September 16, 2025

Our Days of Noah

~THE WORLDWIDE FLOOD WAS NEVER THE PERMANENT SOLUTION~

FAS Intelligence Resource Program

Intelligence e-Prints

This archive includes timely and interesting materials on topics of current interest. Any opinions, findings, and conclusions or recommendations expressed in this archive are those of the author(s) and do not necessarily reflect the views of the Federation of American Scientists.

The U.S. Army Camp Stanley Storage Activity and The CIA Midwest Depot by Allen Thomson, updated July 5, 2015

Joint Inspector General Report on the President’s Surveillance Program (2015 redaction), 10 July 2009 (via NY Times)

The DOD Cyber Strategy, U.S. Department of Defense, April 2015

Mixed Reality: Geolocation & Portable Hand-Held Communication Devices, ODNI Summer Hard Problem (SHARP) Program, 2009 (released February 2015)

Sovereign Citizen Extremist Ideology Will Drive Violence at Home, During Travel, and at Government Facilities, DHS Office of Intelligence and Analysis, February 5, 2015 (via Reason)

Signals Intelligence Reform: 2015 Anniversary Report, Office of the Director of National Intelligence, released February 3, 2015

Principles of Intelligence Transparency for the Intelligence Community, Office of the Director of National Intelligence, released February 3, 2015

Final Report of the Rendition, Detention, and Interrogation Network Agency Accountability Board (Redacted), December 2014, released by CIA January 2015

Report of Investigation into CIA Access to the SSCI Shared Drive on RDINet (Redacted), CIA Inspector General, July 2014, released by CIA January 2015

Foreign Intelligence Gathering Laws, Law Library of Congress, December 2014

Transforming Nuclear Attribution: Culture, Community, and Change (SHARP 2009) (redacted), Office of the Director of National Intelligence Summer Hard Problem (SHARP) Program, July 2009

Identity Intelligence: From Reactionary Support to Sustained Enabler, Defense Intelligence Agency, August 21, 2012

Declassified Facts in PCLOB 702 report, July 22, 2014

Allegations of Iraqi Chemical Weapons Transported to Syria and Possible Tunnel Adits at Al-Bayda, Syria by Allen Thomson, June 22, 2014

Biodetection Technologies for First Responders: 2014 Edition, Pacific Northwest National Laboratory

3D Cyberspace Spillover: Where Virtual Worlds Get Real, ODNI Summer Hard Problem (SHARP) Program, Summer 2008

Report of the National Commission for the Review of the Research and Development Programs of the United States Intelligence Community (Unclassified Version), released November 2013

White Paper: The IC’s Role Within U.S. Cyber R&D, Report of the National Commission for the Review of the Research and Development Programs of the United States Intelligence Community (Unclassified Version), released November 2013

The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens’ fundamental rights, European Parliament Directorate General for Internal Policies, September 2013

Project QUANTUM LEAP: After Action Report, Special Operations Command National Capital Region, Draft, 12 September 2012

Stimulating Innovation in Naval Special Warfare by Utilizing Small Working Groups by Thomas A. Rainville, Master’s Thesis, March 2001

The Emergence of the Internet and Africa by Les Cottrell, SLAC, May 13, 2013

Lawfulness of a Lethal Operation Directed Against a U.S. Citizen Who Is a Senior Operational Leader of Al-Qa’ida or An Associated Force, Department of Justice White Paper

A Dossier on New Construction North of Kashgar, Xinjiang, China 39.6 N, 76.1 E by Allen Thomson, January 11, 2013

Early warning analysis for social diffusion events by Richard Colbaugh and Kristin Glass, Security Informatics, Vol. 1, 2012, SAND 2010-5334C

Proactive Defense for Evolving Cyber Threats by Richard Colbaugh and Kristin Glass, Sandia National Laboratories, November 2012

U.S. National Security and Economic Interests in Remote Sensing: The Evolution of Civil and Commercial Policy by James A. Vedda, prepared for the National Geospatial-Intelligence Agency, February 20, 2009

Strengthened IAEA Safeguards-Imagery Analysis: Geospatial Tools for Nonproliferation Analysis by Frank V. Pabian, Los Alamos National Laboratory, June 22, 2012

A Sourcebook on the TACKSMAN I and TACKSMAN II ELINT Bases in Iran by Allen Thomson, July 25, 2012

A Dossier on the NRO Aerospace Data Facility Southwest (Las Cruces, New Mexico) by Allen Thomson, working draft, July 16, 2012

Cyber Threat Metrics by Mark Mateski, et al, Sandia National Laboratories, March 2012

Espionage and Other Compromises of National Security: Case Summaries from 1975 to 2008, PERSEREC, November 2, 2009

Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes by S. John Luke, Lawrence Livermore National Laboratory, January 2012

Rapid Exploitation and Analysis of Documents, Lawrence Livermore National Laboratory, December 2011

Department of Defense Cyberspace Policy Report, report to Congress, November 2011

Unmanned Air Vehicle (UAV) Ultra-Persistence Research, Sandia National Laboratories, June 2011

The Fingerprint Sourcebook, National Institute of Justice, August 2011

Geomagnetic Storms and Their Impacts on the U.S. Power Grid by John Kappenman, Metatech Corporation, January 2010

Aerospace Data Facility-Colorado / Denver Security Operations Center, Buckley AFB, Colorado a sourcebook by Allen Thomson, updated November 28, 2011

A Guide to the Amerithrax Documents: I. Amount of Attack Materials and Requirements for Production by Martin Furmanski, MD, May 2010

Parliamentary Oversight of Security and Intelligence Agencies in the European Union prepared for the European Parliament, September 2011

Wireless Evolution, ETR Bulletin, Emerging Technologies Research (FBI Operational Technology Division), volume 8, issue 1, March 2011

Kryptographik: Lehrbuch der Geheimschreibekunst (Chiffrir- und Dechiffrirkunst) in Staats- und Privatgeschaeften, by Johann Ludwig Klueber, 1809 (declassified by NSA in 2010)

Terms & Definitions of Interest for DoD Counterintelligence Professionals, Defense Intelligence Agency, 2 May 2011

Transnational Islamic Activism and Radicalization: Patterns, Trends, and Prognosticators, Sandia National Laboratories Report, June 2010

Disclosure of Budget Information on the Intelligence Community, Final Report of the Church Committee (1976), Book I, Chapter XVI

National Security Space Strategy, Unclassified Summary, DOD/ODNI, January 2011

Former CIA Employees are Barred from Lobbying CIA Detailees to Other Agencies, Office of Government Ethics, February 9, 2006

Illicit Commerce by North Korea, Report to the UN Security Council, 2009 (via ArmsControlWonk)

Compilation of good practices on legal and institutional frameworks and measures that ensure respect for human rights by intelligence agencies while countering terrorism, including on their oversight, United Nations Human Rights Council, May 17, 2010

Interrogation: World War II, Vietnam, and Iraq, National Defense Intelligence College, September 2008

Final Report of the Guantanamo Review Task Force, January 22, 2010

Biological Sciences Experts Group (BSEG) concept paper, 2006

The CIA Accountability Act of 1987 (HR 3603), by Rep. Leon Panetta, et al, 100th Congress, November 3, 1987

The Comprehensive National Cybersecurity Initiative, White House release, March 2, 2010

Arab Media Outlook 2009-2013, Dubai Press Club, February 2010

Screening for Potential Terrorists in the Enlisted Military Accessions Process, Defense Personnel Security Research Center, April 2005

Unclassified Report on the President’s Surveillance Program, Joint Inspector General Report, 10 July 2009

Legal Barriers to Information Sharing: The Erection of a Wall Between Intelligence and Law Enforcement Investigations, 9/11 Commission staff monograph by Barbara A. Grewe, August 20, 2004 (declassified June 2009)

Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, The White House, May 2009

Domestic Extremism Lexicon, Department of Homeland Security Office of Intelligence and Analysis, March 26, 2009

Rightwing Extremism: Current Economic and Political Climate Fueling Resurgence in Radicalization and Recruitment, Department of Homeland Security Office of Intelligence and Analysis, April 7, 2009

Leftwing Extremists Likely to Increase Use of Cyber Attacks over the Coming Decade, Department of Homeland Security Office of Intelligence and Analysis, January 26, 2009

Intelligence Community Decision Book for the President, transmitted to President Gerald Ford on December 22, 1975

An Overview of the United States Intelligence Community for the 111th Congress, February 2009.

