Not everything that can be counted counts,
and not everything that counts can be counted.
--- Albert Einstein
Only puny secrets need protection.
Big discoveries are protected by public incredulity.
--- Marshall McLuhan
National Intelligence Strategies
General Sources
- See also same section on Cyberspace & Information Operations Study Center
- Intelligence.gov
- Congressional Research Service (CRS) reports on intelligence, local copies
- A Strategic-Level Intelligence Advisor’s Lessons Learned (local copy), by Chang, in Military Review, July-August 2012
- People's Liberation Army Air Force 2010 (local copy), from the National Air and Space Intelligence Center (NASIC)
- 2005 International Conference on Intelligence Analysis, May 2005, sponsored by the Office of the Assistant Director of Central Intelligence for Analysis and Production - many papers/briefings posted on variety of intelligence topics
- Intelligence Links & Resources, Intelligence Forum
- September 11 and the Imperative of Reform in the U.S. Intelligence Community (local copy), additional views of Senator Richard C. Shelby, Vice Chairman, Senate Select Committee on Intelligence, 10 Dec 2002
- IC21: The Intelligence Community in the 21st Century (local copy), staff study, Permanent Select Committee on Intelligence, House of Representatives, 104th Congress, 1996
- The Information Edge: Imagery Intelligence and Geospatial Information in an Evolving National Security Environment, the NIMA Commission report
- Defense Science Board (DSB) reports
- OSS.NET source for distributed intelligence research & white papers
- National Security Archive, at George Washington Univ., with declassified documents and analysis of the role of intelligence in various wars and operations
- Digital National Security Archive
- The Literature of Intelligence: A Bibliography of Materials, with Essays, Reviews, and Comments, by Clark, Muskingum College
- Federation of American Scientists (FAS), variety of weapons and intel links and material
- Stratfor.com, global intelligence updates, including newsletter
- Association of Former Intelligence Officers (AFIO), with educational materials, issues pieces, etc.
- Freedom of Information Act (FOIA), full text
- Intelligence (INT) online, French electronic newsletter, by paid subscription, some free samples online
- Intelligence Online, also available in French, some free stuff, rest by subscription account
- Africa Intelligence, also available in French, some free stuff, rest by subscription account
- Surprise and Intelligence: Towards a Clearer Understanding, by O'Leary, in Airpower Journal
- An Historical Theory of Intelligence, by Kahn
- These three principles of intelligence – it optimizes resources, it is an auxiliary function in war, and it is essential to the defense but not to the offense – seek to explain intelligence’s operation and its place in the universe, just as the theory of the rise of verbal intelligence seeks to explain how intelligence became as important as it is. But what must intelligence do to improve? What problems must it resolve? What is its future?
Threat Analysis
Not everything that can be counted counts,
and not everything that counts can be counted.
--- Albert Einstein
- See also
- DoD Office of Net Assessment
- DTRA Threat Anticipation Project Overview (local copy), by Patil, Perry, and Hamon, August 2005 white paper, including discussion of
- Joint Threat Anticipation Center (JTAC) - operated collaboratively by the University of Chicago and Argonne National Laboratory
- Cultural Simulation Model (CSM)
- Threat Anticipation Project Multi-Agent Simulation (TAPMAS)
- Improving CIA Analytic Performance: Strategic Warning (local copy), by Davis, occasional paper for CIA's Sherman Kent Center for Intelligence Analysis - includes discussion of "Substantive Uncertainty and Strategic Warning" and "Analytic Tradecraft for Managing Substantive Uncertainty" and "Averting Strategic Surprise through Alternative Analysis" (HTML version)
- Improving CIA Analytic Performance: Analysts and the Policymaking Process (local copy), by Davis, occasional paper for CIA's Sherman Kent Center for Intelligence Analysis
- Improving CIA Analytic Performance: DI Analytic Priorities (local copy), by Davis, occasional paper for CIA's Sherman Kent Center for Intelligence Analysis
- Death and Life in the Power of Language: How Words Might Reveal Developing Threats (local copy), by Chew, page 5 of News & Views, Sandia Labs, Jan 2005 - using linguistic analysis, such as Latent Semantic Analysis (LSA)
- Out of the Ordinary - Finding Hidden Threats by Analyzing Unusual Behavior, RAND report, 2004
- Know Thy Enemy: Profiles of Adversary Leaders and Their Strategic Cultures, Schneider and Post, Editors, USAF Counterproliferation Center (CPC) - includes chapters on al-Qaeda and other radical Islamists
- Al-Qaeda: the Threat to the United States and Its Allies (local copy), Congressional hearing, April 1, 2004
- Success in the War on Terrorism (local copy), 24 Feb 04
..... testimony of Director of FBI, Robert S. Mueller, III
- Current and Projected National Security Threats to the United States (local copy), 24 Feb 04
..... testimony of Director of Defense Intelligence Agency, Vice Admiral Lowell E. Jacoby
- Threat Kingdom (local copy), by Flynt, Foreign Military Studies Office - includes table of emerging threats, means, targets, and ends (HTML version)
"In today's increasingly complex security environment, states are not the only major actors, and technology arms small groups with weapons that in the past were held only by great powers. Technology and the proliferation of knowledge have made biological, radiological, chemical and cyber capabilities available to nonstate actors. Kennan's world assumed the intent of specific state actors based on their public declarations and other information. Determining others' capabilities—for example, by counting missile silos—was essential. In today's security environment it is capability that must be assumed."
- National Counterterrorism Center (NCTC)
- Threats and Protection, Department of Homeland Security - includes current Threat Advisory level
- Intelligence and Law Enforcement: Countering Transnational Threats to the U.S. (local copy), Congressional Research Service
- Threat from Al-Qaeda, Bioterrorism, WMD/CBRNE attack, and others, including such topics as how they pick their targets
- National Threat Assessment Center (NTAC), Secret Service
- Missile Threats
- Foreign Threats to Protected Information, DSS info
- Protective Intelligence and Threat Assessment Investigations: A Guide for State and Local Law Enforcement Officials (local copy), by Fein and Vossekuil, Department of Justice, 1998
Threat Assessments
Not everything that can be counted counts,
and not everything that counts can be counted.
--- Albert Einstein
- See also
- Predicting Violent Behavior (local copy), Defense Science Board task force report, Aug 2012
- DNI Annual Threat Assessment
- 2012 Annual Worldwide Threat Assessment of the U.S. Intelligence Community (local copy), testimony before House Permanent Select Committee on Intelligence, by Director of National Intelligence James R. Clapper, 2 Feb 2012
- 2011 Annual Worldwide Threat Assessment of the U.S. Intelligence Community (local copy), testimony before House Permanent Select Committee on Intelligence, by Director of National Intelligence James R. Clapper, 10 Feb 2011
- 2010 Annual Threat Assessment of the US Intelligence Community (local copy), testimony before Senate Select Committee on Intelligence, by Director of National Intelligence Dennis C. Blair, 2 Feb 2010
- 2009 Annual Threat Assessment of the Intelligence Community (local copy), testimony before Senate Select Committee on Intelligence, by Director of National Intelligence Dennis C. Blair, 12 Feb 2009
- 2008 Annual Threat Assessment of the Director of National Intelligence (local copy), testimony before Senate Select Committee on Intelligence, by Director of National Intelligence J. Michael McConnell, 5 Feb 2008
- 2007 Annual Threat Assessment of the Director of National Intelligence (local copy), testimony before Senate Armed Services Committee, by Director of National Intelligence J. Michael McConnell, 27 Feb 2007
- 2007 Annual Threat Assessment of the Director of National Intelligence (local copy), testimony before Senate Select Committee on Intelligence, by Director of National Intelligence John D. Negroponte, 11 Jan 2007
- 2006 Annual Threat Assessment of the Director of National Intelligence (local copy), testimony before Senate Armed Services Committee, by Director of National Intelligence John D. Negroponte, 28 Feb 2006
- CIA Annual Worldwide Threat Briefings to Congress
- DIA National Security Threat Assessment
- 2012 DIA Annual Threat Assessment (local copy), testimony before Senate Armed Services Committee, by Director, Defense Intelligence Agency, Lt Gen Ronald L. Burgess, Jr., U.S. Army, 16 Feb 2012
- 2011 DIA Annual Threat Assessment (local copy), testimony before Senate Armed Services Committee, by Director, Defense Intelligence Agency, Lt Gen Ronald L. Burgess, Jr., U.S. Army, 10 Mar 2011
- 2007 Current and Projected National Security Threats to the United States (local copy), testimony before Senate Armed Services Committee, by Director, Defense Intelligence Agency, Lt Gen Michael D. Maples, U.S. Army, 27 Feb 2007
- Defense Security Service (DSS)
National Intelligence Estimate (NIE)
- National Intelligence Estimates, National Intelligence Council (NIC)
- Declassified Key Judgments of the National Intelligence Estimate "Trends in Global Terrorism: Implications for the United States" dated April 2006 (local copy)
- Sherman Kent and the Board of National Estimates - Collected Essays, book by Sherman Kent, CIA Center for the Study of Intelligence - includes the following essays/sections
- Estimates and Influence
- The Law and Custom of the National Intelligence Estimate
- The Making of an NIE
- Words of Estimative Probability, with tables of what percentage likelihood is meant by various words and phrases
- Glossary
- also, several essays looking back at the Cuban missile crisis
- Declassified National Intelligence Estimates on the Soviet Union and International Communism, 1946-1984
- Foreign Missile Developments and the Ballistic Missile Threat Through 2015, NIE, Dec 2001
- The Global Infectious Disease Threat and Its Implications for the United States, NIE, Jan 2000
New Thinking
- See also same section on Cyberspace & Information Operations Study Center
- See also Blogs, Milblogs
- DNI's Information Sharing Conference & Technology Exposition - "Intelink and Beyond: Dare to Share" - August 21-24, 2006
- 21 Aug 2006 speech by Hon. Dale Meyerrose, Assoc. Dir. of National Intelligence and CIO, and Hon. John Grimes, DoD CIO (local copy)
- 21 Aug 2006 speech by Dr. Thomas Fingar, Dep. Dir. of National Intelligence for Analysis (local copy)
- What are those objectives? One is to transform the analytic component of our community from a federation of agencies, or a collection of feudal baronies, into a community of analysts, professionals dedicated to providing the best and most timely, most accurate, most useful analytic insights to all of the customers we serve – policymakers, war fighters, and first responders; to do this in ways that draw upon the collective strength we have inside the community and the incredible amounts of knowledge that are available outside the IC, outside the U.S. government, and even outside the United States.
Central to all of this is collaboration. I always use the word collaborations rather than cooperation. Cooperation is something we make people do: Play nice in the sandbox. You will come to this coordination meeting. That’s not good enough. Collaboration must be something people are excited to do; do without thinking about; do in ways that are invisible or transparent; do because they recognize it leads to better insights, and more timely responses.
- We’re about to launch an experiment in producing a National Intelligence Estimate using the Intellipedia. I don’t know if it’s going to work. It might; it might not. But we’re going to try it– it’s going to be on Nigeria. Instead of relying on those who can make it to the meeting or happen to be in town at critical junctions to shape it, we will engage any who are knowledgeable and let the Wikipedia process operate. We’ll see if it works. We might have to tweak it. We might want to run the regular process in parallel, as we are running in parallel a number of analytic efforts where we give the same questions to an outside group using open sources as we give the community to work using all of our classified data. Exactly how much better, and on what questions, does classified information yield better insights than what we can produce using unclassified information? There are people that describe this as one of the scariest innovations that I have launched. It shouldn’t be scary; it should help analysts to direct their time and attention to where they get the biggest bang for the buck. [ed. this is just one of the initiatives discussed in the speech]
- 22 Aug 2006 speech by Amb. Ted McNamara, Program Manager, Information Sharing Environment (ISE) (local copy)
- 24 Aug 2006 speech by Dr. Eric Haseltine, Assoc. Dir. of National Intelligence for Science and Technology (local copy)
- And that led us to look at supermarkets. How many of you have supermarket discount cards? Do you know how much of your privacy you are giving up with those cards? Does anybody know? You are giving it all up. They know everything that you buy down last match, whatever. The stuff you get in your mailbox is very much determined by what you put when you scan your card. You know, they knew for example that there was a super-high correlation between the purchase of beer and diapers. (Laughter.) Right?
Now, that is not because men are all babies, as all of the women here know . (laughter) . that is because there was an interesting sociology which said, honey, would you go to the store? I have to change him; you go buy them. And honey goes to the store, and he has to buy diapers, and what else does he buy? He buys beer. So if you buy a certain kind of beer, you're likely to get a direct mailing for pampers. (Laughter.) Okay?
