카테고리 보관물: Uncategorized

HST540 Readings 4

Colleen Bell, “Subject to Exception:  Security Certificates, National Security and Canada’s Role in the ‘War on Terror’ “, Canadian Journal of Law and Society, Vol. 21, No. 1,  2006.  pp. 63-83

Steve Hewitt, “Reforming the Canadian Security State:  The Royal Canadian Mounted Police Security Service and the ‘Key Sectors’ Program, Intelligence and National Security, Vol. 17, No. 4 (Winter 2002) pp. 165-184

Kate Martin, “Domestic Intelligence and Civil Liberties”, SAIS Review, Vol. 24, No. 1 (Winter-Spring 2004) pp. 7-24

HST540 Lec 1

strategic surprise

tactical surprise

long term expertise

policy process

maintenance of secrecy (clandestinity) 

intelligence vs. information

product

intelligence process (intelligence cycle)

HUMINT

SIGINT

IMINT

MASINT

OSINT

Disciplines of Clandestine Collection

espionage

walk-in

dangle

penetration

assets

case officer

agent

intelligence officer

resident

NOC (Non-official cover)

illegal

legend

covert operatives  national security operatives 

operations officers

DO-Directorate of Operations

NCS-National Clandestine Service

SAD-Special Activities Division

disinformation

DCI-Director of Central Intelligence

Deutch Rules

Counterespionage

Counterintelligence

Security

AUSCANZUKUS

ECHELON

NarusInsight Intercept Suite

burst transmission

spread spectrum transmission

radio silence

DIA-Defence Intelligence Agency

NRO-National Reconnaissance Office

NSA-National Security Agency

CIA-Central Intelligence Agency

NIMA-National Imagery and Mapping Agency

UAV-Unmanned Aerial Vehicles

image resolution

signal-to-noise ration

media echo

William R. Johnson, “Clandestinity and Current Intelligence” Studies in Intelligence, Vol. 20, No. 3 Fall 1976.  pp. 19-20 defines espionage as follows:

Espionage is the theft of information in contravention of another nation’s laws by a person known as an “agent.” This act of theft may be direct, as in the secret copying of a classified document, or indirect, as in the hiding of an eavesdropping device, or merely oral, but it is done by an agent and it breaks either a foreign law or the internal regulations of an alien organization.

Espionage is not the confidential purchase of information where mere embarrassment, rather than illegality is risked. It is not the flattery, bribery, or coercion of a person to influence his actions within legal limits. It is not “a scuttling, violence-prone business…incompatible with democracy,” but rather a silent, surreptitious, violence-shunning business serving the nation.

INTELLIGENCE is information that meets the stated or understood needs of policy makers and has been collected, refined and narrowed to meet those needs.

All intelligence is information. Not all information is intelligence.

INTELLIGENCE PROCESS:

1.     Identifying requirements and targeting — tasking;

2.     Collection of information;

3.     Processing and Exploitation;

4.     Analysis and Production of Intelligence;

5.     Reporting and Dissemination

COUNTER-ESPIONAGE:

That branch of espionage of which the target is an alien organization which uses conspiratorial methods, whether as part of a foreign government or of some non-national or international group, and whether against the United States or against another entity.  Counterespionage is, therefore, also the theft of information by one’s agent, who will in this circumstance usually be called a double agent or a penetration, depending upon the status (agent or officer) he holds in the enemy apparatus

Counterespionage is a branch of counterintelligence, a system of disciplines mainly involving investigation and detection aimed at frustrating active efforts of alien conspiratorial organizations to acquire secrets or sensitive information.

NATIONAL CLANDESTINE SERVICE (NCS) (formerly DO):

Operates as the clandestine arm of the CIA, and serves as the national authority for the coordination, deconfliction, and evaluation of clandestine human intelligence operations across the Intelligence Community. The NCS supports our country’s security and foreign policy interests by conducting clandestine activities to collect information that is not obtainable through other means. The NCS also conducts counterintelligence and special activities as authorized by the President.

