FY 2009 Budget Request Summary: a Pathway to Achieving Critical End-State Capabilities for the Federal Bureau of Investigation

Total Page:16

File Type:pdf, Size:1020Kb

FY 2009 Budget Request Summary: a Pathway to Achieving Critical End-State Capabilities for the Federal Bureau of Investigation Table of Contents Page No. I. Overview ………………………………………………………………….............. 1-1 II Summary of Program Changes…………………………………………….. 2-1 III. Appropriations Language and Analysis of Appropriations Language….......... 3-1 IV. Decision Unit Justification A. Intelligence………………………………………………………………… . 4-1 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes c. Results of Programs Assessment Rating Tool (PART) Reviews B. CT/CI……………………………………………………………………… 4-15 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes c. Results of Programs Assessment Rating Tool (PART) Reviews C. CEFC………………………………………………………………………....... 4-39 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes c. Results of Programs Assessment Rating Tool (PART) Reviews D. CJS………………………………………………………………………… ...... 4-65 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes c. Results of Programs Assessment Rating Tool (PART) Reviews V. E-Gov Initiatives……………………………………………………………. 5-1 VI. Program Increases by Item………………………………………………… 6-1 Domain and Operations Increases Response to a WMD Incident……………………………………………. 6-1 CBRNE/WMD Forensic Response Capability…………………………... 6-6 Weapons of Mass Destruction Directorate (WMDD)……………………. 6-14 National Security Field Investigations…………………………………… 6-17 Computer Intrusion Program……………………………………………… 6-20 National Security Analysis Center……………………………………….. 6-25 Domain Management Technology Program……………………………… 6-30 Undercover and Sensitive Operations Program………………………….. 6-33 Counterterrorism Financial Analysts…………………………………….. 6-34 Foreign Language Program………………………………………………. 6-37 National Virtual Translation Center (NVTC)…………………………….. 6-41 Foreign Intelligence Collection Program…………………………………. 6-47 Confidential Human Source Validation (CHSV)………………………… 6-53 Guardian Counterterrorism IT System……………………………………. 6-57 Comprehensive National Cybersecurity Initiative………………………... 6-60 Open Source………………………………………………………………. 6-69 Surveillance Increases Surveillance………………………………………………………………. 6-71 Aviation and Surveillance Program………………………………………. 6-72 Advanced Electronic Technology (ELSUR)……………………………… 6-75 Tactical Operations (TACOPS)…………………………………………… 6-76 DaLAS…………………………………………………………………….. 6-79 Physical Surveillance (FISUR) Technology……………………………… 6-80 Consolidated Collections…………………………………………………. 6-84 NexGen - EDMS/DWS…………………………………………………… 6-88 Infrastructure Increases Field Facility Infrastructure……………………………………………….. 6-91 Information Technology Disaster Recovery……………………………… 6-97 Central Records Complex………………………………………………… 6-100 Unclassified Network Capabilities (UNet)……………………………….. 6-104 Leveraging Technology DNA Programs……………………………………………………………. 6-107 Counterterrorism & Forensic Analytical Support………………………… 6-116 Communications Capabilities…………………………………………….. 6-120 Partnerships Increases CT Operations Deployment/International Support………………………. 6-123 Legat Expansion………………………………………………………….. 6-125 Fusion Centers……………………………………………………………. 6-129 Workforce Increases National Security Branch Training Capabilities………………………….. 6-133 Background Investigations……………………………………………….. 6-134 Foreign Language Program - Workforce Initiatives……………………… 6-137 Human Intelligence (HUMINT) Field Training………………………….. 6-138 Specialized Training and International Liaison Unit – Cyber……………. 6-142 Pay Modernization………………………………………………………… 6-146 Offsets Intelligence Community (IC) Centralization of LIFECARE Management……………………………………………………….……… 6-149 VII. Exhibits A. Organizational Chart B. Summary of Requirements C. Program Increases by Decision Unit D. Resources by DOJ Strategic Goal/Objective E. Justification for Base Adjustments F. Crosswalk of 2007 Availability G. Crosswalk of 2008 Availability H. Summary of Reimbursable Resources I. Detail of Permanent Positions by Category J. Financial Analysis of Program Increases/Offsets K. Summary of Requirements by Grade L. Summary of Requirements by Object Class M. Status of Congressionally Requested Studies, Reports, and Evaluations VIII. Construction……………………………………………………………… 8-1 Program Increases by Item…………………………………………………….. 