I. Chapter 1: Intelligence
A. Definition and Purpose of Intelligence
Intelligence is information collected, processed, and analyzed to assist in decision-making for national security.
It differs from general information by being tailored to meet policymakers' needs.
B. Why Have Intelligence Agencies?
Avoiding Strategic Surprise – Preventing unexpected attacks (e.g., Pearl Harbor, 9/11).
Providing Long-Term Expertise – Intelligence agencies retain institutional knowledge.
Supporting the Policy Process – Provides background, warning, and risk assessments to policymakers.
Maintaining Secrecy – Protects sources and methods from adversaries.
C. Types of Intelligence Disciplines
HUMINT (Human Intelligence) – Information from spies and informants.
SIGINT (Signals Intelligence) – Interception of electronic communications.
GEOINT (Geospatial Intelligence) – Satellite imagery and mapping.
MASINT (Measurement and Signature Intelligence) – Technical intelligence from weapons, radiation, etc.
OSINT (Open-Source Intelligence) – Publicly available data from media, social media, and academia.
D. What Intelligence is NOT About
Not Absolute Truth – Intelligence involves probabilities and estimates, not certainty.
Not Policy Advocacy – Intelligence informs policy but should not dictate decisions.
II. Chapter 2: The Development of the U.S. Intelligence Community (USIC)
A. Historical Evolution of U.S. Intelligence
Early U.S. intelligence efforts were ad hoc, becoming more structured in World War II.
The Office of Strategic Services (OSS), a wartime intelligence agency, laid the foundation for modern intelligence.
B. The National Security Act of 1947
Established the CIA – The first peacetime intelligence agency.
Created the Director of Central Intelligence (DCI) – Predecessor to the Director of National Intelligence (DNI).
Formed the National Security Council (NSC) – High-level policy coordination body.
C. The Cold War and Intelligence Expansion
Intelligence played a central role in countering the Soviet Union.
The CIA, NSA, and DIA were key in Cold War-era intelligence collection and covert operations.
D. Post-9/11 Reforms and Restructuring
Creation of the Office of the Director of National Intelligence (ODNI) – Oversight of all intelligence agencies.
Formation of the Department of Homeland Security (DHS) – Centralized domestic intelligence.
Increased Counterterrorism Focus – Emphasized intelligence-sharing to prevent future attacks.
III. Chapter 3: Intelligence Community Relationships That Matter
A. The Role of the DNI and the President
The Director of National Intelligence (DNI) is the principal intelligence adviser to the president.
The President’s Daily Brief (PDB) provides intelligence updates for national security decisions.
B. CIA and Its Relationship with Other Agencies
FBI Collaboration – The CIA handles foreign intelligence, while the FBI manages domestic intelligence.
NSA Cooperation – NSA provides SIGINT to support intelligence and military operations.
C. Congressional Oversight of Intelligence
Senate Select Committee on Intelligence (SSCI) – Senate oversight body.
House Permanent Select Committee on Intelligence (HPSCI) – House oversight counterpart.
Budget Oversight – Congress controls intelligence agency funding.
D. The Intelligence Budget Process
National Intelligence Program (NIP) – Funds intelligence for national security.
Military Intelligence Program (MIP) – Funds intelligence supporting military operations.
IV. Chapter 4: The Intelligence Process and TECHINTS
A. The Intelligence Cycle
Planning and Direction
Identifying intelligence requirements based on national security needs.
Setting priorities for intelligence collection.
Collection
Gathering intelligence through different sources (HUMINT, SIGINT, GEOINT, etc.).
Processing and Exploitation
Converting raw intelligence into usable information through translation, decryption, and analysis.
Analysis and Production
Interpreting and assessing intelligence to identify threats and trends.
Dissemination
Delivering intelligence reports to policymakers and military leaders.
Feedback Loop
Evaluating intelligence effectiveness and refining collection priorities.
B. The Role of TECHINT (Technical Intelligence)
SIGINT – Interception of electronic communications, handled by the NSA.
GEOINT – Use of satellite imagery for military and intelligence operations.
MASINT – Technical intelligence from radiation, acoustics, and chemical signatures.
V. Chapter 5: Collection Disciplines – GEOINT, SIGINT, MASINT, HUMINT, OSINT
A. Geospatial Intelligence (GEOINT)
Uses satellite imagery and mapping for intelligence and military strategy.
Managed by the National Geospatial-Intelligence Agency (NGA).
B. Signals Intelligence (SIGINT)
Interception of communications to detect threats.
Managed by the National Security Agency (NSA).
C. Measurement and Signature Intelligence (MASINT)
Detects nuclear tests, missile launches, and other technical data.
D. Human Intelligence (HUMINT)
Traditional espionage using undercover operatives.
Handled primarily by the CIA’s Directorate of Operations.
E. Open-Source Intelligence (OSINT)
Information from media, social networks, and academic sources.
Growing role in counterterrorism and cyber intelligence.
VI. Chapter 13: Ethical and Moral Issues in Intelligence (National Interest)
A. Ethical Challenges in Intelligence Collection
Balancing national security with individual privacy rights.
