Welcome to GRU's 2Nd Annual Cyber Education Summit Thank You To

Total Page:16

File Type:pdf, Size:1020Kb

Welcome to GRU's 2Nd Annual Cyber Education Summit Thank You To Welcome To GRU’s 2nd Annual Cyber Education Summit Welcome! We are excited to host the second annual Cyber Education Summit at Georgia Regents University, soon to be Augusta University. Welcome to our campus! Since last year’s summit, we have been very busy. We launched the GRU Cyber Institute to provide a framework for cybersecurity initiatives at our university, and we hosted two cybersecurity summer academies for high school students. And that is just the beginning of what our university and our region can contribute to the effort to secure our nation’s cyber future. Your presence here today clearly signals the importance of this issue. In an in- creasingly wired world, we all have a big stake in the security of our digital informa- tion. The wealth of expertise available among the senior military and government personnel, industry representatives, academia and community leaders here today will advance our understanding of the critical issues and no doubt stimulate much valuable discussion. I am grateful to our honorary hosts and expert panel of speakers. And I want to express my appreciation to our event organizers for providing this opportunity to explore ways we can all work together — government, industry and higher education stakeholders — to ensure the safety and security of our data and our world. Brooks A. Keel, Ph.D. President, Georgia Regents University, soon to be Augusta University CEO, Georgia Regents Health System Thank You To Our Honorary Hosts SAXBY CHAMBLISS U.S. REP. LYNN WESTMORELAND Partner, DLA Piper, Chairman, NSA and Cybersecurity Previous Vice Chairman of U.S. Senate Subcommittee, House Permanent Select Committee on Intelligence Select Committee on Intelligence WEDNESDAY, OCTOBER 14, 2015 Augusta Marriott Riverfront, 2 Tenth Street, 30901 • Location: Estes Room 3:00 PM Registration 3:30 PM GRU Welcoming Remarks Dr. Gretchen Caughman, Provost, Georgia Regents University Welcome to Augusta The Honorable Hardie Davis, Mayor, City of Augusta Introductory Speaker: The Importance of Cybersecurity to Georgia The Honorable David Perdue, United States Senator (GA) 4:00 PM Keynote Speaker Mr. Robert Anderson Jr., Executive Assistant Director of Criminal, Cyber, Response and Services Branch; FBI 5:00 PM Networking Reception (Lamar Room) THURSDAY, OCTOBER 15, 2015 Georgia Regents University • J. Harold Harrison, M.D. Education Commons 1301 R.A. Dent Boulevard, 30912 • Location: Hall B 8:00 AM Welcome President Brooks A. Keel, Ph.D., President, Georgia Regents University, CEO, Georgia Regents Health System Presentation of Colors Georgia Regents University ROTC Pledge of Allegiance The Honorable Rick Allen, United States Congressman (GA-12) 8:15 AM Opening Remarks The Honorable Lynn Westmoreland, United States Congressman (GA-3) 8:30 AM Introduction of Keynote Speaker The Honorable Saxby Chambliss, Partner, DLA Piper Former Vice-Chair of U.S. Senate Select Committee on Intelligence 8:45 AM Keynote Speaker Ms. Stephanie O’Sullivan, Principal Deputy Director of National Intelligence 9:45 AM Networking Break #AUGcybersummit THURSDAY, OCTOBER 15, 2015 10:15 AM Panel Discussion: Overview of Unique Cyber Partnerships Across the Nation Location: Hall B Moderator: Dr. Karla Leeper, Executive Vice President for Strategic Communications, Chief Marketing Officer, Georgia Regents University Panelists: Mr. Girish Seshagiri, VP, Ishpi Technologies, Inc. Dr. Tony Coulson, Director, Cyber Security Center, California State University, San Bernardino Mr. Daniel Stein, Program Lead, National Cybersecurity Education and Training Program (NCTEP), Cybersecurity Education and Awareness Branch, DHS Mr. David Brown, Director of Cyber Talent, SANS Institute 11:15 AM Networking Break 11:30 AM Keynote Speaker Lt. Gen. Edward C. Cardon, Commanding General, U.S. Army Cyber Command 12:15 PM Lunch (provided) 1:15 PM Keynote Speaker Mr. Sean Roche, Deputy Director, Directorate for Digital Innovation, CIA 2:00 PM Panel discussions to run concurrently Panel Discussion: Coordinating Cyber Community Wide: It’s a Team Sport Location: Hall A Moderator: Mr. Deke Copenhaver, Principal, Copenhaver Consulting, LLC Panelists: Mr. Tom Sadowski, President/CEO, Economic Alliance of Greater Baltimore Mr. Todd Boudreau, Deputy Commandant, U.S. Army Cyber School Mr. Tom Patterson, VP, Unisys Global Security Solutions Mr. Mark Baggett, President, Greater Augusta Information Systems Security Association (ISSA) Panel Discussion: Cybersecurity in the Health Care World: What’s at Risk Location: Hall B Moderator: Mr. Matthew J. Eggers, Senior Director, National Security and Emergency Preparedness Department, U.S. Chamber of Commerce Panelists: Dr. Suzanne Schwartz, Director of Emergency Preparedness/ Operations and Medical Countermeasures Center for Devices and Radiological Health (CDRH), FDA Mr. Michael McNeil, Global Product Security and Services Officer, Royal Philips 3:00 PM Networking Break 3:15 PM Panel discussions to run concurrently Panel Discussion Cybersecurity Workforce Needs: Building for the Future Location: Hall B Moderator: Dr. Gretchen Caughman, Provost, Georgia Regents University Panelists: Mr. Rodney J. Petersen, Director, National Initiative for Cybersecurity Education (NICE), National Institute for Standards and Technology (NIST), U.S. Department of Commerce Col. Donald Bray, Commander, Army Cyber Protection Brigade Mr. Mark Lytle, Vice Chancellor for Economic Development, University System of Georgia Mr. Mike Cameron, VP Integrated Systems Group, Leidos, Inc. Panel Discussion: Emerging Needs for Cybersecurity Curriculum and Skills Location: Hall A Moderator: Ms. Joanne Sexton, Cyber Institute Director, Georgia Regents University Panelists: Dr. Leonard T. Reinsfelder, Associate Director of Education and Training, NSA Lt. Col. Michael Nowatkowski, Army Cyber Institute at West Point, Cyber Center of Excellence Forward Support Dr. Blair Taylor, Clinical Associate Professor, Computer and Information Sciences, Towson University Dr. Mustaque Ahamad, Professor, Computer Science, Georgia Institute of Technology Dr. Kyle Cronin, Assistant Professor, Cyber Security, Dakota State University 4:15 PM Networking Break 4:30 PM Keynote Speaker Maj. Gen. Stephen G. Fogarty, Commanding General, U.S. Army Cyber Center of Excellence and Fort Gordon 5:15 PM Closing Remarks #AUGcybersummit KEYNOTE SPEAKERS ROBERT ANDERSON JR. Executive Assistant Director, Criminal, Cyber, Response and Services Branch, Federal Bureau of Investigation Robert Anderson Jr. was appointed executive assistant director (EAD) of the Criminal, Cyber, Response and Services Branch in March 2014. In this position, he oversees all FBI criminal and cyber investigations worldwide, international operations, critical incident response and victim assistance. Anderson most recently served as assistant director of the Counterintelligence Division beginning in August 2012; prior to that, he was the division’s deputy assistant director for operations. Anderson joined the FBI in 1995 and reported to the Washington Field Office (WFO), where he worked narcotics and violent crime cases. He then served on the Hostage Rescue Team and completed deployments to more than 20 countries and war zones. STEPHANIE O’SULLIVAN Principal Deputy Director of National Intelligence Stephanie O’Sullivan was sworn in as the principal deputy director of national intelligence (PDDNI) on February 28, 2011. As PDDNI, O’Sullivan serves in a role similar to that of a chief operating officer where she focuses on the operations of the ODNI and manages intelligence community (IC) coordination and information sharing. She also reinforces the DNI’s intel- ligence integration initiatives and focus on IC resource chal- lenges. Before this assignment, she served as the associate deputy director of the Central Intelligence Agency (CIA) since December 2009, where she worked with the director and deputy director in the overall leadership of the agency, with emphasis on day-to-day management of the organization. She holds a Bachelor of Science degree in civil engineering from the Missouri Science and Technology University. #AUGcybersummit KEYNOTE SPEAKERS LT. GEN. EDWARD C. CARDON Commanding General, U.S. Army Cyber Command Lt. Gen. Edward C. Cardon is the commanding general of U.S. Army Cyber Command and Second Army. He was born in Texas and