Mumbai Terrorist Attacks (Nov. 26-29, 2008), January 5, 2009. This dossier based on the investigation of the Mumbai terror attacks was prepared by the Government of India and presented to the Government of Pakistan.

Biometric Collection, Transmission and Storage Standards Technical Reference, Department of the Army Biometrics Task Force, 24 July 2006

Joint Federal Agencies Intelligence DNA Database Joint Federal Agencies Intelligence DNA Database, describing a searchable database of DNA profiles from detainees and Searchable database of DNA profiles from detainees and known or suspected terrorists known or suspected terrorists, December 2007

Al Qaida-Like Mobile Discussions & Potential Creative Uses, 304th MI BN OSINT Team, October 16, 2008

Issues Related to the Bureau of Industry and Security�s Budget and Responsibilities for International Treaty Implementation and Compliance, U.S. Department of Commerce, Office of Inspector General, October 2008

Biometrics in Government POST – 9/11, National Science and Technology Council, August 2008

The Department of Defense DNA Registry and the U.S. Government Accounting Mission by Brion C. Smith, August 2005

Zawahiri Tries to Clear Name, Explain Strategy, Transnational Security Issues Report, International Research Center, 21 April 2008

An Examination of State and Local Fusion Centers and Data Collection Methods by Milton Nenneman, Naval Postgraduate School thesis, March 2008

Iraqi Perspectives Project: Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents, Institute for Defense Analyses, November 2007 (released March 2008)

Independent Study of the Roles of Commercial Remote Sensing in the Future National System for Geospatial-Intelligence (NSG), Report to the Directors of the NGA and the NRO, July 16, 2007

Remarks of Open Source Center Director Doug Naquin before the Central Intelligence Retirees’ Association, October 3, 2007

El Fenomeno Chavez: Hugo Chavez of Venezuela, Modern Day Bolivar by Jerrold M. Post, USAF Counterproliferation Center, March 2007

Managing the Private Spies: The Use of Commercial Augmentation for Intelligence Operations by Maj. Glenn J. Voelz, Joint Military Intelligence College, June 2006

Review of Anticorruption Efforts in Iraq, U.S. Embassy working draft report, Baghdad, Iraq, 2007

Civil Applications Committee (CAC) Blue Ribbon Study, Independent Study Group Final Report, September 2005 (Civil Applications Committee Fact Sheet, 2001)

Review of Psychological Operations: Lessons Learned from Recent Operational Experience by Christopher J. Lamb, National Defense University Press, September 2005

DCI Robert M. Gates on CIA and Openness, speech to the Oklahoma Press Association, February 21, 1992

Further Information Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq (cont’d) by Milton Leitenberg, part 3 of 3, August 2006

Further Information Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq by Milton Leitenberg, part 2 of 3, August 2006

Targeted Killing as an Element of U.S. Foreign Policy in the War on Terror by Major Matthew J. Machon, US Army School of Advanced Military Studies, Fort Leavenworth, May 2006

Information Operations in Operations Enduring Freedom and Iraqi Freedom – What Went Wrong? by Major Joseph L. Cox, US Army School of Advanced Military Studies, Fort Leavenworth, May 2006

Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of Iran by Jason P. Patterson and Matthew N. Smith, Naval Postgraduate School, September 2005

Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of North Korea by Christopher Brown, Naval Postgraduate School, September 2004

Unresolved Questions Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq by Milton Leitenberg, part 1 of 3, June 2006

Assisting People to Become Independent Learners in the Analysis of Intelligence by Peter L. Pirolli, Palo Alto Research Center, Inc., February 2006

Intelligence Analysis in Theater Joint Intelligence Centers: An Experiment in Applying Structured Methods by MSgt Robert D. Folker, Jr. (USAF), Joint Military Intelligence College, January 2000

The A.Q. Khan Network: Causes and Implications by Christopher O. Clary, Master’s Thesis, Naval Postgraduate School, December 2005

An Analysis of the Systemic Security Weaknesses of the U.S. Navy Fleet Broadcasting System, 1967-1974, as Exploited by CWO John Walker by Maj. Laura J. Heath, Master’s Thesis, U.S. Army Command and General Staff College, June 2005

Online Islamic Organizations and Measuring Web Effectiveness by Minji Daniels, Master’s Thesis, Naval Postgraduate School, December 2004

Deception 101 — A Primer on Deception by Joseph W. Caddell, U.S. Army War College Strategic Studies Institute, December 2004

Link Analysis Workbench, SRI International, Air Force Research Laboratory, September 2004 (1.3 MB PDF file)

Some Human Factors in Codebreaking by Christine Large, originally presented at a symposium on “The Role of Humans in Intelligent and Automated Systems,” held in Warsaw, Poland, October 2002

Reliable and Relevant National Communications System by Lt. Col. Timothy L. Lake, US Army War College research paper, May 2004

Advanced Command, Control, Communications & Intelligence (C3I) Systems Analysis and Trade-Offs, CACI Technologies, Incorporated, March 2004

Intelligence, Surveillance and Reconnaissance in Support of Operation Iraqi Freedom: Challenges for Rapid Maneuvers and Joint C4ISR Integration and Interoperability by Lt. Com. Carl M. Bradley, USN, Naval War College, February 9, 2004

Insight Into Foreign Thoughtworlds for National Security Decision Makers by J.W. Barnett, Institute for Defense Analyses, January 2004

Resume of a CIA SIGINT Operations Officer, 1965-1993

Some-Time, Part-Time and One-time Terrorism by M.E. Bowman, Intelligencer, Association of Former Intelligence Officers, Winter/Spring 2003

Interviewing With An Intelligence Agency, a first-person narrative of an applicant interviewing and going through the clearance process with the National Security Agency, November 2003, updated January 2004

“All Necessary Means” — Employing CIA Operatives in a Warfighting Role Alongside Special Operations Forces by Colonel Kathryn Stone, US Army War College, April 7, 2003

The Evolution of Strategic Influence by LTC Susan L. Gough, US Army War College, April 7, 2003

Strategic Influence Operations — The Information Connection by Col. Brad M. Ward, US Army War College, April 7, 2003

George Washington, America�s First Director of Military Intelligence by LCDR Michael S. Prather, USN, USMC Command and Staff College (Master’s Thesis), July 2002

NSA’s Central Security Service, by Keith P. Clive, excerpted from Cryptologia, April 2002

Remarks of David Kahn on the 50th Anniversary of the National Security Agency, November 1, 2002

Force Protection in an Era of Commercially Available Satellite Imagery: Space Blockade as a Possible Solution, by Maj. Robert Fabian (USAF), Naval War College, February 2002 (1.3 MB PDF file)

Chasing Spies: How the FBI Failed in Counterintelligence But Promoted the Politics of McCarthyism in the Cold War Years, by Athan Theoharis, Ivan R. Dee, Publisher, 2002 (Chapter One).

Israeli Court Verdict Against BG Yitzhak Yaacov, convicted of unauthorized disclosure of nuclear secrets, May 14, 2002, MS Word document (in Hebrew)

A Critical View of the National Reconnaissance Office by Dave Thompson, President & CEO, Spectrum Astro, at the 18th National Space Symposium, April 11, 2002.

An Assessment of International Legal Issues in Information Operations, Department of Defense Office of General Counsel, May 1999

Project Megiddo, Federal Bureau of Investigation, 1999

A Social Network Analysis of the Iranian Government by Capt. Robert S. Renfro, II and Dr. Richard F. Deckro, Air Force Institute of Technology, November 2001.

Congressional Oversight of Intelligence: One Perspective by Mary K. Sturtevant, American Intelligence Journal, Summer 1992.

The Search for a European Intelligence Policy by Charles Baker, May 2001, addresses the prospects for, and obstacles to, a joint European intelligence policy.

