Roger Z. George - Intelligence in the National Security Enterprise _ An Introduction-Georgetown University Press (2020)
Roger Z. George - Intelligence in the National Security Enterprise _ An Introduction-Georgetown University Press (2020)
Roger Z. George - Intelligence in the National Security Enterprise _ An Introduction-Georgetown University Press (2020)
in the
N at i o n a l
Security
Enterprise
This page intentionally left blank
Intelligence
in the
National
Security
Enterprise
An I ntro d u cti o n
Roger Z. George
All statements of fact, opinion, or analysis expressed in this book are those of the author and
do not reflect the official positions or views of the Central Intelligence Agency or any other
U.S. Government agency. Nothing in the contents should be construed as asserting or implying
U.S. Government authentication of information or endorsement of the author’s views. This
material has been reviewed solely for classification.
The publisher is not responsible for third-party websites or their content. URL links were active
at time of publication.
c This book is printed on acid-free paper meeting the requirements of the American National
Standard for Permanence in Paper for Printed Library Materials.
21 20 9 8 7 6 5 4 3 2 First printing
List of Illustrations ix
Acknowledgments xi
2 What Is Intelligence? 7
Index 313
vii
This page intentionally left blank
Illustrations
BOXES
ix
xIllustrations
FIGURES
TABLES
This book is the product of many years of learning from my mentors, supervisors, and
peers about intelligence practices and principles. In this regard I want to thank a long
list of former colleagues who read chapters or parts of chapters to ensure I got my
facts right. In particular, I want to express special appreciation to Thomas Fingar at
Stanford University, Gregory Treverton at the University of Southern California, and
Peter Clement at Columbia University for reviewing various chapters from their van-
tage point of being former intelligence practitioners and now teachers themselves.
Also I need to acknowledge the indispensable advice I received from former policy
and intelligence officials at the National Security Council, such as Gregory Schulte,
Steven Simon, Stephen Flanagan, and Steven Slick. Along the way, I also consulted
with a wide range of former colleagues regarding particular events, processes, or
facts: Brad Knopp, James Carson, Tim Kilbourn, Craig Chellis, John Lauder, Mathew
Burrows, Aris Pappas, Daniel Wagner, and Cindy Storer. Of course, if I have commit-
ted any errors of fact or reached ill-conceived conclusions, those rest solely on my
shoulders.
Special thanks is also reserved for three individuals who have shaped my academic
and professional career and offered assistance in this book project. First, my earliest
and longest mentor, Larry Caldwell, is responsible for encouraging me to pursue a
career in international affairs but also for providing a model for someone who had
one foot in academia and another in the intelligence world. Second, my closest intel-
ligence colleague, James Bruce, and I have collaborated on several writing projects
over the past decade. He encouraged me in this textbook project as part of a career-
long conversation. Last, Harvey Rishikof has been a close writing partner during and
after a decade teaching with him at the National War College. Like Larry and James,
Harvey has been both friend and colleague and one who brings both insight and
integrity to the study and teaching of national security decision-making. He has deep-
ened my own understanding of the labyrinth within which the national security and
intelligence enterprises operate.
Last, I wish to thank Georgetown University Press for encouraging me to write this
book. For the past decade, we have collaborated on several edited volumes examin-
ing the national security decision-making process as well as intelligence analysis. In
particular, I want to express my gratitude to Donald Jacobs, who has been a wise and
xi
xiiAcknowledgments
gentle editor and overseer of several book projects before this one. Don has been a
trusted partner on my intelligence publications as well as those of many other prac-
titioners and scholars, which has made Georgetown University Press one of the fore-
most publishers of intelligence scholarship.
Abbreviations
xiii
xivAbbreviations
DO Directorate of Operations
DOD Department of Defense
DOJ Department of Justice
E-O electro-optical
EPIC El Paso Intelligence Center
FBI Federal Bureau of Investigation
FEMA Federal Emergency Management Agency
FISA Foreign Intelligence Surveillance Act
FISC Foreign Intelligence Surveillance Court
FISINT foreign instrumentation intelligence
FOIA Freedom of Information Act
G-2 Army intelligence
GEOINT geospatial intelligence
HPSCI House Permanent Select Committee on Intelligence
HSC Homeland Security Council
HUMINT human intelligence
IAEA International Atomic Energy Agency
I&A Office of Intelligence and Analysis
I&W indications and warning
IC intelligence community
ICBM intercontinental ballistic missile
ICD Intelligence Community Directive
IG inspector general
IMINT imagery intelligence
INF intermediate nuclear forces
INFOSEC information security
INR Bureau of Intelligence and Research
INT intelligence-collection discipline
IOB Intelligence Oversight Board
IPC interagency policy committee
IRTPA Intelligence Reform and Terrorism Prevention Act of 2004
ISG Iraq Survey Group
ISIS Islamic State of Iraq and Syria
J-2 JCS intelligence section
JCS Joint Chiefs of Staff
JSOC Joint Special Operations Command
JTTF joint terrorism task force
LEGAT legal attaché
LG NSC Lawyers Group
Abbreviationsxv
1
2 Chapter 1
challenges of the intelligence business. However, such a focus on the inside of the
IC can detract from a student’s understanding of what the actual output and value of
such collection is and how the finished analysis produced from such exotic, expen-
sive, and risky efforts actually is used in national-level decision-making.
This book captures my understanding of how the IC and the policy community
attempt to work together. It is a symbiotic relationship. When it is working well, pol-
icy decisions are usually more systematic and better informed; when it is not, poli-
cies are often poorly shaped, either because the intelligence was incorrect or simply
ignored. Granted, even with a good relationship, there is no guarantee that policies
will succeed, but in the author’s view the odds are surely better.
The book takes the approach of illustrating with practical examples how intelli-
gence has played a significant part in national security policymaking. The author’s own
experiences as a political-military analyst at the Central Intelligence Agency (CIA),
including serving in policy rotations at the State Department and Defense Depart-
ment in the late 1980s and early 1990s, have shaped the way this book addresses the
intersection of policy and intelligence. Most intelligence practitioners have had some
good experiences when intelligence was useful as well as bad ones when intelligence
was flawed, dismissed, or misused. Indeed, my own opinions are on display in this
book, which I might summarize as being convinced that intelligence is a necessary, if
never perfect, part of the national security enterprise.
This book deepens a student’s understanding of how American national security pol-
icy is conducted with a more detailed description of how intelligence contributes to
the development of such policies. Most textbooks about American foreign policy or
national security provide scant attention to the intelligence contribution, but that is
a gap that should be filled. This book thus can complement textbooks on American
foreign policy by providing concrete examples of how intelligence informs and influ-
ences national security deliberations.
For students taking general courses in intelligence, this book can provide two
important additions to what is often left out of other intelligence textbooks. First, this
volume provides a clear explanation of the expanding US national security enterprise
(NSE), in which intelligence operates.1 The term itself suggests a set of agencies and
operations that conduct US national security policies. As the definition of national
security has broadened well beyond traditional military and diplomatic concerns to
include more transnational and socioeconomic issues, the enterprise and the agen-
cies it comprises has continued to expand. It is often assumed that the student is
already familiar with the NSE and its interagency process. In this author’s experience,
How to Use This Book3
students taking an introductory intelligence course often are not aware of the details
of that decision-making process, so it is hard for them to put the intelligence contribu-
tion into proper context.
A second feature of this book is its focus on distinguishing among a range of intel-
ligence functions that contribute to the NSE. Other intelligence textbooks will typi-
cally address intelligence support to policy in a single chapter, perhaps accompanied
by a chapter on analysis. Instead, this volume examines the varied forms of intel-
ligence support to policymakers, ranging from strategic intelligence and warning
analysis to more actionable daily intelligence support and covert action.
Accordingly, this book’s chapters are organized around the kinds of decisions
that policymakers often confront. At times their intelligence questions revolve more
around mysteries than secrets—to use Joseph Nye’s characterization of the different
sets of problems facing a senior policymaker or commander.2 Will C hina’s economic
model collapse? This is a mystery about which the IC can speculate and develop
alternative scenarios to help national decision-makers prepare strategies and options
for dealing with different circumstances. However, other questions might be how
potent China’s military modernization effort is likely to become and how it might
impact the South China Sea maritime rivalry. Here there are specific facts and trends
that the IC can bring into the discussion in order for policymakers to assess the risks
the United States and its allies face in challenging Chinese territorial claims. Some-
times policymakers are simply asking how to “think about” a problem—whether it
is the geopolitics of climate change or how Vladimir Putin views the world—while
others might be seeking specific facts about the size and location of Syria’s chemical
weapons stocks or the nature of Russia’s new “hybrid warfare.”
The wide range of questions posed to the IC lends itself to characterizing a range
of functions that are being performed constantly. The book’s chapters are organized
around those key functions. Chapter 2 first defines what intelligence is and its vari-
ous dimensions in general terms. Students will learn about intelligence-collection
methods, including technical, human, and open sources, and the contributions they
make to analysis. This foundation will then enable students to focus more on intel-
ligence “outputs” than “inputs” in order to highlight the value of intelligence to the
policymaking process.
Chapter 3 will outline the current structure and decision-making processes of the
NSE. It highlights the policy agencies and interagency mechanisms that are used
to develop and implement national security strategies. Students can then appreci-
ate the complexity of the decision-making process and the role that particular senior
policymakers play in running the process or shaping its outcomes. Importantly, the
chapter also will illustrate how intelligence fits into the formal interagency process
for national security decision-making.
4 Chapter 1
Chapter 4 will outline the current structure of the IC and identify some of the key
agencies that participate regularly in the NSE. Attention will be focused principally
on the national and departmental intelligence provided to National Security Council
(NSC) members as well as senior departmental decision-makers, who are principal
customers for the IC. This chapter will also introduce students to some of the continu-
ing challenges leaders face in managing this huge intelligence enterprise.
Chapter 5 lays out a framework for how to think about the distinct and diverse roles
that intelligence plays in the national security process. It describes the “intelligence
cycle” concept and moves to the practical discussion of more-specific missions that
support the decision-making process. Thereafter, chapters 6 through 10 will examine
each of those missions in more detail, providing examples of how intelligence has
contributed to major policy decisions.
To start, chapter 6 will describe “strategic intelligence” and its use for develop-
ing long-term strategies and policies. Students will gain an understanding of what
kinds of strategic intelligence, as opposed to tactical intelligence, are available to
policymakers. This discussion will explore the role of National Intelligence Esti-
mates (NIEs) and how they are produced. It will identify the actors and processes that
produce NIEs, using recent examples such as the deeply flawed 2002 NIE on Iraqi
weapons of mass destruction (WMDs) as well as the rising importance of the Global
Trends documents aimed at each incoming president.
Chapter 7 will describe the IC’s enduring responsibility to provide warning of
threats to the United States and its interests abroad. Students will be introduced to
the concept of warning, including how it is conducted and organized. A brief examina-
tion of some of the famous warning events—beginning with Pearl Harbor and includ-
ing the 9/11 attacks—will help students to identify lessons to be learned from past
warning cases. The chapter will conclude with an examination of how the warning
function has been organized in the past and how recent practices are shifting the
burden of warning from specialized warning staffs to every analyst.
Chapter 8 will shine a light on the usually invisible mission of direct policy sup-
port provided to virtually every major national security agency in the US government.
Students as well as scholars sometimes misunderstand the term to imply that the IC
openly supports an administration’s policy agenda. That is not the meaning or intent
of this term. Rather, the chapter will illustrate how intelligence supports policymakers
with information and analysis relevant to their decisions, without intending to favor
or oppose them. Students will gain an understanding of the President’s Daily Brief
(PDB) and the process behind it. It also describes other unique forms of intelligence
support to policymakers engaged in ongoing international negotiations, crisis man-
agement, and counterterrorism efforts.
How to Use This Book5
interested in going further into any of the topics covered in each chapter, there is
also a short list of key readings at the end of each chapter, which the author considers
excellent sources on a wide range of intelligence and national security topics. Last, at
the end of the chapters where relevant there are sections variously titled Useful Doc-
uments, Useful Websites, and Further Reading with links to additional intelligence
studies, declassified intelligence products, and related materials. With these addi-
tional aids, the author hopes to make a student’s introduction to intelligence more
accessible and comprehensive.
NOTES
Epigraph: As cited in Charles Lathrop, The Literary Spy: The Ultimate Source of Quotations on
Espionage and Intelligence (New Haven, CT: Yale University Press, 2004), 10.
1. See Roger George and Harvey Rishikof, eds., The National Security Enterprise: Navi-
gating the Labyrinth, 2nd ed. (Washington: Georgetown University Press, 2017). This book
outlines the many government agencies involved in national security decision-making along
with descriptions of other key actors, such as Congress, the courts, think tanks, and the media.
It provides students with an overview of the interagency processes and challenges that the
NSE faces and is likely to face for the foreseeable future.
2. Joseph Nye, “Peering into the Future,” Foreign Affairs, July/August 1994, 82–93.
2
What Is Intelligence?
7
8 Chapter 2
evaluated for its credibility and accuracy, it is compiled into finished analysis (i.e.,
fully evaluated information) reports and disseminated to government officials for
their use in shaping national security policies. Policymakers then may provide feed-
back and levy new intelligence requirements for additional information and analysis
on those topics. This sequence of steps has become known as the intelligence cycle.
All of these phases are important, but they reveal little about how intelligence informs
policy or how policymakers use intelligence. Moreover, the alphabet soup of more
than a dozen intelligence agencies is bewildering. They are not all equally important
to national-level decision-making. Knowing where, when, and how intelligence has
been critical to a national security decision is far more critical to understanding how
US national security policies are formulated and implemented.
The intelligence-policy relationship is fundamentally one of a support function
involving a wide range of intelligence agencies, activities, and assessments. Iden-
tifying the roles and responsibilities of both sides of this relationship is critical to
understanding why sometimes it can become a very contentious one. Policymakers
expect and depend on intelligence to provide more clarity if not total comprehension
of complex international issues; however, they consider intelligence only one input
and not always the decisive one. Intelligence officers do not wish to make policy, but
they must often provide information and analysis that complicates or raises ques-
tions about an administration’s decisions or actions. This symbiotic relationship, as
we shall see in subsequent chapters, is not always evident or easy to manage. The
intelligence-policy relationship often suffers from distrust on both sides, partly owing
to poor understanding of the different cultures that drive them.
When the Cold War broke out, the United States began developing a national secu-
rity strategy as well as a national security system (see chapter 3 for more discussion).
US containment strategy was soon in place along with seminal legislation titled the
National Security Act of 1947, which set up the now well-known National Security
Council and its various components. At that time, there was no set idea of how intel-
ligence would support a growing US international role. However, an early participant
in US wartime intelligence, Professor Sherman Kent, wrote perhaps the most influ-
ential book on intelligence. In it, he argued that intelligence should “raise the level
of discussion” around the policymaking table.1 At the same time, intelligence should
not advocate any specific policy option but rather should provide information that is
tailored to those policies being considered by decision-makers. Kent was aware of the
dangers of being too close or too far from the policy process. Being too close ran the
risk of intelligence becoming skewed to suit policymakers’ preferences; being too far
What Is Intelligence?9
“I suppose if we in intelligence were one day given three wishes, they would be to know
everything, to be believed when we spoke, and in such a way to exercise an influence to the
good in the matter of policy.”
—Sherman Kent, former director, Board of National Estimates
removed from policy discussions risked being irrelevant to or uninformed about the
policies being debated and the options being considered (see box. 2.1).
An important by-product of the 1947 National Security Act was the institutional-
ization of intelligence support to senior policymakers. According to the legislation,
the NSC would be expanded beyond just the president’s diplomatic and military
advisers to include the director of central intelligence (DCI) as its key intelligence
adviser. This usually placed intelligence at or near the policy table when presidents
and secretaries of state and defense were making momentous decisions. That intel-
ligence advisory role took the form of providing the president with his own daily
intelligence reports, which later came to be known as the President’s Daily Brief, as
well as preparation of more comprehensive intelligence reports such as National
Intelligence Estimates on which major policies were often based. In addition, the
Cold War and the threat of nuclear war obliged the United States to find methods
short of a “hot” conflict for combating Soviet subversion around the world. In short
order, President Harry Truman and virtually every president thereafter authorized
the CIA to conduct other “special activities”—later known as covert action. This
became an important secret tool of presidents and also placed the CIA in a unique
position to both formulate policy initiatives and implement them. In the post-9/11
era, this covert action tool has become even more important and ironically more
visible than the original shapers of the US national security system could have
imagined.
Today the United States maintains the largest and most elaborate and capable set
of intelligence agencies in the world. This intelligence system employs more than
one hundred thousand people and spends over $70 billion annually on its activities.
It supports the national security enterprise by providing tailored intelligence to virtu-
ally every national security body, from the White House to the Department of State
and Department of Defense to the economic and law enforcement agencies. Impor-
tant intelligence subjects go far beyond the politico-military realm, and the concept
of national security now encompasses such broad topics as infectious disease, climate
change, and the cyberspace domain. Since 9/11, national security has also required
significant domestic intelligence functions. Simply stated, intelligence is a significant
10 Chapter 2
player in forming and conducting all aspects of US foreign policy but also aspects of
domestic public safety.
WHAT IS INTELLIGENCE?
The term intelligence has a variety of meanings and uses. The most common usage
is to encompass just information (both classified and unclassified) provided to pol-
icy officials, in order to distinguish it from a broader body of information available
to those inside and outside the US government. So the term is often applied to the
collection of raw (i.e., unevaluated) information that the intelligence agencies collect
and distribute to a select group of civilian and military decision-makers. A second
usage is when intelligence refers to the analysis that is produced when regional and
technical experts evaluate the raw information and then prepare “finished” intelli-
gence reports of various kinds. The word finished denotes that all the information
included in those reports has been reviewed and evaluated for its accuracy and
significance.
Intelligence Is Collection
Intelligence is most often but not always focused on the collection of secret informa-
tion. That is to say, intelligence organizations are especially interested in gathering
information that a foreign actor wishes to conceal from the US government. In this
sense, clandestinely acquired intelligence is doubly secret—it concerns the secrets of
foreign actors that US intelligence can gather secretly. The acquisition of the infor-
mation is done so that the collection operation as well as the source and identity of
the collector are concealed. This allows the US IC the ability to know things that a
foreign government or actor does not want to be shared, but it also keeps that tar-
get in the dark regarding what the US government has learned about its plans and
capabilities. This is the essence of secret intelligence—giving the United States a
decision-advantage in dealing with a foreign threat.
The two most well-known categories of intelligence are technical intelligence
(TECHINT) and human intelligence (HUMINT). First, intelligence can be gathered
by technical (i.e., TECHINT) systems involving ground-based electronic systems and
aerial platforms or satellites in earth orbit that gather electronic signals or images
using different technologies. These systems produce the bulk of the raw intelligence
used by the IC. Alternatively, raw information can be collected through clandestine
(i.e., conducted in order to assure the secrecy of the activity) or overt means involv-
ing people (i.e., HUMINT). Here, the goal is to understand the activities but also
the intentions of foreign government officials or other nonstate actors. A third but
entirely unclassified form of intelligence collection has been the widespread use of
What Is Intelligence?11
Within the TECHINT category, signals intelligence (SIGINT) collects the wide
array of electronic signals and communications produced by foreign actors. It is col-
lected via ground stations as well as aircraft and satellites that suck up all the sig-
nals emanating from multiple sources and locations. SIGINT is further broken down
into other more distinct categories of collection techniques and targets. For example,
communications intelligence (COMINT) comprises all the signals produced by tele-
communication systems such as telephones, fax machines, radios, and Internet data
streams. COMINT is particularly useful in providing insights into the conversations
among foreign actors and any activities that might be revealed in the collected phone,
fax, or Internet activity. In addition, there is electronic intelligence (ELINT), which is
produced by the signals emanating from foreign radars and other electronic military
systems; it is especially useful for observing and assessing military capabilities and
operations. Finally, the SIGINT family is rounded out by foreign instrumentation
signals intelligence (FISINT), the electronic signals produced by a foreign govern-
ment’s military, commercial, and scientific testing. When a foreign government sends
performance data from a rocket test, for example, these signals can sometimes be
intercepted by US collectors.
Also within the TECHINT category is imagery intelligence (IMINT). The United
States led the way in developing overhead imagery systems such as the U-2 and
SR-71 aircraft, which carried cameras (as well as SIGINT sensors) to observe foreign
military activities. These have been dramatically augmented by large satellite sys-
tems, which today are mostly electro-optical (E-O) systems capable of returning vast
numbers of images of selected targets in near-real time.2 These satellites have the
advantage of being well above enemy air defenses and can loiter in long-duration
earth orbits to give them ability to reaccess important target locations on a regular
basis. Technology has advanced to the point that these systems can pick up targets
that are far less than a square meter in size.3 Other technical sensors on such sat-
ellites can also capture infrared images of ground and even underground targets
that E-O systems would not detect. Managed from the ground, satellites can be pro-
grammed to take images at precise times and places based on the priorities estab-
lished by the imagery analysts.
Satellites are typically operated for many years and are expensive to replace. While
they can produce many images, they are in great demand, so they are used only on
high-priority targets. The advent of commercial imagery satellites now permits the
US IC to purchase images of lower-priority targets, which otherwise might not be
covered. Most recently, imagery has been supplemented as well by the appearance of
unmanned aerial vehicles (UAVs), which can also provide real-time imagery on spe-
cific locations, installations, or operations being conducted by foreign governments
or nonstate actors.
What Is Intelligence?13
what they believe the US government expects to hear. Third, a human source might
actually be part of a foreign counterintelligence (CI) operation. In this case, the
source is a foreign intelligence officer working to penetrate US intelligence. Such CI
operations are designed to provide misinformation, collect against US intelligence
agencies, and disrupt American intelligence programs.
Having surveyed the main sources of largely secret intelligence collection, it is
important not to minimize the value of open-source intelligence. OSINT includes the
vast array of publicly available news reporting, government documents, academic and
scientific scholarship, and social media that are carried in publications, on television
or radio, or over the Internet. In fact, open-source materials had been used through-
out the Cold War, when translations of Soviet newspapers and television and radio
broadcasts provided insight into internal Kremlin politics, domestic economic condi-
tions, and foreign policy positions. In the post–Cold War period, with the decline in
so-called denied areas (i.e., authoritarian states where information is closely guarded)
and the growth of the Internet and social media, the volume of open-source material
has grown exponentially. While these sources are easily accessible, they still require
systems and processes to retrieve, store, and evaluate their significance to American
national security. Translation services, data mining, and other technical processes are
often used to put those information sources into a form that is useful for analysts and
ultimately for policymakers.
Open sources are in many ways ubiquitous, and they provide a useful starting
point for understanding a foreign government’s or nonstate actor’s behavior. Intel-
ligence analysts often use open sources to assist them in pointing TECHINT and
HUMINT collectors to targets where their unique access might provide more insight
and details about an emerging problem. In some cases, where a target is considered a
low priority for expensive TECHINT or risky HUMINT operations, OSINT might be
the most likely source of information.
Intelligence comprises all these sources, which are collected to produce the best
understanding of complex issues. A good example of the combination of intelligence
disciplines was the successful targeting of Osama bin Laden. Human intelligence
derived from agents and interrogation of terrorist detainees was used to ascertain the
possible location of the al-Qaeda leader in the Pakistani town of Abbottabad. Imag-
ery provided details of the compound in which he was living, while communication
intercepts were used to determine who was in touch with Bin Laden and how alert
Pakistani officials were to the activities inside that compound. No single intelligence
source was sufficient to locate and identify Bin Laden. Even so, as participants said
after the fact, they were never 100 percent sure Bin Laden was there. But the combi-
nation of all the sources helped to raise confidence that this was the location. Typi-
cally, good intelligence relies on a combination of clandestine, technical, and even
16 Chapter 2
Intelligence Is Analysis
Intelligence, as President Reagan’s comment at the beginning of this chapter notes, is
more than the collection of raw information. That information must be assembled into
a consolidated picture of what international developments might affect US national
security interests. Many of the book’s later chapters will delve deeply into the nature
of intelligence analysis, but understanding the contribution that analysis makes to
collection of raw information is important to understand. The old adage that “the
facts speak for themselves” is almost never true. In an intelligence context, arraying
all the facts is not enough, for many reasons. First, all the facts may not address the
question policymakers are asking. Experts need to determine which facts are relevant.
Second, not all the information may be accurate or reliable. The data must be exam-
ined and compared with other information known to be accurate to see if this new
information can be validated. Third, the relevant and validated information must be
developed into a narrative or story that explains why this development is significant
for US policy. Last, when policymakers react to these finished reports and pose further
questions, analysts must determine what new information needs to be collected to fill
gaps in their understanding and to continue monitoring those intelligence issues. In
sum, analysts must guide the collection for new information so that they can address
policymakers’ critical intelligence needs.
Analysis can take a number of forms, depending on where it occurs in the intel-
ligence cycle. Within each INT, there are single-source analysts who examine and
evaluate the collected raw information. They assemble a picture of the intelligence
target or topic based on their understanding of the imagery, signals, or human sources
that their collection system produces. Although single-source analysts have access to
information from other INTs and their work is often informed by other collection
disciplines (usually termed “collateral information”), they are not authorized to pro-
duce “all-source analysis,” or “finished” intelligence. Instead, sole-source reports go
to other all-source analysts, where they will collate all relevant information that sole-
source analysis has on a specific topic.
For example, take the case of Saddam Hussein’s efforts to develop weapons of
mass destruction in the late 1990s and early 2000. Single-source imagery analysts
would evaluate many photos taken of suspected WMD research or production sites to
determine if there might be proof of renewed activities. SIGINT analysts would cull
through many intercepted phone conversations of senior Iraqi officials to determine
if they were talking about the development or transfer of “special weapons” (e.g., what
analysts believed was the euphemism for WMDs) among suspect sites. HUMINT
What Is Intelligence?17
reports officers (now called “collection management officers”) would evaluate the
accuracy and reliability of human assets (a combination of agents or defectors or for-
eign liaison reporting) and disseminate any credible reports on the supposed plans
of senior Iraqi officials regarding their WMD programs or on reactions to US poli-
cies to restrict Baghdad’s weapons research. These single-source reports across all
INTs would be available to all-source analysts in other agencies. All-source analysts
would then be responsible for assessing whether Saddam had plans to restart WMD
programs and whether he could develop a nuclear, chemical, or biological weapons
capability over the next several years. Their “finished” intelligence assessments were
then provided to the president and his senior civilian and military advisers. In this
particular case, George W. Bush administration officials were convinced that Saddam
had restarted his programs. Their feedback tended to criticize analysts for not pro-
viding more conclusive evidence of Saddam’s WMD programs. Later chapters will
examine how this kind of policymaker bias and feedback can distort analysis and
sometimes misdirect collection priorities toward confirming a policy bias rather than
searching as well for disconfirming information.
As defined in the Executive Order 12333, which governs US intelligence activities, counter-
intelligence is “information gathered and activities conducted to identify, deceive, exploit,
disrupt or protect against espionage, other intelligence activities, sabotage, or assassina-
tions conducted for or on behalf of foreign power, organizations or persons, or their agents,
or international terrorist organizations or activities.”
US intelligence agencies conduct counterintelligence analysis and operations to ensure
that they understand which specific threats hostile foreign intelligence agencies may pres-
ent to the United States. US CI activities also include careful screening of US government
employees, requiring a security clearance to ensure they are not under the control of a
foreign intelligence service. Travel restrictions as well as reporting of any contact with for-
eign nationals are required of all employees; moreover, periodic reinvestigation and often
polygraph exams are used to verify their adherence to strict rules about the handling and
sharing of classified information.
Formal responsibility for counterintelligence is shared by several US intelligence agen-
cies. The CIA is principally responsible for monitoring and combating foreign counterintel-
ligence overseas, while the FBI is responsible for investigating foreign counterintelligence
activities within the United States.
of agencies. Proof of the connection between intelligence and national security can be
seen in the simultaneous expansion of American global influence and military pres-
ence abroad and the comparable growth of American intelligence. As America became
a superpower, so too the US IC went “global,” covering virtually any topic that might
be discussed in the Oval Office, by the NSC, or by military officials in the Pentagon.
This growth also reflected more sophistication in intelligence techniques—both for
collection of information as well as its analysis. As the US national security policy
structure grew into a major enterprise, it created an ever-larger and more diverse set of
civilian and military users of intelligence. Important legislation and presidential exec-
utive orders—sometimes secret—authorized the creation of new intelligence agencies.
The position of DCI was established in 1947. After some debate over whether analysis
and espionage should be run separately by the State Department and the CIA, respec-
tively, the CIA began its slow evolution into the multimission organization that it is
today.10 President Truman secretly authorized the establishment of the National Secu-
rity Agency (NSA) in 1952, unifying previously separate signals intelligence agen-
cies of the military services. In the early 1960s, Presidents Dwight Eisenhower and
John F. Kennedy pushed for the National Reconnaissance Office (NRO) to monitor
Soviet military activities and the Defense Intelligence Agency (DIA) to strengthen
military analysis. Other elements of the IC came into being as each major department
became a player in international diplomatic, economic, or legal affairs and needed tai-
lored intelligence in order to conduct its business.
Another expansion occurred in the wake of the 9/11 terrorist attacks. President
George W. Bush introduced the most far-reaching intelligence reforms to defend the
homeland against terrorist attacks and to better coordinate the vast IC. He established
the Office of Director of National Intelligence (ODNI) to oversee the sixteen indi-
vidual intelligence agencies, gave the CIA new authorities to conduct covert action
against global terrorist organizations, and created a National Counterterrorism
Center (NCTC) to better orchestrate the development of counterterrorism policies.
Separately, he created the new Department of Homeland Security (DHS), which has
intelligence functions as well as domestic policy authorities. All of these measures
highlight just how interrelated intelligence and policy are.
Today intelligence is central to defeating terrorism, preventing proliferation of
WMDs, and deterring the actions of resurgent or rising powers such as Russia and
China. Indeed, the 2019 National Intelligence Strategy lists countering cyber threats,
terrorism, and WMD proliferation as key missions as well as conducting broad stra-
tegic intelligence analysis of enduring security issues and anticipating emerging
threats.11
Each president has recognized the crucial role of intelligence in formulating
national security decision-making. Most presidents have been dissatisfied with the
What Is Intelligence?21
IC’s performance at various points in their tenures, while praising the community at
other times. Failures receive the lion’s share of attention in the form of presidential
criticisms, congressional inquiries, and media attention. Most successes must remain
secret or are of such little interest that they seldom garner attention. Many are simply
getting good information in a timely way to senior policymakers that helps to shape
policies; some are early warnings that lead to decisions that avert or at least reduce
the risks or impact of damaging trends. Still others are invisible covert actions that
reinforce diplomacy or military operations. However, dramatic failures are often seen
as particularly damning and cause for major investigations and additional reforms.
There can be double standards. For example, the successful tracking and elimina-
tion of Bin Laden has been generally applauded, but the “targeted killings” by drone
operations and enhanced interrogation techniques have been strongly questioned
by the media. Consider how few people will recall or appreciate the IC’s successful
discovery of secret Syrian or North Korean nuclear weapons facilities during George
W. Bush’s presidency, whereas everyone is aware of the intelligence failures leading
to 9/11 and the Iraq War.
Intelligence has also become a much more visible feature of America’s national
security policy debates. Intelligence agencies during the early Cold War years largely
operated under the cloak of secrecy, having less oversight and arguably less influence
over the direction of foreign policy. Today intelligence judgments or operations are
now widely reported in major news media. Whereas one seldom heard from or saw
the CIA director in public during the 1950s and 1960s, today the DNI or CIA direc-
tor regularly presents major public addresses or open congressional testimonies. For
example, the DNI’s annual Worldwide Threat Assessment to congressional oversight
committees is now a standard presentation of the IC’s assessment of major threats.
Of course, intelligence reports are periodically and unofficially “leaked” to the media.
Sometimes they are part of the government’s efforts to highlight important issues to
the public or to warn adversaries that Washington is aware of their activities. Other
times leaks are the result of internal policy debates over controversial m ethods or
actions, in which disgruntled government employees or others with access to classi-
fied information want to disclose secrets to start a public discussion. Official declas-
sification of significant intelligence assessments has also become the subject of
congressional and public debates over not only those intelligence judgments but also
the national security policies they support. Again, we see that the two are intertwined
more and more.
Intelligence is also a force multiplier for the United States in terms of providing
critical information or methods that can reduce the costs of conducting effective US
national security policies. To cite just one historical example, a former Soviet spy for the
United States provided critical information regarding Soviet radar developments that
22 Chapter 2
USEFUL DOCUMENTS
FURTHER READING
Richard Betts, Enemies of Intelligence: Knowledge and Power in American National Security
(New York: Columbia University Press, 2007).
What Is Intelligence?23
Offers a recapitulation of the author’s many excellent articles on intelligence that takes a
balanced view between many critics and the few apologists for US intelligence.
Thomas Fingar, Reducing Uncertainty: Intelligence and National Security (Stanford, CA: Stan-
ford University Press, 2011).
Gives an insider’s view of the challenges of post-9/11 intelligence, with special attention
to the intelligence-policy relationship and how intelligence weathered the controversies
surrounding the 2002 Iraq WMD NIE.
Robert Jervis, Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War
(Ithaca, NY: Cornell University Press, 2010).
An excellent postmortem by a recognized intelligence scholar on the sources of cogni-
tive and bureaucratic bias in intelligence analysis.
Mark Lowenthal, Intelligence: From Secrets to Policy, 6th ed. (Washington, DC: CQ Press, 2015).
The best-known treatment of the intelligence process and cycle.
Mark Lowenthal and Robert Clark, The Five Disciplines of Intelligence Collection (Washington,
DC: CQ Press, 2015).
An excellent survey of the technical, human, and open-source collection systems, written
by individual scholars and practitioners.
Paul Pillar, Intelligence and US Foreign Policy: Iraq, 9/11, and Misguided Reform (New York:
Columbia University Press, 2011).
Provides a practitioner’s view of the 9/11 and Iraq War intelligence controversies and
criticizes both the politicization of intelligence as well as recent intelligence reforms.
Amy Zegart, Flawed by Design: The Evolution of the CIA, JCS, and NSC (Stanford, CA: Stan-
ford University Press, 1999).
Provides a controversial description of how the national security and intelligence enter-
prises came about largely because of bureaucratic and legislative rivalries.
NOTES
First epigraph: White House, National Security Strategy, May 2010, 15.
Second epigraph: Office of the Director of National Intelligence, The National Intelligence
Strategy of the United States, 2014, 21.
1. Sherman Kent, Strategic Intelligence for an American World Policy (Princeton, NJ:
Princeton University Press, 1966).
2. “Near-real time” refers to the speed with which electro-optical images can be transmit-
ted from overhead satellites to ground stations and then processed so that they can be viewed
by imagery analysts within a very short period of time.
3. Imaging resolution of small targets far less than a square meter in size are now possible
by classified satellite systems, but commercial satellites are prohibited from exploiting the full
capability, for national security reasons.
4. A “signature” is commonly understood as a unique characteristic of a target that is
observable or measurable. In imagery it might be the design of a particular kind of weapons
facility; in ELINT it might be a particular radio frequency or radar band used by a foreign mili-
tary’s radar or air-defense systems; in MASINT a signature might be a chemical compound
24 Chapter 2
The US national security system has evolved over the past half century into an elabo-
rate set of organizations and processes. As vast as this national security enterprise
has become, it still rests on some fundamental concepts that make it responsive to
American leaders and the US Constitution. Key to understanding what American
national security officials do is the role of the president as commander in chief and
his reliance on key advisers and institutions to support his decisions. This chapter
will describe the way national security policy is made and how intelligence fits into
that decision-making process. It will also highlight some of the ongoing issues facing
a president’s organization of his national security team.
Article 2 of the Constitution bestows on the president the authority as commander
in chief of US military forces and as chief diplomat over US foreign relations. The
president’s authority to appoint ambassadors, negotiate treaties, and implement all
laws and policies through his direction of the huge executive branch agencies gives
him unparalleled control over national security decisions. To be sure, Article 1 of the
Constitution gives Congress the power of the purse to set budgets for military, dip-
lomatic, and intelligence activities and to confirm his appointments of cabinet offi-
cers, diplomats, and military leaders. The president must often act in concert with
Congress, but in many circumstances he or she can take the initiative and announce
a policy or commence a military operation, knowing that Congress is hesitant to chal-
lenge presidential authority abroad. Given the far-flung US national interests around
25
26 Chapter 3
the globe, presidents have relied on an increasingly complex set of national security
agencies and processes to conduct American statecraft. That decision-making sys-
tem has been orchestrated through the National Security Council and its so-called
interagency process. The intelligence community plays a key role in both, as this
chapter will make clear.
The US national security system has grown larger and more complicated since it was
established in 1947. At that time, the intent was both to reorganize the postwar mili-
tary establishment and to centralize the national-level decision-making process. It
created a secretary of defense as well as the Joint Chiefs of Staff (JCS), a body that
would organize and direct the previously more independent military services. The
intent was to give the president the ability to seek the advice of his closest politi-
cal and military advisers on how to use all instruments of national power—political,
military, economic, and informational—to protect and advance US national interests.
In fact, President Truman tended not to rely on it heavily until confronted with the
Korean War, when he was obliged to fashion a more robust “containment strategy” to
halt the spread of communism.
Even so, it was a bare-bones operation. The newly established Office of the Sec-
retary of Defense had only a few assistants and was easily overpowered by the well-
established secretaries of the army and navy. The State Department was the true
center of foreign policy authority. President Truman, like President Franklin D. Roos-
evelt, relied heavily on the wisdom of his secretaries of state, George C. Marshall and
Dean Acheson. He made most foreign policy decisions on his own, based on their
advice and counsel, but generally shied away from allowing the NSC to become a
decision-making body. That began to change as America’s world involvement deep-
ened into a bipolar conflict. Indeed, one of the major contributions of the early NSC
system was the now famous NSC 68 policy document, which laid out a containment
strategy that continued for more than forty years.
Subsequent presidents have altered what began as occasional meetings of key
advisers into a complicated set of national security–related committees and staffs
that meet virtually nonstop to consider a myriad of international crises and decisions.
By the 1960s, the national security adviser—not specifically mentioned in the 1947
act—had become a key advisory position, comparable to the secretary of state in influ-
ence if not formal status. Dr. Henry Kissinger, who assumed this job for President
Richard Nixon in 1968, single-handedly created the NSC staff as we know it today,
although it comprised a mere dozen or so experts. As will be discussed later, the NSC
staff has become its own powerful organization, with several hundred professional
What Is the National Security Enterprise? 27
staff members. For many observers, this trend has made the NSC the most power-
ful “agency” of the US government, which was not the original intent of the 1947
National Security Act.1 “Staffing the president” has come to mean ensuring that the
president is fully informed on every aspect of US national security policy. As we will
see, the NSC staff has become one of the key consumers of intelligence, especially as
it has grown in size over the past seventy years.
An important by-product of the 1947 National Security Act was the further institu-
tionalization of intelligence support to senior policymakers. According to the legisla-
tion, the NSC would be expanded beyond just the president’s diplomatic and military
advisers to include the director of central intelligence as its key intelligence adviser.
This usually placed intelligence at or near the policy table when presidents and sec-
retaries of state and defense were making momentous decisions. That intelligence
advisory role took the form of providing the president with his own daily intelligence
reports, which later came to be known as the President’s Daily Brief, as well as prepa-
ration of more comprehensive intelligence reports such as National Intelligence Esti-
mates, on which major policies were often based.
In addition, the Cold War and the threat of nuclear war obliged the United States
to find methods short of a “hot” conflict for combating Soviet subversion around the
world. In short order, President Truman and virtually every president thereafter autho-
rized the CIA to conduct other “special activities”—later known as covert action. This
became an important secret tool of presidents and also placed the CIA in a unique
position to influence policy as well as implement it. In the post-9/11 era, this covert
action tool has become even more important and ironically more visible than the
original shapers of the US national security system could have imagined.
Most importantly, the 1947 legislation also established the NSC as part of the Exec-
utive Office of the President in order to provide him or her with advice on foreign
and security issues. By statute, the president, the vice president, and the secretar-
ies of state and defense are members; in addition, the chairman of the Joint Chiefs
and the director of central (now national) intelligence are advisers from the military
and intelligence communities (see box 3.1).2 Since that act first established the NSC,
presidents have felt free to modify the structure as well as add other agency heads to
the list of attendees of NSC-sponsored meetings. For example, when nuclear matters
are discussed, it has been routine for the secretary of energy to be included in NSC
meetings, as this department oversees the operations of America’s nuclear weapons
laboratories.
Another example of a major structural change occurred when President Bill Clin-
ton entered office wanting to highlight the importance of economics. In this case, he
created the National Economic Council (NEC), somewhat modeled after the NSC but
attended by key economic departments, agencies, and advisers.3 Accordingly, when
28 Chapter 3
The function of the Council shall be to advise the President with respect to the integration of
domestic, foreign, and military policies relating to the national security so as to enable the
military services and the other departments and agencies of the Government to cooperate
more effectively in matters involving the national security.
* Section 102 was amended with the passage of the Intelligence Reform and Terrorism Prevention Act (Public
Law 108–458) on December 17, 2004.
the NSC meets to discuss international economic issues, it has been usual to include
the NEC adviser as well as the secretaries of the treasury and commerce. A more
recent addition has been the creation of the Homeland Security Council (HSC), which
President George W. Bush established after the 9/11 attacks. The HSC includes key
foreign policy advisers as well as law enforcement and counterterrorism officials for
examining issues such as terrorism, WMDs, and natural disasters.4 During the Bush
administration, the HSC operated somewhat separately from the NSC; however, the
Barack Obama administration later integrated the two staffs under the NSC, resulting
in a dramatic enlargement of the size of the professional staff.
Two factors serve to restrict the role of the NSC. First, the NSC serves only
to “advise” the president and is not a decision-making body. Secretary Marshall
worried that the new National Security Act would undermine the constitutional
What Is the National Security Enterprise? 29
authority of the president as well as the prerogatives of the secretary of state.5 How-
ever, in practice, the president, as George W. Bush famously said, has remained the
“decider.” Second, each president can alter the composition of the NSC to suit his or
her preferences. Early in the Donald Trump presidency, there was controversy sur-
rounding the appointment of Stephen Bannon, Trump’s onetime strategic adviser,
to the NSC’s Principals Committee (PC) while neglecting to retain the chairman
of the Joint Chiefs of Staff (CJCS) and the DNI.6 While it is not unheard of for
presidents to include personal advisers in NSC meetings, it was unusual to include
them in all aspects of NSC official business. This decision was shortly reversed. Like
his predecessors, President Trump altered the composition to suit his own desires
and like them ultimately decided to include both the DNI and the CJCS in NSC
deliberations.
hands of the president and his national security adviser, weakening the influence of
the other presidential advisers.
Subsequent presidents from the 1960s to the present day have largely continued
to use the NSC staff as a way to keep decision-making within the Oval Office. The size
of the NSC staff has grown tenfold since Kissinger first built the staff, from roughly a
dozen professionals to several hundred. Moreover, its control over the foreign policy
agenda—if the president so chooses—is unparalleled. Each president has shaped the
NSC system by issuing presidential directives that describe its structure, participants,
and review process in order to prioritize the issues that matter most to him and direct
how the interagency process will operate for that particular administration.
equivalent) will discuss, debate, and complete policy reviews and recommendations
that would then go to the PC. The DC is also used extensively for “crisis manage-
ment,” meaning the deputies will monitor those situations and implement any emer-
gency measures. Below the DC, there will typically be a long list of country, regional,
or issue-specific interagency policy committees (IPCs), which the appropriate assis-
tant secretaries from departments (or their equivalent) will attend (see fig. 3.1).
To give one hypothetical example of the interagency process, imagine if the presi-
dent were interested in promulgating a new policy on China. In this case, his national
security adviser might issue an NSC directive to all departments and agencies call-
ing for an IPC meeting to review possible policy options. The senior director of the
NSC for East Asia would chair this meeting; in attendance would be representatives
from the national security agencies (see fig. 3.2). The assistant secretary of state for
East Asia would attend and might cochair the meeting, along with counterparts from
the Defense Department—the assistant secretary for international security affairs
and the chairman’s senior representative from the Joint Staff, who represents the
views of the chairman of the Joint Chiefs. Economic and law enforcement agen-
cies also would send their equivalent representatives on the presumption that policy
options might touch on commercial or financial relations as well as counterterrorism
or copyright laws.
Senior analysts from both the DNI and the CIA would also participate in this
IPC. Most likely, the national intelligence officer for East Asia would represent the
IC, while the CIA might send a senior substantive analyst on China. Together these
intelligence officials might provide a briefing as well as an intelligence assessment
32 Chapter 3
on any key questions raised by the national security adviser’s directive calling for a
policy review. The briefing and intelligence assessment may have been coordinated
across major intelligence agencies if there was a White House desire to have a more
authoritative IC assessment of the issues. If military intelligence issues are to be dis-
cussed—such as China’s defense programs or the “militarization” of the South China
Sea—the DIA might also send a representative to this IPC in order to support Depart-
ment of Defense (DOD) policy counterparts.
Once the IPC has reviewed the intelligence and the key issues to be addressed, the
NSC senior director would assign an agency, most likely the Department of State, to
prepare a policy options paper. This paper would later be circulated and reviewed by
the agencies attending the IPC, and additional IPC meetings might be necessary to
finalize the policy options. That policy review document would then go to the DC for
review, where the deputies would either approve it or remand it for changes if there
are disagreements about the policy options. Once approved by the DC, the PC would
meet to discuss the options and agree on recommendations to be made to the presi-
dent. At each of these PC and DC meetings, the DNI and CIA representatives might
provide an updated intelligence brief as a foundation for the discussion of the policy
options.
At the PC, chaired by the national security adviser, there would be a full and candid
discussion of the intelligence surrounding the various policy options. The DNI and
the CIA director might be asked to assess the Chinese military threats to US interests
in the region; alternatively, if the policy review was focusing more on the US-Chinese
trade issues or on a possible American diplomatic initiative, the intelligence brief
might concentrate on the state of the Chinese economy or on the current Chinese
What Is the National Security Enterprise? 33
leadership’s views of the United States. At the end, the national security adviser would
transmit the final policy review with the PC’s recommendations to the president for
his approval or disapproval. All through this process, intelligence will have been a
key input to understanding the pros and cons of various policy options as well as key
uncertainties regarding Chinese intentions, plans, operations, or responses to US deci-
sions. The interagency participants would also be responsible for monitoring agen-
cies’ progress in implementing presidential decisions.
Because this interagency review process can extend over several weeks or even
months, constant intelligence updates might be required as new events occur in the
Far East. In some crisis situations, of course, the process can be extremely compressed,
with a series of nonstop meetings of the PC and DC over a period of hours or a few
days. In place of face-to-face meetings, some interagency sessions would be held
via secure video-teleconference (VTC) facilities. This is especially useful for quickly
emerging issues or crisis management. The White House Situation Room is connected
to all major national security agencies’ operations centers via such VTC systems, so
classified discussions can be conducted without leaving one’s office.9 This has greatly
increased the US government’s ability to operate in crisis mode, with the capability of
including military commands and overseas embassies in the VTC discussions.
Typically, the IPC convenes most frequently, with the DC overseeing its work and the
PC meeting only to validate the work of lower-level committees or to iron out disagree-
ments. One hypothetical but fairly typical week in the life of the interagency process
is provided in figure 3.3. As is represented there, not only is China on the agenda but
there are also a number of other pressing international issues that compete for senior
officials’ time and attention. There might be an ongoing crisis—such as has occurred
in Syria or Venezuela—that demands frequent meetings at various committee levels;
in general, however, issues are placed on the NSC agenda as events demand. Likewise,
senior substantive experts from the IC participate and support multiple interagency
meetings at any given time.
The set of institutional players within the NSE has vastly grown since the 1947
National Security Act. That original system was largely focused on the president,
his secretaries of state and defense, and his military and intelligence advisers. But
now “national security” issues are spread virtually across every department. When
the NSC meets to discuss critical international issues, it will often have to include
not only foreign and security policy agencies but also economic and law enforce-
ment agencies. To capture this complex web of agencies and processes, the term
national security enterprise has often been used. Embedded in the word enterprise
is the realization that a set of agencies and institutions must work together in a
“whole-of-government” fashion to achieve a common vision or purpose. In a sense,
the NSE suggests a whole that is greater than the sum of its parts as it strives to cre-
ate better synergies among the various departments’ and agencies’ activities and
capabilities.10
State Department
As the oldest federal department with the longest tradition of conducting foreign rela-
tions for the United States, this department carries the largest share of the diplomatic
mission. The State Department maintains over 190 diplomatic missions overseas and
employs slightly more than eight thousand Foreign Service officers (diplomats) and
eleven thousand civil servants. In FY 2017, it had a budget of $50.1 billion, far less
than the DOD budget of nearly $600 billion and smaller even than the IC’s budget.11
As the US global role has grown, so too has the size of US embassy operations. Today
a US embassy has become a platform for the programs of many other departments
of government, to the point that often the State Department’s complement of Foreign
Service officers amounts to far less than half of the American officials present in their
diplomatic mission.
What Is the National Security Enterprise? 35
Department of Defense
Created by the promulgation of the 1947 National Security Act and subsequent legisla-
tion in 1949, the DOD has become what some call the “eight-hundred-pound gorilla”
in the interagency process. By virtue of commanding so many resources—roughly 1.1
million men and women under arms, with a budget of over $600 billion annually—the
36 Chapter 3
secretary of defense has enormous power to exert. The secretary also now has a con-
siderable professional staff in the Office of the Secretary of Defense (OSD), and his
undersecretary for policy has become a key player in the interagency process. This
undersecretary and his subordinate assistant secretary for international security affairs
are active participants in the NSE. If they are team players, then much can be accom-
plished. However, if they choose to oppose actions by the NSC or the State Department,
the DOD can be a major hurdle to effective policy formation or implementation.13
This clout is not simply due to the personality of the secretary of defense or his
closeness to the president, although that can be a factor. Rather, the resources that
the DOD commands—to support military, peacekeeping, or humanitarian relief opera-
tions or to provide military hardware, training, or technical advice to foreign govern-
ments—gives the department huge advantages over the relatively tiny NSC staff or the
resource-poor State Department. By virtue of its military mission, the DOD’s organi-
zational culture is dominated by long-term planning (e.g., in developing and fielding
weapons, positioning forces around the world, and designing elaborate war plans) that
is not found in any other national security department. The DOD resists the ad hoc
approaches sometimes proposed by the State Department if they do not fit into a more
cohesive, long-term strategy.
The DOD is also unique in that it is both a producer and user of the largest por-
tion of US intelligence. Given its mandate to fight and win the nation’s wars, it needs
vast amounts of highly sensitive intelligence information on foreign military adver-
saries. Since its creation, the department has established a number of designated
combat-support agencies, which make up the bulk of the US intelligence community.
Although they are discussed in more detail in the next chapter, it is worth mention-
ing that these combat-support agencies—including the DIA, the NSA, the NRO, and
the National Geospatial-Intelligence Agency (NGA)—account for roughly 70 percent
of the budgets of the National Intelligence Program (NIP). Hence, the secretary of
defense controls most of the US intelligence program, and it is important that the
DNI be able to work closely with him and his undersecretary of defense for intel-
ligence (USDI).14 As will be discussed later, cooperation among the sixteen national
intelligence agencies is not always easy, especially when the DOD controls so much
of the IC’s budget, technology, and personnel.
The Pentagon also is unique in that it will have two representatives on the NSC
and its subcommittees. That is because the CJCS is the senior military adviser to the
president and the NSC. As such, he represents the chiefs of the individual military
services (army, navy, air force, and Marine Corps). While it is desirable to have the
secretary of defense and the chairman take the same position on a military policy
issue, the chairman has the responsibility to give his best military advice, even if he
disagrees with the defense secretary.
What Is the National Security Enterprise? 37
In the 1986 Goldwater-Nichols Act, the CJCS was given more independence and an
enhanced policy role. Moreover, his Joint Staff has grown to more than fifteen hundred
military officers from all the services, which are among the best and brightest in the
Pentagon. Arranged into sections ranging from intelligence (J-2) to operations (J-3)
to strategy, plans, and policy (J-5), these professional military officers will attend key
NSC meetings relevant to their responsibilities. Often the director of J-5 will represent
the chairman at the IPC level and be the plus one at PC and DC meetings. The director
of J-2 works closely with the director of the DIA in order to maximize the combined
resources of the Joint Staff’s intelligence section as well as the entire DIA in support
of the intelligence requirements of the secretary of defense, the chairman, the overseas
military commands, and the vast array of military intelligence consumers.
The customary membership of the NSE includes the NSC, the State Department, the
Defense Department, the Joint Staff, and the IC. However, the definition of “national
security” and the NSE itself has now broadened to include a much larger array of
agencies and departments that have responsibilities for protecting the nation from
foreign and domestic threats. National security now not only includes traditional
military and economic threats but also covers more unconventional but increasingly
dangerous ones from terrorism, proliferation, cyber operations, and even climate
change.
Accordingly, this expanded notion of national security has drawn agencies nor-
mally seen as more domestically oriented into discussion of international security.
Leading the list of those agencies and departments are the Federal Bureau of Investi-
gation (FBI) and DHS for domestic law enforcement and counterterrorism purposes,
but also included are the Treasury Department and the Commerce Department for
dealing with illicit financial and commercial crimes that touch on the sale of prohib-
ited weapons-related technologies as well as funding of terrorist organizations. More-
over, US actions to impose economic, trade, and financial sanctions make economic
departments central national security players in using hard economic power to deter
potential proliferators and their state sponsors or to disrupt financial operations that
would support terrorist plots.
Economic Agencies
While America’s diplomatic and military instruments of power are concentrated in
the Department of State and the Department of Defense, its economic instruments
are spread across a number of departments and special offices. This reflects the fact
that the American economy has a range of sectors—financial, commercial, agricul-
tural, and technological, to name only the most obvious—over which the federal gov-
ernment has only partial control. Depending on the actions a president might desire,
one or another department will be the key executor of policy. So, if the president
wishes to begin trade negotiations, he will instruct the US special trade representa-
tive (USTR) to lead those talks. However, if he wants to impose financial or commer-
cial sanctions, he will have to instruct the secretary of treasury and/or commerce to
work with Congress to legislate new restrictions on international financial or com-
mercial transactions vis-à-vis specific countries or individuals. Other economic tools
include foreign sales of weapons, food, and technology, which again can involve a
number of different agencies as well as the State Department and Defense Depart-
ment, which together are responsible for much of the foreign economic and military
assistance programs.18
Without going into detail about each economic office or agency, it is useful to
examine the expanding role of the Department of the Treasury. Since 9/11, it has
become an increasingly active participant in national security policymaking regard-
ing counterterrorism and other illicit international activities. As a former deputy sec-
retary noted, there is now a strong argument for including the Treasury Department
as a statutory member of the NSC because its financial tools for punishing state spon-
sors of proliferation and terrorism and for squeezing off the financial support for such
operations have become so powerful.19 Its Office for Foreign Assets Control (OFAC)
has the authority to name and shame individuals who are breaking US laws, making
major international banks and other financial institutions wary of doing business with
them. Likewise, Treasury’s Office of Intelligence and Analysis (OIA) and Office for
Terrorism and Financial Intelligence (OTFI) have become powerful tools for monitor-
ing rogue foreign governments, criminals, and terrorists. Its ability to design effec-
tive sanctions has worked tremendously in bringing pressure on Iran to negotiate a
nuclear arrangement with the United States and the other permanent members of the
UN Security Council.20
40 Chapter 3
“black sites” for enhanced interrogations reportedly came from a former NSC official
who disagreed with those actions.21 Leaks have been a nemesis to every president, and
few leakers are ever prosecuted successfully. Yet there are also times when a White
House may itself produce leaks to mislead or confuse congressional opponents or keep
the media off the scent of another story. The leak weapon is one that is available to a
variety of executive and legislative branch officials for lots of different reasons.
What is most significant about the media’s role for understanding the role of intel-
ligence, however, is its skill in bringing information to light that otherwise would have
remained secret. The media is very much in the forefront of revealing controversial
intelligence programs that become topics of debate in Congress and the executive
branch. For instance, stories in the Washington Post and New York Times revealed the
CIA’s rendition programs that placed Afghan detainees in secret prisons outside the
United States, where enhanced interrogation methods (considered torture by many)
were conducted. Later the then chairman of the Senate Select Committee on Intel-
ligence, Sen. Dianne Feinstein, released a sanitized summary (more than six hundred
pages long) of an extensive staff report on torture; she did this prior to losing her
chairmanship, after which it was likely that the new Republican chairman would block
its release. In many cases, leaked intelligence judgments or findings can become part
of the public policy debate because they have appeared in the New York Times or the
Washington Post. In a few cases, such as the recent Russian hacking into the com
puters of the Democratic National Committee and efforts to penetrate American elec-
toral systems, the IC might even produce a declassified assessment to publicize the
seriousness of the issue and gain public and congressional support for more forceful
presidential actions.22
Every president must make some major decisions on how to organize the national
security decision-making process. Sometimes presidents have wished to radically
alter the system used by their predecessors, while at other times they retained much
of the system they inherited. But inevitably there are issues that have to be addressed
or that will confront presidents in one way or another. Among the most enduring are
the role presidents see for their national security adviser, the extent to which they
wish to see national security decisions made in the White House, and the degree to
which they are comfortable relying on formal structures and the career bureaucrats.
experts have noted, presidents have to feel comfortable with their national security
adviser, who will spend more time with them than their secretaries of state or defense.
The national security adviser has traditionally maintained a small office close to
the Oval Office, allowing the adviser to brief the president on fast-moving events,
participate in morning briefings and international phone calls to heads of state, and
generally control the flow of foreign affairs information reaching the president. None-
theless, presidents have to decide if they want to be more personally engaged in
foreign policy or devolve that to their national security adviser and cabinet officers.
Some scholars have described Bill Clinton as “indecisive” because he held lengthy
NSC meetings without decisions emerging, while George W. Bush relished being
“the decider” and wanted “actionable” intelligence so he could make swift decisions.
Barack Obama, as a constitutional lawyer, was more deliberative, and some criticized
him as “procrastinating” in how long he took to make important policy decisions.23
How a president answers those questions will dictate the type of national security
adviser with whom he is likely to feel most comfortable.
A useful way of thinking about the national security adviser’s role is to outline
what the position entails. First, the national security adviser must advise the presi-
dent, meaning provide him or her with information in the form of staff memoranda
or briefings on specific topics. Second, the adviser is responsible for running what
has become a large NSC staff of several hundred foreign policy experts. Third, but
not unimportant, the adviser must manage the interagency process by setting the
agendas for NSC, PC, DC, and IPC meetings. Embedded in these duties is also the
responsibility to present to the president the views of other cabinet officers and their
agencies so that the president has the widest possible set of perspectives and options.
Different national security advisers have prioritized those duties differently. In the
early days, those serving as quasi–national security advisers were primarily interested
in administering and scheduling the meetings of NSC principals with the president
and distributing policy papers for review. These were essentially “administrators” of
the national security process.24 Later, national security advisers became more personal
“counselors” to the president in terms of giving the president advice and information
privately to assist presidential decision-making. Other advisers have defined their role
as more the “honest broker” who would ensure that the interagency process fairly aired
all agencies’ views and options, which should be shared with the president. And finally,
there have been strong-minded national security advisers who have exercised their
own closeness to the president and strongly advocated their own positions as opposed
to simply presenting the views of the secretaries of state and defense.
Most scholars have concluded that the honest-broker role is the proper one, most
likely to succeed in generating the best decisions. President George H. W. Bush’s
national security adviser, Brent Scowcroft, is often held up as the classic honest
What Is the National Security Enterprise? 43
broker who was able to maintain an even playing field for all cabinet officers and
agencies to get their views on the table and before the president, without any fear that
he would bias the president. Partly, this model works when there is a good teamwork
spirit among the NSC principals. President Bush is reputed to have insisted on this
early in his administration.
Other models have also been prevalent with other presidents. Henry Kissinger,
under President Nixon, and Zbigniew Brzezinski, under President Jimmy Carter,
are often described as advocates who held strong views and worked to have theirs
accepted by the president. President George W. Bush’s national security adviser,
Condoleezza Rice, often described her first responsibility as being a counselor to the
president rather than a manager of the interagency process; many have criticized
her weak control over a strong-minded defense secretary, Donald Rumsfeld, and Vice
President Dick Cheney for a dysfunctional NSC process. During the Obama era, the
NSC principals were sometimes described as a “team of rivals” as there were strong
personalities in the cabinet, such as Hillary Clinton as secretary of state and Robert
Gates as secretary of defense.
National security advisers also serve as key customers of intelligence and often
are the gatekeepers for intelligence reaching the president. As the adviser who
shapes the president’s daily agenda of foreign policy discussions, the national secu-
rity adviser can walk intelligence reporting into the Oval Office if it is deemed criti-
cally important or can simply dismiss it. Photos of Soviet missiles in Cuba were first
shown to McGeorge Bundy, who then escorted the briefers into the Oval Office to
brief President Kennedy. Both Henry Kissinger and Zbigniew Brzezinski had the
PDB delivered directly to them, choosing which items to then discuss with their
presidents that morning. Other national security advisers have organized separate
PDB sessions for themselves prior to the president’s in order to be better prepared
to address the policy implications of the intelligence issues contained in the PDB.
In today’s environment, it would appear that President Trump’s national security
adviser, John Bolton, is the most likely reader of daily intelligence because the pres-
ident himself appears not to value intelligence highly and has repeatedly shown
indifference if not disdain for its contributions. (To be examined further in later
chapters.)
governors, with far less exposure to foreign affairs. If presidents wish to be involved,
then there is a natural tendency to pick strong national security advisers who will try
to control national security decisions from the White House. Such national security
advisers will build a strong NSC staff, take charge of meetings, and insist on the NSC
adviser being as much of a policymaker as any cabinet officer. That model prevailed
under President Nixon, where Kissinger was virtually single-handedly in charge of
American foreign policy.
Other presidents have preferred to have less to do with foreign affairs and have
devolved onto the secretaries of state and defense much of the responsibility for for-
mulating and implementing presidential decisions. President Ronald Reagan began
his eight years in office with such a view, selecting a national security adviser who
had little responsibility other than scheduling meetings, while relying on strong sec-
retaries of state, retired general Al Haig and later George Shultz, for big foreign pol-
icy ideas. This departmentally driven foreign policy might have worked, except that
a weak national security adviser was unable to moderate the bitter rivalry between
Shultz and Defense Secretary Caspar Weinberger. Reagan’s model of weak presiden-
tial interest in the NSC also permitted the Iran-Contra scandal to occur and threaten
his presidency.
A more recent model of less centralized foreign policy occurred during George W.
Bush’s tenure, when he empowered Defense Secretary Rumsfeld to run the war in Iraq,
leaving the NSC and State Department relatively uninvolved or at least uninfluential
in shaping the president’s policies in his first term. Finally, the Obama presidency
tried to learn from the mistakes of the Bush years and again centralized foreign policy
in the hands of the NSC staff in the White House. This was perhaps an overcorrec-
tion. Several cabinet officials would later criticize President Obama for allowing rela-
tively inexperienced NSC staffers to shape policy and allow political considerations
to creep into national security discussions.25
Structured or Informal?
The preceding discussion described a range of approaches presidents have taken in
selecting and organizing their national security teams. Often, however, the description
of the formal process cannot capture the complexity and variety of decision-making
styles that presidents adopt. Truman shunned the NSC meetings and relied heavily
on his secretaries of states. Eisenhower participated in a huge number of NSC meet-
ings over which he presided, to the point his advisers thought they might exhaust
him. Kennedy preferred informal gatherings and violated bureaucratic hierarchy reg-
ularly—often calling junior desk officers himself. Nixon liked to make his decisions
on long walks or privately with his equally secretive national security adviser. So,
presidents are prone to make decisions outside the normal processes.
What Is the National Security Enterprise? 45
As described above, the NSC system is a complex set of policy discussion and
options-generating processes that ultimately allow the president to make national
security decisions. Intelligence contributes in a number of ways to this process. First,
it informs the president and by extension his national security team with both cur-
rent and estimative intelligence. The daily intelligence publications, including the
PDB, contain valuable information and analysis that is purposely aimed at address-
ing issues that are of presidential interest (see box 3.2). One former CIA director
recalls the “rain of requests” for information from the national security adviser follow-
ing such briefings.27 Other publications are also designed to inform the president’s
national security staff as well as the staffs supporting other NSC members across the
government.
Second, intelligence provides direct input to the interagency discussions—at the
PC, DC, and IPC levels—in the form of oral briefings by IC representatives as well
as written assessments requested as part of the policy reviews. Longer-term assess-
ments in the form of NIEs often are tasked to support significant NSC deliberations.
Intelligence support to the almost continuous set of PC, DC, and IPC meetings has
become a major part of the DNI’s and the CIA’s responsibilities. Both CIA offices and
the ODNI’s national intelligence council spend much of their time preparing memos
and briefings for their respective directors who attend the PC meetings.
Third, the IC often has to put forth options for covert action, which is an additional
policy tool at the disposal of the president and his closest advisers. The CIA director
(as will be discussed in chapter 9) is responsible for developing covert means to sup-
port broader national security policies where the US role must be hidden. In this way,
46 Chapter 3
George H. W. Bush:
“One important fixture was the 8:00 am national security meeting in the Oval Office, at
which the CIA briefed me on the latest developments around the world. It had two parts.
The first portion was the intelligence briefing, at which I was joined by Brent [NSC adviser
Scowcroft], Bob Gates [deputy NSC adviser], usually John Sununu [chief of staff], and, once
or twice a week, Bill Webster [CIA director]. A CIA officer would bring in the President’s
Daily Brief (PDB), which was a written rundown of important intelligence reports and analy-
sis put together during the night and small hours of the morning. I made it a point from day
one to read the PDB in the presence of a CIA briefer and either Brent or his deputy. This
way I could task the briefers to bring in more information on a certain matter or, when the
reading would bring to mind policy matters, ask Brent to follow up on an item of interest.
The CIA officers would write down my questions; in a day or so, I would get an answer or
an elaboration.
