What Role for the Cia's General Counsel
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Allen W. Dulles and the CIA
THE GILDED AGE Allen W. Dulles and the CIA Allen W. Dulles spent his tenure as the Director of Central Intelligence (DCI) entrenched in secret power struggles that would ensure his ultimate power over the foreign and domestic aff airs for the United States. Th roughout his childhood, Dulles learned to use political power in order to get ahead, and to use secrecy to make unilateral deci- sions. Aft er analyzing examples of his treatment of various foreign aff airs disasters, as well as his manipulation of American media and politicians, Dulles is exposed as a man whose legacy lives in the CIA, as a legendary fi gure who is in fact much more of a craft ed legend than a man of truth. By Sada O. Stewart ‘16 Princeton University of the CIA’s own making, the product of the publicity and the political propaganda Allen Dulles manufactured in the 1950s.”4 How, though, did Dulles craft a fl awless, genius im- age for the CIA? What methods did Dulles use to manipulate the press, the public, and even the other branches of govern- ment to bring forth an agency with “a great reputation and a terrible record?”5 Dulles made the CIA seem like an elite agency full of top agents resulting in high risk, high reward missions—how is this reconciled with the reality of the CIA under Dulles’ reign? INTELLIGENCE IN YOUTH To begin, it is vital to identify the signifi cance of developing and running an intelligence agency in an open democratic system.6 Sun Tzu, author of Th e Art of War, insists the best A Bas-relief of Allen Dulles at the Original Headquarters of (only) way to fi ght a war is to know the enemy. -
ARTIFICIAL INTELLIGENCE on the BATTLEFIELD an Initial Survey of Potential Implications for Deterrence, Stability, and Strategic Surprise Zachary S
ARTIFICIAL INTELLIGENCE ON THE BATTLEFIELD An Initial Survey of Potential Implications for Deterrence, Stability, and Strategic Surprise Zachary S. Davis Center for Global Security Research Lawrence Livermore National Laboratory March 2019 ARTIFICIAL INTELLIGENCE ON THE BATTLEFIELD | I ARTIFICIAL INTELLIGENCE ON THE BATTLEFIELD An Initial Survey of Potential Implications for Deterrence, Stability, and Strategic Surprise Zachary S. Davis ARTIFICIAL INTELLIGENCE ON THE BATTLEFIELD | III Table of Contents About the Author. VI Introduction . 1 A Realistic Appraisal of AI, Big Data, and Machine Learning . 2 Characterizing the Military Potential of AI . 4 Illustrative AI Applications at the Operational Level of War . 5 Illustrative AI Applications at the Strategic Level of War . 6 The Negative Side of Disruptive Technologies . 8 AI’s Potential Effects on Deterrence and Stability . .14 AI is Only One Piece of a Larger Puzzle. 17 Notes . .18 ARTIFICIAL INTELLIGENCE ON THE BATTLEFIELD | V About the Author Zachary Davis is a senior fellow at the Center for Global Security Research at Lawrence Livermore National Laboratory and a research professor at the Naval Postgraduate School in Monterey, California, where he teaches courses on counterproliferation. He has broad experience in intelligence and national-security policy and has held senior positions in the executive and legislative branches of the U.S. government. His regional focus is South Asia. Davis began his career with the Congressional Research Service at the Library of Congress and has served the State Department, Congressional committees, and the National Security Council. Davis was the group leader for proliferation networks in LLNL’s Z Program and, in 2007, senior advisor at the National Counterproliferation Center, in the office of the Director of National Intelligence. -
On Terrorism and Whistleblowing
Case Western Reserve University School of Law Scholarly Commons Faculty Publications 2007 On Terrorism and Whistleblowing Michael P. Scharf Case Western Reserve University - School of Law, [email protected] Colin T. McLaughlin Follow this and additional works at: https://scholarlycommons.law.case.edu/faculty_publications Part of the Criminal Law Commons, and the Legal Ethics and Professional Responsibility Commons Repository Citation Scharf, Michael P. and McLaughlin, Colin T., "On Terrorism and Whistleblowing" (2007). Faculty Publications. 