[Home] [Fore] [Down] [Aft]
Contents Jump Search Gopher Meta Nodes Home Index


Values

The Way of the Spirit


DESCRIPTION: The twelfth of fifteen pages on Values (one of the Field Nodes comprising the subject tree of The Telson Spur), this page is one of seven comprising a list of links to on-line resources related to issues of law and public security, civil and global (including law and justice, crime and criminal justice, corporate crime and accountability, civil peace and security, global peace and security, international law, global trade policy and economic security, space policy and security, and intelligence and security). The coordinate pages, with a common header and List of Contents, contain links to resources related to the development of human rights and responsibilities (including civil rights, ideology and political belief, and social justice), women's resources, and to resources on private security (including freedom of expression and access, censorship and free speech, copyright and intellectual property, public access and private security, hackers and hacktivism, and noise, i.e., net abuse, junk mail, and spam).

KEYWORDS: earth protection; global security; impact hazard; military space; security; space command; space defence; space defense; space force; spaceguard; space hazards; space policy; space security; space treaty; space war; space warfare; communications security; counterintelligence; information operations; information war; information warfare; infowar; intelligence; intelligence agency; intelligence service; IO; i-war; military intelligence; national security; secrecy; secret service; spy; surveillance



.
[Up] [Down] List of Contents
  1. Human Rights and Responsibilities
    Disability Resources
    Ideology and Political Belief
    Social Justice: Freedom and Security

  2. Hera: Women and Woman
    Mnemosyne: Women and Learning
    Athena: Women in Science and Technology
    Pronoia: Women in Computing
    Arachne: Women and the Internet

  3. Public Security
    Law and Justice
    Crime and Criminal Justice
    Corporate Crime and Accountability
    Civil Peace and Security
    Global Peace and Security
    International Law
    Global Trade Policy and Economic Security
    Space Policy and Security
    Intelligence and Security

  4. Freedom of Expression and Access
    Censorship and Free Speech
    Copyright and Intellectual Property
    Public Access and Private Security
    Hackers and Hacktivism
    Noise (Net Abuse, Junk Mail, and Spam)


[Up] [Down]

Public Security

Law and Justice
Crime and Criminal Justice
Corporate Crime and Accountability
Civil Peace and Security
Global Peace and Security
International Law and Justice
Global Trade Policy and Economic Security
Space Policy and Security
Intelligence and Security



[Up]

Space Policy and Security


If man goes down I do not believe that he will ever again have the resources or the strength to defend the sunflower forest and simultaneously to follow the beckoning road across the star fields. It is now or never for both, and the price is very high.
Loren Eiseley

Active Assessment of Active SETI (H. Paul Shuch, Guest Editorial, SETI League, 7 Jan 2006)
Addressing the Comet and Asteroid Impact Threat: A Next Step (Edward Tagliaferri et al., American Institute of Aeronautics and Astronautics Position Paper, Jul 2002) PDF
AERADE Aerospace and Defence (Cranfield University)
Air & Space Power Chronicles (USAF)
Air & Space Power Course (USAF Air University, Maxwell AFB)
Air & Space Power Journal (USAF)
Air Force 2025 Final Report (USAF, 1996)
-- FAS Space Policy Project Mirror
Air University Space Primer (USAF Air University Center for Space Studies)
Alternatives for Military Space Radar (US Congressional Budget Office, Jan 2007) PDF
AMOS WWW Homepage (Air Force Maui Optical Station)
The Archimedes Institute
Asteroid and Comet Impact Hazard (NASA Ames SSD)
Asteroid Close Approaches: Analysis and Potential Impact Detection (Andrea Milani et al., 2002)
Asteroid Deflection (Piet Hut, Princeton IAS)
Asteroid Deflection: How, where and when? (Daniele Fargion, arXiv:0705.1805 [astro-ph], 12 May 2007, revised)
Asteroid Initiative | NASA
Asteroid Redirect Initiative (NASA)
-- Asteroid Initiative Request for Information (NAIS, 18 Jun 2013)
AsteroidShield (Al Globus et al., Lifeboat Foundation)
Asteroids in our Future (Paul Gilster, Centauri Dreams, 27 Jun 2013)
Asteroid threat: Don't worry, Congress is looking into it (Leonard David, Christian Science Monitor, 20 Jul 2010)
Asteroid Threats: The Geopolitical Challenge (Press Kit, Association of Space Explorers Committee on Near Earth Objects, 25 Sep 2008) PDF
Asteroid Watch (JPL)
ASTRONET | Asteroid Tracking, Reconnaissance, and Observation Network (Dana Berry & Scott Battaion, Wright Center for Science Education, Tufts University, Boston)
Astronomical Odds: A Policy Framework for the Cosmic Impact Hazard (Geoffrey S. Sommer, RAND Corporation, 2005) PDF
ATLAS: The Asteroid Terrestrial-impact Last Alert System (Institute for Astronomy, University of Hawaii)
Australian Spaceguard Survey (Michael Paine)
Australia's Contribution to Spaceguard | An Open Letter to the Australian Federal Government from International Scientists (29 Jan 2002) PDF
Ballistic Missile Defence (CBC News Indepth)
Ballistic Missile Defence (Tim Youngs & Claire Taylor, UK House of Commons Research Paper 03/28, 26 Mar 2003) PDF
Ballistic Missile Defense (Council for a Livable World)
Ballistic Missile Defense Agency (USAF)
Ballistic Missile Defense Programs (John Pike, GlobalSecurity.org)
Belligerent Tone Mars U.S. Administration Space Policy (Louis Friedman, Who We Are, The Planetary Society, 23 Oct 2006)
Better Collision Insurance (Russell L. Schweickart & Clark R. Chapman, Macroscope, American Scientist 93(5):392, Sep-Oct 2005)
Beware of Apophis...or not? (Daniel Lak, CBC News, 20 Feb 2007)
B612 Foundation (Piet Hut & Ed Lu et al., Tiburon, California)
A Call to (Considered) Action (Russell L. Schweickart, B612 Foundation, 20 May 2005) PDF
Campaign for Cooperation in Space (coord. Carol Rosin, Institute for Cooperation in Space)
Capturing Near Earth Objects (Hexi Baoyin et al., arXiv:1108.4767v1 [astro-ph.EP], 24 Aug 2011)
-- The Asteroid Deflection Gambit (Paul Gilster, Centauri Dreams, 7 Sep 2011)
Center for Space Studies (USAF Air University)
Clark Community Network || Space (Wesley Clark 2004 US Presidential Campaign)
The Comet/Asteroid Impact Hazard: A Systems Approach
(Clark R. Chapman et al., SwRI White Paper, 24 Feb 2001)
Comet Busters (Peter Tyson, Technology Review, Feb 1995)