Knowing of my interest in the oft-berated but essential clandestine service, Webster would
occasionally ask to bring along some individual who had risked his or her life to gather criti-
cally important intelligence. I found those sessions fascinating, and I was always impressed
with the courage, the patriotism, and the professionalism of those who served in the Director-
ate of Operations.”
Brent Scowcroft:
“After the CIA briefing, the second part of the national security meeting would begin. The
Vice President, already briefed separately by a different CIA team, would arrive and I would
go over pertinent events of the day, items where the President’s guidance was needed, and
anything else requiring discussion.”
Source: George H. W. Bush and Brent Scowcroft, A World Transformed (New York: Knopf, 1998), 30.
This brief description of the national security decision-making process and the role
that intelligence plays cannot capture the full complexity of the huge NSE. One thing
is very clear. What began as a fairly simple structure has grown over seventy years into
an unwieldy and often unresponsive tangle of agencies, organizational cultures, and
competing authorities. Government practitioners as well as scholars have lamented this
development but have seemed unable to convince presidents and Congress to make
the needed improvements. Former secretary of defense Donald Rumsfeld bemoaned
the reality of “incredible amounts of time that just kind of suck the life out of you at the
end of the day spending 4, 5, 6 hours in interagency meetings and the reason is, because
the organization of the government fit the last century instead of this century.”28 The
bureaucracies within the NSE have also been reluctant to modify the well-trodden paths
and processes with which they have become comfortable. At the heart of the problem
are the distinct organizational cultures resident in the different national security agen-
cies. Efforts to produce “jointness”—coordination of military, diplomatic, law enforce-
ment, and intelligence activities—remain elusive. Congress adds to the problem by its
refusal to reform its own committee structure, which tends to separate rather than inte-
grate the military, diplomatic, economic, law enforcement, and intelligence tools. Con-
gressional leaders’ personal status and clout over their committees’ jurisdiction have
often inclined them to resist organizational reforms that might somehow reduce their
own importance.29 The NSE today continues to suffer from a lack of sufficient coordina-
tion and development of capabilities that are needed for the twenty-first century.
Major reforms to the national security decision-making process usually result only
from a major crisis that can generate a temporary consensus on next steps. The 1947
National Security Act bubbled up from the many lessons learned in World War II,
particularly those regarding the need for better coordination of America’s military,
diplomatic, and intelligence activities. The post-9/11 reforms that created the ODNI
and DHS were also driven by a major shock to the nation. Most likely, the next set of
reforms will be similarly driven by a surprise or shock, perhaps one associated with the
new cyber domain or growing environmental threats posed by climate change. What-
ever those changes to the NSE amount to, intelligence is likely to be one of the major
areas where change will be needed.
USEFUL WEBSITES
FURTHER READING
Cody M. Brown, The National Security Council: A Legal History of the President’s Most Power-
ful Advisers (Washington, DC: Center for the Study of the Presidency, 2008).
A concise legislative history of the evolution of the NSC across numerous presidencies.
Ivo Daadler and I. M. Destler, In the Shadow of the Oval Office: Profiles of the National Security
Advisers and the Presidents They Served—from JFK to George W. Bush (New York: Simon &
Schuster, 2009).
An excellent study of the personalities who held the position of national security adviser
and how they dealt with their presidents.
Roger Z. George and Harvey Rishikof, The National Security Enterprise: Navigating the Laby-
rinth, 2nd ed. (Washington, DC: Georgetown University Press, 2017).
A compendium of practitioners’ assessments of the principal national security agencies,
Congress, the courts, think tanks, and the media.
Peter W. Rodman, Presidential Command: Power, Leadership, and the Making of American For-
eign Policy from Richard Nixon to George W. Bush (New York: Knopf, 2009).
A leading political scientist’s assessment of presidential style in directing US foreign
policy.
David Rothkopf, Running the World: Inside the National Security Council and the Architects of
American Power (New York: PublicAffairs, 2005).
A recognized think tank expert’s analysis of the NSC’s evolution and his critique of US
foreign policy.
Charles A. Stevenson, America’s Foreign Policy Toolkit: Key Institutions and Processes (Los
Angeles: SAGE, 2013).
A concise description of the major tools and agencies that direct US military, diplomatic,
economic, and intelligence missions.
NOTES
Second epigraph: Quote from McGeorge Bundy, “Letter to Jackson Subcommittee,” in Fateful
Decisions: Inside the National Security Council, ed. Karl E. Inderfurth and Loch K. Johnson
(New York: Oxford University Press, 2004), 44.
What Is the National Security Enterprise? 49
1. For a good discussion of the expansion of the NSC, see David Rothkopf, National Inse-
curity: American Leadership in an Age of Fear (New York: PublicAffairs, 2014), 206–8.
2. Typically the secretary of energy is also considered a statutory member, as the Depart-
ment of Energy oversees the operation of the national laboratories that research, develop, and
build America’s nuclear weapons.
3. Typical attendees include the assistant to the president for national economic pol-
icy, who directs the NEC, and the secretaries of commerce, treasury, agriculture, energy, and
transportation.
4. Spenser Hsu, “Obama Combines Security Councils,” Washington Post, May 27, 2009, http://
www.washingtonpost.com/wp-dyn/content/article/2009/05/26/AR2009052603148.html.
5. See Cody M. Brown, The National Security Council: A Legal History of the President’s
Most Important Advisers (Washington, DC: Center for the Study of the Presidency, 2008), 3.
6. “Principals” refers to secretary-level or equivalent positions of the departments and
agencies attending NSC meetings. A principal often is allowed to bring a “backbencher” to
expanded meetings, who is termed “plus one.”
7. Truman attended very few NSC meetings prior to the Korean War, and the council’s
reviews and policy papers had far less impact than its workload would have suggested. See
Stanley Falk, “The NSC under Truman and Eisenhower,” in Fateful Decisions: Inside the
National Security Council, ed. Karl Inderfurth and Loch Johnson (London: Oxford University
Press, 2004), 38.
8. See Ivo Daalder and I. M. Destler, In the Shadow of the Oval Office: Profiles of the
National Security Advisers and the Presidents They Served—from JFK to George W. Bush (New
York: Simon & Schuster, 2009), for a comprehensive review of the changes that early presi-
dents made to the NSC system.
9. Operations centers are continuously manned to receive and send messages or con-
duct secure telephone- and/or video-conferencing among key agencies and foreign military
and diplomatic posts. The operations staffs at the White House Situation Room and at other
departments are responsible for alerting the president and key advisers to any rapidly emerg-
ing crisis or event requiring presidential or departmental attention.
10. In a similar fashion, the Department of Homeland Security has highlighted its “Home-
land Security Enterprise,” which strives to knit together the twenty-two DHS agencies and
their disparate missions into a single integrated approach to homeland security. Also, the
ODNI often discussed the “National Intelligence Enterprise” that aims to integrate the activi-
ties of the sixteen national intelligence organizations under a set of common missions.
11. For fuller treatment of the Department of State’s role, mission, and culture, see Marc
Grossman, “The State Department: Culture as Interagency Destiny,” in The National Security
Enterprise: Navigating the Labyrinth, 2nd ed., ed. Roger Z. George and Harvey Rishikof (Wash-
ington, DC: Georgetown University Press, 2017), 81–96.
12. “Chief of station” refers to the senior CIA official in a country who directs the intelli-
gence activities there. He or she is responsible for managing relationships with that country’s
security services and in this way has unique access to a foreign government’s thinking and
operations.
13. For discussion of how the secretaries of defense have treated the interagency process,
see Joseph McMillan and Frank C. Miller, “The Office of the Secretary of Defense,” in George
and Rishikof, National Security Enterprise, 120–41.
50 Chapter 3
14. The USDI is the senior-most intelligence official who reports to the secretary of defense.
In turn, the directors of the NSA, DIA, NRO, and NGA report to this official.
15. For a fuller discussion of the FBI’s evolving national security role, see Harvey Rishi-
kof and Brittany Albaugh, “The Evolving FBI: Becoming a New National Security Enterprise
Asset,” in George and Rishikof, National Security Enterprise, 223–45.
16. This budget figure includes more than $7 billion in disaster-relief funds used by FEMA.
17. For an analysis of DHS’s organizational challenges and missions, see Susan Ginsburg,
“The Department of Homeland Security: Civil Protection and Resilience,” in George and Rishi-
kof, National Security Enterprise, 247–78.
18. An excellent overview of the many economic instruments and agencies can be found
in Charles A. Stevenson, America’s Foreign Policy Toolkit: Key Institutions and Processes (Los
Angeles: SAGE, 2013), 170–299.
19. Robert Kimmitt, “Give Treasury Its Proper Role on the National Security Council,” New
York Times, July 23, 2012, http://www.nytimes.com/2012/07/24/opinion/give-treasury-its
-proper-role-on-the-national-security-council.html?mcubz=1.
20. See Dina Temple-Raston and Harvey Rishikof, “The Department of Treasury: Brogues
on the Ground,” in George and Rishikof, National Security Enterprise, 162–82.
21. Dafna Linzer, “CIA Officer Fired for Leaking Classified Data,” Washington Post, April 25,
2006, http://www.washingtonpost.com/wp-dyn/content/discussion/2006/04/24/DI2006
042401026.html.
22. Adam Entous, “Secret CIA Assessment Says Russia Was Trying to Help Trump Win the
White House,” Washington Post, December 9, 2016, https://www.washingtonpost.com/world
/national-security/obama-orders-review-of-russian-hacking-during-presidential-campaign
/2016/12/09/31d6b300-be2a-11e6-94ac-3d324840106c_story.html?utm_term=.6bcd00
fcdcfe.
23. Illustrative of Obama’s deliberative style, he took more than sixty days to review his
Afghan strategy before announcing a major increase in troops sent there in 2008.
24. See Alexander L. George, “The Case for Multiple Advocacy in Making Foreign Policy,”
American Political Science Review 66, no. 3 (September 1972): 751–85.
25. Former CIA director Leon Panetta and Defense Secretary Robert Gates both criticized
President Obama for allowing relatively junior NSC staff to drive policy and marginalize more
senior cabinet officials. See “Hagel’s Predecessors Decry White House Micromanaging,” NBC
News, November 24, 2014, https://www.nbcnews.com/politics/first-read/hagels-predecessors
-decried-white-house-micromanaging-n255231; and Robert M. Gates, Duty: Memoir of a Secre-
tary at War (New York: Alfred A. Knopf, 2014), 587.
26. Lyndon Johnson held his Tuesday lunches with his secretaries of state and defense,
while during the Clinton administration, Defense Secretary William Perry, Secretary of State
Warren Christopher, and National Security Adviser Anthony Lake would have their “PCL”
(“pickle”) meetings. Likewise, Secretary of State Madeleine Albright, National Security Adviser
Sandy Berger, and Defense Secretary William Cohen (“ABC”) would continue this habit. See
David Auerswald, “The Evolution of the NSC Process,” in George and Rishikof, National Secu-
rity Enterprise, 36.
27. Recalled by former DCIA Frank Carlucci in Inderfurth and Johnson, Fateful Deci-
sions, 175.
What Is the National Security Enterprise? 51
28. Quoted in Christopher J. Lamb and Joseph C. Bond, “National Security Reform and the
2016 Election,” Strategic Forum, no. 293 (March 2016): 2.
29. For a more complete discussion of these challenges, see Harvey Rishikof and Roger Z.
George, “Navigating the Labyrinth of the National Security Enterprise,” in George and Rishi-
kof, National Security Enterprise, 382–94.
4
What Is the Intelligence
Community?
Before Pearl Harbor the United States did not have an intelligence
service comparable to that of Great Britain or France or Russia or
Germany or Japan. We did not have one because the American
people would not accept it. It was felt that there was something un-
American about espionage and intelligence in general.
—Lt. Gen. Hoyt Vandenberg, second DCI, 1947
52
What Is the Intelligence Community?53
pace with the expanding set of users and their diverse intelligence requirements. It
will examine these agencies’ basic functions and their involvement in both collecting
and producing intelligence. It will also identify some continuing challenges that such
a large and diverse set of agencies face in coordinating their operations for support-
ing the policy community.
In 1947, America’s new national security system also brought into existence its first
peacetime civilian intelligence community. Prior to the outbreak of World War II,
having a permanent peacetime intelligence agency was deemed both unnecessary
and essentially undemocratic. After World War I, civilian involvement in the modest
US military intelligence effort was terminated. Much later, Secretary of State Henry
Stimson said, “Gentlemen do not read each others’ mail.” In spite of this, the American
54 Chapter 4
military retained modest intelligence functions: the army’s G-2 and the navy’s Office
of Naval Intelligence (ONI) focused on assessing foreign armies and navies in the
event of future conflicts. And the relatively young FBI did maintain some foreign
intelligence capabilities—including operations in Latin America—to monitor possible
foreign espionage and criminal activities. But the notion of having a large-scale for-
eign intelligence function in peacetime was entirely new for the United States.
As Europe went to war in 1939, President Roosevelt began to see the need for
information on Europe as he worried that the United States might be dragged into
the fighting. He first instructed a close confidant, William J. “Wild Bill” Donovan,
to make a fact-finding trip to Europe in order to assess whether Britain would be
willing and able to resist the Third Reich’s military onslaught. Donovan came back
reporting that the British would resist. Also, he was impressed with Britain’s intel-
ligence services, which openly expressed a willingness to help Washington build up
its own. Roosevelt thereafter assigned Donovan the role of “coordinator of informa-
tion” (COI) to carry out “supplementary activities” for information not available to
the US government.2
Following the Pearl Harbor attack in 1941, President Roosevelt soon established
the Office of Strategic Services (OSS), and he put Donovan in charge. However, this
was to be largely a military-focused intelligence effort, with the OSS operating under
the authority of the military chiefs. In addition to running agents behind enemy lines
for conducting sabotage and collecting information on the Axis powers, the OSS also
established the first research-and-analysis function (its R&A branch), which would
later serve as a model for the CIA’s own analytical directorate.
At the end of World War II, President Truman disbanded the OSS. Donovan
argued, unsuccessfully, that the growing problems with the Soviet Union justified
maintaining and expanding the OSS; however, he faced bureaucratic resistance from
the military intelligence services, the State Department, and the FBI.3 But as the
Cold War deepened, the need for a peacetime intelligence community became over-
whelming. Truman gradually agreed to a modest national intelligence effort, led by
a newly named first director of central intelligence—Sidney Souers, who already had
been a presidential adviser. In 1947, Truman signed the National Security Act, which
gave the DCI a more formal role in advising the president and his NSC; in short
order, this led to the creation of the CIA. Nonetheless, Truman continued to have
serious reservations that it would create rivalries among the already existing intel-
ligence agencies and might create an American “Gestapo.”4
These functions make it a truly central player in the national security decision-
making process. First, as the major collector of HUMINT, it recruits spies to provide
information on some of the most sensitive and important national security issues. DO
case officers (those who recruit agents) are asked to operate in highly risky foreign
environments, focused on stealing secrets that can be gotten no other way. Secrets
gained through daring operations naturally draw special attention from the White
House. Many presidents often wish to understand “how we know” certain secrets that
foreign adversaries hope to conceal from Washington.
Second, the CIA manages the largest number of all-source intelligence analysts,
who produce assessments on a global set of issues, including most of the material
finding its way into the important President’s Daily Brief. The DA not only has ana-
lysts focused on regional issues such as Russia, China, and Iran, but it also covers
special topics such as CI, counterterrorism, and counterproliferation and supports
a variety of national intelligence centers (operated by the DNI and discussed later).
What Is the Intelligence Community?57
Third, the DO and its Special Activities Division plan and conduct covert action at
the direction of the president. In this case, the CIA is actually implementing policy,
not just supporting other policy agencies with information (discussed in more detail
in chapter 9). The CIA’s unique direct reporting role to the president makes it the
obvious choice to be the agency that conducts covert operations because only the
president can authorize those activities.
Fourth, the CIA runs CI and counterespionage operations as well as produces CI
analysis to identify, monitor, exploit, and disrupt foreign intelligence services’ efforts
to penetrate US intelligence and national security agencies. Along with the FBI,
which is responsible for CI activities domestically, the CIA has uncovered numer-
ous instances of Russian, Chinese, and other hostile intelligence services’ efforts to
recruit agents; steal classified military, scientific, and economic information; and pen-
etrate critical American civilian and government information systems.
For much of its history, the CIA was considered the agency with the most clout,
given these critical missions. On top of that, the director of the CIA was also simul-
taneously the DCI, making him the president’s senior intelligence adviser as well as
giving him responsibility for overseeing other IC agencies. This clout, however, was
diminished with the passage of the Intelligence Reform and Terrorism Prevention
Act of 2004 (IRTPA). The act established the director of national intelligence, who
not only became the senior intelligence adviser to the NSC and the president but also
took over the role of managing the IC. In so doing, the CIA director now reports to the
DNI, which has caused the CIA to lose some status within the IC as well as the White
House. Some CIA careerists viewed this action as punitive, to reflect dissatisfaction
with the CIA’s failure to prevent the 9/11 attacks and its flawed Iraq WMD analysis.
However, other commentaries stress that previous CIA directors were never able to
juggle the day-to-day management of the CIA with effective oversight of the huge IC.
That said, the relationship between the CIA director and the DNI continues to be an
evolving one.
Today the CIA remains the most visible IC member, whose analysis is often con-
sidered the unofficial record of intelligence performance, and thus often it is the one
agency that attracts the most criticism if those assessments prove to be off the mark.9 It
remains the agency most responsive to the president’s intelligence requirements and
is said to generate upward of 80 percent of the PDB articles for the president. More-
over, in this era of terrorism, insurgencies, and WMD proliferation, its covert action
programs have become all the more critical to presidential efforts to prevent future
attacks or other threats to the nation. Most recently, the CIA’s management of covert
detention and interrogation programs has also drawn attention and criticism, even
though these have been authorized by two presidents from both major political parties.
58 Chapter 4
Military intelligence is perhaps the oldest part of the intelligence discipline. As one
military analyst has argued, “Military intelligence is the basis of operations.”10 Military
strategists (such as Sun Tzu and Carl von Clausewitz) as well as better-known Ameri-
can generals (from George Washington to Dwight Eisenhower to David Petraeus) have
relied on spies, deception, and sabotage to gain military advantages over their oppo-
nents. Not surprisingly, America’s IC has long been dominated by the military. The
earliest American intelligence organizations were the ONI, established in 1882, and
the army’s military intelligence directorate, established in 1885. They gathered infor-
mation on the great European and Asian militaries prior to, during, and between the
two world wars through a system of military attachés assigned to American embassies.
World War II and the onset of the Cold War later demanded a large, diverse, and
permanent military intelligence community in its own right. The military intelligence
failure at Pearl Harbor led both the army and navy to reorganize and expand their
own use of HUMINT and SIGINT collection in an effort to give Allied forces the
intelligence needed to defeat the Axis powers. And as the Soviet Union loomed larger
as a military and nuclear threat in the 1950s, the newly created Defense Department
demanded more intelligence to conduct military analysis focused on key threats fac-
ing the US homeland and overseas commitments.
Defense intelligence today commands roughly two-thirds to three-quarters of the
NIP’s budgets and includes some of the largest intelligence agencies in terms of
collection operations and personnel. In addition to the service intelligence orga-
nizations tied to the army, navy, air force, and Marine Corps, there are the large
combat-support agencies that include the DIA, the NSA, the NRO, and the NGA.
These big four are responsible for collecting, exploiting, and analyzing all national-
level military intelligence required by the president and the NSC but especially
by the secretary of defense, the JCS, and the senior generals and admirals spread
across the globe in nearly a dozen unified and specified commands. Among the
many intelligence requirements these agencies must satisfy are:
Fulfilling such a wide array of intelligence requirements for such a long list of mili-
tary and civilian customers helps to explain the huge size and cost of defense intel-
ligence. With so many separate service and combat-support intelligence agencies
within a single department, the secretary of defense decided in 2003 to create an
undersecretary of defense for intelligence (USDI) to whom all defense intelligence
agencies would report. This change has put him in charge of a high percentage of the
NIP that comes through DOD appropriations. In terms of lines of authority, the direc-
tors of the DIA, the NSA, the NRO, and the NGA must now report both to the USDI
as defense “combat-support agencies” but also to the DNI as members of the national
intelligence community.
capabilities provoke Americans’ civil liberties concerns. Most recently, the Edward
Snowden leaks of the NSA’s worldwide collection of communications—including some
reportedly directed at America’s allies—have caused Congress and the public to ques-
tion whether the NSA’s activities go well beyond what the law permits.
Today the NSA is the principal US cryptologic organization, with a dual mission.
First and foremost, it must protect US national security information by creating secure,
encrypted communication equipment and systems. The NSA produces what is com-
monly referred to as information security (INFOSEC) or information assurance—
encrypted codes and encryption gear (e.g., secure phones and other communication
devices) used throughout the US government. Second, it must collect, exploit, and
analyze foreign SIGINT, including missile telemetry systems; military command, con-
trol, and communications (C3 ) systems; commercial telephone and Internet networks;
and foreign information networks. In layperson’s terms, the NSA attempts to collect,
process, and then analyze virtually any significant form of foreign electronic signals.
For example, when a foreign military tests a new weapon system, the NSA will collect
FISINT; when foreign diplomats or military commanders talk to each other, the NSA
will collect COMINT; and when a foreign military is operating a variety of electronic
devices such as radars, the NSA will collect ELINT. To do all this, the NSA manages a
large workforce of both civilian and military professionals with skills in cryptoanalysis,
cryptography, mathematics, computer science, and foreign languages. It is sometimes
suggested that the NSA is the largest employer of mathematicians and computer
“geeks” in the United States.
Like the DIA, the director of the NSA (often abbreviated DIRNSA) is a serving
three-star officer who reports to the USDI. The DIRNSA not only directs the activi-
ties of the NSA but also oversees the individual military service SIGINT activities,
which ensures their smooth cooperation with the NSA. At the time of this writing, the
DIRNSA also has the job of being the commander of the United States Cyber Com-
mand (CYBERCOM). This is a unified military command established in 2010 with
the mission to protect US defense information networks from foreign cyberattacks
and to conduct a full spectrum of cyber operations in support of US military opera-
tions. There continue to be discussions of whether the DIRNSA should be separated
from CYBERCOM in order to give this command its own dedicated senior military
commander.14
in the 1950s. Cold War intelligence requirements for Soviet nuclear and missile tests
posed great risks to pilots of “spyplanes” trying to overfly Soviet airspace. In 1958,
President Eisenhower directed his science and military advisers to begin a crash pro-
gram for developing space-based satellite systems that could photograph Soviet test
ranges and missile sites. By 1960, the first such system, designated Corona, produced
the reconnaissance photos that helped to dispel the myth of a “missile gap.”15
Early development of reconnaissance satellites was spurred on by the fact that the
US Air Force, the US Navy, and the CIA all wished to develop overhead collection
capabilities for their own organizational reasons. The air force was interested in tar-
geting information for bombing attacks, the CIA needed information on Soviet mis-
sile tests, and the navy wanted to monitor Soviet maritime operations. This resulted
in a hybrid organization, made up of military service personnel, CIA employees, and
civilian staff and contractors.
These three separate programs were brought under central management when,
in 1961, Secretary McNamara placed them all under the newly created NRO. As an
assistant secretary of the air force, the director of the NRO would report to both the
secretary of defense and the DCI (after 2005, the DNI). The organization’s existence
and even its name were secret and remained so until 1992, when Secretary of Defense
Dick Cheney declassified the name.
The NRO’s first decade was focused on revealing the military capabilities and inten-
tions of the Soviet Union and the People’s Republic of China. Although considered
a temporary fix to satisfy American intelligence needs, the Corona program contin-
ued to operate through the early 1970s. However, the demand for higher volume and
higher-resolution imagery pressed the United States to introduce the KH-7 and KH-9
satellite systems, which were able to produce thousands of linear feet of film during
their more than one hundred missions. These film-return systems were replaced in
1976 by the first electro-optical KH-11 system, which transmitted electronically much
higher-resolution images in near real time to ground stations and then on to Wash-
ington for rapid processing and interpretation.16 Avoiding military surprises such as
the 1968 Soviet invasion of Czechoslovakia and the 1973 Arab attack on Israel were
strong drivers to develop such capabilities to give policymakers adequate warning
time to take appropriate action.
In the 1990s, as defense and intelligence budgets suffered through cuts (à la the
“peace dividend”), the NRO reorganized and integrated the three separate air force,
navy, and CIA programs and their personnel. The expense of large satellites also put
a premium on integrating the diverse IMINT- and SIGINT-collection capabilities
onto single satellite platforms to get the most “bang per launch.”
During the Cold War, the NRO systems were largely focused on collecting against
Soviet and Chinese strategic and tactical military targets, as those were seen as the
What Is the Intelligence Community?63
most direct military threats to the United States. However, even more diverse and
capable satellite programs are used for a variety of national security challenges:
As there are many applications for imagery, the NRO has found itself working
closely with the NGA, which combines satellite imagery and SIGINT with other
data to produce unique GEOINT. In addition, there are domestic agencies inter-
ested in exploiting the NRO’s considerable resources for disaster relief and envi-
ronmental monitoring, so there is now a Civil Applications Committee within the
Department of the Interior, where representatives from other domestic agencies
such as DHS and the Department of Health and Human Services can make their
requests for imagery.17
The NRO, like other combat-support agencies, has to operate with split loyalties
to both the secretary of defense and the DNI. The original charter for the NRO had it
reporting directly to the secretary of defense but allowed the then DCI to assign its
intelligence requirements. President Carter first established the NRO as a member of
the national foreign intelligence program, giving the then DCI authority over its bud-
get. For many years, a special Committee on Imagery Requirements and Exploitation
(COMIREX) functioned to ensure that all IC agencies—not just military ones—rely-
ing on IMINT could jointly determine imagery priorities, including their urgency,
frequency, and resolution.18 A 2010 memorandum of agreement between the DNI and
the secretary of defense has stipulated that the NRO director is the senior adviser on
overhead systems to both; in practice, this means that both the DNI and the secretary
of defense must validate future intelligence requirements for satellite systems. As one
historian phrased it, “A certain amount of conflict between the Defense Department
and the Intelligence Community is an inherent part of the NRO’s history, and remains
a challenge for running the organization today.”19
briefly tracing its history, a working definition of GEOINT is required. The IC con-
siders GEOINT to be the exploitation and analysis of imagery and other geospatial
information that “describe, exploit and visually depict physical features and geo-
graphically referenced activities on the earth.”20 In layperson’s terms, GEOINT has to
take advantage of not just images but also combines them with data and information
from all the other INTs as well. Imagery information has been and remains the foun-
dation on which much geospatial information and analysis is based. But it must be
enhanced with other information—often referred to as “collateral collection”—to give
meaning or value to the imagery itself.
Two examples might help explain how GEOINT is more than just imagery. First,
when a tsunami hit the Philippines in 2004 and reshaped the landscape, the NGA
used digital mapping imagery to revise maritime maps used by rescue ships. It
exploited social media being used by the victims to update existing maps to highlight
new physical hazards, closed roads, and displaced populations.21 Second, the NGA
was a key contributor to locating Osama bin Laden and many other so-called high-
value targets. During the planning of Operation Neptune Spear, the NGA helped to
produce an exact replica of Bin Laden’s Abbottabad residence, using various forms
of imagery of the compound to measure it. This information reportedly helped show
US Navy SEALs where to land their helicopters and detailed the number, gender, and
even heights of the compound’s occupants.22
This new discipline is really not that new. Ancient and modern armies and navies
have always relied on topographical and maritime mapping to describe difficult ter-
rain features of the battlefield as well as favorable and dangerous maritime routes. In
1803, for example, President Thomas Jefferson sent the US Army’s Lewis and Clark
Expedition off to map significant features of the huge Louisiana Territory purchased
from the French. The US Navy also has been conducting defense-related mapping as
far back as the 1830s, so as not to rely on the British navy’s charts.23 Likewise, there
has long been the practice of aerial reconnaissance to assist in targeting an enemy
as well as assessing the damage done by strategic bombing campaigns. The world
wars saw the steady expansion and greater sophistication of such aerial reconnais-
sance for mapping battlefields, landings, and enemy targets. All of this was done by
the individual services that were primarily interested in their unique domains—land,
naval, and air battle spaces.
The CIA produced further early advancements in the use of the U-2 and the SR-71/
AR-12 spyplanes and eventually space-based imagery satellites. Increasing imagery
collection also required a dedicated set of analysts to interpret this growing vol-
ume of data. Thus began the gradual reorganization and centralization of GEOINT.
In 1961, President Eisenhower created the National Photographic Interpretation
Center (NPIC) by combining the imagery analysis found in the CIA with similar
What Is the Intelligence Community?65
activities in the army, navy, and air force. The NPIC made an early contribution in
its identification of the Soviet missiles secretly placed in Cuba in 1962. During the
Vietnam War in the 1960s and 1970s, the need for better coordination of mapping
services led to a comparable consolidation of the separate military services’ map-
ping function into a single Defense Mapping Agency (DMA). But it was not until the
mid-1990s that Secretary of Defense William Perry and DCI John Deutch agreed to
combine all imaging and mapping services into a single National Imagery and Map-
ping Agency (NIMA).
Shortly after 9/11, James Clapper became the director of NIMA, and he quickly
determined that the agency was now producing more sophisticated products for
more and more customers. Increasingly, NIMA was producing geospatial informa-
tion well beyond military maps or finished imagery analysis. In fact, it was combining
imagery with a host of other data to support humanitarian relief efforts, support inter-
national negotiations, and plot the locations and movement of terrorists, criminals,
and pirates. With such a wide array of applications and government users, General
Clapper pushed to rename NIMA as the NGA to highlight this shift in focus.
The NGA is also unlike the NSA and the DIA, as it now has a senior civilian rather
than a general military officer as its director. This is understandable given that the
NGA has to work with a variety of nonmilitary departments and agencies that also
have geospatial missions and requirements. Any number of domestic agencies pro-
duce geospatial data that the NGA might need to access to develop actionable intel-
ligence for national security purposes. While the director of the NGA is the senior
manager of all GEOINT produced by the DOD, it must work with many of those
agencies outside the DOD. Some of those nontraditional and nonmilitary applica-
tions include environmental problems such as desertification and climate change,
geological and environmental challenges caused by natural disasters, human rights
and war crimes data, population movements, energy production and disruption, and
food security problems caused by weather and other natural causes.
The Bureau of Intelligence and Research (INR) provides all-source intelligence sup-
port to the secretary of state and other State Department policymakers, including
ambassadors, special negotiators, and other Foreign Service professionals through-
out the department. The assistant secretary for INR requires Senate confirmation,
reports directly to the secretary of state, and is his or her senior intelligence adviser.
In this capacity, INR is therefore responsible for producing its own departmental
intelligence analysis, crafting an intelligence policy for the department, and coordi-
nating national intelligence activities in support of American diplomacy.
66 Chapter 4
INR has claimed the distinction of being the direct descendent of the OSS. In
fact, its R&A branch was transferred to the State Department at the end of the war
and was huge at the time (sixteen hundred employees) compared to its size today
(slightly more than three hundred).24 It was the foundation for later all-source analy-
sis. At the same time, however, the OSS’s collection and special operations functions
were transferred to the CIA and the US military, respectively. Unlike the CIA, DIA,
or NSA, INR has no formal collection activities. That said, it has considerable insight
into the quality of the extensive diplomatic reporting that comes to the US govern-
ment from American embassies and consulates. Its analytical workforce comprises
civilian regional and functional experts, who tend to remain on their accounts far
longer than analysts at other agencies. Historically, roughly 30 percent have been
Foreign Service officers who have served overseas, know their regions and coun-
tries well, and have excellent connections with those embassies and their diplomatic
reporting. INR’s organization not surprisingly aligns well with the various regional
and functional bureaus, as these are key consumers of INR assessments.
Importantly, INR is close to the policymaking process at the department. Its analysts
are routinely included in each of the regional or functional bureaus’ daily and weekly
staff meetings. This puts INR in a unique position of being able to tailor its assessments
to current and longer-term issues on the agendas of assistant secretaries and higher-
level officials in the department. Until 2002, INR also produced its own daily intel-
ligence bulletin, called the Secretary’s Morning Summary, which was also sent to the
White House and other PDB consumers; it often received kudos for being better written
than the PDB, if not as highly classified. This daily and broadly circulated current intel-
ligence publication was eventually ended when INR and key consumers determined
the bureau could have more impact if State Department customers received specially
tailored memoranda with detailed analyses on issues of direct interest to them.
INR has a well-deserved reputation for being able to assert its independence
from policy, even as it reports to senior political appointees such as the secretary of
state. During the Vietnam War, INR famously dissented from Secretary McNama-
ra’s rosy assessments that the United States was “winning the hearts and minds.”25
During the early 1960s, it routinely dissented from National Intelligence Estimates
on South Vietnam it considered too optimistic, and later it also disputed the Penta-
gon’s numbers of North Vietnamese fighters. This reputation for independence was
more recently demonstrated in the well-publicized dissent INR took to the 2002 Iraq
WMD estimate (discussed in chapter 10) regarding the status of Saddam Hussein’s
nuclear program. INR has also stood by its analysts whenever political appointees
have pressed them to hew to a political line.26
INR also has the responsibility to advise the secretary of state on intelligence mat-
ters that could impact the conduct of US diplomacy and US foreign relations more
What Is the Intelligence Community?67
broadly. INR is responsible for managing the department’s relationship with the CIA.
In this capacity, INR acts on behalf of the department to ensure that CIA activities
are consistent with American diplomacy vis-à-vis foreign governments. Overall, INR
will represent Department of State interests to other intelligence agencies as well,
especially when intelligence sharing is involved. For example, if the secretary of state
wishes to share sensitive intelligence with a foreign official, INR would need to gain
approval from the intelligence agency producing that report, whether it is based on
NSA SIGINT or CIA HUMINT. Also, a senior INR official is responsible for coordi-
nating any proposed covert action or other special intelligence activities and assess-
ing whether they might have diplomatic repercussions or require that such plans be
shared with a foreign government.
The FBI has been involved in intelligence-related activities almost from the begin-
ning of its existence in the early twentieth century. Prior to September 11, 2001,
however, it principal focus was on CI—on threats coming from hostile intelligence
services. Historically, terrorism was not treated as a core mission; instead, such cases
were handled individually out of single field offices without much interaction with
or input from the FBI’s Washington headquarters. The subsequent investigation of
the 9/11 plotters highlighted major flaws in the FBI’s handling of counterterrorism
cases, including the way FBI procedures “stove-piped” investigative information,
prevented effective FBI headquarters oversight, and assigned inconsistent priori-
ties to terrorism cases.27 Since 9/11 and the 2004 intelligence reforms, the FBI has
become America’s principal “domestic intelligence” organization.28 In this new era,
the bureau has had to modify its mission statements, which previously focused on
“law enforcement,” to something closer to “national security.” The fusing of these
two has required a new set of missions and forced a change in the law enforcement
culture at the FBI.
In recognition of the new era and its new missions, the FBI created its National
Security Branch (NSB), which is led by a senior FBI deputy director. This branch has
special agents and analysts who investigate crimes and threats to the United States
involving counterterrorism, CI, and WMDs. After 9/11, an Intelligence Directorate
was added to ensure careful management of intelligence resources across the bureau
and to establish its intelligence strategy and programs. As of 2014, the FBI went a
step further and created an entirely separate Intelligence Branch, whose mission
continues to be the integration of FBI intelligence activities but also ensuring that
analysis and information are shared across the government and with international
partners.
68 Chapter 4
Beyond the Washington Beltway, the FBI’s joint terrorism task forces, located in
major metropolitan areas, increased from a couple dozen prior to 9/11 to over a hun-
dred since then. These bring together FBI law enforcement and intelligence experts
from across the federal government as well as state and municipal law enforcement
organizations. Overseas, the FBI operates over sixty legal attaché offices that are part
of the law enforcement and IC presence in foreign countries. These LEGATs work
with other US intelligence agencies operating overseas as well as foreign law enforce-
ment and security services. It is the LEGAT who, in most cases, is responsible for pur-
suing extradition and most renditions of suspected terrorists and WMD proliferators
whom the United States wishes to bring to justice.
The FBI organizational culture of being simply America’s “top cop” has also
changed. In addition to being populated and run by FBI “special agents” (who carry
badges and guns and have arrest authorities), the FBI has developed a large cadre
(nearly three thousand) of intelligence analysts. These analysts work in the NSB
located at FBI headquarters in downtown Washington as well as in the fifty-six field
offices across the United States, which still take the lead on individual investigations.
Increasingly, especially since the Russian interference with the 2016 US elections, the
FBI has played a leading role in presenting intelligence findings and warnings to US
policymakers, Congress, and the American public.
DEA also runs the El Paso Intelligence Center (EPIC), a multiagency center that is
focused on illicit drug trafficking and smuggling on the southwestern US border.29
And, finally, DHS contains two separate intelligence functions. The first is its
Office of Intelligence and Analysis (I&A). When the department was first being cre-
ated, there was some support for giving DHS a more expansive counterterrorism
intelligence role, but this was quickly batted down by proponents of leaving the FBI
and CIA largely responsible for collecting and analyzing domestic and foreign CT
intelligence, respectively. Instead, the I&A was restricted to taking the intelligence
collected by other intelligence agencies and using it to inform other DHS leaders of
major threats to the homeland. In addition, the office is responsible for communicat-
ing threat information to state, municipal, tribal, and private sector partners. That
said, DHS does play a major role in cyber issues. As recently reported, DHS joined
the FBI in producing the first public reports on Russian government sponsorship of
cyberattacks on US election systems and the Hillary Clinton campaign.30 This was
partly designed to alert local officials of cyber threats and to encourage closer coop-
eration among all levels of government to enhance their cyber security.
The second DHS intelligence agency is the US Coast Guard (USCG). The USCG
is a hybrid organization as well, operating as a military service in its own right but
with substantial law enforcement and intelligence functions. It always had a military
intelligence mission but joined the IC only when it was transferred to DHS in 2005.
The USCG’s most visible intelligence mission focuses on drug interdiction through
maritime routes.31 But it has many additional roles, perhaps most importantly assess-
ing and combating maritime and port security threats to the homeland.32
The preceding description of the many agencies and missions within the IC under-
lines the challenge of organizing and directing their activities in a way that can sup-
port the president and the national security enterprise. For more than half a century,
the CIA director carried the burden of overseeing the IC as his “second hat” as director
of central intelligence. Numerous studies over that period had argued for reforms that
would strengthen the DCI’s budgetary and programmatic authority versus the power-
ful secretaries of defense, who controlled most of the resources. The most radical call
for strengthening central management came from former national security adviser
Brent Scowcroft, who in 2001 reportedly recommended to President George W. Bush
that the three largest defense intelligence organizations—the NSA, the NRO, and
NIMA (precursor to NGA)—be placed under the budgetary authority of the DCI, leav-
ing the secretary of defense with day-to-day management of only the military service
70 Chapter 4
intelligence programs.33 That plan, never made public officially, was strongly resisted
by Defense Secretary Rumsfeld at the time. And like previous efforts, any notion of
creating a “national intelligence czar” was met with strong congressional reluctance
to give up control over large parts of the defense budget to the intelligence oversight
committees.34
All of that changed with the 9/11 attacks on the World Trade Center and the Pen-
tagon. Analysis of this surprise attack pointed to weaknesses in information sharing
across the IC, divided management responsibilities, and the DCI’s inability to direct
other agencies to take the Bin Laden threat more seriously. The flawed 2002 NIE on
Iraq’s WMD program only added fuel for congressional pressure to pass new legisla-
tion that would reorganize the IC to improve both collection and analysis.35
Accordingly, the 2004 Intelligence Reform and Terrorism Prevention Act created
the position of DNI, who became the new head of the IC and now shoulders all the
responsibility once held by the DCI for developing the IC’s budgets, setting intelli-
gence priorities, protecting classified information, and overseeing the production of
NIEs. Most importantly, the DNI replaces the DCI as the senior intelligence adviser
to the president and the NSC. In particular, the DNI now represents the IC at NSC
meetings and at Principals Committee meetings; members of his staff also represent
the DNI at the Deputies Committee and IPC-level meetings. The DNI’s responsibili-
ties are laid out in Executive Order 12333, which has been modified since the IRTPA
was promulgated (see box 4.2).
As similar as it sounds to that of the former DCI, the DNI’s job is very differ-
ent, for a number of reasons. First, unlike the former DCIs, the new DNI does not
simultaneously run the CIA or any other intelligence agency. Rather, his sole job
is to represent the broader IC, advise the president and the NSC, and oversee and
implement the NIP. This has mixed effects. On the one hand, the DNI can concen-
trate on his responsibilities to advise the president, oversee the broader IC, and pre-
pare a consolidated intelligence program and budget. In this way, he is a far better
adjudicator of budget disputes because he does not have any personal control or
investment in the CIA’s budget or programs as former DCIs did. On the other hand,
the DNI lacks the backing of a large organization like the CIA to support his efforts.
Congress directed that the Office of the Director of National Intelligence not become
another agency and not become too large or bureaucratic and create another layer of
management. In fact, the ODNI currently has roughly eighteen hundred employees,
many of whom are on rotational assignments from other intelligence agencies or are
contractors.
Second, the pre-9/11 walls between domestic and foreign intelligence as well as
between law enforcement and intelligence have been broken down. Now the DNI has
What Is the Intelligence Community?71
(a) Purpose. The National Security Council (NSC) shall act as the highest ranking executive
branch entity that provides support to the President for review of, guidance for, and direc-
tion to the conduct of all foreign intelligence, counterintelligence, and covert action, and
attendant policies and programs. . . .
1.3 Director of National Intelligence. Subject to the authority, direction, and control of
the President, the Director of National Intelligence (Director) shall serve as the head of the
Intelligence Community, act as the principal adviser to the President, to the NSC, and to the
Homeland Security Council for intelligence matters related to national security, and shall
oversee and direct the implementation of the National Intelligence Program and execution
of the National Intelligence Program budget. The Director will lead a unified, coordinated,
and effective intelligence effort. In addition, the Director shall, in carrying out the duties and
responsibilities under this section, take into account the views of the heads of departments
containing an element of the Intelligence Community and of the Director of the Central Intel-
ligence Agency. . . .
(b) In addition to fulfilling the obligations and responsibilities prescribed by the Act, the
Director:
(1) Shall establish objectives, priorities, and guidance for the Intelligence Community to
ensure timely and effective collection, processing, analysis, and dissemination of intelli-
gence, of whatever nature and from whatever source derived. . . .
(7) Shall ensure that appropriate departments and agencies have access to intelligence and
receive the support needed to perform independent analysis;
(8) Shall protect, and ensure that programs are developed to protect, intelligence sources,
methods, and activities from unauthorized disclosure. . . .
(14) Shall have ultimate responsibility for production and dissemination of intelligence pro-
duced by the Intelligence Community and authority to levy analytic tasks on intelligence
production organizations within the Intelligence Community, in consultation with the heads
of the Intelligence Community elements concerned. . . .
(17) Shall determine requirements and priorities for, and manage and direct the tasking,
collection, analysis, production, and dissemination of, national intelligence by elements of
the Intelligence Community, including approving requirements for collection and analysis
and resolving conflicts in collection requirements and in the tasking of national collection
assets of Intelligence Community elements (except when otherwise directed by the Presi-
dent or when the Secretary of Defense exercises collection tasking authority under plans
and arrangements approved by the Secretary of Defense and the Director).
Source: Executive Order 12333, United States Intelligence Activities. As amended by Executive Orders 13284
(2003), 13355 (2004), and 13470 (2008), https://fas.org/irp/offdocs/eo/eo-12333–2008.pdf.
72 Chapter 4
not only foreign intelligence duties but also duties overseeing intelligence aspects of
domestic and homeland security. It is important to remember he or she is the senior
intelligence adviser to the Homeland Security Council as well as the NSC. Thus, the
DNI has to coordinate not just the large defense intelligence agencies, the powerful
CIA, and the smaller departmental intelligence units, but now he or she must also
oversee the intelligence-related activities of a growing FBI’s national security respon-
sibilities and DHS’s intelligence and analysis functions.
Third, the legislation modestly strengthened the DNI’s authorities compared to
the former DCIs regarding the control over financial resources and people. But it fell
far short of a new “Department of Intelligence” or of bringing all DOD intelligence-
related activities under the DNI. The secretary of defense and the powerful armed
services committees were aligned against such a move, and they insisted on legisla-
tive language that essentially prohibited the DNI from undermining the “statutory
responsibilities of the heads of the departments.”36 For example, the DNI can repro-
gram (move funds from one part of the intelligence budget to another) a few million
dollars and transfer a few dozen personnel from one program to another; however,
in both cases these numbers are small, and anything larger has to be done with the
concurrence of the department in which the action was to be taken.
Fourth, the DNI has the responsibility for overseeing a number of national intelli-
gence centers, which are designed to centralize management of critical functions and
improve information sharing across the community. These centers help account for
the considerable size of the ODNI and wield considerable influence:
• The National Intelligence Council (NIC) predated the IRTPA and has the
responsibility for preparing long-term, strategic intelligence analysis that
represents the collective judgments of the IC. The NIC prepares NIEs that
are approved by the DNI. The council is composed of a dozen national intel-
ligence officers (NIOs) with regional and functional responsibilities, who
oversee the production of NIEs and other community-based assessments for
senior policymakers. NIOs are usually the senior IC representatives to the
interagency policy committees and often support the DNI at NSC and PC
meetings as a backbencher (termed the “plus one”) participant.
• The National Counterterrorism Center has primary responsibility for conduct-
ing CT analysis as well as counterterrorism strategic planning. It uniquely
bridges the foreign and domestic intelligence agencies responsible for counter
terrorism, as it oversees all activities for accessing, integrating, and analyzing
all intelligence related to terrorism. Likewise, it is responsible for ensuring that
other agencies with CT missions have access to this information. Perhaps its
most unique role is that it must conduct strategic operational planning for the
What Is the Intelligence Community?73
entire US government and ensure the effective use of all military, diplomatic,
law enforcement, and intelligence disciplines. Therefore, the director of NCTC
reports both to the DNI and to the president in his capacity as senior adviser
on counterterrorism operations.
• The National Counterproliferation Center (NCPC) facilitates the counter
proliferation activities of IC agencies and conducts strategic planning
designed to prevent the spread of WMD technologies and systems. Unlike the
NCTC, the NCPC does not produce WMD-related intelligence analysis but
rather identifies intelligence gaps, promotes new techniques and technologies,
and fosters cooperation among intelligence agencies, other federal agencies,
and American industry and academia. In this manner, its smaller workforce is a
management function rather than an intelligence-production element.
• The National Counterintelligence and Security Center (NCSC) serves as
the focus of the national CI effort, which aims at integrating the CI activities
of the CIA, FBI, and other agencies as well as coordinating their budgets and
evaluating their effectiveness. Importantly, NCSC is responsible for inves-
tigating CI cases to assess their damage and also for establishing common
security practices across the US government.
Finally, the DNI has taken over responsibility—as the president’s senior intel-
ligence adviser—for the preparation of the PDB. Under the prior DCIs, the PDB was
almost exclusively a CIA publication, written and briefed by CIA analysts. Under
the DNI, the PDB has become an IC document that includes assessments prepared
by CIA but also DIA and INR analysts. This ensures that a range of analytical views
are available to the president and senior advisers; it also allows the DNI to give
feedback to agencies beyond the CIA as to the president’s agenda and intelligence
priorities. New procedures introduced by the DNI include PDB editorial and brief-
ing teams that include non-CIA analysts (primarily from the DIA and INR). CIA
offices still produce the vast majority of PDB articles, but many also contain input
from other contributing agencies. But the principle of DNI control of the most sen-
sitive information reaching the Oval Office has given the DNI greater influence,
even if he does not control a large bureaucracy like the CIA.
In sum, the DNI has become a key participant in the national security decision-
making process. The DNI or his deputy has usually chosen to join the PDB briefings
in the Oval Office, and they are regular participants at the many NSC, PC, and DC
meetings. The DNI has to approve the content of the PDB and NIEs reaching senior
officials. Moreover, the DNI prepares and defends the IC programs and budgets on
Capitol Hill and often has to take the heat for intelligence activities gone wrong or
judged to be controversial. Last, he gives an annual Worldwide Threat Assessment to
74 Chapter 4
the armed services and intelligence oversight committees in early spring that often
generates great media attention and reveals the latest IC assessments regarding
cyber and terrorism threats as well as Russian, Iranian, or North Korean military chal-
lenges. The 2019 presentation by DNI Dan Coats produced its own media attention
as it was widely reported that the IC’s views on Russia, North Korea, and Iran were
judged widely at odds with President Trump’s own assessments.37
The intelligence reforms contained in the 2004 IRTPA have now been in existence
for more than a decade along with the DNI and other new intelligence organizations
and processes. The question remains as to whether these reforms have been sufficient
to improve the IC’s performance. Perennial issues still remain on how best to manage,
resources coordinate, and oversee the IC.
much attention and spending on technical systems comes at the expense of HUMINT
collection. After 9/11, for example, President Bush authorized a 50 percent increase
in CIA operations officers in order to strengthen human-source reporting. Those
increases cannot immediately guarantee results because human-source recruitment
can take years to come to fruition. It is generally believed that budget increases are
aimed at greatly expanded efforts directed against terrorism, proliferation, and insur-
gencies in the Middle East but may also reflect growing concern about cyber issues
and the need for an active information-operation capability. In 2013, James Clap-
per noted that even though today’s environment is so fluid, the IC is spending far
less than 1 percent of the gross national product on intelligence: “The United States
has made a considerable investment in the Intelligence Community since the terror
attacks of 9/11, a time which includes wars in Iraq and Afghanistan, the Arab Spring,
the proliferation of weapons of mass destruction technology, and asymmetric threats
in such areas as cyber-warfare.”38
As in the past, more than half of the NIP was consumed by the big defense intel-
ligence agencies—the NSA, the NRO, and the NGA. As reported in 2010, these three
agencies were consuming a large portion of the $60 billion intelligence budget. It was
pointed out earlier in this chapter that the intelligence reforms did not go so far as to
give the newly created DNI sole control over the NIP’s budgets. While the DNI can
set priorities, most of the money is found in the defense appropriations bills. In addi-
tion, the military services control their own tactical military intelligence programs—
termed the Military Intelligence Program (MIP)—which are separate from the NIP.
This MIP totals roughly $20 billion annually and is submitted to the USDI first and
is approved by the secretary of defense. Thus, in reality, the secretary of defense has
huge influence over both the NIP and the MIP. Specifically, he must concur in any
DNI changes to defense-related budgets of any magnitude. Moreover, the Senate and
House intelligence and armed services committees all get a chance to review, cri-
tique, and approve the intelligence agencies’ programs and budgets that come under
their jurisdiction, so, the DNI’s budgetary authority is far from supreme.
the CIA produces analyses on Russia, China, Iran, WMDs, and other national security
issues, just as the DIA and INR do for their departmental customers. Policy agen-
cies, however, have particular and often different types of questions regarding foreign
policies, military capabilities, or economic and financial practices of China, Iran, and
so forth, and thus their departmental intelligence units produce uniquely tailored
assessments on the same countries or topics. In addition, proponents of rigorous
analytical tradecraft argue that multiple perspectives are needed to guard against
groupthink. As a former DNI put it, “Competitive analysis avoids single points of
failure and unchallenged analytic judgments.”39
The creation of the DNI has once again raised the question of how much integra-
tion is enough without losing the autonomy that the IC agencies clearly desire. While
praising the value of orchestrating the operations of a large intelligence enterprise for
efficiency and effectiveness, few senior intelligence leaders support centralization if
that means the DNI can direct individual agencies’ daily activities and order them to
stop producing intelligence for their departmental policymakers. During the debate
of the DNI’s role, many in the CIA believed the authorities of the then DCI could have
been modestly strengthened without creating an entirely new organization and more
bureaucracy. Congress, in particular, has been adamant that the ODNI not grow into
a new agency of its own or presume to take on the roles of other agencies. Hence, it
has placed limits on the number of personnel the ODNI can hire.
At the same time, nearly every senior intelligence official recognizes the need
for better coordination of the collection-exploitation-analysis process in order to
ensure that all available information is examined and evaluated properly. Close
cooperation between the NSA and the NGA has enabled the US military to tar-
get key terrorists operating in Iraq and Afghanistan. Former NGA director Rob-
ert B. Murrett described this as “horizontal integration” that could have a multiplier
effect on military operations.40 Moreover, when covert joint operations are planned,
it requires close coordination between the CIA and the DOD’s Joint Special Opera-
tions Command (JSOC) for managing paramilitary activities in Iraq and Afghan-
istan. As one participant described it, the Abbottabad operation amounted to “a
complete integration of special forces into a CIA operation.”41
President Gerald Ford was the first president to acknowledge “the existence of a
committee of the NSC—then known as the 40 Committee—which had for over two
decades reviewed covert programs before they were submitted to the President for
approval.”43
The NSC interagency groups overseeing intelligence activities have been given
a variety of names over the years, reflecting each president’s preferences for how to
handle sensitive intelligence matters. But as the 1981 Executive Order 12333 makes
clear, the NSC should play a central role in intelligence:
This authority, combined with the 1947 National Security Act, placed special
responsibility on the NSC and indirectly the national security adviser to supervise
and evaluate intelligence activities. Within the NSC staff, there is a senior director
for intelligence programs, who is customarily charged with supporting the president,
the national security adviser, and the NSC and Homeland Security Council on intel-
ligence matters. Thus, this directorate participates with the ODNI and OMB in deter-
mining the IC’s budget, helps set up the administration’s priorities on collection and
analysis (see below), and oversees ongoing covert actions as well as proposed sensi-
tive collection operations. The senior director for intelligence programs also chairs
an interagency committee that reviews intelligence policy questions—including sen-
sitive operations—and makes recommendations to the Deputies Committee and the
Principals Committee.
As with other senior appointments, the senior director’s influence depends on his
relationships to the president, the national security adviser, and senior intelligence
78 Chapter 4
officials, especially the DNI and DCIA. In some cases, this officer has been largely
invisible to the policy process and little known. In others, he can become a key player.
For example, George Tenet was the senior director for intelligence policy for Bill Clin-
ton and from that position rose to become deputy director of CIA and finally direc-
tor. Likewise, President Barack Obama selected former CIA careerist John Brennan,
who oversaw the NSC’s Directorate of Intelligence, to become deputy national secu-
rity adviser for terrorism and homeland security. Brennan later became CIA director
when Leon Panetta left that position to become secretary of defense.
Since 2003, there has been a greater emphasis placed on having the NSC “drive”
the intelligence process. This has meant having senior interdepartmental officials
review current and longer-term intelligence-collection and analysis priorities, which
are used to allocate IC funds to various programs. This review takes the form of a
National Intelligence Priorities Framework (NIPF), which arrays key intelligence
targets and topics on separate axes in a matrix format. This then allows senior offi-
cials to rank the target and topic cells by a 1-to-5 numbering system. For example,
hypothetically North Korea (country target) and “nuclear program” (intelligence
topic) might receive the highest ranking of a “1,” while Argentina (country target)
and “political unrest” (intelligence topic) might only rank a “4.” The ranking method
allows intelligence agencies then to prioritize—as well as justify—their collection and
analysis efforts.
In reality, most NSC principals have little time or patience to review the elaborate
NIPF priorities. The list of intelligence issues is almost endless, and the matrix of
topics and targets has grown to have over nine thousand individual entries.45 Thus,
the NSC is likely to review the NIPF no more than twice annually. However, the IC
leadership led by the DNI will examine it regularly to ensure it is consistent with pres-
idential and other official actions and directives. Naturally, policymakers are inclined
to attach high importance to many intelligence problems without realistically weigh-
ing the opportunity costs that the IC must incur with its finite resources. Many prac-
titioners have lamented that too many topics are assigned higher priorities than can
possibly be serviced. Moreover, any set priorities list can be upset by a quickly break-
ing crisis that will shoot an issue or a country to the top priority. Most likely, political
conditions in Tunisia prior to the outbreak of the Arab Spring had a low ranking, but
undoubtedly this was given much more attention as the crisis spread across North
Africa and eventually to Syria.
Presidents and their advisers are seldom proponents for major intelligence
reforms because they often are focused more on their own policy challenges and
less on the effectiveness and efficiency of the IC. Sadly, major reforms are usu-
ally the result of major intelligence failures, which generate pressure for reforms.
Even more than a decade since the tragedy of 9/11, there continue to be questions
What Is the Intelligence Community?79
regarding the necessity and wisdom of the DNI’s creation and its associated moves
to integrate the huge IC. As of 2019, however, the necessity for having a senior offi-
cial responsible for the overall operation of such a massive intelligence enterprise
remains unquestionable, even if the job is nearly impossible to perform without
periodic clashes within the IC or with senior policy consumers.
USEFUL WEBSITES
FURTHER READING
James Clapper, Facts and Fears: Hard Truths from a Life in Intelligence (New York: Penguin
Press, 2018).
The first memoir by a DNI and relates the challenges of orchestrating such a diverse set
of agencies.
Michael E. DeVine, Intelligence Community Spending: Trends and Issues (Washington, DC:
Congressional Research Service, 2018), https://fas.org/sgp/crs/intel/R44381.pdf.
Gives an excellent overview of IC budgets, including both the NIP and the MIP.
Richard Immerman, The Hidden Hand: A Brief History of the CIA (West Sussex: Wiley & Sons,
2014).
A brief history with special emphasis on controversies involving covert action and CI.
Rhodri Jeffreys-Jones, The CIA and American Democracy, 3rd ed. (New Haven, CT: Yale Uni-
versity Press, 2003).
An excellent, if critical, history of CIA activities.
Mark M. Lowenthal and Robert M. Clark, The Five Disciplines of Intelligence Collection (Wash-
ington, DC: CQ Press, 2016).
Provides a clear and concise explanation and history of the technical, human-source, and
open-source collectors.
Jeffrey Richelson, The US Intelligence Community, 7th ed. (New York: Routledge, 2015).
Provides a comprehensive description of the organizations, methods, and operations of
the entire US intelligence community.
Michael Warner, The Rise and Fall of Intelligence: An International Security History (Washing-
ton, DC: Georgetown University Press, 2014).
80 Chapter 4
Covers intelligence history from ancient to modern times, with special attention paid to
the IC.
Amy Zegart, Flawed by Design: The Evolution of CIA, JCS, and the NSC (Stanford, CA: Stan-
ford University Press, 1999).
Describes the creation of the NSC, FBI, and CIA as a bureaucratic battle that impeded
effective intelligence management.
NOTES
First epigraph: Lt. Gen. Hoyt Vandenberg, “Testimony before the Senate Armed Service Com-
mittee,” April 29, 1947, found in Office of Legal Counsel, Legislative History of the CIA and
National Security Act of 1947, July 25, 1967, declassified, https://www.cia.gov/library/reading
room/docs/DOC_0000511045.pdf.
Second epigraph: James Clapper, in Loch K. Johnson, “A Conversation with James R. Clapper,
The Director of National Intelligence in the United States,” Intelligence and National Security,
vol. 30, issue 1 (2015): 6.
1. These figures were cited by former DNI Michael McConnell in 2008. In 2016, the ODNI
released the 2016 figure for the National Intelligence Program as $53.0 billion. See ODNI,
News Release NR-20–16, October 28, 2016, https://fas.org/irp/news/2016/10/nip-2016.pdf.
Simultaneously, the DOD released the official FY 2016 requests for the Military Intelligence
Program controlled by the individual service intelligence agencies. See DOD News Release
NR-286–16, October 28, 2016, https://fas.org/irp/news/2016/10/mip-2016.html.
2. Rhodri Jeffreys-Jones, The CIA and American Democracy, 3rd ed. (New Haven, CT:
Yale University Press, 2003), 16.
3. For discussion of the bureaucratic resistance to establishing a new Central Intelligence
Agency, see Richard Immerman, “Birth of an Enigma 1945–49,” The Hidden Hand: A Brief His-
tory of the CIA (West Sussex, UK: Wiley Blackwell, 2014), 11–12.
4. Harry Truman, Memoirs by Harry S. Truman: Years of Trial and Hope (New York:
Doubleday, 1955, Vol. 2), 51–60. Legend has it that when Truman conferred the title of first
director of central intelligence on Sidney Souers, one of his close staff aides, he gave him a
black hat, a black coat, and a wooden dagger and called him the first “director of centralized
snooping.” See Jeffreys-Jones, CIA and American Democracy, 34.
5. Vandenberg began expanding current intelligence operations by gaining the authority
to hire staff rather than borrow from other agencies. See Immerman, “Birth of an Enigma,” 17.
6. See Michael Warner, The Rise and Fall of Intelligence: An International Security History
(Washington, DC: Georgetown University Press, 2014), 140.
7. Warner, 17.
8. 9/11 Commission, The Final Report on the National Commission on Terrorist Attacks
upon the United States (New York: Norton, 2003), 86.
9. An example of this is the infamous 2003 Iraq WMD estimate’s key judgments, which
all other agencies largely concurred in, but only the CIA was singled out publicly for having
produced flawed analysis.
What Is the Intelligence Community?81
10. David Thomas, “US Military Intelligence Analysis: Old and New Challenges,” in Ana-
lyzing Intelligence: Origins, Obstacles, and Innovations, ed. Roger Z. George and James Bruce
(Washington, DC: Georgetown University Press, 2008), 143.
11. Thomas, 143–45.
12. Office of the DIA Historical Research, A History of the Defense Intelligence Agency,
2007, https://fas.org/irp/dia/dia_history_2007.pdf.
13. President Truman signed an NSC intelligence directive on October 24, 1952, creating
the NSA within the new DOD. See Records of the National Security Agency / Central Security
Service, National Archives, https://www.archives.gov/research/guide-fed-records/groups/457
.html.
14. Morgan Chalfant, “Pentagon Mulling Whether Split of NSA-Cybercom Command,” The
Hill, February 23, 2017, http://thehill.com/policy/cybersecurity/320736-pentagon-mulling
-split-of-nsa-cyber-command.
15. See Bruce Berkowitz, The National Reconnaissance Office at 50 Years: A Brief History
(Chantilly, VA: Center for the Study of National Reconnaissance, 2011), 1, 11.
16. Darryl Murdock and Robert M. Clark, “Geospatial Intelligence,” in The Five Disciplines
of Intelligence Collection, ed. Mark M. Lowenthal and Robert M. Clark (Washington, DC: CQ
Press, 2016), 124. See also Bruce Berkowitz with Michael Suk, The National Reconnaissance
Office at 50 Years: A Brief History (Chantilly, VA: Center for the Study of National Reconnais-
sance, 2018), https://www.nro.gov/Portals/65/documents/about/50thanniv/The%20NRO%
20at%2050%20Years%20-%20A%20Brief%20History%20-%20Second%20Edition.pdf ?ver
=2019-03-06-141009-113×tamp=1551900924364.
17. Murdock and Clark, 124.
18. COMIREX was reorganized as the Central Imagery Office in 1992 and placed within
the DOD.
19. Berkowitz, National Reconnaissance Office, 15.
20. See Murdock and Clark, “Geospatial Intelligence,” 111–54, for a much more in-depth
explanation of GEOINT’s characteristics, processes, and applications.
21. Murdock and Clark, 131.
22. David Brown, “10 Things You Might Not Know about the National Geo-spatial Intel-
ligence Agency,” News and Career Advice, ClearanceJobs.com, March 22, 2013, https://
news.clearancejobs.com/2013/03/22/10- things- you-might-not- know-about- the-national
-geospatial-intelligence-agency/.
23. See Office of the Historian, United States Military Academy, NGA History, http://www
.usma.edu/cegs/siteassets/sitepages/research%20ipad/nga_history.pdf.
24. Mark Stout, “Bureau of Intelligence and Research at 50,” INR, December 1997.
25. John Prados, “The Mouse That Roared: State Department Intelligence in the Vietnam
War,” National Security Archive, http://nsarchive.gwu.edu/NSAEBB/NSAEBB121/prados
.htm.
26. In 2002, former undersecretary John Bolton is alleged to have threatened to fire INR
analysts for publishing findings at odds with his views on a number of issues, which was well
publicized during his ambassadorial nomination hearings in 2005. See Jonathan S. Landay,
“Ex-State Official Describes Bolton as Abusive, Questions Suitability,” McClatchy DC Bureau,
April 12, 2005, http://www.mcclatchydc.com/latest-news/article24445810.html.
82 Chapter 4
27. See Harvey Rishikof and Brittany Albaugh, “The Evolving FBI: Becoming a New
National Security Enterprise Asset,” in Roger Z. George and Harvey Rishikof, The National
Security Enterprise: Navigation the Labyrinth (Washington, DC: Georgetown Press, 2016), 229.
28. Former FBI intelligence officials will argue there is no official definition of “domestic
intelligence” but rather a redefinition of “national intelligence” that includes any information
collected anywhere that relates to security within US borders. See Maureen Baginski, “Domes-
tic Intelligence,” in Analyzing Intelligence: Origins, Obstacles, and Innovations, 2nd ed., ed.
Roger Z. George and James Bruce (Washington, DC: Georgetown University Press, 2014), 267.
29. See DEA, Drug Enforcement Center, El Paso Intelligence Center: Intelligence, https://
www.dea.gov/ops/intel.shtml#epic.
30. Katie Williams, “FBI, DHS Release Report on Russian Hacking,” The Hill, December
29, 2016, http://thehill.com/policy/national-security/312132-fbi-dhs-release-report-on-russia
-hacking.
31. See Ron Nixon, “Coast Guard Faces Challenges at Sea and at the Budget Office,” New
York Times, July 4, 2017, https://www.nytimes.com/2017/07/04/us/politics/coast-guard-faces
-challenges-at-sea-and-at- the-budget-office.html?smprod=nytcore-ipad&smid=nytcore-ipad
-share&_r=0.
32. USCG, Publication 2–0, Intelligence, May 2010, https://www.uscg.mil/doctrine/CGPub
/CG_2_0.pdf.
33. Walter Pincus, “Sweeping Revamp of Intelligence System Drafted,” Washington Post,
November 8, 2001, http://www.chicagotribune.com/chi-0111080259nov08-story.html.