Interception Capabilities 2000 Report to the Director General for Research of the European Parliament (Scientific and Technical Options Assessment programme office) on the development of surveillance technology and risk of abuse of economic information – April 1999

Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions, and Operations – 01 May 1998 – By Mr. Robert D. Steele President, OSS Inc., and Dr. Mark M. Lowenthal , President OSS USA

 

TAKEDOWN: Targets, Tools, & Technocracy Robert David Steele Author’s Pre-Conference Final Draft, Ninth Annual Strategy Conference, U.S. Army War College “Challenging the United States Symmetrically and Asymmetrically: Can America Be Defeated?” 31 March through 2 April 1998

 

INFORMATION PEACKEEPING: The Purest Form of War Robert D. Steele Editor’s Final Draft 3.9 dated 11 March 1998, Forthcoming in Dearth and Campen, CYBERWAR 2.0: Myths, Mysteries, and Realities

 

Nuclear Threats During the Gulf War John Pike 19 February 1998

The Integration of Operations & Intelligence — Getting Information to the Warfighter Air Command and Staff College 1997 – Getting combat information in a timely manner from the stovepipes of the intelligence world to the operators that require it has been a problem for years.

Marine Corps Intelligence Doctrine: Does It Know The Information Age Has Arrived? Bradley J. Sillman Major USMC [United States Marine Corps Command and Staff College]

 

How Much for a Pound of Communication? Paul E. Ruud Lieutenant Commander, US Navy [United States Marine Corps Command and Staff College]

 

USAF TACS Battle Management: Preparing for High Tempo Future Operations Major C.B. Miller, United States Air Force [United States Marine Corps Command and Staff College]

 

The Final Report of the Snyder Commission — A Perspective on Intelligence Reform from Outside the Beltway Woodrow Wilson School Policy Conference 401a: Intelligence Reform in the Post-Cold War Era

Confronting the New Intelligence Establishment: Lessons from the Colorado Experience – Loring Wirbel The Workbook Fall 1996

 

UK Eyes Alpha by Mark Urban – The Inside Story of British Intelligence – with sample chapter on ZIRCON


Secret Power – New Zealand’s Role in the International Spy Network – by Nicky Hager


THE SPECIAL OSPREY: IMPACT ON SPECIAL OPERATIONS DOCTRINE THOMAS J. TRASK School of Advanced Airpower Studies JUNE 1996

ORGANIZATIONAL CONCEPTS FOR THE “SENSOR-TO-SHOOTER” WORLD: THE IMPACT OF REAL-TIME INFORMATION ON AIRPOWER TARGETING WILLIAM G. CHAPMAN School of Advanced Airpower Studies JUNE 1996

Communications and Intelligence: Why Can’t We Get Along? Major Lisa Tubridy, United States Marine Corps – April 1996

Rise of Domestic Terrorism and Its Relation to United States Armed Forces LCDR Steven Mack Presley, MSC, USN – 19 April 1996

INTEGRATION OF INTELLIGENCE INTO PROFESSIONAL MILITARY EDUCATION – MAJOR R. J. BUIKEMA, USMC – 18 APRIL 96

Preparation of the US Navy Intelligence Officer CDR (Sel) Richard L. Saunders, USN – 15 April 1996

“Forward…From The Sea”: Intelligence Support to Naval Expeditionary Forces Lieutenant Commander Thomas C. Baus, United States Navy – 04 April 1996

The Future of Airborne Reconnaissance Major Keith E. Gentile, United States Air Force – 27 March 1996 [this is a rather nice piece, though I fear that our HTML version has oddly deleted the even-number footnotes, so if you need these references, you may have better luck with the original ZIP version]

V [Marine] Amphibious Corps Planning for Operation Olympic and the Role of Intelligence in Support of Planning. Author: Major Mark P. Arens, USMCR [MCIA] 27 March 1996

Making Intelligence Smarter: The Future of U.S. Intelligence — Report of an Independent Task Force Sponsored by the Council on Foreign Relations, February 1996

A Framework for Reform of the U.S. Intelligence Community, by John A. Gentry

SPECIAL OPERATIONS FORCES AND UNMANNED AERIAL VEHICLES: SOONER OR LATER? STEPHEN P. HOWARD School of Advanced Airpower Studies JUNE 1995

Reconnaissance, Surveillance, and Target Acquisition Collection Planning–Embedded Within the MEF Intelligence and Operations Cycles – Intelligence Doctrine Working Group Chairman: Major J.C. Dereschuk, United States Marine Corps Members: Major R. H. Chase Major J. A. Day (USMC) Major D. D. Cline Major J.G. O’Hagan — May 1995

A CRITICAL ANALYSIS OF THE I MEF INTELLIGENCE PERFORMANCE IN THE 1991 PERSIAN GULF WAR Major Raymond E. Coia, United States Marine Corps – 22 May 1995

The Use of Covert Paramilitary Activity as a Policy Tool: An Analysis of Operations Conducted by the United States Central Intelligence Agency, 1949-1951 – Major D. H. Berger, USMC – 22 May 1995

CAN ATARS FIX AMERICA’S TACTICAL RECONNAISSANCE VACUUM? by Major Mark E. Marek Conference Group Nine LtCol Sorrell Dr. Jacobsen 18 April 1995 United States Marine Corps Command and Staff College Marine Corps University

COUNTERING TERRORISM: THE ISRAELI RESPONSE TO THE 1972 MUNICH OLYMPIC MASSACRE AND THE DEVELOPMENT OF INDEPENDENT COVERT ACTION TEAMS – Alexander B. Calahan – April 1995

TEMPEST Eavesdropping On the Electromagnetic Emanations of Digital Equipment: The Laws of Canada, England and the United States

Observation Satellites for Arms Control: Some Implications and Policy Choices by Rosemary Klineberg, Institute for Defense Analyses, 31 May 1963

LINK: 

Intelligence e-Prints

This archive includes timely and interesting materials on topics of current interest. Any opinions, findings, and conclusions or recommendations expressed in this archive are those of the author(s) and do not necessarily reflect the views of the Federation of American Scientists.

The U.S. Army Camp Stanley Storage Activity and The CIA Midwest Depot by Allen Thomson, updated July 5, 2015

Joint Inspector General Report on the President’s Surveillance Program (2015 redaction), 10 July 2009 (via NY Times)

The DOD Cyber Strategy, U.S. Department of Defense, April 2015

Mixed Reality: Geolocation & Portable Hand-Held Communication Devices, ODNI Summer Hard Problem (SHARP) Program, 2009 (released February 2015)

Sovereign Citizen Extremist Ideology Will Drive Violence at Home, During Travel, and at Government Facilities, DHS Office of Intelligence and Analysis, February 5, 2015 (via Reason)

Signals Intelligence Reform: 2015 Anniversary Report, Office of the Director of National Intelligence, released February 3, 2015

Principles of Intelligence Transparency for the Intelligence Community, Office of the Director of National Intelligence, released February 3, 2015

Final Report of the Rendition, Detention, and Interrogation Network Agency Accountability Board (Redacted), December 2014, released by CIA January 2015

Report of Investigation into CIA Access to the SSCI Shared Drive on RDINet (Redacted), CIA Inspector General, July 2014, released by CIA January 2015

Foreign Intelligence Gathering Laws, Law Library of Congress, December 2014

Transforming Nuclear Attribution: Culture, Community, and Change (SHARP 2009) (redacted), Office of the Director of National Intelligence Summer Hard Problem (SHARP) Program, July 2009

Identity Intelligence: From Reactionary Support to Sustained Enabler, Defense Intelligence Agency, August 21, 2012

Declassified Facts in PCLOB 702 report, July 22, 2014

Allegations of Iraqi Chemical Weapons Transported to Syria and Possible Tunnel Adits at Al-Bayda, Syria by Allen Thomson, June 22, 2014

Biodetection Technologies for First Responders: 2014 Edition, Pacific Northwest National Laboratory

3D Cyberspace Spillover: Where Virtual Worlds Get Real, ODNI Summer Hard Problem (SHARP) Program, Summer 2008

Report of the National Commission for the Review of the Research and Development Programs of the United States Intelligence Community (Unclassified Version), released November 2013

White Paper: The IC’s Role Within U.S. Cyber R&D, Report of the National Commission for the Review of the Research and Development Programs of the United States Intelligence Community (Unclassified Version), released November 2013

The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens’ fundamental rights, European Parliament Directorate General for Internal Policies, September 2013

