Report of the Inquiry Into Australian Intelligence Agencies
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Radical Islamist Groups in the Modern Age
WORKING PAPER NO. 376 RADICAL ISLAMIST GROUPS IN THE MODERN AGE: A CASE STUDY OF HIZBULLAH Lieutenant-Colonel Rodger Shanahan Canberra June 2003 National Library of Australia Cataloguing-in-Publication entry: Shanahan, Rodger, 1964-. Radical Islamist Groups in the Modern Age: A Case Study of Hizbullah Bibliography. ISBN 0 7315 5435 3. 1. Hizballah (Lebanon). 2. Islamic fundamentalism - Lebanon. 3. Islam and politics - Lebanon. 4. Terrorism - Religious aspects - Islam. I. Title. (Series : Working paper (Australian National University. Strategic and Defence Studies Centre) ; no.376). 322.42095692 Strategic and Defence Studies Centre The aim of the Strategic and Defence Studies Centre, which is located in the Research School of Pacific and Asian Studies in the Australian National University, is to advance the study of strategic problems, especially those relating to the general region of Asia and the Pacific. The centre gives particular attention to Australia’s strategic neighbourhood of Southeast Asia and the Southwest Pacific. Participation in the centre’s activities is not limited to members of the university, but includes other interested professional, diplomatic and parliamentary groups. Research includes military, political, economic, scientific and technological aspects of strategic developments. Strategy, for the purpose of the centre, is defined in the broadest sense of embracing not only the control and application of military force, but also the peaceful settlement of disputes that could cause violence. This is the leading academic body in Australia specialising in these studies. Centre members give frequent lectures and seminars for other departments within the ANU and other universities and Australian service training institutions are heavily dependent upon SDSC assistance with the strategic studies sections of their courses. -
National Insider Threat Task Force Mission Fact Sheet
NATIONAL INSIDER THREAT TASK FORCE MISSION FACT SHEET _________________________________ Why was the NITTF established? The National Insider Threat Task Force (NITTF) was established after the WikiLeaks release of thousands of classified documents through the global media and internet. Its mission is to deter, detect, and mitigate actions by employees who may represent a threat to national security by developing a national insider threat program with supporting policy, standards, guidance, and training. Who runs the task force, and which agencies are involved? Under Executive Order (E.O.) 13587, the NITTF is co-chaired by the U.S. Attorney General and the Director of National Intelligence. They, in turn, designated the Federal Bureau of Investigation (FBI) and the National Counterintelligence Executive to co-direct the daily activities of the NITTF. The NITTF comprises employees and contractors from a variety of federal departments and agencies (D/A), and its work impacts more than 99 federal D/As that handle classified material. Currently, the following D/As have representatives on the NITTF: FBI, National Counterintelligence and Security Center (NCSC), Defense Intelligence Agency (DIA), Central Intelligence Agency (CIA), and Transportation Security Administration. The NITTF responds directly to the Senior Information Sharing and Safeguarding Steering Committee, which was also established under E.O. 13587. The steering committee comprises representatives from largely Intelligence Community agencies with extensive access to classified networks and materials, including the Departments of State, Energy, Justice, Defense, and Homeland Security, CIA, FBI, Office of the Director of National Intelligence, NCSC, National Security Agency, DIA, the Program Manager—Information Sharing Environment, Office of Management and Budget, the National Security Council Staff, and the Information Security Oversight Office. -
