Intelligence e-Prints
This archive includes timely and interesting materials on topics of current interest. Any opinions, findings, and conclusions or recommendations expressed in this archive are those of the author(s) and do not necessarily reflect the views of the Federation of American Scientists.
The U.S. Army Camp Stanley Storage Activity and The CIA Midwest Depot by Allen Thomson, updated July 5, 2015
Joint Inspector General Report on the President’s Surveillance Program (2015 redaction), 10 July 2009 (via NY Times)
The DOD Cyber Strategy, U.S. Department of Defense, April 2015
Mixed Reality: Geolocation & Portable Hand-Held Communication Devices, ODNI Summer Hard Problem (SHARP) Program, 2009 (released February 2015)
Sovereign Citizen Extremist Ideology Will Drive Violence at Home, During Travel, and at Government Facilities, DHS Office of Intelligence and Analysis, February 5, 2015 (via Reason)
Signals Intelligence Reform: 2015 Anniversary Report, Office of the Director of National Intelligence, released February 3, 2015
Principles of Intelligence Transparency for the Intelligence Community, Office of the Director of National Intelligence, released February 3, 2015
Final Report of the Rendition, Detention, and Interrogation Network Agency Accountability Board (Redacted), December 2014, released by CIA January 2015
Report of Investigation into CIA Access to the SSCI Shared Drive on RDINet (Redacted), CIA Inspector General, July 2014, released by CIA January 2015
Foreign Intelligence Gathering Laws, Law Library of Congress, December 2014
Transforming Nuclear Attribution: Culture, Community, and Change (SHARP 2009) (redacted), Office of the Director of National Intelligence Summer Hard Problem (SHARP) Program, July 2009
Identity Intelligence: From Reactionary Support to Sustained Enabler, Defense Intelligence Agency, August 21, 2012
Declassified Facts in PCLOB 702 report, July 22, 2014
Allegations of Iraqi Chemical Weapons Transported to Syria and Possible Tunnel Adits at Al-Bayda, Syria by Allen Thomson, June 22, 2014
Biodetection Technologies for First Responders: 2014 Edition, Pacific Northwest National Laboratory
3D Cyberspace Spillover: Where Virtual Worlds Get Real, ODNI Summer Hard Problem (SHARP) Program, Summer 2008
Report of the National Commission for the Review of the Research and Development Programs of the United States Intelligence Community (Unclassified Version), released November 2013
White Paper: The IC’s Role Within U.S. Cyber R&D, Report of the National Commission for the Review of the Research and Development Programs of the United States Intelligence Community (Unclassified Version), released November 2013
The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens’ fundamental rights, European Parliament Directorate General for Internal Policies, September 2013
Project QUANTUM LEAP: After Action Report, Special Operations Command National Capital Region, Draft, 12 September 2012
Stimulating Innovation in Naval Special Warfare by Utilizing Small Working Groups by Thomas A. Rainville, Master’s Thesis, March 2001
The Emergence of the Internet and Africa by Les Cottrell, SLAC, May 13, 2013
Lawfulness of a Lethal Operation Directed Against a U.S. Citizen Who Is a Senior Operational Leader of Al-Qa’ida or An Associated Force, Department of Justice White Paper
A Dossier on New Construction North of Kashgar, Xinjiang, China 39.6 N, 76.1 E by Allen Thomson, January 11, 2013
Early warning analysis for social diffusion events by Richard Colbaugh and Kristin Glass, Security Informatics, Vol. 1, 2012, SAND 2010-5334C
Proactive Defense for Evolving Cyber Threats by Richard Colbaugh and Kristin Glass, Sandia National Laboratories, November 2012
U.S. National Security and Economic Interests in Remote Sensing: The Evolution of Civil and Commercial Policy by James A. Vedda, prepared for the National Geospatial-Intelligence Agency, February 20, 2009
Strengthened IAEA Safeguards-Imagery Analysis: Geospatial Tools for Nonproliferation Analysis by Frank V. Pabian, Los Alamos National Laboratory, June 22, 2012
A Sourcebook on the TACKSMAN I and TACKSMAN II ELINT Bases in Iran by Allen Thomson, July 25, 2012
A Dossier on the NRO Aerospace Data Facility Southwest (Las Cruces, New Mexico) by Allen Thomson, working draft, July 16, 2012
Cyber Threat Metrics by Mark Mateski, et al, Sandia National Laboratories, March 2012
Espionage and Other Compromises of National Security: Case Summaries from 1975 to 2008, PERSEREC, November 2, 2009
Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes by S. John Luke, Lawrence Livermore National Laboratory, January 2012
Rapid Exploitation and Analysis of Documents, Lawrence Livermore National Laboratory, December 2011
Department of Defense Cyberspace Policy Report, report to Congress, November 2011
Unmanned Air Vehicle (UAV) Ultra-Persistence Research, Sandia National Laboratories, June 2011
The Fingerprint Sourcebook, National Institute of Justice, August 2011
Geomagnetic Storms and Their Impacts on the U.S. Power Grid by John Kappenman, Metatech Corporation, January 2010
Aerospace Data Facility-Colorado / Denver Security Operations Center, Buckley AFB, Colorado a sourcebook by Allen Thomson, updated November 28, 2011
A Guide to the Amerithrax Documents: I. Amount of Attack Materials and Requirements for Production by Martin Furmanski, MD, May 2010
Parliamentary Oversight of Security and Intelligence Agencies in the European Union prepared for the European Parliament, September 2011
Wireless Evolution, ETR Bulletin, Emerging Technologies Research (FBI Operational Technology Division), volume 8, issue 1, March 2011
Kryptographik: Lehrbuch der Geheimschreibekunst (Chiffrir- und Dechiffrirkunst) in Staats- und Privatgeschaeften, by Johann Ludwig Klueber, 1809 (declassified by NSA in 2010)
Terms & Definitions of Interest for DoD Counterintelligence Professionals, Defense Intelligence Agency, 2 May 2011
Transnational Islamic Activism and Radicalization: Patterns, Trends, and Prognosticators, Sandia National Laboratories Report, June 2010
Disclosure of Budget Information on the Intelligence Community, Final Report of the Church Committee (1976), Book I, Chapter XVI
National Security Space Strategy, Unclassified Summary, DOD/ODNI, January 2011
Former CIA Employees are Barred from Lobbying CIA Detailees to Other Agencies, Office of Government Ethics, February 9, 2006
Illicit Commerce by North Korea, Report to the UN Security Council, 2009 (via ArmsControlWonk)
Compilation of good practices on legal and institutional frameworks and measures that ensure respect for human rights by intelligence agencies while countering terrorism, including on their oversight, United Nations Human Rights Council, May 17, 2010
Interrogation: World War II, Vietnam, and Iraq, National Defense Intelligence College, September 2008
Final Report of the Guantanamo Review Task Force, January 22, 2010
Biological Sciences Experts Group (BSEG) concept paper, 2006
The CIA Accountability Act of 1987 (HR 3603), by Rep. Leon Panetta, et al, 100th Congress, November 3, 1987
The Comprehensive National Cybersecurity Initiative, White House release, March 2, 2010
Arab Media Outlook 2009-2013, Dubai Press Club, February 2010
Screening for Potential Terrorists in the Enlisted Military Accessions Process, Defense Personnel Security Research Center, April 2005
Unclassified Report on the President’s Surveillance Program, Joint Inspector General Report, 10 July 2009
Legal Barriers to Information Sharing: The Erection of a Wall Between Intelligence and Law Enforcement Investigations, 9/11 Commission staff monograph by Barbara A. Grewe, August 20, 2004 (declassified June 2009)
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, The White House, May 2009
Domestic Extremism Lexicon, Department of Homeland Security Office of Intelligence and Analysis, March 26, 2009
Rightwing Extremism: Current Economic and Political Climate Fueling Resurgence in Radicalization and Recruitment, Department of Homeland Security Office of Intelligence and Analysis, April 7, 2009
Leftwing Extremists Likely to Increase Use of Cyber Attacks over the Coming Decade, Department of Homeland Security Office of Intelligence and Analysis, January 26, 2009
Intelligence Community Decision Book for the President, transmitted to President Gerald Ford on December 22, 1975
An Overview of the United States Intelligence Community for the 111th Congress, February 2009.
