Intelligence / National Security / Secrecy Index [A-I]
# | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
abovetopsecret.com- A website comprising a vast array of pages containing information with the ultimate purpose of exposing the secrecy that exists within the government and military organisations of the world.
ACLU National Security Project - Advocates for national security policies that are consistent with the Constitution, the rule of law, and fundamental human rights. The Project litigates cases relating to detention, torture, discrimination, surveillance, censorship, and secrecy. Originally created as an informal working group after the September 2001 attacks, the National Security Project is now at the forefront of virtually every major legal battle relating to national security, civil liberties, and human rights.
Africa Intelligence - The leading website for professional information on Africa, Africa Intelligence disseminates confidential information on the African continent's political and economic news.
Air America - Air America, an airline secretly owned by the CIA. Air America's tenure in Asia began when Civil Air Transport (CAT) crossed the river into Shanghai in 1946. It ended on a rooftop in downtown Saigon in 1975. CAT/Air America archival collections and historical resources.
Air University: Published Maxwell Papers - The Maxwell Papers, the Air War College's occasional papers series, focus on current and future issues of interest to the Air Force and Department of Defense. The first Maxwell Paper was published in May 1996.
AJAX - Access to U.S. and international government military and intelligence agencies.
AMDOCS - Amdocs is a provider of software and services for billing, customer relationship management (CRM), and business and operations support systems (OSS). Its traditional clients are telecommunications Tier-1 and Tier-2 providers such as AT&T Mobility, Cable One, Cablevision, Comcast, DirecTV, Jupiter Communications, Sprint-Nextel, T-Mobile, Sensis, Vodafone, Fido Solutions and Rogers Communications (both of which use the ICM/CRM application). The company also offers outsourced customer service and data center operations. Amdocs maintains development facilities in China, Cyprus, India, Ireland, Israel and the United States, operates a support center in Brazil, and has operations in North America, Europe, Latin America and the Asia-Pacific region. Virtually all call records and billing in the U.S. are done for the phone companies by Amdocs Ltd., an Israeli-based private communications company.
ArmorGroup International PLC - Describes itself as "a leading international provider of protective security services, security training and weapons reduction and mine clearance services, primarily to governments, major inter-governmental organizations and multinational corporations." ArmorGroup has over 9,000 highly trained and experienced employees and long term operations in 38 countries. Over the past two years it has supported its clients in over 160 countries across the Middle East, Africa, North and South America, the CIS and central Asia. Also see SourceWatch entry on ArmorGroup.
Army Intelligence and Security - Regulations are directives prescribing responsibilities and procedures. Pamphlets explain responsibilities and procedures.
Asia-Pacific Area Network (APAN) - A collaborative enviroonment designed for the defense and security community to include military and civilian government officials, defense academics and think tanks.
Australian Security Intelligence Organisation (ASIO) - The domestic counter-intelligence and security agency of Australia which is responsible for the protection of the country and its citizens from espionage, sabotage (especially sabotage of critical infrastructure), politically-motivated violence, attacks on the Australian defence system, terrorism and acts of foreign interference. Also see Wikipedia article.
Australian Signals Directorate (DSD) - Australia's national authority for signals intelligence and information security. Collects and disseminates foreign signals intelligence (known as Sigint); provides information security (Infosec) products and services to the Australian Government and its Defence Force.
Battelle - An international science and technology enterprise that explores emerging areas of science, develops and commercializes technology, and manages laboratories, including several U.S. national laboratories for its Department of Energy. Food product development, national security, solutions lab, laboratory security, formulation development, product stabilization, protein manufacturing, protein purification, assay development, drug metabolism, efficacy testing, biomarkers, toxicology, safety pharmacology, analytic chemistry, trace analysis, agrochemical product development, animal health product development, futuregen, homeland security, logistics management, laboratory management.
Battleland - Military intelligence news from Time magazine.
Blum, William - Writings of William Blum, American author, historian, and critic of United States foreign policy.
Booz Allen Hamilton: Defense/National Security - The firm serves the U.S. Department of Defense, armed services, the National Security Community, and allied defense clients with expertise in the broad areas of strategy, engineering, management consulting, information technology, and systems development and integration.
