Advertisement
mark lowenthal intelligence from secrets to policy: Intelligence: From Secrets to Policy Mark M. Lowenthal, 2012 Details how the intelligence community's history, structure, procedures, and functions affect policy decisions. This edition highlights: changes in the management of US intelligence and the fourth DNI in five years; Obama administration policies; developments in collection and analysis; and the killing of Bin Laden. |
mark lowenthal intelligence from secrets to policy: Intelligence Mark M. Lowenthal, 2016-09-29 Mark M. Lowenthal’s trusted guide is the go-to resource for understanding how the intelligence community’s history, structure, procedures, and functions affect policy decisions. In this Seventh Edition, Lowenthal examines cyber space and the issues it presents to the intelligence community such as defining cyber as a new collection discipline; the implications of the Senate Intelligence Committee’s staff report on enhanced interrogation techniques; the rise of the Islamic State; and the issues surrounding the nuclear agreement with Iran. New sections have been added offering a brief summary of the major laws governing U.S. intelligence today such as domestic intelligence collection, whistleblowers vs. leakers, and the growing field of financial intelligence. |
mark lowenthal intelligence from secrets to policy: Intelligence Mark M. Lowenthal, 2019-10-15 Winner of the 2020 McGuffey Longevity Award from the Textbook & Academic Authors Association (TAA) [The text is] one of the most useful, one-volume, introductory works on intelligence today. [Intelligence] does an excellent job of working through the intricacies of U.S. intelligence. —Richard J. Norton, United States Naval War College Mark M. Lowenthal’s trusted guide is the go-to resource for understanding how the intelligence community’s history, structure, procedures, and functions affect policy decisions. In the fully updated Eighth Edition of Intelligence, the author addresses cyber security and cyber intelligence throughout, expands the coverage of collection, comprehensively updates the chapters on nation-state issues and transnational issues, and looks at foreign intelligence services, both large and small. |
mark lowenthal intelligence from secrets to policy: The Future of Intelligence Mark M. Lowenthal, 2017-08-31 Intelligence is, by definition, a shadowy business. Yet many aspects of this secret world are now more openly analyzed and discussed, a trend which has inevitably prompted lively debate about intelligence gathering and analysis: what should be allowed? What boundaries, if any, should be drawn? And what changes and challenges lie ahead for intelligence activities and agencies? In this compelling book, leading intelligence scholar Mark Lowenthal explores the future of intelligence. There are, he argues, three broad areas – information technology and intelligence collection; analysis; and governance – that indicate the potential for rather dramatic change in the world of intelligence. But whether these important vectors for change will improve how intelligence works or make it more difficult remains to be seen. The only certainty is that intelligence will remain an essential feature of statecraft in our increasingly dangerous world. Drawing on the author's forty years' experience in U.S. intelligence, The Future of Intelligence offers a broad and authoritative starting point for the ongoing debate about what intelligence could be and how it may function in the years ahead. |
mark lowenthal intelligence from secrets to policy: The Five Disciplines of Intelligence Collection Mark M. Lowenthal, Robert M. Clark, 2015-01-14 Leading intelligence experts Mark M. Lowenthal and Robert M. Clark bring you an all new, groundbreaking title. The Five Disciplines of Intelligence Collection describes, in non-technical terms, the definition, history, process, management, and future trends of each intelligence collection source (INT). Authoritative and non-polemical, this book is the perfect teaching tool for classes addressing various types of collection. Chapter authors are past or current senior practitioners of the INT they discuss, providing expert assessment of ways particular types of collection fit within the larger context of the U.S. Intelligence Community. |
mark lowenthal intelligence from secrets to policy: Why Intelligence Fails Robert Jervis, 2010-12-15 The U.S. government spends enormous resources each year on the gathering and analysis of intelligence, yet the history of American foreign policy is littered with missteps and misunderstandings that have resulted from intelligence failures. In Why Intelligence Fails, Robert Jervis examines the politics and psychology of two of the more spectacular intelligence failures in recent memory: the mistaken belief that the regime of the Shah in Iran was secure and stable in 1978, and the claim that Iraq had active WMD programs in 2002. The Iran case is based on a recently declassified report Jervis was commissioned to undertake by CIA thirty years ago and includes memoranda written by CIA officials in response to Jervis's findings. The Iraq case, also grounded in a review of the intelligence community's performance, is based on close readings of both classified and declassified documents, though Jervis's conclusions are entirely supported by evidence that has been declassified. In both cases, Jervis finds not only that intelligence was badly flawed but also that later explanations—analysts were bowing to political pressure and telling the White House what it wanted to hear or were willfully blind—were also incorrect. Proponents of these explanations claimed that initial errors were compounded by groupthink, lack of coordination within the government, and failure to share information. Policy prescriptions, including the recent establishment of a Director of National Intelligence, were supposed to remedy the situation. In Jervis's estimation, neither the explanations nor the prescriptions are adequate. The inferences that intelligence drew were actually quite plausible given the information available. Errors arose, he concludes, from insufficient attention to the ways in which information should be gathered and interpreted, a lack of self-awareness about the factors that led to the judgments, and an organizational culture that failed to probe for weaknesses and explore alternatives. Evaluating the inherent tensions between the methods and aims of intelligence personnel and policymakers from a unique insider's perspective, Jervis forcefully criticizes recent proposals for improving the performance of the intelligence community and discusses ways in which future analysis can be improved. |