Mumbai Terrorist Attacks (Nov. 26-29, 2008), January 5, 2009. This dossier based on the investigation of the Mumbai terror attacks was prepared by the Government of India and presented to the Government of Pakistan.
Biometric Collection, Transmission and Storage Standards Technical Reference, Department of the Army Biometrics Task Force, 24 July 2006
Joint Federal Agencies Intelligence DNA Database Joint Federal Agencies Intelligence DNA Database, describing a searchable database of DNA profiles from detainees and Searchable database of DNA profiles from detainees and known or suspected terrorists known or suspected terrorists, December 2007
Al Qaida-Like Mobile Discussions & Potential Creative Uses, 304th MI BN OSINT Team, October 16, 2008
Issues Related to the Bureau of Industry and Security�s Budget and Responsibilities for International Treaty Implementation and Compliance, U.S. Department of Commerce, Office of Inspector General, October 2008
Biometrics in Government POST – 9/11, National Science and Technology Council, August 2008
The Department of Defense DNA Registry and the U.S. Government Accounting Mission by Brion C. Smith, August 2005
Zawahiri Tries to Clear Name, Explain Strategy, Transnational Security Issues Report, International Research Center, 21 April 2008
An Examination of State and Local Fusion Centers and Data Collection Methods by Milton Nenneman, Naval Postgraduate School thesis, March 2008
Iraqi Perspectives Project: Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents, Institute for Defense Analyses, November 2007 (released March 2008)
Independent Study of the Roles of Commercial Remote Sensing in the Future National System for Geospatial-Intelligence (NSG), Report to the Directors of the NGA and the NRO, July 16, 2007
Remarks of Open Source Center Director Doug Naquin before the Central Intelligence Retirees’ Association, October 3, 2007
El Fenomeno Chavez: Hugo Chavez of Venezuela, Modern Day Bolivar by Jerrold M. Post, USAF Counterproliferation Center, March 2007
Managing the Private Spies: The Use of Commercial Augmentation for Intelligence Operations by Maj. Glenn J. Voelz, Joint Military Intelligence College, June 2006
Review of Anticorruption Efforts in Iraq, U.S. Embassy working draft report, Baghdad, Iraq, 2007
Civil Applications Committee (CAC) Blue Ribbon Study, Independent Study Group Final Report, September 2005 (Civil Applications Committee Fact Sheet, 2001)
Review of Psychological Operations: Lessons Learned from Recent Operational Experience by Christopher J. Lamb, National Defense University Press, September 2005
DCI Robert M. Gates on CIA and Openness, speech to the Oklahoma Press Association, February 21, 1992
Further Information Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq (cont’d) by Milton Leitenberg, part 3 of 3, August 2006
Further Information Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq by Milton Leitenberg, part 2 of 3, August 2006
Targeted Killing as an Element of U.S. Foreign Policy in the War on Terror by Major Matthew J. Machon, US Army School of Advanced Military Studies, Fort Leavenworth, May 2006
Information Operations in Operations Enduring Freedom and Iraqi Freedom – What Went Wrong? by Major Joseph L. Cox, US Army School of Advanced Military Studies, Fort Leavenworth, May 2006
Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of Iran by Jason P. Patterson and Matthew N. Smith, Naval Postgraduate School, September 2005
Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of North Korea by Christopher Brown, Naval Postgraduate School, September 2004
Unresolved Questions Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq by Milton Leitenberg, part 1 of 3, June 2006
Assisting People to Become Independent Learners in the Analysis of Intelligence by Peter L. Pirolli, Palo Alto Research Center, Inc., February 2006
Intelligence Analysis in Theater Joint Intelligence Centers: An Experiment in Applying Structured Methods by MSgt Robert D. Folker, Jr. (USAF), Joint Military Intelligence College, January 2000
The A.Q. Khan Network: Causes and Implications by Christopher O. Clary, Master’s Thesis, Naval Postgraduate School, December 2005
An Analysis of the Systemic Security Weaknesses of the U.S. Navy Fleet Broadcasting System, 1967-1974, as Exploited by CWO John Walker by Maj. Laura J. Heath, Master’s Thesis, U.S. Army Command and General Staff College, June 2005
Online Islamic Organizations and Measuring Web Effectiveness by Minji Daniels, Master’s Thesis, Naval Postgraduate School, December 2004
Deception 101 — A Primer on Deception by Joseph W. Caddell, U.S. Army War College Strategic Studies Institute, December 2004
Link Analysis Workbench, SRI International, Air Force Research Laboratory, September 2004 (1.3 MB PDF file)
Some Human Factors in Codebreaking by Christine Large, originally presented at a symposium on “The Role of Humans in Intelligent and Automated Systems,” held in Warsaw, Poland, October 2002
Reliable and Relevant National Communications System by Lt. Col. Timothy L. Lake, US Army War College research paper, May 2004
Advanced Command, Control, Communications & Intelligence (C3I) Systems Analysis and Trade-Offs, CACI Technologies, Incorporated, March 2004
Intelligence, Surveillance and Reconnaissance in Support of Operation Iraqi Freedom: Challenges for Rapid Maneuvers and Joint C4ISR Integration and Interoperability by Lt. Com. Carl M. Bradley, USN, Naval War College, February 9, 2004
Insight Into Foreign Thoughtworlds for National Security Decision Makers by J.W. Barnett, Institute for Defense Analyses, January 2004
Resume of a CIA SIGINT Operations Officer, 1965-1993
Some-Time, Part-Time and One-time Terrorism by M.E. Bowman, Intelligencer, Association of Former Intelligence Officers, Winter/Spring 2003
Interviewing With An Intelligence Agency, a first-person narrative of an applicant interviewing and going through the clearance process with the National Security Agency, November 2003, updated January 2004
“All Necessary Means” — Employing CIA Operatives in a Warfighting Role Alongside Special Operations Forces by Colonel Kathryn Stone, US Army War College, April 7, 2003
The Evolution of Strategic Influence by LTC Susan L. Gough, US Army War College, April 7, 2003
Strategic Influence Operations — The Information Connection by Col. Brad M. Ward, US Army War College, April 7, 2003
George Washington, America�s First Director of Military Intelligence by LCDR Michael S. Prather, USN, USMC Command and Staff College (Master’s Thesis), July 2002
NSA’s Central Security Service, by Keith P. Clive, excerpted from Cryptologia, April 2002
Remarks of David Kahn on the 50th Anniversary of the National Security Agency, November 1, 2002
Force Protection in an Era of Commercially Available Satellite Imagery: Space Blockade as a Possible Solution, by Maj. Robert Fabian (USAF), Naval War College, February 2002 (1.3 MB PDF file)
Chasing Spies: How the FBI Failed in Counterintelligence But Promoted the Politics of McCarthyism in the Cold War Years, by Athan Theoharis, Ivan R. Dee, Publisher, 2002 (Chapter One).
Israeli Court Verdict Against BG Yitzhak Yaacov, convicted of unauthorized disclosure of nuclear secrets, May 14, 2002, MS Word document (in Hebrew)
A Critical View of the National Reconnaissance Office by Dave Thompson, President & CEO, Spectrum Astro, at the 18th National Space Symposium, April 11, 2002.
An Assessment of International Legal Issues in Information Operations, Department of Defense Office of General Counsel, May 1999
Project Megiddo, Federal Bureau of Investigation, 1999
A Social Network Analysis of the Iranian Government by Capt. Robert S. Renfro, II and Dr. Richard F. Deckro, Air Force Institute of Technology, November 2001.
Congressional Oversight of Intelligence: One Perspective by Mary K. Sturtevant, American Intelligence Journal, Summer 1992.
The Search for a European Intelligence Policy by Charles Baker, May 2001, addresses the prospects for, and obstacles to, a joint European intelligence policy.