INTERNET LINKS:

CIA Front Companies http://www.jar2.com/2/Intel/CIA/CIA%20Fronts.htm

Air America http://www.air-america.org/

National Security Archives http://www.gwu.edu/~nsarchiv/

CIA Book of Honor  http://198.62.75.1/www2/fcf/ray.washingtonpost.cia91897.html

Federation of American Scientists:  http://www.fas.org/main/home.jsp

US Intelligence Community:  http://www.intelligence.gov/index.shtml

Electronic Frontier Foundation  http://www.eff.org/

NSA spying and AT&T  https://www.eff.org/issues/nsa-spying

NarusInsight  http://narus.com/products/index.html

AUSCANNZUKUS http://auscannzukus.org/intro.asp

Canadian Intelligence Resource Center  http://circ.jmellon.com/

HST540 Lec 8

Herman Göring Rudolf Diels Heinrich Himmler

Geheime Staats Polizei (Gestapo)

State Secret Police Reinhard Tristan Eugen Heydrich 

Sicherheitsdiest (SD)

Security Service

Reichssicherheitshauptamt (RSHA)

Reichs Security Main Office

Einsatzgruppen — Einsatzkommandos

Auschwitz

SD-Ausland

Walter Schellenberg

Abwehr (Amt Ausland/Abwehr im Oberkommando der Wehrmacht)

Wilhelm Canaris Operation Nordpol “Frau Solf Tea Party” Reinhard Gehlen

Fremde Heer Ost (FHO)

Gehlen Org (1945-1956)

Bundesnachrichtendienst (BND) (1956-current)

Alfred Naujocks

Operation Canned Goods

Special Operations Executive (SOE)

Operation Anthropoid

William “Wild Bill” Donovan

OSS-Office of Strategic Services.

Colossus

MAGIC

ULTRA

Enigma

HST540 Lec 6

Russian Foreign Intelligence Service (SVR) Main Intelligence Directorate (GRU) [Military Intelligence]

[ГРУ:  Гла́вное Разве́дывательное Управле́ние]

Federal Security Service (FSB) Alexander Litvenenko Anna Politkovskaya “wet jobs” Committee for State Security (KGB) [КГБ:  Lubyanka on Dzerzhinsky Square Vladimir Putin 

Cheka (Vcheka – The All-Russian Extraordinary Commission for Combating Counter-Revolution and Sabotage)

[ЧК: Всероссийская чрезвычайная комиссия по борьбе с контрреволюцией и саботажем]

Okhrana 

agent provocateurs 

Father Georgi Gapon

Roman Malinovsky 

Protocols of the Learned Elders of Zion (1905)

Dialogues in Hell (1864)

Russo-Japanese War of 1905

Revolution of 1905 February Revolution of 1917 sealed railway car  Vladimir Illych Ulyanov (Lenin)

The October “Revolution” 1917

Russian Civil War (1917-1922)

Treaty of Brest-Litovsk

Leon Trotsky

the Sword and Shield

Felix Edmundovich Dzerzhinsky

Chekisty

extra-judicial reprisal

Red Terror

Revolutionary Tribunals

Paul Dukes  Sydney Reilly Robert Bruce Lockhart Rene Marchand Fanya Kaplan Diplomats’ Plot or the Lockhart Plot INO (Foreign Section of the Cheka) Comintern

Operation “Sindikat” and Operation Trust

LINKS

SVR  Official Home Page
http://svr.gov.ru/

FSB Official Home Page
http://www.fsb.ru/

Russian Intelligence Agencies News (English)
http://www.agentura.ru/english/

CIA History on the Okhrana
Link

Bruce Lockhart British Agent   [text of book]
http://www.gwpda.org/wwi-www/BritAgent/BATC.htm

 

Agency Ancestry
SVR/FSB   KGB   MVD          MGB   NKGB  NKVD  OGPU  GPU 

Cheka 

1991-1995 1954 1946 1943 1941 1934 1923 1922

1917

HST540 Lec 13

Security Certificates

Charkaoui v. Canada (Citizenship and Immigration) Bill C-3 (Feburary 2008) special advocates 

Quis custodiet ipsos custodes?

