Wednesday, January 29, 2020

The role of Intelligence in the formulation of government policies Essay Example for Free

The role of Intelligence in the formulation of government policies Essay Introduction Espionage is the secret collection of information, or intelligence, that the source of such information wishes to protect from disclosure. Intelligence refers to evaluated and processed information needed to make decisions. The term can be used with reference to business, military, economic, or political decisions, but it most commonly relates to governmental foreign and defense policy. Intelligence generally has a national security connotation and therefore exists in an aura of secrecy.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Espionage, or spying, is illegal according to national laws. Spying proceeds against the attempts of counter-espionage (or counter-intelligence) agencies to protect the secrecy of the information desired.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   International espionage methods and operations have few boundaries. They have been romanticized in popular fiction and the mass media, but in reality, espionage exists in a secret world of deception, fraud, and sometimes violence. Espionage involves the recruiting of agents in foreign nations; efforts to encourage the disloyalty of those possessing significant information; and audio surveillance as well as the use of a full range of modern photographic, sensing, and detection devices and other techniques of eliciting secret information (see C. S. Trahair, Richard. Encyclopedia of Cold War Espionage, Spies and Secret Operations, 2004).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The intents of this paper are to: (1) trace how espionage started; (2) know the justification and international sanction of intelligence; (3) know the recruitment agents; (4) be aware how espionages are gathered; (5) be acquainted espionage agencies and networks; (6) be informed how espionage during the 19th century and early 20th century; (7) know the role of espionage during World War II and Modern Era; (8) realized how is espionage in politics and industry; (9) learn about the   Espionage Act of 1917; (10) know about Central Intelligence Agency (CIA) as one of the agencies of intelligence and; (11)   know about its implications of modern technology. Background How espionage started?   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Intelligence was early recognized as a vital tool of statecraft—of diplomacy or war. Writing almost 2,500 years ago, the Chinese military theorist Sunzi stressed the importance of intelligence. His book The Art of War (c. 500 BC) gave detailed instructions for organizing an espionage system that would include double agents and defectors. Intelligence, however, was haphazardly organized by rulers and military chiefs until the rise of nationalism in the 18th century and the growth of standing armies and diplomacy (see T. Richelson, Jeffrey. A Century of Spies: Intelligence in the Twentieth Century. 1999). III. Discussion Justification and International Sanction of Intelligence   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In order to adopt and implement foreign policy, plan military strategy and organize armed forces, conduct diplomacy, negotiate arms control agreements, or participate in international organization activities, nations have vast information requirements. Not surprisingly, many governments maintain some kind of intelligence capability as a matter of survival in a world where dangers and uncertainties still exist. The cold war may have ended, but hostilities continue in parts of Eastern Europe, the former Soviet Union, the Middle East, and elsewhere. Indeed, the collapse of old political blocs in the late 1980s has even increased international uncertainty and consequent need for information (see Carney, Ralph M. Citizen Espionage: Studies in Trust and Betrayal. 2001).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   All nations have laws against espionage, but most sponsor spies in other lands. Because of the clandestine nature of espionage, no reliable count exists of how many intelligence officers—only a small percentage of whom are actually spies—there are in the world. A common estimate is that the United States today still employs some 200,000 intelligence personnel. The number that was generally ascribed to the Soviet intelligence establishment in the 1980s was 400,000, a figure that included border guards and internal security police (see T. Richelson, Jeffrey. A Century of Spies: Intelligence in the Twentieth Century. 1999). The recruitment agents   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Today, scores of developed nations have efficient intelligence organizations with systematic programmes for recruiting new agents. Agents come from three main sources: the university world, where students are sought and trained for intelligence careers; the armed services and police forces, where some degree of intelligence proficiency may already have been attained; and the underground world of espionage, which produces an assortment of people, including criminal informers, with relevant experience (see Bungert, Heike Et Al. Secret Intelligence in the Twentieth Century. 2003).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Those who do the actual spying, which may involve stealing information or performing disloyal acts of disclosure, are led to this work by various motivations. Greed or financial need is a leading incentive in many cases, but other motivations, such as ambition, political ideology, or nationalistic idealism, can figure importantly: Oleg Vladimirovich Penkovsky, a highly placed Soviet officer, provided valuable information to Western intelligence services in the belief that the West must be warned of danger. H. A. R. (â€Å"Kim†) Philby, the notorious English spy, worked for the Soviet Union on ideological grounds.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Some spies must be carefully recruited and enticed into cooperation; others volunteer. The latter must be handled with extreme caution, as it is common for double agents to be among the volunteers. Double agents are spies who pretend to be defecting, but in reality maintain their original loyalty. Counter-intelligence staffs are always sceptical of volunteers or defectors and restrict their use for positive espionage purposes. In some cases, the most valuable spy of all is the â€Å"agent-in-place†, the person who remains in a position of trust with access to highly secret information, but who has been recruited by a foreign intelligence service; such a spy is known as a â€Å"mole† (see Herrington, Stuart A. Traitors among Us: Inside the Spy Catchers World, 1999).