1060. https://scholarlycommons.law.case.edu/faculty_publications/1060 This Article is brought to you for free and open access by Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Faculty Publications by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. ON TERRORISM AND WHSTLEBLOWING MichaelP. Schar! & Colin T. McLaughlin' At a Bio-Terrorism Conference at Case Western Reserve University School of Law on March 31, 2006, the government participants were asked what they would do if a superior instructed them not to disclose in- formation to the public about the likely grave health affects of an ongoing bio-terrorist attack. In response, they indicated that they would be reluc- tant to become a "whistleblower." This is not surprisingsince, despite the federal and state laws that purport to facilitate such whistleblowingfor the public good, government whistleblowers routinely have faced loss of pro- motion, harassment,firing, and in some instances criminal prosecution when they have gone public with their important information. Yet, without government whistleblowers who had the courage to go to the press, the public would never have learned about Watergate, the Iran-Contrascan- dal, the inhumane practices at Abu Ghraib prison in Iraq, the secretpris- ons run by the United States in Eastern Europe, or the NSA policy of wire- tappingAmericans without warrants. -
Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government. -
The History and Politics of Defense Reviews
C O R P O R A T I O N The History and Politics of Defense Reviews Raphael S. Cohen For more information on this publication, visit www.rand.org/t/RR2278 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-0-8330-9973-0 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2018 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface The 1993 Bottom-Up Review starts with this challenge: “Now that the Cold War is over, the questions we face in the Department of Defense are: How do we structure the armed forces of the United States for the future? How much defense is enough in the post–Cold War era?”1 Finding a satisfactory answer to these deceptively simple questions not only motivated the Bottom-Up Review but has arguably animated defense strategy for the past quarter century. -
9/11 Report”), July 2, 2004, Pp
Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5. -
Cryptography
Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. -
James B. Steinberg – “Deep Dive”
JAMES B. STEINBERG – “DEEP DIVE” I. Introduction James Braidy Steinberg is the current dean of the Lyndon B. Johnson School of Public Affairs of the University of Texas. He served as Deputy National Security Advisor and Director of the State Department’s Policy Planning Staff under President Clinton. Steinberg produced the completed questionnaire and attachments, the completed SF 86, the completed OGE 4501, his 401k and investment reports, federal tax returns from 2005-07, and a District of Columbia tax return for part of 2005. Steinberg indicated that because there is no state income tax in Texas, he did not file state tax returns for the remainder of 2005 and 2006-07 (during his residency in Texas). Because Steinberg was not able to travel to Washington during the time allotted for this assignment, Team Leader Robert Wilkins traveled to Austin and interviewed him on October 30 in a suite at the Courtyard Marriott adjacent to the airport. The interview took place at 2:30 pm and lasted approximately two hours. II. Comment on Public Vet Memo The Public Vet memo deals with Steinberg's public record fairly comprehensively, and it accurately captures the subjects it covers. (One small nit – the Public Vet memo inaccurately describes him as maintaining “an active DC bar license”; his bar membership is actually on “inactive” status.) The Public Vet memo does not, however, address three potentially controversial issues that are reported in the media and other public sources: the Gilbert Chagoury meeting, the accusation of treason by Navy Lt. Commander Jack Daly, and the Clinton administration’s purported failure to detain Osama bin Laden in 1996. -
Re: Request Under Freedom of Information Act (Expedited Processing Requested)
AMERICAN CIVIL LIBERTIES UNION I August 14, 2015 Ms. Michele Meeks Information and Privacy Coordinator Central Intelligence Agency Washington, D.C. 20505 Mr. Paul Jacobsmeyer OSD/JS FOIA Requester Service Center Office of Freedom of Information Department of Defense 1155 Defense Pentagon, Room 2C757 Washington, D.C. 20301-1155 Ms. Sheryl L. Walter Director, Office of Information Programs and Services AMERICAN CIVIL LIBERTIES U.S. Department of State UNION FOUNDATION Building SA-2 NATIONAL OFFICE 515 22nd Street, NW 125 BROAD STR EE T, 18TH FL NEW YORK , N Y 10004-2400 Washington, D.C. 20522-8100 T/21 2 549.2500 WWW.ACLU ORG Carmen L. Mallon Chief of Staff Office of Information Policy Department of Justice Suite 11050 1425 New York Avenue, N.W. Washington, D.C. 20530-0001 Melissa Golden Lead Paralegal and FOIA Specialist Office of Legal Counsel Room 5511, 950 Pennsylvania Avenue, NW Department of Justice Washington, DC 20530-0001 Re: Request Under Freedom of Information Act (Expedited Processing Requested) To Whom It May Concern: The American Civil Liberties Union and the American Civil Liberties Union Foundation (together, the "ACLU")1 submit this Freedom of 1 The American Civil Liberties Union is a non-profit, 26 U.S.C. § 50l(c)(4) membership organization that educates the public about the civil liberties implications of pending and proposed state and federal legislation, provides analysis of pending and proposed legislation, directly lobbies legislators, and mobilizes its members to lobby their legislators. The American Civil Liberties -
