391-420 Social Media articles displayed
for the Americas/North America/United States
Region
|
For Security, Get Off Oil |
Former CIA director R. James Woolsey discusses oil dependence as a multidirectional national security threat. He asserts that reducing foreign oil dependence matters less than a reduction in domestic...
Read More...
|
|
|
Building the Global Counterterrorism Network |
The spread of the terrorist threat across the globe is identified by Michael Vickers (ASD/SOLIC&IC) as the long-term strategic challenge in the GWOT. He asserts it is primarily an intelligence war an...
Read More...
|
|
|
Obama inheriting broad covert ops policies |
Some predict that in order to maintain flexibility and not hamper the ability of intelligence and military to combat terrorists, President-elect Obama is unlikely to rescind Bush’s directive allowing ...
Read More...
|
|
|
The Money Trail: Finding, Following, and Freezing Terrorist Finance |
A report by two former Treasury Department intelligence officials includes an analysis of the evolution of terrorist financing since 2001. They contend that a viable counterterrorism strategy must al...
Read More...
|
|
|
Intelligence community gets new reciprocity directive |
In a continuing effort to achieve a more unified intelligence community, the Office of the Director of National Intelligence (ODNI) issued a directive requiring intelligence agencies to supervise the ...
Read More...
|
|
|
The Climate for Change |
The inspiring and transformative choice by the American people to elect Barack Obama as our 44th president lays the foundation for another fateful choice, writes former U.S. Vice President, Al Gore. (...
Read More...
|
|
|
U.S.-Peru Free Trade Agreement: One Year Later |
Author discusses impact and effects of the U.S.-Peru Free Trade Agreement. By Adam Kott (11/03/2008)
Read More...
|
|
|
Should the United States Establish a Dedicated Domestic Intelligence Agency for Counterterrorism? |
A RAND study requested by DHS, Office of Intelligence & Analysis provides a framework for debate on the pros and cons of creating a domestic intelligence agency. Many policy choices must be considere...
Read More...
|
|
|
TSA Takes Over Matching Passengers to Watch List from Airlines |
To address the problem of false matches, the TSA will take over what had formerly been commercial airline responsibility for checking passenger names against the terrorist watch list. By Matthew Harw...
Read More...
|
|
|
Government urged to improve information sharing before crises |
A Stimson Center report discusses the need for improved intelligence sharing in a threat environment that includes pandemics, natural disaster, and terrorism with much relevant information outside tra...
Read More...
|
|
|
Threat to Free Trade, Threat to Progress |
The crisis of the financial markets could all-too easily be turned into vast economic crisis if political meddling and populist resentments manage to infringe on free trade. By George A. Pieler and Je...
Read More...
|
|
|
The Fall of U.S. Hegemony in Latin America |
Author analyzes the decreasing influence of the United States in Latin American and the rising influence of Russia and Brasil. By Adam Kott. (10/20/2008)
Read More...
|
|
|
Privacy, Biometrics and the War on Terror |
Author argues that national I.D. cards will not be an effective tool in preventing terrorist attacks in the U.S. He cites fundamental flaws including cost, the need to address civil liberties concern...
Read More...
|
|
|
DARPA seeks technology for seeing inside buildings |
To help address the problem of fighting adversaries who use asymmetric strategies in urban environments, the Defense Advanced Research Projects Agency is attempting to develop technologies to enable w...
Read More...
|
|
|
U.S. Study Is Said to Warn of Crisis in Afghanistan |
A forthcoming National Intelligence Estimate to be issued after the November elections cautions a decline for Afghanistan’s central authority. Among the factors cited are continued cross-border attac...
Read More...
|
|
|
Senate Approves Bill to Broaden Wiretap Powers |
After two and a half years of heated debate over the balance between security and civil liberties, the U.S. Senate approves the largest overhaul of surveillance law in three decades. It facilitates e...
Read More...
|
|
|
Forgotten Homeland Security Agenda |
In the public discourse on homeland security, discussion tends to revolve only around the department itself. However, the authors note there needs to be recognition that the DHS is one of many parts ...
