5 June 2015
DIA Releases Joint Military Spy College Papers
A sends:
JOINT MILITARY INTELLIGENCE COLLEGE:
SELECTED THESES AND DISSERTATIONS
The Defense Intelligence Agency recently released a listing of theses and
dissertations produced by the students of the Joint Military Intelligence
College during the years 2004-2010.
Below is a selection of some of those titles.
You can request a copy of any of the documents below by sending a request
to the DIA at this address:
Defense Intelligence Agency
ATTN: FAC2A1 (FOIA)
7400 Pentagon
Washington, DC 20301-7400
Or by FAX : 301-394-5356
Or by email at FOIA[at]dodiis.mil
===============
Venezuela: Reliable Supplier of Oil to the United States, July 31, 2008
Terrorist Group Genesis: Role of Creation Myth, July 3, 2005
Foreign Laser Weapons: Questions MASINT Can Answer, June 29, 2010
Thorns Among the Roses: The Frozen conflicts in Georgia, July 30,
2008
Insurgency in Iraq: A Failure to Warn, July 27, 2007
Postmodern Trojan Horse, Franchised Radicalization or Six Degrees of
Separation? Assessing Current Detainee Communication Trends at Guantanamo
Bay and the Effect of Domestic Detainment on the Intelligence Community,
July 6, 2010
Indias Search for Energy Supplies and Potential Impact on U.S. Interests,
June 25, 2009
If its so Easy, Why Hasnt the U.S. Been Attacked: Al-Qaeda
and Agroterror, July 20, 2009.
Data Mining: Approaches and Methods for Counterterrorism, July 7, 2005.
National Geospatial-Intelligence Agency Support to International Athletic
Events: A Case for Centralized control and Execution, September 30,
2009
Germany: A Terrorist Haven or Headache?, August 7, 2005
Strategic Influence and Persuasion: Semantic Infiltration and the Latest
War of Ideas, August 19, 2008
The National Security Implications of Southeast Asian Human Trafficking,
July 16, 2009
An Unwarned, Unexpected, and Unconventional Approach to Uncover Foreign Denial
and Deception: Filling Gaps in National Coverage with Ad Hoc Constellations
of Commercial and Foreign Space Platforms, July 17, 2006
Waypoints for a Sanctuary in Concert: The Interactive Characteristics
of the Global Terrorist Safe Haven, July 5, 2006
Controversial Interrogation Techniques: Must Use Tradecraft or
Counterproductive Methods?, June 26, 2009
Classified Information Leaks, February 4, 2007
Understanding Al Qaeda as a Global Revolution, July 21, 2009
Mitigating Cognitive Quagmires in Strategic Intelligence Analysis, July 11,
2006
Rearming the OPSEC Arsenal in the Cyber Age, July 30, 2008
Denial and Deception in Support of North Koreas Integrated Air Defense
System, July 4, 2007
Alternative Analysis: The Role of Red Teaming in the Intelligence Community,
July 1, 2010
Why the United States Needs a Domestic Intelligence Service and How to Make
it Work, July 13, 2010
Failed Nation-States and Terrorist Safe-Havens: Assessing the Prospects
of State Failure in Nigeria, March 3, 2005
Training the Enemy: Terrorist Exploitation of privately owned third-party
paramilitary training courses in the United States, August 9, 2007
Irans Plan for Iraq, July 30, 2008
The Posse Comitatus Act and Disaster Relief: Time to Loosen up on Military
and Intelligence Restrictions, August 11, 2008
An Application of Technology Roadmapping to Forecasting Disruptive Technology
in Electronic Warfare Development by the Peoples Republic of china,
June 26, 2009
Perspective on a Modern Monarchy Outlasting the Oil in Bahrain, November
2, 2005
The Relevancy of Patent Secrecy Orders in the 21st Century, July 14, 2010.
