Office of the National Counterintelligence Executive

Size: px
Start display at page:

Download "Office of the National Counterintelligence Executive"

Transcription

1 Office of the National Counterintelligence Executive Speeches Michelle Van Cleave National Counterintelligence Executive Remarks for Department Of Defense Conference on Counterintelligence San Diego, California April 28, 2004 It s a pleasure to be with you here in my beautiful home state, which, as our Governor says, is called California and to share some of my thoughts about our Nation s strategic counterintelligence mission. Since it s the last week in April, 2004, let me begin by noting that the last week in April has traditionally been a bad one for spies: The last week in April, ten years ago, Rick and Rosario Ames pleaded guilty. Rosario got a lighter sentence as an inducement for her husband s cooperation; Aldrich Ames was sentenced to life. Ames, a former CIA CI officer, was arrested in 1994; he spied for the Russians for nearly a decade, during which period some 30 operations against the Soviets were compromised, and at least 10 Russians and East Europeans were executed as a result of his espionage. Indeed, as the Senate Intelligence Committee reported, Ames was responsible for the loss of virtually all of CIA s intelligence assets targeted at the Soviet Union at the height of the Cold War. At the time, it was believed that Ames was the most damaging spy in US history. In fact, FBI Agent Robert Hanssen was waiting in the wings, serving the same master; as was the lesser-known (but potentially no less damaging) DIA analyst Ana Montes, working for the Cubans. Their betrayal of their country s trust through their continuing espionage over 21 and 17 years, respectively, opened the contest for the title a little. Then there is Christopher Boyce, a former TRW employee here in California, who in the last week in April 1977, was convicted of espionage and sentenced to 40 years in prison. You may remember Boyce from the movie "The Falcon and the Snowman." Boyce s espionage revealed U.S. technical capabilities in the satellite (1 of 9)11/28/2005 1:57:41 AM

2 field, requirements for communicating with agents covertly, and other operational details. By the way, Boyce successfully petitioned for early release, and got out of jail last year; although he will probably remain on parole for the rest of his life. The last week in April 1865, John Wilkes Booth was shot and killed. His name appears among the roll call of spies, of course, because he served as a courier for the Confederate Secret Service. He was able to cross the Union- Confederate lines under cover of his engagements as an actor; which brought him to Ford s Theater, where he assassinated President Lincoln. Justice caught up with Booth in a barn near Port Royal, Virginia, where he was shot dead by federal cavalrymen after they set the barn on fire. He didn t get parole. As it happens, the last week in April was a bad one for Mae West too. No, she wasn t a spy; but she was an actress, of course, and one of the betterknown graduates of my alma mater, USC. (National football champions this year, I might add.) Mae West was arrested the last week in April, 1926 for "corrupting the morals of youth" for her play "Sex." Allegedly, she "gyrated her navel seductively" during a belly dance performance. She was fined $500 and sentenced to 10 days in jail. She paid the fine, and served her time well nearly; in fact, she was released after only eight days incarceration. In her words, "This is the only time that I ever got anything for good behavior!" While Mae West was being hauled in front of the judge, across the world Corporal Hitler was celebrating his 37th birthday by consolidating his leadership of the Nazi Party. And soon the world would know the full meaning of that evil. Now we are building a monument on the Mall in Washington DC, in honor of those who served in the world war that followed, to be dedicating, fittingly, on Memorial Day. As I heard my first boss in Washington, Jack Kemp, say many times, the history of the great American experiment has been that freedom must be won anew by every generation. Perhaps with proclamations about the End of History, we thought the post-vietnam generation had escaped that burden. We were wrong. As my current boss George W. Bush has said, "For America, there will be no going back to the era before September the 11th, to false comfort in a dangerous world. We have learned that terrorist attacks are not caused by the use of (2 of 9)11/28/2005 1:57:41 AM

3 strength; they are invited by the perception of weakness. And the surest way to avoid attacks on our own people is to engage the enemy where he lives and plans. We are fighting that enemy in Iraq and Afghanistan today so that we do not meet him again on our own streets, in our own cities." The President s message is clear. In the aftermath of September 11, the world has been divided into two: those who would stand with us against terrorism, and those who would stand with the terrorists. This war has brought about a profound moral accounting of the nations and peoples and creeds of the world. And we in the United States are reminded of what it means to be the Leader of the Free World. For those of us in the counterintelligence business, we are reminded of the solemn importance of our work. During the Cold War, with the possible exception of the Coast Guard, virtually every one of our national security institutions was penetrated by the Warsaw Pact, most more than once. These losses imposed grave damage in peacetime; they could have had catastrophic consequences had we found ourselves at war. Now we are at war, and the potential consequences of intelligence failure are far more immediate, putting in jeopardy deployed forces, ongoing operations, and the lives of troops abroad as well as Americans at home. So I am seized with the need to do our job as though it were the morning after. Indeed, each of the major challenges confronting the nation s security defeating global terrorism, countering weapons of mass destruction, ensuring the security of the homeland, transforming defense capabilities, fostering cooperation with other global powers, promoting global economic growth -- has an embedded counterintelligence imperative. Specifically, terrorists and tyrants, foreign adversaries and economic competitors, engage in a range of intelligence activities directed against us in order to advance their interests and defeat U.S. objectives. Too often, these foreign intelligence activities against the United States are successful. Collectively, they present strategic threats to the Nation s security and prosperity. The U.S. requires a national, systematic perspective and coherent policies to counter them, including a strategic counterintelligence response. U.S. Counterintelligence (CI) has four essential purposes: To identify, assess, neutralize and exploit the intelligence activities of foreign powers, terrorist groups, and other entities who seek to do us harm. I would put force protection in this category. (3 of 9)11/28/2005 1:57:41 AM