Commercial Satellite Imagery and National Security: Declassified Documents Trace U.S. Policy Shifts on Use of Commercial Satellite Imagery from 1970s to Today (Jeffrey T. Nicholson, ed., National Security Archive Electronic Briefing Book No. 404, 27 Nov 2012)
Committee on the Peaceful Uses of Outer Space | COPUOS
(UN Office for Outer Space Affairs)
Committee on Radio Astronomy Frequencies
Consultative Committee for Space Data Systems
Containing ET (Interview with Cassie Conley, Part II, Astrobiology Magazine, 28 May 2007)
A Contrarian Perspective on Altruism: The Dangers of First Contact (David Brin, SETI League, Sep 2002) PDF
Cosmic Collisions and the Longevity of Non-Spacefaring Galactic Civilizations (Steven J. Ostro & Carl Sagan, JPL TRS 1992+) PDF
The Cosmos on a Shoestring (Liam Sarsfield, RAND Corporation)
COSPAR Planetary Protection Policy (COSPAR/IAU Workshop on Planetary Protection, 20 Oct 2002)
Costs and Difficulties of Large-Scale 'Messaging', and the Need for International Debate on Potential Risks (John Billingham & James Benford, arXiv:1102.1938 [astro-ph.IM], 9 Feb 2011, revised)
-- Is Our Civilization Detectable? (Paul Gilster, Centauri Dreams, 31 May 2012)
Countermeasures: A Technical Evaluation of the Operational Effectiveness of the Planned U.S. National Missile Defense System (A. M. Sessler et al., Union of Concerned Scientists and MIT, Apr 2000)
Counterspace Operations (United States Air Force Doctrine Document 2-2.1, 2 Aug 2004) PDF
Critique of "2006 Near-Earth Object Survey and Deflection Study: Final Report" Published 28 Dec. 2006 by NASA Hq. Program Analysis & Evaluation Office (Clark R. Chapman, Southwest Research Institute, Boulder, Colorado, 2 May 2007) DOC
Current and Future Space Security (Center for Nonproliferation Studies, Monterey)
Current Impact Risks (NASA Sentry)
Dealing with the Threat of an Asteroid Striking the Earth (Edward Tagliaferri, American Institute of Aeronautics and Astronautics Position Paper, Apr 1990) PDF
Declassifying the "Fact of" Satellite Reconnaissance (Jeffrey T. Richardson, ed., NSA Electronic Briefing Book No. 231, 1 Oct 2007)
Defending Planet Earth: Near-Earth Object Surveys and Hazard Mitigation Strategies: Final Report (Irwin I. Shapiro et al., Committee to Review Near-Earth Object Surveys and Hazard Mitigation Strategies, Space Studies Board, U.S. National Research Council, Washington, DC, 2010)
-- Report Examines Options for Detecting and Countering Near-Earth Objects (NRC News Office, 22 Jan 2010)
-- New Report Spotlights Impact Hazards (Kelly Beatty, Sky & Telescope News Blog, 22 Jan 2010)
Defense Space Doctrine (FAS Space Policy Project)
Designated Airspace Handbook (Aeronautical Charts Service, Geomatics Canada)
DE-STAR (Directed Energy Solar Targeting of Asteroids in expoRation): California Scientists Propose System to Vaporize Asteroids That Threaten Earth (UC Santa Barbara News Release, 14 Feb 2013)
The detection of extra-terrestrial life and the consequences for science and society (M. Dominik & J. C. Zarnecki, Philosophical Transactions A, 13 Feb 2011)
Deterrence and First-Strike Stability in Space: A Preliminary Assessment (Forrest E. Morgan, RAND Corporation, 4 Jun 2010)
-- Monograph PDF
Earth must prepare for close encounter with aliens, say scientists (Alok Jah, Guardian, 10 Jan 2011)
ECSL | European Centre for Space Law (European Space Agency)
Ensuring America's Space Security (Federation of American Scientists, 7 Apr 2005)
Evaluation of the National Aerospace Initiative (Edsel D. Dunford et al., US National Research Council, 2004)
Exopolitics: Politics, Government, and Law in the Universe
(Vancouver, BC)
Fencing the Global Commons (F. M. Boomer, AMSC)
Friends and Partners in Space (Jennifer Green)
From Sputnik to NDEA: The Changing Role of Science During the Cold War (Garrett Moritz, 1999)
The Garwin Archive (Richard L. Garwin, Federation of American Scientists)
George E. Brown, Jr. Near-Earth Object Survey Act (H.R. 1022, introduced to 109th Congress 1 Mar 2005)
-- THOMAS Search Results (Library of Congress)
Global Navigation Space Systems: reliance and vulnerabilities (Martyn Thomas et al., Royal Academy of Engineering, London, 8 Mar 2011) PDF
-- News Release (RAoE, 8 Mar 2011)
Global Network Against Weapons and Nuclear Power in Space
A Gravitational Tractor for Towing Asteroids (Edward T. Lu & Stanley G. Love, astro-ph/0509595, 20 Sep 2005)

Hazardous NEO Technical Reviews (IAU)
Holes in the Missile Shield (Richard L. Garwin, Scientific American 291:5:70-79, Nov 2005)
IASL - The Institute of Air & Space Law at McGill University
(dir. Michael Milde)
If aliens wanted to, they would have destroyed us by now (George P. Dvorsky, Sentient Developments, 26 Jun 2007)
If An Impact Looms, Then What? (Kelly Beatty, Sky & Telescope News Blog, 18 Nov 2011)
Impact (James A. Marusek, 14 Jul 2001)
Impact: Earth! (Jay Melosh et al., Purdue University)
Impact Hazard: Hot Topics (Ken Bollinger)
Impact Risk Assessment (NASA Sentry)
International Space Law (UN Office for Outer Space Affairs, Vienna)
Issues and Opportunities Regarding the U.S. Space Program: A Summary Report of a Workshop on National Space Policy (Radford Byerly, Jr., et al., US National Research Council, 2004)
IUCAF (Commission on the Allocation of Frequencies for Radio Astronomy and Space Sciences)
Japan Spaceguard Association
Joint Doctrine for Space Operations (Joint Publication 3-14, US Defense Technical Information Center, 9 Aug 2002) PDF
Keeping It Clean (Interview with Cassie Conley, Part I, Astrobiology Magazine, 21 May 2007)
Key Documents in the History of Space Policy (NASA)
KIAM Ballistic Center (IPM RAN)
Law of Armed Conflict in Air and Space Operations (comp. Joan T. Phillips, Maxwell AFB, Alabama, May 2006)
Lifeboat Foundation: Safeguarding Humanity (Minden, Nevada)
Lifting the Veil on NRO Satellite Systems and Ground Stations (Jeffrey T. Richardson, ed., NSA Electronic Briefing Book No. 392, 4 Oct 2012)
Long-term impact risk for (101955) 1999 RQ36 (Andrea Milani et al., arXiv:0901.3631 [astro-ph.EP], 23 Jan 2009, revised; Icarus, Oct 2009)
Lost in Space (Piers Bizony, Wired 5.12, Dec. 1997)
Maui Space Surveillance Complex (Det 3, 18 SPSS Home Page)
Military Ballistic Missile Warning Programs
(FAS Space Policy Project)
Military Ballistic Missile Warning Programs
(John Pike, GlobalSecurity.org)
Military Doctrine & Space Doctrine (USAF Air War College)
Military Role in Space Control: A Primer (Adolfo J. Fernandez, CRS Report for Congress, 23 Sep 2004) PDF
Military Space (John Pike, FAS)
-- Military Space Agencies

Military Space Guide (Vic Stathopoulos, AeroSpaceGuide)
Military Space Programs (John Pike, GlobalSecurity.org)
A Minefield in Earth Orbit: How Space Debris Is Spinning Out of Control [Interactive] (Kathy Jones et al., Scientific American, 1 February 2012)
Missile Defense Agency (U.S. Department of Defense)
-- SBRI/STTR, Arlington, Virginia
NASA analysis of asteroid risk deeply flawed, critics say (Jeff Hecht, New Scientist, 21 May 2007)
NASA Budget Material
NASA Budget Situation (AAS)
NASA HQ FOIA (Freedom of Information Act)
NASA Insiders Propose Stepping Stone Path to Deep Space (Leonard David, SPACE.com, 30 Jul 2007)
NASA plans 'Armageddon' spacecraft to blast asteroid (Rob Coppinger, Flight Global, 3 Aug 2007)
NASA's Plan to Snag a Near-Earth Asteroid (Kelly Beatty, Sky & Telescope News Blog, 11 Apr 2013)
-- 2013 IAA Planetary Defense Conference (15-19 April 2013, Flagstaff, Arizona)
National Geospatial-Intelligency Agency (NIMA)
National Missile Defense (U.S. Ballistic Missile Defense Organization)
National Missile Defense (The Washington Post Online, Special Report)
National Reconnaissance Office (US)
National Security Space Launch Report (Forrest McCartney et al., RAND Corporation, 16 Aug 2006)
National Security Space Office (US Department of Defense)
Near-Earth Asteroids and the Impact Hazard, Paper & Preprints on (Clark R. Chapman)
Near Earth Object Impact Hazard (Armagh Observatory)
Near-Earth Object Survey and Deflection: Analysis of Alternatives (NASA Report to Congress, Mar 2007) PDF
Near-Misses and their Uses (Paul Gilster, Centauri Dreams, 18 Feb 2013)
NEO Earth Close Approach Tables (NASA Sentry)
The NEO Impact Hazard and Options for Mitigation (Christian Gritzner) PDF
Newly Released Map Data Shows Frequency of Small Asteroid Impacts, Provides Clues on Larger Asteroid Population (Linda Billings & NASA/JPL NEO Program, 14 Nov 2014)
-- New Map Shows Frequency of Small Asteroid Impacts, Provides Clues on Larger Asteroid Population (JPL News, 14 Nov 2014)
NIMA Home (U.S. National Imagery and Mapping Agency)
NORAD | North American Aerospace Defense Command
NOVA | Astrospies (C. Scott Willis & James Bamford, PBS, 12 Sep 2008)
NOVA Online | Doomsday Asteroid (PBS)
The NRO (National Reconnaissance Office) Declassified
(Jeffrey T. Richelson, NSA Electronic Briefing Book No. 35)
Outer Space Treaty (UNOOSA)
The Outer Space Treaty (US State Department Bureau of Arms Control)