Deconstructing Al-Qaeda in Iraq: Using Contemporary Analytical Models
to Examine the Failure of Al-Qaeda in Iraqs Al-Anbar Province, July
29, 2008
Immunizing America from Economic Espionage: A Team Effort Between the
United States Government and the Private Sector, July 9, 2007
Ayatollahs and Atoms: A Nuclear Iran in Context, July 16, 2009
Blackbird Reborn: A Cautionary Tale of Missed Opportunity, December 4, 2006
Chinese Commercial Vessels and their Threat to the port of Beaumont, Texas,
Jun3 27, 2007
Targeted Killing and Assassination: Effective Tools in the War on Terror,
July 29, 2008
The U.S. Effort in Neutralizing the Financing of Terrorism, July 30, 2008
The State of the FBI-CIA Partnership in the Global War on Terrorism, July
6, 2007
Iraqs Biological Warfare Program: Truth or Mirage in the Desert?,
September 19, 2005
Use of Private Security Companies by Diplomatic Security in Support of Operation
Iraqi Freedom: Lessons Learned, July 12, 2006
Pipe Drams: proposed Gas Pipeline Projects and Their Effect on Eurasian Pipeline
Politics, June 26, 2009
Non-Lethal Weapons: Weapons of Mass Disruption, June 24, 2004
Ex-officio: The Intelligence Communitys Role in the CFIUS Process,
July 28, 2009
Suspicious Neighbors: Saudi Arabias Future Iraq Policy, June 30, 2009
Spies on the Silver Screen: How Hollywood has Influenced the Publics
Perception of the National Security Agency, July 12, 2005
Challenges and Opportunities that Await DEA as it Considers Membership in
the Intelligence Community, December 16, 2004
Sympathetic Ears: the Proliferation of Radical Islam in Kyrgyzstan, Tajikistan
and Uzbekistan, July 12, 2007
Prediction Markets: A Revolution in Analytical Affairs?, July 29, 2008
Where the Wild Things Are: A Spatial Meta-analysis of the National
Defense Intelligence Colleges Production of Knowledge, July 1, 2010
Security Threat of Bank Collapse in China, July 21, 2004
Gender Bomb: Is Chinas Gender Imbalance a Threat to its Stability,
June 23, 2010
Mother Natures Silent War: United States National Security
Implications of Climate Change in Hawaii, July 1, 2010
Investigating the War on Terror: Intelligence Community Support to
Criminal Investigations of Terrorists in DoD Custody, July 17, 2009
Cyber Intelligence Preparation of the Battlespace: the Key to Overwhelming
Information Dominance in the Cyber Domain of War, July 7, 2004
Is Mexico a Failing State? The Influence of Drug Trafficking Organizations
on Mexican Political Stability, June 25, 2009
Sino Nano: The Export of Micro Technologies to China, June 30, 2005
Mass Media Effects on National Defense Policymakers, July 7, 2006
Forensic Entomology and Intelligence: Entomology/Explosive E2 Project and
its Utilization to Help Solve Heinous Crimes Against Humanity, July 12,
2004
Domestic Extremist Groups Targeting the U.S. Military, September 8, 2005
The Nexus of Crime and Terrorism: An Analysis of Islamic Extremist
Organizatio in the American Prison System, July 14, 2006
The Eyes of Katrina: A Case Study of Incident Command System (ICS) Intelligence
Support During Hurricane Katrina, July 31, 2009
Surveillance, Information Sharing and the Great Influenza of 1918:
Identifying and Applying Lessons from the Worst Pandemic in American History,
June 28, 2006
The UAV Threat to the United States, July 8, 2007
Be Careful What you Eat: The Threat of Agroterrorism and Combating
it through Increased Collaboration within the United States Intelligence
Community, July 15, 2010
Wall of Ignorance: Media Manipulation by Islamic Terrorists, July 16, 2007
The State of Vulnerability Regarding U.S. Railroads and Mobilization, July
2, 2006
Jihadist Threats in Cyberspace: Is the US CI Community Postured to
Detect, Neutralize and Exploit the Threat, June 28, 2010
Transforming Domestic Counterterrorism Intelligence after 9/11, August 8,
2005
Impact that U.S. Laws and Policies Governing Intelligence Activities within
the U.S. or against U.S. Persons Have on Signals Intelligence Collection,
March 1, 2005
Was the Rwandan Genocide, in Part, the Result of Intelligence Failure, June
28, 2010
The Great Chip Heist: An Analysis of Foreign Microelectronic Reverse Engineering
Capabilities, July 6, 2010
Women at DIA: A Data-Driven Snapshot, July 28, 2006
Sudan and Iran: Expansion of the Islamic Caliphate, July 1, 2010
North Korean Negotiation Behavior, July 13, 2004
Medical Warning and the Surveillance of Pandemic Influenza: Does the
United States Government have an Integrated and Comprehensive Surveillance
Plan?, July 8, 2010
The Analyst Guide to the Social Science Universe: Using Social Science
Methodology to Analyze, Explain and Forecast Phenomena, July 29, 2009
Over the Horizon: Preparing the Intelligence Community for the Next Generation
of Self-Propelled Semi-Submersible Narcotics Smuggling Vessel, July 28,
2009
Hollywood Soldier: Intelligence Support for SOFTWAR Operations, July 1,
2010
Effects of Micro Aerial Vehicles on Intelligence Community Processes, August
5, 2004
Erysichthon Factor: Policy Implications of US Counter Measures to North
Koreas Criminal Enterprise, August 15, 2008
Intelligence Support to Counter Terrorist-Linked U.S. Contraband Cigarette
Trafficking, July 1, 2010
Nanotechnology use for Biological Weapons, July 11, 2007
Chinas Tranformational Strategy for North Korea, July 13, 2007
A Solution for the Failure of Imagination: The Applicability and
Utilization of Complexity Theory and the Complex Adaptive System Framework
to Combat Terrorism, July 29, 2006.