Law Enforcement Intelligence (Chapter 5)
The Intelligence Process 5 CHAPTER FIVE The Intelligence Process In defining intelligence, it was previously noted that the key factor that transforms information to intelligence is analysis. The British National Crime Squad, when referring to intelligence, observed the following: The processing of reliable intelligence is the cornerstone of successful law enforcement. Analysis organizes and interprets the intelligence in a way that significantly enhances its value and the possibility of its success in combating organized crime. Analysis identifies and predicts trends, patterns or problem areas requiring action.69 57 Many larger law enforcement agencies have an intelligence unit, but in too many cases the unit is limited in its utility because of failures in structure or direction.70 Perhaps the most common limitation is that the unit collects, but does not analyze information. Instead, the information is stored in a database simply awaiting access. For example, in some agencies field interview reports are managed by the intelligence function. While this descriptive report on an intelligence subject typically is forwarded to the intelligence unit, too often it is only entered into a database. When information sits passively in an information system, its use will be limited. If, however, the intelligence unit closely examines, analyzes, and compares the field interview forms with other information, the information can be used more effectively. Having a group of people whose primary job is simply responding to information requests about possible wanted subjects but not providing proactive analysis is not a contemporary intelligence unit. 69 See All too frequently when an intelligence unit performs some type of analysis, http://www.nationalcrimesqua d.police.uk no distinction is made within the unit about the different types of 70 In a survey conducted by the intelligence outputs and how they can contribute to the agency's goals. -
Periodicals and Recurring Documents
PERIODICALS AND RECURRING DOCUMENTS May 2012 Legend A ANNUAL S-M SEMI-MONTHLY D DAILY BI-M BI-MONTHLY W WEEKLY Q QUARTERLY BI-W BI-WEEKLY TRI-A TRI-ANNUAL M MONTHLY IRR IRREGULAR S-A SEMI-ANNUAL A ACADEME. (BI-M) 1985-1989 ACADEMY OF POLITICAL SCIENCE. PROCEEDINGS. (IRR) 1960-1991 (MFILM 1975-1980) (MFICHE 1981-1982) ACQUISITION REVIEW QUARTERLY. (Q) 1994-2003 CONTINUED BY DEFENSE ACQUISITION REVIEW JOURNAL. AD ASTRA-TO THE STARS. (M) 1989-1992 ADA. (Q) 1991-1997 FORMERLY AIR DEFENSE ARTILLERY. ADF: AFRICA DEFENSE FORUM. (Q) 2008- ADVANCE. (A) 1986-1994 ADVANCED MANAGEMENT JOURNAL. SEE S.A.M. ADVANCED MANAGEMENT JOURNAL. ADVISOR. (Q) 1974-1978 FORMERLY JOURNAL OF NAVY CIVILIAN MANPOWER MANAGEMENT. ADVOCATE. (BI-M) 1982-1984 - 1 - AEI DEFENSE REVIEW. (BI-M) 1977-1978 CONTINUED BY AEI FOREIGN POLICY AND DEFENSE REVIEW. AEI FOREIGN POLICY AND DEFENSE REVIEW. (BI-M) 1979-1986 FORMERLY AEI DEFENSE REVIEW. AEROSPACE. (Q) 1963-1987 AEROSPACE AMERICA. (M) 1984-1998 FORMERLY ASTRONAUTICS & AERONAUTICS. AEROSPACE AND DEFENSE SCIENCE. (Q) 1990-1991 FORMERLY DEFENSE SCIENCE. AEROSPACE HISTORIAN. (Q) 1965-1988 FORMERLY AIRPOWER HISTORIAN. CONTINUED BY AIR POWER HISTORY. AEROSPACE INTERNATIONAL. (BI-M) 1967-1981 FORMERLY AIR FORCE SPACE DIGEST INTERNATIONAL. AEROSPACE MEDICINE. (M) 1973-1974 CONTINUED BY AVIATION SPACE AND EVIRONMENTAL MEDICINE. AEROSPACE POWER JOURNAL. (Q) 1999-2002 FORMERLY AIRPOWER JOURNAL. CONTINUED BY AIR & SPACE POWER JOURNAL. AEROSPACE SAFETY. (M) 1976-1980 AFRICA REPORT. (BI-M) 1967-1995 (MFICHE 1979-1994) AFRICA TODAY. (Q) 1963-1990; (MFICHE 1979-1990) 1999-2007 AFRICAN SECURITY. (Q) 2010- AGENDA. (M) 1978-1982 AGORA. -
Universal GEOINT Credentialing Christopher K
