T2 B26 National Defense U 1 of 2 Fdr- EC Readings 5741- Covert Action- 2002-2003 Fall- Table of Contents 114

Embed Size (px)

Citation preview

  • 8/14/2019 T2 B26 National Defense U 1 of 2 Fdr- EC Readings 5741- Covert Action- 2002-2003 Fall- Table of Contents 114

    1/9

    ELECTIVECOURSE READINGS 5741COVERT ACTION: A

    CONTROVERSIAL INSTRUMENT OFSTATECRAFT

    ACADEMICYEAR2002-2003 (FALL)

    NATIONAL DEFENSE UNIVERSITYNATIONAL WARCOLLEGE

    ft. Lesley J.McNair, Washington, DC 20319-5066

  • 8/14/2019 T2 B26 National Defense U 1 of 2 Fdr- EC Readings 5741- Covert Action- 2002-2003 Fall- Table of Contents 114

    2/9

    TABLE OF CONTENTSELECTIVE COURSE 5741 READINGSCOVERT ACTION: A CONTROVERSIAL

    INSTRUMENT OF STATECRAFTACADEMIC YEAR 2002-2003

    ALL MATERIAL HAS BEEN APPROVED FOR PERMISSION TO REPRINT

    TOPIC 1,R-aFrom Dirty Tricks or Trump Cards: U.S. Covert Action and Counterintelligence by Roy Godson,pp. i-xxxvii, (published byTransactions, Inc., in Armed Forces and Society. (1999), (internetedition, pp. 1-15); pp.1-9; 18-26; and 27-65. Copyright 1995 by Brassey's, Inc., Washington,DC. Rights reverted to National Strategy Information Center, Washington, DC., in 1995.Reproduced with permission from National Strategy Information Center for use in the courses ofthe National Defense University.

    TOPIC 2, R-bFrom Dirty Tricks or Trump Cards: U.S. Covert Action and Counterintelligence by Roy Godson,pp. 120-183. Copyright 1995 by Brassey's, Inc., Washington, DC. Rights reverted to NationalStrategy Information Center, Washington, DC., in 1995. Reproduced with permission fromNational Strategy Information Center for use in the courses of the National Defense University.TOPIC 2, R-cFrom From the Shadows,The Ultimate Insider's Story of Five Presidents and HowThey Won theCold War. (1996), byRobert M. Gates, pp. 242-257; 357-359. Copyright 1996 by Robert M.Gates. Published (1996) by Simon & Schuster, Inc., New York, NY. All Rights Reserved.Reproduced with permission from the publisher for use in the courses of the National DefenseUniversity.TOPIC 2, R-dFrom The New York Times, (16 April, 2000), Secrets of History-The CIA in Iran: "How a PlotConvulsed Iran in '53 (And in79)," byJames Risen; (internet edition), pp. 1-9. Copyright 2000by The New York Times Company, New York, NY. Reproduced with permission from thepublisher via the Copyright Clearance Center, Inc., Danvers, MA., for use in the courses of theNational Defense University.TOPIC 3, R-aFrom Regulating Covert Action: Practices, Contexts and Policiesof Covert Coercion Abroad inInternational and American Law r (1992), by W. Michael Reisman and James E. Baker, "UnitedStates Internal Procedures," pp. 116-135. Copyright 1992 by the Yale University Press, NewHaven, CT. All Rights Reserved. Reproduced with permission from the publisher for use in thecourses of the National Defense University.TOPIC 3, R-bFrom Studies in Intelligence. No. 1, (1997), "Covert Action, Loss of Life, and the Prohibition onAssassination," by Jonathan M. Fredman, pp. 15-25; (internet edition), pp. 1-12. Published(1997) by the Center for the Study of Intelligence, a division of the Central Intelligence Agency,McLean, VA. Reproduced for use in the courses of the National Defense University.