Project QUANTUM LEAP: After Action Report, Special Operations Command National Capital Region, Draft, 12 September 2012

Stimulating Innovation in Naval Special Warfare by Utilizing Small Working Groups by Thomas A. Rainville, Master’s Thesis, March 2001

The Emergence of the Internet and Africa by Les Cottrell, SLAC, May 13, 2013

Lawfulness of a Lethal Operation Directed Against a U.S. Citizen Who Is a Senior Operational Leader of Al-Qa’ida or An Associated Force, Department of Justice White Paper

A Dossier on New Construction North of Kashgar, Xinjiang, China 39.6 N, 76.1 E by Allen Thomson, January 11, 2013

Early warning analysis for social diffusion events by Richard Colbaugh and Kristin Glass, Security Informatics, Vol. 1, 2012, SAND 2010-5334C

Proactive Defense for Evolving Cyber Threats by Richard Colbaugh and Kristin Glass, Sandia National Laboratories, November 2012

U.S. National Security and Economic Interests in Remote Sensing: The Evolution of Civil and Commercial Policy by James A. Vedda, prepared for the National Geospatial-Intelligence Agency, February 20, 2009

Strengthened IAEA Safeguards-Imagery Analysis: Geospatial Tools for Nonproliferation Analysis by Frank V. Pabian, Los Alamos National Laboratory, June 22, 2012

A Sourcebook on the TACKSMAN I and TACKSMAN II ELINT Bases in Iran by Allen Thomson, July 25, 2012

A Dossier on the NRO Aerospace Data Facility Southwest (Las Cruces, New Mexico) by Allen Thomson, working draft, July 16, 2012

Cyber Threat Metrics by Mark Mateski, et al, Sandia National Laboratories, March 2012

Espionage and Other Compromises of National Security: Case Summaries from 1975 to 2008, PERSEREC, November 2, 2009

Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes by S. John Luke, Lawrence Livermore National Laboratory, January 2012

Rapid Exploitation and Analysis of Documents, Lawrence Livermore National Laboratory, December 2011

Department of Defense Cyberspace Policy Report, report to Congress, November 2011

Unmanned Air Vehicle (UAV) Ultra-Persistence Research, Sandia National Laboratories, June 2011

The Fingerprint Sourcebook, National Institute of Justice, August 2011

Geomagnetic Storms and Their Impacts on the U.S. Power Grid by John Kappenman, Metatech Corporation, January 2010

Aerospace Data Facility-Colorado / Denver Security Operations Center, Buckley AFB, Colorado a sourcebook by Allen Thomson, updated November 28, 2011

A Guide to the Amerithrax Documents: I. Amount of Attack Materials and Requirements for Production by Martin Furmanski, MD, May 2010

Parliamentary Oversight of Security and Intelligence Agencies in the European Union prepared for the European Parliament, September 2011

Wireless Evolution, ETR Bulletin, Emerging Technologies Research (FBI Operational Technology Division), volume 8, issue 1, March 2011

Kryptographik: Lehrbuch der Geheimschreibekunst (Chiffrir- und Dechiffrirkunst) in Staats- und Privatgeschaeften, by Johann Ludwig Klueber, 1809 (declassified by NSA in 2010)

Terms & Definitions of Interest for DoD Counterintelligence Professionals, Defense Intelligence Agency, 2 May 2011

Transnational Islamic Activism and Radicalization: Patterns, Trends, and Prognosticators, Sandia National Laboratories Report, June 2010

Disclosure of Budget Information on the Intelligence Community, Final Report of the Church Committee (1976), Book I, Chapter XVI

National Security Space Strategy, Unclassified Summary, DOD/ODNI, January 2011

Former CIA Employees are Barred from Lobbying CIA Detailees to Other Agencies, Office of Government Ethics, February 9, 2006

Illicit Commerce by North Korea, Report to the UN Security Council, 2009 (via ArmsControlWonk)

Compilation of good practices on legal and institutional frameworks and measures that ensure respect for human rights by intelligence agencies while countering terrorism, including on their oversight, United Nations Human Rights Council, May 17, 2010

Interrogation: World War II, Vietnam, and Iraq, National Defense Intelligence College, September 2008

Final Report of the Guantanamo Review Task Force, January 22, 2010

Biological Sciences Experts Group (BSEG) concept paper, 2006

The CIA Accountability Act of 1987 (HR 3603), by Rep. Leon Panetta, et al, 100th Congress, November 3, 1987

The Comprehensive National Cybersecurity Initiative, White House release, March 2, 2010

Arab Media Outlook 2009-2013, Dubai Press Club, February 2010

Screening for Potential Terrorists in the Enlisted Military Accessions Process, Defense Personnel Security Research Center, April 2005

Unclassified Report on the President’s Surveillance Program, Joint Inspector General Report, 10 July 2009

Legal Barriers to Information Sharing: The Erection of a Wall Between Intelligence and Law Enforcement Investigations, 9/11 Commission staff monograph by Barbara A. Grewe, August 20, 2004 (declassified June 2009)

Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, The White House, May 2009

Domestic Extremism Lexicon, Department of Homeland Security Office of Intelligence and Analysis, March 26, 2009

Rightwing Extremism: Current Economic and Political Climate Fueling Resurgence in Radicalization and Recruitment, Department of Homeland Security Office of Intelligence and Analysis, April 7, 2009

Leftwing Extremists Likely to Increase Use of Cyber Attacks over the Coming Decade, Department of Homeland Security Office of Intelligence and Analysis, January 26, 2009

Intelligence Community Decision Book for the President, transmitted to President Gerald Ford on December 22, 1975

An Overview of the United States Intelligence Community for the 111th Congress, February 2009.

Mumbai Terrorist Attacks (Nov. 26-29, 2008), January 5, 2009. This dossier based on the investigation of the Mumbai terror attacks was prepared by the Government of India and presented to the Government of Pakistan.

Biometric Collection, Transmission and Storage Standards Technical Reference, Department of the Army Biometrics Task Force, 24 July 2006

Joint Federal Agencies Intelligence DNA Database Joint Federal Agencies Intelligence DNA Database, describing a searchable database of DNA profiles from detainees and Searchable database of DNA profiles from detainees and known or suspected terrorists known or suspected terrorists, December 2007

Al Qaida-Like Mobile Discussions & Potential Creative Uses, 304th MI BN OSINT Team, October 16, 2008

Issues Related to the Bureau of Industry and Security�s Budget and Responsibilities for International Treaty Implementation and Compliance, U.S. Department of Commerce, Office of Inspector General, October 2008

Biometrics in Government POST – 9/11, National Science and Technology Council, August 2008

The Department of Defense DNA Registry and the U.S. Government Accounting Mission by Brion C. Smith, August 2005

Zawahiri Tries to Clear Name, Explain Strategy, Transnational Security Issues Report, International Research Center, 21 April 2008

An Examination of State and Local Fusion Centers and Data Collection Methods by Milton Nenneman, Naval Postgraduate School thesis, March 2008

Iraqi Perspectives Project: Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents, Institute for Defense Analyses, November 2007 (released March 2008)

Independent Study of the Roles of Commercial Remote Sensing in the Future National System for Geospatial-Intelligence (NSG), Report to the Directors of the NGA and the NRO, July 16, 2007

Remarks of Open Source Center Director Doug Naquin before the Central Intelligence Retirees’ Association, October 3, 2007

El Fenomeno Chavez: Hugo Chavez of Venezuela, Modern Day Bolivar by Jerrold M. Post, USAF Counterproliferation Center, March 2007

Managing the Private Spies: The Use of Commercial Augmentation for Intelligence Operations by Maj. Glenn J. Voelz, Joint Military Intelligence College, June 2006

Review of Anticorruption Efforts in Iraq, U.S. Embassy working draft report, Baghdad, Iraq, 2007

Civil Applications Committee (CAC) Blue Ribbon Study, Independent Study Group Final Report, September 2005 (Civil Applications Committee Fact Sheet, 2001)

Review of Psychological Operations: Lessons Learned from Recent Operational Experience by Christopher J. Lamb, National Defense University Press, September 2005

DCI Robert M. Gates on CIA and Openness, speech to the Oklahoma Press Association, February 21, 1992

