Defense Intelligence Agency (DIA)
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
National Insider Threat Task Force Mission Fact Sheet
NATIONAL INSIDER THREAT TASK FORCE MISSION FACT SHEET _________________________________ Why was the NITTF established? The National Insider Threat Task Force (NITTF) was established after the WikiLeaks release of thousands of classified documents through the global media and internet. Its mission is to deter, detect, and mitigate actions by employees who may represent a threat to national security by developing a national insider threat program with supporting policy, standards, guidance, and training. Who runs the task force, and which agencies are involved? Under Executive Order (E.O.) 13587, the NITTF is co-chaired by the U.S. Attorney General and the Director of National Intelligence. They, in turn, designated the Federal Bureau of Investigation (FBI) and the National Counterintelligence Executive to co-direct the daily activities of the NITTF. The NITTF comprises employees and contractors from a variety of federal departments and agencies (D/A), and its work impacts more than 99 federal D/As that handle classified material. Currently, the following D/As have representatives on the NITTF: FBI, National Counterintelligence and Security Center (NCSC), Defense Intelligence Agency (DIA), Central Intelligence Agency (CIA), and Transportation Security Administration. The NITTF responds directly to the Senior Information Sharing and Safeguarding Steering Committee, which was also established under E.O. 13587. The steering committee comprises representatives from largely Intelligence Community agencies with extensive access to classified networks and materials, including the Departments of State, Energy, Justice, Defense, and Homeland Security, CIA, FBI, Office of the Director of National Intelligence, NCSC, National Security Agency, DIA, the Program Manager—Information Sharing Environment, Office of Management and Budget, the National Security Council Staff, and the Information Security Oversight Office. -
Inside Russia's Intelligence Agencies
EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat. -
Vice Admiral Jon A. Hill, USN Director, Missile Defense Agency Before the House Armed Services Committee Subcommittee on Strategic Forces March 12, 2020
Vice Admiral Jon A. Hill, USN Director, Missile Defense Agency Before the House Armed Services Committee Subcommittee on Strategic Forces March 12, 2020 Good morning, Chairman Cooper, Ranking Member Turner, distinguished Members of the subcommittee. I appreciate this opportunity to testify before you today. The Missile Defense Agency budget request of $9.187 billion for Fiscal Year (FY) 2021 will enable the continued execution of the MDA mission to design, develop and deploy a layered Missile Defense System to defend the United States, deployed forces, allies, and friends from missile attacks in all phases of flight. Working together with the Services, international partners, and industry, the highly skilled and dedicated MDA government and contractor workforce stands ready to develop and deliver ready, reliable, and effective defenses the Nation needs to counter the proliferating and increasingly sophisticated missile threat. Missile Threat – A Significant Inflection Point for Missile Defense Potential adversaries continue to increase the number and capabilities of existing missile systems while adding new types of missile capabilities to their arsenals, creating an inflection point in the missile defense program that will complicate U.S. missile defense operations. Ballistic, hypersonic, and cruise missiles are becoming more capable of carrying conventional and mass destruction payloads farther, faster, and with greater accuracy. New ballistic missile systems feature multiple independently targetable reentry vehicles and maneuverable reentry vehicles, along with decoys and jamming countermeasures. Russia and 1 China are developing advanced cruise missiles and hypersonic missiles. Hypersonic missiles can be launched from ground ballistic missile launchers, released from aircraft, or launched from the sea. These missiles travel along unpredictable flight paths and at low altitudes, making them especially difficult to track and intercept. -
Navy Aegis Ballistic Missile Defense (BMD) Program: Background and Issues for Congress