  • 8/14/2019 T2 B26 National Defense U 1 of 2 Fdr- EC Readings 5741- Covert Action- 2002-2003 Fall- Table of Contents 114

    3/9

    TOPIC 3,R-cFrom The NewYork Times, (12 October, 1997), Section IV, "Israel and the Arabs: The HarshLogic of Assassination," by Serge Schemann, p. 4; (internet edition), pp. 1-3. Copyright 1997by The New York Times Company, New York, NY . Reproduced with permission from thepublisher via the Copyright Clearance Center, Inc., Danvers, MA., for use in the courses of theNational DefenseUniversity.TOPIC 3, R-dFrom U.S. News and World Report, (20 October, 1997), "Payback Time for a BotchedAssassination: In Israel, A Debate Over Covert Operations," by David Makovsky, pp. 40-43;(internet edition), pp. 1-3. Copyright 1997 by U.S. News& World Report, L.P., NewYork,NY.Reproduced with permission from the publisher for use in the courses of the National DefenseUniversity.TOPIC 3, R-eFrom British Broadcasting Company News fBBC>. (1 August, 2001), "Israel's AssassinationPolicy," byTarik Kafala, staff writer, World News, Middle East; (internet edition), pp. 1-2.Published (2001) by the British Broadcasting Company News, Ltd., London, England.Reproduced with permission from the author and the publisher for use in the coursesof theNational Defense University.TOPIC 3, R-fFrom The Washington Times, (3 March, 1998), Security Council Endorses Annan'sBaghdad Pact:Killing Saddam Not Justifiable, Woolsey Advises," by Ben Barber, p. A17. Copyright 1998 byNews World Communications, Inc., Washington, DC. Reproduced with permission of TheWashington Times for use in the courses of the National Defense University.TOPIC 3,R-hFrom The New YorkTimes, LATE Edition, East Coast, (19 August, 2001), "Making Rules in theWorld Between War and Peace," by Tim Weiner; (internet edition), pp. 1-3. Copyright 2001 byThe New YorkTimes Company, New York, NY. Reproduced with permission from the publishervia the Copyright Clearance Center, Inc., Danvers, MA., for use in the coursesof the NationalDefense University.TOPIC 3, R-iFrom Reuter?, (19 September, 2001), "Changing U.S. Assassination Policy Called Useless," byTabassum Zakaria; (internet edition), 3 pages. Copyright 2001 by Reuters and ReutersServices, Lancaster, PA. Please visit: www.reuters.com. Reproduced with permission fromReuters Reprint Management Services for use in the courses of the National Defense University.TOPIC 3, R-jFrom The Washington Post. FINAL Edition, (28 October, 2001), "CIA Weighs Targeted Killing'Missions; Administration Believes Restraints Do Not Bar Singling Out Individual Terrorists," byBarton Gellman; (internet edition), pp. 1-4, Copyright 2001 by The Washington Post forWriters' Group, Inc., Washington, DC. Reproduced with permission from the publisher for use inthe courses of the National Defense University.TOPIC 4, R-aPresidential Decision Directive, (PDD), No. 2, (20 January, 1993), "Organization of NationalSecurity Council," by William J. Clinton, 3 pages. Published (1993) by the Office of the President,Washington, DC. Reproduced for use in the courses of the National Defense University.

  • 8/14/2019 T2 B26 National Defense U 1 of 2 Fdr- EC Readings 5741- Covert Action- 2002-2003 Fall- Table of Contents 114

