Democratization of Intelligence

Total Page:16

File Type:pdf, Size:1020Kb

Democratization of Intelligence Does “national character” correlate with the nature of national, strategic intelligence across a major region of the world? This question remains open and important, given that the intelligence services of any country by DEMOCRATIZATION defi nition ideally provide an institutional guarantee of national survival. In the end, public consciousness of the intelligence function can contribute OF INTELLIGENCE directly to the positive evolution of intelligence as one of the oldest of political institutions, in such a way that we can begin to identify a MELDING STRATEGIC INTELLIGENCE phenomenon of “democratization” of national intelligence. AND NATIONAL DISCOURSE Russell G. Swenson and Susana C. Lemozy Editors As may be inferred from most of the essays in this book, the emphasis on state security and control of violent criminal activity is a strong, distinctive feature of the intelligence services across the region. One possibility is to extend the research carried out for this book to a systematic comparison of the institutional framework and operational emphases in other regions where, as we know through an emerging body of comparative research, there is an impetus to institutionalize democratic reform and improve the integration of law enforcement and strategic intelligence. Intelligence studies are on the brink of making the leap to a level where they will have practical relevance. This book edited by Russell Swenson and Susana Lemozy holds importance for its presentation of usefully detailed essays and for the impetus it gives for theoretically oriented comparative studies. The book should be required reading for scholars interested in the combination of intelligence, strategic culture, security and democracy. Marco Cepik Professor of Comparative Politics and International Security Federal University of Rio Grande do Sul, Brazil Visit the NDIC Press at www.ndic.edu RUSSELL G. SWENSON AND SUSANA C. LEMOZY EDITORS PCN 17140 NATIONAL DEFENSE INTELLIGENCE COLLEGE SECRET//FGI//NOFORN//FRD//MR Democratization of Intelligence Melding Strategic Intelligence and National Discourse Russell G. Swenson and Susana C. Lemozy Editors NATIONAL DEFENSE INTELLIGENCE COLLEGE WASHINGTON, DC July 2009 Opinions expressed in this book are those of the authors and do not represent the policies or points of view of their respective national governments. SECRET//FGI//NOFORN//FRD//MR SECRET//FGI//NOFORN//FRD//MR Th e National Defense Intelligence College supports and encourages research on intelligence issues that distills lessons and improves Intelligence Community capabilities for policy-level and operational consumers. Democratization of Intelligence: Melding Strategic Intelligence and National Discourse — Russell G. Swenson and Susana C. Lemozy, editors Th is abbreviated English edition of the book Democratización de la Fun- ción de Inteligencia—El Nexo de la Cultura y la Inteligencia Estratégica (NDIC Press, January 2009) presents that book’s introductory material in translation, along with essays by three U.S. and Canadian authors. Essays by the editors and by a Peruvian observer, which make up the introductory material, provide the reader unfamiliar with Spanish or Portuguese an overview of all essays in the original edition. Th e original book features essays by 28 authors who represent 14 countries in the Western Hemisphere plus Spain. Th e book aims to educate offi cials as well as students about the vicissitudes that accompany the develop- ment and execution of the government intelligence function. Th e authors dem- onstrate that national, strategic intelligence in any country of the Hemisphere can experience episodes of devolution as well as positive evolution, at the same time that the culturally modulated practices of government professionals can oscillate between periods of repression and democratic observance. Essays by authors who are U.S. Government employees were reviewed and cleared for public release by the Department of Defense’s Offi ce of Security Review. Th is edition and the original book in Spanish and Portuguese are avail- able at http://www.ndic.edu/press/press.htm. ii | Russell G. Swenson, PhD, Director, NDIC Press Library of Congress Control Number 2008944062 ISBN 978-1-932946-27-7 SECRET//FGI//NOFORN//FRD//MR SECRET//FGI//NOFORN//FRD//MR CONTENTS v FOREWORD Marco Cepik 1 FRAMEWORK FOR A NORMATIVE THEORY OF NATIONAL INTELLIGENCE Russell G. Swenson and Susana C. Lemozy 27 INVITED COMMENTARY Jorge Serrano Torres SELECTED ESSAYS 63 Refl ections on the U.S. Intelligence Culture: Career Engagements of a Civil and Military Intelligence Offi cer—Jon Wiant 79 Canadian Intelligence Culture: An Evaluation—Stephane Lefebvre 99 National Intelligence: Made in the U.S.A.