Past Work (September, 2013 – January, 2014 )
All noted work on this page was written by Eugenie de Silva. If you wish to receive a copy of any of the work listed on this page, visit the “Contact Us” page or send an email to ( eugeniedesilvaofficial@gmail.com ) , and request a copy by noting the title (listed in bold) of the work, and the corresponding date of the work you wish to view. To view certain documents, you may be required to pay a fee. You will receive a response to your inquiry within 3 -5 business days. All work is copyrighted, and you must request permission to cite or reference any information noted on this page or any page on the website. This page is updated regularly.
Mexican Drug Cartels and the Government’s Response – OSINT Report – September, 2013
Analysis and Collection: Indications and Warnings – Report – September, 2013
The Constitution: Personal Meaning – Short Discussion – September, 2013
OSINT in Modern Intelligence Collection – Report – September, 2013
The Role of Surprise in Intelligence Collection – Report – September, 2013
Future Trends in Collections Methods: Land, Sea, & Air – Report – September, 2013
Cognitive Errors in the Intelligence Community – Report – September, 2013
Practices of Good Analysts – Report – September, 2013
Groupthink Explained and Exemplified – Report – September, 2013
Bureaucratic Politics and Organizational Dynamics: Analysis and Decision-Making – Report – September, 2013
Crisis and Decision-Making – Report – September, 2013
The Application of Psychology to Understand Intelligence Threat Assessments – Report – September, 2013
Blame, Responsibility, and Attribution Errors – Report – October, 2013
Evolution of Human Intelligence (HUMINT) Since the 1990s – Report – October, 2013
Operation Iraqi Freedom: Success or Failure? – Report – October, 2013
Open Source Intelligence (OSINT): Key Issues – Report – October, 2013
Over-emphasizing SIGINT, IMINT, and Cyber Collection: Under-valuing HUMINT – Report – October, 2013
Computer Network Operations: USA Defense Against Cyber Network Attack and Exploitation – Report – October, 2013
Evolution of USA Intelligence Community: Cold War to Present Day – Report – October, 2013
Legal and Policy Issues: Post 9/11 – Report – October, 2013
Intelligence Reform: Issues & Future Impact – Report – October, 2013
Iraq and Syria: Two Sides of the Same Coin? – Report – October, 2013
Covert Action – When is it Most Appropriate? – Report – October, 2013
Berlin Tunnel & Bay of Pigs: Analysis of Failures – Case Analysis Report – October, 2013
Covert Action: Advantages and Risks – Report – October, 2013
The Nature of Truth: Threat Analysis – Report – October, 2013
Policy Purpose in Case Studies – Critical for Success? – Report – October, 2013
Lower-Level Analysts: Three Greatest Hurdles to Timely Action – Report – October, 2013
Mara Salvatrucha 13 (MS-13): Structure, Function, & Process – Case Analysis Report – October, 2013
Reliance on Technology: Problem Area for USA Interests – Report – November, 2013
Operation Mincemeat: World War II – Report – November, 2013
National Counterintelligence Strategy: How Does it Frame Key Priorities? – Report – November, 2013
Denial of Service / Attacks Against Adversary Websites: Analysis – Report – November, 2013
Considering Behavior of Terrorists: Predictive Analysis – Report – November, 2013
Motives and Social Identity – Report – November, 2013
Imminent Threats: Next Decade – Report – November, 2013
Transnational Organized Crime Groups: Similarities and Differences – Report – November, 2013
Human Trafficking: A Security, Economic, and Political Threat – Report – November, 2013
What Makes Money Laundering A Difficult Crime to Detect, Investigate, and Prosecute – Report – November, 2013
One of the Greatest Impediments to Interdicting Transnational Crime and Narcotics Used to Support Terrorists’ Efforts – Reports – November, 2013
Categorization and Attitudes: Ayman al-Zawahiri – Report – November, 2013
