Escolar Documentos
Profissional Documentos
Cultura Documentos
Used by special permission from Dr Tom O’Connor Email Dec 31, 2010 14:02
In law enforcement as well as government in general, the way it's usually put is by
saying intelligence is a staff, not a line function. Organizational theorists might call it an
aide-de-camp function. This means that intelligence is almost always an add-on, luxury
item for most organizations. It also means that intelligence organization usually involves a
community of equals or loose confederation of agencies trying to work together on common
priorities. Hence, the word "community" instead of "system" is frequently encountered,
as in the entity known as the intelligence community (IC), consisting of about 15 agencies
that try to work together (see graphic below). Criminal justice, has of course, always
strived to work as a system, and it's ironic that people-processing organizations tend to
organize in terms of systems while information-processing ones do not.
The CIA of yesteryear is gone. The DCI position was established to be the President’s
principal advisor with regards to national security intelligence since the 1947 National
Security Act. It placed the DCI in charge of the CIA and made him the titular head of the
U.S. intelligence community. Over the years, the CIA was an easy target of criticism, being
accused of everything from AIDS to crack cocaine to missing the breakup of the Soviet
Union (all untrue). However, it did fail to predict the attacks of 9/11, incorrectly assessed
Iraq’s WMD program, and more recently has suffered from leaks and petty jealousies.
The Intelligence Reform and Terrorism Prevention Act of 2004 removed the DCI from a
prominent role, and replaced him with a Director of National Intelligence (DNI), who not
only has the President’s ear, but also has budgetary control over the Intelligence
Community (something the DCI never had).
Intelligence is information for action, in its most basic form, consisting of: (1) strategic
foreign intelligence, or information relating to the capabilities, intentions, and activities of
foreign powers; (2) counterintelligence, which is information or activities conducted to
protect against espionage and the penetration of US assets by foreign intelligence services;
and (3) covert action, which are clandestine activities designed to influence events abroad
without the role of the United States being apparent. Intelligence plays a crucial role at
achieving national security goals. For example, as Silver et. al. (2005) point out,
intelligence can help maintain world peace and order by reducing the risks of international
conflict. It can also help the United States better compete, politically and economically. It
can greatly assist diplomatic and military efforts to stop the spread of unconventional
weaponry. And finally, it plays a self-evident role in defending or protecting the United
States and its allies by combating the threats of terrorism, transnational crime, and other
sources of international violence.
Note: the above graphic comes from the NIC website dated April 2004, and doesn't include the Coast Guard,
which would be the 15th agency listed between the Marine Corps and National Geospatial Intelligence. It also
doesn't reflect the NID position or other reforms added in December 2004 by passage of S.2774. A more modern
graphic appears below:
Although one can make almost anything out of organization charts, it should be noted
that there's nothing represented here which would suggest a strict chain-of-command. One
should know that some IC agencies were created by statute, others as cabinet-level
agencies, and others as tied to the military, and the whole thing is mostly run by Executive
Orders. There is little to no proof that the "Intel as tool of the Executive branch" thesis is
true. The whole intelligence community collectively works for the notions of national
security and vital interests. The opposing notion has little standing, although Chief
Executives sometimes hold it dear, and often get in trouble for it, as when a President says
something like a NIE ought to be declassified -- true, they have that authority -- but events
like the Valerie Plume affair make it clear that sometimes -- to counter leaks from
elsewhere -- a President will violate one principle of intelligence to salvage another.
Executive privilege plays a big role in intelligence, but there are countervailing principles.
One such countervailing principle is that intelligence must never be classified or
declassified for political purposes.
