Advanced search Help
Searching for terms: EXACT: "United States. Central Intelligence Agency" in: publisher
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Counterintelligence vs. Insurgency
This document describes in detail how counterintelligence forces in Latin America ideally plan and mount operations against insurgent forces. It covers every aspect of counterintelligence from identifying insurgents to mounting covert action operations against them.
United States. Central Intelligence Agency
Arango, Carlos Revilla
1968
-
Intelligence Support to the Life Science Community: Mitigating Threats from Bioterrorism
"The al-Qa`ida attacks of 11 September 2001 and the delivery of 'Bacillus anthracis' (anthrax) via the US Postal Service triggered a significant increase in initiatives to improve defense against biological attacks. They also reinvigorated a decades-old debate about the contributions that openly published scientific research might make to the efforts of bioterrorists and others who may be developing a biological warfare (BW) or other weapons of mass destruction (WMD) capability. Resolution of this debate could be made easier by input from knowledgeable intelligence and other national security professionals. This article is an overview of this debate, and it summarizes the most recent discussions among bioscience researchers. In addition, it offers some options the Intelligence Community (IC) can consider to help the life science community continue its work effectively, while safeguarding national security."
United States. Central Intelligence Agency
Petro, James B.
2004
-
Integrating Methodologists into Teams of Substantive Experts
"Intelligence analysis, like other complex tasks, demands considerable expertise. It requires individuals who can recognize patterns in large data sets, solve complex problems, and make predictions about future behavior or events. To perform these tasks successfully, analysts must dedicate a considerable number of years to researching specific topics, processes, and geographic regions. Paradoxically, it is the specificity of expertise that makes expert forecasts unreliable. While experts outperform novices and machines in pattern recognition and problem solving, expert predictions of future behavior or events are seldom as accurate as simple actuarial tables. In part, this is due to cognitive biases and processing time constraints. In part, it is due to the nature of expertise itself and the process by which one becomes an expert."
United States. Central Intelligence Agency
Johnston, Rob, 1967-
2003
-
Developing a Taxonomy of Intelligence Analysis Variables
"By distilling a list of the variables that affect analytic reasoning, the author aims to move the tradecraft of intelligence analysis closer to a science. A carefully prepared taxonomy can become a structure for heightening awareness of analytic biases, sorting available data, identifying information gaps, and stimulating new approaches to the understanding of unfolding events, ultimately increasing the sophistication of analytic judgments. The article is intended to stimulate debate leading to refinements of the proposed variables and the application of such a framework to analytic thinking among intelligence professionals."
United States. Central Intelligence Agency
Johnston, Rob, 1967-
2003
-
Wanted: A Definition of 'Intelligence'
Michael Warner: "In a business as old as recorded history, one would expect to find a sophisticated understanding of just what that business is, what it does, and how it works. If the business is 'intelligence,' however, we search in vain. As historian Walter Laqueur warned us, so far no one has succeeded in crafting a theory of intelligence. Even today, we have no accepted definition of intelligence. The term is defined anew by each author who addresses it, and these definitions rarely refer to one another or build off what has been written before. Without a clear idea of what intelligence is, how can we develop a theory to explain how it works? If you cannot define a term of art, then you need to rethink something. In some way you are not getting to the heart of the matter. Here is an opportunity: a compelling definition of intelligence might help us to devise a theory of intelligence and increase our understanding. In the hope of advancing discussions of this topic, I have collected some of the concise definitions of intelligence that I deem to be distinguished either by their source or by their clarity. After explaining what they do and do not tell us, I shall offer up my own sacrificial definition to the tender mercies of future critics."
United States. Central Intelligence Agency
Warner, Michael
2002
-
Intelligence in the Internet Era
"The Internet era brings an on-rush of changes, both revolutionary and subtle, to the work of intelligence"changes in the doctrine and practice of collection, analysis, and dissemination; and changes in the mindsets and relationships between intelligence and law enforcement, intelligence and the policymaker, and intelligence and the military commander. We are now in an era in which the US Intelligence Community continues to set aside old practices in favor of dramatically new ways of doing business. This comes at a time when both decisionmakers and military commanders recognize the heightened priority and the central importance of good intelligence in providing for the well-being, the security, and the defense of the United States."
