Weapons of Mass Destruction Intelligence Capabilities
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Iraq and Weapons of Mass Destruction
1/9/2017 Iraq and Weapons of Mass Destruction home | about | documents | news | publications | FOIA | research | internships | search | donate | mailing list Iraq and Weapons of Mass Destruction National Security Archive Electronic Briefing Book No. 80 Updated February 11, 2004 Edited by Jeffrey Richelson Originally posted December 20, 2002 Previously updated February 26, 2003 Documents Press release Further reading Between Iraq's invasion of Kuwait in August 1990, and the commencement of military ac绳on in January 1991, then President George H.W. Bush raised the specter of the Iraqi pursuit of nuclear weapons as one jus绳fica绳on for taking decisive ac绳on against Iraq. In the then‐classified Na绳onal Security Direc绳ve 54, signed on January 15, 1991, authorizing the use of force to expel Iraq from Kuwait, he iden绳fied Iraqi use of weapons of mass destruc绳on (WMD) against allied forces as an ac绳on that would lead the U.S. to seek the removal of Saddam Hussein from power. (Note 1) In the aermath of Iraq's defeat, the U.S.‐led U.N. coali绳on was able to compel Iraq to agree to an inspec绳on and monitoring regime, intended to insure that Iraq dismantled its WMD programs and did not take ac绳ons to recons绳tute them. The means of implemen绳ng the relevant U.N. resolu绳ons was the Special Commission on Iraq (UNSCOM). That inspec绳on regime con绳nued un绳l December 16, 1998 ‐ although it involved interrup绳ons, confronta绳ons, and Iraqi aꬫempts at denial and decep绳on ‐ when UNSCOM withdrew from Iraq in the face of Iraqi refusal to cooperate, and harassment. Subsequent to George W. Bush's assump绳on of the presidency in January 2001, the U.S. -
1 ISR Asset Visibility and Collection Management Optimization Through
ISR asset visibility and collection management optimization through knowledge models and automated reasoning Anne-Claire Boury-Brisset1, Michael A. Kolodny2, Tien Pham2 (1) Defence Research and Development (2) U.S. Army Research Laboratory Canada 2800 Powder Mill Road 2459 de la Bravoure Road Adelphi, MD 20783-1197 Quebec, QC, G3J 1X5, Canada [email protected] [email protected] [email protected] Abstract The increasing number and diversity of information sources makes ISR operations more and more challenging; this is especially true in a coalition environment. Optimizing the discovery and utility of coalition ISR assets when facing multiple requests for information, and enhancing the data to decisions process by gathering mission-relevant information to consumers will require automated tools in support of collection planning and assessment. Defence R&D Canada and the US Army Research Laboratory have related research activities in the area of ISR asset interoperability and information collection. In this paper, we present these projects and collaborative efforts to enhance ISR interoperability, through plug-and-play ISR interoperability and semantic knowledge representation of ISR concepts as well as approaches to maximize the utilization of available ISR collection assets. Keywords: Intelligence, Surveillance, Reconnaissance, information collection, sensors, UGS, standards, ontology. Published in the KSCO-2016 conference proceedings, ICCRTS-KSCO 2016 DRDC-RDDC-2016-P144 © Her Majesty the Queen in Right of Canada, as represented by the Minister of National Defence, 2016 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2016 1 1. -
The Report of the Iraq Inquiry: Executive Summary
Return to an Address of the Honourable the House of Commons dated 6 July 2016 for The Report of the Iraq Inquiry Executive Summary Report of a Committee of Privy Counsellors Ordered by the House of Commons to be printed on 6 July 2016 HC 264 46561_00b Viking_Executive Summary Title Page.indd 1 23/06/2016 14:22 © Crown copyright 2016 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government-licence/ version/3 or write to the Information Policy Team, The National Archives, Kew, London TW9 4DU, or email: [email protected]. Where we have identifi ed any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at www.gov.uk/government/publications Any enquiries regarding this publication should be sent to us at [email protected] Print ISBN 9781474133319 Web ISBN 9781474133326 ID 23051602 46561 07/16 Printed on paper containing 75% recycled fi bre content minimum Printed in the UK by the Williams Lea Group on behalf of the Controller of Her Majesty’s Stationery Offi ce 46561_00b Viking_Executive Summary Title Page.indd 2 23/06/2016 14:22 46561_00c Viking_Executive Summary.indd 1 23/06/2016 15:04 46561_00c Viking_Executive Summary.indd 2 23/06/2016 14:17 EXECUTIVE SUMMARY Contents Introduction ...................................................................................................................... 