Archived Content Contenu Archivé

Total Page:16

File Type:pdf, Size:1020Kb

Archived Content Contenu Archivé ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for L’information dont il est indiqué qu’elle est archivée reference, research or recordkeeping purposes. It est fournie à des fins de référence, de recherche is not subject to the Government of Canada Web ou de tenue de documents. Elle n’est pas Standards and has not been altered or updated assujettie aux normes Web du gouvernement du since it was archived. Please contact us to request Canada et elle n’a pas été modifiée ou mise à jour a format other than those available. depuis son archivage. Pour obtenir cette information dans un autre format, veuillez communiquer avec nous. This document is archival in nature and is intended Le présent document a une valeur archivistique et for those who wish to consult archival documents fait partie des documents d’archives rendus made available from the collection of Public Safety disponibles par Sécurité publique Canada à ceux Canada. qui souhaitent consulter ces documents issus de sa collection. Some of these documents are available in only one official language. Translation, to be provided Certains de ces documents ne sont disponibles by Public Safety Canada, is available upon que dans une langue officielle. Sécurité publique request. Canada fournira une traduction sur demande. CONTRE - TERRORISME BIBLIOGRAPHIE No 1988 - 14 Solliciteur général Canada Secrétariat du Ministère , P).er S01.10iTCY. (_isIERAL. cANADA AUG A 19'12_ AOUT / eD SCA_ CITE» CANADA 4,) mœ, ..... BRUCE BEANLAND /ggo ET o JAMES DEACON DIRECTION DE LA POLICE ET DE SÉCURITÉ DIVISION DE LA RECHERCHE ET DE DÉMONSTRATON '/-CONTRE - TERRORISME BIBLIOGRAPHIE No 1988 - 14 Cette bibliographie a été rédigée en 1988. Les idées énoncées dans cette bibliographie n'engagent que ces auteurs; elles ne reflètent pas nécessairement les vues du Ministère. Cette bibliographie est disponible en anglais. This bibliography is available in English. TABLE DES MATIERES Chapitre Page INTRODUCTION SECTION I CHAPITRE I - VUE D'ENSEMBLE Généralités 3 Scène Internationale 15 Par Région ou Pays 18 CHAPITRE II DIPLOMATIE Généralités 32 Par Région ou Pays 33 CHAPITRE III - PERSPECTIVE LEGALE Généralités 37 Scène Internationale 41 Par Région ou Pays 50 CHAPITRE IV - OPTIQUE DES SERVICES DE RENSEIGNEMENT Généralités 60 Par Région ou Pays 64 CHAPITRE V - INTERVENTION POLICIERE Généralités 78 Scène Internationale 80 Par Région ou Pays 81 CHAPITRE VI - INTERVENTION MILITAIRE Généralités 86 Scène Internationale 89 Par Région ou Pays 89 CHAPITRE VII - METHODES DE RECHERCHE Généralités 96 CHAPITRE VIII - CONFLIT POLITIQUE ET ORIENTATION Généralités 101 Scène Internationale 104 Par Région ou Pays 110 Par faction terroriste 153 CHAPITRE IX - LES MEDIAS Généralités 169 Scène Internationale 178 Par Région ou Pays 179 CHAPITRE X - PSYCHOLOGIE ET PSYCHOSOCIOLOGIE Généralités 184 Par faction terroriste 192 CHAPITRE XI- TENDANCES ET TACTIQUES DU TERRORISME Généralités 197 Scène Internationale 205 Par Région ou Pays 210 Par faction terroriste 222 SECTION II CHAPITRE XII - VUE D'ENSEMBLE Généralités 230 Technologie/services de renseignements et de communication 233 Citoyens Privé/Corporations 233 Tactiques et menace 235 PropriétePrivé/Corporations/Individus 235 Militaire 236 Centres de transportation 237 Technologie/services de renseignements et de communication 237 Diplomates/Ambassade/Politiciens 237 Réaction et Prévention 238 Centres de transportation 238 Technologie/services de renseignements et de communication 240 Diplomates/Ambassade/Politiciens 241 Police/Application de la loi 242 Militaire 243 Citoyen Privé/Corporations 244 CHAPITRE XIII - RENSEIGNEMENT ET CONTRE - ESPIONAGE Généralités 248 Scène Internationale 251 Tactiques/menace 251 Ordinateurs/Technologie 253 Réaction/Prévention 253 Militaire 256 CHAPITRE XIV - INTERROGATOIRES Généralités 258 Réaction/Prévention 259 CHAPITRE XV - SECURITE PHYSIQUE Généralités 265 CHAPITRE XVI - AGRESSION ARMEE ET PRISE D'AMBASSADE Généralités 270 Tactiques/menace 270 Réaction/Prévention 271 CHAPITRE XVII - ASSASSINAT Généralités 273 Tactiques/menace 275 Réaction/Prévention 275 CHAPITRE XVIII - AGENTS BIOLOGIQUES ET CHIMIQUES