Read More...
|
|
|
Pakistan's new spy chief |
Pakistan chooses former head of Military Operations as Director General of its intelligence agency, ISI. This and more than a dozen other appointments come amidst US concerns over ISI loyalties and p...
Read More...
|
|
|
The counterterrorism paradox |
The author asserts that the military actions-side of the War on Terror has done little to diminish the terrorist threat to the U.S. He advocates a more ‘subtle’ global strategy, one that develops all...
Read More...
|
|
|
Study of Data Mining for Terrorists Is Urged |
The National Research Council contends that there are fundamental problems with applying commercial data mining tools to the tracking of terrorists. Among the legal, technological and logistical prob...
Read More...
|
|
|
Climate Change Will Have Destabilizing Consequences, Intelligence Agencies Warn |
Relying largely on public sources of information, the Intelligence Community has issued a National Intelligence Assessment (NIA) on the global security implications of climate change. Among other jud...
Read More...
|
|
|
Tackling terror: India takes lessons from US |
India national security advisor is briefed on the operations of the DHS by Under Secretary for Intelligence and Analysis of the Department of Homeland Security to learn how better to coordinate the co...
Read More...
|
|
|
Security, Surveillance and Satellites |
Congress has authorized funds to begin implementation of the DHS National Applications Office (NAO) program to utilize geospatial intelligence capabilities for domestic purposes. It will enhance port...
Read More...
|
|
|
An Argument for Open Source Intelligence Secrecy |
Director of intelligence studies at Georgetown University argues that the risk of compromising insights that support ‘decision advantage’ rather than protecting sources and methods necessitates the cl...
Read More...
|
|
|
C.I.A. Outlines Pakistan Links With Militants |
Addressing continuing concerns about ISI loyalties, the CIA confronts Pakistan with evidence of ties between its intelligence service and militant groups operating in the country’s tribal areas. By M...
Read More...
|
|
|
Homeland Security lacking 'open source' intelligence |
A report by the House Committee on Homeland Security criticizes the DHS for being behind the rest of the intelligence community in its OSINT efforts. The Committee says not enough has been done to p...
Read More...
|
|
|
Reduced Dominance Is Predicted for U.S. |
NIC Chairman Thomas Fingar previews a report forecasting an erosion of U.S. influence as other economic powers rise. The declining influence may affect the international system as no power will be in...
Read More...
|
|
|
Media Leaks Hinder Intelligence Gathering |
RAND analyst notes that when journalists publish classified information gained from leaks by government officials they can compromise sources and methods as severely as would efforts by foreign intell...
Read More...
|
|
|
FBI Wrestling With Remake as Intelligence Agency |
Among the problems the FBI is facing in developing its domestic intelligence capabilities is its gun-and-badge culture in which intelligence analysts are regarded as less important than agents. By Si...
Read More...
|
|
|
U.S. Intelligence Agencies Militarizing |
Some speculate that the appointment of military officers to the most senior positions of civilian intelligence agencies entrenches a shift towards current intelligence reporting at the expense of stra...
Read More...
|
|
1-30 | 31-60 | 61-90 | 91-120 | 121-150 | 151-180 | 181-210 | 211-240 | 241-270 | 271-300 | 301-330 | 331-360 | 361-390 | 391-420 | 421-450 | 451-480 | 481-510 | 511-540 | 541-570 | 571-600 | 601-630 | 631-660 | 661-690 | 691-720 | 721-750 | 751-780 | 781-810 | 811-840 | 841-870 | 871-900 | 901-930 | 931-960 | 961-990 | 991-1020 | 1021-1050 | 1051-1080 | 1081-1110 | 1111-1140 | 1141-1170 | 1171-1200 | 1201-1230 | 1231-1260 | 1261-1290 | 1291-1320 | 1321-1350 | 1351-1380 | 1381-1410 | 1411-1440 | 1441-1470 | 1471-1481
|
|
|