Vigilant State 2 COLLECTION INTELLIGENCE. 1. Strategic Revolutions.

Slides:



Advertisements
Similar presentations
Intelligence in the 21st Century: Re-focusing Intelligence to Shape the Strategic Environment Joint Military Intelligence Training Center Douglas H. Dearth.
Advertisements

Open Source Intelligence Doctrine
® Afterthoughts & Additions Robert David Steele Intelligence Coach Prepared 30 August 2003.
Overview An emerging challenge A belated response Debating the alternatives – Air-Sea Battle – A distant blockade – Maritime denial Conclusions.
NATO’S RESPONSE TO NEW SECURITY CHALLENGES Michael Rühle Head, Energy Security Section NATO Emerging Security Challenges Division ATHENA CONFERENCE Athens,
Lecture 6: Terrorism and Asymmetric Warfare  Rupal Mehta POL 12.
Espionage During the Cold War. After the end of World War Two the World was split into two, After the end of World War II the world was split into two;
The Cold War: Democracy vs. Communism Political Differences, Military Conflicts & Economic Competition.
The best US foreign policy is one based on contemporary understandings of realism. Such a policy would be more successful, particularly in avoiding wars,
Deterrence and Dissuasion for the 21st Century Ryan Henry Principle Deputy Under Secretary of Defense for Policy IFPA-Fletcher Conference December 14,
SOUTH KOREA – EU SECURITY COOPERATION: PROBLEMS AND PROSPECTS Bruxelles 25 June 2014 Dr. Stefano Felician Beccari, Ph.D. SOUTH KOREA AND EU: A SECURITY.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
INFORMATION WARFARE Information is not a new component to conflict. The Information Age, however, has ushered in extraordinary improvements in collection,
Arms Race.
QinetiQ in confidence © Copyright QinetiQ CCRP: The Complex environment and C2 IOCS: 22/23 October 2007.
1 Military Globalization Military power central to globalization –Underwrites empires and territorial expansion –Military technologies shrink globe, permit.
Case “The Last Supper” by Kent Kresa. What is a CEO’s job? Maximize shareholder value.
C4ISR and Information Warfare
Organizational Behavior as a Way of Thinking and Acting
Cold War Chapter 18 section 4.
Organization Theory and Nuclear Proliferation History 5N: The Challenge of Nuclear Weapons.
CSCE 727 Strategic Information Warfare. National Security Issues Information Warfare - Farkas2 Interesting read: B. Baer Arnold, Cyber war in Ukraine.
Operations Security (OPSEC) GOOD SECURITY IS A GROUP EFFORT
Intelligence and Security in the Digital Age Sir David Omand GCB Visiting Professor, Department of War Studies, King’s College London Cambridge, Computing.
INFORMATION WARFARE. What is Information Warfare? “All actions taken to defend the military’s information-based processes, information systems and communications.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
List of intelligence gathering disciplines
Deliberative Working Document - Predecisional FOUO Supporting the Secretary’s Top Priorities Eric Coulter, Deputy Director OSD Program Analysis and Evaluation.
Geospatially Enabling the Intelligence Collector David Attaway Natalie Feuerstein Phil Suarez.
DP 3 : Hostile Groups’ freedom of action & sanctuary are denied SE 1a TGT/A Lead Supported (Supporting)EntitiesMOEsMOEIs Deny hostile groups’ movement.
IAFS 1000 Terrorism. Dinner See evite Paper Presentations Dec min. talk, 6 min. Q&A Clearly and concisely summarize: –Argument –Evidence (analysis.
Spy v. Spy: Espionage, 1947-Present Dr. David R Smith Ohio Northern University.
Weapons and Technology of World War II by Nicholas S.
ELECTRONIC WARFARE AIAA Team 5 Robert Speer Craig Searles.
Space Policy Now 13 January History of Space Policy 4 Oct 1957: Sputnik I launched – Shock waves throughout free world, esp USA Part of Cold War.
TACTICAL INTELLIGENCE POTENTIAL TARGETS 1. Military Operational Environments 2. Terrorists Targets 3. Espionages 4. Friendly Accredited Diplomats 5. Military.
Strategic Implications of Virtual Warfare: by Captain Terry C. Pierce USN Explaining Virtual Warfare as a Strategic Disruptive Innovation Explaining Virtual.
1 Chapter 14 - Intelligence Operations. 2 Why did the Intelligence Fail to Precipitate Appropriate Action? Pearl Harbor The Japanese had already.
Threat context TLP WHITE Cyber security panel
Mr. Wenban Binghamton West Middle 8 th Humanities.
Intelligence Support to Operations
WELCOME CyberSecurity and Global Affairs Workshop Enhancing Situational Awareness Through Cyber Intelligence Henry Horton, CISM Partner, CyberSecurity.
IAFS 1000 Terrorism.
UNCLASSIFIED//FOR OFFICIAL USE ONLY National Reconnaissance Office Overview UNCLASSIFIED//FOR OFFICIAL USE ONLY.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
 Q: What factors discouraged the use of nuclear weapons during the Cold War?
Operational Security Awareness
Vigilant State 1 CONTESTED DEFINITIONS INTELLIGENCE.
Intelligence and Globalisation. No longer the missing dimension of history?
Military Intelligence
TSP 310-C , Phase II, OCS TSP 310-C , Phase II, OCS Implement OPSEC.
Discussion QuestionDiscussion Question  Some pundits argue that spread of nuclear weapons will bring more stability to the interstate relations, while.
WMD Operations Unit 1 slide 1 MODULE 2 UNIT 1 Training at the Awareness Level Review.
Emerging Global Trends and Strategic Challenges in the Coming Decade Marvin J. Cetron, President, Forecasting International June 12, 2012 Emerging Global.
OPERATIONS SECURITY 16 August August 2004.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Four ways to source documents…. Atomic Anxiety New Dangers: The Hydrogen Bomb Nov Megatons Fusion bomb 2500X power of Hiroshima Shift from.
Types of War.
Foreign & Military Policy
Soviet Invasion of Afghanistan
Work Cited What is a Spy? Cold War Spy Gear Spies Like Us.
Space Policy Now 28 August 2017.
About Callpcexperts Independent technical support service provider World Class Service Experienced technicians Quick solutions.
Do Now: How would you define terrorism? Please give examples that demonstrate your definition.
The Arms Race and its impact on the Cold War
Organization Theory and Nuclear Proliferation
National Defense University
Space Policy Now 16 January 2018.
Operations Security (OPSEC): A Force Multiplier
Presentation transcript:

Vigilant State 2 COLLECTION INTELLIGENCE

1. Strategic Revolutions

Vigilant State 2 1. Strategic Revolutions mobility surprise attack nuclear weapons premium on warning

Vigilant State 2 NEW sophistication of intelligence including – humint + deception in 1870s sigint WWI imint WWII processing 1960s producing information on intentions and capabilities

2. The Problem of Surprise

Vigilant State 2 2. Surprise and the Intelligence Cycle Why do surprise attacks occur so often ? All surprise attacks = intelligence failures ??

The Intelligence Cycle DIRECTION DISSEMINATION PROCESSING COLLECTION

3. Human Intelligence

Vigilant State 2 3. Human Intelligence or Humint Classic form – Go Spy the Land Types of motivation Cheap Good on intentions Good on non-state actors

Vigilant State 2 Slow and involves communications risk Requires high skill levels especially in secure states Defectors & Deception – who is master? Overlap with bugging

4. Technical

Vigilant State 2 4. Technical Signals Intelligence – Sigint Imagery – Imint Classic form – Bletchley Park Types of sigint – comint and elint Increasingly Expensive & Crypto Problem Good on capabilities

Vigilant State 2 Weak on non-state actors Fast & can be re-tasked quickly Fewer security worries - but overload Also can be deceived – Kola Overlap with bugging

5. Open Source

Vigilant State 2 5. Open Sources – Opint Classic form – Newspapers Internet FBIS Cheap + issue of prestige End of closed states – BBC 1990s

Vigilant State 2 Weak on the last pariah states Weak on important state aspects eg WMD Fewer security worries - but info overload Can be shared and pooled – important!!!

6. Political and Ethical Risks

Vigilant State 2 6. Political and Ethical Risks A. Human High political and ethical risk Decline of the ideological spy Induces paranoia on all sides ?

Vigilant State 2 B. Technical Was perceived as low risk 100s lost in aircraft and submarines Only satellites are low risk

Vigilant State 2 Is intelligence provocative or benign ? ‘You shall know the truth and its shall make you free’ Scott Sagan on the Alaskan Incident

7. “Pressure” - Collection Now

Vigilant State 2 7. Collection in the 21st century A. the 1990s debate end of the cold war & endless new targets red mafia, proliferation, humanitarian budget grabbing By 1999 the toilet cleaners of globalisation?

Vigilant State 2 B. 11 September 2001 How much change there had been? 50% have been there 18 months Privatisation Watch and Wait or Seize and Strike? Globalisation ?