4 To protect our intelligence collection and analytic capabilities from adversary denial, penetration, or manipulation. To help enable the successful execution of sensitive national security operations. To help safeguard our vital national security secrets, critical assets and technologies, and sensitive propriety data against theft, covert foreign diversion or exploitation. As this audience knows full well, CI is more than catching spies. It is more than force protection. It is more than support to operations. And it is much bigger in its reach than the purview of the several departments and agencies charged with CI responsibilities. Foreign intelligence services don t target an individual FBI field office, or a CIA station, or a military unit; they target the United States. Our Nation s security requires that we approach CI strategically, from two perspectives: First, CI must be driven strategically by coherent processes for collection, investigation, analysis, operations that support integration when it is needed and respect compartmentation when it is needed and enable the big picture to emerge and order our allocation of resources and creative effort. Secondly, we must look at our vulnerabilities strategically as well. Our adversaries are keenly interested in our closely guarded national security secrets. But they are also interested in the national critical assets that underpin our wealth, our daily life, and ultimately our security. In times past, the U.S. government did not take a strategic view of CI. The near sixty-year history of CI has been one of having no one in charge of the enterprise. Our community was not organized or structured to accomplish a national mission; rather, the various CI elements have grown out of individual department or agency needs. They are part of a loose confederation of independent organizations with narrower and varying responsibilities, jurisdictions and capabilities. Operations have tended to focus on individual cases and are conducted with little appreciation of the potential impact of a synergistic effort. Many previous CI deficiencies have been the result of this systemic failure in the architecture of the CI community. To begin to remedy this situation and help bring strategic coherence to U.S. CI, the Congress created the position of the National Counterintelligence Executive (NCIX). The law directs that the NCIX shall serve as the head of counterintelligence for the US government, subject to the direction and control of the President. The law also creates the office of the NCIX (ONCIX), which is assigned a number of specific duties. Among others, these include the development of a national CI strategy for the President s approval, the production of an annual threat assessment, and government-wide CI budget reviews to evaluate on an (4 of 9)11/28/2005 1:57:41 AM

5 ongoing basis the effectiveness of resource allocation and program execution against the priorities set forth in the national strategy. More broadly, the purposes behind the CI Enhancement Act, which codified the mission, authorities and responsibilities of my office, are set forth in the Act s preamble: To enable the CI community to fulfill better its mission of identifying, assessing, prioritizing and countering the intelligence threats to the US. To ensure that the CI community acts in an efficient and effective manner. To provide for the integration of all of the CI activities of the US government. It is easy to read this language to you. It is rather more difficult to reduce goals to actions. I am reminded of the words of another of my recent bosses, for whom most of you now work in one way or another, Don Rumsfeld. One of the Secretary s many notable innovations is the compilation of rules to govern conduct in government, business and life. As it happens, there are pages and pages of rules (and those of us who have had the opportunity to work for him know a raft of more rules, up close and personal, in addition to the ones that are written down). But here are three of my favorite, as they pertain to my current job: Learn to say I don't know. If used when appropriate, it will be often. (Unfortunately, we encounter this truth too often in CI. I d like to fix that.) Look for what's missing. Many advisers can tell a president how to improve what's proposed or what's gone amiss. Few are able to see what isn't there. (Not infrequently the key to insightful CI analysis.) Finally, if you think you have things under control, you're not going fast enough. (No danger of that.) As many of you know, this isn t the first time a national level CI organization has been constituted. Earlier efforts, under the DCI s direction, or under the FBI s leadership, or pursuant to PDD, have had important objectives and have left a record of mixed results. Why should we expect that the new NCIX will be any more effective or successful? First the imperatives for integration have never been stronger than they are now, in the aftermath of September 11. Second the head of the office is a Presidential appointee, conferring a needed stature to the mission that has been lacking in the past. Third, Congress has put my organization into law I may leave when the President s term ends but my office is here to stay. (5 of 9)11/28/2005 1:57:41 AM

6 Fourth, the law confers policy independence on the NCIX that keeps it from being brought under the wing of one part of the CI community to the exclusion of others. It is truly a purple organization, headed by noncareer personnel, and populated by directly hired employees as well as detailees from the various departments and agencies with CI responsibilities. Finally, the Department of Defense has recognized the imperative of bringing strategic coherence to its many CI activities, to ensure unity of purpose and strategic design. This is reflected in the creation of CIFA and in your presence here today. While each of the Services properly must look to its own mission, DoD s role in support of national level CI needs transcends any one Service or any one combatant commander. I d like to discuss some of those national CI imperatives. To begin, we must extend the safeguards of CI to the global war on terrorism. I know this is a major focus of this conference. In many parts of the world, including here at home, Al Qaida and other terrorist organizations employ classic intelligence methods to gather information, recruit sources, and run assets. They are also capable of engaging in sophisticated deceptive practices, not unlike traditional foreign powers, to deceive US decision-makers. Terrorist groups draw strength from the support of state sponsors, which means that the intelligence services of those regimes are a key link in the global terrorist support network. Accordingly, we must ensure that the global war on terrorism is armor-plated with an effective CI strategy 1) to identify and exploit offensive opportunities against terrorist networks, 2) to support force protection and operations security in the field, 3) to counter the intelligence operations of state sponsors, and 4) to help filter truth from deception. The imperative for U.S. CI overall parallels the strategic imperative for the global war on terrorism: to go on the offense. US counterintelligence needs to shift emphasis from a posture of reacting to a proactive strategy of seizing advantage. Offensive CI activities can increase the range of options available to decision makers to defuse or shape an emerging threat. In wartime, we must be able to defeat the adversary s intelligence capabilities, including their ability to deceive or mislead us. Our experience with Iraq taught us once again that neutralizing the intelligence services of the adversary is a crucial element in winning the war; and that it is far better to plan well in advance than on a crash basis. Strategic CI planning can also increase the options available to decision makers for advancing national objectives while avoiding war. Similarly, within the U.S., the operational and analytic focus must transform from a case-driven rhythm and purpose to a strategic CI assessment and engagement of adversary presence, capabilities and intentions. In order to do this, we will need to have unity of effort among the several organizations with (6 of 9)11/28/2005 1:57:41 AM