Many principles, or best practices, derive from the way intelligence officials (or workers
in any job) "read the minds" (so to speak) of their superiors. It doesn't take a genius to
know what the boss likes, especially when intuition is supported by strong patriotism. A
common way for the process to work is that word comes down (usually from the National
Security Advisor or someone on the National Security Council) that the President has
directed or is thinking about planning to detect the intentions and capabilities or what-
have-you of some identified group which represents a threat to our national security or
vital interests. Hundreds of national security planners then go to work devising plans
based on the best intelligence that can be gathered and analyzed. All the military-related
bureaus tend to think along the lines of hard-line plans, and all the political bureaus under
White House jurisdiction tend to think along political lines. Bureaus like the CIA will
think along all the alternative lines, like what is in the best economic interests or has
psycho-political implications. After a period of time, about a dozen or so "good" plans
emerge and come to the attention of various supervisors. These plans must then go
through three stages involving the following suborganizations:
Stage 1 -- the Deputies' Committee, made up of the No. 2s, or Vice-Presidents of the
main national security agencies. This Deputies Committee or Council generally
consists of people with titles like "undersecretary," "deputy," or "chief of staff."
Stage 2 -- the Principals' Committee, made up of the U.S. Vice President, National
Security Advisor, head of the CIA (now ODNI), Secretary of State, and Secretary of
Defense.
Stage 3 -- the approval of the President himself, and it is incumbent upon the Vice
President to pass something along.
Only when a plan has passed all three stages is it signed off on, and if there is an actual
"plan" in the document, signoff will typically be accompanied by a Presidential Directive,
Presidential Decision Directive (PDD), or Executive Order as a fully "actionable"
intelligence plan.
The process is regulated by all three branches of government: by the executive branch
via Justice Department signoff (the Office of Intelligence Policy and Review) on IC agency
procedures; by the legislative branch via select committee oversight, particularly the Senate
Select Committee and the House Permanent Select Committee (where the continuing
controversy has been whether these committees can compel the executive branch to release
classified information); and by the judicial branch via FISA's Foreign Intelligence
Surveillance Court and judicial relief via FOIA requests (although doctrine in Totten v. US
(1875) and the "state secret privilege" in US v. Reynolds (1953) tend to limit the judiciary
from an active role in intelligence law). In addition, whistleblowers and leaks tend to
permeate the system, serving a type of regulatory function. Personnel rules, regulations,
and discipline also tend to be rather stringent for employees of intelligence agencies.
A number of items fall under the definitional umbrella of national security, but what
exactly does the term mean? The U.N. Charter defines national security as "safety from
foreign coercion or intimidation." The Federalist Papers define it as "safety from a variety
of circumstances and protection of freedom-loving people everywhere." The Constitution
mentions it within the international law of maritime regulation and law of the sea. History
is replete with precedents, both legal and otherwise, where the scope of America's definition
of national security has evolved over the years. For a better understanding, let's start with
the classic statement of the Monroe Doctrine (1823) where President James Monroe said:
Numerous other treaties and alliances spell out the nature and character of American
national security. Regional treaties, like NATO, SEATO, and CTO, consider an attack
against one to be an attack against all, and it was SEATO that provided the basis for
unilateral "police action" in Vietnam, as well as NATO and CTO which provided the basis
for multinational force against Yugoslavia and Iraq. Territorial-based notions of national
security tend to operate under a "domino theory" that if one country falls, neighboring
countries will be next. Modern versions of domino theory exist involving esoteric fields like
geostrategic economics, which takes into consideration airspace, water currents,
meteorological uniqueness, as well as a number of other globalization factors.
More recent Presidents have expressed their own doctrines. President Reagan, for
example, declared the support of backing anti-guerrilla forces throughout the world, and
President Clinton advocated a doctrine of isolating enemies from participation in the world
community. It's far too easy to dismiss these doctrines as rhetoric or as excuses for
American imperialism. There are fundamental values and ideals at stake. The principles
that guide intelligence don't exist in some legal shadow world. They come from the guiding
vision of chief executives. In a very real sense, what matters are the actions carried out in
the name of principle, and the hard part is figuring out a principled response to the degree
of threat to vital interests, which might be referred to as national security dangers. For
classification purposes, such dangers can be grouped as follows:
There have been 20 preventive wars launched by the great powers over the last three
centuries. Pearl Harbor, for example, was a preemptive strike. Democracies tend to avoid
them, and politicians are often concerned that voters will toss them out of office if they
over-reach. The current US-UN regime (if it could be called that) is based on the
preferance for an alliance or coalition, but America's history of unilateral action has also
relied upon strategies of destabilization, deterrence, and dissuasion. As Walzer (2000) puts
it, first strikes can be justified before the moment of imminent attack if the point of
"sufficient threat" has been reached. This concept has three dimensions: "a manifest
intent to injure, a degree of active preparation that makes that intent a positive danger,
and a general situation in which waiting greatly magnifies the risk." This explanation
highlights the connections between the notion of "threat" and the term "vital interests."