mark lowenthal intelligence from secrets to policy: Intelligence and the National Security Strategist Roger Z. George, Robert D. Kline, 2006 Presents students with an anthology of published articles from diverse sources as well as contributions to the study of intelligence. This collection includes perspectives from the history of warfare, views on the evolution of US intelligence, and studies on the balance between the need for information-gathering and the values of a democracy. - publisher. |
mark lowenthal intelligence from secrets to policy: Intelligence and National Security Loch K. Johnson, Loch J. Johnson, James J. Wirtz, 2008 The second edition of Johnson and Wirtz's anthology provides a comprehensive set of readings in the field of intelligence studies. The book spans a wide range of topics, from how the United States gathers and interprets information collected around the world to comparisons of the American intelligence system with the secret agencies of other nations. The text addresses a wide range of material including: (1) the meaning of strategic intelligence; (2) methods of intelligence collection; (3) intelligence analysis; (4) the danger of intelligence politicization; (5) relationships between intelligence officers and the policymakers they serve; (6) covert action; (7) counterintelligence; (8) accountability and civil liberties; (9) the implications of the major intelligence failures in 2001 and 2002 regarding, respectively, the terrorist attacks against the United States and the faulty estimates about weapons of mass destruction in Iraq; and (10) intelligence as practiced in other nations. New to this edition: * A review of the state of intelligence research literature * An interview with former CIA director Richard Helms * The early development of U.S. satellite surveillance * The role of intelligence leaks in the federal government * Improving relations between the producers and consumers of intelligence * The Senate investigation of the Ames spying scandal in the CIA * NSA warrantless wiretaps * Intelligence mistakes leading up to the 9/11 attack * Intelligence failures in the faulty predictions of WMDs in Iraq * Institutional conflicts that contributed to 9/11 failures * The British intelligence failures regarding WMDs in Iraq |
mark lowenthal intelligence from secrets to policy: Silent Warfare Abram N. Shulsky, Gary James Schmitt, 2011 A thoroughly updated revision of the first comprehensive overview of intelligence designed for both the student and the general reader, Silent Warfare is an insider s guide to a shadowy, often misunderstood world. Leading intelligence scholars Abram N. Shulsky and Gary J. Schmitt clearly explain such topics as the principles of collection, analysis, counterintelligence, and covert action, and their interrelationship with policymakers and democratic values. This new edition takes account of the expanding literature in the field of intelligence and deals with the consequences for intelligence of vast recent changes in telecommunication and computer technology the new information age. It also reflects the world s strategic changes since the end of the Cold War. This landmark book provides a valuable framework for understanding today s headlines, as well as the many developments likely to come in the real world of the spy. |
mark lowenthal intelligence from secrets to policy: Intelligence Collection Robert M. Clark, 2013-09-13 This comprehensive book by one of the foremost authorities in the field offers systematic and analytical coverage of the how and why of intelligence collection across its three major stages—the front end (planning), collection, and the back end (processing, exploitation, and dissemination). The book provides a fresh, logical, and easily understandable view of complex collection systems used worldwide. Its ground-breaking organizational approach facilitates understanding and cross-INT collaboration, highlighting the similarities and differences among the collection INTs. The first part of the book explains how the literal INTs—open source, human intelligence, communications intelligence, and cyber collection—work. The second part focuses on nonliteral or technical INTs including imagery, electronic intelligence, and measurements and signatures intelligence. All chapters use a common format based on systems analysis methodology, detailing function, process, and structure of the collection disciplines. The third part is a complete chapter discussing the complexities of collection management in the United States. Rich, full color illustrations accompany the text with examples throughout the book on topics as diverse as battlespace situational awareness, terrorism, weapons proliferation, criminal networks, treaty monitoring, and identity intelligence. |
mark lowenthal intelligence from secrets to policy: Intelligence in an Insecure World Peter Gill, Mark Phythian, 2013-08-27 Over a decade on from the terrorist attacks of 9/11, intelligence continues to be of central importance to the contemporary world. Today there is a growing awareness of the importance of intelligence, and an increasing investment in it, as individuals, groups, organizations and states all seek timely and actionable information in order to increase their sense of security. But what exactly is intelligence? Who seeks to develop it and how? What happens to intelligence once it is produced, and what dilemmas does this generate? How can liberal democracies seek to mitigate problems of intelligence, and what do we mean by “intelligence failure?”’ In a fully revised and expanded new edition of their classic guide to the field, Peter Gill and Mark Phythian explore these and other questions. Together they set out a comprehensive framework for the study of intelligence, discussing how ‘intelligence’ can best be understood, how it is collected, analysed, disseminated and acted upon, how it raises ethical problems, and how and why it fails. Drawing on a range of contemporary examples, Intelligence in an Insecure World is an authoritative and accessible guide to a rapidly expanding area of enquiry - one which everyone has an interest in understanding. |