4 Pre‑conflict strategy and planning .................................................................................... 5 The UK decision to support US military action ................................................................. 6 UK policy before 9/11 ................................................................................................ -
Chapter 22. Case Study
CHAPTER Case Study 22 A Tale of Two NIEs he two cases discussed in this chapter provide contrasting insights into the pro- Tcess of preparing intelligence estimates in the United States. They are presented here as the basis for a capstone set of critical thinking questions that are tied to the material discussed throughout this text. In 1990, the National Intelligence Council produced a national intelli- gence estimate (NIE)—the most authoritative intelligence assessment pro- duced by the intelligence community—on Yugoslavia. Twelve years later, the National Intelligence Council produced an NIE on Iraq’s WMD program. The Yugoslavia NIE • Used a sound prediction methodology • Got it right distribute • Presented conclusions that were anathema to U.S.or policymakers • Had zero effect on U.S. policy The Iraqi WMD NIE, in contrast, • Used a flawed prediction methodologypost, • Got it wrong • Presented conclusions that were exactly what U.S. policymakers wanted to hear • Provided supportcopy, to a predetermined U.S. policy This case highlights the differences in analytic approaches used in the two NIEs. Both NIEs now are available online. The full text of the “Yugoslavia Trans- formed” NIEnot is available at https://www.cia.gov/library/readingroom/docs/1990- 10-01.pdf. In 2014, the CIA released the most complete copy (with previously redacted material) of the original “Iraq’s Continuing Programs for Weapons of Mass Destruction” NIE. It is available at https://www.cia.gov/library/reports/ _general-reports-1/iraq_wmd/Iraq_Oct_2002.htm.Do The Yugoslavia NIE The opening statements of the 1990 Yugoslavia NIE contain four conclusions that were remarkably prescient: 420 Copyright ©2020 by SAGE Publications, Inc. -
Curveball Saga
Bob DROGIN & John GOETZ: The Curveball Saga Los Angeles Times 2005, November 20 THE CURVEBALL SAGA How U.S. Fell Under the Spell of 'Curveball' The Iraqi informant's German handlers say they had told U.S. officials that his information was 'not proven,' and were shocked when President Bush and Colin L. Powell used it in key prewar speeches. By Bob Drogin and John Goetz, Special to The Times The German intelligence officials responsible for one of the most important informants on Saddam Hussein's suspected weapons of mass destruction say that the Bush administration and the CIA repeatedly exaggerated his claims during the run-up to the war in Iraq. Five senior officials from Germany's Federal Intelligence Service, or BND, said in interviews with The Times that they warned U.S. intelligence authorities that the source, an Iraqi defector code-named Curveball, never claimed to produce germ weapons and never saw anyone else do so. According to the Germans, President Bush mischaracterized Curveball's information when he warned before the war that Iraq had at least seven mobile factories brewing biological poisons. Then-Secretary of State Colin L. Powell also misstated Curveball's accounts in his prewar presentation to the United Nations on Feb. 5, 2003, the Germans said. Curveball's German handlers for the last six years said his information was often vague, mostly secondhand and impossible to confirm. "This was not substantial evidence," said a senior German intelligence official. "We made clear we could not verify the things he said." The German authorities, speaking about the case for the first time, also said that their informant suffered from emotional and mental problems. -