7 CI responsibilities. Additionally, we will need to draw on the full range of CI resources, both defensive and offensive; prioritize the allocation of CI community resources against risk and opportunity; and ensure that CI is coupled with effective security and countermeasures that support the missions they protect. These are some of the strategic imperatives behind U.S. CI. But there is a second meaning behind the need to approach counterintelligence strategically. We also need to bring a strategic perspective to the way in which we think about our Nation s vulnerabilities and critical resources. U.S. counterintelligence has a strategic mission to help protect the vital technology secrets that are the bedrock of our security. America s national defense rests on its continuity technological superiority. The United States cannot maintain its dynamic technological superiority without a corresponding intelligence and counterintelligence superiority. A national defense strategy based on transformation places a premium on the sensitive capabilities and technologies that give advantage. The single most effective strategy to defeat U.S. plans to ensure superiority through transformation is to capture those essential secrets, in order to incorporate them into adversary weapons systems and to develop countermeasures. Our adversaries understand this well. Espionage has long delivered the highest payoff for the lowest cost as a means of defeating U.S. capabilities. Weapons systems that cost billions of dollars can have their essential secrets exposed and therefore defeated by the work of a single successful spy. We also see a breadth of foreign activity to evade US export control laws, in order to acquire key technologies. In attacking our technology base, many foreign powers employ collection techniques outside of clandestine intelligence channels, including tasking visiting businessmen, scientists and engineers; exploiting trade shows and exhibits, and debriefing third country visitors. Given its pervasiveness, and the limits of our resources, it s a struggle simply to be able to characterize the scope of this collection activity. Another major responsibility of my office is to help ensure that the national security decision-making process is informed by counterintelligence insights. Specifically, we need to be able to present an array of strategic CI operational and information options in foreign and defense policy for the President and his national security leadership team. Such a process should also support the strategic direction and integration of CI operations with other national goals and instruments. Working together as a community, I believe that we have the opportunity to develop and institutionalize a strategic, national CI system, not taking on everything at once but methodically, one piece at a time. We need to: (7 of 9)11/28/2005 1:57:41 AM

8 Build on the work that CIFA has begun by establishing a national-level CI assessment center to facilitate cross-agency and cross-disciplinary work to: Integrate threat data Detect anomalies in foreign conduct Provide basis for initiating CI and CM ops Transition CI from a HUMINT-centric activity to an all-source discipline Institutionalize damage assessments when they are performed, what they must include. We need to rationalize their relationships to other activities including IG investigations, and to ensure that actionable recommendations are derived from the lessons learned, and remedies implemented. Develop a CI doctrine for attacking foreign intelligence services systematically via strategic CI operations. Take lessons from our experience with Iraq to heart and develop the campaign plans that have been of such interest during your discussions this week. My office will be leading a study of the JIATF approach, not for the purpose of slowing things down (to be sure!) but to ensure the best use of resources as we build up. The combatant commanders must stand prepared to deal with any contingency in their area of responsibility. The development of war plans is a finally honed military art. It is also a necessary responsibility of the nation to whom much of the free world looks for its security. We need to bring the deliberate planning process into strategic planning for neutralizing the intelligence capabilities of an adversary (which goes beyond the existing tactical battlefield focus). As a standing requirement, we should consider building strategic CI annexes to war plans. As I mentioned earlier, such planning can increase options available to decision makers, to advance national objectives while avoiding war. Advance the professionalization of the CI cadre, from the senior-most leadership to the newest recruit, including the development of common standards, training and education. If we can do these things, then we will have laid the foundations not only to articulate, but also to execute an effective national CI strategy. You all know how important it is that we succeed. I first reported for duty at the Pentagon in mid-september You could still smell the smoke in the halls and the grim determination in the air. The dedication of the men and women of our armed forces, and the civilians, with whom I had the honor to serve, was extraordinary. It remains so today. I am so proud to have been a part of DoD at that time in our Nation s history, and a witness to what selfless service truly means. (8 of 9)11/28/2005 1:57:41 AM

9 In the past eight months, I have come to a far deeper appreciation of the dedication of the professionals in the CI business, which I admire. And I have a much clearer understanding of the difficulties many of you face in carrying out your responsibilities. If there is one message I could leave with you today, it is this. As you ensure vital CI support to the warfighter, you are also part of a larger strategic CI mission that supports the Nation. I am honored to share that mission with you. Top of Page (9 of 9)11/28/2005 1:57:41 AM

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5240.02 March 17, 2015 USD(I) SUBJECT: Counterintelligence (CI) References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) O-5240.02

More information

The National Counterintelligence Strategy of the United States

The National Counterintelligence Strategy of the United States Honorable Michelle Van Cleave National Counterintelligence Executive remarks prepared for delivery Conference on Counterintelligence for the 21 st Century Bush School of Intelligence, Texas A&M University

More information

U.S. Government Collecting and Interpreting Intelligence, Conducting Covert Action and Counterintelligence

U.S. Government Collecting and Interpreting Intelligence, Conducting Covert Action and Counterintelligence It is the responsibility of the federal government to protect its citizens and interests. Good intelligence, or information, about threats to our national security whether from within our country or from

More information

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES (Federal Register Vol. 40, No. 235 (December 8, 1981), amended by EO 13284 (2003), EO 13355 (2004), and EO 13470 (2008)) PREAMBLE Timely, accurate,

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014 THE WHITE HOUSE Office of the Press Secretary For Immediate Release January 17, 2014 January 17, 2014 PRESIDENTIAL POLICY DIRECTIVE/PPD-28 SUBJECT: Signals Intelligence Activities The United States, like

More information

The Global War on Terrorism Or A Global Insurgency

The Global War on Terrorism Or A Global Insurgency The Global War on Terrorism Or A Global Insurgency 28 February 2007 LTG William G. Boykin, USA Deputy Undersecretary of Defense for 1 Intelligence for Warfighting Support What kind of War is this? Terrorism:

More information

Statement of FBI Executive Assistant Director for Intelligence Maureen A. Baginski. Before the House Permanent Select Committee on Intelligence

Statement of FBI Executive Assistant Director for Intelligence Maureen A. Baginski. Before the House Permanent Select Committee on Intelligence Statement of FBI Executive Assistant Director for Intelligence Maureen A. Baginski Before the House Permanent Select Committee on Intelligence August 4, 2004 Introduction Good afternoon, Mr. Chairman and

More information

Student Guide: Introduction to Army Foreign Disclosure and Contact Officers

Student Guide: Introduction to Army Foreign Disclosure and Contact Officers Length 30 Minutes Description This introduction introduces the basic concepts of foreign disclosure in the international security environment, specifically in international programs and activities that

More information

To be prepared for war is one of the most effectual means of preserving peace.