- At NSA there is this habit in analysts of only looking at highly classified information on highly classified networks. When I used to come back from Iraq, having looked at just vanilla secret stuff, let alone the coalition stuff which was regarded as basically opensourced by the people at NSA, I would say, my god, there’s a treasure trove of stuff not on the intel but on SIGACTS. You know, SIGACTS, which is Significant Activity database, records from a military operations point of view everything that happened. It has huge significance for the SIGINT business. But the analysts there weren’t in the habit of doing it. I would take it and show it to them. I’d say, look, look! (Laughter.) And they were very busy. They’re not bad people. They were just extremely busy, and it was not comfortable and familiar to them to look at this non-intel, non-top-secret stuff. It was not easy. It was not simple. It was not in their comfort zone.
- I interviewed over a three-week period analysts in Baghdad when I
was out there. And that was very difficult, by the way. I used the ethologists’ technique. This is a type of psychology that has to do with observing organisms in their natural habitat without disturbing them. So these organisms were MI analysts in Baghdad. So I put on a uniform and I sat there at the terminal and did what they did, and I wrote reports and, you know, did stuff like that. And I would hang out in the laundry room and I would hijack them on their way to the chow hall or even the latrine because I didn’t want to get them out of their comfort zone, all right? They weren’t used to talking to geekazoids from headquarters while they’re trying to fight a war, but they did have to go to the laundry room, and that’s where I got quality time.
...
Well, did you know that you have a lot of single sign-on capability in federated query with Pathfinder? You got that. And they said, ahh! It’s too hard. I don’t have time to learn that.
...
So what we did was we came up with this federated query system. We called it Oggle (sp), and the letters may have kind of looked like Google. I’m not saying they may have been fooled into thinking it was Google. It wasn’t. No copyright or trademark infringement the lawyers tell me. But the fact of the matter is, they already new how to do it. It was zero learning for them, and it appeared simple. It turned out it was not at all simple because it had features where you could say what the query term was; was it a people, a person, an event, a date and so forth. But it was. it went over instantly. We monitored the usage of it, and it went up exponentially because it was perceived to be simple, and that was key to the intrinsic motivation.
- Intellipedia - a tool similar to Wikipedia, built by contributions from members of the of the U.S. intelligence community
- Open-Source Spying, by Clive Thompson, New York Times, 3 Dec 2006 - discusses need for intelligence community to use open sources and the communication techniques used on the global internet (such as instant mail and wikis and blogs)
- DARPA's Future Markets Applied to Prediction (FutureMAP)
- A "Standard & Poors 500 Index" for Intelligence: Using Prediction Markets to Enhance US Intelligence Capabilities, by Puong Fei Yeh, in Studies in Intelligence, vol. 50, no. 4, 2006
- The decision to cancel FutureMAP was at the very least premature, if not wrong-headed. The bulk of evidence on prediction markets demonstrate that they are reliable aggregators of disparate and dispersed information and can result in forecasts that are more accurate than those of experts. If so, prediction markets can substantially contribute to US Intelligence Community strategic and tactical intelligence work.
- DARPA's Policy Analysis Market for Intelligence: Outside the Box or Off the Wall? (local copy) by Looney, in Strategic Insights, Sep 2003
- Futures Markets Applied to Prediction (FutureMAP) program withdrawn (local copy), 29 July 2003 news release from DARPA
- Studies in Intelligence
- A "Standard & Poors 500 Index" for Intelligence: Using Prediction Markets to Enhance US Intelligence Capabilities, by Puong Fei Yeh, in Studies in Intelligence, vol. 50, no. 4, 2006 - discussing capabilities such as DARPA’s Future Markets Applied to Prediction (FutureMAP)
- Intelligence Analysis: A Holistic Vision for the Analytic Unit, by Kerr et al, in Studies in Intelligence, vol. 50, no. 2, 2006
- Collection and Analysis on Iraq: Issues for the US Intelligence Community, by Kerr et al, in Studies in Intelligence, vol. 49, no. 3, 2005
- The Wiki and the Blog: Toward a Complex Adaptive Intelligence Community, by Andrus, in Studies in Intelligence, vol. 49, no. 3, 2005
- How the Web Can Relieve Our Information Glut and Get Us Talking to Each Other, by Burton, in Studies in Intelligence, vol. 49, no. 3, 2005
- Intelligent Design: COIN Operations and Intelligence Collection and Analysis (local copy), by Zeytoonian et al, in Military Review, Sep-Oct 2006
- Networks: Terra Incognita and the Case for Ethnographic Intelligence (local copy), by Renzi, in Military Review, Sep-Oct 2006
- Full-Spectrum Analysis: a New Way of Thinking for a New World (local copy), by Wolfberg, in Military Review, Jul-Aug 2006
- Establishment of the National Clandestine Service (NCS), October 13, 2005
- The NCS will serve as the national authority for the integration, coordination, deconfliction, and evaluation of human intelligence operations across the entire Intelligence Community, under authorities delegated to the Director of the CIA who serves as the National HUMINT Manager.
- Manhunting: a Methodology for Finding Persons of National Interest (local copy), by Marks, Meer, and Nilson, Naval Postgraduate School, June 2005
- Unfortunately, no military doctrine, framework or process currently exists for finding and apprehending these Persons of National Interest (PONIs). Since military planners and intelligence analysts are neither educated nor trained in the methods or procedures necessary to find and capture PONIs, this thesis will propose a methodology to do so. This involves the development of an analytical process, and an organizational structure and procedure to identify and locate PONIs. Consequently, the United States government’s ability to prosecute the war on terrorism today, and to find and apprehend PONIs in the future, depends on its ability to develop and institutionalize a comprehensive manhunting strategy now.
- Advanced Research and Development Activity (ARDA)
- The Advanced Research and Development Activity (ARDA) is an Intelligence Community (IC) center for conducting advanced research and development related to information technology (IT) (information stored, transmitted, or manipulated by electronic means). ARDA sponsors high risk, high payoff research designed to produce new technology to address some of the most important and challenging IT problems faced by the intelligence community. The research is currently organized into five technology thrusts,
- Information Exploitation,
- Quantum Information Science,
- Global Infosystems Access,
- Novel Intelligence from Massive Data and
- Advanced Information Assurance.
- Latent Semantic Analysis (LSA) (Local Copy), discussed on page 6 of News & Views, Sandia Labs, Jan 2005
- We believe there is potential to apply techniques such as LSA to identify, early on, ideas which appear to be “transformational.” These are ideas which, because of their
emergent nature, are not yet on the “radar screens” of intelligence analysts, but are rapidly gaining a following.
- We Need Spy Blogs: An Army officer calls for better information gathering, by Alexander, in Wired, Mar 2005
- And why not tap the brainpower of the blogosphere as well? The intelligence community does a terrible job of looking outside itself for information. From journalists to academics and even educated amateurs - there are thousands of people who would be interested and willing to help. Imagine how much traffic an official CIA Iraq blog would attract. If intelligence organizations built a collaborative environment through blogs, they could quickly identify credible sources, develop a deep backfield of contributing analysts, and engage the world as a whole. How cool would it be to gain "trusted user" status on a CIA blog?
- The Intelligence Community: 2001-2015, by Pappas and Simon, Studies in Intelligence, Vol.46, No.1, 2002
- The New Craft of Open Source Intelligence: How the U.S. Department of State Should Lead (local copy), presentation by Robert David Steele, at a State Department forum, 24 Mar 2004
- The New Craft of Intelligence: Achieving Asymmetric Advantage in the Face of Nontraditional Threats (local copy), by Steele, Feb 2002, for Strategic Studies Inst.
- National Virtual Translation Center (NVTC)
- National Visualization and Analytics Center (NVAC) - a Department of Homeland Security resource
- Carnivore Diagnostic Tool (local copy), testimony of Donald M. Kerr, Assistant Director, Laboratory Division, FBI, before the United States Senate, the Committee on the Judiciary, September 6, 2000 (NOTE: In Jan 2005, U.S. media outlets reported that the Jan 2005 FBI report to Congress showed little or no use of Carnivore and instead reflected a turning to commercially produced software.)
- Independent Technical Review of the Carnivore System (local copy), Final Report, done for DoJ
- In-Q-Tel: A New Partnership Between the CIA and the Private Sector
- Realistic Evaluation of Terrain by Intelligent Natural Agents (RETINA) (local copy), NPS thesis by Burgess, 2003 - discusses modeling of human movement tendencies
- Swarm Intelligence resources at NASA
- Swarm Intelligence (SI) is the property of a system whereby the collective behaviours of (unsophisticated) agents interacting locally with their environment cause coherent functional global patterns to emerge. SI provides a basis with which it is possible to explore collective (or distributed) problem solving without centralized control or the provision of a global model.
- other swarm intelligence references - especially as used by businesses
- SETI@home, search for extraterrestrial intelligence, using millions of computers through a screensaver which analyzes astronomical data
- Nug30 solved using parallel computers
Organizations and Associations
Intelligence & Information Sharing
- See also Able Danger, especially Senate hearings dealing with info sharing
- See also Global Intelligence Working Group (GIWG), especially National Criminal Intelligence Sharing Plan (NCISP)
- See also lessons learned
- See also law enforcement intelligence and sharing methods mentioned there
- Below are a few of the current and/or planned systems for exchanging intelligence and information
- Intelligence Community System for Information Sharing (ICSIS)
- The FBI's Field Intelligence Groups and Police: Joining Forces (local copy), by Spiller, in FBI Law Enforcement Bulletin, May 2006
- It's Mine! Why the US Intelligence Community Does Not Share Information, by Green, SAASS paper, July 2005
- Justice Information Sharing Initiatives (local copy) - a White Paper Prepared for the Attorney General’s Advisory Committee of United States Attorneys by the Office of Justice Programs October, 2004
- Global Intelligence Working Group Information/Intelligence Sharing System Survey (local copy), Spring 2003
- Law Enforcement Information Sharing (LEIS) initiative
- DoD Instruction Number 8110.1, Multinational Information Sharing Networks Implementation
- SIPRNET - SECRET Internet Protocol Router Network (definition from DoD Dictionary)
- INTELNET - Intelligence Network
Data Mining & Privacy
- See also Able Danger
- See privacy related congressional research service reports
- See also Freedom of Information Act (FOIA) and the Privacy Act on Law page
- See also USA PATRIOT Act on Law page
- Federal Agency Data Mining Reporting Act of 2007 (local copy)
- Office of the Director of National Intelligence (DNI)
- The Privacy Office of the U.S. Department of Homeland Security
- Early Warning: NSA's Multi-Billion Dollar Data Mining Effort, by Arkin, Washington Post, May 2006 - includes "list of some 500 software tools, databases, data mining and processing efforts ... contracted for or are under development or in use at the NSA and other intelligence agencies and military commands"
- Data Mining and Knowledge Discovery journal
- Office of Information and Privacy, Dept of Justice
- RL31798 - Data Mining and Homeland Security: An Overview (local copy), Congressional Research Service report
- Data Mining and Homeland Security Applications - variety of tools and programs listed by National Science Foundation
- Monash University, Australia
- Visual Data Mining (local copy), by Wong, Pacific Northwest National Laboratory
- Data Mining - Agencies Have Taken Key Steps to Protect Privacy in Selected Efforts, but Significant Compliance Issues Remain (local copy), Aug 2005 GAO report
- Data Mining - Federal Efforts Cover a Wide Range of Uses (local copy), May 2004 GAO report
- Total Information Awareness (TIA) Programs
- RL32536 - The Multi-State Anti-Terrorism Information Exchange (MATRIX) Pilot Project (local copy), Congressional Research Service report - [project has been completed, according to the MATRIX web site at http://www.matrix-at.org/]
- This report provides an overview of the Multi-State Anti-Terrorism Information Exchange (MATRIX) pilot project, which leverages advanced computer/information management capabilities to more quickly access, share, and analyze public records to help law enforcement generate leads, expedite investigations, and possibly prevent terrorist attacks. The pilot project is intended to demonstrate the effective use of such capabilities, but it is less clear whether the project has been designed to prevent unnecessary intrusions on privacy.
- Privacy and Technology: Government Use of Commercial Data for Homeland Security - Department of Homeland Security Privacy Office public workshop, 8-9 Sep 2005
- Able Danger and Intelligence Information Sharing - testimony before Senate Judiciary Committee, 21 Sep 2005
- testimony of William Dugan, Acting Assistant to the Secretary of Defense for Intelligence Oversight (local copy)
- First, no one in DoD intelligence has a mission to collect information on United States persons. What we have are missions such as foreign intelligence, counterintelligence, counterterrorism, Signals intelligence, and the like.
- In the course of performing our mission, we run across or find information that identifies United States persons. That is when the rules in the DoD Regulation, DoD 5240.1-R, kick in. If the information is necessary to the conduct of the mission such as I just described, for example, counterterrorism, and if it falls within one of the 13 categories prescribed by the Executive Order 12333 and DoD regulation, then the intelligence component can collect the information. The 13 categories are:
- Information obtained with consent.
- Publicly available information.
- Foreign intelligence.
- Counterintelligence.
- Potential sources of assistance to intelligence activities.
- Protection of intelligence sources and methods.