The following are the standard vital interests of any country, particularly the United
States:
There are many quaint customs regarding intelligence law, or the "law of silent
warfare" as it is sometimes called. Although the United States is fairly unique among
nations in the statutory establishment of civilian intelligence agencies, many intelligence
activities are recognized as military activities under international law. During wartime,
intelligence is an accepted practice governed by the laws of war as are any intrusions into
foreign territory. It is safe to say that no nation invites or permits spying against itself.
Spies are punished, not so much as violators of international law, but to make that method of
collecting intelligence dangerous, difficult, and as ineffective as possible. The Hague IV
Convention (1907) and the Vienna Convention on Diplomatic Relations (1961) both
recognize the legitimate right of nations to employ spies. Getting caught for spying in
peacetime is a criminal offense; getting caught for spying in wartime is a war crime offense.
These penalties exist to serve as disincentives to spying, not because spying is completely
banned or outlawed. In fact, Article 31 of the Hague Convention actually prohibits
conviction of a spy for a previously successful mission if captured during a subsequent
mission.
Not all spies are prosecuted. The most common defense is diplomatic immunity. Agents
with diplomatic status enjoy immunity from criminal prosecution. When diplomats get
caught spying, they are deemed persona non grata, asked to leave, or sometimes kidnapped
and exchanged under some spy or diplomatic exchange program. Counterintelligence is a
different ballgame where the effort is to check on one's own people for leaks, moles, and
double agents. As such, counterintelligence creates the potential for more violations of civil
and criminal law, such as domestic eavesdropping.
Oversight committees exist in both houses of Congress over intelligence; i.e., the Senate
Select Committee on Intelligence and the House Permanent Select Committee on
Intelligence. These OVERSIGHT committees make it their business to see that funds are
not specifically used to overthrow the governments of other nations. Oversight also has
some investigative authority to force the President to turn over classified information not
normally revealed to Senators or Congressmen. There are also oversight mechanisms in
place within the Executive Branch. Just as the FBI is legally supervised by the Attorney
General, other agencies, like the CIA and NSA, have counterparts in the form of General
Counsels or Inspector Generals. In addition, the National Security Council and two other
boards, the PFIAB (President's Foreign Intelligence Advisory Board) and PIOB
(President's Intelligence Oversight Board), exercise oversight functions. The NSC does this
by considering many different points of view. PFIAB and PIOB audit IC agency policies
and procedures. Other laws exist which are related to terrorism and homeland security,
but many of these are only indirectly related to intelligence law.
Secrecy and security are important. The intelligence community works with lists the
same way homeland security works with databases. Certain federal employees and certain
employees in the private sector are required to have security clearances because their job
requires them to have access to classified documents. A "need to know" must accompany
the possession of a security clearance, and in this way, information is not only controlled
but channeled. The standard intelligence community approach to security clearance
involves an all-or-nothing "risk avoidance" approach (compared to a risk management
approach which might be found in homeland security). Security extremes are the norm.
Various work takes place in secured facilities by secured individuals with secure
documents. The occupant of any such job would be said to have much more than a
"sensitive" position, defined as "any position, by virtue of its nature, could bring about a
material adverse effect on national security." At any given time, there are about 3 million
people with security clearances. In addition, there are about 2 million security clearances in
the hands of private contractors and consulting firms. Contractors participate in what is
called the industrial security program administered by the Defense Industrial Security
Clearance Office (DISCO) which is part of the Joint Information Systems Technology
(JIST), a military agency. Manufacturers of technology (broadly defined as computer
technology and anything that could be used for military purposes) must abide by
regulations set down by the Bureau of Export Administration (BXA) which maintain a
number of lists: Commerce Control List (CCL), Entity List, Denial List, and Debarred List.
