Learning with Professionals

Total Page:16

File Type:pdf, Size:1020Kb

Learning with Professionals Joint Military Intelligence College LEARNING WITH PROFESSIONALS Selected Works from the Joint Military Intelligence College EL INT LIG Y E R N A C T E I L C I O M L L T E N G I E O J 1962 The Joint Military Intelligence College supports and encourages research on intelligence issues that distills lessons and improves support to policy-level and operational consumers Learning With Professionals: Selected Works from the Joint Military Intelligence College is a collection of writings by present or former faculty and students at the Joint Military Intelligence College. The purpose of the book is to provide an academic resource for students, teachers, and practitioners of intelligence. The growth of the field as an academic discipline has been accompanied by a growth in its body of literature, and some of the most significant writings have come from a center of excellence in the field, the Joint Military Intelligence College. Those presented here represent a cross section of subdisciplines, some with a very timely element, some timeless. Though many of the writings were published outside of the College, those published within are available from the College, and are accessible by Intelink or from the National Technical Information Service (www.ntis.gov). For more details, please contact the Center for Strategic Intelligence Research at the College ([email protected]). This product has been reviewed by senior experts from academia and government, and has been approved for unrestricted distribution by the Directorate for Freedom of Information and Security Review, Washington Headquarters Services, Department of Defense. Compiled by: Mr. James S. Major, Director of the College Writing Center Dr. Solveig Eggers Brownfeld, Associate Director, College Writing Center Edited by: Dr. James E. Lightfoot, Associate Director, Center for Strategic Intelligence Research Library of Congress Control Number 2005927346 ISBN 1-932946-05-5 56166_p.fm Page i Tuesday, July 19, 2005 9:16 AM LEARNING WITH PROFESSIONALS Selected Works from the Joint Military Intelligence College A collection of previously published works by students and members of the faculty of the Joint Military Intelligence College In g ic t e e g ll t ii a g e r n tt c SS c ee rr R R o o e e f f s s e e r r a a e e t r t r n c n Joint Military c e h e h C Intelligence College C Washington, DC July 2005 The views expressed in this book are those of the authors and do not reflect the official policy or position of the Department of Defense or the U.S. Government 56166_p.fm Page ii Tuesday, July 19, 2005 9:16 AM 56166_p.fm Page iii Tuesday, July 19, 2005 9:16 AM CONTENTS Introduction. v A. Denis Clift The Work of Intelligence Meeting the Intelligence Community’s Continuing Need for an Intelligence Literature. 1 Russell G. Swenson Writing with Intelligence, Chapter 2, “The Basic Tools of Writing with Intelligence’’ . 7 James S. Major Intelligence Essentials for Everyone, Prologue, Part 1, Part 2 . 21 Lisa Krizan On Becoming an Intelligence Analyst . 39 Ronald D. Garst and Max L. Gross Getting Intelligence Right: The Power of Logical Procedure (excerpt) . 47 William S. Brei Opening Windows of Opportunity: The Need for Opportunities-Based Warning. 77 Stewart C. Eales Teaching Vision. 87 Mark G. Marshall Spy Fiction, Spy Reality . 111 Jon A. Wiant Evidence Marshaling and Argument Construction (excerpt) . 125 Frank J. Hughes Failures of Imagination: Thoughts on the 9/11 Commission Report . 131 Thomas Dowling Homeland Security and Intelligence: Can Oil Mix with Water in an Open Society?. 139 William C. Spracher iii 56166_p.fm Page iv Tuesday, July 19, 2005 9:16 AM The History of Intelligence The San Cristobal Trapezoid. 165 A. Denis Clift and John T. Hughes Israel’s Quest for Satellite Intelligence. 185 Eugene L. Zorn Experiences to Go: Teaching with Intelligence Case Studies (excerpt). 195 Thomas W. Shreeve The Creation of the National Imagery and Mapping Agency: Congress’s Role as Overseer . 217 Anne Daugherty Miles The Applications of Intelligence Health and National Security . 247 George C. Fidas Intelligence Support to Refugee Operations: Who’s the Expert? . 253 James D. Edwards Religion and War in the 21st Century. 273 Pauletta Otis Intelligence Support to the Life Science Community: Mitigating Threats from Bioterrorism . 285 James B. Petro ‘SALSA for Cyber Sonics’: Education and Research at the Joint Military Intelligence College . 301 A. Denis Clift Knowledge-based Tools: A Solution for Optimizing Collection Requirements Management (excerpt) . 307 Mark Jensen Narco-Mercantilism and the War on Drugs: Is Victory an Option? . 