Royal Commission of Inquiry into Certain Activities of the RCMP  (McDonald Commission) SIRC—Security Intelligence Review Committee Canadian Security Intelligence Service (CSIS)  Access to Information Act (AIA) Privacy Act Canadian Security Intelligence Service Act (CSISA)

Phoenix Program

Montagnards Judiciary Subcommittee on Constitutional Rights Daniel Ellsberg The Pentagon Papers Watergate CREEP—the Committee to Re-Elect the President “plumbers” E. Howard Hunt G. Gordon Liddy “Skeletons File” Family Jewels U.S. President’s Commission on CIA activities within the United States (Rockefeller Commission) United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities (Church Committee) House Select Committee on Assassinations (HSCA)  SRPOINTER / HTLINGUAL Operation CELOTEX I-II MK/ULTRA Project FBI COINTELPRO United States Senate Select Committee on Intelligence Iran-Contra Affair – or – Irangate

Oliver North

Hashshashin Irgun Hotel David Bombing Deir Yassin massacre Menachem Begin

Che Guevara

Félix Rodríguez Carlos Marighella

Mini-manual of Urban Guerrilla Warfare

Tupamaros  Dan Mitrione Munich Massacre Black September Mossad (Institute for Intelligence and Special Operations) Operation Wrath of God Ahmed Bouchiki Mordechai Vanunuan  PLO PFLP—the Popular Front for the Liberation of Palestine Dawson’s Field Hijackings Red Brigades Baader-Meinhof Group (Gang) RAF Direct Action IRA ETA FLQ Soviet Invasion of Afghanistan (December 1979) Mujahedeen ISI– Inter-Services Intelligence Directorate (Pakistan) Gulbuddin Hekmatyar  al-Qaeda  Osama Bin Laden

9/11

LINKS

SIRC Report Titles [Secret and Top Secret]
http://www.sirc-csars.gc.ca/opbapb/lsrlse-eng.html

Rockefeller Committee on CIA Activities
http://www.history-matters.com/archive/church/rockcomm/contents.htm

Church Committee Reports / Rockefeller Report
http://www.aarclibrary.org/publib/church/contents.htm

FBI CONINTELPRO Report
http://www.icdc.com/~paulwolf/cointelpro/cointel.htm

CIA Family Jewels Report
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB222/index.htm

Mossad
http://www.mossad.gov.il/Eng/AboutUs.aspx

HST540 Readings 3

David Kahn, “The Intelligence Failure of Pearl Harbor,” Foreign Affairs, Vol. 70, no. 5 (Winter 91/92), pp. 136-52

Loch Johnson, “Seven Sins of Strategic Intelligence, World Affairs, Vol. 146, No. 2 (Fall) 1983.  pp. 176-204

HST540 Espionage Course Outline

Ryerson University

Department of History

HST 540: History of Espionage

(Winter Session 2008)

Section 003  Mon: 11:00AM – 1:00PM (ENG LG02)  & Wed:   9:00 – 10:00AM (KHE 321B)

Section 006  Mon:    1:00PM – 3:00PM (EPH 229)      & Wed: 11:00 – 12:00PM (KHE 121)

Instructor:        Peter Wronski 

Office Hours:  Weds:  10:00-11:00 & 12:00-1:00 or by appointment –
                                    JOR 501 OR JOR A-510 (Dr. Arne Kislenko’s office)

Email :                         pwronsky@ryerson.ca

Phone :                        979-5000 ext. 6058

Course website:           www.petervronsky.com/espionage.htm     OR
                                    www.russianbooks.org/espionage.htm

COURSE DESCRIPTION / OBJECTIVE:

This course examines the evolution of intelligence services throughout the twentieth century, with particular reference to the two world wars, technological changes, and the Cold War confrontation after 1945. The focus in the first part will be on British, German, and Imperial Russian intelligence, before we turn towards the development of services in the United States and the Soviet Union. The development of services in other countries, such as Israel, China, and Canada will also be addressed. The course will survey the role that intelligence played in securing Allied victory during World War Two and in crucial Cold War events like the arms race, Cuban Missile Crisis and Vietnam War.  Theoretical principles of intelligence gathering and assessment will be introduced and explored as will the portrayal of espionage in popular culture.  The course will conclude with an examination of the challenges intelligence services face today, and the future of spying in the post Cold War world. In this regard, the events of September 11, 2001 and the current “war on terrorism” will be discussed.

The objectives of this course are:  1. To examine espionage in its contemporary setting and to establish a factual framework for its history; 2. To understand the relationship between espionage and the conduct of foreign and domestic policy; 3. To improve your ability to think critically and to analyse data by undertaking the kind of research required for an upper level university essay or a professional or academic report or publication and to write and present it clearly and effectively.   

(Upper-level liberal studies elective)

TEXT:  Jeffrey T. Richelson, A Century of Spies: Intelligence in the 20th Century, (New York:  Oxford University Press, 1995. (available at the Ryerson bookstore) and downloadable seminar readings as assigned.