Border Security and Unmanned Aerial Vehicles [.pdf] - The use of Unmanned Aerial Vehicles (UAVs) to improve border security is a technique that has garnered congressional attention. This report examines the strengths and limitations of deploying UAVs along the borders and related issues for Congress. This report is not intended to provide in-depth information regarding technical or military capabilities of UAVs, but to discuss their application at the border.
Brennan Center for Justice: Liberty and National Security - Focuses on restoring the proper flow of information between the government and the people by securing increased public access to government information; ensuring government policies targeting terrorist do so effectively and without religious or ethnic profiling; and securing appropriate for government oversight and accountability.
British American Security Information Council (BASIC) - A progressive and independent analysis and advocacy organization which researches and provides a critical examination of global security issues, including nuclear policies, military strategies, armaments and disarmament. BASIC assists in the development of global security policies, policy-making and the assessment of policy priorities, and promotes public awareness and understanding of these policies and of policy-making in Europe and the U.S.
Bureau of Industry and Security (BIS) - U.S. agency regulates the export of sensitive goods and technologies; enforces export control, antiboycott, and public safety laws; cooperates with and assists other countries on export control and strategic trade issues; assists U.S. industry to comply with international arms control agreements; and monitors the viability of the U.S. defense industrial base to ensure that it is capable of satisfying U.S. national and homeland security needs.
Canadian Security Intelligence Service (CSIS) - Investigates threats which may, on reasonable grounds, be suspected of posing a threat to the security of Canada. CSIS also has the authority to take measures to reduce these threats if there are reasonable grounds to believe that they pose a threat to national security.
Center for Cryptologic History - Preserves and advances understanding of cryptologic history for National Security Agency (NSA), the United States Intelligence Community, the Department of Defense, other government agencies, academia, and the general public.
Center for International and Security Studies at University of Maryland (CISSM) - Current projects include the Advanced Methods of Cooperative Security Project, which includes the Controlling Dangerous Pathogens Project; the National Intelligence Council Project on the Evolution of the Nation-state; the National Security Council and U.S. Foreign Policymaking; the Jerusalem Project; and the Project on a New U.S.-European Dialogue. Research includes the use of traditional security instruments - such as arms control, peacekeeping, and the use of force - in the post-Cold War context; the nexus between international economics and security; cooperation and conflict between the United States and its allies; and the process of foreign policymaking, including the role of particular institutions and the impact of public attitudes.
Center for International Policy (CIP) - Promoting a U.S. foreign policy based on peace, international cooperation, demilitarization and respect for basic human rights. Through research, education, and direct public advocacy, CIP works to define and put into practice a more sympathetic, farsighted, and non-militaristic approach to the developing world.
Center for Security Policy (CSP) - Source of news, analysis and information on key defense and security issues, a revolving door network of hawkish defense pundits, conservative policy-makers, and defense industry representatives.
Center for Studies of Intelligence (CSI) - A Central Intelligence Agency (CIA) site. Intelligence research, history and historical records. Publishes the quarterly classified journal and annual unclassified edition of Studies in Intelligence.
Center on Law and Security - A global center of expertise designed to promote an informed understanding of the major legal and security issues that define the post-9/11 environment. Towards that end, the Center brings together policymakers, practitioners, scholars, journalists and other experts who might not otherwise meet to address major issues and gaps in policy discourse and to provide concrete policy recommendations.
Central Bureau of Investigation (India) - The Central Bureau of Investigation was primarily set up to investigate offences relating to bribery and corruption against the Central Government/ Public Sector Undertakings employees. However, over the years it has acquired a much vaster role and today it is investigating into cases pertaining to central fiscal and economic laws, major economic frauds of the country, terrorist offences and other offences affecting the national security.
CREST: 25-Year Program Archive - The new CIA Freedom of Information Act (FOIA) Electronic Reading Room. The automatic declassification provisions of Executive Order 13526 require the declassification of nonexempt historically valuable records 25 years or older. The CREST system is the publicly accessible repository of the subset of CIA records reviewed under the 25-year program in electronic format (manually reviewed and released records are accessioned directly into the National Archives in their original format).