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A high-priority espionage target is the penetration of the various international terrorist organizations. If the leadership of such units can be infiltrated by spies, advance knowledge can be obtained of the location and identity of intended victims, the nature of the disguises being used by the hit team, and the secret sources of weapons. Such information could be used to foil terrorist operations. International drug trafficking, it has been asserted, can similarly be thwarted by effective espionage, but the problem is complex, and only limited success has been achieved. How espionages are gathered?   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Intelligence work, including spying, proceeds in a five-step process. Initially, what the decision makers need to know is considered, and requirements are set. The second step is collecting the desired information, which requires knowing where the information is located and who can best obtain it. The information may be available in a foreign newspaper, radio broadcast, or other open source; or it may be obtained only by the most sophisticated electronic means, or by planting an agent within the decision-making system of the target area. The third step is intelligence production, in which the collected raw data are assembled, evaluated, and collated into the best possible answer to the question initially asked. The fourth step is communicating the processed information to the decision maker. To be useful, information must be presented in a timely, accurate, and understandable form. The fifth and crucial step is the use of intelligence. The decision maker may choose to ignore the information conveyed, thus possibly courting disaster; on the other hand, a judgment may be made on the basis of information that proves inaccurate (see Hulnick, Arthur S. and Valcourt, Richard R. Fixing the Spy Machine: Preparing American Intelligence for the Twenty-First Century, 1999).The point is that the decision maker must make the final crucial judgment about whether, or how, to use the information supplied. The intelligence process can fail at each or any of these five basic steps. Espionage Agencies and Networks   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The worlds intelligence, espionage, counter-intelligence, and covert action programmes may be said to follow three distinct organizational patterns: the American, the totalitarian (exemplified by the Communist regimes), and the British (parliamentary) systems. Similarities exist among them, yet distinctions are sharp.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In the United States the Central Intelligence Agency continues to sit at the corner of an elaborate complex of some dozen separate intelligence organizations. Each has a specific role and a carefully guarded area of operations. The director of central intelligence is both head of the CIA and the presidents principal intelligence adviser. In the latter job the director theoretically coordinates all the separate intelligence units, setting their requirements, budgets, and operational assignments. In reality, many of the major units in the system—such as the Defense Intelligence Agency and the huge National Security Agency/Central Security Service, both part of the Department of Defense—operate in quasi-independence. The National Security Agency, which engages in code making and code breaking, the science of cryptography, is much larger in staff size and budget than the CIA (see Marchetti, Victor and Marks, John D. The CIA and the Cult of Intelligence, 2001). The military also maintains a major tactical intelligence capability to assist field commanders in making on-the-spot decisions. Other major units in the US intelligence system include the State Departments Bureau of Intelligence and Research, the Department of the Treasury, the Federal Bureau of Investigation, and the Drug Enforcement Administration of the Department of Justice. The US model influenced the intelligence structures of those countries where the United States was dominant at the end of World War II, such as West Germany (now part of the united Federal Republic of Germany), Japan, South Korea, and Taiwan.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In contrast to the federated American intelligence structure, the typical totalitarian setup is highly centralized. In the Soviet Union, the power of the KGB pervaded every aspect of national life. Its director was generally a powerful member of the Politburo (the governing political committee of the USSR). The KGB had two chief directorates. The most important was the First Directorate, which was responsible for foreign intelligence gathering. The Second Directorates principal responsibilities involved providing counter-espionage protection to the regime and recruiting foreign agents within the Soviet Union. Its targets included diplomats and journalists stationed in the USSR, foreign students, business people, tourists, and visiting delegations (see Macpherson, Nelson. American Intelligence in War-Time London: The Story of the Oss, 2003).Most Eastern European governments followed the KGB model in their intelligence operations. China, Cuba, and other Communist nations still do.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The third model of intelligence systems is the British, a confederation of agencies coordinated by a Cabinet subcommittee and accountable to the Cabinet and prime minister. The two principal units are the Secret Intelligence Service (often called MI6, signifying â€Å"military intelligence†) and the Security Service (popularly called MI5). These labels reflect the military origins of these services, which are now in the civilian sector. MI6 is similar to the CIA and the KGB in that it carries out espionage, counter-espionage, and covert action overseas. MI5 is charged with domestic counter-intelligence and internal security. Scotland Yard maintains a â€Å"special branch†, which operates as the overt arm of the security service; it makes arrests and offers evidence in espionage cases while MI5 agents remain in the background. A number of specialized units also operate within the British intelligence community. These include the Government Communications Centre (for code making and breaking), the Ministry of Defense intelligence sections, and various Foreign Office intelligence groups. With some national variations, the intelligence services of France, Italy, Israel, and the Commonwealth of Nations countries follow the general British pattern of organization (see Macpherson, Nelson. American Intelligence in War-Time London: The Story of the Oss, 2003). During the 19th century   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Political espionage is thought to have first been used systematically by Joseph Fouchà ©, duc dOtrante, minister of police during the French Revolution and the reign of Napoleon. Under Fouchà ©s direction, a network of police agents and professional spies uncovered conspiracies to seize power organized by the Jacobins and by Bourbon Royalist à ©migrà ©s. The Austrian statesman Prince von Metternich also established an efficient organization of political and military spies early in the 19th century. Better known than either of these organizations was the dreaded Okhrana (Department for Defence of Public Security and Order) of the Russian tsars, created in 1825 to uncover opposition to the regime.