The Palermo Technical Impact Hazard Scale (NASA NEO Program)
Pan-STARRS (Panoramic Survey Telescope & Rapid Response System, University of Hawaii Insitute of Astronomy)
-- Two Wide Eyes on the Sky (Kelly Beatty, Sky & Telescope News Blog, 24 Jun 2010)
-- PS1 Science Consortium
Permanent Monitoring Panel - Defence Against Cosmic Objects
(World Federation of Scientists)
Planetary Defense: Catastrophic Health Insurance for Planet Earth
(John M. Urias et al., USAF Air Force 2025 v3c16-1, Oct 1996)
Planetary Defense Conference (The Aerospace Corporation, Los Angeles)
The Planetary Defense Conference: Protecting Earth from Asteroids
(American Institute of Aeronautics and Astronautics/The Aerospace Corporation, 23-26 Feb 2004)
Planetary Defense Resources (The Aerospace Corporation, Los Angeles)
Planetary Defense Workshop Proceedings (LLNL, 22-26 May 1995)
Policy.com: Issues Library: Science: Space Policy
Private Funding for Asteroid Telescope (Paul Gilster, Centauri Dreams, 29 Jun 2012)
-- B612 Debuts Its Asteroid-Seeking Sentinel (Kelly Beatty, Sky & Telescope News Blog, 29 Jun 2012)
Project Wormwood: Studies in Planetary Defense and Space Debris (Learmonth Solar Observatory, IPS Radio and Space Services, Australia)
ProSpace: The Citizen's Space Lobby
Protecting Earth from Asteroids (Planetary Defense Conference, AIAA/Aerospace Corporation, 23-26 Feb 2004)
Protecting Earth from Asteroids and Comets (American Institute of Aeronautics and Astronautics Position Paper, Oct 2004) PDF
A Protocol for Messaging to Extraterrestrial Intelligence (Dimitra Atri et al., arXiv:1101.4968v1 [physics.pop-ph], 25 Jan 2011)
Quantifying the Risk: From the Torino Scale to the Palermo Scale
(Livia Giacomini, Tumbling Stone11 , Feb 2002)
Quantifying the Risk Posed by Potential Earth Impacts
(Steven R. Chesley et al., Palermo, Jun 2001)
Report of the APS Study Group on Boost Phase Intercept Systems for National Missile Defense (D. Kleppner et al., Reviews of Modern Physics 76:3:S1-S424, American Physical Society, 15 Jul 2004)
Report of the Commission to Assess United States National Security, Space Management and Organization (11 Jan 2001)
Report of the Commission to Assess United States National Security Space Management and Organization (U.S. Department of Defense, 11 Jan 2001)
Report of the Independent Working Group on Missile Defense, the Space Relationship, and the Twenty-first Century: 2007 Report (Institute for Foreign Policy, Cambridge, Massachusetts, 2006)
Report of the [UK] Task Force on Potentially Hazardous Near Eath Objects (Harry Atkinson et al., 18 Sep 2000)
Responding to the Potential Threat of a Near-Earth-Object Impact (American Institute of Aeronautics and Astronautics Position Paper, Sep 1995) PDF
Restricted Zone (Interview with Cassie Conley, Part III, Astrobiology Magazine, 4 Jun 2007)
Russian Space Forces
-- CSIC (Coordinational Scientific Information Center)
The San Marino Scale (IAA SETI Permanent Study Group)
Secrecy and U.S. Satellite Reconnaissance, 1958-1976 (Jeffrey T. Richardson, ed., NSA Electronic Briefing Book No. 225, 13 Jul 2007)
Security Space Forum (Space Policy Institute, Elliott School of International Affairs, George Washington University)
SETI Hacker? (Richard A. Carrigan)
SETI, METI... and Assessing Risk like Adults (David Brin, ed. Paul Gilster, Centauri Dreams, 12 Nov 2013)
SETI, METI, and Existential Risk (J. T. Nielsen, ed. Paul Gilster, Centauri Dreams, 8 Nov 2013)
SETI Post-Detection Taskgroup (Paul Davies et al., SETI Permanent Study Group, International Academy of Astronautics)
-- SETI Protocols
SHIELD: A Comprehensive Earth Protection System (Robert E. Gold, PI, NASA Institute for Advanced Concepts, 28 May 1999) PDF
Shouting at the Cosmos ...Or How SETI has Taken a Worrisome Turn Into Dangerous Territory (David Brin, Lifeboat Foundation, Sep 2006)
Soldiers, Spies and the Moon: Secret U.S. and Soviet Plans from the 1950s and 1960s (Jeffrey T. Richelson (ed), NSA Electronic Briefing Book No.479, 20 Jul 2014)
Space (comp. Diana Simpson, Special Bibliography No. 329, USAF Air University Library, Maxwell AFB, Alabama, Jun 2006)
Space Activism Home Page
Space Air Force (USSPACEAF, 14th Air Force, Vandenberg AFB)
Space & Electronic Warfare Lexicon (Joe Cyr)

The Space and Missile Systems Center SMC Link
(Los Angeles AFB and SMC)
Space and National Security: Canada's Sporadic Strategy, 1985-1999
(Andrew B. Godefroy, RMC, Nov 1998)
Space and Naval Warfare Systems Center San Diego (SPAWAR)
Space-Based Early Warning: From MIDAS to DSP to SBIRS (Jeffrey T. Richelson (ed), NSA Electronic Briefing Book No.235, 9 Nov 2007)
-- Update (8 Jan 2013)
Space Based Infrared System (FAS Space Policy Project)
Space Based Infrared System (John Pike, GlobalSecurity.org)
Space-Based Infrared System (SBIRS Low)
Space-Based Solar Power As an Opportunity for Strategic Security: National Security Space Office Interim Assessment Phase 0 Architecture Feasibility Study (U.S. National Security Space Office, 10 Oct 2007)
-- Pentagon backs plan to beam solar power from space (Dan Cho, New Scientist, 11 Oct 2007)
-- LA Times, MSNBC, NewScientist: An old idea gets a boost - space-based solar power worth a try, says US defense panel (Knight Science Journalism Tracker, 12 Oct 2007)
Space Battlelab (Space Warfare Center, Schriever AFB, Colorado)
The Space Campaign: Space-Power Theory Applied to Counterspace Operations (Brent D. Ziarnick, Air & Space Power Journal, Summer 2004)
Space for the World (American Astronautical Society)
Space.gov (US)
Spaceguard Canada (Dave Balam)
The Spaceguard Central Node (ESA)
-- IASF-CNR Mirror (Italy)
The Spaceguard Foundation (ESA)
-- IASF-CNR Mirror (Italy)
-- US Mirror (CfA)
Spaceguard Links (Michael Paine, Australian Spaceguard Survey)
Spaceguard Survey
The Spaceguard UK Portal (Cardiff, Wales)
Space Hazards Branch (US Air Force Research Laboratory)
Space Operations (Strategy Page)
Space Operations (USAF Air Force Doctrine Document 2-2, 27 Nov 2006) PDF
Space Operations & Resources (USAF Air War College)
Space Policy (T. J. Grant, AMSC)