GEOINT ESSENTIAL BODY OF KNOWLEDGE Transparent Transportable TransIndustry USGIF is a 501(c)(3) non-lobbying, nonprofit educational foundation dedicated to promoting the geospatial intelligence tradecraft and developing a stronger community of interest between Government, Industry, Academia, and Professional Organizations. Almost 500 students Twelve Accredited Geospatial have graduated from Intelligence Certificate Programs Northeastern West Point USGIF-accredited Penn State U. of Utah programs with George Mason UM Columbia Air Force GEOINT Certificates. Redlands Academy Fayetteville State USC UT Dallas U. of South Carolina Did you know USGIF offers hundreds of hours of training, education, and professional development opportunities throughout the year? in Scholarships $792K awarded since 2004 u S gif Monograph Serie S V o L u M e 1 USGIF in 2014 published the Human Geography monograph as a community resource. Socio-Cultural Dynamics and USGIF is developing the first GEOGRAPHYChallenges to Global Security Darryl G. Murdock, Robert R. Tomes and Universal GEOINT Credentialing Christopher K. Tucker, editors Program to bolster profesional development in the GEOINT tradecraft. USGIF produces the GEOINT Symposium, the largest intelligence event in the world. Sustaining Member 240 Organizations TEN YEARS Launched in 2012 as USGIF’s first official print magazine. GEOINT ESSENTIAL BODY OF KNOWLEDGE SECTION I The GEOINT Essential Body of Knowledge �� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � 3 Transparency and Transportability -
From Air, Sea, and Space, Geospatial Technology Is Helping Nations Monitor One of Their Biggest and Most Understated Threats: the Open Ocean
» CARDILLO AND LONG Q&A » FUTURE GEOINT LEADERS » SMALLSAT WORKING GROUP 2014 ISSUE 4 THE OFFICIAL MAGAZINE OF THE UNITED STATES GEOSPATIAL INTELLIGENCE FOUNDATION WATCHING THE 2014 USGIF MEMBERSHIP DIRECTORY WATERFrom air, sea, and space, geospatial technology is helping nations monitor one of their biggest and most understated threats: the open ocean. © DLR e.V. 2014 and © Airbus 2014 DS/© DLR Infoterra e.V. GmbH 2014 WorldDEMTM Reaching New Heights The new standard of global elevation models with pole-to-pole coverage, unrivalled accuracy and unique quality to support your critical missions. www.geo-airbusds.com/worlddem CONTENTS 2014 ISSUE 4 The USS Antietam (CG 54), the USS O’Kane (DDG 77) and the USS John C. Stennis (CVN 74) steam through the Gulf of Oman. As part of the John C. Stennis Carrier Strike Group, these ships are on regularly scheduled deployments in support of Maritime Operations, set- ting the conditions for security and stability, as well as complementing counterterrorism and security efforts to regional nations. PHOTO COURTESY OF U.S. NAVAL FORCES CENTRAL COMMAND/U.S. 5TH FLEET 5TH COMMAND/U.S. CENTRAL FORCES NAVAL U.S. OF COURTESY PHOTO 02 | VANTAGE POINT Features 12 | ELEVATE Tackling the challenge of Fayetteville State University accelerating innovation. builds GEOINT curriculum. 16 | WATCHING THE WATER From air, sea, and space, geospatial technology 14 | COMMON GROUND 04 | LETTERS is helping nations monitor one of their biggest USGIF stands up SmallSat Trajectory readers offer Working Group. feedback on recent features and most understated threats: the open ocean. and the tablet app. By Matt Alderton 32 | MEMBERSHIP PULSE Ball Aerospace offers 06 | INTSIDER 22 | CONVEYING CONSEQUENCE capabilities for an integrated SkyTruth and the GEOINT enterprise. -
Inside Russia's Intelligence Agencies
EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat. -
National Criminal Intelligence Sharing Plan T S R T Global Justice a I P C
NT O E F M JU T S R T A I P C E E D United States Department of Justice Solutions and approaches for a cohesive plan to improve our nation’s ability to develop and share criminal intelligence October 2003 T O VersionEN 1.0F M JU National Criminal Intelligence Sharing Plan T S R T Global Justice A I P C E E D Information Sharing Initiative United States Department of Justice The National Criminal Intelligence Sharing Plan Solutions and approaches for a cohesive plan to improve our nation’s ability to develop and share criminal intelligence October 2003 National Criminal Intelligence Sharing Plan Version 1.0 This