaluate their performance and, by extension, the performance of our electedofcials in overseeing such activities. In such circumstances, memoirs and other forms of expression
    [Show full text]
  • Fixing Leaks Assessing the Department of Defense’S Approach to Preventing and Deterring Unauthorized Disclosures
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND Purchase this document TERRORISM AND HOMELAND SECURITY Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Defense Research Institute View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for re- search quality and objectivity. JAMES B. BRUCE ■ W. GEORGE JAMESON FIXING LEAKS ASSESSING THE DEPARTMENT OF DEFENSE’S APPROACH TO PREVENTING AND DETERRING UNAUTHORIZED DISCLOSURES C O R P O R A T I O N NATIONAL DEFENSE RESEARCH INSTITUTE FIXING LEAKS ASSESSING THE DEPARTMENT OF DEFENSE’S APPROACH TO PREVENTING AND DETERRING UNAUTHORIZED DISCLOSURES JAMES B.
    [Show full text]
  • Volume 5, Issue 2 (Fall/Winter 2017) Isbn-13: 978-0-692-11069-0 Isbn-10: 0-692-11069-0 Articles
    TM VOLUME 5 ISSUE 2 FALL/WINTER 2017 National Security Law Journal Antonin Scalia Law School George Mason University 3301 Fairfax Drive Arlington, VA 22201 www.nslj.org © 2017 National Security Law Journal. All rights reserved. Library of Congress Publication Data (Serial) ‪National Security Law Journal. ‪‪Arlington, Va. : National Security Law Journal, 2013-‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪ ‪ K14 .N18 ‪ ‪‪ISSN: ‪2373-8464‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪ ‪ Variant title: NSLJ National security—Law and legislation—Periodicals LC control no. 2014202997 (http://lccn.loc.gov/2014202997) Past issues available in print at the Law Library Reading Room of the Library of Congress (Madison, LM201). VOLUME 5, ISSUE 2 (FALL/WINTER 2017) ISBN-13: 978-0-692-11069-0 ISBN-10: 0-692-11069-0 ARTICLES REFORM OF THE INTELLIGENCE COMMUNITY PREPUBLICATION REVIEW PROCESS: BALANCING FIRST AMENDMENT RIGHTS AND NATIONAL SECURITY INTERESTS Christopher E. Bailey MULTIPLE PRINCIPALS AND THE (LACK OF) INTELLIGENCE OVERSIGHT Tobias T. Gibson COMMENTS THE KATZ OUTTA THE BAG: BRINGING NATIONAL SECURITY LETTERS INTO COMPLIANCE WITH THE “REASONABLE EXPECTATION OF PRIVACY” TEST Anees Mokhiber OUR ALLIES HAVE RIGHTS, TOO: JUDICIAL DEPARTURE FROM IN PERSONAM CASE LAW TO INTERFERENCE IN INTERNATIONAL POLITICS Laura J. Rosenberger VOLUME 5 FALL/WINTER 2017 ISSUE 2 PUBLISHED BY THE ANTONIN SCALIA LAW SCHOOL AT GEORGE MASON UNIVERSITY Cite as 5 NAT’L SEC. L.J. ___ (2017). The National Security Law Journal (“NSLJ”) is a student-edited legal periodical published twice annually at George Mason University School of Law in Arlington, Virginia. We print timely, insightful scholarship on pressing matters that further the dynamic field of national security law, including topics relating to foreign affairs, homeland security, intelligence, and national defense.
    [Show full text]
  • ALA Denounces Library Destruction at Occupy Wall Street
    Editor: Henry Reichman, California State University, East Bay Founding Editor: Judith F. Krug (1940–2009) Publisher: Barbara Jones Office for Intellectual Freedom, American Library Association ISSN 0028-9485 January 2012 Vol. LXI No. 1 www.ala.org/nif The American Library Association has denounced the destruction of books at a library established by Occupy Wall Street demonstrators when New York police raided a park where protesters were staying. The People’s Library, a library constructed by the New York Occupy Wall Street move- ment, was seized in the early morning hours of November 15 by the New York Police Department during a planned raid to evict Occupy Wall Street protesters from Zuccotti Park. The library held a collection of more than 5,000 items and provided free access ALA to books, magazines, newspapers and other materials. According to ALA members who visited the site, the library reflected many of ALA’s core intellectual freedom values and denounces best practices—a balanced, cataloged collection, representing diverse points of view, that included children’s books and reference service often provided by professional librarians library “The dissolution of a library is unacceptable,” said a statement by ALA President Molly Raphael. “Libraries serve as the cornerstone of our democracy and must be safeguarded.” destruction at During what the New York Police Department described as a temporary cleaning of Zuccotti Park, the library was torn down in the dark of night and its books, laptops, Occupy Wall archives, and support materials were thrown into dumpsters by armed police and city sani- tation workers. Numerous library staff were arrested, and, in one case, a librarian strapped the notebooks of original poetry from the library’s poetry readings to her body before Street lending aid to others who had been pepper-sprayed.
    [Show full text]