—Bowman H. Miller 115 EDITORS’ ACKNOWLEDGMENTS REVERSE BLANK | iii SECRET//FGI//NOFORN//FRD//MR SECRET//FGI//NOFORN//FRD//MR FOREWORD Marco Cepik*1 Th is new book edited by Russell Swenson and Susana Lemozy contin- ues and deepens a research partnership that has been useful to the fi eld of intel- ligence studies in the Americas and beyond. In the wake of contributions such as Bringing Intelligence About (Swenson 2003) and Intelligence Professionalism in the Americas (Swenson and Lemozy 2004), the editors bring together in this volume 23 essays that address the theme of national culture and its infl uence on the nature of the intelligence function in 15 countries of the Americas and of Spain. As the various authors discuss why and how national cultures infl u- ence threat perceptions, security and defense policies, and the design of intelli- gence institutions in their respective countries, readers are treated to more than a description of the intelligence landscape. Th e editors seize on that auspicious circumstance to formulate a theory about the democratization of the national intelligence function. Th e theory proposes that the strategic intelligence culture in each country contributes in its own way to the process of democratization, which, in turn, infl uences the nature of intelligence activities in those countries. Th is hypothesis is explicit and verifi able. Although it requires additional test- ing in other national contexts (especially in Africa and Asia), the diverse essays presented here successfully demonstrate the applicability of the concept to Latin America, the United States and Canada, and to Spain. Research on culture, informal institutions, norms and values associated with intelligence is advanced by this important work, which further develops a line of inquiry that has deep roots in intelligence studies (Jervis, 1985; Lowen- thal, 1992; Bozeman, 1992; Boardman, 2006). Given that intelligence culture depends, for its behavioral expression, on operationalization or codifi cation through individual initiative and collec- tive action, the work presented in this book complements, and does not con- | v tradict, institutionally oriented studies that focus on the intelligence function, whether in the military arena or in criminal or police arenas. * Professor of Comparative Politics and International Security at the Federal University of Rio Grande do Sul, Brazil. He holds a doctorate in Political Science and is the author of Espionagem e Democracia (Rio de Janeiro, FGV, 2003), as well as four other books and approximately 30 book chapters or journal articles presented in Portuguese, Spanish or English. He also holds a Fellowship with Brazil’s National Scientifi c Research Council. SECRET//FGI//NOFORN//FRD//MR SECRET//FGI//NOFORN//FRD//MR Several volumes of intelligence case studies have appeared in recent years, many of them centered around well-defi ned research problems and sup- ported by systematic, empirical evidence (e.g., Herman, 2001, 66-158; Johnson, 2006; Bruneau & Boraz, 2007; Gill & Farson & Phythian & Shpiro, 2008). Th ese works, together with the present volume, are a fuller realization of comparative studies, building on works by the preceding generation of intelligence scholars (e.g., Richelson, 1988; Godson, 1988; Johnson, 1996, 119-145; Herman, 1996, 16-136). As may be inferred from most of the essays in this book (including the cases of Costa Rica and Colombia as two extremes in terms of the militariza- tion of their intelligence services), the emphasis on State security and control of violent criminal activity is a strong and distinctive feature of the intelligence services across the region. An interesting possibility would be to extend the research carried out for this book to a systematic comparison of the institu- tional framework and operational emphases in other regions where, as we know through an emerging body of comparative research, there is an impe- tus to institutionalize democratic reform and improve