One out of every thirty Americans has some sort of security clearance. It has been
estimated that one out of every thousand can be expected to compromise the secrets they
are entrusted with. Some need money, some can be blackmailed, some are disgruntled, and
some are just sloppy. American industry is a prime target for espionage as well as domestic
terrorism and white collar crime. A security clearance is technically a license issued by a
department head of a department, division, or agency of the federal government, and the
type of security clearance one can be approved for also depends upon the department,
division, or agency involved. Wikipedia has a really good article on Classified Information
Systems, with illustrations, and Wikileaks can be a real eye-opener. Although there are
dozens of different types of security clearances (see Security Clearance Central for a
complete list), the basic six are:
The SECRET and TOP SECRET categories were added around 1950, and were
originally intended for non-military applications such as scientists working on government
projects. Further, these two levels were intended to allow quick upgrading and
downgrading of information. Top secret classifications almost always have some amount of
military involvement in the clearance process, as these types of licenses are typically found
in agencies like the CIA or NSA. One of the differences between secret and top secret is
how "expansive" the background check is, i.e., how far and deep the investigation goes
(aka "full scope") into your dependents, friends, and relatives. SCI classification is only
cleared for a few people, and the background investigation process as well as the continual
monitoring is extremely intensive. The amount of time it takes to receive a security
clearance is usually 6 months to a year, if all goes well. Rarely if ever are temporary
clearances granted while waiting for the review process to conclude.
Certain countries and entities within countries are barred completely from receiving any
information of vital interest to the United States. These "lists" are similar to lists of parties
which have been denied export of technology from the U.S. They are effectively under an
EMBARGO, and some obvious examples include Iran, North Korea, Cuba, and Syria.
Suspect countries which require a permit to do business with are called Tier 3 countries.
Tier 3 designation lists are put out by State (for human rights violations), Commerce (for
economic violations), and a number of other cabinet agencies. The names of known spies
are routinely included on a Denied Persons List, and an even more interesting list is the
Entity List, which are essentially organizations a little too closely linked to foreign
intelligence services. A sample of the Entity List appears below:
The number of employees and budget of the CIA cannot be publicly disclosed. However,
the budget was $26.6 billion in fiscal year 1997 and $26.7 billion for fiscal year 1998, two
years in which those figures leaked out. The Central Intelligence Agency does not give
public tours of its buildings, except limited ones for academic and civic groups. The CIA
releases millions of pages of documents each year. Much of this is material of historical
significance that has been declassified under Executive Order 12958 (a presidential order
outlining a uniform system for handling national security information) or the Freedom of
Information Act. The Agency handles thousands of cases each year and maintains the
CIA’s Electronic Document Release Center at www.foia.ucia.gov to release this
information to the public and to provide guidance for requesting information. Some
released information of significant public interest or historical value is also available at the
National Archives and Records Administration. Specific copies of any previously
declassified records are available directly from the CIA office. Many documents, including
the CIA World Fact book, reports on foreign economic or political matters, maps, and
directories of foreign officials are also available in hard copy. Most CIA publications are
classified, however, and are not publicly available.
