· 2009
During the Cold War, U.S. intelligence was concerned primarily with states; non-state actors like terrorists were secondary. Now the priorities are reversed and the challenge is enormous. States had an address, and they were hierarchical and bureaucratic. They thus came with some 'story'. Terrorists do not. States were 'over there', but terrorists are there and here. They thus put pressure on intelligence at home, not just abroad. The strength of this book is that it underscores the extent of the change and ranges broadly across data collection and analysis, foreign and domestic, as well as presenting the issues of value that arise as new targets require collecting more information at home.
· 2001
Gregory Treverton, former US National Intelligence council head, demonstrates how government intelligence must change.
· 2014
When nations divide, whether peacefully or through violence, there are many issues beyond politics to negotiate in the aftermath. Understanding the concerns that are likely to confront separated states is vital in establishing stability in new states. Examining case studies in Africa, Europe, and Asia, international security expert Gregory Treverton provides a detailed guide to recent national divisions that range from the partition of India to the secession of Eritrea from Ethiopia. Dividing Divided States offers an overview of the ways different states have handled such contentious issues as security and citizenship, oil and water resources, assets and liabilities, and the rights of pastoralist groups. In each case, Treverton considers how the root causes of secession—such as long-simmering conflicts, nationalist politics, and changed geopolitical circumstances—impact the effectiveness of policies that form new nations. Dividing Divided States serves as both a source of ideas for future secession policies and a reminder that, while the motivations and outcomes of secessions may differ widely, separating states face similar challenges in dividing populations, natural resources, and state resources. This book offers considered and cautionary lessons for policy makers and policy researchers alike.
No image available
· 2003
The world of intelligence has been completely transformed by the end of the Cold War and the onset of an age of information. Prior to the 1990s, US government intelligence had one principal target, the Soviet Union; a narrow set of 'customers', the political and military officials of the US government; and a limited set of information from the sources they owned, spy satellites and spies. Today, world intelligence has many targets, numerous consumers - not all of whom are American or in the government - and too much information, most of which is not owned by the U.S. government and is of widely varying reliability. In this bold and penetrating study, Gregory Treverton, former Vice Chair of the National Intelligence Council and Senate investigator, offers his insider's views on how intelligence gathering and analysis must change. He suggests why intelligence needs to be both contrarian, leaning against the conventional wisdom, and attentive to the longer term, leaning against the growing shorter time horizons of Washington policy makers. He urges that the solving of intelligence puzzles tap expertise outside government - in the academy, think tanks, and Wall Street - to make these parties colleagues and co-consumers of intelligence, befitting the changed role of government from doer to convener, mediator, and coalition-builder.
· 2016
The Intelligence Community does not lag far behind the private sector in using collaborative tools; indeed, it has developed an impressive array. However, the most used tools, like instant messaging (IM), are employed primarily within agencies for peer-to-peer communication and hence are neither widely collaborative nor especially novel: they are different ways of accomplishing familiar functions. The array of collaborative tools across agencies—ranging from IM to blogs to a wiki called Intellipedia—is impressive but used mostly by enthusiasts. This report identifies lessons learned from looking at the use of internal collaborative tools across the Intelligence Community, especially across the four biggest agencies: Central Intelligence Agency, Defense Intelligence Agency, National Security Agency, and National Geospatial Intelligence Agency.
One of the questions in the fight against terrorism is whether the United States needs a counterterrorism domestic intelligence agency separate from law enforcement. Drawing on an analysis of current counterterrorism efforts, an examination the domestic intelligence agencies in six other democracies, and interviews with intelligence and law enforcement experts, this volume lays out the relevant considerations for creating such an agency.
This report assesses intelligence analysis across the main U.S. intelligence agencies and makes a number of recommendations, some of which parallel initiatives that have begun in the wake of the December 2004 legislation, for instance, create a Deputy Director of National Intelligence as a focal point for analysis, establish a National Intelligence University, build a Long Term Analysis Unit at the National Intelligence Council, and form an Open Source Center for making more creative use of open-source materials.
In theory, financial professionals are relatively distinct: A broker-dealer conducts transactions in securities on behalf of itself and others; and an investment adviser provides advice to others regarding securities. Different laws regulate each type of professional, but boundaries have blurred. This report examines current business practices and investor understanding of each type.
It is still easy to underestimate how much the collapse of the Soviet Union and the end of the Cold War?--and then the terrorist attacks of September 11, 2001?--transformed the task of American foreign and defense policymaking. In place of predictability (if a sometimes terrifying predictability), the world is now very unpredictable. In place of a single overriding threat and benchmark by which all else could be measured, a number of possible threats have arisen, not all of them states. In place of force-on-force engagements, U.S. defense planners have to assume "asymmetric" threats?--ways not to defeat U.S. power but to render it irrelevant. This book frames the challenges for defense policy that the transformed world engenders, and it sketches new tools for dealing with those challenges?--from new techniques in modeling and gaming, to planning based on capabilities rather than threats, to personnel planning and making use of "best practices" from the private sector.
· 2009
A study of the involvement of organized-crime and terrorist groups in product counterfeiting. Case studies of film piracy illustrate the problem of criminal and perhaps terrorist groups using this new high-payoff, low-risk way to fund their activities. Cooperation among law enforcement and governments worldwide is needed to combat intellectual-property theft, which threatens the global information economy, public safety, and national security.