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   During the mid-19th century the secret police of Prussia was reorganized and invested with the duty of safeguarding the external as well as the internal security of the country. The Prussian espionage system played an important part in preparations to unify the German states in the German Empire. It also covered France with a network of about 30,000 agents whose work contributed to the German victory in the Franco-Prussian War of 1870-1871. Not until the latter part of the 19th century, however, were permanent intelligence bureaux created by modern states (see T. Richelson, Jeffrey. A Century of Spies: Intelligence in the Twentieth Century. 1999). Early 20th century   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Systematic espionage aided the Japanese in defeating the Russians in the Russo-Japanese War of 1904-1905. In preparing for World War I the Germans again flooded France with a host of agents, some of whom were disguised as trade representatives, teachers, agricultural labourers, or domestics. The most famous of these agents was Mata Hari, who posed as an Indian dancer in Paris. German agents also engaged in attempts to sabotage American national defense both before and after the US entry into World War I.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Most nations, however, entered World War I with inadequate espionage staffs, and the war was frequently fought on the basis of poor intelligence. The lessons of that war, along with rapid advances in technology, especially in communications and aviation, spurred a major growth in intelligence agencies. This was further stimulated by the advent of Fascist governments in Europe and a military dictatorship in Japan, all of which had expansionist foreign policies and the creation of counter-espionage agencies such as the Gestapo in Nazi Germany. These developments led other, democratic countries to establish counter-espionage systems as well (see Hulnick, Arthur S. and Valcourt, Richard R. Fixing the Spy Machine: Preparing American Intelligence for the Twenty-First Century. 1999). Espionage during World War II   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   World War II was the great stimulus to intelligence services worldwide. Modern military and communications technology put a premium on accurate and quick information, as well as on efforts to protect the security of sensitive information. Some of the great battles of World War II were actually intelligence and counter-intelligence battles. Only in recent years have some of the exploits, and failures, in this secret war been disclosed. Notable is Operation Double Cross, in which the British captured practically all the German spies in Great Britain during the war and turned them into double agents who sent false information back to Germany. Also, the British and their allies were able to break the German secret code, providing access to many of the enemys secret transmissions (see Sexton Jr., Donal J. Signals Intelligence in World War II: A Research Guide. 1999).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The surprise attack by Japan on the American naval base at Pearl Harbor on December 7, 1941, was a great intelligence success for the Japanese and an intelligence failure for the Americans. That failure stimulated the post-war growth of a massive intelligence apparatus in the United States. Before World War II the United States had virtually no intelligence system; after the war the CIA became world famous for its pervasive international surveillance, joining the MI6, the KGB, the Service de Documentation Extà ©rieure et de Contre-Espionage of France, Israels foreign intelligence agency Mossad, Chinas Social Affairs Department, and numerous other intelligence agencies in a massive network of espionage and counter-espionage efforts (see Sexton Jr., Donal J. Signals Intelligence in World War II: A Research Guide. 1999). Modern Era   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In the mid-1970s, as a result of disillusionment with the Vietnam War, the Watergate scandal, and the policies of dà ©tente, many Americans began to question the role of the CIA. Mass-media disclosures of intelligence agency abuses and failures were followed by investigations by presidential commissions and congressional committees, which resulted in new guidelines for secret operations and a new structure for executive and legislative supervision. Controversy over the CIAs role and control remains, however. One result is an ever-increasing amount of public information about intelligence services around the world (see â€Å"Espionage†. Grolier Encyclopedia of Knowledge, pp. 342-347, vol. 5). In Britain, MI5 remained unrecognized by statute until 1989, and MI6 until 1994. Espionage in Politics and Industry   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Intelligence and espionage are terms most commonly associated with national foreign policies, yet secret information is needed to make decisions in politics, commerce, and industry. Political parties have always been interested in the strategic plans of their opponents or in any information that might discredit them.