By law, the CIA is specifically prohibited from collecting foreign intelligence concerning
the domestic activities of US citizens. Its mission is to collect information related to foreign
intelligence and foreign counterintelligence. By direction of the President in Executive
Order 12333 of 1981 and in accordance with procedures issued by the Director of Central
Intelligence and approved by the Attorney General, the CIA is restricted in the collection
of intelligence information directed against US citizens. Collection is allowed only for an
authorized intelligence purpose; for example, if there is a reason to believe that an
individual is involved in espionage or international terrorist activities. The CIA's
procedures require senior approval for any such collection that is allowed, and, depending
on the collection technique employed, the sanction of the Attorney General and Director of
Central Intelligence may be required. These restrictions on the CIA have been in effect
since the 1970s. Likewise, only the president can direct the CIA to undertake covert action,
and such actions usually are recommended by the National Security Council when the
NSC judges that foreign policy objectives may not be fully realized by normal diplomatic
means and when military action is deemed to be too extreme an option. Once tasked, the
Director of Central Intelligence must notify the intelligence oversight committees of the
Congress. With terrorism, the CIA works with friendly foreign governments and shares
pertinent information with them. The CIA also plays a crucial role in combating drug
trafficking by providing intelligence information to the Drug Enforcement Administration,
the Federal Bureau of Investigation, and the State Department
Prior to creation of the ODNI position, the DCI (Director of Central Intelligence) was the
primary adviser to the President and the National Security Council on national foreign
intelligence matters. He or she is the head of the Central Intelligence Agency and of such
other staff elements as are required for the discharge of his Intelligence Community
responsibilities. It appears under recent reforms that the DCI (sometimes abbreviated
D/CIA) is in charge of day-to-day operations while the ODNI is in charge of strategy. The
various deputy director offices are described next. The Deputy Director of Central
Intelligence (DDCI) acts for and exercises the powers of the Director in his absence or
disability. The Deputy Director of Central Intelligence Community Management (DDCI/CM)
develops the budget for collection, and also overseeing analysis. The Executive Director
(EXDIR) is the Agency's Chief Operating Officer, and manages the CIA on a daily basis.
The Associate Director of Central Intelligence for Military Support (ADCI/MS) coordinates
with the various Joint Force commanders. The Chairman of/and National Intelligence
Council concentrate on the substantive problems of particular geographic regions of the
world such as economics and weapons proliferation by producing National Intelligence
Estimates. The Deputy Director for Administration (DDA) is the senior business manager.
The Deputy Director for Intelligence (DDI) manages the production and dissemination of
all-source intelligence analysis on key foreign problems. The Deputy Director for Operations
(DDO) has primary responsibility for the clandestine collection of foreign intelligence,
including human source intelligence, but in late 2005, it appears the DDO is being
incorporated into a DD/NCS (Deputy Director of National Clandestine Service). The
Deputy Director for Science and Technology (DDS&T) is responsible for creating and
applying innovative technology to meet today's intelligence needs. The General Counsel
serves as the legal adviser to the DCI and is responsible for the conduct of all the Agency's
legal affairs. The Inspector General promotes efficiency, effectiveness, and accountability in
the administration of Agency activities.
SELECTED AGENCY FOCUS: THE NSA
The NSA is relatively (not completely) free from legal restrictions because it wasn't
established by Congress like the CIA was with the National Security Act of 1947. That the
NSA was created through an executive order rather than by Congress is purely a
constitutional issue. The NSA never needed approval from Congress because the purpose
of the NSA is a function of the executive branch in terms of national security. Had
Congress wished to create the NSA, they would have had no constitutional basis to do so.
The NSA is guided by a series of executive orders called United States Signals Intelligence
Directives, or USSIDs. USSIDs are classified, some more than others, but none are
releasable to the public. NSA employees, whether military or civilian, are strictly
monitored to prevent the possibility of intelligence collection on U.S. citizens. The only two
people who can authorize the collection of intelligence on any U.S. citizen are the Attorney
General and the President. The NSA is also directed in its operations by the CIA, its major
customer for information outside of the military services. Ten units comprise the NSA
organizational structure.
The Defense Intelligence Agency (DIA) was established in 1961 to coordinate all the
intelligence activities of the military services. The DIA serves as the intelligence agency for
the Joint Chiefs of Staff as well as the Secretary of Defense, but during war, takes on a
more active role in providing battlefield intelligence to theatre commanders. The DIA
relies extensively on the NRO (National Reconnaissance Office) for satellite information,
the NSA for cryptoanalysis, and the CIA for human intelligence. Traditionally, the DIA
has lived within the shadow of the CIA, but in 1995, it was authorized to operate its own
agents and actions overseas. The DIA is always headed by an admiral or general. Its HQ
is the Pentagon, and the main Analysis Center is at Bolling Air Force Base. Since 1991, the
DIA has operated its own television network, a closed circuit, encrypted telecast only
available at about 1,000 offices around the world, including all military bases. The
telecasts are similar to a CNN news channel. The DIA has also in recent years been
involved in providing assistance to U.N. peacekeeping forces and to U.S. antidrug agencies
like the DEA and FBI. About 60% of DIA staff are civilians, and it has become a good
entry-level job area for college students interested in intelligence work.