34. For an overview of many intelligence reforms, see Michael Warner and J. Kenneth
McDonald, US Intelligence Reform Studies since 1947 (Washington, DC: Center for the Study of
Intelligence, 2005), www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications
/books-and-monographs/US%20Intelligence%20Community%20Reform%20Studies%20
Since%201947.pdf.
35. For an eyewitness account of IRTPA’s legislative history, see Michael Allen, Blinking
Red: Crisis and Compromise in American Intelligence after 9/11 (Washington: Potomac Books,
2013).
36. Cited in Richard Best, Intelligence Reform after Five Years: The Role of the Director of
National Intelligence, Congressional Research Service, June 22, 2010, 4, https://www.fas.org
/sgp/crs/intel/R41295.pdf.
37. Daniel R. Coats, Worldwide Threat Assessment of the US Intelligence Community: State-
ment for the Record, to the Senate Select Committee on Intelligence, January 29, 2019, https://
www.dni.gov/files/ODNI/documents/2019-ATA-SFR-SSCI.pdf.
38. “DNI James Clapper’s Statement to the Post,” Washington Post, August 29, 2013,
https://www.washingtonpost.com/world/national-security/dni-james-clappers-statement-to
- the-post/2013/08/29/52d52090-10e1-11e3-85b6-d27422650fd5_story.html?utm_term=
.5fd6ce866caf.
39. Questions and Answers, ODNI, 2010.
40. Robert Murrett, “Issues Confronting Military Intelligence,” Incidental Paper, Center for
Policy Research, Harvard University, December 2006, http://www.pirp.harvard.edu/pubs_pdf
/murrett/murrett-i06-1.pdf.
41. Nicholas Schmidle, “Getting Bin Laden,” New Yorker, August 8, 2011, http://www.new
yorker.com/magazine/2011/08/08/getting-bin-laden.
What Is the Intelligence Community?83
The preceding chapters have outlined the national security decision-making process
and described the large national intelligence enterprise. This chapter will address
how intelligence works in both theory and practice by examining the concept of the
“intelligence cycle,” then dissecting its key components and in the process describ-
ing its challenges and limitations. It will then explore a more practical way of distin-
guishing the separate missions that intelligence performs for the national security
enterprise.
As cited above, national security strategies rest on good information. They depend
on careful analysis of the international environment in which the United States oper-
ates and development of courses of action that can be implemented. Expanding a
bit on this “simple” process, there are always difficulties involved. American foreign
84
From Intelligence Cycle to Policy Support85
policies require good information for assessing the international environment, which
is not always available. Defining American interests is also a somewhat ambiguous
process, as those can change depending on the international and domestic condi-
tions at the time. Even if those interests are clearly defined, identifying the major
threats and opportunities to those interests rests as well on good information. And,
of course, once those threats and opportunities are laid out, there is the challenge
of formulating and weighing the advantages and disadvantages of different policy
options. Without accurate information, decision-makers are prone to fail in assess-
ing the international environment as well as the costs and risks associated with their
policy decisions. The challenge for intelligence then is in providing the most relevant,
accurate, and timely information and analysis in order to give policymakers a realistic
picture of the world they face.
How does a national security decision-maker get intelligence? Over the past
half-century, the American intelligence bureaucracies have developed processes
designed to collect, analyze, and disseminate critical information that senior officials
can use in making decisions. As mentioned in an earlier chapter, this system is often
called the “intelligence cycle.” As the US intelligence apparatus has grown, practitio-
ners and scholars have developed elaborate ways to describe this cycle. Graphically,
it can be displayed as in figure 5.1.
As the graphic shows, the intelligence cycle suggests a linear process that begins
with policymakers ranging from the president of the United States (POTUS) on
down laying out intelligence requirements for tasking (step 1) of the intelligence
community. These information needs, as discussed in previous chapters, can be
expressed in the NIPF rankings as well as many ad hoc requirements from the
White House or other senior officials. They can be conveyed during in-person brief-
ings, written directives to senior intelligence officials, or at interagency meetings
focused on high-priority policy issues. Collection (step 2) will then seek to fulfill
those intelligence requirements via the various intelligence disciplines. This “raw
intelligence,” or unevaluated information, is not yet ready for analysis but often
requires further processing (step 3). For example, collected communications intel-
ligence usually needs to be translated, and other types of electronic signals intel-
ligence may need to be decrypted and put into a format that is usable by analysts.
Raw CIA clandestine reports also have to be reviewed for relevance and validity;
this often involves expunging much information regarding the source and deter-
mining whether the new information is not only valid and credible but also pro-
vides what analysts are seeking to confirm or disconfirm in any previous reporting.
Figure 5.1. The Intelligence Cycle
From Intelligence Cycle to Policy Support87
Policymakers
Figure 5.1 also highlights the three principal groups of actors in the intelligence cycle.
First, of course, are the policymakers who work in the White House, the foreign and
homeland security–related departments, the military, and many other parts of the
executive and legislative branches. They are mostly involved in the tasking of the
IC in the form of intelligence needs or requirements. They also will provide feed-
back to the analysis provided them, either by asking for more information, critiquing
the analysis, or sometimes challenging intelligence judgments that require further
explanation or review by the analysts. The other factor to keep in mind is that many
policymakers have sources of information other than the IC. They are in close contact
with foreign officials who may represent their governments and policies in ways that
do not reflect the IC’s assessments. Naturally, policymakers may form opinions at
variance with IC analyses, and their own sources may contradict or at least diverge
from intelligence assessments. In a few cases, policymakers will consider themselves
to be “super analysts” and ask to receive as much raw intelligence as they can absorb
without having intelligence analysts put this reporting into proper context. This has
a way of undermining the purpose of the intelligence cycle—namely, to carefully col-
lect, evaluate, and integrate all available information into an all-source finished intel-
ligence analysis.
As suggested above, policymakers use a certain strategic logic in making their
national security decisions. First, they must assess the international environment to
determine what major trends and factors are critical to understand. In many cases,
policymakers bring to their jobs strongly held views, partly shaped by their own
political ideologies and partly by their own backgrounds and experiences. Each
administration will formulate a set of national security objectives based on tradi-
tional “national interests” such as protection of the homeland, promotion of eco-
nomic prosperity, maintenance of a stable international order, and preservation of
American values and institutions. In an effort to articulate these objectives, recent
88 Chapter 5
after they were on the ground in Abbottabad could US commandos confirm they had
found bin Laden.
Collectors
The second group of actors includes collection agencies such as the NSA and CIA
that take policymaker tasking or requirements and translate them into collection
priorities and directives for their SIGINT and HUMINT operations. Often decisions
have to be made regarding the most relevant, reliable, and rapid methods for answer-
ing policymakers’ questions. Keep in mind that open-source intelligence is the most
readily available, least costly, and least risky in answering many questions. But when
“secret” information is required, then senior intelligence officials must determine
whether a technical or human operation is needed. In the case of technical intelli-
gence collection, the challenge may be whether a SIGINT or IMINT satellite can
access the needed information better than a risky HUMINT operation that puts a
CIA case officer and a clandestine source at risk of detection by a foreign govern-
ment. Collection priorities may also play a role. For a hypothetical example, tasking
an imaging satellite to monitor Chinese maritime activities in the South China Sea
might reduce the availability of that same satellite system to image North Korean
nuclear test sites or perhaps some other activity in South Asia. Collection managers
will have to juggle competing collection requirements to best satisfy the most cus-
tomers. Adjusting a satellite’s orbit, collection priorities, or frequency of accessing a
particular target is almost always an “opportunity-cost” decision. In the past decade,
however, the availability of less costly commercial satellite imagery has allowed the
United States to satisfy lower-priority collection needs without compromising cover-
age of higher-priority topics.
Collection faces its own challenges in providing the best information available to
analysts and decision-makers. First, some information simply might not be acces-
sible—that is, there is a collection gap. Information on a foreign adversary’s inten-
tions is usually hard to come by. If it exists, it is usually carefully guarded by a small
number of people. Imagine how few people knew about the 9/11 attack plans being
formulated. Sometimes foreign plans or decisions are not fully known even by the
adversary. One good example is that until shortly before the Soviet invasion of
Afghanistan in 1979, the IC had no indication of such plans; however, it later became
known that there was a serious division within the Soviet leadership regarding the
invasion that only resolved itself just before the decision was taken. Second, collec-
tion is often impeded by an adversary’s deception and denial (D&D) plans. Many US
adversaries use camouflage over their military equipment or hide nuclear activities
in underground facilities; they also can put out false or misleading information on
their plans or activities. Saddam Hussein was able to deceive US intelligence prior
90 Chapter 5
to the 1990–91 Gulf War, allowing him to develop a potent WMD capability includ-
ing nuclear programs. Adversaries can deny US access to their information by using
encrypted communications or couriers instead of telephones or observing other prin-
ciples of “operational security” to keep their plans hidden. Overcoming these D&D
efforts by adversaries such as Russia, China, and Iran can be nearly impossible. Third,
failure to share information among collection agencies can impede their ability to
develop a composite picture of an adversary’s plans and capabilities. Information not
shared might in some cases reveal the deeper significance of additional information
held by other agencies. Collectors all have so-called need-to-know rules that com-
partmentalize their sensitive intelligence to protect sources and methods. In many
cases, this need-to-know principle is well placed; however, too much compartmental-
ization can withhold valuable data to other agencies. After the 9/11 attacks, a need-
to-share principle took precedence since it became clear that information held by
the CIA and FBI had not been adequately shared. In the wake of the WikiLeaks and
Edward Snowden revelations of intelligence-collection programs, the pendulum may
be shifting away from a need to share back toward a need to know. All of these factors
can contribute to a less than complete or accessible set of raw intelligence reporting.
Analysts
The third set of actors is the analytical community. As described in chapter 4, there
are several agencies that have such all-source analysts, who are able to access vir-
tually everything the IC collects. The CIA’s Directorate of Analysis has the largest
cadre of analysts, who regard themselves as covering virtually the entire world. The
DIA’s Directorate of Intelligence (DI) also contains thousands of specialists in for-
eign military intelligence topics. Much smaller in size, the State Department’s Bureau
of Intelligence and Research is nonetheless regarded as highly skilled and often hav-
ing analysts who have worked on their accounts for decades, compared to CIA and
DIA analysts, who tend to move from account to account as they advance up through
their much larger bureaucracies. Last, the FBI has a large contingent of analysts who
work in investigations regarding domestic counterintelligence, counterterrorism, and
counterproliferation threats. The IC’s analytical tasks are many, but some basic kinds
of analysis include the following:
IMINT/GEOINT: imagery and Provides quick graphic display Imagery captures only one
geospatial reports collected of foreign defense, industrial point in time and is subject to
remotely from overhead facilities, and test sites as well weather/malfunction. Requires
systems; UAVs transmitting live as geographically significant proper interpretation that can be
action on battlefields or other physical targets. difficult if D&D is used.
sensitive sites
MASINT: measurements Provides unique insight into Hard to evaluate and explain to
and reporting of changes in environmental conditions policymakers. Usually requires
environmental conditions via (e.g., temperature changes, unique access to a target and
variety of seismic, radiological, composition, chemical) special processing.
and materials sensors surrounding a target.
the policymakers and their senior staff can help determine whether policymakers’
background knowledge is accurate or complete; likewise, analysts might need to
be prepared for the possibility that decision-makers have preconceptions or biases
regarding the answers they hope to receive. A second task is to determine how much
information and analysis decision-makers want, what kind of time horizon they might
be considering, and also where the policymaker is in the decision-making process. In
the latter case, it will matter whether an interagency discussion is only just beginning
or whether the broad outlines of a strategy have been set and policymakers are more
interested in intelligence focused on an adversary’s likely response to US actions.
To take one hypothetical example, consider the kinds of strategic intelligence ques-
tions that a new administration might have regarding Iran’s nuclear program. The IC
might produce a National Intelligence Estimate on the development of Iran’s nuclear
program, with a time-horizon of no more than four years—as this is the furthest out a
newly formed NSC team might be prepared to look. On the other hand, if two years
later the NSC team has developed a set of policies for dealing with Iran’s nuclear pro-
gram, it would be looking for more focused intelligence assessments regarding how
Iran is responding to those policies, the steps Iran might take to undermine US goals,
and the likely consequences of Iran’s countermeasures. Thus, strategic intelligence
has to be very much tailored to the needs and time frames of decision-makers.
A third step in developing strategic intelligence is to gather, organize, and evalu-
ate the available intelligence reporting on the topic. Having defined the specific set
of intelligence questions to be answered, analysts must gather all relevant intelli-
gence information, whether classified or open-source, that bears on the subject. At
this point, analysts may well need to generate new requests—officially described as
“requirements”—for additional information from collectors. Most strategic intel-
ligence topics have an enduring quality so that analysts can expect to be asked
to update or amend their assessments over time. Soviet military developments
dominated strategic intelligence throughout the Cold War, while counterterrorism,
counterproliferation, and now cyber threats are most prominent today. Hence, ana-
lysts need to remind collectors of their interest in new information on these and
other targets such as Russia, China, Iran, and North Korea.
Continuing with the Iran nuclear example, analysts would task HUMINT, IMINT,
and SIGINT systems to collect any information on the state of Iran’s nuclear program.
Whatever assessment the analyst might produce today, it is likely to be amended
in a few months as new information becomes available. As analysts organize and
evaluate available information, they also need to be wary of taking each report at
face value. Just because reports are classified does not make the information true.
Indeed, HUMINT sources are hard to recruit, difficult to manage, and can turn out
to be self-promoters, fabricators, or double agents. SIGINT intelligence can require
94 Chapter 5
tremendous resources to collect and process but can provide important insights into
the motivations and plans of an adversary, depending on the quality and reliability of
the interception, decryption, and translation processes. Much of what we know about
al-Qaeda and ISIS has been the result of intercepting terrorist cells’ communications
or capturing computer data, which can contain terabytes of information. Imagery, too,
can detect planned military operations or nuclear test preparations of countries such
as North Korea, but it also needs to be carefully interpreted; that imagery can be of
poor quality or misleading as the result of weather, geography, or an adversary’s use
of camouflage and deception.
In many cases, well over half of an analyst’s information may come from open
sources, which also need to be evaluated for their accuracy and validity. Analysts
must be alert to the danger that OSINT may be promoting what a foreign govern-
ment wants the United States to believe. On the other hand, good journalists can
sometimes ferret out important facts regarding a government’s policies or personali-
ties that analysts can use. In general, analysts need to keep five factors in mind when
weighing evidence provided by human sources:
• Accuracy: Is an intelligence report consistent with other data that has been
validated as accurate?
• Expertise: Do sources have the knowledge or background to report accurately
on an intelligence target?
• Access: Has a report come directly from a source having observed the event,
or is it secondhand information?
• Reliability: Has a source been accurately reporting over time, or is it a new
source who requires further vetting?
• Objectivity: Is a source motivated by a hidden agenda or personal gain that
distorts reality?
After analysts have evaluated the reliability and validity of available reporting, they
also have to consider whether the information gathered is both relevant and plausible.
Some reporting may appear relevant to policymakers’ concerns but be highly implau-
sible. In the case of Iraq’s WMD program in 2002, there were rumors but scant reli-
able reporting that Saddam Hussein was prepared to share WMDs with al-Qaeda; to
analysts, it was implausible for the Iraqi leader, who despised and feared Islamic fun-
damentalism, to give al-Qaeda access to weapons it might use against him. At other
times, data may be too incomplete or insufficient to be of much value. In the 1962
Cuban Missile Crisis, for example, among the hundreds of anecdotal reports of Soviet
activities, there were fewer than a half dozen credible HUMINT reports that the USSR
had placed missiles on the island. Also, the reliability of most of these sources was
From Intelligence Cycle to Policy Support95
judged to be very poor as they were uneducated émigrés who knew next to nothing
about Soviet weaponry.5
A fourth step in the analysis process is to generate key hypotheses that explain
the validated intelligence reporting. In intelligence, the facts do not speak for them-
selves. Rather, they must be organized, evaluated, and put into a framework of some
understanding. As analysts sift through the data, they will begin to formulate plau-
sible explanations for what they are observing. For seasoned analysts, they will have
accumulated a body of knowledge about the target and can imagine how data may fit
into how the target has behaved in the past. Often analysts are looking for patterns,
relationships, and trends in the data. They may detect some similarities as well as dif-
ferences in how the new information describes a target’s actions.
There usually is more than one possible explanation that is worth pursuing. Ana-
lysts must be alert to keeping an open mind regarding alternative hypotheses, as
additional data may confirm or disconfirm their current interpretation. It is wise for
them to ask themselves what future developments they would expect to see if a par-
ticular hypothesis is accepted. Alternatively, what information might disconfirm the
current hypothesis in favor of an alternative one? In 2007, for example, the controver-
sial NIE on Iran postulated a halt in parts of Iran’s nuclear weapons program begin-
ning in 2003, which was a major shift from the 2005 NIE. That earlier estimate had
concluded Iran was continuing its nuclear activities and was intent on building a
bomb.6 Clearly these earlier hypotheses had to be altered in favor of a more nuanced
one—namely, that Iran had curtailed for several years key aspects of its weaponization
research program.
A fifth step in the analysis process is making an argument. Having weighed the
evidence and developed alternative hypotheses or explanations for a target’s behav-
ior or actions, analysts must present findings or conclusions. Those findings—some-
times termed an assessment or in an NIE captured in summary form as the “key
findings” or “key judgments”—have to rest on a clear logic and rigorous use of evi-
dence. In most cases, analysts will begin with a strong key message, followed by a
succession of facts and reliable intelligence reporting. Analysts must be objective in
reporting the level of confidence they have in the sources used so that policymakers
can independently judge whether they find the argument compelling. Typically ana-
lysts will not have high confidence in their findings unless they are corroborated by
multiple high-quality sources from a variety of collection disciplines.7 Low confidence
levels result when there is scant information or the sources are not considered to be
fully vetted and reliable. Medium confidence often reflects a mixed set of reporting,
some of which might be contradictory. Even if analysts have high confidence in a
judgment, it is wise to consider including alternative explanations in order to high-
light how much uncertainty might still exist in these findings and also to convince
96 Chapter 5
policymakers that the analysts considered a range of scenarios that might yet occur
if circumstances change.
Analytical challenges are equally as important as those facing the collection agen-
cies. First, analysts must accept the fact that the available information is going to be
incomplete, contradictory, and sometimes false. To prepare first-rate all-source assess-
ments, the analyst must be able to deal with a high degree of ambiguity. Seldom will
analysts have all the information they want in order to answer a policymaker’s ques-
tions; at times they will be overwhelmed by too much information, which in itself can
make finding what is truly significant even more difficult. At other times there will
be huge intelligence gaps because of collection limitations or an adversary’s D&D
efforts. Compensating or accounting for the so-called missing information in an intel-
ligence assessment is a very difficult exercise.8 As the saying goes, there are known
unknowns but also unknown unknowns that can change an intelligence problem
dramatically. To cite only one example, American intelligence analysts incorrectly
assessed that the shah of Iran was not in danger of being toppled in 1979 because
they believed he would have acted more decisively if he felt threatened. Unknown to
analysts at the time was the fact that the shah was deathly ill with cancer (he would
die a few months later in exile), causing him perhaps to be much less decisive than he
had been previously.
A second challenge is the reliance on analytical assumptions and mind-sets in
formulating intelligence judgments. Analysts often operate on what others might call
“conventional wisdom.” These are the bedrock assumptions that analysts use to build
their intelligence assessments. These assumptions can prove to be either out of date
or flatly wrong. But analysts must often rely on assumptions when there is no hard
evidence. A classic example of a bedrock assumption that later proved wrong was that
Saddam Hussein was deceiving the UN inspectors about his renewed chemical, bio-
logical, and nuclear programs. This assumption formed after the Gulf War revealed
he had been hiding massive amounts of WMD stockpiles and was dangerously close
to having a nuclear bomb. Thereafter, analysts assumed Saddam would be effective
in deceiving UN inspectors. So, in 2002, the IC assessment was that he was again
hiding WMDs when American collection efforts did not produce much new and cor-
roborated information regarding Iraq’s programs (see chapter 6). The point is that
analysts must be attuned to their reliance on such assumptions and challenge them
periodically to revalidate them.
Closely related to the assumptions problem is the mind-set challenge. Every ana-
lyst has in his or her mind an image of how the world operates and in particular how
a particular target behaves. These mind-sets or mental maps help to filter information
coming to the analysts, who are prone to accepting a report as “confirming” their
mind-set or to dismissing it as inconsistent with the ways the target had previously
From Intelligence Cycle to Policy Support97
behaved. Analysts need these mental maps to organize their thinking, but they must
be careful not to allow them to become out of date.9
The IC can be faulted for not appreciating in the late 1980s that Mikhail Gor-
bachev was a new style of Soviet leader. The USSR had gone through a rapid series
of leadership changes as one aging Politburo chairman after another struggled to
maintain the Soviet Union’s hardline stances vis-à-vis the West. Inside the CIA,
there was a debate among military and political analysts about the authenticity
of Gorbachev’s reforms and whether they indicated a fundamental shift in Soviet
thinking. For many analysts, the dominant mental map was of a conservative com-
munist leadership unprepared for radical reforms that might threaten the socialist
system itself. Gorbachev’s behavior challenged that mental map, and many ana-
lysts were slow to appreciate it.10 Hence, their analysis underestimated Gorbachev’s
willingness to jettison Soviet practices and positions vis-à-vis the West. Gorbachev
subsequently surprised analysts by agreeing to far-reaching arms control agree-
ments as well as to German unification in 1990 and the ultimate withdrawal of
Soviet power from Eastern Europe.
Underlying both the assumptions and mind-set problems is the broader challenge
of “cognitive bias.” Scientists as well as intelligence scholars have written about the
way the human brain perceives, filters, and integrates information. The cognitive
process involves distilling huge volumes of information in an efficient way. Humans
develop thinking styles for perceiving the world that enable them to make inferences
or draw conclusions rapidly. In a major study, two psychologists termed this habitual
cognitive process as “thinking fast”—that is, using mental shortcuts that allow new
information to be quickly absorbed and integrated to an existing cognitive map.11
Such mental processes can cause analysts to make incorrect inferences or to dismiss
new information that “doesn’t fit.” Among the many analytical biases that can inter-
fere with more objective weighing of information, the following are often at the center
of flawed analysis:
see themselves (i.e., in a mirror), disregarding the possibility that in other cul-
tures or political systems decision-makers might behave differently.
• Groupthink: Although not a cognitive bias, this group behavior can afflict
analysts who work together and strive for consensus rather than seek alterna-
tive hypotheses or explanations for information. In large agencies such as the
CIA and DIA, there develops an “agency line,” which can be hard to shift. The
phenomenon is even more prevalent among decision-makers working under
great time pressure and stress.
There are a few ways that analysts can work to overcome cognitive and other ana-
lytical biases. Most importantly, most CIA and DIA analysts receive some training in
the perils of cognitive biases and measures that can be taken to uncover them. They
are expected to employ structured analytical techniques (SATs), which can chal-
lenge these unconscious biases. While there are dozens of such techniques today, the
most often employed and powerful SATs are the following:
The steps highlighted in figure 5.1 give the impression that there is a logical pro-
gression from requirement to collection and processing and ultimately to analysis
and dissemination of reporting. That, however, is highly theoretical and seldom
reflects the real process by which information in gathered, analyzed, and provided
to senior policymakers. In reality, there are any number of complexities that impede
the notion that policymakers are the initiators of intelligence collection and analysis.
First, policymakers seldom want to invest the time in prioritizing their intelligence
needs, although they will routinely ask for additional information in more of an ad hoc
fashion. In reality, senior intelligence managers must often identify key requirements
based on impressions—if not direct instructions—of presidential and cabinet officials’
intelligence needs. Agencies cannot wait for explicit instructions to collect what they
believe are essential intelligence data. Analysts are also important in directing col-
lectors to access the information they need to answer key intelligence questions they
have about their targets. They do not need the NSC or a senior official to tell them
that information on China’s military buildup in the South China Sea is important to
access, nor do they need to ask policymakers whether they would be interested in
knowing more about the cyber capabilities of America’s key adversaries.
Second, the notion of a linear or sequential “intelligence cycle” is also very sim-
plistic. Analysts and collectors are working most often in parallel or simultaneously
to answer policymakers’ questions. Analysts prepare analyses even as collectors are
continuing to search for new information on any given topic. A written assessment
is only a snapshot in time of what is known about a subject, but as new information is
collected, analysts will update, amend, or correct their earlier assessments to fit the
newly collected and evaluated information. A good example of this is to be found in
the 2007 NIE on Iran’s nuclear program.16 Based on new information, the IC aban-
doned previous judgments and assessed that Iran had halted a critical part of the
program in response to international pressure.
Third, the intelligence cycle also is less a linear process and more an interactive
one. That is to say that there is often communication back and forth between analysts
and policymakers as well as between analysts and collectors regarding intelligence
topics. Analysts often refine their assessments based on conversations with senior
From Intelligence Cycle to Policy Support101
policymakers, in order to address their policy agenda more directly; similarly, collec-
tors may alter their collection strategies to fit analysts’ views of the kinds of informa-
tion they need to answer policymakers’ questions. Ironically, then, these interactions
run the intelligence cycle somewhat in reverse. Indeed, analysts are typically at the
center of the process of fielding intelligence requirements from policymakers and
working with them and collectors to satisfy their questions. A more realistic, if still
overly simplified, depiction of the analyst-centric intelligence process might be what
is shown in figure 5.2.
This analyst-centric process highlights how critical it is to define more precisely
the kinds of analytical tasks that must be undertaken to satisfy the long list of intelli-
gence concerns by American decision-makers across the government and now includ-
ing even state and local officials responsible for homeland security. Analysts must
be subject-matter experts on countries such as China, Russia, and Iran as well as on
transnational threats such as international terrorism, narcotic trafficking, and WMD
proliferation. They must also be knowledgeable about US national security policies
designed to deal with these issues. In other words, they are expected to know as much
about US foreign policy as they are to understand a foreign government’s policies. If
not, they will not be able to accurately gauge what constitutes a significant develop-
ment for presidents and their key advisers.
Analyst as Enabler
Today the analyst has the benefit—and the challenge—of understanding a long
list of explicit US strategies on security, homeland defense, counterterrorism, and
intelligence that have been drafted in the wake of the terrorist attacks of Septem-
ber 11, 2001. The 2010 National Security Strategy goes further than earlier ones in
mentioning the critical role of intelligence in shaping American strategies: “Our
country’s safety and prosperity depend on the quality of the intelligence we col-
lect and the analysis we produce, our ability to evaluate and share this information
102 Chapter 5
in a timely manner and our ability to counter intelligence threats. This is true for
the strategic intelligence that informs executive decisions as it is for intelligence
support to homeland security, state and tribal governments, our troops and critical
national missions.”17
Likewise, the 2019 National Intelligence Strategy lays out the various missions of
the IC, including strategic intelligence, anticipatory (i.e., warning) intelligence, and cur-
rent operations as critical support to the decision-maker.18 Figure 5.3 graphically dis-
plays how the analyst makes contributions throughout the decision-making process.
An analyst who has studied the strategic thinking of key policymakers is in a better
position to enable those individuals to improve their performance at each step of the
decision-making and policy-execution processes. Seen in this context, virtually all intel-
ligence analysis is strategic, for it seeks to enable policymakers to achieve their goals
with the required means. That is, whether the analyst is describing the general strate-
gic environment, providing warning of some attack, merely describing the details of
an adversary’s military potential or infrastructure, or providing very tactical targeting
information, the endeavor itself is in support of an overall strategy to achieve certain
specific ends. As shown in figure 5.3, the analytical mission will change as policymakers
move from developing an understanding of the problem to defining the major goals for
US national security and then designing policy options and implementing them:
From Intelligence Cycle to Policy Support103
The next few chapters will examine in greater depth these four unique ways in
which intelligence analysis can enable effective strategy. The remainder of this
chapter will briefly outline their differences to illustrate that intelligence analysis is
not a one-size-fits-all proposition. Indeed, the IC must be sensitive to the stage at
which American policies are being formulated or implemented. Analysis that focuses
too much on broad trends when the strategist is already poised to select courses of
action or implement specific policy decisions is likely to be disregarded. Likewise, if a
decision-maker does not share the analytical community’s general views of a problem
early in the strategy-formulation process, then trying to provide policy support can
be doubly difficult for the IC.
Strategic Intelligence
The most fundamental goal of both the policymaker and analyst must be to compre-
hend the strategic environment in which the United States and other friendly and
adversarial actors are operating. However, the vantage point of the decision-maker
and analyst are very different. Whereas a policymaker such as a president usually
comes to the problem with a well-formed set of values, preconceptions, and policy
104 Chapter 5
goals, the analyst must attempt to examine the strategic context from a less explicitly
American perspective.
In the Cold War, US strategists were both contemptuous toward and alarmed by
the communist system. They could see the faults of the system but may have ascribed
more ideology to the factors driving Soviet policy than was actually the case. It was
the analysts’ responsibility to view the Soviet Union in its totality. Hence, the analyst
was obliged to assess the limits of the Soviet Union’s national economic, political, and
military power, the importance of Russian self-interest (vis-à-vis other competing com-
munist power centers such as China), and understand how interest groups inside the
Soviet Union (e.g., the party, the military, the government ministries) might be compet-
ing or working at cross purposes.
Today, as during the Cold War, analysts must consider the world as it exists, not
as one wishes it to be. Moreover, analysts must remain consciously more self-critical
than most policymakers; sometimes analysts can become too complacent or over-
confident about their knowledge and too resistant to alternative explanations and
thus miss important changes in the international environment or in the attitudes of
US adversaries. Hence, the analyst must constantly challenge his or her views on
an intelligence subject and use different analytical techniques to check whether key
assumptions are flawed; information is incomplete, misleading, or flatly wrong; or the
known facts about an issue could legitimately produce multiple thoughts rather than
a single conclusion.19
Informing the policymaker about the changing strategic environment is the most
all-encompassing role that the analyst performs. Adding knowledge to the policy dis-
cussion is what Sherman Kent described as the intelligence analyst’s goal of elevating
the level of the policy debate. Many policymakers do not always acknowledge this
quiet yet pervasive function of intelligence. But it is one that intelligence analysts
perform almost unconsciously in their everyday interactions with policymakers via
finished analysis, oral briefings, or telephone and face-to-face conversations. Some-
times providing a different perspective to a policymaker can be the most important
contribution to a strategy debate if it can put the decision-maker in the adversary’s
position or demonstrates that the American perspective on an issue is not the only
possible interpretation of the current problem.
prosperous economy, access to energy supplies, effective alliances and defenses, and
the like—and how American hard and soft power will be used to achieve these goals.
Defining what are critical national interests at a given moment is not easy, nor is it
simple to prioritize, choose among, or balance those interests that might at times be
in conflict.20 If, in fact, US decision-makers have difficulty defining what are the most
critical US interests worth defending or advancing, then it stands to reason that intel-
ligence analysts will have an equally difficult time determining which issues need
to be watched to provide effective warning or—more positively—notification that an
opportunity exists to advance an important US interest. A case in point is the recent
intelligence findings that indicated the highest levels of the Russian government
authorized hacking into the US electoral system. It must be puzzling to intelligence
managers that President Trump has dismissed the issue as a “hoax,” which might
suggest the IC should not prioritize collecting and analyzing information on this. On
the other hand, other policy agencies, including the FBI and DHS, as well as Congress
seem adamant about getting to the bottom of the issue. There appears to be a division
of opinion on whether Russian hacking poses a serious threat to American democ-
racy, putting US intelligence in the middle of this controversy.
In the post-9/11 world, it is now axiomatic that a central mission of the IC is warn-
ing of any terrorist attack. A huge national effort has been launched to create large
analytical centers to identify and prevent such threats from materializing. Not only is
there a National Counterterrorism Center to which many national intelligence agen-
cies contribute, but there also are separate, departmental counterterrorism activities
throughout the government, most especially at the CIA, the FBI, the Treasury Depart-
ment, DHS, the DIA, and the State Department’s INR. In this sense, the analysts’ mis-
sion is clear. However, there is still a long list of other US national interests that must
also be protected and advanced, most of which have not been as clearly enunciated as
counterterrorism or counterproliferation. How many analysts also should be follow-
ing and reporting regularly on international human and drug trafficking, illegal bor-
der crossings, and organized crime activity that can threaten and potentially kill US
citizens? Moreover, are senior officials, to whom analysts might report their concerns,
paying attention to these issues?
Once policymakers believe they understand the international environment and the
principal challenges facing the nation, they are concerned primarily about using the
military, diplomatic, economic, and other instruments of power at their disposal.
The role of the analyst, then, becomes one of providing information and analysis
that can enable the best tactical application of those courses of action—for example,
the imposition of sanctions, the offer or cancellation of foreign military assistance,
the threat of military intervention, or the use of public diplomacy. Few writers out-
side the IC, however, recognize the wide range of analytical contributions to this
phase in the policy process, which do not fall into the category of a major intelligence
warning or prescient reassessment of an important international development. There
are literally thousands of transactions between analyst and policymaker that fall into
the category of policy support. These involve the analyst providing bits and pieces
of information and insight on a specific policy issue—for example, where a diplomat
is trying to determine how best to use an instrument such as a foreign aid package
or to construct convincing arguments in a planned conversation with a foreign coun-
terpart or to contemplate possible countermeasures an adversary might take if the
United States were to initiate certain actions designed to increase US influence. As
Professor Jennifer Sims has argued, this kind of intelligence support is often judged
by whether it can give “decision advantage” to US policymakers.21 What is meant is
that timely intelligence can enable American decision-makers to react more quickly
and more effectively than an adversary can. Few of these activities are ever trans
parent to the outside observer. Analysts are being instrumental in providing informa-
tion, which “supports” current policy objectives, regardless of whether analysts think
the policy is correct or likely to succeed.
Policy Evaluation
It would be naive to assume that a president’s policies, once set, run their course
“automatically” until they achieve their stated goals. As military commanders often
say, “No plan survives first contact with the enemy.” Likewise, when developing strate-
gic plans, there is the danger that the decision-makers will fall into the trap sometimes
known as the “fallacy of the first move”—presuming that the adversary will accept the
inevitability of an American action and comply in the ways imagined by its creators.
Sadly, the world is far more complex and less predictable than this. Numerous times
overconfident presidents or commanders have proclaimed that a stated policy action
will be successful and then were shocked by the persistence of an enemy’s resistance
or an actor’s clever response to some US policy action. One thinks immediately of
Bush administration officials’ claims that only a few Iraqi “bitter-enders” remained,
just prior to the onset of the violent Iraqi insurgency in 2005. The analysts’ role in the
postimplementation phase of strategy formulation is to report back to policymakers
From Intelligence Cycle to Policy Support107
on the effectiveness of their actions taken. This role is more feedback rather than
forecasting; in this case, analysts are required to draw up “after-action” reporting that
can assist policymakers in reassessing or redirecting their policies. Not surprisingly,
this is a contribution that is needed but not always welcomed, particularly when it
amounts to a failing grade or a less-than-overwhelming success for an American
administration. As former deputy national security adviser Leon Fuerth used to muse,
“There are no policy failures, only intelligence failures.”
Hence, the analyst must tread carefully in providing feedback to the strategist if
he or she is to maintain the trust of a president or other senior official. As another
former deputy national security adviser, James Steinberg, has noted, a smart policy-
maker would be foolish to dismiss analytical evaluations of policy simply because
they do not conform to his expectations.22 However, there are examples of where
the policymaker’s expectations and the analyst’s assessment of a policy action
were widely disputed. The long record of IC evaluations of US military policies in
Vietnam and American policymakers dismissing them is recorded by numerous
intelligence practitioners and policymakers and recounted in later chapters in this
volume.
In sum, policy evaluation of all the specific intelligence tasks is most likely to
breed distrust between the intelligence and policy communities. As the next chapters
lay out, strategic intelligence lays the groundwork for a dialogue about the interna-
tional environment between those two groups, while warning and policy support are
directed especially at assisting decision-makers in formulating and executing effec-
tive policies. But where the IC is most likely to encounter problems is when its analy-
sis suggests policies are not working or intelligence is perceived to be undermining a
president’s agenda. That is where the intelligence-policy relationship becomes most
challenging.
USEFUL DOCUMENTS
CIA Analytical Tradecraft Primer, https://w ww. cia. gov/ library/center - for - the- study - of
-intelligence/csi-publications/books-and-monographs/Tradecraft%20Primer-apr09.pdf
A good summary of more recent analytical methods used to guard against mind-sets and
cognitive bias.
The Intelligence Cycle, https://fas.org/irp/cia/product/facttell/intcycle.htm
Gives a description of the intelligence process as a linear process.
FURTHER READING
A good examination of the analytical process and analysts’ role in the policy-collection-
analysis process.
Donald C. Daniel, “Denial and Deception,” in Transforming US Intelligence, ed. Jennifer Sims
and Burton Gerber (Washington, DC: Georgetown University Press, 2005).
A concise description of the role that D&D plays in complicating US intelligence
assessments.
Richards Heuer, The Psychology of Intelligence Analysis (Washington, DC: Center for the
Study of Intelligence, 1999).
A ground-breaking examination of how analysts are prone to cognitive biases and mind-
sets and what measures can be taken to guard against them.
Mark Lowenthal and Robert M. Clark, The Five Disciplines of Intelligence Collection (Washing-
ton, DC: CQ Press, 2011).
An excellent collection of articles written by practitioners who examine each intelli-
gence discipline.
Douglas MacEachin, The Tradecraft of Analysis: Challenge and Change in the CIA (Washing-
ton, DC: Consortium for the Study of Intelligence, 1994).
A foundational examination of how analysts must guard against analytical biases.
Stephen Marrin, Improving Intelligence Analysis: Bridging the Gap between Scholarship and
Practice (New York: Routledge, 2012).
An intelligence scholar’s critique of intelligence analysis as practiced in the IC and how
social science scholarship might assist in improving the IC’s performance.
Mark Phythian, ed., Understanding the Intelligence Cycle (New York: Routledge, 2013).
An outstanding collection of articles on the origins, development, and limitations of the
concept, which may have outlived its usefulness.
NOTES
First epigraph: White House, National Security Strategy of the United States, December 2017, 32.
1. A “national security strategy” refers to the development of plans for preventing a range
of threats to the United States, utilizing all elements of national power, including diplomatic,
military, economic, and information power. Typically they require coordination among all the
national security agencies, such as the State and Defense Departments and the Department of
Homeland Security, as well as the intelligence and law enforcement communities.
2. To paraphrase an anonymous senior intelligence official quoted in the CIA monograph
Intelligence and Policy: An Evolving Relationship (Washington, DC: Center for the Study
of Intelligence, 2003), 3, https://www.cia.gov/library/center-for-the-study-of-intelligence/csi
-publications/books-and-monographs/IntelandPolicyRelationship_Internet.pdf.
3. For detailed discussion of analysts’ model building, see Robert M. Clark, Intelligence
Analysis: A Target-centric Approach (Washington, DC: CQ Press, 2004), 39–62.
4. The author wants to acknowledge that much of this discussion of the analytical process
is drawn from a former colleague’s unclassified paper produced for the CIA’s Global Futures
From Intelligence Cycle to Policy Support109
Partnership in 2008. See Timothy Walton, “An Intelligence Analysis Primer: Six Steps to Bet-
ter Intelligence Analysis,” Global Futures Forum’s Community of Interest on the Practice and
Organization of Intelligence, Vancouver, Canada, March 2008.
5. See Sherman Kent, “A Crucial Estimate Relived,” Studies in Intelligence (Spring 1964):
185–87.
6. Thomas Fingar, chairman of the NIC at the time, described this new estimate in detail
in his chapter “Tale of Two Estimates,” in Reducing Uncertainty: Intelligence Analysis and
National Security, ed. Thomas Fingar (Stanford, CA: Stanford University Press, 2013), 89–125.
7. NIEs now contain a scope note laying out what the terms high, medium, and low confi-
dence imply about analysts’ views of the information on which their judgments are based. In
the 2007 NIE on Iran’s nuclear program, the following statement was included in the Scope
Note and repeated in all subsequent NIEs:
• High confidence generally indicates that our judgments are based on high-quality infor-
mation, and/or that the nature of the issue makes it possible to render a solid judgment.
A “high confidence” judgment is not a fact or a certainty, however, and such judgments
still carry a risk of being wrong.
• Moderate confidence generally means that the information is credibly sourced and plau-
sible but not of sufficient quality or corroborated sufficiently to warrant a higher level of
confidence.
• Low confidence generally means that the information’s credibility and/or plausibility is
questionable, or that the information is too fragmented or poorly corroborated to make
solid analytic inferences, or that we have significant concerns or problems with the
sources.
8. On the impact of missing information, see James Bruce, “The Missing Link: The Analyst-
Collector Relationship,” in Analyzing Intelligence: National Security Practitioners’ Perspectives,
2nd ed., ed. Roger George and James Bruce (Washington, DC: Georgetown University Press,
2014), 157–77.
9. The best source on the assumptions and mind-set problems is the book by Richards
Heuer Jr., The Psychology of Intelligence Analysis (Washington, DC: Center for the Study
of Intelligence, 1999), https://www.cia.gov/library/center-for-the-study-of-intelligence/csi
-publications/books-and-monographs/psychology -of-intelligence-analysis/PsychofIntel
New.pdf.
10. One senior analyst involved in those debates has recounted to the author that the inter-
nal CIA debate was won by those whose assessment was largely based on the continued high
defense spending by the USSR, which they believed was a reflection of a continuation of pre-
vailing Soviet foreign and security policy objectives. Separately, in the Aspen Security Forum
in the mid-1980s, a senior CIA official reflected this military perspective when he told an audi-
ence that that nuclear deterrence of the Soviet Union as we know it would be with us for as
long as one could imagine. See a description of scenario planning in Peter Schwartz, The Art of
the Long View: Paths to Strategic Insight for Yourself and Your Company (New York: Currency
Press, 1991).
11. Daniel Kahneman and Amos Tversky wrote about common analytical errors made by
people in reaching decisions. See Daniel Kahneman and Amos Tversky, Thinking Fast Think-
ing Slow (New York: Farrar, Straus and Giroux, 2011). Richards Heuer Jr. also produced a
110 Chapter 5
groundbreaking book on the role of cognitive bias found in intelligence analysis. See Heuer,
Psychology of Intelligence Analysis.
12. For a fuller explanation of SATs and their purpose and process, see Randolph Pherson
and Richards Heuer Jr., “Structured Analytical Techniques: A New Approach to Analysis,” in
George and Bruce, Analyzing Intelligence, 231–48.
13. Micah Zlenko, “Inside the Red Cell,” Foreign Policy, October 30, 2015, http://foreign
policy.com/2015/10/30/inside-the-cia-red-cell-micah-zenko-red-team-intelligence/.
14. See Robert Jervis, Why Intelligence Fails: Lessons from the Iranian Revolution and the
Iraq War (Ithaca, NY: Cornell University Press, 2010). Jervis describes his long-standing rela-
tionship as an outside consultant and how it enabled him to identify a number of analytical
and collection pathologies that are endemic in intelligence failures.
15. For a comprehensive overview of recent academic outreach, see Susan H. Nelson, “Aca-
demic Outreach: Pathway to Expertise Building and Professionalization,” in George and Bruce,
Analyzing Intelligence, 319–38.
16. See the discussion of the 2007 Iran NIE in Thomas Fingar, Reducing Uncertainty, xxx.
17. White House, National Security Strategy of the United States, May 2010, 15, http://
nssarchive.us/NSSR/2010.pdf.
18. ODNI, The National Intelligence Strategy of the United States of America: 2014, 6,
https://www.dni.gov/files/documents/2014_NIS_Publication.pdf.
19. See Roger George, “Fixing the Problem of Analytic Mindsets: Alternative Analysis,” in
Intelligence and the National Security Strategist: Enduring Issues and Challenges, ed. Roger A.
George and Robert D. Kline (Lanham, MD: Rowman & Littlefield, 2005), 311–26.
20. Today the homeland security debate often focuses on balancing American citizens’
right to privacy against their right to feel secure at home. Equally challenging is proper priori-
tization of domestic well-being in the form of spending on education, health care, or airport
security against defense spending or foreign assistance programs designed to avert failing
states that can become havens for future terrorists.
21. See Jennifer E. Sims, “Decision Advantage and the Nature of Intelligence Analysis,”
Oxford Handbook on National Security Intelligence, ed. Loch Johnson (Oxford: Oxford Univer-
sity Press, 2010).
22. James Steinberg, “The Policymaker’s Perspective: Transparency and Partnership,” in
George and Bruce, Analyzing Intelligence, 95.
6
Strategic Intelligence
This chapter will examine the topic of strategic intelligence and how it supports the
national security enterprise. It will describe how strategic intelligence is conducted
and lays the foundation for other intelligence missions. The key role of the National
Intelligence Council and the National Intelligence Estimates process will be used to
illustrate the practice of preparing strategic intelligence, although other intelligence
agencies also produce strategic analysis. Last, the chapter will examine some of the
enduring challenges of such analysis to have impact as well as to ensure its accuracy
and quality.
For both the intelligence analyst and the policymaker, the principal concern is the
strategic international environment in which the United States and other friendly and
111
112 Chapter 6
adversarial actors are operating. Intelligence analysts’ first task is to comprehend the
major trends and factors that are shaping the world in which the American govern-
ment is operating. Strategic intelligence, then, is defined as information and analysis
that informs policymakers about those critical trends and factors that will impinge on
broad and enduring US national security interests. As illustrated in figure 6.1, stra-
tegic intelligence goes beyond simply reporting of known facts (basic intelligence)
and daily events (current intelligence). Basic intelligence is best understood as cata-
logs of known information such as economic statistics, demographic data, and infra-
structure and logistics information (location of ports, airports, military installations,
power plants, etc.). Current intelligence is the daily production of short assessments
that distill the vast flow of diplomatic, military, clandestine, and open-source report-
ing that comes into the US intelligence community. Because of their time urgency
and brevity, current intelligence permits very little analysis of those reports. Yet good
current intelligence rests on solid strategic analysis.
In turn, strategic intelligence does rest on the analysts’ understanding of both basic
intelligence information and an awareness of current intelligence reporting. To be able
to produce solid strategic intelligence, analysts must have a good grasp of the basic
geographic, historical, political, and economic conditions of their country targets or
functional topics. On top of that, analysts must integrate the latest information on their
target with past reporting; however, strategic analysis must avoid being driven solely by
Strategic Intelligence113
the current development. Instead, strategic intelligence must integrate that new infor-
mation with a much larger body of past reporting to form a comprehensive picture of
a country’s or target’s actions and likely behavior. Thus, analysts working on a country
or functional subject will build up extensive knowledge about a country—its history,
economy, leadership, and politics.
In the precomputer age, a new analyst was sometimes directed toward a large four-
drawer file cabinet full of past intelligence reporting on his new intelligence account
(e.g., Iran, China, Russia, or ballistic missiles, chemical weapons, etc.). His supervisor
would point and say, “Read everything in that file drawer, and then we’ll see if you
are ready to write intelligence analysis.” While this is only a slight exaggeration, the
process of becoming a subject-matter expert (SME) on targets such as Iran or North
Korea or WMDs could take considerable time. Figure 6.2 lays out the layers of knowl-
edge that a senior intelligence analyst might be expected to achieve in order to pre-
pare strategic intelligence analysis. The analyst must understand a target country’s
political history, regional setting, and resource potential, which in turn feeds into a
broader international environment in which the analyst must understand the existing
division and dynamics of power. Factoring in a particular state’s political culture, gov-
ernment structure, and leadership styles will then permit the analyst to assess how a
particular national leadership will define its vital national interests, develop policy
objectives, and utilize the diplomatic, military, and economic power at its disposal in
dealing with the United States and US partners.
The first challenge for analysts is to determine what strategic intelligence trends
are of most importance to senior policymakers and to gather the best intelligence
available to help inform policymakers’ discussions and decisions regarding these
strategic issues. In wartime, strategic intelligence is obviously focused principally on
the opponent’s military capabilities, plans, and intentions; even in peacetime, how-
ever, strategic intelligence also can often be focused on military issues. Indeed, dur-
ing the Cold War, strategic intelligence focused extensively on the Soviet military
challenge. However, it was never limited to the military domain alone. The CIA and
other IC agencies also had to examine nonmilitary factors such as an adversary’s eco-
nomic performance (which can support its military potential) and its political system
and leadership characteristics, as those can inform US policymakers on how a foreign
adversary might behave or react to American policies.
Like intelligence analysts, policymakers undertake to both understand the inter-
national environment and attempt to shape it to the advantage of the United States.
Neither is necessarily easy. At times the international environment is difficult to
comprehend. Particularly at times of great change, as the United States finds itself
today, policymakers are often confronted with difficult questions about how the inter-
national system is changing, how power is distributed, and which states are likely to
Figure 6.2. Determinants of Foreign Actors National Security Policy
Strategic Intelligence115
pose the greatest challenges to US interests. At the end of the Cold War, for instance,
the IC was focusing as much as 80 percent of its collection and analysis resources
on the so-called Soviet target, and it took considerable time to both reduce this pre
occupation and expand its global coverage of other issues.
Unlike during the Cold War, policymakers today do not have the luxury or clar-
ity to focus on a single actor or adversary. There are broader, more diffuse trends or
factors that may alter the international conditions in which the United States must
operate. For example, global climate change is likely to create new environmental
as well as geopolitical conditions in which US diplomacy must operate; if scientists
are correct, climate change may produce more failing states, humanitarian crises,
and interstate conflicts, for which the US will have to develop policies.1 Unlike intel-
ligence analysts, however, policymakers must go beyond identifying these factors
to fashioning strategies and enunciating policies designed to exploit opportunities
and prevent or at least reduce the threats that might emerge from changing interna-
tional conditions.
Informing the policymaker about the changing strategic environment is the most
challenging role that the analyst performs, and it can come in many forms. Provid-
ing knowledge is what Sherman Kent described in 1949 as the intelligence analyst’s
goal of elevating the level of the policy debate. Many policymakers do not always
acknowledge this quiet yet pervasive function of intelligence. But it is one that intel-
ligence analysts must perform in their everyday interactions with policymakers via
finished analysis, oral briefings, or telephone and classified email communications
and face-to-face conversations. Sometimes providing a different perspective to a poli-
cymaker can be the most important contribution to a strategic decision if it can put
the decision-maker in the adversary’s position or demonstrates that the policymaker’s
perspective on an issue is not the only possible interpretation of the current problem.
Threat Assessment outlines the top-tier strategic intelligence challenges, and these
days that list begins with the transnational issues such as cyber domain, counter
intelligence, Internet manipulation terrorism, proliferation, and more traditional
adversarial relations with China, North Korea, Iran, and Russia, just to name the
most obvious.2 Clearly, the international environment has shifted with the end of
the bipolar US-Soviet global competition. Nonetheless, Russia remains a strategic
challenge, even though it is nowhere near the top of the list of major threats facing
the United States today.
So, what is seen as having strategic importance will change, and necessarily US
intelligence has adapted its collection and analysis priorities to make sure it can
provide strategic intelligence on a whole range of subjects that were unknown or
unimportant before the 1989 fall of the Berlin Wall. One way of understanding what
has become strategic is to look at the long list of national “strategies” that several
presidents have promulgated since 2000. These documents have been issued by
the White House or by individual agencies but often include in their titles the word
National to indicate they reflect a strategic priority that demands high-level attention
across the entire national security enterprise. It is hoped that also will carry a high
priority for intelligence. Even a short and incomplete list (and accompanying issue
dates) would include the following:
As this only partial list demonstrates, there is a wide range of international issues
for which there needs to be broad strategies that can orchestrate the activities of
numerous federal (and, in many cases, state and municipal) agencies. These enun-
ciated strategies are the results of NSC deliberations outlined in chapter 3. Many
more topics remain in classified channels, so they cannot be discussed as examples
here. Nonetheless, these classified interagency studies and decision memoranda are
prepared and coordinated by the interagency process. Presidents then approve strate-
gies for dealing with those problems. Many of those documents contain intelligence
assessments either as part of the national security decision memoranda or as separate
Strategic Intelligence117
highly or more likely, less likely, or improbable. Whatever the adjectives used by
analysts, they are impressions and judgments, not facts. As a rule of thumb, analysts
will attach qualifiers—often termed “caveats”—to their judgments to imply that an
improbable or unlikely event carries a probability of less than 50 percent, while
likely or almost certain events carry a probability of much more than 50 percent.
More precision is both impossible and reckless when so many known and unknown
factors can influence a foreign actor’s behavior. To manage this probability challenge,
analysts will also resort to developing alternative scenarios that permit them to rank
them in terms of their relative probability depending on which key factors become
more prominent in a foreign actor’s behavior. In many cases, analysts will distinguish
the most likely from the least likely cases based on their understanding of which
key factors and forces are most powerful in determining how a target might behave.
Among the scenarios, analysts might also highlight those likely to have the most
positive or negative consequences for US interests.
To take one example, if analysts were asked to assess the probability of China
attacking Taiwan, they might construct several scenarios based on factors such as
the nature of the Chinese leadership and the foreign policies of the current Taiwan-
ese government. Analysts would determine which factors might be most likely to
generate pressure for one or another scenario, and from those factors there would be
a set of indicators most likely to accompany increasing chances of one or another
scenario. So, for example, one scenario might judge an attack as unlikely, if the Beijing
leadership was stable and confident and the Taiwanese government had eschewed
any notion of independence from China. However, a second scenario might be judged
much more likely if the Beijing was undergoing a leadership struggle between hard-
liners and moderates, and a new Taiwanese government was toying with the idea of
declaring independence. Under the latter scenario, the risk of a preemptive Chinese
invasion might be significantly higher, and intelligence analysts would be looking for
new evidence (e.g., indicators) in Beijing and Taipei for radical departures from past
policies of coexistence.
One of the most critical yet challenging tasks for analysts is also laying out key
assumptions used in a strategic assessment. When forecasting the future, there is
seldom strong evidence for actions not yet taken by an adversary, so in place of facts
analysts must rely on past behavior and patterns. These assumptions, often unap-
preciated and usually unstated, may disguise potential analytical errors. In 1941,
American military intelligence dismissed a Japanese attack on Pearl Harbor in part
because of well-formed biases that the Japanese were culturally inferior and did not
have the military capabilities or skills to attack the US Pacific Fleet. In 1962, Sherman
Kent’s CIA analysts largely dismissed Soviet placement of offensive missiles on Cuba
because of the assumptions that the Soviets had never before deployed their missiles
Strategic Intelligence119
outside of the USSR and that the Soviets would surely understand that the United
States would never tolerate such weapons ninety miles from American shores. Such
assumptions should be made as transparent as possible so that other analysts can
challenge them and policymakers can decide if they are well founded. In some cases,
it is useful to allow a diverse set of outside experts to review intelligence assessments
because they will often bring a different perspective and set of assumptions regard-
ing a topic and thus are then able to quickly identify and challenge the intelligence
analysts’ assumptions.
in the Cold War, the CIA organized its analysts into groups with different functions;
one large group was the Office of Strategic Research (OSR), and the other was the
Office of Current Intelligence. The former focused on broad questions of Soviet mili-
tary and scientific developments. This is where much of the analysis of the USSR’s
military programs was conducted, including ballistic missile developments, nuclear
programs, and their strategic doctrines that guided their use of military force. These
analysts were producing a wide range of CIA assessments used by the Department
of Defense but also valuable to senior civilian leaders trying to understand how the
Soviet military planned to use nuclear weapons, how the Kremlin thought about war,
and what strategic plans the Soviets had for expanding their sphere of political and
military influence in Europe and Asia. Complementing this work on strategic military
questions, the CIA’s then Office of Economic Research developed the best models of
the Soviet economy’s performance, its growth rates, and, importantly, the extent of
the defense burden on the Soviet economy. These CIA analysts were also regularly
participating in the preparation of NIEs and might be the principal estimate drafters
if they were among the IC’s recognized experts.
At the same time, the DIA maintained its own cadre of senior military analysts
who focused on Soviet military power and its capabilities vis-à-vis the United States.
Within the DIA, there was a Directorate of Estimates, where longer-term estimates of
missiles, tanks, planes, and ships were developed. Those military estimates became
part of the broader IC’s development of NIEs. Over the years, disagreements between
DIA and CIA analysts over the size and growth rates of Soviet military programs and
budgets were quite controversial and heated. In a somewhat simplistic sense, defense
intelligence analysts tended to see the Soviets as “ten feet tall,” while civilian intel-
ligence analysts at the CIA and elsewhere tended to see a smaller and more backward
Soviet military threat.8 Disputes over the Soviet strategic capabilities and intentions
persisted throughout the 1970s and 1980s, when very elaborate studies of Soviet
weapon systems and military doctrine were deemed critical to whether the United
States could deter and survive a Soviet nuclear attack. Those assessments also played
a key part of the debate of the 1970s strategic arms control agreements negotiated by
President Richard Nixon and National Security Adviser Henry Kissinger (discussed
in more detail in a later chapter).
The State Department’s INR bureau never had the staff to support a large-scale
intelligence-estimate effort. Nonetheless, it would periodically prepare its own longer-
term assessments that could be considered of strategic and national interest. INR
analysts were also drafters of NIEs on occasion, when the bureau had an outstanding
expert on the estimate’s topic. INR’s own all-source analysts were just as able to use
intelligence reporting from all national collectors as CIA and DIA analysts could, and
sometimes they could produce alternative views on major issues regarding Soviet
Strategic Intelligence121
strategic intentions or prospects for success in Vietnam; in the latter case, INR’s pes-
simistic forecasts proved to be much more accurate than many of those produced by
other intelligence agencies.
The NIC has distinguished itself by containing a diversity of experts with var-
ied military, diplomatic, academic, or private-sector backgrounds. As one former
NIC chairman pointed out, the NIC attracted senior CIA and DIA officers but also
experts from other IC agencies, the Federal Reserve, the West Point faculty, and
prestigious think tanks.10 As he put it, the NIC “wanted officers who were widely
122 Chapter 6
recognized inside and outside government, and respected for their expertise.”11 The
NIO’s job was not only to be a substantive expert but also a leader of the com-
munity of analysts and a bridge to the policy world. An NIO was responsible for
representing the IC’s collective views on international topics, not primarily their
personal judgments. As such, NIOs usually attended the interagency policy com-
mittee meeting on their respective areas and were often the plus one supporting
the DNI’s participation at the Principals Committee meetings. NIOs meet regularly
with senior NSC, State Department, and Defense Department officials to brief them
on community intelligence assessments and to develop an intelligence research
agenda that suits their needs.
In most cases, NIOs would propose topics for NIEs and other NIC products based
on their understanding of policymakers’ needs. Alternatively, senior policymakers
or even congressional committees can request a national estimate. It is then the
NIC’s and NIOs’ responsibility to prepare those along the lines and timetable of the
requestors. The NIOs are responsible for developing outlines (called a “terms of ref-
erence”) for each project, assign and manage the drafting of the assessments, lead
interagency “coordination” sessions of analysts that reviewed and revised the drafts,
and then edit and finalize those products. At the end of the process, the NIO would
present the estimate for review by the National Intelligence Board (NIB), comprising
the heads of all IC agencies and chaired by the DNI. This would be the final step when
any amendments or dissents to the NIE would be considered.
As of 2005, the NIC became part of the Office of the Director of National Intelli-
gence and now reports directly to the DNI. In his capacity as head of the IC, the DNI
would approve all NIEs produced by the NIC. While policymakers recognize the NIE
as the most authoritative product by the IC, it is by no means the most widely read
or popular NIC publication. Typically NIEs involve the most exhaustive drafting and
review process, often taking weeks if not months. Historically, the NIEs tended to be
lengthy, detailed studies that could run into tens if not hundreds of pages or even sev-
eral volumes, depending on the complexity of some technical topics such as weapon
technologies. In some cases, policymakers were not prepared to read such documents,
so the NIOs have often resorted to quicker memos—called “sense of the community
memoranda”—that are more focused on current priority issues and did not require
the lengthy review by the DNI and other IC chiefs. One recent example of such an
interagency memo was the January 2017 Intelligence Community Assessment titled
“Assessing Russian Activities and Intentions Regarding Recent US Elections.”12
These products, combined with individual NIO memos prepared for specific policy
consumers, have totaled more than seven hundred publications annually.13 Moreover,
recent NIC chairmen have dictated that NIEs should be no longer than twenty pages
in length, with a three-page “Key Judgments” (major conclusions) preface. This is all
Strategic Intelligence123
designed to make the NIEs themselves more useful and increase the likelihood that
busy policymakers will actually read the products.
Process
The NIE is considered the most authoritative form of strategic intelligence because
it has the most time-consuming and senior-level review of all IC products. The typi-
cal NIE is often the result of senior policymaker interest in a subject on which deci-
sions must be made or an NIO having determined that such an NIE may be needed
either to review past judgments made on a priority subject or to anticipate decisions
that might be made by the policy community. Often the focus of an NIE is derived
from interactions between the NIO and his counterparts at the NSC, the State Depart-
ment, and the Defense Department. Once the topic is agreed on, the NIO will chair
an IC-wide meeting of experts to develop an outline focused on the key questions
that the NIE is designed to address. NIOs will assign drafting responsibility to one or
more analysts from the CIA, the DIA, INR, and so forth, and he or his deputy NIO will
oversee the drafting process and act as a first-level reviewer and editor. Once a draft
is prepared, the NIO will circulate the NIE draft among the IC agencies for comment,
using that feedback to revise it. Most NIEs require several face-to-face meetings—
part of the coordination process—at which analysts representing their agencies will
review the draft line by line; this can be an exhausting day- or weeklong process,
depending on the complexity and scope of the NIE. Despite the term coordination,
the experience can be both frustrating and not entirely collegial.
At the end of the day, the NIO will determine if there is consensus on the subject
or whether further review and some “dissents” are needed to capture the difference
of opinion among the agencies. In the past, NIEs were often written as consensus
documents, with minor footnotes inserted when an agency disagreed on particular
124 Chapter 6
points; they would appear at the bottom of the page and identify those agencies dis-
senting and a brief discussion of their reasons. In the post-Iraq-WMD era, however,
such disagreements are highlighted in the text, allowing individual agencies to lay
out in more detail why their judgments differ and whether they believe the evidence
is available to support the majority’s line of argumentation.
Today senior NIC officials are averse to minimizing differences in the interest of
consensus; rather, the emphasis is on “clarity” in each agency’s views. Importantly,
each agency gets a vote, and directors of those agencies will have to ultimately con-
firm their approval at the final NIB meeting on the paper. This process, instituted
since the flawed 2002 Iraq WMD estimate, is designed to force agencies to review
in a zero-based fashion their previous judgments on a subject and stand by those
views before it can be approved and disseminated by the DNI. At that final NIB meet-
ing, not only do agency heads need to confirm their agreement to the judgments but
collection agencies must also review the use of their source material and confirm
that they are confident in that information’s validity and use in the NIE. All of this is
designed to connote as much authority and responsibility for an NIE’s accuracy as
can be expected.
Estimative Products
NIEs come in all shapes and sizes. In the Cold War era, it was not unusual for estimates
on Soviet strategic nuclear forces to run into several volumes of several hundred pages
each. They truly were strategic research of the most basic kind. Those estimates on
Soviet strategic forces were given the series designation of “NIE 11-3/8” (see excerpt
in box 6.1) and were an annual exercise that was used by the Defense Department
to size US strategic forces and develop strategic plans to deter any plausible Soviet
nuclear strike. Based on those estimates, US policymakers developed a nuclear triad
of American land-based, sea-based, and airborne delivery systems to complicate any
Soviet temptation for “first strike.” Those estimates also became controversial in the
1970s, when President Nixon and National Security Adviser Kissinger were promot-
ing détente and signed the first major Strategic Arms Limitation Talks (SALT) agree-
ment with the USSR. Disagreements between the CIA and DIA on future Soviet force
projections led to later charges that the CIA had politicized its lower force projections
to fit Kissinger’s détente policies; outside critics attacked those estimates, claiming
CIA analysts were prone to “best-casing” Soviet programs by assuming Moscow was
content on parity rather than superiority in strategic forces.14
Those days of lengthy NIEs and long, drawn-out disagreements over Soviet stra-
tegic doctrine and forces are long past. Estimates run the gamut from very short and
focused on a narrow question of a foreign government’s survivability to longer-term
prospects of threats to the US homeland. There has been a steady stream of shorter
Strategic Intelligence125
The intercontinental attack forces considered in this paper include intercontinental ballistic
missiles (ICBMs), submarine-launched ballistic missiles (SLBMs) and heavy bombers. In the
course of the past 10 years, the Soviets have engaged in a vigorous and costly buildup of
these elements of their military establishment. While all defense spending increased during
the period, the estimated share allocated to these forces doubled, going from about 5 per-
cent in 1960 to more than 10 percent in the later years of the decade. The 1969 level—an
estimated 2.3 billion rubles (the equivalent of $5.6 billion)—was more than three times as
high as the 1960 level. For the decade as a whole, spending on intercontinental attack forces
accumulated to about 16 billion rubles (about $36 billion) with ICBMs accounting for 80 per-
cent of this amount. . . .
As a result of this effort, the Soviets had on 1 October 1970 an estimated 1,291 operational
ICBM launchers at operational ICBM complexes, and they will have an estimated 1,445
launchers operational by mid-1972. . . . Of the 1,445 ICBM launchers estimated to be at oper-
ational complexes by mid-1972, 306 probably will be of the large SS-9 type and 850 the
smaller SS-11. . . .
In the early 1960s, the Soviet leaders, politically and ideologically hostile to the US, and
thinking and behaving as rulers of a great power, perceived that in this particular respect
their military forces were conspicuously inferior to those of their most dangerous rival, the
US. Consequently, they set themselves to rectify the imbalance—to achieve at a minimum a
relation of rough parity. Parity in this sense cannot be objectively measured; it is essentially
a state of mind. Such evidence as we have, much of it from the strategic arms limitation
talks, indicates that Soviet leaders think that they have now achieved this position, or are
about to achieve it, at least in respect to weapons of intercontinental range.
Source: Declassified excerpts from NIE 11-8-70 found in CIA, Intentions and Capabilities: Estimates on Soviet
Strategic Forces, 1950–1983 (Washington, DC: Center for the Study of Intelligence, 1996), 263–67.