- Physical security. [with a foreign nexus/connection]
- Personnel security.
- Communications security.
- Narcotics. [international narcotics activity]
- Threats to safety. [with a foreign nexus/connection - such as international terrorist organizations]
- Overhead reconnaissance.
- Administrative purposes. [training records - a narrowly drawn category]
- If the intelligence component is unsure if the information they have obtained is proper for them to keep, the Intelligence Oversight rules allow them to temporarily retain the information for 90 days solely to determine whether it may be permanently retained.
- Thus it is possible for DoD intelligence components to have information on United States persons in their holdings.
- Finally, if an intelligence component is in receipt of information that pertains to the function of other DoD components or agencies outside DoD, such as the FBI, the intelligence component can transmit or deliver the information to them for their independent determination whether it can be collected, retained, or disseminated in accordance with their governing policy.
Intelligence Basics
- See also intelligence analysis
- See also reorganization and reform
- See also Gathering Process & Types of Intelligence
- National Intelligence: a Consumer's Guide, 2009 (local copy), from DNI
- U. S. Marine Corps 2006 Intelligence Reading List (local copy)
- Intelligence.gov
- Educing Information: Interrogation: Science and Art - Foundations for the Future (local copy), Intelligence Science Board, Phase 1 Report, National Defense Intelligence College, Dec 2006
- Intelligence Education: Studying and Teaching About Intelligence: The Approach in the United Kingdom (local copy), by Goodman, in Studies in Intelligence, vol. 50, no. 2, 2006
- Bringing Intelligence About: Practitioners Reflect on Best Practices (local copy), ed. by Swenson, Joint Military Intelligence College, 2003
- Intelligence Essentials for Everyone (local copy), by Krizan, Joint Military Intelligence College, 1999
- CIA Factbook on Intelligence
- IC21: The Intelligence Community in the 21st Century (local copy), staff study, Permanent Select Committee on Intelligence, House of Representatives, 104th Congress, 1996
- Preparing for the 21st Century: an Appraisal of U.S. Intelligence (local copy), by the Commission on the Roles and Capabilities of the United States Intelligence Community, 1996
- Joint Pub 3-54, Joint Doctrine for Operations Security - includes planning process, OPSEC measures, explanation of terms, examples of critical information, etc.
- OPSEC Glossary (local copy), from Interagency OPSEC Support Staff (IOSS)
- Compilation of Intelligence Laws And Related Laws And Executive Orders Of Interest To The National Intelligence Community (local copy), June 2003, prepared by the House Office of the Legislative Counsel for the use and convenience of the Permanent Select Committee on Intelligence.
- Central Intelligence: Origin and Evolution (local copy), ed. Michael Warner, CIA History Staff
- Wanted: A Definition of "Intelligence" (local copy), by Warner, in Studies in Intelligence, Vol. 46, No. 3, 2002
- Richard Helms: The Intelligence Professional Personified, by Robarge, in Studies in Intelligence, Vol. 46, No. 4, 2002
- Throughout his career, and especially as DCI, Helms hewed to several basic principles of intelligence activity. He expressed most of them in catch phrases, which he used often.
- Focus on the core missions: collecting and analyzing foreign intelligence
- Keep the game honest. Helms thought that the purpose of finished intelligence was to inform but not second-guess policy decisions.
- Never wear two hats. ... stick to the facts and stay out of policy debates
- Stay at the table. ... the product they provide must be relevant, timely, and cogent to be of value to their customers
- Serve only one President at a time
- Make intelligence a profession, not just an occupation
- The Ten Commandments of Counterintelligence (local copy), by Olson, in Studies in Intelligence, Fall-Winter, No. 11, 2001
- CIA Compendium of Analytic Tradecraft Notes (local copy) - "CIA has made this edition [1995] of the compendium available to the public to help shed light on how the Directorate of Intelligence meets the daily challenges of providing timely, accurate, and rigorous analysis to intelligence consumers"
- Sharing Secrets With Lawmakers: Congress as a User of Intelligence, by Snider, CIA Center for the Study of Intelligence
- Masters of the Intelligence Art, Fort Huachuca Museum
- CIA Briefings of Presidential Candidates 1952-1992, by Helgerson, CIA Center for the Study of Intelligence
- from Counterspace Operations for Information Dominance, by James G. Lee, Oct 1994
- Survival Handbook, "the basic security procedures necessary for keeping you out of trouble" - from the Defense Security Service (DSS) Academy
Intelligence Analysis
- See also intelligence basics
- See also intelligence fusion
- National Research Council reports for DNI, Mar 2011
Together, the two publications respond to a request from the Office of the Director of National Intelligence for up-to-date scientific guidance for the IC so that it might improve individual and group judgments, communication between analysts, and analytic processes.
- Intelligence Analysis for Tomorrow: Advances from the Behavioral and Social Sciences, from the National Academies Press, Mar 2011
- The IC deserves great credit for its commitment to self-scrutiny and improvement, including its investments in lessons-learned, training, and collaboration procedures. Yet these efforts have been only weakly informed by the behavioral and social sciences. At the same time, post-9/11 changes in the IC have created unprecedented demands for that knowledge. In this context, the Office of the Director of National Intelligence (ODNI) asked the National Research Council to conduct a study to
synthesize and assess the behavioral and social science research evidence relevant (1) to critical problems of individual and group judgment and of communication by intelligence analysts and (2) to kinds of analytic processes that are employed or have potential in addressing these problems.
The study charge also asked for recommendations on analytic practices “to the extent the evidence warrants” and for future research, including the identification of impediments to implementation.
- Intelligence Analysis: Behavioral and Social Scientific Foundations, from the National Academies Press, Mar 2011 - collection of individually authored papers
- Each chapter introduces readers to a fundamental behavioral or social science approach as it applies to the kinds of complex, uncertain problems facing intelligence analysis. The topics covered include analytic methods, group dynamics, individual decision making, intergroup relations, evaluation, and communication.
- A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis (local copy), posted by CIA, March 2009
- This primer highlights structured analytic techniques—some widely used in the private sector and academia, some unique to the intelligence profession. It is not a comprehensive overview of how intelligence officers conduct analysis. Rather, the primer highlights how structured analytic techniques can help one challenge judgments, identify mental mindsets, stimulate creativity, and manage uncertainty. In short, incorporating regular use of techniques such as these can enable one to structure thinking for wrestling with difficult questions.
- Building a Better Strategic Analyst: A Critical Review of the U.S. Army’s All Source Analyst Training Program (local copy), by Allen, a SAMS paper, AY 2008
- This monograph explores the development of intelligence analysts from their indoctrination through positions of senior intelligence analysts charged with scrutinizing strategic concepts and providing strategic recommendations. It compares current methodologies used to produce adaptive, effective senior intelligence analysts necessary for today’s complex battlefields in non-Department of Defense agencies to those used within the United States Army. It seeks to answer the question: does the intelligence school in the United States Army prepare its intelligence analysts properly through training and education for roles as senior intelligence analysts?
- Critical Thinking and Intelligence Analysis (local copy, 1.4 Mb low res), by Moore, National Defense Intelligence College (NDIC) occasional paper no. 14, March 2007 (local copy, 12.1 Mb high res) - includes generic and intel-specific discussion, as well as an appendix which is the NSA's Critical Thinking and Structured Analysis Class Syllabus
- Curing Analytic Pathologies: Pathways to Improved Intelligence Analysis (local copy), by Cooper, CIA Center for the Study of Intelligence, Dec 2005
- The Analytic Pathologies framework yields four insights that are crucial both to accurate diagnosis and to developing effective remedies. First, the framework enables analysts to identify individual analytic impediments and determine their sources. Second, it prompts analysts to detect the systemic pathologies that result from closely-coupled networks and to find the linkages among the individual impediments. Third, it demonstrates that each of these networks, and thus each systemic pathology, usually spans multiple levels within the hierarchy of the Intelligence Community. Fourth, the framework highlights the need to treat both the systemic pathologies and the individual impediments by focusing effective remedial measures on the right target and at the appropriate level.
- Integration of Psychology into Intelligence Production (local copy), by Oracz, University of Military Intelligence, 20 Jan 2009
- Intelligence Analysis in Theater Joint Intelligence Centers: an Experiment in Applying Structured Methods (local copy), by Folker, Joint Military Intelligence College (JMIC) occasional paper no. 7, Jan 2000
- Shakespeare for Analysts: Literature and Intelligence (local copy), by White, Joint Military Intelligence College (JMIC) occasional paper no. 10, July 2003
- Assessing the Tradecraft of Intelligence Analysis, by Treverton and Gabbard, RAND report, 2008
- Foundations for Meta-Analysis: Developing a Taxonomy of Intelligence Analysis Variables (local copy), by Johnston, in Studies in Intelligence, Vol. 47, No. 3, 2003
- Reducing Analytic Error: Integrating Methodologists into Teams of Substantive Experts (local copy), by Johnston, in Studies in Intelligence, Vol. 47, No. 1, 2003
- Psychology of Intelligence Analysis (local copy), by Heuer, 1999, for CIA -- very good examination of many elements of critical thinking, for example (PDF version)
- Chapter 8 - Analysis of Competing Hypotheses (ACH) "is a tool to aid judgment on important issues requiring careful weighing of alternative explanations or conclusions. It helps an analyst overcome, or at least minimize, some of the cognitive limitations that make prescient intelligence analysis so difficult to achieve."
- Analysis of competing hypotheses involves seeking evidence to refute hypotheses. The most probable hypothesis is usually the one with the least evidence against it, not the one with the most evidence for it. Conventional analysis generally entails looking for evidence to confirm a favored hypothesis.
- CIA Compendium of Analytic Tradecraft Notes (local copy) - "CIA has made this edition [1995] of the compendium available to the public to help shed light on how the Directorate of Intelligence meets the daily challenges of providing timely, accurate, and rigorous analysis to intelligence consumers"
- Analyst Toolbox: A Toolbox for the Intelligence Analyst (local copy), Dept of Justice Global Justice Information Sharing Initiative - recommended hardware, software, connectivity, sources
- The Role of Rhetorical Theory in Military Intelligence Analysis - A Soldier’s Guide to Rhetorical Theory, by Mills, AU Press, Aug 2003
- The Cognitive Bases of Intelligence Analysis (local copy, 6 Mb file), by Thompson et al, U.S. Army Research Institute for the Behavioral and Social Sciences, Jan 1984
- Law Enforcement Analytic Standards, Nov 2004, Dept of Justice Global Justice Information Sharing Initiative
Intelligence and Policy Makers
- See also Intelligence Lessons Learned
- Intelligence and Policy-Making: A Bibliography, Web Sites, Naval Postgraduate School
- Intelligence and Policy: the Evolving Relationship (local copy), Roundtable Report, June 2004, Center for the Study of Intelligence
- U.S. Intelligence and Policymaking: The Iraq Experience (local copy), Congressional Research Service report
- Senate Select Committee on Intelligence: Term Limits and Assignment Limitations, Congressional Research Service report
- Sherman Kent’s Final Thoughts on Analyst-Policymaker Relations (local copy), by Davis, in Sherman Kent Occasional Papers: Volume 2, Number 3, Jun. ‘03
- Sherman Kent, widely recognized as the single most influential contributor to the analytic doctrine and tradecraft practiced in CIA’s Directorate of Intelligence, was long seized with the importance, and difficulty, of establishing effective relationships between intelligence analysts and policy officials.
- In warning analysis, Kent judged that the analytic and policy “trades” were too distant in their relations. As a result, the “Warnees,” to use Kent’s term, mistrusted the motives and findings of “Warners” and too often failed to take requisite action to avoid dangers and seize opportunities.
- "But the big determinant is likely to be a fear of under-warning. The Warner’s nightmare is having something important happen without having given warning—not having blown the whistle loud enough and in time."
- "Warners know Warnees are hard to convince. They will not be warned by a hint. The thing that will really jolt them into being warned is for the Warner to push his conclusions beyond what his evidence will legitimately support. This is seldom done for good reason. It ain’t honest. It ain’t prudent."
- In intentions analysis, in contrast, Kent judged that analysts and policymakers were at times too close in their thinking about an adversary’s likely course of action. In this case, neither side would take proper measure of new information that could undermine a shared conclusion.
- "But no matter how clear everyone is about the estimate’s tentative nature on its birthday, the tentative quality recedes more and more into the background of the thinking, especially of the consumer. Consumers tend to take such judgments as “yes or no” answers. Once accepted as correct it begins to take on a life of its own."
- "The worst case is when it is a Siamese twin. That is, when the intelligence estimate coincides with the estimate of consumers."
- As with warning, Kent concludes that the malfunction in misjudging enemy intentions when analysts and policy officials share “vested intellectual positions” is “[rooted] in the nature of things” and not open to easy fixing. His lecture outline ends on a pessimistic note.