The DIA is organized into 4 units: The National Military Production Center --
responsible for threat assessments to aerospace, maritime, and ground establishments; The
National Military Intelligence Collection Center -- responsible for the military attaché
system and HUMINT; The National Military Intelligence Systems Center -- responsible
for information services, reference & libraries, computer support; The Defense
Intelligence College -- responsible for postgraduate education in intelligence curriculums
(MS in strategic intelligence), training of attaches, and seminars. Renamed the Joint
Military Intelligence College in 1993.
The DIA is a rather large collection of many organizations, some of which are high-
profile. They generally release their intelligence in the form of CD-ROMs which often
contain spectacular artwork and graphics. Besides the weapons capability of enemies, the
DIA is also involved with Unidentified Flying Objects (UFOs), Geographic Imagery,
Zoology, Entomology, and handbooks on Poisonous Snakes, Small-Caliber Ammunition
Identification Guide, Paraphysic R&D, Parapsychology Research, Controlled Offensive
Behavior, and identification of Global Threats and Challenges.
The FBI is part of the Intelligence Community, but not normally an intelligence
gatherer. It's mandated by federal law to be the "lead" or agency out in front during any
investigation of espionage. It is therefore America's premiere counterespionage agency,
which is similar to the CIA's counterintelligence function abroad. The difference is that the
FBI use law enforcement mechanisms to prevent secrets from falling into the hands of
enemy agents, and do not use deception, disinformation, or other countermeasures to feed
false secrets into the hands of enemy agents. The FBI can arrest people, but typically not
outside the United States. The CIA, on the other hand, cannot arrest people, but can
operate outside the United States. The ban on geographical jurisdiction is not applied very
strictly. For the FBI, the restriction has been lifted to allow FBI agents to operated in
foreign embassies as "attaches", and certain FBI agents are allowed to make arrests
overseas and bring the suspect to trial in the United States.
The Bureau's involvement in intelligence work goes back to World War I, when it
assisted Army Intelligence in rounding up spies and saboteurs, as well as establishing a
system of informants known as the Protective League, which consisted of American citizens
(vigilantes) who spied and snitched on suspected German infiltrators. The Bureau then
had remarkable success at recruiting "Junior G-men" during Prohibition. The FBI had an
excellent snitch system in place to deal with bootleggers and the rise of organized crime,
but there was a growing law enforcement movement over in Treasury, so the duty of
enforcing Prohibition did not really fall in the FBI's lap. As the story goes, a young file
clerk named J. Edgar Hoover made a name for himself as a zealous pursuer of
anarchists, radicals, and subversives. In 1924, he became director of the FBI, and never
ceased to zealously pursue such people until 1972. In the hands of Hoover (and reportedly,
also with the approval of President Roosevelt), the FBI became a counter-subversion
agency. Such domestic intelligence (or internal state security) activities are basically
incompatible with a constitutional democracy.
For example, Congress banned wiretapping in 1934, but the FBI continued to use it
because Hoover interpreted the law to not prohibit wiretapping per se, but the disclosure of
information obtained by wiretapping. The FBI also pioneered the use of blacklisting, or
putting together numerous "FBI files" on millions of people: celebrities, heroes, politicians,
teachers, anyone in a position of public influence. Hoover also authorized the use of
surreptitious entry, or break-ins, what in tradecraft is called a "black bag job" to obtain
copies of files or materials or to plant bugs and telephone wiretaps. Hoover got called on
the carpet for this in 1966, and promised to stop it; and of course, President Nixon got
caught on it with Watergate in 1971. In a little known act by President Reagan in 1981, the
government re-established in itself the power to conduct black bag jobs, provided that they
had Attorney General approval. The Foreign Intelligence Surveillance Court (FISC) also
holds hearings to approve break-ins when considered necessary for national security
reasons.