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Most large corporate enterprises today have divisions for strategic planning that require intelligence reports. Competitive enterprises are undeniably interested in the plans of their competitors; despite laws against such practices, industrial espionage is difficult to detect and control and is known to be an active tool for gaining such foreknowledge. Many of the tools of government intelligence work are used, including electronic surveillance and aerial photographic reconnaissance, and attempts are even made to recruit defectors (see â€Å"Espionage†. Grolier Encyclopedia of Knowledge, pp. 342-347, vol. 5). Espionage Act of 1917   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Espionage Act of 1917 is a principal United States legislation prohibiting espionage for a foreign country and providing heavy penalties for such activity. As amended in 1940 and 1970, it is still in force.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The 1917 law provided steep fines and imprisonment for collecting and transmitting to foreign power information related to US national defense and for interfering with the recruitment or loyalty of the armed forces. Use of the US mail for material urging treason or resistance to US laws was prohibited; sabotage, especially of trading ships, was subjected to severe penalties; the movement of neutral ships in US waters was regulated (in order to stop such vessels from shipping arms or supplies to an enemy country); and the fraudulent use of passports as well as the unauthorized representation of a foreign government were prohibited. An important amendment to the law, usually called the Sedition Act, was passed in 1918 but repealed in 1921; it forbade spoken or printed attacks on the US government, Constitution, or flag (see â€Å"Intelligence†. New Standard Encyclopedia, pp. 431-437, vol. 7).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   During the outbreak of public hysteria following the US entry into World War I, the 1917 and 1918 laws permitted about 1,500 trials and prison sentences; freedom of the press was curtailed. In 1919 this led US Supreme Court justices Oliver Wendell Holmes, Jr., and Louis Brandeis to state the principle, later much cited, that unpatriotic speech and publications were illegal only if they constituted a â€Å"clear and present danger† to national security.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The 1940 revision of the Espionage Act increased its penalties. The application of the law to propaganda was limited by a Supreme Court decision in 1944. During World War II about 160 people were convicted under the Espionage Act. Also under this act, the American Communists Julius Rosenberg and Ethel Rosenberg were convicted of spying and executed in 1953 (see â€Å"Intelligence†. New Standard Encyclopedia, pp. 431-437, vol. 7). Central Intelligence Agency   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Central Intelligence Agency (CIA), agency of the Executive Office of the President of the United States, created in 1947, together with the National Security Council. The CIA is Americas first permanent peacetime intelligence agency responsible for keeping the government informed of foreign actions affecting the nations interests. It was established by the National Security Act of 1947 and is charged with coordinating all US intelligence activities, as well as such functions and duties related to intelligence as directed by the National Security Council (see Darling, Arthur B. The Central Intelligence Agency: An Instrument of Government, to 1950. 2002). A director and deputy director of the agency are appointed by the president with the consent of the Senate (see Hulnick, Arthur S. and Valcourt, Richard R. Fixing the Spy Machine: Preparing American Intelligence for the Twenty-First Century, 1999). History   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The CIAs original mission was primarily intelligence gathering, but after Communist takeovers in Eastern Europe and mainland China, the National Security Council directed that the agency engage in political, covert psychological, paramilitary, and economic operations. United States participation in the Korean War (1950-1953) placed additional requirements on the CIA to support the combat forces.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In the period from 1953 to 1961 the CIA was at the height of its cold war activities, carrying out continuous foreign intelligence, counter-intelligence, political action, and propaganda operations. In late 1961 the CIA was reorganized to put more emphasis on science, technology, and internal management. The agency was heavily committed in the war in South East Asia. In 1963 an Office of National Intelligence Programs Evaluation was established to coordinate community activities; this was replaced in 1972 by an Intelligence Community Staff (see Lowenthal, Mark M. U.S. Intelligence: Evolution and Anatomy, 1999). Activities   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The US Central Intelligence Agency (CIA) is divided into four main directorates, or branches. The Directorate of Operations conducts covert activities around the world. The Directorate of Science and Technology interprets data gathered from electronic transmissions, spy satellites, and other sources. The Directorate of Intelligence produces analyses for policy makers by synthesizing information from the CIA and other federal agencies. The Directorate of Administration oversees the agencys finances and personnel and monitors internal security.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The activities of the CIA are many and varied. Clandestine collection of vital information that cannot be obtained by any overt means requires recruiting agents who can obtain the needed intelligence without detection. Intelligence reports from all sources are reviewed by analysts who produce studies ranging from basic surveys to estimates of future developments. Current intelligence of major importance is detailed in daily, weekly, or monthly bulletins. Periodic projections concerning key nations are presented as national intelligence estimates (see Lowenthal, Mark M. U.S. Intelligence: Evolution and Anatomy, 1999).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The CIA is also responsible for counter-espionage activities. Its mission is to prevent the placement of foreign agents in sensitive US agencies; domestically this work is coordinated with the Federal Bureau of Investigation (FBI).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Covert political operations have ranged from subsidizing friendly foreign politicians, parties, or pressure groups to providing assistance in combating subversion. Paramilitary operations support certain exile forces with training and equipment; one example was the CIAs support of Cuban exiles before and during the Bay of Pigs invasion of Cuba.