Johnny Adair: Study of Behavior to Examine Groupthink and Escalation of Commitment – Report – November, 2013
Nationalism: Adolf Hitler and Abdullah Ocalan – Report – November, 2013
Deindividuation: Latin American Groups – Report – November, 2013
Appropriate Role of the USA and Allied Governments in Addressing Illicit Narcotics Trafficking – Report – November, 2013
What Facilitates Successful Illicit Narcotics Trafficking in Source and Transit Nations: Cultural, Environmental, Political, and Economic Factors – Report – December, 2013
Covert Action: Realistic Expectations and Goals – Report – December, 2013
Case Analysis: Iranian Hostage Crisis & Aldrich Ames – Case Analysis Report – December, 2013
Bashar al-Assad – Coup or Total Elimination: Assessment – Case Analysis Report – December, 2013
World War II Denial and Deception Operations: Operation Mincemeat – Report – December, 2013
The Role of Policymakers in Threat Analysis – Report – December, 2013
Biases in Intelligence Agencies – Report & Brief Case Analysis – December, 2013
Profiling from a Distance & Systematically Studying Personality: Is it Possible? – Report – December, 2013
Leaders: Unit of Analysis – Report – December, 2013
Psychoanalytic Psychobiography in a Leadership Profile – Report – December, 2013
Operational Code to Study Political Leaders – Report – December, 2013
At-a-Distance Trait Analysis – Report – December, 2013
At-a-Distance Profiling: Motive Imagery – Report – December, 2013
Integrative Complexity & High/Low Self-Monitor – Report – December, 2013
Authoritarian Personality: Strengths and Weaknesses – Report – December, 2013
Narcotics Trafficking: Social and Political Response is Justified in Light of Other Transnational Crimes Against Humanity? – Report – December, 2013
Afghanistan and Central Asia: Transnational Crime and Narcotics Issues – Report – December, 2013
Intelligence and Law Enforcement: Countering Transnational Illicit Narcotics Trafficking Threats to the USA – Report – December, 2013
Cyber Crime: A Lucrative Criminal Venture – Report – December, 2013
Transnational Crime, Narcotics, and Terrorism Finance – Report – December, 2013
Course of Action: Stabilizing Security in Afghanistan/Central Asia – Report – December, 2013
Policy Change: Countering Transnational Crime and Illicit Narcotics Trafficking – Report – December, 2013
The Ever Changing World in Which We Live: A Review of Joel Brenner’s Book – America the Vulnerable – Brief Book Review – December, 2013
Legal Issues: Cyber Operations / Cyber Intelligence Activities – Report – December, 2013
Personal Analysis: Intelligence Priorities – Cyber Issues as Important as Terrorism – Report – December, 2013
Attribution: Estonia Case Study – Brief Case Analysis Report – December, 2013
The Military’s Role in Defending Computer Networks and Executive Offensive Attacks – Report – December, 2013
Personality, Beliefs, and Identity in the Study of Individuals – Report – December, 2013
Profiling: Hezbollah – Case Analysis Report – December, 2013
Conformity in Terrorist Groups – Report – December, 2013
Propaganda: Northern Ireland, Hamas, Hezbollah, and the Shining Path – Case Analysis Report – December, 2013
Mad Dog Adair: Motives, Social Identity, Attitudes, & Egocentric Bias – Report – December, 2013
Propaganda as a Psychological Tool – Report – December, 2013
Social Psychological Concepts: Northern Ireland – Report – December, 2013
Psychological Variables in Understanding Terrorism – Report – December, 2013
Course of Action: Hypothetical “Denial of Service (DoS)” Attack – Memorandum – January, 2014
Computer Network Exploitation, Computer Network Defense, and Computer Network Attack – Report – January, 2014
Challenges of Attribution – Report – January, 2014
Social Networks and Cyber Intelligence Techniques – Report – January, 2014
No Current Cyber-War? – Report – January, 2014
Finalizing a Policy Structure for Authorities in the Cyber Arena – Report – January, 2014