    4/9

    TOPIC 4, R-bFrom From the Shadows.The Ultimate Insider's Story of Five Presidents and HowThey Won theCold War. (1996), by Robert M. Gates, pp. 89-96; 142-153; and pp. 450-451. Copyright 1996by Robert M. Gates. All Rights Reserved. Published (1996) by Simon & Schuster, Inc., NewYork, NY. Reproduced with permissionfrom the publisher for use in the courses of the NationalDefense University.TOPIC 4, R-cFrom Intelligence: From Secrets to Policy, (2000), by Mark Lowenthal, "The Intelligence Process -Covert Action," pp. 106-119. Copyright 2000 by Congressional Quarterly Press, Washington,DC. All Rights Reserved. Reproduced with permission from Congressional Quarterly, Inc., foruse in the courses of the National Defense University.TOPIC 5,R-aFrom Secret and Sanctioned, Covert Operations and the American Presidency, (1996) by StephenF. Knott, pp. 139-159. Copyright 1996 by Ballantyne Books, a division of Random House, Inc.,New York, NY. Reproduced with permission from the publisher via the Copyright ClearanceCenter, Inc., Danvers, MA., for use in the courses of the National Defense University.TOPIC 5, R-bFrom Studies in Intelligence, (Spring 1981), "Harry S. Truman on CIA Covert Operations," byHayden B. Peake, pp. 31-41. Published(1981) by the Center for the Study of Intelligence,adivision of the Central Intelligence Agency, McLean, VA. Reproduced for use in the courses ofthe National Defense University.TOPIC 5, R-cFrom For the President's Eyes Only: Secret Intelligence and the AmericanPresidency fromWashington to Bush by Christopher Andrew, "Dwight D. Eisenhower, 1953-1961," pp. 199-212;pp. 250-256; "John F. Kennedy," pp. 257-276; "Jimmy Carter," pp. 425-431; 447-456; "RonaldReagan," pp. 457-502; "George Bush," pp. 511-536. Copyright 1995 byHarperCollinsPublishers, Inc., New York, NY. Reproduced with permission from the publisher via the CopyrightClearance Center, Inc., Danvers, MA., for use in the courses of the National Defense University.TOPIC 6, R-aFrom Secret and Sanctioned, Covert Operations and the American Presidency, (1996), byStephen F. Knott, "The Distorted Legacy: The Rise of Congressional Control of ClandestineOperations," pp. 160-187. Copyright 1996 by Ballantyne Books, a division of Random House,Inc., New York, NY. Reproduced with permission from the publisher via the Copyright ClearanceCenter, Inc., Danvers, MA., for use in the courses of the National Defense University.TOPIC 6, R-bFrom Secret Agencies: U.S. Intelligence in a Hostile World. (1996), "Intelligence Accountability,"by Loch K. Johnson, pp. 89-118. Copyright 1996 by Loch K. Johnson. Published (1996) byYale University Press, New Haven, CT. All Rights Reserved. Reproduced with permission fromthe publisher for use in the courses of the National Defense University.

  • 8/14/2019 T2 B26 National Defense U 1 of 2 Fdr- EC Readings 5741- Covert Action- 2002-2003 Fall- Table of Contents 114

    5/9

    TOPIC 6,R-cFrom Intelligence: From Secrets to Policy, (2000), by Mark Lowenthal, "The IntelligenceProcess:Oversight and Accountability," pp. 133-153. Copyright 200 0 by Congressional Quarterly Press,Washington, DC. All Rights Reserved. Reproduced with permission from CongressionalQuarterly, Inc. for use n the courses of the National Defense University.TOPIC 6, R-dFrom The Washington Post, (15 May, 2002), "Congress Moves to Lift Intelligence Spending: HillAlso Told of Afghan War Cost - $17 Billion," by Walter Pincus and Dana Priest, p. A01; (internetedition), pp. 1-4. Copyright 2002 by TheWashington Post for Writers' Group, Inc.,Washington, DC. Reproduced with permission from the publisher for use in the courses of theNational Defense University.TOPIC 7, R-aFrom Ethics and International Affairs, Volume 3, (1989), "Covert Intervention as a MoralProblem," by Charles R. Beitz, pp. 45-60. Copyright 1989 by the Carnegie Council on Ethicsand International Affairs, New York, NY. Reproduced with permission from the publisher for usein the courses of the National Defense University.TOPIC 7, R-bFrom Ethics and International Affairs, Volume 3, (1989), "Public Policy, Secret Action," by WilliamE. Colby, pp. 61-71. Copyright 1989 by the Carnegie Council on Ethics and InternationalAffairs, New York, NY. Reproduced with permission from the publisher for use in the courses ofthe National Defense University.TOPIC 7, R-cFrom Studies in Intelligence. (1992), "Managing Covert Political Action," byJames A. Barry,pp. 21-33. Published (1992) by the Center for the Study of Intelligence, a division of the CentralIntelligence Agency, McLean, VA. Reproduced for use in the co urses of the National DefenseUniversity.TOPIC 7, R-dFrom Intelligence: From Secrets to Policy, (2000), by Mark Lowenthal, "Ethical and Moral Issuesin Intelligence," pp. 184-200. Copyright 2000 by Congressional Quarterly Press, Washington,DC. All Rights Reserved. Reproduced with perm ission from Congressional Quarterly, Inc., foruse in the courses of the National Defense University.TOPIC 7, R-eFrom The New York Times. (19 February, 2002), "Pentagon Readies Efforts to Sway Sentiment,"by James Dao and Eric Schmitt; (internet edition), pp. 1-4. Copyright 2002 by The New YorkTimes Company, NewYork, NY. Reproduced with permission from the publisher via theCopyright ClearanceCenter, Inc., Danvers, MA., for use in the courses of the National DefenseUniversity.

