Past Work (September, 2013 – January, 2014 )

All noted work on this page was written by Eugenie de Silva. If you wish to receive a copy of any of the work listed on this page, visit the “Contact Us” page or send an email to ( eugeniedesilvaofficial@gmail.com ) , and request a copy by noting the title (listed in bold) of the work, and the corresponding date of the work you wish to view. To view certain documents, you may be required to pay a fee. You will receive a response to your inquiry within 3 -5 business days. All work is copyrighted, and you must request permission to cite or reference any information noted on this page or any page on the website. This page is updated regularly.

Mexican Drug Cartels and the Government’s Response – OSINT Report – September, 2013

Analysis and Collection: Indications and Warnings – Report – September, 2013

The Constitution: Personal Meaning – Short Discussion – September, 2013

OSINT in Modern Intelligence Collection – Report – September, 2013

The Role of Surprise in Intelligence Collection – Report – September, 2013

Future Trends in Collections Methods: Land, Sea, & Air – Report – September, 2013

Cognitive Errors in the Intelligence Community – Report – September, 2013

Practices of Good Analysts – Report – September, 2013

Groupthink Explained and Exemplified – Report – September, 2013

Bureaucratic Politics and Organizational Dynamics: Analysis and Decision-Making – Report – September, 2013

Crisis and Decision-Making – Report – September, 2013

The Application of Psychology to Understand Intelligence Threat Assessments – Report – September, 2013

Blame, Responsibility, and Attribution Errors – Report – October, 2013

Evolution of Human Intelligence (HUMINT) Since the 1990s – Report – October, 2013

Operation Iraqi Freedom: Success or Failure? – Report – October, 2013

Open Source Intelligence (OSINT): Key Issues – Report – October, 2013

Over-emphasizing SIGINT, IMINT, and Cyber Collection: Under-valuing HUMINT – Report – October, 2013

Computer Network Operations: USA Defense Against Cyber Network Attack and Exploitation – Report – October, 2013

Evolution of USA Intelligence Community: Cold War to Present Day – Report – October, 2013

Legal and Policy Issues: Post 9/11 – Report – October, 2013

Intelligence Reform: Issues & Future Impact – Report – October, 2013

Iraq and Syria: Two Sides of the Same Coin? – Report – October, 2013

Covert Action – When is it Most Appropriate? – Report – October, 2013

Berlin Tunnel & Bay of Pigs: Analysis of Failures – Case Analysis Report – October, 2013

Covert Action: Advantages and Risks – Report – October, 2013

The Nature of Truth: Threat Analysis – Report – October, 2013

Policy Purpose in Case Studies – Critical for Success? – Report – October, 2013

Lower-Level Analysts: Three Greatest Hurdles to Timely Action – Report – October, 2013

Mara Salvatrucha 13 (MS-13): Structure, Function, & Process – Case Analysis Report – October, 2013

Reliance on Technology: Problem Area for USA Interests – Report – November, 2013

Operation Mincemeat: World War II – Report – November, 2013

National Counterintelligence Strategy: How Does it Frame Key Priorities? – Report – November, 2013

Denial of Service / Attacks Against Adversary Websites: Analysis – Report – November, 2013

Considering Behavior of Terrorists: Predictive Analysis – Report – November, 2013

Motives and Social Identity – Report – November, 2013

Imminent Threats: Next Decade – Report – November, 2013

Transnational Organized Crime Groups: Similarities and Differences – Report – November, 2013

Human Trafficking: A Security, Economic, and Political Threat – Report – November, 2013

What Makes Money Laundering A Difficult Crime to Detect, Investigate, and Prosecute – Report – November, 2013

One of the Greatest Impediments to Interdicting Transnational Crime and Narcotics Used to Support Terrorists’ Efforts – Reports – November, 2013

Categorization and Attitudes: Ayman al-Zawahiri – Report – November, 2013

Johnny Adair: Study of Behavior to Examine Groupthink and Escalation of Commitment – Report – November, 2013

Nationalism: Adolf Hitler and Abdullah Ocalan – Report – November, 2013

Deindividuation: Latin American Groups – Report – November, 2013

Appropriate Role of the USA and Allied Governments in Addressing Illicit Narcotics Trafficking – Report – November, 2013

What Facilitates Successful Illicit Narcotics Trafficking in Source and Transit Nations: Cultural, Environmental, Political, and Economic Factors – Report – December, 2013

Covert Action: Realistic Expectations and Goals – Report – December, 2013

Case Analysis: Iranian Hostage Crisis & Aldrich Ames – Case Analysis Report – December, 2013

Bashar al-Assad – Coup or Total Elimination: Assessment – Case Analysis Report – December, 2013

World War II Denial and Deception Operations: Operation Mincemeat – Report – December, 2013

The Role of Policymakers in Threat Analysis – Report – December, 2013

Biases in Intelligence Agencies – Report & Brief Case Analysis – December, 2013

Profiling from a Distance & Systematically Studying Personality: Is it Possible? – Report – December, 2013

Leaders: Unit of Analysis – Report – December, 2013

Psychoanalytic Psychobiography in a Leadership Profile – Report – December, 2013

Operational Code to Study Political Leaders – Report – December, 2013

At-a-Distance Trait Analysis – Report – December, 2013

At-a-Distance Profiling: Motive Imagery – Report – December, 2013

Integrative Complexity & High/Low Self-Monitor – Report – December, 2013

Authoritarian Personality: Strengths and Weaknesses – Report – December, 2013

Narcotics Trafficking: Social and Political Response is Justified in Light of Other Transnational Crimes Against Humanity? – Report – December, 2013

Afghanistan and Central Asia: Transnational Crime and Narcotics Issues – Report – December, 2013

Intelligence and Law Enforcement: Countering Transnational Illicit Narcotics Trafficking Threats to the USA – Report – December, 2013

Cyber Crime: A Lucrative Criminal Venture – Report – December, 2013

Transnational Crime, Narcotics, and Terrorism Finance – Report – December, 2013

Course of Action: Stabilizing Security in Afghanistan/Central Asia – Report – December, 2013

Policy Change: Countering Transnational Crime and Illicit Narcotics Trafficking – Report – December, 2013

The Ever Changing World in Which We Live: A Review of Joel Brenner’s Book – America the Vulnerable – Brief Book Review – December, 2013

Legal Issues: Cyber Operations / Cyber Intelligence Activities – Report – December, 2013

Personal Analysis: Intelligence Priorities – Cyber Issues as Important as Terrorism – Report – December, 2013

Attribution: Estonia Case Study – Brief Case Analysis Report – December, 2013

The Military’s Role in Defending Computer Networks and Executive Offensive Attacks – Report – December, 2013

Personality, Beliefs, and Identity in the Study of Individuals – Report – December, 2013

Profiling: Hezbollah – Case Analysis Report – December, 2013

Conformity in Terrorist Groups – Report – December, 2013

Propaganda: Northern Ireland, Hamas, Hezbollah, and the Shining Path – Case Analysis Report – December, 2013

Mad Dog Adair: Motives, Social Identity, Attitudes, & Egocentric Bias – Report – December, 2013

Propaganda as a Psychological Tool – Report – December, 2013

Social Psychological Concepts: Northern Ireland – Report – December, 2013

Psychological Variables in Understanding Terrorism – Report – December, 2013

Course of Action: Hypothetical “Denial of Service (DoS)” Attack – Memorandum – January, 2014

Computer Network Exploitation, Computer Network Defense, and Computer Network Attack – Report – January, 2014

Challenges of Attribution – Report – January, 2014

Social Networks and Cyber Intelligence Techniques – Report – January, 2014

No Current Cyber-War? – Report – January, 2014

Finalizing a Policy Structure for Authorities in the Cyber Arena – Report – January, 2014