Généralités 277 Tactiques/menace 277 Réaction/Prévention 278 Police/Application de la loi 279 CHAPITRE XIX - ATTENTAT A LA BOMBE Généralités 281 Tactiques/menace 282 Centres de transportation 283 Réaction/Prévention 283 CHAPITRE XX - DETOURNEMENT D'AVION Généralités 286 Tactiques/menace 290 Réaction/Prévention 290 CHAPITRE XXI - PRISE D'OTAGES Généralités 295 Tactiques/menace 298 Diplomates/Ambassade/Politiciens 298 Réaction/Prévention 298 Diplomates/Ambassades/Politiciens 302 Police/Application de la loi 303 Citoyen Privé/Corporations 304 CHAPITRE XXII - ENLEVEMENT Généralités 306 Tactiques/menace 307 PropriétéPrivée/Corporations/Individus 307 Diplomates/Ambassades/Politiciens 307 Reaction/Prévention 307 Diplomates/Ambassades/Politiciens 308 Citoyens Privés/ Corporations/Individus 309 CHAPITRE XXIII - TERRORISME NUCLEAIRE Généralités 311 Tactiques/menace 314 Reaction/Prévention 317 CHAPITRE XXIV - iVALUATION DU RISQUE Générali:. - 320 111 CHAPITRE XXV - GESTION DES CRISES Généralités 322 ANNEXE A 327 ANNEXE B 332 ANNEXE C 334 ANNEXE D 339 INDEX DES PAYS ET DES REGIONS 357 g INTRODUCTION La présente bibliographie constitue un guide des documents utiles à ceux qui s'intéressent à la lutte antiterroriste. Aux fins du présent document, la lutte antiterroriste désigne les mesures décisionnelles et opérationnelles visant à endiguer et à prévenir le terrorisme. Les ouvrages répertoriés traitent des problèmes liés à l'évolution des politiques antiterroristes à l'échelle nationale et internationale ainsi que des opérations et des menaces avec lesquelles doivent composer les agences de lutte contre le terrorisme. Ouvrages sur les idéologies des factions terroristes et des états qui les financent, traités des caractéristiques sociales et psychologiques des terroristes et des factions terroristes et études des milieux dans lesquels les terroristes opèrent y sont aussi relevés. Les références ont été mémorisées sur disquettes, ce qui facilitera la mise à jour de la bibliographie. Pour retrouver une source, on peut faire une recherche par lieu, mot-matière, année de publication, auteur, titre ou une combinaison des ces données. La bibliographie se divise en deux sections. La SECTION I regroupe les ouvrages relatifs aux méthodes et aux enjeux de la lutte antiterroriste tandis que la SECHON II englobe surtout des ouvrages traitant des différentes tactiques des terroristes et des moyens d'endiguer et de prévenir les actions terroristes. Les sections comptent un certain nombre de grands titres, chacun constituant un chapitre. Chaque grand titre se divise en intertitres qui, au besoin, se subdivisent en sous-titres (pays / région). Chaque ouvrage est codé numériquement et introduit dans la base de données au moyen d'une série de codes précis qui définissent l'endroit où il se trouve dans la bibliographie. La structuration du codage est expliquée à l'annexe A. Les subdivisions de chaque chapitre marquent un rétrécissement du sujet car les documents qui y sont énumérés se focalisent davantage sur des problèmes de fond. Les intertitres de la SEC LION I sont les suivants : Généralités, Par région ou pays, Scène internationale et Par faction terroriste. L'intertitre Généralités regroupe des ouvrages qui traitent du sujet annoncé par le grand titre dans une optique générale, parfois même abstraite. Les sous-titres Scène internationale et Par région ou pays regroupent des documents d'intérêt international ou des ouvrages sur des régions ou des pays précis. Dans le cas du sous-titre Par région ou pays, les ouvrages sont subdivisés par région ou pays. L'intertitre de la SECTION I, Par faction terroriste, est lié seulement aux grands titres Conflit politique et orientation, Psychologie et psychosociologie et Tendances et tactiques du terrorisme. Ces trois grands titres sont les seuls à donner des références de documents sur les factions terroristes. Lorsque ces documents figurent sous le sous-titre Par région ou pays, ils sont accompagnés d'un code qui précise le pays ou la région d'origine de la faction. Voici des exemples typiques des codes attribués aux ouvrages de la SECTION I: Mesures policières [50] - Par région ou pays [30] Canada [112] ou Tendances et tactiques du terrorisme [110] - Par faction terroriste [40] - Grande-Bretagne [132]. Au nombre des intertitres de la SECTION II figurent les suivants : Généralités. (même objectif que dans la SECliON I), Tactiques et menaces et Réaction et prévention. Ces deux derniers intertitres ont permis de subdiviser les ouvrages relevant d'un grand titre de la SECTION II, par exemple Détournement d'avion, selon la nature de la menace ou les contre-mesures accessibles aux agences de lutte antiterroriste. Dans la SECTION II, les sous-titres servent à préciser la cible de la menace ou l'agence chargée de contrer la menace. Ces sous-titres, comme le sous-titre Par région ou pays de la SECTION I, constituent la plus petite subdivision de la bibliographie. Un ouvrage traitant des mesures policières utilisées dans le cas d'un détournement d'avion sera codé de la façon suivante : Détournement d'avion [250] - Réaction et prévention [60] - Mesures policières et application de la loi [70]. Dans l'ensemble, le contenu de la bibliographie se limite aux documents
Recommended publications
  • FINAL VOLUME ONE JUNE 10TH.Indb
    ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for L’information dont il est indiqué qu’elle est archivée reference, research or recordkeeping purposes. It est fournie à des fins de référence, de recherche is not subject to the Government of Canada Web ou de tenue de documents. Elle n’est pas Standards and has not been altered or updated assujettie aux normes Web du gouvernement du since it was archived. Please contact us to request Canada et elle n’a pas été modifiée ou mise à jour a format other than those available. depuis son archivage. Pour obtenir cette information dans un autre format, veuillez communiquer avec nous. This document is archival in nature and is intended Le présent document a une valeur archivistique et for those who wish to consult archival documents fait partie des documents d’archives rendus made available from the collection of Public Safety disponibles par Sécurité publique Canada à ceux Canada. qui souhaitent consulter ces documents issus de sa collection. Some of these documents are available in only one official language. Translation, to be provided Certains de ces documents ne sont disponibles by Public Safety Canada, is available upon que dans une langue officielle. Sécurité publique request. Canada fournira une traduction sur demande. The opinions expressed in these academic studies are those of the authors; they do not necessarily represent the views of the Commissioner. ©Her Majesty the Queen in Right of Canada, represented
    [Show full text]
  • PSCI-4008A-Jensen-F14.Pdf
    Carleton University FALL 2014 Department of Political Science PSCI 4008 A NATIONAL SECURITY AND INTELLIGENCE Thursday, 08:35 – 11:25 Please confirm location on Carleton Central Instructor: Dr. Kurt F. Jensen Office: Loeb Bldg B643 Office Hours: Thursday 11:30-12:30. Please make appointment. Other times are possible. Email: [email protected] and [email protected] Phone: (613) 520-2600 Ext. 3214 (no voicemail) Best to contact me through e-mail Purpose of Course: This course is primarily a research seminar, designed to allow students to examine in detail a particular aspect of national security and intelligence in the modern state and to illustrate the impact of intelligence on statecraft. As there is no specific second year course in this area, the course is also designed to provide an overview of the field and acquaint students with the different ways in which modern states deal with the issue of national security. The course has been loosely organized along four themes: Introduction and overview of comparative current and historical structures; Threats and how the state protects itself from those threats; issues related to the protection of individual rights and oversight; and, finally an examination of current issues in intelligence and national security. The focus of the course is to provide an understanding of security and intelligence issues as tools of modern statecraft and to show how these factor into national decision-making as well as illustrating their impact. Requirements: The major requirement for the course is an in-depth and critical essay examining one specific issue or concept related to the topics addressed in the reading list below.
