| |
| |
Preface | |
| |
| |
Acknowledgments | |
| |
| |
Authors | |
| |
| |
| |
An Overview of Intelligence | |
| |
| |
Introduction | |
| |
| |
What Is Intelligence? | |
| |
| |
The Challenge of Defining Intelligence | |
| |
| |
Information and Intelligence | |
| |
| |
Types of Intelligence | |
| |
| |
Functions of Intelligence Agencies | |
| |
| |
Policymakers and Decision-Makers | |
| |
| |
Intelligence Foundations in U.S. Government | |
| |
| |
U.S. Intelligence Community | |
| |
| |
Purpose of Intelligence | |
| |
| |
Limitations of Intelligence | |
| |
| |
Conclusion | |
| |
| |
Key Terms | |
| |
| |
References | |
| |
| |
| |
History of Intelligence in the United States | |
| |
| |
Introduction | |
| |
| |
Revolutionary War to Civil War | |
| |
| |
Civil War to World War I | |
| |
| |
Law Enforcement Intelligence: The Palmer Raids | |
| |
| |
World War I to Pearl Harbor | |
| |
| |
World War II | |
| |
| |
The Cold War | |
| |
| |
National Security Act of 1947 | |
| |
| |
Early Days of the CIA | |
| |
| |
Korean War | |
| |
| |
Creation of the National Security Agency | |
| |
| |
Evolution of IMINT | |
| |
| |
Cuba | |
| |
| |
Vietnam Era | |
| |
| |
War at Home | |
| |
| |
Watergate and the Pike and Church Committees | |
| |
| |
The Carter Years | |
| |
| |
The Reagan Years: End of the Cold War | |
| |
| |
End of the Soviet Union | |
| |
| |
Emergence of Terrorism | |
| |
| |
Espionage in 1980s and 1990s | |
| |
| |
The Clinton Years | |
| |
| |
9/11 and Its Aftermath | |
| |
| |
Intelligence Reform and Terrorism Prevention Act of 2004 and Creation of the Director of National Intelligence | |
| |
| |
Recent Developments in the Struggle against Terrorism | |
| |
| |
Conclusion | |
| |
| |
Key Terms | |
| |
| |
References | |
| |
| |
| |
The IC Today | |
| |
| |
Introduction | |
| |
| |
Designated Federal Agencies and the DNI | |
| |
| |
Director of National Intelligence | |
| |
| |
Independent Agencies: CIA | |
| |
| |
Department of Energy: Office of Intelligence and Counterintelligence | |
| |
| |
DHS: Office of Intelligence and Analysis | |
| |
| |
DHS: Coast Guard Intelligence | |
| |
| |
Department of Justice: FBI | |
| |
| |
Department of Justice: DEA | |
| |
| |
Department of State: Bureau of Intelligence and Research | |
| |
| |
Department of the Treasury: Office of Terrorism and Financial Intelligence | |
| |
| |
Military Agencies: Army, Navy, Air Force, and Marines | |
| |
| |
Military Agencies: Defense Intelligence Agency | |
| |
| |
Military Agencies: National Geospatial-Intelligence Agency | |
| |
| |
Military Agencies: National Security Agency | |
| |
| |
Military Agencies: National Reconnaissance Office | |
| |
| |
Federal, State, and Local Agencies | |
| |
| |
Federal Agencies | |
| |
| |
State and Local Agencies | |
| |
| |
State and Local Police Departments | |
| |
| |
Fusion Centers | |
| |
| |
Private Sector | |
| |
| |
Conclusion | |
| |
| |
Key Terms | |
| |
| |
References | |
| |
| |
| |
Collection | |
| |
| |
Introduction | |
| |
| |
Considerations for Collection | |
| |
| |
Credibility Issues: Vetting the Source | |
| |
| |
Information: How Much Is Enough? | |
| |
| |
Protecting Sources and Methods | |
| |
| |
First Step in Collection-You Need to Have a Plan | |
| |
| |
Collection Methods: The "INTs" | |
| |
| |
Human Intelligence | |
| |
| |
Signals Intelligence | |
| |
| |
The Special Case of "Chatter" | |
| |
| |
Law Enforcement Operations | |
| |
| |
Geospatial Intelligence | |