8-1 FBI Academy Construction………………………………………………………. 8-1 Exhibits A. Appropriations Language and Analysts of Appropriations Language B. Summary of Requirements D. Resources by DOJ Strategic Goal and Objective F. Crosswalk of 2007 Availability G. Crosswalk of 2008 Availability L. Summary of Requirements by Object Class THIS PAGE INTENTIONALLY LEFT BLANK I. Overview for Federal Bureau of Investigation FY 2009 Budget Request Summary: A Pathway to Achieving Critical End-State Capabilities for the Federal Bureau of Investigation The FY 2009 budget request for the Federal Bureau of Investigation proposes a total of $7,108,091,000 in direct budget authority, including 31,340 permanent positions (12,225 Special Agent, 2,647 Intelligence Analyst, and 16,468 professional support) and $7,065,100,000 for Salaries and Expenses and $42,991,000 for Construction. • The FBI request for Salaries and Expenses proposes a total of 1,129 new positions, including 280 Special Agents, 271 Intelligence Analysts, and 578 professional support and $185,692,000 in associated personnel funding. The request for Salaries and Expenses proposes a total of $252,053,000 in new non-personnel funding for program improvements and increased capabilities. • The FBI request for Construction proposes a total of $42,991,000, including $9,800,000 for new construction at the FBI Academy. In addition to directly appropriated resources, the FBI proposes reimbursable resources and resources transferred from other agencies in the amount of $1,249,313,000 and 3,265 FTE for FY 2009. These totals include a transfer of $123,840,000,which provides funding for 774 FTE, pursuant to the Health Insurance Portability and Accountability Act (HIPPA) of 1996. These totals also include $138,587,000 and 899 FTE under the Interagency Crime and Drug Enforcement Program. The remaining reimbursable resources are used to facilitate a number of activities, including fingerprint-based background checks, name checks, pre-employment background investigations, and detail assignments to other agencies. An interim fee structure for the Name Check Program and the Fingerprint Identification Program brings resources in line with costs and improves services for those programs. The FBI’s Mission. The mission of the FBI is to protect and defend the United States against terrorism and foreign intelligence threats, to uphold and enforce the criminal laws of the United States, and to provide leadership and criminal justice services to federal, state, municipal, and international agencies and partners.1 Organization. Since the submission of the FY 2008 Budget to Congress, there have been no major reorganizations within the FBI. FBI Headquarters, located in Washington, D.C., provides centralized operational, policy, and administrative support to FBI investigations conducted throughout the United States and in foreign countries. Major FBI facilities include the FBI Academy, the Engineering Research Facility, and FBI Laboratory at Quantico, Virginia, a large complex in Clarksburg, West Virginia for 1 Beginning in FY 2007, electronic copies of the Department of Justice’s Congressional Budget Justifications and Capital Asset Plan and Business Case exhibits can be viewed or downloaded from the Internet using the Internet address: http://www.usdoj.gov/jmd/2009justification/. 