mark lowenthal intelligence from secrets to policy: The Oxford Handbook of National Security Intelligence Loch K. Johnson, 2010-03-12 The Oxford Handbook of National Security Intelligence is a state-of-the-art work on intelligence and national security. Edited by Loch Johnson, one of the world's leading authorities on the subject, the handbook examines the topic in full, beginning with an examination of the major theories of intelligence. It then shifts its focus to how intelligence agencies operate, how they collect information from around the world, the problems that come with transforming raw information into credible analysis, and the difficulties in disseminating intelligence to policymakers. It also considers the balance between secrecy and public accountability, and the ethical dilemmas that covert and counterintelligence operations routinely present to intelligence agencies. Throughout, contributors factor in broader historical and political contexts that are integral to understanding how intelligence agencies function in our information-dominated age. |
mark lowenthal intelligence from secrets to policy: Enemies of Intelligence Richard K. Betts, 2009 Combining study with experience, Richard K. Betts draws on three decades of work within the U.S. intelligence community to illuminate the paradoxes and problems that frustrate the intelligence process. Unlike America's efforts to improve its defenses against natural disasters, strengthening its strategic assessment capabilities means outwitting crafty enemies who operate beyond U.S. borders. It also requires looking within to the organizational and political dynamics of collecting information and determining its implications for policy. Betts outlines key strategies for better intelligence gathering and assessment. He describes how fixing one malfunction can create another; in what ways expertise can be both a vital tool and a source of error and misjudgment; the pitfalls of always striving for accuracy in intelligence, which in some cases can render it worthless; the danger, though unavoidable, of politicizing intelligence; and the issue of secrecy--when it is excessive, when it is insufficient, and how limiting privacy can in fact protect civil liberties. Grounding his arguments in extensive theory and policy analysis, Betts takes a comprehensive and realistic look at the convergence of knowledge and power in facing the intelligence challenges of the twenty-first century. |
mark lowenthal intelligence from secrets to policy: The Pueblo Incident Mitchell B. Lerner, 2002 Mitchell Lerner now examines for the first time the details of this crisis and uses the incident as a window through which to better understand the limitations of American foreign policy during the Cold War. Drawing on thousands of pages of recently declassified documents from President Lyndon Johnson's administration, along with dozens of interviews with those involved, Lerner provides the most complete and accurate account of the Pueblo incident to date.--BOOK JACKET. |
mark lowenthal intelligence from secrets to policy: Intelligence and Information Policy for National Security Jan Goldman, Susan Maret, 2016 Building on Goldman's Words of Intelligence and Maret's On Their Own Terms this is a one-stop reference tool for anyone studying and working in intelligence, security, and information policy. This comprehensive resource defines key terms of the theoretical, conceptual, and organizational aspects of intelligence and national security information policy. It explains security classifications, surveillance, risk, technology, as well as intelligence operations, strategies, boards and organizations, and methodologies. It also defines terms created by the U.S. legislative, regulatory, and policy process, and routinized by various branches of the U.S. government. These terms pertain to federal procedures, policies, and practices involving the information life cycle, national security controls over information, and collection and analysis of intelligence information. This work is intended for intelligence students and professionals at all levels, as well as information science students dealing with such issues as the Freedom of Information Act. |
mark lowenthal intelligence from secrets to policy: The U.S. Intelligence Community Jeffrey T Richelson, 2018-05-04 The role of intelligence in US government operations has changed dramatically and is now more critical than ever to domestic security and foreign policy. This authoritative and highly researched book written by Jeffrey T. Richelson provides a detailed overview of America's vast intelligence empire, from its organizations and operations to its management structure. Drawing from a multitude of sources, including hundreds of official documents, The US Intelligence Community allows students to understand the full scope of intelligence organizations and activities, and gives valuable support to policymakers and military operations. The seventh edition has been fully revised to include a new chapter on the major issues confronting the intelligence community, including secrecy and leaks, domestic spying, and congressional oversight, as well as revamped chapters on signals intelligence and cyber collection, geospatial intelligence, and open sources. The inclusion of more maps, tables and photos, as well as electronic briefing books on the book's Web site, makes The US Intelligence Community an even more valuable and engaging resource for students. |
mark lowenthal intelligence from secrets to policy: Intelligence in the National Security Enterprise Roger Z. George, 2020-02-03 This textbook introduces students to the critical role of the US intelligence community within the wider national security decision-making and political process. Intelligence in the National Security Enterprise defines what intelligence is and what intelligence agencies do, but the emphasis is on showing how intelligence serves the policymaker. Roger Z. George draws on his thirty-year CIA career and more than a decade of teaching at both the undergraduate and graduate level to reveal the real world of intelligence. Intelligence support is examined from a variety of perspectives to include providing strategic intelligence, warning, daily tactical support to policy actions as well as covert action. The book includes useful features for students and instructors such as excerpts and links to primary-source documents, suggestions for further reading, and a glossary. |
mark lowenthal intelligence from secrets to policy: Cases in Intelligence Analysis Sarah Miller Beebe, Randolph H. Pherson, 2014-04-28 In their Second Edition of Cases in Intelligence Analysis: Structured Analytic Techniques in Action, accomplished instructors and intelligence practitioners Sarah Miller Beebe and Randolph H. Pherson offer robust, class-tested cases studies of events in foreign intelligence, counterintelligence, terrorism, homeland security, law enforcement, and decision-making support. Designed to give analysts-in-training an opportunity to apply structured analytic techniques and tackle real-life problems, each turnkey case delivers a captivating narrative, discussion questions, recommended readings, and a series of engaging analytic exercises. |