    [Show full text]
  • 104-10431-10126.Pdf
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com I I .u.~. ..., CONFIDENTIAL NOFORN NOCONTRAC~ DRAFT May 1992 A REVIEW OF COUNTERINTELLIGENCE LITERATURE. 1975 - 1992 By Cleveland c. Cram ·BOTE: ~inal version will have proper page breaks, etc. CONFIDENTIAL NOFORN NOCONTRACT 13-00000 CONFIDENTIAL NOFORN NOCONTRA~T REVIEW OF COQNTERIHTELLIGEHCE LITEBATQRE. 1975 - 1992 Foreword The review of counterintelligence literature, 1975 - 1992, which follows is not meant to include every book published concerning espionage and/or counterintelligence from the period 1975 until 1992. The object of this study is to focus on a relatively small selection of books that were influential because of the views they expressed and_/, their reasonable degree of historical accuracy ~~stly concentrate on the major counterintelligence issues of the I( period and ~ highlight~~ the of James Angleton and Anatole Golitsyn, which from 1962 were a compelling force in Western counterintelligence services. \?The scope of the study is largely limited to books about the American, British, and Canadian intelligence and security services although it in some instances touches on countries . j , of Western Europe such as France, West Germany, Norway, etc. ' J r LJ.~,._i.vt- ~ \ -""r Recent books such as Corson and Trento 1 s Widows cure m;aladed _,_ because they are not reputable by even the gener~}~:; ;~~ ( ..
    [Show full text]
  • Of Moles and Molehunters: a Review of Counterintelligence Literature, 1977-92
    Of Moles and Molehunters: A Review of Counterintelligence Literature, 1977-92 An Intelligence Monograph Center for the Study of Intelligence CSI 93-002 October 1993 This publication is prepared for the use of US Government officials, and the formal, coverage, and content are designed to meet their specific requirements US Government officials may obtain additional copies of this document directly or through liasion channels from the Central Intelligence Agency Requesters outside the US Government may obtain subscriptions to CIA publications similar to this one by addressing inquiries to: Document Expediting (DOCEX) Project Exchange and Gift Division Library of Congress Washington, D.C. 20540 or. National Technical Information Service 5285 Port Royal Road Springfield, VA 22161 Requesters outside the US Government not interested in subscription service may purchase specific publications either in paper copy or microform from: Photoduplication Service Library of Congress Washington, D.C. 20540 or National Technical Information Service 5285 Port Royal Road Springfield, VA 22161 (To expedite service call the NTIS Order Desk (703) 487-4650) Comments and queries on this paper may be directed to the DOCEX Project at the above address or by phone (202-707-9527), or the NTIS Office of Customer Services at the above address or by phone (703-487-4660) Publications are not available to the public from the Central Intelligence Agency. SSSi;-> PB9 3- 928 019 Of Moles and Molehunters: A Review of Counterintelligence Literature, 1977-92 An Intelligence Monograph Center for the Study of Intelligence Reverse Blank Erratum Notice to recipients of the Center for the Study of Intelligence monograph CSI 93-002, October 1993 Of Moles and Molehunters: A Review of Counterintelligence Literature, 1977-92.
