A Formal Risk-Effectiveness Analysis Proposal for the Compartmentalized Intelligence Security Structure

  title={A Formal Risk-Effectiveness Analysis Proposal for the Compartmentalized Intelligence Security Structure},
  author={D. Javorsek and J. Rose and Christopher Marshall and P. Leitner},
  journal={International Journal of Intelligence and CounterIntelligence},
  pages={734 - 761}
Major John Rose of the United States Army is a graduate student at the National Intelligence University. Previously, he was a Troop Commander in the 508th Parachute Infantry Regiment of the 82nd Airborne Division at Fort Bragg, North Carolina. He received his B.A. in Communications from the University of South Alabama and an M.A. in Statecraft and National Security Affairs, with a specialization in Public Diplomacy and Political Warfare, from the Institute of World Politics. 


Ethics, National Security and Bureaucratic Realities
Some have characterized Oliver North's conviction in federal court, for lying to Congress among other things, as the criminalization of policy differences, whereas others have condemned his actionsExpand
Spying for America: The Hidden History of U.S. Intelligence
Shocking details of Gulf War espionage and the treachery of CIA officer Aldrich Ames update this in-depth history of U.S. intelligence operations-- Reveals that U.S. intelligence did not begin inExpand
Top Secret America: The Rise of the New American Security State
The top-secret world that the government created in response to the 9/11 terrorist attacks has become so enormous, so unwieldy and so secretive that no one knows how much money it costs, how manyExpand
Knowledge as Power: Science, Military Dominance, and U.S. Security
maintain its global lead in science, the new key to its recently unparalleled military dominance? U.S. scientiac prowess has become the deep foundation of U.S. military hegemony. U.S. weapons systemsExpand
Command of the Commons: The Military Foundation of U.S. Hegemony
Since the end of the Cold War, scholars, commentators, and practitioners of foreign policy have debated what structure of world power would follow the bipolar U.S.-Soviet competition, and what U.S.Expand
Congressional Oversight of National Security Activities: Improving Information Funnels
This article, which was prepared for a spring 2007 conference at Cardozo Law School on "The Domestic Commander in Chief," considers constitutional and policy questions regarding congressionalExpand
Intelligence: From Secrets to Policy
What Is "Intelligence"? The Development of U.S. Intelligence The U.S. Intelligence Community The Intelligence Process-A Macro Look: Who Does What For Whom? Collection and the Collection DisciplinesExpand
Sensitive But Unclassified Information and Other Controls: Policy and Options for Scientific and Technical Information
Abstract : Since the September 11, 2001 terrorist attacks, controls increasingly have been placed on some unclassified research and ST restrictive contract clauses; visa controls; controlledExpand
Building Our Own "Iron Curtain": The Emergence of Secrecy in American Government
On 5 March 1946, Winston Churchill delivered a famous speech that many say signaled the beginning of the Cold War. Addressing an audience at Westminster College in Fulton, Missouri, Churchill spokeExpand
Secrecy and National Commercial Information Policy and Secrecy: Its Role in National Scientific and Technical Information Policy.
National scientific and technical information policy is not anywhere articulated in a comprehensive form and must derive it from numerous statutes, legislative histories, regulations, and executive branch directives. Expand