The Space Policy Institute (Elliott School of International Affairs, George Washington University)
Space Policy Project (John Pike, FAS)
Space Politics (Jeff Foust)
-- Review (Web life, Physics World, 30 Jan 2014)
Space Resources (GlobalSecurity.org)
Space Security Index (SpaceSecurity.org)
Space Shield Foundation
Space Technology Guide (U.S. Department of Defense)
Space Testbed - SMC/TE, STP, TEO
Space-Track: The Source for Space Surveillance Data
(USAF Space Command)
Space Vehicles Directorate (US Air Force Research Laboratory)
SpaceWar.com Military Space Portal (SpaceDaily)
Space Warfare Center (Schriever AFB, Colorado)
The Spacewatch Project (LPL)
Space Weapons (Union of Concerned Scientists)
SPAWAR's Home Page
Star Tek - Exploiting the Final Frontier: Counterspace Operations in 2025 (Robert H. Zielinski et al., Air Force 2025, Aug 1996)
Technical Realities: An Analysis of the 2004 Deployment of a U.S. National Missile Defense System (L. Gronlund et al., Union of Concerned Scientists, May 2004)
Threat Characterization: Trajectory Dynamics (Russell Schweickart et al., physics/0608155, 15 Aug 2006)
Threat Mitigation: The Asteroid Tugboat (Russell Schweickart et al., physics/0608156, 15 Aug 2006)
Threat Mitigation: The Gravity Tractor (Russell Schweickart et al., physics/0608157, 15 Aug 2006)
The Threat of Near-Earth Asteroids (Hearing before the U.S. House of Representatives, 3 Oct 2002) Webcast (RAM)
Tightening the Focus on Near Earth Asteroids (Paul Gilster, Centauri Dreams, 15 Dec 2014)
Time to rethink the Outer Space Treaty (Philip Ball, Nature News, 4 Oct 2007)
Toward a New 'Prime Directive' (Paul Gilster, Centauri Dreams, 30 Jan 2012)
Treaty on Principles Governing the Acitivities of States in the Exploration and Use of Outer Space, including the Moon and Other Celestial Bodies (Resolution adopted by the General Assembly of the United Nations, 1499th plenary meeting, 19 Dec 1966)
Tumbling Stone - NEOs, asteroids, comets, meteors and Earth impact hazards... (SGF/NEODyS)
-- IASF-CNR Mirror (Italy)
2006 Near-Earth Object Survey and Deflection Study
(NASA, 28 Dec 2006)
PDF
-- B612 Foundation copy PDF

UCS Satellite Database (Union of Concerned Scientists)
The Ultimate Hacker: SETI signals may need to be decontaminated (Richard A. Carrigan, Jr., SETI Decon Australia, Jun 2002) PDF
UNISPACE III (Third UN Conference on the Exploration and Peaceful Uses of Outer Space, Vienna, 19-30 July 1999)
UNISPACE III (UNOOSA)
United Nations Office for Outer Space Affairs (UN-OOSA)
The United Nations of Space (Interview with Roger Bonnet, COSPAR, Astrobiology Magazine European Edition, Spring 2007)
United Nations to Adopt Asteroid Defense Plan: Scientific American (Clara Moskowitz, Scientific American, 28 Oct 2013)
United States Air Force Space Command Headquarters (AFSPC, Peterson AFB, Colorado)
USAF Bolide Information (AFTAC)
U.S. Army Space & Missile Defense Command
U.S. Intelligence and the Soviet Space Program (Jeffrey T. Nicholson, ed., National Security Archive Electronic Briefing Book No. 501, 4 Feb 2015)
U.S. Intelligence Eyes Chinese Research into Space-Age Weapons (ed. Dan Jenkins & Malcolm Byrne, National Security Archive Electronic Briefing Book No. 351, 21 Jul 2011)
U.S. Military Uses of Space, 1945-1991 (Digital National Security Archive)
U.S. National Space Policy (Presidential Decision Directive, 19 Sep 1996)
U.S. National Space Policy (National Security Presidential Directive, 31 Aug 2006)
U.S. National Space Policy (31 Aug 2006) PDF
U.S. Reconnaissance Satellites: Domestic Targets (Jeffrey T. Richardson, ed., NSA Electronic Briefing Book No. 229, 14 Sep 2007)
U.S. Satellite Imagery, 1960-1999 (Jeffrey T. Richardson, NSA Electronic Briefing Book No. 13, 14 Apr 1999)
U.S. Space Doctrine (USAF Air War College)
The Vela Incident: Nuclear Test or Meteorite? (Jeffrey Richelson, ed., National Security Archive Electronic Briefing Book No. 190, 5 May 2006)
Western Range MOCC, 30th Space Wing (USAF)
When SETI Succeeds: The Impact of High-Information Contact (ed. Allen Tough, Foundation for the Future, 2000)
-- Download
Why Space? (Paul B. Van Slyke)
Wolves Among The Stars: Rethinking Who On Earth Controls Interstellar Policy (Adam Frank, NPR Blog 13.7: Cosmos and Culture, 4 Jan 2011)
Workshop on Scientific Requirements for Mitigation of Hazardous Comets and Asteroids (NASA, Arlington, Virginia, 3-6 Sep 2002)

See also NEOs, SB Impact, and Astroblemes and Space: The Far Lands


[Up]

Intelligence and Security


Informant [redacted] stated on [redacted] that although Subject is the retired director of the Harvard Observatory ... he continues to be an active professor of astrology.
FBI agent (from a 1953 report on American astronomer Harlow Shapley)

For special forces and special operations, see Unholy Warriors: Special Forces.

Air India Flight 182: A Canadian Tragedy (John C. Major, Final Report of the Commission of Inquiry into the Investigation of the Bombing of Air India Flight 182, 17 Jun 2010)
AJAX U.S. & International Government Military, Intelligence & Law Enforcement Agency Access
The Arar Inquiry (Dennis R. O'Connor et al., Commission of Inquiry into the Actions of Canadian Officials in Relation to Maher Arar, Ottawa)
-- Report of the Events Relating to Maher Arar: Addendum (released 8 Aug 2007) PDF
The Area 51 File: Secret Aircraft and Soviet MiGs (Jeffrey T. Richelson, ed., National Security Archive Electronic Briefing Book No. 443, Washington, D. C., 29 Oct 2013)
The Area 51 truthers were right (Joseph Lapin, Salon, 9 Sep 2013)
Artificial Intelligence? (NOW, with David Brancacchio, PBS, 3 Feb 2006)
Australian Security Intelligence Organisation (ASIO)
Bletchley Park and its Museum - Virtual Tour (Anthony E. Sale, UK)
Bletchley Park - Britain's Best-Kept Secret of World War II (Colin Day, Perth, Western Australia)
Building a Comprehensive Open Source Intelligence Capability: Perspectives From IBM Corporation (W. Scott Gould, IBM Center for The Business of Government, Washington, DC, Nov 2006) PDF
Bush Administration Documents on Secrecy Policy (Steven Aftergood, FAS Project on Government Secrecy)
Byting Back -- Regaining Information Superiority Against 21st-Century Insurgents: RAND Counterinsurgency Study -- Volume 1 (Martin C. Libicki et al., RAND Corporation, Santa Monica, California, 19 Sep 2007)
Cabinet Office: Intelligence and Security Committee (UK)
Canadian Intelligence Agencies (John Pike, FAS)
Canadian Intelligence Agencies (John Pike, GlobalSecurity.org)
Canadian Secret Agents in the Second World War (Dave Depickere)
Canadian Security Intelligence Service (CSIS)
-- The CSIS Public Report
-- CSIS 2002 Public Report
Canadian spies (CBC News In Depth)
CASIS - Canadian Association for Intelligence and Security Studies (Ottawa)
CBC News Indepth: U.S. Security (CBC News Online, 17 Feb 2005, updated)
The Center for Security Policy (US)
Center for the Study of Intelligence (CIA)
Central Intelligence Agency (CIA)
Central Intelligence Agency - Electronic Document Release Center
The Centre for Security Studies (University of Hull)