raised in California. In 1982, he was commissioned as an engineer officer from the United States Military Academy at West Point. Cardon has commanded at every level, from company through division. Prior to leading Army Cyber Command and Second Army, he commanded the 2nd Infantry Division in South Korea. His education includes a Bachelor of Science degree from the United States Military Academy and two master’s degrees in national security and strategic studies from the National War College and the U.S. Naval Command and Staff College. Cardon is married and has three children. SEAN P. ROCHE Deputy Director, Directorate for Digital Innovation, CIA In March 2015, Sean P. Roche was named associate deputy director of CIA for digital innovation. The Directorate for Digital Innovation is responsible for accelerating the integration of digital and cyber capabilities across all of CIA’s mission areas. Prior to his assignment to the Directorate for Digital In- novation, Roche served as the deputy director for science and technology. In this role, he provided daily leadership that enabled the Directorate to attack national intelligence problems with effective targeting, advanced technology and excellent tradecraft.
Recommended publications
  • 'Global Intelligence Co-Operation Versus Accountability: New Facets
    This article was downloaded by: [Aldrich, Richard J.] On: 2 April 2009 Access details: Access Details: [subscription number 910154969] Publisher Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Intelligence and National Security Publication details, including instructions for authors and subscription information: http://www.informaworld.com/smpp/title~content=t713672628 Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem Richard J. Aldrich Online Publication Date: 01 February 2009 To cite this Article Aldrich, Richard J.(2009)'Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem',Intelligence and National Security,24:1,26 — 56 To link to this Article: DOI: 10.1080/02684520902756812 URL: http://dx.doi.org/10.1080/02684520902756812 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.informaworld.com/terms-and-conditions-of-access.pdf This article may be used for research, teaching and private study purposes. Any substantial or systematic reproduction, re-distribution, re-selling, loan or sub-licensing, systematic supply or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material.
    [Show full text]
  • Remnants of Al-Qaeda in Saudi Arabia: Current Assessment
    Remnants of al-Qaeda in Saudi Arabia: Current Assessment Washington, DC - November 9th, 2006 Center for Strategic and International Studies Nawaf Obaid Managing Director Counter-Terrorism in the Kingdom • Since May 2003, Saudi security forces have captured ~845 individuals with direct or indirect links to al-Qaeda. • Over 400 have attended “ideological re-education programs.” • 264 al-Qaeda commanders, logisticians, theologians, financiers and fighters have been captured or killed. • Of 26 members that comprised first “most wanted” list, all but one have been killed or captured and all five initial al-Qaeda cells have been identified, infiltrated and decimated. • Of 36 second-tier operatives comprising second “most wanted” list: • 20 had already fled the Kingdom when list was published • Of remaining 16, only 4 have not been killed or captured • This group carried out recent failed attack on Abqaiq • Over 25 major terrorist attacks have been foiled since May 2003. Saudi National Security Assessment Project 2 Counter-Terrorism in the Kingdom (cont.) • Four of the main routes used by terrorists to smuggle themselves, fighters, weapons and drugs have been identified. • Close surveillance had resulted in hundreds of interceptions on the Saudi-Yemeni border. • The largest of the al-Qaeda safe houses used for logistical support has been destroyed. As have three in Riyadh, two in Qassim, two in the Eastern Province, one in Najran and three in the Western Province (Makkah, Madinah and Jeddah). • Several arrests of fighters returning from Afghanistan and Pakistan have been made over the past several months. Important Note: They had no attack plan and no clear command structure, focused exclusively on avoiding Saudi security services.
