Historical Dictionary of United States Intelligence


Book Description

While the United States has had some kind of intelligence capability throughout its history, its intelligence apparatus is young, dating only to the period immediately after World War II. Yet, in that short a time, it has undergone enormous changes—from the labor-intensive espionage and covert action establishment of the 1950s to a modern enterprise that relies heavily on electronic data, technology, satellites, airborne collection platforms, and unmanned aerial vehicles, to name a few. This second edition covers the history of United States intelligence, and includes several key features: Chronology Introductory essay Appendixes Bibliography Over 600 cross-referenced entries on key events, issues, people, operations, laws, regulations This book is an excellent access point for members of the intelligence community; students, scholars, and historians; legal experts; and general readers wanting to know more about the history of U.S. intelligence.




Intelligence


Book Description

Mark M. Lowenthal’s trusted guide is the go-to resource for understanding how the intelligence community’s history, structure, procedures, and functions affect policy decisions. In this Seventh Edition, Lowenthal examines cyber space and the issues it presents to the intelligence community such as defining cyber as a new collection discipline; the implications of the Senate Intelligence Committee’s staff report on enhanced interrogation techniques; the rise of the Islamic State; and the issues surrounding the nuclear agreement with Iran. New sections have been added offering a brief summary of the major laws governing U.S. intelligence today such as domestic intelligence collection, whistleblowers vs. leakers, and the growing field of financial intelligence.







Transforming US Intelligence for Irregular War


Book Description

When Joint Special Operations Command deployed Task Force 714 to Iraq in 2003, it faced an adversary unlike any it had previously encountered: al-Qaeda in Iraq (AQI). AQI’s organization into multiple, independent networks and its application of Information Age technologies allowed it to wage war across a vast landscape. To meet this unique threat, TF 714 developed the intelligence capacity to operate inside those networks, and in the words of commander Gen. Stanley McChrystal, USA (Ret.) “claw the guts out of AQI.” In Transforming US Intelligence for Irregular War, Richard H. Shultz Jr. provides a broad discussion of the role of intelligence in combatting nonstate militants and revisits this moment of innovation during the Iraq War, showing how the defense and intelligence communities can adapt to new and evolving foes. Shultz tells the story of how TF 714 partnered with US intelligence agencies to dismantle AQI’s secret networks by eliminating many of its key leaders. He also reveals how TF 714 altered its methods and practices of intelligence collection, intelligence analysis, and covert paramilitary operations to suppress AQI’s growing insurgency and, ultimately, destroy its networked infrastructure. TF 714 remains an exemplar of successful organizational learning and adaptation in the midst of modern warfare. By examining its innovations, Shultz makes a compelling case for intelligence leading the way in future campaigns against nonstate armed groups.




Intelligence and the State


Book Description

In the eighty years since Pearl Harbor, the United States has developed a professional intelligence community that is far more effective than most people acknowledge--in part because only intelligence failures see the light of day, while successful collection and analysis remain secret for decades. Intelligence and the State explores the relationship between the community tasked to research and assess intelligence and the national decision makers it serves. The book argues that in order to accept intelligence as a profession, it must be viewed as a non-partisan resource to assist key players in understanding foreign societies and leaders. Those who review these classified findings are sometimes so invested in their preferred policy outcomes that they refuse to accept information that conflicts with preconceived notions. Rather than demanding that intelligence evaluations conform to administration policies, a wise executive should welcome a source of information that has not "drunk the Kool-Aid" by supporting a specific policy decision. Jonathan M. House offers a brief overview of the nature of national intelligence, and especially of the potential for misperception and misunderstanding on the part of executives and analysts. Furthermore, House examines the rise of intelligence organizations first in Europe and then in the United States. In those regions fear of domestic subversion and radicalism drove the need for foreign surveillance. This perception of a domestic threat tempted policy makers and intelligence officers alike to engage in covert action and other policy-based, partisan activities that colored their understanding of their adversaries. Such biases go far to explain the inability of Nazi Germany and the Soviet Union to predict and deal effectively with their opponents. The development of American agencies and their efforts differed to some degree from these European precedents but experienced some of the same problems as the Europeans, especially during the early decades of the Cold War. By now, however, the intelligence community has become a stable and effective part of the national security structure. House concludes with a historical examination of familiar instances in which intelligence allegedly failed to warn national leaders of looming attacks, ranging from the 1941 German invasion of the USSR to the Arab surprise attack on Israel in 1973.




Bytes, Bombs, and Spies


Book Description

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently: A computer virus is unleashed that destroys centrifuges in Iran, slowing that country’s attempt to build a nuclear weapon. ISIS, which has made the internet the backbone of its terror operations, finds its network-based command and control systems are overwhelmed in a cyber attack. A number of North Korean ballistic missiles fail on launch, reportedly because their systems were compromised by a cyber campaign. Offensive cyber operations like these have become important components of U.S. defense strategy and their role will grow larger. But just what offensive cyber weapons are and how they could be used remains clouded by secrecy. This new volume by Amy Zegart and Herb Lin is a groundbreaking discussion and exploration of cyber weapons with a focus on their strategic dimensions. It brings together many of the leading specialists in the field to provide new and incisive analysis of what former CIA director Michael Hayden has called “digital combat power” and how the United States should incorporate that power into its national security strategy.




Intelligence: From Secrets to Policy


Book Description

Details how the intelligence community's history, structure, procedures, and functions affect policy decisions. This edition highlights: changes in the management of US intelligence and the fourth DNI in five years; Obama administration policies; developments in collection and analysis; and the killing of Bin Laden.




Improving Intelligence Analysis


Book Description

This book on intelligence analysis written by intelligence expert Dr. Stephen Marrin argues that scholarship can play a valuable role in improving intelligence analysis. Improving intelligence analysis requires bridging the gap between scholarship and practice. Compared to the more established academic disciplines of political science and international relations, intelligence studies scholarship is generally quite relevant to practice. Yet a substantial gap exists nonetheless. Even though there are many intelligence analysts, very few of them are aware of the various writings on intelligence analysis which could help them improve their own processes and products. If the gap between scholarship and practice were to be bridged, practitioners would be able to access and exploit the literature in order to acquire new ways to think about, frame, conceptualize, and improve the analytic process and the resulting product. This volume contributes to the broader discussion regarding mechanisms and methods for improving intelligence analysis processes and products. It synthesizes these articles into a coherent whole, linking them together through common themes, and emphasizes the broader vision of intelligence analysis in the introduction and conclusion chapters. The book will be of great interest to students of intelligence studies, strategic studies, US national security, US foreign policy, security studies and political science in general,as well as professional intelligence analysts and managers.