Ensuring legal and ethical intelligence practices.
B. Controversies in Covert Action
Assassinations and Targeted Killings – Legal and ethical debates over drone strikes.
Cyberattacks – Use of offensive hacking for intelligence purposes.
C. Intelligence and the National Interest
Intelligence supports policymakers in making informed national security decisions.
Preventing the politicization of intelligence.
D. Whistleblowers and Leaks
Edward Snowden and NSA surveillance leaks – Impact on intelligence credibility.
The role of congressional oversight in managing intelligence disclosures.
VII. Why the U.S. Has Intelligence Oversight
A. Preventing Intelligence Abuses
Church Committee (1975) – Investigated intelligence overreach and illegal surveillance.
Foreign Intelligence Surveillance Act (FISA, 1978) – Established legal framework for intelligence-related wiretapping.
B. Ensuring Accountability
Congressional Oversight Committees – Ensure intelligence agencies follow legal and ethical guidelines.
Inspectors General (IGs) – Internal watchdogs within intelligence agencies.
C. Balancing National Security and Civil Liberties
FISA Courts issue surveillance warrants to protect constitutional rights.
The USA PATRIOT Act expanded intelligence-gathering powers after 9/11.
D. Addressing Emerging Threats
Cybersecurity – Intelligence agencies play a key role in preventing cyberattacks.
Election Security – Countering foreign interference in democratic processes.
I. The Fourth Amendment
A. Definition and Purpose
Protects citizens against unreasonable searches and seizures.
Requires probable cause and a judicial warrant for searches.
B. Relevance to Intelligence
Limits government surveillance powers.
Basis for legal challenges against mass data collection programs (e.g., NSA metadata collection).
Impacts electronic surveillance and FISA court procedures.
II. The Church Committee (1975)
A. Background
Formed in response to intelligence agency abuses.
Investigated the CIA, FBI, NSA, and IRS for domestic surveillance violations.
B. Key Findings
Illegal surveillance of civil rights leaders, journalists, and political dissidents.
COINTELPRO (FBI) – Targeted activists like Martin Luther King Jr.
CIA Assassination Plots – Involved in attempts against foreign leaders.
C. Major Reforms and Impact
Led to permanent congressional oversight committees (Senate Select and House Permanent Select Committees on Intelligence).
Foreign Intelligence Surveillance Act (FISA, 1978) was enacted to regulate intelligence wiretaps.
Ban on political assassinations through Executive Order 11905.
III. The Foreign Intelligence Surveillance Act (FISA, 1978)
A. Purpose
Created legal framework for electronic surveillance of foreign threats.
Established the Foreign Intelligence Surveillance Court (FISC) for warrant approvals.
B. Key Provisions
FISA Court (FISC) – Secret court reviewing government surveillance requests.
Minimization Procedures – Limits on collecting information on U.S. persons.
C. Post-9/11 Amendments
USA PATRIOT Act (2001) – Expanded surveillance powers (e.g., Section 215 metadata collection).
FISA Amendments Act (2008) – Allowed warrantless surveillance of foreign targets.
USA FREEDOM Act (2015) – Reformed bulk data collection practices.
IV. Executive Order (EO) 12333
A. Overview
Signed by President Reagan (1981) to define U.S. intelligence community roles.
Establishes the scope, duties, and limitations of intelligence activities.
B. Section 1.1 – Goals, Direction, and Duties
Defines intelligence objectives, including national security and foreign intelligence collection.
Ensures intelligence activities comply with U.S. law and civil liberties protections.
C. Section 1.12(b) – The National Security Agency (NSA)
Outlines the NSA’s role in Signals Intelligence (SIGINT).
Limits domestic surveillance but allows coordination with law enforcement.
D. Part 2 – Conduct of Intelligence Activities
Restrictions on Domestic Intelligence – Prohibits spying on U.S. citizens unless authorized.
Oversight and Accountability – Intelligence activities must follow legal and constitutional guidelines.
Collection, Retention, and Dissemination Rules – Limits how intelligence on U.S. persons is handled.
1. Definition of Covert Action
Q: What is the legal definition of covert action according to the National Security Act (1991)? A: Covert action is an activity or activities of the U.S. government to influence political, economic, or military conditions abroad while ensuring the U.S. government's role is not apparent or acknowledged publicly.
Q: What is the difference between covert and clandestine operations? A: Clandestine operations focus on secrecy in collecting information, while covert operations make actions visible but hide the responsible party.
Q: What are the main types of covert actions? A:
Propaganda – Spreading information to influence opinions.
Political Activity – Supporting or undermining political movements.
Economic Activity – Disrupting or strengthening economic conditions.
Coups – Overthrowing governments.
Paramilitary Operations – Supporting armed resistance or special forces.
Support to Liaison – Assisting foreign intelligence services.
Q: Name two Cold War examples of covert action. A:
Iran 1953 Coup – CIA-backed overthrow of Prime Minister Mossadegh.
Guatemala 1954 Coup – U.S. covert operation to remove President Arbenz.