Navy Aegis Ballistic Missile Defense (BMD) Program: Background and Issues for Congress Updated September 30, 2021 Congressional Research Service https://crsreports.congress.gov RL33745 SUMMARY RL33745 Navy Aegis Ballistic Missile Defense (BMD) September 30, 2021 Program: Background and Issues for Congress Ronald O'Rourke The Aegis ballistic missile defense (BMD) program, which is carried out by the Missile Defense Specialist in Naval Affairs Agency (MDA) and the Navy, gives Navy Aegis cruisers and destroyers a capability for conducting BMD operations. BMD-capable Aegis ships operate in European waters to defend Europe from potential ballistic missile attacks from countries such as Iran, and in in the Western Pacific and the Persian Gulf to provide regional defense against potential ballistic missile attacks from countries such as North Korea and Iran. MDA’s FY2022 budget submission states that “by the end of FY 2022 there will be 48 total BMDS [BMD system] capable ships requiring maintenance support.” The Aegis BMD program is funded mostly through MDA’s budget. The Navy’s budget provides additional funding for BMD-related efforts. MDA’s proposed FY2021 budget requested a total of $1,647.9 million (i.e., about $1.6 billion) in procurement and research and development funding for Aegis BMD efforts, including funding for two Aegis Ashore sites in Poland and Romania. MDA’s budget also includes operations and maintenance (O&M) and military construction (MilCon) funding for the Aegis BMD program. Issues for Congress regarding the Aegis BMD program include the following: whether to approve, reject, or modify MDA’s annual procurement and research and development funding requests for the program; the impact of the COVID-19 pandemic on the execution of Aegis BMD program efforts; what role, if any, the Aegis BMD program should play in defending the U.S. -
DEPARTMENT of DEFENSE Office of the Secretary, the Pentagon, Washington, DC 20301–1155 Phone, 703–545–6700
DEPARTMENT OF DEFENSE Office of the Secretary, The Pentagon, Washington, DC 20301–1155 Phone, 703–545–6700. Internet, www.defenselink.mil. SECRETARY OF DEFENSE ROBERT M. GATES DEPUTY SECRETARY OF DEFENSE WILLIAM LYNN III Under Secretary of Defense for Acquisition, ASHTON B. CARTER Technology, and Logistics Deputy Under Secretary of Defense (Business PAUL A. BRINKLEY Transformation) Deputy Under Secretary of Defense LOUIS W. ARNY III (Installations and Environment) Under Secretary of Defense for Policy MICHELE FLOURNOY Principal Deputy Under Secretary of Defense JAMES N. MILLER, JR. for Policy Assistant Secretary of Defense (International ALEXANDER R. VERSHBOW Security Affairs) Assistant Secretary of Defense (Special MICHAEL VICKERS Operations and Low-Intensity Conflict) Assistant Secretary of Defense (Homeland (VACANCY) Defense and America’s Security) Assistant Secretary of Defense (Global Strategic JOSEPH BENKERT Affairs Assistant Secretary of Defense (Asian and (VACANCY) Pacific Security Affairs) Deputy Assistant Secretary of Defense (Plans) JANINE DAVIDSON Deputy Under Secretary of Defense (VACANCY) (Technology Security Policy/Counter Proliferation) Deputy Under Secretary of Defense (Strategy, KATHLEEN HICKS Plans and Forces) Deputy Under Secretary of Defense (Policy PETER VERGA Integration and Chief of Staff) Principal Deputy Under Secretary of Defense WILLIAM J. CARR, Acting for Personnel and Readiness Assistant Secretary of Defense (Reserve Affairs) DAVID L. MCGINNIS, Acting Deputy Assistant Secretary of Defense (Reserve JENNIFER C. BUCK Affairs) Deputy Under Secretary of Defense (Program JEANNE FITES Integration) Deputy Under Secretary of Defense (Readiness) SAMUEL D. KLEINMAN Deputy Under Secretary of Defense (Military WILLIAM J. CARR Personnel Policy) Deputy Under Secretary of Defense (Military ARTHUR J. MYERS, Acting Community and Family Policy) Deputy Under Secretary of Defense (Plans) GAIL H. -
Report to the Under Secretary of Defense