To be prepared for war is one of the most effectual means of preserving peace. The missions of US Strategic Command are diverse, but have one important thing in common with each other: they are all critical to the security of our nation and our allies. The threats we face today are

More information

The current Army operating concept is to Win in a complex

The current Army operating concept is to Win in a complex Army Expansibility Mobilization: The State of the Field Ken S. Gilliam and Barrett K. Parker ABSTRACT: This article provides an overview of key definitions and themes related to mobilization, especially

More information

National Security Agency

National Security Agency National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships balance between our need for security and preserving those freedoms that make us who

More information

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003 Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces J.D. Crouch II March 5, 2003 Current and Future Security Environment Weapons of Mass Destruction Missile Proliferation?

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL SUBJECT: DoD Operations Security (OPSEC) Program Manual References: See Enclosure 1 NUMBER 5205.02-M November 3, 2008 Incorporating Change 1, Effective April 26, 2018 USD(I)

More information

INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 304

INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 304 INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 304 HUMAN INTELLIGENCE A. PURPOSE 1. Pursuant to Intelligence Community Directive (ICD) 101, Section G.1.b.(3), ICD 304 Human Intelligence is hereby amended. 2.

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 5205.02-M November 3, 2008 USD(I) SUBJECT: DoD Operations Security (OPSEC) Program Manual References: See Enclosure 1 1. PURPOSE. In accordance with the authority in

More information

Revolution in Army Doctrine: The 2008 Field Manual 3-0, Operations

Revolution in Army Doctrine: The 2008 Field Manual 3-0, Operations February 2008 Revolution in Army Doctrine: The 2008 Field Manual 3-0, Operations One of the principal challenges the Army faces is to regain its traditional edge at fighting conventional wars while retaining

More information

Department of Defense

Department of Defense Department of Defense DIRECTIVE SUBJECT: Under Secretary of Defense for Intelligence (USD(I)) NUMBER 5143.01 November 23, 2005 References: (a) Title 10, United States Code (b) Title 50, United States Code

More information

Leading Intelligence INTEGRATION. Office of the Director of National Intelligence

Leading Intelligence INTEGRATION. Office of the Director of National Intelligence D Leading Intelligence INTEGRATION Office of the Director of National Intelligence Office of the Director of National Intelligence Post 9/11 investigations proposed sweeping change in the Intelligence

More information

Statement by. Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3. Joint Staff. Before the 109 th Congress

Statement by. Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3. Joint Staff. Before the 109 th Congress Statement by Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3 Joint Staff Before the 109 th Congress Committee on Armed Services Subcommittee on Terrorism, Unconventional

More information

Department of Defense INSTRUCTION. Counterintelligence (CI) in the Combatant Commands and Other DoD Components

Department of Defense INSTRUCTION. Counterintelligence (CI) in the Combatant Commands and Other DoD Components Department of Defense INSTRUCTION NUMBER 5240.10 October 5, 2011 Incorporating Change 1, Effective October 15, 2013 USD(I) SUBJECT: Counterintelligence (CI) in the Combatant Commands and Other DoD Components

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION SUBJECT: Counterintelligence (CI) Analysis and Production References: See Enclosure 1 NUMBER 5240.18 November 17, 2009 Incorporating Change 2, Effective April 25, 2018

More information

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction [National Security Presidential Directives -17] HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4 Unclassified version December 2002 Subject: National Strategy to Combat Weapons of Mass Destruction "The gravest

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.04 April 1, 2016 Incorporating Change 1, Effective April 26, 2018 USD(I) SUBJECT: Counterintelligence (CI) Investigations References: See Enclosure 1 1. PURPOSE.

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.04 February 2, 2009 USD(I) SUBJECT: Counterintelligence (CI) Investigations References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction

More information

Fiscal Year (FY) 2011 Budget Estimates

Fiscal Year (FY) 2011 Budget Estimates Fiscal Year (FY) 2011 Budget Estimates Attack the Network Defeat the Device Tr ai n the Force February 2010 JUSTIFICATION OF FISCAL YEAR (FY) 2011 BUDGET ESTIMATES Table of Contents - Joint Improvised

More information

SUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity

SUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity THE UNDER SECRETARY OF DEFENSE 2000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-2000 POLICY October 1, 2010 MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT: Directive-Type Memorandum (DTM) 10-018 Law Enforcement

More information

Department of Homeland Security Needs Under Secretary for Policy

Department of Homeland Security Needs Under Secretary for Policy Department of Homeland Security Needs Under Secretary for Policy James Jay Carafano, Ph.D., Richard Weitz, Ph.D., and Alane Kochems Unlike the Department of Defense (DoD), the Department of Homeland Security

More information

ARMY G-8

ARMY G-8 ARMY G-8 Deputy Chief of Staff, G-8 703-697-8232 The Deputy Chief of Staff, G-8, is responsible for integrating resources and Army programs and with modernizing Army equipment. We accomplish this through

More information

Joint Publication Operations Security

Joint Publication Operations Security Joint Publication 3-13.3 Operations Security 04 January 2012 CHAPTER II Little minds try to defend everything at once, but sensible people look at the main point only; they parry the worst blows and stand

