Policy Archives on Public Intelligence (1992-2006)

Policy

2006

US

PolicyDoDQDR Shift in Focus 18 Years After Gray and Steele Recommended Same

2006

US

PolicyMarkowitzDefense Science Board Report on Transitions (NGO, OSINT)

2006

US

PolicyPetersCounterrevolution in Military Affairs

2006

US

PolicySteeleTerms of Reference for Intelligence Reform 1.1

2006

US

PolicySteeleIn Search of a Leader (Four Essential Reforms)

2006

US

PolicySteeleElectoral Refrom as Precursor to Intelligence Reform

2006

US

PolicyTsuruokaManaging for the Future: Interview with Alvin Toffler

2005

US

PolicyAndreggEthics and the IC: Breaking the Laws of God and Man

2005

UK

PolicyBASICThink Tank Report on US Intelligence Incompetence

2005

EU

PolicyEUEuropean Union Proposed Multi-National Intelligence Service

2005

US

PolicyGodsonCulture of Lawfullness

2005

US

PolicySteeleON INTELLIGENCE: Overview in Aftermath of 9-11

2005

US

PolicySteeleOp-Ed on Condi Rice’s Active Deception

2005

US

PolicySteeleCease and desist letter on Naquin

2005

US

PolicyTamaPrinceton Review on Intelligence Reform

2004

US

PolicyAlexanderArmy G-2 Accepts OSINT as Separate Discipline

2004

US

PolicyAndreggInsanity of Planned Intelligence “Reforms”

2004

AU

PolicyAnon & SteeleUpdate on OSINT in Australia

2004

FR

PolicyClercCognitive Knowledge for Nations

2004

US

PolicyCordesmanQuestions & Answers on Intelligence Reform

2004

US

PolicyCordesman & SteeleQuestions & Answers on Intelligence Reform

2004

US

PolicySimmonsCongressman Simmons Letter to General Schoomaker on OSINT

2004

US

PolicySteeleDoD OSINT Program: One Man’s View of What Is Needed

2004

US

PolicySteeleTranscript of Steele at Secretary of State’s Open Forum 24 March 2004

2004

NL

PolicyTongeren (van)Need for Global Alliance for Human Security (Complete)

2004

NL

PolicyTongeren (van)Need for Global Alliance for Human Security (Overview)

2003

US

PolicyCzechSteady State Revolution and National Security

2003

CA

PolicyFyffeIntelligence Sharing and OSINT

2003

CA

PolicyFyffeIntelligence Sharing and OSINT (Summary)

2003

UN

PolicyLewisCreating the Global Brain

2003

US

PolicyMarkowitzOSINT in Support of All Source

2003

US

PolicyMarkowitzOpen Source Intelligence Investment Strategy

2003

US

PolicySteeleOpen Letter to Ambassadors Accredited to the USA

2003

BE

PolicyTruyensIntelligent vs. Intelligence: That Is The Question

2002

Italy

PolicyPoliti11th of September and the Future of European Intelligence

2001

US

PolicyHeibelIntelligence Training: What Is It?  Who Needs It?

2001

US

PolicyHeibelValue of Intelligence & Intelligence Training to Any Organization

2001

US

PolicyOakleyUse of Civilian & Military Power for Engagement & Intervention

2000

US

PolicyBerkowitzAn Alternative View of the Future of Intellligence

2000

RU

PolicyBudzkoRussian View of Electronic Open Sources and How to Exploit Them

2000

US

PolicyErmarthOSINT: A Fresh Look at the Past and the Future

2000

IT

PolicyPolitiThe Birth of OSINT in Italy

1999

US

PolicyAllen (ADCI/C)OSINT as a Foundation for All-Source Collection Management

1999

UK

PolicyRolingtonChanging Messages in Western Knowledge Over 400 Years (Slides)

1999

UK

PolicyRolingtonChanging Messages in Western Knowledge Over 400 Years (Text)

1999

UK

PolicySteeleSnakes in the Grass: Open Source Doctrine

1998

US

PolicyDonahueBalancing Spending Among Spies, Satellites, and Schoolboys

1997

FR

PolicyBotbolThe OSINT Revolution: Early Failures and Future Prospects

1997

US

PolicyFelsherViability & Survivability of US Remote Sensing as Function of Policy

