Seminar on Intelligence and Foreign Policy

Total Page:16

File Type:pdf, Size:1020Kb

Seminar on Intelligence and Foreign Policy JUNIOR TASKFORCE ON INTELLIGENCE AND FOREIGN POLICY Professor Keren Yarhi-Milo WWS 401f (Robertson 014) 117 Bendheim Hall Fall 2012 Office Hours: Mon 11:00-12:00 Monday 1:30-4:30 Phone: 609-258-0772 The Woodrow Wilson School of Public and E-mail: [email protected] International Affairs Princeton University Seminar Description The 9/11 attacks and the intelligence pertaining to the Iraqi WMD programs have led policy-makers, academics, and journalists to criticize the practices and judgments of the US intelligence community, acknowledge the gap between ideal and practical intelligence- policy relations, and revisit the sources of intelligence failures and their implications for US foreign policy. To address these issues, the task force will examine several topics that are central to putting the recent controversies over the 9/11 attacks and the War in Iraq in context. We will explore the various sources of intelligence failures and successes; the challenges terrorism and nuclear proliferation in particular pose in the context of intelligence analysis in the pre- and- post- Cold War environments; the sources and implications of politicization of intelligence by policy-makers; as well as evaluate the effectiveness of past and more recent attempts to reform the intelligence community. The taskforce will primarily focus on the US intelligence community, although a comparative perspective, using case studies detailing the experiences of Israeli and British intelligence communities, will be highlighted as well when appropriate. We will meet with former intelligence officers and policy-makers to hear different perspectives on the role of intelligence, and challenges they see in forging a trusting relationship between intelligence officers and policy-makers. The final task force report will be in the form of recommendations to the Director of National Intelligence and the United States Senate Select Committee on Intelligence. Requirements Individual Research Paper Each student should select a topic for a research paper that pertains to the issue of intelligence and foreign policy, and develop a working research plan that includes a preliminary bibliography and the identification of the relevant materials. Students should meet with the research librarians, and identify officials or experts who might be interviewed. Each student should submit a rough draft of their research paper on November 12. Papers should not exceed 24 pages (including appendices and footnotes, but excluding the title, table of contents, briefing memo, and bibliography.) The paper should be concise and cogent, analyzing the nature of the particular problem, comparing alternative options and their implications, and marshaling information for informed policy choices and recommendations. The paper should include its own set of references and bibliography. Papers should be clearly written and accessible to the audience identified for the Final Report. The final paper is due on January 8. Briefing Paper Students should also submit a short (one- or two-page) briefing paper that provides a summary of the substance of the issue, its political implications, and the available policy options. Draft of the briefing memo is due on November 12. The briefing paper is also due on January 8. Oral Presentation Each student should make an oral presentation based upon the findings and recommendations of her or his research. These presentations will be strictly timed (10 minutes per presentation), and it should single out the significant points in a well- organized way. The student should be prepared to answer questions and respond to the concerns and comments of other Seminar members. The purpose of the question-and- discussion period is to clarify ambiguities, spell out the implications of certain positions, and highlight remaining issues to be addressed. The Junior Seminar Report The Senior Commissioner prepares a draft report with recommendations and their justifications. This report is generally a synthesizing, original statement rather than a compendium of the junior papers. It is intended to blend the juniors' views and recommendations in a creative manner, but with faithfulness to all positions represented. The Seminar discusses and debates the draft report and tries to resolve controversial issues, sometimes by formal vote. A minority report is possible. The Final Report is then prepared. Appended to the Report are the individual juniors’ research papers (completed earlier). Grading 50% Seminar Research Paper 10% Briefing Paper of Research Paper 15% Oral presentation 25% Participation in the group Required Books • Mark M. Lowenthal, Intelligence: From Secrets to Policy, CQ Press. • Loch Johnson & James Wirtz, Intelligence: The Secret World of Spies, Oxford U. Press, Third Edition, 2011. • Paul Pillar, Intelligence and U.S Foreign Policy: Iraq, 9/11, and Misguided Reform. Columbia University Press, 2011. Course Outline and Reading List September 17: What is Intelligence? And How does it Work? • Mark M. Lowenthal, Intelligence: From Secrets to Policy (Washington, DC: CQ Press), Chapters 1, 4-6, and 8 (Skim Chapters 2 and 3). • Lock Johnson, & James Writz, Intelligence, Intro to Part I, Chapters 1, and 4 • Shlomo Gazit. “Estimates and Fortune-Telling in Intelligence Work,” International Security, Vol. 4, No. 4. (Spring 1980), pp.36-56. • Thomas Fingar, Reducing Uncertainty, Chapter 5: Estimative Analysis, pp. 67- 88. • Optional: http://www.nsa.gov/public_info/_files/cryptologic_spectrum/new_national_sigint. pdf Foreign Policy Decision-Making: Theories and Practice • Richard Heurer, “Psychology of Intelligence Analysis,” Center for the Study of Intelligence. Central Intelligence Agency, 1999. Available on line: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi- publications/books-and-monographs/psychology-of-intelligence- analysis/index.html (no need to read chapter 3). • Robert Jervis, "Hypotheses on Misperception," World Politics, Vol. 20, No. 3 (Apr., 1968), pp. 454-479. • Fingar: Intelligence and Grand Strategy: http://iis-db.stanford.edu/pubs/23528/Fingar__Intelligence_and_Grand_Strategy.pdf September 24: The Intelligence – Policy Nexus ** Learning about Library Research Resources with Nancy Pressman Levy (3:45 -4:30 PM) • Mark Lowenthal, Intelligence. Chapters 9 and 11. • Jervis, Why Intelligence and Policymakers Clash, Political Science Quarterly 125. (Summer 2010): 185-204. • Joshua Rovner, Fixing the Facts. (Cornell University Press: 2011) pp. 8-48. • Richard Betts, “Politicization of Intelligence: Costs and Benefits,” in Betts and Mahnken, eds., Paradoxes of Strategic Intelligence (London: Frank Cass 2003), 59–79. • Loch Johnson & James Wirtz, Intelligence. Chapters 14, 15, 17. • Richard Best, “Intelligence Estimates: How Useful to Congress?” A Congressional Research Service Report, January 2011, 12. • Paul Pillar, Intelligence and US Policy, Chapter 6 “politicization,” pp. 121-174. • Paul Pillar, Intelligence and US Policy, Chapter 5 “Great Decisions and the Irrelevance of Intelligence,” pp. 98-120. • John McLaughlin, “Serving the National Policymaker,” Chapter 4 in Analyzing Intelligence: Origins, Obstacles and Innovations, pp. 71-90. • Dennis Wilder. Improving Policymaker Understanding of Intelligence: An Educated Consumer Is Our Best Customer. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi- publications/csi-studies/studies/vol.-k55-no.-2/an-educated-consumer-is- our-best-customer.html October 1: Challenges in Estimating Intelligence • Jervis, Why Intelligence Fails, Chapters TBD. • Philip Davies, “Intelligence Culture and Intelligence Failure in Britain and the United States,” Cambridge Review of International Affairs, Vol. 17, No.3 (Oct. 2004), pp. 495–520. • Loch Johnson &James Wirtz, Intelligence. Chapters 8, 10 and 12. • John Hedley, “Learning from Intelligence Failures,” International Journal of Intelligence and CounterIntelligence, Vol. 18, No. 3 (Fall 2005), pp. 435–50. • David Robarge, “Getting It Right: CIA Analysis of the 1967 Arab-Israeli War,” Studies in Intelligence, Vol. 49, No. 1 (2005). • James Davis, Why Bad Things Happen to Good Analysts, Chapter 10 in Analyzing Intelligence: Origins, Obstacles, and Innovations, pp.157-170. • Uri Bar Joseph and Jack Levy, Conscious Action and Intelligence Failure. Political Science Quarterly, Volume 124, Number 3, 2009. Surprise Attacks • Michael Handel, “Intelligence and the Problem of Strategic Surprise,” in Betts and Mahnken, eds., Paradoxes of Strategic Intelligence (London: Frank Cass 2003), pp. 1-58. • James Writz, “Theory of Surprise,” in Betts and Mahnken, eds., Paradoxes of Strategic Intelligence (London: Frank Cass 2003), pp. 101-116. October 8: The Use of Historical Case Studies Pearl Harbor • Roberta Wohlstetter. “Cuba and Pearl Harbor: Hindsight and Foresight,” Foreign Affairs, Vol. 43, No. 4 (Jul., 1965), pp. 691-707. • James Wirtz, “Deja Vu? Comparing Pearl Harbor and September 11,” Harvard International Review, Vol.24, No. 3, (2002), pp. 73-77 (or Chapter 9 in Johnson and Writz). The Cuban Missiles Crisis • Jonathan Renshon, Mirroring Risk: The Cuban Missile Estimation http://scholar.harvard.edu/renshon/files/Renshon-Mirroring_Risk_copy.pdf The Fall of the Shah in Iran • Robert Jervis. “Failing to See that the Shah Was in Danger,” in Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War, (Cornell University Press, 2010) , pp. 15-122. • Janne Nolan and Douglass McEachin, “Discourse, Dissent, and Strategic Surprise: Formulating U.S.