the integration of law enforcement and strategic intelligence (e.g., Williams & Deletant, 2001; Gill & Brodeur & Tollborg 2003; Born & Johnson & Leigh, 2005; Wetzling, 2006; Gill, 2006; Cepik, 2006; Burch, 2007). Intelligence studies are on the brink of making the leap to a level where they will have practical relevance. Th is book edited by Russell Swenson and Susana Lemozy holds importance for its presentation of usefully detailed essays and for the impetus it gives for theoretically oriented comparative studies. Th e book should be required reading for scholars interested in the combination of intelligence, strategic culture, security and democracy. vi | SECRET//FGI//NOFORN//FRD//MR SECRET//FGI//NOFORN//FRD//MR References BOARDMAN, Chase. (2006). “Organizational Culture Challenges to Interagency and Intelligence Community
Recommended publications
  • Killing Hope U.S
    Killing Hope U.S. Military and CIA Interventions Since World War II – Part I William Blum Zed Books London Killing Hope was first published outside of North America by Zed Books Ltd, 7 Cynthia Street, London NI 9JF, UK in 2003. Second impression, 2004 Printed by Gopsons Papers Limited, Noida, India w w w.zedbooks .demon .co .uk Published in South Africa by Spearhead, a division of New Africa Books, PO Box 23408, Claremont 7735 This is a wholly revised, extended and updated edition of a book originally published under the title The CIA: A Forgotten History (Zed Books, 1986) Copyright © William Blum 2003 The right of William Blum to be identified as the author of this work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. Cover design by Andrew Corbett ISBN 1 84277 368 2 hb ISBN 1 84277 369 0 pb Spearhead ISBN 0 86486 560 0 pb 2 Contents PART I Introduction 6 1. China 1945 to 1960s: Was Mao Tse-tung just paranoid? 20 2. Italy 1947-1948: Free elections, Hollywood style 27 3. Greece 1947 to early 1950s: From cradle of democracy to client state 33 4. The Philippines 1940s and 1950s: America's oldest colony 38 5. Korea 1945-1953: Was it all that it appeared to be? 44 6. Albania 1949-1953: The proper English spy 54 7. Eastern Europe 1948-1956: Operation Splinter Factor 56 8. Germany 1950s: Everything from juvenile delinquency to terrorism 60 9. Iran 1953: Making it safe for the King of Kings 63 10.
    [Show full text]
  • Cyber, Intelligence, and Security
    Cyber, Intelligence, and Security Volume 3 | No. 1 | May 2019 European Countries Facing the Challenge of Foreign Influence on Democracy—Comparative Research David Siman-Tov and Mor Buskila The Threat of Foreign Interference in the 2019 Elections in Israel and Ways of Handling it Pnina Shuker and Gabi Siboni The INF Treaty and New START: Escalation Control, Strategic Fatalism, and the Role of Cyber Stephen J. Cimbala Iranian Cyber Capabilities: Assessing the Threat to Israeli Financial and Security Interests Sam Cohen Outsourcing in Intelligence and Defense Agencies: A Risk of an Increase in the Proliferation of Cyber Weapons? Omree Wechsler The Academization of Intelligence: A Comparative Overview of Intelligence Studies in the West Kobi Michael and Aaron Kornbluth Forty-Five Years Since the Yom Kippur War: Intelligence and Risk Management in the Thirty Hours Preceding the War Shmuel Even National Cyber Security in Israel Yigal Unna Cyber, Intelligence, and Security Volume 3 | No. 1 | May 2019 Contents European Countries Facing the Challenge of Foreign Influence on Democracy—Comparative Research | 3 David Siman-Tov and Mor Buskila The Threat of Foreign Interference in the 2019 Elections in Israel and Ways of Handling it | 27 Pnina Shuker and Gabi Siboni The INF Treaty and New START: Escalation Control, Strategic Fatalism, and the Role of Cyber | 41 Stephen J. Cimbala Iranian Cyber Capabilities: Assessing the Threat to Israeli Financial and Security Interests | 71 Sam Cohen Outsourcing in Intelligence and Defense Agencies: A Risk of an Increase in the Proliferation of Cyber Weapons? | 95 Omree Wechsler The Academization of Intelligence: A Comparative Overview of Intelligence Studies in the West | 117 Kobi Michael and Aaron Kornbluth Forty-Five Years Since the Yom Kippur War: Intelligence and Risk Management in the Thirty Hours Preceding the War | 141 Shmuel Even National Cyber Security in Israel | 167 Yigal Unna The purpose of Cyber, Intelligence, and Security is to stimulate Cyber, and enrich the public debate on related issues.