- Paul Wolfowitz on Intelligence Policy-Relations (local copy), by Davis, in Studies in Intelligence, Vol. 39, No. 5, 1996
- Policy, Intelligence, and
The Billion-Dollar Petroglyph, by Donovan, in Air University Review, Jan-Feb 1986 - includes models for processing of intelligence and viewing the threat
- Online Lectures on Intelligence Analysis, at North Carolina Wesleyan College
Commissions
Counterterrorism & Intelligence
- The Ten Commandments of Counterintelligence (local copy), by Olson, in Studies in Intelligence, Fall-Winter, No. 11, 2001
- National Counterterrorism Center
- Counterterrorism Office, U.S. Department of State
- Combating Terrorism Center (CTC) at West Point
- Threats and Protection, Dept of Homeland Security
- Information Analysis & Infrastructure Protection, Dept of Homeland Security
- Counterterrorism Intelligence Capabilities and Performance Prior to 9-11 (local copy), report by Subcommittee on Terrorism and Homeland Security, House Permanent Select Committee on Intelligence
- Findings of the Final Report of the Joint Inquiry Into the Terrorist Attacks of September 11, 2001 (local copy), December 11, 2002
- Recommendation of the Final Report of the Joint Inquiry into the Terrorist Attacks of September 22, 2001 (local copy), December 11, 2002
- Why did U.S. intelligence fail on September 11th, PBS Frontline report
- "Smarter Intelligence - What's needed to fix U.S. counterterrorism intelligence?" by Deutch and Smith, in Foreign Policy, Jan-Feb 2002
Reorganization of Intelligence
Laws, Regulations, & Restraints
- See also U.S. government, DoD/joint, and service sections for additional regulations and guidance
- See also torture prohibitions on Law page
- See also assassination prohibitions on Law page
- Intelligence Community Legal Reference Book, Summer 2009 (local copy)
- Key documents
- Who Watches the Watchmen? The Conflict Between National Security and Freedom of the Press (local copy), by Ross, National Intelligence University Press, July 2011
- Who Watches the Watchmen? argues that the tension between maintaining national security secrets and the public’s right to know cannot be “solved,” but can be better
understood and more intelligently managed.
- UCMJ Article 106 - Spies and Espionage (local copy)
- Counterintelligence Laws and Policies, NCIX
- Extracts from Espionage Laws and Federal Statutes
- Compilation of Intelligence Laws And Related Laws And Executive Orders Of Interest To The National Intelligence Community (local copy), prepared for House Permanent Select Committee on Intelligence
- Statutes, Laws, and Executive Orders, listed by Senate Select Committee on Intelligence
- Congressional Research Service (CRS) reports
- Freedom of Information Act (FOIA), full text
- Attorney General Guidelines for FBI Foreign Intelligence Collection and Foreign Counterintelligence Investigations, posted by FAS
- Legal Standards for the Intelligence Community in Conducting Electronic Surveillance, listed by FAS
- Intelligence Laws and Regulations, listed by FAS
- An overview of the regulation and oversight of the National Security Agency’s electronic surveillance activities, 12 Apr 2000 Congressional statement by NSA Director LtGen Michael V. Hayden, USAF
- Laws and Directives Enabling Intelligence Work or Counter-Terrorism, posted at MilNet
Congress
Other U.S. Government Resources
U.S. Intelligence Organizations
- An Overview of the United States Intelligence Community for the 111th Congress (local copy), DNI, Jan 2009
- President's Foreign Intelligence Advisory Board (PFIAB)
"Independent of the intelligence community and free from any day-to-day management or operational responsibilities, the PFIAB is able to render advice which reflects an objective view of the kinds of intelligence that will best serve the country and the organizational structure most likely to achieve this goal."
- Office of the National Counterintelligence Executive (NCIX)
- as of May 2001, assumed duties of the multi-agency National Counterintelligence Center (NACIC), in accordance with Presidential Decision Directive-75 "which created the NCIX to serve as the substantive leader of national-level counterintelligence and to coordinate and support the critical counterintelligence missions of the United States Government."
- National Visualization and Analytics Center (NVAC) - a Department of Homeland Security resource
- National Intelligence Council (NIC)
- U.S. Intelligence Community
- U.S. Intelligence Community members
- National Security Space Office (NSSO)
- Our mission is to create strategic focus and unity of effort for National Security Space activities across the Department of Defense and the Intelligence Community.
- DoD Directorate for Intelligence, Surveillance and Reconnaissance Systems
- National Ground Intelligence Center (NGIC) -- see INSCOM under Army section below
- IC21: The Intelligence Community in the 21st Century (local copy), staff study, Permanent Select Committee on Intelligence, House of Representatives, 104th Congress, 1996
DoD/Joint Resources
- See also same section on Cyberspace & Information Operations Study Center
- Defense Intelligence Agency (DIA), "a Combat Support Agency of the Dept of Defense"
- Training for Law Enforcement Managers: What Does Professional Military Education Offer? (local copy), by Trott, in FBI Law Enforcement Bulletin, May 2006
- National Intelligence University (NIU) [formerly National Defense Intelligence College (NDIC)] - located in the Defense Intelligence Analysis Center (DIAC), Bolling AFB, Washington, D.C.
- Armed Forces Medical Intelligence Center (AFMIC), DIA
- National Ground Intelligence Center (NGIC) "is a major subordinate command of INSCOM and is the Defense center of excellence for ground force production. It provides scientific and technical intelligence (S& TI) and general military intelligence (GMI) on foreign ground forces in support of the warfighting commanders, force and material developers, DA, DOD, and National- level decisionmakers." (from the draft of new FM 34-37, as posted by FAS)
- Defense Security Service (DSS), including counterintelligence
- DSS Security Library, including papers on risk from foreign film crews and use of contract bidding to gather intelligence
- JP 2-0: Intelligence Support to Joint Operations
- See other Operational Joint Pubs
- Joint Airborne SIGINT Architecture (JASA) Standards Working Group (JSWG), "established to identify the standards and protocols necessary to develop joint, common, interoperable airborne SIGINT systems compatible with the United States Cryptologic System (USCS) and other intelligence disciplines"
- for the Joint Airborne SIGINT Architecture (JASA) Standards Handbook, check the Products section
- Joint Reserve Intelligence Planning Support System (JRIPSS), "matching reserve intelligence and linguist capability to total force requirements"
- Interagency Intelligence Teams Support Bosnia Mission (local copy), American Forces Information Service (AFIS), 23 Jan 1996 - mentions DIA's Defense Human Intelligence Service and CIA's Operation Directorate fielding integrated teams to support U.S. forces - also mentions three-way cooperation between DIA, CIA, and NSA
Army Resources
- See also same section on Cyberspace & Information Operations Study Center
- Intelligence Center Online Network (ICON) Portal
- University of Military Intelligence web site is now available through the ICON Portal
- Deputy Chief of Staff, G-2 - Army G-2 Homepage
- US Army Intelligence and Security Command
- U.S. Army Intelligence Center, Fort Huachuca
- U.S. Army Intelligence and Security Command (INSCOM), Ft Belvoir, VA - "The Army's Operational Intelligence Force"
- National Ground Intelligence Center (NGIC) "is a major subordinate command of INSCOM and is the Defense center of excellence for ground force production. It provides scientific and technical intelligence (S& TI) and general military intelligence (GMI) on foreign ground forces in support of the warfighting commanders, force and material developers, DA, DOD, and National- level decisionmakers." (from the draft of new FM 34-37, as posted by FAS)
- INSCOM Journal (under news menu button) "for the military intelligence professional"
- FM 2-0, Intelligence supercedes FM 34-1, Intelligence and Electronic Warfare Operations, see also rest of 34 series
- FM 34-8-2, Intelligence Officers Handbook
- FM 34-37, Echelons above Corps (EAC) Intelligence and Electronic Warfare (IEW) Operations
- FM 34-37, Strategic, Departmental, and Operational Intelligence and Electronic Warfare (IEW) Operations, preliminary draft posted by FAS which is "for review purposes only and does not represent approved Department of the Army doctrine."
- FM 34-60, Counterintelligence
- U.S. Army Intelligence Center, Ft Huachuca
- Military Intelligence, professional bulletin from U.S. Army Intelligence Center, Ft Huachuca
- TQ 1-98, Tactical HUMINT Battalion, a perspective on how to provide CI/HUMINT operational support to the commander in unilateral, joint, or combined military operations -- from Center for Army Lessons Learned (CALL)
- Military Intelligence, by Finnegan - book from the Army Center of Military History
Navy & Marine Resources
Air Force Resources
- See also same section on Cyberspace & Information Operations Study Center
- AFDD 2-9 Intelligence, Surveillance, and Reconnaissance Operations, formerly 2-5.2
- See also other Air Force Doctrine Pubs
- See also Air Force Publications, especially electronic pubs for Intelligence, Communication, and Information Management
- USAF Air Intelligence Agency (AIA)
- 70th Intelligence Wing (IW)
- Air Force Iinformation Operations Center (AFIOC)
- National Air & Space Intelligence Center (NASIC), formerly known as NAIC
- 67th Information Operations Wing (IOW)
- 480th Intelligence Wing (IW)
- AIA Technology Demonstration Center (TDC)
- U.S. Air Force Office of Special Investigations (OSI)
- Air Force Command and Control & Intelligence, Surveillance, and Reconnaissance Center (AFC2ISRC), Langley AFB -- a good starting point for C2ISR
- Project Broadsword, Air Force Research Lab, Rome Research Site, "an innovative information integration software application that enables an organization to manage heterogeneous, distributed resources. With the assistance of Broadsword, an organization can tie together diverse information resources, perform intelligent searches, and visually display the results in a manner that aids and simplifies the decision making process."
- Practical Intelligence Course (PIC), Advanced Airlift Tactics Training Center - "designed to provide aircrews and Intelligence support personnel with ground and flight training, which will enhance the aircrews' chances for survival and mission success within hostile flying environments"
Intelligence Fusion & Analysis
- See also intelligence analysis
- See also Threat Analysis & Threat Assessment
- Sensemaking: A Structure for an Intelligence Revolution (local copy), by Moore, NDIC, March 2011
- Sensemaking, whereby intelligence professionals would work with executive decisionmakers to explain data that are “sparse, noisy, and uncertain,” requires an interpreter and experienced champion to bring about a practicable understanding and acceptance of the concept among intelligence practitioners. David Moore has accomplished that feat. Further, he, along with collaborators in chapters 5 and 7, demonstrate how sensemaking can be accomplished as a collaborative enterprise.
- Intelligence Analysis for Tomorrow: Advances from the Behavioral and Social Sciences, The National Academies Press, 2011
- A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis (local copy), posted by CIA, March 2009
- This primer highlights structured analytic techniques—some widely used in the private sector and academia, some unique to the intelligence profession. It is not a comprehensive overview of how intelligence officers conduct analysis. Rather, the primer highlights how structured analytic techniques can help one challenge judgments, identify mental mindsets, stimulate creativity, and manage uncertainty. In short, incorporating regular use of techniques such as these can enable one to structure thinking for wrestling with difficult questions.
- Assessing the Tradecraft of Intelligence Analysis, by Treverton and Gabbard, RAND report, 2008
- Fusion Centers: Issues and Options for Congress (local copy), Congressional Research Service report
- International Society of Information Fusion (ISIF)
- The Future of Intelligence Analysis, Vol I, Final Report, Center for International and Security Studies at Maryland, 10 Mar 2006 - project commissioned by the Assistant Deputy Director of National Intelligence for Education and Training
- The Future of Intelligence Analysis, Vol II, Annotated Bibliography: Publications on Intelligence Analysis and Reform, Center for International and Security Studies at Maryland, 10 Mar 2006
- Assisting People to Become Independent Learners in the Analysis of Intelligence (local copy), by Pirolli, Office of Naval Research, Feb 2006
- Intelligence Analysis: A Holistic Vision for the Analytic Unit, by Kerr et al, in Studies in Intelligence, vol. 50, no. 2, 2006
- Analytic Culture in the U.S. Intelligence Community: an Ethnographic Study (local copy, 8 Mb), by Johnston, for the Center for the Study of Intelligence (CSI), 2005
- May 2005 International Conference on Intelligence Analysis
- Information Technology Initiatives, Office of Justice Programs (OJP), US Department of Justice
- Global Intelligence Working Group (GIWG)
- Curing Analytic Pathologies: Pathways to Improved Intelligence Analysis (local copy), by Cooper, Center for the Study of Intelligence (CSI), CIA, Dec 2005
- Manhunting: a Methodology for Finding Persons of National Interest (local copy), by Marks, Meer, and Nilson, Naval Postgraduate School, June 2005
- Unfortunately, no military doctrine, framework or process currently exists for finding and apprehending these Persons of National Interest (PONIs). Since military planners and intelligence analysts are neither educated nor trained in the methods or procedures necessary to find and capture PONIs, this thesis will propose a methodology to do so. This involves the development of an analytical process, and an organizational structure and procedure to identify and locate PONIs. Consequently, the United States government’s ability to prosecute the war on terrorism today, and to find and apprehend PONIs in the future, depends on its ability to develop and institutionalize a comprehensive manhunting strategy now.