Recommended publications
  • Security and Society in the Information Age Vol. 3
    SECURITY Katarzyna MANISZEWSKA, Paulina PIASECKA Editors AND SOCIETY IIt is our pleasure to present a third scholarly volume bringing together a unique series of research papers by talented students – participants in the Security and Society in the Information Age program held at Collegium Civitas University in AGE IN THE INFORMATION Warsaw, Poland. In 2020, due to the pandemic, the program was held for first time online and included a component on the security-related implications of Covid-19. The students took part in a fully-fledged online course followed by an online research internship at the Terrorism Research Center. This book presents the results of their SECUR TY work – research papers devoted to contemporary security threats. The contributors not only analyzed the issues but also looked for solutions and these papers include recommendations for policy makers. We hope you will find this book interesting and valuable and we cordially invite you to learn more about the Security and Society in the Information Age program at: www. AND securityandsociety.org Volume 3 SOCIETY IN THE INFORMATION AGE Volume 3 ISBN 978-83-66386-15-0 9 788366 386150 Volume 3 COLLEGIUM CIVITAS „Security and Society in the Information Age. Volume 3” publication is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License under the following terms – you must keep this information and credit Collegium Civitas as the holder of the copyrights to this publication. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/4.0/ Reviews: Daniel Boćkowski, PhD, University of Bialystok Marek Jeznach, PhD, an independent security researcher Editors: Katarzyna Maniszewska, PhD ( https://orcid.org/0000-0002-8021-8135) and Paulina Piasecka, PhD ( https://orcid.org/0000-0003-3133-8154) Proofreader: Vanessa Tinker, PhD e-ISBN: 978-83-66386-15-0 ISBN-print: 978-83-66386-16-7 DOI 10.6084/m9.figshare.13614143 Publisher: Collegium Civitas Press Palace of Culture and Science, XI floor 00-901 Warsaw, 1 Defilad Square tel.
    [Show full text]
  • Strategic Latency: Red, White, and Blue Managing the National and International Security Consequences of Disruptive Technologies Zachary S
    Strategic Latency: Red, White, and Blue Managing the National and International Security Consequences of Disruptive Technologies Zachary S. Davis and Michael Nacht, editors Center for Global Security Research Lawrence Livermore National Laboratory February 2018 Disclaimer: This document was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor Lawrence Livermore National Security, LLC, nor any of their employees makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States government or Lawrence Livermore National Security, LLC. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC, and shall not be used for advertising or product endorsement purposes. LLNL-BOOK-746803 Strategic Latency: Red, White, and Blue: Managing the National and International Security Consequences of Disruptive Technologies Zachary S. Davis and Michael Nacht, editors Center for Global Security Research Lawrence Livermore National Laboratory February
    [Show full text]
  • Strategic Studies Quarterly an Air Force–Sponsored Strategic Forum on National and International Security
    WINTER 2019 Vol 13, No. 4 On Great Power Conflict: Entangled or Untangled Alliances? An Interview with Charles A. Kupchan Attrition and the Will to Fight a Great Power War Emma Moore FEATURE ARTICLE Through the Glass—Darker James Wood Forsyth Jr. Ann Mezzell Missile Defense for Great Power Conflict: Outmaneuvering the China Threat Henry Obering III Rebeccah L. Heinrichs Ambiguity, Risk, and Limited Great Power Conflict Thomas G. Mahnken Gillian Evans Techniques for Great Power Space War Paul Szymanski Minding the Gaps: US Military Strategy toward China Derek Grossman John Speed Meyers Decide, Disrupt, Destroy: Information Systems in