    [Show full text]
  • Understanding and Intelligence Support to Joint Operations
    JDP 2-00 JOINT DOCTRINE PUBLICATION 2-00 UNDERSTANDING AND INTELLIGENCE SUPPORT TO JOINT OPERATIONS Joint Doctrine Publication 2-00 (JDP 2-00) (3rd Edition), August 2011 is promulgated as directed by the Chiefs of Staff Assistant Chief of the Defence Staff (Development, Concepts and Doctrine) CONDITIONS OF RELEASE 1. This information is Crown copyright and the intellectual property rights for this publication belong exclusively to the Ministry of Defence (MOD). No material or information contained in this publication should be reproduced, stored in a retrieval system, or transmitted in any form outside MOD establishments except as authorised by both the sponsor and the MOD where appropriate. 2. This information may be subject to privately owned rights. i 3rd Edition, Change 1 JDP 2-00 AUTHORISATION The Development, Concepts and Doctrine Centre (DCDC) is responsible for publishing Joint Doctrine Publications (JDPs) within a hierarchy of similar publications. Readers wishing to quote JDPs as reference material in other work should confirm with the DCDC Doctrine Editor whether the particular publication and amendment state remains authoritative. Comments on factual accuracy or proposals for amendment are welcomed by the Doctrine Editor at: The Development, Concepts and Doctrine Centre Ministry of Defence Shrivenham SWINDON, Wiltshire, SN6 8RF Telephone number: 01793 314216/7 Military Network: 96161 4216/4217 Facsimile number: 01793 314232 Military Network: 96161 4232 E-mail: [email protected] DISTRIBUTION Distribution of JDPs is managed by the Forms and Publications Section, DSDA Operations Centre, C16 Site, Ploughley Road, Arncott, Bicester, OX25 1LP. Requests for issue of this publication, or amendments to its distribution should be referred to the DSDA Operations Centre.
    [Show full text]
  • UK Eyes Alpha by the Same Author UK Eyes Alpha Big Boys' Rules: the SAS and the Secret Struggle Against the IRA Lnside British Lntelligence
    UK Eyes Alpha By the same author UK Eyes Alpha Big Boys' Rules: The SAS and the secret struggle against the IRA lnside British lntelligence Mark Urban tr firhrr anr/ fulrr' ft For Ruth and Edwin Contents lntroduction Part One The First published in I996 1 Coming Earthquake 3 and Faber Limited by Faber 2 A Dark and Curious Shadow 13 3 Queen Square London vcrN JAU 3 The Charm Offensive 26 Typeset by Faber and Faber Ltd Printed in England by Clays Ltd, St Ives plc 4 Most Ridiculed Service 42 All rights reserved 5 ZIRCON 56 O Mark Urban, 1996 6 Springtime for Sceptics 70 Mark Urbar-r is hereby identified as author of 7 A Brilliant Intelligence Operation 84 this work in accordance with Section 77 of the Copyright, Designs and Patents Act 1988 8 The \7all Comes Tumbling Down 101 A CIP rccord for this book is available from the Part Two British Library 9 Supergun LL7 tsnN o-57r-r7689-5 10 Black Death on the Nevsky Prospekt L29 ll Assault on Kuwait L43 12 Desert Shield 153 13 Desert Storm 165 14 Moscow Endgame LA2 Part Three l5 An Accidcnt of History L97 l(r Irrlo thc ll:rllirrn 2LO tt),)B / (,1,1 l, I Qulgrnirc 17 Time for Revenge 22L lntroduction 18 Intelligence, Power and Economic Hegemony 232 19 Very Huge Bills 245 How good is British intelligence? What kind of a return do ministers and officials get 20 The Axe Falls 2il for the hundreds of millions of pounds spent on espionage each year? How does this secret establishment find direction and purpose 2l Irish Intrigues 269 in an age when old certainties have evaporated? Very few people, even in Conclusion 286 Whitehall, would feel confident enough to answer these questions.
