Donate for the Cryptome archive of files from June 1996 to the present

5 June 2015

DIA Releases Joint Military Spy College Papers


A sends:

The Defense Intelligence Agency recently released a listing of theses and dissertations produced by the students of the Joint Military Intelligence College during the years 2004-2010.
Below is a selection of some of those titles.
You can request a copy of any of the documents below by sending a request to the DIA at this address:
Defense Intelligence Agency
7400 Pentagon
Washington, DC 20301-7400
Or by FAX : 301-394-5356
Or by email at FOIA[at]
Venezuela: Reliable Supplier of Oil to the United States, July 31, 2008
Terrorist Group Genesis:  Role of Creation Myth, July 3, 2005
Foreign Laser Weapons: Questions MASINT Can Answer, June 29, 2010
Thorns Among the Roses:  The Frozen conflicts in Georgia, July 30, 2008
Insurgency in Iraq: A Failure to Warn, July 27, 2007
Postmodern Trojan Horse, Franchised Radicalization or Six Degrees of Separation?  Assessing Current Detainee Communication Trends at Guantanamo Bay and the Effect of Domestic Detainment on the Intelligence Community, July 6, 2010
India’s Search for Energy Supplies and Potential Impact on U.S. Interests, June 25, 2009
If it’s so Easy, Why Hasn’t the U.S. Been Attacked:  Al-Qaeda and Agroterror, July 20, 2009.
Data Mining: Approaches and Methods for Counterterrorism, July 7, 2005.
National Geospatial-Intelligence Agency Support to International Athletic Events:  A Case for Centralized control and Execution, September 30, 2009
Germany:  A Terrorist Haven or Headache?, August 7, 2005
Strategic Influence and Persuasion:  Semantic Infiltration and the Latest War of Ideas, August 19, 2008
The National Security Implications of Southeast Asian Human Trafficking, July 16, 2009
An Unwarned, Unexpected, and Unconventional Approach to Uncover Foreign Denial and Deception: Filling Gaps in National Coverage with Ad Hoc Constellations of Commercial and Foreign Space Platforms, July 17, 2006
Waypoints for a Sanctuary in Concert:  The Interactive Characteristics of the Global Terrorist Safe Haven, July 5, 2006
Controversial Interrogation Techniques:  Must Use Tradecraft or Counterproductive Methods?, June 26, 2009
Classified Information Leaks, February 4, 2007
Understanding Al Qaeda as a Global Revolution, July 21, 2009
Mitigating Cognitive Quagmires in Strategic Intelligence Analysis, July 11, 2006
Rearming the OPSEC Arsenal in the Cyber Age, July 30, 2008
Denial and Deception in Support of North Korea’s Integrated Air Defense System, July 4, 2007
Alternative Analysis: The Role of Red Teaming in the Intelligence Community, July 1, 2010
Why the United States Needs a Domestic Intelligence Service and How to Make it Work, July 13, 2010
Failed Nation-States and Terrorist Safe-Havens:  Assessing the Prospects of State Failure in Nigeria, March 3, 2005
Training the Enemy: Terrorist Exploitation of privately owned third-party paramilitary training courses in the United States, August 9, 2007
Iran’s Plan for Iraq, July 30, 2008
The Posse Comitatus Act and Disaster Relief:  Time to Loosen up on Military and Intelligence Restrictions, August 11, 2008
An Application of Technology Roadmapping to Forecasting Disruptive Technology in Electronic Warfare Development by the People’s Republic of china, June 26, 2009
Perspective on a Modern Monarchy – Outlasting the Oil in Bahrain, November 2, 2005
The Relevancy of Patent Secrecy Orders in the 21st Century, July 14, 2010.