Great Power Competition with China Ainikki Riikonen Strategic Studies SSQ Quarterly Chief of Staff, US Air Force Gen David L. Goldfein, USAF Commander, Air Education and Training Command Lt Gen Marshall B. Webb, USAF Commander and President, Air University Lt Gen Anthony J. Cotton, USAF Director, Academic Services Dr. Mehmed Ali Director, Air University Press Lt Col Darin Gregg, USAF Editor Col W. Michael Guillot, USAF, Retired Content Editor Illustrator Jeanne K. Shamburger Daniel M. Armstrong Prepress Production Coordinator Webmaster Megan N. Hoehn Kevin V. Frey Advisors Contributing Editors Gen Michael P. C. Carns, USAF, Retired David C. Benson, PhD James W. Forsyth, PhD Mark J. Conversino, PhD Christina Goulter, PhD Kelly A. Grieco, PhD Robert P. Haffa, PhD Michael R. Kraig, PhD Jay P. Kesan, PhD Col Kristi Lowenthal, USAF, PhD Charlotte Ku, PhD Dawn C. Murphy, PhD Benjamin S. Lambeth, PhD David D. Palkki, PhD Martin C. Libicki, PhD Nicholas M. Sambaluk, PhD Allan R. Millett, PhD https://www.af.mil/ https://www.aetc.af.mil/ https://www.airuniversity.af.edu/ Strategic Studies Quarterly An Air Force–Sponsored Strategic Forum on National and International Security WINTER 2019 VOL.
    [Show full text]
  • Frustrating Evolution of the Defense Intelligence Agency
    INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps. Each original is also photographed in one exposure and is included in reduced form at the back of the book. Photographs included in the original manuscript have been reproduced xerographically in this copy. Higher quality 6" x 9" black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. University Microfilms International A Bell & Howell Information Com pany 300 North Zeeb Road. Ann Arbor. Ml 48106-1346 USA 313/761-4700 800/521-0600 Order Number 1353496 The frustrating evolution of the Defense Intelligence Agency Jeszenszky, Elizabeth, M.A. The American University, 1992 Copyright ©1992 by Jeszenszky, Elizabeth.
    [Show full text]
  • Volume 5, Issue 2 (Fall/Winter 2017) Isbn-13: 978-0-692-11069-0 Isbn-10: 0-692-11069-0 Articles
    TM VOLUME 5 ISSUE 2 FALL/WINTER 2017 National Security Law Journal Antonin Scalia Law School George Mason University 3301 Fairfax Drive Arlington, VA 22201 www.nslj.org © 2017 National Security Law Journal. All rights reserved. Library of Congress Publication Data (Serial) ‪National Security Law Journal. ‪‪Arlington, Va. : National Security Law Journal, 2013-‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪ ‪ K14 .N18 ‪ ‪‪ISSN: ‪2373-8464‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪ ‪ Variant title: NSLJ National security—Law and legislation—Periodicals LC control no. 2014202997 (http://lccn.loc.gov/2014202997) Past issues available in print at the Law Library Reading Room of the Library of Congress (Madison, LM201). VOLUME 5, ISSUE 2 (FALL/WINTER 2017) ISBN-13: 978-0-692-11069-0 ISBN-10: 0-692-11069-0 ARTICLES REFORM OF THE INTELLIGENCE COMMUNITY PREPUBLICATION REVIEW PROCESS: BALANCING FIRST AMENDMENT RIGHTS AND NATIONAL SECURITY INTERESTS Christopher E. Bailey MULTIPLE PRINCIPALS AND THE (LACK OF) INTELLIGENCE OVERSIGHT Tobias T. Gibson COMMENTS THE KATZ OUTTA THE BAG: BRINGING NATIONAL SECURITY LETTERS INTO COMPLIANCE WITH THE “REASONABLE EXPECTATION OF PRIVACY” TEST Anees Mokhiber OUR ALLIES HAVE RIGHTS, TOO: JUDICIAL DEPARTURE FROM IN PERSONAM CASE LAW TO INTERFERENCE IN INTERNATIONAL POLITICS Laura J. Rosenberger VOLUME 5 FALL/WINTER 2017 ISSUE 2 PUBLISHED BY THE ANTONIN SCALIA LAW SCHOOL AT GEORGE MASON UNIVERSITY Cite as 5 NAT’L SEC. L.J. ___ (2017). The National Security Law Journal (“NSLJ”) is a student-edited legal periodical published twice annually at George Mason University School of Law in Arlington, Virginia. We print timely, insightful scholarship on pressing matters that further the dynamic field of national security law, including topics relating to foreign affairs, homeland security, intelligence, and national defense.