Intelligence & Analysis - The DI is comprised of 13 offices. Four offices concentrate on regional political and economic issues, six examine broad transnational issues, and three focus on policy, collection, and staff support. The DI also supports a selection of other analytic programs.
Cheyenne Mountain Complex - Overview provided by the Federation of American Scientists. The Cheyenne Mountain Complex (CMC) outside Colorado Springs, CO, is the main correlation center of the Integrated Tactical Warning and Attack Assessment (ITW/AA) system. Cheyenne Mountain is the command, control, communication and intelligence center for coordinating and controlling North American Aerospace Defense Command (NORAD) and United States Space Command (USSPACECOM) missions. The facility houses operations centers which are equipped with processors, displays, and communications link the centers to forward sensors and to the NCC.
Cheyenne Mountain Complex - Overview provided by the NORAD: "The original requirement for an operations center in Cheyenne Mountain was to provide command and control in support of the air defense mission against the Soviet manned bomber threat. In the early 1960s, the advent of an Intercontinental Ballistic Missile (ICBM) attack against North America became a top priority. Missile warning and air sovereignty were the primary missions in the Mountain throughout the 1960s and 70s. During a brief period in the mid 1970s, the Ballistic Missile Defense Center was installed within the Mountain. In 1979, the Air Force established a Space Defense Operations Center to counter the emerging Soviet's anti-satellite threat. Evolution continued into the 1980s when Air Force Space Command was created and tasked with the Air Force Space mission. In April 1981, Space Defense Operations Center crews and their worldwide sensors, under the direction of Air Defense Command, supported the first flight of the space shuttle. Cheyenne Mountain has continued to support every shuttle mission since. In the latter part of the 1980s, the air sovereignty mission received renewed emphasis and continues to this day, to play a role in working with U.S. and Canadian Customs and Drug Enforcement Agencies. The Air Warning Center, through its air defense network, provides surveillance and control of air operations to North America and unknown trafficking of illegal drugs. In the early 1990s, Desert Storm created the need to provide Theater Ballistic Missile Warning (TBMW) for deployed forces. On Sept. 11, 2001, Cheyenne Mountain added another mission to its historic legacy in the defense of North America. The terrorist attacks against the United States marked the beginning of Operation Noble Eagle. Operation Noble Eagle is a homeland defense mission incorporating NORAD's mission of Aerospace Warning and Control to include the monitoring of the interior airspace of Canada and the United States. Oct. 1, 2002 marked the welcoming of two new commands, U.S. Northern Command and U.S. Strategic Command, to Cheyenne Mountain. CMOC is responsible for providing support to USNORTHCOM's mission of homeland defense and USSTRATCOM's mission of space and missile warning, formerly associated with U.S. Space Command.
Church Committee Reports - These 14 published reports of the Church Committee contain a wealth of information on the formation, operation, and abuses of U.S. intelligence agencies. They are the most extensive review of intelligence activities ever made public. They were published in 1975 and 1976, after which recommendations for reform were debated in the Congress and in some cases carried out.
CIA Museum - Housed in the Agency's Headquarters Building in McLean, Virginia, this collection illustrates the history of U.S. intelligence by showing some of the artifacts and tools used by men and women serving in various aspects of espionage.
CIA's Family Jewels - The Central Intelligence Agency violated its charter for 25 years until revelations of illegal wiretapping, domestic surveillance, assassination plots, and human experimentation led to official investigations and reforms in the 1970s. CIA director Gen. Michael Hayden announced on 21 Jun 2007, that the Agency would declassify the full 693-page file amassed on CIA's illegal activities by order of then-CIA director James Schlesinger in 1973--the so-called "family jewels." Only a few dozen heavily-censored pages of this file have previously been declassified, although multiple Freedom of Information Act requests have been filed over the years for the documents.
CIABASE - CIABASE focuses on CIA activities but also includes data on individuals and entities with no known intelligence connection.