Deconstructing Al-Qaeda in Iraq:  Using Contemporary Analytical Models to Examine the Failure of Al-Qaeda in Iraq’s Al-Anbar Province, July 29, 2008
Immunizing America from Economic Espionage:  A Team Effort Between the United States Government and the Private Sector, July 9, 2007
Ayatollahs and Atoms: A Nuclear Iran in Context, July 16, 2009
Blackbird Reborn: A Cautionary Tale of Missed Opportunity, December 4, 2006
Chinese Commercial Vessels and their Threat to the port of Beaumont, Texas, Jun3 27, 2007
Targeted Killing and Assassination:  Effective Tools in the War on Terror, July 29, 2008
The U.S. Effort in Neutralizing the Financing of Terrorism, July 30, 2008
The State of the FBI-CIA Partnership in the Global War on Terrorism, July 6, 2007
Iraq’s Biological Warfare Program:  Truth or Mirage in the Desert?, September 19, 2005
Use of Private Security Companies by Diplomatic Security in Support of Operation Iraqi Freedom: Lessons Learned, July 12, 2006
Pipe Drams: proposed Gas Pipeline Projects and Their Effect on Eurasian Pipeline Politics, June 26, 2009
Non-Lethal Weapons: Weapons of Mass Disruption, June 24, 2004
Ex-officio:  The Intelligence Community’s Role in the CFIUS Process, July 28, 2009
Suspicious Neighbors: Saudi Arabia’s Future Iraq Policy, June 30, 2009
Spies on the Silver Screen:  How Hollywood has Influenced the Public’s Perception of the National Security Agency, July 12, 2005
Challenges and Opportunities that Await DEA as it Considers Membership in the Intelligence Community, December 16, 2004
Sympathetic Ears: the Proliferation of Radical Islam in Kyrgyzstan, Tajikistan and Uzbekistan, July 12, 2007
Prediction Markets: A Revolution in Analytical Affairs?, July 29, 2008
Where the Wild Things Are:  A Spatial Meta-analysis of the National Defense Intelligence College’s Production of Knowledge, July 1, 2010
Security Threat of Bank Collapse in China, July 21, 2004
Gender Bomb:  Is China’s Gender Imbalance a Threat to its Stability, June 23, 2010
Mother Nature’s Silent War:  United States National Security Implications of Climate Change in Hawaii, July 1, 2010
Investigating the War on Terror:  Intelligence Community Support to Criminal Investigations of Terrorists in DoD Custody, July 17, 2009
Cyber Intelligence Preparation of the Battlespace:  the Key to Overwhelming Information Dominance in the Cyber Domain of War, July 7, 2004
Is Mexico a Failing State?  The Influence of Drug Trafficking Organizations on Mexican Political Stability, June 25, 2009
Sino Nano:  The Export of Micro Technologies to China, June 30, 2005
Mass Media Effects on National Defense Policymakers, July 7, 2006
Forensic Entomology and Intelligence: Entomology/Explosive E2 Project and its Utilization to Help Solve Heinous Crimes Against Humanity, July 12, 2004
Domestic Extremist Groups Targeting the U.S. Military, September 8, 2005
The Nexus of Crime and Terrorism:  An Analysis of Islamic Extremist Organizatio in the American Prison System, July 14, 2006
The Eyes of Katrina: A Case Study of Incident Command System (ICS) Intelligence Support During Hurricane Katrina, July 31, 2009
Surveillance, Information Sharing and the Great Influenza of 1918:  Identifying and Applying Lessons from the Worst Pandemic in American History, June 28, 2006
The UAV Threat to the United States, July 8, 2007
Be Careful What you Eat:  The Threat of Agroterrorism and Combating it through Increased Collaboration within the United States Intelligence Community, July 15, 2010
Wall of Ignorance: Media Manipulation by Islamic Terrorists, July 16, 2007
The State of Vulnerability Regarding U.S. Railroads and Mobilization, July 2, 2006
Jihadist Threats in Cyberspace:  Is the US CI Community Postured to Detect, Neutralize and Exploit the Threat, June 28, 2010
Transforming Domestic Counterterrorism Intelligence after 9/11, August 8, 2005
Impact that U.S. Laws and Policies Governing Intelligence Activities within the U.S. or against U.S. Persons Have on Signals Intelligence Collection, March 1, 2005
Was the Rwandan Genocide, in Part, the Result of Intelligence Failure, June 28, 2010
The Great Chip Heist: An Analysis of Foreign Microelectronic Reverse Engineering Capabilities, July 6, 2010
Women at DIA:  A Data-Driven Snapshot, July 28, 2006
Sudan and Iran: Expansion of the Islamic Caliphate, July 1, 2010
North Korean Negotiation Behavior, July 13, 2004
Medical Warning and the Surveillance of Pandemic Influenza:  Does the United States Government have an Integrated and Comprehensive Surveillance Plan?, July 8, 2010
The Analyst Guide to the Social Science Universe:  Using Social Science Methodology to Analyze, Explain and Forecast Phenomena, July 29, 2009
Over the Horizon: Preparing the Intelligence Community for the Next Generation of Self-Propelled Semi-Submersible Narcotics Smuggling Vessel, July 28, 2009
Hollywood Soldier: Intelligence Support for SOFTWAR Operations, July 1, 2010
Effects of Micro Aerial Vehicles on Intelligence Community Processes, August 5, 2004
Erysichthon Factor: Policy Implications of US Counter Measures to North Korea’s Criminal Enterprise, August 15, 2008
Intelligence Support to Counter Terrorist-Linked U.S. Contraband Cigarette Trafficking, July 1, 2010
Nanotechnology use for Biological Weapons, July 11, 2007
China’s Tranformational Strategy for North Korea, July 13, 2007
A Solution for the Failure of Imagination:  The Applicability and Utilization of Complexity Theory and the Complex Adaptive System Framework to Combat Terrorism, July 29, 2006.
