Military Archives on Public Intelligence (1992-2006)

Military
Archives 1992-2006
Archives 1992-2006

2005

US

Military Steele US Army Conference: E3i: Making the Revolution

2005

US

Military USA Army Modernization Briefing

2004

US

Military Simmons Foreword to the Draft SOF OSINT Handbook

2004

NL

Military Wiebes SIGINT in Bosnia

2003

US

Military Hardee OSINT in Support of Special Operations

2003

US

Military Harrison OSINT Requirements, Collection, & Production Management

2003

US

Military Steele SOUTHCOM: Strategic Threat Assessment

2003

US

Military Steele AFCEA Texas: C4I Revolution and National Security

2003?

US

Military Steele To SecDef: Force Structure Trade-Offs and the Real World

2002

US

Military Hardee Growing an Open Source Intelligence Program

2001

US

Military Steele AUSA: Intelligence Support to a Transforming Army

2001

US

Military Steele AWC: Welcome to the Real World: Force Structure Trade-Offs

2000

CA

Military Cox OSINT at SHAPE…Some Musings

2000

FR

Military Debat The Challenge of Informing European Defence Decisions

2000

US

Military Hughes Open Sources and Intelligent Solutions

2000

Austria

Military Mueller Austrian Military Intelligence Thoughts on OSINT

2000

UK

Military Regan The UK Ministry of Defence OSINT Program

2000

US

Military Reynolds U.S. Transportation Command OSINT

2000

US

Military Steele Briefing to NATO/PfP: One World Ready or Not

1999

US

Military Clark EAGLE VISION: USAF Initiative for Tactical Receipt of Imagery

1999

US

Military Connors PACOM Additional Slides on VIC

1999

US

Military Connors U.S. Pacific Command’s Virtual Information Center (VIC)

1999

US

Military Dearth Intelligence in the 21st Century

1999

US

Military Lee Summary of Military Map Availabililty for Iran

1999

US

Military Myers & Madison Virtual Information Center Concept Refinement

1999

US

Military Prinslow & Bond Information Sharing in Humanitarian Emergencies

1999

US

Military Steele Overview of OSINT Issues & OSINT Utility to DoD

1999

US

Military Steele Setting the Stage for Information Sharing in the 21st Century: 3 Issues

1999

US

Military Steele What Do We Need to Know and Where Do We Get It? (Slides)

1999

US

Military Steele Expeditionary Environment in the 21st Century

1999

US

Military Wirtz Bridging the Culture Gap: OSINT and the Tet Offensive

1998

US

Military Beavers & Shanahan Operationalizing IO in Bosnia-Herzegovina (Book Chapter)

1998

SE

Military Bjore Open Sources and Methods for the Military

1998

SE

Military Bjore OSINT Lessons Learned

1998

UK

Military Rathmell Assessing the IW Threat from Sub-State Groups

1998

US

Military Steele INFORMATION PEACEKEEPING: Purest Form of War (Outline)

1998

US

Military Steele Skeptical Assessment of USN-USMC Based on Real-World OSINT

1998

US

Military Steele TAKEDOWN: The Asymmetric Threat to the Nation

1998

UK

Military Tyrrell OSINT: The Challenge for NATO

1997

US

Military Alger IATAC: Building a Knowledge Base of Emerging IAT

1997

US

Military Clark EAGLE VISION: Tactical Downlink Station for Imagery

1997

US

Military Clinton Managing Complex Contingency Operations

1997

US

Military Molholm DTIC: Building a Virtual Knowledge Warehouse

1997

US

Military Necoba The Marines and OSINT

1997

US

Military Pedtke National Air Intelligence Center Science & Technology OSINT

1997

US

Military Steele CINC Brief: The One that Got CINCSOC (Now CSA) to Buy In

1997

US

Military Steele Creating a Bare Bones OSINT  Capability (Slides)

1997

US

Military Steele Creating a Bare Bones OSINT Unit for DIA

1997

US

Military Steele CINCSOC 10 Minute Brief on OSINT

1997

US

Military Vesely Striking A Balance: National, Operational, & Tactical Acquisition

1996

US

Military Smith Defense Mapping Agency and the Commercial Sector

1996

US

Military Steele Open Source Intelligence Handbook, Chapter 5, OSINT and Military

1996

US

Military Steele DIA/JMITC: National Knowledge Strategy & Revolution in Intelligence

1996

US

Military Stein Mapping, Charting, and Geodetic Needs for Remote Sensing Data

1995

SE

Military Bjore Six Years of Open Source Information (OSI): Lessons Learned

1995

US

Military Dandar Army Intelligence XXI, Open Source Status Report

1995

US

Military Dandar OSIF Exploitation for Army Intelligence XXI: Summary

1995

UK

Military Garfield Update on the UK MoD OSINT Programme (Slides)

1995

UK

Military Garfield Update on the UK MoD OSINT Programme (Text)