Overhead Surveillance
Confrontation or Collaboration? Congress and the Intelligence Community Overhead Surveillance Eric Rosenbach and Aki J. Peritz Overhead Surveillance One of the primary methods the U.S. uses to gather vital national security information is through air- and space-based platforms, collectively known as “overhead surveillance.” This memorandum provides an overview of overhead surveillance systems, the agencies involved in gathering and analyzing overhead surveillance, and the costs and benefits of this form of intelligence collection. What is Overhead Surveillance? “Overhead surveillance” describes a means to gather information about people and places from above the Earth’s surface. These collection systems gather imagery intelligence (IMINT), signals intelligence (SIGINT) and measurement and signature intelligence (MASINT). Today, overhead surveillance includes: • Space-based systems, such as satellites. • Aerial collection platforms that range from large manned aircraft to small unmanned aerial vehicles (UAVs). A Brief History of Overhead Surveillance Intelligence, surveillance and reconnaissance platforms, collectively known as ISR, date back to the 1790s when the French military used observation balloons to oversee battlefields and gain tactical advantage over their adversaries. Almost all WWI and WWII belligerents used aerial surveillance to gain intelligence on enemy lines, fortifications and troop movements. Following WWII, the U.S. further refined airborne and space-based reconnaissance platforms for use against the Soviet Union. Manned reconnaissance missions, however, were risky and could lead to potentially embarrassing outcomes; the 1960 U-2 incident was perhaps the most widely publicized case of the risks associated with this form of airborne surveillance. Since the end of the Cold War, overhead surveillance technology has evolved significantly, greatly expanding the amount of information that the policymaker and the warfighter can use to make critical, time-sensitive decisions. -
Intelligence Information and Judicial Evidentiary Standards
811 INTELLIGENCE INFORMATION AND JUDICIAL EVIDENTIARY STANDARDS ROBERT BEJESKYt I. INTRODUCTION................................... 811 II. FACT FINDERS .................................... 813 III. NUCLEAR CAPABILITY ........................... 820 IV. BIOLOGICAL WEAPONS........................... 836 V. CHEMICAL WEAPONS ............................ 845 VI. DELIVERY SYSTEMS .............................. 851 VII. M ENS REA ......................................... 854 VIII. INVOLVEMENT WITH TERRORISM ............... 855 IX. CONCLUSION ..................................... 875 I. INTRODUCTION Senator Kennedy called it "reprehensible" that the "administra- tion distorted, misrepresented and manipulated the intelligence" on Iraq.' Louis Fisher wrote: "There should be no question that the pre- war information was distorted, hyped, and fabricated. The October 2002 [National Intelligence Estimate ("NIE")] prepared by the intelli- gence community is plain evidence of that . ."2 University of Pitts- burgh President Jem Spectar contended that the "Bush administration exploited, furthered, manipulated or thrived on the public's confusion .... "3 Professor Yamamoto explained, "Many have documented this ad- ministration's penchant for deliberate misrepresentations on national security-in blunt terms, [and] for lying to the American people about threats at home and abroad."4 Harvard Emeritus Professor Stanley t MA Political Science (Michigan), MA Applied Economics (Michigan), LL.M. In- ternational Law (Georgetown). The author has taught courses in International Law at Cooley Law School and for the Department of Political Science at the University of Michigan, courses in American Government and Constitutional Law at Alma College, and courses in Business Law at Central Michigan University and the University of Miami. 1. J M Spectar, Beyond the Rubicon: PresidentialLeadership, InternationalLaw & The Use of Force in the Long Hard Slog, 22 CoN. J. Irr'iL L. 47, 90 (2006). 2. Louis Fisher, Lost ConstitutionalMoorings: Recovering the War Power, 81 IND. -
