Intelligence


Featured Article: A Brief History of Scandals…



Featured Article: A Brief History of Scandals…
Featured article: A Brief History of Scandals: Special Oversight Challenges in National Security Interrogations by Erik Jens A history of (at least) American national security operations and initiatives shows, fairly convincingly, the need for external oversight. Time and again, executive branch agencies have, with the best of motives as they… Read More

Featured Article: Improving the Intelligence Community’s Contribution to CWMD



Featured Article: Improving the Intelligence Community’s Contribution to CWMD
Featured article: Improving the Intelligence Community’s Contribution to Countering Weapons of Mass Destruction by Timothy W. Fisher There is, of course, no such thing as a perfect weapon of mass destruction (WMD) threat assessment. Some of the brightest minds in the intelligence community continuously work WMD issues. The intelligence community,… Read More

Featured Article: Covert Action and Unintended Consequences



Featured Article: Covert Action and Unintended Consequences
Featured article: Covert Action and Unintended Consequences by John G. Breen In the middle of the CIA’s 1954 covert overthrow of the democratically-elected government of Guatemala, with waning rebel force momentum and facing calls to increase support to the insurgents with unmarked surplus WWII bombers, President Eisenhower turned to his… Read More

InterAgency Journal 8-3



InterAgency Journal 8-3
Inside this issue: Features Critical Infrastructure Protection by Patricia Ladnier Fostering Interagency Collaboration for Upstream Counterproliferation by Matthew D. Rautio Nuclear Terrorism – Imminent Threat? by Brendan G. Melley A Clear Deterrence Strategy Required for Cyber by Terrence S. Allen Interagency Leadership by Duane M. Blackburn The End of Operational… Read More

Featured Article: Moving Toward Improved Strategic Planning in U.S. Foreign Policy



Featured Article: Moving Toward Improved Strategic Planning in U.S. Foreign Policy
Featured article: Moving Toward Improved Strategic Planning in U.S. Foreign Policy by Jeffrey Grieco In 2005, the Department of State (State) and the U.S. Agency for International Development (USAID) undertook a detailed program with over 24 civilian, counterpart, federal agencies entitled “Project Horizon.” Project Horizon, inspired by USAID Administrator Andrew… Read More

Featured Article: NRO/NSA Synergy



Featured Article: NRO/NSA Synergy
Featured article: Whole-of-Government Teaming Through Collaborative Construction: NRO/NSA Synergy by Leilani DeWitt and Bob Dillinger Each member of the Nation’s Security Agency Community is defined by the distinct responsibilities, competencies, and capabilities it contributes to the national intelligence mission. The melding of the unique overhead information processing of the National… Read More

Featured Article: Disrupting the Foreign Fighter Flow…



Featured Article: Disrupting the Foreign Fighter Flow…
Featured article: Disrupting the Foreign Fighter Flow: Interdiction and Prosecution by Jan Schwarzenberg U.S. persons travelling to other lands to become foreign fighters are a threat to domestic security in the U.S. Numerous reports over the past decade note the presence of foreign fighters arriving in conflict areas such as… Read More

Law enforcement, intelligence community vital for domestic security



Law enforcement, intelligence community vital for domestic security
A recent paper published by Harvard Kennedy School’s Belfer Center for Science and International Affairs examines the balance between a U.S. citizen’s unalienable right to privacy and security of the nation. “By Any Means Necessary: Privacy Implications of Intelligence Support to Domestic Security” looks at what happens when the government’s… Read More

RAND suggests Army cyber strategy



RAND suggests Army cyber strategy
Earlier this year, the RAND Corporation published a report suggesting a new cyber strategy for the U.S. Army. Tactical Cyber proposes a strategy for tactical Army cyber operations and describes how the Army should use available resources to achieve mission objectives. RAND’s report documents research conducted as part of the… Read More