Query Result Set
Skip Navigation Links
   ActiveUsers:446Hits:19951138Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
INTELLIGENCE AND NATIONAL SECURITY VOL: 35 NO 5 (9) answer(s).
 
SrlItem
1
ID:   172918


Division D: Operation Rubicon and the CIA’s secret SIGINT empire / Mainwaring, Sarah   Journal Article
Mainwaring, Sarah Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The CIA is a popular topic of study for intelligence historians. Renowned for covert action and human intelligence operations, we know a lot about how they became woven into the tapestry of world history. More recently, scientific and technical intelligence emerged as a central theme, uncovering the work of the ‘Wizards of Langley’. This article suggests we still have much to learn. Exploring CIA’s historic interest in communications intelligence, it uncovers ways they controlled a significant proportion of the world’s communications systems. Working internationally, and disagreeing with NSA, the CIA influenced important systems well into the twenty-first century.
Key Words Operation Rubicon  Division D  CIA’s  SIGINT Empire 
        Export Export
2
ID:   172922


FOIA and the national security scholar as fire alarm oversight / Samahon, Tuan N   Journal Article
Samahon, Tuan N Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Congress may engage in intelligence oversight by authorizing third-party requesters as ‘fire alarms’ to promote transparency under the Freedom of Information Act (FOIA). FOIA authorizes requesters to sue federal agencies to ensure their cooperation with requests for agency records. This article considers judicial review and the national security scholar’s role as fire alarm oversight by examining the litigation for the Pfeiffer Bay of Pigs CIA operation history, draft volume V. The article illustrates a compliance gap that requesters and courts can close by canvassing the advantages that scholars, especially historians, enjoy in enabling judicial oversight that promotes executive agency transparency.
        Export Export
3
ID:   172924


Intelligence in defence organizations: a tour de force / Rietjens, Sebastiaan   Journal Article
Rietjens, Sebastiaan Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Intelligence in defence organizations is widely seen as an under-researched topic. This paper assesses this claim and, by means of a metareview, systematically analyses the body of literature that has focused on intelligence in defence organizations between 2009 and 2018. The review includes 13 key journals on intelligence studies (e.g., Intelligence and National Security), military studies (e.g., Small Wars and Insurgencies) and conflict and peace studies (e.g., Journal of Strategic Studies). The analysis provides insight on the focus areas, the timeframes and conflicts that are addressed as well as the authors involved. Based on this, the paper provides suggestions for further research into intelligence within defence organizations.
        Export Export
4
ID:   172920


Maximator: European signals intelligence cooperation, from a Dutch perspective / Jacobs, Bart   Journal Article
Jacobs, Bart Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article is first to report on the secret European five-partner sigint alliance Maximator that started in the late 1970s. It discloses the name Maximator and provides documentary evidence. The five members of this European alliance are Denmark Sweden, Germany, the Netherlands, and France. The cooperation involves both signals analysis and crypto analysis. The Maximator alliance has remained secret for almost fifty years, in contrast to its Anglo-Saxon Five-Eyes counterpart. The existence of this European sigint alliance gives a novel perspective on western sigint collaborations in the late twentieth century. The article explains and illustrates, with relatively much attention for the cryptographic details, how the five Maximator participants strengthened their effectiveness via the information about rigged cryptographic devices that its German partner provided, via the joint U.S.-German ownership and control of the Swiss producer Crypto AG of cryptographic devices.
        Export Export
5
ID:   172917


Operation Rubicon: Germany as an intelligence ‘Great Power’? / Dobson, Melina J   Journal Article
Dobson, Melina J Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Operation Rubicon was probably one of the most successful intelligence operations of our time. Recent press revelations detail this secret partnership between the German Bundesnachrichtendienst (BND) and the American Central Intelligence Agency (CIA), focused on the purchase and control of Crypto AG. Supported by German technical giants like Siemens, the company sold and produced compromised cypher machines. This article challenges the idea that the dominant sigint powers were within the Anglosphere during the Cold War. Instead suggesting Rubicon evidences that the centre of gravity for intelligence lay ‘elsewhere’. It also explores the complex ethical implications of Germany’s involvement in Rubicon.
Key Words Intelligence  Germany  Great Power  Operation Rubicon 
        Export Export
6
ID:   172916


Operation Rubicon: sixty years of German-American success in signals intelligence / Aldrich, Richard J   Journal Article
Aldrich, Richard J Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The story of Operation Rubicon provides a ‘missing link’ in the history signals intelligence. It connects the period of the Second World War, dominated by Bletchley Park and Arlington Hall, with the Snowden era. This special section examines signals intelligence in the latter decades of the twentieth century, arguing that the processes of covert interference that were used help us to understand sources and methods in our present times. It examines new material that has emerged in Europe that expands our comprehension of the intelligence co-operation between the United States, Germany, Switzerland and Sweden, focusing on the control of technology corporations, especially Crypto AG. It argues that, as a result of Operation Rubicon, all states with high-grade computing, even the Soviet Union, were probably secret beneficiaries of this process and derived substantial flow of intelligence as a result, mostly from the global south. However, the task of exploring the material generated by Operation Rubicon has only just begun, since most of the product remains classified.
        Export Export
7
ID:   172919


RUBICON and revelation: the curious robustness of the ‘secret’ CIA-BND operation with Crypto AG / Dymydiuk, Jason   Journal Article
Dymydiuk, Jason Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract For over 50 years, America and Germany read much of the world’s communications. With ‘Operation Rubicon’, the CIA and the BND undermined the encryption security of foreign governments by controlling the Swiss technology company, Crypto AG. Puzzlingly, investigative journalists and customers increasingly identified the relationship and the vulnerabilities of their products. Yet, Rubicon continued, producing dividends for over half a century despite repeated revelations. This article asks why? It argues that geopolitical influences on targets, the consumer’s limited resources, and individual brilliance by CIA-BND agents within Crypto AG combined to enable operational longevity – where other sigint operations would have failed.
Key Words Rubicon  CIA-BND Operation  Crypto AG 
        Export Export
8
ID:   172925


Security, scandal and the security commission report, 1981 / Lomas, Daniel W B   Journal Article
Lomas, Daniel W B Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This research note introduces the December 1981 report of the Security Commission. This report was never released with the main conclusions forming the basis of a statement by Prime Minister Margaret Thatcher, published in May 1982. But the 1981 report is significant for a number of reasons. It was the first major review of government security since the Radcliffe Report of 1961, resulting in a number of recommendations that changed government vetting for the rest of the 1980s. The report also recommended the avowal of Britain’s foreign intelligence agency – a recommendation that proved especially controversial.
Key Words Security  Scandal  1981  Security Commission Report 
        Export Export
9
ID:   172923


Strategic intelligence: a concentrated and diffused intelligence model / Barnea, Avner   Journal Article
Barnea, Avner Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Both the discipline of strategic intelligence at the governmental level and the competitive intelligence discipline constitute accepted methods of supporting decision in order to avert mistakes and prevent strategic surprise. So far, research has focused on national intelligence and intelligence in business separately however, it is possible to use experience accumulated in the business field to improve intelligence practice in national security and vice versa . The central innovation of this article is that mutual learning can be utilized in the context of a model that makes a distinction between a ‘concentrated surprise’ and a ‘diffused surprise’ to provide a breakthrough in the intelligence field for better prediction of the development of surprises.
        Export Export