1997

US

PolicySteeleIntelligence in the Balance: Opening Remarks at OSS ‘97

1997

US

PolicySuttonGlobal Coverage ($1.5B/Year Needed for Lower Tier OSINT)

1997

US

PolicyTsuruokaAsian Perceptions of What Is and Is Not Legal in Economic Intelligence

1997

UK

PolicyTyrrellProposals to Develop a NATO/PfP OSINT Capability

1996

FR

PolicyClercEconomic and Financial Intelligence: The French Model

1996

US

PolicyKahinWhat Is Intellectual Property?

1996

US

PolicySteeleCreating a Smart Nation (Govt Info Q and also CYBERWAR Chapter)

1996

US

PolicySteeleInfoPeace: OSINT as a Policy Option & Operational Alternative

1996

US

PolicySteeleOpen Sources and the Virtual Intelligence Community

1996

US

PolicySteeleProtecting the Civilian Infrastructure as an Aspect of Information Warfare

1996

US

PolicyZuckermanThe Central Role of Open Source Economic Intelligence

1995

US

PolicyPrusakSeven Myths of the Information Age

1995

US

PolicySteeleConference Executive Summary C/HPSCI and former DCI Colby

1995

US

PolicySteeleCreating a Smart Nation: Strategy, Policy, Intelligence, & Information

1995

US

PolicySteeleSMART NATIONS: NI Strategies and Virtual Intelligence Communities

1994

US

PolicyOgdin & GiserCyber-Glut, and What To Do About It

1994

FR

PolicySchmidtOpen Source Solutions 1994: The State of Intelligence

1994

US

PolicySchwartauLetter on NII Security

1994

US

PolicySchwartau et alCross-Walk of 3 Experts’ Spending $1 Billion per Year for NII Security

1994

US

PolicySteeleCommunications, Content, Coordination, and C4 Security: Talking Points

1994

US

PolicySteeleCorrespondence to Mr. Marty Harris, NII Commission

1994

US

PolicySteeleDATA MINING: Don’t Buy or Build Your Shovel Until You Know What…

1994

US

PolicySteeleExpansion of Questions Posed by Senator John Warner to Aspin-Brown

1994

US

PolicySteeleLetter to the Open Source Lunch Club on PFIAB Being Useless

1994

US

PolicySteeleNational and Corporate Security in the Age of Information

1994

US

PolicySteelePrivate Enterprise Intelligence: Its Potential Contribution to Nat’l Sec.

1993

FR

PolicyBeaumardFrance: Think-tank to Anticipate & Regulate Economic Intelligence Issues

1993

FR

PolicyBeaumardLearned Nations: Competitive Advantages Via Knowledge Strategies

1993

US

PolicyBrennerLaw and Policy of Telecommunications and Computer Database Networks

1993

US

PolicyCastagnaReview of Reich, The Work of Nations

1993

AU

PolicyChantlerNeed for Australia to Develop a Strategic Policy on OSI

1993

US

PolicyCislerCommunity Computer Networks

1993

US

PolicyCivilleThe Spirit of Access: Equity, NREN, and the NII

1993

US

PolicyFedanzoA Genetic View of National Intelligence

1993

US

PolicyHaverIntelligence Aim Veers to Amassing Overt Information

1993

JP

PolicyKumonJapan and the United States in the Information Age

1993

SE

PolicyLeijonhelmEconomic Intelligence Cooperation Between Government Industry

1993

US

PolicyLoveComments on the Clinton Administration’s ‘Vision’ Statement for the NII

1993

US

PolicyPetersenA New Twenty-First Century Role for the Intelligence Community

1993

GE

PolicySchmidtHistory of Failure, Future of Opportunity: Reinventions and Deja Vu

1993

US

PolicySteeleA Critical Evaluation of U.S. National Security Capabilities

1993

US

PolicySteeleACCESS: Theory and Practice of Intelligence in the Age of Information

1993

US

PolicySteeleExecutive Order 12356, ‘National Security Information’

1993

US

PolicySteeleReinventing Intelligence in the Age of Information (TP for DCI)