Further Information Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq (cont’d) by Milton Leitenberg, part 3 of 3, August 2006

Further Information Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq by Milton Leitenberg, part 2 of 3, August 2006

Targeted Killing as an Element of U.S. Foreign Policy in the War on Terror by Major Matthew J. Machon, US Army School of Advanced Military Studies, Fort Leavenworth, May 2006

Information Operations in Operations Enduring Freedom and Iraqi Freedom – What Went Wrong? by Major Joseph L. Cox, US Army School of Advanced Military Studies, Fort Leavenworth, May 2006

Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of Iran by Jason P. Patterson and Matthew N. Smith, Naval Postgraduate School, September 2005

Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of North Korea by Christopher Brown, Naval Postgraduate School, September 2004

Unresolved Questions Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq by Milton Leitenberg, part 1 of 3, June 2006

Assisting People to Become Independent Learners in the Analysis of Intelligence by Peter L. Pirolli, Palo Alto Research Center, Inc., February 2006

Intelligence Analysis in Theater Joint Intelligence Centers: An Experiment in Applying Structured Methods by MSgt Robert D. Folker, Jr. (USAF), Joint Military Intelligence College, January 2000

The A.Q. Khan Network: Causes and Implications by Christopher O. Clary, Master’s Thesis, Naval Postgraduate School, December 2005

An Analysis of the Systemic Security Weaknesses of the U.S. Navy Fleet Broadcasting System, 1967-1974, as Exploited by CWO John Walker by Maj. Laura J. Heath, Master’s Thesis, U.S. Army Command and General Staff College, June 2005

Online Islamic Organizations and Measuring Web Effectiveness by Minji Daniels, Master’s Thesis, Naval Postgraduate School, December 2004

Deception 101 — A Primer on Deception by Joseph W. Caddell, U.S. Army War College Strategic Studies Institute, December 2004

Link Analysis Workbench, SRI International, Air Force Research Laboratory, September 2004 (1.3 MB PDF file)

Some Human Factors in Codebreaking by Christine Large, originally presented at a symposium on “The Role of Humans in Intelligent and Automated Systems,” held in Warsaw, Poland, October 2002

Reliable and Relevant National Communications System by Lt. Col. Timothy L. Lake, US Army War College research paper, May 2004

Advanced Command, Control, Communications & Intelligence (C3I) Systems Analysis and Trade-Offs, CACI Technologies, Incorporated, March 2004

Intelligence, Surveillance and Reconnaissance in Support of Operation Iraqi Freedom: Challenges for Rapid Maneuvers and Joint C4ISR Integration and Interoperability by Lt. Com. Carl M. Bradley, USN, Naval War College, February 9, 2004

Insight Into Foreign Thoughtworlds for National Security Decision Makers by J.W. Barnett, Institute for Defense Analyses, January 2004

Resume of a CIA SIGINT Operations Officer, 1965-1993

Some-Time, Part-Time and One-time Terrorism by M.E. Bowman, Intelligencer, Association of Former Intelligence Officers, Winter/Spring 2003

Interviewing With An Intelligence Agency, a first-person narrative of an applicant interviewing and going through the clearance process with the National Security Agency, November 2003, updated January 2004

“All Necessary Means” — Employing CIA Operatives in a Warfighting Role Alongside Special Operations Forces by Colonel Kathryn Stone, US Army War College, April 7, 2003

The Evolution of Strategic Influence by LTC Susan L. Gough, US Army War College, April 7, 2003

Strategic Influence Operations — The Information Connection by Col. Brad M. Ward, US Army War College, April 7, 2003

George Washington, America�s First Director of Military Intelligence by LCDR Michael S. Prather, USN, USMC Command and Staff College (Master’s Thesis), July 2002

NSA’s Central Security Service, by Keith P. Clive, excerpted from Cryptologia, April 2002

Remarks of David Kahn on the 50th Anniversary of the National Security Agency, November 1, 2002

Force Protection in an Era of Commercially Available Satellite Imagery: Space Blockade as a Possible Solution, by Maj. Robert Fabian (USAF), Naval War College, February 2002 (1.3 MB PDF file)

Chasing Spies: How the FBI Failed in Counterintelligence But Promoted the Politics of McCarthyism in the Cold War Years, by Athan Theoharis, Ivan R. Dee, Publisher, 2002 (Chapter One).

Israeli Court Verdict Against BG Yitzhak Yaacov, convicted of unauthorized disclosure of nuclear secrets, May 14, 2002, MS Word document (in Hebrew)

A Critical View of the National Reconnaissance Office by Dave Thompson, President & CEO, Spectrum Astro, at the 18th National Space Symposium, April 11, 2002.

An Assessment of International Legal Issues in Information Operations, Department of Defense Office of General Counsel, May 1999

Project Megiddo, Federal Bureau of Investigation, 1999

A Social Network Analysis of the Iranian Government by Capt. Robert S. Renfro, II and Dr. Richard F. Deckro, Air Force Institute of Technology, November 2001.

Congressional Oversight of Intelligence: One Perspective by Mary K. Sturtevant, American Intelligence Journal, Summer 1992.

The Search for a European Intelligence Policy by Charles Baker, May 2001, addresses the prospects for, and obstacles to, a joint European intelligence policy.

Interception Capabilities 2000 Report to the Director General for Research of the European Parliament (Scientific and Technical Options Assessment programme office) on the development of surveillance technology and risk of abuse of economic information – April 1999

Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions, and Operations – 01 May 1998 – By Mr. Robert D. Steele President, OSS Inc., and Dr. Mark M. Lowenthal , President OSS USA

 

TAKEDOWN: Targets, Tools, & Technocracy Robert David Steele Author’s Pre-Conference Final Draft, Ninth Annual Strategy Conference, U.S. Army War College “Challenging the United States Symmetrically and Asymmetrically: Can America Be Defeated?” 31 March through 2 April 1998

 

INFORMATION PEACKEEPING: The Purest Form of War Robert D. Steele Editor’s Final Draft 3.9 dated 11 March 1998, Forthcoming in Dearth and Campen, CYBERWAR 2.0: Myths, Mysteries, and Realities

 

Nuclear Threats During the Gulf War John Pike 19 February 1998

The Integration of Operations & Intelligence — Getting Information to the Warfighter Air Command and Staff College 1997 – Getting combat information in a timely manner from the stovepipes of the intelligence world to the operators that require it has been a problem for years.

Marine Corps Intelligence Doctrine: Does It Know The Information Age Has Arrived? Bradley J. Sillman Major USMC [United States Marine Corps Command and Staff College]

 

How Much for a Pound of Communication? Paul E. Ruud Lieutenant Commander, US Navy [United States Marine Corps Command and Staff College]

 

USAF TACS Battle Management: Preparing for High Tempo Future Operations Major C.B. Miller, United States Air Force [United States Marine Corps Command and Staff College]

 

The Final Report of the Snyder Commission — A Perspective on Intelligence Reform from Outside the Beltway Woodrow Wilson School Policy Conference 401a: Intelligence Reform in the Post-Cold War Era

Confronting the New Intelligence Establishment: Lessons from the Colorado Experience – Loring Wirbel The Workbook Fall 1996

 

UK Eyes Alpha by Mark Urban – The Inside Story of British Intelligence – with sample chapter on ZIRCON


Secret Power – New Zealand’s Role in the International Spy Network – by Nicky Hager


THE SPECIAL OSPREY: IMPACT ON SPECIAL OPERATIONS DOCTRINE THOMAS J. TRASK School of Advanced Airpower Studies JUNE 1996

ORGANIZATIONAL CONCEPTS FOR THE “SENSOR-TO-SHOOTER” WORLD: THE IMPACT OF REAL-TIME INFORMATION ON AIRPOWER TARGETING WILLIAM G. CHAPMAN School of Advanced Airpower Studies JUNE 1996

Communications and Intelligence: Why Can’t We Get Along? Major Lisa Tubridy, United States Marine Corps – April 1996

Rise of Domestic Terrorism and Its Relation to United States Armed Forces LCDR Steven Mack Presley, MSC, USN – 19 April 1996

INTEGRATION OF INTELLIGENCE INTO PROFESSIONAL MILITARY EDUCATION – MAJOR R. J. BUIKEMA, USMC – 18 APRIL 96

Preparation of the US Navy Intelligence Officer CDR (Sel) Richard L. Saunders, USN – 15 April 1996