Interception Capabilities 2000 Report to the Director General for Research of the European Parliament (Scientific and Technical Options Assessment programme office) on the development of surveillance technology and risk of abuse of economic information – April 1999
Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions, and Operations – 01 May 1998 – By Mr. Robert D. Steele President, OSS Inc., and Dr. Mark M. Lowenthal , President OSS USA
TAKEDOWN: Targets, Tools, & Technocracy Robert David Steele Author’s Pre-Conference Final Draft, Ninth Annual Strategy Conference, U.S. Army War College “Challenging the United States Symmetrically and Asymmetrically: Can America Be Defeated?” 31 March through 2 April 1998
INFORMATION PEACKEEPING: The Purest Form of War Robert D. Steele Editor’s Final Draft 3.9 dated 11 March 1998, Forthcoming in Dearth and Campen, CYBERWAR 2.0: Myths, Mysteries, and Realities
Nuclear Threats During the Gulf War John Pike 19 February 1998
The Integration of Operations & Intelligence — Getting Information to the Warfighter Air Command and Staff College 1997 – Getting combat information in a timely manner from the stovepipes of the intelligence world to the operators that require it has been a problem for years.
Marine Corps Intelligence Doctrine: Does It Know The Information Age Has Arrived? Bradley J. Sillman Major USMC [United States Marine Corps Command and Staff College]
How Much for a Pound of Communication? Paul E. Ruud Lieutenant Commander, US Navy [United States Marine Corps Command and Staff College]
USAF TACS Battle Management: Preparing for High Tempo Future Operations Major C.B. Miller, United States Air Force [United States Marine Corps Command and Staff College]
The Final Report of the Snyder Commission — A Perspective on Intelligence Reform from Outside the Beltway Woodrow Wilson School Policy Conference 401a: Intelligence Reform in the Post-Cold War Era
Confronting the New Intelligence Establishment: Lessons from the Colorado Experience – Loring Wirbel The Workbook Fall 1996
UK Eyes Alpha by Mark Urban – The Inside Story of British Intelligence – with sample chapter on ZIRCON
Secret Power – New Zealand’s Role in the International Spy Network – by Nicky Hager
THE SPECIAL OSPREY: IMPACT ON SPECIAL OPERATIONS DOCTRINE THOMAS J. TRASK School of Advanced Airpower Studies JUNE 1996
ORGANIZATIONAL CONCEPTS FOR THE “SENSOR-TO-SHOOTER” WORLD: THE IMPACT OF REAL-TIME INFORMATION ON AIRPOWER TARGETING WILLIAM G. CHAPMAN School of Advanced Airpower Studies JUNE 1996
Communications and Intelligence: Why Can’t We Get Along? Major Lisa Tubridy, United States Marine Corps – April 1996
Rise of Domestic Terrorism and Its Relation to United States Armed Forces LCDR Steven Mack Presley, MSC, USN – 19 April 1996
INTEGRATION OF INTELLIGENCE INTO PROFESSIONAL MILITARY EDUCATION – MAJOR R. J. BUIKEMA, USMC – 18 APRIL 96
Preparation of the US Navy Intelligence Officer CDR (Sel) Richard L. Saunders, USN – 15 April 1996
“Forward…From The Sea”: Intelligence Support to Naval Expeditionary Forces Lieutenant Commander Thomas C. Baus, United States Navy – 04 April 1996
The Future of Airborne Reconnaissance Major Keith E. Gentile, United States Air Force – 27 March 1996 [this is a rather nice piece, though I fear that our HTML version has oddly deleted the even-number footnotes, so if you need these references, you may have better luck with the original ZIP version]
V [Marine] Amphibious Corps Planning for Operation Olympic and the Role of Intelligence in Support of Planning. Author: Major Mark P. Arens, USMCR [MCIA] 27 March 1996
Making Intelligence Smarter: The Future of U.S. Intelligence — Report of an Independent Task Force Sponsored by the Council on Foreign Relations, February 1996
A Framework for Reform of the U.S. Intelligence Community, by John A. Gentry
SPECIAL OPERATIONS FORCES AND UNMANNED AERIAL VEHICLES: SOONER OR LATER? STEPHEN P. HOWARD School of Advanced Airpower Studies JUNE 1995
Reconnaissance, Surveillance, and Target Acquisition Collection Planning–Embedded Within the MEF Intelligence and Operations Cycles – Intelligence Doctrine Working Group Chairman: Major J.C. Dereschuk, United States Marine Corps Members: Major R. H. Chase Major J. A. Day (USMC) Major D. D. Cline Major J.G. O’Hagan — May 1995
A CRITICAL ANALYSIS OF THE I MEF INTELLIGENCE PERFORMANCE IN THE 1991 PERSIAN GULF WAR Major Raymond E. Coia, United States Marine Corps – 22 May 1995
The Use of Covert Paramilitary Activity as a Policy Tool: An Analysis of Operations Conducted by the United States Central Intelligence Agency, 1949-1951 – Major D. H. Berger, USMC – 22 May 1995
CAN ATARS FIX AMERICA’S TACTICAL RECONNAISSANCE VACUUM? by Major Mark E. Marek Conference Group Nine LtCol Sorrell Dr. Jacobsen 18 April 1995 United States Marine Corps Command and Staff College Marine Corps University
COUNTERING TERRORISM: THE ISRAELI RESPONSE TO THE 1972 MUNICH OLYMPIC MASSACRE AND THE DEVELOPMENT OF INDEPENDENT COVERT ACTION TEAMS – Alexander B. Calahan – April 1995
Observation Satellites for Arms Control: Some Implications and Policy Choices by Rosemary Klineberg, Institute for Defense Analyses, 31 May 1963
LINK:
Intelligence e-Prints
This archive includes timely and interesting materials on topics of current interest. Any opinions, findings, and conclusions or recommendations expressed in this archive are those of the author(s) and do not necessarily reflect the views of the Federation of American Scientists.
The U.S. Army Camp Stanley Storage Activity and The CIA Midwest Depot by Allen Thomson, updated July 5, 2015
Joint Inspector General Report on the President’s Surveillance Program (2015 redaction), 10 July 2009 (via NY Times)
The DOD Cyber Strategy, U.S. Department of Defense, April 2015
Mixed Reality: Geolocation & Portable Hand-Held Communication Devices, ODNI Summer Hard Problem (SHARP) Program, 2009 (released February 2015)
Sovereign Citizen Extremist Ideology Will Drive Violence at Home, During Travel, and at Government Facilities, DHS Office of Intelligence and Analysis, February 5, 2015 (via Reason)
Signals Intelligence Reform: 2015 Anniversary Report, Office of the Director of National Intelligence, released February 3, 2015
Principles of Intelligence Transparency for the Intelligence Community, Office of the Director of National Intelligence, released February 3, 2015
Final Report of the Rendition, Detention, and Interrogation Network Agency Accountability Board (Redacted), December 2014, released by CIA January 2015
Report of Investigation into CIA Access to the SSCI Shared Drive on RDINet (Redacted), CIA Inspector General, July 2014, released by CIA January 2015
Foreign Intelligence Gathering Laws, Law Library of Congress, December 2014
Transforming Nuclear Attribution: Culture, Community, and Change (SHARP 2009) (redacted), Office of the Director of National Intelligence Summer Hard Problem (SHARP) Program, July 2009
Identity Intelligence: From Reactionary Support to Sustained Enabler, Defense Intelligence Agency, August 21, 2012
Declassified Facts in PCLOB 702 report, July 22, 2014
Allegations of Iraqi Chemical Weapons Transported to Syria and Possible Tunnel Adits at Al-Bayda, Syria by Allen Thomson, June 22, 2014
Biodetection Technologies for First Responders: 2014 Edition, Pacific Northwest National Laboratory
3D Cyberspace Spillover: Where Virtual Worlds Get Real, ODNI Summer Hard Problem (SHARP) Program, Summer 2008
Report of the National Commission for the Review of the Research and Development Programs of the United States Intelligence Community (Unclassified Version), released November 2013