    [Show full text]
  • Lowenthal – Intelligence Collection in Transition
    http://mail.worldpoliticsreview.com/article.aspx?id=3235 Intelligence Collection in Transition Mark Lowenthal | 02 Feb 2009 Collection is one of the essential activities in intelligence. Not only does it involve some of the most daring and technically adept aspects of intelligence, it is also a major part of the United States intelligence budget. It even forms the basis for the security classification system, with classification of intelligence stemming from the harm that would be done to U.S. national security if the basis by which intelligence was obtained were revealed. Much of the intelligence collection system that the United States developed over many decades was dictated by two factors: the nature of the Soviet state and the ability to adapt or to create technology to penetrate that intelligence target. The Soviet Union was vast, secretive and largely what intelligence officers call a "denied area." Much of what the United States most wanted to know about it took place deep in its interior, driving the U.S. to find ways to penetrate that space with technology -- balloons, then airplanes and then satellites. The Soviet Union and other nation states were and are somewhat appealing intelligence targets, because some major aspects of what we wish to know "self-reveal." Military bases, large scale deployments and long-distance weapons tests (e.g., missiles) cannot be easily hidden. Of course, much that we wish to know -- plans, intentions, underground facilities, for example -- also remains more difficult to discover. The collapse of the Soviet Union in 1991 and the end of the Cold War seemed to usher in a new international order.
    [Show full text]
  • Critical Thinking and Intelligence Analysis, Second Printing (With Revisions) David T
    Managing the private spies PCN 5193 The National Defense Intelligence College supports and encourages research on intelligence issues that distills lessons and improves Intelligence Community capabilities for policy-level and operational consumers Critical Thinking and Intelligence Analysis, Second Printing (with revisions) David T. Moore This series of Occasional Papers presents the work of faculty, students and others whose research on intelligence issues is supported or otherwise encouraged by the National Defense Intelligence College (NDIC) through its Center for Strategic Intelligence Research. Occasional Papers are distributed to Department of Defense schools and to the Intelligence Community, and unclassified papers are available to the public through the National Technical Information Service (www.ntis.gov). Selected papers are also available through the U.S. Government Printing Office (www.gpo.gov). This work builds on earlier publications in this series, particularly Occasional Papers Two, Six, and Seven; Getting Intelligence Right: The Power of Logical Procedure, Intelligence Essentials for Everyone, and Intelligence Analysis in Theater Joint Intelligence Centers: An Experiment in Applying Structured Methods. The author’s insights have been developed through years of creative interaction with the Community’s leaders in analytic methododology, and tested for practicality by successive waves of students in training and education courses throughout the Community. Proposed manuscripts for these papers are submitted for consideration to the NDIC Press Editorial Board. Papers undergo review by senior officials in Defense, Intelligence and civilian academic or business communities. Manuscripts or requests for additional copies of Occasional Papers should be addressed to Defense Intelligence Agency, National Defense Intelligence College, MC-X, Bolling AFB, Washington, DC 20340-5100.