“Forward…From The Sea”: Intelligence Support to Naval Expeditionary Forces Lieutenant Commander Thomas C. Baus, United States Navy – 04 April 1996

The Future of Airborne Reconnaissance Major Keith E. Gentile, United States Air Force – 27 March 1996 [this is a rather nice piece, though I fear that our HTML version has oddly deleted the even-number footnotes, so if you need these references, you may have better luck with the original ZIP version]

V [Marine] Amphibious Corps Planning for Operation Olympic and the Role of Intelligence in Support of Planning. Author: Major Mark P. Arens, USMCR [MCIA] 27 March 1996

Making Intelligence Smarter: The Future of U.S. Intelligence — Report of an Independent Task Force Sponsored by the Council on Foreign Relations, February 1996

A Framework for Reform of the U.S. Intelligence Community, by John A. Gentry

SPECIAL OPERATIONS FORCES AND UNMANNED AERIAL VEHICLES: SOONER OR LATER? STEPHEN P. HOWARD School of Advanced Airpower Studies JUNE 1995

Reconnaissance, Surveillance, and Target Acquisition Collection Planning–Embedded Within the MEF Intelligence and Operations Cycles – Intelligence Doctrine Working Group Chairman: Major J.C. Dereschuk, United States Marine Corps Members: Major R. H. Chase Major J. A. Day (USMC) Major D. D. Cline Major J.G. O’Hagan — May 1995

A CRITICAL ANALYSIS OF THE I MEF INTELLIGENCE PERFORMANCE IN THE 1991 PERSIAN GULF WAR Major Raymond E. Coia, United States Marine Corps – 22 May 1995

The Use of Covert Paramilitary Activity as a Policy Tool: An Analysis of Operations Conducted by the United States Central Intelligence Agency, 1949-1951 – Major D. H. Berger, USMC – 22 May 1995

CAN ATARS FIX AMERICA’S TACTICAL RECONNAISSANCE VACUUM? by Major Mark E. Marek Conference Group Nine LtCol Sorrell Dr. Jacobsen 18 April 1995 United States Marine Corps Command and Staff College Marine Corps University

COUNTERING TERRORISM: THE ISRAELI RESPONSE TO THE 1972 MUNICH OLYMPIC MASSACRE AND THE DEVELOPMENT OF INDEPENDENT COVERT ACTION TEAMS – Alexander B. Calahan – April 1995

TEMPEST Eavesdropping On the Electromagnetic Emanations of Digital Equipment: The Laws of Canada, England and the United States

Observation Satellites for Arms Control: Some Implications and Policy Choices by Rosemary Klineberg, Institute for Defense Analyses, 31 May 1963

Intelligence e-Prints

This archive includes timely and interesting materials on topics of current interest. Any opinions, findings, and conclusions or recommendations expressed in this archive are those of the author(s) and do not necessarily reflect the views of the Federation of American Scientists.

The U.S. Army Camp Stanley Storage Activity and The CIA Midwest Depot by Allen Thomson, updated July 5, 2015

Joint Inspector General Report on the President’s Surveillance Program (2015 redaction), 10 July 2009 (via NY Times)

The DOD Cyber Strategy, U.S. Department of Defense, April 2015

Mixed Reality: Geolocation & Portable Hand-Held Communication Devices, ODNI Summer Hard Problem (SHARP) Program, 2009 (released February 2015)

Sovereign Citizen Extremist Ideology Will Drive Violence at Home, During Travel, and at Government Facilities, DHS Office of Intelligence and Analysis, February 5, 2015 (via Reason)

Signals Intelligence Reform: 2015 Anniversary Report, Office of the Director of National Intelligence, released February 3, 2015

Principles of Intelligence Transparency for the Intelligence Community, Office of the Director of National Intelligence, released February 3, 2015

Final Report of the Rendition, Detention, and Interrogation Network Agency Accountability Board (Redacted), December 2014, released by CIA January 2015

Report of Investigation into CIA Access to the SSCI Shared Drive on RDINet (Redacted), CIA Inspector General, July 2014, released by CIA January 2015

Foreign Intelligence Gathering Laws, Law Library of Congress, December 2014

Transforming Nuclear Attribution: Culture, Community, and Change (SHARP 2009) (redacted), Office of the Director of National Intelligence Summer Hard Problem (SHARP) Program, July 2009

Identity Intelligence: From Reactionary Support to Sustained Enabler, Defense Intelligence Agency, August 21, 2012

Declassified Facts in PCLOB 702 report, July 22, 2014

Allegations of Iraqi Chemical Weapons Transported to Syria and Possible Tunnel Adits at Al-Bayda, Syria by Allen Thomson, June 22, 2014

Biodetection Technologies for First Responders: 2014 Edition, Pacific Northwest National Laboratory

3D Cyberspace Spillover: Where Virtual Worlds Get Real, ODNI Summer Hard Problem (SHARP) Program, Summer 2008

Report of the National Commission for the Review of the Research and Development Programs of the United States Intelligence Community (Unclassified Version), released November 2013

White Paper: The IC’s Role Within U.S. Cyber R&D, Report of the National Commission for the Review of the Research and Development Programs of the United States Intelligence Community (Unclassified Version), released November 2013

The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens’ fundamental rights, European Parliament Directorate General for Internal Policies, September 2013

Project QUANTUM LEAP: After Action Report, Special Operations Command National Capital Region, Draft, 12 September 2012

Stimulating Innovation in Naval Special Warfare by Utilizing Small Working Groups by Thomas A. Rainville, Master’s Thesis, March 2001

The Emergence of the Internet and Africa by Les Cottrell, SLAC, May 13, 2013

Lawfulness of a Lethal Operation Directed Against a U.S. Citizen Who Is a Senior Operational Leader of Al-Qa’ida or An Associated Force, Department of Justice White Paper

A Dossier on New Construction North of Kashgar, Xinjiang, China 39.6 N, 76.1 E by Allen Thomson, January 11, 2013

Early warning analysis for social diffusion events by Richard Colbaugh and Kristin Glass, Security Informatics, Vol. 1, 2012, SAND 2010-5334C

Proactive Defense for Evolving Cyber Threats by Richard Colbaugh and Kristin Glass, Sandia National Laboratories, November 2012

U.S. National Security and Economic Interests in Remote Sensing: The Evolution of Civil and Commercial Policy by James A. Vedda, prepared for the National Geospatial-Intelligence Agency, February 20, 2009

Strengthened IAEA Safeguards-Imagery Analysis: Geospatial Tools for Nonproliferation Analysis by Frank V. Pabian, Los Alamos National Laboratory, June 22, 2012

A Sourcebook on the TACKSMAN I and TACKSMAN II ELINT Bases in Iran by Allen Thomson, July 25, 2012

A Dossier on the NRO Aerospace Data Facility Southwest (Las Cruces, New Mexico) by Allen Thomson, working draft, July 16, 2012

Cyber Threat Metrics by Mark Mateski, et al, Sandia National Laboratories, March 2012

Espionage and Other Compromises of National Security: Case Summaries from 1975 to 2008, PERSEREC, November 2, 2009

Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes by S. John Luke, Lawrence Livermore National Laboratory, January 2012

Rapid Exploitation and Analysis of Documents, Lawrence Livermore National Laboratory, December 2011

Department of Defense Cyberspace Policy Report, report to Congress, November 2011

Unmanned Air Vehicle (UAV) Ultra-Persistence Research, Sandia National Laboratories, June 2011

The Fingerprint Sourcebook, National Institute of Justice, August 2011

Geomagnetic Storms and Their Impacts on the U.S. Power Grid by John Kappenman, Metatech Corporation, January 2010

Aerospace Data Facility-Colorado / Denver Security Operations Center, Buckley AFB, Colorado a sourcebook by Allen Thomson, updated November 28, 2011

A Guide to the Amerithrax Documents: I. Amount of Attack Materials and Requirements for Production by Martin Furmanski, MD, May 2010

Parliamentary Oversight of Security and Intelligence Agencies in the European Union prepared for the European Parliament, September 2011

Wireless Evolution, ETR Bulletin, Emerging Technologies Research (FBI Operational Technology Division), volume 8, issue 1, March 2011