Classified Information Procedures Act - U.S. Public Law 96-456: "'Classified information', as used in this Act, means any information or material that has been determined by the United States Government pursuant to an Executive order, statute, or regulation, to require protection against unauthorized disclosure for reasons of national security and any restricted data, as defined in paragraph r. of section 11 of the Atomic Energy Act of 1954 (42 U.S.C. 2014(y))."
U.S. Classification System - The United States government classifies information according to the degree which the unauthorized disclosure would damage national security.The deeper parts of this classification system are classified, but some new details and codewords have been revealed in documents from the recent Snowden-leaks.
Commission on the Roles and Capabilities of the United States Intelligence Community - The Intelligence Authorization Act for Fiscal Year 1995 (P.L. 103-359) created the Commission on the Roles and Capabilities of the United States Intelligence Community. This bipartisan panel was charged with reviewing "the efficacy and appropriateness" of U.S. intelligence activities in the "post-cold war global environment" and with submitting a report of its findings and recommendations to the President and the Congress. The Commission's report, Preparing for the 21st Century: An Appraisal of U.S. Intelligence," was released on March 1, 1996. It addresses such issues as the size and secrecy of the intelligence budget; the organization of U.S. Intelligence Community; management of the CIA; covert action; economic intelligence; intelligence support to policy makers and military operations; space reconnaissance; "right-sizing" intelligence agencies; and oversight of intelligence.
Commission to Assess the Ballistic Missile Threat to the United States - Established pursuant to Public Law 104-201, the National Defense Authorization Act for Fiscal Year 1997, Section 1321. The Commission examined the potential of both existing and emerging powers to arm ballistic missiles with weapons of mass destruction. The examination included the domestic design, development and production of nuclear material and nuclear weapons as well as the potential for states to acquire - through clandestine or covert sale, transfer or theft - either technology, material or weapons. The Commission examined biological and chemical weapons programs of the ballistic missile powers, as well as the potential means for delivering such agents by ballistic missiles.
Committee on Foreign Investment in the United States (CFIUS) - CFIUS is an inter-agency committee authorized to review transactions that could result in control of a U.S. business by a foreign person ("covered transactions"), in order to determine the effect of such transactions on the national security of the United States. CFIUS operates pursuant to section 721 of the Defense Production Act of 1950, as amended by the Foreign Investment and National Security Act of 2007 (FINSA) (section 721) and as implemented by Executive Order 11858, as amended, and regulations at 31 C.F.R. Part 800.
Communications Security Establishment Canada (CSEC) - Canada's national cryptologic agency. Provides the Government of Canada with two key services: foreign signals intelligence (SIGINT) in support of defence and foreign policy, and the protection of electronic information and communication (Information Technology Security). Additionally, CSEC provides technical and operational assistance to federal law enforcement and security agencies.
Covert Action Quarterly - Contributors include Philip Agee, Mumia Abu-Jamal, Richard Becker, Ramsey Clark, Sarah Flounders, Edward S. Herman, Diana Johnstone, Sean Gervasi, John Parker, James Petras, Greg Speeter, Louis Wolf, Michael Parenti, William Blum and many others.
Cox Report - Summarizes findings and judgments contained in the U.S. House of Representatives Select Committee's classified Report issued January 3, 1999. The report concerns missile and space technology and what the committee considers inadequate safeguards for protecting U.S. advanced technology. A broad range of topics is covered, including: export controls, technology transfer, licensing, foreign policy, bilateral agreements, monitoring, commercial arrangements, espionage, and other national security concerns.
Cartome - A companion site to Cryptome. It is an archive of spatial and geographic documents on privacy, cryptography, dual-use technologies, national security and intelligence - communicated by imagery systems: cartography, photography, photogrammetry, steganography, climatography, seismography, geography, camouflage, maps, images, drawings, charts, diagrams, imagery intelligence (IMINT) and their reverse-panopticon and counter-deception potential.
Continuity of Government (U.S.) - Presidential Decision Directive 67 (PDD 67), issued 21 October 1998, relates to enduring constitutional government, continuity of operations (COOP) planning, and continuity of government (COG) operations. The purpose of Enduring Constitutional Government (ECG), Continuity of Government (COG), and Continuity of Operations (COOP) is to ensure survival of a constitutional form of government and the continuity of essential Federal functions. Presidential Decision Directive 67 replaced the Bush Administration's NSD 69 "Enduring Constitutional Government" of 02 June 1992, which in turn succeeded NSD 37Enduring Constitutional Government" of 18 April 1990 and NSDD 55 "Enduring National Leadership" of 14 September 1982.