- Fusion Center Guidelines, Bureau of Justice Assistance, Office of Justice Programs, US Department of Justice - guidelines for establishing and operating fusion centers at the local, state, tribal, and federal levels
- State and Local Intelligence Fusion Centers: An Evaluative Approach in Modeling a State Fusion Center (local copy), by Forsyth, Naval Postgraduate School, Sep 2005
- Transforming Army Intelligence Analysis Training and Doctrine to Serve the Reasonable Expectations and Needs of Echelons Corps and Below Commanders, Consumers, and Customers (local copy), by Lewis, School of Advance Military Studies (SAMS), 26 May 05
- Out of the Ordinary - Finding Hidden Threats by Analyzing Unusual Behavior, RAND report, 2004
- Something Old, Something New: Guerrillas, Terrorists, and Intelligence Analysis (local copy), by Grau, in Military Review, Jul-Aug 2004
- The Role of Rhetorical Theory in Military Intelligence Analysis - A Soldier’s Guide to Rhetorical Theory, by Mills, AU Press
- Psychology of Intelligence Analysis (local copy), by Heuer, 1999, for CIA -- very good examination of many elements of critical thinking and analysis
- CIA Compendium of Analytic Tradecraft Notes (local copy) - "CIA has made this edition [1995] of the compendium available to the public to help shed light on how the Directorate of Intelligence meets the daily challenges of providing timely, accurate, and rigorous analysis to intelligence consumers"
- The Intelligence Fusion Family, by Arrol, in Military Intelligence Professional Bulletin, Oct-Dec 1998
- As the Army moves into the future, we must ensure the rapid analysis and dissemination of relevant information to the force. Whether the mission is force-on-force or stability and sustainment operations, the role of intelligence fusion products does not fluctuate—giving the commander the superior information advantage of a nearly instantaneous and complete battlespace picture, while protecting the force.
- Maritime Intelligence Fusion Center, USCG
- Drug Intelligence Fusion Center
- 2025 In-Time Information Integration System (I3S), AF2025
- Developing the concepts and means to selectively and rapidly move accurate information across a vast, secure cyberspace, while accurately fusing intelligence, detecting information deception, securing credible knowledge sources, and employing the laws of probability are the technical challenges for the next 30 years.
- Preparing for the 21st Century: an Appraisal of U.S. Intelligence (local copy), by the Commission on the Roles and Capabilities of the United States Intelligence Community, 1996
- In Depth Observational Studies of Professional Intelligence Analysts (local copy), NIST research paper by Scholtz, Morse, and Hewett, 2004
- Our purpose in conducting the observational studies was to determine how much of the overall analytic process was being automatically captured and to determine metrics that would appropriately describe the analytic process.
- Avoiding another Pearl Harbor: The Primary Purpose of National Estimating (local copy), by Harold P. Ford
- This article is published in conjunction with the 50th anniversary of the Japanese attack on Pearl Harbor. It is part of an award-winning unclassified monograph, "The Purposes and Problems of National Intelligence Estimating, " published in 1989 by the Defense Intelligence College.
- Estimates and Influence, by Sherman Kent
- This classic of estimative intelligence, which treats both epistemology and its importance to the policymaker, was originally classified Confidential and published in the Summer of 1968 by the Center for the Studies of Intelligence.
- Cuban Missile Crisis: A Crucial Estimate Relived (local copy), by Sherman Kent, originally appeared in the Spring 1964 edition of Studies in Intelligence
- A Crucial Estimate Relived was written in 1964 by Sherman Kent, who as head of the Office of National Estimates was directly involved in an NIE that, in mid-September 1962, reasoned that the Soviets would not put offensive intercontinental ballistic missiles in Cuba. In less than a month, photographic intelligence proved the estimate wrong. In reflecting on the lessons learned, Kent discusses the estimative process in general as well as that erroneous estimate in particular.
- The Cognitive Bases of Intelligence Analysis (local copy), by Thompson et al, report for Army Research Institute, 1984
- This report summarizes the background research that led to development of the Strategic Intelligence Analysis Handbook which was also developed under this contract. The goal of the research was to develop a framework for understanding human processes in intelligence analysis to be used in the development or evaluation of training procedures, doctrine, and system requirements for automated support to analysts. In addition to the strategic handbook, the research findings have been applied to the development of training materials for tactical intelligence analysts and are summarized in the Training Circular An Introduction to Tactical Intelligence Analysis: Cognitive Preparation for the Battlefield. This report summarizes a description model of the cognitive structures and processes involved in analysis. It then relates both general and specific cognitive skills to the performance of analytic tasks within the context of threat modeling. The report also addresses analyst training, performance evaluation, automated systems, and future research directions. (Author)
Analysis Tools & Theories
- See also intelligence analysis
- See also intelligence basics
- See also Analysis & Assessment Modeling and Simulation Tools at the Behavioral Influences Analysis Center (BIAC)
- See also Research and Theory at the Behavioral Influences Analysis Center (BIAC)
- Out of Bounds: Innovation and Change in Law Enforcement Intelligence Analysis (local copy), by Osborne, Joint Military Intelligence College, Mar 2006
- Methodology, Metrics and Measures for Testing and Evaluation of Intelligence Analysis Tools, by Greitzer, posted at Pacific Northwest Labs, Mar 2005
- Analytic Culture in the U.S. Intelligence Community: an Ethnographic Study (local copy, 8 Mb), by Johnston, for the Center for the Study of Intelligence (CSI), 2005
- Foundations for Meta-Analysis: Developing a Taxonomy of Intelligence Analysis Variables (local copy), by Johnston, in Studies in Intelligence, Vol. 47, No. 3, 2003
- Reducing Analytic Error: Integrating Methodologists into Teams of Substantive Experts (local copy), by Johnston, in Studies in Intelligence, Vol. 47, No. 1, 2003
- Wanted: A Definition of "Intelligence" (local copy), by Warner, in Studies in Intelligence, Vol. 46, No. 3, 2002
- Bayesian
- A Theorem for Prediction, by Zlotnick, in Studies in Intelligence, vol. 11, no. 4
- Bayes' Theorem for Intelligence Analysis, by Zlotnick, in Studies in Intelligence, vol. 16, no. 2
- The Sino-Soviet Border Dispute: a Comparison of the Conventional and Bayesian Methods for Intelligence Warning, by Fisk, in Studies in Intelligence, vol. 16, no. 2
- Bayesian Analysis for Intelligence: Some Focus on the Middle East, by Schweitzer, in Studies in Intelligence, vol. 20, no. 2
- Scientific Estimating, by Jackson, in Studies in Intelligence, vol. 9, no. 3
- Words of Estimative Probability, by Sherman Kent, CIA, with tables of what percentage likelihood is meant by various words and phrases
- A Study in Indications Methodology, by Ramsey and Boerner, in Studies in Intelligence, vol. 7, no. 3
- Delphi method, discussed in "Bayesian Analysis for Intelligence: Some Focus on the Middle East," by Schweitzer, in Studies in Intelligence, vol. 20, no. 2
- Some Limitations in Systems Analysis in Intelligence Activities, by Shreckengost, in Studies in Intelligence, vol. 14, no. 2
- A Value for Information, by Oldham, in Studies in Intelligence, vol. 12, no. 2 - measuring information value using gaming
- Platt's Law, by Platt in 1951, reprinted in Studies in Intelligence, vol. 13, no. 4
- Intelligence Research: Some Suggested Approaches, by Drell, in Studies in Intelligence, vol. 1, no. 4 - a 1950s primer
Intelligence Preparation of the Battlefield (IPB)
International Resources - Government
- See also same section on Cyberspace & Information Operations Study Center
- See also NATO Open Source Intelligence handbooks
- International intelligence links at Loyola's Strategic Intelligence site
- World Intelligence and Security Agencies, listed by FAS
- INTERPOL, the International Criminal Police Organization (ICPO)
- Intelligence Professionalism in the Americas, Swenson and Lemozy, ed.s, Joint Military Intelligence College's Center for Strategic Intelligence Research, 2003
- Criminal Intelligence Services of Canada (CISC), in English and French
- Canadian Security Intelligence Service (CSIS), in English and French
- Security Intelligence Review Committee (SIRC), in English and French
- Defence Signals Directorate (DSD), Australia, home page of "Australia's national authority for signals intelligence and information security"
- Australian Defence Intelligence Organisation (DIO)
- Australian Institute of Professional Intelligence Officers (AIPIO)
- Government Communications Security Bureau (GCSB), New Zealand, "an intelligence and security agency which produces foreign intelligence information and at the same time ensures the protection of government classified or sensitive information from unauthorized disclosure"
- National Criminal Intelligence Service (NCIS), U.K.
- MI5 The Security Service, U.K., "carries out security intelligence work aimed at combating threats to the nation such as espionage and terrorism"
- Institute for Intelligence and Special Operations (aka Mossad), Israel - "appointed by the State of Israel to collect information, analyze intelligence and perform special covert operations beyond its borders"
- Jordanian General Intelligence Department (GID)
- The Yom Kippur War: Indications and Warnings (local copy), by Aboul-Enein, in Military Review, Jan-Feb 2003 - discussing the Israeli intelligence failure
International Resources - NonGovernment
- See also same section on Cyberspace & Information Operations Study Center
- World Intelligence and Security Agencies, as listed by FAS
- Stratfor.com, global intelligence updates, including newsletter
- Canadian Association for Security and Intelligence Studies (CASIS), "a nonpartisan, voluntary association established in 1985 ... to provide informed debate in Canada on security and intelligence issues"
- Intelligence (INT) online, French electronic newsletter, by paid subscription, some free samples online
- Intelligence Online, also available in French, some free stuff, rest by subscription account
- Africa Intelligence, also available in French, some free stuff, rest by subscription account
Schools and Courses
- See also same section on Cyberspace & Information Operations Study Center
- See Military Education Online, Professional Military Education (PME) and Professional Continuing Education (PCE), for all services
- National Cryptologic School (NCS), NSA/CSS
- National Intelligence University (NIU) [formerly National Defense Intelligence College (NDIC)] - located in the Defense Intelligence Analysis Center (DIAC), Bolling AFB, Washington, D.C.
- Joint Intelligence Virtual University (JIVU) , DIA
The DIA Joint Intelligence Virtual University provided cost-efficient training for the Intelligence Community and introduced new training opportunities with the inclusion of the NSA National Cryptologic School, the NIMA National Geospatial Intelligence College, and the USPACOM Joint Intelligence Training Activity-Pacific. Web–based training saves money, time, and manpower with more than 200 courses offered on-line. More than 6,000 students enrolled in FY2002. [from DCI Annual Report, Support to Military Operations, Jan 2003]
- DSS Academy, Defense Security Service
The DSS Academy provides DoD security professionals, DoD contractors, employees of other Federal agencies, and selected foreign governments with a security curriculum, awareness products, and professional development services that are relevant and responsive to their needs.
- Intelligence Center Online Network (ICON) Portal
- University of Military Intelligence web site is now available through the ICON Portal
- National Geospatial Training, from the National Geospatial-Intelligence Agency (NGA)
- Intelligence Community Officer Training (ICOT), Air Force page
- Intelligence Community Officer Training (ICOT), Curriculum Guide
- Intelligence Community Officer Course (ICOC), Navy page
- Navy and Marine Corps Intelligence Training Center (NMITC)
- Fleet Intelligence Training Center, Pacific
- The Case for Integrating Information Security and Intelligence courses (local copy), paper by Hutchinson, at the Third Annual World Conference on Information Security Education (wise[3]), June 2003
- Training The Cyber Warrior (local copy), paper at the Third Annual World Conference on Information Security Education (wise[3]), June 2003
- Intelligence Education for Joint Warfighting (local copy), by Clift, Joint Force Quarterly, Spring 1999
- more .gov and .mil intelligence training links
- Non-DoD/Government
- OSS.NET source for distributed intelligence research & white papers
- Intelligence Analysis Course at NCWC, complete with online lectures
Intelligence History
- See also same section on Cyberspace & Information Operations Study Center
- Index and archive of Studies in Intelligence articles on intelligence analysis and operations
- Center for the Study of Intelligence (CSI), includes declassified articles and online pubs
- Central Intelligence: Origin and Evolution, online CIA book, 2001
- The Office of Strategic Services: America's First Intelligence Agency, online CIA book, 2000
- Intelligence in the War of Independence, online CIA book
- The Final Months of the War With Japan: Signals Intelligence, U.S. Invasion Planning, and the A-Bomb Decision, online CIA book, 1998
- OKHRANA: The Paris Operations of the Russian Imperial Police, online CIA book, 1997
- Sharing Secrets With Lawmakers: Congress as a User of Intelligence, online CIA book, 1997
- CIA Assessments of the Soviet Union, online CIA book, 1996, explaining that they did see the end coming
- Our First Line of Defense ("Presidential Reflections on US Intelligence"), online CIA book, 1996
- The Evolution of the U.S. Intelligence Community-An Historical Overview
- National Archives
- CORONA Satellite Photography
, approximately 880,000 declassified military photographs
- A Brief History of Air Force Scientific and Technical Intelligence, Air Force Historical Studies Office
- The "Team B" experiment of 1976, where outside experts were asked to second guess the CIA estimates regarding Soviet military
- Intro to Watching the Bear: Essays on CIA's Analysis of the Soviet Union (also look at the Team B paragraphs in Chapter V - Estimating Soviet Military Intentions and Capabilities)
- Garthoff sharply criticizes the "Team B" approach created by DCI George H. W. Bush in 1976 as an alternative to the Intelligence Community's military estimates. Team B's report was highly critical of CIA's analysis but, according to Garthoff, virtually all of Team B's criticisms proved to be wrong. The Team B exercise, in his view, was "ill conceived and disappointing" in its attempt to identify ways to improve the estimating process. The Team B members, according to Garthoff, were less concerned with objectively evaluating Intelligence Community estimates than with pushing their hard-line views of a dangerous Soviet Union bent on world domination.
