Category: Counterintelligence

The Muslim Brotherhood: Doctrine, Strategy, Operations and Vulnerabilities

Want to discover the vulnerabilities of the Muslim Brotherhood? Study its doctrine, strategy and operations worldwide. That’s what I set out to do in my chapter, “The Muslim Brotherhood: Doctrine, Strategy, Operations and Vulnerabilities,” appearing in the newly published book, Meeting the Ideological Challenges of Islamism: How to Combat Modern Radical Islam. The work was edited by Anna Bekele and...

Investor’s Business Daily: Hillary Clinton’s email server a foreign spy magnet

The private email server of former secretary of state Hillary Clinton, set up for personal secrecy purposes, was a “spy magnet” for foreign intelligence services. I wrote about the problem in Investor’s Business Daily. It is worth noting that I gave Clinton’s office a week to respond to my questions, and no one there chose to comment. The text of...

MAJ Nidal Hasan: He described his threat doctrine in Army powerpoint long before Fort Hood

Fort Hood jihadist MAJ Nidal Hasan described his ideology in a powerpoint presentation to his fellow soldiers at Walter Reed Army Hospital. He outlined his threat doctrine long before he shot up Fort Hood.  Download MAJ Hasan Slides Because he didn’t describe it as a “threat doctrine” but merely as an expression of religious belief, the Army took no action...

New professional advancement for security strategists – Still time to sign up

National security professionals: Want to jump-start your career by sharpening your strategic thinking? There’s still time to sign up for an intensive program that I’m directing at the Institute of World Politics. PASS:PORT is a new opportunity for US government national security professionals to stimulate their strategic thinking, advance their careers, and more effectively shape their actions in defense of the...

Spy hunter says WikiLeaks should be treated as espionage case

(My article reposted from BigPeace.com)  One of the nation’s highest-ranking former spy hunters says that the individuals responsible for the theft and publication of tens of thousands of secret military documents should be prosecuted under federal espionage laws. The Obama Administration is pursuing the disclosure of more than 90,000 secret documents to WikiLeaks.org as merely the mishandling of classified information...

Accountability and private security contractors: Visibility of operations is key to success

by J Michael Waller, Serviam, November-December 2007 When a private contractor for the U.S. government abides with the letter of the law, but the law is so flawed that it doesn’t correspond with reality, whose fault is it? The contractor’s, of course. That’s the apparent reasoning of critics in Congress and the press who blame private security providers for not...

Canada cites Dr Waller in deportation of Russian ‘illegal’ spy

(Institute of World Politics news release) The Canadian Security and Intelligence Service (CSIS) extensively cited Dr Waller in support of its request for a Montreal court to hold an alleged Russian “illegal” spy. The alleged Russian deep-cover agent, who goes by the assumed name Paul William Hampel, is being held under a rarely-used “security certificate” so that he can be...

Russia: Death and Resurrection of the KGB

Russia: Death and Resurrection of the KGB J Michael Waller Demokratizatsiya: The Journal of Post-Soviet Democratization, Summer 2004      “We represent in ourselves organized terror–this must be said very clearly.” Feliks Dzerzhinsky, founder of Cheka   The roots of all of the most efficient political police systems in modern history can be traced to December 20, 1917. On that...

Conferences discuss new intelligence requirements

[IWP news release] A year-long series of conferences, dedicated to the memory of former Director of Central Intelligence William J. Casey, is a major IWP forum from which to discuss ways to improve U.S. intelligence capabilities. The series was convened in light of the intelligence and policy failures that led to the September 11, 2001, terrorist attacks. The series, “Intelligence Requirements...

Undermining the war on terror: Top American Muslim groups courted by the Bush administration have used their political cover to launch influence operations and extend support to terrorists

Published by Insight magazine, a weekly of the Washington Times, March 18, 2003 by J. Michael Waller Terrorists and their supporters are doing their best to weave themselves into the political fabric of American society, say specialists in homeland security. They are operating front groups and charities to finance their operations, and they are running influence operations to weaken federal...