Hoover seemed to have it out for two groups in society: college professors and black
revolutionaries. He also had a thing against Jehovah's Witnesses because they wouldn't
salute the flag. The FBI's COINTELPRO (for Counterintelligence Program) was launched
in 1956 and was a spying on college campuses operation (aka CODE NAME CHAOS)
which collected the names of over 7,000 students and professors suspected of being
communist sympathizers. Many of these professors were criminal justice professors, a
discipline that was starting to emerge in the 1960s, and Hoover apparently didn't want this
discipline to emerge at all since he thought anything to do with training or education in law
enforcement needed to stay in the hands of law enforcement. In 1993, Congress authorized
the FBI to go to Russia and help them fight organized crime using their counterintelligence
skills. In 1994, the FBI scored a coup with catching a spy in the CIA called Aldrich Ames.
In response, President Clinton immediately make the FBI the primary agency for
counterintelligence as well as counterespionage in a memorandum. The FBI was elevated to
the point where one of their representatives would be rotated in as head of the Intelligence
Community every four years. It is important to note that the FBI can operate overseas
now.
J. EDGAR HOOVER
From 1924 to 1972, Hoover (the Boss) was the FBI, and the most powerful man in
government, with a dossier on every important person in society. He possessed a Bachelors
and Masters of law degree from George Washington University, and was a bachelor who
lived with his mother until her death in 1938, and then lived there alone. Claims that he was
a closet homosexual were never proven. Hoover had President Roosevelt's blessing for just
about anything, but Truman stood up to Hoover. Hoover constantly used the existence of
mistresses to pressure Presidents Eisenhower, Kennedy, and Johnson. The Nixon
administration trusted Hoover at first, but then developed its own apparatus, and Hoover
died in office shortly after the Nixon reelection. Most of his personal records were
destroyed. Hoover knew how to run an excellent publicity campaign. His name and by-line
became synonymous in the nations' newspapers and magazines as the relentless hunter of
spies and crooks. Many of the magazines we see today, like Popular Detective, etc., are a
remnant of that era and the Hoover legacy. As anyone who's seen the cover of these things
knows, they are especially lurid and appeal to a sexy mystique about detective work that
probably wouldn't be there if it wasn't for Hoover. His ability to leak information to the
press was the source of his power. Hoover capitalized on August Vollmer's success with
crime labs, and for awhile, the FBI crime lab was the best in the world. Subsequent
directors have struggled with restructuring the agency.
Getting back to the definition of intelligence, it might be helpful to lay out what types of
activities intelligence is involved in. Shulsky & Schmitt (2002) make the case that there are
four (4) "elements" of intelligence: collection; analysis; covert action; and
counterintelligence (or CI). Collection refers to the gathering of raw data, through
espionage, technical means, other sources, open sources, and any other manner. Analysis
refers to the processing of information to make it useful to policy makers and military
commanders. In the vast majority of cases, the information to be processed is only
fragmentary, so it is the job of the analyst to make judgments about the capabilities and
intentions of the enemy on the basis of partial information. To some extent, this is the same
as forecasting or estimation. A basic tenet or principle in intelligence studies is that you
keep your collection people separate from your analysis people because you don't want one
group biasing the other group.
Covert action seeks to influence the politics, economics, or social phenomena of an enemy
or ally by influencing the course of events, either directly or indirectly. It can range from a
planned campaign of persuasion or propaganda to a full-fledged paramilitary operation.
Covert action has been described by many experts as "an activity midway between
diplomacy and war." A basic tenet or principle in intelligence studies is that your covert
action teams should not be a regular part of the intelligence community.
INTERNET RESOURCES
Avoiding the Burden of the Carter Doctrine in Perspective
FISA and the Fourth Amendment
Is There a Clinton Doctrine of National Security
Loyola Univ.'s Strategic Intel Page
Project WhistleStop: The Truman Doctrine Archive
Proposals for Reform within the Intelligence Community
The Roosevelt Corollary to the Monroe Doctrine
Website of the Rome Statute International Criminal Court
CIABASE
Crimes by the CIA
Philip Agee on the CIA
CIA Document Release Center
CIA Employment Page
CIA Publications
CIA Web Site Search
CNN In-depth Report on NSA
Cryptome
Eschelon Watch
Federation of American Scientists
Map of Eschelon Network
NSA Website
Defense Intelligence Agency
Joint Military Intelligence College
The FBI & National Security 1993-1998 Director's Report
FBI Employment Page
FBI Record System Classification Codes
PRINTED RESOURCES
Bamford, James. (2001). Body of secrets. NY: Doubleday.