- Team B: The trillion-dollar experiment, by Cahn, Bulletin of the Atomic Scientists
- Military Intelligence, by Finnegan - book from the Army Center of Military History
- International Intelligence History Association (IIHA)
- links about Office of Strategic Services (OSS)
- Center for Cryptologic History at NSA
- Cryptology in the 16th and 17th Centuries, by Leary, in Cryptologia
- See also search engine results re: Joint Intelligence Objectives Agency (JIOA) and Operation Paperclip for resources on the importation of scientists to the U.S. after WW II
- Military and Intelligence History in China, resources by Sawyer
- Code makers/breakers - articles by Simon Singh
- John Michael Archer. Sovereignty and Intelligence Spying and Court Culture in the English Renaissance. Stanford University Press, 1993.
Publications
- See also same section on Cyberspace & Information Operations Study Center
- Defense Intelligence Journal - a publication of the Joint Military Intelligence College Foundation
- CIA Publications
- Studies in Intelligence, "Journal of the American Intelligence Professional," at the Center for the Study of Intelligence
- DCI Recurring Reports, including Director of Central Intelligence Annual Report for the United States Intelligence Community
- Association of Former Intelligence Officers (AFIO)
- Weekly Intelligence Notes (WINs) "are commentaries based on fresh, open source research of intelligence related topics. WINs also contain book reviews. Members receive these Notes via email."
- Center for the Study of Intelligence (CSI), includes declassified articles and online pubs [see history of info ops above]
- Kent Center Occasional Papers, Sherman Kent School for Intelligence Analysis, at CIA
- Office of Counterintelligence (OCI), Department of Energy, Hanford Site - includes
- Counterintelligence Quarterly
- Cryptologia, a quarterly journal devoted to all aspects of cryptology
- Journal of Intelligence History
- Spokesman magazine, Air Intelligence Agency
- Military Intelligence Professional Bulletin - available behind the Army portal
- Covert Action Quarterly
- Intelligence and National Security, quarterly
- International Journal of Intelligence and CounterIntelligence
- Jane's Intelligence Review
- Jane's IntelWeb, includes Terrorism Watch Report and Intelligence Watch Report
- National Security Law Report
- Naval Intelligence Professionals quarterly - behind the NIP portal
- C4ISR Journal
- Electronic Briefing Books, National Security Archive, George Washington University
- U.S. Intelligence Policy Documentation Project, National Security Archive, George Washington University
- includes microfiche libraries of key documents from 1947-1996
- includes books such as
- The U.S. Intelligence Community
- A Century of Spies: Intelligence in the Twentieth Century
- Forensic Science Communications, FBI
Espionage & Spies
- See also HUMINT
- espionage - (DOD Dictionary) The act of obtaining, delivering, transmitting, communicating, or receiving information about the national defense with an intent, or reason to believe, that the information may be used to the injury of the United States or to the advantage of any foreign nation. Espionage is a violation of 18 United States Code 792-798 and Article 106, Uniform Code of Military Justice. See also counterintelligence.
- Yahoo! News - Espionage & Intelligence
- Article 106 - Spies and Espionage (local copy), UCMJ
- Espionage: Why Does it Happen? (local copy) by Fischer, DoD Security Institute
- International Spy Museum
- CNN Special Report on Espionage
- Why Spy? The Uses and Misuses of Intelligence, by Kober, CATO Institute
- Treason 101, Defense Security Service (DSS), "Your short course in Treason is a series of articles on how spies are caught, the prevalence of espionage, and why people spy." -- includes discussion of insider threats to info systems
- Employees' Guide to Security Responsibilities, Defense Security Service (DSS)
- Recent Espionage Cases, Defense Security Service (DSS)
- Espionage: Information-Gathering Using Covert Methods (local copy), Twelfth Lesson from the Al Qaeda Training Manual posted by the US Dept of Justice -- look at with a view toward countering its methods
- Espionage Listing, Freedom of Information Act, FBI
- Office of the National Counterintelligence Executive (NCIX)
- Democracies and Their Spies, by Berkowitz, in Hoover Digest, Winter 2003
- Cold War Espionage - a chronology, from U. of San Diego
- The Use of Spies (local copy), by Sun Tzu, in The Art of War
Cryptology
- National Cryptologic Strategy for the 21st Century (local copy), outline of the National Security Agency/Central Security Service's strategic plan
- Center for Cryptologic History at NSA
- National Cryptologic Museum at NSA
- New light shed on unbreakable encryption, 15 Nov 02, ZDNet News
- Scientists at Northwestern University say they have harnessed the properties of light to encrypt information into code that can be cracked only one way: by breaking the physical laws of nature.
- This high-speed quantum cryptography method allowed the scientists to send encrypted data over a fiber-optic line at 250mbps (megabits per second), which the researchers said was more than 1,000 times faster than what was achievable with existing quantum technology.
- Encryption Formulas Declassified, DoD news release, June 1998
- Advanced Encryption Standard (AES) Development Effort, "a crypto algorithm for the twenty-first century"
- Cryptologia, a quarterly journal devoted to all aspects of cryptology
- Navajo Code Talkers: World War II Fact Sheet
- Navajo Code Talkers' Dictionary
- Cryptology in the 16th and 17th Centuries, by Leary, in Cryptologia
- Cryptography's Role In Securing the Information Society, Computer Science and Telecommunications Board, National Research Council
- RSA Cryptographic Challenges, "a research tool" consisting of cash prizes for cracking encryption puzzles
Counterintelligence
- See also Espionage & Spies
- The National Counterintelligence Strategy of the United States
- DoD Directive 5105.67, "Department of Defense Counterintelligence Field Activity (DoD CIFA)
- FM 34-60 Counterintelligence
- Operations Security (OPSEC)
- Office of the National Counterintelligence Executive (NCIX)
- The Ten Commandments of Counterintelligence (local copy), by Olson, in Studies in Intelligence, Fall-Winter, No. 11, 2001
- Office of Counterintelligence (OCI), Department of Energy, Hanford Site - includes Counterintelligence Quarterly and
- Defense Security Service (DSS), including counterintelligence
- DSS Security Library, including papers on risk from foreign film crews and use of contract bidding to gather intelligence
- Employees' Guide to Security Responsibilities, Defense Security Service (DSS)
- Counterintelligence Indicators
- True Spy Stories
- Collection from Open Sources
- National Security Threat List
- The FBI's foreign counterintelligence mission is set out in a strategy known as the National Security Threat List (NSTL). The NSTL combines two elements:
- First is the Issues Threat List -- a list of eight categories of activity that are a national security concern regardless of what foreign power or entity engages in them.
[click here for expanded description of each]
- Terrorism
- Espionage
- Proliferation
- Economic Espionage
- Targeting the National Information Infrastructure
- Targeting the U.S. Government
- Perception Management
- Foreign Intelligence Activities
- Second is the Country Threat List -- a classified list of foreign powers that pose a strategic intelligence threat to U.S. security interests. The activities of these countries are so hostile, or of such concern, that counterintelligence or counterterrorism investigations are warranted to precisely describe the nature and scope of the activities as well as to counter specific identified activities.
- Declassified Department of Justice 1995 Memo: Instructions on Separation of Certain Foreign Counterintelligence and Criminal Investigations (local copy)
- Centre for Counterintelligence and Security Studies (CI Centre)
- Cox Report on Chinese Nuclear Espionage
- Economic Espionage: Information on Threat from U.S. Allies (local copy), GAO report, 1996
Intelligence Process & Types of Intelligence
- From www.intelligence.gov
- There are six basic intelligence sources, or collection disciplines:
- Signals Intelligence (SIGINT)
- Imagery Intelligence (IMINT)
- Measurement and Signature Intelligence (MASINT)
- Human-Source Intelligence (HUMINT)
- Open-Source Intelligence (OSINT)
- Geospatial Intelligence.
- When information has been reviewed and correlated with information available from other sources, it is called finished intelligence. Five categories of finished intelligence are available to the consumer.
- Current intelligence addresses day-to-day events, seeking to apprise consumers of new developments and related background, to assess their significance, to warn of their near-term consequences, and to signal potential dangerous situations in the near future.
- Estimative intelligence deals with what might be or what might happen. Its main role is to help policymakers navigate the gaps between available facts by suggesting alternative patterns into which those facts might fit and to provide informed assessments of the range and likelihood of possible outcomes.
- Warning intelligence sounds an alarm or gives notice to policymakers. It includes identifying or forecasting events that could cause the engagement of US military forces, or those that would have a sudden and deleterious effect on US foreign policy concerns. Warning intelligence involves exploring alternative futures and low probability/high impact scenarios.
- Research intelligence consists of in-depth studies. It underpins both current and estimative intelligence. It includes two subcategories of research. Basic intelligence consists primarily of the structured compilation of geographic, demographic, social, military, and political data on foreign countries. Intelligence for operational support incorporates all types of intelligence production and is tailored, focused, and rapidly produced for planners and operators.
- Scientific and technical intelligence includes information on technical developments and characteristics, performance, and capabilities of foreign technologies. It covers the entire spectrum of sciences, technologies, weapon systems, and integrated operations.
- A Guide to Intelligence, at DoD GulfLINK site (local copy)
- Intelligence Process, as described by FBI
- Requirements are identified information needs
- Planning and Direction is management of the entire effort, from identifying the need for information to delivering an intelligence product to a consumer
- Collection is the gathering of raw information based on requirements
- Processing and Exploitation involves converting the vast amount of information collected to a form usable by analysts
- Analysis and Production is the conversion of raw information into intelligence
- Dissemination--the last step--which directly responds to the first, is the distribution of raw or finished intelligence to the consumers whose needs initiated the intelligence requirements
Signals Intelligence (SIGINT)
- From www.intelligence.gov
- Signals intelligence is derived from signal intercepts comprising -- however transmitted -- either individually or in combination:
- all communications intelligence (COMINT)
- electronic intelligence (ELINT)
- foreign instrumentation signals intelligence (FISINT)
- The NSA is responsible for collecting, processing, and reporting SIGINT. The National SIGINT Committee within NSA advises the Director, NSA, and the DCI on SIGINT policy issues and manages the SIGINT requirements system.
- National Security Agency (NSA)
- POPPY Satellite Reconnaissance Program Recognized - 12 Sep 2005 - "National Reconnaissance Office (NRO), National Security Agency (NSA) and Naval Research Laboratory announce the declassification of the Cold War POPPY electronic intelligence (ELINT) reconnaissance program"
- Reconnaissance and Signals Intelligence Satellites, U.S. Centennial of Flight web site
Imagery Intelligence (IMINT)
- From www.intelligence.gov
- Imagery Intelligence includes representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media. Imagery can be derived from visual photography, radar sensors, infrared sensors, lasers, and electro-optics. NGA is the manager for all imagery intelligence activities, both classified and unclassified, within the government, including requirements, collection, processing, exploitation, dissemination, archiving, and retrieval.
- National Geospatial-Intelligence Agency (NGA) - formerly National Imagery and Mapping Agency (NIMA)
- IMINT Gallery at FAS, with IMINT from Enduring Freedom on back -- including pre- and post-strike photos from Afgahnistan, imagery from Gulf War strikes, imagery grouped by source, etc.
- Remote Sensing Tutorial, NASA document, lotsa detail
- From Counterspace Operations for Information Dominance by James G. Lee, Oct 1994, AU Press
- Reconnaissance and Signals Intelligence Satellites, U.S. Centennial of Flight web site
- CORONA Satellite Photography
, approximately 880,000 declassified military photographs
Measurement and Signature Intelligence (MASINT)
- From www.intelligence.gov
- Measurement and Signature Intelligence is technically derived intelligence data other than imagery and SIGINT. The data results in intelligence that locates, identifies, or describes distinctive characteristics of targets. It employs a broad group of disciplines including nuclear, optical, radio frequency, acoustics, seismic, and materials sciences. Examples of this might be the distinctive radar signatures of specific aircraft systems or the chemical composition of air and water samples. The Central MASINT Organization, a component of DIA, is the focus for all national and DoD MASINT matters.
- Defense Intelligence Agency (DIA)
- An Introduction to MASINT
- MASINT, per TRADOC's "Army Target Sensing Systems Handbook", 1 March 1994
- Scientific and technical intelligence information obtained by quantitative and qualitative analysis of data (metric, angle, spatial, wavelength, time dependence, modulation, plasma, and hydromagnetic) derived from specific technical sensors for the purpose of identifying any distinctive features associated with the source, emitter, or sender and to facilitate subsequent identification and/or measurement of the same. MASINT includes: Radar Intelligence (RADINT), Acoustic Intelligence (ACOUSTINT), Nuclear Intelligence (NUCINT), Radio Frequency/Electromagnetic Pulse Intelligence (RF/EMPINT), Electro-optical Intelligence (ELECTRO-OPTINT), Laser Intelligence (LASINT), Materials Intelligence, Unintentional Radiation Intelligence (RINT), Chemical and Biological Intelligence (CBINT), Directed Energy Weapons Intelligence (DEWINT), Effluent/Debris Collection, Spectroscopic Intelligence, and Infrared Intelligence (IRINT).
Human-Source Intelligence (HUMINT)
- See also Espionage & Spies
- See also Interrogation on Communication Skills page
- Field Manual 2-22.3, Human Intelligence Collector Operations, Sep 2006 - replaced FM 34-52 Intelligence Interrogation (1992)
- ST 2-91.6, Small Unit Support to Intelligence
- FM 2-91.6 Soldier Surveillance and Reconnaissance: Fundamentals of Tactical Information Collection
- HUMINT-Centric Operations: Developing Actionable Intelligence in the Urban Counterinsurgency Environment (local copy), by Baker, in Military Review, Mar-Apr 2007
- Establishment of the National Clandestine Service (NCS), October 13, 2005
- The NCS will serve as the national authority for the integration, coordination, deconfliction, and evaluation of human intelligence operations across the entire Intelligence Community, under authorities delegated to the Director of the CIA who serves as the National HUMINT Manager.
- Statement From Pentagon Spokesman Lawrence DiRita on Intelligence Activities of the Defense Department (local copy), DoD news release, 23 Jan 05 - mentions the Defense Human Intelligence Service
- From www.intelligence.gov
- Human intelligence is derived from human sources. To the public, HUMINT remains synonymous with espionage and clandestine activities, yet, in reality, most HUMINT collection is performed by overt collectors such as diplomats and military attaches. HUMINT is the oldest method for collecting information, and until the technical revolution of the mid to late twentieth century, it was the primary source of intelligence. HUMINT is used mainly by the CIA, the Department of State, the DoD, and the FBI . Collection includes clandestine acquisition of photography, documents, and other material; overt collection by personnel in diplomatic and consular posts; debriefing of foreign nationals and US citizens who travel abroad; and official contacts with foreign governments. The National HUMINT Requirements Tasking Center is responsible for providing guidance for HUMINT activities, which are reflected in the National HUMINT Collection Directive. As part of this national effort, all HUMINT collection within the DoD is managed by the Defense HUMINT Service, under the direction of DIA’s Directorate for Operations.
- Central Intelligence Agency (CIA)
- Defense Intelligence Agency (DIA)
- Federal Bureau of Investigation (FBI)
- Department of State
Open Source Intelligence (OSINT)
- See also Economic & Competitive Intelligence
- See also Publications
- See also Blogs, Milblogs on the Cyberspace and Information Operations Study Center
- Open Source Works on Intellipedia
- Open Source Works was created in 2007 by the CIA's Director for Intelligence and charged with drawing on language-trained analysts to mine open-source information for new or alternative insights into intelligence issues. Open Source Works products are based only on unclassified information and do not represent the coordinated views of the Central Intelligence Agency. We have organized our information geographically and by sections that reflect research products underway; published products; and our knowledge base. Excluding already published products, the material on this Wiki constitutes unreviewed work in progress and therefore does not represent OSW's final judgment on the substance of any given issue.
- Open Source Center (OSC), formerly known as Foreign Broadcast Information Service (FBIS)
- Open-Source Spying, by Clive Thompson, New York Times, 3 Dec 2006 - discusses need for intelligence community to use open sources and the communication techniques used on the global internet (such as instant mail and wikis and blogs)
- National Air & Space Intelligence Center (NASIC), formerly known as NAIC
- NOSI-Naval Open Source Intelligence
- From www.intelligence.gov
- Open-Source Intelligence is publicly available information appearing in print or electronic form including radio, television, newspapers, journals, the Internet, commercial databases, and videos, graphics, and drawings. While open-source collection responsibilities are broadly distributed through the IC, the major collectors are the Foreign Broadcast Information Service (FBIS) and the National Air Intelligence Center (NAIC).
- Information Operations: Putting the "I" back into DIME (local copy), by Steele, Strategic Studies Institute (SSI), Feb 2006 - includes discussion of relationship between strategic communication and open source intelligence
- Diving the Digital Dumpster: The Impact of the Internet on Collecting Open-Source Intelligence, by Umphress, in Air & Space Power Journal, Winter 2005
- Comprehensive Assessment of Department of Defense Human Factors Analysis Methodologies - Statement of Work
- Additionally, the information that supports IO HF analysis can be derived largely from open sources. Open source information exploitation has been identified as severely deficient by various sources, including Commissions on Intelligence Reform, the 2005 Intelligence Reform Act, and the Defense Open Source Council. Development of a repeatable exploitation model in support of IO activities using open source can have immediate and far-reaching positive implications both to IO and other areas of Intelligence Community (IC) interest.
- Reexamining the Distinction Between Open Information and Secrets, by Mercado, in Studies in Intelligence, vol. 49, no. 2, 2005
- Not only are open sources at times indistinguishable from secrets, but OSINT often surpasses classified information in value for following and analyzing intelligence issues. By value, I am thinking in terms of speed, quantity, quality, clarity, ease of use, and cost.
- Quantity: There are far more bloggers, journalists, pundits, television reporters, and think-tankers in the world than there are case officers. While two or three of the latter may, with good agents, beat the legions of open reporters by their access to secrets, the odds are good that the composite bits of information assembled from the many can often approach, match, or even surpass the classified reporting of the few.
- Sailing the Sea of OSINT in the Information Age, by Mercado, in Studies in Intelligence, vol. 48, no. 3, 2004
- Open Source Intelligence (local copy), review essay by Friedman, in Parameters, Summer 1998 - although discussion of the internet is dated, the essay is a good quick read about the OSINT arena
- We Need Spy Blogs: An Army officer calls for better information gathering, by Alexander, in Wired, Mar 2005
- And why not tap the brainpower of the blogosphere as well? The intelligence community does a terrible job of looking outside itself for information. From journalists to academics and even educated amateurs - there are thousands of people who would be interested and willing to help. Imagine how much traffic an official CIA Iraq blog would attract. If intelligence organizations built a collaborative environment through blogs, they could quickly identify credible sources, develop a deep backfield of contributing analysts, and engage the world as a whole. How cool would it be to gain "trusted user" status on a CIA blog?
- Using Google (TM) as a Reconnaissance Tool (local copy), slides for address by Ljutic, at FISSEA conference, 11 Mar 2004 (PPT version)
- The New Craft of Open Source Intelligence: How the U.S. Department of State Should Lead (local copy), presentation by Robert David Steele, at a State Department forum, 24 Mar 2004
- Employees' Guide to Security Responsibilities, Defense Security Service (DSS)
- Open Source Intelligence Handbook (local copy), NATO publication
- Open Source Intelligence Reader (local copy), NATO publication
- Intelligence Exploitation of the Internet (local copy), NATO publication
- OSS.NET
- Open-Source Intelligence From the Airwaves - FBIS Against the Axis, 1941-1945, by Mercado, in Studies in Intelligence, Fall-Winter 2001
Geospatial Intelligence
Medical Intelligence (MEDINT)
- From the DoD Dictionary
- medical intelligence - (DOD) That category of intelligence resulting from collection, evaluation, analysis, and interpretation of foreign medical, bio-scientific, and environmental information that is of interest to strategic planning and to military medical planning and operations for the conservation of the fighting strength of friendly forces and the formation of assessments of foreign medical capabilities in both military and civilian sectors. Also called MEDINT.
- medical surveillance - (DOD) The ongoing, systematic collection of health data essential to the evaluation, planning, and implementation of public health practice, closely integrated with the timely dissemination of data as required by higher authority. See also surveillance.
- Armed Forces Medical Intelligence Center (AFMIC), DIA
- Epidemic Intelligence Service (EIS), CDC
Environmental Intelligence
Economic & Competitive Intelligence
- See also Open Source Intelligence (OSINT)
- Strategic Intelligence, Loyola College in Maryland
- Economic Intelligence, Loyola College in Maryland
- Office of the National Counterintelligence Executive (NCIX)
- Economic Collection and Industrial Espionage, DSS
- Society of Competitive Intelligence Professionals (SCIP)
- Business Information & Competitive Intelligence eJournals, Hanford Technical Library, Pacific Northwest National Laboratory
- Competitive Intelligence / Business Analysis Resources (local copy), from Pacific Northwest National Laboratory
- Piecing Together Competitive Intelligence using Scenarios in the Classroom (local copy), paper by Armstrong and Davey, at the Third Annual World Conference on Information Security Education (wise[3]), June 2003
- 23rd National Information Systems Security Conference proceedings, Oct 2000
- Economic Espionage: Information on Threat from U.S. Allies (local copy), GAO report, 1996
Law Enforcement Intelligence
- Global Intelligence Working Group (GIWG) - "Global serves as an advisory body to the federal government-specifically through the U.S. Attorney General and the Assistant Attorney General, OJP-to facilitate standards-based electronic information exchange throughout the justice and public safety communities."
- Interpol, the International Criminal Police Organization (ICPO)
- Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies, from Office of Community Oriented Policing Services (COPS), U.S. Dept of Justice
- Chapter 1 - Law Enforcement Intelligence
- Chapter 2 - Understanding Contemporary Law
- Chapter 3 - A Brief History of Law Enforcement
- Chapter 4 - Intelligence-Led Policing
- Chapter 5 - The Intelligence Process
- Chapter 6 - Law Enforcement Intelligence Classifications, Products, and Dissemination
- Chapter 7 - Managing the Intelligence Function
- Chapter 8 - Human Resource Issues
- Chapter 9 - Networks and Systems
- Chapter 10 - Intelligence Requirements and Threat Assessment
- Chapter 11 - Federal Law Enforcement Intelligence
- Chapter 12 - Summary, Conclusions, and Next Steps
- The Production and Sharing of Intelligence, also from COPS
- Information Technology Initiatives, Dept of Justice - "the information sharing resource for the justice and public safety communities"
- International Association of Law Enforcement Intelligence Analysts (IALEIA)
- Sources of Law Enforcement Intelligence, by Cook, Municipal Police Officers' Education and Training Commission (MPOETC), Penn.
- Law Enforcement Intelligence Unit (LEIU) - purpose "is to gather, record, and exchange confidential information not available through regular police channels, concerning organized crime and terrorism"
- more resources online
Social Intelligence, or Cultural Intelligence
- See also strategic culture
- See also cultural awareness and cross-cultural communication
- Small Wars Journal - cultural intelligence resources
- USMC Center For Advanced Operational Culture Learning (CAOCL)
- Joint Cultural Intelligence Seminars, Marine Small Wars Center of Excellence
- As had been the case for 200 years, today's Marines may be called upon to fight in any corner of the globe. In many of these conflicts, particularly those classified as "small wars," the key factor in determining who wins and who loses will often be knowledge of the local culture. Culture is far more than language, folklore, food, or art. It is the lens through which people see, and make sense of, their world. Culture determines what is admired and what is despised, what makes life worth living, and what things are worth dying for. This is particularly true in times of great stress, to include natural disasters and war.
- One of the more important techniques for preparing Marines to deal with a particular culture is the cultural intelligence seminar. This is an exercise that allows persons with first hand, detailed knowledge of a particular culture to make that knowledge available to Marines.
- Building a Virtual Cultural Intelligence Community (local copy), by Zahn and Lacey, Naval Postgraduate School, June 2007
-
The U.S. intelligence community is without peer in providing high-quality, detailed technical intelligence. Due to the intelligence community’s efforts, the USG has a thorough understanding of its adversaries’ activities. What we propose is to develop a means by which that same intelligence community can use cultural factors to answer the question “Why?”