document was prepared under the leadership, guidance, and funding of the Bureau of Justice Assistance (BJA), Office of Justice Programs, U.S. Department of Justice, in collaboration with the U.S. Department of Justice’s Global Justice Information Sharing Initiative. The opinions, findings, and conclusions or recommendations expressed in this document are those of the authors and do not necessarily represent the official position or policies of the U.S. Department of Justice. This project was supported by Award No. 2000-LD-BX-0003, awarded by the Office of Justice Programs. Version 1.0 National Criminal Intelligence Sharing Plan Table of Contents Executive Summary .....................................................................iii Acknowledgements ................................................................... ix The Rationale for the National Criminal Intelligence Sharing Plan ...............................................................................1 -
Of the 90 YEARS of the RAAF
90 YEARS OF THE RAAF - A SNAPSHOT HISTORY 90 YEARS RAAF A SNAPSHOTof theHISTORY 90 YEARS RAAF A SNAPSHOTof theHISTORY © Commonwealth of Australia 2011 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior written permission. Inquiries should be made to the publisher. Disclaimer The views expressed in this work are those of the authors and do not necessarily reflect the official policy or position of the Department of Defence, the Royal Australian Air Force or the Government of Australia, or of any other authority referred to in the text. The Commonwealth of Australia will not be legally responsible in contract, tort or otherwise, for any statements made in this document. Release This document is approved for public release. Portions of this document may be quoted or reproduced without permission, provided a standard source credit is included. National Library of Australia Cataloguing-in-Publication entry 90 years of the RAAF : a snapshot history / Royal Australian Air Force, Office of Air Force History ; edited by Chris Clark (RAAF Historian). 9781920800567 (pbk.) Australia. Royal Australian Air Force.--History. Air forces--Australia--History. Clark, Chris. Australia. Royal Australian Air Force. Office of Air Force History. Australia. Royal Australian Air Force. Air Power Development Centre. 358.400994 Design and layout by: Owen Gibbons DPSAUG031-11 Published and distributed by: Air Power Development Centre TCC-3, Department of Defence PO Box 7935 CANBERRA BC ACT 2610 AUSTRALIA Telephone: + 61 2 6266 1355 Facsimile: + 61 2 6266 1041 Email: [email protected] Website: www.airforce.gov.au/airpower Chief of Air Force Foreword Throughout 2011, the Royal Australian Air Force (RAAF) has been commemorating the 90th anniversary of its establishment on 31 March 1921. -
Council Decision (Cfsp)
L 246/12 EN Offi cial Jour nal of the European Union 30.7.2020 COUNCIL DECISION (CFSP) 2020/1127 of 30 July 2020 amending Decision (CFSP) 2019/797 concerning restrictive measures against cyber-attacks threatening the Union or its Member States THE COUNCIL OF THE EUROPEAN UNION, Having regard to the Treaty on European Union, and in particular Article 29 thereof, Having regard to the proposal from the High Representative of the Union for Foreign Affairs and Security Policy, Whereas: (1) On 17 May 2019 the Council adopted Decision (CFSP) 2019/797 (1). (2) Targeted restrictive measures against cyber-attacks with a significant effect which constitute an external threat to the Union or its Member States are among the measures included in the Union’s framework for a joint diplomatic response to malicious cyber-activities (the cyber diplomacy toolbox) and are a vital instrument to deter and respond to such activities. Restrictive measures can also be applied in response to cyber-attacks with a significant effect against third States or international organisations, where deemed necessary to achieve common foreign and security policy objectives set out in the relevant provisions of Article 