1-1 fingerprint identification and other services, information technology centers in Pocatello, Idaho, and Fort Monmouth, New Jersey, and operational support centers in Butte, Montana, and Savannah, Georgia, and the Hazardous Devices School at Redstone Arsenal, Alabama. The FBI operates 56 field offices in major U.S. cities and over 400 resident agencies (RAs) throughout the country. Resident agencies are satellite offices that support the larger field offices and allow the FBI to maintain a presence in and serve communities that are distant from main field offices. FBI employees assigned to field offices and resident agencies perform the majority of the investigative and intelligence work of the FBI. The FBI also operates 59 Legal Attaché (Legat) offices and 14 sub-offices in foreign countries around the world. The Deputy Director exercises oversight of the National Security, the Criminal, Cyber, Response and Services Branch, and the Science and Technology Branch. Also reporting to the Deputy Director are the Assistant Directors in Charge/Special Agents in Charge of FBI Field Offices, the Office of Public Affairs, the Office of Congressional Affairs, the Office of the General Counsel, the Office of Equal Employment Opportunity, the Office of Professional Responsibility, and the Office of the Ombudsman. • The National Security Branch (NSB) includes the Counterterrorism Division (CTD), the Counterintelligence Division (CD), the Directorate of Intelligence (DI) and the newly created Weapons of Mass Destruction Directorate (WMDD), which consolidates the FBI’s WMD and counterproliferation efforts. • The Criminal, Cyber, Response and Services Branch includes the Criminal Investigative Division (CID), the Cyber Division
Recommended publications
  • FBI Academy Training Facility A&E Study………………………………
    Table of Contents Page No. I. Overview ………………………………………………………………….............. 1-1 II. Summary of Program Changes…………………………………………….. 2-1 III. Appropriations Language and Analysis of Appropriations Language….......... 3-1 IV. Decision Unit Justification…………………………………………………... 4-1 A. Intelligence………………………………………………………………… . 4-1 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes B. Counterterrorism/Counterintelligence ……………………………………… 4-14 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes C. Criminal Enterprises and Federal Crimes…………………………………… 4-36 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes D. Criminal Justice Services…………………………………………………….. 4-59 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes V. Program Increases by Item………………………………………………… 5-1 Domain and Operations Increases Comprehensive National Cybersecurity Initiative………………………... 5-1 Intelligence Program………………………………………………….…... 5-6 National Security Field Investigations……….………………………….... 5-13 Mortgage Fraud and White Collar Crime………………………………… 5-15 WMD Response………………………………………………………..…. 5-19 Infrastructure Increases
    [Show full text]
  • A Review of FBI Security Programs, March 2002
    U.S. Department of Justice A Review of FBI Security Programs Commission for Review of FBI Security Programs March 2002 Commission for the Review of FBI Security Programs United States Department of Justice 950 Pennsylvania Avenue, NW, Room 1521 Washington, DC 20530 (202) 616-1327 Main (202) 616-3591 Facsimile March 31, 2002 The Honorable John Ashcroft Attorney General United States Department of Justice 950 Pennsylvania Avenue, N.W. Washington, D.C. 20530 Dear Mr. Attorney General: In March 2001, you asked me to lead a Commission to study security programs within the Federal Bureau of Investigation. Your request came at the urging of FBI Director Louis Freeh, who had concluded that an outside review was critical in light of the then recently discovered espionage by a senior Bureau official. In discharging my duties, I turned to six distinguished citizens as fellow Commissioners and to a staff of highly qualified professionals. I want to acknowledge the diligence with which my colleagues pursued the complex matters within our mandate. The Commission took its responsibilities seriously. It was meticulous in its investigation, vigorous in its discussions, candid in sharing views, and unanimous in its recommendations. When I agreed to chair the Commission, you promised the full cooperation and support of the Department of Justice and the FBI. That promise has been fulfilled. I would like to thank the Department’s Security and Emergency Planning Staff for the expert help they gave us, and I especially commend the cooperation of Director Mueller and FBI personnel at every level, who have all been chastened by treachery from within.