NIEs estimating the prospects for stability in such hot spots as Afghanistan and Iraq
that become part of the NSC interagency discussions on US strategies toward those
conflicts. One example of this is the January 2007 NIE on the prospects for Iraq
(see box 6.2), which was one major contribution to the decision about how to “surge”
American forces to defeat the Sunni insurgency.
Seeing a deteriorating security situation, well documented in the NIE, Presi-
dent George W. Bush simultaneously announced a new strategy that increased US
forces in Iraq by twenty thousand troops and embedded them in the Iraqi Security
Forces, which the NIE had also identified as a major weak point. This estimate was
quickly followed by several others, which updated the IC’s judgments on how well
the surge was working and whether progress was being made. In August 2007, for
example, the NIC disseminated an updated NIE titled Prospects for Iraq’s Stability:
126 Chapter 6
Some Security Progress but Political Reconciliation Elusive, a title that suggested
mixed success for the US strategy. This update used the January NIE as a “baseline”
and examined prospects for security and national reconciliation for the next six to
twelve months.15
Naturally, other NIEs have focused on the terrorist threat to the homeland. Also
in 2007, the NIC produced a major NIE titled The Terrorist Threat to the US Home-
land, which judged that the United States would face a “persistent and evolving ter-
rorist threat over the next three years.” In this estimate, the IC experts judged that
“greatly increased counter-terrorism efforts over the past five years have constrained
the ability of al-Qaida to attack the US homeland again and have led terrorist groups
to perceive the homeland as a harder target to strike than on 9/11.” Like other forward-
looking NIEs, it forecast the “likely spread of radical—especially Salafi—Internet sites,
Strategic Intelligence127
increasingly aggressive anti-US rhetoric and actions, and a growing number of radi-
cal, self-generating cells in Western countries, indicating that the radical and vio-
lent segment of the West’s Muslim population is expanding, including in the United
States.”16 Again, these kinds of assessments bolstered the Bush administration’s confi-
dence that its efforts to combat terrorism abroad and tighten surveillance and border
security at home were working, yet it also put Washington decision-makers on notice
that radical Islamic extremism was spreading. Subsequent ISIS-inspired attacks in
Europe and even the United States confirmed that al-Qaeda was not the only group
that threatened US security.
• In 1997, Global Trends 2010 forecast that the postwar international order was
ending, leading to three major significant trends: conflicts would be largely
internal, not state-to-state; weak states would fail, resulting in ethnic conflict
and refugee flows; and even major powers would lose some control over their
destinies by virtue of the advancing globalization process and technological
revolution.
• In 2001, Global Trends 2015: A Dialogue about the Future highlighted global
drivers of change (such as demographic trends, natural resources, globaliza-
tion, and even the role of the United States) and described plausible alterna-
tive futures to describe the range of outcomes possible under very uncertain
conditions.
• In 2004, Global Trends 2020: Mapping the Global Future deepened the prac-
tice of combining key uncertainties such as globalization and governance and
presented fictional scenarios. A “Davos World” foresaw challenges in sustain-
ing globalization’s positive aspects, “Pax Americana” examined whether the
American unipolar moment could continue, “A New Caliphate” illustrated the
impact of new identity politics, and “Cycle of Fear” captured a perfect storm of
WMD proliferation, international terrorism, and global power shifts.
• In 2008, Global Trends 2025: A Transformed World foresaw a multipolar
world, with China, India, Brazil, Iran, and, perhaps, a resurgent Russia emerg-
ing as power blocs in contest with the United States. Postwar international
institutions would no longer be effective or be seen as legitimate by newly
rising powers, suggesting that major changes in the global order are needed.
• In 2012, Global Trends 2030: Alternative Worlds identified “megatrends”
and “game-changers” (which includes the US role in the world) that could
create four quite different scenarios. Increased empowerment, widely avail-
able technologies, more diffusion of power among nations, and urbanization
Strategic Intelligence129
and youth bulges in less-developed countries could produce some very chal-
lenging international conditions. The paper further identified a dozen key
emerging and disruptive technologies and their impact on world conditions.
With each new publication, the Global Trends series has experimented with dif-
ferent forms of consultation with the incoming national security team as well as with
outside experts and use of online social media. These unclassified assessments had
surprising impact on policymakers both in Washington and around the world. New
administrations received these papers well in advance of their formal publication, and
often they included some of the Global Trends thinking in the preparation of their
own National Security Strategy documents. Former NIC chairman Thomas Fingar
also noted that by involving hundreds of foreign participants in the preparation of
the papers, it built up interest in using the publications in their own governments and
translating the findings into foreign languages. Several North Atlantic Treaty Orga-
nization (NATO) allies adopted or echoed some of the findings and also began their
own “futures” projects.18
The most recent version, Global Trends: Paradox of Progress (2017), is perhaps
the most ambitious strategic analysis conducted by the NIC. It was a two-year
process of commissioning outside research and testing assumptions and themes,
with more than two thousand participants in thirty-five countries. Breaking new
ground, it went beyond the customary think-tank experts and foreign officials to
include focus groups with students, women’s groups, and entrepreneurs in a num-
ber of countries. Unlike past Global Trends, this one focused on both a five-year
and twenty-year time frame, believing that it would engage policymakers more to
see the kinds of projections that might actually impact their policies and priorities
as well as stimulate their thinking about how those same policies might shape the
longer-term future. The paper laid out three key scenarios, summarized below, built
on a set of key trends and implications outlines in the paper, shown in box 6.3. The
three scenarios—described as “Islands,” “Orbits,” and “Communities”—are the result
of responses made by key governments and other international actors to the near-
term volatility projected to occur:
Admittedly, the Global Trends series is not a coordinated, classified NIE that has
the gravitas of being endorsed by the ODNI and other heads of US intelligence agen-
cies. However, it has introduced a new type of strategic analysis that is closer to being
a “net assessment” of the interaction of US policies with the actions of foreign govern-
ments and future trends that the IC can imagine, although not predict. The NIC makes
no apologies for “getting some things wrong” in terms of its projections, although it
does conduct a self-review in preparation for each new project. Necessarily, such stra-
tegic speculation must be caveated as not representing the official views of the IC.
Moreover, despite foreign experts’ appreciation for inclusion in these Global Trends
exercises, many are puzzled that the IC might prepare assessments that project a
world that the United States does not wish to see or that might project a less powerful
American role. The best one can say is that this strategic analysis abides by the adage
of trying to imagine the future as best as one can understand it without making it fit
policymakers’ preferences.20
Strategic intelligence is a vital but not always widely appreciated function of the
IC. Critics contend that strategic intelligence is less relevant to daily policy deci-
sions and seldom critical to issues of war and peace. While there is some truth in
these arguments, one needs to keep in mind that good strategic research is the foun-
dation for providing good current intelligence and timely warning as well. If the
IC’s understanding of the strategic environment is flawed, most likely it will have a
skewed view of current events and major threats as well. Hence, it would be foolish
for policymakers to dismiss the importance of the NIC, CIA, DIA, and other agen-
cies conducting good strategic intelligence, even if it does not always address all
of their short-term intelligence needs. That said, it is important to examine several
dimensions of this argument to have a more balanced appreciation for what strategic
intelligence can and cannot provide policymakers.
Strategic Intelligence131
Box 6.3 2017 Global Trends and Key Implications through 2035
The rich are aging, the poor are not. Working-age populations are shrinking in wealthy
countries, China, and Russia but growing in developing, poorer countries, particularly in
Africa and South Asia, increasing economic, employment, urbanization, and welfare pres-
sures and spurring migration. Training and continuing education will be crucial in developed
and developing countries alike.
The global economy is shifting. Weak economic growth will persist in the near term. Major
economies will confront shrinking workforces and diminishing productivity gains while recov-
ering from the 2008–09 financial crisis with high debt, weak demand, and doubts about glo-
balization. China will attempt to shift to a consumer-driven economy from its longstanding
export and investment focus. Lower growth will threaten poverty reduction in developing
countries.
Ideas and Identities are driving a wave of exclusion. Growing global connectivity amid
weak growth will increase tensions within and between societies. Populism will increase on
the right and the left, threatening liberalism. Some leaders will use nationalism to shore up
control. Religious influence will be increasingly consequential and more authoritative than
many governments. Nearly all countries will see economic forces boost women’s status and
leadership roles, but backlash also will occur.
Governing is getting harder. Publics will demand governments deliver security and pros-
perity, but flat revenues, distrust, polarization, and a growing list of emerging issues will
hamper government performance. Technology will expand the range of players who can
block or circumvent political action. Managing global issues will become harder as actors
multiply—to include NGOs, corporations, and empowered individuals—resulting in more ad
hoc, fewer encompassing efforts.
The nature of conflict is changing. The risk of conflict will increase due to diverging inter-
ests among major powers, an expanding terror threat, continued instability in weak states,
and the spread of lethal, disruptive technologies. Disrupting societies will become more
common, with long-range precision weapons, cyber, and robotic systems to target infra-
structure from afar, and more accessible technology to create weapons of mass destruction.
Climate change, environment, and health issues will demand attention. A range of
global hazards pose imminent and longer-term threats that will require collective action to
address—even as cooperation becomes harder. More extreme weather, water and soil stress,
and food insecurity will disrupt societies. Sea-level rise, ocean acidification, glacial melt,
and pollution will change living patterns. Tensions over climate change will grow. Increased
travel and poor health infrastructure will make infectious diseases harder to manage.
Source: Excerpted from Office of the Director of National Intelligence, Global Trends: Paradox of Progress, Janu-
ary 2017, https://www.dni.gov/files/documents/nic/GT-Full-Report.pdf.
132 Chapter 6
These findings suggest that strategic intelligence can be illuminating but nonethe-
less ignored for reasons that have little to do with its quality, accuracy, or relevance.
By the same token, strategic intelligence is often not credited as a contributing
factor to decision-making if one is trying to link a specific intelligence product to a
Strategic Intelligence133
inspections and postmortems on how the IC’s judgments have evolved and a way to
critique the quality of intelligence over time.
Second, NIEs may be very useful to policymakers who are not themselves experts
on the subjects but wish to have a working knowledge of how the IC assesses a prob-
lem. In the author’s experience, diplomats and military officers wishing to “get smart”
on topics such as Iran, Iraq, and Afghanistan will very often read recent NIEs and
other intelligence products to familiarize themselves with topics that might become
important if they are assigned to a Middle Eastern embassy or a command in that part
of the world. Likewise, new political appointees such as ambassadors are eager to read
the latest NIE or other finished intelligence products to understand what challenges
they will face when they are running US diplomacy from their foreign posts.
Finally, the IC has a selfish reason for developing strategic intelligence. Such work
is necessary to develop analysts’ skills at putting together cogent arguments, weigh-
ing evidence in a rigorous fashion, and challenging their own judgments by exposing
them to peers’ critiques and outside review. In regard to the latter, NIEs and other
strategic-level analysis are usually exchanged with foreign intelligence services. It is
common practice for the NIB to release sanitized versions (i.e., free of the most sensi-
tive intelligence reporting) to the other Five Eyes services (Commonwealth countries)
as well to those of other close NATO allies.28 Such exchanges not only help American
analysts to test their hypotheses against other perspectives but also can often help to
shape a foreign government’s views of an issue in ways that are advantageous to the
United States.
Estimates are informed judgments based on the best information available, but that
knowledge is usually incomplete and often contains contradictory evidence. What
facts do exist seldom allow for perfect certainty. As one former CIA deputy director
noted, these judgments are “not chiseled in stone,” never to be changed.30 Rather
they are subject to revision as new information is available that confirms, alters, or
rejects those previous judgments.
Policymakers must recognize that, at best, estimates and intelligence judgments
more generally must go beyond the few facts available and craft projections of how
the future might look. They can be useful in laying out the key factors that might
alter the future and preferably also suggest how a different plausible set of condi-
tions might produce different outcomes. In so doing, strategic intelligence can edu-
cate policymakers about the relationship among political, economic, and military
factors that they should be mindful of. Developing alternative outcomes can also
prepare decision-makers for circumstances they had not previously considered.
This can in turn allow military and civilian leaders to game out how US policies
and actions might have to change to address those different scenarios as well as
to highlight which factors are most problematic and might be susceptible to US
preventive action.
This NIE was prepared at the mid-September request of the SSCI, which asked the
NIC to produce a broad estimate on Iraq’s WMD programs no later than October 1.
The Senate wanted it prior to its October 3 vote to approve an “authorization for the
use of military force” requested by the Bush administration. This “fast-track” NIE was
produced in less than three weeks, which allowed for only one day’s coordination of
the estimate by the IC’s WMD and Iraq experts. Moreover, the short-fuse estimate did
not permit a bottom-up review of past reporting but essentially was a “cut-and-paste”
cobbling of past intelligence judgments reached on Iraq’s WMD programs. The NIE’s
key conclusions were the following:32
• Iraq was reconstituting its nuclear program and could have a nuclear device
in the next few years.
• Iraq’s biological weapons (BW) capability was larger and more advanced than
before the 1991 Gulf War.
• Iraq had renewed its production of chemical weapons (CW) and had a stock-
pile of one hundred to five hundred metric tons of mustard, sarin, VX, and
other dangerous neurotoxins.
• Iraq also had UAVs for delivering BW and ballistic missiles exceeding the
150-kilometer range banned by the United Nations.
Nearly all these key judgments proved to be wrong in most respects. Later
inspectors of the Iraq Survey Group (ISG) found no evidence of CW or BW research
or stockpiles and, most important, no active nuclear weapons research and develop-
ment.33 The UAVs were most likely not designed for dispersing biological toxins,
and only some of the ballistic missiles found were capable of ranges exceeding 150
kilometers. Perhaps most shocking was the fact that the estimate had the temerity
to attach “high confidence” and “moderate confidence” to many of these judgments,
even though the evidence of any WMD activity proved to be so thin and mostly
false.
How could the IC get this critical estimate so wrong? First, collection failed to
provide significant and corroborated information on Saddam’s WMD activities after
UN inspectors were withdrawn from the country in 1998. The WMD commission con-
cluded that the CIA had no dedicated HUMINT sources in Iraq, and the handful of
assets it did have were not reliable. What little new information was collected, then,
turned out to be false, exaggerated, or fabricated by sources with personal agendas.
The ISG subsequently concluded that Saddam had unilaterally destroyed his WMD
stocks in 1991.34
Second, in the absence of good information, analysts fell back on their assump-
tions that Saddam probably had WMDs and was very clever in hiding them from
Strategic Intelligence137
inspectors and the IC. Having underestimated Saddam’s WMD capabilities in 1990,
WMD analysts spent the next decade assuming Iraq was up to something, which the
commission found to be no longer just a hypothesis but a firm conclusion.35 As it
reported, “Rather than weighing the evidence independently, analysts accepted infor-
mation that fit the prevailing theory and rejected information that contradicted it.”36
Furthermore, analysts “layered” one judgment on top of another, so there was a cas-
cading set of unproven assumptions masquerading as evidence; this layering effect
disguised the fact that those previous judgments were also based on limited and
uncertain information.37
Third, intelligence analysts did not do a good job of understanding the pressures
the Saddam regime was under to curtail rather than restart its WMD programs.
Weapons analysts were not regional Iraq specialists, and they simply did not consider
how the political, cultural, and regional dynamics might play into Saddam’s theatrical
performance of inhibiting inspections of WMDs he no longer possessed. Analysts
failed to entertain the idea that “Saddam was actually telling the truth” or to revisit
earlier intelligence that suggested his programs had been dismantled.38
Finally, the estimate presented its findings without ever explaining its “high-to-
moderate” confidence judgments. While there were numerous caveats sprinkled
throughout the lengthy estimate underlining some of the intelligence gaps that
existed, the key judgments themselves contained far fewer qualifiers. Thus, Congress
and Bush administration officials had no way of knowing the basis on which they
were reached. Unbeknown to the few readers of the estimate, analysts themselves
had little information on the sources they were relying on, as collectors shielded that
information from most analysts. Up to that time, a general need-to-know principle
prevented HUMINT collectors from revealing the identity and other characteristics
of sources to analysts. Thus, there was little information available to judge a source’s
reliability.39
The IC has made strides in all these areas, although more improvement is needed. The
NIC initially established its Long-Range Assessment Group, which has been empow-
ered to develop longer-term assessments of broad topics. This group—later renamed
the Strategic Futures Group—has now largely taken over the responsibility for organiz-
ing and drafting the Global Trends series. Those efforts are perhaps the best example of
extensive outreach to tap the knowledge of nonintelligence experts on broad national
security issues. The IC has also committed itself to more in-depth training of analysts
to ensure they understand the perils of poor analysis and can utilize more rigorous ana-
lytical methods to challenge their assumptions and judgments. Multiweek courses have
been established that enable analysts to use more structured analytical techniques—
some of which were described in chapter 5—that aim at uncovering key assumptions,
critically examining reporting, and developing alternative hypotheses. Inculcating
these so-called tradecraft tools has become a standard training objective at the CIA,
DIA, and several other intelligence agencies. The CIA as well as the DIA also created
lessons-learned centers, where classified postmortems are conducted on successes and
failures of strategic analysis. These studies in turn are often used in IC training courses.
At the CIA and DIA, a number of Red Cell teams have been created, whose mission
is to craft alternative analyses that challenge the conventional views held by analysts
or to provide unconventional perspectives on key intelligence questions. As described
in chapter 5, this technique helps analysts get out of their US mind-set. In this capac-
ity, the Red Cell will design strategies to undermine US interests and thereby dem-
onstrate how an enemy might react differently than the planners anticipate. The Red
Cells found in the IC often are asked to play an adversary’s “national security team”
and fashion hypothetical decision memos and policies to illustrate to US policymakers
how that enemy’s plans and intentions might deviate from their own presumptions.
Strategic Intelligence139
Finally, the DNI has taken a number of steps to improve the NIE process to ensure
that mistakes made in the 2002 Iraq WMD estimate are not repeated. First, the DNI
has instructed that collection agencies must review all sources used by analysts and
stand by those sources’ reliability and validity; at every NIB review of an NIE, collec-
tion agencies must address how their products were used in the final estimate. At the
same time, the DNI has pressed HUMINT and SIGINT collectors to provide analysts
more information on the nature and reliability of the sources they are using. Second,
the DNI and the NIC have vowed to conduct future NIEs with an eye toward more
zero-based reviews of intelligence problems and to avoid accepting past judgments
as a starting point. The use of outside reviewers who can bring in different perspec-
tives has also been revitalized. Moreover, alternative views of an intelligence problem
are given equal treatment in the NIEs rather than being played down or minimized in
a short dissenting footnote as in the past.
A third initiative by the DNI has been to issue several important interagency Intel-
ligence Community Directives (ICDs) that have encouraged greater analytical rigor
as well as more extensive academic outreach to nonintelligence experts. For exam-
ple, in 2007, the DNI issued Intelligence Directive 203: Analytical Standards, which
instructs that all IC products shall
These directives have helped set community goals, but agencies and senior man-
agers are still in a position to encourage or resist such efforts. In the case of improved
140 Chapter 6
training, programs for integrating new tradecraft methods have continued, but some
of these techniques remain untested as to whether they truly improve analytical per-
formance or not.41 Most alarming, however, IC budgets have been cut, and some of the
previous tradecraft training has also been reduced. In terms of academic outreach, the
intent of encouraging more analysts to reach out to their counterparts in think tanks,
academia, and the private sector has not really grown. Indeed, the era of WikiLeaks
and Edward Snowden has caused senior intelligence managers to be reluctant to
expose their analysts to outside experts. Ironically, the outreach coordinators created
by ICD 205 became in some cases obstacles to greater academic exchanges, as they
created so much red tape and anxiety for analysts that they often just abandoned
efforts to contact nongovernment experts.42
When all is said and done, high-quality strategic intelligence rests on senior intel-
ligence officials as well as analysts taking seriously the mission of providing timely,
accurate, and cogently argued assessments within the limits of the information they
are able to use. It is incumbent on analysts to remain self-aware of their own analyti-
cal biases as well as be willing to alter their assessments as new evidence requires. As
senior intelligence officials such as Richard Kerr have argued, building and improv-
ing a strategic intelligence capability is not something achieved overnight: “Expertise
building cannot be achieved quickly or easily. Analysis is a ‘people’s business’ that
requires hiring, training, and leading the best thinkers. CIA has sought people with
area expertise, technical training, and linguistic skills to assemble the most complete
knowledge of important security issues.”43
In addition, efforts must be made to ensure that adequate priority is placed on con-
ducting strategic analysis despite the constant policymaker demand for more current
intelligence reporting. As another former senior CIA official, Douglas MacEachin, has
argued, weaving together a “comprehensive, detailed tapestry should not, however,
be treated as part of an ‘either-or’ tradeoff with the more concise products delivered
to top policy officials.” Strategic intelligence is more of a capital investment for the
overall intelligence enterprise.44
USEFUL WEBSITES
FURTHER READING
Richard Betts, Enemies of Intelligence: Knowledge and Power in American National Security
(New York: Columbia University Press, 2007).
A compilation of the author’s critiques of strategic intelligence’s role and inevitable
failures.
Center for the Study of Intelligence, Sherman Kent and the Board of National Estimates: Col-
lected Essays (Washington, DC: Center for the Study of Intelligence, 2007).
Provides an excellent description of how Kent constructed the NIE process and how he
viewed strategic intelligence.
Commission on the Intelligence Capabilities of the United States regarding Weapons of Mass
Destruction, Report to the President, March 31, 2005.
https://fas.org/irp/offdocs/wmd_report.pdf.
Most complete postmortem of an intelligence failure on major strategic issues.
Thomas Fingar, Reducing Uncertainty: Intelligence Analysis and National Security (Stanford,
CA: Stanford University Press, 2011).
A practitioner’s examination of how strategic intelligence informs policy, providing use-
ful case histories.
Harold P. Ford, Estimative Intelligence (Washington, DC: Association of Former Intelligence
Officers, 1993).
A early description and assessment by a well-known senior CIA estimates officer of how
national estimates were conducted.
Gregory F. Treverton, Intelligence in the Age of Terror (Cambridge: Cambridge University
Press, 2009).
A former senior official’s view of how strategic intelligence has adjusted to the post-9/11
world.
NOTES
First epigraph: Sherman Kent, “Estimates and Influence,” in Donald P. Steury, ed., Sherman
Kent and the Board of National Estimates: Collected Essays (Washington, DC: Center for the
Study of Intelligence, 1994), 34.
Second epigraph: Thomas Fingar, Reducing Uncertainty: Intelligence Analysis and National
Security (Stanford CA: Stanford University Press, 2011), 72.
.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs
/Est%20on%20Soviet%20Strategic.pdf.
15. ODNI, Prospects for Iraq’s Stability: Some Security Progress but Political Reconciliation
Elusive, National Intelligence Estimate (Update to NIE, Prospects for Iraq’s Stability: A Chal-
lenging Road Ahead), August 2007, https://www.dni.gov/files/documents/Newsroom/Press
%20Releases/2007%20Press%20Releases/20070823_release.pdf.
16. ODNI, The Terrorist Threat to the Homeland, National Intelligence Estimate, July
2007, http://nsarchive2.gwu.edu//nukevault/ebb270/18.pdf.
17. According to one former NIC chairman, the NIC has tried to address the “US factor”
in products in addition to the Global Trends series. Private email with a former senior official,
June 2017.
18. Fingar, Reducing Uncertainty, 55.
19. See ODNI, NIC Global Trends: Paradox of Progress, January 2017, https://www.dni.gov
/files/documents/nic/GT-Full-Report.pdf.
20. Former NIC chairman Thomas Fingar has also commented to the author that when for-
eign officials were asked to share their views of what the United States might do in the future,
many were initially pleased to be asked but ultimately declined to provide any negative com-
ments. Personal email, June 2017.
21. Stephen Marrin, “Why Strategic Intelligence Analysis Has Limited Influence on Ameri-
can Foreign Policy,” Intelligence and National Security 32, no. 6 (2017): 725–42.
22. Douglas MacEachin and Janne Nolan, Discourse, Dissent, and Strategic Surprise: For-
mulating US Security Policy in an Age of Uncertainty (Washington, DC: Institute for the Study
of Diplomacy, 2006). The cases examined include 1979 US policy toward Iran, 1998 threats to
US embassies in East Africa, pre-1979 Soviet military preparations in Afghanistan, 1989 rise
of the Afghan mujahideen (“holy warriors”), and the 1998 Asian financial crisis.
23. Paul Pillar, “Intelligence, Policy and the War in Iraq,” Foreign Affairs 85, no. 2 (2006):
15–27.
24. If one wants further evidence of the commonly held view on Saddam’s WMD programs
driven by intelligence, review Kenneth Pollock, The Threatening Storm: The Case for Invading
Iraq (New York: Random House, 2002), in which the former CIA analyst makes the case better
than the Bush administration for why containing Saddam was not sufficient.
25. An interesting fact is that of the few senators who did read the NIE, almost all voted
against the authorization to use military force, presumably because the full NIE contained a
large number of caveats on its judgments as well as dissenting opinions from the intelligence
analysts of the State Department and the Energy Department. This would suggest NIEs can
have impact if they are actually read carefully.
26. Fingar, Reducing Uncertainty, 108.
27. Fingar, 85–87.
28. Based on defense and intelligence cooperation among the United States and Brit-
ish Commonwealth countries during World War II, the Five Eyes forum includes the US, the
United Kingdom, Canada, Australia, and New Zealand. This forum is where multinational clas-
sified intelligence exchanges are the most frank and complete.
29. Ron Suskind, The One Percent Doctrine (New York: Simon & Schuster, 2006).
30. John McLaughlin, CNN interview, December 10, 2007.
144 Chapter 6
31. See also SSCI, Report on the Intelligence Community’s Pre-war Assessments of Iraq
WMD, July 7, 2004, https://fas.org/irp/congress/2004_rpt/ssci_iraq.pdf.
32. Commission on the Intelligence Capabilities of the United States regarding Weapons
of Mass Destruction, Report to the President, March 31, 2005, “Overview,” 8–9, https://fas.org
/irp/offdocs/wmd_report.pdf.
33. The ISG comprised fourteen hundred inspectors and support staff and issued a com-
prehensive final report on its findings. In three volumes, the ISG systematically assessed the
Iraqi regime’s intents and strategy as well as reviewed the state of Iraq’s delivery systems
and nuclear, chemical, and biological programs. See ISG, Comprehensive Report of the Special
Advisor to the DCI on Iraq’s WMD; 30 September 2004, https://www.cia.gov/library/reports
/general-reports-1/iraq_wmd_2004/. It concluded that Saddam had abandoned his nuclear
program in 1991, believing it was more important to get economic sanctions removed. Further-
more, it found no evidence of any CW or BW and concluded that Saddam wished to deceive his
enemies into believing he retained some WMDs to deter them from attacking him.
34. ISG Comprehensive Report, 151.
35. ISG Comprehensive Report, 9.
36. ISG Comprehensive Report, 169.
37. ISG Comprehensive Report, 172.
38. ISG Comprehensive Report, 174.
39. ISG Comprehensive Report, 176.
40. ICD 205 has been revised since 2008 but not made publicly available. Some intelli-
gence officials have implied that the new version is more cautious than the original one.
41. See Steve Artner, Richard S. Girven, and James B. Bruce, Assessing the Value of Struc-
tured Analytic Techniques to the U.S. Intelligence Community (Washington, DC: RAND Corp.
2016), 1–15, https://www.rand.org/content/dam/rand/pubs/research_reports/RR1400/RR1408
/RAND_RR1408.pdf.
42. See Susan Nelson, “Analytic Outreach: Pathway to Expertise Building and Profes-
sionalization,” in Roger Z. George and James Bruce, Analyzing Intelligence: National Secu-
rity Practitioners’ Perspectives (Washington, DC: Georgetown University Press, 2014), 331.
She highlights some of the challenges to conducting outreach and calls for a more balanced
approach between counterintelligence concerns and analysts’ desire for outside perspectives.
For a more pessimistic view, see Roger Z. George, “Reflections on CIA Analysis: Is It Fin-
ished?,” Intelligence and National Security 26 no. 1 (March 2011): 78, http://www.tandfonline
.com/doi/abs/10.1080/02684527.2011.556360.
43. Richard J. Kerr and Michael Warner, “The Track Record of CIA,” in George and Bruce,
Analyzing Intelligence, 50–51.
44. Douglas MacEachin, “Analysis and Estimates,” in Transforming US Intelligence, ed. Jen-
nifer E. Sims and Burton Gerber (Washington, DC: Georgetown University Press, 2011), 126.
7
The Challenges of Warning
After every crisis there surfaces in the press some obscure intelli-
gence report or analyst purporting to have predicted it, only to have
been foolishly ignored by policymakers. What these claims omit to
mention is that when warnings become too routine they lose all sig-
nificance; when reports are not called specifically to the attention of
the top leadership they are lost in the bureaucratic background noise,
particularly since for every admonitory report one can probably find
also its opposite in the files.
—Henry Kissinger, White House Years, 1979
Warning has a special priority in American intelligence. Were it not for the 1941 Jap-
anese attack on Pearl Harbor, it is debatable whether there would have been such
urgency in establishing the CIA in 1947 or encouraging the growth of the huge intel-
ligence enterprise that exists today. Without the “surprise attack” on December 7,
American intelligence might have remained largely a military service function, with
some diplomatic reporting provided by the Department of State. Instead, the growing
fear of “another Pearl Harbor”—whether from Soviet strategic nuclear missiles in the
Cold War, a catastrophic terrorist attack like 9/11, or a possible massive cyberattack
against the US homeland’s infrastructure—has made warning a major mission of the
US intelligence community. This chapter will describe what warning analysis is and
how the warning process is conducted and organized. In addition, it will present a
short survey of major warning cases, which can then be analyzed for some general
lessons learned and challenges for the future.
145
146 Chapter 7
WHAT IS WARNING?
Not all strategic analyses contain a warning. However, warning invariably involves
detailed examination of intelligence that leads analysts to conclusions that certain
trends are moving in a dangerous direction. Historically, warning has been associ-
ated with a military threat. In fact, the best-known “strategic surprises”—for example,
Pearl Harbor, Adolf Hitler’s 1941 eastern offensive against Joseph Stalin’s armies, the
1950 North Korean attack on the south, and the 1979 Soviet invasion of Afghani-
stan—are most often associated with direct military attacks. For much of the Cold
War, American intelligence was focused heavily on the danger of a Soviet or Chinese
conventional or nuclear attack on the United States or its allies in Europe or Asia. For
example, in 1975 an authoritative definition of “strategic” warning issued by the direc-
tor of central intelligence read, “Strategic warning is defined as the earliest possible
warning that the Soviet Union, the Warsaw Pact, the PRC, or North Korea is consider-
ing military action by its armed forces beyond its borders, or is employing its military
capabilities beyond its borders in ways that might threaten military confrontation
with the United States.”1 Fear of a “bolt-from-the-blue” conventional attack or nuclear
strike motivated American defense planners to argue for a rigorous warning system
that could provide Washington a timely alert to evidence of Soviet preparations for
war. Thus, the warning mission was foremost in the minds of both intelligence offi-
cials and decision-makers.
Like other forms of strategic analysis, there has to be a strong linkage between
intelligence and policy. A longtime military intelligence analyst, Cynthia Grabo,
wrote a major treatment on warning in the 1960s that remains relevant even today.
In it she describes warning analysis as “the considered judgment of the finest ana-
lytic minds available, based on an exhaustive and objective review of all available
indications, which is conveyed to the policy official in sufficiently convincing lan-
guage that he is persuaded of its validity and takes appropriate action to protect
the national interest.”2 Embedded in this citation, as well as in the two epigraphs
that open this chapter, are three key characteristics of good warning: (1) exhaus-
tive study of all available information, (2) development of a set of indicators that
can alert warning analysts of an impending threat, and (3) successful and convinc-
ing communication of that threat to policymakers so they are in a position to take
action. This seemingly simple description of warning process disguises an incred-
ibly elusive result.
Warning in many respects remains the most difficult form of strategic analysis.
First, it requires in-depth strategic intelligence conducted by analysts who under-
stand what effective warning is. Warning intelligence is unique in that it is not just
reporting the latest or most alarmist report received but rather is a careful sorting
The Challenges of Warning147
hand, if the warning is that an adversary has marshaled sufficient forces to conduct a
rapid invasion in a matter of days, it would presumably draw far more attention. There
is always the danger that too many such warnings will be seen as “crying wolf” and
thus will lose their impact with policymakers over time. Decision-makers can worry
that intelligence will often provide a “worst-case analysis” and cause them to over-
react in those cases.
And fourth, it requires that policymakers be convinced to take action that might
avert or at least reduce the impact of such a development. Often policymakers will
wish for more time to deliberate and for more confirming information before they
are forced to take action. Good strategic warning sometimes involves telling policy
makers, “You’ve been warned, and we are not likely to be able to give you much tacti-
cal warning.” Senior officials or military commanders must have an appreciation for
how quickly the situation they face might worsen if they do not act now. To take one
recent example, NATO experts have said that a plausible Russian invasion of a Baltic
state could occur quickly and be completed long before US or other NATO forces are
able to reach the battlefield. Knowing that, policymakers have to weigh the merits of
putting more NATO forces closer to the Baltics and/or raising the tempo and size of
NATO forces that are temporarily rotated into the Baltic states to show the alliance’s
resolve in defending them.5 In sum, warning provided too late is neither strategic
nor helpful.
There is a very unique terminology when talking about warning intelligence. First, one
has to distinguish strategic warning from tactical warning. Intelligence professionals
want to provide as much time as possible prior to a major shift in an adversary’s hos-
tile intent so that policymakers can act to build up US defenses or reposition them, or
at least disperse them so as to blunt any possible military attack. Likewise, other types
of strategic warning might alert policymakers to unfavorable economic or political
trends in key countries that might be moderated by timely American actions. Tactical
warning essentially is intelligence that announces that military hostilities or other
dangerous events are now occurring and the United States must be ready to absorb
whatever military shocks or politico-economic disruptions are underway. The lack of
accurate or timely tactical warning is often the source of many strategic surprises,
even if there has been demonstrable strategic warning given to decision-makers.
strategic suggests that the warning focuses on an event or trend that would have a
major impact on US national interests in a physical way (such as a direct attack on
the US homeland or forces or those of our close allies or partners) or would under-
mine American economic prosperity or political influence abroad. Second, analysts
need to have sufficient information and also enough confidence to determine that the
development has a reasonable probability of occurring within a given time frame that
matters to policymakers. Third, such strategic warning needs to be given enough in
advance so that policymakers are in a position to take actions designed to head off the
danger or at least ameliorate the consequences of the event occurring.
All three characteristics are subject to great debate about what qualifies as a stra-
tegic threat, what is a reasonable probability that analysts and policymakers consider
worrisome, and how much advance warning (i.e., time to prepare) must be given to
allow policymakers to adopt measures to avert some disaster or negative trend. The
simple answer to those questions is that it depends on the issue, the set of conditions
surrounding it, and the current US policies and set of policymakers. Consider that dur-
ing the Cold War, policymakers viewed our greatest threat to be a nuclear war with the
Soviet Union; accordingly, they designed US military forces and intelligence systems
around strategies that could give us maximum survivability and warning time in order
to deter Moscow’s consideration of a first-strike nuclear attack.6 Analysts generally
did not believe there was a high probability of a Soviet preemptive attack so long as
the United States maintained a diversified set of nuclear systems, but even if the prob-
ability was low, the consequences were so high that adequate warning was considered
critical to giving the president time for deciding whether to launch a US counterstrike.
Today, the overriding importance of strategic warning of a Russian attack is lower but
certainly not zero in the era of Vladimir Putin. Instead, the consequences of a military
confrontation with North Korea or emergence of a nuclear Iran seem more threatening
and more probable than another nuclear confrontation with Moscow.
Military threats are not the only ones requiring strategic warning. In today’s world,
there are a variety of plausible scenarios around which advanced warning needs to be
provided:
Warning is easiest when there are easily observable indicators such as the move-
ment or massing of large forces, clear battle lines, and large-scale operations that
require time and large amounts of equipment and personnel. Those indicators are
more easily observed by US reconnaissance satellites and SIGINT systems. The US
intelligence system was largely based on a military type of indications and warning
(I&W) analysis. Analysts would determine what kinds of military actions an adver-
sary like the Soviet Union or now Russia and China might contemplate in Europe or
Asia. This was based on observations of the kinds of military training exercises or
actual combat those militaries have conducted. For example, Russia’s war with Geor-
gia in 2008 and its use of hybrid warfare against Ukraine have provided insights
into the kinds of operations Russia might engage in vis-à-vis the Baltics as well as
what steps it can take to mask or obscure its intentions or actual military presence in
Eastern Ukraine.
I&W analysis amounted to studying how an adversary plans or has used its military
forces. As Grabo defined it, an indicator list is a “compilation of projected, anticipated,
or hypothetical actions which any nation might take in preparation for hostilities or
other inimical actions.7 These indications, however, have to be ones that are clearly
linked to some planned actions as well as be visible or collectable. Typical indicators
of possible military hostilities might include
This notion of black swans also is so ill-defined that it is hard to generalize about
the characteristics that might allow analysts to develop an I&W-style list of indica-
tors. Terrorism might lend itself to such analysis, if the target is a large, multifaceted
organization like al-Qaeda or the Islamic State of Iraq and Syria (ISIS).11 In many
respects, both operated more like military organizations—and their members con-
sidered themselves “soldiers”—which included having identifiable logistics experts,
financiers, bomb makers, and commanders who used a variety of communication
systems and locations. In the case of ISIS, it operated tanks and field artillery, had
organized brigades in Syria and Iraq, and considered itself a state, not just an orga-
nization. Hence, monitoring via technical and human means might yield some indi-
cators of plans and capabilities. Indeed, prior to the 9/11 attacks by al-Qaeda, CIA
director George Tenet remarked that the “system was blinking red,” meaning a lot of
intercepted communications chatter was saying something big was coming.12 On the
other hand, small, self-radicalized cells or “lone wolf” individuals are much harder to
monitor and forecast whether they have the intention and capability to attack unpro-
tected targets. Naturally occurring events such as earthquakes, tsunamis, and pan-
demics are more like mysteries, for which no reliable method exists to forecast with
any precision. Some would argue that Californians have been given strategic warning
that the “big one” is overdue and so the only question is whether citizens are prepared
and whether any better seismic-monitoring system might give them enough tactical
warning to take cover.
1. Collection gaps frequently exist in how a threat will materialize, in what form,
at what time, or where.
2. Deception and denial can magnify existing collection gaps if an adversary
has maintained good operational security, spread disinformation to confuse
analysts, and mastered other deception techniques that cloak its preparations.
3. Misinterpretation and mind-sets can cause analysts to miss signals or dismiss
them as “noise” or disinformation because they do not fit their expectations
of how an adversary would behave.
The Challenges of Warning153
its war plans; these inherently carried important warnings. Special estimates such
as the infamous 1962 special NIE on the Soviet military buildup in Cuba contained
warnings that were insufficient to alert policymakers to Moscow’s intentions regard-
ing support to Fidel Castro’s regime. The 2002 Iraq WMD NIE could also be catego-
rized as a warning analysis regarding Saddam Hussein’s intentions to resume his
nuclear and other programs, even as flawed as it was.
The NIC became even more involved in the warning process when, in 1979, DCI
Stansfield Turner created the national intelligence officer for warning (NIO/W).
Following the strategic surprise of the shah’s fall, he established this new position
to head the national warning system that already existed. The NIO/W was now
directly responsible for providing warning analysis to the DCI and to the policy
community. Accordingly, these duties included becoming an advocate for warn-
ing across the community’s analytical elements but also for improved collection
to reduce intelligence gaps and to improve analysis. As a matter of course, this
individual also would be responsible for overseeing the national warning system
plus coordinating the warning activities of other regional and functional NIOs.
Individual NIOs were in turn responsible for monitoring conditions in their areas of
responsibility and would host monthly “warning meetings” at which agencies could
raise concerns about developments that might lead to political instability, military
conflicts, or other negative consequences. These NIO reports would be inputs to the
NIO/W’s own monthly report to the DCI. In addition, the NIO/W could indepen-
dently raise concerns with other NIOs if he or she believed developments in their
areas were occurring that needed more attention. In this way, the NIO/W could
provide a “second opinion” or act as a “devil’s advocate” when there might be too
much consensus or complacency among analysts regarding a security issue. This,
naturally, could create friction between the NIO/W and his counterparts who might
view this intervention as crying wolf or micromanagement. Depending on the per-
sonality of the NIO/W, the relationship between his office and those of other NIOs
could be collaborative or frosty.
This centralized system of an NIO/W running the national warning system ended
in 2011 when DNI James Clapper eliminated the NIO/W position and directed that
“every analyst is a warning analyst.” The notion that warning constituted an impor-
tant duty of every intelligence analyst was by no means new. Even during the Cold
War and its centralized system of warning, there had been the mantra that every
analyst must be writing assessments that highlight both threats and opportunities
for policymakers. However, with the end of the bipolar military competition and the
proliferation of many nonmilitary threats, the NIO/W seemed to be a legacy of a
bygone era. The national warning system and its entire I&W methodology had been
predicated on an enduring Soviet-American military competition. The NIO/W and
The Challenges of Warning155
the national warning staff were likewise seen as being more military analysts than
experts in political instability, economic crises, or a host of other transnational chal-
lenges. Hence, intelligence officials came to believe that analysts responsible for
each issue were in the best position to warn of any changes that would endanger US
national interests.
That said, individual NIOs continue to be responsible for warning in their regional
and functional areas. More than anything, however, the new mantra was “integra-
tion” of efforts to make the IC a single operation. Hence, holding out warning from
other analytical and collection functions clashed with DNI Clapper’s vision of a more
integrated national intelligence enterprise. To accomplish this, he also established a
new group of national intelligence managers (NIMs)—generally mirroring the sepa-
rate regional and functional areas covered by NIOs—which were now responsible for
ensuring that the IC’s many functions, including warning, were integrated rather than
operating separately from each other. As such, NIMs were responsible for ensuring
that adequate collection as well as analytical resources were available to promote
timely warning.
Having laid out the distinction between strategic and tactical warning and their char-
acteristics and challenges, it is useful to consider some of the more prominent warn-
ing successes and failures. Having done that, the remainder of the chapter will assess
what can be learned from them.
to come by, given excellent Japanese military operational security.15 In the end, one
can say that tactical information on the where, when, and how was lacking regard-
ing Japanese attack plans, so that even with the knowledge that a US-Japan conflict
was unavoidable, few senior Washington officials and military commanders in Hawaii
believed the war would begin there.
also on optimistic Israeli and American assumptions that Egypt would not start a war
it could not win. Described by many such critiques as “the concept,” this assumption
of inferior Egyptian forces being incapable of attacking Israeli air bases or defend-
ing against Israeli air strikes combined with what were seen as past “false alarms”
of Egyptian attacks to dissuade the Israeli military to mobilize again.20 Such deci-
sions led to the near defeat of Israel and a subsequent major reorganization of its
intelligence services. Moreover, US and Israeli analysts failed to understand Egyptian
president Anwar Sadat’s motive for war: he did not presume he would win but that he
could deal Israel a severe blow to its military prowess and sense of security, thereby
regaining the diplomatic initiative. In the United States, the Yom Kippur War also
was a reminder that relying too heavily on foreign governments’ assessments could
be dangerous—a problem that cropped up again in the 1990 Iraqi invasion of Kuwait.
eight-year war between Iraq and Iran. Analysts perceived Iraq to be a war-weary
state, deeply in debt as a result of loans it needed from Kuwait and other Gulf states
to keep its war with Iran going. In assessing Saddam’s views toward Kuwait, analysts
agreed that he had territorial and financial grievances against the Kuwaiti monarchy
but that his saber-rattling military buildups were more of a “shakedown” than war
preparations. Ten days prior to Saddam’s invasion of Kuwait, US policymakers as
well as analysts were reassured by messages from key Gulf allies (especially Egyp-
tian president Hosni Mubarak and Jordan’s King Hussein) that Saddam was bluffing.
George H. W. Bush administration officials appeared divided over the seriousness
of the threat and inclined to study the problem rather than act. In mid-July 1990,
DIA and CIA assessments separately said Iraq was unlikely to use “significant force”
against Kuwait.23
However, as Saddam’s buildup accelerated, some intelligence mind-sets, if not all,
began to perceive that Saddam had the intention to invade if his demands for loan for-
giveness and territorial concessions were not accepted. On July 25, the NIO/W alerted
the White House to this danger, a week before Iraqi forces entered Kuwait. Other CIA
analysts were slow to come around to this, perhaps explaining why the Bush adminis-
tration had not made stronger statements or taken some preparatory actions to deter
Saddam. However, Defense Secretary Dick Cheney, in defense of the administration,
told senators, “All the reports we received from those most directly affected focused
specifically on the proposition that Saddam Hussein will never invade Kuwait.”24
• NIE 11-18-89, November 1989: The Soviet System in Crisis: Prospects for the
Next Two Years
• NIE 11-18-90, November 1990: The Deepening Crisis in the USSR: Prospects
for the Next Year
If fault can be laid on the IC’s doorstep, perhaps it was its overwhelming focus
on Moscow’s economic problems and not imagining how the political system could
be undone by them. Yet, in April 1991, the director of the Office of Soviet Analysis,
George Kolt, prepared a prescient analysis laying out the possibility of political col-
lapse, including a move by hardliners to remove reformers through force and restore
a communist dictatorship. Titled “The Soviet Cauldron,” the analysis warned that
Gorbachev was in deep trouble and that civilian and military opponents of reform
had already put steps in motion so that a military coup was possible. (See box 7.1 for
a more complete set of intelligence findings.) Already alert to Gorbachev’s precari-
ous position, President Bush was less shocked by the announced August 1991 coup
against this hapless reformer as he vacationed in Crimea. Bush stood by Gorbachev,
having also been alerted to other reporting that suggested the coup plotters were
poorly organized and not widely supported.
Box 7.1 April 1991 CIA Analysis: The Soviet Cauldron (Excerpts)
The economic crisis, independence aspirations, and anti-communist forces are breaking
down the Soviet empire and system of governance.
Gorbachev has truly been faced with terrible choices in his effort to move the USSR away
from the failed rigid old system. His expedients have so far kept him in office and changed that
system irretrievably, but have also prolonged and complicated the agony of transition. . . .
[A] pre-meditated, organized attempt to restore a full-fledged dictatorship would be the most
fateful in that it would try to roll back newly acquired freedoms and be inherently destabiliz-
ing in the long term. Unfortunately, preparations for dictatorial rule have begun in two ways:
• [M]ilitary, MVD, and KGB leaders are making preparations for a broad use of force
in the political process.
• A campaign to retire democratically inclined officers or at least move them out of
key positions has been going on for some time.
Any attempt to restore full-fledged dictatorship would start in Moscow with the arrest or
assassination of Yeltsin and other democratic leaders. . . . The long-term prospects of such
an enterprise are poor, and even short-term success is far from assured.
Even a putsch is not likely to prevent the pluralistic forces from emerging in a dominant posi-
tion before the end of this decade.
The current Soviet situation and the various directions in which it could develop over the
short term present us with three possible Soviet Unions over the next year:
• Continuation of the current political stalemate would maintain the current Western
dilemma of developing the proper mix of relationships with contending forces.
• An attempt at the restoration of dictatorship would face the West with a repetition
of Poland 1981 but almost certainly with more brutality and bloodshed.
• An accelerated breakthrough by the pluralists would create the best prospects for
internal and external stability based on cooperative arrangements.
Source: Extracts from a ten-page assessment authored by George Kolt, “CIA Memo, The Soviet Cauldron,” in
Center for the Study of Intelligence, At Cold War’s End: US Intelligence on the Soviet Union and Eastern Europe,
1989–1991 (Washington, DC: Center for the Study of Intelligence, 1993), https://www.cia.gov/library/center-for
-the-study-of-intelligence/csi-publications/books-and-monographs/at-cold-wars-end-us-intelligence-on-the
-soviet-union-and-eastern-europe-1989–1991/art-1.html#rtoc7.
pledged to manage the crisis. The warning did not generate any major US policy ini-
tiative or shift. Subsequent national estimates on the possible outbreak of violence in
Bosnia also elicited little policy response until after President Bill Clinton took office,
when the Serbian-led ethnic-cleansing campaign shocked the conscience of the world
and pressed the new administration to get more involved.
162 Chapter 7
• Yugoslavia will cease to function as a federal state within one year, and will prob-
ably dissolve within two. Economic reform will not stave off the breakup.
• Serbia will block Slovene and Croat attempts to form an all-Yugoslavia federation.
• There will be a protracted armed uprising by Albanians in Kosovo. A full-scale,
inter-republic war is unlikely, but serious intercommunal conflict will accompany
the breakup and will continue afterward. The violence will be intractable and bitter.
• There is little the United States and its European allies can do to preserve Yugoslav
unity. Yugoslavs will see such efforts as contradictory to advocacy of democracy
and self-determination.
Source: DCI, NIE 15–90: Yugoslavia Transformed, October 18, 1990, iii.
In this case, then, the warning of political dissolution was accurate as was its
ominous forecast of violence. However, it failed to move policymakers in a way that
might have tried to head off the violence that lasted from 1991 to 1995. Some crit-
ics believe that the NIE’s presumption that the United States could not prevent the
breakup was not only flawed but also verged into being policy-proscriptive. Others
held the estimate up as an example of how pointless strategic warning analysis can
be when an administration has already formed an opinion and is resistant to revisit-
ing those views.
day, but in the officer’s words, “it will be spectacular,” and multiple and simultaneous
attacks are possible.29
In that sense, the IC had provided “strategic warning.” Publications such as a 1995
NIE on terrorism had already forecast terrorist attacks, even in the United States.30
The DCI’s annual Worldwide Threat Assessment testimonies to Congress from 1998
onward had identified Bin Laden’s shadowy organization as the number-one terrorist
threat. Moreover, in August 2001, in response to a question from President George W.
Bush, the PDB ran a lead item titled “Bin Laden Intent on Striking the U.S. Homeland”
(see box 7.3). Following the attacks, the 9/11 Commission conducted an extensive
investigation that concluded the IC had failed to apply its own warning methods to
al-Qaeda, which contributed to a “failure of imagination.” Also, the Commission cred-
ited poor information sharing by the CIA and FBI that might have identified some
of the nineteen plotters who had already entered the country and were taking flying
instructions.
The 9/11 Commission’s findings remain controversial, as many intelligence
experts defended the IC’s performance in the face of vocal criticisms coming from
the 9/11 victims’ families and many in the public at large.31 The fact that the CIA, its
Counterterrorism Center (CTC),32 and other agencies had repeatedly warned about
Clandestine, foreign government and media reports indicate Bin Ladin since 1997 has
wanted to conduct terrorist attacks in the US. Bin Ladin implied in US television interviews in
1997 and 1998 that his followers would follow the example of the World Trade Center bomber
Ramzi Yousef and “bring the fighting to America.”
The millennium plotting in Canada in 1999 may have been part of Bin Laden’s first serious
attempt to implement a terrorist strike in the US.
Although Bin Ladin has not succeeded, his attacks against the US Embassies in Kenya and
Tanzania in 1998 demonstrate that he prepares operations years in advance and is not
deterred by setbacks.
We have not been able to corroborate some of the more sensational threat reporting, such
as that from a [foreign intelligence] service in 1998 saying that Bin Ladin wanted to hijack
a US aircraft to gain the release of “Blind Shaykh” Umar Abd al-Rahman and other US-held
extremists.
Source: “Bin Ladin Determined to Strike the US,” President’s Daily Brief, August 6, 2001, https://nsarchive2.gwu
.edu/NSAEBB/NSAEBB116/pdb8-6-2001.pdf.
164 Chapter 7
The list of successes and failures in warning tends to highlight some recurring pat-
terns in how surprise happens, even when policymakers are warned. Among the most
typical causes and challenges of effective warning are cognitive biases, organizational
hurdles, and policymakers’ resistance to accepting and acting on warning. However,
a fourth lesson learned is that adversaries often can play on those weaknesses in the
warning process by effective use of deception, disinformation, and denial.
the analysts or policymakers. In 2002, analysts warned that Saddam possessed sub-
stantial WMD stockpiles and might be making progress toward developing nuclear
weapons. There was little real information that pointed to renewed WMD activities,
but collectors also had not been providing any disconfirming information either. So,
in the absence of good information, analysts will always fall back on their assump-
tions about how capable or devious an adversary is. Robert Jervis, a distinguished
political scientist and frequent consultant to intelligence agencies, has famously
written about the power of decision-makers’ perceptions and misperceptions, which
can be far off the mark.33
Doing good warning, then, requires that analysts and policymakers be aware
of their own biases and unproven assumptions about the world and how it oper-
ates. Too often Americans presume that foreign leaders will operate and calculate
the risks and benefits of taking certain actions much as Washington does. In such
instances, analysts conclude that an adversary would not start a war it cannot win or
take an action that would be too risky were it an American decision. Analysts must
guard against such mirror-imaging. Understanding foreign leaders, who have been
raised in very different cultures and for whom risk and benefit may be assessed dif-
ferently, is perhaps the hardest job that analysts face. Historically, the IC has not
done well anticipating how dictators such as Iraq’s Saddam Hussein, Serbia’s Slo-
bodan Milošević, or North Korea’s Kim Jong-un might behave. Warning of foreign
leaders’ erratic, or what some people might consider irrational, behavior poses real
challenges without some resort to different cultural and psychological lenses. At the
least, warning analysis needs to take advantage of structured analytical techniques—
Red Cell analysis, devil’s advocacy, or assumptions checks—that can challenge an
American analytical mind-set.
Organizational Effects
Contributing to many successes and failures is the role that the IC’s own operations
and organizational cultures play in shaping warning. During the Cold War, a cen-
trally directed warning system performed well enough that the United States never
experienced a strategic surprise involving nuclear weapons. The national warning
system was sufficiently reliable, and American nuclear forces were sufficiently sur-
vivable that the Soviets were convinced that a surprise “first strike” could not disarm
the United States. National warning systems, including the sizable specialized warn-
ing staffs and the actions of the NIO/Ws, also were reasonably good at alerting poli-
cymakers to major military buildups. However, the CIA and DIA as organizations
also tended to fall into recognizable and predictable camps regarding the nature
of the Soviet threat. The CIA tended to take a more benign view of Soviet strate-
gic programs, believing Moscow would reason that nuclear war was “unwinnable”
166 Chapter 7
and so achieving strategic parity with the United States was sufficient. On the other
hand, the DIA and the military intelligence services tended to ascribe more ambi-
tious goals, including achieving strategic superiority and “winning” a nuclear war, to
the Soviet leadership. Neither got it exactly right. At times the CIA underestimated
the Soviet strategic programs, while defense intelligence was generally regarded as
taking a worst-case position.
Intelligence organizations also tend to develop a “party line” on warning issues. In
1973, the CIA was confident that Israel’s superior military could not be defeated, so
Egyptian president Sadat would not dare to attack Israel. The CIA also tended to defer
to Israeli intelligence, which also had developed a “conception” that Egypt would not
consider attacking Israel again until its military had vastly improved its air defenses.
Once an analytical judgment has been pronounced within an agency, it takes on an
important foundational basis for all future analysis. Few analysts are willing to con-
test a well-accepted office position. Hence, “linchpin” assumptions, as one senior CIA
official termed them, go unchallenged because they reflect past conclusions that the
agency’s analysts feel obliged to defend. The accepted wisdom that “Saddam was hid-
ing WMDs” or that “Egypt would not start a war it could not win” or that “the Soviets
would not deploy offensive missiles in Cuba” would have been tough for any indi-
vidual analyst to question, much less debunk.
Organizations also share information poorly, which can undermine effective warn-
ing. As seen in the 1941 attack on Pearl Harbor, the army and navy code-breakers were
competing to provide deciphered messages to the few Washington officials privy to
them, and bureaucratic infighting slowed down communication with policymakers.
In the case of 9/11, there was information collected overseas on the plotters, which
the CIA had and did not share with the FBI, and the FBI field offices also had col-
lected information, which it had not provided to its Washington headquarters or the
CIA. For a variety of reasons, each agency saw no reason it should pass its unique
information to each other. This hampered analysts in building a complete picture of
the threat, which had both domestic and international aspects. Since 9/11, there have
been efforts to soften the long-standing need-to-know principle that compartments
information inside organizations or even within an organization’s separate divisions.
The DNI’s call for a “need to share” has helped to break down some of these organi-
zational barriers, but it remains a challenge when so many intelligence organizations
are now involved in monitoring a range of international threats.
It is worth considering whether the transition from a centrally directed warning
system relying on warning specialists to one that places primary warning responsi-
bility on all analysts is working. It presumes a solid understanding of what warning
is and how it must be communicated to policy officials. Yet at the moment there is
very little formal warning training, especially in civilian intelligence agencies such as
The Challenges of Warning167
the CIA. Moreover, it presumes that effective warning can be produced through the
normal analytical production methods, when warning is as much an art as a science.34
As troubling, the DNI’s latest moves away from old-style warning to something now
termed “anticipatory” intelligence has created a new concept in need of further defini-
tion. As articulated by the DNI, “anticipatory intelligence is the result of intelligence
collection and analysis focused on trends, events, and changing conditions to identify
and characterize potential or imminent discontinuities, significant events, substantial
opportunities, or threats to U.S. national interests.”35
To some analysts, anticipatory intelligence is nothing more than new jargon for
what has long been called strategic and warning analysis. But that definition fails to
highlight the need to provide advanced skills to analysts or to develop mechanisms
for passing such anticipatory intelligence to policymakers who can take action. At
a minimum, more needs to be done to foster the skills for such missions regardless
of what one calls it. In partial recognition of the need to do more, the NIC now has a
special adviser on warning, whose mission might appear to be advocating for more
attention to warning issues. At the time of this writing, that adviser appears to lack the
substantial staff or authority previously held by the NIO/W.
Some of the aforementioned cases of warning also show that, confronted with
growing evidence of possible military conflict (e.g., the 1979 Soviet invasion of
Afghanistan) or ethnic violence in the former Yugoslavia (the 1990–95 breakup and
the Bosnian War), neither the Carter administration nor the Bush administration
wanted to take action. In the former case, it was the wishful thinking that Moscow
would not want to jeopardize its relations with Washington; further, it would under-
mine a strategic arms treaty that Congress would most likely reject if the Soviets
invaded. In the latter case, it was the Bush administration’s hopes that Europeans
would manage the Yugoslav crisis and that it could avoid involvement while it dealt
with more pressing problems such as the dissolution of the Soviet Union and the
Gulf War. In both cases, warning was provided but just not acted on. From the ana-
lysts’ perspective, this might seem irresolute or even irresponsible. But from the poli-
cymakers’ perspective, this is their choice to make. What often happens, however, is
policymakers will later lament that the IC had not effectively communicated their
concerns, had not highlighted the consequences, or had played down the probability
of such dire events occurring.
own military operations, whether it is “little green men” (soldiers wearing uniforms
that bear no unit designations) or conducting hybrid warfare through the use of
“volunteers.”
Operational security—steps used to prevent the IC from intercepting sensitive
communications—also has been a commonplace technique for hostile militaries but
also for terrorist groups. The Japanese maintained radio silence between Tokyo and
its fleet in the Pacific. The Soviet and Russian military have routinely encrypted com-
munication systems to keep military plans secret and also routinely put out misinfor-
mation to disguise their true intentions. Even al-Qaeda and ISIS are wise to the ways
of operational security. They learned to avoid using cell phones or any Internet sites
that would be susceptible to American intelligence collection, opting instead for cou-
riers and other low-tech methods of communication. Use of the “dark Web” and heavy
encryption also can shield terrorist and other illicit operations from US intelligence
and law enforcement. Likewise, if such groups suspect that the IC is listening, they
will invoke euphemisms or code words to describe their planned activities. Terrorist
cells and their networks are by their very nature decentralized, making it harder to
uncover all of their plots by capturing a key leader or a terrorist cell’s computers and
mobile phones.
When all is said and done, warning remains the most difficult but most important
task for intelligence. As the previously discussed cases illustrate, the IC’s record of
warning successes and failures is mixed. Improving it has proven difficult, espe-
cially as the types of warning issues have moved from strictly military problems
into transnational issues, where there are fewer secrets and more mysteries. Richard
Betts, who has written widely on intelligence and strategic surprise, has concluded
that “intelligence failures are inevitable.” In his view, surprise occurs most often by
policymakers’ inability or unwillingness to accept warnings and act on them. So long
as warning information remains ambiguous—that is less than certain—then policy
makers will harbor the illusion that somehow intelligence should have been better or
needs to be improved.36 On the other hand, intelligence faults should not be excused
entirely. Other scholars have argued that providing strategic warning is seldom
enough to avoid strategic surprise.37 But good strategic warning can alert the IC to
devote more collection and analytical resources to develop tactical warning. Thus,
specific measures to expand collection that reduces information gaps on strategic
warning issues can be made; moreover, strategic warning should put analysts on
notice that they also need to review their assumptions and mind-sets that may have
lulled them into complacency.
170 Chapter 7
At the same time, however, policymakers must be more attuned to what the IC is
communicating and also to telling their intelligence counterparts which issues are of
most concern to them, about which they need to be warned. As one seasoned intelli-
gence analyst concluded, “To expect to predict or prevent any and all surprises is not
reasonable. But it is unreasonable to expect that intelligence analysts will not make
mistakes, just as policymakers have and will.”38
USEFUL DOCUMENTS
FURTHER READING
Erik Dahl, Intelligence and Surprise Attack: Failure and Success from Pearl Harbor to 9/11 and
Beyond (Washington, DC: Georgetown University Press, 2011).
Author makes the case that tactical intelligence failed to provide sufficient warning in
both cases.
John Gentry and Joseph Gordon, Strategic Warning Intelligence: History, Challenges, and
Prospects (Washington, DC: Georgetown University Press, 2019).
The most recent and definitive treatment of warning by two recognized warning
practitioners.
Cynthia Grabo, Anticipating Surprise: Analysis for Strategic Warning (Lanham, MD: Univer-
sity Press of America, 2004).
One of the earliest, and now declassified, treatments of the warning problem, which
remains a classic.
Robert Jervis, Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War
(Ithaca, NY: Cornell University Press, 2010).
Author compares warning failures of these two cases and analyzes their causes and
impacts.
Janne Nolan and Douglas MacEachin, eds., Discourse, Dissent, and Strategic Surprise: Formu-
lating U.S. National Security Policy in an Age of Uncertainty (Washington, DC: Georgetown
University Institute for the Study of Diplomacy, 2006).
The Challenges of Warning171
Authors review a series of lesser-known cases where intelligence warnings were pro-
vided but not heeded by policymakers.
Roberta Wohlstetter, Pearl Harbor: Warning and Decision (Stanford, CA: Stanford University
Press, 1962).
Study remains the classic description of an intelligence warning failure, arguing that too
much noise disguised available signals of a Japanese attack.
NOTES
First epigraph: John McCone quotation in the CIA’s Historical Intelligence Collection, as cited
in Charles E. Lathrop, The Literary Spy: The Ultimate Source for Quotations on Espionage and
Intelligence (New Haven, CT: Yale University Press, 2004), 411.
Second epigraph: Henry Kissinger quotation from his memoir White House Years, cited in
Lathrop, Literary Spy, 413.
10. Nassim Taleb, The Black Swan: The Impact of the Highly Improbable (London: Penguin,
2008).
11. Roger George and James Wirtz, “Warning in an Age of Uncertainty,” in George and
Bruce, Analyzing Intelligence, 225.
12. See George Tenet, At the Center of the Storm: My Years at CIA (New York: Harper
Collins, 2007), 133–74. Although a “hindsight” reflection, the chapter titled “They Are Coming
Here” recounts the CIA director’s unsuccessful efforts to draw attention to the grave danger of
a major attack in the spring and fall of 2001. It illustrates that warning messages may not be
convincing enough to produce action.
13. See the excellent description of the I&W methodology and strategic warning in John A.
Gentry and Joseph S. Gordon, Strategic Warning: History, Challenges, and Prospects (Wash-
ington, DC: Georgetown University Press, 2019).
14. Roberta Wohlstetter, Pearl Harbor: Warning and Decision (Stanford, CA: Stanford Uni-
versity, 1962).
15. Erick Dahl, Intelligence and Surprise Attack: Failure and Success from Pearl Harbor to
9/11 and Beyond (Washington, DC: Georgetown University Press, 2013).
16. See Eric Dahl, “Testing the Argument: Classic Cases of Surprise Attack,” in Dahl, Intel-
ligence and Surprise Attack, 69–70.
17. The volume by Graham Allison and Phil Zelikow, The Essence of Decision: Explaining
the Cuban Missile Crisis (New York: Longman, 1999), remains widely read and an authorita-
tive treatment of how Kennedy and his advisers negotiated the removal of missiles during the
thirteen-day crisis.
18. See his defense in Sherman Kent, “A Crucial Estimate Relived,” Studies in Intelligence
(Spring 1964), declassified, https://www.cia.gov/library/center-for-the-study-of-intelligence
/csi-publications/books-and-monographs/sherman-kent-and-the-board-of-national-estimates
-collected-essays/9crucial.html.
19. David S. Robarge, “CIA Analysis of the 1967 Arab-Israeli War,” Studies in Intelligence
49, no. 1 (April 2007), https://www.cia.gov/library/center-for-the-study-of-intelligence/csi
-publications/csi-studies/studies/vol49no1/html_files/arab_israeli_war_1.html.
20. See Ephraim Kahana, “Early Warning Concept: The Case of the Yom Kippur War 1973,”
Intelligence and National Security 17, no. 2 (2002): 81–104.
21. Extracted and quoted from IIM Soviet Operations in Afghanistan, found in Janne Nolan
and Douglas MacEachin, eds., Discourse, Dissent, and Strategic Surprise: Formulating U.S.
National Security Policy in an Age of Uncertainty (Washington, DC: Georgetown University
Institute for the Study of Diplomacy, 2006), 55.
22. Nolan and MacEachin, 62–63.
23. CIA and DIA assessments are described in John Diamond, The CIA and the Culture
of Failure: U.S. Intelligence from the End of the Cold War to the Invasion of Iraq (Stanford, CA:
Stanford University Press, 2008 ), 141–56 and 126–27, respectively.
