Seb - Sei

 

Sebag-Montefiore, Hugh. Enigma: The Battle for the Code. London: Weidenfeld & Nicolson, 2000. Rev. ed. London: Folio Society, 2005.

For Kruh, Cryptologia 25.1, the author provides "one of the most detailed accounts of how the Enigma cipher was broken.... [His] research is superb and he has written a remarkable book."

[UK/WWII/Ultra]

Seck, Hope Hodge. "Marine Raiders to Lead Joint Spec Ops Fight against ISIS." Marine Corps Times, 26 Aug. 2015. [http://www.marinecorpstimes.com]

Capt. Barry Morris, a spokesman for Marine Corps Forces Special Operations Command, has said that the Marine Corps' "special operations command will lead the next rotation of operators into Iraq.... Marine Raiders will head the staff element for the next iteration of Combined Joint Special Operations Task Force-Iraq [CJSOTF].... The unit is set to deploy early next year and will be led by a MARSOC colonel."

[MI/Marines/10s, Ops/Iraq/10s/15, & SpecOps/10s/15]

Secord, Richard V. [MAJGEN/USA (Ret.)] "Tragedy Strikes Laos Site 85." Air Commando Journal 1, no. 3 (Spring 2012): 9-11. [http://www.aircommando.org]

The author was Chief of the CIA Tactical Air Division at the time of Lima Site 85 debacle in March 1968. See also Timothy N. Castle, One Day Too Long: Top Secret Site 85 and the Bombing of North Vietnam (New York: Columbia University Press, 19990; and James C. Linder, "The War in Laos: The Fall of Lima Site 85," Studies in Intelligence 38, no. 5 (1995): 79-88.

[CIA/Laos]

Secord, Richard V., and Jay Wurts. Honored and Betrayed: Irangate, Covert Affairs, and the Secret War in Laos. New York: John Wiley, 1992.

From publisher: "The inside account of Irangate by the man who coordinated and operated the Iran Initiative.... Delineates his dealings with Oliver North, William Casey, Admiral Poindexter, and others. Reveals new information on what President Reagan's and then Vice President Bush's roles were. A point-blank response to Secord's accusers and the administration that hung him out to dry." Armstrong, WPNWE, 19-25 Oct. 1992, believes that Secord's version of Iran-Contra adds "little that is new" and "is marred by myriad mistakes of fact.... [I]t is difficult to take seriously Secord's protestations that he is blameless and upright."

[CIA/Laos & Memoirs; GenPostwar/80s/Iran-Contra]

Security Service - MI5. "The Security Service at The National Archives." At: https://www.mi5.gov.uk/output/the-security-service-at-the-national-archives.html.

From access on 8 August 2012: "We have released nearly 4,000 files to The National Archives, covering a period up to 1957." Covers releases from 1 April 2000 to 17 February 2012. See also, "History: What's in the National Archives?" at: https://www.mi5.gov.uk/output/whats-in-the-national-archives.html: "Security Service files in the National Archives cover many aspects of the Service's work. They fall into a number of distinct categories, which can be found in the National Archives catalogue under five 'KV' headings (KV being the catalogue reference for the Security Service in general)."

[RefMats/Release/UK]

Segaller, Stephan. Invisible Armies: Terrorism into the 1990s. San Mateo, CA: Joseph, 1986. Boston: Harcourt, 1987. Rev. ed. London: Sphere, 1987.

[Terrorism/80s]

Segell, Glen M. "Creating Intelligence: Information Operations in Iraq." International Journal of Intelligence and Counterintelligence 22, no. 1 (Spring 2009): 89-109.

The author discusses the work of the Information Operations Task Force (IOTF) in Iraq. "The IOTF's specific information warfare was initiated through a media campaign essentially utilizing persuasion and dissuasion.... Specifically the IOTF was empowered to offer the Iraqi population alternatives more attractive than those offered by the insurgents and terrorists.... [I]ntelligence should not be limited to gathering and analyzing information"; "it can also create information aimed at 'winning the hearts and minds' of a population, while seeking to dissuade it from supporting an adversary."

[MI/Ops/Iraq/09; CA/PsyOps]

Segell, Glen M. "French Cryptography Policy: The Turnabout of 1999." International Journal of Intelligence and Counterintelligence 13, no. 3 (Fall 2000): 345-358.

France has been slow in the use of information technology "compared to other developed countries.... Prior to 1999, France was the only country that both restricted the export of cryptography and enforced restrictions on its internal use and provision." Then, in early 1999, the French government liberalized cryptography, raising the key length from 40 bits to 128 bits.

