The Soviet Invasion of Afghanistan, Published by the Center for Cryptologic History, Is a Notable Contribution to Professional Reading About Signals Intelligence•
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Afghanistan, 1989-1996: Between the Soviets and the Taliban
Afghanistan, 1989-1996: Between the Soviets and the Taliban A thesis submitted to the Miami University Honors Program in partial fulfillment of the Requirements for University Honors with Distinction by, Brandon Smith May 2005 Oxford, OH ABSTRACT AFGHANISTAN, 1989-1996: BETWEEN THE SOVIETS AND THE TALIBAN by, BRANDON SMITH This paper examines why the Afghan resistance fighters from the war against the Soviets, the mujahideen, were unable to establish a government in the time period between the withdrawal of the Soviet army from Afghanistan in 1989 and the consolidation of power by the Taliban in 1996. A number of conflicting explanations exist regarding Afghanistan’s instability during this time period. This paper argues that the developments in Afghanistan from 1989 to 1996 can be linked to the influence of actors outside Afghanistan, but not to the extent that the choices and actions of individual actors can be overlooked or ignored. Further, the choices and actions of individual actors need not be explained in terms of ancient animosities or historic tendencies, but rather were calculated moves to secure power. In support of this argument, international, national, and individual level factors are examined. ii Afghanistan, 1989-1996: Between the Soviets and the Taliban by, Brandon Smith Approved by: _________________________, Advisor Karen L. Dawisha _________________________, Reader John M. Rothgeb, Jr. _________________________, Reader Homayun Sidky Accepted by: ________________________, Director, University Honors Program iii Thanks to Karen Dawisha for her guidance and willingness to help on her year off, and to John Rothgeb and Homayun Sidky for taking the time to read the final draft and offer their feedback. -
In Afghanistan Afsar Sadiq Shinwari* School of Journalism and Communication, Hebei University, Baoding, Hebei, China
un omm ica C tio Shinwari, J Mass Communicat Journalism 2019, 9:1 s n s a & M J o f u o Journal of r l n a a n l r i s u m o J ISSN: 2165-7912 Mass Communication & Journalism Review Article OpenOpen Access Access Media after Interim Administration (December/2001) in Afghanistan Afsar Sadiq Shinwari* School of Journalism and Communication, Hebei University, Baoding, Hebei, China Abstract The unbelievable growth of media since 2001 is one of the greatest achievements of Afghan government. Now there are almost 800 publications, 100TV and 302 FM radio stations, 6 telecommunication companies, tens of news agencies, more than 44 licensed ISPs internet provider companies and several number of production groups are busy to broadcast information, drama serial, films according to the afghan Culture, and also connected the people with each other on national and international level. Afghanistan is a nation of 30 million people, and a majority live in its 37,000 villages. But low literacy rate (38.2%) is the main obstacle in Afghanistan, most of the people who lived in rural area are not educated and they are only have focus on radio and TV broadcasting. So, the main purpose of this study is the rapid growth of media in Afghanistan after the Taliban regime, but most of those have uncertain future. Keywords: Traditional media; New media; Social media; Media law programs and also a huge number of publications, mobile Networks, press clubs, newspaper, magazines, news agencies and internet Introduction were appeared at the field of information and technology. -
COIN in Afghanistan - Winning the Battles, Losing the War?