319 William Drohan iv 56166_p.fm Page v Tuesday, July 19, 2005 9:16 AM LEARNING WITH PROFESSIONALS Selected Works from the Joint Military Intelligence College INTRODUCTION The University of Maryland’s July 2005 conference on "Teaching Intelligence in America’s Universities" marks the turning of a significant page in the history of American academia. The history, the role, and the contributions of intelligence are now recognized in growing numbers of institutions of higher learning across the land as important fields of academic study and research. If intelligence was first formally declared an instrument of U.S. national security in the National Security Act of 1947, it did not enter the mainstream of American thinking and discourse until the terrorist attacks of 2001 and their aftermath. Now, with the benefit of commission studies and recommendations and executive and legislative actions culminat- ing in the passage of the Intelligence Reform and Terrorism Prevention Act of 2004, good, timely, relevant intelligence is recognized as "the air the nation breathes." Soccer moms discuss intelligence. College students’ interest in intelligence extends beyond the work of the classroom to the prospect of intelligence as a career. The Joint Military Intelligence College has the privilege and the trust of serving as the Federal Government’s center of excellence for intelligence education and research. With teaching and research at both the classified and unclassified levels, the College awards the Master of Science of Strategic Intelligence degree and the Bachelor of Science in Intelli- gence degree. The College’s degrees are authorized by the Congress. The College is accredited by the Middle States Commission on Higher Education and is a member of the Consortium of Universities of the Washington Metropolitan Area. The research and publications of the College’s students, faculty, and research fellows are contributing to the work of intelligence and the security of the nation. They are creat- ing the literature of intelligence. This book of readings taken from such research and writ- ings offers a window on the incredible history and evolving work of intelligence and the contributions it is making in the early 21st century. The different chapters underscore the importance of the emergence of intelligence as a sought-after academic discipline. A. Denis Clift President, Joint Military Intelligence College v 56166_p.fm Page vi Tuesday, July 19, 2005 9:16 AM 56166.fm7 Page -1 Tuesday, July 19, 2005 9:14 AM THE WORK OF INTELLIGENCE 56166.fm7 Page 0 Tuesday, July 19, 2005 9:14 AM 56166.fm7 Page 1 Tuesday, July 19, 2005 9:14 AM MEETING THE COMMUNITY’S CONTINUING NEED FOR AN INTELLIGENCE LITERATURE Russell G. Swenson (Originally Published in the Defense Intelligence Journal; 11-2 (2002), 87-98.) Intelligence today is not merely a profession, but like most professions it has taken on the aspects of a discipline: it has developed a recognized methodol- ogy; it has developed a vocabulary; it has developed a body of theory and doctrine; it has elaborate and refined techniques. It now has a large profes- sional following. What it lacks is a literature.1 Sherman Kent’s argument, published in 1955, bears re-examination. On the same page with the passage above, he noted that “The sort of literature I am talking about is of the nature of house organ literature, but much more. You might call it the institutional mind and memory of our discipline.” Over the years, the journal Studies in Intelligence, published by the Center for the Study of Intelligence, has brought to light the insights of government intelligence practitioners. Featured articles, for example, have addressed Kent’s concern that the professional literature address questions of mission and method. His other concerns, that the literature promote a shared definition of terms, and that it elevate the level of debate of all these issues, have certainly been accomplished in the training and especially the education classrooms of the Intelligence Community.2 How- ever, active debate over the principles and practices of intelligence remains confined largely to those classrooms. How can a more mature literature be drawn from these obscure debates, so as to expose arguments to the sometimes humbling yet clarifying light that comes with their publication as a permanent record? How can those of us who feel responsible for capturing institutional knowledge accommodate ourselves to the maxim that, as earlier generations might have put it: Litera scripta manet — [It is] the written word [that] remains — and that provides a literature on which an applied (field- tested) academic discipline may develop. As Kent acknowledges, this literature must at times bear a classification to protect sen- sitive information. However, he also suggests that a surprising share of the literature can be produced without controls that shield it from “outsiders.” Academically oriented publi- cation of Intelligence Community literature on collection, analysis and presentation meth- ods, and published explorations of such topics as the intelligence-policy relationship and international intelligence sharing, if presented on a Community website, could broadcast 1 Sherman Kent, “The Need for an Intelligence Literature,” Studies in Intelligence 1, no.