United States. Central Intelligence Agency
Clift, Arthur Denis, 1937-
2003
-
Importance of Interchange: Studying and Teaching Intelligence
In this document, a leading intelligence history scholar cites recent improvements but avers that scholars still largely ignore the role of intelligence in addressing international relations and intelligence agencies still are too slow in declassifying historical materials for scholars use. "For it is in the interest of the Intelligence Community to have its work dealt with as part of the warp and woof of international relations even if, as is sure to be the case, the descriptions are sometimes unflattering or critical or worse."
United States. Central Intelligence Agency
May, Ernest R.
1995
-
Challenge for the Political Analyst
In this document, a senior CIA analyst and manager distills three decades of serving policymakers to set forth how political analysts can best develop credibility with those in the policy community. He explains why policymakers are an especially tough audience for political analysts (they know more about politics than any analyst) and, then, provides six areas of knowledge analysts need to master if they hope to have an impact.
United States. Central Intelligence Agency
Petersen, Martin
2003
-
Hermit Surfers of P'yongyang
This document reviews historical instances of countries seeking out foreign science and technology information while blocking access to foreign political philosophies as a prelude to discussing North Korea's use of the Internet. It provides examples of how the North Korean government encourages its scientists to exploit the Internet but retains control by keeping them under surveillance. The document also shows how Open Source Intelligence (OSINT) is of value to North Korea.
United States. Central Intelligence Agency
Mercado, Stephen C.
2004
-
Comprehensive Report of the Special Advisor to the DCI on Iraq's WMD, Volume 3: Iraq's Chemical Warfare Program
This document is volume one of the Special Advisors report to the Director of Central Intelligence on Iraq's WMD. This volume discusses Iraq's chemical warfare program and biological warfare.
United States. Central Intelligence Agency
2004-09-30
-
Support to Military Operations: The Evolution and Relevance of Joint Intelligence Centers
This document aims to answer the following questions: Why did it take so long for joint intelligence centers (JICs) to become widely accepted and used in the US military? And what does the tale of the JICs tell us about how coordinated intelligence might look as the United States pursues the global war on terrorism?
United States. Central Intelligence Agency
Marchio, James D.
2005
-
Sailing the Sea of OSINT in the Information Age
"Our age's increasingly voluminous open-source intelligence (OSINT) sheds
light on issues of the day for all-source analysts, covert collectors, and
policymakers, but have we done enough to exploit its potential?" This document explains why we haven't done enough and what can be done to change the trend.
United States. Central Intelligence Agency
Mercado, Stephen C.
2004
-
Reexamining the Distinction Between Open Information and Secrets
"We need to rethink the distinction between open sources and secrets. Too many policymakers and intelligence officers mistake secrecy for intelligence and assume that information covertly acquired is superior to that obtained openly. Yet, the distinction between overt and covert sources is less clear than such thinking suggests. Open sources often equal or surpass classified information in monitoring and analyzing such pressing problems as terrorism, proliferation, and counterintelligence. Slighting open source intelligence (OSINT) for secrets, obtained at far greater expense when available at all, is no way to run an intelligence community. Also, we must put to rest the notion that the private sector is the preferred OSINT agent. In the end, I would contend, the Intelligence Community (IC) needs to assign greater resources to open sources."
United States. Central Intelligence Agency
2005
-
Preserving Central Intelligence: Assessment and Evaluation in Support of the DCI
"This article will focus on suggestions for correcting two related deficiencies in the intelligence establishment, the absence of an effective internal assessment mechanism in service of the DCI and the absence of an equivalent to the US military's 'combatant command' structure, which has proven invaluable to the defense establishment over the past half-century."