Ending the North Korean Threat, April 28, 2009
Bungle in the Jungle: The Use and Abuse of U.S. Counterterrorism Intelligence
in the Philippines, June 15, 2004
Cognitive Warfare, July 29, 2008
To Catch a Terrorist: The Application of Structured Analytic Methodologies
to the Counter-Terrorism Problem, July 11, 2007
Collecting and Analyzing Geographic Place-Name Intelligence in a Collaborative
Wiki-Environment This is not your Grandfathers Gazetteer, February
25, 2008
French Intelligence Operations in Post-Revolutionary America: the Genet
Intrigues Against Louisiana and Florida, 1793-1794, July 1, 2007
Measurement and Signatures Intelligence (MASINT) Technologies Enhancing
Law Enforcement, June 25, 2007
The Department of State and Department of Defense Counter-Terrorism Rewards
Programs: A Comparative Analysis, August 12, 2008
Indicators and Warnings of State Sponsored Biological Antimaterial Weapons
Proliferation, July 1, 2010
Intelligence and Anthropology: The Cultural Knowledge Gap, July 31,
2008
Japanese Measures to Counter North Korean Illicit Activities in Japan, January
5, 2007
Irans Emerging Nuclear Doctrine: A Persian New Look?, July 15,
2007
Outsourcing War: An Analysis of Proxy Warfare, July 29, 2008
Corruption in the Philippine Government; A Force Multiplier for Terrorists,
August 12, 2005
Improving GEOINT Efforts Against the Radiofrequency Weapon Intelligence Problem,
August 12, 2008
Smoke Out: Integrated Intelligence to Combat Contraband Tobacco Smuggling
Across the Akwesasne Mohawk Territory, July 10, 2009
The Peoples Republic of Chinas (PRC) Space Policy, Strategy and
Intentions, June 29, 2009
Stony Beach: Past, Present and Future of the Sole U.S. Intelligence Program
Dedicated to Resolving the Fate of POW/MIAs from the Vietnam War, July 28,
2009
The Scarcity of Resources: Indias Missing Women, July 29, 2008
Video Exploitation and the YouTube Generation: A Pandoras Box
of Oversight in a Free Media World, July 29, 2009
Standarized Training for Interpreters Supporting Polygraph Examinations:
The Time has Come, January 6, 2009
Chinese Anti-Satellites: Intent, Capabilities, Advances, and Indications,
June 24, 2010
Saudi Arabias War on Terror, July 7, 2006
Uncivil from the Start: The Threat of Radical Islam to Indonesia, July
29, 2008
Sub-Saharan Africa: Impact of Laboratory Capabilities on Medical Intelligence
Collection and Bioterrorism, July 7, 2010.