Recommended publications
  • Killing Hope U.S
    Killing Hope U.S. Military and CIA Interventions Since World War II – Part I William Blum Zed Books London Killing Hope was first published outside of North America by Zed Books Ltd, 7 Cynthia Street, London NI 9JF, UK in 2003. Second impression, 2004 Printed by Gopsons Papers Limited, Noida, India w w w.zedbooks .demon .co .uk Published in South Africa by Spearhead, a division of New Africa Books, PO Box 23408, Claremont 7735 This is a wholly revised, extended and updated edition of a book originally published under the title The CIA: A Forgotten History (Zed Books, 1986) Copyright © William Blum 2003 The right of William Blum to be identified as the author of this work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. Cover design by Andrew Corbett ISBN 1 84277 368 2 hb ISBN 1 84277 369 0 pb Spearhead ISBN 0 86486 560 0 pb 2 Contents PART I Introduction 6 1. China 1945 to 1960s: Was Mao Tse-tung just paranoid? 20 2. Italy 1947-1948: Free elections, Hollywood style 27 3. Greece 1947 to early 1950s: From cradle of democracy to client state 33 4. The Philippines 1940s and 1950s: America's oldest colony 38 5. Korea 1945-1953: Was it all that it appeared to be? 44 6. Albania 1949-1953: The proper English spy 54 7. Eastern Europe 1948-1956: Operation Splinter Factor 56 8. Germany 1950s: Everything from juvenile delinquency to terrorism 60 9. Iran 1953: Making it safe for the King of Kings 63 10.
    [Show full text]
  • Cyber, Intelligence, and Security
    Cyber, Intelligence, and Security Volume 3 | No. 1 | May 2019 European Countries Facing the Challenge of Foreign Influence on Democracy—Comparative Research David Siman-Tov and Mor Buskila The Threat of Foreign Interference in the 2019 Elections in Israel and Ways of Handling it Pnina Shuker and Gabi Siboni The INF Treaty and New START: Escalation Control, Strategic Fatalism, and the Role of Cyber Stephen J. Cimbala Iranian Cyber Capabilities: Assessing the Threat to Israeli Financial and Security Interests Sam Cohen Outsourcing in Intelligence and Defense Agencies: A Risk of an Increase in the Proliferation of Cyber Weapons? Omree Wechsler The Academization of Intelligence: A Comparative Overview of Intelligence Studies in the West Kobi Michael and Aaron Kornbluth Forty-Five Years Since the Yom Kippur War: Intelligence and Risk Management in the Thirty Hours Preceding the War Shmuel Even National Cyber Security in Israel Yigal Unna Cyber, Intelligence, and Security Volume 3 | No. 1 | May 2019 Contents European Countries Facing the Challenge of Foreign Influence on Democracy—Comparative Research | 3 David Siman-Tov and Mor Buskila The Threat of Foreign Interference in the 2019 Elections in Israel and Ways of Handling it | 27 Pnina Shuker and Gabi Siboni The INF Treaty and New START: Escalation Control, Strategic Fatalism, and the Role of Cyber | 41 Stephen J. Cimbala Iranian Cyber Capabilities: Assessing the Threat to Israeli Financial and Security Interests | 71 Sam Cohen Outsourcing in Intelligence and Defense Agencies: A Risk of an Increase in the Proliferation of Cyber Weapons? | 95 Omree Wechsler The Academization of Intelligence: A Comparative Overview of Intelligence Studies in the West | 117 Kobi Michael and Aaron Kornbluth Forty-Five Years Since the Yom Kippur War: Intelligence and Risk Management in the Thirty Hours Preceding the War | 141 Shmuel Even National Cyber Security in Israel | 167 Yigal Unna The purpose of Cyber, Intelligence, and Security is to stimulate Cyber, and enrich the public debate on related issues.
    [Show full text]
  • Democratization of Intelligence
    Does “national character” correlate with the nature of national, strategic intelligence across a major region of the world? This question remains open and important, given that the intelligence services of any country by DEMOCRATIZATION defi nition ideally provide an institutional guarantee of national survival. In the end, public consciousness of the intelligence function can contribute OF INTELLIGENCE directly to the positive evolution of intelligence as one of the oldest of political institutions, in such a way that we can begin to identify a MELDING STRATEGIC INTELLIGENCE phenomenon of “democratization” of national intelligence. AND NATIONAL DISCOURSE Russell G. Swenson and Susana C. Lemozy Editors As may be inferred from most of the essays in this book, the emphasis on state security and control of violent criminal activity is a strong, distinctive feature of the intelligence services across the region. One possibility is to extend the research carried out for this book to a systematic comparison of the institutional framework and operational emphases in other regions where, as we know through an emerging body of comparative research, there is an impetus to institutionalize democratic reform and improve the integration of law enforcement and strategic intelligence. Intelligence studies are on the brink of making the leap to a level where they will have practical relevance. This book edited by Russell Swenson and Susana Lemozy holds importance for its presentation of usefully detailed essays and for the impetus it gives for theoretically oriented comparative studies. The book should be required reading for scholars interested in the combination of intelligence, strategic culture, security and democracy.
