Intelligence


Featured Article: Covert Action and Unintended Consequences



Featured Article: Covert Action and Unintended Consequences
Featured article: Covert Action and Unintended Consequences by John G. Breen In the middle of the CIA’s 1954 covert overthrow of the democratically-elected government of Guatemala, with waning rebel force momentum and facing calls to increase support to the insurgents with unmarked surplus WWII bombers, President Eisenhower turned to his… Read More

InterAgency Journal 8-3



InterAgency Journal 8-3
Inside this issue: Features Critical Infrastructure Protection by Patricia Ladnier Fostering Interagency Collaboration for Upstream Counterproliferation by Matthew D. Rautio Nuclear Terrorism – Imminent Threat? by Brendan G. Melley A Clear Deterrence Strategy Required for Cyber by Terrence S. Allen Interagency Leadership by Duane M. Blackburn The End of Operational… Read More

Featured Article: Moving Toward Improved Strategic Planning in U.S. Foreign Policy



Featured Article: Moving Toward Improved Strategic Planning in U.S. Foreign Policy
Featured article: Moving Toward Improved Strategic Planning in U.S. Foreign Policy by Jeffrey Grieco In 2005, the Department of State (State) and the U.S. Agency for International Development (USAID) undertook a detailed program with over 24 civilian, counterpart, federal agencies entitled “Project Horizon.” Project Horizon, inspired by USAID Administrator Andrew… Read More

Featured Article: NRO/NSA Synergy



Featured Article: NRO/NSA Synergy
Featured article: Whole-of-Government Teaming Through Collaborative Construction: NRO/NSA Synergy by Leilani DeWitt and Bob Dillinger Each member of the Nation’s Security Agency Community is defined by the distinct responsibilities, competencies, and capabilities it contributes to the national intelligence mission. The melding of the unique overhead information processing of the National… Read More

Featured Article: Disrupting the Foreign Fighter Flow…



Featured Article: Disrupting the Foreign Fighter Flow…
Featured article: Disrupting the Foreign Fighter Flow: Interdiction and Prosecution by Jan Schwarzenberg U.S. persons travelling to other lands to become foreign fighters are a threat to domestic security in the U.S. Numerous reports over the past decade note the presence of foreign fighters arriving in conflict areas such as… Read More

Law enforcement, intelligence community vital for domestic security



Law enforcement, intelligence community vital for domestic security
A recent paper published by Harvard Kennedy School’s Belfer Center for Science and International Affairs examines the balance between a U.S. citizen’s unalienable right to privacy and security of the nation. “By Any Means Necessary: Privacy Implications of Intelligence Support to Domestic Security” looks at what happens when the government’s… Read More

RAND suggests Army cyber strategy



RAND suggests Army cyber strategy
Earlier this year, the RAND Corporation published a report suggesting a new cyber strategy for the U.S. Army. Tactical Cyber proposes a strategy for tactical Army cyber operations and describes how the Army should use available resources to achieve mission objectives. RAND’s report documents research conducted as part of the… Read More

House passes Intelligence Authorization Act



House passes Intelligence Authorization Act
On May 3, the House of Representatives passed the Intelligence Authorization Act (IAA) for Fiscal Year 2017. The bill ensures that the programs and activities of the U.S. intelligence community are authorized by law, fully resourced, and subject to rigorous congressional oversight. The IAA provides urgent funds and authorities to… Read More

Convergence in the Cross-Domain Era



Convergence in the Cross-Domain Era
May 3, 2017 The 16th Annual C4ISRNET Conference will be held on May 3, 2017, and the Renaissance Arlington Capital View in Arlington, VA. The Conference brings together senior-level military, government, industry and corporate leaders to discuss the latest requirements and capabilities in mobility, command and control, communications, cyber, unmanned… Read More