    [Show full text]
  • The Golden Spy-Masters & the Devolution of the West In
    THE GOLDEN SPY-MASTERS & THE DEVOLUTION OF THE WEST IN BRITISH ESPIONAGE FICTION by Kelly Allyn Lewis A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts in English MONTANA STATE UNIVERSITY Bozeman, Montana April 2017 ©COPYRIGHT by Kelly Allyn Lewis 2017 All Rights Reserved ii TABLE OF CONTENTS 1. FREEZE FRAMING................................................................................................1 Endnotes...................................................................................................................9 2. COLD WAR SPACES & BRITAIN’S SECRET WEST.......................................11 Endnotes.................................................................................................................22 3. THE BOND EMPIRE: THE WEST & THE GOLDEN AGE OF ESPIONAGE.................................................................25 Endnotes.................................................................................................................45 4. TRUTH & DISILLUSIONMENT IN LE CARRÉ’S COLD WAR WEST...................................................................47 Endnotes.................................................................................................................68 5. THE LIMINAL FRONTIER..................................................................................70 Endnotes.................................................................................................................75 BIBLIOGRAPHY......................................................................................................76
    [Show full text]
  • The Department of Justice and the Limits of the New Deal State, 1933-1945
    THE DEPARTMENT OF JUSTICE AND THE LIMITS OF THE NEW DEAL STATE, 1933-1945 A DISSERTATION SUBMITTED TO THE DEPARTMENT OF HISTORY AND THE COMMITTEE ON GRADUATE STUDIES OF STANFORD UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Maria Ponomarenko December 2010 © 2011 by Maria Ponomarenko. All Rights Reserved. Re-distributed by Stanford University under license with the author. This work is licensed under a Creative Commons Attribution- Noncommercial 3.0 United States License. http://creativecommons.org/licenses/by-nc/3.0/us/ This dissertation is online at: http://purl.stanford.edu/ms252by4094 ii I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. David Kennedy, Primary Adviser I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. Richard White, Co-Adviser I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. Mariano-Florentino Cuellar Approved for the Stanford University Committee on Graduate Studies. Patricia J. Gumport, Vice Provost Graduate Education This signature page was generated electronically upon submission of this dissertation in electronic format. An original signed hard copy of the signature page is on file in University Archives. iii Acknowledgements My principal thanks go to my adviser, David M.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Spy Culture and the Making of the Modern Intelligence Agency: from Richard Hannay to James Bond to Drone Warfare By
    Spy Culture and the Making of the Modern Intelligence Agency: From Richard Hannay to James Bond to Drone Warfare by Matthew A. Bellamy A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (English Language and Literature) in the University of Michigan 2018 Dissertation Committee: Associate Professor Susan Najita, Chair Professor Daniel Hack Professor Mika Lavaque-Manty Associate Professor Andrea Zemgulys Matthew A. Bellamy [email protected] ORCID iD: 0000-0001-6914-8116 © Matthew A. Bellamy 2018 DEDICATION This dissertation is dedicated to all my students, from those in Jacksonville, Florida to those in Port-au-Prince, Haiti and Ann Arbor, Michigan. It is also dedicated to the friends and mentors who have been with me over the seven years of my graduate career. Especially to Charity and Charisse. ii TABLE OF CONTENTS Dedication ii List of Figures v Abstract vi Chapter 1 Introduction: Espionage as the Loss of Agency 1 Methodology; or, Why Study Spy Fiction? 3 A Brief Overview of the Entwined Histories of Espionage as a Practice and Espionage as a Cultural Product 20 Chapter Outline: Chapters 2 and 3 31 Chapter Outline: Chapters 4, 5 and 6 40 Chapter 2 The Spy Agency as a Discursive Formation, Part 1: Conspiracy, Bureaucracy and the Espionage Mindset 52 The SPECTRE of the Many-Headed HYDRA: Conspiracy and the Public’s Experience of Spy Agencies 64 Writing in the Machine: Bureaucracy and Espionage 86 Chapter 3: The Spy Agency as a Discursive Formation, Part 2: Cruelty and Technophilia
    [Show full text]
  • The Richard Aoki Case: Was the Man Who Armed the Black Panther Party an FBI Informant?