    [Show full text]
  • Information Sources on the Web – Intelligence Bibliographies, Newsletters, Blogs, and Webliographies
    Staying Informed: Information Sources on the Web – Intelligence Bibliographies, Newsletters, Blogs, and Webliographies Peter C. Oleson For those educators and interested parties who try to keep up with the world of intelligence the flood of information can be daunting. Newspaper articles, new books, scholarly journals, and web blogs that address intelligence are numerous. Many are politically motivated; none is comprehensive. Unclassified sources lack much of the primary material. Classified sources, unless leaked, are not available. Nevertheless, the following are useful resources, presented in alphabetical order. AFCEA International (Armed Forces Communications and Electronics Association) publishes Signal magazine monthly, which contains numerous intelligence-related articles and news. AFCEA also publishes via its website webinars and white papers related to intelligence. www.afcea.org. AFCEA also has a monthly intelligence- related blog, the MAZZINT Blog. Air University has an excellent compilation of intelligence-related materials with many links to articles and relevant websites at its “Gateway to Intelligence.” http://www.au.af.mil/au/awc/awcgate/awc-ntel.htm. The American Enterprise Institute’s Critical Threats project tracks and provides analysis of key and emerging threats to national security. http://www.aei.org/feature/critical-threats-project/. The Association of Former Intelligence Officers (AFIO) is an education-oriented national association and has two major recurring publications. The Weekly Intelligence Notes (WIN), available to paid members, provides synopses and links to major intelligence-related news stories. The WINs also have a comprehensive calendar of intelligence-related events, including for the International Spy Museum in Washington, D.C. AFIO’s journal, Intelligencer, carries articles, opinion pieces, book reviews, and association news.
    [Show full text]
  • Periscope Newsletter of Afio
    NEWSLETTER OF AFIO NATIONAL AND CHAPTER PERISCOPE EVENTS, PLANS & NEWS Association of Former Intelligence Offi cers Volume XXV, Numbers 1 and 2, 2002 Gates rose through the ranks to the top job; but, incredibly, he didn’t C O N T E N T S bunki “get it”! Or perhaps he just forgot the e ng fundamental difference between a Debunking the CIA Case Offi cer D CIA “case offi cer” and an indigenous Myth by Fred Rustmann, Jr. .............. 1 “agent.” President’s Message and SpyCruise by Gene Poteat.................................. 2 More recent criticism has been What’s New in AFIO directed at the Agency by a few former by Roy Jonkers................................... 4 disgruntled junior case offi cers (who AFIO Board Actions on Bylaws ............ 6 also don’t get it, or don’t want to get it). Ballot for Election of New Board They claim that the Agency’s Members for 2003............................. 7 effectiveness, particularly regarding AFIO’s Strategic Plan Update .............. 8 Middle Eastern terrorist targets, is Honors Lists for 2001 - Donors, New hamstrung by the lack of case offi cers Member-Getters, Corporate Partners, with the requisite foreign language fl u- Volunteers .........................................10 the CIA Case Officer Myth ency, cultural knowledge and physical Welcome to the Board ........................13 characteristics to blend into a foreign Chapter Reports ...................................14 operational environment with the ease In Memorium .......................................15 Frederick W. Rustmann Jr. of a native of that country. They call Researchers Needing Assistance ..........16 July 23, 2002 for a recruitment drive to attract such Forthcoming Events/ souls, and that call has been fueled by Conferences ......................................17 Several years ago I was among a the press and others ever since.