Ending the North Korean Threat, April 28, 2009
Bungle in the Jungle: The Use and Abuse of U.S. Counterterrorism Intelligence in the Philippines, June 15, 2004
Cognitive Warfare, July 29, 2008
To Catch a Terrorist: The Application of Structured Analytic Methodologies to the Counter-Terrorism Problem, July 11, 2007
Collecting and Analyzing Geographic Place-Name Intelligence in a Collaborative Wiki-Environment – This is not your Grandfather’s Gazetteer, February 25, 2008
French Intelligence Operations in Post-Revolutionary America:  the Genet Intrigues Against Louisiana and Florida, 1793-1794, July 1, 2007
Measurement and Signatures Intelligence (MASINT) Technologies – Enhancing Law Enforcement, June 25, 2007
The Department of State and Department of Defense Counter-Terrorism Rewards Programs: A Comparative Analysis, August 12, 2008
Indicators and Warnings of State Sponsored Biological Antimaterial Weapons Proliferation, July 1, 2010
Intelligence and Anthropology:  The Cultural Knowledge Gap, July 31, 2008
Japanese Measures to Counter North Korean Illicit Activities in Japan, January 5, 2007
Iran’s Emerging Nuclear Doctrine:  A Persian New Look?, July 15, 2007
Outsourcing War: An Analysis of Proxy Warfare, July 29, 2008
Corruption in the Philippine Government;  A Force Multiplier for Terrorists, August 12, 2005
Improving GEOINT Efforts Against the Radiofrequency Weapon Intelligence Problem, August 12, 2008
Smoke Out: Integrated Intelligence to Combat Contraband Tobacco Smuggling Across the Akwesasne Mohawk Territory, July 10, 2009
The People’s Republic of China’s (PRC) Space Policy, Strategy and Intentions, June 29, 2009
Stony Beach: Past, Present and Future of the Sole U.S. Intelligence Program Dedicated to Resolving the Fate of POW/MIAs from the Vietnam War, July 28, 2009
The Scarcity of Resources:  India’s Missing Women, July 29, 2008
Video Exploitation and the YouTube Generation:  A Pandora’s Box of Oversight in a Free Media World, July 29, 2009
Standarized Training for Interpreters Supporting Polygraph Examinations:  The Time has Come, January 6, 2009
Chinese Anti-Satellites:  Intent, Capabilities, Advances, and Indications, June 24, 2010
Saudi Arabia’s War on Terror, July 7, 2006
Uncivil from the Start:  The Threat of Radical Islam to Indonesia, July 29, 2008
Sub-Saharan Africa: Impact of Laboratory Capabilities on Medical Intelligence Collection and Bioterrorism, July 7, 2010.