White Paper: The IC’s Role Within U.S. Cyber R&D, Report of the National Commission for the Review of the Research and Development Programs of the United States Intelligence Community (Unclassified Version), released November 2013
The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens’ fundamental rights, European Parliament Directorate General for Internal Policies, September 2013
Project QUANTUM LEAP: After Action Report, Special Operations Command National Capital Region, Draft, 12 September 2012
Stimulating Innovation in Naval Special Warfare by Utilizing Small Working Groups by Thomas A. Rainville, Master’s Thesis, March 2001
The Emergence of the Internet and Africa by Les Cottrell, SLAC, May 13, 2013
Lawfulness of a Lethal Operation Directed Against a U.S. Citizen Who Is a Senior Operational Leader of Al-Qa’ida or An Associated Force, Department of Justice White Paper
A Dossier on New Construction North of Kashgar, Xinjiang, China 39.6 N, 76.1 E by Allen Thomson, January 11, 2013
Early warning analysis for social diffusion events by Richard Colbaugh and Kristin Glass, Security Informatics, Vol. 1, 2012, SAND 2010-5334C
Proactive Defense for Evolving Cyber Threats by Richard Colbaugh and Kristin Glass, Sandia National Laboratories, November 2012
U.S. National Security and Economic Interests in Remote Sensing: The Evolution of Civil and Commercial Policy by James A. Vedda, prepared for the National Geospatial-Intelligence Agency, February 20, 2009
Strengthened IAEA Safeguards-Imagery Analysis: Geospatial Tools for Nonproliferation Analysis by Frank V. Pabian, Los Alamos National Laboratory, June 22, 2012
A Sourcebook on the TACKSMAN I and TACKSMAN II ELINT Bases in Iran by Allen Thomson, July 25, 2012
A Dossier on the NRO Aerospace Data Facility Southwest (Las Cruces, New Mexico) by Allen Thomson, working draft, July 16, 2012
Cyber Threat Metrics by Mark Mateski, et al, Sandia National Laboratories, March 2012
Espionage and Other Compromises of National Security: Case Summaries from 1975 to 2008, PERSEREC, November 2, 2009
Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes by S. John Luke, Lawrence Livermore National Laboratory, January 2012
Rapid Exploitation and Analysis of Documents, Lawrence Livermore National Laboratory, December 2011
Department of Defense Cyberspace Policy Report, report to Congress, November 2011
Unmanned Air Vehicle (UAV) Ultra-Persistence Research, Sandia National Laboratories, June 2011
The Fingerprint Sourcebook, National Institute of Justice, August 2011
Geomagnetic Storms and Their Impacts on the U.S. Power Grid by John Kappenman, Metatech Corporation, January 2010
Aerospace Data Facility-Colorado / Denver Security Operations Center, Buckley AFB, Colorado a sourcebook by Allen Thomson, updated November 28, 2011
A Guide to the Amerithrax Documents: I. Amount of Attack Materials and Requirements for Production by Martin Furmanski, MD, May 2010
Parliamentary Oversight of Security and Intelligence Agencies in the European Union prepared for the European Parliament, September 2011
Wireless Evolution, ETR Bulletin, Emerging Technologies Research (FBI Operational Technology Division), volume 8, issue 1, March 2011
Kryptographik: Lehrbuch der Geheimschreibekunst (Chiffrir- und Dechiffrirkunst) in Staats- und Privatgeschaeften, by Johann Ludwig Klueber, 1809 (declassified by NSA in 2010)
Terms & Definitions of Interest for DoD Counterintelligence Professionals, Defense Intelligence Agency, 2 May 2011
Transnational Islamic Activism and Radicalization: Patterns, Trends, and Prognosticators, Sandia National Laboratories Report, June 2010
Disclosure of Budget Information on the Intelligence Community, Final Report of the Church Committee (1976), Book I, Chapter XVI
National Security Space Strategy, Unclassified Summary, DOD/ODNI, January 2011
Former CIA Employees are Barred from Lobbying CIA Detailees to Other Agencies, Office of Government Ethics, February 9, 2006
Illicit Commerce by North Korea, Report to the UN Security Council, 2009 (via ArmsControlWonk)
Compilation of good practices on legal and institutional frameworks and measures that ensure respect for human rights by intelligence agencies while countering terrorism, including on their oversight, United Nations Human Rights Council, May 17, 2010
Interrogation: World War II, Vietnam, and Iraq, National Defense Intelligence College, September 2008
Final Report of the Guantanamo Review Task Force, January 22, 2010
Biological Sciences Experts Group (BSEG) concept paper, 2006
The CIA Accountability Act of 1987 (HR 3603), by Rep. Leon Panetta, et al, 100th Congress, November 3, 1987
The Comprehensive National Cybersecurity Initiative, White House release, March 2, 2010
Arab Media Outlook 2009-2013, Dubai Press Club, February 2010
Screening for Potential Terrorists in the Enlisted Military Accessions Process, Defense Personnel Security Research Center, April 2005
Unclassified Report on the President’s Surveillance Program, Joint Inspector General Report, 10 July 2009
Legal Barriers to Information Sharing: The Erection of a Wall Between Intelligence and Law Enforcement Investigations, 9/11 Commission staff monograph by Barbara A. Grewe, August 20, 2004 (declassified June 2009)
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, The White House, May 2009
Domestic Extremism Lexicon, Department of Homeland Security Office of Intelligence and Analysis, March 26, 2009
Rightwing Extremism: Current Economic and Political Climate Fueling Resurgence in Radicalization and Recruitment, Department of Homeland Security Office of Intelligence and Analysis, April 7, 2009
Leftwing Extremists Likely to Increase Use of Cyber Attacks over the Coming Decade, Department of Homeland Security Office of Intelligence and Analysis, January 26, 2009
Intelligence Community Decision Book for the President, transmitted to President Gerald Ford on December 22, 1975
An Overview of the United States Intelligence Community for the 111th Congress, February 2009.
Mumbai Terrorist Attacks (Nov. 26-29, 2008), January 5, 2009. This dossier based on the investigation of the Mumbai terror attacks was prepared by the Government of India and presented to the Government of Pakistan.
Biometric Collection, Transmission and Storage Standards Technical Reference, Department of the Army Biometrics Task Force, 24 July 2006
Joint Federal Agencies Intelligence DNA Database Joint Federal Agencies Intelligence DNA Database, describing a searchable database of DNA profiles from detainees and Searchable database of DNA profiles from detainees and known or suspected terrorists known or suspected terrorists, December 2007
Al Qaida-Like Mobile Discussions & Potential Creative Uses, 304th MI BN OSINT Team, October 16, 2008
Issues Related to the Bureau of Industry and Security�s Budget and Responsibilities for International Treaty Implementation and Compliance, U.S. Department of Commerce, Office of Inspector General, October 2008
Biometrics in Government POST – 9/11, National Science and Technology Council, August 2008
The Department of Defense DNA Registry and the U.S. Government Accounting Mission by Brion C. Smith, August 2005
Zawahiri Tries to Clear Name, Explain Strategy, Transnational Security Issues Report, International Research Center, 21 April 2008
An Examination of State and Local Fusion Centers and Data Collection Methods by Milton Nenneman, Naval Postgraduate School thesis, March 2008
Iraqi Perspectives Project: Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents, Institute for Defense Analyses, November 2007 (released March 2008)