METHOD OF STUDENT EVALUATION:        

Essay Proposal (250 words):   10%     Feb 6

Mid-Term Test:                       10%     Feb 13            

Essay (2500 words):               30%     Mar 26

Final Exam:                             30%     TBA

Seminars:                                 20%     Weds:  Jan 30; Feb 27; Mar 19; Apr 2. (time as signed up)

METHOD OF INSTRUCTION:     Lecture & Seminar

LECTURE TOPICS AND READINGS   (tentative and subject to change):

·         The birth of modern espionage (chapter 1)          

·         Espionage in the First World War 1914-1918 (chapters 2-3)

·         Espionage in the inter-war period 1918-1939 (chapters 4-6)

·         Espionage in the Second World War 1939-1945 (chapters 7-12)

·         Espionage in the Cold War 1946-1991 (chapters 13-18, 20-25)

·         Covert Operations – Cuba and Vietnam (chapter 19)

·         Espionage and Canada 1860 – 2008

·         Terrorism and Counter-Terrorism 1860-2008

·         The Future of Intelligence and Espionage  (chapter 26)

SEMINARS:  Four one-hour seminars will be scheduled during the semester on Wednesdays. The sign-up sheet for seminar times will be posted on my office door (JOR 501.)  First come/first serve for seminar times.  Discussion will be based on lecture and assigned reading materials.  Participation is mandatory and worth 20% of the final mark based on attendance and the quality and degree of your participation.  Readings will consist of academic journal articles which you can access online through the Ryerson Library internet portal.  See website for instruction how to access academic journal titles online. 

ASSIGNMENTS

Essay:  A topic of your choice pertaining to espionage in the 20th Century.  Come see me if you need help or advice in choosing your topic.  Suggested topic areas are posted on the website.

Assignments not meeting any of the below specified requirements and formats will be deducted marks and/or failed entirely.

There are two parts in this assignment:

1.      Prior to writing your essay, you will submit a one page outline (apx. 250 words) that clearly defines your subject and approach and a proposed annotated bibliography that describes your sources and their relevance to your essay.  You will be marked on the basis of originality and specificity of your subject matter and the depth, quality, range and currency of your sources.  Due date for your proposal is Feb 6  This is worth 10% of your final grade.

2.      An essay of 2,500 words (not including citations). This is due on Mar 26 by end of class and is mandatory for all students. It is worth 30% of your final grade.  A minimum of six acceptable (see next) sources are required for the essay.  The essay should be in 12pt font, double-spaced and approximately 10-12 pages in length plus bibliography and a cover page. Clearly indicate on the cover page the title of your essay, your name and section number. Each essay page is to be numbered and the pages stapled and submitted without any additional or alternative cover, binding or cover art.

Acceptable Sources:  The six minimum required sources should be scholarly monographs, trade books, journal articles, or primary sources.  Institutional and archival websites are acceptable if they were approved at the proposal stageNever acceptable as citable sources are popular websites like Wikipedia or History Place, encyclopaedias, dictionaries, atlases, general history textbooks, the course text book, serial books like Time-Life series or American Heritage.  (Journal readings assigned for tutorials are acceptable.)  Popular, journalistic, or editorial books can be acceptable depending upon whether they offer adequate citations and/or upon the author’s qualifications.  Identify and describe such books in the annotated bibliography of your proposal.

Citations:  Essays MUST contain citations in the form of Chicago style footnotes at the bottom of each essay page (or as endnotes in the worst case scenario).  A source’s first citation will indicate:  the author, title, city and date of publication, as well as the correct and exact page number(s).  In subsequent citations of that same source, only the author and precise page number(s) are needed.  The use of bibliographic indicators like ibid or op cit is discouraged.  This is an example of citations as they would appear at the bottom of an essay page: 
 

John Smith, The History of History (Toronto: Ontario Publishers, 1997), pp. 20-21.

Sally Tong, The Long March (New York:  Columbia Press, 2006.) p. 105.

John Smith,  p. 23.

Sally Tong, pp.107-108

A research essay of 10-12 pages in length should have approximate 25-35 sequentially Arabic numbered citations at minimum.  As a general rule, references should be given for direct quotations, summaries or paraphrases of other people’s work, ideas or points of view, and for material that is controversial or obscure. WHEN IN DOUBT, IT IS BETTER TO PROVIDE A REFERENCE.   Incomplete citations will result in lost marks. Citations without precise page references will result in failure of the assignment with no opportunity to resubmit.