    [Show full text]
  • Of-Moles-And-Molehunters.Pdf
    Spy stories Of Moles and Molehunters Cleveland C. Cram Editor™s Note.~ The following background essay first Because Epstein™s writings contained so much informa appeared in a monograph published by the Centerfor tion about sensitive CIA and FBI operations, it was gen the Study of Intelligence in October 1993. erally assumed he had a willing and knowledgeable source, either a serving officer (considered doubtful) or The year 1975 was a watershed in literature about the a retired senior person with wide knowledge of anti- CIA. Before that time, only a few outsiders, usually pro Soviet operations overseas and in the United States. fessional journalists, had written books critical of the Neither the articles nor the book was annotated, how Agency. Most of the others were neutral or even posi ever. Epstein stated that he had spoken occasionally tive, especially those written by former Agency offi with James Angleton, the retired chief of CIA™s cials like Allen Dulles and Lyman Kirkpatrick. But in CI Staff, but did not acknowledge that he was the 1975 a disgruntled former Agency employee, Philip source. Agee, published his highly critical book, Inside the Company: CIA Diary. Books by other ex-employeesŠ When Director of Central Intelligence (DCI) William J. B. Smith, John Stockwell, Victor Marchetti (with Colby dismissed him in 1974, Angleton for the next six J. D. Marks), and R. W. McGeheeŠfollowed in quick months spent part of his time at Langley, introducing succession, each exposing highly confidential material. members of the new CI Staff to such people as his defector friend, Anatole Golitsyn.
    [Show full text]
  • Counterspy: Libya: U.S. Propaganda and Covert
    Approved For Release 2010/06/15: CIA-RDP90-00845R000100140005-7 GOVERMENT MOVES TO CENSOR COUNTERSPY COUNTER The Magazine For People Who Need To Know Volume 6 Number 1 $2 Nov.1981-Jan.1982 Libya: U.S. Propaganda and Covert Operations World Bank Blueprint for China AIFLD: Secret Plan for El Salvador U.S. Destabilization of Canada? Approved For Release 2010/06/15: CIA-RDP90-00845R000100140005-7 Approved For Release 2010/06/15: CIA-RDP90-00845R000100140005-7 Editorial Unlike his friend R-ich.ard Nixor:, CIA Di­ Identitles I'rotecticn J,.ct'' is "designed rector t!itliam Casey cannot clairr:: ''I am to deal primarily witr:. the dar;age to OUY' r;ot a crook." On May 19, 1981 Judge inte3Zigence capabi Zities ...[emphas1: s Charles E·. Stewart, J1,. in Nev York con.­ addedj which is ca:used by ur"°'uthm,izec elided that Casey had unla1;iful ly n:1'.sled disclosures of identities, 1�·hether or not investors of HulHpionics, Inc. In a a particular officer• or· source is physi­ Casey-authorized offer•ing circular, pro­ cally jeor:ardized in each individual spect'ive ir:.vestoN: were not told that Mul­ case." InteUigence capabilit-ies, of tipionics had assumed $2.? miUi-cn in course, co1)eY' everythinr; fron' as sas sir:c­ mortga,ge debts - t-Wl,OCO of which was ti ons and destabilizations to ir�teU·{­ Casey's personal debt. gence gathering. The retention of Casey as CIA Director In the same letter, Casey revealed the 1 a;ter this ruling says a lot about the CIA draconian reach u:ith 1.;Jhich the CIA 1.tanted and the Reagan ai!,m1,'.nistration.
    [Show full text]
  • Freedom‟S Voices: Czech and Slovak Immigration to Canada During the Cold War
    Freedom‟s Voices: Czech and Slovak Immigration to Canada during the Cold War by Jan Raska A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Doctor of Philosophy in History Waterloo, Ontario, Canada, 2013 © Jan Raska 2013 Author‟s Declaration I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final versions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. ii Abstract During the Cold War, approximately 36,000 persons claimed Czechoslovakia as their country of citizenship upon entering Canada. A defining characteristic of this postwar migration of predominantly ethnic Czechs and Slovaks was the prevalence of anti-communist and democratic values. This dissertation follows Czech and Slovak refugees through the German invasion of the Czech lands and Slovakia‟s independence in 1939, the Second World War, the Communist takeover of Czechoslovakia in 1948, and the Warsaw Pact Invasion of 1968. Diplomats, industrialists, workers, democratic politicians, professionals, and students fled to the West in search of freedom, security, and economic opportunity. Many of these individuals sought to return home after Czechoslovakia was liberated from communism. This dissertation examines the interwar, wartime, and postwar immigration experiences of Czech and Slovak refugees through the lens of Canadian Czechoslovak institutions. In Canada, Czechs and Slovaks who professed a belief in a Czechoslovak identity formed their own organizations. In the Cold War era, the two most prominent Canadian Czechoslovak institutions were the Czechoslovak National Alliance and the Masaryk Hall.