United States. Central Intelligence Agency
Nolte, William
2004
-
Intelligence and Policy: The Evolving Relationship - Roundtable Report
This document is a summary of roundtable proceedings that took place on 10 November 2003. The proceedings focused on intelligence and policy intended to foster better understanding of the often perplexing dynamic between the consumers of intelligence and intelligence professionals. "The following summary of roundtable proceedings does not attempt to recapitulate the discussions in detail. It attempts, rather, to focus on the most salient points made by the participants as they considered a set of key questions drawn up in advance by the roundtable sponsors. These questions will be found at the conclusion of the text. Readers will note that some of the questions were discussed more extensively than others. Those interested in sampling the tenor of the discussions may refer to the italicized excerpts contained in each section."
United States. Central Intelligence Agency
2004-06
-
Designation of Operational Files of the National Reconnaissance Office
"Section 502 of the Intelligence Authorization ACT (IAA) for FY 2003, Public Law 107-306, provides that the Director, National Reconnaissance Office (NRO), with the coordination of the Director of Central Intelligence, may exempt operational files of the NRO from search, review, publication and disclosure provisions of the Freedom of Information Act (FIOA). This important provision will alleviate many of the resource burdens that we are encountering in complying with the FOIA."
United States. Central Intelligence Agency
2003-02-10
-
9.11: Marking the Tenth Anniversary
"From the first moment of terror, America has shown, through the courage and strength of its people, a powerful resilience. At the World Trade Center, professionals dedicated to public safety, joined by men and women from countless walks of life, went bravely into harm's way to save others. At the Pentagon, colleagues, friends, and strangers came together to rescue those threatened by fire and smoke. And in the skies over Pennsylvania, the passengers and crew of a once-ordinary flight stood up to their attackers and shattered their plans. It has been 10 years since the brutal attacks on America. Looking back, we can see the effects they have had and the impact of our country's response."
United States. Central Intelligence Agency
2011-09
-
Guide to the Analysis of Insurgency [2012]
"This Guide provides definitions, a series of indicators, and an analytic framework designed to assist in evaluating an insurgency. Analysts with knowledge of the political, military, cultural, and socioeconomic characteristics of a specific insurgency will find these definitions and the framework helpful in analyzing the conflict. […] No two insurgencies are identical, and this Guide is not intended to provide a one-size-fits-all template. No insurgency is unique in all aspects, however, and most share some combination of characteristics, tactics, and objectives. Most pass through similar stages of development during their life cycle. These commonalities are the focus of this Guide, but analysts should note that the specific insurgencies they are examining will probably not exhibit all of the characteristics or undertake all of the activities addressed in the Guide."
United States. Central Intelligence Agency
2012
-
International and Transnational Terrorism: Diagnosis and Prognosis
This document provides the government's definition of terrorism, graphs of the distribution of international and transnational terrorist acts, discusses case studies of major incidents, state sponsorship of terrorism, and makes predictions about international terrorist activity in the next decade.
United States. Central Intelligence Agency
1976-04
-
International Terrorism in 1979
This research paper produced by the Central Intelligence Agency in April 1980 provides graphs and analysis of international terrorist acts for the year of 1979. Topics discussed include trends, the numbers of total deaths from acts of terrorism, geographic distribution of acts, state supported terrorism and a breakdown of the nationality of victims of terrorist attacks.
United States. Central Intelligence Agency
1980-04
-
International Terrorism in 1976
This research paper produced by the Central Intelligence Agency in July 1977 provides graphs and analysis of international terrorist acts for the year of 1976. Topics discussed include trends, the numbers of total deaths from acts of terrorism, geographic distribution of acts, state supported terrorism and a breakdown of the nationality of victims of terrorist attacks.
United States. Central Intelligence Agency
1977-07
-
International Terrorism in 1978
This research paper produced by the Central Intelligence Agency in March 1979 provides analysis of international terrorist acts during the year of 1978 as well as graphic analysis for the years of 1968-1978. Topics discussed include trends, the numbers of total deaths from acts of terrorism, geographic distribution of acts, state supported terrorism and a breakdown of the nationality of victims of terrorist attacks.
United States. Central Intelligence Agency
1979-03
-
Foundations of Anglo-American Intelligence Sharing
"If there was one constant to any account of postwar British foreign policy, it is the centrality of the United States. In the past 20 years, the importance and role of the intelligence relationship that underpins this factor have become more prevalent. Yet, attention is often focused on specific aspects. The 1946 UK-USA Agreement, for instance, which provided the backbone to the sharing of signals intelligence to this day, is often cited as the central pillar of the special intelligence relationship. Similarly, in episodic instances the covert relationship is cited, with notable examples including the restoration to power of the shah of Iran in 1953 and the running of agents like Oleg Penkovksy."
United States. Central Intelligence Agency
Goodman, Michael
2015-06
-
Application of the Critical-Path Method to Evaluate Insider Risks
"Our purpose in this article is to draw on the most recent and comprehensive empirical studies of insider hostile acts--ranging from formal academic efforts to collections of in-depth case reports--to demonstrate that there exists a common set of factors and a similar pattern of individual and organizational behavior across the many occurrences during recent years. We will describe these factors and the indicators of heightened risk and place them in the context of a 'critical-path' analysis, an approach that has been used in business and medical fields to identify the interrelationships of processes and their most critical and vulnerable points. We will apply this framework to historical cases and discuss the implications for counterintelligence and security personnel, as well as for intelligence officers engaged in recruitment activities focused on the insiders in targeted foreign institutions."
United States. Central Intelligence Agency
Shaw, Eric D.; Sellers, Laura
2015
-
Director's Diversity in Leadership Study: Overcoming Barriers to Advancement
"Building upon the CIA's February 2013 study by the Director's Advisory Group on Women in Leadership (DAG), the DLS [Diversity in Leadership Study] team of CIA officers--guided by a group of six External Senior Advisors--took three initial steps: [a] Defined the scope of the Study, focusing on the experiences of minority officers, as well as the characteristics of gender, sexual orientation, and disability status. [b] Articulated the central importance of diversity in leadership in the enhancement of mission performance in every way: 1) better decision-making and problem-solving capabilities; 2) effective use of the workforce's talents; 3) greater cultural competence to collaborate with colleagues and enhance mission performance; 4) more innovation; and 5) promoting the Agency as an employer of choice in an increasingly diverse nation. [c] Identified the dramatic gap between the composition of the workforce and that of the leadership ranks. Racial and ethnic minority officers make up 23.9% of the entire CIA workforce, but account for only 10.8% of the Senior Intelligence Service (SIS), 15.2% of GS-15s, and 21.0% of GS-14s. A similar gap between the workforce and the leadership ranks exists for minority female officers and officers with disabilities. Moreover, the occupations that most commonly serve as paths to executive ranks (Analysis, Technical Intelligence, and Operations) have minority representation lower than 10% at the GS-15 level or above. As of 1 January 2015, only two members of the D/CIA's Senior Staff Meeting were minority officers. […] Despite the findings of numerous prior studies, including the DAG, the record clearly suggests that the senior leadership of the Agency is not committed to diversity. The fact is that there has been little progress over the past several decades in diversifying the leadership cadre and pipeline and in sustaining the hiring of diverse officers."
United States. Central Intelligence Agency
2015
-
Counterterrorism Professionals Reflect on Their Work
From Scope and Method: "The 57 counterterrorism [CT] professionals interviewed for this article came from many different CT fields, in both the public and private sectors. The interviews were conducted using a structured format, and, with one exception, the author interviewed everyone in person. Participants were asked to reflect on their CT professions and their effects on them and to characterize their vocations' unique contributions to the overall CT enterprise. They were also asked to talk about their emotional, psychological, and interpersonal responses to their activities and to attempt to identify enduring effects of their work on themselves as well as on those closest to them, including colleagues, friends, and family. Finally, they described any deeper meanings-- political, scientific, philosophical, spiritual--that this type of work evoked in them."
United States. Central Intelligence Agency
Wilder, Ursula M.
2014-12
-
War in Laos: The Fall of Lima Site 85 in March 1968
"Published in an unclassified edition of 'Studies in Intelligence' in 1995, this article is one of the earliest public accounts given of Lima Site 85 and the successful North Vietnamese attack against it on 10 and 11 March 1968. The most definitive account, based on extensive interviews and documentation, appeared five years later in a book by former CIA and Intelligence Community historian Timothy Castle, 'One Day Too Long: Top Secret Site 85 and the Bombing of North Vietnam' (Columbia University Press). This article is part of a forthcoming compendium of Studies articles related to the conflict in Southeast Asia that will be published in support of Defense Department efforts to mark the passage of 50 years since that conflict took place."
United States. Central Intelligence Agency
Linder, James C.
2015-03
-
Note to Readers of 'The Central Intelligence Agency's Response to the Senate Select Committee on Intelligence's Study of the CIA's Detention and Interrogation Program'
This is an unclassified report approved for public release on December 08, 2014, from the Central Intelligence Agency (CIA). This report accompanies the following memorandum: "CIA Comments on the Senate Select Committee on Intelligence Report on the Rendition, Detention, and Interrogation Program: Memorandum for the Honorable Dianne Feinstein and the Honorable Saxby Chambliss," available in the Homeland Security Digital Library at https://www.hsdl.org/?abstract&did=760465. This report identifies the sections of the memorandum and makes necessary corrections of errors and omissions.
United States. Central Intelligence Agency
2014-12-08?
-
Final Report of the Rendition, Detention, and Interrogation Network Agency Accountability Board
"The CIA Office of the Inspector General (OIG) on 30 January 2014 opened an investigation into potential unauthorized access to the Senate Select Committee on Intelligence (SSCI) shared drive portion of the Rendition, Detention, and Interrogation Network (RDINet) based on information derived from a special review conducted on 29 January 2014. The OIG on 3 February 2014 reported to the Department of Justice (DOJ) the matter of potential CIA officer violations of 18 U.S.C. § 1030 (Computer Fraud and Abuse Act) and 2511 (Wiretap Act). The DOJ on 8 July 2014 informed the OIG that the DOJ had no prosecutorial interest in the case and the OIG delivered its completed report to the Director of the Central Intelligence Agency (D/CIA) on 18 July 2014. […] The OIG investigated a crimes report filed by the Agency with the DOJ that reported that SSCI staff members may have improperly accessed Agency information on the RDINet. The OIG found that the factual basis for this referral was unfounded and the author of the letter had been provided inaccurate information on which the letter was based. […] The D/CIA on 6 August 2014 convened an Agency Accountability Board (the Board) in response to the OIG findings. The Board was commissioned to investigate the conduct of the five individuals referenced in the IG report and provide recommendations regarding both their individual accountability and any systemic CIA issues the Board might find. […] This report represents the Board's summary, analysis, and recommendations based on relevant information that came before the Board and is not intended to be a definitive history of the RDI Network."
United States. Central Intelligence Agency
2015-01-14
-
Implementation: Year Two Report to the Workforce
"Guided by the February 2013 Final Report of the Director's Advisory Group on Women in Leadership (DAG) , the DAG Implementation (DAG/I) staff continued its efforts to implement the ten recommendations from the final report (see Figure 1) in Year Two (June 2014 to June 2015). The DAG/I staff continued to apply the three-pronged approach established during Year One of implementation: [1] 'Manage Working Groups' with cross-Directorate membership to spearhead the recommendations through research, action, and deliverables. [2] 'Hold Learning Events' to showcase best practices, raise awareness, and generate in-depth discussions on issues pertaining to the DAG report and the development of officers. [3] 'Conduct Strategic Outreach and Communication' across the Agency on the status of the implementation effort, as well as on specific actions employees can take to act upon the recommendations within their team, office, group, etc."
United States. Central Intelligence Agency
2015-07