Counterinsurgency Operations [FMI 3-07.22] - This FMI establishes doctrine (fundamental principles and TTP) for military operations in a counterinsurgency environment. It is based on existing doctrine and lessons learned from recent combat operations. Chapter 4 discusses Intelligence.
Craft International - A private military company that provides military, law-enforcement, and civilian training, as well as private security and protection.
Crowley Files of "The Crow" - The Crow was the CIA code name for Robert Trumbull Crowley, once Deputy Director of Clandestine Operations for that agency. In 1996, Crowley gave a quantity of his private papers to several journalists. Because of his position with the CIA, Crowley was privy to many of the agencies most closely-kept secrets and his files are legendary.
Cryptome - Gathers and posts state security and law enforcement agency information. Searchable via Cryptome Search.
Danger Room - Wired's blog on national security and intelligence issues.
Defence Advisory (DA) Notice System (UK) - The UK's Defence, Press and Broadcasting Advisory Committee (DPBAC) oversees a voluntary code which operates between the UK government departments which have responsibilities for national security and the media. It uses the Defence Advisory (DA)-Notice System as its vehicle.
Defense One - Delivers news and breaking analysis on U.S. defense and national security.
Defense Security Cooperation Agency (DSCA) - Directs, administers, and provides guidance to the DoD Components and DoD representatives to U.S. missions, for the execution of DoDSC programs for which DSCA has responsibility.
Defense Tech - Exploring the future of the military, law enforcement, and national security.
Department of Homeland Security (DHS) - The new U.S. department's priority is to protect the nation against terrorist attacks. Component agencies will analyze threats and intelligence, guard its borders and airports, protect its critical infrastructure, and coordinate U.S. responses to emergencies. Also see DHS Office of Inspector General. The Inspector General is responsible for conducting and supervising audits, investigations, and inspections relating to the programs and operations of the Department.
Department of Homeland Security National Response Plan (426 p, .pdf) - The National Response Plan establishes a comprehensive all-hazards approach to enhance the ability of the United States to manage domestic incidents. The plan incorporates best practices and procedures from incident management disciplines - homeland security, emergency management, law enforcement, firefighting, public works, public health, responder and recovery worker health and safety, emergency medical services, and the private sector - and integrates them into a unified structure. It forms the basis of how the federal government coordinates with state, local, and tribal governments and the private sector during incidents. Implemented December 2004.
DigitalGlobe - Imagery and information company: satellite imagery, geospatial data, remotedly sensed images, GIS, space imagery.
Also see DigitalGlobe's FirstLook Coverage, web-based access to high-resolution pre- and post-event satellite imagery.
Digital National Security Archive - Contains fifteen complete collections, Afghanistan, Berlin Crisis 1958-1962, Cuban Missile Crisis, El Salvador, Iran-Contra Affair, Intelligence Community, Iran Revolution, Iraqgate, Military Uses of Space, Nicaragua, Nuclear Non-Proliferation, Philippines, Presidential Directives from Truman to Clinton, South Africa, and Soviet Estimate.
Drug Enforcement Agency (DEA) - The mission of the Drug Enforcement Administration (DEA) is to enforce the controlled substances laws and regulations of the U.S. and bring to the criminal and civil justice system of the U.S., or any other competent jurisdiction, those organizations and principal members of organizations, involved in the growing, manufacture, or distribution of controlled substances appearing in or destined for illicit traffic in the U.S.
Early Warning - The Washington Post's William A. Arkin reports daily on the comings and goings of the national security community -- military, special ops, intelligence, homeland security -- part blog, part investigative journalism.
Electrospaces - A weblog about signals intelligence, communications security and top level telecommunications equipment, and also about the equipment, from past and present, which make that civilian and military leaders can communicate in order to fulfill their duties.
Erinys - An international business intelligence and security risk consultancy focused on Africa and the Middle East.