COIN in Afghanistan - Winning the Battles, Losing the War? MAGNUS NORELL FOI, Swedish Defence Research Agency, is a mainly assignment-funded agency under the Ministry of Defence. The core activities are research, method and technology development, as well as studies conducted in the interests of Swedish defence and the safety and security of society. The organisation employs approximately 1000 personnel of whom about 800 are scientists. This makes FOI Sweden’s largest research institute. FOI gives its customers access to leading-edge expertise in a large number of fields such as security policy studies, defence and security related analyses, the assessment of various types of threat, systems for control and management of crises, protection against and management of hazardous substances, IT security and the potential offered by new sensors. FOI Swedish Defence Research Agency Phone: +46 8 555 030 00 www.foi.se FOI Memo 3123 Memo Defence Analysis Defence Analysis Fax: +46 8 555 031 00 ISSN 1650-1942 March 2010 SE-164 90 Stockholm Magnus Norell COIN in Afghanistan - Winning the Battles, Losing the War? “If you don’t know where you’re going. Any road will take you there” (From a song by George Harrison) FOI Memo 3123 Title COIN in Afghanistan – Winning the Battles, Losing the War? Rapportnr/Report no FOI Memo 3123 Rapporttyp/Report Type FOI Memo Månad/Month Mars/March Utgivningsår/Year 2010 Antal sidor/Pages 41 p ISSN ISSN 1650-1942 Kund/Customer Försvarsdepartementet Projektnr/Project no A12004 Godkänd av/Approved by Eva Mittermaier FOI, Totalförsvarets Forskningsinstitut FOI, Swedish Defence Research Agency Avdelningen för Försvarsanalys Department of Defence Analysis 164 90 Stockholm SE-164 90 Stockholm FOI Memo 3123 Programme managers remarks The Asia Security Studies programme at the Swedish Defence Research Agency’s Department of Defence Analysis conducts research and policy relevant analysis on defence and security related issues. -
The Cold War and Mccarthyism Howard Tennant
WARS The Cold War and McCarthyism Howard Tennant 1. Work in pairs. Read the text on the Cold War and then make questions, HISTORY using the phrases in bold. The first question has been done for you. Text A The Cold War The term ‘Cold War’ is used to describe the relationship between America and the Soviet Union from 1945 to 1980. It was a period of conflict, tension and rivalry between the world’s two superpowers. (1) Neither side fought the other – the consequences would be too terrible – but they did fight for their beliefs using other countries. For example, in (2) the Vietnam war in the 1960s and 1970s, (3) South Vietnam was against the Communists and supported by America. North Vietnam was pro-Communist and fought the south (4) using weapons from communist Russia or communist China. In Afghanistan, the Americans supplied the Afghans with weapons after (5) the Soviet Union invaded Afghanistan in 1979. They never physically involved themselves and so avoided direct conflict with the Soviet Union. 1. Did America and the Soviet Union fight each other? 2. When was ___________________________________________________________________________________________________________________________________________________? 3. Which country did the USA ____________________________________________________________________? 4. Which countries supplied weapons ______________________________________________________________? 5. When did the Soviet Union ______________________________________________________________________? • This page has been downloaded from www.onestopclil.com. 1 of 2 Written by Howard Tennant. © Copyright Macmillan Publishers Ltd 2008. FROM WEBSITE •PHOTOCOPIABLECAN BE DOWNLOADED HISTORY 2. In pairs read this text on McCarthyism and make the questions. Text B McCarthyism (1) The term ‘McCarthyism’ refers to a period of strong anti-communist suspicion in the USA that lasted from the late 1940s to the late 1950s. -
Which Law Applies to the Afghan Conflict?
WHICH LAW APPLIES TO THE AFGHAN CONFLICT? By W. Michael Reisman and James Silk* Soviet armed forces have been directly engaged in combat in Afghanistan for more than 8 years.1 The level of international protest, sanctions and media coverage diminished after the initial outcry over the large-scale So- viet intervention in December 1979. With the conclusion in many diplo- matic and professional quarters that the Soviet presence in Afghanistan would be of long duration, the focus of international disapproval shifted from the question whether the Soviet presence in Afghanistan was lawful or not to whether Soviet conduct in Afghanistan was lawful or not: fromjus ad bellum to jus in bello. Access to Afghanistan has been extremely limited, but various individ- uals, commissions and credible international organizations have reported extensive abuses of human rights by Soviet forces there; most of the reports are based largely on refugee testimony.2 While the practices of the Soviet occupation and campaign have emerged with increasing clarity, the ques- tion of which law these practices are to be tested against is still controversial. * W. Michael Reisman is Wesley Newcomb Hohfeld Professor of Jurisprudence, Yale Law School. James Silk expects to receive aJ.D. from Yale University in 1989. The authors gratefully acknowledge the comments and criticism of colleagues on the Board of Editors and of several scholars in Europe. The authors are, of course, solely responsible for the contents. I By the time this article is published, it is possible that the Soviet Union will, at least, have begun to withdraw its troops from Afghanistan. -