Kryptographik: Lehrbuch der Geheimschreibekunst (Chiffrir- und Dechiffrirkunst) in Staats- und Privatgeschaeften, by Johann Ludwig Klueber, 1809 (declassified by NSA in 2010)

Terms & Definitions of Interest for DoD Counterintelligence Professionals, Defense Intelligence Agency, 2 May 2011

Transnational Islamic Activism and Radicalization: Patterns, Trends, and Prognosticators, Sandia National Laboratories Report, June 2010

Disclosure of Budget Information on the Intelligence Community, Final Report of the Church Committee (1976), Book I, Chapter XVI

National Security Space Strategy, Unclassified Summary, DOD/ODNI, January 2011

Former CIA Employees are Barred from Lobbying CIA Detailees to Other Agencies, Office of Government Ethics, February 9, 2006

Illicit Commerce by North Korea, Report to the UN Security Council, 2009 (via ArmsControlWonk)

Compilation of good practices on legal and institutional frameworks and measures that ensure respect for human rights by intelligence agencies while countering terrorism, including on their oversight, United Nations Human Rights Council, May 17, 2010

Interrogation: World War II, Vietnam, and Iraq, National Defense Intelligence College, September 2008

Final Report of the Guantanamo Review Task Force, January 22, 2010

Biological Sciences Experts Group (BSEG) concept paper, 2006

The CIA Accountability Act of 1987 (HR 3603), by Rep. Leon Panetta, et al, 100th Congress, November 3, 1987

The Comprehensive National Cybersecurity Initiative, White House release, March 2, 2010

Arab Media Outlook 2009-2013, Dubai Press Club, February 2010

Screening for Potential Terrorists in the Enlisted Military Accessions Process, Defense Personnel Security Research Center, April 2005

Unclassified Report on the President’s Surveillance Program, Joint Inspector General Report, 10 July 2009

Legal Barriers to Information Sharing: The Erection of a Wall Between Intelligence and Law Enforcement Investigations, 9/11 Commission staff monograph by Barbara A. Grewe, August 20, 2004 (declassified June 2009)

Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, The White House, May 2009

Domestic Extremism Lexicon, Department of Homeland Security Office of Intelligence and Analysis, March 26, 2009

Rightwing Extremism: Current Economic and Political Climate Fueling Resurgence in Radicalization and Recruitment, Department of Homeland Security Office of Intelligence and Analysis, April 7, 2009

Leftwing Extremists Likely to Increase Use of Cyber Attacks over the Coming Decade, Department of Homeland Security Office of Intelligence and Analysis, January 26, 2009

Intelligence Community Decision Book for the President, transmitted to President Gerald Ford on December 22, 1975

An Overview of the United States Intelligence Community for the 111th Congress, February 2009.

Mumbai Terrorist Attacks (Nov. 26-29, 2008), January 5, 2009. This dossier based on the investigation of the Mumbai terror attacks was prepared by the Government of India and presented to the Government of Pakistan.

Biometric Collection, Transmission and Storage Standards Technical Reference, Department of the Army Biometrics Task Force, 24 July 2006

Joint Federal Agencies Intelligence DNA Database Joint Federal Agencies Intelligence DNA Database, describing a searchable database of DNA profiles from detainees and Searchable database of DNA profiles from detainees and known or suspected terrorists known or suspected terrorists, December 2007

Al Qaida-Like Mobile Discussions & Potential Creative Uses, 304th MI BN OSINT Team, October 16, 2008

Issues Related to the Bureau of Industry and Security�s Budget and Responsibilities for International Treaty Implementation and Compliance, U.S. Department of Commerce, Office of Inspector General, October 2008

Biometrics in Government POST – 9/11, National Science and Technology Council, August 2008

The Department of Defense DNA Registry and the U.S. Government Accounting Mission by Brion C. Smith, August 2005

Zawahiri Tries to Clear Name, Explain Strategy, Transnational Security Issues Report, International Research Center, 21 April 2008

An Examination of State and Local Fusion Centers and Data Collection Methods by Milton Nenneman, Naval Postgraduate School thesis, March 2008

Iraqi Perspectives Project: Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents, Institute for Defense Analyses, November 2007 (released March 2008)

Independent Study of the Roles of Commercial Remote Sensing in the Future National System for Geospatial-Intelligence (NSG), Report to the Directors of the NGA and the NRO, July 16, 2007

Remarks of Open Source Center Director Doug Naquin before the Central Intelligence Retirees’ Association, October 3, 2007

El Fenomeno Chavez: Hugo Chavez of Venezuela, Modern Day Bolivar by Jerrold M. Post, USAF Counterproliferation Center, March 2007

Managing the Private Spies: The Use of Commercial Augmentation for Intelligence Operations by Maj. Glenn J. Voelz, Joint Military Intelligence College, June 2006

Review of Anticorruption Efforts in Iraq, U.S. Embassy working draft report, Baghdad, Iraq, 2007

Civil Applications Committee (CAC) Blue Ribbon Study, Independent Study Group Final Report, September 2005 (Civil Applications Committee Fact Sheet, 2001)

Review of Psychological Operations: Lessons Learned from Recent Operational Experience by Christopher J. Lamb, National Defense University Press, September 2005

DCI Robert M. Gates on CIA and Openness, speech to the Oklahoma Press Association, February 21, 1992

Further Information Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq (cont’d) by Milton Leitenberg, part 3 of 3, August 2006

Further Information Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq by Milton Leitenberg, part 2 of 3, August 2006

Targeted Killing as an Element of U.S. Foreign Policy in the War on Terror by Major Matthew J. Machon, US Army School of Advanced Military Studies, Fort Leavenworth, May 2006

Information Operations in Operations Enduring Freedom and Iraqi Freedom – What Went Wrong? by Major Joseph L. Cox, US Army School of Advanced Military Studies, Fort Leavenworth, May 2006

Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of Iran by Jason P. Patterson and Matthew N. Smith, Naval Postgraduate School, September 2005

Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of North Korea by Christopher Brown, Naval Postgraduate School, September 2004

Unresolved Questions Regarding US Government Attribution of a Mobile Biological Production Capacity by Iraq by Milton Leitenberg, part 1 of 3, June 2006

Assisting People to Become Independent Learners in the Analysis of Intelligence by Peter L. Pirolli, Palo Alto Research Center, Inc., February 2006

Intelligence Analysis in Theater Joint Intelligence Centers: An Experiment in Applying Structured Methods by MSgt Robert D. Folker, Jr. (USAF), Joint Military Intelligence College, January 2000

The A.Q. Khan Network: Causes and Implications by Christopher O. Clary, Master’s Thesis, Naval Postgraduate School, December 2005

An Analysis of the Systemic Security Weaknesses of the U.S. Navy Fleet Broadcasting System, 1967-1974, as Exploited by CWO John Walker by Maj. Laura J. Heath, Master’s Thesis, U.S. Army Command and General Staff College, June 2005

Online Islamic Organizations and Measuring Web Effectiveness by Minji Daniels, Master’s Thesis, Naval Postgraduate School, December 2004

Deception 101 — A Primer on Deception by Joseph W. Caddell, U.S. Army War College Strategic Studies Institute, December 2004

Link Analysis Workbench, SRI International, Air Force Research Laboratory, September 2004 (1.3 MB PDF file)

Some Human Factors in Codebreaking by Christine Large, originally presented at a symposium on “The Role of Humans in Intelligent and Automated Systems,” held in Warsaw, Poland, October 2002

Reliable and Relevant National Communications System by Lt. Col. Timothy L. Lake, US Army War College research paper, May 2004

Advanced Command, Control, Communications & Intelligence (C3I) Systems Analysis and Trade-Offs, CACI Technologies, Incorporated, March 2004

Intelligence, Surveillance and Reconnaissance in Support of Operation Iraqi Freedom: Challenges for Rapid Maneuvers and Joint C4ISR Integration and Interoperability by Lt. Com. Carl M. Bradley, USN, Naval War College, February 9, 2004

Insight Into Foreign Thoughtworlds for National Security Decision Makers by J.W. Barnett, Institute for Defense Analyses, January 2004