  • 8/14/2019 T2 B26 National Defense U 1 of 2 Fdr- EC Readings 5741- Covert Action- 2002-2003 Fall- Table of Contents 114

    6/9

    TOPIC 7, R-fFrom The Washington Post. (16 May, 1999), "A Look at...What Makes a War Just?" (Glossary),p. B3. Copyright 1999 by Rev. J. Bryan Hehir, President and CEO, Catholic Charities, USA,Alexandria, VA. Reproduced with permission from the author for use in the coursesof theNational Defense University.TOPIC 7, R-gFrom Ethics and International Affairs. Volume 13, (1999), "A Peaceful, Silent, Deadly Remedy:The Ethics of Economic Sanctions," by Joy Gordon, pp. 123-142. Copyright 1999 by theCarnegie Council on Ehtics and International Affairs, NewYork, NY. Reproduced with permissionfrom the publisher for use in the courses of the National Defense University.TOPIC 8, R-aFrom Out of the Ashes:The Resurrection of Saddam Hussein, (1999), by Andrew and PatrickCoburn, pp. 31-56. Copyright 1999 by HarperCollins Publishers, Inc., New York, NY.Reproduced with permission from the publisher via the Copyright ClearanceCenter, Inc.,Danvers, MA., for use in the courses of the National Defense University.TOPIC 8, R-bFrom The Washington Post. FINAL Edition, (18 July, 1999), "Operation Backfire, Covert ActionAgainst Milosevic is Neither Secret nor Smart," by Bruce D. Berkowitz; (internet edition), pp. 1-3.Copyright 1999 by Bruce D. Berkowitz. Reproduced with permission from the author for use inthe coursesof the National Defense University.TOPIC 8, R-cFrom The Washington Post, FINAL Edition, (11 December, 2000), "U.S. Advice Guided MilosevicOpposition: Political Consultants Helped Yugoslav Opposition Topple Authoritarian Leader," byMichael Dobbs; (internet edition), pp. 1-6. Copyright 2000 by The Washington Post for Writers'Group, Inc., Washington, DC. Reproduced with permission from the publisher for use in thecourses of the National Defense University.TOPIC 8, R-dFrom The Washington Post. FINAL Edition, (31 January,2002), "10 Days in September, Insidethe War Cabinet: At Camp David, Advise and Dissent," by Bob Woodward and Dan Balz, p. A01;(internet edition), pp. 1-10. Copyright 2002 by The Washington Post for Writers' Group, Inc.,Washington, DC. Reproduced with permission from the publisher for use in the coursesof theNational Defense University.TOPIC 8, R-eFrom The Washington Post, FINAL Edition, (1 February, 2002), "10 Days in September, Insidethe War Cabinet: Combating Terrorism: 'It Starts Today'," by BobWoodward and DanBalz,p. A01; (internet edition), pp. 1-6. Copyright 2002 by The Washington Post for Writers' Group,Inc., Washington, DC. Reproduced with permission from the publisher for use in the courses ofthe National Defense University.