Charlotte Gray (Warner Brothers, 28 Dec 2001)
CIA Directorate of Intelligence Homepage
CIA Electronic Reading Room (CIA FOIA)
CIA Factbook on Intelligence
The C.I.A. leak case: Did senior Bush officials out an undercover agent? (CBC News Indepth, 6 Apr 2006)
The CIA's Family Jewels (Thomas Blanton, ed., National Security Archive Electronic Briefing Book No. 222, 21 Jun 2007, updated)
CIA's Homepage for Kids
The CIA's Vietnam Histories (National Security Archive Electronic Briefing Book No. 284, ed. John Prados, 26 Aug 2009)
CNN - Cold War Experience: Espionage
Codes and Ciphers Heritage Trust (National Museum of Computing, Bletchley Park)
Codes and Ciphers in the Second World War (Anthony E. Sale, UK)
Codetalkers: Native Words, Native Warriors (Edwin Schupman et al., National Museum of the American Indian, Washington, DC)
The Commission on the Intelligence Capabilities of the United States Regrading Weapons of Mass Destruction (Report to the President of the United States, 31 Mar 2005)
Committee Study of the Central Intelligence Agency's Detention and Interrogation Program (US Senate Select Committee on Intelligence, 9 Dec 2014) PDF
Communications Security Establishment Canada (CSEC)
Congressional Intelligence Documents
(FAS Intelligence Resource Program)
Congressional Research Service (CRS) Intelligence and Security Documents Index (John Pike & Steven Aftergood, Federation of American Scientists)
Congressional Research Service Reports
(FAS Project on Government Secrecy)
Congressional Research Service Reports on Homeland Security
(FAS Project on Government Secrecy)
Counterinsurgency Intelligence in a "Long War": The British Experience in Northern Ireland (Brian A. Jackson, Military Review, Jan-Feb 2007) PDF
Criminal Intelligence Service Canada (CISC)
In the Crossfire: Critical Infrastructure in the Age of Cyber War (Stewart Baker et al., McAfee, 17 Dec 2009) PDF
Cryptome (John Young, New York)
Cyber Attacks During the War on Terrorism
(Institute for Security Technology Studies)
Cyber Attacks Explained (James A. Lewis, Center for Strategic & International Studies, Washington, DC, 15 Jun 2007) PDF
Cyberdeterrence and Cyberwar (Martin C. Libicki, RAND, 2009)
Cyberpunks in Cyberspace: The Politics of Subjectivity in the Computer Age (Paul N. Edwards, 1995)
Cyber Security and Politically, Socially and Religiously Motivated Attacks (Paul Cornish, European Parliament, 2 Feb 2009) PDF
Cyber-security: The vexed question of global rules (Bridgid Grauman, Security & Defence Agenda, 2012) PDF
Cyber Storm Exercise Report (U.S. Department of Homeland Security, 12 Sep 2006) PDF
On Cyber Warfare (Paul Cornish et al., Chatham House Report, Nov 2010)
Data Mining and Homeland Security: An Overview (Jeffrey W. Seifert, CRS Report for Congress, 7 Jun 2005, updated) PDF
Declassification in Reverse: The Pentagon and the U.S. Intelligence Community's Secret Historical Document Reclassification Program (ed. Matthew M. Aid, National Security Archive, 21 Feb 2006)
Deconstructing Information Warfare (K. A. Taipale, Center for Advanced Studies in Science and Technology Policy, Oct 2006) PDF
Defense Information Systems Agency Home Page (US DoD)
Defense Intelligence Agency (U.S. Department of Defense)
Development of Surveillance Technology and Risk of Abuse of Economic Information: An Appraisal of Technologies of Political Control (EuroParl Scientific and Technological Options Assessment)
Digital National Security Archive Online (Chadwyck-Healey)
The Digital Spy: How Technology is Changing the Intelligence Community (audio) (Bryan Cunningham & Jeff Jonas, Council on Foreign Relations, New York, 19 May 2006)

The Door of Perception - Index (Channel Zero)
The DSD HomePage (Defence Signals Directorate, Australia)
Echelon Watch
-- ACLU Mirror
Educing Information -- Interrogation: Science and Art -- Foundations for the Future (Phase 1 Report, ed. Russell Swenson, U.S. Intelligence Science Board/National Defense Intelligence College, Dec 2006) PDF
EIU.com Economist Intelligence Unit (The Economist)
Enemy of the Reich | A Muslim Woman Defies the Nazis [Noor Inayat Khan, 1914-1944; Madeleine of the Resistance] (film dir. Robert H. Gardner, Unity Productions Foundation, 9 Sep 2014)
-- Noor Inayat Khan Memorial Trust (London)
EPIC Total Information Awareness Page
EuFIS (European Forum for Information Sharing): The Virtual Intelligence Community
FAS Project on Government Secrecy
FBI (US Federal Bureau of Investigation)
FBI - Awareness of National Security Issues and Response (ANSIR) Program
The FBI Files
FBI Intelligence Reform Since September 11, 2001: Issues and Options for Congress (Alfred Cumming & Todd Masse, U.S. Department of State, 6 Apr 2004)
The Federal Bureau of Investigation's Efforts to Improve the Sharing of Intelligence and Other Information (U.S. Department of Justice Audit Report, Dec 2003) PDF
Foreign Intelligence Service (SVR) Sluzhba Vneshney Razvedki (FAS Intelligence Resource Program)
Former NSA Whistleblower Sheds Light on the Science of Surveillance (Dina Fine Maron, Q&A with Thomas Drake, Scientific American, 10 Jun 2013)
From Director of Central Intelligence to Director of National Intelligence (ed. Jeffrey T. Richelson, NSA Electronic Briefing Book No. 144, 17 Dec 2004)
Frontline | Cyber War! (Michael Kirk, PBS, 24 Apr 2003)
Fuld Intelligence Dictionary
Global Trends 2015: A Dialogue About the Future With Nongovernment Experts (US National Intelligence Council)
Global Trends 2025: The National Intelligence Council's 2025 Project (Director of National Intelligence, Washington, DC)
-- Global Trends 2025: A Transformed World (NIC 2008-003, 13 Nov 2008) PDF
-- Global Trends 2025: A Transformed World (Atlantic Council of the United States)
-- Review of the National Intelligence Council's Global Trends 2025 Report (Karin Bencala, Environmental Change and Security Program, Woodrow Wilson Center, Washington, DC, 24 Jul 2008)
Global Trends 2030: Alternative Worlds (U.S. National Intelligence Council, 7 Dec 2012)
Government Secrecy: Is Too Much Information Kept from the Public? (Kenneth Jost et al., CQ Researcher 15:42:1005-28, 2 Dec 2005) PDF
Gulf of Tonkin (U.S. National Security Agency, 30 Nov 2005)
The Gulf of Tonkin Incident, 40 Years Later: Flawed Intelligence and the Decision for War in Vietnam (National Security Archive Electronic Briefing Book No. 132, ed. John Prados, 4 Aug 2004)

