The Rise of iWar: Identity, Information, and the Individualization of Modern Warfare.
The Rise of iWar examines the evolution of identity-based targeting from a decade of global counterterrorism operations and counterinsurgency campaigns. It offers a case study on wartime military innovation, considering the policies and strategies that evolved in response to a new and unexpected adversary. Available here.
Counterintelligence and Operational Security: Protecting People, Facilities and Information.
A comprehensive reference guide for counterintelligence and operational security planning. Provides a six-step process for developing an organizational security strategy and a comprehensive resource of best practices, checklists and tips for counterintelligence planners and security managers. Available here.
Contractors in the Government Workplace: Managing the Blended Workforce.
Offers best practices and tips for supervisors tasked with managing hybrid government-contractor teams. Discusses legal, ethical, and security tips to help avoid common mistakes, including the basics of service-based contracting and the government-contractor relationship. Available here.
Managing the Private Spies: The Use of Commercial Augmentation for Intelligence Operations.
An examination of commercial intelligence activities used by the Department of Defense for analysis, collection management, document exploitation, interrogation, production, and linguistic support. Considers the policy implications of integrating non-governmental providers into the operational intelligence cycle. Available here.