24. Diamond, CIA and Culture of Failure, 139–40.
25. For a defense of the CIA’s record on tracking the Soviet decline, see Bruce Berkowitz,
“Intelligence Estimates of the Soviet Collapse: Perception and Reality,” International Journal of
Intelligence and Counterintelligence 21 (2008): 237–50, https://www.cia.gov/library/reading
room/docs/20080229.pdf.
The Challenges of Warning173
26. Cited in Jon Meacham, Destiny and Power: The American Odyssey of George Herbert
Walker Bush (New York: Random House, 2015), 383.
27. National Security Adviser Brent Scowcroft, a retired US Air Force lieutenant general,
had served as assistant air attaché in Yugoslavia in the early 1960s, and Deputy Secretary of
State Lawrence Eagleburger had been ambassador there in the late 1970s.
28. See Tenet, Center of the Storm.
29. Tenet, 151–52.
30. 9/11 Commission, Final Report of the National Commission on the Terrorist Attacks
against the United States, 341, https://www.9-11commission.gov/report/911Report.pdf.
31. See Paul Pillar’s critique of the 9/11 Commission’s work blaming the CIA and using the
9/11 attacks for justifying the unnecessary intelligence reforms that created the ODNI and the
NCTC. Paul Pillar, Intelligence and U.S. Foreign Policy: Iraq, 9/11, and Misguided Reform (New
York: Columbia University Press, 2011).
32. The CIA’s Counterterrorism Center (CTC) is primarily focused on the collection of
human intelligence on terrorist organizations and has a small number of targeting analysts
assigned to it. The National Counterterrorism Center (NCTC), created in 2004 and run by
the DNI, has overall responsibility for coordinating counterterrorism policies as well as for
producing finished intelligence analysis on counterterrorism threats. As part of a major orga-
nizational modernization in 2015, the CTC was combined with elements of the directorate of
operations and renamed the Mission Center for Counterterrorism.
33. Robert Jervis, Perception and Misperception in International Politics (Princeton, NJ:
Princeton University Press, 1976).
34. See Gentry and Gordon, Strategic Warning, 82–89. The authors are generally critical
of the abandonment of a national warning system in which trained “warning analysts” would
devote their full attention to monitoring worrisome trends and for which formal training in
warning methodologies as well as foreign D&D techniques were emphasized.
35. ODNI, The National Intelligence Strategy of the United States, February 2014, 7, https://
www.dni.gov/files/2014_NIS_Publication.pdf.
36. Richard Betts, Enemies of Intelligence: Knowledge and Power in American National
Security (New York: Columbia University Press, 2007), 19.
37. Dahl, Intelligence and Surprise Attack, 176.
38. John Hedley, “Learning from Intelligence Failures,” International Journal of Intelli-
gence and Counterintelligence 18, no. 2 (February 2007), 447.
8
Intelligence Support
as Policy Enabler
174
Intelligence Support as Policy Enabler175
and operational targeting. Providing such tactical support also raises some wicked
choices about how to spread limited resources across a vast list of targets and how to
satisfy both national and military intelligence users.
Once decision-makers have assessed a particular issue, considered the relevant
intelligence, and evaluated their possible courses of action, they announce a policy
or set in motion diplomatic, economic, or military actions. But intelligence is not fin-
ished supporting policy. In the case of North Korea, a presidential decision to pres-
sure Pyongyang to stop and eventually give up its nuclear weapons program may
include new diplomatic measures to isolate North Korea or to generate international
agreement to impose new economic sanctions. It might also involve military mea-
sures to strengthen South Korean missile defenses or other measures short of war. In
a worst case, a president might determine that some preemptive action is needed to
avert North Korean achievement of an intercontinental-range nuclear weapon system
that could directly threaten the United States homeland. Intelligence will play a role
in all aspects of American actions vis-à-vis Pyongyang.
Looking at this one example, one can envision a wide variety of intelligence analy-
sis or operations that can support different elements of an American strategy to con-
tain and curtail North Korean nuclear proliferation threats. Table 8.1 lays out some of
those types of direct intelligence support that policymakers might expect or ask for.
In these ways, intelligence is an “enabler” of US policy instruments—diplomatic, mil-
itary, economic, and informational. In the diplomatic field, intelligence can provide
assessments of how key foreign governments might react to American proposals in
international forums such as the UN Security Council and Asian regional security
organizations. At the same time, intelligence might be asked to provide briefings or
unclassified white papers (official reports not identified as written by intelligence
agencies)1 assessing North Korea’s nuclear programs, which can be used with allied
governments and publics as part of a “public diplomacy” campaign. As the inter-
national community, led by the United States, has imposed strenuous economic
sanctions on North Korean trade and financial dealings, intelligence is expected to
monitor and report on the impact those sanctions are having and whether any viola-
tions are occurring that need to be addressed. Potential military options will require
the intelligence community to identify key nuclear and missile facilities, their vul-
nerabilities, and their susceptibility to military or potentially nonkinetic attacks
(e.g., cyberattacks) designed to disable or destroy Pyongyang’s nuclear and missile
programs.
As will be discussed in the next chapter, some intelligence planning could poten-
tially go into covert action operations designed to discredit or weaken the North
Korean regime’s stability or status as well as disrupt its military programs. In each
case, intelligence can provide “opportunity” analysis that highlights the regime’s
Table 8.1. Intelligence as Policy-Support “Enabler”: Examples for North Korea
Diplomatic Policy Economic Policy Informational Policy Military Policy
CURRENT INTELLIGENCE
devoted to the production of daily publications. This office—as opposed to the Office
of National Estimates—focused on fast-breaking events. Its Current Intelligence Bul-
letin (CIB) was produced for the president and senior officials. Over time, the OCI
broadened the distribution of its daily publication while also writing a version—later
known as the President’s Daily Briefing—exclusively for the president. These CIB pub-
lications were notable for their brevity and lack of deep analysis; they were intended to
be quick updates on breaking events, not strategic assessments of long-term trends.
As box 8.1 illustrates, early current intelligence reports covered in a few pages a half
dozen topics that summarized a day’s events with only brief comments on their sig-
nificance. In these excerpts on Korea, analysts reported on recent announcements by
the Chinese government regarding termination of 1950–53 conflict. This would have
been a high priority topic for President Eisenhower, who inherited the UN military
operation from the outgoing Truman administration and had pledged to end it.
Such CIA current intelligence products got lengthier and more sophisticated
over time as policymakers demanded coverage of more aspects of the Cold War.
What began as the CIB evolved into the National Intelligence Daily (NID), which
was distributed to dozens of senior officials in the NSC, the State Department, and
the Defense Department as well as to other intelligence agencies. The NID became
for many decades the document of record regarding what CIA analysts were report-
ing on a daily basis. In the intervening years, the information technology revolution
The Neutral National Inspection Team at Sinanju, North Korea, reported on 16 September
that it had received official notification that seven Chinese Communist divisions would leave
Korea starting next week. The movement, under the surveillance of the NNIT will consist of
ten trains daily, each composed of from 20–24 cars.
By permitting NNIT surveillance for the first time, the Communists are attempting to
strengthen their case in the UN General Assembly against expected moves to terminate
the mission of the teams. If these divisions are infantry units, their withdrawal would reduce
Chinese strength in Korea from 709,000 to 604,000.
Sources: CIA, Office of Current Intelligence, Current Intelligence Bulletin, approved for release January 16, 2004.
Intelligence Support as Policy Enabler179
and decision-makers’ need for rapid intelligence support pushed the transformation
of the NID into a quicker publication called the Senior Executive Intelligence Brief
(SEIB); that then morphed into an even more sophisticated daily publication called
the Worldwide Intelligence Report, or WIRe. As its acronym conveys, this is very
user-friendly and electronically distributed to other civilian decision-makers, military
commanders, and intelligence agencies across the government and overseas.
Other intelligence agencies, however, were also providing daily publications and
briefings for their departmental customers. At the DIA, intelligence analysts prepare
daily summaries of politico-military developments around the world. The DIA is
responsible for supporting not only the secretary of defense and his civilian defense
experts throughout the Pentagon but also for supporting the Joint Staff and the
military combatant commanders around the globe. Short intelligence items, termed
Defense Intelligence Notices (DINs), were compiled in two daily publications called
the Defense Intelligence Summary (DINSUM) and the Military Intelligence Digest
(MID). These products aimed at providing “situational awareness” wherever US
defense forces or interests were at risk; naturally, they primarily reported foreign mili-
tary capabilities and threats as well as related political and economic developments
that would impact US defense policies. In comparative terms, the DINSUM and the
MID were equivalent to the CIA’s NID, SEIB, and the later WIRe publications. Like the
CIA, the DIA produced a more exclusive intelligence summary for the secretary of
defense and chairman of the Joint Chiefs of Staff called the Morning Summary, which
was not widely circulated and emulated the PDB in terms of its sensitivity and narrow
distribution. The DIA also supported the J-2’s daily Chairman’s Brief, which was an
oral presentation of the most important topics with PowerPoint slides that could be
later circulated electronically to some other parts of the Pentagon.3 The agency also
set up a special office that provided direct support to senior customers in the Penta-
gon via a system of briefers.
These intelligence products could run more than two dozen pages as they
attempted to update politico-military events wherever US defense interests were at
stake; their customers might be officials in the Pentagon, on the Joint Staff, or over-
seas commanders in Europe, Asia, or the Middle East. Depending on the individual
users’ interests, some daily items had direct relevance, while other updates would be
far outside a reader’s area of responsibility. Given their broad distribution, they often
did not contain the most sensitive defense information. The example provided in box
8.2 illustrates how the DIA was obliged in the 1960s to follow political events that
might impact the US military campaign in Vietnam. Defense intelligence analysts
were assessing how China would react to President Lyndon Johnson’s decision to
halt the bombing campaign against North Vietnam, and they concluded it would not
result in any major Chinese shift in commitment to Hanoi or its defense production.
180 Chapter 8
No Chinese Communist military reaction to the pause in US air strikes in North Vietnam has
been detected.
Peiping has, however, issued a stinging restatement of its position on Vietnam. An edito-
rial in the authoritative Party organ, People’s Daily, of 1 January asserted that the US was
merely spreading a peace smokescreen to conceal preparations for an expanded war and
that “unconditional discussions” meant “unconditional surrender.” Chinese efforts to pre-
vent any peace talks are, therefore, likely to continue.
A spate of year-end reports out of Peiping noted Chinese industrial achievements during
1965 and announced the beginning of the long-awaited Third Five-Year Plan on 1 January. . . .
The Chinese expect progress to be slow and calculate it will take from 20 to 30 years for
their economy to surpass those of “advanced countries.”
The new plan shows some signs of being especially tailored to meet commitment in Vietnam
and to a possible showdown with the US. People’s Daily said on 31 December that national
defense would be bolstered and basic industry, communications, and transport strength-
ened. . . . Chinese leaders indicated that they were still primarily concerned with economic
priorities and feared that emphasis on military production would have adverse effects on
food production.
Source: Freedom of Information Act release, Defense Intelligence Summary, #10–66, January 13, 1966.
While large intelligence agencies such as the DIA and CIA produce current prod-
ucts for their many customers on a diverse set of security topics, smaller intelligence
agencies tend not to produce daily reports but rather issue current intelligence
reports when developments warrant it or when tasked by specific policymakers to
assess a particular topic they are following. For example, the State Department’s
Bureau of Intelligence and Research has adopted this model. For a time, INR strug-
gled to produce a daily current intelligence product comparable to CIA and DIA
publications; of course, it focused on a range of topics of interest to a secretary of
state and the assistant secretaries responsible for regional diplomatic policies, nego-
tiations, or other politico-military affairs. This document was known as the Secre-
tary’s Morning Summary. Like the NID and the DINSUM, it covered a dozen or more
topics but had to do that in no more than a dozen pages. The Secretary’s Morning
Summary was welcomed by many secretaries of state because it addressed issues
they cared about; however, in many ways it duplicated what was found in CIA publi-
cations. Moreover, INR has only a very small cadre of intelligence analysts and so its
leadership decided in the early 2000s to discontinue producing a daily intelligence
Intelligence Support as Policy Enabler181
First Reaction: The North’s initial response to the news of Patriot deployments, an unattrib-
uted commentary issued yesterday, is typical of what Pyongyang does in the initial stages
of a new situation: the North wants to record its strong opposition without committing itself
to any line of action while it sorts out its options. A higher-level, more definitive response—a
NoDong Sinmum editorial or a foreign ministry statement, for example—awaits leadership
decisions that usually take several days.
Though mostly a pastiche of themes that have appeared in other commentaries over the
past month, this first response to the Patriots is clearly intended to signal that, at least for
now, there has been no decision to back away from diplomatic engagement with the United
States on the nuclear issues.
Breathing space
The commentary notes that the Patriots have not yet arrived and that the deployment is still
only a “plan.” By portraying the process as in an early phase, the North has given itself room
to maneuver. . . . The characterization of the plan to introduce Patriots as an “unpardonable
grave military advantage,” and the warning that pressure on the North may lead to a “catas-
trophe,” are not unusual, especially in this sort of low-level, unattributed piece.
product and move toward more tailored intelligence reports for specific senior dip-
lomatic officials. That said, it was not uncommon for some occupants of the White
House to complain that they liked the writing style found in the Secretary’s Morning
Summary and learned more from it than they did from CIA publications. As box
8.3 demonstrates, this discontinued intelligence product might focus on coercive
diplomatic efforts, such as the 1994 movement of US Patriot antimissile batteries
to South Korea (“DPRK” referring to the Democratic People’s Republic of Korea, or
North Korea).
actionable current intelligence publication that the IC produces. This daily summary
of current events designed for the president has been a feature of US intelligence
since Harry Truman first requested a consolidated digest of intelligence drawn from
all government sources. The CIA produced this first compilation of intelligence
reporting, then called the Daily Summary, beginning on February 15, 1946. It was a
simple, two-page document focused principally on Cold War issues emanating from
Germany, Yugoslavia, Turkey, and China.4 From then on, each successive president
has received a daily summary of the most sensitive reporting on the world’s hot spots
that threaten US national security interests. In the early days, this daily publication
carried a variety of names (e.g., Current Intelligence Bulletin and the President’s Intel-
ligence Checklist) and formats; it was not until 1964 when it became formally known
as the President’s Daily Brief. Given a president’s crowded schedule, the document
seldom exceeded more than a dozen pages. Former CIA director Allen Dulles termed
it “snappy, short, but at the same time fairly comprehensive” in its effort to cover the
past twenty-four hours of world events that mattered.5 Until the 1980s, the existence
of the PDB was not widely known.
The PDB began as an exclusively CIA publication, although periodically other
agencies’ analysts were invited to submit articles or to provide their own comments
on and dissents to the CIA’s analysis. After 2005, with the creation of the Director of
National Intelligence, the DNI became responsible for preparing the PDB. Thus, the
PDB is now a community product that can contain articles prepared by other analytical
offices at INR, the DIA, and others. For many at the CIA, loss of exclusive control over
the PDB to the DNI was an emotional blow, from which analysts have gradually recov-
ered. In fact, CIA analysts continue to prepare most PDB items. In reality, most other
agencies’ analysts consider their department’s officials, not the White House, to be
their principal customers, and they dread the complicated and time-consuming PDB
coordination process. Although the DNI oversees its preparation, the PDB is reviewed,
edited, and assembled at CIA headquarters. Thus, in practical terms, the PDB remains
a largely CIA product, and as former CIA director Robert Gates put it, “Writing for the
PDB . . . was the reason for our existence.”6
Several things distinguish the PDB from other current intelligence reporting. First,
its exclusivity allows for the inclusion of extremely sensitive intelligence and more
explanation of sources (including very restricted SIGINT and HUMINT reporting)
than would otherwise be permitted in daily publications distributed broadly through-
out the government. For more than a few decades, the very existence of the PDB was
not disclosed beyond the Oval Office or the CIA. The document was considered so
sensitive that it was sent via courier and retrieved after the president finished with it.
The PDB was truly the president’s document. Accordingly, each president has
established his own list of recipients. It is not unusual for that list to be extremely
Intelligence Support as Policy Enabler183
narrow at the beginning of an administration. In a few cases, only the president and
his national security adviser have initially received the PDB. Vice presidents did
not regularly see the PDB until Gerald Ford held that office. Typically, however, as a
president’s time in office lengthened, more recipients would be added. This becomes
almost unavoidable, as items in the PDB could prompt a president to start a discus-
sion with his secretaries of state and defense about an issue. Hence, it soon proved
necessary to include those senior officials, in addition to the national security adviser.
As often as not, the eventual distribution list will include—in addition to the presi-
dent, vice president, and national security adviser—the White House chief of staff,
the secretary of state, the secretary of defense, and the chairman of the Joint Chiefs
of Staff. In most instances, each of these officials’ deputies (who attend the Depu-
ties Committee meetings where presidential policies are often hashed out) will also
receive the PDB. Hence, depending on a president’s style and comfort with intelli-
gence sharing, the list could range from a handful to a dozen or more senior officials
across the government. Since 9/11 and the growing concern about terrorism, the PDB
has been provided to the FBI director and the secretary of homeland security, as they
now carry major national security responsibilities for protecting the homeland.
A second characteristic unique to the PDB is that it is redesigned to suit each presi-
dent’s own preferences. Formatting and length will change to suit a president who is a
comfortable or uncomfortable reader. The use of graphics, maps, and photo imagery
augment the attractiveness of the publication. For example, a typical PDB might show
charts of increased Chinese military spending over time or photos of the latest North
Korean missile launch site or nuclear test. If a president was particularly interested
in a topic, the PDB might carry a special analysis or include raw clandestine or dip-
lomatic reporting on that topic. In its latest iteration, the PDB is now provided on a
classified iPad so that each of the articles is available electronically. Its virtues include
good graphics and more storage so that additional reporting and other intelligence
products can be loaded onto the iPad should a recipient have further questions raised
by a PDB item.7
A third unique feature of the PDB is its production process and presentation. Each
morning, analysts will review their message traffic and determine if a current intel-
ligence item needs to be prepared; only a few of these current items are ever judged
of “presidential level” interest. For example, President Trump is likely interested in
statements issued by North Korean leader Kim Jong-un and how they should be inter-
preted or the latest missile tests conducted by Iran. Those items will receive much
more extensive review by analysts and their supervisors, knowing that they must pass
muster with senior intelligence officials before they will be included in the PDB. An
analyst might spend a day or more writing, revising, and coordinating the article with
other analysts across their agency and the IC more broadly. Once that is finished, PDB
184 Chapter 8
editors will examine the item to determine whether it would be of high-level interest
and reflects critical information or analysis that would be new to the president. Even
after the item is edited and approved by the editorial staff, the analyst’s job is not
yet done. Presuming that this article will appear in the next day’s PDB, the analyst is
obliged to arrive at the office in the early hours that next day to review any new infor-
mation that came in during the night that might require revising the article.
In addition, the PDB has become the only current intelligence product that regularly
is conveyed by a “briefer.” Since the days when the PDB was transported via courier,
those individuals have now become senior-level briefers of the PDB for the recipients.
Depending on the president (and other recipients), the briefer may simply hand over
the document, or the briefer might highlight or summarize orally the key items. That
means the president (as well as other recipients) will have several analysts assigned to
provide him his daily intelligence brief. Analysts selected for such assignments have
to be more than just good analysts; indeed, they must be fast learners, well spoken, and
have thick skins for tough feedback provided to them by demanding c onsumers. These
briefing assignments are coveted positions, as they come to know what the president
is interested in, how much information he has already received on any given topic, and
what particular complaints or kudos he has for the PDBs he has received.
This daily feedback is very important for shaping the intelligence reporting to
suit presidential needs. Equally important, it also motivates analysts to undertake
the onerous PDB process for a president and other senior officials when they know
their work has impact. Hence, the analyst drafting a PDB will be expected to meet
the president’s briefer on that early morning in order to prepare the briefer for
follow-up questions that the president might have about the piece. Typically, PDB
briefers also want to hear from the analyst how good the sourcing is, in case the
president probes on “how we know something” or asks how confident the IC is in
these judgments.
Early each morning, PDB briefers spread out across Washington, DC, to their
respective recipients, prepared to hand over their documents, explain items, take
follow-up questions, and return to their offices to debrief senior intelligence officials
and analysts on how the PDB was received. In the case of the White House, PDB
briefers will often provide separate briefings to the national security adviser and pos-
sibly the vice president prior to briefing the president, when those individuals and
others such as the chief of staff might also be in attendance. A former PDB briefer for
President George W. Bush, Michael Morell, described his preparation process in the
following fashion:
It was my job to deliver the PDB—five days a week during the transition
and six days a week after the inauguration. I’d start work at 4 a.m., sifting
Intelligence Support as Policy Enabler185
through the most critical pieces of current intelligence and analysis, decid-
ing which ones to present and in what order, cramming additional infor-
mation on each topic into my head in case the president or any of the
others in the room—almost always Vice President Dick Cheney, National
Security Adviser Condoleezza Rice, and White House Chief of Staff Andy
Card—had additional questions, as they almost always did. . . . It was like
preparing to orally defend several graduate school dissertations every day,
six days a week.8
A final educational feature of the PDB is worth mentioning. When incoming presi-
dents receive their initial PDB briefing, it is often their first exposure to intelligence.
Traditionally, during election campaigns, major candidates will receive several gen-
eral briefings; however, the president-elect will begin to get the full PDB only after the
election. Thus, the PDB process becomes a way of educating a president and other
recipients not only on the wide range of national security topics but also about what
the intelligence community can provide. Over a presidential term of four or possibly
eight years, presidential learning curves will flatten out, so material presented in the
PDB at the start of an administration is most likely far too general and unfocused for
a seasoned president. The president will become more knowledgeable about foreign
affairs and perhaps more demanding of intelligence as time goes on. In cases where
presidents receive the PDB briefer each day and develop a good working relationship,
they can push intelligence to provide far more insight than those who do not meet
regularly with their briefers.
The PDB process also educates the IC about presidential style and needs. It can
help to determine how much and what kind or forms of information a new president
wants. Sadly, this process takes some time before a new president can come to trust
the IC is working for him and not his predecessor. Even so, most cabinet officials privy
to the PDB feel obliged to review it since they know it is available to the president,
vice president, and the national security adviser. At the moment, it is far from clear
whether President Trump has developed a real relationship with the PDB briefer or
any familiarity with how this document can serve him. The few media reports on how
Trump approaches intelligence suggest that the PDB writers have tried to focus on
economic topics, using graphics as much as possible.9
The PDB and National Intelligence Estimates garner the most attention of outside
observers of the IC’s work, but there is much more specialized policy-support work
that seldom if ever is noticed or understood. These types of policy support range
186 Chapter 8
from intelligence provided to diplomats for negotiations, to that used to support mili-
tary and civilian crisis managers, to intelligence supporting ongoing operations to
counter other threats, such as terrorism, proliferation, and drug trafficking. Describ-
ing a few such examples will illustrate how different these activities are from strategic
analysis, warning, or current intelligence reporting.
National technical means is the term referred to in many bilateral US-Soviet arms control
agreements when referring to each country’s reliance on its own national intelligence assets
to monitor compliance with the SALT, ABM, INF, and START I Treaties’ limitations. US reliance
on its NTM practically means using its multidiscipline intelligence collection systems of all
kinds. However, it has traditionally meant heavy reliance on nonintrusive overhead recon-
naissance satellites that collect SIGINT and imagery of weapon sites, test ranges, produc-
tion facilities, and other significant aspects of an opponent’s military capabilities that are
covered by a specific treaty. In fact, the design and deployment of overhead surveillance
systems in the 1970s and 1980s essentially focused on monitoring Soviet capabilities and
helped to make arms control agreements possible.
In some of those treaties, each party also agreed to certain “cooperative measures” that
would allow NTM to monitor compliance with key treaty limitations. Some of these included
banning the use of camouflage or coverings over missile sites or the encryption of telemetry
information used by a party to monitor a weapon system’s operational capabilities. Informa-
tion exchanges were also called for in many agreements to facilitate verification of weapon
numbers and locations.
Separate from NTM, some US-Soviet treaties also included a set number of on-site inspec-
tions to verify the destruction or removal of prohibited systems. Indeed, there is still an
agreement in place that permits a small number of aerial overflights of Russia and the
United States by each other’s reconnaissance aircraft to verify aspects of some treaties that
are still in effect.
Source: Amy Woolf, Monitoring and Verification in Arms Control, Congressional Research Service, December 23,
2011, https://fas.org/sgp/crs/nuke/R41201.pdf.
the IC could detect Soviet cheating. Administrations often had to commit to funding
additional defense programs—including intelligence collection—to reassure skepti-
cal senators that ratifying those treaties was in the best interest of the United States.
To support SALT negotiations, the CIA initially established a small team of mili-
tary analysts called the “SALT support staff.” When developing an interagency con-
sensus on a proposed arms control negotiation, this staff and its larger successors
were responsible for representing the IC’s views on the agreements’ impact on the
respective US-Soviet military balance. Intelligence analysts would participate in the
interagency process, providing briefings on Soviet force levels and plans as well as
presenting the IC’s views on which treaty provisions were most needed to be able
to monitor a treaty. Many times these interagency “negotiations” over monitoring
requirements were as important and fractious as those that had to be hammered out
with the Soviets; when it came to on-site inspections, the IC would propose more
intrusive measures on Soviet programs than the Pentagon would want to permit on
American defense programs.12
188 Chapter 8
Once the United States had developed its negotiating strategy, it was the job of
this staff to provide updated intelligence assessments to the SALT negotiating teams
meeting in Geneva. This SALT support staff was also made available to advise mem-
bers of the US delegation. In preparing for the later SALT II Treaty ratification, the
then CIA director Stansfield Turner further underlined the IC’s role in three areas:
• assessing the size, capabilities, and future potential of the Soviet strategic
forces to be limited by the agreement
• providing timely, responsive support to policymaking agencies and officials
in the process of developing US positions and in negotiating the agreement
• providing assessments of the US capability to monitor proposed treaty
provisions13
Importantly, the IAEA is heavily dependent on member states such as the United
States providing information to the organization in order to prepare its reports on
compliance with NPT safeguards. Naturally, the United States has been a critically
important partner for the IAEA in monitoring suspect activities in Iran and North
Korea. In exchange, the US mission can also provide intelligence analysts with impor-
tant insights into foreign governments’ attitudes toward IAEA safeguards compliance
and inspections of suspect sites. This two-way street illustrates how the intelligence-
policy relationship is perhaps the most intimate and least fractious when focused on
implementing US policies.
responsible for tracking terrorist networks. As early as 1995, a few analysts from
CIA’s DA joined some DO officers to begin working on Afghanistan and investigat-
ing a group that became known as al-Qaida (The Base). This CIA unit—known as
Alec Station—became the core of the al-Qaeda target analysis team. It had prepared
numerous reports on a little-known Saudi who had fought in Afghanistan against the
Soviets and helped to finance the mujahideen. The team examined operational intel-
ligence reporting and developed a good understanding of the al-Qaeda network’s
financing, recruitment, leadership, and operational capabilities. These few target ana-
lysts continued to write some PDB items and other longer reports for policymakers,
but they were increasingly drawn into supporting DO operations to help track, locate,
and apprehend known terrorists. Unlike most analysts in the CIA’s DA who have little
day-to-day contact with operations officers, target analysts were immersed in opera-
tional-level discussions with collectors. They knew their sources better than almost
any other analytical group in the CIA.17 Their numbers remained small, growing
slowly after the 1998 bombings of the US embassies in Kenya and Tanzania but then
expanding rapidly after the 9/11 attacks (see box 8.5).
In order to augment the few target analysts already in the CTC, the CIA turned to
analysts in the agency’s crime and counternarcotics center, who also were trained in
following narco-traffickers and organized crime groups and assisting operations offi-
cers and law enforcement in apprehending them. Such skills transferred well to the
counterterrorism operations that were scaled up at the CTC and later the NCTC. As
a former chief of the counternarcotics center explained target analysis, “Rather than
focusing on the preparation of analytic assessments to support the policy decision
process, target analysts within the intelligence community seek to develop detailed
understanding of individuals, networks, and organizations for operational purposes.
Those operational objectives can range from developing plans to collect further
In the summer and early fall of 2010, I did not know that a small cell of analysts at CIA had
acquired a lead on a courier thought to be in contact with Bin Laden. In the end, he would
be found not through the $25 million reward or any help from the Pakistanis. Bin Laden was
found through old-fashioned detective work and long, painstaking analysis by CIA experts.
There would be a lot of heroes in the Bin Laden raid and even more people in Washington
who would take credit for it, but without those extraordinary analysts at CIA, there would
have been no raid.
—Robert Gates, former secretary of defense, 2014
Source: Robert M. Gates, Duty: Memoirs of a Secretary of Defense (New York: Knopf, 2014), 538–39.
192 Chapter 8
Because of their resource demands, task forces are created only for short periods
of time during the most acute crises. When there was the prospect or outbreak of war
in the Middle East, task forces have been assembled. Similarly, when crises occurred
within the Soviet sphere of influence—for example, during the Soviet suppression of
the Prague Spring in 1968 or the Polish martial law was invoked in 1981—task forces
were used to monitor and report on Soviet diplomatic and military moves.19 Task
forces are particularly useful when there is an urgent need for quick and coordinated
responses to policy needs; they can bring together all the expertise on a problem,
expedite collection requirements to the many different collectors, and ensure that
intelligence is providing a coherent and common picture of a crisis situation.
One early example of this kind of policy support was the establishment of the Bal-
kan Task Force (BTF), born out of the 1990 dissolution of Yugoslavia. Established
in June 1992, it became the first and longest-lasting interagency task force in the
IC’s history. For more than thirty months, the BTF followed the breakup of Yugosla-
via, which began during President George H. W. Bush’s term and continued through
most of President Clinton’s first term. At the time, the then CIA director Robert Gates
announced its creation to assist President Bush in managing what many feared would
be a spreading instability in the entire Balkans region.20 In practice, much of its work
focused on the Bosnian War and anti-Serbian sanctions.
The BTF’s organizational structure illustrates the wide range of policy-support
functions that intelligence can provide to presidents and their civilian and mili-
tary advisers. The BTF had three major functions: (1) to centralize and coordinate
enhanced collection against the Balkans crisis, (2) to centralize and coordinate
economic-sanctions monitoring on Serbia and its allies, and (3) to coordinate general
and tactical military intelligence support to US policy. In practical terms, this led to
the CIA’s inclusion of senior collection representatives from the NSA, the DIA, and
its own DO into the task force team in order to ensure higher intelligence-collection
priorities that presidential decisions would need. The BTF also established three sep-
arate analytical groups to follow these activities and provide direct support to differ-
ent aspects of US policy:
assessments, and monitoring of arms flows into the former Yugoslavia. It also
would produce weekly military update reports.21
The previous country-wide cease-fires that have lasted the longest have done so
either because the warring parties had some mutual interest in temporarily reducing
the level of violence or because weather would have limited fighting in any event. The
presence of peacekeeping forces probably has influenced somewhat the longevity of
cease-fires, but has not been decisive.
UN forces in Bosnia are adequate to monitor implementation of an in-place cease-
fire as long as they enjoy complete freedom of movement. They are not, however, to
deter any of the warring parties from deciding to abandon the peace process.
Some incentive for both sides to comply with a cease-fire—possibly including a desire to
build up forces prior to renewed fighting—has been the key factor in cease-fire maintenance.
The “successful” cease-fires to date have codified a willingness to cease offensive actions
when none of the factions would benefit from them. . . .
If the negotiating parties entered into a cease-fire agreement in good faith, the UN could
monitor compliance relatively quickly using existing peacekeepers and military observers.
Large numbers of outside forces would not be needed immediately so long as observers
already in the country enjoyed freedom of movement and the terms of the peace agree-
ment—such as demilitarized zones, limitations on training and maneuvers and on-site
inspections of heavy weapons at declared sites were designed to simplify verification of
compliance.
Source: Bosnia, Intelligence and the Clinton Presidency: The Role of Intelligence and Political Leadership in End-
ing the Bosnian War, CIA Library, https://www.cia.gov/library/readingroom/collection/bosnia-intelligence-and
-clinton-presidency; boldface and italics in original.
quantity. John McLaughlin, who served earlier in his career at the State Department,
also credits some of his career success to being more aware of how the policy process
operates, having proven himself to senior policy officials and then helping the CIA
develop a better relationship with a wide range of customers downtown.
Senate Select Committee on Intelligence that had requested this estimate. Other
critics often complain that longer-term assessments seldom are focused on their
immediate agendas. Hence, there has been a risky trend to play down longer-term,
in-depth assessments in favor of more current intelligence products such as the
PDB and the WIRe.
While it might seem obvious that intelligence should produce timely and concise
reports that are useful to policymakers, prioritizing short-term production ignores the
importance of conducting longer-term research that is necessary to build expertise
among intelligence analysts. The in-depth understanding of an intelligence issue and
the ability to look over the horizon at potential shifts or new trends enables analysts to
bring attention to emerging issues when policymakers can take timely action. One of
the critiques of the CIA and IC after 9/11 was that they had not produced any NIEs on
terrorism or al-Qaeda specifically since 1995, suggesting that long-term research into
Bin Laden had suffered because analysts were too busy supporting current targeting
operations conducted by the CTC.
One of the recommendations of the 9/11 Commission’s report was to reestablish
an intelligence unit inside the National Intelligence Council to conduct longer-term
research on subjects that might not get attention by offices more focused on produc-
ing PDBs and other intelligence products. As mentioned in chapter 6, this unit is now
largely responsible for preparing the NIC’s Global Trends series as well as other spe-
cial projects that might be considered out of the normal range of intelligence topics.
The CIA’s Senior Analytical Service (SAS) was designed shortly prior to 9/11 to offer
analysts the opportunity to remain specialists in their preferred region or technical
fields precisely to enhance in-depth expertise on the highest-priority topics. This SAS
is a cadre of several hundred senior officers who are often called on to guide complex
analytical challenges and conduct “deep-dive” discussions with a president or cabinet
officer on topics such as Russia, China, or Iran.
But the question remains whether enough analysts—especially at the CIA and
DIA—are conducting longer-term research in order to sharpen their expertise for
when those topics demand deeper understanding. Given that most analysts’ career
tracks move them among various offices and intelligence targets, there is now a ten-
dency to devalue deep expertise over a generalist’s skill set. This may create intelli-
gence gaps if senior intelligence managers do not make sure that sufficient analytical
resources are placed on issues that might one day become more significant.
conceivably wish to learn about. That is a goal that even the large IC cannot easily
meet. Often the decision about so-called global coverage revolves around how much
collection to require. Specific threats such as Iran and North Korea tend to produce
insatiable demands for information and analysis. Thus, justifying higher intelligence
priorities on many developing countries where US interests seem remote is hard. For
example, during the budgetary and personnel build-down of the IC in the early 1990s,
collection was cut, with defense attaché offices and CIA stations closed in parts of
Africa. Then, in 1994, the Rwanda genocide occurred, which dramatically highlighted
the relatively poor collection and coverage of what was going on in Central Africa.
While there was some diplomatic reporting, it did not get the proper attention it
deserved until large-scale massacres had already occurred.27
In many cases, when a topic is placed in the global-coverage category, it remains
without much coverage at all. Often the instinct is to delegate those low priorities to
the Open Source Enterprise to collect materials such as radio and television broad-
casts and blogs from online media. When relying on such open sources, however, it
may then be difficult to quickly ramp up other collection efforts that require reporting
from defense attachés, diplomats, or CIA case officers. When a country is judged to be
a low priority, it also usually means that few analysts are left to watch developments
there. Historically, for example, the CIA has usually had many more analysts follow-
ing large targets such as China, Russia, and Iran, while leaving only a few to cover
large parts of Africa and Latin America. This often then requires a sudden surge of
collection efforts and assignment of additional analysts to a problem like Rwanda,
or other hot spots, in order to respond to the uptick in intelligence requests. A more
recent example of this problem may have been the limited coverage given to Tuni-
sia, where violence and rebellion against an autocratic regime exploded in 2010 and
began what became known as the Arab Spring.
There are no quick fixes for this trade-off, as too many developing countries can
easily tip into a state of instability or failure. The 2017 case of Zimbabwe’s toppling of
longtime head of state Robert Mugabe makes the point that seemingly stable situa-
tions can quickly deteriorate and demand more intelligence attention. Efforts to retain
deeper knowledge on lower-priority intelligence topics sometimes have to include
use of outside experts at universities or former intelligence specialists working at
consulting firms. Realistically, the IC will have to be flexible and resilient enough to
quickly shift its attention to newly arising problems, either in the form of task forces
or more current intelligence coverage than was previously thought necessary.
needs overlap but often diverge. Since the DOD controls a large share of intelli-
gence resources, there has been a tendency to favor military users over the national
intelligence priorities of civilian intelligence agencies and policymakers in other
departments. Specifically, the DOD controls the major overhead satellite collection
systems (run by the NRO and exploited by the NGA) as well as the SIGINT activi-
ties of the NSA. A strong argument can be made, and has been repeatedly, that sup-
port to the warfighter must be the highest intelligence priority. This proved to be
the case during Operation Desert Shield and Operation Desert Storm in 1990–91,
the Balkans wars of the mid-1990s, and the Iraq and Afghanistan wars of the 2000s
and 2010s. One of the lessons learned from the Gulf War was that commanders
need the national IC to contribute even more to the intelligence requirements in the
field. For example, commanders often complained that the CIA’s analysis often was
so highly classified that it could not be provided to field commanders lacking the
proper clearances. Today the process of downgrading military intelligence for use
in the field is much more efficient because the wars in Afghanistan and Iraq have
put more analysts in the forward operating areas who can quickly determine what
information is needed.
That said, the CIA has long worried that DOD intelligence priorities would ignore
its interest in other political and economic information of high interest to Washington
policymakers but of less salience to military customers. One of the reasons why the
2004 IRTPA legislation was so controversial was that early recommendations from
the President’s Intelligence Advisory Board (PIAB) called for placing the NSA and
NRO under the leadership of a strengthened DCI.28 Members of the Senate Armed
Services Committee—along with Defense Secretary Donald Rumsfeld—argued stren-
uously against this recommendation, and so those agencies remain combat-support
elements of the DOD.29 However, it highlights how sensitive the issue of turf can be
among intelligence agencies.
Looking to the future, US intelligence is likely to remain confronted with difficult
decisions regarding the need to balance all the competing demands for its finite
collection and analytical resources. It is difficult to imagine major shifts in the focus
on current intelligence as well as military intelligence needs so long as the United
States remains engaged in so many international problems around the globe. For a
stopgap, the IC will inevitably have to resort to placing its bets on where the next
hot spot or crisis is likely to be and try to develop workforces and intelligence-
collection systems that are flexible enough to surge to wherever information and
analysis is needed. The practice of standing up new crisis task forces is also likely
to remain an important tool for ensuring adequate intelligence for decision-makers
confronted with new decisions and the call for action.
Intelligence Support as Policy Enabler201
USEFUL DOCUMENTS
Bosnia, Intelligence and the Clinton Presidency: The Role of Intelligence and Political Leadership
in Ending the Bosnian War, CIA Library, https://www.cia.gov/library/readingroom/collection
/bosnia-intelligence-and-clinton-presidency
The best compilation of declassified policy documents and intelligence assessments of a
major crisis where intelligence played a major role.
President’s Daily Brief: Nixon and Ford PDBs Released in 2016, CIA Library, https://www.cia
.gov/library/readingroom/presidents-daily-brief
A recent volume that includes redacted PDB items reflecting the intelligence priorities of
the Nixon and Ford presidencies.
FURTHER READING
Peter Bergen, Manhunt: The Ten-Year Search for Bin Laden from 9/11 to Abbottabad (New
York: Broadway, 2012).
A leading counterterrorism expert’s review of how the CIA tracked and eventually tar-
geted Osama bin Laden.
Ellen Laipson, Intelligence: A Key Partner to Diplomacy, Case 337, Institute for the Study of
Diplomacy Case Study Series (Washington, DC: Georgetown University, 2017).
A former official’s assessment of the role intelligence plays in major negotiations.
Michael Morell, The Great War of Our Time: The CIA’s Fight against Terrorism—from al Qa’ida
to ISIS (New York: Hachette, 2016).
A former PDB briefer and later senior official recounts how daily actionable intelligence
was provided to and used by presidents.
David Priess, The President’s Book of Secrets: The Untold Story of Intelligence Briefings to
America’s Presidents from Kennedy to Obama (New York: Public Affairs, 2016).
A practitioner’s history and assessment of the PDB’s central role.
NOTES
First epigraph: R. V. Jones, “Intelligence and Command,” Intelligence and National Security 3,
no. 3 (July 1988): 288.
Second epigraph: ODNI, National Intelligence Strategy of the United States: 2019, 10, https://
www.dni.gov/files/ODNI/documents/National_Intelligence_Strategy_2019.pdf.
1. Some examples include the white paper that distilled the unclassified findings of the
2002 Iraq WMD estimate, and the series of DIA-prepared white papers on Soviet military
power in the 1980s, and the more recent DIA white paper focused on China’s military power.
See DIA, China Military Power: Modernizing a Force to Fight and Win 2019, www.dia.mil
/Military-Power-Publications.
2. Jack Davis, “Facts, Findings, Forecasting, and Fortune-Telling,” Studies in Intelligence
39, no. 3 (1995): 25–30.
202 Chapter 8
3. Author’s November 2017 email correspondence with a former senior DIA official
involved in current and long-term analysis.
4. David Priess, The President’s Book of Secrets: The Untold Story of Intelligence Briefings
to America’s Presidents (New York: PublicAffairs, 2016), 5. This is perhaps the most compre-
hensive examination of the PDB, written by a former CIA historian who has interviewed PDB
briefers and reviewed many PDBs as part of his research.
5. Priess, 25.
6. Priess, 54.
7. Priess, 283.
8. Michael Morell, The Great War of Our Time: The CIA’s Fight against Terrorism—From al
Qa’ida to ISIS (New York: Hachette, 2016), 32.
9. Julian E. Barnes and Michael S. Schmidt, “To Woo a Skeptical Trump, Intelligence
Chiefs Talk Economics Instead of Spies,” New York Times, March 3, 2019, https://www.nytimes
.com/2019/03/03/us/politics/trump-daily-intelligence-briefing.html?smid=nytcore-ios-share.
10. Ellen Laipson, Intelligence: A Key Partner to Diplomacy, Case 337, Institute for the
Study of Diplomacy Case Study Series (Washington, DC: Georgetown University, 2017).
11. For more complete description of the current US-Russian nuclear arms control negotia-
tions and monitoring provisions, see Amy Woolf, The New START Treaty: Central Limits and
Key Provisions, Congressional Research Service, October 5, 2017, https://fas.org/sgp/crs/nuke
/R41219.pdf. Recent American approaches rely primarily on NTM, data exchanges and notifi-
cations, and scheduled and short-notice on-site inspections of deployed systems to confirm the
accuracy of the data exchanges.
12. The Defense Department in 1987 established a new On-Site Inspection Agency that was
responsible to manage the DOD’s treaty-implementation responsibilities under various trea-
ties; it later became part of the Defense Threat Reduction Agency, which commands almost $3
billion annually to implement US obligations under numerous arms control treaties and WMD
agreements.
13. See CIA, “Memorandum for the Record, Admiral Turner’s Contribution to SALT, Janu-
ary 21, 1981,” approved for release July 3, 2003, https://www.cia.gov/library/readingroom
/docs/CIA-RDP86B00269R000800040001-8.pdf.
14. This discussion has been aided by communications with former senior analysts who
were directly responsible for overseeing the ACIS’s activities during the 1980s.
15. The US mission in Vienna is formally called the UN Mission to International Organiza-
tions in Vienna, which represents the United States to the IAEA but also to a number of other
UN-related international organizations such as the Comprehensive Test Ban Organization and
the International Narcotics Control Board.
16. The IAEA, established in 1957 by the UN, has become the foremost scientific and techni-
cal organization for fostering peaceful uses of nuclear energy as well as for developing safeguards
to verify that nations are not diverting their nuclear energy programs for military purposes. As
such, it has a Department of Safeguards responsible for verifying the peaceful uses of nuclear
power. The IAEA can demand documentation and on-site inspection by its teams of technical
inspectors to verify that nuclear facilities in member states are not violating the NPT obligations.
17. This information is based on communications with two former target analysts who
worked in the CTC from 1995 until 2013.
Intelligence Support as Policy Enabler203
18. John Kringen, “Serving the Senior Military Consumer: A National Agency Perspective,”
in Roger Z. George and James Bruce, Analyzing Intelligence: National Security Practitioners’
Perspectives (Washington, DC: Georgetown University Press, 2014), 108.
19. According to former military analysts interviewed by the author, more informal office-
level task forces were often established to enhance reporting on things as diverse as the Falk-
lands War between Argentina and the United Kingdom, the Cuban involvement in Angola,
and various Taiwan Straits crises involving the People’s Republic of China and the Republic of
China.
20. See Deputy DCI, Memorandum to National Foreign Intelligence Board, “Establishment
of the Interagency Balkan Task Force,” June 12, 1992, in Bosnia, Intelligence and the Clinton
Presidency: The Role of Intelligence and Political Leadership in Ending the Bosnian War, CIA
Library, https://www.cia.gov/library/readingroom/collection/bosnia-intelligence-and-clinton
-presidency.
21. Deputy DCI, Memorandum to National Foreign Intelligence Board, 33. Leadership
analysis is focused on describing individual foreign leaders’ personalities, decision-making
styles, and ideological or political convictions. They are highly valued by diplomats and mili-
tary commanders who negotiate with foreign officials.
22. As a result of the BTF’s work, the CIA established its own war crimes team, which collected
eyewitness accounts via intelligence reporting and debriefing of émigrés that was later part of the
State Department’s program to support the work of the International Criminal Tribunal for the
Former Yugoslavia, which brought to justice such well-known figures as Serbian president Slobo-
dan Milošević, Bosnian Serb politician Radovan Karadžić, and the Bosnian Serb military leader
Ratko Mladić.
23. Daniel Wagner, “Year One of the DCI Interagency Balkan Task Force,” in Bosnia, Intel-
ligence and the Clinton Presidency, 18. According to the BTF’s senior manager, these first meet-
ings focused on the news that Bosnian Serbs were holding Muslims in detention camps, and
the BTF had already produced a map showing suspected camps.
24. A. Norman Schindler, “Reflections on the DCI Interagency Balkan Task Force,” in Bos-
nia, Intelligence and the Clinton Presidency, 25.
25. Wilder served as the NSC senior director for East Asia during the incident in which a
US Navy EC-3 was damaged by a Chinese fighter (which crashed, killing its pilot) and had to
land on Hainan Island, where it was seized and its crew detained. There were extended negotia-
tions during which he was one of the key experts advising President Bush on how to respond
to the challenge. Wilder went on to become a senior office director at the CIA, later also run-
ning the critical preparation of the PDB, from which he retired to teach at Georgetown Univer-
sity. For one view of his centrality, see Chris Nelson, “America’s China Brigade,” International
Economy, Spring 2007, http://www.international-economy.com/TIE_Sp07_Nelson.pdf.
26. John McLaughlin, “Serving the National Policymaker,” in George and Bruce, Analyzing
Intelligence, 81–92.
27. For a detailed look at the reporting that came out of the Rwanda crisis, see the National
Security Archive, which includes some declassified current intelligence reporting on the crisis
as it unfolded. See, e.g., William Ferragiaro, “The United States and the Genocide in Rwanda
1994: Information, Intelligence, and the U.S. Response,” March 24, 2004, National Security
Archive, https://nsarchive2.gwu.edu/NSAEBB/NSAEBB117/.
204 Chapter 8
28. Brent Scowcroft, who headed the PIAB under President George W. Bush, reportedly had
made this recommendation but faced stiff opposition from Defense Secretary Donald Rums-
feld. See Philip Zelikow, “The Evolution of the Intelligence Reform: A Personal Reflections,”
Studies in Intelligence 56, no. 3 (2012): 6–9, https://www.cia.gov/library/center-for-the-study-of
-intelligence/csi-publications/csi-studies/studies/vol.-56-no.-3/pdfs/Studies56-3-September
2012-18Sep2012-Web.pdf.
29. See the excellent discussion of intelligence-defense turf questions in Michael Allen,
Blinking Red: Crisis and Compromise in American Intelligence after 9/11 (Dulles, VA: Potomac
Books, 2013), esp. 14–15.
9
Covert Action as
Policy Support
It is true that the CIA’s biggest mistakes involved covert action. But
it is also true that these mistakes, without exception, also involved
operations carried out at the behest of presidents pursuing flawed
policies. And for every covert action that failed spectacularly, there
have been others that enabled presidents and policymakers to
achieve ends in the nation’s interest with an unseen hand, which is
almost always preferable to a heavy footprint.
—Jack Devine, former CIA senior official responsible for numer-
ous covert operations
This chapter will explore the CIA’s role as a policy implementer, when it conducts
covert action in support of special operations at the direction of the president. Often
described as the “third way” between inaction and the use of military force, covert
action is another policy instrument at the disposal of the president and the NSC.
Covert action is the one area in which the CIA participates as an influential deci-
sion-maker that executes policy, which gives it a special stake in how policy is fash-
ioned. At the same time, the CIA operates under strict guidelines, requiring far more
presidential involvement and congressional notification than is required for the US
military when it conducts its own special operations. This chapter will examine the
205
206 Chapter 9
purposes, scope, and processes involved in covert action. In particular, it will exam-
ine the roles the president, the NSC, and Congress play in providing accountability
and oversight. Some of the major successes and failures, along with lessons learned,
will be examined. Finally, the chapter will highlight special challenges that covert
action presents for the CIA and the US government more generally.
Covert action, in the American context, has evolved over time to describe a range of
measures taken by the US government in which its role is designed to be hidden or
deniable. According to section 503 (e) of the National Security Act of 1947, covert
action is “an activity or activities of the United States Government to influence politi-
cal, economic, or military conditions abroad, where it is intended that the role of the
United States Government will not be apparent or acknowledged publicly.” As will
be detailed later, such operations can be long- or short-term, of a military, diplomatic,
or economic character, and involve very little or very large amounts of resources and
people. It all depends on the goals set out by the president and his or her advisers.
When the Cold War broke out in the late 1940s, President Truman and his advis-
ers were much concerned about Soviet subversion taking place in Europe. Moscow’s
involvement in the 1946–49 Greek Civil War, the Soviet-sponsored coup overthrow-
ing the Czechoslovak government in 1948, and the rising influence of communist
parties in Western Europe prompted Washington to find countermeasures. George
Kennan, the father of the emerging US containment policy as well as a drafter of the
Marshall Plan for Europe, was among those recommending immediate political war-
fare. Hand in hand with the publicly announced Marshall Plan to aid weak European
economies, Truman approved NSC-4/A, a directive that authorized secret “psycho-
logical warfare” by the CIA as a government “service of common concern.” Among
other things, the CIA provided funds to Christian Democratic parties in Italy and
France to support their electoral campaigns to defeat resurgent communist parties in
the 1948 elections.
A year later this mandate was expanded to a broader range of activities known
as “covert” action. A new directive, titled NSC-10/2, instructed elements in the CIA
to undertake operations “which are conducted or sponsored by this Government
against hostile foreign states or groups or in support of friendly foreign states or
groups but which are so planned and executed that any US Government responsi-
bility for them is not evident to unauthorized persons and that if uncovered the US
Government can plausibly disclaim any responsibility for them.”1 Thus was born
the notion that covert actions would be measures taken secretly that could be plau-
sibly denied, even if used in conjunction with overt programs such as the Marshall
Covert Action as Policy Support207
and duration of those operations varied widely, it is nonetheless impressive that they
totaled in the hundreds.5
Covert action is indeed an instrument of policy. Unlike the usual set of overt political,
military, economic, or informational tools of statecraft, it is designed to remain secret.
Simply stated, covert action encompasses all the instruments of statecraft when used
covertly and run by the CIA under the auspices of the president. Hence, the range of
covert action can be quite broad. Whether large or small, those operations can apply
one or blend several of the usual tools of American statecraft. Some forms of covert
actions might include the following:
The early use of covert action in Western Europe in the late 1940s illustrates
some of these forms of covert action. In 1947, as the threat of communist control of
Western European governments rose, the United States began secretly providing
money to selected prodemocracy groups in several European countries.6 In addi-
tion to the well-known Truman Doctrine of openly aiding governments opposed
to communist subversion, the CIA sponsored so-called black propaganda in the
form of widely distributed pamphlets that publicized the Red Army’s brutal tactics
during the war and the dismal conditions in communist-led countries.7 Much of the
focus was on the 1948 Italian elections. However, similar covert assistance was also
provided to the Greek government by the CIA.
Covert Action as Policy Support209
Covert action has had a mixed reputation, at least in terms of what is known or
believed by the public. In reality, most covert action operations remain unknown.
From the hundreds (now probably thousands) of operations approved by presidents
since 1945, only a small percentage have been publicly revealed or acknowledged. Of
210 Chapter 9
Propaganda: Most often used form of covert action requiring few resources. Often takes
longer to have impact, if only indirectly. Variants:
• “White”: Usually advertised as being produced by a US government agency, such
as the former US Information Agency; it is overt and usually truthful. Voice of
America radio broadcasting is a good example of US efforts to provide truthful
information.
• “Gray”: Usually hides the fact of a US source, but sponsorship is often known by
experts to be backed by the United States. The information is often accurate, if
spun to a favorable view of the United States. Radio Free Europe and Radio Liberty
were initially examples of gray propaganda.
• “Black”: Usually well-hidden sources that are providing disinformation designed to
discredit an adversary or undermine an opponent. Forged documents are a classic
form of black propaganda that alleges some horrific action by an adversary. For
example, Soviet disinformation placed in Indian newspapers claimed the CIA had
produced the AIDS virus.
Political action: Used to directly influence a foreign government’s policies and actions;
designed to have more immediate impact on decision-makers. For example, developing
agents of influence who are able to work inside a foreign government or institution:
• supporting media: buying or subsidizing newspapers or other foreign media for
the purpose of developing inroads into foreign public opinion and government
decisions
• supporting civil society organizations: funding special-interest groups that are
hostile to an anti-US regime; providing resources for their activities
• supporting political parties: funding their officials and campaigns as well as pro-
viding them with information, political expertise, or campaign supplies that are in
short supply
• influencing elections: supporting activities that can shift electoral support for or
against particular candidates or parties through propaganda, demonstrations, or
covert interference in electoral processes
Lethal military: Political assassination is prohibited by law, but the use of lethal military force
by covert means is authorized in certain war zones and regions of terrorist activities:
• targeted attacks on known terrorists by armed drones
• special covert military operations conducted in conjunction with the US military’s
special operations forces to eliminate known terrorists
course, the most publicized are those that fail or possibly involved wrongdoing. Some
lessons can be drawn from some of the most infamous and celebrated cases: the 1953
coup in Iran, the 1961 Bay of Pigs operation, the 1986 Iran-Contra scandal, and the
1980–88 program to aid Afghans fighting the Soviets.
Kermit Roosevelt, one of the architects of this operation, remarked on what condi-
tions need to be present: If “we are ever going to try something like this again, we
must be absolutely sure that people and the army want what we want.”13
The Iranian coup—despite its primarily indigenous causes—became a model for
subsequent efforts to use psychological and propaganda operations to force other
anti-American leaders from office. The removal of Guatemalan leader Jacobo Árbenz
in 1954 followed this pattern. Like Mosaddegh, Árbenz had shown a willingness to
resist Washington, expropriate American companies, and toy with the idea of accept-
ing aid from Moscow. Through the use of very modest amounts of money and people,
the US operation (code-named PBSuccess) was able to fool Árbenz into thinking that
a major counterrevolution was occurring. Using two planes, dropping a single large
bomb on a large military parade ground, and issuing radio broadcasts reporting col-
umns of soldiers marching to the capital, the CIA frightened Árbenz into resigning
and seeking asylum at the Mexican embassy.
Again, a small operation had led to surprising results. But, unfortunately, the lesson
learned was that the CIA could easily pull off such coups without major costs. By one
estimate, the Iran operation lasted less than six months, involved a handful of CIA
officers, and cost around a million dollars.14 At the time, the operation was judged a
huge success, and the shah’s strong support for US policies, including his anti-Soviet
and pro-Israeli leanings, made his government a major pillar of US Middle East poli-
cies. Less appreciated at the time was the prospect that installing the shah by stealth
would make the United States the “Great Satan” to many Iranians who would later
resent the shah’s Westernization plans and his vicious security service, SAVAK. The
1953 coup has remained a key element of the grievances and strong anti-American
attitudes of the post-1979 governments of the Islamic Republic of Iran. Likewise, top-
pling the Árbenz government was a relatively minor paramilitary operation, but it too
did not lead to better governance but rather decades of repressive authoritarian rule,
albeit one that was more anticommunist in tone.
uprising against the supposedly unpopular Castro. President Kennedy insisted that
the US role remain invisible and would not approve sufficient air support to the beach
landing that some military advisers believed was necessary.15 Dulles and his head of
covert operations, Richard Bissell, downplayed this requirement in conversations with
President Kennedy and his brother, Attorney General Robert Kennedy, and believed
that the president would be forced to authorize more overt force if the invasion started
to go badly. It did go badly almost immediately, but Kennedy would not approve more
than one hour’s sortie of six bombers, which could not turn the tide.
Thus, the exiles soon found themselves on an inhospitable beachhead (known as
the Bay of Pigs). The few unmarked aircraft allowed to bomb the Cuban airfields were
not successful in destroying the Cuban air force jets that would quickly attack the
beach landings. Cuban ground forces numbering nearly twenty thousand and armed
with tanks easily defeated and killed or captured the exiles. As postmortems would
testify, the covert action plan suffered from wishful thinking that Castro was unpopu-
lar and that a general uprising would spontaneously occur; moreover, the operation
itself was not a secret, as Latin American newspapers had been reporting the training
of an exile force that would mount an invasion. Finally, the strict compartmentaliza-
tion of the operation inside the CIA had prevented any true country experts from
questioning the operational assumptions and details. In the end, however, President
Kennedy admitted it was his mistake to depend so heavily on a few senior CIA offi-
cers who were so committed to the operation that they could not be objective about
its chances for success.
The abject failure of this operation convinced President Kennedy that he needed
much more oversight of future operations. He did not give up on anti-Castro covert
action, but he did deputize his brother to oversee future plans to ensure no new fail-
ures. Much has been written about other, more multifaceted CIA plans to remove Cas-
tro (under what became known as Operation Mongoose). While that program focused
on economic sabotage, it did include assassination plots—none of which were ever
executed.16
President Reagan earlier had approved a covert action plan for the CIA to fund anti-
Sandinista rebels (the “Contras”) to harass the Nicaraguan government, which was
seen as a pro-Cuban foothold in Central America. Following some missteps by the CIA
(including the illegal mining of harbors in Nicaragua), Congress had steadily limited
the agency’s backing of the Contras by allowing only nonlethal aid, then putting fund-
ing limits on the aid and eventually banning it entirely in 1985 through the Boland
Amendment. US Marine Corps lieutenant colonel Oliver North, assigned to the NSC,
was put in charge of finding new ways to fund the Contras. He succeeded in soliciting
monies from “third countries” (largely from the Middle East) but soon began funnel-
ing the profits from the sale of arms to Iran to aid the Contras—both actions that would
later been seen as circumventing congressional intent if not the law.
Unbeknown to most CIA officials as well as large parts of the US national security
bureaucracy, North concocted this elaborate illegal covert plan (called “the Enter-
prise”) with CIA director William Casey and a few others. Senior CIA officers, includ-
ing its then deputy director, opposed CIA involvement in the plan. In essence, the
NSC now was running a covert action program. North along with the then national
security adviser, Vice Adm. John Poindexter, were largely responsible for planning
and running the operation, enlisting individual officers from the NSA and CIA for
logistical support as needed. Most significantly, the operation was conducted with-
out any clear presidential approval. Poindexter later admitted a presidential directive
was approved only retroactively, which included the proviso that the CIA not inform
Congress, but Reagan never actually signed it.17 Following lengthy congressional and
a special prosecutor’s investigations, North, Poindexter, and other NSC, military, and
CIA officers were indicted on a range of charges including obstruction of justice,
destroying evidence, and lying to or withholding evidence from Congress. Many were
later pardoned by President George H. W. Bush.
This scandal highlighted the need for more executive and legislative control over
covert action. In addition, President Reagan empowered a special presidential review
board (named the Tower Commission after its chairman, Sen. John Tower) to investi-
gate how the NSC found itself at the center of this failed operation. The Tower Com-
mission’s recommendations also became instrumental in reforming the role of the
NSC system that Reagan’s successor, George H. W. Bush, established. As some former
officials noted at the time, “the report reached important conclusions that the covert
action on the sale of arms to Iran did not comply with U.S. law prior to a written finding.
The executive branch did not comply with legal requirements that Congress be noti-
fied of covert actions in a ‘timely’ manner.”18 In other respects it let the Reagan admin-
istration off gently by suggesting Iran-Contra was an “aberration.” That said, it was
clear that the NSC system under Reagan—which saw a revolving door of six national
security advisers in eight years—had proven to be one of the least well managed.
Covert Action as Policy Support215
Decades and hundreds of operations later, there are clear lessons that one can learn
from the successes and failures of presidentially directed covert action. First, covert
action should never be either the “first or last resort.” That means covert action is best
216 Chapter 9
If these principles were applied to covert action decisions, a president would have
to weigh the nature of a threat, the legitimacy and morality of a US covert operation,
its chances of success, and its likely longer-term consequences, as well as whether
other less risky options might achieve similar or better results.
For the first three decades of the CIA’s existence, covert action was conducted with
few formal restrictions or regulations and uneven oversight. Presidents from Truman
to Carter varied in the degree to which they wished to oversee the CIA’s covert action
programs, although each established an NSC committee to oversee and provide
advice on covert action programs. Those committees took a variety of names, often
carrying cryptic titles (e.g., “Special Coordination Group” under Eisenhower, “Special
Group” under Kennedy) or were given numbers (e.g., “40 Committee” under Nixon/
Ford, “303 Committee” under Johnson).24 Those NSC groups typically included CIA
covert action managers plus representatives from the State and Defense Depart-
ments, along with an NSC staff member representing the president.
It was common for presidents to issue NSC decision documents authorizing the
CIA to conduct covert actions aimed at some general political objectives without nec-
essarily reviewing all the details of the plans. Naturally, for large and highly risky or
sensitive operations, such as the 1953 Iran coup and the 1962 Bay of Pigs operation,
presidents took a more prominent role. Partly presidents distanced themselves from
the operational details in order to preserve plausible deniability. In fact, for many
of the smaller, less controversial covert programs, the CIA director could essentially
authorize them without formal presidential approval, so long as the NSC oversight
committee considered them to be consistent with American foreign policy objectives.
In some administrations, operations that involved costs under $25,000 and were pre-
sumed to be less risky were left to the CIA director’s discretion.
Legislative oversight of covert action was virtually nonexistent until the creation
of the intelligence oversight committees in the mid-1970s. Up to then, subcommit-
tees of the Armed Services and Appropriations Committees of both houses signed
off on CIA budget authorization and appropriations, including covert action pro-
grams. In the early days, Congress was especially wary of knowing too much about
covert action. The Armed Service and Appropriations Subcommittees were mainly
concerned about the CIA having sufficient resources to fight communism, and less
218 Chapter 9
In the post-1990 period, covert action programs have been reviewed and approved
using the long-established interagency process described in earlier chapters. Like
other policy decisions, a covert action proposal will often emerge from the White
House or other NSC discussions. Most administrations produce a classified national
security directive outlining the interagency process by which it planned to propose,
review, and approve covert action. While each administration since 1990 has modi-
fied that process in some ways, each has had a much more deliberate process that
ensures covert actions are rigorously reviewed internally by the CIA as well as by the
NSC, fully briefed to and duly authorized by the president, and, finally, notified to the
appropriate congressional oversight authorities.
As an illustration of this elaborate vetting process, the following describes how
covert action was handled during George W. Bush’s tenure.27 At the request of
President Bush, the national security adviser would typically draft a memo to the
CIA director (and after 2005, the director of national intelligence). Almost without
exception, no CIA planning would begin without NSC authorization. Then, the CIA’s
220 Chapter 9
1. Presidential request for covert action options (memo from the national security adviser
to the CIA).
2. CIA covert action staff develops options (e.g., the scope, methods, costs, and risks) with
regional operations division and agency legal counsel.
3. Interagency legal group from the CIA, the NSC, and the State, Justice, and Defense
Departments approves the legal basis and appropriateness of covert action proposals.
4. Special Principals Committee and Deputies Committee group reviews and approves covert
action proposals prior to transmittal to the president.
5. President reviews, then approves, disapproves, or modifies a presidential finding.
6. White House “notifies” congressional oversight committees of a presidential finding.
The CIA might present a set of options or make a recommendation on the most
promising one that it believes meets the president’s objective. Once the covert
action proposal has met with the approval of the Directorate of Operations, a cross-
directorate review group reporting to the CIA director (i.e., the Covert Action Review
Group) would review, amend, or approve the proposal. If the CIA director approves
the plan, it would be forwarded to the White House for interagency review.28
At the White House, the NSC’s senior director for intelligence (typically a CIA
officer assigned to the NSC) would chair a special interagency policy committee that
reviews covert action plans. Attendance would be limited to the specially cleared rep-
resentatives from the State Department, the Defense Department, and the Joint Staff,
along with the LG representatives.29 The White House contingent would typically
include NSC senior directors responsible for the region or focus of the covert action,
a senior representative of the vice president’s office, the NSC’s legal counsel, and a
senior deputy from the Office of Management and Budget. On occasion, a Treasury
representative might be included if the covert action involves financial transactions.