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Modern technology has increased the capabilities of intelligence collection. In the 1960s high-altitude aircraft introduced a new era of aerial photography; this was quickly followed by transmissions from space satellites. Similarly, underseas intelligence work was advanced by vessels capable of raising a submarine from great depths (see Lowenthal, Mark M. U.S. Intelligence: Evolution and Anatomy, 1999). Controversy and investigations   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   All clandestine activities are considered abhorrent by some people. Many, however, recognize secret intelligence collection necessary to protect national security. Generally, people support covert political activities in times of crisis.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The role of the CIA director as the principal US intelligence officer and coordinator of activities of the other agencies has often been in dispute. Over the years frequent proposals have been made to divest the head of the CIA of the coordinating role and assign that function to a member of the White House staff.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The CIA has been investigated a number of times by various task force groups, one of which in 1949 recommended major reorganization of CIA operations. Following the Bay of Pigs invasion in 1961, President John F. Kennedy appointed a group to analyze the failure.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In 1975 the CIA came under extensive Congressional and White House examination. It was found that the agency had been engaged in â€Å"unlawful† domestic spying activities and had been implicated in assassination attempts abroad. As a result of these investigations, permanent Congressional committees were established to oversee CIA operations. By 1980 these committees had exclusive jurisdiction over review of CIA activities (see Marchetti, Victor and Marks, John D. The CIA and the Cult of Intelligence, 2001).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   By 1986, however, the agency was involved in a new controversy concerning the secret sale of arms to Iran and the disbursement of monies from the sale to the rebels (known as the Contras) fighting the government of Nicaragua. The late CIA director William J. Casey, among others, was suspected of being implicated in the arms scandal. As the 1990s began, the collapse of the Soviet bloc and the dissolution of the USSR led the CIA to revise its mission and organization to meet changing world conditions.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The United States government released the first of three batches of classified documents expected to shed light on relations between Chile and the United States during the 1970s in June 1999. These documents included reports by the Central Intelligence Agency referring to covert operations intended to promote a military coup and overturn the government of President Allende.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   There was further criticism for the CIA after the terrorist attacks on the United States of September 11, 2001, when it was accused of not having done enough to warn of, and possibly prevent, the impending disaster. Over the following months the organization was subsequently given extra powers and resources to conduct increased covert operations as part of the war on terrorism; it also began to develop closer ties with the FBI (see T. Richelson, Jeffrey. A Century of Spies: Intelligence in the Twentieth Century. 1999). Conclusion Implications of Modern Technology   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   All forms and techniques of intelligence are now aided by an accelerating technology of communications and a variety of computing and measuring devices. Miniaturized cameras and microfilm have made it easier for people engaged in all forms of espionage to photograph secret documents and conceal the films. Artificial satellites also have an espionage function—that of aerial photography for such purposes as detecting secret military installations. Information held or programmes running on computers are vulnerable to penetration by hackers, whether acting independently or for other bodies. The vanguard of these developments is highly secret, but it is known that telephones can be tapped without wires, rooms can be bugged (planted with electronic listening and recording devices) without entry, and photographs can be made in the dark. Of course this same technology is used in countermeasures, and the competition escalates between those seeking secret information and those trying to protect it.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In foreign embassies in sensitive areas, confidential discussions routinely take place in plastic bubbles encasing secure rooms, to protect the confidentiality of information. Intelligence agencies have long been known to be staffed with expert lip readers. Privacy of communications remains under constant assault by technological developments that offer threats to, but perhaps also promises for, human progress. References C. S. Trahair, Richard. Encyclopedia of Cold War Espionage, Spies and Secret Operations, 2004. Greenwood Press, Westport, CT. T. Richelson, Jeffrey. A Century of Spies: Intelligence in the Twentieth Century. 1999. Oxford University Press, New York. Carney, Ralph M. Citizen Espionage: Studies in Trust and Betrayal. 2001. Praeger Publishers, Westport, CT. Bungert, Heike Et Al. Secret Intelligence in the Twentieth Century. 2003. Frank Cass. London. Herrington, Stuart A. Traitors among Us: Inside the Spy Catchers World, 1999. Presidio Press, Novato, CA. Marchetti, Victor and Marks, John D. The CIA and the Cult of Intelligence, 2001. Dell, New York. Hulnick, Arthur S. and Valcourt, Richard R. Fixing the Spy Machine: Preparing American Intelligence for the Twenty-First Century, 1999. Praeger, Westport, CT. Sexton Jr., Donal J. Signals Intelligence in World War II: A Research Guide. 1999. Greenwood Press, Westport, CT. Darling, Arthur B. The Central Intelligence Agency: An Instrument of Government, to 1950. 2002. Pennsylvania State University Press, University Park, PA. Macpherson, Nelson. American Intelligence in War-Time London: The Story of the Oss, 2003. Frank Cass, London. Hulnick, Arthur S. and Valcourt, Richard R. Fixing the Spy Machine: Preparing American Intelligence for the Twenty-First Century, 1999. Praeger, Westport, CT. â€Å"Espionage†. Grolier Encyclopedia of Knowledge, pp. 342-347, vol. 5. â€Å"Intelligence†. New Standard Encyclopedia, pp. 431-437, vol. 7. Lowenthal, Mark M. U.S. Intelligence: Evolution and Anatomy, 1999. Praeger, Westport, CT.