More information

Intelligence Operations (HMSY 1340) Online. Credit: 3 semester credit hours (3 hours lecture)

Intelligence Operations (HMSY 1340) Online. Credit: 3 semester credit hours (3 hours lecture) Operations (HMSY 1340) Online Credit: 3 semester credit hours (3 hours lecture) Prerequisite/Co-requisite: Complete the Online Orientation and answer yes to 7+ questions on the Online Learner Self-Assessment:

More information

RECORD VERSION STATEMENT BY THE HONORABLE MARK T. ESPER SECRETARY OF THE ARMY BEFORE THE COMMITTEE ON ARMED SERVICES UNITED STATES SENATE

RECORD VERSION STATEMENT BY THE HONORABLE MARK T. ESPER SECRETARY OF THE ARMY BEFORE THE COMMITTEE ON ARMED SERVICES UNITED STATES SENATE RECORD VERSION STATEMENT BY THE HONORABLE MARK T. ESPER SECRETARY OF THE ARMY BEFORE THE COMMITTEE ON ARMED SERVICES UNITED STATES SENATE FIRST SESSION, 115TH CONGRESS ON THE CURRENT STATE OF DEPARTMENT

More information

SSUSH23 Assess the political, economic, and technological changes during the Reagan, George H.W. Bush, Clinton, George W.

SSUSH23 Assess the political, economic, and technological changes during the Reagan, George H.W. Bush, Clinton, George W. SSUSH23 Assess the political, economic, and technological changes during the Reagan, George H.W. Bush, Clinton, George W. Bush, and Obama administrations. a. Analyze challenges faced by recent presidents

More information

Operations Security (OPSEC)

Operations Security (OPSEC) Operations Security (OPSEC) OPSEC. Background What is it? Why do we need it? Who should use it? Goal Key Terms The 5-Step Process OPSEC Applications OPSEC Background National Security Decision Directive

More information

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE SECNAV INSTRUCTION 3850.2E DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1 000 NAVY PENTAGON WASHINGTON DC 20350 1000 SECNAVINST 3850.2E DUSN (P) January 3, 2017 From: Subj: Secretary of the Navy DEPARTMENT

More information

SACT s remarks to UN ambassadors and military advisors from NATO countries. New York City, 18 Apr 2018

SACT s remarks to UN ambassadors and military advisors from NATO countries. New York City, 18 Apr 2018 NORTH ATLANTIC TREATY ORGANIZATION SUPREME ALLIED COMMANDER TRANSFORMATION SACT s remarks to UN ambassadors and military advisors from NATO countries New York City, 18 Apr 2018 Général d armée aérienne

More information

USS COLE Commission Report

USS COLE Commission Report D UNCLASSIFIED DoD USS COLE COMMISSION USS COLE Commission Report Learning from the attack on the USS COLE implications for protecting transiting U.S. forces from terrorist attack UNCLASSIFIED DoD USS

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 10-25 26 SEPTEMBER 2007 Operations EMERGENCY MANAGEMENT ACCESSIBILITY: COMPLIANCE WITH THIS PUBLICATION IS MANDATORY Publications and

More information

STATEMENT OF DR. STEPHEN YOUNGER DIRECTOR, DEFENSE THREAT REDUCTION AGENCY BEFORE THE SENATE ARMED SERVICES COMMITTEE

STATEMENT OF DR. STEPHEN YOUNGER DIRECTOR, DEFENSE THREAT REDUCTION AGENCY BEFORE THE SENATE ARMED SERVICES COMMITTEE FOR OFFICIAL USE ONLY UNTIL RELEASED BY THE SENATE ARMED SERVICES COMMITTEE STATEMENT OF DR. STEPHEN YOUNGER DIRECTOR, DEFENSE THREAT REDUCTION AGENCY BEFORE THE SENATE ARMED SERVICES COMMITTEE EMERGING

More information

The Way Ahead in Counterproliferation

The Way Ahead in Counterproliferation The Way Ahead in Counterproliferation Brad Roberts Institute for Defense Analyses as presented to USAF Counterproliferation Center conference on Countering the Asymmetric Threat of NBC Warfare and Terrorism

More information

GREGORY A. SCOVEL. Work Experience Bent Creek Terrace Leesburg, VA (703)

GREGORY A. SCOVEL. Work Experience Bent Creek Terrace Leesburg, VA (703) GREGORY A. SCOVEL 42799 Bent Creek Terrace Leesburg, VA 20176 (703) 859-0486 gascovel@gmail.com More than 31 years of experience in the Naval Criminal Investigative Service (NCIS), which produced a significant

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.10 May 18, 1990 Administrative Reissuance Incorporating Change 1, April 8, 1992 SUBJECT: DoD Counterintelligence Support to Unified and Specified Commands

More information

Case M:06-cv VRW Document 254 Filed 04/20/2007 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA

Case M:06-cv VRW Document 254 Filed 04/20/2007 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA Case M:06-cv-091-VRW Document 254 Filed 04//07 Page 1 of IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA IN RE NATIONAL SECURITY AGENCY TELECOMMUNICATIONS RECORDS LITIGATION

More information

An Interview with Gen John E. Hyten

An Interview with Gen John E. Hyten Commander, USSTRATCOM Conducted 27 July 2017 General John E. Hyten is Commander of US Strategic Command (USSTRATCOM), one of nine Unified Commands under the Department of Defense. USSTRATCOM is responsible

More information

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #199

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #199 COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY 2015 FY 2015 OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Cost To Complete Total Program Element - 0.343 0.195 0.498-0.498 0.475 0.412 0.421

More information

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 7 R-1 Line #198

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 7 R-1 Line #198 Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Air Force : February 2015 3600: Research, Development, Test & Evaluation, Air Force / BA 7: Operational Systems Development COST ($ in Millions) FY