The IPC would focus on the obvious questions about a program’s costs, benefits,
risks, chances of success, and legality. The State Department’s Bureau of Intelligence
and Research would also be attuned to how the covert action would fit with and
impact existing diplomatic policies and how ambassadors in the region of the opera-
tion might react or be affected. It might take several meetings and drafts of a potential
finding before it is ready to be transmitted to the Deputies Committee and eventu-
ally the Principals Committee for approval and signature by the president. By law,
once the president has signed a finding, it has to be transmitted to the congressional
oversight committees. That is usually accomplished within forty-eight hours unless
there are special circumstances. In highly sensitive and fragile operations, such noti-
fication can also be limited to the so-called Gang of Eight—the majority and minority
leaders of the House and Senate, as well as the majority and minority leaders of the
two intelligence oversight committees.30
The 9/11 attacks have once again elevated covert action to an important instrument
of national security policy. One measure of this is the huge increases in the CIA’s
budget that are partly explained by the use of covert action applied to the global war
against terrorism across multiple presidential administrations in countries such as
Iraq, Afghanistan, and Syria. Those operations depended much more on new forms of
222 Chapter 9
covert action, including renditions, interrogations, and armed drone operations. The
earlier question of where paramilitary operations rightfully belong—at the CIA or the
DOD—has also risen again. And there is now the rising concern about foreign intelli-
gence services employing cyber operations not only for espionage purposes but also
for covert information operations against the United States and other democracies.
the CIA took action to use whatever means necessary to ensure that other plots were
not about to unfold. The CIA has acknowledged that the initial phase of the interro-
gation program was not well managed; its revelation in the press has also caused the
CIA to lose credibility and possibly the support of other intelligence partners who
had agreed to host “secret prisons” where some of the EITs were conducted. Over-
all, a president’s sense of urgency overrode caution about whether a program could
be both effective and ethical. And, not surprisingly, journalists began reporting that
there had been concerns that the CIA would once again be “scapegoated” once the
political winds shifted.37
Early in his term, President Donald Trump had hinted that he might consider
restoring some of the harsher interrogation techniques, but his then secretary of
defense, James Mattis, said he did not believe they were necessary or effective. Other
former intelligence officials, including Michael Hayden, have stated that any reintro-
duction of waterboarding would force military officers to refuse an “illegal order,” as
prescribed by the Uniform Code of Military Justice. So far, there has not been any
sign of the Trump administration returning to such covert collection operations.
took office, he markedly increased drone strikes, which some observers believed were
designed to shift from a boots-on-the-ground strategy toward a counterterrorism strat-
egy. At the same time as drone strikes were escalating, outside observers believed that
collateral damage caused by them was also rising. Several reports claimed that the
civilian casualties might be as low as 250 or as high as 400 to 900.39 Later, CIA direc-
tor Brennan publicly defended the Agency’s claims that there had been no civilian
deaths caused by any classified drone programs, because President Obama instituted
a much more rigorous process that called for near certainty before approving a strike.40
Skeptics remain unconvinced regarding a nearly perfect record of drone strikes, and
the debate over whether drones attacks are effective continues. Proponents argue they
are far more precise and less risky to the US military than aerial bombing raids or
ground operations; moreover, drone attacks are also less visible. Opponents argue that
drone strikes create a moral hazard of encouraging more attacks on less important tar-
gets because they pose no major risk to US personnel. They also believe that collateral
damage is higher than the US government is willing to acknowledge and that civilian
deaths result in increased recruitment to terrorist organizations.
According to press reports, the Obama administration eventually reduced drone
strikes, partly due to its successful elimination of key targets. In July 2016, President
Obama also moved to quell allegations of substantial civilian casualties by issuing an
executive order that required agencies to develop more precise rules of engagement
and target selection.41 This was accompanied by an annual report from the DNI on
the number of strikes in areas outside active hostilities, the number of combatant and
noncombatant casualties, and the reasons for any discrepancies between noncomba-
tant drone casualty estimates by nongovernmental organizations and the US govern-
ment. In 2018, there had also been some hints that the Trump administration might
be considering shifting such drone operations to Afghanistan. In any case, US use
of armed drones and targeted killings has set a precedent that other countries may
eventually use to justify their own lethal drone operations. Even now, there are report-
edly cases of Syrian opposition forces attempting to attack the main Russian military
bases there through armed drones.42
the operation and insisted there be some agreement about how the CIA’s covert
action role and the United States Central Command’s operations would be coordi-
nated. There was a memorandum of understanding that laid out the terms of the two
organizations’ operating areas and responsibilities, including a commitment to col-
laborate as well as deconflict their operations.43
While this division of effort seemed to work in Afghanistan, it never fully settled
the issue. Periodically there have been efforts by the DOD to gain more control over
paramilitary activities. In 1995, when former deputy secretary of defense John Deutch
became DCI and CIA director, he tried unsuccessfully to allow more military control
over CIA operations. His assistant DCI for military support, Adm. Dennis Blair (later
DNI under President Obama) also believed the military should be running any covert
paramilitary operations.44 However, their efforts failed to gain much White House
or congressional support. Following the 9/11 attacks, many Pentagon officials and
advisers believed the department needed to get more involved in the covert side of
the war on terrorism, recommending large increases in special operations forces and
expanded missions.45 Defense Secretary Rumsfeld tried to expand military operations
to include measures that smacked of covert political-influence operations as well as
covert HUMINT operations that had not been approved by Congress.46
The reality is that the CIA and DOD seem to be conducting similar activities with
many of the same goals and results but under very different authorities. CIA opera-
tions are covered under Title 50 of the United States Code. Among other aspects
of war, it specifies that any covert actions—as distinguished from its intelligence-
collection mission—be approved by the president in a written finding and notified
to the congressional oversight committees. Such covert actions are conducted with
the expectation that the United States will deny official responsibility and that CIA
personnel have none of the legal protections that uniformed military officers would
normally have.
Under Title 10 of the United States Code, traditional military activities include
kinetic (lethal) action in the form of unconventional warfare and special operations
necessary in preparation of the battlefield environment. DOD special operations thus
fall under these statutes. In most instances, however, military personnel are in uni-
form, are protected by the Geneva Accords if captured, and must follow the rules of
war. Typically they are operating only in declared war zones such as Afghanistan and
Iraq and usually with some form of congressional authorization for the use of force.
Most important, the United States Special Operations Command is not under any
obligation to prenotify Congress of these special operations. Figure 9.1 illustrates the
different chains of command used in Title 10 and Title 50.
The May 2011 killing of Osama bin Laden has considerably blurred the above
distinction. CIA director Leon Panetta announced the successful operation as being
226 Chapter 9
conducted under Title 50 authorities, in which he had overall responsibility for the
covert action. At the same time, he and President Obama acknowledged that spe-
cial operations forces, under the command of Vice Adm. William McRaven, had con-
ducted the covert strike action. A number of national security legal specialists had
noted that the modern battlefield has led to a greater synthesis of intelligence and
military operations than ever before, blurring any clear lines between the two func-
tions: “As a matter of law, the President may authorize any agency to conduct a covert
action via presidential finding. Alternatively, the President must justify the use of
force under traditional military activities under jus ad bellum doctrines in domestic
and international law.”47
Another example of blurred lines has been the paramilitary activities conducted in
the Syrian conflict. In 2013, President Obama was reluctant to intervene in what many
believed to be a messy civil war, choosing instead to encourage regional states such as
Turkey and Saudi Arabia to take a larger role in supporting the opposition to Syrian
president Bashar al-Assad. Observers believed that Obama was trying to end the Iraq
conflict, not get the US military involved in neighboring Syria. As recounted in several
memoirs by former senior Obama advisers, they were urging the president to sup-
port opposition groups in Syria openly as well as covertly. Part of the explanation for
multiple programs lay in the changing nature of the conflict. Once ISIS had become a
bigger threat to Iraq, the Obama administration was obliged to adopt an overt military
Covert Action as Policy Support227
effort to defeat it rather than rely solely on other covert means of pressuring Assad to
relinquish power. The Pentagon’s program was designed to bolster Iraqi forces fight-
ing ISIS rather than strengthen Syrian opposition forces. But having simultaneous
and ultimately unsuccessful programs running within the same country, under very
different authorities, merely highlights the unclear lines separating military and intel-
ligence operations (under Title 10 and Title 50, respectively).
If future presidents consider more joint military-intelligence operations, then
those distinctions may become less and less clear, and perhaps there will need to
be new executive orders or legislation that create a new category of covert joint
military-intelligence operations. Without it, there will be concerns that DOD clan-
destine operations might suffer from a lack of presidential and congressional over-
sight of special military activities. Shortly after taking office, President Trump gave
Secretary of Defense Mattis wider authority for conducting military operations
against terrorism, after the Obama administration had been accused of overly cau-
tious “micro-management.”48 Since then, several special operations have suffered
some notable casualties, including a US Navy SEAL lost in a botched operation in
Yemen and four US Army Special Forces troops ambushed in Niger in 2017. The loss
of the personnel in Niger has raised new concerns about the preparedness of the
DOD to conduct such special activities, which had not been previously approved at
the highest levels in the executive branch or by congressional oversight committees.
President Trump reacted to that event by noting he had given his generals more lee-
way and had not specifically authorized this mission.49 Congressional investigations
into these events may well lead to more debate over whether the DOD or the CIA
is best suited for covert paramilitary activities or whether some better mix of those
organizations’ capabilities should be found.
Little is known, correctly so, about the nature and extent of US covert cyber
operations. United States Cyber Command is responsible for shielding DOD infor-
mation systems from attacks and for conducting military cyber operations. At the
moment, however, the four-star officer leading the NSA is also responsible for run-
ning CYBERCOM. The current arrangement where a single senior military officer is
dual hatted, running a major intelligence organization as well as a separate military
command, further blurs the lines between intelligence and military operations. The
Obama administration had considered separating the two responsibilities, and that
might still occur in the future.
The CIA, on the other hand, has been involved in so-called information operations
as part of its own intelligence mission. It established a Directorate of Digital Innova-
tion as part of a 2015 modernization of the agency’s organizational structure. That
directorate collects cyber-related intelligence as well as manages the increasingly
important exploitation of “big data.”51 At the same time, the CIA may well be called
on to develop covert actions that involve the use of cyber operations. Some press
reporting has indicated that small cyber operations may have been launched against
the personal computers of key al-Qaeda members.52
Given the growing importance of cyberspace to most governments’ civilian
sectors and military programs, it seems inevitable that cyber operations will be a
significant new form of covert action. Where once the United States focused on eco-
nomic or military “sabotage” or “political influence” conducted through newspaper
placements and black broadcasting, now there can be cyber options. This has been
amply demonstrated by the North Korean cyber operation against Sony Pictures
in 2014, which penetrated the American entertainment company’s computer sys-
tem, published its emails, and also destroyed some data. The 2010 attack on Iran’s
nuclear program has also been analyzed by private security firms to be so sophis-
ticated that it was more likely conducted by a government than any individual or
hacker group. Likewise, the 2019 DNI’s Worldwide Threat Assessment identified
Beijing as posing a persistent cyber threat to the United States’ military and critical
infrastructure systems.53
The Russian interference in the 2016 US presidential campaign has become an
example of how covert use of cyberspace to penetrate electoral computer systems and
to manipulate social media websites to produce bogus news stories can influence voters.
A joint NSA-CIA-FBI-DNI assessment characterized the Russian political-influence
campaign as an officially sanctioned and highly organized effort to use covert cyber
operations, along with overt Russian media, third parties, and social media bloggers, to
undermine the Hillary Clinton campaign in favor of Donald Trump’s.54 Other examples
are likely to emerge over time, suggesting that this will be a potential tool for the United
States as well as its adversaries.
Covert Action as Policy Support229
To summarize, then, covert action is likely to remain a potent tool for future presi-
dents but also one that contains a number of operational, political, and legal-ethical
risks. As former official Gregory Treverton’s comments at the beginning of this chapter
note, Americans do not want to think of their government as conducting dirty tricks,
but the fact that governments hostile to the United States will do so tempts any presi-
dent or senior US official to reply in kind. Adopting a set of principles such as cited by
Sir David Omand earlier in this chapter would be one way to ensure that covert actions
remain within the bounds of what would be acceptable to the American people.
USEFUL DOCUMENTS
Marshall Curtis Erwin, Covert Action: Legislative Actions and Possible Policy Questions, Con-
gressional Research Service, https://fas.org/sgp/crs/intel/RL33715.pdf
Office of the Director of National Intelligence, Background to “Assessing Russian Activities
and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribu-
tion, January 6, 2017, at URL: https://www.dni.gov/files/documents/ICA_2017_01.pdf
United States Senate, Select Committee on Intelligence, “Executive Summary,” Committee
Study of the Central Intelligence Agency’s Detention and Interrogation Program, https://fas
.org/irp/congress/2014_rpt/ssci-rdi.pdf
FURTHER READING
William Daugherty, Executive Secrets: Covert Action and the Presidency (Lexington: Univer-
sity Press of Kentucky, 2004).
Provides a practitioner’s view of earlier covert actions, which defends its uses when prop-
erly authorized and executed.
Jack Devine, Good Hunting: An American Spymaster’s Story (New York: Farrar, Strauss and
Giroux, 2014).
Describes the career of a CIA practitioner of covert action and his principal lessons
learned from both successes and failures.
Roy Godson, Dirty Tricks or Trump Cards: US Covert Action and Counterintelligence (New
Brunswick, NJ: Transaction, 2001).
Presents a typology of covert actions and some of the pros and cons of its uses since
1945.
Richard Immerman, The Hidden Hand: A Brief History of the CIA (New York: Wiley, 2014).
Provides a good discussion of the early decisions regarding covert action and some of
the major successes and failures throughout the CIA’s history.
Jennifer D. Kibbe, “Covert Action,” Oxford Research Encyclopedias, http://internationalstudies
.oxfordre.com/view/10.1093/acrefore/9780190846626.001.0001/acrefore-9780190846626
-e-135.
Provides an extensive review of the covert action literature and highlights some of its
challenges.
230 Chapter 9
Peter Kornbluh, Bay of Pigs Declassified: The Secret CIA Report on the Invasion of Cuba (New
York: New Press, 1998).
Recounts the most often cited failure of CIA-sponsored covert action.
Gregory Treverton, Covert Action: The Limits of Intervention in the Postwar World (New York:
Basic Books, 1987).
A former staff member of the 1975 Church Committee provides his perspective on the
CIA’s secret operations up until those hearings.
NOTES
First epigraph: Gregory Treverton, Covert Action: The Limits of Intervention in the Postwar
World (New York: Basic Books, 1987), 11.
Second epigraph: Jack Devine, Good Hunting: An American Spymaster’s Story (New York: Far-
rar, Strauss and Giroux, 2014), 5.
1. See Office of the Historian, “Notes on Covert Action,” in Foreign Relations of the United
States, 1964–48; Western Europe, vol. 12, https://history.state.gov/historicaldocuments/frus
1964-68v12/actionsstatement.
2. See Richard Immerman, The Hidden Hand: A Brief History of the CIA (New York: Wiley,
2014), 19–29.
3. The OPC was the element within the CIA where covert action was centralized. The
Senior Consultants included representatives from the Departments of State and Defense and
the Joint Chiefs of staff.
4. Treverton, Covert Action, 38.
5. See “History of Evolution,” Coordination and Approval of Covert Operations, Febru-
ary 23, 1967, CIA Library, declassified May 2002, https://www.cia.gov/library/readingroom
/docs/DOC_0000790232.pdf.
6. See James Callanan, Covert Action in the Cold War: US Policy, Intelligence and CIA
Operations (London: I. B. Tauris, 2010), 37–38.
7. Callanan, 41.
8. At the time, the CIA was assessing this split as the most significant division in the
Soviet sphere of influence and was alert to the possibility of Stalin considering attacking Yugo-
slavia to force it back into the fold.
9. See Coleman Mehta, “The CIA Confronts the Tito-Stalin Split,” Cold War Studies 13,
no. 1 (Winter 2011): 101–45.
10. Mehta.
11. John Prados, CIA’s Secret Wars (New York: William Morrow, 1986), 17, 312–13.
12. Devine, Good Hunting.
13. Quoted in William Daugherty, Executive Secrets: Covert Action and the Presidency
(Lexington: University Press of Kentucky, 2004), 138.
14. Treverton, Covert Action, 45.
15. The US military had more elaborate plans for the invasion of Cuba and believed noth-
ing short of a major operation would dislodge Castro. However, it was content to let the CIA
continue its plans, believing in the end that Kennedy would have to provide more military
Covert Action as Policy Support231
support and thereby be open to its more overt plans for invasion. This was an important back-
drop to the military’s thinking that invasion was necessary during the Cuban Missile Crisis.
16. Daugherty, Executive Secrets, 154.
17. Treverton, Covert Action, 226.
18. Former Secretary of State Cyrus Vance, quoted in the New York Times, March 1, 1987.
19. Devine, Good Hunting, 25–42, provides an eyewitness account of the operation by the
former Afghan task force chief of the covert action program against the Soviet occupation.
20. On March 27, 1985, “National Security Decision Directive 166: U.S. Policy, Programs,
and Strategy in Afghanistan” stipulated that “our covert program will deny Afghanistan to the
Soviets as a secure base from which to project power further in the region.”
21. Daugherty, Executive Action, 206. Another feature of the program’s funding was that
Saudi Arabia had pledged matching funds to whatever the US Congress was prepared to
appropriate.
22. Some media, along with a book and movie, have characterized the Afghan operation as
“Charlie Wilson’s war” in view of his strong advocacy for the program.
23. Adapted from Sir David Omand, “Ethical Guidelines in Using Secret Intelligence for
Public Security,” Cambridge Review of International Affairs 19, no. 4 (2006): 613–28. Text in
parentheses mine.
24. Each president usually issued a national security memorandum detailing the responsi-
bilities and representation on covert action oversight groups. NSDM 40 (Nixon) became the
title of the NSC subgroup assigned to review and approve covert action proposals.
25. Treverton, Covert Action, 232.
26. Daugherty, Executive Action, 100.
27. The author is indebted to a former senior NSC official responsible for overseeing covert
action who explained the Bush process in some detail.
28. Daugherty, Executive Action, 103–4.
29. Attendance might expand depending on the topic and region. If other agencies, such as
the FBI, DEA, or Department of Commerce had equities at stake, they might also be included.
30. According to one former NSC participant in covert action decisions, a senior congres-
sional official might strongly object to a proposed finding, which raised the risk of a leak if the
president went ahead with the operation.
31. CIA, Office of the Inspector General, Unauthorized Interrogation Techniques, Octo-
ber 29, 2003, https://www.cia.gov/library/readingroom/docs/0006541525.pdf.
32. Michael Hayden, Playing to the Edge: American Intelligence in the Age of Terror (New
York: Penguin, 2016), 223–25.
33. Hayden, 223–25. Hayden and other former officials have noted that the full list of ten
techniques has not been revealed, but once the existence of the interrogation program and
waterboarding had leaked, the list was cut down and waterboarding was eliminated.
34. The United States ratified in 1994 the UN Convention on Torture and Other Cruel,
Inhuman or Degrading Treatment or Punishment, which defines torture as “any act by which
severe pain or suffering, whether physical or mental, is intentionally inflicted on a person.”
In August 2002, the DOJ produced a legal memorandum for President Bush that approved
a wide range of techniques, concluding that “while many of these techniques may amount to
cruel, inhuman or degrading treatment, they do not produce pain or suffering of the necessary
intensity to meet the definition of torture.”
232 Chapter 9
35. Senate Select Committee on Intelligence, Committee’s Study of the CIA’s Detention
and Interrogation Program, Executive Summary and Key Findings, and Declassified Revisions
December 3, 2014, https://www.feinstein.senate.gov/public/_cache/files/7/c/7c85429a-ec38
-4bb5-968f-289799bf6d0e/D87288C34A6D9FF736F9459ABCF83210.sscistudy1.pdf.
36. “Statement from Director Brennan on the SSCI Study on the Former Detention and
Interrogation Report,” December 9, 2014, https://www.cia.gov/news-information/press-releases
-statements/2014-press-releases-statements/statement-from-director-brennan-on-ssci-study
-on-detention-interrogation-program.html.
37. Mark Mazzetti, The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of
the Earth (New York: Penguin, 2013), 120.
38. George Tenet, At the Center of the Storm: My Years at the CIA (New York: Harper
Collins, 2007), 158.
39. The New America Foundation claims that, by 2017, the United States had conducted
over four hundred strikes in Pakistan, causing anywhere from 245 to 303 civilian casual-
ties out of a total casualty range of 2,359 to 3,685. See New America Foundation, “America’s
CounterTerrorism Wars: Drone Strikes Pakistan,” https://www.newamerica.org/in-depth
/americas-counterterrorism-wars/pakistan/. The Bureau for Investigative Journalism reports
that there were 429 confirmed strikes in Pakistan, resulting in 2,514 to 4,023 deaths, of which
424 to 926 were civilian deaths. See Bureau for Investigative Journalism, “Strikes in Pakistan,”
accessed January 5, 2017, https://www.thebureauinvestigates.com/drone-war/data/pakistan
-covert-us-reported-actions-2017.
40. Scott Shane, “CIA Is Disputed on Civilian Toll in Drone Strikes,” New York Times,
August 11, 2011, http://www.nytimes.com/2011/08/12/world/asia/12drones.html.
41. See “Executive Order: United States Policy on Pre- and Post-Strike Measures to Address
Civilian Casualties in U.S. Operations Involving the Use of Force,” July 1, 2016.
42. Neil MacFarquhar, “Russia Says Its Syria Bases Beat Back an Attack by 13 Drones,” New
York Times, January 8, 2018, https://www.nytimes.com/2018/01/08/world/middleeast/syria
-russia-drones.htm.
43. Tenet, At the Center of the Storm, 216.
44. Daugherty, Executive Secrets, 65–68.
45. Greg Miller, “Wider Pentagon Spy Role Urged,” The Nation, October 26, 2002, http://
www.washingtonpost.com/wp-dyn/articles/A29414-2005Jan22.html.
46. Barton Gellman, “Secret Unit Expands Rumsfeld’s Domain,” Washington Post, Janu-
ary 23, 2005, http://www.washingtonpost.com/wp-dyn/articles/A29414-2005Jan22.html.
47. See Jeff Mustin and Harvey Rishikof, “Projecting Force in the 21st Century: Legitimacy
and the Rule of Law; Title 50, Title 10, Title 18, and Art. 75,” Rutgers Law Review 68 (Summer
2011): 1251.
48. Jim Michaels, “Trump Gives Defense Chief Mattis Running Room in War-Fighting,” USA
Today, April 5, 2017, https://www.usatoday.com/story/news/world/2017/04/05/mattis-trump
-syria-iraq-yemen-isis/100016758/.
49. John Haltiwanger, “Trump Blames Generals for Ambush That Got Four Servicemen
Killed,” Newsweek, October 25, 2017, http://www.newsweek.com/trump-blames-generals-niger
-ambush-four-us-soldiers-killed-693227.
50. See Joint Staff, Cyberspace Operations, Joint Publication-3–12, February 5, 2013, II-2,
https://fas.org/irp/doddir/dod/jp3_12r.pdf, which lays out how cyberspace operations are to
be conducted, including mention of “offensive operations.”
Covert Action as Policy Support233
51. “Big data” typically refers to extremely large and complex data sets that require sophis-
ticated software to analyze and exploit the information found there. For intelligence pur-
poses, big data analysis can reveal trends, patterns, or relationships hidden within these huge
amounts of information gleaned from websites, blogs, or social media sources.
52. David Sanger, “Obama Order Sped Up Wave of Cyberattacks against Iran,” New York
Times, June 1, 2012.
53. ODNI, Worldwide Threat Assessment of the US Intelligence Community, January 29,
2019, 5.
54. ODNI, “Key Judgments,” Assessing Russian Activities and Intentions in the Recent U.S.
Presidential Elections, ICA 2017–01D, January 6, 2017, https://www.dni.gov/files/documents
/ICA_2017_01.pdf. See also the Mueller Report, formally known as the Report on the Inves-
tigation into Russian Interference in the 2016 Presidential Election, volumes 1 and 2, submit-
ted by Special Counsel Robert S. Mueller III, March 2019, https://www.justice.gov/storage
/report.pdf.
10
The Challenges of
the Intelligence-Policy
Relationship
Often we feel the desire to influence policy and . . . to wish simply for
influence can, and upon occasion does, get intelligence to the place
where it can have no influence whatever. By striving too hard in this
direction, intelligence may come to seem just another policy voice,
and an unwanted one at that.
—Sherman Kent, Estimates and Influence, 1968
American intelligence has provided presidents and national security teams with an
amazing amount of information and insight into a bewildering array of international
challenges. As the preceding chapters make clear, intelligence has played a part in the
shaping and execution of foreign and security policies at both the strategic and tac-
tical levels; moreover, intelligence at times has to implement policies in the form of
covert action. That said, the relationship between intelligence and policy has remained
contentious and unpredictable. While policymakers and intelligence officers share the
same national security enterprise, they sometimes appear to be coexisting in parallel
universes. Policymakers and intelligence officers are driven by different sets of political
interests and bureaucratic imperatives. This chapter will explain how the relationship
234
The Challenges of the Intelligence-Policy Relationship235
has evolved but remains full of friction. In particular, it will examine how “politicization”
of intelligence occurs, spotlighting some major cases and raising some issues about the
future of the intelligence-policy relationship.
In contrast, intelligence officers by their very nature are more cautious if not
skeptical about the feasibility of ambitious policy initiatives and wary of providing
high-confidence judgments or predictions regarding the future. “It’s complicated”
would capture the essence of the intelligence world. Analysts in particular tend to
see the world in shades of gray rather than black-and-white terms. Uncertainty can be
bounded but not reduced to zero. Above all else, intelligence is designed to be “policy
neutral,” or free of any particular policy agenda. Indeed, the whole purpose of hav-
ing an independent intelligence community is to assure that the most comprehen-
sive set of facts and analysis can be brought to bear on very complex foreign policy
issues. At best, that information might present policymakers with inconvenient facts
and alternative assessments of an adversary’s capabilities, intentions, or reactions to
American policies; at worst, intelligence might raise questions about the underlying
premises or conclusions of a policy decision. However, for intelligence officers, pre-
senting the facts is more important than seeking approval from their policy masters.
At the outset of the Cold War, intelligence as a discipline was poorly understood, and
the clear lines between policy and intelligence were not so carefully defined. However,
a senior intelligence expert in the OSS (the CIA’s precursor), and later a key official in
the early estimates process at the CIA, laid out the ground rules for the IC’s operation
in the policy process. In his 1949 book Strategic Intelligence for an American World
Policy, Sherman Kent enunciated the basic principle that intelligence should “raise
the level of discussion” around the policymaking tables. In Kent’s view, intelligence
should not advocate a specific policy position; instead, it should inform policy. Intelli-
gence analysts should be cognizant of, but detached from, any specific policy agenda.
Kent knew that lively debates would tempt strong-willed policymakers to manipulate
intelligence findings. Thus, intelligence analysts had to strive to present information
objectively without regard to whether it was pleasing to senior officials.
Stating this principle, however, was not to say it would be easy to achieve in prac-
tice. Nor were intelligence assessments uncontroversial when matters of war or peace
were to be based partly on these findings. Over the decades, US intelligence has been
faulted for not only being incorrect at times but also of being biased against presi-
dential policies. Intelligence frequently became embroiled in debates over strategy
and was sometimes accused, rightly or wrongly, of becoming “politicized” (i.e., dis-
torted by political agendas).
The Kent model of a kind of “arm’s-length” approach to policymakers was designed
to avoid becoming entangled in such political debates. However, it also tended to
The Challenges of the Intelligence-Policy Relationship237
instill an attitude among analysts that they could write what they wished and that
policymakers could take or leave their analysis. This “ivory-tower” intelligence atti-
tude toward policy could at times verge on hubris. Policymakers would accuse ana-
lysts of indulging in faintly disguised criticism of policies with which they did not
agree. Moreover, the CIA often conducted analysis on topics as much to sharpen the
skills of its own analysts and deepen their expertise as to inform a specific policy dis-
cussion. Hence, periodically policymakers have complained that intelligence was not
relevant to their policy needs. In the early days, intelligence assessments tended to
be lengthy, excessively detailed, and hard to digest for harried policymakers. Indeed,
the CIA and other agencies always considered themselves as much the audience for
intelligence products as the policy agencies themselves.3
The end of the Cold War and demise of the Soviet Union found the IC less pre-
pared to justify its huge operations than ever before. Some critics, citing the CIA’s
failure to forecast the collapse of the Soviet Union, asserted that there was no need
for the agency at all if the principal threat was gone. Sen. Daniel Moynihan famously
proposed in the early 1990s to either fold the CIA into the State Department or abol-
ish it entirely.4 Even before this time, however, senior officials, including Robert Gates,
began to articulate a different intelligence-policy model that highlighted “relevance”
in the place where “objectivity” once had pride of place. As a Soviet analyst, Gates had
served in several presidents’ National Security Council staffs, and he made the obser-
vation that too often analysis was not addressing current policy agendas. He wrote
that while intelligence prided itself on understanding how foreign governments
worked, few analysts understood how the US government worked or seemed aware of
the policy processes that drove American foreign policy.5 As deputy director for intel-
ligence in the 1980s, he instructed his senior managers and analysts to spend more
time “downtown” in interagency meetings and in the offices of NSC, State Depart-
ment, and Defense Department policymakers.6 Only then could analysts understand
what the true intelligence needs of the government were.
From then on and up to the present, the CIA in particular has aimed to be close to
policymakers in order to understand what policies are being considered and thereby
tailor intelligence to the issues that most mattered. Senior analysts increasingly took
rotational assignments to policy agencies in order to get close to policy discussions
and to help provide direct intelligence support. The author was himself assigned to
the State Department’s policy planning staff in 1989–91 in order to help bring intel-
ligence to some of Secretary of State James Baker’s closest advisers.7 The crafting
of a President’s Daily Brief (explained in detail in chapter 8) is perhaps the best
example of the Gates model in action, as it explicitly focuses on presidential intel-
ligence requirements. As the PDB became the key intelligence product, assignment
as a PDB briefer was sought after by rising analysts, who were frequently promoted
238 Chapter 10
to become senior managers on the basis of their performance as briefers to the presi-
dent or other cabinet officers. For example, Michael Morell, who was one of President
George W. Bush’s PDB briefers, went on to become a senior office manager, executive
director (the number-three position), and eventually CIA deputy director. In practice,
a briefer’s exposure to senior policy officials gave them insight into how the inter-
agency policy process ran and the types of intelligence questions being posed by
senior officials. In addition, they gained personal credibility with their counterparts
in the White House and State and Defense Departments, which built up important
intelligence-policy relationships for the future.
Less apparent, however, was the inherent risk that this model presented to main-
taining intelligence’s analytical objectivity and integrity. By virtue of being close to
policy, was there not a danger of analysts becoming inadvertently biased toward the
policy preferences of the current occupant of the White House? As Richard Betts
noted, “Packaging intelligence to be more productive makes it harder to draw sharp
lines between what is relevant and what supports a particular policy choice.”8 Robert
Gates, who had been deputy director of the CIA during the Reagan years, became the
target of vicious accusations of “skewing” analysis in ways favorable to the hawkish
views of CIA director William Casey and President Reagan (see box 10.1). The ten-
dency for presidents also to pick their CIA directors from among personal advisers
In the fall of 1991, Robert Gates was nominated to become George H. W. Bush’s CIA director.
During the nomination hearings before the Senate Select Committee on Intelligence, sev-
eral senior CIA analysts accused Gates of forcing analysts to rewrite analysis of the Soviet
Union to bolster the Reagan administration’s skeptical perceptions of Mikhail Gorbachev’s
so-called New Thinking. Those analysts claimed that as deputy director of intelligence, Gates
had dismissed the Gorbachev phenomenon as mere tactics, exaggerated the Soviet military
threat, and played down instability in the USSR.
Gates’s own defense was primarily focused on his review responsibilities that CIA analysis
be as rigorous and analytically defensible as possible. He acknowledged that he criticized
some assessments as “flabby and complacent” and some analysts as being “closed-minded,
smug, [and providing] arrogant responses to legitimate questions.”* In his own memoir of the
1990s, he also admitted that he had significant differences with the then secretary of state
George Shultz, who complained that Gates was using his position as CIA director to question
Gorbachev’s abilities and indirectly Shultz’s diplomatic overtures toward Gorbachev.†
* Elaine Sciolino, “The Gates Hearings: Bush’s C.I.A. Choice in Counterattack at Senate Hearing,” New York
Times, October 4, 1991, http://www.nytimes.com/1991/10/04/us/the-gates-hearings-bush-s-cia-choice-in-counter
attack-at-senate-hearing.html?pagewanted=all.
†
Robert Gates, From the Shadows: The Ultimate Insider’s Story of Five Presidents and How They Won the Cold
War (New York: Simon & Schuster, 1996), 443–47.
The Challenges of the Intelligence-Policy Relationship239
and political supporters rather than careerists also increased concerns that intelli-
gence might become more prone to politicization.
Given that the assigned role of CIA directors and later directors of national intelligence
is to be the principal intelligence adviser to presidents and the NSC, their relation-
ships with their presidents has often become critical to the broader intelligence-
policy relationship. Those presidents who had a better understanding of and valued
intelligence tended to establish strong bonds with their intelligence advisers, while
those less familiar or comfortable with intelligence kept a more arm’s-length attitude
toward those individuals and their agencies.
Among the presidents who held the most sophisticated views of intelligence,
Dwight Eisenhower and George H. W. Bush stand out. As a military commander,
Eisenhower had used intelligence throughout his wartime campaigns and saw it as
a force multiplier in the struggle against communism during the Cold War. He was
responsible for the development of some of the earliest overhead imagery programs
(the U-2 “spyplane” and the first satellite programs). Moreover, as a military com-
mander, he had been comfortable exploiting secret operations and later eagerly used
covert action programs crafted by his CIA director, Allen Dulles. Eisenhower placed
great confidence in Dulles, who had conducted OSS wartime operations overseas,
and he boosted the agency’s covert action programs.
George H. W. Bush was another president with a unique understanding of intelli-
gence, as he served as CIA director under Gerald Ford. He came to this position with
substantial international experience, having served as US ambassador to the UN and
as first US envoy to the People’s Republic of China. Later, as vice president during the
Reagan presidency, he was authorized to read the PDB and enjoyed the interactions
with his personal briefer. Hence, when he became president in 1988, he made it a
practice to read the PDB every day, elevating the status of the document more than
any previous president. “When I was president,” he told the CIA history staff, “one
of my favorite times of the day was when I would sit down with a briefer and read
through the PDB.”9 He also decided to retain President Reagan’s CIA director, for-
mer FBI director William Webster, who had replaced the controversial William Casey.
Bush had failed to retain his own CIA directorship when President Carter came into
office, so he also wanted to send the message that the job should be nonpolitical.10
Many presidents have been far less knowledgeable, supportive, or comfortable with
intelligence. Christopher Andrew, the British intelligence historian, has described
Harry Truman as “almost totally ignorant” of intelligence when he took office.11 Tru-
man also famously worried about creating a CIA that could become an American
240 Chapter 10
Gestapo but eagerly wanted a single organization to collate and provide him infor-
mation. John F. Kennedy came into office largely ignorant of intelligence operations
but trusting and relying on careerists such as Allen Dulles. However, the Bay of Pigs
fiasco quickly dispelled this confidence, and he designated his brother, Attorney
General Robert Kennedy, to watch over the CIA to make sure it did not get him into
trouble. Lyndon Johnson was perhaps the earthiest in reflecting on his problems with
intelligence: “One day, I’d worked hard and gotten a full pail of milk, but I wasn’t pay-
ing attention, and old Bessie swung her s—smeared tail through the bucket of milk.
Now, you know that’s what these intelligence guys do. You work hard and get a good
program or policy going, and they swing a s—smeared tail through it.”12
As Johnson’s quote makes clear, presidents are often frustrated by intelligence
assessments that do not support their policy agendas. In particular, Richard Nixon
suspected the CIA was opposed to his presidency, believing the agency was somehow
involved in his defeat in the presidential election of 1960 and filled with “Georgetown
liberals” who despised him and his conservative views.13 In general, new occupants to
the office are wary of the CIA, given its attention to presidential intelligence needs.
They often suspect that the CIA and the IC more generally have been working so long
for their predecessors (often from the opposing party) that they have become cap-
tives of, if not advocates for, that former president’s policies. During the postelection
transition period prior to taking office, the president-elect begins to meet with senior
intelligence officials and might see their first PDBs. They begin to take the measure
of the current intelligence officials and their views. Likewise, those senior intelligence
officials are anxious to prove their ability to work for the new president, regardless of
party or policy views, and to get a sense of the new president’s intelligence priorities.
That “shake-down cruise” is sometimes smooth but often very bumpy.
The transition from George H. W. Bush to Bill Clinton was clearly a bumpy one.
President Clinton appointed James Woolsey, who had been a prominent defense
official in previous Democratic administrations. However, Clinton had never met
Woolsey, and the two men proved unable to forge a close relationship. Clinton never
became an avid reader of the PDB or comfortable with his intelligence advisers. Wool-
sey became the victim of political cartoons showing him failing to get access to the
Oval Office, and he eventually departed in frustration. Clinton’s efforts to appoint his
first national security adviser, Anthony Lake, as the next CIA director—in order to have
someone with whom he did have a good relationship—foundered in the nomination
process, and he eventually selected Deputy Secretary of Defense John Deutch, who
had a similarly checkered and short tenure at the CIA. George Tenet, once Clinton’s
NSC senior director for intelligence and then the deputy DCI, would eventually take
the number-one position. He proved to be a better fit for Clinton and clever enough
to be retained during the first years of George W. Bush’s presidency.14 Throughout his
The Challenges of the Intelligence-Policy Relationship241
presidency, however, Clinton seldom saw a PDB briefer, content to allow his national
security advisers to read the PDB and remind him of the important articles he should
read. While acknowledging the importance of intelligence, Clinton never took a par-
ticular interest in it.
The transition to the George W. Bush presidency saw the IC and its leadership hav-
ing to prove itself once again to an occupant who had very little foreign policy experi-
ence or interest. He surrounded himself, however, with a skilled team of senior advisers
who did have significant experience and strong opinions regarding intelligence. Sec-
retary of State Colin Powell was supportive but skeptical at times, while Vice President
Dick Cheney and Secretary of Defense Donald Rumsfeld were suspicious and often
critical of the CIA’s intelligence judgments. Bush, however, had an open mind and was
encouraged by his father’s positive experience working at and with the CIA. During
early intelligence briefings at his “Texas White House,” the president-elect remarked
that he hoped when he was finally in office, he would be able to get the “good stuff!”15
This remark put the CIA into a state of high anxiety, believing it already was providing
the best intelligence it could. However, the then CIA director George Tenet decided
to brief the president himself in order to sensitize him to the spectacular sources and
methods the CIA employed as well as cement a solid personal relationship with the
new president. That relationship survived the disastrous 9/11 attacks, but ultimately
Tenet was a casualty of the Iraq WMD estimate’s flawed findings.
His successor, Congressman Porter Goss, had even less success in building rap-
port with the president or his own workforce. In addition, the creation of the position
of director of national intelligence demoted CIA director Goss’s status and often put
him at odds with the first DNI, John Negroponte. Goss left shortly thereafter, hav-
ing unsuccessfully challenged Negroponte’s authority to redirect some of the CIA’s
counterterrorism activities.16 As the Iraq War bogged down into a protracted civil
war, the Bush administration was tempted to let the CIA’s flawed 2002 estimate carry
a large share of the blame for the failing policies. The White House also did little to
shield the CIA from congressional criticism for conducting presidentially approved
secret detention and interrogation programs. US Air Force general Michael Hayden’s
selection as CIA director helped to quiet the uproar over the CIA’s role in “torture,”
as he pledged to take the agency off the front pages. His longtime intelligence back-
ground and service as NSA director made him a suitable partner with DNI Negro-
ponte. Most important, he formed a good relationship with President Bush.
Intelligence under President Obama began with its own share of controversy. His
appointment of Leon Panetta—who had considerable political experience and clout but
no intelligence background—struck many as puzzling if not risky. President Obama had
publicly condemned the Bush administration’s Iraq policies and its counterterrorism
policy of using enhanced interrogation techniques. This led to a chilly relationship
242 Chapter 10
between the president and CIA professionals initially. Panetta, however, proved to be
a skilled bureaucratic leader who had the president’s ear. In short order, he restored
morale at the agency and also its credibility with the White House.
If anything, Panetta overshadowed Obama’s first DNI, retired admiral Dennis Blair,
who managed to clash repeatedly with the CIA—especially over overseas assignment
of chiefs of station—and lose the confidence of the White House. His replacement by
James Clapper—a career military intelligence professional—proved to be a stroke of
genius in terms of crafting an effective partnership among senior intelligence officials.
Along with NSC senior director for counterterrorism and intelligence John Brennan,
the intelligence leadership formed an effective team that gained the president’s con-
fidence. Obama came to appreciate intelligence, particularly the use of covert action
and special operations, which led to the killing of Osama bin Laden. Obama also
proved to be an exceptionally good reader of intelligence, requesting that his PDB
be delivered via a classified electronic tablet that he regularly read. When he decided
to shuffle his cabinet in his second term, he chose Brennan to become CIA director.
By placing at Langley a former senior NSC adviser and seasoned intelligence profes-
sional, Obama ensured he had someone who could deliver tough intelligence assess-
ments, oversee both active counterterrorism and covert action programs, and work
with his defense, intelligence, and law enforcement counterparts.
Those positives, however, were overshadowed by the impact of Edward Snowden’s
stunning leak of highly sensitive electronic surveillance efforts by the NSA. The IC
had to explain long-standing programs designed to collect metadata of millions of
American citizens from major Internet and phone providers, which the IC could comb
through to track down possible links to foreign terrorist organizations. In addition,
this massive release of NSA intercept programs revealed collection efforts against key
allied leaders, most notably German chancellor Angela Merkel. The diplomatic fallout
from the Snowden leaks damaged not only US credibility but also strained the White
House relationship with some intelligence officials. The administration was obliged to
ratchet back those programs and establish new policies regarding collection against
key allies. A presidentially appointed commission found that those NSA programs had
probably overreached and did not in fact surface enough valuable information to jus-
tify the intrusion into Americans’ personal communications. The Obama administra-
tion subsequently directed that the NSA would not collect that data but that Internet
providers would have to archive that information in case a FISA warrant were issued
allowing IC to access an individual user’s metadata. (See chapter 11 for more details.)
In the most recent presidential transition, it became clear that president-elect Don-
ald Trump would not readily accept the joint CIA, NSA, FBI, and DNI assessment
that the Russian government had covertly interfered in the 2016 elections in an effort
to undermine his opponent’s candidacy. To President Trump, these assessments
The Challenges of the Intelligence-Policy Relationship243
diminished his confidence in the intelligence leadership and the community’s non-
political nature. During the 2016 presidential campaign, the Trump campaign had
mocked IC findings as speculation, stating, “These are the same people that said Sad-
dam had weapons of mass destruction.”17 Throughout the campaign and even after
taking office, he expressed skepticism about the Russian hacking episode; moreover,
unlike any previous president, he attacked the independence and credibility of the
FBI’s efforts to uncover the Russian “active measures” program.18 Like many presi-
dents before him, President Trump wanted to have people leading intelligence agen-
cies who shared his views and who were loyal to him. His selection of Republican
congressman Mike Pompeo to be his first CIA director fit this mold of having political
appointees. Likewise, the appointment of former diplomat John Bolton as President
Trump’s third national security adviser also raised alarm bells regarding politicization
driven by a strong policy advocate with a record of misrepresenting intelligence.19
On the positive side, the appointment of a competent if controversial professional
intelligence officer, Gina Haspel, as the first female CIA director likely will have a
mixed impact on the policy-intelligence relationship.20 Her nomination hearings were
clouded by criticism of her involvement in the discredited CIA “torture” program
and senatorial complaints that she might not stand up to President Trump’s seem-
ing attraction to harsher interrogation methods. Yet she pledged as a professional to
speak truth to power and seemed to demonstrate this in the 2019 Worldwide Threat
Assessment hearings, when she and DNI Dan Coats laid out IC assessments on Rus-
sia, Iran, North Korea, and ISIS that the media characterized as being at odds with the
president’s own views.21 Periodic presidential dissatisfaction with his intelligence and
law enforcement leaders now appears almost predictable, if they are asked to set the
record straight.
President Trump has also proven to be an indifferent reader of the PDB. According
to numerous press reports, he does not enjoy reading it and is content to be briefed
orally on intelligence topics. While he receives the PDB daily, it is clear he is not overly
focused on using an intelligence briefing to shape his agenda.22 Some CIA careerists
defend this practice as not being a huge deviation from some past presidents who
also did not read every item or who preferred oral briefings; they note that other presi-
dents also relied on their national security advisers to tell them which intelligence
reports were significant.23 From what reporters have learned, the president’s national
security adviser and other key White House officers remain readers of the PDB.
Policy disputes in which intelligence assessments play a role are often a reason for pres-
idential distrust of and disregard for intelligence. As mentioned earlier, policymakers
244 Chapter 10
have their policy agendas and their own worldviews. When intelligence challenges
either of those, conflict is sure to erupt. Because intelligence brings facts and uniquely
secret information into a policy discussion, it can play an incredibly powerful role in
supporting or opposing presidential decisions. A longtime scholar of the intelligence-
policy relationship, Joshua Rovner, has noted that normal friction between intelli-
gence and policy results when the two hold different assessments about the quality,
objectivity, and implications of intelligence assessments. In such circumstances, well-
informed policymakers have every right to challenge intelligence assessments and to
demand the IC explain and prove its case. However, politicization most often occurs
when policy officials try to manipulate or cherry-pick intelligence to suit their policy
preferences.24 Those instances tend to be ones where policymakers are so committed
to a set of policies that any hint that intelligence might question their basis would be
extremely damaging politically. Sometimes those instances reflect a genuine discon-
nect between policies and the intelligence that might undergird them. In others, poli-
cymakers accuse intelligence officials of producing estimates specifically to challenge
policies with which they disagree.
The specific motivations for and forms of politicization are many, and Rovner’s
scholarship suggests they can be found in the policy assumptions and agendas,
bureaucratic parochialism and organizational processes, and partisan and scapegoat-
ing tactics embedded in the intelligence-policy relationship (see box 10.2).
Embedded assumptions: Analysts may embrace political and social assumptions held by poli-
cymakers that limit their exploration of intelligence issues. These may be driven by conven-
tional wisdom.
Partisan intelligence: Political parties can align themselves with or criticize intelligence for
partisan political gain. This can distort the work of intelligence agencies, leading them to be
more closely associated with particular political factions.
Intelligence as scapegoat: Intelligence assessments are regularly blamed for failed policies.
According to the “Washington Rule,” there are only policy successes and intelligence failures.
Source: Derived from a lengthy appendix in Joshua Rovner, Fixing the Facts: National Security Politics of Intel-
ligence (Ithaca, NY: Cornell University Press, 2011), 207–9. Used with author’s permission.
The Challenges of the Intelligence-Policy Relationship245
In retrospect, senior CIA officials have documented how their warnings of deterio-
rating political conditions in South Vietnam had been provided through field report-
ing, CIA assessments, and NIEs, which President Johnson and Secretary McNamara
dismissed as too pessimistic and politically inconvenient. Only much later did the
former defense secretary acknowledge in his own memoirs that those intelligence
assessments were correct and he had been “wrong, terribly wrong.”31
had failed to forecast the continued buildup of Soviet strategic forces because of the
agency’s support for détente and a mistaken belief that the Soviet Union subscribed
to American views of mutual deterrence.35 Team B, made up of those subscribing to
the Wohlstetter-Nitze view, naturally concluded that CIA analysts (Team A) had used
incorrect assumptions in forecasting Soviet force projections, which reflected a bias
for the Kissinger policies of détente. Later examinations of the entire Team A / Team B
exercise concluded that its findings were hardly objective or independent of bias
themselves.36
A more balanced critique by the then chairman of the House Armed Services Com-
mittee, Les Aspin, concluded that CIA estimators had used incorrect assumptions
about how Soviet planners would retire older weapon systems. CIA analysts may also
have fallen prey to mirror-imaging in presuming that Soviet planners would favor
eliminating obsolete weapons and favor quality over quantity by producing fewer
missile launchers carrying more warheads; however, political bias was not the basis
of those calculations.37
the Senate Select Committee on Intelligence, Bob Graham. He and other Democrats
expected a lively Senate debate over giving President Bush an authorization to use
force. That only a half dozen senators bothered to read the classified and lengthy
estimate also suggests it was not a critical determinant of the congressional decision
to go to war.
In evaluating whether politicization occurred or not, the subsequent 2004 Robb-
Silberman WMD commission concluded that there was no evidence of blatant pres-
sure on the CIA to alter intelligence judgments to support the Bush administration’s
policies. The commission did not evaluate how the Bush administration used intel-
ligence. And this, in fact, is where some former intelligence officials centrally involved
in the assessments regarding Iraq believed politicization occurred. Paul Pillar, the
national intelligence officer for the Middle East and one of the authors of the 2002
NIE, contends that Bush officials “pocketed” the flawed judgments on Saddam’s
WMD programs because they helped build the case; moreover, White House officials
went further in knocking down any intelligence judgments that conflicted with the
campaign to sell the war’s legitimacy.40
Pillar’s argument is that senior Bush officials conspired to selectively cite intel-
ligence reporting they liked, dismiss or discredit analysis they did not like, and
encourage alternative intelligence assessments that favored their own views of
Iraq’s involvement in terrorism. Senior officials such as Vice President Cheney
and Secretary Rumsfeld regularly appeared before congressional committees or
on major TV programs, citing often uncorroborated intelligence reports that they
characterized as providing absolute certainty that Saddam had a nuclear program.
Simultaneously, some officials were actively discrediting anyone who had presented
disconfirming evidence. In particular, Cheney’s chief of staff had tried to punish for-
mer ambassador Joseph Wilson, who had confirmed to the CIA that reporting on
Iraq’s purchase of “yellow cake” uranium ore from Niger was entirely bogus. Finally,
Rumsfeld’s deputies had set up an in-house Pentagon unit for producing alternative
intelligence assessments aimed at finding links between Iraq and al-Qaeda, which
the CIA had largely dismissed. Known as the Policy Counter Terrorism Evaluation
Group, its mission was to collect as much information as possible of those possible
links for use with the public but also to undermine IC assessments that dismissed
this linkage.
In view of these less visible forms of politicization and a steady stream of official
requests for only information that confirmed prowar positions, Pillar believes that
there was a not so subtle message to analysts: “Intelligence officers also did not need
explicit threats or pressure to be all too aware of the ways in which producing what
policymakers did not want to hear would make the officers’ professional lives unpleas-
ant but producing what was wanted would reduce the unpleasantness.”41
The Challenges of the Intelligence-Policy Relationship249
A final fault line in the intelligence-policy relationship over Iraq occurred as the
war was about to be launched. NIO Pillar had commissioned two interagency assess-
ments on the impact of Saddam’s removal on regional stability and Iraq’s domestic
future. Requested by Colin Powell’s policy planning director, Richard Haass, both
reports were generally pessimistic about the impact the war would have on the region
and Iraq’s future. One suggested that an invasion could bolster anti-American sen-
timent as a result of the occupation and generate support for al-Qaeda. The other
warned that Iraq had little prospect for representative democracy because it was a
society deeply divided among Sunni, Shia, and Kurdish factions and faced a huge
economic recovery problem.42 “No one who accepted and reflected on these assess-
ments’ conclusions,” as Pillar recounts, “could possibly think the war was a good
idea.”43 Not surprisingly, the Bush administration paid no heed to these assessments,
largely ignoring the implications that the United States would have to shoulder a
much larger and longer role in providing security and economic assistance to guar-
antee Iraq’s recovery.
Lost in translation was an important footnote to this judgment clarifying that the
estimators meant that only the “weapons design” aspects of the nuclear program had
been halted, not the covert, large-scale uranium enrichment necessary to produce
weapons-grade fuel. Also, the IC concluded in the later parts of the key judgments
that Tehran’s agreement to sign an additional safeguards protocol was the result of
“international scrutiny and pressure resulting from exposure of Iran’s previously
undeclared nuclear work.” In essence, the IC believed it was confirming that the Bush
administration’s efforts to pressure Iran were working. In preparing these new find-
ings, the then DNI Michael McConnell also promised the White House, and later
announced to the press, a new policy of not releasing declassified key judgments as
had occurred with the 2002 Iraq NIE.
The reaction from policymakers was quite different. First, the White House
reached the conclusion that the key judgments were so different in tone from those
in 2005 that they were likely to leak selectively and would draw fire from Congress.
So, President Bush directed that the entire key judgments be declassified to show
how much of the Iranian program was unaffected. Second, the administration found
itself caught in a dilemma of explaining why more pressure on Iran was needed,
if indeed a major part of Tehran’s weaponization program had been halted. It was
in the process of urging European allies, Russia, and China to join in additional
sanctions measures. The release of the estimate’s key judgments would most likely
weaken support among those countries, and indeed it did. State and DOD defend-
ers of the Bush actions against Iran accused the IC of political bias and trying to sty-
mie the White House plans to threaten Iran with harsher measures, even possible
military strikes.46 Voices in Congress concluded that the military option was off the
table and that allies would be less likely to back more hawkish moves against Iran.47
While the White House attempted to put the best spin on the NIE, it was unhappy
about the tenor and timing of this estimate, about which the IC had not warned the
president.
Charges of analysts infusing their political bias into this estimate were unfounded,
and intelligence professionals defended the NIE for its careful weighing of evidence
and the genuine surprise that they felt in receiving new information confirming a
halt in the weaponization process.48 Senior intelligence officials did wonder if the key
judgments’ prose that was released would be easily understood by outsiders without
knowledge or clearances. This example of intelligence-policy differences highlights
just how different the two tribes’ perspectives can be. By 2007, senior policymakers
were well acquainted with Iran’s nuclear program and did not need a general tutorial
of how the IC had covered Iran in the past, allowing the IC to go directly to what had
changed. On the other hand, the public and Congress would not read the estimate in
the same fashion, and they would not appreciate that the estimate was referring only
The Challenges of the Intelligence-Policy Relationship251
to one part of the nuclear program, while other parts (e.g., the production of fissile
materials and testing of ballistic missiles) continued unchanged.
disclosures of alleged hacked emails on sites like DCLeaks.com and WikiLeaks and
by the Guccifer 2.0 online persona are consistent with the methods and motivations
of Russian-directed efforts.”50
This was only part of the IC’s assessment. Once the election was over, the IC
reported that in addition to the cyberattacks on the Democratic candidate and party
organization and selected state electoral systems, the shadowy Internet Research
Agency in Russia had run a massive disinformation and propaganda campaign.
According to various media reports, this social media campaign involved hundreds
of individuals, costing millions of dollars; more important, it may have reached over
a hundred and twenty-five million Americans via a variety of social media websites.
The combined effect of the hacking and social media campaigns raised serious ques-
tions about the results of the presidential election that was determined by fewer than
eighty thousand votes across three states key to the Electoral College’s tally.
After briefing both President Obama and president-elect Trump, the IC issued a
joint CIA, FBI, NSA, and DNI report in January 2017 (see box 10.3). Looking back to
the campaign, an observer can raise a number of questions. First, should President
Obama and his administration have intervened more actively during the campaign
to alert Americans about Russian meddling? Would the public perceive such action
as a sitting Democratic president, in essence, intervening in an ongoing presidential
Source: ODNI, Assessing Russian Activities and Intentions in Recent US Elections, Intelligence Community
Assessment, January 2017, https://www.dni.gov/files/documents/ICA_2017_01.pdf.
The Challenges of the Intelligence-Policy Relationship253
election that might sway voters in a favorable direction? Related to that, should intel-
ligence agencies have spoken out more publicly as well? On the one hand, intelli-
gence is not supposed to get involved in political matters; on the other hand, to avoid
alerting the American public of the Russian interference might itself have helped
determine the election’s outcome.
An equally vexing question is how would a newly elected president, whose vic-
tory might well have benefited from Russian interference, respond to the intelligence
assessment provided to him by his intelligence advisers? President Trump’s campaign
posture had been to deny any connection to the Russian government and to assert
that the IC was merely speculating that the Russian government was behind the email
leaks. Once in office and officially briefed, President Trump remained ambivalent
regarding the veracity of the intelligence assessments when he mused that it might
have been Russia or it might have been someone else; however, he was adamant that
those activities had not affected the election. Moreover, he repeatedly misrepresented
the intelligence assessments and the results of the 2018 House intelligence commit-
tee investigations by saying they confirmed that the Russian activities had not helped
him or had any connection to his campaign.51 In both cases, he misstated what the IC
and congressional committee had concluded. Hence, President Trump was fudging
the intelligence he received, for his own political and personal advantage.
Like no other president—except perhaps Richard Nixon—Donald Trump has formed
a hostile perception of the law enforcement and intelligence communities. He acts
as if he believes that they are intentionally disloyal if they present evidence of Rus-
sian behavior that suggests he may have personally benefited from those actions.
This places the IC in an exceedingly awkward position of trying to present objective
judgments on ongoing counterintelligence threats to an unwilling audience. While
this particular set of circumstances is unique in American history, it highlights the
inherent danger when intelligence officials attempt to present inconvenient truths to
senior policy officials. The result is often that policymakers will attempt to discredit
the reports, as well as the agencies presenting them, in order to rescue their policies or
personal reputations. In such cases, intelligence agencies have little ability to defend
themselves. Only Congress, which can also act on the basis of intelligence, has the
power to correct the record publicly, but it too is presently polarized and in a poor posi-
tion to give a more objective review of the IC’s performance.
The foregoing cases of politicization of intelligence suggest that it can occur for a
variety of reasons and be committed by both the policymaker and the intelligence
officer. Blatant politicization, as seen in the case of the Vietnam War estimates and
254 Chapter 10
the Nixon-era disputes over strategic nuclear assessments, happens less often than
generally appreciated. Subtler forms of politicization are usually at work, when
“high politics” are in play. In the Iraq case, policymakers used intelligence selec-
tively to win support but ignored and dismissed other assessments that would
undermine their public diplomacy. This cherry-picking of intelligence happens reg-
ularly, often simply when informal policy discussions ensue. However, sometimes
this practice can force senior officials—as in the case of the 2007 Iran NIE—to get
the full story out by declassifying assessments they otherwise would prefer to keep
secret. Finally, there is a natural tendency for those running programs to assess
their operations more favorably than intelligence agencies with no direct responsi-
bility for them. In those few instances where military intelligence is slanted toward
more positive assessments, they are often a matter of opinion and highly subjective.
One person’s slanted intelligence is another person’s more rigorous analysis. For all
these reasons, a friction-free intelligence-policy relationship free from politiciza-
tion is not likely to emerge.
In 2016, the tables were turned as Republicans controlled both houses of Congress.
This time it was House Permanent Select Committee on Intelligence investigations
into Russian interference in recent US elections that has been stymied by sharp dis-
agreements between its ranking Republican and Democratic members.55 Separate
majority and minority reports were issued, which disagreed on whether these inves-
tigations uncovered Trump campaign collusion with Russia. Much of this played out
on television as leading Democratic members of the House attacked the Republican
report as a whitewash, and Republicans called for a speedy end to the many investiga-
tions underway. At the time of this writing, the congressional battles with the Trump
White House and the Justice Department over the just-released Mueller Report
promise to ignite another round of partisan debates over the quality and integrity of
intelligence and law enforcement activities.
The other feature that is alarming is the more open commentary on national secu-
rity topics by former senior intelligence officials. Heretofore, most departing direc-
tors and deputy directors avoided directly engaging in partisan debates. They were
mostly content to write memoirs about their past service or sit on boards of major cor-
porations or think tanks. With few exceptions, they were satisfied if asked to provide
advice privately to legislators or executive branch officials. The 2016 elections have
seemingly changed this. A number of former Bush and Obama intelligence officials
have become regular commentators on CNN, MSNBC, and Fox News. This follows
news outlets’ earlier use of retired senior military officers to comment on ongoing
national security issues. Some of these officers have also decided to become strong
backers or critics of presidential candidates; in 2016, retired general John Allen
spoke at the Democratic convention on behalf of Hillary Clinton, and retired gen-
eral Michael Flynn gave a rousing speech for Donald Trump at the Republican con-
vention. In response, former JCS chairman Martin Dempsey has admonished such
behavior, as it can give the appearance of a military that is itself politicized and less
professional.56
In late 2016, former CIA directors Michael Hayden and John Brennan and DNI
James Clapper challenged President Trump’s attacks on the IC (especially the CIA
and FBI) as well as criticized his admiring comments about Vladimir Putin. Since
leaving office, Brennan and Clapper have gone well beyond defending the IC to criti-
cizing Trump’s statements or actions as dangerous. They have also hinted that the
president himself may have personal and unpatriotic motives for discrediting intel-
ligence and refusing to admonish Russian behavior.57 In response, President Trump
has gone beyond just attacking these individuals publicly to terminating John Bren-
nan’s security clearance and threatening to do the same for other former officials
criticizing him or his actions. Both these former officials’ actions and the president’s
256 Chapter 10
response are almost unprecedented and reveal a deep division between intelligence
and the president it serves.
While these former officials have the right to exercise free speech, their state-
ments also give the appearance of an IC that is prepared to engage in politics. If this
becomes more widespread, there is a danger that the comments of former senior offi-
cials could undermine the public’s view that intelligence agencies are above party
politics when issuing their findings. Likewise, the president’s broad attack on some
past and even current leaders of the intelligence and law enforcement communities
will spark further politicization charges and undermine public trust in the nonpoliti-
cal nature of intelligence activities.
judgments that diverge from a consensus view. For all its flaws, the 2002 Iraq WMD
estimate contained important dissents by the State Department’s Bureau of Intelli-
gence and Research and the Department of Energy’s intelligence office, which doubted
that Saddam had reconstituted his nuclear program or had acquired the proper steel
cylinders for fashioning nuclear centrifuges. Procedures adopted since that estimate
have also encouraged more sharing of views across the community, more rigorous
drafting of key judgments to reflect only the actual text that follows, and inclusion in
key judgments all dissents or minority views held in the IC.59
educating analysts about the policy process, and many IC agencies strive to give
their stronger analysts opportunities to serve in policy agencies to broaden their
understanding of how policymakers operate. A comparable effort to educate policy-
makers on the IC does not exist. The sole opportunity for this at the moment is the
presidential transition process, when intelligence officials can meet with the presi-
dent-elect and his or her likely key advisers to begin a dialogue. This is a time when
a future president and his or her team might be most susceptible to understand-
ing how the IC is postured to meet the new administration’s information needs.
The briefers should not only cover the latest intelligence but should also conduct a
high-level tutorial on intelligence, particularly for those officials who had not served
previously in government and perhaps have never held a security clearance or seen
classified information.
A third lesson is that selecting senior intelligence officials who have both the
subject-matter competence and the confidence of the White House can dramatically
shape the intelligence-policy relationship. There is no single recipe for successful
intelligence leadership. Seemingly well-informed former military and civilian offi-
cials have failed as CIA directors and DNIs. Others with little practical experience in
intelligence but great political skills have succeeded without overly politicizing intel-
ligence. Whoever a president selects for intelligence advisers should, however, under-
stand the role he or she is to play and the red lines between intelligence and policy.
As intelligence has become such an integral part of the policymaking process, the
senior-most positions in the IC are just as important as selecting a national security
adviser or secretaries of state and defense. Some scholars have recommended those
positions come with a set term of office, like the FBI director’s, in order to make those
assignments less political. That has merit but only if a president and those advisers
can develop a trusting relationship.
Finally, it is unreasonable and unlikely to expect the IC could return to a Kent-
style model of arm’s-length advising, given the need for rapid and constant intelli-
gence support. As one scholar notes, it was possible in the Cold War to rely on such
a model when the dominant strategy was “deterrence” of a low-probability Soviet
nuclear strike.61 In the twenty-first-century world of quickly emerging transnational
threats, intelligence must be at the elbow of policymakers and run the risk that its role
can become politicized. Few would argue that a less forward-leaning IC would have
prevented the Russian interference into the 2016 elections. Likewise, the increasing
openness in discussing intelligence as part of American foreign policy debates is also
not likely to decline. The challenge will be to establish the correct balance between
keeping intelligence secret so it can provide decision-advantage to policymakers and
still providing enough information for an informed congressional and public debate
over critical national security decisions.
The Challenges of the Intelligence-Policy Relationship259
USEFUL DOCUMENTS
Iraq’s Continuing Program for Weapons of Mass Destruction: Key Judgments (from October
2002 NIE), https://www.dni.gov/files/documents/Iraq_NIE_Excerpts_2003.pdf
National Intelligence Council, Iran: Nuclear Intentions and Capabilities, 2007 NIE, https://
www.dni.gov/files/documents/Newsroom/Press%20Releases/2007%20Press%20Releases
/20071203_release.pdf
ODNI and DNI, Background to “Assessing Russian Activities and Intentions in Recent US Elec-
tions”: The Analytic Process and Cyber Incident Attribution, January 6, 2017, https://www
.dni.gov/files/documents/ICA_2017_01.pdf
Special Counsel Robert S. Mueller, Report on the Investigation into Russian Interference in
the 2016 Presidential Election, vols. 1 and 2, March 2019, https://www.justice.gov/storage
/report.pdf
FURTHER READING
Richard Betts, Enemies of Intelligence: Knowledge and Power in American National Security
(New York: Columbia University Press, 2011).
A compilation of this intelligence scholar’s views on intelligence analysis, politicization,
and the intelligence-policy relationship.
James Clapper, Facts and Fears: Hard Truths from a Life in Intelligence (New York: Penguin /
Random House, 2018).
Recounts a former DNI’s experiences dealing with policymakers, including presidents
unwilling to accept intelligence judgments.
Thomas Fingar, Reducing Uncertainty: Intelligence Analysis and National Security (Stanford,
CA: Stanford University Press, 2011).
Describes the lessons learned from working closely with policymakers and how intel-
ligence was used and misunderstood by various administrations.
John L. Helgerson, Getting to Know the President: Intelligence Briefings of the Presidents, 1952–
2004 (Washington, DC: Center for the Study of Intelligence, 2012).
Provides a senior agency officer’s study of how the CIA has provided intelligence during
the transitions and terms of most recent presidents.
Paul Pillar, Intelligence and U.S. Foreign Policy: Iraq, 9/11, and Misguided Reform (New York:
Columbia University Press, 2011).
A practitioner’s critique of the intelligence-policy relationship that examines how intel-
ligence has not been the cause of failed policy choices but nonetheless suffers from
politicization to suit policy preferences.
Joshua Rovner, Fixing the Facts: National Security and the Politics of Intelligence (Ithaca, NY:
Cornell University Press, 2011).