High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments (Clay Wilson, CRS Report for Congress, 20 Aug 2004, updated) PDF
Homeland Security & Fighting Terrorism (U.S. National Technical Information Service)
Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches (Todd Masse, CRS Report for Congress, 18 Aug 2006) PDF
How Would the U.S. Respond to a Nightmare Cyber Attack? (Josephine Wolff, SA Forum, Scientific American, 23 Jul 2013)
Human Intelligence and Covert Action on the Web (John Pike, FAS)
Human Intelligence Collector Operations
(U.S. Army Field Manual, Sep 2006)
PDF
The Impact of the Information Revolution on Policymakers' Use of Intelligence Analysis (Lorne Teitelbaum, RAND Corporation, 2005)
An Information Operations Approach to Counter Suicide Bomber Recruitment (William S. Rabena, U.S. Army War College, Carlisle, Pennsylvania, 15 Mar 2006) PDF
Information Operations in Operations Enduring Freedom and Iraqi Freedom -- What Went Wrong? (Joseph L. Cox, U.S. Army School of Advanced Military Studies, Fort Leavenworth, Kansas, 25 May 2006) PDF
The Information Revolution and National Security (ed. Thomas E. Copeland, Strategic Studies Institute, U.S. Army War College, Aug 2000) PDF
Information Technology Security
(Communications Security Establishment, Canada)
Information War
Information War and Cyberspace Security
(RAND Research Review, Fall 1995)
Information Warfare (I-War Research Group)
Information Warfare (ResearchIndex)
Information Warfare (Reto Haeni)
Information Warfare (comp. Stephen B. Chun, USAF Air University Library, Maxwell AFB, Alabama, Mar 2005)
Information Warfare (Strategy Page)
Information Warfare, I-War, IW, C4I, Cyberwar (IASIW)
Information Warfare on the Web (John Pike, FAS)
Information Warfare Research Center
Infosecwriters.com (Info Security Writers, Woodbridge, New Jersey)
InfoWar.com (Winn Schwartau)
InfraGard: Guarding the Nation's Infrastructure
INSAC - Integrated National Security Assessment Centre (CSIS)
Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors (Michelle Keeney et al., U.S. Secret Service, Washington, DC, May 2005) PDF
Institute for Security Technology Studies (ISTS)

Intelligence (comp. Glenda Armstrong, USAF Air University Library, Maxwell AFB, Alabama, Oct 2005)
Intelligence (SpecialOperations.com)
Intelligence and Analysis on Iraq: Issues for the Intelligence Community (Richard Kerr et al., CIA, 29 Jul 2005) PDF
Intelligence and the Camp David Accords (Central Intelligence Agency Library)
Intelligence and CounterIntelligence (KIM-SPY)
-- KIM-SPY Mirror at Mario's Cyberspace Station
Intelligence & Security analysis (Intellisec blog, Center for the Study of Intelligence and Security, Rome)
Intelligence and Security Legislation for Security Sector Reform
(Greg Hannah et al., RAND Corporation, 2005)
Intelligence Brief: Information and Intelligence from the Internet
Intelligence Center [DEFSMAC] Tracks Missile Launches Worldwide 24/7 (Jeffrey T. Richelson, ed., National Security Archive Electronic Briefing Book No. 489, 21 Oct 2014)
Intelligence Communities, by Country (Ben N. Venzke, IWR)
Intelligence Essentials for Everyone, Part 1 - Intelligence Process (Lisa Krizan, Joint Military Intelligence College, Jun 1999, reprinted in Directions Magazine, 4 Oct 2006)
Intelligence Essentials for Everyone, Part 2 - Converting Customer Needs Into Intelligence Requirements (repr. 11 Oct 2006)
Intelligence Essentials for Everyone, Part 3 - Collection (repr. 18 Oct 2006)
Intelligence in the Civil War (Thomas Allen, CIA, 2006) PDF
Intelligence in the Internet Era (A. Denis Clift, CIA Studies in Intelligence 47:3, 2003)
Intelligence in Recent Public Literature (CIA Studies in Intelligence 50:1, Mar 2006)
Intelligence Literature (CIA)
The Intelligence Officer's Bookshelf (Compiled and reviewed by Hayden B. Peake, CIA Studies in Intelligence 50:1, Mar 2006)
Intelligence on the Web (John Pike, FAS)
The Intelligence Pages (Gary Burt)
Intelligence Reform and Terrorism Prevention Act of 2004 (U.S. Congress, Dec 2004; Free askSam Searchable Version)
The Intelligence Reform and Terrorism Prevention Act of 2004, Initial Assessment on the Implementation of (Oversight Subcommittee of the U.S. House of Representatives Permanent Select Committee on Intelligence, 27 Jul 2006) PDF
Intelligence Resource Program (John Pike & Steven Aftergood, FAS)
Intelligence Resources (John Pike, GlobalSecurity.org)
Intelligence Studies (Michael Dartnell, York CISS)
IntellNet | The Intelligence Network

Intel Wars: The Lessons for U.S. Intelligence From Today's Battlefields (Matthew M. Aid, ed., NSA Electronic Briefing Book No. 370, 13 Feb 2012)
IntelWeb - The WWW Site of Intelligence Watch Report (IWR)
Interagency OPSEC Support Staff (U.S. Government Operations Security)
The Intercept
The International Centre for Security Analysis
(King's College, London)
International Law and Secret Surveillance: Binding Restrictions Upon State Monitoring of Telephone and Internet Activity (Sarah St. Vincent, Center for Democracy & Technology, 4 Sep 2014) PDF
International Spy Museum
Investigative Research for Infrastructure Assurance
(Institute for Security Technology Studies)
Invicta Networks Inc. Network Security (Victor Sheymov et al.)
ISECOM (Institute for Security and Open Methodologies)
IWS - The Information Warfare Site (Wanja Eric Naef, UK)
Jane's Geopolitical Intelligence Unit
Jane's Intelligence Review $
Joint Terrorism Analysis Centre (MI5)
Joint Terrorism Analysis Centre (UK Intelligence Community Online)
Leading surveillance societies in the EU and the World
(Privacy International, London, 2006)
A Legal Analysis of the NSA Warrantless Surveillance Program (Morton H. Halperin, Center for American Progress, Washington, DC, 5 Jan 2006) PDF
The Literature of Intelligence: A Bibliography of Materials, with Essays, Reviews, and Comments (J. Ransom Clark, Muskingum College, New Concord, Ohio, 1998, updated)
The Litvinenko Chronicles (TFP)
Loyola Homepage on Strategic Intelligence (Loyola College, Baltimore)
The McGraw-Hill Homeland Security Handbook (ed. David G. Kamien, 2006): Study Resources (Companion Website)
Maher Arar (CBC News Indepth, 18 Sep 2006, updated)
Making Intelligence Accountable: Legal Standards and Best Practice for Oversight of Intelligence Agencies (Hans Born & Ian Leigh, DCAF, Geneva Centre for the Democratic Control of Armed Forces)
Mapping the Risks: Assessing the Homeland Security Implications of Publicly Available Geospatial Information (John C. Barker et al., RAND, Mar 2004)
Massing Effects in the Information Domain -- A Case Study in Aggressive Information Operations (Thomas F. Metz et al., Military Review, May-Jun 2006) PDF
Mata Hari and Edith Cavell: Women, intrigue and WWI propaganda (Nicola Luksic, CBC News, 15 Oct 2014)
The Memory Hole (Russ Kick)
Mexico's Southern Front: Guatemala and the Search for Security
(Kate Doyle, National Security Archive, 2 Nov 2003)
Military Intelligence (Strategy Page)
MILNET: Intelligence Agencies
MI5 (Security Service, UK)
MI6 (SIS, British Secret Intelligence Service)
MI6 Secret Intelligence Service (UK Foreign & Commonwealth Office)
Mossad (Israeli Institute for Intelligence)
NameBase Book Index (Daniel Brandt)
National CounterIntelligence Center (CIA)
The National Counterintelligence Strategy of the United States (Office of the National Counterintelligence Executive, Mar 2005) PDF

National Criminal Intelligence Service (UK)
National Intelligence Council (Director of National Intelligence, Washington, DC)
National Intelligence Council Web Site (CIA)
National Intelligence News (Carroll Publishing, Bethesda, Maryland)
National Military Intelligence Association (US)
National Reconnaissance Office (U.S. Department of Defense)
National Security (Sean Mead, Suite 101)
National Security Agency (John Pike, FAS)
National Security Agency (U.S. NSA Official Homepage)
-- NSA Handbook
The National Security Agency Declassified
(Jeffrey T. Richelson, assisted by Michael L. Evans, 13 Jan 2000, updated)
National Security Agency Releases History of Cold War Intelligence Activities (National Security Archive Electronic Briefing Book No. 260, 14 Nov 2008)
The National Security Archive at George Washington University
-- Digital National Security Archive Online (Chadwyck-Healey)
--Document of The Month
-- Unredacted: The National Security Archive, Unedited and Uncensored