Tuesday, January 21, 2020

Richard Wagner :: Biography, Composer

(1813-1883)  German composer. His childhood was divided between Dresden and Leipzig, where he had first composition lessons; his teacher refused payment because of his talent. His first opera, Die Feen (1834), was followed by Der Liebesverbot (1836); the premiere performance was so unprepared that the event was a fiasco, and he henceforth determined not to settle for modest productions. The success of Rienzi (1840) led him to be more adventurous in The Flying Dutchman (1843), and even more so in Tannhà ¤user (1845). Caught up in the political turmoil of 1848, he was forced to flee Dresden for Zurich. During this enforced vacation, he wrote influential essays, asserting (following G. W. F. Hegel) that music had reached a limit after Ludwig van Beethoven, and that the "artwork of the future" would unite music and theater in a Gesamtkunstwerk ("total artwork"). In 1850 he saw Lohengrin produced. He had begun his most ambitious work, The Ring of the Nibelung, a four-opera cycle. The need for larg e-scale unity brought him to the concept of the leitmotiv. He ceased work on the Ring's third opera, Siegfried, in the throes of an adulterous love with Mathilde Wesendonk, and wrote an opera of forbidden love, Tristan und Isolde (1859), which also seemed to break the bonds of tonality. He published the Ring librettos in 1863, asking if some German prince would support his artistic dreams, and Ludwig II of Bavaria responded. Shortly thereafter, Cosima Liszt von Bà ¼low became the mother of the first of his children; they marriedin 1870, after his own wife's death.

Monday, January 13, 2020

To what extent was Lenin crucial to the Bolshevik

To what extent was Lenin crucial to the Bolshevik seizure of power in October 1917? On 24th October 1917 the Lenin and the Bolsheviks led a revolution in Russia. The Bolshevik Red Guards led a revolution against the Provisional Government by seizing control of stations, telephone exchanges, post offices, the national bank and the Winter Palace in Petrograd. Now Lenin set about creating the world's first communist state. Although he was a strong influence, he was not solely responsible for the outbreak of revolution.There are other important causes of the Bolshevik seizure of ower, such as the weakness of the Provisional government and Kerenskys mistakes. Also other important factor was the actions of Trotsky and the timing and luck of the Bolsheviks. However, Lenin was, toa large extent, crucial to the Bolshevik seizure of power because he presented his April thesis, which gave the people of Russia an awakening to the communist aim. Lenin was important to the Bolshevik seizure of pow er as he was able to manipulate public opinion using slogans and propaganda.This was also shown early in the year, before Lenin's return to Russia from Switzerland. The Bolsheviks in Russia had printed in ‘Pravda' (their newspaper) that their members and followers should support the Provisional Government, and also that they had given serious thought to the idea of combining with the Mensheviks. This was all very contrary to what Lenin wrote in his ‘April Theses' which clearly laid out his views and beliefs on the subject. A key point of his ‘April Theses' was â€Å"No Support for the Provisional Government†, yet without him his party were proposing just that.Lenin as an individual was able to force the Bolsheviks to follow his beliefs nd goals and without him they may never have chosen this course of action at all. Through his April thesis, particularly the slogans â€Å"Peace, Bread, Land† and â€Å"All Power to the Soviets†, he was able to h arness the support of the Russian people. These slogans appealed to the majority, the peasants and the workers. The support of the people was an extremely important factor, as this is the support which determined that there would be little resistance to the Bolshevik revolution.This shows Lenin's importance in the occurrence of the October Revolution. Lenin's character as an individual was a vital reason to the success of the Bolsheviks. Prior to the February Revolution, the Bolshevik party was not the most powerful. Lenin was strong, determined and dedicated to the revolution. His speeches were inspiring. The â€Å"April Theses† forced through key policy decisions. Lenin rewrote Marx's ideas, he believed the Bourgeois revolution can be followed immediately by a socialist revolution. Which was different to the Bolshevik views but after he presented his ideas he won over the