The most serious study of politicization, using a series of case studies to argue that the
phenomenon should be expected when intelligence touches on high-stakes policy issues.
Gregory F. Treverton, “Intelligence Analysis: Between ‘Politicization’ and Irrelevance,” in Ana-
lyzing Intelligence: Origins, Obstacles, and Innovations, 1st ed., ed. Roger Z. George and
James Bruce (Washington, DC: Georgetown University Press, 2008).
260 Chapter 10
Focuses on the types of politicization that can occur and the methods for countering
them.
NOTES
First epigraph: Robert Gates, From the Shadows: The Ultimate Insider’s Story of Five Presidents
and How They Won the Cold War (New York: Simon & Schuster, 1996), 567.
Second epigraph: Sherman Kent, “Estimates and Influence,” in Don Steury, Sherman Kent, and
the Board of National Estimates, Collected Essays (Washington, DC: Center for the Study of
Intelligence, 1994), 42.
1. Robert Jervis, “Why Intelligence and Policymakers Clash,” Political Science Quarterly
125, no. 2 (Summer 2010): 185–204.
2. James Steinberg, “The Policymaker’s Perspective: Transparency and Partnership, in
Roger Z. George and James Bruce, Analyzing Intelligence: National Security Practitioners’
Perspectives (Washington, DC: Georgetown University Press, 2014), 2nd ed., 94.
3. The author as analyst recalls having examined numerous dissemination lists of assess-
ments he prepared and found that far more copies were distributed among other intelligence
agencies’ analysts than were turned over to policy agencies.
4. Richard Immerman, The Hidden Hand: A Brief History of the CIA (New York: John
Wiley, 2014), 150.
5. Robert Gates, From the Shadows: The Ultimate Insider’s Story of Five Presidents and
How They Won the Cold War (New York: Simon & Schuster, 1996), 56. Gates also recounts that
senior managers discouraged him from taking an NSC assignment as it was not considered
career enhancing, exactly the opposite of what he came to believe after serving on the Nixon,
Carter, and Reagan NSC staffs.
6. According to John McLaughlin, a former deputy director of the CIA, Gates insisted
that any analyst who wished to compete for a senior management job serve a tour in a policy
agency before being promoted. See John McLaughlin, “Serving the National Policymaker,” in
George and Bruce, Analyzing Intelligence, 2nd ed., 84.
7. As a member of the policy planning staff, the author was able to direct intelligence
requirements to CIA offices and get quick responses to State Department counselor Robert
Zoellick and policy planning director Dennis Ross, for whom he worked. This assignment also
involved organizing senior intelligence briefings for these officials.
8. Richard K. Betts, Enemies of Intelligence: Knowledge and Power in American National
Security (New York: Columbia University Press, 2009), 77.
9. Cited in David Priess, The President’s Book of Secret: The Untold Story of Intelligence
Briefings to America’s Presidents from Kennedy to Obama (New York: PublicAffairs, 2016),
165.
10. Bush laments that when Jimmy Carter became president, he did not keep him on in
order to depoliticize the CIA director’s job. He urged his son later to keep CIA director George
Tenet, partly to dispel the notion that the CIA job was a political assignment.
11. Christopher Andrew, For the President’s Eyes Only: Secret Intelligence and the Ameri-
can Presidency from Washington to Bush (New York: Harper Perennial, 1996), 3.
The Challenges of the Intelligence-Policy Relationship261
12. Quoted in Robert Gates, “An Opportunity Unfulfilled: The Use and Perceptions of Intel-
ligence at the White House,” Washington Quarterly, Winter 1989, 42.
13. See Evan Thomas, “Why Nixon Hated Georgetown,” Politico, June 4, 2015, https://www
.politico.com/magazine/story/2015/06/richard-nixon-georgetown-set-118607.
14. John L. Helgerson, Getting to Know the President: Intelligence Briefings of the Presidents,
1952–2004 (Washington, DC: Center for the Study of Intelligence, 2012), 170–71, https://www
.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs
/getting - to - know - the - president /pdfs / U - % 20Book - Getting % 20to % 20Know % 20the % 20
President.pdf.
15. Priess, President’s Book of Secrets, 227.
16. David Stout, “CIA Director Goss Resigns,” New York Times, May 6, 2006, https://www
.nytimes.com/2006/05/05/washington/05cnd-cia.html.
17. Linda Qiu, “How Trump Has Flip-Flopped on Intelligence Agencies,” New York Times,
December 7, 2017, https://www.nytimes.com/2017/12/07/us/politics/trump-reversals-fbi
-intelligence-agencies.html.
18. Qiu. “Active measures” is the term applied to Soviet/Russian covert political warfare
designed to increase Moscow’s influence over world events and diminish US and other West-
ern powers’ influence.
19. See former deputy secretary of state Anthony Blinken’s New York Times op-ed that
lays out the numerous charges made against John Bolton when he was a senior State Depart-
ment official during the Bush administration. The story recounts how Bolton misused intel-
ligence and employed blatant pressure and threats to force changes in intelligence judgments.
Anthony Blinken, “When Republicans Rejected Bolton,” New York Times, March 23, 2018,
https://www.nytimes.com/2018/03/23/opinion/john-bolton-republicans.html.
20. Director Haspel has also selected a career analyst and senior manager, Vaughn Bishop,
as her deputy director, which could further insulate the agency from political pressures that a
White House might like to exert in the future.
21. Jaqueline Thomsen, “Trump Strain with Intel Chiefs Spills into the Public,” The Hill,
February 2, 2019, https://thehill.com/policy/national-security/428157-trumps-strain-with-intel
-chiefs-spills-into-public.
22. Carol Leonnig, Shane Harris, and Greg Jaffe, “Breaking with Tradition, Trump Skips
Reading President’s Written Intelligence Report for Oral Briefings,” Washington Post, Febru-
ary 9, 2018, https://www.washingtonpost.com/politics/breaking-with-tradition-trump-skips
-presidents-written-intelligence-report-for-oral-briefings/2018/02/09/b7ba569e-0c52-11e8
-95a5-c396801049ef_story.html?utm_term=.694e7cd2b642.
23. David Priess, “CIA Tailors Its Briefing So It Doesn’t Anger Trump; That’s Good,” Wash-
ington Post, December 14, 2017, https://www.washingtonpost.com/news/posteverything/wp
/2017/12/14/the-cia- tailors-its-briefings-so-it-doesnt-anger- trump- thats-good/?utm_term=
.0f099c5983be.
24. Joshua Rovner, Fixing the Facts: National Security and the Politics of Intelligence
(Ithaca, NY: Cornell University Press, 2011), 29.
25. See Harold Ford, CIA and the Vietnam Policymakers: Three Episodes, 1962–1968 (Wash-
ington, DC: Center for the Study of Intelligence, 1991), https://www.cia.gov/library/center
-for-the-study-of-intelligence/csi-publications/books-and-monographs/cia-and-the-vietnam
-policymakers-three-episodes-1962-1968/.
262 Chapter 10
39. CIA director George Tenet recounts that a “presidential decision on going to war was
always alluded to by the NSC in hypothetical terms, as though it were still up in the air and the
conferees were merely discussing contingencies.” See George Tenet, Center of the Storm: My
Years at CIA (New York: HarperCollins, 2007), 308.
40. Paul R. Pillar, Intelligence and U.S. Foreign Policy: Iraq, 9/11, and Misguided Reform
(New York: Columbia University Press, 2011), 140.
41. Pillar, 155.
42. See National Intelligence Council, Regional Consequences of Regime Change in Iraq,
Intelligence Community Assessment, January 2003, https://www.cia.gov/library/readingroom
/docs/DOC_0005299385.pdf; and National Intelligence Council, Principal Challenges of a
Post-Saddam Iraq, Intelligence Community Assessment, January 2003, https://www.cia.gov
/library/readingroom/docs/DOC_0005674817.pdf.
43. Pillar, Intelligence and U.S. Foreign Policy, 58.
44. See Gregory Treverton, Support to Policymakers: The 2007 NIE on Iran’s Nuclear Inten-
tions and Capabilities (Washington, DC: Center for the Study of Intelligence, 2013). This
case study provides a comprehensive look at the intelligence-policy friction surrounding this
estimate.
45. ODNI, Iran: Nuclear Intentions and Capabilities, National Estimate, November 2007,
https://www.dni.gov/files/documents/Newsroom/Press%20Releases/2007%20Press%20
Releases/20071203_release.pdf.
46. John Bolton, “Flaws in the Iran Report,” Washington Post, December 6, 2007, http://
www.washingtonpost.com/wp-dyn/content/article/2007/12/05/AR2007120502234.html.
47. Steven Lee Meyers, “An Assessment Jars Foreign Policy Debate on Iran,” New York
Times, December 2007, https://www.nytimes.com/2007/12/04/washington/04assess.html.
48. See Thomas Fingar, “It’s Complicated,” American Interest (May/June 2013): 31–35,
https://www.the-american-interest.com/2013/04/12/its-complicated/.
49. See US State Department, Soviet Active Measures: Forgery, Disinformation, and Politi-
cal Operations, Special Issue No. 88, October 1981, https://www.cia.gov/library/readingroom
/docs/CIA-RDP84B00049R001303150031-0.pdf.
50. Department of Homeland Security, Joint Statement of the Department of Homeland
Security and Office of the Director of National Intelligence on Election Security, October 2017,
https://www.dhs.gov/news/2016/10/07/joint-statement-department-homeland-security-and
-office-director-national.
51. Greg Miller, Greg Jaffe, and Philip Rucker, “Doubting the Intelligence, Trump Pursues
Putin and Leaves a Russian Threat Unchecked,” Washington Post, December 14, 2017, https://
www.washingtonpost.com/graphics/2017/world/national-security/donald- trump-pursues
-vladimir-putin-russian-election-hacking/?utm_term=.4af26317f918; Greg Megerian, “Trump
Praises House Republicans Who Found No Evidence of Russian Collusion,” Los Angeles Times,
March 13, 2018, http://www.latimes.com/politics/la-na-pol-essential-washington-updates
-president-trump-praises-house-1520952667-htmlstory.html.
52. Marvin Ott, “Partisanship and the Decline of Intelligence Oversight,” International
Journal of Intelligence and CounterIntelligence 16 (2003): 69–94.
53. Senator Feinstein as chairperson initiated in 2009 a massive, years-long investiga-
tion into the CIA’s use of enhanced interrogation techniques, which concluded the program
was poorly run, caused the death of some detainees, and failed to elicit claimed information
264 Chapter 10
that resulted in foiled terrorist plots. See US Senate, Senate Select Committee on Intelligence,
Staff Study on the CIA’s Detention and Interrogation Program, December 2014, https://www
.feinstein.senate.gov/public/_cache/files/7/c/7c85429a-ec38-4bb5-968f-289799bf6d0e
/D87288C34A6D9FF736F9459ABCF83210.sscistudy1.pdf.
54. Jonathan Topaz, “GOP Senators Defend CIA in Alternative Report,” Politico, Decem-
ber 9, 2014, https://www.politico.com/story/2014/12/gop-senators-defend-cia-alternate-report
-113434.
55. As of this writing, the Senate Select Committee on Intelligence’s investigation into the
Russian hacking appear to be operating much better, largely because of the comity between
the ranking Democratic senator, Mark Warner, and Republican chairman Richard Burr. The
Senate’s investigations had not yet been released when this chapter was completed.
56. Martin Dempsey, “Military Leaders Do Not Belong at Political Conventions,” letter to
the editor, Washington Post, July 30, 2016, https://www.washingtonpost.com/opinions/military
- leaders-do-not-belong-at-political-conventions/2016/07/30/0e06fc16-568b-11e6-b652
-315ae5d4d4dd_story.html?utm_term=.a200eb158f2c.
57. See, e.g., Harriet Sinclair, “Trump Finances May Be the Next Shoe to Drop in Russia
Probe,” Newsweek, February 18, 2018, http://www.newsweek.com/james-clapper-donald-trump
-russia-probe-810357; and Matthew Rosenberg, “Ex-CIA Chief Says Putin May Have Compro-
mising Material on Trump,” New York Times, March 21, 2018, https://www.nytimes.com/2018
/03/21/us/politics/john-brennan-trump-putin.html.
58. The author was present when the then deputy director of intelligence John Kringen
addressed senior analysts at the CIA auditorium on the issue of analytical tradecraft.
59. Fingar, “It’s Complicated,” 32–33.
60. Rovner, Fixing the Facts, 199.
61. Gregory F. Treverton, “Intelligence Analysis: Between ‘Politicization’ and Irrelevance,”
in Analyzing Intelligence: Origins, Obstacles, and Innovations, 1st ed., ed. Roger George and
James Bruce (Washington, DC: Georgetown University Press, 2008), 101.
11
Intelligence and
American Democracy
265
266 Chapter 11
intelligence requires careful supervision, and its use must be consistent with the US
Constitution and federal law. This chapter will examine the challenges that intelli-
gence poses to democratic principles in its efforts to safeguard national security. The
executive, legislative, and judicial mechanisms for oversight will be described and
analyzed. Finally, the chapter will examine issues related to post-9/11 intelligence
operations and their impact on American democracy. Today the practice of intelli-
gence has become more complex, and the existing oversight framework that balances
security and liberty have been severely tested.
IS INTELLIGENCE ETHICAL?
Analysts must perform their functions with objectivity and with awareness
of their own assumptions and reasoning. They must employ reasoning
techniques and practical mechanisms that reveal and mitigate bias. Ana-
lysts must be alert to influence by existing analytic positions or judgments
and must consider alternative perspectives and contrary information. . . .
Analytic assessments must not be distorted by, nor shaped for, advocacy
of a particular audience, agenda, or policy viewpoint. Analytic judgments
must not be influenced by the force or preference for a particular policy.2
A second ethical issue for intelligence analysis involves providing its judgments on
a confidential basis to policymakers. To have maximum benefit and give policymak-
ers a decision advantage, analytical judgments should remain secret and available
only to those decision-makers with a need to know. This maxim has encouraged the
IC to classify virtually everything it produces as SECRET or TOP SECRET, depend-
ing on its sensitivity. Revealing what US intelligence knows about a foreign govern-
ment’s military plans and capabilities reduces policymakers’ ability to take advantage
of known vulnerabilities and to avoid an adversary’s strengths. Intelligence analysts
thus prepare assessments on the assumption that their judgments will remain secret,
so they can be as candid and objective as possible regarding a foreign government’s
behavior. If analysts believe their analysis will be leaked to the press, they would most
likely have to hold back on some assessments for fear of their impact on US diplomacy.
As discussed in chapter 10, the selective leaking or misrepresentation of intelli-
gence judgments can alter the political debate on important issues. This can politi-
cize intelligence in ways that do not serve the country well. Even the approved release
of controversial NIEs’ key judgments—such as the 2007 Iran nuclear estimate—can
produce huge political repercussions and generate subsequent regret on the part of
some senior intelligence officials regarding how they wrote those judgments. Current
ODNI policy is that there will be no future release of estimates or their key judg-
ments, but whether that stated policy will withstand future political pressure remains
to be seen. Unauthorized leaks, which have caused huge damage to US foreign policy
and intelligence performance, will remain a major threat, particularly with the rising
Intelligence and American Democracy269
IS SECRECY NECESSARY?
To many scholars and practitioners of intelligence, secrecy is the central concept that
distinguishes intelligence from other information used by national security decision-
makers. This is, to be sure, too narrow a definition of intelligence, but it is a start-
ing point for discussing the unique role intelligence plays in American democracy.
Americans have long been wary of secrecy as a tool of statecraft, bemoaning the Old
World’s reliance on secret alliances and treaties used to carve up much of the globe
and plot wars. Woodrow Wilson’s principle of “open covenants, openly arrived at”
during the Treaty of Versailles negotiations of 1919 captured the American ethos that
somehow the United States would operate differently from other nation-states.
270 Chapter 11
Yet in reality the United States has had to rely on secret intelligence from the time
it declared its independence—with Gen. George Washington presiding as essentially
the country’s first spymaster. Nonetheless, there has been discomfort with espionage,
surveillance, and reliance on secret information throughout US history. Secret intel-
ligence and spying were reluctantly deemed appropriate when the country was at war
but discontinued when peace ensued.
The solution to the dilemma of conducting secret intelligence in a democracy was
to ensure that there was proper governmental guidance on the purposes for which
it was conducted, the kinds of information that could be collected, and with whom it
could be shared. While the 1947 National Security Act was extremely vague on the
operation of the CIA and the authorities granted to the DCI (later the DNI), it did
charge this official with the protection of sources and methods used to collect secret
intelligence. The 1949 Central Intelligence Agency Act also authorized the agency to
protect (i.e., classify) the names and numbers of its employees. From the beginning,
the IC’s budget remained classified, hidden within the much larger Defense Depart-
ment’s appropriation. Only recently has the DNI agreed to publish the “top-line” (total
figure) of the IC’s spending as a nod to greater transparency.
Presidential executive orders have also laid out the IC’s responsibility to protect
secrets. However, they directed that these authorities could not be used to hide viola-
tions of law, administrative errors, or personal embarrassment of US agencies or offi-
cials. The IC was permitted only to classify information that was needed for national
security purposes in the following categories:
Given the tremendous powers that the IC has to collect and analyze secret infor-
mation, as well as conduct covert operations, there must be a system of oversight
and control to ensure that such authorities are not abused. Within the US govern-
ment, there is an elaborate framework of legislative, executive, and judicial review of
intelligence activities. It is complicated and far from perfect but probably the most
comprehensive oversight system of any democratic government in the world. It
was created over time to reflect the growing scale and complexity of US intelligence
operations as well as a result of intelligence failures and abuses that occurred along
the way.
Many of these checks on US intelligence activities reflect lessons learned from
painful mistakes made by intelligence agencies as well as a failure of effective execu-
tive and congressional oversight in the past. In particular, the current system is the
result of the Vietnam War protests of the 1960s and 1970s, which prompted the
Nixon White House to resort to extralegal surveillance of civil rights and antiwar
activists. On the heels of President Nixon’s resignation in 1974, revelations of CIA,
NSA, and FBI illegal surveillance of Americans led to the House and Senate investi-
gations (later known as the Pike and Church hearings, respectively) of wrongdoings
and intelligence failures.7 This series of public hearings produced massive reporting
on previously unknown plans, some of which had proposed illegal opening of mail,
wiretaps, and home entries. It also confirmed the existence of a seven-hundred-page
dossier of the CIA’s “Family Jewels”—a compilation of agency missteps that included
failed assassination attempts on Fidel Castro, mind-altering drug experimentation
Intelligence and American Democracy273
programs, and involvement in coup attempts.8 These hearings gave the appearance
of the CIA operating as a “rogue elephant,” as Sen. Frank Church once characterized
it, and called for further controls on intelligence agencies.9
Legislative Oversight
As a result of the Pike and Church hearings, both houses of Congress established
select committees on intelligence in the late 1970s.10 These two committees have
slightly different mandates (see box 11.1). The House Permanent Select Committee
on Intelligence (HPSCI) has exclusive jurisdiction over the national intelligence pro-
gram and shares jurisdiction over tactical military intelligence and budgets with the
House Armed Services Committee. The Senate Select Committee on Intelligence
has sole jurisdiction only over the CIA and the DNI and its various subelements (e.g.,
the NIC, NCTC, and NCPC). At the same time, the Senate Armed Services Commit-
tee essentially retains oversight of the much larger defense intelligence programs
and budgets of the NSA, NRO, NGA, and DIA. Although these two oversight com-
mittees carry out the bulk of the oversight responsibilities, it should be noted that
the armed services, judiciary, homeland security, and appropriations committees do
retain substantial leverage when it comes to defense intelligence (roughly 70 per-
cent of the IC’s budget), FBI and DHS intelligence activities, and any intelligence
appropriations.
The House Permanent Select Intelligence Committee (HPSCI) was established in 1977, and
its size has fluctuated from twenty to twenty-two members. The majority-minority ratio is
roughly comparable that found in the full House but generally is no more than a 3:2 ratio.
At least one member must be drawn from the membership of the House Appropriations,
Armed Services, Judiciary and Foreign Affairs Committees. The HPSCI has jurisdiction over
the National Intelligence Program and the Military Intelligence Program. Jurisdiction over
the FBI and DHS is shared with other committees of the judiciary and homeland security.
The Senate Select Committee on Intelligence (SSCI) was established in 1976 and is currently
composed of fifteen senators. By custom, the majority party always has eight members and
the minority has seven members, regardless of the full Senate composition. In a sign of
bipartisanship, the SSCI also has a vice chairman representing the minority party. At least
one member is drawn from the armed services, foreign relations, appropriations, and judi-
ciary committees. The chairman and ranking minority member of the Senate Armed Ser-
vices Committee are also ex officio members of the SSCI. The SSCI has jurisdiction only
over the National Intelligence Program budget, including the CIA and the Office of the DNI.
Otherwise, it has limited jurisdiction over DOD, DHS, Treasury, and Justice Department enti-
ties with the corresponding committees of the Senate.
274 Chapter 11
For reassuring the public’s confidence in intelligence, the SSCI has the responsibil-
ity for confirming the appointment of the DNI, the CIA director, and all other direc-
tors of the National Intelligence Program, including those within the Department of
Defense, such as the NSA and DIA. This lends the SSCI the power to hold public
hearings and grill those officials on their views prior to confirming them. This can be
a platform from which to express critical views and concerns regarding the operation
of intelligence as well as to extract promises of greater transparency and truthfulness
regarding the IC’s performance. As was demonstrated in early 2018, the nomination
of Gina Haspel as CIA director allowed for a robust congressional and public debate
over past CIA conduct regarding secret detention camps and enhanced interrogation
techniques. Her pledge to speak truth to power in dealing with President Trump as
well as to never to employ “torture” again were conditions on which her nomination
was narrowly approved.
The earlier chapter on covert action described in great detail the procedures for
sharing presidential findings with Congress. However, it is worth underlining the key
role the intelligence oversight committees play in reviewing and commenting on
highly classified CIA operations. The 1980 law requires that the CIA share presiden-
tial findings with both House and Senate oversight committees in a timely manner
(see box 11.2). While these committees have no power to stop or modify those opera-
tions, hypothetically they could encourage the passage of legislation to prevent their
future funding or alter their scope. Having that kind of power tends to discourage
ill-advised or highly risky operations. When a covert action is considered extremely
sensitive, the president may decide to delay notification beyond the normal forty-
eight-hour period. Alternatively, the president may elect to brief only a select group of
congressional leaders. Often, the so-called Gang of Eight—the Senate majority leader
and the House speaker, along with their ranking minority leaders and the chairmen
The 1980 Intelligence Oversight Act requires the CIA director to keep the intelligence over-
sight committees “fully and currently informed of all intelligence activities, including any
significant anticipated intelligence activity.” It requires timely notification of any significant
illegalities or intelligence failures. Importantly, it supersedes the Hughes-Ryan Amendment
in providing that the president notify the intelligence oversight committees of any decision
for a planned covert action and lays out the procedures and timelines for such notifica-
tion. In exchange for eliminating the requirement that the CIA report significant intelligence
operations to up to eight separate congressional committees, it reduced that requirement to
only the two intelligence oversight committees and demanded a set of detailed procedures
(later known as “findings” and “notifications”) for informing those committees of presiden-
tially approved covert actions.
Intelligence and American Democracy275
“The CBJB is the annual report to Congress that describes in detail the full extent of intel-
ligence capabilities, essentially detailing what we’d done with the money that had been allo-
cated to us and justifying our requests for the following year. It went into specifics about
many programs—how they worked, what results they produced, and the effect they had on
national security. It covered how we protected our forces from insurgent attacks and how
we assessed adversarial leaders’ intentions. It explained how we monitored proliferation of
weapons of mass destruction, including in Iran, North Korea, and Syria. It contained, in short,
the full expanse of how the US conducts intelligence.”
Source: James Clapper, Facts and Fears: Hard Truth from a Life in Intelligence (New York: Viking, 2018), 240.
276 Chapter 11
Reconnaissance Office had not spent previously appropriated and designated funds
and later reprogrammed some monies for its headquarters building in Northern
Virginia. The NRO had never briefed these plans to Congress. Needless to say, the
committee’s chairman held hearings and demanded an explanation and ultimately a
resignation of a senior NRO official.11
Congressional oversight via its hearings and independent investigations can also
constrain and shape intelligence activities. In the wake of the 2002 Iraqi WMD NIE
scandal, both oversight committees undertook their own investigations into what
went wrong. They reviewed intelligence documents, interviewed analysts and manag-
ers, and reached a series of critical findings regarding CIA and IC analytical tradecraft
practices. Similarly, in 2011, at the behest of the then chairperson Dianne Feinstein,
a two-year staff investigation focused on the CIA’s secret detention and interroga-
tion program. A massive classified final report outlining the program’s flaws and false
claims—including a redacted six-hundred-page summary—was prepared to underline
the committee majority’s belief that the program was misguided and should never be
repeated. More contemporary examples have been the separate House and Senate
committee investigations into the Russian interference in the 2016 elections, which
are not yet completed at the time of writing.
ask the PIAB to perform postmortems on intelligence failures and examine the
effectiveness of implemented intelligence reforms. For example, President George
W. Bush’s NSC staff engaged the PIAB during the 2008 revisions to the FISA. Presi-
dent Obama also reportedly directed his PIAB to examine the intelligence failure
surrounding the “Underwear Bomber’s” nearly successful downing of an airliner in
2009; the board also proposed ways to manage the expanding volume of data on
the Internet and investigate what the government can do about WikiLeaks types of
disclosures.
The PIAB has fluctuated in size and significance, depending on each president’s
personal involvement in intelligence matters and relationship with the board and its
chairman. A president typically issues an executive order laying out the size, duties,
and scope of this advisory group. During the Eisenhower and Kennedy years, the
body was instrumental for some major organizational innovations at a time when the
IC was still taking shape. Other presidents have relied on it far less. Indeed, President
Carter chose not to create a PIAB, as the new congressional oversight committees had
just been established and he believed they would be sufficient oversight of a function
in which he had little interest. During those times when the PIAB was little used—as
in the Clinton presidency—it became largely a ceremonial body, where presidential
friends or party stalwarts could occupy a seemingly lofty position.
In most cases, the PIAB’s operations are seldom known and remain noncontro-
versial. One exception was during the Ford administration, when the body urged the
creation of the Team A / Team B exercise that attacked the CIA’s estimates of Soviet
strategic programs. A more recent exception occurred during George W. Bush’s first
term, when his PIAB chairman, Brent Scowcroft, reportedly recommended that post-
9/11 intelligence reforms include moving the NSA and NRO out from under the
secretary of defense in order to give the then director of central intelligence more
authority. This recommendation was never officially released and was reportedly
strongly opposed by Defense Secretary Donald Rumsfeld. This dispute, combined
with Scowcroft’s open letter criticizing the administration’s invasion of Iraq, led to his
removal from the PIAB after 2004.
a small (three to five members) Intelligence Oversight Board (IOB), which would
investigate and report to the attorney general and Department of Justice any illegal
activities by the CIA or other intelligence agencies. The IOB serves as a subcommittee
to the PIAB itself and thus ultimately reports to the president. Intelligence agencies
and their inspectors general (IGs) are responsible for making any and all information
available to the IOB for them to conduct their independent investigations.
Inspectors General
By law and executive order, many of the national intelligence agencies must maintain
an Office of the Inspector General.14 At the CIA, for example, the Office of the Inspec-
tor General was established in 1953 but later made fully autonomous in 1989 by a
separate statute. The president nominates an individual who must then be confirmed
by the Senate Select Committee on Intelligence; only the president can remove the
IG, making him or her more independent of the current CIA leadership.
By statute, an IG is charged with conducting routine audits and inspections of units
and programs within an executive department as well as performing special investiga-
tions to ensure the efficiency, effectiveness, and legality of the organization’s activi-
ties. In the CIA, audits focus on financial transactions and accounting practices, while
inspections can examine the performance of specific agency components or crosscut-
ting programs. Investigations can be launched to uncover alleged fraud, waste, misman-
agement, or violations of laws and government regulations. These reports are sent to
the CIA director for his or her review and possible further administrative actions. Such
reports can focus on employees’ fraudulent submission of time cards and misuse of
government property or funds, all the way up to illegal covert actions, alleged detainee
abuse, or unauthorized destruction of detainee interrogation methods videos.15 IG
reports involving possible criminal activity must be reported to the attorney general,
while those investigating significant intelligence failures or problems must be shared
with the congressional oversight committees. In this way, IGs often assist in the legis-
lative branch performing its own oversight responsibilities.
While most reports and investigations are used to determine internal administra-
tive actions—such as reprimands or dismissals for inappropriate and unethical behav-
ior or legal wrongdoing—occasionally an IG report becomes a public issue. In 2001,
Inspector General John Helgerson, a senior career CIA analyst, produced a report
critical of the CIA Counterterrorism Center’s performance prior to 9/11, which rec-
ommended forming an accountability board to reprimand individuals for their mis-
takes. This angered the CIA leadership and also demoralized some CTC analysts.
Helgerson’s office also later issued a 2004 study that claimed the secret CIA deten-
tion and interrogation program very likely violated the United Nations Convention
against Torture. This made it harder for the Bush administration to brush aside civil
Intelligence and American Democracy279
The 1978 Foreign Intelligence Surveillance Act (FISA) created the Foreign Intelligence Sur-
veillance Court (FISC), which reviews and approves requests from law enforcement and
intelligence agencies for physical and electronic surveillance of persons suspected of “being
foreign agents for foreign powers” of espionage or terrorism. Section 702 of the FISA allows
law enforcement and intelligence agencies to obtain emails and telephone communications
of foreigners outside the United States without a warrant.
Significantly, it strictly defines the procedures under which a federal warrant for elec-
tronic (and later physical) surveillance can be conducted. The primary purpose must be to
protect against a foreign power’s or its agent’s efforts to engage in an attack, sabotage,
international terrorism, or clandestine intelligence activities. If the intelligence information
concerns a “United States person,” the information must be necessary to prevent an attack,
sabotage, or act of terrorism or espionage.
Subsequent interpretation and Justice Department procedures led to a restriction (“The
Wall”) on allowing law enforcement and intelligence agencies to coordinate and share infor-
mation for fear of tainting criminal proceedings. Essentially, a FISA warrant cannot be used
to get around the Fourth Amendment’s “due process” protections for American citizens.
federal court districts around the country. The FISA instructed the court to review
search warrant requests of communications intercepts of foreign targets operating
outside the United States in order to prevent or at least “minimize” the intercept of
American citizens’ communications.19 The act requires that the DOJ apply for a war-
rant in order to collect communications transmissions on foreign targets that are col-
lected in the United States. The department must provide probable cause that the
target is a “foreign power” or “agent of a foreign power” (see box 11.4).
The FISA was renewed and amended in 2008 amid considerable debate regard-
ing the NSA’s domestic surveillance programs, later revealed by Edward Snowden. At
that time, the IC was adamant that it needed certain provisions found in Section 702
that permitted the NSA to collect—with court supervision—communications of non-
US persons operating outside the United States who might be involved in terrorism.
According to legal scholars, the law had previously always distinguished between US
citizens and non-US citizens as well as between domestic and foreign locations. The
FISA essentially eliminated both distinctions if the government could show probable
cause that an individual was an “agent” of a foreign power.20
Following the Snowden leaks, which revealed extensive collection of Americans’
Internet and telephone metadata, DNI James Clapper and other senior intelligence
officials tried to dispel congressional concerns that this provision was being misused
to spy on innocent American citizens. Clapper maintained that when the IC moni-
tored the communications overseas of a non-US person who was speaking to a US
citizen, such “incidental collection” would be deleted if it had no foreign intelligence
Intelligence and American Democracy281
value.21 There have been continuing press reports that the NSA’s ability to carefully
track only non-US persons communications is far from perfect. The New America
Foundation’s analysis of ODNI semiannual reports on Section 702 reveal that the
law’s complexity as well as the NSA’s vast collection capabilities means that inad-
vertent collection of Americans’ phone messages and emails continues because of
human error and poor tasking instructions.22 The Privacy and Civil Liberties Over-
sight Board (PCLOB)—created by the 2004 intelligence legislation—also investi-
gated the use of Section 702 and concluded that while the error rate was low, given
the size and complexity of the collection programs, mistakes were inevitable. In its
defense, the IC has duly reported these errors and has modified training of signals
analysts to reduce these incidents.
At the end of the Cold War, it may have appeared that the United States could wind
down its defense commitments and intelligence efforts. However, the attacks of
September 11, 2001, put security back on the front burner. Moreover, it made more
apparent the dilemmas of security versus liberty. More intrusive surveillance and
interrogation techniques, as well as the resort to intelligence-led targeted killings,
have led to questions regarding the adequacy of executive and legislative oversight.
In addition, the need to share intelligence more widely within the IC and with foreign
partners to aid counterterrorism has come at a time when unauthorized disclosures of
classified intelligence programs have undermined America’s trustworthiness in the
eyes of some partners. Current and future US policymakers will have to wrestle with
these issues in order to restore US credibility both at home and abroad.
By this definition, the DOJ set the bar very high before any charges of torture
could be brought against any CIA staff or contract employee involved in the program.
The executive branch also believed it had covered itself by informing a few key
members of Congress regarding the broad nature of the rendition and interrogation
program. In September 2002, CIA officials briefed the ranking majority and minority
members of the House intelligence committee—Porter Goss (later CIA director) and
Nancy Pelosi (at the time, the House minority leader). Additional briefings were sub-
sequently provided to a few more congressional oversight committee members, but
the program was not briefed to the full committees until two years later. According to
Bush administration and CIA officials, those few congressional leaders expressed no
qualms at the time. The Washington Post revelation of the secret prisons and harsh
interrogations program prompted the CIA to defend the program without provid-
ing any details, but it ultimately terminated it.27 Later Pelosi alleged she had been
lied to about the character and extent of the interrogation techniques. In particular,
Intelligence and American Democracy283
she claimed never to have been told about waterboarding, a claim that CIA officials
strongly disputed. More broadly, this controversy not only raised questions about
the practice of briefing only a small number of congressional figures rather than full
committees, but it also suggested that CIA officials could not be trusted to volunteer
information unless congressional oversight committee members posed direct ques-
tions to them.28 In sum, the intelligence oversight function was seen to have proven
inadequate to guaranteeing proper review of an ethically and legally questionable
program.
The use of roughly a dozen coercive techniques continued until the program of
secret prisons was leaked to the press in the fall of 2005. While never fully revealed,
they appeared to include isolation, stress positions, faked executions, harsh slaps,
sensory deprivation, dietary adjustments, extreme temperature changes, removal of
clothing, and in three cases waterboarding. Once the program became exposed in
2005, President Bush and his advisers were forced to consider modifications, and
Director Goss suspended the techniques in late 2005. Later in 2009, President
Obama went further and prohibited them by executive order, limiting any US inter-
rogations to following the existing US Army field manual that specifically prohibited
waterboarding among other coercive methods.
American intelligence leaders have publicly disagreed on the extent to which these
techniques actually produced actionable intelligence. Hayden and those involved in
the program remain convinced they did produce useful intelligence that even con-
tributed eventually to finding Bin Laden. Former CIA director John Brennan, on the
other hand, has been more critical of the methods and equivocal about whether the
CIA could prove they were decisive in preventing other attacks. What is known is that
their use remains an ethical stain on America’s reputation as a liberal democracy gov-
erned by the rule of law. The UN and most allied governments considered those mea-
sures to be torture and denounced them. Combined with the shocking photos of the
military interrogations conducted at Abu Ghraib prison in Afghanistan, the United
States had lost considerable credibility. It may have also cost the US future coopera-
tion from some allied intelligence services. In sum, it appeared that a president gave a
compliant CIA license to conduct an ill-advised and poorly improvised coercive pro-
gram, justified by a DOJ only too willing to please an administration driven by fear.
Equally problematic was the Bush administration’s secret approval of extensive
electronic surveillance of foreign and domestic communications for the purpose
of detecting new terrorist threats. In October 2001, President Bush determined
that the extraordinary emergency facing the United States from al-Qaeda justified
the NSA’s electronic surveillance of both foreign and domestic Internet and phone
communications without a court order. The NSA could collect metadata for a period
of thirty to sixty days, and this authority was repeatedly renewed for nearly five
284 Chapter 11
years.29 The NSA was then able to analyze the metadata and report it to the FBI and
CIA as well as to other counterterrorism organizations. As was revealed later by
Edward Snowden, one such technical collection program was code-named Prism.
It involved the NSA collecting and storing millions of records from major Internet
service providers, including Microsoft, Yahoo, Google, Facebook, YouTube, AOL,
Skype, and Apple. As much of the world’s Internet traffic passes through the United
States via the “backbone” of major Internet providers, it was a simple matter for the
US government to secretly get them to give the NSA access to receive and store
such metadata records.
According to a 2009 report to President Obama by the IGs of the DOD, DOJ, CIA,
NSA, and ODNI, NSA director Michael Hayden had briefed the HPSCI in October
2001 that under pre-9/11 FISA rules, the NSA would not have been able to adequately
detect new terrorism threats.30 FISA requirements for a court order would be too slow
and cumbersome to ensure timely interception of phone or email traffic. In his view,
however, collecting only the metadata without individual court orders raised fewer
constitutional issues—such as Fourth Amendment protections against “unreasonable
searches and seizures”—than collecting the content of those communications. After
the administration successfully lobbied Congress for a freer hand in the way it con-
ducted surveillance, Congress approved the 2001 USA PATRIOT Act. It allowed law
enforcement to use the same electronic tools available against organized crime and
drug traffickers (such as “roving wiretaps” and access to business records) to investi-
gate terrorists. Most importantly, Section 215 of this act permitted the NSA to store
telephone metadata provided by major Internet and phone companies. At the time,
few in Congress understood how broadly this authority would be interpreted. Indeed,
according to released records later, the more expansive NSA surveillance programs
were not briefed to congressional leaders—and then only to the Gang of Eight—more
than two years after the programs commenced.
This President’s Surveillance Program (PSP) was given legal justification in a series
of DOJ memoranda prepared by the Office of Legal Counsel. Their author, the only
official given access to this highly classified program, was conservative legal scholar
John Yoo, who had also authored the controversial “torture memos” justifying the CIA’s
secret interrogation program. Yoo’s memoranda quickly dismissed Fourth Amend-
ment concerns as not relevant to the collection of electronic communications on non-
US persons. Regarding electronic surveillance of US persons, he opined that Fourth
Amendment protections applied solely to law enforcement activities, which should
not be construed to obstruct “direct support to military operations” duly authorized
by the president as commander in chief.31 Later, when other DOJ lawyers were allowed
access to the PSP, they came to question Yoo’s legal analysis that a president’s war-
time powers were excluded from FISA limits.32 They warned Attorney General John
Intelligence and American Democracy285
Ashcroft that the PSP might be based on unsound legal arguments. When then deputy
attorney general, James Comey, was briefed on the PSP and its legal basis, he too was
concerned about the legal arguments that appeared to ignore an act of Congress and
failed to notify congressional leaders of this opinion.
Later DOJ legal opinions argued for revisions in the program following a March
2004 comprehensive briefing of the Gang of Eight. At that time congressional leaders
expressed concerns about the surveillance program but did not oppose its continu-
ation. In 2008, Congress passed FISA amendments that allowed the NSA to collect
electronic communications inside the United States of non-US citizens believed to be
involved in terrorism activities. This legislation gave the government even broader
authority to intercept international communications than did the provisions of the
presidential authorizations governing the NSA’s activities begun in 2002.
In sum, 9/11 caused considerable expansion of electronic intelligence operations
within the United States on the presumption that such authorities were critical to
protecting American citizens. In practice, some individual privacy rights had to give
way to public safely. Yet the effectiveness of this extensive surveillance program
remains at best very ambiguous. The 2009 joint IGs report notes that it was difficult
to assess or quantify the overall effectiveness of the PSP program because it was
highly compartmentalized and hard to interview participants involved. With that
limitation in mind, the DOJ’s IG concluded that “although PSP-derived information
had value in some counterterrorism investigations, it generally played a limited role
in the FBI’s overall counterterrorism efforts.”33 According to the same report, CIA
and NCTC analysts were somewhat more positive, noting that the PSP-derived infor-
mation had contributed; however, the program’s effectiveness was difficult to assess
because of its sensitivity and in the end proved no more useful than other streams
of intelligence.34
The question in 2009 was whether the expansion of the NSA’s surveillance authori-
ties to find a few suspected terrorists was worth the cost of appearing to compromise
all Americans’ privacy protections. President Obama decided in 2010 that such an
expansion of surveillance was unwarranted. His presidential commission on this mat-
ter reviewed the program and concluded that there were less intrusive ways to access
these sources of information without jeopardizing American public safety. President
Obama accepted the commission’s recommendations that the NSA curtail bulk meta-
data collection and instead require that phone and Internet providers store their
customers’ metadata, which could be accessed by law enforcement and intelligence
agencies with a request to the FISC. Congress also subsequently reinforced this presi-
dential decision with new legislation that effectively replaced the PATRIOT Act’s loose
authorities granted the NSA with the US Freedom Act (see box 11.5). This 2015 law
essentially forbids the NSA from retaining metadata and also requires the executive
286 Chapter 11
The 2015 USA Freedom Act bans the George W. Bush–era bulk collection of metadata and
requires that a government surveillance request “specifically identify a person, account,
address, or personal device,” which limits as much as possible the scope of the information
sought to the purpose of the investigation. Furthermore, it directs the government to adopt
“minimization” procedures to protect American citizens’ privacy rights and allows FISC
judges to direct additional minimization procedures concerning any nonconsenting persons.
It also requires the US attorney general to submit to Congress an annual report of how many
warrant requests were made to the FISA court, how many were granted but modified, and
how many were rejected.
branch to issue annual reports that revealed how many FISA requests were made to
the FISC, in order to provide more transparency to Congress and the American public.
One lesson from these various episodes is that 9/11 produced a sense of fear and
urgency, conditions that encouraged loosening the restrictions on intelligence-collection
practices at the expense of American civil liberties; moreover, this same sense of fear and
urgency also tempered proper oversight by both the executive and legislative branches
of government. These experiences should be remembered if there comes another major
attack on the United States so that proper oversight can be exercised. A second lesson is
that the IC cannot resort to simply staying “within the law” as interpreted by an admin-
istration’s own lawyers. As one scholar put it, compliance with the law is not sufficient if
those activities are not likely to be viewed as legitimate and ethical.35
1. Mission. We serve the American people, and understand that our mission
requires selfless dedication to the security of our Nation.
Intelligence and American Democracy287
2. Truth. We seek the truth; speak truth to power; and obtain, analyze, and pro-
vide intelligence objectively.
3. Lawfulness. We support and defend the Constitution, and comply with the
laws of the United States, ensuring that we carry out our mission in a manner
that respects privacy, civil liberties, and human rights obligations.
4. Integrity. We demonstrate integrity in our conduct, mindful that all our
actions, whether public or not, should reflect positively on the Intelligence
Community at large.
5. Stewardship. We are responsible stewards of the public trust; we use intel-
ligence authorities and resources prudently, protect intelligence sources and
methods diligently, report wrongdoing through appropriate channels; and
remain accountable to ourselves, our oversight institutions, and through
those institutions, ultimately to the American people.
6. Excellence. We seek to improve our performance and our craft continuously,
share information responsibly, collaborate with our colleagues, and demon-
strate innovation and agility when meeting new challenges.
7. Diversity. We embrace the diversity of our Nation, promote diversity and
inclusion in our work force, and encourage diversity in our thinking.36
These seemingly obvious principles are important, if only because they commit
the IC’s agencies and individuals to weigh the ethics of their practices. These princi-
ples demand that officials authorizing collection operations, covert action, or analysis
be cognizant that their efforts must serve the nation, respect American laws and civil
liberties, speak truth to power, and remain accountable to oversight institutions and
the American people.
Second, the IC has created new “Principles of Transparency,” including the estab-
lishment of a community-wide Intelligence Transparency Council.37 Its mandate
is to work toward greater release of information so that the public can know more
about intelligence missions, authorities, and oversight mechanisms. The four broad
transparency principles attempt to strike a balance between encouraging more
release of information that can inform the public and at the same time protecting
what are absolutely essential sources and methods (see box 11.6). They seem to
acknowledge that the IC must do better in only classifying what truly would cause
major harm to national security and make a concerted effort to get more informa-
tion declassified.
Third, the IC needs to talk up what successful contributions it does make to
national security and public safety when it can do so without damaging intelligence
collection or analysis. When DNI James Clapper announced this initiative, he also
encouraged the individual agencies to speak more openly to the public about how
288 Chapter 11
3. In protecting information about intelligence sources, methods, and activities from unau-
thorized disclosure, ensure that IC professionals consistently and diligently execute
their responsibilities to:
a. classify only that information which, if disclosed without authorization, could be
expected to cause identifiable or describable damage to the national security;
b. never classify information to conceal violations of law, inefficiency, or administrative
error, or to prevent embarrassment. . . .
d. consider the public interest to the maximum extent feasible when making classifica-
tion determinations, while continuing to protect information as necessary to maintain
intelligence effectiveness, protect the safety of those who work for or with the IC or
otherwise protect national security.
Source: ODNI, “Principles of Intelligence Transparency for the Intelligence Community,” https://www.dni.gov/
files/documents/ppd-28/FINAL%20Transparency_poster%20v1.pdf.
they contributed to the public’s security. In a 2016 speech, he noted the significant
role that the NRO and NGA had played in providing essential information to the
first responders to a variety of natural disasters, such as hurricanes Rita and Katrina,
as well as manmade ones, such as the BP oil spill in the Gulf of Mexico. On top of
that, he and other senior intelligence officials have made more efforts to make public
addresses when possible. In addressing one large audience, however, he hinted at
how hard this was going to be for a community raised in a culture of secrecy to come
from the shadows: “I admit, because of my experience growing up in the SIGINT busi-
ness and my decades of intelligence work, the kind of transparency we’re engaged
in now feels almost genetically antithetical to me. . . . I think Air Force 2nd Lt. Jim
Intelligence and American Democracy289
Clapper, from 1963, would be shocked by the level of detail with which we talk about
SIGINT specifically and intelligence activities in general in 2015.”38
Fourth, the IC needs to remind the public about its commitment to safeguarding
their civil liberties at home. Within the ODNI, the PCLOB was established as part
of the 2004 intelligence reforms. It comprises four part-time members and a full-
time chairman, who are responsible for reviewing executive branch counterterrorism
actions to ensure that those actions are balanced with the need to protect privacy
and civil liberties. The board is also there to ensure any future development of laws,
agency regulations, or policies are consistent with American civil liberties. In this
latter case, it was instrumental in issuing recommendations following the Snowden
revelations that shaped the USA Freedom Act and curtailed aspects of the NSA’s
surveillance programs. Its 2014 report on Section 215 and Section 702 of the 2008
FISA Amendments Act proved very influential in shifting congressional and execu-
tive branch thinking on electronic surveillance. All of the board’s recommendations
regarding these programs have been implemented in part or in full.
Moreover, those reports were public documents, allowing Americans to read more
about their IC’s surveillance activities than ever before. The PCLOB can and should
provide status reports on how its recommendations are being implemented. It can
hold public hearings and can involve outside experts and organizations in its delib-
erations, creating an indirect connection between the secretive IC and the American
public. At the moment, the board’s jurisdiction is limited to the IC’s counterterror-
ism programs; however, civil liberties advocates strongly endorse broadening the
PCLOB’s mandate to cover a fuller range of intelligence-collection programs.39 How
effective this board will be under President Trump remains to be seen. In the past few
years, it has been less highly regarded by Congress in particular, and its membership
has dropped. In 2018, President Trump had named several new members, giving it
the minimum of three necessary for a quorum.40 Those supporters of an active board
have recommended that the PCLOB be empowered to issue an annual report to Con-
gress on how current intelligence practices and policies have impacted Americans’
civil liberties. Efforts to pass such legislation failed in the last Congress, and it is
uncertain whether it might be revisited any time soon. That said, should there be
new threats to America’s security that generate additional intelligence surveillance
programs, it would be desirable to have an effective board that can ensure that Ameri-
cans’ civil liberties are not unduly infringed upon.
Whether the IC can regain American public trust is obviously a work in progress.
While there are few public opinion polls on intelligence, what is available suggests
the public is suspicious of intelligence yet regards its missions are vital. A 2015 Pew
Research poll reported that following the Snowden affair, two-thirds of respondents
“do not trust” intelligence agencies regarding its information collection and data
290 Chapter 11
privacy.41 In a 2017 study, polls showed that a slight majority (55 percent) consider the
IC “plays a vital role in warning against foreign threats and contributes to national
security.” Only a small minority (12 percent) felt the IC posed a threat to civil liberties.
While those figures might be reassuring, other findings were less so:
• Millennials (individuals born after 1982) were least likely to believe the IC is
vital and were less well informed about the IC.
• Almost a majority of those crediting the IC with a vital role said they had little
knowledge of its missions.
• Nearly 60 percent of those responding to the question rated the IC’s ability to
protect privacy as “not very effective” or “not effective at all.”42
At this juncture, one has to remain hopeful that the IC will do more to explain
its role in the national security enterprise and its commitment to balancing security
with protecting Americans’ privacy. One of the purposes of this book has been to
make the contribution of the IC more transparent to students of American national
security. It has laid out the complexity of the national security enterprise as well as
the diversity and secretive nature of the huge US IC. That said, much of what the IC
provides to American policymakers will remain known only to those inside the gov-
ernment. As we enter a new decade with rising peer rivals and resurgent ones such as
China and Russia as well as rogue states such as Iran and North Korea, intelligence
will be as important as ever. Add to that the unpredictable nature of the digital and
cyber worlds, and there is every reason to believe that intelligence will have many
challenges to providing actionable information to protect Americans’ safety while
safeguarding US institutions and values.
USEFUL DOCUMENTS
Current law that restricts the NSA’s domestic surveillance programs that must be reviewed
and reauthorized by the end of 2019.
FURTHER READING
Kenneth Absher, Michael Desch, and Roman Popadiuk, Privileged and Confidential: The
Secret History of the President’s Intelligence Advisory Board (Lexington: University Press
of Kentucky, 2012).
Provides the most authoritative descriptions of this highly secretive presidential advi-
sory group.
Ross Bellaby, “What’s the Harm? Ethics of Intelligence Collection,” Intelligence and National
Security 27, no. 1 (February 2012): 93–117.
Describes the arguments for a “just intelligence” set of principles to guide post-9/11
intelligence collection.
James Clapper, Facts and Fears: Hard Truths from a Life in Intelligence (New York: Viking, 2018).
Lays out some of the challenges a career intelligence officer faced in balancing the pub-
lic’s right to know and the IC’s need for secrecy.
Genevieve Lester, When Should State Secrets Stay Secret? Accountability, Democratic Gover-
nance, and Intelligence (Cambridge: Cambridge University Press, 2015).
Provides an analytical framework for critiquing intelligence’s internal and external
mechanisms for oversight, concluding ironically that creating more oversight mecha-
nisms have actually reduced their overall effectiveness.
Steven Slick and Joshua Busby, “Glasnost for US Intelligence: Will Greater Transparency
Lead to Increased Public Trust?,” Chicago Council on Global Affairs, May 24, 2018, https://
www.thechicagocouncil.org/publication/glasnost-us-intelligence-will- transparency-lead
-increased-public-trust.
Summarizes what little recent opinion polling exists on public attitudes toward the IC.
L. Britt Snider, The Agency and the Hill: CIA’s Relationship with Congress, 1946–2004 (Wash-
ington, DC: Center for the Study of Intelligence, 2008).
Documents the CIA’s stormy oversight relationship with Congress, as told by a former
senior CIA legislative affairs official.
NOTES
First epigraph: James Madison, “The Structure of Government Must Furnish the Proper Checks
and Balances between Different Departments,” Federalist Paper no. 51, February 6, 1788, http://
constitution.org/fed/federa51.htm.
Second epigraph: Lee Hamilton, “Oversight vs. Glitzy Investigation,” Christian Science Moni-
tor, July 15, 1999, https://www.csmonitor.com/1999/0715/p11s1.html.
1. Among US allies, only Canada claims to not maintain a clandestine HUMINT capabil-
ity, instead relying solely on its diplomatic reporting. That said, within the Five Eyes intel-
ligence sharing, Canada has access to American and British information; moreover, Canada
does maintain a SIGINT capability of its own.
292 Chapter 11
2. ODNI, “Intelligence Directive 203: Analytic Standards,” June 21, 2007, https://www.dni
.gov/files/documents/ICD/ICD%20203%20Analytic%20Standards.pdf.
3. Dov Levin of Carnegie Mellon University has compared American and Soviet elec-
toral interventions and found that the United States conducted more than 70 percent of over
a hundred instances of foreign interferences in other states’ elections. According to Levin,
the United States has regularly attempted to interfere in foreign elections in Latin America,
the Middle East, and Asia; in many cases, this was done secretly. See Dov H. Levin, “Datas-
ets,” http://dovhlevin.com/datasets.
4. Executive Order 13526 / Intelligence Community Directive 710, “Classification Man-
agement and Control Markings System,” https://www.dni.gov/files/documents/ICD/ICD
_710.pdf.
5. See “President’s Daily Brief 1969–1977,” CIA’s FOIA Electronic Reading Room, https://
www.cia.gov/library/readingroom/collection/presidents-daily-brief-1969-1977.
6. Richard Betts, Enemies of Intelligence: Knowledge and Power in American National
Security (New York: Columbia University Press, 2007), 163.
7. The House committee was headed by Rep. Otis Pike and the Senate committee by Sen.
Frank Church.
8. The CIA director of security compiled the list of questionable (“flap potential”) activi-
ties at the direction of CIA director James Schlesinger, and later CIA director William Colby
felt compelled to release the study to the Pike and Church oversight committees. A redacted
version is available through a FOIA request. See “Memorandum for the Executive Director,
Subject: Family Jewels, May 16, 1973,” https://www.cia.gov/library/readingroom/docs/DOC
_0001451843.pdf.
9. Senator Church would eventually retract his statement, as the hearings revealed that the
CIA and other intelligence agencies were largely operating under the direct or indirect instruc-
tions of the White House. But the public relations damage to the CIA and the IC was done.
10. A select committee is composed of legislators drawn from other standing committees.
In the case of both intelligence committees, members are selected from the foreign affairs,
armed services, judiciary, homeland security, and appropriations committees.
11. The SSCI held hearings on the NRO building in 1994, demanding that the NRO’s
director, Marty Faga, explain how the committee did not receive any information regarding
the construction of a classified headquarters costing $300 million or more. See Senate Select
Committee on Intelligence, Hearing on NRO Headquarters Project, August 10, 1994, https://
www.intelligence.senate.gov/sites/default/files/hearings/103997.pdf.
12. Cynthia Nolan, “PIAB: Presidents and Their Foreign Intelligence Boards,” International
Journal of Intelligence and Counterintelligence 23 (2010): 27–60.
13. President Ford created the Commission on CIA Activities within the United States in
January 1975 to determine whether any domestic CIA activities exceeded the agency’s statu-
tory authority. It concluded that some of the CIA’s domestic activities were approved either
directly or indirectly by presidents and fell into a gray area, while in a few cases CIA activities
were “plainly unlawful and constituted improper invasions of the rights of Americans. See
Report to the President by the Commission on CIA Activities within the United States, June 6,
1975, https://www.fordlibrarymuseum.gov/library/document/0005/1561495.pdf.
14. The Inspector General Act of 1978 has mandated the creation of such positions in more
than sixty federal agencies. Some IGs are “statutory,” meaning they are required by law and
Intelligence and American Democracy293
have responsibilities to inform Congress as well as their agency heads of any major legal or
ethical problems. Nonstatutory IGs report only to their agency heads and thus can be removed
without congressional involvement.
15. For a list of exemplary titles of CIA IG reports, see “Agency Inspector General Reports
and Investigations,” The Black Vault, http://www.theblackvault.com/documentarchive/agency
-inspector-general-reports-and-investigations/#.
16. John Warrick, “CIA Sets Changes to IG’s Oversight, Adds Ombudsman,” Washington
Post, February 2, 2008, http://www.washingtonpost.com/wp-dyn/content/article/2008/02/01
/AR2008020103150.html?noredirect=on.
17. See Harvey Rishikof, “The Supreme Court: The Cult of the Robe in the National Secu-
rity Enterprise,” in Roger Z. George and Harvey Rishikof, The National Security Enterprise:
Navigating the Labryinth, 2nd ed. (Washington, DC: Georgetown University Press, 2016) 312.
18. Rishikof, 313.
19. “Minimization” refers to the practice of removing the name of an American citizen from
any intercepted communication and replacing it with a designation (e.g., “US person #1”) in
any signals intelligence report.
20. Rishikof, “Supreme Court,” 315.
21. James Clapper, Facts and Fears: Hard Truths from a Life in Intelligence (New York:
Viking, 2018), 198–99.
22. See Robyn Greene, “Unintentional Non-compliance and the Need for Section 702
Reform,” Lawfare (blog), October 5, 2017, https://www.lawfareblog.com/unintentional
-noncompliance-and-need-section-702-reform.
23. The full title is “Convention against Torture and Other Cruel, Inhuman or Degrading
Treatment or Punishment.” The United States is a party to the convention, which came into
effect in 1987 and commits each state party to uphold these principles, not to transport indi-
viduals to states where they might be subject to such practices, to investigate suspected cases,
and to compensate victims of such practices.
24. UN, Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or
Punishment, entry into force June 26, 1987, https://www.ohchr.org/EN/ProfessionalInterest
/Pages/CAT.aspx.
25. According to the 2006 Military Commissions Act, an “unlawful combatant” is a person
who has engaged in hostilities or who has purposefully and materially supported hostilities
against the United States or its cobelligerents. Lawful combatants are only persons who are
“members of regular forces of a state party” or “members of a militia, volunteer corps or orga-
nized resistance movement belonging to a State party engaged in hostilities, which are under
responsible command, wear a fixed distinctive sign recognizable at a distance, carry their arms
openly and abide by the law of war.”
26. See “Memorandum for Attorney General Alberto R. Gonzalez, Counsel to the President,
Re: Conduct for Interrogations under 18 U.S.C. §§ 2340–2340A,” August 1, 2002, https://www
.justice.gov/olc/file/886061/download.
27. Dana Priest, “CIA Holds Terror Suspects in Secret Prisons,” Washington Post, Novem-
ber 2, 2005.
28. Paul Kane, “CIA Says Pelosi Was Briefed on Use of ‘Enhanced Interrogations,’” Wash-
ington Post, May 7, 2009, http://thehill.com/homenews/house/65111-dems-say-cia-may-have
-misled-congress-5-times.
294 Chapter 11
29. Metadata is typically understood to be the records that commercial carriers routinely
collect that are associated with individual phone calls, text messages, or emails. They can
include the time and date of the transmission, the phone number, the email address and/or the
Internet provider’s address, the duration of the phone call, and the location of the phone call or
email address. It does not include the content of the phone call or the email message.
30. See Offices of the Inspectors General of the DOD, DOJ, CIA, NSA, and ODNI, Unclassified
Report on the President’s Surveillance Program, July 10, 2009, https://oig.justice.gov/special
/s0907.pdf.
31. Offices of the Inspectors General, 12.
32. Offices of the Inspectors General, 20. Senior DOJ lawyer Jack Goldsmith reviewed the
Yoo memo in 2003 and noted that it had omitted any reference to the FISA provision allowing
interception of electronic communications without a warrant for a period of fifteen days follow-
ing a congressional declaration of war. This provision would seem to directly contradict Yoo’s
argument that Congress had never considered FISA applying in wartime. See 50 U.S.C. § 181l.
33. Offices of the Inspectors General, 32.
34. Offices of the Inspectors General, 34.
35. Zachary K. Goldman, “The Emergence of Intelligence Governance,” in Global Intelli-
gence Oversight: Governing Security in the Twenty-First Century, ed. Zachary K. Goldman and
Samuel J. Raschoff (Oxford: Oxford University Press, 2016), 220.
36. ODNI, Principles of Professional Ethics for the Intelligence Community, January 2012,
https://www.dni.gov/files/documents/CLPO/Principles%20of%20Professional%20Ethics
%20for%20the%20IC.pdf.
37. ODNI, The Intelligence Transparency Council, April 5, 2016, https:// fas
.org
/sgp
/othergov/intel/dni-itc.pdf.
38. James Clapper, “Remarks on Transparency in Intelligence at AFCEA/INSA National
Security and Intelligence Summit,” September 9, 2015, https://www.dni.gov/index.php/news
room/speeches-interviews/speeches-interviews-2015/item/1250-remarks-as-delivered-by-the
-honorable-dni-james-r-clapper- transparency-in-intelligence-with-great-power-comes-great
-responsibility-at-the-afcea-insa-national-security-and-intelligence-summit.
39. Daphna Renan, “The FISC’s Stealth Administrative Law,” in Goldman and Raschoff,
Global Intelligence Oversight, 140.
40. Matthew Kahn, “Trump Nominates Two New Members to Privacy and Civil Liber-
ties Oversight Board,” Lawfare (blog), March 13, 2018, https://www.lawfareblog.com/trump
-nominates-two-new-members-privacy-and-civil-liberties-oversight-board.
41. Mary Madden and Lee Rainie, “Americans’ Attitudes about Privacy, Security and Sur-
veillance,” Pew Research Center, May 20, 2015, http:// www .pewinternet
.org
/2015/05/20
/americans-attitudes-about-privacy-security-and-surveillance/.
42. Steven Slick and Joshua Busby, “Glasnost for US Intelligence: Will Transparency Lead
to Increased Public Trust?,” Chicago Council on Global Affairs, May 2018, https://www.the
chicagocouncil.org/publication/glasnost-us-intelligence-will- transparency-lead-increased
-public-trust. It reports on a survey of a thousand Americans taken in May and June 2017. The
survey provides a benchmark for future surveys on a range of questions regarding Americans’
attitudes toward intelligence and democracy.
Glossary
Intelligence Terms
295
296Glossary
analytical tradecraft. Analytical tradecraft is the term used to describe the principles
and tools used by analysts to instill rigor in their thinking and prevent cognitive
biases from skewing their analytical judgments. Through the use of so-called struc-
tured analytical techniques, analysts make their argumentation and logic more
transparent and subject to further investigation. The term tradecraft originated
with the Directorate of Operations term for techniques used to avoid counter
intelligence detection and to successfully recruit and run agents.
anchoring bias. A form of cognitive bias, anchoring bias occurs when a previous anal-
ysis of a subject prevents analysts from reassessing their judgments and allows for
only incremental change in their forecasts. In essence, the initial judgment acts as
an anchor, making the final estimate closer to the original one than should be the
case, given the new information available to analysts.
basic intelligence. Basic intelligence is the fundamental and factual reference mate-
rial on a country or issue that forms the foundation on which analysts can base
current and estimative analysis. Examples include economic statistics, topographic
and geographic information, and documentary information on a country’s form of
government, rules of law, and electoral procedures and patterns. The CIA’s World
Factbook is a product containing basic information on major countries of the world.
caveat. A caveat is a term used within the analytical community to suggest analysts
are qualifying their judgments because of a problem in sourcing or in interpreting
available information regarding an intelligence topic. Caveats include the use of
qualifying statements, such as “we believe” or “we estimate,” which indicate that
analysts are reaching judgments, not stating facts.
clandestine. In intelligence terms, clandestine refers to the manner of acquiring
information on a target in such a way as to conceal the collection operation itself
as well as the identity of the source. It differs from covert in that a covert operation
is observable but the US government is able to plausibly deny it had conducted the
operation.
classified intelligence. Classified intelligence information requires special, expen-
sive, or risky methods to collect, either by technical systems or humans, which
must be protected. The risk of compromising these sources and methods is given
a security classification (confidential, secret, or top secret). Classified intelligence
is then shared only with those individuals who have a “need to know” this informa-
tion. Analysts use this information in written assessments, which carry classifica-
tion markings according to the sensitivity of the information used.
cognitive bias. Cognitive biases are mental errors caused by unconscious and sim-
plified information-processing strategies. The human mind’s natural tendency to
develop patterns of thinking, or mind-sets, often distorts, exaggerates, or dismisses
new information in ways that produce errors in judgment or thinking. Forms of
Glossary297
cognitive bias can include mirror-imaging, anchoring bias, confirmation bias, and
hindsight bias, to name a few.
collection. Gathering of raw information through specialized methods and systems
used by intelligence agencies. Collection methods can be clandestine as well as overt
and range from technical systems to human sources recruited to spy for the United
States. Collection along with analysis are key elements in the intelligence cycle.
collection gap. Analysts identify shortfalls in their knowledge on a subject, and these
collection gaps become “requirements” for future collection efforts. Identifying
important collection gaps not only aids collectors but also sensitizes analysts to
the need to qualify, or caveat, their judgments or set more modest levels of confi-
dence in reaching their analytical conclusions.
collector. The organizations that operate a variety of technical systems or espionage
units are collectors. They are part of the US intelligence community and are tasked
by analysts through the development of complex sets of “collection requirements.”
For example, the National Security Agency is the principal SIGINT collector, while
the CIA’s Directorate of Operations is the principal HUMINT collector.
combat-support agency. The Department of Defense designates certain intelligence
agencies as responsible for directly supporting department-level as well as tactical
military combat operations. Such combat-support agencies include the Defense
Intelligence Agency, the National Security Agency, the National Reconnaissance
Office, and the National Geospatial-Intelligence Agency.
communications intelligence (COMINT). COMINT is information gathered from
the electronic gathering of foreign communications of individuals or organiza-
tions, including from telephone, fax, and Internet systems, that can indicate the
plans, intentions, and capabilities of foreign actors. It is part of the signals intel-
ligence technical collection system.
competitive analysis. Competitive analysis refers to the explicit use of competing
sets of analysts or analytical units to reach judgments on the same intelligence
subject. The goal is to determine whether competing analysis will uncover differ-
ent sets of assumptions, use of evidence, or contrasting perspectives, which would
enhance analysts’ understanding of an important topic. Historically, the CIA and
the Defense Intelligence Agency provided competing analysis of Soviet military
developments, often based on different assumptions about Soviet behavior.
confirmation bias. Confirmation bias is the human tendency to search for or interpret
information in a way that confirms a preconception. Analysts will often seek out or
give more weight to evidence that confirms a current hypothesis or the “conven-
tional wisdom” while dismissing or devaluing disconfirming information.
congressional notification. The process by which the executive branch will inform the
congressional intelligence oversight committees of any covert action or anticipated
298Glossary
government, including the FBI and Department of Defense, for conducting foreign
intelligence collection and covert action abroad. The director of the DO reports to
the director of the CIA. As such, the DO is the principal “collection” manager—like
the National Security Agency for SIGINT—for human intelligence.
director of central intelligence (DCI). Prior to 2004, the DCI headed both the
CIA and the intelligence community and was the president’s and the National
Security Council’s senior intelligence adviser. The position was abolished and
replaced by the director of national intelligence as part of the 2004 intelligence
reforms.
director of national intelligence (DNI). The DNI serves as the head of the US Intel-
ligence Community. The DNI also acts as the principal adviser to the president,
the National Security Council, and the Homeland Security Council for intelligence
matters related to national security. He or she also oversees and directs the imple-
mentation of the National Intelligence Program.
drones. Drones is the term given to unmanned airborne vehicles (UAVs) that were
originally deployed to collect imagery and electronic intelligence over battlefields.