    [Show full text]
  • Archived Content Information Archivée Dans Le
    Archived Content Information identified as archived on the Web is for reference, research or record-keeping purposes. It has not been altered or updated after the date of archiving. Web pages that are archived on the Web are not subject to the Government of Canada Web Standards. As per the Communications Policy of the Government of Canada, you can request alternate formats on the "Contact Us" page. Information archivée dans le Web Information archivée dans le Web à des fins de consultation, de recherche ou de tenue de documents. Cette dernière n’a aucunement été modifiée ni mise à jour depuis sa date de mise en archive. Les pages archivées dans le Web ne sont pas assujetties aux normes qui s’appliquent aux sites Web du gouvernement du Canada. Conformément à la Politique de communication du gouvernement du Canada, vous pouvez demander de recevoir cette information dans tout autre format de rechange à la page « Contactez-nous ». CANADIAN FORCES COLLEGE / COLLÈGE DES FORCES CANADIENNES JCSP 35 / PCEMI 35 MDS SURVEILLANCE & INFORMATION EXPLOITATION TO COMBAT THE NEW TERROR THREAT: THE ETHICAL AND LEGAL WAY TO ENSURE VICTORY By/par LCol/Lcol Darren L. Harper 24 April 2009 This paper was written by a student attending the Canadian Forces College in fulfilment of one La présente étude a été rédigée par un stagiaire of the requirements of the Course of Studies. du Collège des Forces canadiennes pour The paper is a scholastic document, and thus satisfaire à l'une des exigences du cours. L'étude contains facts and opinions, which the author est un document qui se rapporte au cours et alone considered appropriate and correct for contient donc des faits et des opinions que seul the subject.
    [Show full text]
  • Spring 1989 Schools of Thought: National Perceptions of Intelligence by Stuart Farson
    Spring 1989 Schools of Thought: National Perceptions of Intelligence by Stuart Farson INTRODUCTION A cursory review of the literature suggests that the word "in­ telligence" itself is likely to be problematic. Blackstock and Schaf, for example, in the introduction to their annotated bibliography of the field in English note that: . even the terms used are confused and confusing. Expressions such as "Soviet (or U.S.) intelligence" are used as a kind of shorthand for all the intelligence and security agencies of the state concerned. [PJopular usage confused espionage . with the entire in­ telligence function. Melodramatic spy novels and mo­ tion pictures reinforce this mistaken notion.1 And apparently, the situation is no better in other languages.2 Four factors lie at the root of the problem. One has been partly alluded to in the observations above. "Intelligence" is a synecdoche in the true sense of the word. It is used to represent both a larger whole and a smaller part. In the former case it is used to mean not only the collec­ tion of information and the analysis thereof but also all the activities of organizations forming an intelligence community (i.e. those doing special operations, counterintelligence and security work, etc.). In the latter case it is sometimes used interchangeably with the word "es­ pionage" which constitutes but one small part of an intelligence effort. The second factor concerns the occasional need of intelligence agencies to use euphemisms for what in blunt language might be politically unac­ ceptable. This is particular true where covert operations are concerned. Thirdly, intelligence does not exist in either a verb or gerund form.
