collection disciplines and 2010 national security strategy

40
UNIVERSITY OF NEW HAVEN National Security Charter, Legal Issues & Executive Orders September 16, 2010

Upload: elopez560

Post on 22-Jun-2015

117 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Collection Disciplines and 2010 National Security Strategy

UNIVERSITY OF NEW HAVENNational Security Charter, Legal Issues & Executive Orders

September 16, 2010

Page 2: Collection Disciplines and 2010 National Security Strategy

Chapter 1 Review

An Introduction to the Intelligence Process for Addressing National Security Threats and

Vulnerabilit ies

What is Intelligence?

Why does the United States needs intelligence?

Where is the United States Vulnerable?

Page 3: Collection Disciplines and 2010 National Security Strategy

Chapter 1 Review

The International Dictionary of Intelligence defines intelligence as "the product resulting from the collecting and processing of information concerning actual and potential situations and conditions relating to domestic and foreign activities and to domestic and foreign or US and enemy-held areas." Leo D. Carl, International Dictionary of Intelligence (McLean, VA: Maven Books, 1990).

Definition of Intelligence

WHAT IS INTELLIGENCE?http://intellit.muskingum.edu/whatis_folder/whatisintelintro.html

Page 4: Collection Disciplines and 2010 National Security Strategy

The desired degree of secrecy about such information is known as its sensitivity. Sensitivity is based upon a calculation as to the damage to "national security". The United States has three levels of classification — confidential, secret, and top secret.

Each level of classification indicates an increasing degree of sensitivity — top-secret being the highest, and confidential being the lowest. If one holds a "top-secret" clearance, one is allowed to handle information up to the level of "top-secret" (thus, secret, and confidential information). If one holds a "secret" clearance, one may not then handle "top-secret" information, but may handle confidential classified information.

Government Secrecy

Page 5: Collection Disciplines and 2010 National Security Strategy

The U.S. Intelligence Community

Page 6: Collection Disciplines and 2010 National Security Strategy

Definition of Intelligence

What is Information?

What is Intelligence?

“Intelligence refers to information that meets the stated or understood needs of policy makers and has been collected, processed, and narrowed to meet those needs. Intelligence is a subset of the broader category of information” Lowenthal, Mark. Intelligence

Page 7: Collection Disciplines and 2010 National Security Strategy

Why Have Intelligence Agencies?

Intelligence exists solely to support policy makers

The policy maker is not the passive recipient of intelligence, but actively influences all aspects of intelligence

1. Avoid Strategic Surprise

2. To Provide Long Term Expertise

3. To Support the Policy Process

Page 8: Collection Disciplines and 2010 National Security Strategy

The Intelligence Disciplines

Page 9: Collection Disciplines and 2010 National Security Strategy

Human IntelligenceHUMINT

Intelligence gathering by means of Interpersonal Contact

Typical HUMINT activity consist of interrogations and conversations with persons having access to pertinent information.

Also known as “Espionage” “Spying”

The CIA is largely responsible for HUMINT via the National Clandestine Service (NCS)

Page 10: Collection Disciplines and 2010 National Security Strategy

Other HUMINT Agencies

Defense Intelligence Agency

Federal Bureau of Investigations

Drug Enforcement Administration

Page 11: Collection Disciplines and 2010 National Security Strategy

Definition of Intelligence

National Clandestine ServiceCoordinate among various agencies

conducting HUMINT

COMMUNITY HUMINT

TECHNOLOGY

CIA HUMINT

AGENT ACQUISITION CYCLE

•Targeting or Spotting

•Assessing

•Recruiting

•Handling

•Termination

Page 12: Collection Disciplines and 2010 National Security Strategy

Human Intelligence

HUMINT largely involves sending clandestine service officers to foreign countries, where they attempt to recruit foreign nationals to spy.

•Skills require time to be developed (foreign languages, conducting, detecting or evading security, recruiting skills)•Officers need to maintain cover stories (Official vs. Non-Official Cover)

WHAT ARE SOME IDEAL COVER JOBS FOR “NOC’s?”

WEAKNESSES•Cannot be done remotely (contends with counterintelligence capabilities of opponent)•Risk to human life•Political ramifications if caught•Possibly more susceptible to deception than the INT’s•Balancing prudent caution and haste in recruitment•Masking of HUMINT sources may devalue reports for analysts•Close contact with enemy for penetration may jeopardize morals

Page 13: Collection Disciplines and 2010 National Security Strategy

HUMINT collection requires the manipulation of other human beings as a potential source of information

The skills required to be a successful HUMINT collector are acquired over time with training or experience

Techniques to gain trust, including empathy, flattery and sympathyDirect methods may include bribery, blackmail and sex

Page 14: Collection Disciplines and 2010 National Security Strategy

Examples of HUMINT sources:•Advisors or internal defense•Diplomatic reporting by accredited diplomats•Espionage clandestine reporting, access agents, couriers,

cutouts•Military attaches•Non-governmental organizations•Prisoners of War (POW’s or detainees)•Refugees•Routine Patrolling•Special Reconnaissance

HUMINT Operations: Recruit foreign nationals, Direct Spying (stealing documents, planting sensors)

HUMINT

Page 15: Collection Disciplines and 2010 National Security Strategy

Signals Intelligence

The Art of Interception: “CODE-BREAKING”

SIGINT consists of several types of intercepts

Refers to the interception between two parties, or COMINT

TELEMETRY INTELLIGENCE (TELINT)ELECTRONIC EMISSIONS (ELINT) (FISINT)

•Foreign Instrumentation Signals Intelligence

“The ability to intercept communications is highly important, because it gives insight into what is being said, planned and considered. It comes as close as one can to reading the other person’s mind, a goal that cannot be achieved by imagery.”

“GEOINT (IMINT) tells you what has happened. SIGINT tells you what will happen” – Former NSA director

Page 16: Collection Disciplines and 2010 National Security Strategy

Measurement & Signatures Intelligence

Earth-Based Collectors

Page 17: Collection Disciplines and 2010 National Security Strategy

Measurement & Signatures Intelligence

Weapons Capabilities & Industrial Activities - Tends to be viewed in the subset of SIGINT

Consist of two major contributors1. FISINT – Foreign Instrumentation Signals Intelligence2. ELINT – Electronic Emissions Intelligence

Debate as to whether it should be a separate discipline or by-product of SIGINT

MASINT can help identify the types of gasses or waste leaving a factory, which can be important in chemical weapons identification

It can also help identify other specific characteristics (composition, material, content of weapons systems)

MASINT: Think “EMISSIONS”

Page 18: Collection Disciplines and 2010 National Security Strategy

Measurement & Signatures Intelligence

MASINT Has 6 Disciplines1. Electro-optical2. Geophysical3. Materials4. Nuclear Radiation5. Radar6. Radio Frequency

MASINT can be used against a wide array of intelligence issues, including WMD development and proliferation, arms control, environmental issues, narcotics, weapons developments, space activities and denial and deception practices.

MASINT suffers as an collection discipline because of dependence on other technical INT’s for its products

Requires analysts will more technical training

Page 19: Collection Disciplines and 2010 National Security Strategy

COMINT intercepts provide both “content” and “texture”

Content: What is being saidTexture: Tone, choice of words, accent

COMINT Weaknesses•Depends on communication that can be intercepted•Encrypted or coded communications•Use of false transmissions to avoid pattern detection•Vast quantity of information

“Even a focused collection plan collects more COMINT than can be processed and exploited”

Page 20: Collection Disciplines and 2010 National Security Strategy

Geospatial Intelligence

Intel discipline that used to be called imagery or IMINT

NGA defines GEOINT as “information about any object – - natural or man-made – that can be observed or referenced to the Earth, and has national security implications.