    THE RICHARD AOKI CASE: WAS THE MAN WHO ARMED THE BLACK PANTHER PARTY AN FBI INFORMANT? by Natalie Harrison A Thesis Submitted to the Faculty of The Wilkes Honors College in Partial Fulfillment of the Requirements for the Degree of Bachelor of Arts in Liberal Arts and Sciences with a Concentration in History Wilkes Honors College of Florida Atlantic University Jupiter, Florida April 2013 THE RICHARD AOKI CASE: WAS THE MAN WHO ARMED THE BLACK PANTHERS AN FBI INFORMANT? by Natalie Harrison This thesis was prepared under the direction of the candidate’s thesis advisor, Dr. Christopher Strain, and has been approved by the members of her supervisory committee. It was submitted to the faculty of The Honors College and was accepted in partial fulfillment of the requirements for the degree of Bachelor of Arts in Liberal Arts and Sciences. SUPERVISORY COMMITTEE: ____________________________ Dr. Christopher Strain ___________________________ Dr. Mark Tunick ____________________________ Dr. Daniel White ____________________________ Dean Jeffrey Buller, Wilkes Honors College ____________ Date ii ACKNOWLEDGEMENTS I would like to thank, first and foremost, Dr. Strain for being such a supportive, encouraging and enthusiastic thesis advisor – I could not have done any of this had he not introduced me to Richard Aoki. I would also like to thank Dr. Tunick and Dr. White for agreeing to be my second readers and for believing in me and this project, as well as Dr. Hess for being my temporary advisor when I needed it. And finally, I would like to thank my family and friends for all their support and for never stopping me as I rattled on and on about Richard Aoki and how much my thesis felt like a spy movie.
    [Show full text]
  • A FBI Program, Resource, and Service Guide for Chiefs and Sheriffs
    A FBI Program, Resource, and Service Guide for Chiefs and Sheriffs “The most effective weapon against crime is cooperation…. The efforts of all law enforcement agencies with the support and understanding of the American people.” J. Edgar Hoover Law Enforcement Executives: The FBI, Office of Law Enforcement Coordination, in partnership with law enforcement association executive staff, board members, and members in addition to FBI executive management, have collaborated with one another regarding FBI products, services, and resources a Chief of Police, Commissioner, Superintendent, Director, Sheriff, or other law enforcement executives may want or need to know about. We invite you, our state, local, tribal, and campus law enforcement partners to sit down and have a leisurely conversation with your FBI Assistant Director or Special Agent in Charge about these and other FBI capabilities at your earliest convenience. The FBI, Office of Law Enforcement Coordination has categorized the FBI programs, services, and resources into the following five categories: 1. Crisis Response 2. Investigative Assistance 3. Forensic Support 4. Intelligence and Information Sharing 5. Training The FBI, Office of Law Enforcement Coordination, encourages you to review these FBI products, services, and resources which may be available to state, local, tribal, and campus law enforcement partners in addition to collaborating with your FBI Assistant Director or local Special Agent in Charge in your area of responsibility to promote new or enhance existing relationships
    [Show full text]
  • The FBI's Counterterrorism Program
    U.S. Department of Justice Federal Bureau of Investigation Report to the National Commission on Terrorist Attacks upon the United States: The FBI’s Counterterrorism Program Since September 2001 April 14, 2004 Report to The National Commission on Terrorist Attacks upon the United States The FBI’s Counterterrorism Program Since September 2001 TABLETABLE OF OFCONTENTS CONTENTS I EXECUTIVE SUMMARY....................................................................11 II FBI ORGANIZATIONAL CHART................................................. 3 III TIMELINE OF SIGNIFICANT REFORMS AND INITIATIVES SINCE 9/11/01.......................................................... 4 IV INTRODUCTION......................................................................................66 V PRIORITIZATION....................................................................................77 The New Priorities.........................................................................................77 1 Protect the United States from Terrorist Attack..........................................77 2 Protect the United States Against Foreign Intelligence Operations and Espionage........................................................................................77 3 Protect the United States Against Cyber-based Attacks and High-Technology Crimes..................................................................88 4 Combat Public Corruption at all Levels.......................................................88 5 Protect Civil Rights......................................................................................88
    [Show full text]
  • Federal Bureau of Investigation (FBI)