Bolsheviks.Lenin's leadership, and his usage and manipulation of events taking place in Russia after hi s return, facilitated their ability to seize control. The failure of the Provisional government was also a key reason why the Bolsheviks seized power in October 1917. In February, the constitutional monarchy reluctantly granted in 1905 by the Tsar collapsed following riots over food shortages and the continuing slaughter of Russian soldiers in the World War l. Tsar Nicholas II was forced to abdicate and a provisional government came into power I . existed to till the void ot ower in the chaos of rioting and the Bolsheviks did not accept any part in it. Disassociating himself and the party from the Provisional Government was to prove a wise decision by Lenin. Despite early acceptance of the Provisional Government by the people, it soon lost popularity in the face of Russia's continuing presence in the war and loss of life. They also became unpopular when took the peasants land This made Russia a fertile ground for Bolshevik revolutionary ideas. The Bolsheviks came to power at an espe cially volatile time in Russian history – the ProvisionalGovernment was weak-willed, disorganized, and ripe for Bolshevik insurrection. Kerenskys mistakes, as a leading member of the Provisional Government, were also a important reason in the Bolsheviks seizure of power. He served as Minister of War under Prince Lvov before becoming leader of the Provisional Government in July 1917. Kerensky, as a Menshevik, was a moderate socialist who saw a need to work with the Liberals in order to bring about change. He was a superb speaker but he struggled to remain in control of events during the summer of 1917: the June offensive.His attempt to revitalise the Russian army against Germany failed and the confusion caused by his role in the Kornilov Affair greatly undermined his position. General Lavr Kornilov replaced the commander-in-chief, Brusilov, after the failed June Offensive. A myth that was present in 1917 was that Kornilov planned a coup d' ©tat against the provisional govern ment. When Kornilov ordered troops into Petrograd, not on the bases of this myth but as he was concerned of a left-wing radical plot against the government, Kerensky panicked fearing a military takeover.Kerensky arrested Kornilov, who was innocent and loyal, and armed groups of workers, many Bolsheviks. This was a vital for the Bolsheviks, and their future success in seizing power, because they are now seen as defenders and their numbers increased. They were also still armed from the Kornilov affair. Kerensky and the Provisional government were now completely undermined. Trotsky and the timing of the uprising are also a key reason by the Bolsheviks were able to seize power in October 1917. The Bolsheviks claimed they were acting on behalf of the Soviet who were in oalition with the Provisional government.Although Kerensky was aware the Bolsheviks were planning some kind of takeover, he did not take any pivotal action. The takeover was organised and almost bloodless. The planning of the takeover was the responsibility of Trotsky, a leading Social democrat who had Joined the Bolsheviks in May. This was a plan of Lenin's, as he hoped it would hide the Bolshevik involvement. The planning was handed over to the military revolutionary committee of the Petrograd Soviet, who Trotsky was chairman. Trotsky was responsible for the akeover being carried out smoothly and efficiently.Trotsky played an important role in organising the Bolshevik seizure of power. In conclusion, toa large extent Lenin was crucial to the Bolshevik seizure of power in October 1917. Lenin was a brilliant leader – a professional revolutionary who was ruthless, a brilliant speaker, a good planner with ONE aim: to overthrow the government. The Bolsheviks were well-led. Lenin used both the war and the failure of the Provisional government to his advantage by saying how he would stop the war and take over from the ProvisionalGovernment who didn't seem to be listening to the people. His strong p ersonality and ty to communicate well witn the people gave the Bolsheviks many supporters in the revolution and so ultimately gave them the upper hand against the Provisional Government. Lenin changed the Marx theory, by skipping capitalism – Marxist Leninism, therefore Communism was now seen as conceivable. The Bolshevik party was the only party that opposed the Provisional government, as the provisional government was unpopular, the Bolsheviks once again gained a lot of support.

