Rep. Walter B. Jones (R-NC) paid tribute to military intelligence officer Lt. Col. Anthony Shaffer in a statement entered into the Congressional Record yesterday. “Col. Shaffer’s storied career has been distinguished by his willingness and ability to work at the cutting edge of our nation’s intelligence community,” Rep. Jones said. Though it was not mentioned […]
Click on image to download document. . By Nickolas Roth, Hans M. Kristensen and Stephen Young Note: This is the second of four posts analyzing the FY 2012 Stockpile Stewardship Management Plan, each jointly produced by the Federation of American Scientists and Union of Concerned Scientists. See the other posts: 1, 3, 4. According to the […]
The growing use of social media — such as Twitter and Facebook — in responding to emergency situations is examined in a new report (pdf) from the Congressional Research Service. “In the last five years social media have played an increasing role in emergencies and disasters,” the report notes. “Social media sites rank as the […]
A newly updated doctrinal publication from the Joint Chiefs of Staff describes the infrastructure of legal review and support to all phases of military operations. “It is DoD policy that members of the DoD components comply with the law of war during all armed conflicts, however such conflicts are characterized, and in all other military […]
The legal and constitutional framework for military operations, intelligence collection and other national security activities is explored in depth in the new edition of “National Security Law,” the preeminent casebook on <the subject for law students. It presents concise treatments of dozens of topics — from secrecy to rendition and interrogation — with case studies […]
Click on image to download document. . By Nickolas Roth, Hans M. Kristensen and Stephen Young Note: This is the first of four posts analyzing the FY 2012 Stockpile Stewardship Management Plan, each jointly produced by the Federation of American Scientists and Union of Concerned Scientists. See the other posts here: 2, 3, 4. A […]
A draft resolution (pdf) prepared for the inter-parliamentary Council of Europe bluntly criticized the “cult of secrecy” in the United States and other nations and it praised the role of whistleblowers in helping to challenge the abuse of secrecy authority. “In some countries, in particular the United States, the notion of state secrecy is used […]
Stewart Nozette, a space scientist who was deeply involved in many of the nation’s most highly classified technology programs, pleaded guilty to attempted espionage for providing classified information to an undercover FBI agent posing as an Israeli intelligence officer. According to a “factual proffer” (pdf) presented by the government in court yesterday, “The defendant [Nozette] […]
The House Intelligence Committee issued its report on the FY2012 intelligence authorization act on September 2, and the bill is expected to go to the House floor on September 9. The White House issued a veto threat against the bill yesterday based on its opposition to two provisions: a requirement to produce State Department cables […]
Prosecutors in the case of former CIA officer Jeffrey Sterling, who is suspected of leaking classified information to author and New York Times reporter James Risen, last week renewed their request (pdf) for a subpoena to compel Risen to testify at Sterling’s upcoming trial. A July 29 court order, issued by Judge Leonie M. Brinkema, […]
The latest annual report on secrecy (pdf) from the pro-transparency coalition Openthegovernment.org finds some positive signs of increasing openness amidst a continuing expansion of secret government. “We are not as yet at the level of ‘unprecedented transparency’ the Obama Administration promises, but we are beginning to see signs that at least some of the Administration’s […]
Most people can vaguely recall that there was once no U.S. Department of Homeland Security and that there was a time when you didn’t have to take your shoes off before boarding an airplane or submit to other dubious security practices. But hardly anyone truly comprehends the enormous expansion of the military, intelligence and homeland […]