1993

US

PolicySteeleReinventing Intelligence: The Advantages of OSINT

1993

US

PolicySteeleRole of Grey Lit & Non-Traditional Agencies in Informing Policy Makers

1993

US

PolicyToffler (Both)Knowledge Strategies, Intellience Restructuring,  Global Competitiveness

1993

US

PolicyWallnerOverview of IC Open Source Requirements and Capabilities

1993

US

PolicyWoodThe IC and the Open Source Information Challenge

1992

US

PolicyBarlowEFF and the National Public Network (NPN)

1992

US

PolicyCastagnaReview of Toffler’s PowerShift

1992

SE

PolicyDedijerOpen Source Solutions: Intelligence and Secrecy

1992

US

PolicyGageOpen Sources, Open Systems

1992

US

PolicyGreenwaldUnrepresented Nations & Peoples Organization: Diplomacy’s Cutting Edge

1992

US

PolicyHughesAn Affordable Approach to Networking America’s Schools

1992

US

PolicyKahinNew Legal Paradigms for Multi-Media Information in Cyberspace

1992

US

PolicyKahnOutline of a Global Knowledge Architecture, Visions and Possibilities

1992

US

PolicySteeleE3i: Ethics, Ecology, Evolution, and Intelligence

1992

US

PolicySteeleInaugural Remarks Opening 1st International Conference

1992

US

PolicySteeleInformation Concepts & Doctrine for the Future

1992

US

PolicySteeleOSINT Clarifies Global Threats: Offers Partial Remedy to Budget Cuts

1992

US

PolicySteeleReview Strassmann, Information PayOff

1992

US

PolicyWoodRemarks, Don’t Be Suspicious of Contractors

1991

US

PolicyJFK Working GroupNational Intelligence and the American Enterprise: Possibilities

1991

US

PolicyKarrakerHighways of the Mind

1991

US

PolicySteeleHow to Avoid Strategic Intelligence Failures in the Future

1990

US

PolicySteeleRecasting National Security in a Changing World

1957

US

PolicyWrightProject for a World Intelligence Center

Military Archives on Public Intelligence (1992-2006)

Military
Archives 1992-2006
Archives 1992-2006

2005

US

MilitarySteeleUS Army Conference: E3i: Making the Revolution

2005

US

MilitaryUSAArmy Modernization Briefing

2004

US

MilitarySimmonsForeword to the Draft SOF OSINT Handbook

2004

NL

MilitaryWiebesSIGINT in Bosnia

2003

US

MilitaryHardeeOSINT in Support of Special Operations

2003

US

MilitaryHarrisonOSINT Requirements, Collection, & Production Management

2003

US

MilitarySteeleSOUTHCOM: Strategic Threat Assessment

2003

US

MilitarySteeleAFCEA Texas: C4I Revolution and National Security

2003?

US

MilitarySteeleTo SecDef: Force Structure Trade-Offs and the Real World

2002

US

MilitaryHardeeGrowing an Open Source Intelligence Program

2001

US

MilitarySteeleAUSA: Intelligence Support to a Transforming Army

2001

US

MilitarySteeleAWC: Welcome to the Real World: Force Structure Trade-Offs

2000

CA

MilitaryCoxOSINT at SHAPE…Some Musings

2000

FR

MilitaryDebatThe Challenge of Informing European Defence Decisions

2000

US

MilitaryHughesOpen Sources and Intelligent Solutions

2000

Austria

MilitaryMuellerAustrian Military Intelligence Thoughts on OSINT

2000

UK

MilitaryReganThe UK Ministry of Defence OSINT Program

2000

US

MilitaryReynoldsU.S. Transportation Command OSINT

2000

US

MilitarySteeleBriefing to NATO/PfP: One World Ready or Not

1999

US

MilitaryClarkEAGLE VISION: USAF Initiative for Tactical Receipt of Imagery

1999

US

MilitaryConnorsPACOM Additional Slides on VIC

1999

US

MilitaryConnorsU.S. Pacific Command’s Virtual Information Center (VIC)