    [Show full text]
  • Proquest Dissertations
    LIGHTING THE SHADOWS: AN EVALUATION OF THEORY AND PRACTICE IN CANADIAN DEFENCE INTELLIGENCE FAffiE DE LA LUMIERE: UNE EVALUATION DE LA THEORIE ET DE LA PRATIQUE DU RENSEIGNEMENT DE DEFENSE AU CANADA A Thesis Submitted to the Division of Graduate Studies of the Royal Military College of Canada by James Samuel Cox, OMM, CD, MA Brigadier General (Retired) In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy May 2011 © This thesis may be used within the Department of National Defence but copyright for open publication remains the property of the author. 1 Library and Archives Bibliotheque et 1*1 Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington OttawaONK1A0N4 OttawaONK1A0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-82224-1 Our file Notre reference ISBN: 978-0-494-82224-1 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library and permettant a la Bibliotheque et Archives Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par I'lnternet, preter, telecommunication or on the Internet, distribuer et vendre des theses partout dans le loan, distribute and sell theses monde, a des fins commerciales ou autres, sur worldwide, for commercial or non­ support microforme, papier, electronique et/ou commercial purposes, in microform, autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in this et des droits moraux qui protege cette these.
    [Show full text]
  • The Changing Face of the NCMF
    The Link BULLETIN OF THE NATIONAL CRYPTOLOGIC MUSEUM FOUNDATION, INC. VOLUMES 9, NO. 3 - , NO. 2, COMPOSITE Summer 2008 THe CHANGING FAce of THe NCMF Events of the past year have moved too quickly for the slow pace of publication of The Link. Issues intended for publication covering Fall 2006 and Winter 2006-2007 have, accordingly, been “pulled back” from the printer and – to adopt the term recently applied to military action in Iraq – we are “surging” by consolidating about a year and a half of content into a single composite issue. That requires a great deal of compression and omission, even to “hit the highlights.” We apologize in advance for the omitted coverage. In return, we plan next to introduce a new look, with color photographs, as the beginning of some further experiments to improve our communication with you, our members and readers. We thank our ambidextrous colleague, John Garcia, and his associates and corporate sponsors for the interim issuance of the occasional “NCMF Newsletter,” mailed to you. Our webmaster, Bob Bowie, Bill Saadi, our website coordinator, and others are pondering changes in the NCMF web site. Thanks also go to occasional Link contributors Ray Schmidt, David Hamer, “cub reporter” Mary Faletto, Kirsten Eland, Jim Boone, Prof. Mark Sommer, and others whose by-lines have appeared. They represent the vanguard of what we hope will be a plethora of “new” (and familiar) names as we invite others of you to remember (as we reminded you in Volume 1, Number 1 ten years ago) that, by our old definition, a “link” should go both ways.
    [Show full text]
  • 2016 Program
    2016 PROGRAM SARASOTA INSTITUTE OF LIFETIME LEARNING Global Issues Series An Insider’s View of Today’s World FREE! Ambassadors Panel March 30 See page 49 www.sillsarasota.org Sarasota Program A Message from the President Pages M4-M5 MONDAY MUSIC SESSIONS Welcome to SILL’s 45th year of outstand- MUSIC MONDAYS ing lectures. SILL exists for you and thrives because of your continued support. 12 Lectures January 4 - March 21, 10:30 am Church of the Palms, 3224 Bee Ridge Road In 1972, SILL was founded as an educa- Pages G4-G5 TUESDAY LECTURE SERIES tional, non-profit organization to bring out- standing experts to Sarasota to speak on the GLOBAL ISSUES SERIES I burning issues of the day. Well over 2000 12 Lectures January 5 - March 22, 10:30 am people attend SILL lectures weekly and First United Methodist Church, 104 S. Pineapple Ave. hundreds watch live telecasts at major Pages G6-G7 WEDNESDAY LECTURE SERIES retirement centers. GLOBAL ISSUES SERIES II Begin your week with Music Mondays. June LeBell’s upbeat, 12 Lectures January 6 - March 23, 10:30 am informative, and entertaining program blends humor, intelligent First United Methodist Church, 104 S. Pineapple Ave. discussion, and performance. Pages G8-G9 THURSDAY LECTURE SERIES Our lectures on world and national affairs remain SILL’s core. Iran, the Middle East, China, Russia - our Program Committee has put together GLOBAL ISSUES SERIES III what is possibly our best ever set of lectures. 12 Lectures January 7 - March 24, 10:30 am First United Methodist Church, 104 S. Pineapple Ave.