You, Me, and Charlie Wilson's War George Crile's Charlie Wilson's War, the Tale of the Defeat of the Soviet
SPECIAL SECTION: You, Me, and Charlie Wilson's War George Crile's Charlie Wilson's War, the tale of the defeat of the Soviet Union in Afghanistan (which led directly to its subsequent unraveling), is quite simply the most extraordinary non- fiction potboiler I have ever read. And, perhaps surprisingly, it has lessons for you and me from Congressman Wilson and his CIA cohort, Gust Avrakotos: (1) Make friends with the ... "Invisible 95%." Gust Avrakotos apparently knew every "top floor" CIA executive secretary by name—and had helped many of them sort out personal or professional problems. The folks in the mailroom and in the bowels of the computer operations affairs were also the subject of Gust's intense and affectionate attentions. In effect, you could say that Gust was Commander-in-Chief of the "Invisible 95%" of the Agency—which allowed him to make extraordinary things happen despite furious resistance from his bosses and bosses' bosses sitting atop a very rigid organization. (2) Create a Networker-Doer Partnership. Congressman Wilson had the networking part down, but he needed help with the doing. Conversely, if you are the doer, then you must find the politician-networker. (3) Carefully manage the BOF/Balance Of Favors. Practice potlatch—giving so much help to so many people on so many occasions (purposeful overkill!) that there is little issue about their supporting you when the (rare!) time comes to call in the chits. (4) Follow the money! "Anybody with a brain can figure out that if they can get on the Defense subcommittee, that's where they ought to be—because that's where the money is."—Charlie Wilson (5) Found material. -
The Kgb in Afghanistan
THE KGB IN AFGHANISTAN RALPH PICKARD Figure 1: A display case of a KGB officer’s grouping showing his known Soviet and Afghanistan medals and award booklets earned during his service in the KGB. There has been much written over the years about the intent of stabilizing the Afghan government from the history of the Soviet forces occupation of Afghanistan deterioration that was occurring throughout the region and during the Cold War. However, less has been written especially the souring relationship with the government from the collecting community perspective about the prior to December 1979. The Soviet forces’ intent was Afghanistan medals and award booklets that were earned to seize all important Afghan government facilities and by Soviet personnel during that same time period. The other important areas.1 Within days after the Soviet forces intent of this article is to shed a little light on a few of invasion into Afghanistan and occupation of the capital the Afghanistan medals that were awarded during the of Kabul, the Afghanistan President was assassinated Cold War through a unique group that belonged to a and replaced with the more pro-Soviet government of KGB officer (Figure 1). This grouping provides strong President, Babrak Karmal, who had promised his loyalty indications that this officer served multiple tours and earlier to the Soviet government. 2,3,4 continued to operate in Afghanistan even after February 1989. However, prior to illustrating more about the group Prior to the invasion of Afghanistan by the Soviets the in this article, a brief overview of the Soviet invasion and two governments had an ongoing relationship dating back available history of the KGB in Afghanistan during the to the early 1920s with Soviet advisors and technicians Cold War will be presented. -
Law Enforcement Intelligence: a Guide for State, Local, and Tribal Law Enforcement Agencies Second Edition
U. S. Department of Justice Office of Community Oriented Policing Services Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies Second Edition David L. Carter, Ph.D. School of Criminal Justice, Michigan State University Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies Second Edition David L. Carter, Ph.D. School of Criminal Justice, Michigan State University This project was supported by Cooperative Agreement #2007-CK-WX-K015 by the U.S. Department of Justice Office of Community Oriented Policing Services. Points of view or opinions contained in this publication are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice or Michigan State University. References to specific agencies, companies, products, or services should not be considered an endorsement by the author or the U.S. Department of Justice. Rather, the references are illustrations to supplement discussion of the issues. Letter from the COPS Office January 2009 Dear Colleague: This second edition of Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement captures the vast changes that have occurred in the 4 years since the first edition of the guide was published in 2004 after the watershed events of September 11, 2001. At that time, there was no Department of Homeland Security, Office of the Director of National Intelligence, Information-Sharing Environment, or Fusion Centers. Since the advent of these new agencies to help fight the war on terror, emphasis has been placed on cooperation and on sharing information among local, state, tribal, and federal agencies. -