1995

US

Military Ricardeli OSINT in Support of Haiti Invasion (Slides)

1995

US

Military Ricardeli OSINT in Support of Haiti Invasion (Text)

1995

US

Military Steele The Military Perspective on Information Warfare: Apocalypse Now

1995

US

Military Steele AWC: Open Source Intelligence for the Military

1994

US

Military Brooks & McKeeyer Split-Based Ops in DESERT STORM: Glimpse of the Future Digital Army

1994

US

Military Munro INFORMATION WARFARE: Snake Eaters Meet Net-Heads

1994

US

Military Pedtke NAIC & The Intelligence Community Open Source Architecture

1994

US

Military Steele DIA/JMITC: NS via the Reinvention of National & Defense Intelligence

1992

US

Military Clift Military OSINT Requirements, Capabilities, and Contracting Directions

1992

US

Military Pedtke et al NAIC S&T Open Source Intelligence Requirements & Capabilities

1992

US

Military Petersen New Roles for the U.S. Military

1992

US

Military Schwartau Introduction to Information Warfare

1992

US

Military Steele Intelligence Lessons Learned from Recent Expeditionary Operations

1992

US

Military Steele Comments Prepared for Future War Roundtable

1992

US

Military Strassmann Forcing Innovation, Cutting Costs, and Increasing Defense Productivity

1991

US

Military Steele Defense Intelligence Productivity in the 1990's

1990

US

Military USMC & Steele Expeditionary Environment Research & Analysis Model

1990

US

Military USMC & Steele Expeditionary Mission Area Factors Summaries

Review: Pearl Harbor Dot Com

5 Star, Communications, Information Society, Information Technology, Threats (Emerging & Perennial)

Amazon Page
Amazon Page

5.0 out of 5 stars Everything You Need to Know About the Next Attack–And Fun,

February 6, 2002
Winn Schwartau
This book is a based on a *non-fiction* manuscript about U.S. vulnerabilities to electronic that was so hot that the author's lawyers insisted he turn it into a novel to avoid liability.It is absolutely superb and written by one of the most authoritative persons around. Unlike most academic and industry security specialists, the author has from the very beginning understood, respected, and been in touch with the elite hackers who worked very hard in the 1980's to expose the outrageously vulnerable electronic systems used by our financial, transportation, power, and communications industries.

In my view, books like this as well as the non-fiction books such as “Information Warfare: Chaos on the Electronic Superhighway” have been vital elements in educating consumers, stockholders, and voters. If you want to know just how vulnerable your bank account is, read this book.

I won't reveal the surprise ending, but will say that it is absolutely a shocker, and totally credible.

Vote on Review
Vote on Review

Review: Cybershock–Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption

5 Star, Asymmetric, Cyber, Hacking, Odd War

Amazon Page
Amazon Page

5.0 out of 5 stars Sensationalist, Populist, Useful, Worthy,

August 22, 2000
Winn Schwartau
There will be those quick to trash this book as sensationalist, and they are partly right. What most people, including the critics, do not realize is that Winn Schwartau went out on a limb in the late 1980's and early 1990's and is *the* primary reason Congress got concerned enough about these issues to demand a Critical Infrastructure Protection program funded at over $1B–it was Winn, not others quick to claim the line, that testified to Congress about an “electronic Pearl Harbor” on 24 June 1991. This book is unabashedly populist and seeks to make this very complex threat entertaining and understandable, and for that reason alone it is worth the time to consider. There are many other serious books for engineers, this is the one for anyone at all from housewife to student to executive. Great airplane book, won't save the world, but will certainly increase your consciousness across the board. Worthy.
Vote on Review
Vote on Review

1994 Sounding the Alarm on Cyber-Security

Correspondence, Memoranda
Steele to USG
Steele to USG

This is the cover letter to the US Government official most responsible for thinking about the National Information Infrastructure (NII) and the security of that infrastructure.  Three “top guns,” one of the the foremost authority in the public arena, another the foremost expert on these matters advising the National Security Agency (NSA) all agreed on the need, in 1994, for a $1 billion a year program.

Today (Fall 2009) NSA has asked for $12 billion a year, and they are not letting on that the real reason they are building their own power plant is because the Chinese have mastered the art of riding the public electrical grid into any computer running on public electricity.  Below are the cross walk and the contributing letters from the top experts in 1004.  NSA has let us all down.

OSS1994-01-18 Cross Walk

OSS1994-01-19 Warning Letters

UPDATE OF 19 DECEMBER 2016:

Both Bill Caelli and Winn Schwartau have new books coming out in 2017, the bottom line of which is that we can indeed secure cyberspace, but it requires that governments and the providers of communications and computing software and hardware have integrity — not the case today. Below is the concept Robert Garigue (RIP) and Robert Steele developed in 1997. No one has implemented this to date.

Click on Image to Enlarge