Indicators and Warnings of Foreign Military Innovation:  A Conceptual Framework for Analysis, June 21, 2010
Faster Intelligence Community Acquisitions:  Applying the Lessons of the CORONA Program, July 7, 2007
Improving OSINT: How Public Affairs and Intelligence Can Support Each Other, August 12, 2008
Patterns of Proliferation:  Open Source Indicators of Japanese Technology Proliferation to Iran, July 21, 2009
A New Terrorist Threat in the Philippines:  The Merging of the Abu Sayyaf Group and the Jemaah Islamiyah, July 6, 2007
Red Leaf Rising: Vulnerabilities to Canada’s Emerging Oil Sector, June 27, 2007
Back to Basics: Educating the General Public to Prevent Terrorist Attacks within the United States, August 11, 2006
National Security Division of the Department of Justice:  Assessment of Intelligence Community membership, July 29, 2008
Asad’s Legacy and the Future of Baathism in Syria, July 8, 2005
Dragons in the Newest Frontier:  China’s Use of Media Warfare to Manipulate and Control the International Information Environment, July 1, 2010
Attacking U.S. Economic Strength:  The Threat of Foreign Espionage, July 10, 2007
The Use of Non-Traditional Partners to Achieve Counterterrorism Objectives:  A Case for the U.S. Fire Service, June 29, 2010
Pandemic Influenza: Warning Against a Threat to National Security that Poses as a Menace to Public Health, May 5, 2009
Courting a Continent: China’s Influence in Africa and the Implications for the United States, July 1, 2010
Iran’s Pending Acquisition of Nuclear Arms, August 1, 2005
Practical Applications of Holistic Systems Analysis:  Al-Qaeda in the Islamic Lands of the Maghreb, July 31, 2008
The People’s Republic of China:  The Strategem Link to the Information Warfare Strategy, July 31, 2009
Contemporary Urban Environment: Developing Intelligence Techniques for the 21st Century, July 21, 2004
No Genius for War: German Military Intelligence and the United States in World War II, June 13, 2004
Gender and Terrorism: Motivations of Female Terrorists, June 27, 2005
China’s Cyber Nukes: The Modern Sino Strategic Deterrent, June 30, 2010
Semiconductor Industry in China:  Drivers and Risks Associated with China Interfering with the U.S. Semiconductor Supply Chain, June 24, 2010
National Security Implications Arising from the High Latitude Ice Melt, June 23, 2010
Role of Propaganda in Covert Action Campaigns:  Successes, Failures and Implications, July 29, 2009
American Right-Wing Extremism and WMD Terrorism:  How Significant a Threat, August 20, 2005
On Today’s Menu Foodborne Bioterrorism, July 1, 2010
Intelligence Community Integration of Non-Traditional Partners:  Intelligence Analysis in Non-Title 50 Agencies, June 24, 2010
Sopranos on the Volga: organized Crime and Corruption in Russia, July 11, 2007
Burma:  to Pursue a Nuclear Weapons Program?, July 10, 2009
USCG Intelligence and Influence Operations in Haiti, June 23, 2010
Is My Water Safe to Drink?  Bioterrorism’s Threat to Community Water Systems, July 13, 2005
A Retrospective Psychological Vulnerability Assessment of James Angleton:  Lessons for Counterintelligence Officers, July 30, 2009
Human Factors Analysis:  A Quantitative Study Measuring Associations Between Cognitive Traits of World Leaders, July 2, 2007
China’s Rising Power and Strategy in the Pacific Islands Region – PIR, July 31, 2008
Yellow Fruit Anatomy of an Intelligence Scandal, August 3, 2005
Rise of China within the International Financial Institutions, August 5, 2005
Freedom’s Paradox: Protecting National Security Information in a Right-to-Know Environment, July 12, 2005
The Transfer of U.S Commercial Dual-Use Space Related Technologies to the People’s Republic of China, July 16, 2007
In Over Our Heads Under Our Waters:  the Asymmetric Submersible and Semi-Submersible Threat to Homeland Security, August 12, 2008
Loch Ness Monster, the CNN Effect and other Mythical Creatures, July 7, 2004
Economic Espionage and the Technology Gap, July 7, 2006
Drugs and Bugs: Narco-Terrorists, Bioattacks and the Lesson’s of Anthrax, June 23, 2010
Syria and Weapons of Mass Destruction, August 13, 2008
Assessing the Technology Readiness Level of the Radio Frequency Bioweapons Threat Posed by Russia and China, July 1, 2009
To Be or Not to Be? Fusion Centers, Domestic Intelligence and Coordinating Intelligence Sharing to Counter Radicalization and Extremism Post 9/11, July 8, 2010
Federal Bureau of Investigation’s Counterintelligence Program:  Options for Change, June 25, 2004
The Counterintelligence Long Tail:  Why the Future of Counterintelligence is in Knowing a Little about a Lot, June 3, 2009