The term “imagery” can be somewhat misleading

Consist of natural objects and man-made objects

Page 21: Collection Disciplines and 2010 National Security Strategy

Geospatial Intelligence

Electro-optical systemsRadar ImagerInfrared Imagery (IR)

Multispectral (MSI) Hyperspectral (HSI)

Measurement & Signals Intelligence (MASINT)

Page 22: Collection Disciplines and 2010 National Security Strategy

Geospatial Intelligence

High Resolution Vs. Low Resolution Lower to Higher ResolutionAdvantages of SIGINT

Graphic and CompellingEasily understood much of the time by

policy makers

Targets make themselves availableProvides intelligence on ancillary

activities

Page 23: Collection Disciplines and 2010 National Security Strategy

Foundations of National Security Law

Page 24: Collection Disciplines and 2010 National Security Strategy

Truman Doctrine

The Truman Doctrine was a policy set forth by U.S. President Harry S Truman on March 12, 1947 stating that the U.S. would support Greece and Turkey with economic and military aid to prevent their falling into the Soviet sphere.Truman stated the Doctrine: it would be "the policy of the United States to support free peoples who are resisting attempted subjugation by armed minorities or by outside pressures." Truman reasoned, because these "totalitarian regimes" coerced "free peoples," they represented a threat to international peace and the national security of the United States. Truman made the plea amid the crisis of the Greek Civil War (1946–1949). He argued that if Greece and Turkey did not receive the aid that they urgently needed, they would inevitably fall to communism with grave consequences throughout the region.

http://www.ask.com/questions-about/Truman-Doctrine

Truman’s 1947 Speech – Time: 2:31

Page 25: Collection Disciplines and 2010 National Security Strategy

Truman Doctrine

What was the main goal of the Truman Doctrine?

What were the effects of the Truman Doctrine?

What was the western response to the development of the “Iron Curtain?”

The main goal of the Truman Doctrine was to stop the spread of _______________?

What did the Truman Doctrine State

When was the Truman Doctrine established?

Frequently Asked Questions

Page 26: Collection Disciplines and 2010 National Security Strategy

Marshall Plan

He challenged the countries of Europe to produce a plan, which the US would fund. By 12 July, the British politician Ernest Bevin (who called the Plan ‘a lifeline to sinking men’) had organized a meeting of European nations in Paris, which asked for $22 billion of aid. Stalin forbade Cominform countries to take part. Truman asked Congress for $17 bn, and Congress (after the collapse of Czechoslovakia, March 1948) gave $13 bn. Marshall Aid took the form of fuel, raw materials, goods, loans and food, machinery and advisers. It jump-started rapid European economic growth, and stopped the spread of Communism.

Soon after the Truman Doctrine promised to ‘support free peoples’ (March 1947), General George Marshall went to Europe. He was shocked by what he saw. Europe was ruined and – after the coldest winter in record – starving. Marshall told Truman that all Europe would turn Communist unless the US helped. Marshall announced his Plan to students at Harvard University on 5th June 1947. He promised that America would do ‘whatever it is able to do to assist in the return of normal economic health in the world.’

Page 27: Collection Disciplines and 2010 National Security Strategy

WHAT IS THE DIFFERENCE BETWEEN THE TRUMAN DOCTRINE AND MONROE

PLAN?

Truman Doctrine promised economic and military aid to countries threatened by communism that year,

Turkey and Greece

Marshal plan rebuilt the economies of war-ravaged western Europe to make them less susceptible to

communist appeals against capitalism

Page 28: Collection Disciplines and 2010 National Security Strategy

National Security Act of 1947

Background: In the aftermath of World War II, the National Security Act provided a major reorganization of the U.S. defense and intelligence agencies. As amended, the Act provides “a comprehensive program for the security of the United States” through the integration of the policies and procedures of U.S. military, intelligence, and national security agencies, and the coordination of national security policy. 50 U.S.C. § 401.

President Truman signed the National Security Act of 1947 onboard this VC-54C Presidential transport, the first aircraft used for the role of Air Force One. (At the time it was not painted with "U.S. Air Force" because it belonged to the USAAF.)

