Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy

Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy

Date: January 25, 2011
Creator: Rollins, John
Description: The focus of this report is on the history of Al Qaeda, known (or attributed) actions, suspected capabilities of the organization and non-aligned entities, and an analysis of select regional Al Qaeda affiliates.
Contributing Partner: UNT Libraries Government Documents Department
2012-2013 Presidential Election Period: National Security Considerations and Options

2012-2013 Presidential Election Period: National Security Considerations and Options

Date: October 5, 2012
Creator: Rollins, John
Description: This report discusses historical national security-related presidential transition activities, provides a representative sampling of national security issues a new Administration may encounter, and offers considerations and options relevant to each of the five phases of the presidential election period. Each phase has distinct challenges and opportunities for the incoming Administration, the outgoing Administration, and Congress. This report is intended to provide a framework for national security considerations during the current election period and will be updated to reflect the election outcome.
Contributing Partner: UNT Libraries Government Documents Department
Osama bin Laden's Death: Implications and Considerations

Osama bin Laden's Death: Implications and Considerations

Date: May 5, 2011
Creator: Rollins, John.
Description: This report discusses issues and questions related to the killing of Osama bin Laden (OBL), which are multifaceted and may have operational, regional, and policy implications. Operational policy issues include congressional notification, legal considerations, and current and future military activities.
Contributing Partner: UNT Libraries Government Documents Department
"Gang of Four" Congressional Intelligence Notifications

"Gang of Four" Congressional Intelligence Notifications

Date: November 19, 2012
Creator: Rollins, John & Lange, Rebecca S.
Description: Report that reviews the history of the Gang of Four intelligence notification process and compares this procedure with that of the "Gang of Eight" notification procedure.
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Use of the Internet: Information Operations in Cyberspace

Terrorist Use of the Internet: Information Operations in Cyberspace

Date: March 8, 2011
Creator: Theohary, Catherine A. & Rollins, John
Description: This report describes the ways that international terrorists and insurgents use the Internet, strategically and tactically, in pursuit of their political agendas.
Contributing Partner: UNT Libraries Government Documents Department
NSA Surveillance Leaks: Background and Issues for Congress

NSA Surveillance Leaks: Background and Issues for Congress

Date: September 4, 2013
Creator: Rollins, John W. & Liu, Edward C.
Description: This report discusses the specifics of these two NSA collection programs. The first program collects in bulk the phone records--including the number that was dialed from, the number that was dialed to, and the date and duration of the call--of customers of Verizon and possibly other U.S. telephone service providers. The second program targets the electronic communications, including content, of foreign targets overseas whose communications flow through American networks.
Contributing Partner: UNT Libraries Government Documents Department
The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability

The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability

Date: December 9, 2010
Creator: Kerr, Paul K.; Rollins, John & Theohary, Catherine A.
Description: In September 2010, media reports emerged about a new form of cyber attack that appeared to target Iran, although the actual target, if any, is unknown. This report discusses this cyber attack, a malicious software program known as Stuxnet, which infected computer systems that were used to control the functioning of a nuclear power plant. Once inside the system, Stuxnet had the ability to degrade or destroy the software on which it operated. Although early reports focused on the impact on facilities in Iran, researchers discovered that the program had spread throughout multiple countries worldwide.
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Date: January 22, 2007
Creator: Rollins, John & Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Date: October 20, 2005
Creator: Rollins, John & Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Post-911 National Threat Notification Efforts: Issues, Actions, and Options for Congress

Post-911 National Threat Notification Efforts: Issues, Actions, and Options for Congress

Date: April 29, 2005
Creator: Rollins, John & Cunningham, L.J.
Description: None
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 NEXT LAST