1999

US

MilitaryDearthIntelligence in the 21st Century

1999

US

MilitaryLeeSummary of Military Map Availabililty for Iran

1999

US

MilitaryMyers & MadisonVirtual Information Center Concept Refinement

1999

US

MilitaryPrinslow & BondInformation Sharing in Humanitarian Emergencies

1999

US

MilitarySteeleOverview of OSINT Issues & OSINT Utility to DoD

1999

US

MilitarySteeleSetting the Stage for Information Sharing in the 21st Century: 3 Issues

1999

US

MilitarySteeleWhat Do We Need to Know and Where Do We Get It? (Slides)

1999

US

MilitarySteeleExpeditionary Environment in the 21st Century

1999

US

MilitaryWirtzBridging the Culture Gap: OSINT and the Tet Offensive

1998

US

MilitaryBeavers & ShanahanOperationalizing IO in Bosnia-Herzegovina (Book Chapter)

1998

SE

MilitaryBjoreOpen Sources and Methods for the Military

1998

SE

MilitaryBjoreOSINT Lessons Learned

1998

UK

MilitaryRathmellAssessing the IW Threat from Sub-State Groups

1998

US

MilitarySteeleINFORMATION PEACEKEEPING: Purest Form of War (Outline)

1998

US

MilitarySteeleSkeptical Assessment of USN-USMC Based on Real-World OSINT

1998

US

MilitarySteeleTAKEDOWN: The Asymmetric Threat to the Nation

1998

UK

MilitaryTyrrellOSINT: The Challenge for NATO

1997

US

MilitaryAlgerIATAC: Building a Knowledge Base of Emerging IAT

1997

US

MilitaryClarkEAGLE VISION: Tactical Downlink Station for Imagery

1997

US

MilitaryClintonManaging Complex Contingency Operations

1997

US

MilitaryMolholmDTIC: Building a Virtual Knowledge Warehouse

1997

US

MilitaryNecobaThe Marines and OSINT

1997

US

MilitaryPedtkeNational Air Intelligence Center Science & Technology OSINT

1997

US

MilitarySteeleCINC Brief: The One that Got CINCSOC (Now CSA) to Buy In

1997

US

MilitarySteeleCreating a Bare Bones OSINT  Capability (Slides)

1997

US

MilitarySteeleCreating a Bare Bones OSINT Unit for DIA

1997

US

MilitarySteeleCINCSOC 10 Minute Brief on OSINT

1997

US

MilitaryVeselyStriking A Balance: National, Operational, & Tactical Acquisition

1996

US

MilitarySmithDefense Mapping Agency and the Commercial Sector

1996

US

MilitarySteeleOpen Source Intelligence Handbook, Chapter 5, OSINT and Military

1996

US

MilitarySteeleDIA/JMITC: National Knowledge Strategy & Revolution in Intelligence

1996

US

MilitarySteinMapping, Charting, and Geodetic Needs for Remote Sensing Data

1995

SE

MilitaryBjoreSix Years of Open Source Information (OSI): Lessons Learned

1995

US

MilitaryDandarArmy Intelligence XXI, Open Source Status Report

1995

US

MilitaryDandarOSIF Exploitation for Army Intelligence XXI: Summary

1995

UK

MilitaryGarfieldUpdate on the UK MoD OSINT Programme (Slides)

1995

UK

MilitaryGarfieldUpdate on the UK MoD OSINT Programme (Text)

1995

US

MilitaryRicardeliOSINT in Support of Haiti Invasion (Slides)

1995

US

MilitaryRicardeliOSINT in Support of Haiti Invasion (Text)

1995

US

MilitarySteeleThe Military Perspective on Information Warfare: Apocalypse Now

1995

US

MilitarySteeleAWC: Open Source Intelligence for the Military

1994

US

MilitaryBrooks & McKeeyerSplit-Based Ops in DESERT STORM: Glimpse of the Future Digital Army

1994

US

MilitaryMunroINFORMATION WARFARE: Snake Eaters Meet Net-Heads

1994

US

MilitaryPedtkeNAIC & The Intelligence Community Open Source Architecture

1994

US

MilitarySteeleDIA/JMITC: NS via the Reinvention of National & Defense Intelligence