  • 8/14/2019 T2 B26 National Defense U 1 of 2 Fdr- EC Readings 5741- Covert Action- 2002-2003 Fall- Table of Contents 114

    7/9

    TOPIC 8, R-fFrom The New York Times. (13 February, 2002), "Powell Says U.S. is Weighing Ways to ToppleHussein," by Michael R. Gordon and David E. Sanger; (internet edition), pp. 1-2. Copyright2002 by The New York Times Company, New York, NY. Reproduced with permission from thepublisher via the Copyright Clearance Center, Inc., Danvers, MA., for use in the coursesof theNational Defense University.TOPIC 8, R-gFrom Foreign Affairs. Volume 78, Issue 3, (May-June 1999), "Getting It Backwardon Iraq," byF. Gregory Cause III, pp. 53-65. Copyright 1999 by the Councilon Foreign Relations, Inc.,New York, NY. Reproduced with permission from the publisher for use in the courses of theNational Defense University.TOPIC 8, R-hFrom Foreign Affairs.Volume 78, Issue 3, (May-June1999), "Rethinking Sanctions on Iraq:Sanctions of Mass Destruction," byJohn and Karl Mueller, pp. 43-53. Copyright 1999 by theCouncil on Foreign Relations, Inc., New York, NY. Reproduced with permission from thepublisher for use in the courses of the National Defense University.TOPIC 9, R-aFrom National Insecurity, U.S. Intelligence After the Cold War, (1999) edited by Craig Eisendrath,and Melvin A. Goodman, "Espionage and Covert Action," pp. 23-44. Copyright 1999 by TempleUniversity Press, Philadelphia, PA . Reproduced with permission from the publisher via theCopyright Clearance Center, Inc., Danvers, MA., for use in the courses of the National DefenseUniversity.

    TOPIC 9, R-bFrom Commonweal. (4 June, 1999), "Rethinking Foreign Policy," by Robert E. White,pp. 12-18; (internet edition), pp. 1-6. Copyright 1999 by Commonweal Foundation, New York,NY. Please visit www.commonweal.org for a no-fee subscription. Reproduced with permissionfrom the publisher for use in the courses of the National Defense University.TOPIC 9, R-cFrom Foreign Affairs. Volume 78, Issue 2, (March-April 1999), "Bully of the Free World," by GaryWills, pp. 50-59; (internet edition), pp. 1-6. Copyright 1999 by the Council onForeignRelations, Inc., New York, NY. Reproduced with permission from the publisher for use in thecourses of the National Defense University.

    TOPIC 10, R-aFrom The Sword and the Shield, (1999), by Christopher Andrewand Vasili Mitrokhin, "PoliticalWarfare: Active Measuresand the Main Adversary," pp. 224-246. Copyright 1999 by BasicBooks, Inc., a division of Perseus Book Group, New York, NY. Reproduced with permission fromthe publisher via the Copyright Clearance Center, Inc., Danvers, MA., for use in the courses ofthe National Defense University.

  • 8/14/2019 T2 B26 National Defense U 1 of 2 Fdr- EC Readings 5741- Covert Action- 2002-2003 Fall- Table of Contents 114