Executive Order 13292 - Further Amendment to Executive Order 12958, As Amended, Classified National Security Information. (25 March 2003).
Executive Order 13526 - 'Classified National Security Information.' This was released by the White House on December 29, 2009.
Executive Order 13549 - 'Classified National Security Information Program for State, Local, Tribal, and Private Sector Entities.'
Executive Order 13587 - 'Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information.'
Executive Order 13292 - Further Amendment to Executive Order 12958, As Amended, Classified National Security Information. (25 March 2003).
Facts on International Relations and Security Trends (FIRST) - A free service for politicians, journalists, and the interested public. Databases on country organization memberships, conflicts and peace keeping activities, arms production and trade, military expenditures, weapons of mass destruction, armed forces and conventional weapon holdings, political system and country indicators, and other reference data. FIRST is a joint project of the International Relations and Security Network (ISN) and the Stockholm International Peace Research Institute (SIPRI).
FBI Investigations of Espionage, 30 November 1989 - U.S. Public Law 101- 193: Subject to the authority of the Attorney General, the FBI shall supervise the conduct of all investigations of violations of the espionage laws of the United States by persons employed by or assigned to United States diplomatic missions abroad. All departments and agencies shall report immediately to the FBI any information concerning such a violation. All departments and agencies shall provide appropriate assistance to the FBI in the conduct of such investigations. Nothing in this provision shall be construed as establishing a defense to any criminal, civil, or administrative action.
Federal Protective Service (FPS) - Provides law enforcement and security services to over one million tenants and daily visitors to all U.S. federally owned and leased facilities nationwide.
Federal Security Service (FSB) - Official site (in Russian only). Also see the FAS backgrounder on the FSB. The Federal Security Service (FSB - Federal'naya Sluzhba Bezopasnosti, previously known as Federal Counterintelligence Service - FSK) is one of the successors of the KGB, and remains headquarterd in the Lubyanka.
Federation of American Scientists (FAS) - A leading source of information and commentary on the intelligence community, with particular emphasis on intelligence agency budgets and satellite collection systems. Also see:
Flashpoint Partners - A research and analysis enterprise focused on global security, with managing partners based in London and New York. Flashpoint offers a host of contract consulting services which are available to international governments, law enforcement agencies, media outlets, academic institutions, and private corporations. Proven track record in successfully completing critical projects for a variety of high-profile clients around the world--including the U.S. Department of Justice, the U.S. Department of Defense, Scotland Yard's SO-15 Counter Terrorism Command, the United Kingdom Crown Prosecution Service, the Australian Federal Police, and the International Court of Justice at the Hague.
FM 34-52 Intelligence Interrogation - U.S. Army manual, 08 May 1987: "This manual sets forth the basic principles of interrogation doctrine and establishes procedures and techniques applicable to Army intelligence interrogations. It outlines procedures for the handling of the sources of interrogations, the exploitation and processing of documents, and the reporting of intelligence gained through interrogation. It covers directing and supervising interrogation operations, conflict scenarios and their impact on interrogation operations, and peacetime interrogation operations."
Foreign Agents Registration Act (FARA) - This site is for the Department of Justice The Foreign Agents Registration Act (FARA) unit. The Act requires every agent of a foreign principal to register with the Department of Justice and file forms outlining its agreements with, income from, and expenditures on behalf of the foreign principal. These forms are public records and must be supplemented every six months.
Glimmerglass - Serves a global customer base in cyber security, defense, and telecommunications. Defense agencies worldwide employ Glimmerglass solutions for enhanced monitoring. Sells optical fiber technology, offers government agencies software product CyberSweep to intercept signals on undersea cables. Their technology can analyze Gmail and Yahoo! Mail as well as social media like Facebook and Twitter to discover 'actionable intelligence.'
Global Security - Information about and innovative approaches to emerging security challenges.
Global Trends 2015 - The National Intelligence Council (NIC), in close collaboration with U.S. Government specialists and a wide range of experts outside the government, identifies major drivers and trends that will shape the world of 2015.