President Truman signs the National Security Act Amendment of 1949 in the Oval Office.

Page 29: Collection Disciplines and 2010 National Security Strategy

National Security Act of 1947

General Provisions

As amended, the National Security Act created or modified much of the U.S. intelligence, defense, and national security communities. Among its effects, the Act and its subsequent amendments:

reorganized the Intelligence Community,reorganized the Department of Defense,established the National Security Counsel,established the Central Intelligence Agency (CIA),established the position of Director of National Intelligence (DNI) to serve as the

President’s chief intelligence advisor and the head of the Intelligence Community, and to ensure closer coordination and integration of the sixteen agencies that make up the Intelligence Community,

established the National Counterterrorism Center to serve as a multiagency center analyzing and integrating all intelligence pertaining to terrorism,

including threats to U.S. interests at home and abroad,mandated the development of procedures for the disclosure of foreign

intelligence information acquired in criminal investigations and for notice of criminal investigations of foreign intelligence sources,

mandated the development of procedures for access to classified information, and

provided for presidential and congressional oversight of intelligence activities.

Page 30: Collection Disciplines and 2010 National Security Strategy

National Security Act of 1947

Privacy and other Civil Liberties Implications

Privacy and Other Civil Liberties Implications. The National Security Act, as amended by the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA), requires the creation of a Civil Liberties Protection Officer within the Office of the Director of National Intelligence. 50 U.S.C. § 403-3d. The Civil Liberties Protections Officer (CLPO) reports directly to the DNI and is responsible for:ensuring that privacy and civil liberties protections are incorporated into the ODNI’s policies and procedures,ensuring that personal information is handled in accordance with the Privacy Act, andconducting privacy impact assessments. 50 U.S.C. § 403-3d(d).

Title VII of the National Security Act requires the CIA, the National Geospatial-Intelligence Agency, the National Reconnaissance Office, the National Security Agency, and the Defense Intelligence Agency to:exempt operational files from provisions of the Freedom of Information Act that would otherwise require publication or disclosure, but also requires those agencies topermit search and review of operational files for information concerning “United States citizens or aliens lawfully admitted for permanent residence who have requested information on themselves” under the Freedom of Information Act or the Privacy Act. 50 U.S.C. Chapter 15, Subchapter V.

Page 31: Collection Disciplines and 2010 National Security Strategy

2010 National Security Strategy

NSS submitted every 4 years as required by CongressStrategic approach to National Security including

approach to strategic issuesLayout of American leadership

2010 NSS Strategy: BUILDING THE SOURCES OF AMERICA’S STRENGTH AND INFLUENCE AT HOME AND USING AMERICAN LEADERSHIP TO SHAPE AN INTERNATIONAL ORDER THAT CAN EFFECTIVELY DEAL WITH THE CHALLENGES OF THE 21ST CENTURY.

What are some strategic challenges facing the U.S. in the 21st Century?

Page 32: Collection Disciplines and 2010 National Security Strategy

2010 National Security StrategyStrategic Challenges

Nuclear Prol i ferati on

Cl imate Change

Violent Extremism

Growing the Global Economy

Page 33: Collection Disciplines and 2010 National Security Strategy

2010 National Security Strategy

Go to following website: http://www.acus.org/new_atlanticist/national-security-strategy-instant-reactions

Page 34: Collection Disciplines and 2010 National Security Strategy

2010 National Security Strategy

In 2006, the NSS declared America's war with "radical militant Islam" to be the single most important overarching framework for its relationship with the world. The 2010 NSS clearly meets that threat, but defines it far more narrowly and places it within a much broader context

How So?