How to Track and Insert Citations:  In MS Word 2007 choose menu bar item “References” and [insert footnote].  In MS Word 2000, choose menu bar item “Insert” and then [footnote].

For more information on Chicago Style footnoting see:

            http://www.unc.edu/depts/wcweb/handouts/chicago.html

http://www.dianahacker.com/resdoc/p04_c10_s1.html

http://www.chicagomanualofstyle.org/tools_citationguide.html

Bibliographies

:  Essays MUST provide bibliographies in alphabetical order by the authors’ surnames of all works consulted, whether or not they have been quoted directly.  Dictionaries, atlases, text books and/or encyclopaedias, popular websites, DO NOT count towards the minimum number of sources, and their inclusion should NOT be considered as constituting research.  You may of course use them for general guidance but they are not citable sources under normal circumstances.  The bibliography should look like this:  

Smith, John.  The History of History (Toronto: Ontario Publishers, 1997.)

Tong, Sally.  The Long March (New York:  Columbia Press, 2006.)
                                   

Submission of Essays:  Essays must be typed. Students should hand-in essays directly to me in lecture on the due date. Only those essays submitted on the due date in hard copy in class will be guaranteed return by the day of the exam.  Late essays may be placed in the essay box on the fifth floor of Jorgenson Hall with my name clearly on them. Never slide essays under my office door. Students are responsible for ensuring that their essays have been received. Please keep copies of your work.  Worse case scenario, you may e-mail an attached MS Word doc.  file of your essay to me at pwronsky@ryerson.ca to secure a submission date and then submit a hard copy at the first opportunity.  Note on the hard copy the date of the e-mailed submission. (The hard copy essay is to be identical to the e-mailed version obviously.)

Deadlines and Penalties:  Late work will be penalized by the deduction of 2% per day, including weekends. Extensions may be granted on medical or compassionate grounds. Students requesting an extension should submit a written request to me before the deadline. If this is not possible, students should be prepared to provide appropriate documentation relating to the extension request (i.e. doctor’s note). No late work will be accepted after the last day of lectures in the term.

Deduction of Marks:  The evaluation of your research, content, and argumentation is of primary concern in marking. The range of your sources as indicated by your citations in presenting evidence for your argument will be assessed and critical analysis of your sources is encouraged and rewarded. Equally important is the syntax or structure of your work. Marks will be deducted from work containing excessive grammar/spelling mistakes, from essays excessively long or inadequately short, or improperly formatted. Be sure to edit and check your work carefully. Do not simply rely on your computer’s spelling or grammar check.

Grounds for Failure:  Essays which do not supply proper and adequate citations indicating precise page references and bibliographies will be failed.  Essays will not be accepted after the last day of lecture without prior arrangement. Any written work that quotes directly from other material without attribution, or which paraphrases extensive tracts from the works of others, is plagiarised. It will receive no marks and there will be no chance to resubmit. Please consult the Ryerson academic calendar for further information on plagiarism. If you have any questions or doubts about how to cite material, please feel free to contact me.

Plagiarism:  Plagiarism is a form of intellectual dishonesty in which someone attempts to claim the work of others as their own. Work which has been researched and/or written by others, such as an essay-writing agency, internet service, friend, or family member is NOT acceptable. The submission of such work is one form of plagiarism, and it will be dealt with accordingly as academic misconduct. Quoting directly or indirectly from research sources without proper attribution is also plagiarism, and it will also constitute an academic misconduct. The Faculty of Arts policy on plagiarism will be strictly enforced in this course; resulting in a grade of zero for the assignment, a report to the Registrar and the programme department of the student, and possibly other academic penalties. A second violation of the Code of Academic Conduct on a student’s record will result in a recommendation of suspension or expulsion.

Academic Integrity

For additional help, Ryerson now offers the Academic Integrity Website at www.ryerson.ca/academicintegrity. This offers students a variety of resources to assist in their research, writing, and presentation of all kinds of assignments. It also details all dimensions of Academic Misconduct and how to avoid it. It was put together by a team representing the Vice President Academic, faculty, the library, Digital Media Projects, and Student Services.