Loopholes of the Nuclear Nonproliferation Regime, July 29, 2005
Anomalous Human Cognition:  A Possible Role within the Crucible of Intelligence Collection, July 15, 2010
Anthrax: Indicators of Terrorist Use, August 9, 2005
Climate Change and United States National Security:  Northern China’s Water Crisis – A Case Study, July 1, 2009
No Need for Another MI-5:  Countering the Homegrown Terrorist Threat through a Regulated Domestic Intelligence Surveillance Act, July 29, 2009
The Office of the Inspector General fo the Office of the Director of National Intelligence, Gasping for A.I.R.E. or Alive and Thriving?,  July 9, 2007
Assessing the Effectiveness of the Department of State Surveillance Detection Program, July 29, 2009
Chasing Technological Autonomy, July 11, 2007
Apocalypse Not: An Examination of a Nuclear Iran, July 20, 2009
Global Reach: Renditions in U.S. Counterterrorism Operations, July 20, 2009
Finding Normal: Deriving Indications and Warning from Statistical Examination of DoD, July 22, 2004
Intelligence Support to the Life Science Community:  mitigating Threats Posed by Bioterrorism, July 7, 2004
China’s Computer Network Attack Capabilities, Sampling Experts’ Perspectives on Intelligence Collection Gaps, June 24, 2004
North Korean Prison System, July 24, 2004
Cultural Intelligence and International Marketing:  A Link Between Miller Lite and the Air Force Intelligence, Surveillance and Reconnaissance Process, April 29, 2005
Playing Nice and Saving the World:  The Security Implications of Global Climate Change for the United States and the European Union, July 31, 2008
The Race to the Stratosphere:  the Operational State of Worldwide High-Altitude Long Endurance Lighter-than-Air Systems for Communications and Surveillance by 2020, July 27, 2009
Rationing the IC: The Impact of Private American Citizens on the Intelligence Community, June 24, 2010
Intelligence Support to Strategic Communication:  The Strategic Communication Tactic of Paid Television Advertising and the Role of Intelligence, July 7, 2006
The Dragon’s Black Hats:  A Historical and Future Look at China’s Use of Non-State Cyber Actors, June 30, 2010
U.S. Proliferation of Nuclear Weapons, July 31, 2008
Unlawful Disclosure in the New Information Sharing Era, June 24, 2004
Political Dissent in Saudi Arabia:  Effects on the Stability of the Ruling Family, August 18, 2004
Social Engineering: Another Tool in the Fight Against Terrorism, June 8, 2004
From Russia With Love: The Intelligence Effects of Russia’s Demographic Crisis, July 8, 2010
Chinese information Operations Against the Tibetan Rights Movement, June 28, 2007
Outerspace Weigi – China’s Secret Weapon to Develop Its Counterspace Capabilities, August 15, 2008
Castro Goes to College:  Cuban Intelligence Targets American Academia, June 28, 2010
Compromising National Security in the Media:  How to Do a Better Job of Plugging the Leaks, July 31, 2008
Wildcats and Tigers: China’s Oil Acquisition Strategy and Potential Outcomes, July 7, 2006
The Role of the Intelligence Community Concerning the Emergence of Closed Circuit Surveillance within the United States, June 28, 2010
Covert Ops in the 1800s:  The Acquisition of East Florida from Spain and the Seminoles, June 28, 2007
Chinese Psychological Warfare:  the manned space program, July 30, 2007
Forthcoming Revolution in Saudi Arabia, July 6, 2004
Chasing Demons: The Potential for Nuclear Proliferation in Latin America, June 11, 2007
The Outsourcing of America’s Military Secrets, July 20, 2009
Conversations with Charlie:  Case Studies of U.S. Interrogators in Vietnam, July 16, 2007
In the Public Interest:  Preventing and Prosecuting Unauthorized Disclosures of Classified Information in the Media, June 28, 2010.
Radiological Devices: Measuring the Threat, July 13, 2007
Interrogation of Japanese POWs in WWII:  U.S. Response to a Formidable Challenge, July 7, 2007
Polygraph Theory and Practice:  Creating a False Sense of Security, July 14, 2014
Iranian Acquisition of Electromagnetic Pulse Technology:  National Security Implications for the United States, June 23, 2010
Improving Contemporary Interrogations:  What is the Impact of Gender, July 30, 2009
Lone Wolf Domestic Terrorism:  Identifying Predictive Behaviors, July 31, 2008
The Games They Play: Russian Strategic Political Deceptions, July 30, 2008
Swine-Origin Influenza:  Defining the Threat of H1N1 to National Security and the role of the Intelligence Community, July 6, 2010
Inside the Loop: Terrorist Insider Trading as an Attack Indicator, August 2, 2005