| |
| |
Measurement and Signatures Intelligence | |
| |
| |
Financial Intelligence | |
| |
| |
Open Source Intelligence | |
| |
| |
Conclusion | |
| |
| |
Key Terms | |
| |
| |
References | |
| |
| |
| |
Barriers to Analysis | |
| |
| |
Introduction | |
| |
| |
Murky World of the IC | |
| |
| |
Psychological Barriers | |
| |
| |
Group Decision-Making | |
| |
| |
Bureaucratic Barriers: Politics and the Will of the Policymaker | |
| |
| |
Bureaucratic Barriers: Information Sharing | |
| |
| |
Security and Sharing: Inherent Tension | |
| |
| |
Conclusion | |
| |
| |
Key Terms | |
| |
| |
References | |
| |
| |
| |
Analytical Methods | |
| |
| |
Introduction | |
| |
| |
Critical Thinking | |
| |
| |
Collaboration | |
| |
| |
Structured Analytical Techniques | |
| |
| |
Understanding Our Assumptions: Key Assumptions Check | |
| |
| |
Considering All Sides of the Issue: Analysis of Competing Hypotheses | |
| |
| |
Preparing for Whatever Comes: Scenarios | |
| |
| |
The Emperor s Clothes Are Fair Game: Contrarian Methods | |
| |
| |
Analytical Software | |
| |
| |
Conclusion | |
| |
| |
Key Terms | |
| |
| |
References | |
| |
| |
| |
Putting It All Together: The Intelligence Cycle | |
| |
| |
Introduction | |
| |
| |
Information and the Origin of the Intelligence Cycle | |
| |
| |
The Intelligence Cycle | |
| |
| |
Step One: Planning and Direction | |
| |
| |
Step Two: Collection | |
| |
| |
Step Three: Processing and Exploitation | |
| |
| |
Step Four: Analysis and Production | |
| |
| |
Step Five: Dissemination | |
| |
| |
Step Six: Evaluation | |
| |
| |
Critical Reactions to the Intelligence Cycle | |
| |
| |
Conclusion | |
| |
| |
Key Terms | |
| |
| |
References | |
| |
| |
| |
Counterintelligence | |
| |
| |
Introduction | |
| |
| |
Defensive Counterintelligence | |
| |
| |
Classification Systems | |
| |
| |
Security Clearances | |
| |
| |
Counterintelligence Operations | |
| |
| |
Offensive Counterintelligence | |
| |
| |
Catching Spies in the United States | |
| |
| |
International Operations | |
| |
| |
Disinformation | |
| |
| |
Counterintelligence Operations Today | |
| |
| |
Conclusion | |
| |
| |
Key Terms | |
| |
| |
References | |
| |
| |
Further Reading | |
| |
| |
| |
Covert Operations | |
| |
| |
Introduction | |
| |
| |
Covert Operations | |
| |
| |
Clandestine Operations | |
| |
| |
Deception Operations | |
| |
| |
Recent History of Covert and Clandestine Operations by the United States | |
| |
| |
Military Covert Operations | |
| |
| |
Legal Requirements upon the President to Report Intelligence Operations | |
| |
| |
Covert Operations and the War on Terror | |
| |
| |
Are Covert Operations a Good Idea? | |
| |
| |
Conclusion | |
| |
| |
Key Terms | |
| |
| |
References | |
| |
| |
| |
Constitutional Mandates-Overview of Executive, Legislative, and Judicial Roles | |
| |
| |
Introduction | |
| |
| |
Legal Origin of the Intelligence Community | |
| |
| |
Intelligence and International Law | |
| |
| |
Targeting and Assassination | |
| |
| |
Fourth Amendment: Right to Privacy | |
| |
| |
History of FISA | |
| |
| |
28 Code of Federal Regulations 23 | |
| |
| |
First Amendment Issues and Intelligence | |
| |
| |
USA PATRIOT Act | |
| |
| |
Intelligence Reform and Terrorism Prevention Act | |
| |
| |
Terrorism and Legal Proceedings | |
| |
| |
Classified Information Procedures Act | |
| |
| |
Ethics | |
| |
| |
Conclusion | |
| |
| |
Key Terms | |
| |
| |
References | |
| |
| |
| |