    8/9

    TOPIC 10, R-bFrom The Washington Post. FINAL Edition, (17 September, 1989), "How Churchill's AgentsSecretly Manipulated the U.S. Before Pearl Harbor," by David Ignatius, p. C1-2; (internetedition), pp. 1-8. Copyright 2002 by The Washington Post for Writers' Group, Inc.,Washington, DC. Reproduced with permission from the publisher for use in the courses of theNational Defense University.TOPIC 10, R-cFrom From the Shadows. The Ultimate Insider's Story of Five Presidents and How They Won theCold War. (1996), by Robert M. Gates, "1983: The Most Dangerous Year," pp. 258-262.Copyright 1996 by Robert M.Gates. All Rights Reserved. Published (1996) by Simon &Schuster, Inc., New York, NY. Reproduced with permission from the publisher for use in thecourses of the National Defense University.TOPIC 10, R-dFrom The Boston Globe. (26 April, 2002), "Worries of Cyberattacks on U.S. Are Aired; ChineseMilitary is Looking for Ways; Students Gearing Up for Disruptions," by Bill Miller, pp. A26-27;(internet edition), pp. 1-2. Copyright 2002 by Globe Newspaper Company, a division of TheNew York Times Company, New York, NY. Reproduced with permission from the publisher viathe Copyright Clearance Center, Inc., Danvers, MA., for use in the courses of the NationalDefense University.TOPIC 11, R-aFrom Orbis, Volume 44, Issue 1, (Winter 2000), "Covert Operations, Now More Than Ever," byThomas H. Henriksen; (internet edition), pp. 1-10. Copyright 2000 by Elsevier Science, Ltd.,Oxford, England. Reproduced with permission from the Foreign Policy Research Institute for usein the courses of the National Defense University.TOPIC 11, R-bFrom The National Interest. No. 51, (Spring 1998), "The Logic of Covert Action," by Bruce D.Berkowitz and Allan E. Goodman; (internet edition), pp. 1-11. Copyright 1998 by The NationalInterest, a division of National Affairs, Inc., Washington, DC. Reproduced with permission fromthe publisher for use in the courses of the National Defense University.TOPIC 11, R-cFrom The Next World War. (1996), by James Adams, "The New Arms Race," pp. 233-257.Copyright 1996 by James Adams. All Rights Reserved. Published (1996) by Simon & Schuster,Inc., NewYork, NY. Reproduced with permission from the publisher for use in the courses of theNational Defense University.TOPIC 11, R-dFrom The Washington Post. FINAL Edition, (18 November, 2001), "Secret CIA Unites PlayingACentral Combat Role," by BobWoodward, p. A01; (internet edition), pp. 1-3. Copyright 2001by Austin American Statesman, Austin, TX. Reproduced with permission from The WashingtonPost for use in the courses of the National Defense University.

  • 8/14/2019 T2 B26 National Defense U 1 of 2 Fdr- EC Readings 5741- Covert Action- 2002-2003 Fall- Table of Contents 114

    9/9

    TOPIC 11, R-eFrom Jane's Defence Weekly. Volume 029/010, (11 March, 1998), "Revealed: USA's CovertSquads to Counter WMD," by Barbara Starr, p. 12. Copyright 1998 by Jane's InformationGroup, Ltd., London, England. Reproduced with permission from the publisher via the CopyrightClearance Center, Inc., Danvers, MA., for use in the courses of the National Defense University.TOPIC 11, R-fFrom The New YorkTimes, LATE Edition, East Coast, (30 December, 2001), "A Nation

    Challenged: The Response; Planning for Terror but Failing to Act," byJudith Miller, Jeff Gerthand Don Van Natta, Jr., Section 1A, p. 1; (internet edition), pp. 1-15. Copyright 2001 by TheNew York Times Company, New York, NY. Reproduced with permission from the publisher viathe Copyright Clearance Center, Inc., Danvers, MA., for use in the courses of the NationalDefense UniversityTOPIC 11, R-hFrom The Boston Globe, (31 January, 2002), 'Tactics MayShift vs. Other Foes, Covert Action,Diplomacy Cited," by Bryan Bender, pp. A16-A18; (internet edition), pp. 1-3. Copyright 2002by Globe Newspaper Company, a division of The NewYork Times Company, New York,NY.Reproduced with permission from the publishervia the Copyright Clearance Center, Inc.,Danvers, MA., for use in the courses of the National DefenseUniversity.