    [Show full text]
  • Information Sources on the Web – Intelligence Bibliographies, Newsletters, Blogs, and Webliographies
    Staying Informed: Information Sources on the Web – Intelligence Bibliographies, Newsletters, Blogs, and Webliographies Peter C. Oleson For those educators and interested parties who try to keep up with the world of intelligence the flood of information can be daunting. Newspaper articles, new books, scholarly journals, and web blogs that address intelligence are numerous. Many are politically motivated; none is comprehensive. Unclassified sources lack much of the primary material. Classified sources, unless leaked, are not available. Nevertheless, the following are useful resources, presented in alphabetical order. AFCEA International (Armed Forces Communications and Electronics Association) publishes Signal magazine monthly, which contains numerous intelligence-related articles and news. AFCEA also publishes via its website webinars and white papers related to intelligence. www.afcea.org. AFCEA also has a monthly intelligence- related blog, the MAZZINT Blog. Air University has an excellent compilation of intelligence-related materials with many links to articles and relevant websites at its “Gateway to Intelligence.” http://www.au.af.mil/au/awc/awcgate/awc-ntel.htm. The American Enterprise Institute’s Critical Threats project tracks and provides analysis of key and emerging threats to national security. http://www.aei.org/feature/critical-threats-project/. The Association of Former Intelligence Officers (AFIO) is an education-oriented national association and has two major recurring publications. The Weekly Intelligence Notes (WIN), available to paid members, provides synopses and links to major intelligence-related news stories. The WINs also have a comprehensive calendar of intelligence-related events, including for the International Spy Museum in Washington, D.C. AFIO’s journal, Intelligencer, carries articles, opinion pieces, book reviews, and association news.
    [Show full text]
  • Periscope Newsletter of Afio
    NEWSLETTER OF AFIO NATIONAL AND CHAPTER PERISCOPE EVENTS, PLANS & NEWS Association of Former Intelligence Offi cers Volume XXV, Numbers 1 and 2, 2002 Gates rose through the ranks to the top job; but, incredibly, he didn’t C O N T E N T S bunki “get it”! Or perhaps he just forgot the e ng fundamental difference between a Debunking the CIA Case Offi cer D CIA “case offi cer” and an indigenous Myth by Fred Rustmann, Jr. .............. 1 “agent.” President’s Message and SpyCruise by Gene Poteat.................................. 2 More recent criticism has been What’s New in AFIO directed at the Agency by a few former by Roy Jonkers................................... 4 disgruntled junior case offi cers (who AFIO Board Actions on Bylaws ............ 6 also don’t get it, or don’t want to get it). Ballot for Election of New Board They claim that the Agency’s Members for 2003............................. 7 effectiveness, particularly regarding AFIO’s Strategic Plan Update .............. 8 Middle Eastern terrorist targets, is Honors Lists for 2001 - Donors, New hamstrung by the lack of case offi cers Member-Getters, Corporate Partners, with the requisite foreign language fl u- Volunteers .........................................10 the CIA Case Officer Myth ency, cultural knowledge and physical Welcome to the Board ........................13 characteristics to blend into a foreign Chapter Reports ...................................14 operational environment with the ease In Memorium .......................................15 Frederick W. Rustmann Jr. of a native of that country. They call Researchers Needing Assistance ..........16 July 23, 2002 for a recruitment drive to attract such Forthcoming Events/ souls, and that call has been fueled by Conferences ......................................17 Several years ago I was among a the press and others ever since.
    [Show full text]
  • Learning with Professionals
    Joint Military Intelligence College LEARNING WITH PROFESSIONALS Selected Works from the Joint Military Intelligence College EL INT LIG Y E R N A C T E I L C I O M L L T E N G I E O J 1962 The Joint Military Intelligence College supports and encourages research on intelligence issues that distills lessons and improves support to policy-level and operational consumers Learning With Professionals: Selected Works from the Joint Military Intelligence College is a collection of writings by present or former faculty and students at the Joint Military Intelligence College. The purpose of the book is to provide an academic resource for students, teachers, and practitioners of intelligence. The growth of the field as an academic discipline has been accompanied by a growth in its body of literature, and some of the most significant writings have come from a center of excellence in the field, the Joint Military Intelligence College. Those presented here represent a cross section of subdisciplines, some with a very timely element, some timeless. Though many of the writings were published outside of the College, those published within are available from the College, and are accessible by Intelink or from the National Technical Information Service (www.ntis.gov). For more details, please contact the Center for Strategic Intelligence Research at the College ([email protected]). This product has been reviewed by senior experts from academia and government, and has been approved for unrestricted distribution by the Directorate for Freedom of Information and Security Review, Washington Headquarters Services, Department of Defense.