Sunday, January 5, 2020

Managing Stakeholder Interests And Relationships - 6999 Words

Managing stakeholder interests and relationships in mega construction projects: a network-based and behavioral economics approach Ka Yan Mok1; Geoffrey Qiping Shen2; Helen Xiaohui Bao3; Branko Koncarevic4; and Martin Skitmore5 1PhD Candidate, Dept. of Building and Real Estate, The Hong Kong Polytechnic Univ., Hong Kong (corresponding author). Email: margaret.mok@connect.polyu.hk 2Chair Professor, Dept. of Building and Real Estate, The Hong Kong Polytechnic Univ., Hong Kong. Email: bsqpshen@polyu.edu.hk 3Lecturer, Dept. of Land Economy, Univ. of Cambridge, Cambridge, United Kingdom. Email: hxb20@cam.ac.uk 4PhD Candidate, School of Civil Engineering and Built Environment, Queensland University of Technology, Australia. Email: b.koncarevic@qut.edu.au 5Professor, School of Civil Engineering and Built Environment, Queensland University of Technology, Australia. Email: rm.skitmore@qut.edu.au Abstract Significant research efforts have been devoted to stakeholder management issues in mega construction projects highlighting difficulties of current practice and weaknesses of traditional stakeholder analysis methods. A structured review of stakeholder management research would therefore provide useful insights in improving current stakeholder analysis methods for application in complex project environment. Through an extensive literature review, four key research areas are identified, namely â€Å"stakeholder identification†, â€Å"stakeholder concerns†, â€Å"stakeholder influences† andShow MoreRelatedControl Engagement Flow Diagram Of The Project Management Plan799 Words   |  4 Pagesprocess and phases of a project is enclosed. The plan addresses human resource requirements, the methods of how work will be performed in addition to the requirements and modus operandi for communicating among stakeholder (PMBOK, 2013). The documents used in the plan guides a ma nager â€Å"through managing and controlling project activities† (Dow et al., 2015, p. 113). The issue log, work performance data, and project documents are updated on a regular basis throughout the project cycle. Work performance dataRead MoreStakeholder Management : A Common View1738 Words   |  7 Pages4.4 Stakeholder management challenges Stakeholder management is not without challenges. Effective management of stakeholders faces a number of difficulties as identified by the participants to the study despite the standards and available frameworks for managing and engaging with stakeholders. In an ideal world, these standards would work perfectly without any flaws but the world is not ideal at least the project management world. A common view amongst interviewees when asked about stakeholder managementRead MoreThe Algeria East West Highway Essay1267 Words   |  6 PagesWorks). 5.2.2. The Case analysis - External stakeholders interests. Zidane et al. (2015) have evaluated an Algerian highway megaproject based on a holistic evaluation model consists of five measurements Efficiency, Effectiveness, Relevance, Impact and Sustainability. Each stakeholder played a major role in each of the five measures. Emphasizes the importance of managing both internal and external stakeholders. There were multiple external stakeholders in this mega project as follows: LandownersRead MoreProject Management : Enterprise Environment Factors980 Words   |  4 Pagestools and techniques to manage stakeholders is an undertaking that requires constant engagement at each stage of the project. Using expert judgement a project manager may engage senior stakeholders early in the project to secure support and remove any impediments from the project (PMBOK, 2013). Expert judgment is particularly important at the beginning of a project. Simply having the senior stakeholders at the kickoff meeting will tacitly display to other stakeholders and team members the significanceRead MoreStakeholder Conflicts Essay1073 Words   |  5 PagesStakeholder Conflicts in Organizations Chris Lindquist Grand Canyon University: ORG-807 June 25, 2013 Introduction This paper will discuss how non-profit and for-profit organizations manage the interests, opinions, and concerns of their stakeholders. Additionally, this paper will address the management differences that exist between for-profit and non-profit organizations. A set of research questions will be presented to research the effectiveness of the management techniques employedRead MoreCommunication And Collaboration ( Chinyio And Akintoye 2008 )1542 Words   |  7 Pagesabout stakeholder management and engagement. All participants indicated that communication is the best means of engaging with stakeholders and managing their expectations. The company uses different means of communication to different stakeholders. For example, with internal stakeholder’s emails, phone and face to face communication is often used. However participants highlighted that face to face communication and meetings seems to be preferred and results to positive effect in stakeholder engagementRead MoreImpac t Of The Construction Industry On The Uk Economy1582 Words   |  7 PagesToday stakeholder engagement/management is one of the most common challenges in the construction industry. There is now a growing need to further engage stakeholders into the decision making process. (herry pintardi chandra, 2012)This will help enhance the project performance and identify specific needs. Stakeholders are anyone who is effect by the change, any group or individual who claim ownership, rights or bear some of the risks associated with it. This can be an internal stakeholder such asRead MoreA Research Study On Network Density While Managing Networks And Getting Desired Results Of Your Own Interests775 Words   |  4 Pagesintroduced with scholars in the field of my interest. Conference and seminars are very useful means to build networks as many scholars share their contacts and research interests to each other. I pick those scholars from the conference brochures whose research interest matches with my own interests. I try to contact them after the conference and show my interest to collaborate with them in publishing. It is important to think about network density while managing networks and getting desired results ofRead MoreBusiness For Social Responsibility ( Bsr )1278 Words   |  6 PagesCase Study 1: Stakeholder Mapping Introduction Business for Social Responsibility (BSR) is an international nonprofit organization that aims to â€Å"work with business to create a just and sustainable world† (BSR, 2014). To achieve this mission, BSR promotes collaboration and strategic planning in order to catalyze behavioral change (BSR, 2014). With a mission to drive social and environmental innovation, stakeholder analysis is a core competency at BSR. This organization has developed a five-step modelRead MoreWhat is the Stakeholder Theory?1083 Words   |  5 PagesStakeholder can be defined as â€Å"any group or individual who can affect or is affected by the achievement of the organization’s objectives†. This theory focuses on wider aspect rather than only focusing on just the shareholder. Stakeholder theory is a fundamental theory about how business works at its best and how it could work. It is concerning on the value creation and trade on how to manage a business effectively. A consequences of focusing on organization or company’s stakeholder is that the shareholder