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 3020.40 January 14, 2010 Incorporating Change 2, September 21, 2012 USD(P) SUBJECT: DoD Policy and Responsibilities for Critical Infrastructure References: See Enclosure

More information

The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen,

The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen, The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen, Marines, and Civilians who serve each day and are either involved in war, preparing for war, or executing

More information

Senate Select Committee on Intelligence. July 3, 2018

Senate Select Committee on Intelligence. July 3, 2018 Senate Select Committee on Intelligence July 3, 2018 The Senate Select Committee on Intelligence (SSCI) is conducting a bipartisan investigation into a wide range of Russian activities relating to the

More information

Prepared Remarks for the Honorable Richard V. Spencer Secretary of the Navy Defense Science Board Arlington, VA 01 November 2017

Prepared Remarks for the Honorable Richard V. Spencer Secretary of the Navy Defense Science Board Arlington, VA 01 November 2017 Prepared Remarks for the Honorable Richard V. Spencer Secretary of the Navy Defense Science Board Arlington, VA 01 November 2017 Thank you for the invitation to speak to you today. It s a real pleasure

More information

Famous Women of the War Women Support the War Civil War Soldiers. Anaconda Plan. Battle of Bull Run. Battle of Antietam. Proclamation Lincoln

Famous Women of the War Women Support the War Civil War Soldiers. Anaconda Plan. Battle of Bull Run. Battle of Antietam. Proclamation Lincoln Anaconda Plan Battle of Bull Run Battle of Antietam Famous Women of the War Women Support the War Soldiers Emancipation Abraham Proclamation Lincoln Battle of Gettysburg Gettysburg Address Rose Greenhow

More information

Force 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release.

Force 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release. White Paper 23 January 2014 DISTRIBUTION RESTRICTION: Approved for public release. Enclosure 2 Introduction Force 2025 Maneuvers provides the means to evaluate and validate expeditionary capabilities for

More information

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems United States Government Accountability Office Report to Congressional Committees June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems GAO-15-544

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.19 January 31, 2014 Incorporating Change 1, August 17, 2017 USD(I) SUBJECT: Counterintelligence Support to the Defense Critical Infrastructure Program (DCIP)

More information

Chapter 16: National Security Policymaking

Chapter 16: National Security Policymaking 1. With the fall of the Berlin Wall, the U.S. (A) was the only superpower. (B) saw Communism as the principal threat. (C) knew it was invulnerable. (D) saw the world as a more threatening place. Chapter

More information

MCWP Counterintelligence. U.S. Marine Corps. 5 September 2000 PCN

MCWP Counterintelligence. U.S. Marine Corps. 5 September 2000 PCN MCWP 2-14 Counterintelligence U.S. Marine Corps 5 September 2000 PCN 143 000084 00 To Our Readers Changes: Readers of this publication are encouraged to submit suggestions and changes that will improve

More information

Statement of. Michael P. Downing Assistant Commanding Officer Counter-Terrorism/Criminal Intelligence Bureau Los Angeles Police Department.

Statement of. Michael P. Downing Assistant Commanding Officer Counter-Terrorism/Criminal Intelligence Bureau Los Angeles Police Department. Statement of Michael P. Downing Assistant Commanding Officer Counter-Terrorism/Criminal Intelligence Bureau Los Angeles Police Department Before the Committee on Homeland Security s Subcommittee on Intelligence,

More information

Domestic Nuclear Detection Office (DNDO)

Domestic Nuclear Detection Office (DNDO) Domestic Nuclear Detection Office (DNDO) Radiological and Nuclear Detection Program Support Noel Mueller SETA Contract - Senior Program Support Specialist State and Local RND Liaison U.S. Department of

More information

UNCLASSIFIED. Unclassified

UNCLASSIFIED. Unclassified Clinton Administration 1993 - National security space activities shall contribute to US national security by: - supporting right of self-defense of US, allies and friends - deterring, warning, and defending

More information

Supply Chain Risk Management

Supply Chain Risk Management Supply Chain Risk Management 731 07 December 2013 A. AUTHORITY: The National Security Act of 1947, as amended; 50 USC 3329, note (formerly 50 USC 403-2, note); the Counterintelligence Enhancement Act of

More information

THE UNITED STATES NAVAL WAR COLLEGE

THE UNITED STATES NAVAL WAR COLLEGE NWC 1159 THE UNITED STATES NAVAL WAR COLLEGE JOINT MILITARY OPERATIONS DEPARTMENT A Guide for Deriving Operational Lessons Learned By Dr. Milan Vego, JMO Faculty 2006 A GUIDE FOR DERIVING OPERATIONAL LESSONS

More information

PART ONE: PRESERVE THE UNION

PART ONE: PRESERVE THE UNION I ve seen cities and homes in ashes. I ve seen thousands of men lying on the ground, their dead faces looking up to the skies. I tell you, war is hell! Presidential election of 1860 catastrophic to the

More information

DOD STRATEGY CWMD AND THE POTENTIAL ROLE OF EOD

DOD STRATEGY CWMD AND THE POTENTIAL ROLE OF EOD DOD STRATEGY CWMD AND THE POTENTIAL ROLE OF EOD CDR Cameron Chen CWMD Action Officer Deputy Director for Global Operations J-3 Operations Directorate 1 2 Agenda Review of DoD CWMD Strategy WMD Challenge,

More information

Defense Security Service Intelligence Oversight Awareness Training Course Transcript for CI

Defense Security Service Intelligence Oversight Awareness Training Course Transcript for CI Welcome In a 2013 testimony to congress on Foreign Intelligence Surveillance, the former Director of National Intelligence, LT GEN James Clapper (Ret) spoke about limitations to intelligence activities

More information

Directive on United States Nationals Taken Hostage Abroad and Personnel Recovery Efforts June 24, 2015

Directive on United States Nationals Taken Hostage Abroad and Personnel Recovery Efforts June 24, 2015 Administration of Barack Obama, 2015 Directive on United States Nationals Taken Hostage Abroad and Personnel Recovery Efforts June 24, 2015 Presidential Policy Directive/PPD 30 Subject: U.S. Nationals

More information

Capital Offence June www orld.com.cbrnew

Capital Offence June www orld.com.cbrnew Major General Jeffrey Buchanan, commander Joint Force Headquarters, National Capital Region, (JFHQ NCR) tells Gwyn Winfield about preparing Washington DC for attack GW: What are JFHQNCR s roles in a CBRN

More information

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. Exam Name MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) The realm of policy decisions concerned primarily with relations between the United States

More information

Detecting Nuclear Weapons and Radiological Materials: How Effective Is Available Technology? Opening Statement

Detecting Nuclear Weapons and Radiological Materials: How Effective Is Available Technology? Opening Statement Detecting Nuclear Weapons and Radiological Materials: How Effective Is Available Technology? Opening Statement of Mr. Vayl Oxford Acting Director Domestic Nuclear Detection Office Department of Homeland

More information

Federal Bureau of Investigation (FBI)

Federal Bureau of Investigation (FBI) Federal Bureau of Investigation (FBI) FY 2010 Budget Request At A Glance FY 2009 Enacted: Current Services Adjustments: Program Changes: FY 2010 Budget Request: Change from FY 2009 Enacted: $7,301.2 million

More information

REMARKS BY VICE PRESIDENT PENCE TO TROOPS. Schriever Air Force Base Colorado Springs, Colorado

REMARKS BY VICE PRESIDENT PENCE TO TROOPS. Schriever Air Force Base Colorado Springs, Colorado THE WHITE HOUSE Office of the Vice President For Immediate Release June 23, 2017 REMARKS BY VICE PRESIDENT PENCE TO TROOPS Schriever Air Force Base Colorado Springs, Colorado 2:06 P.M. MDT THE VICE PRESIDENT:

More information

CONFERENCE MATERIAL DAY ONE 19TH ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW

CONFERENCE MATERIAL DAY ONE 19TH ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW 19TH ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW CONFERENCE MATERIAL DAY ONE SPONSORED BY: AMERICAN BAR ASSOCIATION STANDING COMMITTEE ON LAW AND NATIONAL SECURITY CENTER FOR NATIONAL SECURITY

More information

1. Purpose. To implement the guidance set forth in references (a) through (e) by:

1. Purpose. To implement the guidance set forth in references (a) through (e) by: DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON, D.C. 20350-1000 SECNAVINST 3300.2C DUSN SECNAV INSTRUCTION 3300.2C From: Secretary of the Navy Subj: DEPARTMENT OF THE NAVY

More information

The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects

The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects Power Projection through Cyberspace Capt Jason M. Gargan, USAF Disclaimer: The views and opinions expressed or

More information

Chapter 17: Foreign Policy and National Defense Section 2

Chapter 17: Foreign Policy and National Defense Section 2 Chapter 17: Foreign Policy and National Defense Section 2 Objectives 1. Summarize the functions, components, and organization of the Department of Defense and the military departments. 2. Explain how the

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.16 August 27, 2012 USD(I) SUBJECT: Counterintelligence Functional Services (CIFS) References: See Enclosure 1 1. PURPOSE. In accordance with the authority

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5240.01 August 27, 2007 Incorporating Change 1 and Certified Current Through August 27, 2014 USD(I) SUBJECT: DoD Intelligence Activities References: (a) DoD Directive

More information

GAO ECONOMIC ESPIONAGE. Information on Threat From U.S. Allies. Testimony Before the Select Committee on Intelligence United States Senate.

GAO ECONOMIC ESPIONAGE. Information on Threat From U.S. Allies. Testimony Before the Select Committee on Intelligence United States Senate. GAO United States General Accounting Office Testimony Before the Select Committee on Intelligence United States Senate For Release on Delivery Expected at 10:30 a.m., EST Wednesday, February 28, 1996 ECONOMIC

More information

FSO Role in the NISP. Student Guide. Lesson 1: Course Introduction. Course Information. Course Overview

FSO Role in the NISP. Student Guide. Lesson 1: Course Introduction. Course Information. Course Overview FSO Role in the NISP Lesson 1: Course Introduction Course Information Purpose Audience Pass/Fail % Estimated completion time Provide an overview of the Facility Security Officer s (FSO) primary roles in

More information

Presentation to the Advanced Planning Briefing for Industry. Dr. Dale Klein

Presentation to the Advanced Planning Briefing for Industry. Dr. Dale Klein Presentation to the Advanced Planning Briefing for Industry Dr. Dale Klein Assistant to the Secretary of Defense for Nuclear and Chemical and Biological Defense Programs April 8, 2003 ATSD (NCB) Organization

More information

STATEMENT OF THE HONORABLE PETER B. TEETS, UNDERSECRETARY OF THE AIR FORCE, SPACE

STATEMENT OF THE HONORABLE PETER B. TEETS, UNDERSECRETARY OF THE AIR FORCE, SPACE STATEMENT OF THE HONORABLE PETER B. TEETS, UNDERSECRETARY OF THE AIR FORCE, SPACE BEFORE THE HOUSE ARMED SERVICES COMMITTEE STRATEGIC FORCES SUBCOMMITTEE UNITED STATES HOUSE OF REPRESENTATIVES ON JULY

More information

State Emergency Management and Homeland Security: A Changing Dynamic By Trina R. Sheets

State Emergency Management and Homeland Security: A Changing Dynamic By Trina R. Sheets State Emergency Management and Homeland Security: A Changing Dynamic By Trina R. Sheets The discipline of emergency management is at a critical juncture in history. Even before the horrific events of September

More information

Executing our Maritime Strategy

Executing our Maritime Strategy 25 October 2007 CNO Guidance for 2007-2008 Executing our Maritime Strategy The purpose of this CNO Guidance (CNOG) is to provide each of you my vision, intentions, and expectations for implementing our

More information

Current Budget Issues

Current Budget Issues American Society of Military Comptrollers Professional Development Institute San Diego Current Budget Issues Office of the Under Secretary of Defense (Comptroller) / CFO 0 Rebuilding the U.S. Armed Forces

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.6 July 16, 1996 SUBJECT: Counterintelligence (CI) Awareness and Briefing Program ASD(C3I) References: (a) DoD Directive 5240.6, subject as above, February

More information

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 OPNAVINST 3900.30 N4 OPNAV INSTRUCTION 3900.30 From: Chief of Naval Operations Subj: NAVY CAPABILITY

More information

Introduction to Homeland Security. The Intelligence Community (IC) Director of National Intelligence (DNI) National Intelligence Coord.