    [Show full text]
  • Intelligence Analysis Mark M
    INCIDENTAL PAPER Seminar on Intelligence, Command, and Control Intelligence Analysis Mark M. Lowenthal Guest Presentations, Spring 2004 Carol A. Haave, Mark M. Lowenthal, Robert B. Murrett, John C. Gannon, Joan A. Dempsey, Gregory J. Rattray, Robert Liscouski, Arthur K. Cebrowski, Aris Pappas May 2004 Program on Information Resources Policy Center for Information Policy Research Harvard University The Program on Information Resources Policy is jointly sponsored by Harvard University and the Center for Information Policy Research. Chairman Managing Director Anthony G. Oettinger John C. B. LeGates Copyright © 2004 by the President and Fellows of Harvard College. Not to be reproduced in any form without written consent from the Program on Information Resources Policy, Harvard University, Maxwell Dworkin 125, 33 Oxford Street, Cambridge MA 02138. (617) 495-4114 E-mail: [email protected] URL: http://www.pirp.harvard.edu ISBN I-879716-89-5 I-04-1 May 2004 PROGRAM ON INFORMATION RESOURCES POLICY Harvard University Center for Information Policy Research Affiliates AT&T Corp. PDS Consulting Australian Telecommunications Users Group PetaData Holdings, Ltd. BellSouth Corp. Samara Associates The Boeing Company Skadden, Arps, Slate, Meagher & Booz Allen Hamilton Flom LLP Center for Excellence in Education Strategy Assistance Services Commission of the European Communities TOR LLC Critical Path TransMedia Exchange CyraCom International United States Government: Ellacoya Networks, Inc. Department of Commerce Hanaro Telecom Corp. (Korea) National Telecommunications and Hearst Newspapers Information Administration Hitachi Research Institute (Japan) Department of Defense IBM Corp. National Defense University Korea Telecom Department of Health and Human Lee Enterprises, Inc. Services Lexis–Nexis National Library of Medicine John and Mary R.
    [Show full text]
  • America's Alleged Intelligence Failure in The
    University of Calgary PRISM: University of Calgary's Digital Repository Graduate Studies The Vault: Electronic Theses and Dissertations 2017 America’s Alleged Intelligence Failure in the Prelude to Operation Iraqi Freedom: A Study of Analytic Factors Cake, Timothy Cake, T. (2017). America’s Alleged Intelligence Failure in the Prelude to Operation Iraqi Freedom: A Study of Analytic Factors (Unpublished doctoral thesis). University of Calgary, Calgary, AB. doi:10.11575/PRISM/24784 http://hdl.handle.net/11023/3688 doctoral thesis University of Calgary graduate students retain copyright ownership and moral rights for their thesis. You may use this material in any way that is permitted by the Copyright Act or through licensing that has been assigned to the document. For uses that are not allowable under copyright legislation or licensing, you are required to seek permission. Downloaded from PRISM: https://prism.ucalgary.ca UNIVERSITY OF CALGARY America’s Alleged Intelligence Failure in the Prelude to Operation Iraqi Freedom: A Study of Analytic Factors by Timothy Cake A DISSERTATION SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY GRADUATE PROGRAM IN MILITARY, SECURITY, AND STRATEGIC STUDIES CALGARY, ALBERTA APRIL, 2017 © Timothy Cake 2017 ABSTRACT In the prelude to Operation Iraqi Freedom (OIF), notables in the G. W. Bush administration declared Iraq to be an existential threat as it had weapons of mass destruction (WMD) and connections to transnational terrorist groups. After the 2003 invasion of that state, coalition forces engaged in a search effort that found no significant evidence of WMD.
    [Show full text]
  • Assessing the Tradecraft of Intelligence Analysis
    THE ARTS This PDF document was made available from www.rand.org as a public CHILD POLICY service of the RAND Corporation. CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY The RAND Corporation is a nonprofit research POPULATION AND AGING organization providing objective analysis and effective PUBLIC SAFETY solutions that address the challenges facing the public SCIENCE AND TECHNOLOGY and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE Support RAND Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Security Research Division View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation technical report series. Reports may include research findings on a specific topic that is limited in scope; present discus- sions of the methodology employed in research; provide literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research profes- sionals, and supporting documentation; or deliver preliminary findings.
    [Show full text]
  • Who Are the Customers for Intelligence?