    [Show full text]
  • Intelligence Analysis Mark M
    INCIDENTAL PAPER Seminar on Intelligence, Command, and Control Intelligence Analysis Mark M. Lowenthal Guest Presentations, Spring 2004 Carol A. Haave, Mark M. Lowenthal, Robert B. Murrett, John C. Gannon, Joan A. Dempsey, Gregory J. Rattray, Robert Liscouski, Arthur K. Cebrowski, Aris Pappas May 2004 Program on Information Resources Policy Center for Information Policy Research Harvard University The Program on Information Resources Policy is jointly sponsored by Harvard University and the Center for Information Policy Research. Chairman Managing Director Anthony G. Oettinger John C. B. LeGates Copyright © 2004 by the President and Fellows of Harvard College. Not to be reproduced in any form without written consent from the Program on Information Resources Policy, Harvard University, Maxwell Dworkin 125, 33 Oxford Street, Cambridge MA 02138. (617) 495-4114 E-mail: [email protected] URL: http://www.pirp.harvard.edu ISBN I-879716-89-5 I-04-1 May 2004 PROGRAM ON INFORMATION RESOURCES POLICY Harvard University Center for Information Policy Research Affiliates AT&T Corp. PDS Consulting Australian Telecommunications Users Group PetaData Holdings, Ltd. BellSouth Corp. Samara Associates The Boeing Company Skadden, Arps, Slate, Meagher & Booz Allen Hamilton Flom LLP Center for Excellence in Education Strategy Assistance Services Commission of the European Communities TOR LLC Critical Path TransMedia Exchange CyraCom International United States Government: Ellacoya Networks, Inc. Department of Commerce Hanaro Telecom Corp. (Korea) National Telecommunications and Hearst Newspapers Information Administration Hitachi Research Institute (Japan) Department of Defense IBM Corp. National Defense University Korea Telecom Department of Health and Human Lee Enterprises, Inc. Services Lexis–Nexis National Library of Medicine John and Mary R.
    [Show full text]
  • America's Alleged Intelligence Failure in The
    University of Calgary PRISM: University of Calgary's Digital Repository Graduate Studies The Vault: Electronic Theses and Dissertations 2017 America’s Alleged Intelligence Failure in the Prelude to Operation Iraqi Freedom: A Study of Analytic Factors Cake, Timothy Cake, T. (2017). America’s Alleged Intelligence Failure in the Prelude to Operation Iraqi Freedom: A Study of Analytic Factors (Unpublished doctoral thesis). University of Calgary, Calgary, AB. doi:10.11575/PRISM/24784 http://hdl.handle.net/11023/3688 doctoral thesis University of Calgary graduate students retain copyright ownership and moral rights for their thesis. You may use this material in any way that is permitted by the Copyright Act or through licensing that has been assigned to the document. For uses that are not allowable under copyright legislation or licensing, you are required to seek permission. Downloaded from PRISM: https://prism.ucalgary.ca UNIVERSITY OF CALGARY America’s Alleged Intelligence Failure in the Prelude to Operation Iraqi Freedom: A Study of Analytic Factors by Timothy Cake A DISSERTATION SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY GRADUATE PROGRAM IN MILITARY, SECURITY, AND STRATEGIC STUDIES CALGARY, ALBERTA APRIL, 2017 © Timothy Cake 2017 ABSTRACT In the prelude to Operation Iraqi Freedom (OIF), notables in the G. W. Bush administration declared Iraq to be an existential threat as it had weapons of mass destruction (WMD) and connections to transnational terrorist groups. After the 2003 invasion of that state, coalition forces engaged in a search effort that found no significant evidence of WMD.
    [Show full text]
  • Assessing the Tradecraft of Intelligence Analysis
    THE ARTS This PDF document was made available from www.rand.org as a public CHILD POLICY service of the RAND Corporation. CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY The RAND Corporation is a nonprofit research POPULATION AND AGING organization providing objective analysis and effective PUBLIC SAFETY solutions that address the challenges facing the public SCIENCE AND TECHNOLOGY and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE Support RAND Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Security Research Division View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation technical report series. Reports may include research findings on a specific topic that is limited in scope; present discus- sions of the methodology employed in research; provide literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research profes- sionals, and supporting documentation; or deliver preliminary findings.
    [Show full text]
  • Who Are the Customers for Intelligence?