Wind Turbine Analysis for Cape Cod Air Force Station Early Warning Radar and Beale Air Force Base Upgraded Early Warning Radar Spring 2007 EXECUTIVE SUMMARY The Missile Defense Agency (MDA) analyzed the potential impact of utility class wind farms on radars. • Utility class wind farms could have a significant impact on radars, including the missile defense early warning radars (EWRs), the PAVE PAWS radar at Cape Cod AFS, MA, and the Upgraded Early Warning Radar (UEWR) at Beale AFB, CA. • To mitigate this impact, establish and enforce a wind farm offset zone within the effective “line-of-sight” of the radars, taking into account the direct, refracted, and diffracted signals from the radar. This effectively establishes a zone around the radar of approximately twenty-five kilometers, assuming relatively level terrain. • Within twenty-five kilometers, further study would be required to assess the impact accounting for location within the radar’s field of view and the relative height of the wind turbine. • After establishing this offset zone, eliminate any remaining impacts on the radar by using gain control and range gating techniques. 1 History Studies on the effects of windmill farms on military readiness were documented in a 2006 Report to Congressional Defense Committees. That report focused on the effects of wind farms on radars and the resulting potential impact on military readiness. The primary historical data and research efforts were focused on air defense radars, characterized as “Primary Surveillance Radars” (PSR) and Air Traffic Control (ATC) radars. Two fixed-site missile Early Warning Radars (EWR) were mentioned in the report but not examined in detail. -
Toward Integrated Dod Biosurveillance
CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Purchase this document TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Arroyo Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for research quality and objectivity. Research Report Toward Integrated DoD Biosurveillance Assessment and Opportunities Melinda Moore, Gail Fisher, Clare Stevens Prepared for the United States Army Approved for public release; distribution unlimited The research described in this report was sponsored by the United States Army under Contract No. -
Policy Directive 28: Signals Intelligence Activities
PRIVACY & CIVIL LIBERTIES OVERSIGHT BOARD (U) Report to the President on the Implementation of Presidential Policy Directive 28: Signals Intelligence Activities TABLE OF CONTENTS (U) Part I Introduction .............................................................. .............................................. 1 (U) Part II Significant Changes in Practice due to the Issuance of PPD-28 .......................... 5 (U) Part III Analysis and Recommendations ........................................................................... 12 (U) Part IV Conclusion .. ... ... ............. ......................................................................................... 18 (U) Annexes: (U) A. Separate Statement by Board Members Rachel Brand and Elise beth Collins ............ 20 (U) B. Separate Statement by Board Members James Dempsey and Patricia Wald .. ........... 23 I. (U) Introduction (U) On January 17, 2014, President Obama signed Presidential Policy Directive- 28, Signals Intelligence Activities ("PPD-28"), which provides principles to guide "why, whether, when, and how the United States conducts signals intelligence activities[.]"l The directive recognizes both that "[t]he collection of signals intelligence is necessary for the United States to advance its national security and foreign policy interests and to protect its citizens (U) See Presidential Policy Directive - 28, Signals Intelligence Activities (January 17, 2014) (h ereinafter "PPD-28"), available at https:/ j www.whitehouse.gov / the-press- office / 2014/ 01/ 17j presidential-policy-directive-signals-intelligence-activities. -
Dod Instruction 6420.01, March 20, 2009
Department of Defense INSTRUCTION NUMBER 6420.01 March 20, 2009 Incorporating Change 1, Effective September 2, 2014 USD(I) SUBJECT: National Center for Medical Intelligence (NCMI) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues DoD Directive 6420.1 (Reference (a)) as a DoD Instruction in accordance with the authority in DoD Directive 5143.01 (Reference (b)); b. Re-establishes the Armed Forces Medical Intelligence Center as the NCMI for the conduct of medical intelligence within the Department of Defense, pursuant to Executive Order 12333 (Reference (c)), The National Security Act of 1947 (Reference (d)), and DoD Directive 5240.01 (Reference (e)). 2. APPLICABILITY. This Instruction applies to OSD, the Military Departments (including the Coast Guard at all times, including when it is a Service in the Department of Homeland Security by agreement with that Department), the Office of the Chairman of the Joint Chiefs of Staff and the Joint Staff, the Combatant Commands, the Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all other organizational entities in the Department of Defense (hereafter referred to collectively as the “DoD Components”). The term “Military Departments,” as used herein, refers to the Army, the Navy, the Air Force, the Marine Corps, and, as provided above, the Coast Guard (including Active and Reserve Components). 3. DEFINITIONS. For the purpose of this Instruction, the term “medical intelligence” is defined as the product of collection, evaluation, and all-source analysis of worldwide health threats and issues, including foreign medical capabilities, infectious disease, environmental health risks, developments in biotechnology and biomedical subjects of national and military importance, and support to force protection. -