The NSS lays out "a comprehensive strategy" in what it repeatedly calls a war against al-Qaeda and its affiliates, one "that denies [al-Qaeda and its affiliates] safe haven, strengthens front-line partners, secures our homeland, pursues justice through durable legal approaches, and counters a bankrupt agenda of extremism and murder with an agenda of hope and opportunity." It defines this in narrow terms: "this is not a global war against a tactic -- terrorism or a religion -- Islam. We are at war with a specific network, al-Qa'ida, and its terrorist affiliates." It places this war within the perspective of broader foreign policy concerns, and warns against overreaction to terrorist provocations -- pointing out, correctly, that al-Qaeda's strategy hopes to trigger such American overreactions, leading to counterproductive political responses and interventions which drain our resources, alienate our friends, and radicalize Muslims around the world.

Page 35: Collection Disciplines and 2010 National Security Strategy

2010 National Security StrategyDifferences between 2006 & 2010 NSS

Strategy's emphasis on tending the sources of our strength.

Strategy's emphasis on promoting our values by living them at home.

Strategy reduces reliance on military to solve our problems.

Strategy narrows definition of enemy.

Strategy of engagement "recognizes the world as it is and focuses on shaping it, not resisting it."

Strategy embeds war on Al Qaeda in a wider strategic vision.  First sentence of 2006 strategy:  "we are at war."

Strategy incorporates issues such as climate change whose importance Bush Admin rejected.

Page 36: Collection Disciplines and 2010 National Security Strategy

Open Laptops to Top Secret America Investigation

JFK’s speech on Secrecy and Freedom of the Press

Page 37: Collection Disciplines and 2010 National Security Strategy

In a single recent year the U.S. classified about five times the number of pages added to the Library of Congress. We live in a world where the production of secret knowledge dwarfs the production of open knowledge. Depending on whom you ask, government secrecy is either the key to victory in our struggle against terrorism, or our Achilles heel. But is so much secrecy a bad thing?

Secrecy saves: counter-terrorist intelligence officers recall with fury how a newspaper article describing National Security Agency abilities directly led to the loss of information that could have avoided the terrorist killing of 241 soldiers in Beirut late in October 1983. Secrecy guards against wanton nuclear proliferation, against the spread of biological and chemical weapons. Secrecy is central to our ability to wage an effective war against terrorism.Secrecy corrupts: From extraordinary rendition to warrantless wiretaps and Abu Ghraib, we have learned that, under the veil of classification, even our leaders can give in to dangerous impulses. Secrecy increasingly hides national policy, impedes coordination among agencies, bloats budgets and obscures foreign accords; secrecy throws into the dark our system of justice and derails the balance of power between the executive branch and the rest of government.

Page 38: Collection Disciplines and 2010 National Security Strategy

Final Project Assignments

Counter Intelligence

Cyber Operations

Human Intelligence

Intelligence Analysis

Technical Intelligence

Air/Satellite Operations

Ground Operations

Naval Operations

Nuclear Operations

Border Control

Counterdrug Operations

Disaster Preparedness

Law Enforcement

Counter IED Explosive Operations

Psychological Operations

Special Operations

Weapons Technology

Support & Administration

Page 39: Collection Disciplines and 2010 National Security Strategy

Final Project Guidelines

Create and present a PowerPoint presentation describing the operational function of your intelligence discipline.

In addition, your presentation must address the following points of interests:

1. Identify how many government organizations are involved in the discipline

2. Identify how many private companies support the development of the discipline

3. Identify the primary organization(s) responsible for employing the discipline and discern the extent to which duplication of effort may be a problem. (Example)

4. Examine whether the employ of a discipline should be eliminated from an agency’s responsibility

5. Identify and describe any tensions, which may exist between your discipline and civil liberties (I.e.: Habeas Corpus/Posse Comitatus)

Page 40: Collection Disciplines and 2010 National Security Strategy

Final Project Guidelines

1. Identify and summarize the Executive Order/Directives from which participating agency’s/organizations derive authority.

2. Provide a hypothesis on trends or challenges facing your selected discipline by 2020 or beyond

3. Identify entry-level career opportunities (governmental or private) within the discipline and basic qualifications necessary for competitive recruitment.

QUESTION: Would you like a demonstration on how to conduct a professional briefing?