They have more recently been armed with standoff missiles, allowing operators to
target suspected terrorists on a real-time basis.
electronic intelligence (ELINT). ELINT is intelligence gathered from technical
collectors that reveals the existence and characteristics of foreign electronic sys-
tems such as radars, air defense systems, and other military electronic systems.
It assists traffic analysis that identifies the location, frequency, and strength of
electronic warfare systems.
enhanced interrogation techniques (EITs). EITs are measures that cause distress,
confusion, and compliance in order to elicit uniquely valuable information from
suspected terrorists who have been captured or rendered into US custody. Water-
boarding is the most well-known and controversial of those measures.
estimative intelligence. Finished intelligence assessments that are focused on
longer-term and inherently unknowable events are termed estimative intelligence
to convey that these analytical judgments rest on incomplete or sometimes non-
existent evidence. Assessing the future actions, behavior, or military potential of
known adversaries is by definition estimative. The best-known form of estima-
tive intelligence is the National Intelligence Estimate, which is produced by the
National Intelligence Council.
executive order. An executive order is a memorandum or document issued by a pres-
ident that instructs federal agencies to abide by regulations contained in those
memoranda or documents. So long as Congress has not issued any legislation
that would contradict those executive orders, they have the force of law. Executive
Glossary301
Order 12333, which was first issued by President Ronald Reagan and revised in
2008, governs overall US intelligence activities.
finished intelligence. Finished intelligence refers to the written assessments pro-
duced by all-source analysts, who evaluate raw intelligence reporting and prepare
reports that are then disseminated to other US government agencies. Examples of
finished intelligence include the President’s Daily Brief, the National Intelligence
Daily (now called the WIRe), and the Defense Intelligence Agency’s Military Intel-
ligence Digest—all of which are produced daily. Such analysis also includes longer-
term assessments such as National Intelligence Estimates.
forecast. A forecast is an intelligence judgment concerning the future. In analysis,
such estimative or predictive statements aim to reduce or bound uncertainty about
a developing or uncertain situation and highlight the implications for policy
makers. Forecasts are accompanied by probability statements ranging, for exam-
ple, from “highly likely” to “very unlikely” or numerical odds that an outcome will
or will not happen.
foreign instrumentation signals intelligence (FISINT). FISINT is part of the
SIGINT technical collection system, which primarily monitors foreign military
and scientific testing and tracking systems. TELINT (telemetry) is one such cat-
egory of missile test data used for monitoring foreign military activities, which
contributes to national technical means.
Foreign Intelligence Surveillance Act (FISA). The 1978 FISA established proce-
dures for the electronic and physical surveillance and collection of information
regarding “foreign powers” and “agents of foreign powers” suspected of espi-
onage or terrorism. It established the Foreign Intelligence Surveillance Court
(FISC) to review and approve federal warrants to monitor the activities of non-
US persons suspected of planning espionage or terrorism. As amended in 2008,
FISA requires “minimizing” the chances of inadvertent collection of information
on US citizens.
Foreign Intelligence Surveillance Court (FISC). The FISC came into existence in
1978 and oversees federal requests from law enforcement and intelligence agen-
cies for monitoring the activities of non-US persons suspected of conducting
espionage or planning terrorist acts. It meets in secret and grants, denies, or
requires modifications of any federal warrants. FISC consists of eleven federal
judges selected by the Supreme Court chief justice from around the country who
serve for a term of seven years.
Gang of Eight. The Group of Eight comprises the senior congressional leaders often
first briefed on the most sensitive covert actions. They include the Senate major-
ity and minority leaders, the speaker of the House and the House minority leader,
302Glossary
and the chairmen and ranking minority members of the House and Senate intel-
ligence oversight committees. Presidents resort to briefing the Gang of Eight
when they do not wish to reveal the most sensitive operations to the full oversight
committees.
geospatial intelligence (GEOINT). GEOINT is derived from exploitation and analy-
sis of imagery and geospatial information describing and visually depicting physi-
cal features and geographically referenced activities on Earth.
groupthink. Groupthink is a concept that refers to faulty group decision-making that
prevents consideration of all alternatives in the pursuit of unanimity. Groupthink
occurs when small groups are highly cohesive and must reach decisions under
severe time pressures. The psychologist Irving Janis developed this notion in
studying US decision-making during the Vietnam War. It is sometimes misapplied
to analytical failures, where there may have been cognitive errors.
human intelligence (HUMINT). HUMINT consists of collection activities to gain
access to people (agents or liaison services), locations, or things (e.g., information
systems) to obtain sensitive information that has implications for US security inter-
ests. Examples would be information collected clandestinely by agents, obtained
from foreign intelligence services of other governments (“liaison”), or more openly
by diplomats and military attachés and other US government officials. HUMINT
is particularly valuable for analysts when assessing the plans and intentions of
governments or nonstate actors.
imagery intelligence (IMINT). Sometimes referred to as PHOTINT (photo intelli-
gence), IMINT is derived from the images collected from a variety of platforms
ranging from handheld cameras to space-based and other overhead technical
imaging systems controlled by the US government. Imagery analysts study spe-
cific intelligence targets through the use of imaging systems and issue reports
based principally on those collected images. The National Geospatial-Intelligence
Agency processes and analyzes IMINT and geospatial data for use by all-source
analysts and other US government agencies.
indications and warning (I&W). I&W is the term for intelligence activities designed
to identify on a timely basis foreign developments that could become a threat to
US national interests or those of its allies and partners. It can encompass military,
political, economic, or cyber activities, including threats from terrorism, nuclear
weapons, and other WMDs as well as major political or military developments
such as military attacks, political coups, and economic dislocations.
indicator. Any identifiable action or development that focuses on the conditions that
might reflect a government or nonstate actor’s likely behavior. In a military con-
text, indicators usually reflect capabilities intended for aggressive action. Socio-
political indicators (e.g., civil disturbances, crime rates, political activities) might
Glossary303
and other applicable laws as well as executive orders and presidential directives.
It reports to the president as part of the President’s Intelligence Advisory Board.
Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA). The IRTPA
created the director of national intelligence (DNI) and implemented many of the
recommendations of the 9/11 Commission as well as other studies and commis-
sions that focused on intelligence reform. Among the other recommendations that
the IRTPA implements were the creation of a National Counterterrorism Center
and a National Counterproliferation Center. It also separated the roles of DNI from
the CIA director.
interagency policy committee (IPC). IPCs are the lowest level of interagency coor-
dination of policy recommendations and studies that are formed by the National
Security Council. IPCs report to the Deputies and Principals Committees and carry
out presidential directives that are issued through the NSC system. Policy as well
as intelligence agencies are represented at most IPCs, which can cover a wide
range of topics.
interagency process. The interagency process involves analysts participating in many
interagency meetings, where they present their intelligence assessments for use in
policy discussions among the National Security Council, the State Department, and
the Defense Department. Working-level interagency meetings are often held prior
to more senior-level meetings where decisions will be made. Typically analysts sup-
port discussions at the working level and participate in those meetings. For meet-
ings of the Deputies Committee (deputy-secretary level) or Principals Committee
(secretary-level), analysts will provide briefing papers or prepare senior intelligence
community leaders who will represent the IC at those discussions.
Joint Chiefs of Staff (JCS). The JCS is composed of the military chiefs of the army,
navy, air force, and Marine Corps. It is chaired by a four-star general officer (rotat-
ing among the services) named by the president and confirmed by the Senate to be
the chairman of the JCS.
level of confidence. Analysts must determine how confident they are in reaching ana-
lytical judgments based on the quality of the information available and the com-
plexity of the issue. Assigning a “low” level of confidence to a judgment may result
from collection gaps, contradictory information, or the presence of deception
and denial. “High” confidence may result from having very sensitive HUMINT
or extremely precise technical intelligence on a military plan or a weapon system
that is corroborated from multiple independent sources.
measurement and signature intelligence (MASINT). MASINT is technically derived
intelligence data other than standard imagery and SIGINT. It employs a broad
group of disciplines including nuclear, optical, radio frequency, acoustics, seis-
mic, and materials sciences. Examples of MASINT are the detection of low-yield
Glossary305
target country and intelligence topic. The NIPF assigns a numerical priority (1
to 5) according to the importance senior officials attach to the topic, and those
priorities are used to allocate and justify intelligence community resources and
programs.
National Intelligence Program (NIP). The NIP is the consolidated budget of the
sixteen national intelligence agencies, which the director of national intelligence
(DNI) is responsible for compiling, reviewing, and presenting to the Office of Man-
agement and Budget and Congress. The DNI has some limited authority to revise
or prioritize funding and usually works closely with the defense secretary, who has
daily budget control of the large military intelligence budgets.
National Security Act of 1947. The National Security Act of 1947 created a unified
Department of Defense and the CIA as well as the National Security Council
(NSC), which advises the president on national security matters. It specifies the
core members of the NSC to be the president, vice president, and secretaries of
state and defense and traditionally includes the chairman of the Joint Chiefs of
Staff and the director of national intelligence as advisers on military and intelli-
gence matters. This act mandates the NSC as the primary mechanism for advising
the president and ensuring that all instruments of national power (diplomatic, mili-
tary, economic, and informational) be integrated for formulating and implement-
ing national security strategies.
National Security Council (NSC). Established by the 1947 National Security Act, the
NSC is chaired by the president and includes the vice president, the secretaries of
defense, state, and treasury as well as the national security adviser. The chairman of
the Joint Chiefs and the director of national intelligence participate as the president’s
senior military and intelligence advisers. The NSC directs the work of lower-level
committees: the Principals Committee, the Deputies Committee, and interagency
policy committees.
national technical means (NTM). NTM is the term applied to intelligence systems
used to monitor arms control agreements to ensure that the signatories are abiding
by the provisions of those treaties. NTM relies heavily on imagery and electronic
intelligence platforms to monitor the activities in countries such as Russia, which
have signed a number of nuclear arms control agreements with the United States.
need to know. Senior intelligence managers use the “need to know” principle to deter-
mine whether intelligence will be shared with other intelligence professionals or
policy officials. By executive order, the knowledge or possession of such informa-
tion shall be permitted only to persons whose official duties require such access in
the interest of promoting national defense.
need to share. Following the 9/11 attacks, the presidential commission examining
the intelligence failure concluded that the intelligence community needed to share
308Glossary
information more broadly among the various agencies in order to ensure effective
coordination of intelligence and to prevent compartmentalization from inhibiting
the development of a comprehensive view of future terrorist threats.
Office of Strategic Services (OSS). The OSS was the intelligence organization estab-
lished during World War II that later became the basis of the CIA. The OSS con-
ducted overseas collection and covert action as well as maintained a research and
analysis capability. It was led by William “Wild Bill” Donovan.
open-source intelligence (OSINT). OSINT involves collecting information from
unclassified, publicly available sources and analyzing its significance to the US
government. Open sources would include newspaper, magazine, radio, television,
and computer-based information in many foreign languages; public data found in
government reports, press releases, and speeches; and professional and academic
journals and conference proceedings. Increasingly, OSINT has focused on exploit-
ing the Internet world of websites and bloggers. The Open Source Enterprise is
the intelligence community’s primary organization responsible for the collection
and analysis of open-source information.
order of battle (OOB). In military analysis, an OOB identifies military units, their
command structure, and the strength and disposition of personnel, equipment, and
units of an organized military force on the battlefield. It is especially used in warn-
ing analysis of major military threats.
policy support. Policy support describes intelligence reporting and analysis that is
provided specifically to inform policy decisions and enable decision-makers to
conduct or evaluate policy options. It does not imply intelligence advocating any
particular policy agenda.
politicization. There is no generally accepted definition of politicization, but it com-
monly refers to the intentional biasing of intelligence analysis to suit a particular
set of political goals or agendas. Analysts can be prone to politicization if they
allow their personal views to influence their analytical judgments. Likewise, policy-
makers can politicize intelligence by forcing analysts to tailor their judgments to
suit a policy agenda or by misrepresenting analysis as supporting their preferred
policies.
presidential finding. A presidential finding is the presidential document authorizing
a covert action. It must be signed by the president prior to the operation, and in
most cases the finding must be shared with the oversight committees as a “con-
gressional notification.”
President’s Daily Brief (PDB). The PDB is a daily compilation of current intelli-
gence items of high significance provided to the president and key advisers by
the CIA, the Defense Intelligence Agency, and the State Department’s Bureau of
Intelligence and Research. A briefer delivers it to the president, and other briefers
Glossary309
as ELINT and FISINT. The National Security Agency is the principal SIGINT col-
lector in the US government.
signature. Analysts rely on understanding unique “signatures,” or patterns, in the way
a target operates, equips, or deploys military forces or weapon systems. For exam-
ple, patterns of military communications can also indicate how military forces are
likely to operate in the field; these signatures might indicate levels of readiness or
whether operations were underway.
single-source intelligence. Raw information or reporting that is derived from only
one collection discipline, such as technical, human, or open source. Single-source
reporting is analyzed and then combined with other single-source reports to
develop all-source intelligence.
situation report. A situational report (commonly called a “sit-rep”) is reporting that
is rapidly disseminated as soon as analysts receive it, to give policymakers the
most up-to-date information for a quickly developing story. Sit-reps typically focus
on what the facts are and any immediate implications of the event. Reporting on
coups, deaths of world leaders, military clashes, and sudden breakdowns in public
order or negotiations would be the most likely topics of such reports.
sources and methods. Sources and methods are those technical and human means of
gathering information clandestinely on intelligence topics. A source can be a satel-
lite imaging system operating high above a foreign country, a diplomat’s reporting
from an embassy, or a source’s clandestine meeting with a case officer to report on
a high-level meeting of his government. Analysts must “source” their reports and
assessments by demonstrating they have a variety of reporting, preferably from
very different kinds of sources and correction disciplines and assess the validity
and credibility of the reporting. Such scrutiny reduces the chances of deception or
fabrication of reporting if it came from a single source. Protection of “sources and
methods” is considered a vital responsibility for intelligence officials.
strategic intelligence. Unlike situational reporting or current analysis, strategic intel-
ligence focuses less on events than on long-term trends. It is usually performed
only on subjects of enduring interest to the United States. For example, analysis of
foreign ballistic missile developments or of the Chinese military would be of endur-
ing interest to policymakers, regardless of their immediate policy agendas. Such
analysis is inherently “estimative,” as there is little detailed information on trends
beyond a year or more.
structured analytical techniques (SATs). Structured analytical techniques are used
to provide more rigor to analytical judgments and to make them more transpar-
ent and testable. Various structured analytical techniques—such as devil’s advo-
cacy, Team A / Team B exercises, analysis of competing hypotheses, and scenarios
analysis—attempt to record the logic employed by analysts in reaching judgments.
Glossary311
By structuring the analysis according to a set of principles (e.g., listing key assump-
tions, evaluating the quality of information, examining multiple hypotheses, iden-
tifying collection gaps, or detecting possible deception and denial), analysts can
establish more systematically their levels of confidence in judgments reached.
Moreover, they can also track changes in their judgments over time and revisit
conclusions that new evidence might appear to challenge.
target analysis. Target analysis is that conducted in direct support of military oper-
ations, counterterrorism, or counterproliferation operations and that focuses on
understanding, monitoring, and targeting specific individuals, units, or groups for
possible apprehension or physical attacks.
Team A / Team B analysis. This structured analytical technique uses separate analyt-
ical teams that contrast two or more strongly held views or competing hypotheses
about an intelligence topic. Each team will develop its assessments using the avail-
able evidence after laying out their key assumptions about the topic. The value
comes in arraying the two competing views side by side, which highlights how
different premises cause analysts to reach different conclusions.
technical intelligence (TECHINT). TECHINT comprises technical intelligence-
collection systems, including IMINT, GEOINT, SIGINT, COMINT, ELINT,
FISINT, and MASINT. They are used in combination with HUMINT intelligence
to observe and monitor foreign government and nonstate actor actions and behav-
ior. They constitute the largest portion of the US intelligence community’s budget
and programs.
tradecraft. In analysis, tradecraft comprises the cognitive and methodological tools
and techniques used by analysts to gather and organize data, interpret their mean-
ing, and produce judgments, insights, and forecasts for policymakers and other
users of finished intelligence products. An example of intelligence tradecraft is the
analysis of competing hypotheses.
warning analysis. Warning analysis anticipates potentially threatening or hostile
activities and alerts policymakers to the possible implications should the activ-
ity occur. “Strategic” warning refers to relatively long-term developments, which
provide a lengthy period of time before the event during which a policymaker can
develop policies or countermeasures. “Tactical” warning refers to alerting policy-
makers to near-term events, for which there is little time to prepare.
weapons of mass destruction (WMDs). WMDs are commonly considered to
be nuclear, chemical, biological, or radiological weapons that can cause mass
casualties.
Worldwide Intelligence Report (WIRe). The WIRe has replaced the National Intel-
ligence Daily (NID) as the CIA’s current publication circulated throughout the US
government to senior policy officials. This is now a more Web-based publication
312Glossary
Boxes, figures, notes, and tables are indicated by b, f, n, and t following the page number.
313
314Index
BTF (Balkan Task Force), 193–94, 195b, 203nn22–23 75; independence of, 56; INR and, 67; intelligence
Bundy, McGeorge, 25, 29, 43 cycle and, 89; intelligence failures and, 272–73,
Bureau of Intelligence and Research (INR): analysts 292n8; intelligence support and, 45; interagency
in, 90; covert action and, 221; current intelligence cooperation and, 90; IPC participation of, 31–32;
publications of, 180–81, 181b; establishment of, on Iraqi invasion of Kuwait, 158–59; Iraqi WMD
24n10; independence of, 81n26; on Iraq WMD esti- and, 80n9, 136, 241; long-term analysis of, 198;
mate, 257; overview, 65–67; PDB and, 73; strategic military support from, 195; missions of, 56; 9/11
intelligence of, 120–21; on Vietnam War, 66 attacks and, 57, 162–64, 172n12; NRO and, 62;
Burr, Richard, 264n55 Office of General Council, 220; outside expert
Bush, George H. W.: Balkan Task Force, 193–94; as review of analysis, 99; oversight of, 76, 273–74,
CIA director, 142n14, 260n10; end of Soviet Union 274b, 277–78, 292n13; PDB and, 73, 182; policy
and, 159–60; foreign policy and relations, 43, 45; IC understanding of, 237; Political Instability Task
relationship of, 239; Iraqi invasion of Kuwait and, Force, 147; post-9/11 era and, 20, 24n10, 56, 75;
159; PDB and, 46b, 239; Strategic Arms Limitation raw intelligence reports, 85; Red Cell analytical
Talks (SALT), 246; Yugoslavia breakup and, 160 units, 99, 138; rendition programs of, 41; role in
Bush, George W.: CIA growth and, 75; counter intelligence community, 54–59; Soviet Union arms
terrorism efforts of, 126–27, 281–86; covert action control agreements and, 186–88, 246–47; State
and, 219–20, 220b, 222–24, 231n34; decision- Department interactions, 35, 49n12; strategic intel-
making style of, 42; foreign policy and relations, ligence of, 119–20, 124, 142n8; Vietnam War and,
43–44; Homeland Security Council, establishment 245–46, 262nn27–28; war crimes team, 203n22.
of, 28; IC relationship of, 241; intelligence reforms See also covert action
of, 20; intelligence success and failures, 21; inter- Central Intelligence Group (CIG), 55, 76
rogation and torture, 40–41, 278–79, 281–83; Iran certainty of strategic intelligence, 134–35, 235–36
nuclear NIE, 249–51; Iraqi WMD program and, 17, chairman of the Joint Chiefs of Staff (CJCS), 36–37
247–49; Iraq War, 44, 106, 125–26, 126b, 133, 136, Chairman’s Brief, 179
249; 9/11 attacks (2001), 163–64; NSA surveil- Chemical Weapons and Biological Weapons
lance program, 283–84; NSC principals and, 42–43; Conventions, 189
on NSC role in executive branch, 29; PDB and, Cheney, Dick: declassification of NRO information,
184–85; PIAB relations, 277; post-9/11 era and, 62; IC relationship of, 241; invasion of Iraq and,
281–86, 286b; WMDs, strategy to combat, 117 134; on Iraqi invasion of Kuwait, 159; Iraqi WMD
intelligence and, 248; NSC process and, 43; PDB
Cambodia, covert action in, 218 briefing and, 185
Canada, HUMINT and SIGINT capabilities, 291n1 chief of station, 49n12
Card, Andy, 185 China: Corona program and, 62; as cyber threat, 228;
Carter, Jimmy, 63, 157, 277 North Korean invasion of South Korea and, 156
case officers, 13–14 Church, Frank, 218, 273, 292n9
Casey, William, 214, 238 CI. See counterintelligence
Castro, Fidel, 212–13, 218 CIA. See Central Intelligence Agency
caveats, 118 CIG (Central Intelligence Group), 55, 76
CBJBs (congressional budget justification books), civilian casualties of drone attacks, 224, 232n39
275, 275b civil liberties, 18–19, 22, 60–61, 110n20, 271–72, 289
Central Intelligence Agency (CIA): aerial recon- civil servants, 34
naissance advancements, 64; analysis of USSR CJCS (chairman of the Joint Chiefs of Staff), 36–37
leadership, 97, 109n10; biases of agents, 98, 240; clandestine, 10
chain of command, 225, 226f; counterterrorism Clapper, James: criticism of Trump, 255; as DNI, 242;
efforts of, 57, 163–64, 173n32, 190–91, 278; covert elimination of NIO/W, 154–55; on IC budget, 75;
action authorization for, 9, 27, 55–57; Cuban on integration of IC, 7; NGA and, 65; on NIP, 52;
Missile Crisis (1962), 192; current intelligence on NSA spying, 280; transparency principles and,
publications of, 177–79; declassifying information, 287–89
270–71; Directorate of Analysis, 90; on end of Clark, Robert M., 84
Soviet Union, 159, 161b; establishment of, 54–55, Clarke, Richard, 164
145; foreign counterintelligence, monitoring, 18b; classified intelligence: categories of, 270; counter
Global Futures Partnership, 108–9n4; growth of, intelligence and, 18b; HUMINT collection, 14;
Index315
leaks of, 18, 21, 61, 90, 140, 216, 268; overclassifi competitive analysis, 76, 99
cation, 270–71; secrecy and, 268; transparency confidence levels, 95–96, 109n7, 136, 249
principles and, 287 confirmation bias, 97
climate change, 115, 151 Congress: 2016 election interference by Russia and,
Clinton, Bill: Balkan Task Force, 193–94; Bosnia, 40, 105; constitutional authority of, 25; covert
target analysis on, 190; covert action and, 223; action oversight, 216–19, 221, 231n24, 282–83;
decision-making style of, 42; foreign policy and defense budget and, 70, 75; IC oversight, 254,
relations, 43–44, 50n26; IC relationship of, 240–41; 273–75b, 273–76; Iran, nuclear arrangement with,
NEC, establishment of, 27–28; PDB and, 240–41; 40; national security enterprise and, 40, 47; NIEs
PIAB relations, 277; on terrorism, 162; Yugoslavia and, 198; ODNI and, 76; on surveillance program,
breakup and, 161 284–86, 286b. See also specific acts of legislation
Clinton, Hillary, 43, 69, 228, 251, 252b congressional budget justification books (CBJBs),
Coats, Dan, 40, 74, 243 275, 275b
coercive techniques. See interrogation; torture congressional notifications, 19
cognitive bias, 97, 109–10n11, 164–65 Constitution, US: congressional power in Article
Colby, William, 119, 292n8 1, 25; DNI mission and, 287; executive power in
Cold War: analysis of intelligence during, 104; autho- Article 2, 25; habeas corpus violations by military
rization of covert action during, 27; competing commissions and, 279; intelligence gathering and
analyses use during, 99; covert action in Afghani- covert action staying in bounds of, 5, 19. See also
stan, 215; end of, 159–60, 237; need for peacetime Fourth Amendment
intelligence, 54; NIEs during, 124, 125b, 133; NRO conventional wisdom, 96
and, 62–63; nuclear arms control negotiations, 74, Convention on Torture and Other Cruel, Inhuman
120, 124, 158, 186–88, 187b, 202nn11–12, 246–47, or Degrading Treatment or Punishment (UN),
266; open-source intelligence use during, 15; stra- 231n34, 278, 281–82, 293n23
tegic intelligence trends during, 113, 115; warning coordination process, 123
intelligence during, 146–47, 149, 153–54, 171n6. See Corona program, 62
also Soviet Union counterespionage, 18, 57
collateral collection, 64 counterintelligence (CI): CIA and, 57, 207; domestic
collateral information, 16 surveillance and, 271–72; explanation of, 18b; FBI
collection gaps, 89, 152 and, 67; National Counterintelligence and Security
collection management officers, 17 Center, 73; risk of human source information and,
collection of intelligence: analysts and, 91–92, 92t, 15, 18
100–101; data leaks on, 18, 61, 90; defined, 7; democ- counterterrorism. See terrorism and counterterrorism
racy and, 281–86, 286b; development of techniques, covert action, 5, 205–33; Congressional oversight of,
20; failures in, 136–37; intelligence collection disci- 216–19, 221, 231n24, 282–83; criteria for success,
plines (INTs), 10–16, 11b, 91, 92t; intelligence cycle 209–15; cyber operations, 227–29; defined, 9;
and, 7, 10, 85, 89–90; NIE improvements and, 139; drones and targeted killing, 223–24, 232n39; elec-
in post-9/11 era, 281–90, 286b; reform for improve- tion influencing, 206, 208, 210b, 292n3; ethics of,
ments in, 70, 286–90. See also interrogation; specific 216, 269; forms of, 208–9; history of use, 206–8;
intelligence collection agencies lessons from, 215–17; management of, 217–18; NSC
collector, 10 and, 45–46, 77, 205, 217, 221, 231n24, 231nn29–30;
combat-support agencies, 36. See also specific agencies paramilitary operations, 224–27, 226f; in post-9/11
Comey, James, 285 era, 9, 27, 221–29, 226f, 281–86, 286b; presidential
Commerce Department, 37 authorization of, 55–57, 205, 207, 214, 217–19, 225–
Commission on CIA Activities, 292n13 26; as presidential tool, 27, 55–57, 205; procedures
Committee on Imagery Requirements and Exploita- for approving, 219–21, 220b; rendition, detention,
tion (COMIREX), 63 and interrogation, 222–23, 281–83; surveillance
communication of warning, 153 programs, 283–86; types of, 210–11b; “Washington
communications intelligence (COMINT), 12, 61, 169 Post test” for, 269. See also Central Intelligence
communism: containment strategy for, 26; covert Agency
action against, 206–9, 217; Iran and, 211–12; Iran- crisis management: Cuban Missile Crisis and, 156;
Contra Operation (1986), 44, 213–14, 218–19. See Deputies Committee and, 31; interagency process
also Cold War; specific communist countries for, 33, 49n9; policy support for, 186, 192–96, 195b
316Index
Cuba: Bay of Pigs (1961), 212–13, 230–31n15; Cuban challenges and, 281–90; privacy rights and, 271–72;
Missile Crisis (1962), 65, 94–95, 118–19, 156, professionalism and transparency of intelligence,
172n17, 192, 231n15; Guantanamo Bay Naval Base, 286–90, 288b; Russian election hacking as threat
222, 279; warning intelligence on Soviet buildup to, 105, 251
in, 154 Democratic National Committee (DNC), 251
current intelligence: daily intelligence reports, 45, Dempsey, Martin, 255
66, 153, 178–79; defined, 112, 112f; long-term vs., denial. See deception and denial
197–98; for policy support, 174, 177–85, 178b, departmental intelligence, 56, 65, 76, 177
180–81b Department of ___. See specific name of department
Current Intelligence Bulletin (CIB), 178 Deputies Committee (DC), 30–34, 77, 221
cyberattacks: countering as key mission, 20; covert detention programs, 57, 222–23, 241, 274, 276
action to counter, 227–29; DHS and FBI counter- Deutch, John, 65, 225, 240
ing, 69; on DNC, 251–52; election interference devil’s advocacy, 154, 165
(2016) as, 69, 228; NSA and, 61 Devine, Jack, 205
Cyber Command (CYBERCOM), 61, 228 DHS. See Homeland Security, Department of
Czechoslovakia, covert action in, 209 DIA. See Defense Intelligence Agency
DINs (Defense Intelligence Notices), 179
daily intelligence reports, 45, 66, 153, 178–79. See also DINSUM (Defense Intelligence Summary), 179, 180b
President’s Daily Brief diplomatic interactions: embassy operations, 34,
dark Web, 169 38, 66, 68; Foreign Service officers, 14, 34–35, 66;
Davis, Jack, 177 HUMINT reports from, 14; intelligence support
DC (Deputies Committee), 30–34, 77, 221 from, 186–90, 187b; leadership analysis and, 203n21
DCI. See director of central intelligence Directorate of Analysis (DA), 56
DEA (Drug Enforcement Administration), 68–69 Directorate of Digital Innovation, 228
deception and denial (D&D), 89–90, 152, 156, 168–69 Directorate of Operations (DO), 56–57, 220–21
defense appropriations bills, 75 director of central intelligence (DCI): DNI and,
Defense, Department of (DOD), 35–37; arms control 69–70, 235; establishment of, 20, 27; NRO and, 63;
agreements, monitoring, 202n12; budget of, 34, role in NSC, 9, 19, 57; on strategic warning, 146;
35–36, 50n16; chain of command, 225, 226f; covert warning intelligence for, 154–55. See also director
action of, 227; cyber operations of, 228; establish- of national intelligence
ment of, 55; intelligence community members, director of national intelligence (DNI): anticipatory
53b; military mission of, 36; military vs. national intelligence, 167; DOD and, 36; establishment of, 19,
intelligence needs, 199–200; NSC representatives 57, 69–70, 137; inspector general for, 279; integration
from, 36; paramilitary operations and, 225; warn- of IC and, 76–79; Intelligence Community Direc-
ing intelligence and, 153 tives from, 139–40; intelligence support and, 45; IPC
Defense Intelligence Agency (DIA): biases of agents, participation of, 31–32; National Counterterrorism
98; current intelligence publications of, 177, 179, Center (NCTC), 173n32; need-to-share principle
180b; Directorate of Intelligence, 90; establish- and, 166; NIC and, 122; NIE improvements and, 139;
ment of, 20; IPC participation of, 31; on Iraqi NSC and, 71b; PDB and, 182; professional principles
invasion of Kuwait, 159; military support from, 195; for IC, 286–87; role in IC, 69–74, 75, 235, 239; on
PDB and, 73; Red Cell analytical units, 99, 138; role Russian election interference, 251; transparency of
in intelligence community, 59–60; strategic intel- intelligence and, 270; Worldwide Threat Assess-
ligence of, 120, 142n8 ment, 21, 73–74, 115–16, 163, 228. See also Office of
Defense Intelligence Notices (DINs), 179 Director of National Intelligence (ODNI)
Defense Intelligence Summary (DINSUM), 179, 180b director of the NSA (DIRNSA), 61
Defense Mapping Agency (DMA), 65 disinformation campaigns, 252
democracy, 5, 265–94; Congressional oversight dissemination of intelligence, 8, 87, 155
of intelligence and, 273–75b, 273–76; ethics of DMA (Defense Mapping Agency), 65
intelligence, 18–19, 22, 266–69; executive branch DNI. See director of national intelligence
oversight of intelligence and, 276–79; intelligence DOD. See Defense, Department of
collection and, 281–86, 286b; judicial oversight DOJ. See Justice, Department of
of intelligence and, 279–81, 280b; necessity domestic intelligence, 67, 72, 82n28. See also Federal
of secrecy, 205, 269–71; post 9/11 intelligence Bureau of Investigation
Index317
domestic surveillance, 18, 60–61, 271–72, 283–86. See capabilities, 234; foreign relations and, 25–26;
also National Security Agency intelligence-policy relationship and, 239–43;
Donovan, William J. “Wild Bill,” 54–55 interagency process for policymaking and, 26,
drones, 21, 22, 223–24, 232n39 30–34, 31–33f, 40; media leaks and, 40–41, 242;
Drug Enforcement Administration (DEA), 68–69 national security advisers and, 41–44; NSC and,
drug trafficking, 68–69 27–30; oversight of intelligence, 276–79, 292n9;
Duelfer, Charles, 262n38 presidential findings, 19, 274; on protection of
Dulles, Allen, 182, 212–13, 239–40 sources and methods, 270; tutorial on intelligence
duplicative information, 75–76 for, 257–58; wartime powers of, 284–85, 294n32.
See also President’s Daily Brief
economic agencies, 37, 39, 68, 120. See also specific executive orders, 20; Executive Order 11905 (1976),
agencies 277; Executive Order 12333 (1981), 18b, 70, 71b, 77
economic covert action, 208, 210b expertise, 113, 198. See also National Intelligence
Egypt: attack on Israel (1973), 157–58; Yom Kippur Estimates; outside experts
War (1973), 157–58 extradition, 68
Eisenhower, Dwight: Bay of Pigs and, 212; CIB on
Korea, 178, 178b; covert action and, 207, 239; Faga, Marty, 292n11
decision-making style of, 44; DIA and, 20; IC failure of intelligence. See intelligence failures
relationship of, 239; Iranian relations, 211; National failure to warn: adversary D&D, 168–69; cognitive
Photographic Interpretation Center, 64; NRO and, bias and, 164–65; Cuban Missile Crisis (1962), 156;
20, 62; NSC and, 29; PIAB relations, 277 Iraqi invasion of Kuwait (1990), 158–59; Israeli
EITs (enhanced interrogation techniques), 21, 40–41, Six-Day War (1967), 157; 9/11 attacks (2001), 57,
222, 241, 263–64n53, 274, 282 67, 70, 162–64; North Korean invasion of South
election influencing as covert action, 206, 208, 210b, Korea (1950), 156; organizational effects and,
292n3 165–67; Pearl Harbor attack (1941), 54–55, 118, 145,
election interference (U.S. 2016): as cyber security 155–56; policymaker wishful thinking and, 167–68;
issue, 69, 228; investigations of, 40, 255, 264n55; Soviet invasion of Afghanistan (1979), 158; Soviet
policy disputes regarding, 251–53, 252b; Trump on, Union break up and end of Cold War, 159–60; Yom
105, 242–43 Kippur War (1973), 157–58; Yugoslavia breakup
electronic intelligence (ELINT), 12, 23n4, 61 (1990), 160–62, 162b
electro-optical (E-O) systems, 12, 23n2 Federal Bureau of Investigation (FBI): analysts of,
El Paso Intelligence Center (EPIC), 69 90; counterterrorism efforts of, 37–38, 67–68, 285;
embassy operations, 34, 38, 66, 68 foreign counterintelligence, monitoring, 18b, 54;
encryption, 61, 90, 169 interagency cooperation and, 90; National Secu-
Energy Department, 49n2, 143n25, 257 rity Branch, 67–68; national security enterprise
enhanced interrogation techniques (EITs), 21, 40–41, and, 37–38; 9/11 attacks (2001) and, 163; role
222, 241, 263–64n53, 274, 282 in intelligence community, 67–68; WikiLeaks
environmental monitoring, 63 investigation, 251
espionage, 13, 52, 280. See also human intelligence Federal Emergency Management Agency (FEMA),
estimative intelligence, 45 50n16
ethics of intelligence: covert action and, 216, 269; feedback from policymakers, 8, 16, 17, 87, 184
democracy and, 18–19, 22, 266–69; interrogation Feinstein, Dianne, 41, 254, 263–64n53, 276
and torture, 222, 283; post-9/11 era and, 286–87; financial crises, 151
Principles of Professional Ethics for the Intelli- Fingar, Thomas, 83n45, 111, 129, 133, 143n20
gence Community, 265 finished intelligence: analytical process description,
Europe: covert action in, 208; Marshall Plan for, 92–100; duplication of, 75–76; on Iraqi WMD, 17;
206–7; Radio Free Europe (RFE), 209. See also preparation of, 10, 16–17, 87
specific countries first responders, 39, 288
executive branch: Congress and foreign policy, 40; Five Eyes forum, 134, 143n28, 291n1
constitutional authority of president, 25, 28–29; Flynn, Michael, 255
covert action authorization from, 55–57, 205, 207, FOIA (Freedom of Information Act, 1966), 271
214, 217–19, 225–26; criticisms of intelligence, Ford, Gerald, 77, 142n14, 246, 277, 292n13
20–21; DNI and, 70; expectations of intelligence forecasting, 117–19, 147
318Index
need-to-share principle and, 90, 137, 166; 9/11 politicization of intelligence, 256–57; Russian
attacks and, 67, 70, 90, 163; PDB access and, 183; interference in 2016 elections, 251–53, 252b;
warning analysis and, 166 Soviet estimates, 246–47; understanding, 8; Viet-
INR. See Bureau of Intelligence and Research nam War estimates, 245–46
Inspector General Act (1978), 292–93n14 Intelligence Reform and Terrorism Prevention Act
inspectors general (IGs), 278–79, 284–85, 292–93n14 (IRTPA, 2004), 57, 70, 74, 121, 200
intelligence, 3, 7–24; as analysis, 16–17; as collection intelligence support. See policy support
of secret information, 10–16; defined, 10; disci- Intelligence Transparency Council, 287
plines and their uses, 11b; as enabler of strategy, interagency cooperation: for counterterrorism, 72–73,
8–10; history of use, 19; NSC and, 45–46; pur- 76; FBI and, 67; for IC oversight, 77–78; NIEs and,
pose of, 19–22; risk of, 17–19. See also counter 123–24; NRO and, 63; post-9/11 era and, 90; task
intelligence; strategic intelligence forces, 193–94, 195b. See also information sharing
Intelligence Authorization Act (2010), 279 interagency memos, 122, 139
intelligence community (IC), 4, 52–83; budget and interagency policy committees (IPCs), 31–32, 221,
size of, 52, 74–75, 110n20, 140; CIA and, 54–59; 231n29, 237
declassified assessments of, 41; defined, 1; DIA interagency process: congressional involvement in,
and, 59–60; DNI and, 69–74; expansion of, 58–65; 40; covert action and, 219; defined, 26; DOD and,
FBI and, 67–68; function of, 7; history of, 52, 53–57; 35–36; explanation of, 30–34, 31–33f; NSA and,
INR and, 65–67; integration vs. centralization, 42–43; for nuclear arms treaties, 187; State Depart-
75–76; issues for, 74–79; NGA and, 63–65; NIP ment and, 35; strategies for international issues
members and missions, 53b; NRO and, 61–63; NSA and, 116. See also national security enterprise
and, 60–61; other agencies and, 68–69; profes- International Atomic Energy Agency (IAEA), 189–90,
sionalism and transparency, 286–90, 288b; public 202nn15–16, 249, 266
relations and, 286–90, 294n42. See also oversight International Criminal Tribunal, 203n22
of intelligence community; post-9/11 era; specific interrogation: covert action issues and, 222–23;
intelligence organizations and agencies declassified summary on criticism of, 254;
Intelligence Community Assessment (2017), 122 enhanced interrogation techniques (EITs), 21,
Intelligence Community Directives (ICDs), 139 40–41, 222, 241, 263–64n53, 274, 282; Inspectors
intelligence cycle, 4, 84–110; as analyst-centric General and, 278–79; investigation of methods,
process, 100–107, 101–2f; analysts and, 90–92; 263–64n53; legal methods of, 231nn33–34; limits
analytical process description, 92–100; collection on methods, 222; in post-9/11 era, 281; rendition
agencies and, 89–90; collection methods and, programs for, 41, 222–23, 282; SSCI report on, 41,
91, 92t; defined, 8; intelligence process and, 84; 222, 254, 263–64n53, 279; Trump on methods for,
National Security Strategy on, 84; policymakers 223, 243. See also torture
and, 87–89; steps in, 85–87, 86f INTs (intelligence-collection disciplines), 11, 11b, 16,
intelligence estimates. See National Intelligence 91, 92t. See also specific intelligence disciplines
Estimates IOB (Intelligence Oversight Board), 277–78
intelligence failures: analysts and, 92; attention IPCs (interagency policy committees), 31–32, 221,
placed on, 21; CIA and, 272–73, 292n8; on collapse 231n29, 237
of Soviet Union, 151; IC budget and, 52; Iraqi Iran: coup (1953), 211–12; cyberattack on nuclear pro-
WMD, 135–40; PIAB and, 277; as risk of intelli- gram, 228; death of shah (1979), 96, 151; hostage
gence, 17–19. See also failure to warn crisis, 158, 213; NIEs on, 95, 249–51, 268; nuclear
intelligence gaps, 96 activities of, 39, 40, 95, 249–51, 266; sanctions on,
Intelligence Oversight Act (1980), 218, 274, 274b 39, 250
Intelligence Oversight Board (IOB), 277–78 Iran-Contra Operation (1986), 44, 213–14, 218–19
intelligence-policy relationship, 5, 234–64; alterna- Iraq: al-Qaeda relations, 94; Bush (G.W.) policies on
tive models for, 236–39, 238b; improving, 257–58; war in, 44, 106, 125–26, 126b, 133, 249, 263n39;
intelligence and policy disputes, 243–53, 244b, Cheney and invasion of, 134; insurgency (2005),
252b; Iran nuclear NIE, 249–51; Iraq WMD 106; intelligence priorities for, 200; invasion of
intelligence, 247–49; opposition in, 235–36; Kuwait (1990), 158–59; NIEs on, 125–26, 126b,
politicization of intelligence, 254–56; presidents 247–49; target analysis on, 196; warning intelli-
and intelligence advisers, 239–43; remedies for gence on, 151; weapons of war. See Iraqi WMD
320Index
Iraqi WMD: al-Qaeda and, 94; analysis of intelligence 133; Strategic Intelligence for an American World
on, 16–17; CIA and, 57, 80n9; collection of intel- Policy, 236
ligence on, 90; Congress on, 133, 143n25; dissents Kerr, Richard, 140
of intelligence on, 66, 143n25, 257; intelligence key assumptions, 98, 118
improvements following flawed estimate, 137–40; key findings, 95, 125b
ISG assessment of, 136, 144n33, 247; mind-sets Khrushchev, Nikita, 156
on, 96, 133; NIE on, 70, 135–40, 154, 197–98, 247; Kim Il-sung, 156
politicization of intelligence, 247–49; post-war Kim Jong-un, 167
inspection for, 262n38; quality of strategic intel- Kissinger, Henry: on IC oversight, 76–77, 83n43; as
ligence on, 135; warning intelligence on, 154 national security adviser, 29, 44, 45; NSC and, 26,
Iraq Survey Group (ISG), 136, 144n33, 247 29–30, 43; PDB and, 43; Strategic Arms Limitation
IRTPA (Intelligence Reform and Terrorism Preven- Talks, 120, 124, 246–47; on warning analysis, 145;
tion Act, 2004), 57, 70, 74, 121, 200 Yom Kippur War and, 157
Islamic extremism, 126–27 Kojm, Christopher, 121
Islamic State of Iraq and Syria (ISIS), 94, 127, 152, Kolt, George, 160
169, 226–27 Korean War, 26, 29, 59, 178b
Israel: Six-Day War (1967), 157; Yom Kippur War Kosovo, target analysis on, 190
(1973), 157–58 Kuwait, Iraqi invasion of (1990), 158–59
Italy, covert action in, 206, 208
Laird, Melvin, 262n32
Japan, Pearl Harbor attack (1941), 55, 118, 145, 155–56 Laos, covert action in, 218
Jefferson, Thomas, 64 leadership analysis, 203n21
Jervis, Robert, 99, 110n14, 165, 235 leaked information: to alter public debate, 41, 268;
Johnson, Lyndon: covert action authorization and, compromise of counterintelligence operations and,
207, 218; IC relationship of, 240; Israeli Six-Days 18; consequences for IC, 90; executive branch and,
War and, 157; NSC meetings and, 50n26; Vietnam 40–41; on interrogation and torture, 40–41, 283; on
War and, 179, 245–46 NSA metadata collection, 283–84; outside experts
Joint Chiefs of Staff (JCS), 26, 60, 179, 221 and, 140; purpose of, 21; Snowden data leaks, 18, 61,
joint operations, 14 90, 140, 242, 280, 284, 289–90; as threat to foreign
joint terrorism task forces (JTTFs), 38, 68 policy, 216, 268–69; WikiLeaks, 90, 140, 251–52
Jones, R. V., 174 legal attaché (LEGAT) offices, 38, 68
judicial oversight of intelligence, 279–81, 280b legality of covert action, 220, 222
Justice, Department of (DOJ), 68, 220, 231n34, lethal military covert action, 211b
282–85 level of confidence, 95–96, 109n7, 136, 249
just intelligence principles, 216–17 Levin, Dov, 292n3
Lewis and Clark Expedition, 64
Kahneman, Daniel, 109n11 lone wolf terrorists, 152
Karadžić, Radovan, 203n22 long-term assessments, 138, 197–98. See also Global
Kennan, George, 206–7 Trends; National Intelligence Estimates
Kennedy, John F.: Bay of Pigs and, 213, 230–31n15; low confidence, 95, 109n7
covert action authorization and, 207; Cuban Mis-
sile Crisis and, 156, 172n17, 192; decision-making MacArthur, Douglas, 156
style of, 44; DIA and NRO, 20; IC relationship of, MacEachin, Douglas, 132, 140
240; NSC and, 29; PIAB relations, 277 Madison, James, 265
Kennedy, Robert, 240 Marrin, Stephen, 132
Kent, Sherman: on Cuban Missile Crisis, 156; on Marshall, George C., 24n10, 26, 28–29
forecasting, 117; on goals of analysts, 115; on Marshall Plan, 206–7
ignoring intelligence, 167; on intelligence, 9b; Mattis, James, 223, 227
on intelligence influence in policy, 111, 234; McCone, John A., 145, 156, 245
intelligence-policy model of, 236–37; Office of McConnell, Michael, 250
National Estimates and, 119; on purpose of intel- McLaughlin, John, 196–97, 260n6
ligence, 8, 104, 111; on strategic intelligence, 111, McNamara, Robert, 59, 62, 66, 245–46
Index321
National Security Agency (NSA): authorization of, NGA (National Geospatial-Intelligence Agency), 62,
267; budget for, 74; cyber operations, 228; estab- 63–65
lishment of, 20, 60; intelligence cycle and, 89; role NIB (National Intelligence Board), 122, 139
in intelligence community, 60–61; surveillance NIC. See National Intelligence Council
program of, 18, 61, 90, 140, 242, 280–81, 283–86, Nicaragua, Iran-Contra Operation (1986), 44, 213–14,
289–90 218–19
National Security Council (NSC): committee struc- NID (National Intelligence Daily), 178–79
ture, 30–31, 31f; covert action, recommendations NIEs. See National Intelligence Estimates
on, 45–46, 77, 217; covert action authorization, 205, NIMA (National Imagery and Mapping Agency), 65
217, 221, 231n24, 231nn29–30; DNI and, 71b, 72; NIMs (national intelligence managers), 155
economic advisers and, 27–28; establishment of, 9/11 attacks (2001): interagency relations and, 57,
8–9, 28b; executive branch and, 42–45; expanding 67, 70, 90, 92; warning intelligence on, 162–64,
role of, 26–27, 29–30; foreign policy and relations, 172n12. See also post-9/11 era
45–46; IC oversight, 76–79, 83n43; intelligence 9/11 Commission, 56, 99, 163, 198
and, 45–46; interagency process and, 26, 30–34, NIOs (national intelligence officers), 72, 122
31–33f; Iran-Contra Operation (1986), 214, 218–19; NIO/W (national intelligence officer for warning),
Lawyers Group (LG), 220; national strategy docu- 154–55, 159
ments and, 116; NSC 68 document, 26; policy rota- NIP. See National Intelligence Program
tions and, 196, 237, 260n5; purpose of, 19, 71b, 77 NIPF (National Intelligence Priorities Framework),
national security enterprise (NSE), 3, 25–51; Con- 78, 83n45, 85
gress and, 40; DHS and, 38–39; DOD and, 35–37; Nitze, Paul, 246–47
economic agencies and, 39; expansion of, 34–37; Nixon, Richard: covert action and, 218, 231n24, 272;
FBI and, 37–38; foreign policy and, 43–44; future decision-making style of, 44; foreign policy and
of, 47; media and, 40–41; National Security Act, relations, 44, 45; IC relationship of, 240; NSC and,
28b; national security adviser and, 41–43; NSC and, 29; Strategic Arms Limitation Talks (SALT), 120,
26–34, 28b, 31–33f, 45–46; overview, 2–3, 6n1; PDB 124, 246
and, 46b; State Department and, 34–35; structure Non-Proliferation Treaty (NPT), 189–90
vs. informality, 44–45 North, Oliver, 214
National Security Presidential Decision 17 (NSPD North American Treaty Organization (NATO), 148,
17), 117 190
national security strategies, 88, 108n1 North Korea: cyberattack on Sony Pictures, 228; indi-
National Security Strategy (2010), 7, 101–2 cators of state failure, 147; invasion of South Korea
National Security Strategy (2017), 84 (1950), 156; nuclear activities of, 21, 151, 167, 266;
National Security Strategy (2019), 102, 174 policy on, 176t; sanctions on, 167, 175
national strategy documents, 116, 142nn3–4 NPIC (National Photographic Interpretation Center),
National Strategy to Combat Weapons of Mass 64–65
Destruction (2002), 117 NRO. See National Reconnaissance Office
national technical means (NTM), 186, 187b NSA. See National Security Agency
NATO (North American Treaty Organization), 148, NSC. See National Security Council
190 NSC 68 document, 26
natural disasters, 63, 64, 152, 288 NSE. See national security enterprise
NCPC (National Counterproliferation Center), 73 NSPD 17 (National Security Presidential Decision
NCSC (National Counterintelligence and Security 17), 117
Center), 73 NTM (national technical means), 186, 187b
NCTC (National Counterterrorism Center), 20, nuclear weapons: arms control agreements, 74, 120,
72–73, 105, 173n32 124, 158, 186–89, 202nn11–12, 246–47, 266; avoid-
near-real time, 23n2 ance of use, 27; Department of Energy and, 49n2;
NEC (National Economic Council), 27–28, 49n3 International Atomic Energy Agency and, 189–90,
need-to-know principle, 13, 90, 137, 166, 268 202nn15–16, 266; of North Korea, 21, 151, 167, 266;
need-to-share principle, 90, 137, 166 of Syria, 21; warning system for attacks, 146, 149,
Negroponte, John, 241 171n6. See also weapons of mass destruction
New America Foundation, 232n39, 281 Nye, Joseph, 3, 121
Index323
Obama, Barack: Bin Laden, operation against, 88–89; judicial branch, 279–81, 280b; by NSC, 76–79; in
counterterrorism policies, 22; covert action and, post-9/11 era, 281–86, 286b; Privacy and Civil Lib-
222–24; on data collection by NSA, 242; decision- erties Oversight Board, 281, 289; purpose of, 265
making style of, 42, 50n23; foreign policy and
relations, 44, 45; IC relationship of, 241–42, 254; Pakistan, drone strikes in, 232n39
integration of NSC and HSC, 28; interrogation and Panetta, Leon, 50n25, 78, 189, 225–26, 241
torture, 222, 254, 283; Iran, nuclear arrangement paramilitary operations, 209, 210–11b, 212–14,
with, 40; NSA surveillance program, 284–85; NSC 224–27, 281
principals and, 43, 50n25; PDB and, 242; PIAB partisanship, 254–55
relations, 277; Russian election interference and, pattern recognition, 90
252–53; Syrian civil war and, 226 PC. See Principals Committee
Office for Foreign Assets Control (OFAC), 39 PCLOB (Privacy and Civil Liberties Oversight
Office for Terrorism and Financial Intelligence Board), 281, 289
(OTFI), 39 PDB. See President’s Daily Brief
Office of Current Intelligence, 120 peacetime. See intelligence community
Office of Director of National Intelligence (ODNI): Pearl Harbor attack (1941), 54–55, 118, 145, 155–56
Congress on, 76; establishment of, 20, 47; on Pelosi, Nancy, 282–83
national security enterprise, 49n10; NIC as part Pentagon. See Defense, Department of
of, 122; on release of estimates, 268; size and influ- Perry, William, 65
ence of, 72–73; staff of, 70 Philippines, tsunami (2004), 64
Office of Economic Research, 120 PIAB (President’s Intelligence Advisory Board), 200,
Office of Intelligence and Analysis (OIA), 39, 69 276–78
Office of National Estimates (ONE), 119, 142n7 Pillar, Paul, 248–49
Office of Naval Intelligence (ONI), 54, 58 Poindexter, John, 214
Office of Policy Coordination (OPC), 207, 230n3 Policy Counter Terrorism Evaluation Group, 248
Office of Secretary of Defense (OSD), 26, 36 policy evaluation, 106–7
Office of Strategic Research (OSR), 120 policy formation and implementation: analysis of
Office of Strategic Services (OSS), 24n10, 54–55, 66, intelligence and, 102–6; DOD and, 36; economic
207 agencies and, 39; NIEs, impact of, 132–34; State
Omand, David, 216, 229 Department and, 35; warning intelligence and,
open-source intelligence (OSINT): analysts and, 91, 147–48. See also covert action; foreign policy and
92t; analytical process and, 94; availability of, 15; relations; intelligence cycle; intelligence-policy
defined, 11, 11b; intelligence cycle and, 87, 89; for relationship
low priority analyses, 199 policymakers: biases of, 17, 88, 212–13; feedback from,
operational security, 90, 169 8, 16, 17, 87, 184; INR and, 66; intelligence cycle
Operation Desert Shield (1990–1991), 200 and, 87–89; lack training on IC, 258; warning intel-
Operation Desert Storm (1991), 200 ligence and, 145, 167–68, 170; wishful thinking of,
operations centers, 33, 49n9 153, 158, 167–68, 212–13
Operation Zapata (1961), 212–13 policy options papers, 32
opportunity-cost decisions, 89 policy rotations, 196–97, 237, 260nn5–6
order-of-battle (OOB), 58 policy support, 4, 174–204; analysts’ role in, 105–6;
OSD (Office of Secretary of Defense), 26, 36 crisis management and, 192–96, 195b; current
OSINT. See open-source intelligence intelligence publications for, 177–85, 178b,
OSR (Office of Strategic Research), 120 180–81b; current vs. long-term analysis, 197–98;
OSS (Office of Strategic Services), 24n10 defined, 174; diplomatic negotiations, 186–90,
OTFI (Office for Terrorism and Financial 187b; global coverage vs. specific threats, 198–99;
Intelligence), 39 military vs. national intelligence needs, 199–200;
outside experts, 99–100, 110n14, 119, 139–40 NSC and, 45; policy rotations, 196–97; purpose
oversight of intelligence community: by Congress, intelligence for, 174; target analysis, 190–92, 191b;
254, 273–75b, 273–76; by executive branch, 276–79; types of, 175–77, 176t
Intelligence Oversight Act (1980), 218, 274, 274b; political covert action, 208, 210b
Intelligence Oversight Board (IOB), 277–78; by political instability, 150, 151
324Index
politicization: increase in, 254–55; intelligence-policy security vs., 22, 110n20, 271–72; in post-9/11 era,
models and, 236–37; Iran nuclear NIE, 249–51; Iraq 283–86, 286b, 289–90; Privacy and Civil Liberties
WMD intelligence, 247–49; motivations and forms Oversight Board, 281, 289; public opinion on IC
of, 244, 253–54; presidential appointments and, and, 289–90
238b, 239, 243; remedies for IC, 256–57; Rovner’s processing of intelligence, 7–8, 85
taxonomy of, 244b; Russian interference in 2016 propaganda, 209, 210b, 212, 252
elections, 251–53, 252b; Soviet estimates, 246–47; PSP (President’s Surveillance Program), 284–85,
Vietnam War estimates, 245–46 294n32
Pollock, Kenneth, 143n24 psychological warfare, 206, 209, 212
polygraph exams, 18b public relations, 286–90, 292n9, 294n42
Pompeo, Mike, 243 Putin, Vladimir, 149, 252b, 255
post-9/11 era: analytical outreach and, 99; CIA and,
20, 24n10, 56, 75; counterterrorism as central radar signatures, 13
mission, 105; covert action and, 9, 27, 221–29, 226f, Radio Free Europe (RFE), 209
281–86, 286b; FBI role and, 37–38, 67; Homeland Radio Liberty (RL), 209
Security Council, establishment of, 28; IC budget raw intelligence, 10–14, 16, 85
increases, 75; intelligence collection methods, Reagan, Ronald: Afghanistan, covert action in,
281–86, 286b; intelligence reforms, 20, 38, 47, 67, 215; foreign policy and relations, 44; Gorbachev,
78–79, 277; interagency cooperation and, 90; joint skepticism of, 238b; on intelligence analysis, 7;
terrorism task forces and, 68; long-term analysis intelligence-policy relationship and, 238; Iran-
and, 198; national security and, 9–10; privacy Contra Operation and, 213
rights in, 283–86, 286b, 289–90; professionalism Red Cell analysis, 99, 138, 165, 249
and transparency, need for, 286–90, 288b; Red redundant information, 75–76
Cell analytical units, 99; reforms for, 20, 38, 47, 67, reforms: following Iran-Contra Operation, 214; impe-
78–79, 277 tus for, 21, 47, 78; for improvements to strategic
Powell, Colin, 241 intelligence, 137–38; Intelligence Reform and Ter-
presidential findings, 19, 274 rorism Prevention Act (IRTPA, 2004), 57, 70, 74,
President’s Daily Brief (PDB): on Bin Laden, 163b; 121, 200; PCLOB and, 289; post-9/11 era and, 20,
briefers for, 184, 237–38, 258; Bush (G.H.W.) and, 38, 47, 67, 78–79, 277
46b, 239; Bush (G.W.) and, 184–85; CIA global relationship identification, 90
assessments in, 56, 57; Clinton and, 240–41; com- rendition programs, 41, 222–23, 282
mencement of, 27, 178, 182; distribution list for, requirements for intelligence, 8, 93
183; intelligence-policy relationship and, 237–38; research and development activities, 150–51, 171n9
National Security Act and, 9; national security RFE (Radio Free Europe), 209
advisers and, 43; Obama and, 242; overview, Rice, Condoleezza, 43, 162, 185
181–85; preparation of, 73, 183–84; publication of, RL (Radio Liberty), 209
271; purpose of, 45; Truman and, 182; Trump and, Robb-Silberman WMD commission, 248
43, 185, 243; warning intelligence in, 153, 163 Roosevelt, Franklin D., 26, 54–55
President’s Intelligence Advisory Board (PIAB), 200, Roosevelt, Kermit, 212
276–78 Rovner, Joshua, 244, 246, 262n32
President’s Surveillance Program (PSP), 284–85, Rumsfeld, Donald: IC relationship of, 241; Iraqi WMD
294n32 intelligence and, 248; Iraq War and, 44; on military
Principals Committee (PC): covert action and, 221; vs. national intelligence priorities, 200, 204n28;
defined, 29, 49n6; DNI and, 70; interagency pro- on NSC meetings, 47; NSC process and, 43; on
cess and, 30–33, 77 paramilitary operations, 224–25; on post-9/11 IC
Principles of Professional Ethics for the Intelligence reforms, 277; on role of DCI, 70
Community, 265 Russia: warning intelligence on Baltic invasion, 148,
prisoners of war. See interrogation; torture 150. See also Cold War; election interference (U.S.
Privacy and Civil Liberties Oversight Board 2016); Soviet Union
(PCLOB), 281, 289
privacy rights: domestic surveillance and, 18–19, Sadat, Anwar, 157
60–61, 271–72, 283–86; minimization of inter- SALT (Strategic Arms Limitation Talks), 120, 124,
cepted communications, 280, 293n19; national 158, 186–88, 246–47
Index325
sanctions: economic departments’ role in, 37, 39, 68; Snowden data leaks, 18, 61, 90, 140, 242, 280, 284,
on Iran, 39, 250; on North Korea, 167, 175; on Ser- 289–90
bia, 193–94; as WMD deterrent, 117, 144n33, 167 social media, 13, 64
satellite systems, 12, 23nn2–3, 61–62, 64, 74, 239. See Souers, Sidney, 54, 55, 80n4
also imagery intelligence sources and methods, 13, 18, 287
SATs (structured analytical techniques), 98 South Korea, invasion of (1950), 156
scenario analysis, 98 Soviet Military Power (DIA), 142n8
Schlesinger, James, 292n8 Soviet Union: Afghanistan invasion (1979), 89, 158,
scientific developments, 149, 150–51 215; Bay of Pigs (1961), Cuba, 212–13; biologi-
Scowcroft, Brent, 42–43, 46b, 69, 204n28, 277 cal weapons, 171n9; break up and end of Cold
searches and seizures, 271–72, 284 War, 159–60, 237; CIA analysis of leadership, 97,
search warrants, 271–72, 279–80 109n10; Corona program and, 62; covert action
secrecy: classified information and, 268; collection of as response to subversion of, 209; Cuban Missile
intelligence and, 10–16, 267; espionage, 13, 52, 280; Crisis (1962), 65, 94–95, 118–19, 156, 172n17, 192;
necessity of, 205, 269–71. See also covert action; intelligence failure on, 151; NIEs on, 124, 125b, 133,
human intelligence; leaked information 142n14, 246–47; North Korean invasion of South
secretary of defense, 63, 69–70, 72, 75, 179. See also Korea and, 156; strategic intelligence on, 120,
Office of Secretary of Defense 142n8; strategic warning of attack from, 149, 171n6;
secretary of energy, 27, 49n2 Yugoslavia, expulsion from, 209, 230n8. See also
secretary of state, 35, 65–67, 180 Cold War
Secretary’s Morning Summary, 66, 180–81, 181b special activities. See covert action
security clearance, 18b, 100, 200 special agents, 68
seismic detectors, 13 spying, 13, 52, 280. See also human intelligence
Senate Armed Services Committee, 200, 273–75b, SR-71 aircraft, 12
273–76 SSCI. See Senate Select Committee on Intelligence
Senate Select Committee on Intelligence (SSCI): Stalin, Joseph, 156, 209
establishment of, 292n10; on interrogation pro- State Department: dissenting opinion on Iraqi NIE,
grams, 41, 222, 254, 263–64n53, 279; NIEs and, 143n25, 257; foreign policy authority of, 26; over-
133, 135–36, 198; oversight role of, 273–75b, 273–76, sight of IC, 207, 220–21; overview, 34–35; public
292n11; on Russian hacking, 264n55 diplomacy programs, 209; reports from, 56; Secre-
senior director for intelligence programs, 77–78 tary’s Morning Summary, 66, 180–81, 181b. See also
Senior Executive Intelligence Brief (SEIB), 179 Bureau of Intelligence and Research; foreign policy
senior intelligence managers and analysts, 100, 113, and relations
237–38, 258, 260n6 Steinberg, James, 107
sense of the community memoranda, 122 Stevenson, Adlai, 192
September 11, 2001 terrorist attack. See 9/11 attacks Stimson, Henry, 53
Serbia: Balkan Task Force and, 193–94, 203nn22–23; Strategic Arms Limitation Talks (SALT), 120, 124,
target analysis on, 190 158, 186–88, 246–47
Shultz, George, 44, 238b Strategic Futures Group, 138
signals intelligence (SIGINT): analysts and, 91, 92t; strategic intelligence, 4, 111–44; accuracy of, 134–35;
analytical process and, 93–94; budget constraints analytical process and, 93, 103–4; defined, 56, 112;
and, 74; on Cuban Missile Crisis, 192; defined, 11b, failure of, 135–37; forecasting, 117–19; history of,
12; HUMINT vs., 74–75; intelligence cycle and, 89; 115–17; impact and relevance of, 132–34; improve-
Iraqi WMD and, 16; NRA and, 61–63; NSA and, ments to, 137–40; NIC and, 121–23; NIES and,
60–61; target analysis from, 190; warning intelli- 123–30, 125–26b, 130b; overview, 111–15, 112f, 114f;
gence from, 150, 153. See also National Reconnais- producers of, 119–21; quality of, 135–40. See also
sance Office; National Security Agency warnings
signatures (radar), 13, 23–24n4 Strategic Intelligence for an American World Policy
Sims, Jennifer, 106 (Kent), 236
single-source analysis, 16–17, 87 strategic warning, 146, 148–52, 163–64, 169
situational awareness, 179 structured analytical techniques (SATs), 98
situation reports (sit-reps), 192, 194 structured brainstorming, 98
SMEs (subject-matter experts), 113 subject-matter experts (SMEs), 113
326Index
Roger Z. George has taught intelligence and national security subjects at Occidental
College, Pepperdine University, and Georgetown University’s Security Studies Pro-
gram. He also was professor of national security strategy at the US National War Col-
lege from 2009 to 2015. During a thirty-year career as a CIA analyst, he also served
on policy planning staffs at the Department of State and the Department of Defense
and was the national intelligence officer for Europe. He is coeditor with James B.
Bruce of Analyzing Intelligence: National Security Practitioners’ Perspectives (second
edition), and coeditor with Harvey Rishikof of The National Security Enterprise: Navi-
gating the Labyrinth (second edition). Dr. George earned his PhD from the Fletcher
School of Law and Diplomacy, Tufts University, and his BA in political science from
Occidental College.
328