    [Show full text]
  • IN HIS DEFECTOR HE TRUSTED Gérald Arboit
    IN HIS DEFECTOR HE TRUSTED Gérald Arboit To cite this version: Gérald Arboit. IN HIS DEFECTOR HE TRUSTED: HOW THE CIA COUNTERINTELLIGENCE STAFF BROKE THE WESTERN INTELLIGENCE COMMUNITY FOR TEN YEARS (1962-1973). 2007. hal-01152762 HAL Id: hal-01152762 https://hal.archives-ouvertes.fr/hal-01152762 Submitted on 18 May 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution - NonCommercial - ShareAlike| 4.0 International License International Intelligence History Association 13th Annual Meeting – 2007 “Intelligence Clash: East vs West During the Cold War” In his defector he trusted How the CIA Counterintelligence Staff broke the Western intelligence community for ten years, 1962-1973 Gérald ARBOIT Centre français de recherche sur le Renseignement Paris Université Robert Schuman Strasbourg No process is as old and simple as that of intelligence: using a defector to obtain information from the “other side”, especially in the case of a closed political system such as the Soviet Regime. In the first twenty years of the Cold War, the CIA was not very familiar with this game1. Reasons were diverse: its inability to operate in the USSR before 1961, because of the opposition of the State Department; the strong control of the KGB in the Soviet territory, that made it quite impossible for an American to operate freely, and on the Soviet people during Stalin’s era.
    [Show full text]
  • Intelligence Analysis Monday 11:35 – 14:25 Please Confirm Location on Carleton Central
    Carleton University WINTER 2014 Department of Political Science PSCI 5915P Art and Challenges of Intelligence Analysis Monday 11:35 – 14:25 Please confirm location on Carleton Central Instructor: Dr. Kurt F. Jensen Office: Loeb Bldg B643 Office Hours: Thursday 13:30 – 14:30. Please make appointment. Other times are possible. Telephone: Best to contact me through e-mail Email: [email protected] or [email protected] Phone: (613) 520-2600 Ext. 3214 (no voicemail) Purpose of Course: Analysis is at the core of all intelligence work. Information is collected from technical and human sources, collated, evaluation and assessed. It is only after the material has been analyzed to determine its value and impact that it becomes intelligence. This course is designed to provide students with an understanding of the role, tradecraft, and challenges of intelligence analysis. The course will commence with a summary of the intelligence craft, in general. Students will be introduced to the art of intelligence analysis and the challenges of the craft. Identification of the different types of intelligence analysis, the strategies and methodologies for conducting analysis, and the impact of denial and deception strategies upon successful intelligence analysis will be made. The contributors to intelligence failures will be explained, as will be elements of the training and goals of professionalization being discussed around the art of intelligence analysis. A series of case studies on intelligence failures and successes will be led by students during the second half of the course. Requirements: The major requirement of the course is an in-depth and detailed presentation by students of a case study where intelligence analysis played a major role in the political or military outcome.
    [Show full text]
  • REILLY-DISSERTATION-2016.Pdf
    CONTROLLING CONTAGION: POLICING AND PRESCRIBING SEXUAL AND POLITICAL NORMALCY IN COLD WAR CANADA A Thesis Submitted to the College of Graduate Studies and Research In Partial Fulfillment of the Requirements For the Degree of Doctor of Philosophy In the Department of History University of Saskatchewan Saskatoon By: FRANCES V. REILLY © Frances Vija Reilly, June 2016. All rights reserved. i Permission to Use In presenting this thesis in partial fulfillment of the requirements for a Postgraduate degree from the University of Saskatchewan, I agree that the Libraries of this University may make it freely available for inspection. I further agree that permission for copying of this thesis in any manner, in whole or in part, for scholarly purposes may be granted by the professor or professors who supervised my thesis work or, in their absence, by the Head of the Department or the Dean of the College in which my thesis work was done. It is understood that any copying or publication or use of this thesis or parts thereof for financial gain shall not be allowed without my written permission. It is also understood that due recognition shall be given to me and to the University of Saskatchewan in any scholarly use which may be made of any material in my thesis. Request for permission to copy or to make other use of material in this thesis in whole or part should be addressed to: Head of the Department of History Room 522, Arts Building 9 Campus Drive University of Saskatchewan Saskatoon, Saskatchewan S7N 5A5 ii Abstract This dissertation examines the Cold War fear of infiltration and the ‘enemy within.’ While several Cold War histories examine the culture of anxiety, few consider how the larger fears of nuclear weaponry and radiation influenced Canada’s perception of the enemy as contagion during the 1950s and 1960s.
    [Show full text]