National Reconnaissance Office Review and Redaction Guide
NRO Approved for Release 16 Dec 2010 —Tep-nm.T7ymqtmthitmemf- (u) National Reconnaissance Office Review and Redaction Guide For Automatic Declassification Of 25-Year-Old Information Version 1.0 2008 Edition Approved: Scott F. Large Director DECL ON: 25x1, 20590201 DRV FROM: NRO Classification Guide 6.0, 20 May 2005 NRO Approved for Release 16 Dec 2010 (U) Table of Contents (U) Preface (U) Background 1 (U) General Methodology 2 (U) File Series Exemptions 4 (U) Continued Exemption from Declassification 4 1. (U) Reveal Information that Involves the Application of Intelligence Sources and Methods (25X1) 6 1.1 (U) Document Administration 7 1.2 (U) About the National Reconnaissance Program (NRP) 10 1.2.1 (U) Fact of Satellite Reconnaissance 10 1.2.2 (U) National Reconnaissance Program Information 12 1.2.3 (U) Organizational Relationships 16 1.2.3.1. (U) SAF/SS 16 1.2.3.2. (U) SAF/SP (Program A) 18 1.2.3.3. (U) CIA (Program B) 18 1.2.3.4. (U) Navy (Program C) 19 1.2.3.5. (U) CIA/Air Force (Program D) 19 1.2.3.6. (U) Defense Recon Support Program (DRSP/DSRP) 19 1.3 (U) Satellite Imagery (IMINT) Systems 21 1.3.1 (U) Imagery System Information 21 1.3.2 (U) Non-Operational IMINT Systems 25 1.3.3 (U) Current and Future IMINT Operational Systems 32 1.3.4 (U) Meteorological Forecasting 33 1.3.5 (U) IMINT System Ground Operations 34 1.4 (U) Signals Intelligence (SIGINT) Systems 36 1.4.1 (U) Signals Intelligence System Information 36 1.4.2 (U) Non-Operational SIGINT Systems 38 1.4.3 (U) Current and Future SIGINT Operational Systems 40 1.4.4 (U) SIGINT -
Spy Culture and the Making of the Modern Intelligence Agency: from Richard Hannay to James Bond to Drone Warfare By
Spy Culture and the Making of the Modern Intelligence Agency: From Richard Hannay to James Bond to Drone Warfare by Matthew A. Bellamy A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (English Language and Literature) in the University of Michigan 2018 Dissertation Committee: Associate Professor Susan Najita, Chair Professor Daniel Hack Professor Mika Lavaque-Manty Associate Professor Andrea Zemgulys Matthew A. Bellamy [email protected] ORCID iD: 0000-0001-6914-8116 © Matthew A. Bellamy 2018 DEDICATION This dissertation is dedicated to all my students, from those in Jacksonville, Florida to those in Port-au-Prince, Haiti and Ann Arbor, Michigan. It is also dedicated to the friends and mentors who have been with me over the seven years of my graduate career. Especially to Charity and Charisse. ii TABLE OF CONTENTS Dedication ii List of Figures v Abstract vi Chapter 1 Introduction: Espionage as the Loss of Agency 1 Methodology; or, Why Study Spy Fiction? 3 A Brief Overview of the Entwined Histories of Espionage as a Practice and Espionage as a Cultural Product 20 Chapter Outline: Chapters 2 and 3 31 Chapter Outline: Chapters 4, 5 and 6 40 Chapter 2 The Spy Agency as a Discursive Formation, Part 1: Conspiracy, Bureaucracy and the Espionage Mindset 52 The SPECTRE of the Many-Headed HYDRA: Conspiracy and the Public’s Experience of Spy Agencies 64 Writing in the Machine: Bureaucracy and Espionage 86 Chapter 3: The Spy Agency as a Discursive Formation, Part 2: Cruelty and Technophilia -
Operation in Iraq, Our Diplomatic Efforts Were Concentrated in the UN Process
OPERATIONS IN IRAQ First Reflections IRAQ PUBLISHED JULY 2003 Produced by Director General Corporate Communication Design by Directorate of Corporate Communications DCCS (Media) London IRAQ FIRST REFLECTIONS REPORT Contents Foreword 2 Chapter 1 - Policy Background to the Operation 3 Chapter 2 - Planning and Preparation 4 Chapter 3 - The Campaign 10 Chapter 4 - Equipment Capability & Logistics 22 Chapter 5 - People 28 Chapter 6 - Processes 32 Chapter 7 - After the Conflict 34 Annex A - Military Campaign Objectives 39 Annex B - Chronology 41 Annex C - Deployed Forces and Statistics 43 1 Foreword by the Secretary of State for Defence On 20 March 2003 a US-led coalition, with a substantial contribution from UK forces, began military operations against the Saddam Hussein regime in Iraq. Just 4 weeks later, the regime was removed and most of Iraq was under coalition control. The success of the military campaign owed much to the determination and professionalism of the coalition’s Armed Forces and