Indicators and Warnings of Foreign Military Innovation: A Conceptual
Framework for Analysis, June 21, 2010
Faster Intelligence Community Acquisitions: Applying the Lessons of
the CORONA Program, July 7, 2007
Improving OSINT: How Public Affairs and Intelligence Can Support Each Other,
August 12, 2008
Patterns of Proliferation: Open Source Indicators of Japanese Technology
Proliferation to Iran, July 21, 2009
A New Terrorist Threat in the Philippines: The Merging of the Abu Sayyaf
Group and the Jemaah Islamiyah, July 6, 2007
Red Leaf Rising: Vulnerabilities to Canadas Emerging Oil Sector, June
27, 2007
Back to Basics: Educating the General Public to Prevent Terrorist Attacks
within the United States, August 11, 2006
National Security Division of the Department of Justice: Assessment
of Intelligence Community membership, July 29, 2008
Asads Legacy and the Future of Baathism in Syria, July 8, 2005
Dragons in the Newest Frontier: Chinas Use of Media Warfare to
Manipulate and Control the International Information Environment, July 1,
2010
Attacking U.S. Economic Strength: The Threat of Foreign Espionage,
July 10, 2007
The Use of Non-Traditional Partners to Achieve Counterterrorism
Objectives: A Case for the U.S. Fire Service, June 29, 2010
Pandemic Influenza: Warning Against a Threat to National Security that Poses
as a Menace to Public Health, May 5, 2009
Courting a Continent: Chinas Influence in Africa and the Implications
for the United States, July 1, 2010
Irans Pending Acquisition of Nuclear Arms, August 1, 2005
Practical Applications of Holistic Systems Analysis: Al-Qaeda in the
Islamic Lands of the Maghreb, July 31, 2008
The Peoples Republic of China: The Strategem Link to the Information
Warfare Strategy, July 31, 2009
Contemporary Urban Environment: Developing Intelligence Techniques for the
21st Century, July 21, 2004
No Genius for War: German Military Intelligence and the United States in
World War II, June 13, 2004
Gender and Terrorism: Motivations of Female Terrorists, June 27, 2005
Chinas Cyber Nukes: The Modern Sino Strategic Deterrent, June 30,
2010
Semiconductor Industry in China: Drivers and Risks Associated with
China Interfering with the U.S. Semiconductor Supply Chain, June 24, 2010
National Security Implications Arising from the High Latitude Ice Melt, June
23, 2010
Role of Propaganda in Covert Action Campaigns: Successes, Failures
and Implications, July 29, 2009
American Right-Wing Extremism and WMD Terrorism: How Significant a
Threat, August 20, 2005
On Todays Menu Foodborne Bioterrorism, July 1, 2010
Intelligence Community Integration of Non-Traditional Partners:
Intelligence Analysis in Non-Title 50 Agencies, June 24, 2010
Sopranos on the Volga: organized Crime and Corruption in Russia, July 11,
2007
Burma: to Pursue a Nuclear Weapons Program?, July 10, 2009
USCG Intelligence and Influence Operations in Haiti, June 23, 2010
Is My Water Safe to Drink? Bioterrorisms Threat to Community
Water Systems, July 13, 2005
A Retrospective Psychological Vulnerability Assessment of James Angleton:
Lessons for Counterintelligence Officers, July 30, 2009
Human Factors Analysis: A Quantitative Study Measuring Associations
Between Cognitive Traits of World Leaders, July 2, 2007
Chinas Rising Power and Strategy in the Pacific Islands Region
PIR, July 31, 2008
Yellow Fruit Anatomy of an Intelligence Scandal, August 3, 2005
Rise of China within the International Financial Institutions, August 5,
2005
Freedoms Paradox: Protecting National Security Information in a
Right-to-Know Environment, July 12, 2005
The Transfer of U.S Commercial Dual-Use Space Related Technologies to the
Peoples Republic of China, July 16, 2007
In Over Our Heads Under Our Waters: the Asymmetric Submersible and
Semi-Submersible Threat to Homeland Security, August 12, 2008
Loch Ness Monster, the CNN Effect and other Mythical Creatures, July 7,
2004
Economic Espionage and the Technology Gap, July 7, 2006
Drugs and Bugs: Narco-Terrorists, Bioattacks and the Lessons of Anthrax,
June 23, 2010
Syria and Weapons of Mass Destruction, August 13, 2008
Assessing the Technology Readiness Level of the Radio Frequency Bioweapons
Threat Posed by Russia and China, July 1, 2009
To Be or Not to Be? Fusion Centers, Domestic Intelligence and Coordinating
Intelligence Sharing to Counter Radicalization and Extremism Post 9/11, July
8, 2010
Federal Bureau of Investigations Counterintelligence Program:
Options for Change, June 25, 2004
The Counterintelligence Long Tail: Why the Future of Counterintelligence