mark lowenthal intelligence from secrets to policy: Fair Play James M. Olson, 2011 In the high-stakes world of spying, do the ends justify the means? |
mark lowenthal intelligence from secrets to policy: Fixing the Facts Joshua Rovner, 2011-07-26 What is the role of intelligence agencies in strategy and policy? How do policymakers use (or misuse) intelligence estimates? When do intelligence-policy relations work best? How do intelligence-policy failures influence threat assessment, military strategy, and foreign policy? These questions are at the heart of recent national security controversies, including the 9/11 attacks and the war in Iraq. In both cases the relationship between intelligence and policy broke down—with disastrous consequences. In Fixing the Facts, Joshua Rovner explores the complex interaction between intelligence and policy and shines a spotlight on the problem of politicization. Major episodes in the history of American foreign policy have been closely tied to the manipulation of intelligence estimates. Rovner describes how the Johnson administration dealt with the intelligence community during the Vietnam War; how President Nixon and President Ford politicized estimates on the Soviet Union; and how pressure from the George W. Bush administration contributed to flawed intelligence on Iraq. He also compares the U.S. case with the British experience between 1998 and 2003, and demonstrates that high-profile government inquiries in both countries were fundamentally wrong about what happened before the war. |
mark lowenthal intelligence from secrets to policy: Communicating with Intelligence James S. Major, 2012 |
mark lowenthal intelligence from secrets to policy: Reducing Uncertainty Thomas Fingar, 2011-07-20 This book describes what Intelligence Community (IC) analysts do, how they do it, and how they are affected by the political context that shapes, uses, and sometimes abuses their output. It is written by a 25-year intelligence professional. |
mark lowenthal intelligence from secrets to policy: America′s Foreign Policy Toolkit Charles A. Stevenson, 2012-10-02 How is foreign policy in the United States really crafted? Who does the work? How are the various activites of the many key participants coordinated and controlled? In America′s Foreign Policy Toolkit: Key Institutions and Processes, Charles A. Stevenson identifies for students what the key foreign policy tools are, clarifies which tools are best for which tasks, describes the factors that constrain or push how they′re used, and provides fresh insight into the myriad challenges facing national security decisionmakers. Written in an engaging style with case examples drawn from behind the scenes, Stevenson brings depth and dimension to the sophisticated pathways and instruments of American foreign policy, from the State Department to the intelligence agencies to the Commerce Department and beyond. In this brief text for American foreign policy and national security courses, Stevenson focuses on the institutions and processes of foreign policy, beginning with a look at the historical context and then looking in turn at the tools available to the president, congress, and the shared budgetary tools. The following part, Using the Tools, looks at the diplomatic, economic, military, intelligence, homeland security, and international institutions instruments. Stevenson concludes with chapters that consider the important constraints and limitation of the U.S. toolkit. Each chapter ends with a case study that allows readers to connect the theory of the toolkit with the realities of decisionmaking. Highlights of the text′s coverage include: A sustained analysis of the U.S. Constitution as a response to security threats in the 1780s, providing a strong historical foundation on and springboard for discussion of this basic document in terms of national security powers; Comprehensive coverage of the congressional role overseeing all other policy instruments, showing Congress as an active player in all aspects of foreign policy; Analysis of the full spectrum of agencies and activities involved in foreign economic policy, covering the numerous organizations involved in foreign economic policy, the weak coordinating mechanisms, and the various processes (sanctions, trade, foreign assistance, direct investment) used as policy tools; A consistent framework for analyzing each instrument (authorities, capabilities, personnel, culture, internal factions, and the role of Congress), which makes comparative analyses of U.S. institutions simple and direct; An illuminating overview of the budget process through both the executive and legislative branches, acknowledging the budget process as a shared policy tool, with conflict and feedback, rather than as a linear process; A discussion of homeland security instruments and international organizations used as policy tools, highlighting the relevance of these new and often overlooked instruments; and A survey of recommendations for reform and the difficulties involved, providing possible explanations of foreign policy failures and alternative organizations and processes. This must-have text for courses on American foreign policy will be a crucial reference that students will keep on the shelf long after the last class. |
mark lowenthal intelligence from secrets to policy: Critical Thinking for Strategic Intelligence Katherine Hibbs Pherson, Randolph H. Pherson, 2020-08-14 With Critical Thinking for Strategic Intelligence, Katherine Hibbs Pherson and Randolph H. Pherson have updated their highly regarded, easy-to-use handbook for developing core critical thinking skills and analytic techniques. This indispensable text is framed around 20 key questions that all analysts must ask themselves as they prepare to conduct research, generate hypotheses, evaluate sources of information, draft papers, and ultimately present analysis, including: How do I get started? Where is the information I need? What is my argument? How do I convey my message effectively? The Third Edition includes suggested best practices for dealing with digital disinformation, politicization, and AI. Drawing upon their years of teaching and analytic experience, Pherson and Pherson provide a useful introduction to skills that are essential within the intelligence community. |