The policy is available in its entirety at www.ryerson.ca/acadcouncil and at www.ryerson.ca/rr and in the Student Guide.

Ryerson University is committed to promoting academic success and to ensuring that students’ academic records ultimately reflect their academic abilities and accomplishments. The University expects that academic judgments by its faculty will be fair, consistent and objective, and recognizes the need to grant academic consideration, where appropriate, in order to support students who face personal difficulties or events. It is also expected that students will deal with issues which may affect academic performance as soon as they arise. It should be understood that students can only receive grades which reflect their knowledge of the course material.

Students should refer to the Student Guide and to the Academic Council and Records and Registration web sites for detailed information on the various types of academic consideration that may be requested; necessary documents such as appeal forms, medical certificates and forms for religious accommodation; and procedural instructions. Information is also available from the Departments and Schools, Dean’s Offices and the Secretary of Academic Council.

Students are responsible for reviewing all pertinent information prior to the submission of a formal academic appeal. Incomplete appeals will not be accepted. Students are responsible for ensuring that a formal appeal is submitted by the deadline dates published in the calendar, and must adhere to the timelines established in the policy.


Course Evaluation
:

This coming year the Faculty Course Survey will be administered on line. Students will be able to access the surveys through their my.ryerson.ca (Blackboard) portal during the 11th and 12th weeks of the semester, which is after the last date to drop the course.

HST540 Lec 8

Joseph Stalin Leon Trotsky Ramon Mercador (alias Frank Jacson) Special Tasks – “Wet Jobs” Nicolai Yezhov (Ezhov) The Great Terror 1937-38 Lavrentiy Beria

rezidentura

illegal rezident

legal rezident

The “Great Illegals” Zinoviev Letter Nazi seizure of power Reichstag Fire Trial Spanish Civil War International Brigades The Magnificent Five (Cambridge Five) Kim Philby CUSS (Cambridge University Socialist Society

Brown Book on Hitler Terror

Committee for the Relief of Victims of German Fascism Theodor Maly Arnold Deutsche Edith Tudor Hart Guy Burgess Anthony Blunt Donald Maclean the ”homintern” John Cairncross Venona Project

HST540 Readings 2

HST540  SEMINAR 2
READINGS

[Adobe Acrobat Reader is required for these readings]

Thurlow, Richard , ‘Soviet Spies and British Counter-Intelligence in the 1930s: Espionage in the Woolwich Arsenal and the Foreign Office Communications Department’,

Intelligence & National Security, Vol. 19, No. 4. revised

(Winter 2004) pp. 610 – 631 Hewitt, Steve, ‘Royal Canadian Mounted Spy: The Secret Life of John Leopold/Jack Esselwein’

Intelligence and National Security, Vol. 15, No. 1. 

(Spring 2000), pp. 144 -168

HST540 Lec 12

Colonel Rudolf Abel

Hollow Nickel Case SMERSH Nicolai Khokhlov Nikita Khrushchev “open skies”  U-2 U-2 Crisis Francis Gary Powers John F. Kennedy (JFK) Berlin Star of David pattern October Missile Crisis (Cuban Missile Crisis) NGA— National Geospatial-Intelligence Agency  Intelligence Community—the IC  IAO—the Information Awareness Office

TIA—Total Information Awareness

Web scrubbing Rear Admiral John Poindexter Iran-Contra Affair (Irangate) Communications Branch of the National Research Council (CBNRC)  Communications Security Establishment (CSE – Department of Defence) Security Panel Privy Council RCMP Security Service “Key Sectors Program” 

LINKS

CSIS Affidavit Re: Captured Russian Spy, December 2006
www.petervronsky.com/HST540/cansp1.pdf

US Intelligence Community Websites
http://www.fas.org/irp/official.html

IOA (Information Awareness Office)  [scrubbed website] TIA—Total Information Awareness [later changed to “Terrorist Information Awareness”]

http://web.archive.org/web/20020802012150/www.darpa.mil/iao/

DARPA
http://www.darpa.mil/

DARPA Programs Report April 2002 describing IOA
http://www.darpa.mil/body/news/2002/darpa_fact.html

Communications Security Establishment Canada
http://www.cse-cst.gc.ca/

Privy Council Canada
http://www.pco-bcp.gc.ca/index.asp?lang=eng

National Security Archive (The George Washington University)
http://www.gwu.edu/~nsarchiv/NSAEBB/index.html