Greystone - A private security service, Greystone is registered in Barbados, and employs soldiers for off-shore security work through its affiliate Satelles Solutions, Inc. See Wikipedia.
Henry L. Stimson Center, The - A community of analysts devoted to offering practical solutions to problems of national and international security.
High Frequency Active Auroral Research Program (HAARP) - A program focused on the study of upper atmospheric and solar-terrestrial physics and radio science. Designed and built by BAE Advanced Technologies, its purpose is to analyze the ionosphere and investigate the potential for developing ionospheric enhancement technology for radio communications and surveillance. The HAARP program operates a major Arctic ionosphere research facility on an Air Force owned site near Gakona, Alaska. Principal instruments installed at the HAARP Research Station include a high power, high-frequency (HF) phased array radio transmitter (known as the Ionosphere Research Instrument (IRI), used to stimulate small, well-defined volumes of ionosphere, and a large and diversified suite of modern geophysical research instruments including an HF ionosonde, ELF and VLF receivers, magnetometers, riometers, a UHF diagnostic radar and optical and infrared spectrometers and cameras which are used to observe the complex natural variations of Alaska's ionosphere as well as to detect artificial effects produced by the IRI.
Homeland Security Watch - Features breaking news, analysis, and commentary on issues in homeland security such as transportation security, preparedness and response, infrastructure protection, and border security.
Hutton Inquiry - Investigation into the circumstances surrounding the death of UK Ministry of Defence scientist David Kelly. Contacts, FAQ, Times and Witnesses, Hearing Transcripts, Evidence, Rulings, Biographical Details, Press Notices.
IC Off the Record - Provides immediate, ongoing and direct access to unauthorized leaks related to surveillance activities carried out by the U.S. Intelligence Community and their partners.
IC on the Record - Direct access to factual information related to the lawful foreign surveillance activities of the U.S. Intelligence Community. Created at the direction of the President of the United States and maintained by the Office of the Director of National Intelligence.
ICWatch-Data - Resumes of people in the intelligence community and some tools for analysis and counting.
In-Q-Tel (IQT) - Chartered in February 1999 under the leadership of the Director of Central Intelligence and the Directorate of Science and Technology and with the support of the U.S. Congress. IQT is tasked with building a bridge between the Agency and a new set of technology innovators. IQT invests in startup companies that have developed commercially-focused technologies that will provide strong, near-term advantages (within 36 months) to the IC mission. U.S. spy agencies, through In-Q-Tel, have invested in a number of firms to help them better find that information. Visible Technologies crawls over half a million web 2.0 sites a day, scraping more than a million posts and conversations taking place on blogs, YouTube, Twitter and Amazon. Attensity applies the rules of grammar to the so-called "unstructured text" of the web to make it more easily digestible by government databases. Keyhole (now acquired by Google) is a staple of the targeting cells in military-intelligence units. Recorded Future strips from web pages the people, places and activities they mention. The company examines when and where these events happened ("spatial and temporal analysis") and the tone of the document ("sentiment analysis"). Then it applies some artificial-intelligence algorithms to tease out connections between the players. Recorded Future maintains an index with more than 100 million events, hosted on Amazon.com servers. The analysis, however, is on the living web.
Indigo Publications - Publishes several newsletters providing confidential news, business intelligence threat assessment.
Institute for Science and International Security (ISIS) - Dedicated to informing the public about science and policy issues affecting international security. Its efforts focus on stopping the spread of nuclear weapons, bringing about greater transparency of nuclear activities worldwide, and achieving deep reductions in nuclear arsenals.
Intel Briefing - News and intelligence briefings hosted by Alan Simpson.
IntelCenter - Studies terrorist groups and other threat actors. Looks at capabilities and intentions, warnings and indicators, operational characteristics and a wide variety of other points in order to better understand how to interdict terrorist operations and reduce the likelihood of future attacks.
Intelexit - An initiative that helps people leave the secret service and build a new life. It is civil society's response to the lack of oversight and undemocratic practices of intelligence agencies.