mark lowenthal intelligence from secrets to policy: U.S. Intelligence: Evolution and Anatomy Mark M. Lowenthal, 1992-08-21 No major twentieth-century power has so short a history of national intelligence agencies or activities as does the United States, and few have been as public or as tumultuous. A major debate has now opened over the future structure, size, and role of U.S. intelligence in the aftermath of the cold war. This unique and fully updated book is a history of the U.S. intelligence community--as well as a detailed description of the organization and function of the major components of the community as they existed at the beginning of 1992. A welcome and timely update of one of the most concise and objective guides to the history and structure of U.S. intelligence. Representative Dave McCurdy, Chairman, Permanent Select Committee on Intelligence, U.S. House of Representatives The history of the intelligence community can be divided into three distinct periods. From its creation in 1947 until the revelations and investigations of 1974-1975, the intelligence community operated under fairly broad grants of authority based on trust. After the Nixon administration, a previously dormant Congress was galvanized to write new oversight provisions and also took on a greater role as a shaper and consumer of intelligence. With the collapse of the Soviet Union and the end of the cold war in 1991, the intelligence community found its role and even its necessity questioned due to the sudden absence of its major target. Lowenthal emphasizes that a competent and challenged intelligence capability is an essential part of the U.S. national security structure, despite the status of external events or threats. The major requirement of this structure, he says, is providing timely, objective, and pointed analysis to policymakers across a wide range of issues. |
mark lowenthal intelligence from secrets to policy: The Art of Intelligence Henry A. Crumpton, 2012-05-14 “A lively account . . . combines the derring-do of old-fashioned spycraft with thoughtful meditations on the future of warfare and intelligence work. It deserves to be read.” —The Washington Post “Offer[s] an exceptionally deep glimpse into the CIA’s counterterrorism operations in the last decade of the twentieth century.” —Harper’s A legendary CIA spy and counterterrorism expert tells the spellbinding story of his high-risk, action-packed career Revelatory and groundbreaking, The Art of Intelligence will change the way people view the CIA, domestic and foreign intelligence, and international terrorism. Henry A. “Hank” Crumpton, a twenty-four-year veteran of the CIA’s Clandestine Service, offers a thrilling account that delivers profound lessons about what it means to serve as an honorable spy. From CIA recruiting missions in Africa to pioneering new programs like the UAV Predator, from running post–9/11 missions in Afghanistan to heading up all clandestine CIA operations in the United States, Crumpton chronicles his role—in the battlefield and in the Oval Office—in transforming the way America wages war and sheds light on issues of domestic espionage. |
mark lowenthal intelligence from secrets to policy: International Law Malcolm N. Shaw, 2014-09-18 This new edition of International Law confirms the text's status as the definitive book on the subject. Combining both his expertise as academic and practitioner, Malcolm Shaw's survey of the subject motivates and challenges both student and professional. By offering an unbeatable combination of clarity of expression and academic rigour, he ensures both understanding and critical analysis in an engaging and authoritative style. The text has been updated throughout to reflect recent case law and treaty developments. It retains the detailed references which encourage and assist further reading and study. |
mark lowenthal intelligence from secrets to policy: AFIO's Guide to the Study of Intelligence Peter C. Oleson, Stewart A. Baker, Joshua M. Bart, Eleni C. Braat, James B. Bruce, Ronald L. Burgess, Jr., Stephen H. Campbell, David L. Charney, Robert M. Clark, Jonathan D. Clemente, Elbridge Colby, José Medina González Dávila, Lawrence D. Dietz, Robert E. Dupré, Huw Dylan, Thomas Fingar, Rowena Rege Fischer, Jennifer H. Fisher, Carl W. Ford, Jr., Michael Fredholm, Arthur E. Gerringer, Tobias T. Gibson, Edward J. Glantz, Jan Goldman, Michael S. Goodman, Karl O. Haigler, Philippe Hayez, Jan P. Herring, G. Philip Hughes, John Alan Irvin, Stéphane J. Lefebvre, Jeremy Jez Littlewood, Mark M. Lowenthal, N. John MacGaffin, 3rd, Stephen Patrick Marrin, Hedwige Regnault de Maulmin, Robert A. McDonald, John J. McGonagle, Jr., Edward F. Mickolus, Robert A. Mirabello, Philip Mudd, William M. Nolte, Robert A. Norton, Stefania Paladini, Mirielle M. Petitjean, Samuel Eugene Poteat, Douglas R. Price, Robert W. Pringle, Edward Mozley Roche, Frederick W. Rustmann, Jr., Ernesto J. Sanchez, John R. Sano, Florian Schaurer, Rose Mary Sheldon, Robert Anthony Smith, Thomas R. Spencer, Jr., William C. Spracher, James E. Steiner, Jan Störger, Mark E. Stout, Michael J. Sulick, John F. Sullivan, Adam D. M. Svendsen, Michelle K. Van Cleave, Carl Anthony Wege, Gary E. Weir, Douglas L. Wheeler, Jon A. Wiant, 2016-10-15 The goal of the Guide to the Study of Intelligence is to help instructors teach about the field of intelligence. This includes... undergraduate and graduate professors of History, Political Science, International Relations, Security Studies, and related topics, especially those with no or limited professional experience in the field. The assumption is that none of the... instructors is an expert in the topic of intelligence. Even those who are former practitioners are likely to have only a limited knowledge of the very broad field of intelligence, as most spend their careers in one or two agencies at most and may have focused only on collection or analysis of intelligence or support to those activities.In each of the articles the intent is to identify the important learning points for students and the materials that an instructor can use to teach. This includes books, articles, and websites... |
mark lowenthal intelligence from secrets to policy: Analyzing Intelligence Roger Z. George, James B. Bruce, 2014-02-26 Analyzing Intelligence, now in a revised and extensively updated second edition, assesses the state of the profession of intelligence analysis from the practitioner's point of view. The contributors—most of whom have held senior positions in the US intelligence community—review the evolution of the field, the rise of new challenges, pitfalls in analysis, and the lessons from new training and techniques designed to deal with 21st century national security problems. This second edition updates this indispensable book with new chapters that highlight advances in applying more analytic rigor to analysis, along with expertise-building, training, and professional development. New chapters by practitioners broaden the original volume’s discussion of the analyst-policymaker relationship by addressing analytic support to the military customer as well as by demonstrating how structured analysis can benefit military commanders on the battlefield. Analyzing Intelligence is written for national security practitioners such as producers and users of intelligence, as well as for scholars and students seeking to understand the nature and role of intelligence analysis, its strengths and weaknesses, and steps that can improve it and lead it to a more recognizable profession. The most comprehensive and up-to-date volume on professional intelligence analysis as practiced in the US Government, Analyzing Intelligence is essential reading for practitioners and users of intelligence analysis, as well as for students and scholars in security studies and related fields. |