Bowman, M. (2007). "Dysfunctional information restrictions." The intelligencer 15(2): 29-
37.
Breckinridge, Scott. (1986). The CIA and the U.S. intelligence system. CO: Westview.
Brownlie, M. (1963). International law and the use of force by states. NY: Oxford Univ.
Press.
Byers, M. (2002). "Terrorism." 51 International & Comparative Law Quarterly 401-02.
Chalk, P. (2000). Non-military security and global order. NY: Palgrave.
Christol, C. (2004). International law & U.S. foreign policy. Lanham, MD: Univ. Press
America.
Cline, Ray. (1991). The CIA under Reagan, Bush & Casey. NY: Acropolis.
Colby, William & P. Forbath. (1978). Honorable men. NY: Simon & Schuster.
Cook, Terry. (1999). Big brother NSA & its little brother. NY: Hearthstone.
Cothran, H. (2003). The CIA. San Diego: Greenhaven Press.
Dulles, A. (1963). The craft of intelligence. NY: Harper Collins.
Dycus, S. (1997). National security law. NY: Aspen.
Franck, T. & M. Glennon. (1993). Foreign relations and national security law. Belmont:
West/Wadsworth.
Jeffreys-Jones, R. (2003). The CIA and American democracy. New Haven: Yale Univ. Press.
Johnson, Loch. (1989). America's secret power. NY: Oxford.
Kessler, Ronald. (1992). Inside the CIA. NY: Pocket Books.
Kessler, Ronald. (1993). The FBI. NY: Pocket Books.
Krizan, L. (1999). Intelligence essentials for everyone. Washington DC: JMIC.
Laqueur, Walter. (1985). A world of secrets. NY: Basic.
Lowenthal, M. (1999). Intelligence. Washington D.C.: CQ Press.
Marchetti, Victor & J. Marks. (1974). The CIA & the cult of intelligence. NY: Knopf.
Moore, J., F. Tipson & R. Turner. (1990). National security law. Durham: Carolina
Academic Press.
O'Connor, T. (2003). "Technology of intelligence" in The Encyclopedia of Intelligence and
Counterintelligence, edited by R. Carlisle. Armonk, NY: M.E. Sharpe, Inc.
Odom, W. (2003). Fixing intelligence. New Haven: Yale Univ. Press.
Parks, W. (1990). "The international law of intelligence collection" pp. 433-42 in Moore,
Tipson & Turner, National security law. Durham: CAP.
Ramraj, V., Hor, M. & Roach, K. (Eds.) (2005). Global anti-terrorism law and policy. NY:
Cambridge Univ. Press.
Ranelagh, John. (1987). The agency. NY: Touchstone.
Sharp, W. (1999). Jus paciarii. NY: Paciarii International.
Shulsky, A. & Schmitt, G. (2002). Silent warfare. Washington D.C.: Brassey's.
Silver, D., Hitz, F. & Ariail, S. (2005). "Intelligence and counterintelligence." Pp. 935-966
in Moore & Turner National security law. Durham, NC: Carolina Academic Press.
Sorley, Lewis. (1990). The CIA. VA: AFIO.
Swenson, A. & M. Benson. (2003). The complete idiot's guide to the CIA. Indianapolis:
Alpha Books.
Theoharis, A. & J. Cox. (1988). The Boss. Temple Univ. Press.
Troy, T. (1991). "The correct definition of intelligence" International Journal of
Intelligence and Counterintelligence 5(4):433-54.
U.S. Government. (2001). DIA history & documents CD-ROM. NY: Progressive Mgt.
Walzer, M. (2000). Just and unjust wars. NY: Basic.
Westerfield, B. (1995). Inside CIA's private world. New Haven: Yale Univ. Press.
Wingfield, T. (2000). The law of information conflict. NY: Aegis Research.