Title: Intelligence Community
1(No Transcript)
2(No Transcript)
3Intelligence Community
CIA only one (small) element of the
community Total budget is secret --- believed to
be about 30 billion in 2001 --- largest
proportion goes to Defense Department DCI
(Director of Central Intelligence) --- by statute
the Director of the CIA Why central? --- Pearl
Harbor
4Intelligence Community
Mission is to collect and interpret information,
overcoming in the process and barriers to keep
secret the activities, capabilities and plans of
foreign powers or organizations --
collection -- analysis -- counter-intelligence An
d covert action?
5Intelligence Community
- We can dispose of several smaller members of IC
- Energy (counter-intelligence on nuclear weapons)
Wen Ho Lee - Treasury (technical, financial and money
- State (INR)
- The inter-agency process and all source
intelligence - --- each agency has independent capability
- --- but not usually for collection
6Intelligence Community
Defense Department Uniformed Services
Army Airforce Navy Marines
Focus on tactical military intelligence
necessary To carry out military
operations Conflict between tactical and
strategic needs
7Intelligence Community
Office of Secretary of Defense --- DIA
(1961) Does have collection capability ---
military attachés overseas --- runs limited agent
operations --- has primary CI responsibilities
within DoD --- owns some platforms
(drones) Checkered history --- Vietnam, Soviet
capabilities and intentions Not a major player
until Gulf War, Bosnia
8Intelligence Community
Defense Department The National Security Agency
9Intelligence Community
NSA (No such agency) founded in 1952 --- Fort
Meade, MD --- largest component of the Community
in terms of money and personnel --- Headed
by uniformed officer and civilian deputy Lt. Gen.
Michael Hayden (USAF) 2 major functions --- make
codes (INFOSEC) --- break codes (SIGINT and
COMMINT)
10Memorial to 152 US Cryptologists 1946-2001
11National Security Agency
Cryptology
History Black Chamber and Secretaries of
State Purple and Pearl Harbor Bletchley Park and
Enigma VENONA
12(No Transcript)
13National Security Agency
Cryptology
History Black Chamber and Secretaries of
State Purple and Pearl Harbor Bletchley Park and
Enigma VENONA
14(No Transcript)
15National Security Agency
Cryptology
History Black Chamber and Secretaries of
State Purple and Pearl Harbor Bletchley Park and
Enigma VENONA
16(No Transcript)
17(No Transcript)
18National Security Agency
Analysis --- cryptography --- political and
economic analysis Collection --- uses DoD
assets airplanes, submarines and
satellites --- obtaining other peoples
codes 1950s 1960 and new technologies
19National Security Agency
Operation Gold Undersea exploits and the great
Soviet taps Glomar Explorer (CIA
Ops) GUPPY Nanda Devi Liaison Lop Nor 1971,
ECHELON
20National Security Agency
Major ears --- Bad Aibling --- West
Virginia --- Ellensburg/Yakima (Petaluma and 2
Trees) --- Okinawa Minor ears --- US
Embassies --- Incirlik --- Indy Station
21National Security Agency
Merger of Twin Technologies --- Collection
(Satellites) --- Analysis (Computers) CRAY and
other super computers Filters, keywords and
other unknowns
22National Security Agency
US has overwhelming advantage in technology ---
US,UK, AUS, CAN and NZ SIGINT Radar, telemetry,
microwave COMMINT telephone, telegraph, radio
and TV, fax, email Focus is
on strategic intelligence
23National Reconnaisance Office
Defense Department, like the NSA --- staffed by
DoD and CIA personnel Designs, builds and
operates US reconnaisance satellites Existence
declassified in 1992 Chantilly, VA
24National Imagery and Mapping Agency
Defense Department Secret until 1996 NPIC and
Defense mapping Agency The Folks who (helped)
bring you the Chinese Embassy bombing in Belgrade
25NRO
NPIC --- Cuban Missile Crisis CORONA KH-4 KH-9 Th
e breakthough KH-11 Current capabilities ---
LaCrosse --- multi-spectrum imaging
26(No Transcript)
27(No Transcript)
28(No Transcript)
29NRO
Efforts to declassify Current resolutions
(Hubble) Commercial resolutions
30Federal Bureau of Investigation
Primary agency for Counter-intelligence Runs
agent operations Has increasing overseas
presence --- Moscow Has increasing overseas law
enforcement --- Dar es Salaam, Nairobi
bombings --- USS Cole UNIQUE LAW ENFORCEMENT
AGENCY
31Central Intelligence Agency
32CIA
Mission Statement
To provide accurate, comprehensive, and timely
foreign intelligence on national security
topics To conduct counterintelligence
activities, special activities, and other
functions related to foreign intelligence and
national security, as directed by the President.
33CIA
Founded in 1947 Successor of the OSS (Office
Strategic Services) --- The Donovan heritage ---
sabotage and dirty tricks --- SOE and
MI-6 Hillenkoetters problems with
Truman French and Italian covert actions
34William Wild Bill Donovan
35(No Transcript)
36CIA
- Langley, VA
- Budget and personnel about the size of the State
Dept - --- 3.4 billion
- --- 9,000
- Divided into 4 main directorates
- DDP (Plans)
- DDI (Analysis)
- ST (Science and Technology)
- ADMIN (Administration)
37CIA
Firewall between intelligence and
policy Influence depends on relationship to
President Political vs non political
appointments Dulles (Eisenhower and
Kennedy) Helms (Nixon) Colby Turner Casey Woolsey
Webster George Tenant
38CIA
President is primary consumer --- National
Security Council Product disseminated through
government --- State, DoD, Treasury, and other
national security users Supposed to play
coordinating and supervisory role
39CIA
DDP (previously the DDO) Primary agency for
espionage Has large overseas presence Primary
lead for covert operations
40CIA
DDI Analysis and the NIO System Inter-agency
review and coordination May report independently
to President
41CIA
ST Inventors of technology from cell phones to
computers and digital communication Relations
hip with private sector Analysis of technical
issues
42CIA
ADMN Support staff Communications Finance Forgery
and disguise Oversight of 100 stations around
the world Support of NOC
43Intelligence Community
Firewall between intelligence and
policy Influence and relevance of the IC