mark lowenthal intelligence from secrets to policy: Intelligence Analysis for Tomorrow National Research Council, Division of Behavioral and Social Sciences and Education, Board on Behavioral, Cognitive, and Sensory Sciences, Committee on Behavioral and Social Science Research to Improve Intelligence Analysis for National Security, 2011-04-08 The intelligence community (IC) plays an essential role in the national security of the United States. Decision makers rely on IC analyses and predictions to reduce uncertainty and to provide warnings about everything from international diplomatic relations to overseas conflicts. In today's complex and rapidly changing world, it is more important than ever that analytic products be accurate and timely. Recognizing that need, the IC has been actively seeking ways to improve its performance and expand its capabilities. In 2008, the Office of the Director of National Intelligence (ODNI) asked the National Research Council (NRC) to establish a committee to synthesize and assess evidence from the behavioral and social sciences relevant to analytic methods and their potential application for the U.S. intelligence community. In Intelligence Analysis for Tomorrow: Advances from the Behavioral and Social Sciences, the NRC offers the Director of National Intelligence (DNI) recommendations to address many of the IC's challenges. Intelligence Analysis for Tomorrow asserts that one of the most important things that the IC can learn from the behavioral and social sciences is how to characterize and evaluate its analytic assumptions, methods, technologies, and management practices. Behavioral and social scientific knowledge can help the IC to understand and improve all phases of the analytic cycle: how to recruit, select, train, and motivate analysts; how to master and deploy the most suitable analytic methods; how to organize the day-to-day work of analysts, as individuals and teams; and how to communicate with its customers. The report makes five broad recommendations which offer practical ways to apply the behavioral and social sciences, which will bring the IC substantial immediate and longer-term benefits with modest costs and minimal disruption. |
mark lowenthal intelligence from secrets to policy: The National Security Enterprise Roger Z. George, Harvey Rishikof, 2017-07-01 This second edition of The National Security Enterprise provides practitioners’ insights into the operation, missions, and organizational cultures of the principal national security agencies and other institutions that shape the US national security decision-making process. Unlike some textbooks on American foreign policy, it offers analysis from insiders who have worked at the National Security Council, the State and Defense Departments, the intelligence community, and the other critical government entities. The book explains how organizational missions and cultures create the labyrinth in which a coherent national security policy must be fashioned. Understanding and appreciating these organizations and their cultures is essential for formulating and implementing it. Taking into account the changes introduced by the Obama administration, the second edition includes four new or entirely revised chapters (Congress, Department of Homeland Security, Treasury, and USAID) and updates to the text throughout. It covers changes instituted since the first edition was published in 2011, implications of the government campaign to prosecute leaks, and lessons learned from more than a decade of war in Afghanistan and Iraq. This up-to-date book will appeal to students of US national security and foreign policy as well as career policymakers. |
mark lowenthal intelligence from secrets to policy: The Main Enemy Milt Bearden, James Risen, 2003-05-06 A landmark collaboration between a thirty-year veteran of the CIA and a Pulitzer Prize–winning journalist, The Main Enemy is the dramatic inside story of the CIA-KGB spy wars, told through the actions of the men who fought them. Based on hundreds of interviews with operatives from both sides, The Main Enemy puts us inside the heads of CIA officers as they dodge surveillance and walk into violent ambushes in Moscow. This is the story of the generation of spies who came of age in the shadow of the Cuban missile crisis and rose through the ranks to run the CIA and KGB in the last days of the Cold War. The clandestine operations they masterminded took them from the sewers of Moscow to the back streets of Baghdad, from Cairo and Havana to Prague and Berlin, but the action centers on Washington, starting in the infamous Year of the Spy—when, one by one, the CIA’s agents in Moscow began to be killed, up through to the very last man. Behind the scenes with the CIA's covert operations in Afghanistan, Milt Bearden led America to victory in the secret war against the Soviets, and for the first time he reveals here what he did and whom America backed, and why. Bearden was called back to Washington after the Soviets withdrew from Afghanistan and was made chief of the Soviet/East Euro-pean Division—just in time to witness the fall of the Berlin Wall, the revolutions that swept across Eastern Europe, and the implosion of the Soviet Union. Laced with startling revelations—about fail-safe top-secret back channels between the CIA and KGB, double and triple agents, covert operations in Berlin and Prague, and the fateful autumn of 1989—The Main Enemy is history at its action-packed best. |
mark lowenthal intelligence from secrets to policy: The Origins of FBI Counterintelligence Raymond J. Batvinis, 2007 Examines the United States- efforts to create and project a strong counterintelligence capability both at home and abroad during the 1930s. Several federal agencies, governmental departments, and military divisions vied for that role before it was eventually handed to the FBI. The author, a former FBI agent, chronicles the evolution, achievements, and failure of that effort. |