Intelligence and Security Committee (ISC-UK) - Established by the Intelligence Services Act 1994 to examine the policy, administration and expenditure of the Security Service, Secret Intelligence Service (SIS), and the Government Communications Headquarters (GCHQ). The Committee has developed its oversight remit, with the Government's agreement, to include examination of the work of the Joint Intelligence Committee (JIC) and the Intelligence and Security Secretariat, which includes the Assessments Staff in the Cabinet Office. The Committee also takes evidence from the Defence Intelligence Staff (DIS), part of the Ministry of Defence (MOD), which assists the Committee in respect of work within the Committee's remit.
Intelligence Online - Reports on and analyses the activities of intelligence agencies around the world.
Intelligence Online - Global strategic information: business intelligence, developments in technology, activity of the secret services in the world, who's who, etc. This site is geared for a public of specialized professionals (diplomats, military and political leaders, business persons and researchers).
IntelNews - Commentary from Joseph Fitsanakis and Ian Allen discussing the role of intelligence and espionage operations in national and international affairs.
Inter-Services Intelligence (ISI) - Pakistan's ISI is tasked with collection of of foreign and domestic intelligence; co-ordination of intelligence functions of the three military services; surveillance over its cadre, foreigners, the media, politically active segments of Pakistani society, diplomats of other countries accredited to Pakistan and Pakistani diplomats serving outside the country; the interception and monitoring of communications; and the conduct of covert offensive operations.
International Institute for Strategic Studies (IISS) - A primary source of accurate, objective information on international strategic issues for politicians and diplomats, foreign affairs analysts, international business, economists, the military, defence commentators, journalists, academics and the informed public. IISS publications are read by key decision -makers and are commented upon within governments at cabinet level. They include the authoritative annual The Military Balance, an inventory of the world's armed forces; the online Armed Conflict Database; Strategic Survey, an annual retrospective of the year's political and military trends; the Adelphi series of books which provides in-depth analysis of general strategic issues; Survival: Global Politics and Strategy, an international relations journal; and Strategic Comments, containing short briefings on breaking strategic issues. There are also occasional publications such as the IISS Strategic Dossier range.
International Relations and Security Network (ISN) - An initiative designed to promote the free flow of unclassified information and to facilitate cooperation through training and education using modern information technology. Services include news bulletins and backgrounds on current events, a limited area search service, annotated links directories, research reports and publications, distance learning modules, educational and training activities, and conferences and seminars.
International Security Assistance Force (ISAF) - Mandated under Chapter VII of the United Nations Charter (Peace Enforcing) by UN Security Resolutions 1386, 1413, and 1444. ISAF exists to help the Afghan people. The primary role of ISAF is to assist the Afghan Transitional Authority in providing a safe and secure environment within Kabul and its surrounding areas, which will assist in the reconstruction of a new Afghanistan.
Interrogation: The CIA's Secret Manual on Coercive Questioning - Faced with a FOIA lawsuit, the Central Intelligence Agency released an interrogation manual to the Baltimore Sun that details brutal methods of extracting information from resistant sources. The KUBARK Counterintelligence Interrogation manual does more than simply outline various psychological and physical torture tactics: it demonstrates a real-world application of the CIA's mind control research and offers clues on the agency's role in human rights abuses around the world. This report examines the historical context of the interrogation manual, the MKULTRA connection, and the manual itself, presented here verbatim online.
KWSnet is an Internet subject directory providing special attention to U.S. national and international news, the arts, computing, culture, environment, law, literature, media, politics, science and technology. Based in San Francisco, California, KWSnet contains over 125,000 annotated links to resources worldwide. Use Search KWSnet, located at the top of each page, to search within this site. Use Ctrl-F (Windows) or ⌘-F (Mac) to search within individual pages.
KWSnet's Zotero Library provides news articles as well as primary and secondary sources and bibliographic information for your research. More information on Zotero, a powerful, easy-to-use research tool, can be found at its site.
KWSnet is completely non-commercial. It has no commercial objective or emphasis. Instead, it is intended for educational purposes, research, and personal use. It is updated regularly.
KWSnet is IPv6 enabled, HTTPS deployed, and fully HTML5 compliant.
KWSnet may be contacted via email with any comments, suggestions or link submissions. KWSnet is designed and maintained, in its entirety, by Kirk W. Smith.