Q: Why is the CIA the principal agency for covert actions? A: The CIA has the global intelligence infrastructure, counterintelligence capabilities, and operational expertise necessary for covert action.
Q: What is a "Finding" in the context of covert action? A: A Finding is a formal presidential directive that authorizes a covert action, requiring notification to congressional intelligence committees.
Q: How was covert action used during the Cold War? A: It was used to counter Soviet influence, support anti-communist resistance, and destabilize regimes aligned with the USSR.
Q: How did covert action change after 9/11? A: The focus shifted to counterterrorism, using drone strikes, special forces operations, and intelligence collaborations to target terrorist networks.
Q: Give an example of a covert propaganda campaign. A: The CIA’s Radio Free Europe broadcasted anti-communist messages to Eastern Europe during the Cold War.
Q: What are the ethical concerns of covert action? A: Covert actions may interfere with sovereignty, violate international law, and cause unintended consequences such as political instability.
Q: What was the purpose of the Hughes-Ryan Amendment?
A: It required congressional notification for covert operations, ensuring the President justified covert actions to Congress.
Q: Why was the Hughes-Ryan Amendment passed?
A: Due to concerns that Congress was unaware of CIA covert actions, particularly in Chile and Southeast Asia.
Q: What were the Church and Pike Committees?
A: Congressional committees that investigated intelligence abuses, including domestic surveillance.
Q: What was the impact of the Church and Pike Committees?
A: Their findings led to the establishment of permanent intelligence oversight committees.
Q: What are SSCI and HPSCI?
A: The Senate Select Committee on Intelligence (SSCI) and the House Permanent Select Committee on Intelligence (HPSCI), created for routine intelligence oversight.
Q: Why were SSCI and HPSCI created?
A: To ensure intelligence activities align with legal, ethical, and national security objectives.
Q: What did Executive Order 12036 require?
A: Intelligence agencies had to report their activities to congressional intelligence committees.
Q: Which President signed Executive Order 12036?
A: President Jimmy Carter.
Q: What did the Intelligence Authorization Act of 1981 do?
A: Codified requirements for intelligence agencies to notify Congress about covert operations and intelligence failures.
Q: Why was the Intelligence Authorization Act of 1981 important?
A: It ensured accountability by legally mandating congressional notifications.
Q: What was the purpose of the CIA Inspector General Act of 1989?
A: It created an independent Inspector General (IG) to monitor CIA activities and inform Congress of deficiencies.
Q: How did the CIA Inspector General Act improve oversight?
A: By promoting transparency and accountability within the CIA.
Q: What did the 9/11 Commission find about intelligence oversight?
A: It described intelligence oversight as "dysfunctional" and recommended reforms.
Q: What were the key recommendations of the 9/11 Commission?
A: Establishing a joint intelligence committee, separating the intelligence budget from defense, and improving bipartisanship.
Q: What is a proposed benefit of a Joint Committee for Intelligence?
A: It would streamline oversight and increase bipartisan cooperation.
Q: What powers could a Joint Committee for Intelligence have?
A: Subpoena power, authority to report legislation, and a dedicated oversight subcommittee.
Q: Why consolidate intelligence authorizations and appropriations?
A: To give SSCI and HPSCI more control over intelligence budgets and policies.
Q: Which commission recommended this reform?
A: The 9/11 Commission.
Q: What would intelligence appropriations subcommittees do?
A: Focus exclusively on intelligence budgets, rather than broader defense spending.
Q: How would dedicated appropriations subcommittees improve oversight?
A: By ensuring intelligence funding is properly analyzed and allocated.
Q: What is the purpose of separating intelligence and defense budgets?
A: To provide clearer oversight and avoid blurred lines in funding.
Q: Who supported this reform?
A: The 9/11 Commission and former Director of National Intelligence (DNI) James Clapper.
Q: How would providing dedicated staff to HPSCI members improve oversight?
A: It would increase expertise and allow for better intelligence analysis.
Q: Which report recommended this reform?
A: The 9/11 Commission Report.
Q: Why abolish term limits for HPSCI members?
A: To allow continuity and the development of deeper expertise.
Q: How would this reform improve intelligence oversight?
A: By ensuring experienced members remain involved in intelligence decision-making.
Q: What is the Senate Select Committee on Intelligence (SSCI)?
A: The SSCI is a standing committee in the U.S. Senate responsible for overseeing intelligence activities, ensuring they comply with the law and national security policies.
Q: What is the House Permanent Select Committee on Intelligence (HPSCI)?
A: The HPSCI is a standing committee in the U.S. House of Representatives that provides oversight, funding authorization, and legislative guidance for intelligence agencies.
SSCI (Senate): More focused on long-term intelligence policies, confirmations of key intelligence officials, and broader oversight.
HPSCI (House): Handles more frequent funding authorizations and direct legislative actions related to intelligence.
Q: Why were SSCI and HPSCI created?
A: They were established after the Church and Pike Committees (1975) uncovered intelligence abuses, ensuring permanent and structured congressional oversight of intelligence activities.