Resume of a CIA SIGINT Operations Officer, 1965-1993

Some-Time, Part-Time and One-time Terrorism by M.E. Bowman, Intelligencer, Association of Former Intelligence Officers, Winter/Spring 2003

Interviewing With An Intelligence Agency, a first-person narrative of an applicant interviewing and going through the clearance process with the National Security Agency, November 2003, updated January 2004

“All Necessary Means” — Employing CIA Operatives in a Warfighting Role Alongside Special Operations Forces by Colonel Kathryn Stone, US Army War College, April 7, 2003

The Evolution of Strategic Influence by LTC Susan L. Gough, US Army War College, April 7, 2003

Strategic Influence Operations — The Information Connection by Col. Brad M. Ward, US Army War College, April 7, 2003

George Washington, America�s First Director of Military Intelligence by LCDR Michael S. Prather, USN, USMC Command and Staff College (Master’s Thesis), July 2002

NSA’s Central Security Service, by Keith P. Clive, excerpted from Cryptologia, April 2002

Remarks of David Kahn on the 50th Anniversary of the National Security Agency, November 1, 2002

Force Protection in an Era of Commercially Available Satellite Imagery: Space Blockade as a Possible Solution, by Maj. Robert Fabian (USAF), Naval War College, February 2002 (1.3 MB PDF file)

Chasing Spies: How the FBI Failed in Counterintelligence But Promoted the Politics of McCarthyism in the Cold War Years, by Athan Theoharis, Ivan R. Dee, Publisher, 2002 (Chapter One).

Israeli Court Verdict Against BG Yitzhak Yaacov, convicted of unauthorized disclosure of nuclear secrets, May 14, 2002, MS Word document (in Hebrew)

A Critical View of the National Reconnaissance Office by Dave Thompson, President & CEO, Spectrum Astro, at the 18th National Space Symposium, April 11, 2002.

An Assessment of International Legal Issues in Information Operations, Department of Defense Office of General Counsel, May 1999

Project Megiddo, Federal Bureau of Investigation, 1999

A Social Network Analysis of the Iranian Government by Capt. Robert S. Renfro, II and Dr. Richard F. Deckro, Air Force Institute of Technology, November 2001.

Congressional Oversight of Intelligence: One Perspective by Mary K. Sturtevant, American Intelligence Journal, Summer 1992.

The Search for a European Intelligence Policy by Charles Baker, May 2001, addresses the prospects for, and obstacles to, a joint European intelligence policy.

Interception Capabilities 2000 Report to the Director General for Research of the European Parliament (Scientific and Technical Options Assessment programme office) on the development of surveillance technology and risk of abuse of economic information – April 1999

Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions, and Operations – 01 May 1998 – By Mr. Robert D. Steele President, OSS Inc., and Dr. Mark M. Lowenthal , President OSS USA

 

TAKEDOWN: Targets, Tools, & Technocracy Robert David Steele Author’s Pre-Conference Final Draft, Ninth Annual Strategy Conference, U.S. Army War College “Challenging the United States Symmetrically and Asymmetrically: Can America Be Defeated?” 31 March through 2 April 1998

 

INFORMATION PEACKEEPING: The Purest Form of War Robert D. Steele Editor’s Final Draft 3.9 dated 11 March 1998, Forthcoming in Dearth and Campen, CYBERWAR 2.0: Myths, Mysteries, and Realities

 

Nuclear Threats During the Gulf War John Pike 19 February 1998

The Integration of Operations & Intelligence — Getting Information to the Warfighter Air Command and Staff College 1997 – Getting combat information in a timely manner from the stovepipes of the intelligence world to the operators that require it has been a problem for years.

Marine Corps Intelligence Doctrine: Does It Know The Information Age Has Arrived? Bradley J. Sillman Major USMC [United States Marine Corps Command and Staff College]

 

How Much for a Pound of Communication? Paul E. Ruud Lieutenant Commander, US Navy [United States Marine Corps Command and Staff College]

 

USAF TACS Battle Management: Preparing for High Tempo Future Operations Major C.B. Miller, United States Air Force [United States Marine Corps Command and Staff College]

 

The Final Report of the Snyder Commission — A Perspective on Intelligence Reform from Outside the Beltway Woodrow Wilson School Policy Conference 401a: Intelligence Reform in the Post-Cold War Era

Confronting the New Intelligence Establishment: Lessons from the Colorado Experience – Loring Wirbel The Workbook Fall 1996

 

UK Eyes Alpha by Mark Urban – The Inside Story of British Intelligence – with sample chapter on ZIRCON


Secret Power – New Zealand’s Role in the International Spy Network – by Nicky Hager


THE SPECIAL OSPREY: IMPACT ON SPECIAL OPERATIONS DOCTRINE THOMAS J. TRASK School of Advanced Airpower Studies JUNE 1996

ORGANIZATIONAL CONCEPTS FOR THE “SENSOR-TO-SHOOTER” WORLD: THE IMPACT OF REAL-TIME INFORMATION ON AIRPOWER TARGETING WILLIAM G. CHAPMAN School of Advanced Airpower Studies JUNE 1996

Communications and Intelligence: Why Can’t We Get Along? Major Lisa Tubridy, United States Marine Corps – April 1996

Rise of Domestic Terrorism and Its Relation to United States Armed Forces LCDR Steven Mack Presley, MSC, USN – 19 April 1996

INTEGRATION OF INTELLIGENCE INTO PROFESSIONAL MILITARY EDUCATION – MAJOR R. J. BUIKEMA, USMC – 18 APRIL 96

Preparation of the US Navy Intelligence Officer CDR (Sel) Richard L. Saunders, USN – 15 April 1996

“Forward…From The Sea”: Intelligence Support to Naval Expeditionary Forces Lieutenant Commander Thomas C. Baus, United States Navy – 04 April 1996

The Future of Airborne Reconnaissance Major Keith E. Gentile, United States Air Force – 27 March 1996 [this is a rather nice piece, though I fear that our HTML version has oddly deleted the even-number footnotes, so if you need these references, you may have better luck with the original ZIP version]

V [Marine] Amphibious Corps Planning for Operation Olympic and the Role of Intelligence in Support of Planning. Author: Major Mark P. Arens, USMCR [MCIA] 27 March 1996

Making Intelligence Smarter: The Future of U.S. Intelligence — Report of an Independent Task Force Sponsored by the Council on Foreign Relations, February 1996

A Framework for Reform of the U.S. Intelligence Community, by John A. Gentry

SPECIAL OPERATIONS FORCES AND UNMANNED AERIAL VEHICLES: SOONER OR LATER? STEPHEN P. HOWARD School of Advanced Airpower Studies JUNE 1995

Reconnaissance, Surveillance, and Target Acquisition Collection Planning–Embedded Within the MEF Intelligence and Operations Cycles – Intelligence Doctrine Working Group Chairman: Major J.C. Dereschuk, United States Marine Corps Members: Major R. H. Chase Major J. A. Day (USMC) Major D. D. Cline Major J.G. O’Hagan — May 1995

A CRITICAL ANALYSIS OF THE I MEF INTELLIGENCE PERFORMANCE IN THE 1991 PERSIAN GULF WAR Major Raymond E. Coia, United States Marine Corps – 22 May 1995

The Use of Covert Paramilitary Activity as a Policy Tool: An Analysis of Operations Conducted by the United States Central Intelligence Agency, 1949-1951 – Major D. H. Berger, USMC – 22 May 1995

CAN ATARS FIX AMERICA’S TACTICAL RECONNAISSANCE VACUUM? by Major Mark E. Marek Conference Group Nine LtCol Sorrell Dr. Jacobsen 18 April 1995 United States Marine Corps Command and Staff College Marine Corps University

COUNTERING TERRORISM: THE ISRAELI RESPONSE TO THE 1972 MUNICH OLYMPIC MASSACRE AND THE DEVELOPMENT OF INDEPENDENT COVERT ACTION TEAMS – Alexander B. Calahan – April 1995

TEMPEST Eavesdropping On the Electromagnetic Emanations of Digital Equipment: The Laws of Canada, England and the United States

Observation Satellites for Arms Control: Some Implications and Policy Choices by Rosemary Klineberg, Institute for Defense Analyses, 31 May 1963

FAS LINK

Our Days of Noah