[France][c]

Segell, Glen M. "Intelligence Agency Relations between the European Union and the U.S." International Journal of Intelligence and Counterintelligence 17, no. 1 (Spring 2004): 81-96.

"[T]he European Union and the U.S. became progressively involved, after 9/11, in a joint intelligence counterterrorism effort, alongside the evolution of the restructuring of European Union institutions and associated enlargement integration."

[Liaison]

Segell, Glen M. "Intelligence Methodologies Applicable to the Madrid Train Bombings, 2004." International Journal of Intelligence and Counterintelligence 18, no. 2 (Summer 2005): 221-238.

The author looks at the use of (1) trends and patterns, (2) frequency, and (3) probability in antiterrorist intelligence analysis, with the 2004 Madrid train bombings serving as a case study.

[Analysis/Gen]

Segell, Glen M. "Reform and Transformation: The UK's Serious Organized Crime Agency." International Journal of Intelligence and Counterintelligence 20, no. 2 (Summer 2007): 217-239.

The Serious Organized Crime Agency (SOCA) was created in 2006. It brings together the National Crime Squad, National Criminal Intelligence Service, and investigators from Customs and the Home Office's Immigration Service. The author uses SOCA's formation to argue that intelligence in the UK "is undergoing a process of reform and transformation."

[UK/PostCW/Gen]

Segev, Samuel. Tr., Haim Watzman. Iranian Triangle: The Untold Story of Israel's Role in the Iran-Contra Affair. New York: Free Press, 1988.

Butterfield, New York Times, 27 Nov. 1988, says Segev provides "the most detailed account so far of the factionalism in Teheran." This book offers "some important historical nuggets," but "should be read with caution." This work leads Bensky, Los Angeles Times, 18 Dec. 1988," to conclude that it is too soon to expect the full story" of Iran-Contra to emerge. However, the author's "recounting of intergovernmental relations" makes clear that, dating from the Eisenhower years, "'the U.S., Israel and Iran worked together" in an "unofficial alliance aimed at halting the Soviet Union's expansion in the Middle East and weakening its friends in the Arab world.'"

[GenPostwar/80s/Iran-Contra; Israel/Israeli-US Rels/Gen]

Seib, Gerald F. "Briefly, A Spy Steps Forward." Wall Street Journal, 24 Nov. 1999, A20.

[CIA/80s/Kuklinski]

Seib, Gerald F. "Some Urge CIA to Go Further in Gathering Economic Intelligence." Wall Street Journal, 4 Aug. 1992, A1.

[GenPostwar/EconIntel]

Seib, Philip. "The News Media and the Intelligence Community: A Clash of Civilizations?" Defense Intelligence Journal 16, no. 2 (2007): 57-74.

The author reviews some past difficulties in the intelligence-media relationship, and looks at how there might be "a renewed relationship that reflects changes in global security issues and incorporates a reasonable level of cautious cooperation."

[CIA/Relations/Media]

Seifert, Jeffrey W. Data Mining and Homeland Security: An Overview. Washington, DC: Congressional Research Service, Library of Congress, Updated 3 Apr. 2008. Available at: http://www.fas.org/sgp/crs/homesec/RL31798.pdf.

"Data mining is becoming increasingly common in both the private and public sectors.... However, some of the homeland security data mining applications represent a significant expansion in the quantity and scope of data to be analyzed.... Questions that may be considered include the degree to which government agencies should use and mix commercial data with government data, whether data sources are being used for purposes other than those for which they were originally designed, and possible application of the Privacy Act to these initiatives. It is anticipated that congressional oversight of data mining projects will grow as data mining efforts continue to evolve."

[NSA/08; PostCW/00s/Gen; DHS/08]

Seigle, Greg. "CIA Too Involved in Palestinian Peace Accord?" Jane's Defence Weekly, 4 Nov. 1998, 4.

[CIA/90s/98/ME]

Seiler, Richard. La tragédie du réseau Prosper, avril-août 1943. Paris: Pygmalion, 2003.

The author raises the question of whether Churchill sacrificed the Prosper networtk to protect the preparations for the Normandy landings. See also, Francis J. Suttill and M.R.D. Foot, "SOE's 'Prosper' Disaster of 1943," Intelligence and National Security 26, no. 1 (Feb. 2011): 99-105.

[UK/WWII/Services/SOE]

Return to S Table of Contents

Return to Alphabetical Table of Contents