Writing and Briefing for the Intelligence Community | |
| |
| |
Introduction | |
| |
| |
Writing | |
| |
| |
Types of Intelligence Writing | |
| |
| |
Writing for an Audience | |
| |
| |
How to Write Intelligence Products | |
| |
| |
Good versus Bad Intelligence Writing | |
| |
| |
The Art of Writing | |
| |
| |
Sentence Structure | |
| |
| |
The Active Voice | |
| |
| |
Identifying Agents | |
| |
| |
Commas | |
| |
| |
Needless Words | |
| |
| |
Reading Level of the Analytic Piece | |
| |
| |
The Writing Process | |
| |
| |
Briefing | |
| |
| |
Basics of Public Speaking | |
| |
| |
Briefing Preparation | |
| |
| |
The Briefing | |
| |
| |
Conclusion | |
| |
| |
Key Terms | |
| |
| |
Additional Readings | |
| |
| |
References | |
| |
| |
| |
Military Intelligence | |
| |
| |
Introduction | |
| |
| |
Purpose of Military Intelligence | |
| |
| |
Types of Military Intelligence | |
| |
| |
Command and Control | |
| |
| |
The Military Intelligence Cycle | |
| |
| |
Evolution of Military Intelligence | |
| |
| |
Current State of Military Intelligence | |
| |
| |
Intelligence Role of the Commander | |
| |
| |
Role of the Military Intelligence Officer | |
| |
| |
The "2 Section" | |
| |
| |
Military Intelligence Assets | |
| |
| |
Intelligence Preparation of the Battlefield and Today's Threat Structure | |
| |
| |
Military Intelligence within the National Defense Structure | |
| |
| |
United States Army | |
| |
| |
United States Navy | |
| |
| |
United States Marine Corps | |
| |
| |
United States Air Force | |
| |
| |
Conclusion | |
| |
| |
Key Terms | |
| |
| |
References | |
| |
| |
| |
Criminal Intelligence and Crime Analysis | |
| |
| |
Introduction | |
| |
| |
History of Intelligence in Law Enforcement | |
| |
| |
Law Enforcement and Intelligence | |
| |
| |
Criminal Intelligence before the 9-11 Attacks | |
| |
| |
Intelligence-Led Policing in the United States and the National Criminal Intelligence Sharing Plan | |
| |
| |
Fusion Centers | |
| |
| |
Crime Analysis | |
| |
| |
Research behind Crime Analysis | |
| |
| |
Types of Crime Analysis | |
| |
| |
Crime Mapping | |
| |
| |
Tactical Crime Analysis | |
| |
| |
Criminal Investigative Analysis | |
| |
| |
Geographic Profiling | |
| |
| |
Conclusion | |
| |
| |
Key Terms | |
| |
| |
References | |
| |
| |
| |
Threats and Challenges for the Twenty-First Century | |
| |
| |
Introduction | |
| |
| |
Threats | |
| |
| |
Natural Threats | |
| |
| |
Illicit Drug Production and Distribution | |
| |
| |
Border Security and Immigration Issues | |
| |
| |
Transnational Organized Crime | |
| |
| |
Human Trafficking | |
| |
| |
Intellectual Property Theft | |
| |
| |
Cyber Security | |
| |
| |
Weapons Trafficking | |
| |
| |
Conventional Weapons | |
| |
| |
Chemical Weapons | |
| |
| |
Biological Weapons | |
| |
| |
Nuclear and Radiological Weapons | |
| |
| |
Explosives | |
| |
| |
Terrorism | |
| |
| |
Failed States, Failing States, and Rogue Nations | |
| |
| |
Conclusion | |
| |
| |
Key Terms | |
| |
| |
References | |
| |
| |
| |
Future of Intelligence | |
| |
| |
Introduction | |
| |
| |
Forecasting the Future | |
| |
| |
A Look Ahead | |
| |
| |
Technology | |
| |
| |
Demographics | |
| |
| |
Economic Trends | |
| |
| |
Politics/Governance | |
| |
| |
Vision 2015: How the DNI Defines the Future | |
| |
| |
Infrastructure and Technology | |
| |
| |
Policy | |
| |
| |
Personnel | |
| |
| |
Conclusion | |
| |
| |
Key Terms | |
| |
| |
References | |
| |
| |
Index | |