is in Knowing a Little about a Lot, June 3, 2009
Loopholes of the Nuclear Nonproliferation Regime, July 29, 2005
Anomalous Human Cognition: A Possible Role within the Crucible of
Intelligence Collection, July 15, 2010
Anthrax: Indicators of Terrorist Use, August 9, 2005
Climate Change and United States National Security: Northern Chinas
Water Crisis A Case Study, July 1, 2009
No Need for Another MI-5: Countering the Homegrown Terrorist Threat
through a Regulated Domestic Intelligence Surveillance Act, July 29, 2009
The Office of the Inspector General fo the Office of the Director of National
Intelligence, Gasping for A.I.R.E. or Alive and Thriving?, July 9,
2007
Assessing the Effectiveness of the Department of State Surveillance Detection
Program, July 29, 2009
Chasing Technological Autonomy, July 11, 2007
Apocalypse Not: An Examination of a Nuclear Iran, July 20, 2009
Global Reach: Renditions in U.S. Counterterrorism Operations, July 20, 2009
Finding Normal: Deriving Indications and Warning from Statistical Examination
of DoD, July 22, 2004
Intelligence Support to the Life Science Community: mitigating Threats
Posed by Bioterrorism, July 7, 2004
Chinas Computer Network Attack Capabilities, Sampling Experts
Perspectives on Intelligence Collection Gaps, June 24, 2004
North Korean Prison System, July 24, 2004
Cultural Intelligence and International Marketing: A Link Between Miller
Lite and the Air Force Intelligence, Surveillance and Reconnaissance Process,
April 29, 2005
Playing Nice and Saving the World: The Security Implications of Global
Climate Change for the United States and the European Union, July 31, 2008
The Race to the Stratosphere: the Operational State of Worldwide
High-Altitude Long Endurance Lighter-than-Air Systems for Communications
and Surveillance by 2020, July 27, 2009
Rationing the IC: The Impact of Private American Citizens on the Intelligence
Community, June 24, 2010
Intelligence Support to Strategic Communication: The Strategic
Communication Tactic of Paid Television Advertising and the Role of Intelligence,
July 7, 2006
The Dragons Black Hats: A Historical and Future Look at Chinas
Use of Non-State Cyber Actors, June 30, 2010
U.S. Proliferation of Nuclear Weapons, July 31, 2008
Unlawful Disclosure in the New Information Sharing Era, June 24, 2004
Political Dissent in Saudi Arabia: Effects on the Stability of the
Ruling Family, August 18, 2004
Social Engineering: Another Tool in the Fight Against Terrorism, June 8,
2004
From Russia With Love: The Intelligence Effects of Russias Demographic
Crisis, July 8, 2010
Chinese information Operations Against the Tibetan Rights Movement, June
28, 2007
Outerspace Weigi Chinas Secret Weapon to Develop Its Counterspace
Capabilities, August 15, 2008
Castro Goes to College: Cuban Intelligence Targets American Academia,
June 28, 2010
Compromising National Security in the Media: How to Do a Better Job
of Plugging the Leaks, July 31, 2008
Wildcats and Tigers: Chinas Oil Acquisition Strategy and Potential
Outcomes, July 7, 2006
The Role of the Intelligence Community Concerning the Emergence of Closed
Circuit Surveillance within the United States, June 28, 2010
Covert Ops in the 1800s: The Acquisition of East Florida from Spain
and the Seminoles, June 28, 2007
Chinese Psychological Warfare: the manned space program, July 30,
2007
Forthcoming Revolution in Saudi Arabia, July 6, 2004
Chasing Demons: The Potential for Nuclear Proliferation in Latin America,
June 11, 2007
The Outsourcing of Americas Military Secrets, July 20, 2009
Conversations with Charlie: Case Studies of U.S. Interrogators in Vietnam,
July 16, 2007
In the Public Interest: Preventing and Prosecuting Unauthorized Disclosures
of Classified Information in the Media, June 28, 2010.
Radiological Devices: Measuring the Threat, July 13, 2007
Interrogation of Japanese POWs in WWII: U.S. Response to a Formidable
Challenge, July 7, 2007
Polygraph Theory and Practice: Creating a False Sense of Security,
July 14, 2014
Iranian Acquisition of Electromagnetic Pulse Technology: National Security
Implications for the United States, June 23, 2010
Improving Contemporary Interrogations: What is the Impact of Gender,
July 30, 2009
Lone Wolf Domestic Terrorism: Identifying Predictive Behaviors, July
31, 2008
The Games They Play: Russian Strategic Political Deceptions, July 30, 2008
Swine-Origin Influenza: Defining the Threat of H1N1 to National Security
and the role of the Intelligence Community, July 6, 2010
Inside the Loop: Terrorist Insider Trading as an Attack Indicator, August
2, 2005
|