    Association of Former Intelligence Officers From AFIO's The Intelligencer 7700 Leesburg Pike, Suite 324 Journal of U.S. Intelligence Studies Falls Church, Virginia 22043 Web: www.afio.com, E-mail: [email protected] Volume 23 • Number 2 • $15 single copy price Fall 2017 ©2017, AFIO Intelligence Communities — Plural There are four communities that use intelligence: the national security community, the homeland secu- rity community, the law enforcement community, and GUIDE TO THE STUDY OF INTELLIGENCE the private sector. When thinking about intelligence, often the first thought one has is of the national intelligence commu- nity. This is the grouping of 16 agencies (not including the Office of the Director of National Intelligence and Who Are the Customers its several centers) that are involved in intelligence sup- for Intelligence? port to national security, foreign and defense policy, military support, and counterespionage.3 The clients and customers of national security by Peter C. Oleson intelligence include the President and his national security team. While the President and members of ho uses intelligence and why? The short the National Security Council represent the apex of answer is almost everyone and to gain an this team, the national security team extends across advantage. While nation-states are most many departments and agencies of the federal gov- W ernment and geographically to the commanders of closely identified with intelligence, private corpora- 4 tions and criminal entities also invest in gathering the combatant commands and their subordinates. and analyzing information to advance their goals. Since the attacks of 9/11, other intelligence Thus the intelligence process is a service function, communities have evolved in the US senior officials or as Australian intelligence expert Don McDowell of the Department of Homeland Security (DHS) refer describes it, to “homeland security intelligence” (HIS) and the “homeland security intelligence community” as some- Information is essential to the intelligence process.
    [Show full text]
  • Pay for Performance at the CIA: Restoring Equity, Transparency and Accountability
    Pay for Performance at the CIA: Restoring Equity, Transparency and Accountability The Assessment of the Independent Panel on the Central Intelligence Agency’s Compensation Reform Proposals January 2004 Business Executives for National Security − January 2004 The Assessment of the Independent Panel on the CIA’s Compensation Reform Proposals TABLE OF CONTENTS Preface .............................................................................................................................................. iii 1. Executive Summary ...................................................................................................................... 1 2. The BENS Independent Panel ....................................................................................................... 5 3. Overview of Federal Civil Service Reform .................................................................................... 7 4. The Central Intelligence Agency’s Case for Compensation Reform ............................................. 11 5. The Central Intelligence Agency’s Compensation Reform Proposals........................................... 13 6. Observations of the BENS Independent Panel ............................................................................ 15 7. Comparison with Private Sector Best Practices ........................................................................... 21 8. Findings and Recommendations ............................................................................................... 25 Appendices A — Terms of
    [Show full text]
  • FOIA CASE LOGS for the Central Intelligence Agency (CIA)
    Description of document: FOIA CASE LOGS for: The Central Intelligence Agency (CIA) for FY 2005 – FY 2007 Requested date: 21-October-2007 Released date: 19-February-2008 Posted date: 29-April-2008 Title of Document FY 2005, FY 2006, FY 2007 Case Log Date/date range of document: 01-October-2004 – 21-November-2007 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: (703) 613-3007 The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file Central Intelligence Agency Washington, o.c. 20505 • FEB 19 lOW Reference: F-2008-00211 This is a final response to your 21 October 2007 Freedom ofInformation Act (FOIA) request for "FOIA Case Logs for CIA for the time period FY2005 and FY2006 and FY2007-to-date." We processed your request in accordance with the FOIA, 5 U.S.C. § 552, as amended, and the CIA Information Act, 50 U.S.c. § 431, as amended.
    [Show full text]
  • Central Intelligence Agency (CIA) and Made It an Independent Agency Within the Executive Branch of the President
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Central Intelligence Agency Washington, D.C. 20505 MAY 0 9 2018 Mr. John Greenewald, Jr. 27305 W. Live Oak Road Suite #1203 Castaic, CA 91384 Reference: F-2016-01968 Dear Mr. Greenewald: On 4 May 2018, the office of the Information and Privacy Coordinator received your 4 May 2018 letter and phone call asking for clarification regarding our response to your 8 October 2014 Freedom of Information Act request for the Intellipedia entries for the Central Intelligence Agency. Enclosed is another copy of our 19 March 2018 response to your request. Sincerely, Allison Fong Information and Privacy Coordinator Enclosures Central Intelligence Agency Washington, D.C. 20505 19 March 2018 Mr. John Greenewald, Jr. 27305 W. Live Oak Road Suite #1203 Castaic, CA 91384 Reference: F-2016-01968 Dear Mr. Greenewald: In the course of processing your 8 October 2014 Freedom of Information Act (FOIA) request for information on the Intellipedia entries for the Central Intelligence Agency, the National Security Agency (NSA) located CIA material and referred it to us on 6 June 2016 for review and direct response to you. We have determined that three documents can be released in segregable form with deletions made on the basis of FOIA exemption (b )(3).
    [Show full text]