- Incorporating Cultural Intelligence Into Joint Doctrine (local copy), by Coles, in IO Sphere, Spring 2006
- Cultural Intelligence & Joint Intelligence Doctrine (local copy), by Coles, in Joint Operations Review, 2005, published by Joint Forces Staff College
- Book review by Riva of Cultural Intelligence: Individual Interactions Across Cultures, book by Earley and Ang, in Studies in Intelligence, vol. 49, no. 2, 2005
- Earley and Ang define cultural intelligence as “a person’s capability to adapt to new cultural contexts” (59). Their key objective is to address the problem of why people fail to adjust to and understand new cultures. Behavioral, cognitive, and motivational aspects are central to their cultural intelligence framework. By integrating multi-disciplinary perspectives, research data, and practical applications, the authors add significantly to organizational behavior literature.
- Intelligence Community course developers, in particular, will benefit from Earley and Ang’s ideas to improve seminars and training sessions that involve examining cross-cultural factors in national security missions. Training programs and publications must be constantly updated and revised to reflect changing socio-cultural, political, and economic landscapes. Programs that are ineffective in addressing cultural adaptation can be costly to organizations.
- The process aspects of cultural intelligence involve analysis at three levels of increasing specificity. The top-down analytical approach begins with the universal level, which refers to people’s innate knowledge (86). Below that, the culture level draws on specific aspects of culture to mediate between the universal level and the final level, the setting level. The setting level requires knowledge that allows one to respond to specific context, people, and event timing.
- Avoiding a Napoleonic Ulcer: Bridging the Gap of Cultural Intelligence (Or,Have We Focused on the Wrong Transformation?) (local copy, pdf), CJCS award winning essay, by Smith, Marine Corps War College - with historical and current cases
- If the current modus operandi of insurgents in Iraq is an indicator of the total disregard that future adversaries will have toward global societal norms, the joint force will, in many respects, be operating with one hand tied behind its back. The U.S. military can ill afford to have the other hand bound through the development of comprehensive campaign plans not grounded in solid cultural understanding of countries and regions within which it will likely operate. To do so risks adding yet another footnote to history highlighting an intelligence gap between combat and stability and support operations.
- The Military Cooperation Group (local copy), by Renzi, Naval Postgraduate School, Dec 2006
- The United States has experienced a significant amount of difficulty of late with two factors: a) how to fight against a networked enemy, and b) the need for more cultural intelligence. This thesis will describe a structure to assist with both those needs. The premise is that an expanded and improved network of US Military Groups is the weapon of choice for the war on terror, and beyond.
- Networks: Terra Incognita and the Case for Ethnographic Intelligence (local copy), by Renzi, in Military Review, Sep-Oct 2006
- Full-Spectrum Analysis: a New Way of Thinking for a New World (local copy), by Wolfberg, in Military Review, Jul-Aug 2006
- Transformation Chief Outlines Strategy for New Battlefield (local copy, pdf),
(local copy, doc),
American Forces Press Service coverage of 4 Aug 2004 speech by Cebrowski
- The focus on intelligence has changed, too, he said. Social intelligence -- an in-depth knowledge of local culture and customs -- is being valued much more over military intelligence.
- 'Social Intel' New Tool For U.S. Military: Intelligence Increasingly Focuses on Relationships Among Individuals, by Scully, in Defense News, 26 Apr 2004
- This kind of intel is key to sorting out friend from foe on a battlefield without lines or uniforms. Combat troops are becoming intelligence operatives to support stabilization and counterinsurgency operations in Iraq, and the phenomenon will become more common as the U.S. military adapts its forces to fight terrorist organizations and other nonstate actors.
- Pentagon Seeing New Keys To Victory: Report emphasizes post-combat work, 'social intelligence', by Bender, Boston Globe, 15 Nov 2003, describing a Pentagon paper provided to the newspaper
- While overwhelming military power will remain the pillar of national defense, officials are reaching the conclusion that the United States needs to place significantly more emphasis on ways to consolidate its victories, which now seem almost assured given the unmatched superiority of American land, air, and sea forces.
- The Pentagon report says a major element of success is the mastery of "social intelligence" by soldiers, diplomats, and aid workers schooled in the process of stabilizing chaotic societies, and possessing a working knowledge of local culture and customs.
- "We must be able to look and operate deeply within societies," the paper says. Also described as critical are close relationships between the United States and international civilian and military authorities who will ultimately be responsible for securing the peace.
- Strategic Implications of Cultures in Conflict, by Belbutowski, in Parameters, Spring 1996
- "Understanding culture may help to answer important military and civil questions such as the will of the enemy to fight, the determination of resistance groups to persevere, or the willingness of the populace to support insurgents or warlords. Culture, comprised of all that is vague and intangible, is not generally integrated into strategic planning except at the most superficial level. It appears increasingly in scholarly work, however, on problems associated with emerging nations."
- Culture... A Neglected Aspect of War (local copy), by Lindberg, 1996 CSC paper
Strategic Intelligence
- See also Intelligence & Policy Makers above
- See also National Security Threat List above, especially the point about the Country Threat List membership
- See also Economic and Competitive Intelligence
- Strategic Intelligence, Loyola College in Maryland
- Military Intelligence, Loyola College in Maryland
- Economic Intelligence, Loyola College in Maryland
- Master of Strategic Intelligence, American Military University - check out the listings of specialization areas and lesson titles
- additional university courses, degrees, and other resources
- Stratfor "provides strategic intelligence on global business, economic, security and geopolitical affairs"
- Richard K. Betts and Thomas G. Mahnken, eds. Paradoxes of Strategic Intelligence: Essays in Honor of Michael I. Handel. London, UK: Frank Cass, 2003
- Rhodri Jeffreys-Jones, The CIA and American Democracy, New Haven: Yale University Press, 1987
- Sherman Kent, Strategic Intelligence for American World Policy, Princeton: Princeton University Press, 1966 - a classic which covers the basics
Intelligence on Iraq
- See also commissions
- POLO STEP briefing slides pre-Iraq invasion, declassified, posted 14 Feb 07
- National Intelligence Estimates
- Review of the Pre-Iraqi War Activities of the Office of the Under Secretary of Defense for Policy, posted by the DoD Office of Inspector General
- Part I (.pdf, 3397 Kb)
- Part II (.pdf, 3567 Kb)
- Part III (.pdf, 3406 Kb)
- Part IV (.pdf, 4014 Kb)
- Review of Pre-Iraqi War Activities of the Office of the Under Secretary of Defense for Policy (local copy), executive summary of DoD Inspector General report, 9 Feb 2007 - discussing appropriateness of assessments before the war regarding the relationship between Iraq and al-Qaida
- Iraq Study Group Report, 6 Dec 2006, from U.S. Institute of Peace
- Declassified Key Judgments of the National Intelligence Estimate "Trends in Global Terrorism: Implications for the United States" dated April 2006 (local copy) - including addressing Iraq
- Iraqi Chemical Munitions - 21 Jun 06 unclassified overview of chemical munitions recovered in Iraq since May 2004 (local copy) - from the Director of National Intelligence, by way of the House Permanent Select Committee on Intelligence
- Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (aka Silberman-Robb Commission)
- 6 Oct 04 hearings of Senate Armed Services Committee
- Comprehensive Report of the Special Advisor to the Director of Central Intelligence on Iraq's WMD, 30 Sep 2004
- In defence of the intelligence services, by Efraim Halevy, former head of Mossad, in The Economist, 29 Jul 04
- Report on the U.S. Intelligence Community's Prewar Intelligence Assessments on Iraq (local copy), 7 July 2004, Select Committee on Intelligence, U.S. Senate - warning ... 24 Mb file
- Review of Intelligence on Weapons of Mass Destruction (local copy), House of Commons, 14 July 2004
- The Decision to go to War in Iraq (local copy), House of Commons, Foreign Affairs Committee, Ninth Report, 3 July 2003
- Congressional Research Service (CRS) Reports
- Iraq and Weapons of Mass Destruction (local copy), 5 Feb 2004 speech, by George Tenet, Director of Central Intelligence
- Iraq's WMD Programs: Culling Hard Facts from Soft Myths (local copy), Nov 2003 article by the Vice Chairman of the National Intelligence Council (NIC)
- Statement to Congress by David Kay on the Interim Progress Report
on the Activities of the Iraq Survey Group (ISG) (local copy), 2 Oct 2003
- Declassified excerpts from Oct 2002 National Intelligence Estimate (local copy), released 18 July 2003
- Iraqi Mobile Biological Warfare Agent Production Plants (local copy), 28 May 2003 CIA report
- Iraq's Weapons of Mass Destruction Programs (local copy), 4 Oct 2002 CIA report
- The Iraqi WMD Challenge: Myths and Reality (local copy), Task Force on Terrorism & Unconventional Warfare, U.S. House of Representatives
- 1998 FBI press release about indictment of BIN LADEN and MUHAMMAD ATEF for embassy bombings (local copy)
- Count One, Paragraph 4 of the Bin Laden indictment
- Al Qaeda also forged alliances with the National Islamic Front in the Sudan and with the government of Iran and its associated terrorist group Hezballah for the purpose of working together against their perceived common enemies in the West, particularly the United. States. In addition, al Qaeda reached an understanding with the government of Iraq that al Qaeda would not work against that government and that on particular projects, specifically including weapons development, al Qaeda would work cooperatively with the Government of Iraq.
- Iraq - Nuclear, Biological, Chemical, and Missile Capabilities and Programs, Monterey Institute of International Studies
- Center for Strategic and International Studies (CSIS)
Intelligence and 9-11
- See also intelligence-related Congressional Research Service (CRS) reports
- See also commissions
- See also Intelligence Reorganization
- World Trade Center Attack: the Official Documents - hosted by Columbia University
- Report on CIA Accountability with respect to the 9/11 Attacks (local copy), declassified executive summary of June 2005 report by CIA Office of IG, released 21 Aug 2007
- "9/11 Commission Staff Report on FAA Failings Published on Web," 10 Feb 2005, at National Security Archive, George Washington University
- National Commission on Terrorist Attacks Upon the United States (also known as the 9-11 Commission)
- Testimony of Attorney General John Ashcroft, April 13, 2004 (local copy), before the National Commission on Terrorist Attacks Upon the United States
- See Rice statement to 911 Commission, and 6 Aug 2001 presidential daily briefing (PDB)
- Joint Inquiry into Intelligence Community Activities before and after the Terrorist Attacks of September 11, 2001, Dec 2002 Congressional report
- Statement for the Record by Lieutenant General Michael V. Hayden, USAF Director, National Security Agency/Chief, Central Security Service (local copy), Before the Joint Inquiry of the Senate Select Committee On Intelligence and the House Permanent Select Committee On Intelligence,
Washington, D.C., 17 October 2002
- insight into three questions:
(a) What did NSA know prior to September 11th,
(b) what have we learned in retrospect, and
(c) what have we done in response?
- Counterterrorism Intelligence Capabilities and Performance Prior to 9-11 (local copy), report by Subcommittee on Terrorism and Homeland Security, House Permanent Select Committee on Intelligence
- Why did U.S. intelligence fail on September 11th, PBS Frontline report
- FBI Intelligence Investigations: Coordination within Justice on Counterintelligence Criminal Matters Is Limited (local copy), GAO report, July 2001
- Able Danger
Counterdrug Intelligence
- See also Congressional Research Service (CRS) reports on drugs and crime
- See also National Drug Control Strategy, from the Office of National Drug Control Policy (listed with other national strategies)
- Office of National Drug Control Policy (ONDCP)
- Drug Control: An Overview of U.S Counterdrug Intelligence Activities (local copy), GAO report, June 1998
- - includes table of what type of intelligence comes from which agencies
- - includes definitions of strategic, operational, and tactical intelligence
- National Drug Intelligence Center (NDIC)
- Established in 1993, the National Drug Intelligence Center (NDIC) is a component of the U.S. Department of Justice and a member of the Intelligence Community. The General Counterdrug Intelligence Plan, signed by the President in February 2000, designated NDIC as the nation's principal center for strategic domestic counterdrug intelligence.
- [from the GCIP above] The mission of the National Drug Intelligence Center (NDIC) is:
- To support national policy decision makers with timely strategic domestic drug intelligence assessments, focusing on the production, consumption, and trafficking trends and patterns of all illicit drugs inside U.S. national borders and territories.
- To help the Intelligence Community guide and prioritize its counterdrug effort, it will provide to the originating law enforcement agency, or with the permission of the originating agency, foreign-related investigative leads discovered in its domestic analyses.
- To produce an annual National Drug Threat Assessment, to produce or coordinate interagency regional drug threat assessments, and to participate in other joint counterdrug assessments involving the integration of foreign and domestic drug information.
- Multiagency Course - Introduction to Basic Drug Intelligence Analysis
- Director of Central Intelligence (DCI)
- Defense Intelligence Agency (DIA)
- Office for Counterdrug Analysis (TWD)
- U.S. Drug Enforcement Administration (DEA)
- U.S. Immigration and Customs Enforcement (ICE)
- See Appendix C of GCIP above for additional government agencies involved in counterdrug intelligence
Steganography - hiding in plain sight
Miscellaneous
Other Links
[return to top]