21 of the Treaty on European Union. (3) On 16 April 2018 the Council adopted conclusions in which it firmly condemned the malicious use of information and communications technologies, including in the cyber-attacks publicly known as ‘WannaCry’ and ‘NotPetya’, which caused significant damage and economic loss in the Union and beyond. On 4 October 2018 the Presidents of the European Council and of the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy (the ‘High Representative’) expressed serious concerns in a joint statement about an attempted cyber-attack to undermine the integrity of the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands, an aggressive act which demonstrated contempt for the solemn purpose of the OPCW. -
Indigenous Australians Brochure
SEE YOURSELF IN A REWARDING ROLE CHOOSE A JOB IN A DIVERSE AND SUPPORTIVE WORKPLACE A CONTRIBUTE TO YOUR COUNTRY’S DEFENCE THE AUSTRALIAN DEFENCE FORCE (ADF) IS AN EMPLOYER OF CHOICE FOR HUNDREDS OF INDIGENOUS AUSTRALIANS. Help maintain a proud tradition of service by joining the thousands of Indigenous men and women who for over 100 years, have contributed to the protection of our country and its interests as members of the ADF. In the Navy, Army or Air Force, you’ll work alongside Indigenous Australians from across the ranks, enjoying opportunities rarely found in civilian employment. As you serve your country and community, your abilities will be nurtured and given focus. You’ll receive world-class training and be given the opportunity to earn qualifications that will give you the skills, knowledge and experience to reach your full potential in a fulfilling role. 01 FEATURED 04 GET A GREAT JOB AND MORE 08 RECEIVE WORLD-CLASS TRAINING INSIDE AND EDUCATION 09 CHOOSE YOUR IDEAL ROLE 10 ENTER THE WAY YOU WANT TO 14 ACHIEVE YOUR POTENTIAL 16 INDIGENOUS PRE-RECRUIT PROGRAM 18 NAVY INDIGENOUS DEVELOPMENT PROGRAM 20 ARMY INDIGENOUS DEVELOPMENT PROGRAM 22 AIR FORCE INDIGENOUS DEVELOPMENT OPPORTUNITIES 26 ACCESS FLEXIBLE ENTRY PATHWAYS 28 HOW TO JOIN 32 CONTACT US 02 03 GET A GREAT JOB AND MORE REWARDING, WELL-PAID WORK IS JUST THE START. AS A FULL-TIME MEMBER OF THE ADF YOU’LL ENJOY: A friendly and supportive team environment that embraces cultural, social and workforce diversity A competitive salary and superannuation Equal pay regardless -
John Burton: Undermined by Dishonest History: Honest History Lecture Series, Manning Clark House, Canberra, Monday, 18 August 2014 Pamela Burton
John Burton: undermined by dishonest history: Honest History lecture series, Manning Clark House, Canberra, Monday, 18 August 2014 Pamela Burton Dr John Burton headed the Department of External Affairs in 1947 at age 32, his minister being Herbert Vere Evatt (‘the Doc’). He and Evatt shared a joint vision for an Australian foreign policy independent of Britain and the United States. In his short public service career Burton had significant influence over Australia’s foreign policy. Ahead of his times, he held the view that Australia’s security in the Asia-Pacific region depended upon better understanding of and engagement with its neighbours. To achieve this, he advocated ‘open diplomacy’. Burton’s work and influence has been the subject of numerous scholarly works. Curiously, alongside the honest historians, there has been a concerted effort by some dishonest ideologues writing to discredit Burton and what he stood for. Sixty years on, malicious writers continue to skew the historic record by asserting that Burton betrayed his country. Why? And how can the record be corrected? I am a non-fiction writer. I would love to write fiction, but I’ve been told that it’s not my forte, because I can’t help letting truth get in the way of a good story. There are non-fiction writers, however, who won’t let the truth spoil a story. Take the example of a recent article in the magazine Quadrant, ‘The curious case of Dr John Burton’.1 A fictitious spy story if ever there was one, though it purported to be an historical account.