Introduction to Homeland Security. The Intelligence Community (IC) Director of National Intelligence (DNI) National Intelligence Coord. Introduction to Homeland Security Chapter 5 Safety & Security: The Intelligence Community The Intelligence Community (IC) Director of National Intelligence (DNI) DDNI National Intelligence Coord. Center

More information

We Produce the Future. Air Force Doctrine

We Produce the Future. Air Force Doctrine We Produce the Future Air Force Doctrine The Role of Doctrine At the very heart of warfare lies doctrine. It represents the central beliefs for waging war in order to achieve victory. Doctrine is of the

More information

Cold War History on the World Wide Web

Cold War History on the World Wide Web St. Cloud State University therepository at St. Cloud State Library Faculty Publications Library Services 1-2010 Cold War History on the World Wide Web Thomas D. Steman St. Cloud State University, tdsteman@stcloudstate.edu

More information

Engaging the DoD Enterprise to Protect U.S. Military Technical Advantage

Engaging the DoD Enterprise to Protect U.S. Military Technical Advantage Engaging the DoD Enterprise to Protect U.S. Military Technical Advantage Brian Hughes Office of the Deputy Assistant Secretary of Defense for Systems Engineering 19th Annual NDIA Systems Engineering Conference

More information

NG-J2 CNGBI A CH 1 DISTRIBUTION: A 07 November 2013

NG-J2 CNGBI A CH 1 DISTRIBUTION: A 07 November 2013 CHIEF NATIONAL GUARD BUREAU INSTRUCTION NG-J2 CNGBI 2400.00A CH 1 DISTRIBUTION: A ACQUISITION AND STORAGE OF INFORMATION CONCERNING PERSONS AND ORGANIZATIONS NOT AFFILIATED WITH THE DEPARTMENT OF DEFENSE

More information

Introduction. General Bernard W. Rogers, Follow-On Forces Attack: Myths lnd Realities, NATO Review, No. 6, December 1984, pp. 1-9.

Introduction. General Bernard W. Rogers, Follow-On Forces Attack: Myths lnd Realities, NATO Review, No. 6, December 1984, pp. 1-9. Introduction On November 9, 1984, the North Atlantic Treaty Organization s (NATO s) Defence Planning Committee formally approved the Long Term Planning Guideline for Follow-On Forces Attack (FOFA) that

More information

THE UNITED STATES NAVAL WAR COLLEGE OPERATIONAL ART PRIMER

THE UNITED STATES NAVAL WAR COLLEGE OPERATIONAL ART PRIMER THE UNITED STATES NAVAL WAR COLLEGE JOINT MILITARY OPERATIONS DEPARTMENT OPERATIONAL ART PRIMER PROF. PATRICK C. SWEENEY 16 JULY 2010 INTENTIONALLY BLANK 1 The purpose of this primer is to provide the

More information

August Initial Security Briefing Job Aid

August Initial Security Briefing Job Aid August 2015 Initial Security Briefing Job Aid A NOTE FOR SECURITY PERSONNEL: This initial briefing contains the basic security information personnel need to know when they first report for duty. This briefing

More information

U.S. Nuclear Strategy After the 2010 Nuclear Posture Review

U.S. Nuclear Strategy After the 2010 Nuclear Posture Review U.S. Nuclear Strategy After the 2010 Nuclear Posture Review Hans M. Kristensen Director, Nuclear Information Project Federation of American Scientists Presentation to Alternative Approaches to Future U.S.

More information

BIODEFENSE FOR THE 21 ST CENTURY

BIODEFENSE FOR THE 21 ST CENTURY BIODEFENSE FOR THE 21 ST CENTURY Bioterrorism is a real threat to our country. It s a threat to every nation that loves freedom. Terrorist groups seek biological weapons; we know some rogue states already

More information

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT)

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT) SAPPC Knowledge Checkup Please note: Cyber items are indicated with a ** at the end of the practice test questions. Question Answer Linked 1. What is the security professionals role in pursuing and meeting

More information

2D MARINE DIVISION. Unit, Personal and Family Readiness. OPSEC for Families. Presentation materials provided by OSPA (

2D MARINE DIVISION. Unit, Personal and Family Readiness. OPSEC for Families. Presentation materials provided by OSPA ( 2D MARINE DIVISION Unit, Personal and Family Readiness OPSEC for Families Presentation materials provided by OSPA (www.opsecprofessionals.org) Your loved one has the training, leadership and equipment

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 3100.10 October 18, 2012 USD(P) SUBJECT: Space Policy References: See Enclosure 1 1. PURPOSE. This Directive reissues DoD Directive (DoDD) 3100.10 (Reference (a))

More information

The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July

The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July 2009 Since the early days of the Revolutionary War,

More information

Operational Security (OPSEC)

Operational Security (OPSEC) Operational Security (OPSEC) The success of military and intelligence operations depend upon secrecy; without secrecy, they generally fail. Paraphrase of Gen. George Washington, First President of the

More information

OF THE DEFENSE FUNDAMENTALS CHAPTER 9

OF THE DEFENSE FUNDAMENTALS CHAPTER 9 CHAPTER 9 FUNDAMENTALS OF THE DEFENSE The immediate purpose of defensive operations is to defeat an enemy attack. Army forces conduct defensive operations as part of major operations and campaigns, in

More information