    [Show full text]
  • Guidelines on SPECIAL BRANCH WORK in the United Kingdom
    Guidelines on SPECIAL BRANCH WORK in the United Kingdom Foreword Within the police service, Special Branches play a key role in protecting the public and maintaining order. They acquire and develop intelligence to help protect the public from national security threats, especially terrorism and other extremist activity, and through this they play a valuable role in promoting community safety and cohesion. These revised Guidelines – which replace the Guidelines issued in 1994 – describe the current broad range of Special Branch roles and functions at national, regional and local levels. Although Special Branches continue to have important roles in the policing of extremist activity and in the provision of personal protection for VIPs and Royalty, counter terrorist work, in close co-operation with the Security Service (MI5), is currently the main focus of their activity. The current nature of the terrorist threat requires a flexible response and we are encouraged by the development of regional structures which will enhance this approach. In addition, the appointment of the National Co-ordinator of Special Branch will help ensure an even more effective joined-up approach. We are grateful for the professionalism and efficiency with which all Special Branch Officers carry out their duties and we hope that the revised Guidelines provide a useful tool in describing and putting into context the essential nature of Special Branch working. We commend them to you. The Rt Hon David Blunkett MP Cathy Jamieson MSP The Rt Hon Jane Kennedy MP Secretary of State for Minister for Justice Minister of State for the Home Department Northern Ireland GUIDELINES ON SPECIAL BRANCH WORK IN THE UNITED KINGDOM PURPOSE 1.
    [Show full text]
  • Swansea University Open Access Repository
    Cronfa - Swansea University Open Access Repository _____________________________________________________________ This is an author produced version of a paper published in: The Welsh History Review / Cylchgrawn Hanes Cymru Cronfa URL for this paper: http://cronfa.swan.ac.uk/Record/cronfa40530 _____________________________________________________________ Paper: Eirug, A. (2017). The Security Services in South Wales During the First World War. The Welsh History Review / Cylchgrawn Hanes Cymru, 28(4) http://dx.doi.org/10.16922/whr.28.4.7 _____________________________________________________________ This item is brought to you by Swansea University. Any person downloading material is agreeing to abide by the terms of the repository licence. Copies of full text items may be used or reproduced in any format or medium, without prior permission for personal research or study, educational or non-commercial purposes only. The copyright for any work remains with the original author unless otherwise specified. The full-text must not be sold in any format or medium without the formal permission of the copyright holder. Permission for multiple reproductions should be obtained from the original author. Authors are personally responsible for adhering to copyright and publisher restrictions when uploading content to the repository. http://www.swansea.ac.uk/library/researchsupport/ris-support/ 1 THE SECURITY SERVICES IN SOUTH WALES DURING THE FIRST WORLD WAR Aled Eirug Cardiff Abstract: This article reveals the activity of British intelligence agents in south Wales during the Great War, and their involvement in the surveillance of those considered to be ‘subversive’ elements within the peace and labour movements. Within the context of south Wales, it considers the significant shift of the prime concern for the security agencies during the War, from German counter-espionage to domestic counter- subversion.