National Security Directorate (Solicitor General Canada)
-- Security Intelligence Review Committee (SIRC)
National Security in the Information Age, The Task Force on
(Markle Foundation)
National Security Initiatives - Safety and Security for Canadians
(Government of Canada)
National Security Whistleblowers (Louis Fisher, CRS Report for Congress, 30 Dec 2005) PDF
Navaho Codetalkers (Smithsonian Institution)
Navajo Code Talkers | Interviews, Videos & More
NCIX Office of the National Counterintelligence Executive (U.S.)
Nest of spies: The spy and the cuckoo (Helen Macdonald, Aeon Magazine, 11 Feb 2014)
Network Centric Warfare (U.S. Command and Control Research Program)
The New Battlefield (MSNBC)
No Mere Oversight: Congressional Oversight of Intelligence is Broken (Denis McDonough et al., Center for American Progress, Washington, DC, Jun 2006)
NOVA Online | Decoding Nazi Secrets (PBS)
NOVA Online | Secrets, Lies, and Atomic Spies
(Tug Yourgrau, PBS, 5 Feb 2002)
NOVA | Spies That Fly (PBS, Jan 2003)
NOVA | 3D Spies of WWII (Tim Dunn, PBS, 18 Jan 2012)
-- Treasonous Idealism (Review by Chet Raymo, Scientific American 286:2:96-7, Feb 2002)
NOVA | The Spy Factory [US National Security Agency] (James Bamford et al., PBS, 3 Feb 2009)
NOVA | Rise of the Hackers (Kate Dart et al., PBS, 24 Sep 2014)
NSA keys into quantum computing (Jon Cartwright, Physics World, 6 Feb 2014)
NSA - National Cryptologic Museum (U.S. National Security Agency)
Office of the Director of Central Intelligence (CIA)
Office of the Director of National Intelligence (Washington, DC)
Office of the National Intelligence Executive Organization Chart (Carroll Publishing, Bethesda, 14 Mar 2005) PDF
Official Secrets Act (Justice Canada)
OpenCanada.org (Canadian International Council)
OpenTheGovernment.org -- Americans For Less Secrecy, More Democracy (Rick Blum et al.)
Open Source Solutions, Inc.
-- OSS Intelligence Mall
Operations Security (Joint Chiefs of Staff, U.S. Department of Defense, 29 Jun 2006) PDF
OPSEC (OPerations SECurity) Glossary of Terms (Interagency OPSEC Support Staff, U.S. Government Operations Security)
OPSEC in the Information Age (Robert G. Michnowicz, U.S. Army War College, Carlisle, Pennsylvania, 15 Mar 2006) PDF
OPSEC Professionals Society (Operations Security)
Out of the Black: The Declassification of the NRO (Jeffrey T. Richelson, ed., National Security Archive Electronic Briefing Book No. 257, 18 Sep 2008)
Overseas Security Advisory Council (U.S. Department of State)
An Overview of the United State Intelligence Community (Office of the Director of National Intelligence, Washington, DC, 2007) PDF

The Pentagon Papers: Secrets, Lies, and Audiotapes (ed. Thomas S. Blanton, NSA Electronic Briefing Book #48, 5 Jun 2001)
The Pentagon's Counterspies: The Counterintelligence Field Activity (CIFA) (Jeffrey Richolson, ed., National Security Archive Electronic Briefing Book No. 230, 17 Sep 2007)
The Complete Pentagon Papers (John Prados, ed., National Security Archive Electronic Briefing Book No. 359, 16 Sep 2011)
The Pentagon's Spies (Jeffrey T. Richelson, NSA Electronic Briefing Book #46, 23 May 2001)
Police Intelligence Operations (U.S. Army Field Manual No. 3-19.50, Jul 2006) PDF
Postwar Findings about Iraq's WMD Programs and Links to Terrorism and How they Compare with Prewar Assessments (Report of the Select Committee on Intelligence, U.S. Senate, 8 Sep 2006) PDF
Potomac Institute for Policy Studies - Home Page
Prehistory of Public Key Cryptography (Steven M. Bellovin)
Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information (Elizabeth B. Bazan & Jennifer K. Elsea, Congressional Research Service, 5 Jan 2006) PDF
Princess Noor Appreciation Society International (Tom Lipscombe)
Project Megiddo (FBI report, 20 Oct 1999) PDF
Proposals for Intelligence Reorganization, 1949-2004 (Richard A. Best, Jr., CRS Report for Congress, 29 Jul 2004) PDF
Pseudo-Secrets: A Freedom of Information Audit of the U.S. Government's Policies on Sensitive Unclassified Information (National Security Archive, George Washington University, Mar 2006) PDF
Psychology of Intelligence Analysis
(Richards J. Heuer, Jr., CIA, 1999)
Public Eye: Public Intelligence (John Pike, FAS)
Radio Frequency Interference and its Use as a Weapon
(Helen Gantt, InfosecWriters, 16 Aug 2006)
PDF
RAND Home Page
RAND National Security Research Division (RAND Corporation)
RAND Review (The RAND Corporation, Santa Monica, California)
RAND Science and Technology: Online Research
Recognizing Iran as a Strategic Threat: An Intelligence Challenge for the United States (Staff Report, Permanent Select Committee on Intelligence, U.S. House of Representatives, 23 Aug 2006) PDF
Regional Information Sharing Systems (RISS) Program (RISSNET)
Report on the Progress of the DNI in Implementing the "Intelligence Reform and Terrorism Prevention Act of 2004" (Office of the Director of National Intelligence, Washington, DC, May 2006) PDF
A Report on the Surveillance Society For the Information Commissioner by the Surveillance Studies Network (ed. David Murakami Wood, UK, Sep 2006) PDF
A Review of the FBI's Handling of Intelligence Information Prior to the September 11 Attacks (Office of the Inspector General, U.S. Department of Justice, Nov 2004, released Jun 2005) PDF
A Review of the FBI's Handling of Intelligence Information Related to the September 11 Attacks (US DOJ Inspector General, Nov 2004) PDF
-- The Handling of Intelligence Information Prior to the September 11 Attacks (Full Text of Report, released 7 Jun 2005)
Review of Intelligence on Weapons of Mass Destruction
(Butler Review, London)
-- Report (14 Jul 2004) PDF
-- Useful links for the Butler Report

A Review of Remote Surveillance Technology Along U.S. Land Borders (U.S. Department of Homeland Security, Dec 2005) PDF
The Ritchie Boys (a film by Christian Bauer, Munich, 2005)
Road Map for National Security: Imperative for Change
(The Phase III Report of the U.S. Commission on National Security/21st Century, 31 Jan 2001)
PDF
The Robert Gates File (ed. John Prados & Thomas Blanton, National Security Archive Electronic Briefing Book No. 208, 10 Nov 2006)
Safety and Security for Canadians (Government of Canada)
Salon.com Directory | CIA
Science and Security in a Post 9/11 World: A Report Based on Regional Discussions Between the Science and Security Communities (Jacques S. Gansler & Alice P. Gast et al., Committee on a New Government-University Partnership for Science and Security, National Research Council , Washington, DC, 18 Oct 2007)
-- Webcast
Science at its Best, Security at its Worst (Rudman Report) PDF
Science, Technology and the CIA (ed. Jeffrey T. Richelson, National Security Archive, 10 Sep 2001)
The Secrecy Court of Last Resort: New Declassification Releases by the Interagency Security Classification Appeals Panel (ISCAP) (William Burr, ed., NSA Electronic Briefing Book No. 276, 5 Jun 2009)
Secrecy & Government Bulletin (Steven Aftergood, FAS)
Secrecy News (FAS Project on Government Secrecy)
Secrecy News Blog
The Secret History of the U-2 (Jeffrey T. Richelson, ed., National Security Archive Electronic Briefing Book No. 434, 15 Aug 2013)
Secret US Embassy Cables (WikiLeaks)
Secret Kingdom (UK)
The Secret Sentry Declassified (Matthew M. Aid, ed., National Security Archive Electronic Briefing Book No. 278, 19 Jun 2009)
Secret Services (Matthias Wuest)
Secret War Files | Spy secrets revealed (BBC News, 27 Jan 1999)
Securing an Open Society: Canada's National Security Policy
(Government of Canada, 27 Apr 2004)
PDF
Security Intelligence Review Committee (Canada)
Security Resource Net (National Security Institute, US)
See, Speak, and Hear No Incompetence: An Analysis of the Findings of The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (David Isenberg, British American Security Information Council Special Report 2005.1, Oct 2005) PDF
"Sensitive But Unclassified" Information and Other Controls: Policy and Options for Scientific and Technical Information (Genevieve J. Knezo, CRS Report for Congress, 15 Feb 2006) PDF
Signals Intelligence and Communications Security on the Web
(John Pike, FAS)

SISG: The Security and Intelligence Studies Group
(UK Political Studies Association)
64 Baker Street | The Women of the Special Operations Executive
The Snowden Affair: Web Resource Documents the Latest Firestorm over the National Security Agency (Jeffrey T. Richelson, National Security Archive Electronic Briefing Book No. 436, 4 Sep 2013)
Snowden Speaks: NSA Whistleblower Addresses SXSW (Larry Greenemeier, Scientific American, 10 Mar 2013)
-- A Virtual Conversation with Edward Snowden (SXSW)
Special Operations Executive (SOE) Agents in France (Nigel Perrin)
Special Operations Executive F Section
Society of Competitive Intelligence Professionals
(SCIP, Alexandria, Virginia)
Special Operations Executive | Noor-un-nisa Inayat Khan, GC, MBE, CdG (Tom Lipscombe)
Special Plans and Double Meanings: Controversies over Deception, Intelligence, and Policy Counterterrorism (Jeffrey T. Richelson, ed., National Security Archive Electronic Briefing Book No. 456, 20 Feb 2014)
Spy Blog: Watching Them, Watching Us (UK Public CCTV Surveillance Regulation Campaign)
Spy Satellites (Greg Goebel)
Spy versus spy: Government control of sensitive information (Susan Harris Rimmer, Parliament of Australia Library Research Brief, 24 Mar 2006) PDF
The Spy Who Billed Me: Outsourcing the War on Terror
(R. J. Hillhouse)
SpyZone Surveillance, Counter Surveillance and Hi-Tech Spy & Security Products (CCS Group)
State and Local Intelligence in the War on Terrorism
(K. Jack Riley et al., RAND, 2005)
Steganography FAQ (Aelphaeis Mangarae, Zone-H.org, 18 Mar 2006) PDF
StegoArchive.Com
Stratfor Home Page
Studies in Intelligence (CIA Center for the Study of Intelligence)
Studies in Intelligence, Indexes & Archives of (CIA University)
Surveillance & Society Homepage (University of Newcastle upon Tyne)
Surveillance Camera Players
Surveillance, privacy and history (David Vincent, History & Policy, Oct 2013)
Surveillance Studies Resource Base (Surveillance & Society, UK)
SVR | Foreign Intelligence Service (Moscow)
Technological, Social, and Economic Trends That Are Increasing U.S. Vulnerability to Insider Espionage (Lisa A. Kramer et al., Defense Personnel Research Center, Monterey, California, May 2005) PDF
Technology and the Emerging Post-Privacy Era (Scientific American In-Depth Report, 25 Jun 2014)
TFP (The Final Phase)
A Theory of Information Warfare (Richard Szafranski)
TIA (Total Information Awareness) Systems (DARPA Information Office)
["Torture Report" Senate Select Committee on Intelligence (Diane Feinstein et al., Washington D.C., 2014; 'Torture Report Finally Released,' NSA Torture Archive, 9 Dec 2014)
Toward a Revolution in Intelligence Affairs (Deborah G. Barger, RAND Corporation, 2005)
Toward a Universal Order of Cyberspace: Managing Threats from Cybercrime to Cyberwar (Henning Wegener et al., World Federation of Scientists, Aug 2003) PDF
Tribute to the Unsung Heroes of 624 (SD) Squadron RAF (Ron McKeon)
TSCM.COM - Counterintelligence and Technical Security Links

UK Intelligence Community Online (London)
The UK ITSEC Scheme (IT Security)
United States Intelligence Community
The United States Navy INFOSEC Web Information Service
United States Secret Service
U.S. Army Cyber Command (U.s. 2nd Army)
U.S. Commission on National Security/21st Century
The Use by the Intelligence Community of Information Provided by the Iraqi National Congress (Report of the Select Committee on Intelligence, U.S. Senate, 8 Sep 2006) PDF
U.S. Intelligence and the French Nuclear Weapons Program (Jeffrey T. Richelson, ed., National Security Archive Electronic Briefing Book No. 184, 21 Mar 2006)
U.S. Intelligence and the Indian Bomb (Jeffrey T. Richelson, ed., NSA Electronic Briefing Book No. 187, 13 Apr 2006)
US Intelligence and Security Agencies (John Pike, FAS)
U.S. Intelligence and the South African Bomb (Jeffrey Richelson, ed., National Security Archive Electronic Briefing Book No. 181, 13 Mar 2006)
The U.S. Intelligence Community: Information Resources
(Lehman Social Sciences Library, Columbia University)
The U.S. Intelligence Community: Organization, Operations and Management, 1947-1989 (Digital National Security Archive)
U.S. Nuclear Detection and Counterterrorism, 1998-2009 (ed. Jeffrey T. Richelson, National Security Archive Electronic Briefing Book No. 270, 23 Jan 2009)
U.S. Senate Committee on Intelligence
-- Report on the U.S. Intelligence Community's Prewar Intelligence Assessments on Iraq (Pat Roberts et al., U.S. Senate, 7 Jul 2004) PDF
The U-2, OXCART, and the SR-71: U.S. Aerial Espionage in the Cold War and Beyond (Jeffrey T. Richelson, ed., NSA Electronic Briefing Book No. 74, 16 Oct 2002)
The VENONA Home Page (U.S. National Security Agency)
Violette Szabo, GC, MBE, CdG
Virtual World of Intelligence
Vulnerability of Concentrated Critical Infrastructure: Background and Policy Options (Paul W. Parfomak, CRS Report for Congress, 21 Dec 2005) PDF
Watching Them, Watching Us (UK Public CCTV Surveillance Regulation Campaign)
WenHoLee.org
What Is Information Warfare? (Martin Libicki, Aug. 1995)
What the President Leaked: Authorized Leak or Declassification? The Documents Behind the Bush Administration's Intelligence Disclosure on Iraq's Weapons of Mass Destruction (National Security Archive, George Washington University, 7 Apr 2006)
Whistle-Blower's Evidence, Uncut (Mark Klein et al., Wired News, 22 May 2006)
Who's Watching Who?
WikiLeaked: Inside the State Departments Secret Cables (Foreign Policy Magazine)
WikiLeaks | Untraceable mass document leaking and analysis (ed. Julian Assange)
-- WL Central | An unofficial WikiLeaks information resource
-- Save Wikileaks
-- WikiLeaks Mirrors (SaveWikileaks.net)
The Wilson-Plame-Novak-Rove Blame Game (Annenberg Public Policy Center, 22 Jul 2005)
Women in Intelligence (J. Ransom Clark)
World Intelligence Guide (John Pike, GlobalSecurity.org)
The Yuri Orlov File (Svetlana Savranskaya & Tom Blanton, eds., et al, National Security Archive Electronic Briefing Book No. 482, 13 Aug 2014)
The ZGram Attic

See also Antivirus Resources, Counterterrorism, Hackers and Hacktivism, and Public Access and Private Security



[Home] [Fore] [Up] [Aft] Return to Field Nodes or to The Snark Hunter's Page, go to Index, provide Feedback, or send e-mail to Webmaster.

[Top]

This page (URL http://www.snark.org/pax3.htm) was last modified on . Last access was from . The current connection, from , logged on at ().