Independent Study of the Roles of Commercial Remote Sensing in the Future National System for Geospatial-Intelligence (NSG), Report to the Directors of the NGA and the NRO, July 16, 2007
Remarks of Open Source Center Director Doug Naquin before the Central Intelligence Retirees’ Association, October 3, 2007
El Fenomeno Chavez: Hugo Chavez of Venezuela, Modern Day Bolivar by Jerrold M. Post, USAF Counterproliferation Center, March 2007
Managing the Private Spies: The Use of Commercial Augmentation for Intelligence Operations by Maj. Glenn J. Voelz, Joint Military Intelligence College, June 2006
Review of Anticorruption Efforts in Iraq, U.S. Embassy working draft report, Baghdad, Iraq, 2007
Civil Applications Committee (CAC) Blue Ribbon Study, Independent Study Group Final Report, September 2005 (Civil Applications Committee Fact Sheet, 2001)
Review of Psychological Operations: Lessons Learned from Recent Operational Experience by Christopher J. Lamb, National Defense University Press, September 2005
DCI Robert M. Gates on CIA and Openness, speech to the Oklahoma Press Association, February 21, 1992
Further Information Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq (cont’d) by Milton Leitenberg, part 3 of 3, August 2006
Further Information Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq by Milton Leitenberg, part 2 of 3, August 2006
Targeted Killing as an Element of U.S. Foreign Policy in the War on Terror by Major Matthew J. Machon, US Army School of Advanced Military Studies, Fort Leavenworth, May 2006
Information Operations in Operations Enduring Freedom and Iraqi Freedom – What Went Wrong? by Major Joseph L. Cox, US Army School of Advanced Military Studies, Fort Leavenworth, May 2006
Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of Iran by Jason P. Patterson and Matthew N. Smith, Naval Postgraduate School, September 2005
Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of North Korea by Christopher Brown, Naval Postgraduate School, September 2004
Unresolved Questions Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq by Milton Leitenberg, part 1 of 3, June 2006
Assisting People to Become Independent Learners in the Analysis of Intelligence by Peter L. Pirolli, Palo Alto Research Center, Inc., February 2006
Intelligence Analysis in Theater Joint Intelligence Centers: An Experiment in Applying Structured Methods by MSgt Robert D. Folker, Jr. (USAF), Joint Military Intelligence College, January 2000
The A.Q. Khan Network: Causes and Implications by Christopher O. Clary, Master’s Thesis, Naval Postgraduate School, December 2005
An Analysis of the Systemic Security Weaknesses of the U.S. Navy Fleet Broadcasting System, 1967-1974, as Exploited by CWO John Walker by Maj. Laura J. Heath, Master’s Thesis, U.S. Army Command and General Staff College, June 2005
Online Islamic Organizations and Measuring Web Effectiveness by Minji Daniels, Master’s Thesis, Naval Postgraduate School, December 2004
Deception 101 — A Primer on Deception by Joseph W. Caddell, U.S. Army War College Strategic Studies Institute, December 2004
Link Analysis Workbench, SRI International, Air Force Research Laboratory, September 2004 (1.3 MB PDF file)
Some Human Factors in Codebreaking by Christine Large, originally presented at a symposium on “The Role of Humans in Intelligent and Automated Systems,” held in Warsaw, Poland, October 2002
Reliable and Relevant National Communications System by Lt. Col. Timothy L. Lake, US Army War College research paper, May 2004
Advanced Command, Control, Communications & Intelligence (C3I) Systems Analysis and Trade-Offs, CACI Technologies, Incorporated, March 2004
Intelligence, Surveillance and Reconnaissance in Support of Operation Iraqi Freedom: Challenges for Rapid Maneuvers and Joint C4ISR Integration and Interoperability by Lt. Com. Carl M. Bradley, USN, Naval War College, February 9, 2004
Insight Into Foreign Thoughtworlds for National Security Decision Makers by J.W. Barnett, Institute for Defense Analyses, January 2004
Resume of a CIA SIGINT Operations Officer, 1965-1993
Some-Time, Part-Time and One-time Terrorism by M.E. Bowman, Intelligencer, Association of Former Intelligence Officers, Winter/Spring 2003
Interviewing With An Intelligence Agency, a first-person narrative of an applicant interviewing and going through the clearance process with the National Security Agency, November 2003, updated January 2004
“All Necessary Means” — Employing CIA Operatives in a Warfighting Role Alongside Special Operations Forces by Colonel Kathryn Stone, US Army War College, April 7, 2003
The Evolution of Strategic Influence by LTC Susan L. Gough, US Army War College, April 7, 2003
Strategic Influence Operations — The Information Connection by Col. Brad M. Ward, US Army War College, April 7, 2003
George Washington, America�s First Director of Military Intelligence by LCDR Michael S. Prather, USN, USMC Command and Staff College (Master’s Thesis), July 2002
NSA’s Central Security Service, by Keith P. Clive, excerpted from Cryptologia, April 2002
Remarks of David Kahn on the 50th Anniversary of the National Security Agency, November 1, 2002
Force Protection in an Era of Commercially Available Satellite Imagery: Space Blockade as a Possible Solution, by Maj. Robert Fabian (USAF), Naval War College, February 2002 (1.3 MB PDF file)
Chasing Spies: How the FBI Failed in Counterintelligence But Promoted the Politics of McCarthyism in the Cold War Years, by Athan Theoharis, Ivan R. Dee, Publisher, 2002 (Chapter One).
Israeli Court Verdict Against BG Yitzhak Yaacov, convicted of unauthorized disclosure of nuclear secrets, May 14, 2002, MS Word document (in Hebrew)
A Critical View of the National Reconnaissance Office by Dave Thompson, President & CEO, Spectrum Astro, at the 18th National Space Symposium, April 11, 2002.
An Assessment of International Legal Issues in Information Operations, Department of Defense Office of General Counsel, May 1999
Project Megiddo, Federal Bureau of Investigation, 1999
A Social Network Analysis of the Iranian Government by Capt. Robert S. Renfro, II and Dr. Richard F. Deckro, Air Force Institute of Technology, November 2001.
Congressional Oversight of Intelligence: One Perspective by Mary K. Sturtevant, American Intelligence Journal, Summer 1992.
The Search for a European Intelligence Policy by Charles Baker, May 2001, addresses the prospects for, and obstacles to, a joint European intelligence policy.
Interception Capabilities 2000 Report to the Director General for Research of the European Parliament (Scientific and Technical Options Assessment programme office) on the development of surveillance technology and risk of abuse of economic information – April 1999
Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions, and Operations – 01 May 1998 – By Mr. Robert D. Steele President, OSS Inc., and Dr. Mark M. Lowenthal , President OSS USA
TAKEDOWN: Targets, Tools, & Technocracy Robert David Steele Author’s Pre-Conference Final Draft, Ninth Annual Strategy Conference, U.S. Army War College “Challenging the United States Symmetrically and Asymmetrically: Can America Be Defeated?” 31 March through 2 April 1998
INFORMATION PEACKEEPING: The Purest Form of War Robert D. Steele Editor’s Final Draft 3.9 dated 11 March 1998, Forthcoming in Dearth and Campen, CYBERWAR 2.0: Myths, Mysteries, and Realities
Nuclear Threats During the Gulf War John Pike 19 February 1998
The Integration of Operations & Intelligence — Getting Information to the Warfighter Air Command and Staff College 1997 – Getting combat information in a timely manner from the stovepipes of the intelligence world to the operators that require it has been a problem for years.
Marine Corps Intelligence Doctrine: Does It Know The Information Age Has Arrived? Bradley J. Sillman Major USMC [United States Marine Corps Command and Staff College]
How Much for a Pound of Communication? Paul E. Ruud Lieutenant Commander, US Navy [United States Marine Corps Command and Staff College]
USAF TACS Battle Management: Preparing for High Tempo Future Operations Major C.B. Miller, United States Air Force [United States Marine Corps Command and Staff College]
The Final Report of the Snyder Commission — A Perspective on Intelligence Reform from Outside the Beltway Woodrow Wilson School Policy Conference 401a: Intelligence Reform in the Post-Cold War Era
Confronting the New Intelligence Establishment: Lessons from the Colorado Experience – Loring Wirbel The Workbook Fall 1996
UK Eyes Alpha by Mark Urban – The Inside Story of British Intelligence – with sample chapter on ZIRCON
Secret Power – New Zealand’s Role in the International Spy Network – by Nicky Hager
THE SPECIAL OSPREY: IMPACT ON SPECIAL OPERATIONS DOCTRINE THOMAS J. TRASK School of Advanced Airpower Studies JUNE 1996
ORGANIZATIONAL CONCEPTS FOR THE “SENSOR-TO-SHOOTER” WORLD: THE IMPACT OF REAL-TIME INFORMATION ON AIRPOWER TARGETING WILLIAM G. CHAPMAN School of Advanced Airpower Studies JUNE 1996
Communications and Intelligence: Why Can’t We Get Along? Major Lisa Tubridy, United States Marine Corps – April 1996
Rise of Domestic Terrorism and Its Relation to United States Armed Forces LCDR Steven Mack Presley, MSC, USN – 19 April 1996
INTEGRATION OF INTELLIGENCE INTO PROFESSIONAL MILITARY EDUCATION – MAJOR R. J. BUIKEMA, USMC – 18 APRIL 96
Preparation of the US Navy Intelligence Officer CDR (Sel) Richard L. Saunders, USN – 15 April 1996
“Forward…From The Sea”: Intelligence Support to Naval Expeditionary Forces Lieutenant Commander Thomas C. Baus, United States Navy – 04 April 1996
The Future of Airborne Reconnaissance Major Keith E. Gentile, United States Air Force – 27 March 1996 [this is a rather nice piece, though I fear that our HTML version has oddly deleted the even-number footnotes, so if you need these references, you may have better luck with the original ZIP version]
V [Marine] Amphibious Corps Planning for Operation Olympic and the Role of Intelligence in Support of Planning. Author: Major Mark P. Arens, USMCR [MCIA] 27 March 1996
Making Intelligence Smarter: The Future of U.S. Intelligence — Report of an Independent Task Force Sponsored by the Council on Foreign Relations, February 1996
A Framework for Reform of the U.S. Intelligence Community, by John A. Gentry
SPECIAL OPERATIONS FORCES AND UNMANNED AERIAL VEHICLES: SOONER OR LATER? STEPHEN P. HOWARD School of Advanced Airpower Studies JUNE 1995
Reconnaissance, Surveillance, and Target Acquisition Collection Planning–Embedded Within the MEF Intelligence and Operations Cycles – Intelligence Doctrine Working Group Chairman: Major J.C. Dereschuk, United States Marine Corps Members: Major R. H. Chase Major J. A. Day (USMC) Major D. D. Cline Major J.G. O’Hagan — May 1995
A CRITICAL ANALYSIS OF THE I MEF INTELLIGENCE PERFORMANCE IN THE 1991 PERSIAN GULF WAR Major Raymond E. Coia, United States Marine Corps – 22 May 1995
The Use of Covert Paramilitary Activity as a Policy Tool: An Analysis of Operations Conducted by the United States Central Intelligence Agency, 1949-1951 – Major D. H. Berger, USMC – 22 May 1995
CAN ATARS FIX AMERICA’S TACTICAL RECONNAISSANCE VACUUM? by Major Mark E. Marek Conference Group Nine LtCol Sorrell Dr. Jacobsen 18 April 1995 United States Marine Corps Command and Staff College Marine Corps University
COUNTERING TERRORISM: THE ISRAELI RESPONSE TO THE 1972 MUNICH OLYMPIC MASSACRE AND THE DEVELOPMENT OF INDEPENDENT COVERT ACTION TEAMS – Alexander B. Calahan – April 1995
Observation Satellites for Arms Control: Some Implications and Policy Choices by Rosemary Klineberg, Institute for Defense Analyses, 31 May 1963
Intelligence e-Prints
This archive includes timely and interesting materials on topics of current interest. Any opinions, findings, and conclusions or recommendations expressed in this archive are those of the author(s) and do not necessarily reflect the views of the Federation of American Scientists.
The U.S. Army Camp Stanley Storage Activity and The CIA Midwest Depot by Allen Thomson, updated July 5, 2015
Joint Inspector General Report on the President’s Surveillance Program (2015 redaction), 10 July 2009 (via NY Times)
The DOD Cyber Strategy, U.S. Department of Defense, April 2015
Mixed Reality: Geolocation & Portable Hand-Held Communication Devices, ODNI Summer Hard Problem (SHARP) Program, 2009 (released February 2015)
Sovereign Citizen Extremist Ideology Will Drive Violence at Home, During Travel, and at Government Facilities, DHS Office of Intelligence and Analysis, February 5, 2015 (via Reason)
Signals Intelligence Reform: 2015 Anniversary Report, Office of the Director of National Intelligence, released February 3, 2015
Principles of Intelligence Transparency for the Intelligence Community, Office of the Director of National Intelligence, released February 3, 2015
Final Report of the Rendition, Detention, and Interrogation Network Agency Accountability Board (Redacted), December 2014, released by CIA January 2015
Report of Investigation into CIA Access to the SSCI Shared Drive on RDINet (Redacted), CIA Inspector General, July 2014, released by CIA January 2015
Foreign Intelligence Gathering Laws, Law Library of Congress, December 2014
Transforming Nuclear Attribution: Culture, Community, and Change (SHARP 2009) (redacted), Office of the Director of National Intelligence Summer Hard Problem (SHARP) Program, July 2009
Identity Intelligence: From Reactionary Support to Sustained Enabler, Defense Intelligence Agency, August 21, 2012
Declassified Facts in PCLOB 702 report, July 22, 2014
Allegations of Iraqi Chemical Weapons Transported to Syria and Possible Tunnel Adits at Al-Bayda, Syria by Allen Thomson, June 22, 2014
Biodetection Technologies for First Responders: 2014 Edition, Pacific Northwest National Laboratory
3D Cyberspace Spillover: Where Virtual Worlds Get Real, ODNI Summer Hard Problem (SHARP) Program, Summer 2008
Report of the National Commission for the Review of the Research and Development Programs of the United States Intelligence Community (Unclassified Version), released November 2013
White Paper: The IC’s Role Within U.S. Cyber R&D, Report of the National Commission for the Review of the Research and Development Programs of the United States Intelligence Community (Unclassified Version), released November 2013
The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens’ fundamental rights, European Parliament Directorate General for Internal Policies, September 2013
Project QUANTUM LEAP: After Action Report, Special Operations Command National Capital Region, Draft, 12 September 2012
Stimulating Innovation in Naval Special Warfare by Utilizing Small Working Groups by Thomas A. Rainville, Master’s Thesis, March 2001
The Emergence of the Internet and Africa by Les Cottrell, SLAC, May 13, 2013
Lawfulness of a Lethal Operation Directed Against a U.S. Citizen Who Is a Senior Operational Leader of Al-Qa’ida or An Associated Force, Department of Justice White Paper
A Dossier on New Construction North of Kashgar, Xinjiang, China 39.6 N, 76.1 E by Allen Thomson, January 11, 2013
Early warning analysis for social diffusion events by Richard Colbaugh and Kristin Glass, Security Informatics, Vol. 1, 2012, SAND 2010-5334C
Proactive Defense for Evolving Cyber Threats by Richard Colbaugh and Kristin Glass, Sandia National Laboratories, November 2012
U.S. National Security and Economic Interests in Remote Sensing: The Evolution of Civil and Commercial Policy by James A. Vedda, prepared for the National Geospatial-Intelligence Agency, February 20, 2009
Strengthened IAEA Safeguards-Imagery Analysis: Geospatial Tools for Nonproliferation Analysis by Frank V. Pabian, Los Alamos National Laboratory, June 22, 2012
A Sourcebook on the TACKSMAN I and TACKSMAN II ELINT Bases in Iran by Allen Thomson, July 25, 2012
A Dossier on the NRO Aerospace Data Facility Southwest (Las Cruces, New Mexico) by Allen Thomson, working draft, July 16, 2012
Cyber Threat Metrics by Mark Mateski, et al, Sandia National Laboratories, March 2012
Espionage and Other Compromises of National Security: Case Summaries from 1975 to 2008, PERSEREC, November 2, 2009
Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes by S. John Luke, Lawrence Livermore National Laboratory, January 2012
Rapid Exploitation and Analysis of Documents, Lawrence Livermore National Laboratory, December 2011
Department of Defense Cyberspace Policy Report, report to Congress, November 2011
Unmanned Air Vehicle (UAV) Ultra-Persistence Research, Sandia National Laboratories, June 2011
The Fingerprint Sourcebook, National Institute of Justice, August 2011
Geomagnetic Storms and Their Impacts on the U.S. Power Grid by John Kappenman, Metatech Corporation, January 2010
Aerospace Data Facility-Colorado / Denver Security Operations Center, Buckley AFB, Colorado a sourcebook by Allen Thomson, updated November 28, 2011
A Guide to the Amerithrax Documents: I. Amount of Attack Materials and Requirements for Production by Martin Furmanski, MD, May 2010
Parliamentary Oversight of Security and Intelligence Agencies in the European Union prepared for the European Parliament, September 2011
Wireless Evolution, ETR Bulletin, Emerging Technologies Research (FBI Operational Technology Division), volume 8, issue 1, March 2011
Kryptographik: Lehrbuch der Geheimschreibekunst (Chiffrir- und Dechiffrirkunst) in Staats- und Privatgeschaeften, by Johann Ludwig Klueber, 1809 (declassified by NSA in 2010)
Terms & Definitions of Interest for DoD Counterintelligence Professionals, Defense Intelligence Agency, 2 May 2011
Transnational Islamic Activism and Radicalization: Patterns, Trends, and Prognosticators, Sandia National Laboratories Report, June 2010
Disclosure of Budget Information on the Intelligence Community, Final Report of the Church Committee (1976), Book I, Chapter XVI
National Security Space Strategy, Unclassified Summary, DOD/ODNI, January 2011
Former CIA Employees are Barred from Lobbying CIA Detailees to Other Agencies, Office of Government Ethics, February 9, 2006
Illicit Commerce by North Korea, Report to the UN Security Council, 2009 (via ArmsControlWonk)
Compilation of good practices on legal and institutional frameworks and measures that ensure respect for human rights by intelligence agencies while countering terrorism, including on their oversight, United Nations Human Rights Council, May 17, 2010
Interrogation: World War II, Vietnam, and Iraq, National Defense Intelligence College, September 2008
Final Report of the Guantanamo Review Task Force, January 22, 2010
Biological Sciences Experts Group (BSEG) concept paper, 2006
The CIA Accountability Act of 1987 (HR 3603), by Rep. Leon Panetta, et al, 100th Congress, November 3, 1987
The Comprehensive National Cybersecurity Initiative, White House release, March 2, 2010
Arab Media Outlook 2009-2013, Dubai Press Club, February 2010
Screening for Potential Terrorists in the Enlisted Military Accessions Process, Defense Personnel Security Research Center, April 2005
Unclassified Report on the President’s Surveillance Program, Joint Inspector General Report, 10 July 2009
Legal Barriers to Information Sharing: The Erection of a Wall Between Intelligence and Law Enforcement Investigations, 9/11 Commission staff monograph by Barbara A. Grewe, August 20, 2004 (declassified June 2009)
Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, The White House, May 2009
Domestic Extremism Lexicon, Department of Homeland Security Office of Intelligence and Analysis, March 26, 2009
Rightwing Extremism: Current Economic and Political Climate Fueling Resurgence in Radicalization and Recruitment, Department of Homeland Security Office of Intelligence and Analysis, April 7, 2009
Leftwing Extremists Likely to Increase Use of Cyber Attacks over the Coming Decade, Department of Homeland Security Office of Intelligence and Analysis, January 26, 2009
Intelligence Community Decision Book for the President, transmitted to President Gerald Ford on December 22, 1975
An Overview of the United States Intelligence Community for the 111th Congress, February 2009.
Mumbai Terrorist Attacks (Nov. 26-29, 2008), January 5, 2009. This dossier based on the investigation of the Mumbai terror attacks was prepared by the Government of India and presented to the Government of Pakistan.
Biometric Collection, Transmission and Storage Standards Technical Reference, Department of the Army Biometrics Task Force, 24 July 2006
Joint Federal Agencies Intelligence DNA Database Joint Federal Agencies Intelligence DNA Database, describing a searchable database of DNA profiles from detainees and Searchable database of DNA profiles from detainees and known or suspected terrorists known or suspected terrorists, December 2007
Al Qaida-Like Mobile Discussions & Potential Creative Uses, 304th MI BN OSINT Team, October 16, 2008
Issues Related to the Bureau of Industry and Security�s Budget and Responsibilities for International Treaty Implementation and Compliance, U.S. Department of Commerce, Office of Inspector General, October 2008
Biometrics in Government POST – 9/11, National Science and Technology Council, August 2008
The Department of Defense DNA Registry and the U.S. Government Accounting Mission by Brion C. Smith, August 2005
Zawahiri Tries to Clear Name, Explain Strategy, Transnational Security Issues Report, International Research Center, 21 April 2008
An Examination of State and Local Fusion Centers and Data Collection Methods by Milton Nenneman, Naval Postgraduate School thesis, March 2008
Iraqi Perspectives Project: Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents, Institute for Defense Analyses, November 2007 (released March 2008)
Independent Study of the Roles of Commercial Remote Sensing in the Future National System for Geospatial-Intelligence (NSG), Report to the Directors of the NGA and the NRO, July 16, 2007
Remarks of Open Source Center Director Doug Naquin before the Central Intelligence Retirees’ Association, October 3, 2007
El Fenomeno Chavez: Hugo Chavez of Venezuela, Modern Day Bolivar by Jerrold M. Post, USAF Counterproliferation Center, March 2007
Managing the Private Spies: The Use of Commercial Augmentation for Intelligence Operations by Maj. Glenn J. Voelz, Joint Military Intelligence College, June 2006
Review of Anticorruption Efforts in Iraq, U.S. Embassy working draft report, Baghdad, Iraq, 2007
Civil Applications Committee (CAC) Blue Ribbon Study, Independent Study Group Final Report, September 2005 (Civil Applications Committee Fact Sheet, 2001)
Review of Psychological Operations: Lessons Learned from Recent Operational Experience by Christopher J. Lamb, National Defense University Press, September 2005
DCI Robert M. Gates on CIA and Openness, speech to the Oklahoma Press Association, February 21, 1992
Further Information Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq (cont’d) by Milton Leitenberg, part 3 of 3, August 2006
Further Information Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq by Milton Leitenberg, part 2 of 3, August 2006
Targeted Killing as an Element of U.S. Foreign Policy in the War on Terror by Major Matthew J. Machon, US Army School of Advanced Military Studies, Fort Leavenworth, May 2006
Information Operations in Operations Enduring Freedom and Iraqi Freedom – What Went Wrong? by Major Joseph L. Cox, US Army School of Advanced Military Studies, Fort Leavenworth, May 2006
Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of Iran by Jason P. Patterson and Matthew N. Smith, Naval Postgraduate School, September 2005
Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of North Korea by Christopher Brown, Naval Postgraduate School, September 2004
Unresolved Questions Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq by Milton Leitenberg, part 1 of 3, June 2006
Assisting People to Become Independent Learners in the Analysis of Intelligence by Peter L. Pirolli, Palo Alto Research Center, Inc., February 2006
Intelligence Analysis in Theater Joint Intelligence Centers: An Experiment in Applying Structured Methods by MSgt Robert D. Folker, Jr. (USAF), Joint Military Intelligence College, January 2000
The A.Q. Khan Network: Causes and Implications by Christopher O. Clary, Master’s Thesis, Naval Postgraduate School, December 2005
An Analysis of the Systemic Security Weaknesses of the U.S. Navy Fleet Broadcasting System, 1967-1974, as Exploited by CWO John Walker by Maj. Laura J. Heath, Master’s Thesis, U.S. Army Command and General Staff College, June 2005
Online Islamic Organizations and Measuring Web Effectiveness by Minji Daniels, Master’s Thesis, Naval Postgraduate School, December 2004
Deception 101 — A Primer on Deception by Joseph W. Caddell, U.S. Army War College Strategic Studies Institute, December 2004
Link Analysis Workbench, SRI International, Air Force Research Laboratory, September 2004 (1.3 MB PDF file)
Some Human Factors in Codebreaking by Christine Large, originally presented at a symposium on “The Role of Humans in Intelligent and Automated Systems,” held in Warsaw, Poland, October 2002
Reliable and Relevant National Communications System by Lt. Col. Timothy L. Lake, US Army War College research paper, May 2004
Advanced Command, Control, Communications & Intelligence (C3I) Systems Analysis and Trade-Offs, CACI Technologies, Incorporated, March 2004
Intelligence, Surveillance and Reconnaissance in Support of Operation Iraqi Freedom: Challenges for Rapid Maneuvers and Joint C4ISR Integration and Interoperability by Lt. Com. Carl M. Bradley, USN, Naval War College, February 9, 2004
Insight Into Foreign Thoughtworlds for National Security Decision Makers by J.W. Barnett, Institute for Defense Analyses, January 2004
Resume of a CIA SIGINT Operations Officer, 1965-1993
Some-Time, Part-Time and One-time Terrorism by M.E. Bowman, Intelligencer, Association of Former Intelligence Officers, Winter/Spring 2003
Interviewing With An Intelligence Agency, a first-person narrative of an applicant interviewing and going through the clearance process with the National Security Agency, November 2003, updated January 2004
“All Necessary Means” — Employing CIA Operatives in a Warfighting Role Alongside Special Operations Forces by Colonel Kathryn Stone, US Army War College, April 7, 2003
The Evolution of Strategic Influence by LTC Susan L. Gough, US Army War College, April 7, 2003
Strategic Influence Operations — The Information Connection by Col. Brad M. Ward, US Army War College, April 7, 2003
George Washington, America�s First Director of Military Intelligence by LCDR Michael S. Prather, USN, USMC Command and Staff College (Master’s Thesis), July 2002
NSA’s Central Security Service, by Keith P. Clive, excerpted from Cryptologia, April 2002
Remarks of David Kahn on the 50th Anniversary of the National Security Agency, November 1, 2002
Force Protection in an Era of Commercially Available Satellite Imagery: Space Blockade as a Possible Solution, by Maj. Robert Fabian (USAF), Naval War College, February 2002 (1.3 MB PDF file)
Chasing Spies: How the FBI Failed in Counterintelligence But Promoted the Politics of McCarthyism in the Cold War Years, by Athan Theoharis, Ivan R. Dee, Publisher, 2002 (Chapter One).
Israeli Court Verdict Against BG Yitzhak Yaacov, convicted of unauthorized disclosure of nuclear secrets, May 14, 2002, MS Word document (in Hebrew)
A Critical View of the National Reconnaissance Office by Dave Thompson, President & CEO, Spectrum Astro, at the 18th National Space Symposium, April 11, 2002.
An Assessment of International Legal Issues in Information Operations, Department of Defense Office of General Counsel, May 1999
Project Megiddo, Federal Bureau of Investigation, 1999
A Social Network Analysis of the Iranian Government by Capt. Robert S. Renfro, II and Dr. Richard F. Deckro, Air Force Institute of Technology, November 2001.
Congressional Oversight of Intelligence: One Perspective by Mary K. Sturtevant, American Intelligence Journal, Summer 1992.
The Search for a European Intelligence Policy by Charles Baker, May 2001, addresses the prospects for, and obstacles to, a joint European intelligence policy.
Interception Capabilities 2000 Report to the Director General for Research of the European Parliament (Scientific and Technical Options Assessment programme office) on the development of surveillance technology and risk of abuse of economic information – April 1999
Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions, and Operations – 01 May 1998 – By Mr. Robert D. Steele President, OSS Inc., and Dr. Mark M. Lowenthal , President OSS USA
TAKEDOWN: Targets, Tools, & Technocracy Robert David Steele Author’s Pre-Conference Final Draft, Ninth Annual Strategy Conference, U.S. Army War College “Challenging the United States Symmetrically and Asymmetrically: Can America Be Defeated?” 31 March through 2 April 1998
INFORMATION PEACKEEPING: The Purest Form of War Robert D. Steele Editor’s Final Draft 3.9 dated 11 March 1998, Forthcoming in Dearth and Campen, CYBERWAR 2.0: Myths, Mysteries, and Realities
Nuclear Threats During the Gulf War John Pike 19 February 1998
The Integration of Operations & Intelligence — Getting Information to the Warfighter Air Command and Staff College 1997 – Getting combat information in a timely manner from the stovepipes of the intelligence world to the operators that require it has been a problem for years.
Marine Corps Intelligence Doctrine: Does It Know The Information Age Has Arrived? Bradley J. Sillman Major USMC [United States Marine Corps Command and Staff College]
How Much for a Pound of Communication? Paul E. Ruud Lieutenant Commander, US Navy [United States Marine Corps Command and Staff College]
USAF TACS Battle Management: Preparing for High Tempo Future Operations Major C.B. Miller, United States Air Force [United States Marine Corps Command and Staff College]
The Final Report of the Snyder Commission — A Perspective on Intelligence Reform from Outside the Beltway Woodrow Wilson School Policy Conference 401a: Intelligence Reform in the Post-Cold War Era
Confronting the New Intelligence Establishment: Lessons from the Colorado Experience – Loring Wirbel The Workbook Fall 1996
UK Eyes Alpha by Mark Urban – The Inside Story of British Intelligence – with sample chapter on ZIRCON
Secret Power – New Zealand’s Role in the International Spy Network – by Nicky Hager
THE SPECIAL OSPREY: IMPACT ON SPECIAL OPERATIONS DOCTRINE THOMAS J. TRASK School of Advanced Airpower Studies JUNE 1996
ORGANIZATIONAL CONCEPTS FOR THE “SENSOR-TO-SHOOTER” WORLD: THE IMPACT OF REAL-TIME INFORMATION ON AIRPOWER TARGETING WILLIAM G. CHAPMAN School of Advanced Airpower Studies JUNE 1996
Communications and Intelligence: Why Can’t We Get Along? Major Lisa Tubridy, United States Marine Corps – April 1996
Rise of Domestic Terrorism and Its Relation to United States Armed Forces LCDR Steven Mack Presley, MSC, USN – 19 April 1996
INTEGRATION OF INTELLIGENCE INTO PROFESSIONAL MILITARY EDUCATION – MAJOR R. J. BUIKEMA, USMC – 18 APRIL 96
Preparation of the US Navy Intelligence Officer CDR (Sel) Richard L. Saunders, USN – 15 April 1996
“Forward…From The Sea”: Intelligence Support to Naval Expeditionary Forces Lieutenant Commander Thomas C. Baus, United States Navy – 04 April 1996
The Future of Airborne Reconnaissance Major Keith E. Gentile, United States Air Force – 27 March 1996 [this is a rather nice piece, though I fear that our HTML version has oddly deleted the even-number footnotes, so if you need these references, you may have better luck with the original ZIP version]
V [Marine] Amphibious Corps Planning for Operation Olympic and the Role of Intelligence in Support of Planning. Author: Major Mark P. Arens, USMCR [MCIA] 27 March 1996
Making Intelligence Smarter: The Future of U.S. Intelligence — Report of an Independent Task Force Sponsored by the Council on Foreign Relations, February 1996
A Framework for Reform of the U.S. Intelligence Community, by John A. Gentry
SPECIAL OPERATIONS FORCES AND UNMANNED AERIAL VEHICLES: SOONER OR LATER? STEPHEN P. HOWARD School of Advanced Airpower Studies JUNE 1995
Reconnaissance, Surveillance, and Target Acquisition Collection Planning–Embedded Within the MEF Intelligence and Operations Cycles – Intelligence Doctrine Working Group Chairman: Major J.C. Dereschuk, United States Marine Corps Members: Major R. H. Chase Major J. A. Day (USMC) Major D. D. Cline Major J.G. O’Hagan — May 1995
A CRITICAL ANALYSIS OF THE I MEF INTELLIGENCE PERFORMANCE IN THE 1991 PERSIAN GULF WAR Major Raymond E. Coia, United States Marine Corps – 22 May 1995
The Use of Covert Paramilitary Activity as a Policy Tool: An Analysis of Operations Conducted by the United States Central Intelligence Agency, 1949-1951 – Major D. H. Berger, USMC – 22 May 1995
CAN ATARS FIX AMERICA’S TACTICAL RECONNAISSANCE VACUUM? by Major Mark E. Marek Conference Group Nine LtCol Sorrell Dr. Jacobsen 18 April 1995 United States Marine Corps Command and Staff College Marine Corps University
COUNTERING TERRORISM: THE ISRAELI RESPONSE TO THE 1972 MUNICH OLYMPIC MASSACRE AND THE DEVELOPMENT OF INDEPENDENT COVERT ACTION TEAMS – Alexander B. Calahan – April 1995
Observation Satellites for Arms Control: Some Implications and Policy Choices by Rosemary Klineberg, Institute for Defense Analyses, 31 May 1963
More Stories
gmo-monsanto-evil
Dead “Bombers” tell No Tales. Neither do “Dead” Men! Welcome to AmeriKa!
…Courtesy of George Soros, the Clinton Crime Family, and the Obama Administration