Wikileaks.Org
U.S. Intelligence planned to destroy WikiLeaks WikiLeaks release: March 15, 2010 keywords: WikiLeaks, U.S. intelligence, U.S. Army, National Ground Intelligence Center, NGIC, classified, SE- CRET, NOFORN restraint: Classified SECRET/NOFORN (US) title: Wikileaks.org - An Online Reference to Foreign Intelligence Services, Insurgents, Or Terrorist Groups? date: March 18, 2008 group: United States Army Counterintelligence Center, Cyber Counterintelligence Assessments Branch; De- partment of Defence Intelligence Analysis Program author: Michael D. Horvath link: http://wikileaks.org/file/us-intel-wikileaks.pdf pages: 32 Description By Julian Assange ([email protected]) This document is a classifed (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks. “The possibility that current employees or moles within DoD or elsewhere in the U.S. government are providing sensitive or classified information to Wikileaks.org cannot be ruled out”. It concocts a plan to fatally marginalize the organization. Since WikiLeaks uses “trust as a center of gravity by protecting the anonymity and identity of the insiders, leakers or whisteblowers”, the report recommends “The identification, exposure, termination of employment, criminal prosecution, legal action against current or former insiders, leakers, or whistlblowers could potentially damage or destroy this center of gravity and deter others considering similar actions from using the Wikileaks.org Web site”. [As two years have passed since the date of the report, with no WikiLeaks’ source exposed, it appears that this plan was ineffective]. As an odd justificaton for the plan, the report claims that “Several foreign countries including China, Israel, North Kora, Russia, Vietnam, and Zimbabwe have denounced or blocked access to the Wikileaks.org website”. -
Defense Primer: National and Defense Intelligence
Updated December 30, 2020 Defense Primer: National and Defense Intelligence The Intelligence Community (IC) is charged with providing Intelligence Program (NIP) budget appropriations, which insight into actual or potential threats to the U.S. homeland, are a consolidation of appropriations for the ODNI; CIA; the American people, and national interests at home and general defense; and national cryptologic, reconnaissance, abroad. It does so through the production of timely and geospatial, and other specialized intelligence programs. The apolitical products and services. Intelligence products and NIP, therefore, provides funding for not only the ODNI, services result from the collection, processing, analysis, and CIA and IC elements of the Departments of Homeland evaluation of information for its significance to national Security, Energy, the Treasury, Justice and State, but also, security at the strategic, operational, and tactical levels. substantially, for the programs and activities of the Consumers of intelligence include the President, National intelligence agencies within the DOD, to include the NSA, Security Council (NSC), designated personnel in executive NGA, DIA, and NRO. branch departments and agencies, the military, Congress, and the law enforcement community. Defense intelligence comprises the intelligence organizations and capabilities of the Joint Staff, the DIA, The IC comprises 17 elements, two of which are combatant command joint intelligence centers, and the independent, and 15 of which are component organizations military services that address strategic, operational or of six separate departments of the federal government. tactical requirements supporting military strategy, planning, Many IC elements and most intelligence funding reside and operations. Defense intelligence provides products and within the Department of Defense (DOD). -
Considering the Creation of a Domestic Intelligence Agency in the United States
HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity.