Learning With Professionals: Selected Works from the Joint Military Intelligence College is a collection of writings by present or former faculty and students at the Joint Military Intelligence College. The purpose of the book is to provide an academic resource for students, teachers, and practitioners of intelligence. The growth of the field as an academic discipline has been accompanied by a growth in its body of literature, and some of the most significant writings have come from a center of excellence in the field, the Joint Military Intelligence College. Those presented here represent a cross section of subdisciplines, some with a very timely element, some timeless.This product has been reviewed by senior experts from academia and government, and has been approved for unrestricted distribution by the Directorate for Freedom of Information and Security Review, Washington Headquarters Services, Department of Defense.
This book bequeaths to the Defense Intelligence Agency, and to the Intelligence Community at large, a substantiated vision, with examples, of how analysts can exploit already-available, massive databases to tackle many of the most vexing problems that we face. Dr. Bodnar builds on the earlier work and insight of Cynthia Grabo, whose book Anticipating Surprise: Analysis for Strategic Warning was recently published by the Joint Military Intelligence College's Center for Strategic Intelligence Research. The author also usefully integrates into this book the often-cited but rarely-seen original work of the USAF's strategic and operational philosopher Colonel John Boyd.
The "importance of understanding" has become almost an obsession with significant portions of American business. There remain, however, many companies that attempt to operate as they traditionally have in the past - placing great faith in the owner's or manager's judgment as to what is required to remain competitive. In this paper, the author has articulated clearly the fundamentals of sound intelligence practice and has identified some guidelines that can lead toward creation of a solid intelligence infrastructure. These signposts apply both to government intelligence and to business. Good intelligence should always be based on validated requirements, but it may be derived from a wide variety of sources, not all of which are reliable. Understanding the needs of the consumer and the sources available enable an analyst to choose the correct methodology to arrive at useful answers. The author has laid out in clear, concise language a logical approach to creating an infrastructure for government and business. Every system will have flaws but this discussion should help the reader minimize those weaknesses. It is an important contribution to the education of government and business intelligence professionals. James A. Williams, LTG, U.S. Army (Ret.) Former Director, Defense Intelligence Agency
Behind the combat operations of World War II, Allied and Axis intelligence services were locked in an impassioned effort to generate the critical advantage intelligence could provide. More than fifty years later, historians continue to piece together details on the array of intelligence activities pursued on both sides that supported the policymaker and battlefield commander alike. While the impressive accomplishments achieved by signals intelligence programs such as ULTRA and the daring human intelligence operations conducted by the famed Office of Strategic Services have garnered the lion's share of both publicity and academic research, the role of prisoner-of-war (POW) interrogation has remained largely unexplored territory. As World War II unfolded, the strategic interrogation programs established by the British, German, and American forces evolved into robust collection entities that proved to be a unique source of critical intelligence. Decades after their closure, the spate of academic research into these programs has only recently begun to be addressed. Whereas researchers have made headway in chronicling the British and German programs, relatively little has been written about the U.S. program in operation during the same period. Using recently declassified material from the National Archives and Record Administration, this thesis seeks to capture the essence of the strategic interrogation program conducted under the auspices of the War Department's Military Intelligence Service (code-named MIS-Y) with the mission of bringing selected German POWs from the European Theater of Operations to the U.S. for the purpose of gathering vital intelligence in support of the Allied war effort. This study examines the key elements of MIS-Y, to include the events that led to its founding; the program's organization and facilities; the training it provided for its interrogation and operational support personnel; its methods for screening and selecting high value POWs; its process for interrogation and exploitation of captured documents; the Allied intelligence requirements that drove its operations; and the nature of the intelligence it produced and disseminated. A primary objective of this thesis is to add to the Intelligence Community's body of knowledge about the challenges and opportunities inherent in the strategic interrogation of POWs. It will also search this event in contemporary military history for timeless principles in the conduct of strategic level interrogation operations-principles that would guide a more effective intelligence program in support of future military operations. The work begins with a brief overview of the nature and history of intelligence. It then demonstrates how the successful POW intelligence program conducted by the British War Office influenced the development of a similar program in the U.S. The study continues by providing detailed insights into the inter-service struggle to develop a strategic interrogation program, including the selection of Fort Hunt, a Civil War-era military camp, as the site for building and operating a Joint Interrogation Center. Finally, this work chronicles the unique training designed to prepare MIS-Y personnel for their duties and the systematic methodology for screening, selecting, handling, monitoring, and interrogating the thousands of high value German POWs that transited Fort Hunt from 1942-1945.
The modern means of communication have turned the world into an information fishbowl and, in terms of foreign policy and national security in post-Cold War power politics, helped transform international power politics. Information operations (IO), in which time zones are as important as national boundaries, is the use of modern technology to deliver critical information and influential content in an effort to shape perceptions, manage opinions, and control behavior. Contemporary IO differs from traditional psychological operations practiced by nation-states, because the availability of low-cost high technology permits nongovernmental organizations and rogue elements, such as terrorist groups, to deliver influential content of their own as well as facilitates damaging cyber-attacks ("hactivism") on computer networks and infrastructure. As current vice president Dick Cheney once said, such technology has turned third-class powers into first-class threats. Conceived as a textbook by instructors at the Joint Command, Control, and Information Warfare School of the U.S. Joint Forces Staff College and involving IO experts from several countries, this book fills an important gap in the literature by analyzing under one cover the military, technological, and psychological aspects of information operations. The general reader will appreciate the examples taken from recent history that reflect the impact of IO on U.S. foreign policy, military operations, and government organization.
To understand the historical and contemporary context of the CIA/DOD relationship, Major David Oakley draws on secondary sources for his academic research supplemented by primary sources of personal interview with two former Chairmen of the United States Senate Select Committee on Intelligence, interviews with previous and current DOD and CIA leadership, government documents, and written first-person accounts. These primary sources add a new dimension and uniqueness to his research. Although the CIA and DOD relationship expanded significantly following the 9/11 terrorist attacks, its foundation was set 10 years earler in the aftermath of Desert Storm and in the Cold War's twilight glow. During this period, congressional policy pronouncements and organizational changes within institutions increased the communication and liaison partnerships between the CIA and DOD, establishing the foundation for greater interoperability after 1992. These changes established conditions that enabled the blossoming of the relationship since 2001.
Learning With Professionals: Selected Works from the Joint Military Intelligence College is a collection of writings by present or former faculty and students at the Joint Military Intelligence College. The purpose of the book is to provide an academic resource for students, teachers, and practitioners of intelligence. The growth of the field as an academic discipline has been accompanied by a growth in its body of literature, and some of the most significant writings have come from a center of excellence in the field, the Joint Military Intelligence College. Those presented here represent a cross section of subdisciplines, some with a very timely element, some timeless.This product has been reviewed by senior experts from academia and government, and has been approved for unrestricted distribution by the Directorate for Freedom of Information and Security Review, Washington Headquarters Services, Department of Defense.
Description: S. Pub. 108-18. 2003-2004 Official Congressional Directory, 108th Congress, Convened January 7, 2003. Cover title reads: Congressional Directory, 2003-2004, One Hundred Eighth Congress. Spine title reads: 2003-2004 Congressional Directory, 108th Congress. Contains biographies of Senators, members of Congress, and the Judiciary. Also includes committee assignments, maps of Congressional districts, a directory of officials of executive agencies, addresses, telephone and fax numbers, web addresses, and other information. Edge indexed. Item 1004-C.Key Phrases: Senate Publication 108 18, Directories, Congress
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.