    [Show full text]
  • National Incident Management System: Intelligence/Investigations
    NATIONAL INCIDENT MANAGEMENT SYSTEM Intelligence/Investigations Function Guidance and Field Operations Guide October 2013 NIMS: Intelligence/Investigations Function Guidance and Field Operations Guide Table of Contents Intelligence/Investigations Function Guidance ................................................................ 1 Introduction.................................................................................................................................... 3 Intelligence/Investigations Function ............................................................................................ 7 Use and Organization of Groups .................................................................................................. 8 Use and Organization of Branches ............................................................................................... 9 Summary ...................................................................................................................................... 10 Intelligence/Investigations Function Field Operations Guide ....................................... 11 Intelligence/Investigations Functional Overview ...................................................................... 12 Groups and Structure within the Intelligence/Investigations Section .................................... 19 List of Abbreviations and Glossary of Key Terms ......................................................... 31 List of Abbreviations ..................................................................................................................
    [Show full text]
  • Chairman's Introduction
    a. Chairman’s Introduction “The army does not determine its own structure, rules and methods of action … the organization of the army and the determination of its character – all these are within the sole capacity of civilian authorities: the Government, the Knesset and the voters.” (David Ben Gurion, Army and Defense, pages 141-142.) In the past decade, Israel’s intelligence services have faced three crucial challenges to their ability to detect the development of non-conventional warfare and ground-to-ground missiles in second and third tier countries. • In Iran, where they earned significant success by being among the first intelligence services to detect its efforts to develop a military nuclear industry already in the mid-Nineties. • In Iraq, where they had a certain lack of success in their efforts to establish elaborate Humint and Sigint systems that would be able to trace the existence and/or absence of its chemical and biological weapons systems and their missile capability in real time. • In Libya, where they failed to disclose the overall picture and woke up one fine morning to learn from foreign intelligence services of the real scope of that country’s efforts to obtain nuclear weapons that could threaten Israel’s very existence. With all due respect to innovative methods and brilliant operations – which took place in all the above three cases – these do not add up to the minimal achievement required in matters so essential to our national security. Thus, for example, the idea that a hostile Arab country like Libya, with a leader as unpredictable as Gaddafi, could have developed an elaborate nuclear industry without Israel’s intelligence services giving it the necessary early 5 warning to tackle the threat, or at least to prepare for it in good time, is simply intolerable.
    [Show full text]
  • A Short History of Army Intelligence
    A Short History of Army Intelligence by Michael E. Bigelow, Command Historian, U.S. Army Intelligence and Security Command Introduction On July 1, 2012, the Military Intelligence (MI) Branch turned fi fty years old. When it was established in 1962, it was the Army’s fi rst new branch since the Transportation Corps had been formed twenty years earlier. Today, it remains one of the youngest of the Army’s fi fteen basic branches (only Aviation and Special Forces are newer). Yet, while the MI Branch is a relatively recent addition, intelligence operations and functions in the Army stretch back to the Revolutionary War. This article will trace the development of Army Intelligence since the 18th century. This evolution was marked by a slow, but steady progress in establishing itself as a permanent and essential component of the Army and its operations. Army Intelligence in the Revolutionary War In July 1775, GEN George Washington assumed command of the newly established Continental Army near Boston, Massachusetts. Over the next eight years, he dem- onstrated a keen understanding of the importance of MI. Facing British forces that usually outmatched and often outnumbered his own, Washington needed good intelligence to exploit any weaknesses of his adversary while masking those of his own army. With intelligence so imperative to his army’s success, Washington acted as his own chief of intelligence and personally scrutinized the information that came into his headquarters. To gather information about the enemy, the American com- mander depended on the traditional intelligence sources avail- able in the 18th century: scouts and spies.