    U.S. Department of Justice Federal Bureau of Investigation FY 2019 Authorization and Budget Request to Congress February 2018 Table of Contents Page No. I. Overview........................................................................................................................... 1-1 II. Summary of Program Changes (Not Applicable) ..................................................... N/A III. Appropriations Language and Analysis of Appropriations Language ................... 3-1 IV. Program Activity Justification .................................................................................... 4-1 A. Intelligence Decision Unit ............................................................................................... 4-1 1. Program Description 2. Performance Tables (Not Applicable) 3. Performance, Resources, and Strategies (Not Applicable) B. Counterterrorism/Counterintelligence Decision Unit ...................................................... 4-7 1. Program Description 2. Performance Tables (Not Applicable) 3. Performance, Resources, and Strategies (Not Applicable) C. Criminal Enterprises Federal Crimes Decision Unit ...................................................... 4-14 1. Program Description 2. Performance Tables (Not Applicable) 3. Performance, Resources, and Strategies (Not Applicable) D. Criminal Justice Services Decision Unit ....................................................................... 4-20 1. Program Description 2. Performance Tables (Not Applicable) 3. Performance, Resources, and Strategies (Not
    [Show full text]
  • Cia Clandestine Service Age Requirement
    Cia Clandestine Service Age Requirement brunettesWhich Prince arco. gropes Phlegmatic so distressfully Haywood that always Haywood face-harden remonetizing his tonemes her lappings? if Davide Salvatore is man or iswhinnied sinistrally fragmentary. corruptive after confessionary Rory accuses his Lieutenants will review committee, cia clandestine service trainee program: cybersecurity refers to emphasize that transform raw data In cia requires continuous indoctrination and requirements will be dea fast, requiring reasonable demographic spread disinformation campaign. CIA members of Reddit what water your requirements for. Then placed on a cia requires a partial list on factors that age requirements of these services? Spooky Sex blame the Randy Culture of the CIA FDD. How did Get a succession at the CIA and mess It's Like to flourish There. Core collectors typically work light the CIA's Clandestine Service As CIA core. Make a difference in your wife at CIA Join our diverse workforce of individuals backgrounds and roles working we keep America safe. Clandestine Service account the CIA are generally not accepted over the gauge of 35. Plus you for adoption are highly active psychological warfare and field work there is a bachelor or individuals are available to join this program to cause exceptionally grave damage to. Research and Development requires closer coordination with requirements. CIA Fills In Some Blanks on Gina Haspel's Secret Life WSJ. Former CIA officer talks about espionage in the digital age. CIA agent jobs are often portrayed glamorously on feature and TV but enough truth still are. ContentsIntroduction by Tom Secker 4Conclusions CIA Clandestine Services History Record. Cia clandestine service obligation where a cia.
    [Show full text]
  • FBI Law Enforcement Bulletin
    LAW ENFORCEMENT BULLETIN 'D66T~ FEDERAL BUREAU OF INVESTIGATION UNITED STATES DEPARTMENT OF JUSTICE J. EDGAR HOOVER, DIRECTOR JULY 1965 VOL. 34, NO. 7 ­­­­­­­­­ THE COVER-Director J. Edgar Hoover estab· lished the FBI National Academy in 1935. See 30th anniversary article beginning on page 2. LAW ENFORCEMENT BULLETIN CONTENTS Message From Director J. Edgar Hoover 1 The FBI National Academy-Thirty Years of Progress Through Training . 2 The Morals Squad, by William M. Lombard, Chief of Police, Rochester, N.Y. Taking Inventory, by Dwight]. Dalbey, Special Agent, Federal Bureau of Investigation 12 Nationwide Crimes cope 13 Investigators' Aids 23 Wanted by the FBI 24 Published by 'he FEDERAL BUREAU OF INVESTIGATION UNITED STATES DEPARTMENT OF JUSTICE Washington, D.C. 20535 WE CAN EXPECT the coming weeks to present a pied" appearance often discourage and prevent stiff challenge to law enforcement. Predictions burglaries. are prevalent throughout the country for a "long, Crimes against property, however, are only a hot summer" because of anticipated increases of minor part of the problem. Far more appalling disturbances and violent crimes. are the vicious attacks on defenseless children by We would hope the prognosticators of these sexual deviates and the murders, rapes, and ag- ominous conditions are wrong; we would hope gravated assaults which register sharp rises dur- that a recordbreaking summer of strife and law- ing the summer. The intensity and frequency of 1u1ness can be averted. But in addition to the these violations haunt every community. Law annual seasonal increase of summertime crime­- enforcement is still searching for effective pre- crimes of passion and violence­­we can also ex- ventive action against them, and certainly, neg- ~ ect difficulties and violations connected with ligence and public indifference do not lessen the .
    [Show full text]