    [Show full text]
  • Commencement 1981-1990
    TheJohns Hopkins University Conferring of Degi ees At the Close of the 112th Academic Year May 26, 1988 Digitized by the Internet Archive in 2012 with funding from LYRASIS Members and Sloan Foundation http://archive.org/details/commencement1988 CONTENTS Order of Procession 1 Order of Events 2 Johns Hopkins Society of Scholars 9 Honorary Degree Citations 12 Academic Regalia 17 Awards 19 Honor Societies 25 Student Honors 27 Degree Candidates 29 ORDER OF PROCESSION MARSHALS Edward J. Bouwer Marion C. Panyan Donald A. Cornely Peter B. Petersen Marc D. Donohue A. J. R. Russell-Wood Bruce R. Eicher Gerard H. Schlimm John W. Gryder Henry M. Seidel Bonnie J. Lake Stella Shiber Richard A. Macksey I. William Zartman THE GRADUATES * MARSHALS Jerome B. Schneewind Charles Roger Westgate THE FACULTIES MARSHALS Robert E. Green Owen M. Phillips THE DEANS MEMBERS OF THE SOCIETY OF SCHOLARS OFFICERS OF THE UNIVERSITY THE TRUSTEES * CHIEF MARSHAL Nathaniel B. Thayer THE CHAPLAINS THE PRESENTERS OF THE HONORARY DEGREE CANDIDATES THE HONORARY DEGREE CANDIDATES THE PROVOST OF THE UNIVERSITY THE CHAIRMAN OF THE BOARD OF TRUSTEES THE PRESIDENT OF THE UNIVERSITY * 1- ORDER OF EVENTS STEVEN MULLER President of the University, presiding PRELUDE Suite of Nine In trades, Sonatas, Bab and Sarabandes Johann Christoph Pezel (1639-1694) * PROCESSIONAL The audience is requested to stand as the Academic Procession moves into the area and to remain standing after the Invocation FESTIVE MARCHES from "Belshazzar, Flioridante, Ezio, Saint Cecilia's Day, Rinaldo, Scipione" Georg Friedrich Handel (1685-1759) La Mourisque TlELMAN SUSATO (P-1561) THE PRESIDENTS PROCESSION Fanfare Walter Piston (1894-1976) Marches from Judas Maccabaeus Georg Friedrich Handel (1685-1759) * INVOCATION GRETCHEN VAN L'TT Chaplain The Johns Hopkins University THE NATIONAL ANTHEM * GREETINGS GEORGE G.
    [Show full text]
  • A FLOURISHING CRAFT: TEACHING INTELLIGENCE STUDIES Joint
    32688cvr.fh5 5/19/99 11:15 AM Page 1 C M Y CM MY CY CMY K Joint Military Intelligence College June 1999 A FLOURISHING CRAFT: TEACHING INTELLIGENCE STUDIES Occasional Paper Number Five TEL IN LIG Y E R N A C T E I L C I O M L L T E N G I E O J 1962 Papers Prepared for the 18 June 1999 Joint Military Intelligence College Conference on Teaching Intelligence Studies at Colleges and Universities Composite The Joint Military Intelligence College supports and encourages research on intelligence issues that distills lessons and improves support to policy-level and operational consumers This series of Occasional Papers presents the work of faculty, students and others whose research on intelligence issues is supported or otherwise encouraged by the Joint Military Intelligence College through its Office of Applied Research. Additional copies of unclassified papers in this series are avail- able through the National Technical Information Service (www.ntis.gov). -i Occasional Paper Number Five A FLOURISHING CRAFT: TEACHING INTELLIGENCE STUDIES Edited by Russell G. Swenson, PhD JOINT MILITARY INTELLIGENCE COLLEGE WASHINGTON, DC JUNE 1999 The views expressed in this paper are those of the authors and do not reflect the official policy or position of the Department of Defense or the U.S. Government i CONTENTS Foreword . v Teaching Intelligence: The Intellectual Challenges Mark M. Lowenthal. 1 Teaching Intelligence: Getting Started John Macartney. 11 A Virtual UN Security Council: Educating for Multilateral Strategic Decisionmaking Perry L. Pickert. 37 Teaching Intelligence: Diagnosing the Threat of Weapons of Mass Destruction RE Burnett and Robert Pringle.
    [Show full text]