the civilians who supported them. I regret that, during the course of combat operations and subsequently, a number of Service personnel lost their lives. Their sacrifice will not be forgotten. The UK is playing a full part in the re-building of Iraq through the establishment of conditions for a stable and law-abiding Iraqi government. This process will not be easy after years of repression and neglect by a brutal regime. Our Armed Forces are performing a vital and dangerous role by contributing to the creation of a secure environment so that normal life can be resumed, and by working in support of humanitarian organisations to help the Iraqi people. -
Preserving Ukraine's Independence, Resisting Russian Aggression
Preserving Ukraine’s Independence, Resisting Russian Aggression: What the United States and NATO Must Do Ivo Daalder, Michele Flournoy, John Herbst, Jan Lodal, Steven Pifer, James Stavridis, Strobe Talbott and Charles Wald © 2015 The Atlantic Council of the United States. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means without permission in writing from the Atlantic Council, except in the case of brief quotations in news articles, critical articles, or reviews. Please direct inquiries to: Atlantic Council 1030 15th Street, NW, 12th Floor Washington, DC 20005 ISBN: 978-1-61977-471-1 Publication design: Krystal Ferguson; Cover photo credit: Reuters/David Mdzinarishvili This report is written and published in accordance with the Atlantic Council Policy on Intellectual Independence. The authors are solely responsible for its analysis and recommendations. The Atlantic Council, the Brookings Institution, and the Chicago Council on Global Affairs, and their funders do not determine, nor do they necessarily endorse or advocate for, any of this report’s conclusions. February 2015 PREFACE This report is the result of collaboration among the Donbas provinces of Donetsk and Luhansk. scholars and former practitioners from the A stronger Ukrainian military, with enhanced Atlantic Council, the Brookings Institution, the defensive capabilities, will increase the pros- Center for a New American Security, and the pects for negotiation of a peaceful settlement. Chicago Council on Global Affairs. It is informed When combined with continued robust Western by and reflects mid-January discussions with economic sanctions, significant military assis- senior NATO and U.S. -
SPRING 2015 - Volume 62, Number 1 Call for Papers Violent Skies: the Air War Over Vietnam a Symposium Proposed for October 2015
SPRING 2015 - Volume 62, Number 1 WWW.AFHISTORICALFOUNDATION.ORG Call For Papers Violent Skies: The Air War Over Vietnam A Symposium Proposed for October 2015 Four military service historical foundations—the Air Force Historical Foundation, the Army Historical Foundation, the Marine Corps Heritage Foundation, and the Naval Historical Foundation—recognize that a half century has passed since the United States became militarily engaged in Southeast Asia, and hope to sponsor a series of conferences involving scholars and veterans, aimed at exploring aspects and conse- quences of what once was known as America’s Longest War. For the first conference in the series, since all military services employed their combat aircraft capabilities in that conflict, the leaders of the four nonprofit organizations agree that the air war over Southeast Asia offers a compelling joint topic for reflective examination and discus- sion. The intent is to host a symposium on this subject in the national capital region on Thurs- day and Friday, October 15 and 16, 2015, potentially extending into Saturday, October 17. Other stakeholder organizations will be approached to join as co-sponsors of this event. The organizers of the symposium envision plenary and concurrent sessions to accommodate a wide va- riety of topics and issues. Panel participants will be allotted 20 minutes to present their research or discuss their experiences. A panel chair will be assigned to provide commentary and moderate discussion. Com- menters from academia, veterans, Vietnamese émigrés, and scholars from the region may be invited to pro- vide additional insights. Panel/Paper proposals may employ both chronological and topical approaches: Examples of chronological subjects can include: U.S.