1992

US

MilitaryCliftMilitary OSINT Requirements, Capabilities, and Contracting Directions

1992

US

MilitaryPedtke et alNAIC S&T Open Source Intelligence Requirements & Capabilities

1992

US

MilitaryPetersenNew Roles for the U.S. Military

1992

US

MilitarySchwartauIntroduction to Information Warfare

1992

US

MilitarySteeleIntelligence Lessons Learned from Recent Expeditionary Operations

1992

US

MilitarySteeleComments Prepared for Future War Roundtable

1992

US

MilitaryStrassmannForcing Innovation, Cutting Costs, and Increasing Defense Productivity

1991

US

MilitarySteeleDefense Intelligence Productivity in the 1990’s

1990

US

MilitaryUSMC & SteeleExpeditionary Environment Research & Analysis Model

1990

US

MilitaryUSMC & SteeleExpeditionary Mission Area Factors Summaries

Review: Pearl Harbor Dot Com

5 Star, Communications, Information Society, Information Technology, Threats (Emerging & Perennial)

Amazon Page
Amazon Page

5.0 out of 5 stars Everything You Need to Know About the Next Attack–And Fun,

February 6, 2002
Winn Schwartau
This book is a based on a *non-fiction* manuscript about U.S. vulnerabilities to electronic that was so hot that the author’s lawyers insisted he turn it into a novel to avoid liability.It is absolutely superb and written by one of the most authoritative persons around. Unlike most academic and industry security specialists, the author has from the very beginning understood, respected, and been in touch with the elite hackers who worked very hard in the 1980’s to expose the outrageously vulnerable electronic systems used by our financial, transportation, power, and communications industries.

In my view, books like this as well as the non-fiction books such as “Information Warfare: Chaos on the Electronic Superhighway” have been vital elements in educating consumers, stockholders, and voters. If you want to know just how vulnerable your bank account is, read this book.

I won’t reveal the surprise ending, but will say that it is absolutely a shocker, and totally credible.

Vote on Review
Vote on Review

Review: Cybershock–Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption

5 Star, Asymmetric, Cyber, Hacking, Odd War

Amazon Page
Amazon Page

5.0 out of 5 stars Sensationalist, Populist, Useful, Worthy,

August 22, 2000
Winn Schwartau
There will be those quick to trash this book as sensationalist, and they are partly right. What most people, including the critics, do not realize is that Winn Schwartau went out on a limb in the late 1980’s and early 1990’s and is *the* primary reason Congress got concerned enough about these issues to demand a Critical Infrastructure Protection program funded at over $1B–it was Winn, not others quick to claim the line, that testified to Congress about an “electronic Pearl Harbor” on 24 June 1991. This book is unabashedly populist and seeks to make this very complex threat entertaining and understandable, and for that reason alone it is worth the time to consider. There are many other serious books for engineers, this is the one for anyone at all from housewife to student to executive. Great airplane book, won’t save the world, but will certainly increase your consciousness across the board. Worthy.
Vote on Review
Vote on Review

1994 Sounding the Alarm on Cyber-Security

Correspondence, Memoranda
Steele to USG
Steele to USG

This is the cover letter to the US Government official most responsible for thinking about the National Information Infrastructure (NII) and the security of that infrastructure.  Three “top guns,” one of the the foremost authority in the public arena, another the foremost expert on these matters advising the National Security Agency (NSA) all agreed on the need, in 1994, for a $1 billion a year program.

Today (Fall 2009) NSA has asked for $12 billion a year, and they are not letting on that the real reason they are building their own power plant is because the Chinese have mastered the art of riding the public electrical grid into any computer running on public electricity.  Below are the cross walk and the contributing letters from the top experts in 1004.  NSA has let us all down.

OSS1994-01-18 Cross Walk

OSS1994-01-19 Warning Letters

UPDATE OF 19 DECEMBER 2016:

Both Bill Caelli and Winn Schwartau have new books coming out in 2017, the bottom line of which is that we can indeed secure cyberspace, but it requires that governments and the providers of communications and computing software and hardware have integrity — not the case today. Below is the concept Robert Garigue (RIP) and Robert Steele developed in 1997. No one has implemented this to date.

Click on Image to Enlarge