    Association of Former Intelligence Officers From AFIO's The Intelligencer 7700 Leesburg Pike, Suite 324 Journal of U.S. Intelligence Studies Falls Church, Virginia 22043 Web: www.afio.com, E-mail: [email protected] Volume 23 • Number 2 • $15 single copy price Fall 2017 ©2017, AFIO Intelligence Communities — Plural There are four communities that use intelligence: the national security community, the homeland secu- rity community, the law enforcement community, and GUIDE TO THE STUDY OF INTELLIGENCE the private sector. When thinking about intelligence, often the first thought one has is of the national intelligence commu- nity. This is the grouping of 16 agencies (not including the Office of the Director of National Intelligence and Who Are the Customers its several centers) that are involved in intelligence sup- for Intelligence? port to national security, foreign and defense policy, military support, and counterespionage.3 The clients and customers of national security by Peter C. Oleson intelligence include the President and his national security team. While the President and members of ho uses intelligence and why? The short the National Security Council represent the apex of answer is almost everyone and to gain an this team, the national security team extends across advantage. While nation-states are most many departments and agencies of the federal gov- W ernment and geographically to the commanders of closely identified with intelligence, private corpora- 4 tions and criminal entities also invest in gathering the combatant commands and their subordinates. and analyzing information to advance their goals. Since the attacks of 9/11, other intelligence Thus the intelligence process is a service function, communities have evolved in the US senior officials or as Australian intelligence expert Don McDowell of the Department of Homeland Security (DHS) refer describes it, to “homeland security intelligence” (HIS) and the “homeland security intelligence community” as some- Information is essential to the intelligence process.
    [Show full text]
  • Pay for Performance at the CIA: Restoring Equity, Transparency and Accountability
    Pay for Performance at the CIA: Restoring Equity, Transparency and Accountability The Assessment of the Independent Panel on the Central Intelligence Agency’s Compensation Reform Proposals January 2004 Business Executives for National Security − January 2004 The Assessment of the Independent Panel on the CIA’s Compensation Reform Proposals TABLE OF CONTENTS Preface .............................................................................................................................................. iii 1. Executive Summary ...................................................................................................................... 1 2. The BENS Independent Panel ....................................................................................................... 5 3. Overview of Federal Civil Service Reform .................................................................................... 7 4. The Central Intelligence Agency’s Case for Compensation Reform ............................................. 11 5. The Central Intelligence Agency’s Compensation Reform Proposals........................................... 13 6. Observations of the BENS Independent Panel ............................................................................ 15 7. Comparison with Private Sector Best Practices ........................................................................... 21 8. Findings and Recommendations ............................................................................................... 25 Appendices A — Terms of
    [Show full text]
  • FOIA CASE LOGS for the Central Intelligence Agency (CIA)
    Description of document: FOIA CASE LOGS for: The Central Intelligence Agency (CIA) for FY 2005 – FY 2007 Requested date: 21-October-2007 Released date: 19-February-2008 Posted date: 29-April-2008 Title of Document FY 2005, FY 2006, FY 2007 Case Log Date/date range of document: 01-October-2004 – 21-November-2007 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: (703) 613-3007 The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file Central Intelligence Agency Washington, o.c. 20505 • FEB 19 lOW Reference: F-2008-00211 This is a final response to your 21 October 2007 Freedom ofInformation Act (FOIA) request for "FOIA Case Logs for CIA for the time period FY2005 and FY2006 and FY2007-to-date." We processed your request in accordance with the FOIA, 5 U.S.C. § 552, as amended, and the CIA Information Act, 50 U.S.c. § 431, as amended.
    [Show full text]
  • Central Intelligence Agency (CIA) and Made It an Independent Agency Within the Executive Branch of the President
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Central Intelligence Agency Washington, D.C. 20505 MAY 0 9 2018 Mr. John Greenewald, Jr. 27305 W. Live Oak Road Suite #1203 Castaic, CA 91384 Reference: F-2016-01968 Dear Mr. Greenewald: On 4 May 2018, the office of the Information and Privacy Coordinator received your 4 May 2018 letter and phone call asking for clarification regarding our response to your 8 October 2014 Freedom of Information Act request for the Intellipedia entries for the Central Intelligence Agency. Enclosed is another copy of our 19 March 2018 response to your request. Sincerely, Allison Fong Information and Privacy Coordinator Enclosures Central Intelligence Agency Washington, D.C. 20505 19 March 2018 Mr. John Greenewald, Jr. 27305 W. Live Oak Road Suite #1203 Castaic, CA 91384 Reference: F-2016-01968 Dear Mr. Greenewald: In the course of processing your 8 October 2014 Freedom of Information Act (FOIA) request for information on the Intellipedia entries for the Central Intelligence Agency, the National Security Agency (NSA) located CIA material and referred it to us on 6 June 2016 for review and direct response to you. We have determined that three documents can be released in segregable form with deletions made on the basis of FOIA exemption (b )(3).
    [Show full text]