    [Show full text]
  • Instructors' Bios
    Infrastructure Resilience Research Group (IRRG) Office of the Dean, Faculty of Engineering and Design HARMONIZED THREAT RISK VULNERALBILITY ASSESSMENT (HTRVA) INSTRUCTORS’ BIOS Major (Ret’d) Alan Dickie, CD Al began his career with the Canadian Forces (CF) in 1974 with a reconnaissance unit and did a stint as a Nuclear Security Operator before transferring to the Military Intelligence Branch in 1982. He spent much of his career overseas, at the headquarters in West Germany and with the Attaché program in Beijing, China. Back in Canada he provided intelligence to the Task Force Commander during the Winnipeg flood of 1997 and in the aftermath of the ice storm of 1998. Since leaving the Regular Army Al has worked as a consultant with CF to provide intelligence training and process evaluation. He worked for several years as a crypto-analyst in the Counter-Terrorism Office of the Communications Security Establishment and as the leader of the CF Joint Imagery Centre’s Advanced Exploitation Section. He also remained active in the Army as a member of Ottawa’s Reserve Intelligence unit as the Training Officer, Sergeant-Major and, after being commissioned, the Commanding Officer. Al’s most recent work has been as the International Intelligence Training Coordinator on a part-time basis for the Canadian Army Headquarters while his full-time job is as the manager of the Intelligence Section at Natural Resources Canada. Major (Ret’d) Barry J. McLean Threat, Risk and Vulnerability Assessment Background Barry McLean has significant experience in the
    [Show full text]
  • The British Intelligence Community in Singapore, 1946-1959: Local
    The British intelligence community in Singapore, 1946-1959: Local security, regional coordination and the Cold War in the Far East Alexander Nicholas Shaw Submitted in accordance with the requirements for the degree of PhD The University of Leeds, School of History January 2019 The candidate confirms that the work submitted is his own and that appropriate credit has been given where reference has been made to the work of others. This copy has been supplied on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. The right of Alexander Nicholas Shaw to be identified as Author of this work has been asserted by Alexander Nicholas Shaw in accordance with the Copyright, Designs and Patents Act 1988. Acknowledgements I would like to thank all those who have supported me during this project. Firstly, to my funders, the White Rose College of the Arts and Humanities and the Arts and Humanities Research Council. Caryn Douglas and Clare Meadley have always been most encouraging and have never stinted in supplying sausage rolls. At Leeds, I am grateful to my supervisors Simon Ball, Adam Cathcart and, prior to his retirement, Martin Thornton. Emma Chippendale and Joanna Phillips have been invaluable guides in navigating the waters of PhD admin. In Durham, I am indebted to Francis Gotto from Palace Green Library and the Oriental Museum’s Craig Barclay and Rachel Barclay. I never expected to end up curating an exhibition of Asian art when I started researching British intelligence, but Rachel and Craig made that happen.
    [Show full text]
  • Russian Military Intelligence: Background and Issues for Congress
    Russian Military Intelligence: Background and Issues for Congress November 24, 2020 Congressional Research Service https://crsreports.congress.gov R46616 SUMMARY R46616 Russian Military Intelligence: Background and November 24, 2020 Issues for Congress Andrew S. Bowen Following Russia’s occupation of Ukraine’s Crimea region and invasion of eastern Ukraine in Analyst in Russian and 2014, many observers have linked Russia to additional malicious acts abroad. U.S. and European European Affairs officials and analysts have accused Russia of, among other things, interfering in U.S. elections in 2016; attempting a coup in Montenegro in 2016; conducting cyberattacks against the World Anti- Doping Agency and the Organization for the Prohibition of Chemical Weapons in 2016 and 2018, respectively; attempting to assassinate Russian intelligence defector Sergei Skripal in the United Kingdom in 2018; and offering “bounties” to Taliban-linked fighters to attack U.S. personnel in Afghanistan. Implicated in all these activities is Russia’s military intelligence agency, the Main Directorate of the General Staff (GU), also known as the GRU. The United States has indicted GRU officers and designated the GRU for sanctions in response to Russia’s invasion of Ukraine, cybercrimes, and election interference. The Department of Justice has indicted GRU officers for cyber-related offenses against the World Anti-Doping Agency and the Organization for the Prohibition of Chemical Weapons, NotPetya malware attacks in 2017, various cyberattacks against the 2018 Olympics, and interference in the 2016 U.S. elections. The GRU as an agency has been designated for sanctions under Executive Order 13694, as amended, and Section 224 of the Countering Russian Influence in Europe and Eurasia Act of 2017 (CRIEEA; P.L.
    [Show full text]