mark lowenthal intelligence from secrets to policy: Reshaping National Intelligence for an Age of Information Gregory F. Treverton, 2003-03-03 Gregory Treverton, former US National Intelligence council head, demonstrates how government intelligence must change. |
mark lowenthal intelligence from secrets to policy: Secret History, Second Edition Nick Cullather, 2006-10-09 The first edition of this book, published in 1999, was well-received, but interest in it has surged in recent years. It chronicles an early example of “regime change” that was based on a flawed interpretation of intelligence and proclaimed a success even as its mistakes were becoming clear. Since 1999, a number of documents relating to the CIA’s activities in Guatemala have been declassified, and a truth and reconciliation process has unearthed other reports, speeches, and writings that shed more light on the role of the United States. For this edition, the author has selected and annotated twenty-one documents for a new documentary Appendix, including President Clinton’s apology to the people of Guatemala. |
mark lowenthal intelligence from secrets to policy: The Art of Intelligence Rubén Arcos, William J. Lahneman, 2019-06-12 The only professional resource of its kind to offer in one volume original simulations, exercises, and games designed by academics and intelligence professionals from several countries. These interactive learning tools add immeasurable value to students’ understanding of the intelligence enterprise, and the various contributors provide an international perspective to the topics and approached. For use in undergraduate and graduate courses in intelligence, intel analysis, business intelligence, and various other national security policy courses offered in universities and government training facilities with the need for training in analytic principles and tradecraft. |
mark lowenthal intelligence from secrets to policy: The NICE Cyber Security Framework Izzat Alsmadi, 2019-01-24 This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework. Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more |
mark lowenthal intelligence from secrets to policy: Intelligence Theory Peter Gill, Stephen Marrin, Mark Phythian, 2008-08-12 This edited volume brings together a range of essays by individuals who are centrally involved in the debate about the role and utility of theory in intelligence studies. The volume includes both classic essays and new articles that critically analyse some key issues: strategic intelligence, the place of international relations theory, theories of |
mark lowenthal intelligence from secrets to policy: Social Policy, Public Policy Meredith Edwards, Cosmo Howard, Robin Miller, 2020-07-22 'Seldom has a senior public servant been so candid. As a key policymaker, Meredith Edwards takes us inside the process to reveal how we get the policies the affect so much of our lives.' - Paul Kelly, International Editor, The Australian 'This innovative and important volume, unique in the policy literature, provides ideas and case studies of interest to everyone who cares about the quality of Australian public policy. It will be an indispensable guide to past choices, and its lessons should help shape future Australian social policy decisions.' - Dr Glyn Davis, co-author of The Australian Policy Handbook How are social policies conceived, developed and put into practice? Based on four case studies of social policy reforms in which the author was a major player (the Child Support Scheme, AUSTUDY, the Higher Education Contribution scheme (HECS) and long-term employment policies presented as 'Working Nation') Social Policy, Public Policy provides insights into what is often otherwise seen as a 'black box' on how policy advice occurs. Meredith Edwards' personal experience, revealed in extracts from her journal, provides a picture of what social policy participants actually do, something on which too little has been written. Questions addressed in the book include: How was the policy problem identified and articulated and by whom? What were the key ingredients in policy analysis? When did consultation occur and in what form? How was the policy decision arrived at? What were the events between decision and implementation? And what evaluation processes occurred? Social Policy, Public Policy is essential reading for all students of public policy and policy advisers. |
mark lowenthal intelligence from secrets to policy: Witness Whittaker Chambers, 2014-12-09 #1 New York Times bestseller for 13 consecutive weeks! As long as humanity speaks of virtue and dreams of freedom, the life and writings of Whittaker Chambers will ennoble and inspire. - PRESIDENT RONALD REAGAN One of the dozen or so indispensable books of the century... - GEORGE F. WILL Witness changed my worldview, my philosophical perceptions, and, without exaggeration, my life. - ROBERT D. NOVAK, from his Foreward Chambers has written one of the really significant American autobiographies. When some future Plutarch writes his American Live, he will find in Chambers penetrating and terrible insights into America in the early twentieth century. - ARTHUR SCHLESINGER JR. Chambers had a gift for language....to call Chambers an activist or Witness a political event is to say Dostoevsky was a criminologist or Crime and Punishment a morality tract. - WASHINGTON POST Chambers was not just the witness against Alger Hiss, but was also one of th articulators of the modern conservative philosophy, a philosophy that has something to do with restoring the spiritual values of politics. - SAM TANENHAUS, author of Whittaker Chambers One of the few indispensable autobiographies ever written by an American - and one of the best written, too. - HILTON KRAMER, The New Criterion First published in 1952, Witness is the true story of Soviet spies in America and the trial that captivated a nation. Part literary effort, part philosophical treatise, this intriguing autobiography recounts the famous Alger Hiss case and reveals much more. Chambers' worldview and his belief that man without mysticism is a monster went on to help make political conservatism a national force. Regnery History's Cold War Classics edition is the most comprehensive version of Witness ever published, featuring forewords collected from all previous editions, including discussions from luminaries William F. Buckley Jr., Robert D. Novak, Milton Hindus, and Alfred S. Regnery. |
Mark 1 NIV - John the Baptist Prepares the Way - The - Bible Gateway
Mark 1:40 The Greek word traditionally translated leprosy was used for various diseases affecting the skin.