Actual Malice" Standard Really Necessary? a Comparative Perspective Russell L
Louisiana Law Review Volume 53 | Number 4 March 1993 Is The ewN York Times "Actual Malice" Standard Really Necessary? A Comparative Perspective Russell L. Weaver Geoffrey Bennett Repository Citation Russell L. Weaver and Geoffrey Bennett, Is The New York Times "Actual Malice" Standard Really Necessary? A Comparative Perspective, 53 La. L. Rev. (1993) Available at: https://digitalcommons.law.lsu.edu/lalrev/vol53/iss4/5 This Article is brought to you for free and open access by the Law Reviews and Journals at LSU Law Digital Commons. It has been accepted for inclusion in Louisiana Law Review by an authorized editor of LSU Law Digital Commons. For more information, please contact [email protected]. Is The New York Times "Actual Malice" Standard Really Necessary? A Comparative Perspective Russell L. Weaver* Geoffrey Bennett** In New York Times Co. v. Sullivan,' the United States Supreme Court extended First Amendment guarantees to defamation actions.2 Many greeted the Court's decision with joy. Alexander Meiklejohn claimed that the decision was "an occasion for dancing in the streets. ' 3 He believed that the decision would have a major impact on defamation law, and he was right. After the decision, many years elapsed during which "there were virtually no recoveries by public officials in libel 4 actions." The most important component of the New York Times decision was its "actual malice" standard. This standard provided that, in order to recover against a media defendant, a public official must demonstrate that the defendant acted with "malice.' In other words, the official must show that the defendant knew that the defamatory statement was © Copyright 1993, by LoUIsIANA LAW REVIEW. -
Intelligence System
The U.S. Intelligence System https://www.youtube.com/watch?v=OFIG6k4B3zg What is Intelligence? Intelligence – information that meets needs of policy makers and has been collected and processed to meet those needs; all intelligence is information, not all information is intelligence National Intelligence – three subjects -foreign, domestic, and homeland security Intelligence is – a process, product, and a form of organization The Development of U.S. Intelligence National intelligence – didn’t exist until about 1940 CHRONOLOGY -1940-41 – COI (Coordinator of Info) -OSS (Office of Strategic Services) -1941 – Pearl Harbor –mirror imaging/lack of info sharing -1947 – National Security Act – conveyed the legal basis for the intel community; created the SECDEF & National Security Council -cold war influence- countering Soviet Union & stopping the growth of communism -1972- ABM Treaty & SALT I Accord National Technical Means- satellites & other technical collectors (used to verify adherence) Verification- to ensure treaty agreements are honored Monitoring- the means for verification 1975-1976 – created congressional oversight committees ‘cos of violations of law and intel abuses 1989-1991- failure to foresee Soviet collapse (intel failure); minimized Soviet threat 2001- 911 attacks; Patriot Act- allows greater latitude regarding domestic intel gathering Render- delivery of suspected terrorists to a 3rd country that can incarcerate & interrogate with fewer limitations Key judgments- the primary findings of an overall intel estimate that can be -
Book Reviews
Journal of Strategic Security Volume 3 Number 1 Volume 3, No. 1: March 2010 Article 8 Book Reviews Timothy Hsia Sheldon Greaves Donald J. Goldstein Henley-Putnam University Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 71-78 Recommended Citation Hsia, Timothy; Greaves, Sheldon; and Goldstein, Donald J.. "Book Reviews." Journal of Strategic Security 3, no. 1 (2010) : 71-78. DOI: http://dx.doi.org/10.5038/1944-0472.3.1.7 Available at: https://scholarcommons.usf.edu/jss/vol3/iss1/8 This Book Review is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Book Reviews This book review is available in Journal of Strategic Security: https://scholarcommons.usf.edu/jss/ vol3/iss1/8 Hsia et al.: Book Reviews Book Reviews The History of Camp Tracy: Japanese WWII POWs and the Future of Strategic Interrogation. By Alexander D. Corbin. Fort Belvoir, VA: Ziedon Press, 2009. ISBN: 978-0-578-02979- 5. Maps. Photographs. Notes. Bibliography. Index. Pp. 189. $15.95. The History of Camp Tracy, which received the Joint Chiefs of Staff His- tory Office's Fleet Admiral Chester W. Nimitz Archival Research Award, is an illuminating and educating read. The book is written by Alexander Corbin, an intelligence officer in the U.S.