The First Americans the 1941 US Codebreaking Mission to Bletchley Park
United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................ -
Acronyms Abbreviations &Terms
Acronyms Abbreviations &Terms A Capability Assurance Job Aid FEMA P-524 / July 2009 FEMA Acronyms Abbreviations and Terms Produced by the National Preparedness Directorate, National Integration Center, Incident Management Systems Integration Division Please direct requests for additional copies to: FEMA Publications (800) 480-2520 Or download the document from the Web: www.fema.gov/plan/prepare/faat.shtm U.S. Department of Homeland Security Federal Emergency Management Agency The FEMA Acronyms, Abbreviations & Terms (FAAT) List is not designed to be an authoritative source, merely a handy reference and a living document subject to periodic updating. Inclusion recognizes terminology existence, not legitimacy. Entries known to be obsolete (see new “Obsolete or Replaced” section near end of this document) are included because they may still appear in extant publications and correspondence. Your comments and recommendations are welcome. Please electronically forward your input or direct your questions to: [email protected] Please direct requests for additional copies to: FEMA Publications (800) 480-2520 Or download the document from the Web: www.fema.gov/plan/prepare/faat.shtm 2SR Second Stage Review ABEL Agent Based Economic Laboratory 4Wd Four Wheel Drive ABF Automatic Broadcast Feed A 1) Activity of Isotope ABHS Alcohol Based Hand Sanitizer 2) Ampere ABI Automated Broker Interface 3) Atomic Mass ABIH American Board of Industrial Hygiene A&E Architectural and Engineering ABIS see IDENT A&FM Aviation and Fire Management ABM Anti-Ballistic Missile -
ABSTRACT BITCHES and THIEVES: GULAG GUARDS, ADMINISTRATORS, and PROFESSIONAL CRIMINALS in the BITCHES' WAR by Adam Richard
ABSTRACT BITCHES AND THIEVES: GULAG GUARDS, ADMINISTRATORS, AND PROFESSIONAL CRIMINALS IN THE BITCHES’ WAR by Adam Richard Rodger Amongst the professional criminals imprisoned in the Soviet Gulag, a split developed between those who kept to the Thieves’ Law and those who broke the Law and collaborated with the State. This violent schism, the Bitches’ War, raged across the entire Gulag system, becoming most heated between 1948 and 1953, and implicated the camps’ guards and administrators as much as the prisoners themselves. This research examines primary and secondary sources, heavily incorporating Gulag survivor memoirs, to investigate the culture of the Thieves-in-Law, these professional criminals, and also to uncover the involvement, intentions, and guilt of the camp administration. This study argues that the Bitches’ War sheds light on the real purpose and function of the Gulag; that it was not primarily about ideological re-education, nor was it primarily about economics and production, but that the Gulag served as a model for social control through use of power, persuasion, and violence. BITCHES AND THIEVES: GULAG GUARDS, ADMINISTRATORS, AND PROFESSIONAL CRIMINALS IN THE BITCHES’ WAR Thesis Submitted to the Faculty of Miami University in partial fulfillment of Master’s Degree by Adam Richard Rodger Miami University Oxford, Ohio 2017 Advisor: Dr. Stephen Norris Reader: Dr. Dan Prior Reader: Dr. Scott Kenworthy ©2017 Adam Richard Rodger This thesis titled BITCHES AND THIEVES GULAG GUARDS, ADMINISTRATORS, AND PROFESSIONAL CRIMINALS IN THE BITCHES’ WAR by Adam Richard Rodger has been approved for publication by The College of Arts and Sciences and The Department of History ____________________________________________________ Dr. -
Critical Infrastructure and Cyber Security Across the World
$&' ! " ! " $).(/(-+,, $% % #% $%$% % ! " ! ! George Bush School of Government and Public Service Texas A&M University Dr. Engel’s Capstone, 2011 Introduction Executive Summary We were tasked by CENTRA Technology, Inc. to create a methodology that could be used to prioritize critical cyber assets in the United States. We have answered that call by developing a user-friendly, consequence-based methodology that requires the end user to carefully consider their cyber assets’ contributions to vital missions of national security, economic security, and public safety. The user will be able to clearly visualize the potential impact of a loss of cyber assets on those three indicators vis-à-vis one another, which is especially important in the midst of the current budgetary uncertainty in Washington. In this study, we first present our definitions of the three indicators, an overview of the 18 sectors of critical infrastructure and commonalities and characteristics of their operating systems, a brief review of the literature on cyber security to date, and, of course a thorough discussion of the intricacies of how our methodology works. Outline of the Problem Over the past few years, computers and the Internet have become an omnipresent force within the American economy. Industries considered to be vital to the nation's well being rely increasingly technology to improve their day-to-day functions. Greater dependency on cyber assets has also opened up many industries to numerous vulnerabilities that can be manipulated through accidental or malicious intent. The Federal Government has acknowledged the problem of cyber-attacks that could arise because of these vulnerabilities in the system.