Gospel of Mark - Wikipedia
The Gospel of Mark[a] is the second of the four canonical Gospels and one of the three synoptic Gospels. It tells of the ministry of Jesus from his baptism by John the Baptist to his death, the …
Mark: The Gospel According to Mark - Bible Hub
(Matthew 21:18–22; Mark 11:12–14) 20 As they were walking back in the morning, they saw the fig tree withered from its roots. 21 Peter remembered it and said, “Look, Rabbi! The fig tree …
Mark the Evangelist - Wikipedia
Mark the Evangelist [a] (Koinē Greek: Μᾶρκος, romanized: Mârkos), also known as John Mark (Koinē Greek: Ἰωάννης Μᾶρκος, romanized: Iōánnēs Mârkos; Aramaic: ܝܘܚܢܢ, romanized: …
Book of Mark - Read, Study Bible Verses Online
According to early church tradition, Mark was written "in the regions of Italy" (Anti-Marcionite Prologue) or, more specifically, in Rome (Irenaeus; Clement of Alexandria). These same …
MARK Definition & Meaning - Merriam-Webster
: an early Jewish Christian traditionally identified as the writer of the Gospel of Mark. called also John Mark
MARK CHAPTER 1 KJV - King James Bible Online
As to Christ's temptation, Mark notices his being in the wilderness and that he was with the wild beasts. It was an instance of his Father's care of him, which encouraged him the more that his …
Mark, THE GOSPEL ACCORDING TO MARK - USCCB
Jesus is the Son whom God has sent to rescue humanity by serving and by sacrificing his life (Mk 10:45). The opening verse about good news in Mark (Mk 1:1) serves as a title for the entire …
Mark - Wikipedia
A mark used in lieu of a signature when the signatory is incapable of signing their name.
Mark 1 - Bible Hub
9 In those days Jesus came from Nazareth in Galilee and was baptized by John in the Jordan. 10 As soon as Jesus came up out of the water, He saw g the heavens breaking open and the …
Mark 1 NIV - John the Baptist Prepares the Way - The - Bible Gateway
Mark 1:40 The Greek word traditionally translated leprosy was used for various diseases affecting the skin.
Gospel of Mark - Wikipedia
The Gospel of Mark[a] is the second of the four canonical Gospels and one of the three synoptic Gospels. It tells of the ministry of Jesus from his baptism by John the Baptist to his death, the …
Mark: The Gospel According to Mark - Bible Hub
(Matthew 21:18–22; Mark 11:12–14) 20 As they were walking back in the morning, they saw the fig tree withered from its roots. 21 Peter remembered it and said, “Look, Rabbi! The fig tree You …
Mark the Evangelist - Wikipedia
Mark the Evangelist [a] (Koinē Greek: Μᾶρκος, romanized: Mârkos), also known as John Mark (Koinē Greek: Ἰωάννης Μᾶρκος, romanized: Iōánnēs Mârkos; Aramaic: ܝܘܚܢܢ, romanized: …
Book of Mark - Read, Study Bible Verses Online
According to early church tradition, Mark was written "in the regions of Italy" (Anti-Marcionite Prologue) or, more specifically, in Rome (Irenaeus; Clement of Alexandria). These same authors …
MARK Definition & Meaning - Merriam-Webster
: an early Jewish Christian traditionally identified as the writer of the Gospel of Mark. called also John Mark
MARK CHAPTER 1 KJV - King James Bible Online
As to Christ's temptation, Mark notices his being in the wilderness and that he was with the wild beasts. It was an instance of his Father's care of him, which encouraged him the more that his …
Mark, THE GOSPEL ACCORDING TO MARK - USCCB
Jesus is the Son whom God has sent to rescue humanity by serving and by sacrificing his life (Mk 10:45). The opening verse about good news in Mark (Mk 1:1) serves as a title for the entire book. …
Mark - Wikipedia
A mark used in lieu of a signature when the signatory is incapable of signing their name.
Mark 1 - Bible Hub
9 In those days Jesus came from Nazareth in Galilee and was baptized by John in the Jordan. 10 As soon as Jesus came up out of the water, He saw g the heavens breaking open and the Spirit …