Careers in United States Intelligence
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
National Insider Threat Task Force Mission Fact Sheet
NATIONAL INSIDER THREAT TASK FORCE MISSION FACT SHEET _________________________________ Why was the NITTF established? The National Insider Threat Task Force (NITTF) was established after the WikiLeaks release of thousands of classified documents through the global media and internet. Its mission is to deter, detect, and mitigate actions by employees who may represent a threat to national security by developing a national insider threat program with supporting policy, standards, guidance, and training. Who runs the task force, and which agencies are involved? Under Executive Order (E.O.) 13587, the NITTF is co-chaired by the U.S. Attorney General and the Director of National Intelligence. They, in turn, designated the Federal Bureau of Investigation (FBI) and the National Counterintelligence Executive to co-direct the daily activities of the NITTF. The NITTF comprises employees and contractors from a variety of federal departments and agencies (D/A), and its work impacts more than 99 federal D/As that handle classified material. Currently, the following D/As have representatives on the NITTF: FBI, National Counterintelligence and Security Center (NCSC), Defense Intelligence Agency (DIA), Central Intelligence Agency (CIA), and Transportation Security Administration. The NITTF responds directly to the Senior Information Sharing and Safeguarding Steering Committee, which was also established under E.O. 13587. The steering committee comprises representatives from largely Intelligence Community agencies with extensive access to classified networks and materials, including the Departments of State, Energy, Justice, Defense, and Homeland Security, CIA, FBI, Office of the Director of National Intelligence, NCSC, National Security Agency, DIA, the Program Manager—Information Sharing Environment, Office of Management and Budget, the National Security Council Staff, and the Information Security Oversight Office. -
The Future of Weapons of Mass Destruction an Update
A NATIONAL INTELLIGENCE UNIVERSITY PRESIDENTIAL SCHOLAR’S PAPER THE FUTURE OF WEAPONS OF MASS DESTRUCTION AN UPDATE By John P. Caves, Jr. NIU Presidential Scholar November 2019 – November 2020 and W. Seth Carus THE FUTURE OF WEAPONS OF MASS DESTRUCTION AN UPDATE John P. Caves, Jr. and W. Seth Carus National Intelligence University National Intelligence Press Washington, DC February 2021 The views expressed in this paper are solely those of the authors and do not necessarily reflect those of the National Intelligence University, National Defense University, or any other part of the U.S. government. ACKNOWLEDGMENTS While the authors are solely responsible for the final content of this paper, they benefited greatly from the time, expertise and support freely availed to them by many knowledgeable individuals and organizations. They include Mr. Caves’ colleagues at National Intelligence University (NIU), where he worked on this paper while on a detail assignment from National Defense University (NDU). Mr. Caves expresses par- ticular gratitude to Dr. Brian Holmes, dean of the Anthony G. Oettinger School of Science and Technol- ogy Intelligence, for his leadership, knowledge, and support. Dr. Sharon Adams, Ms. Beverly Barnhart, Mr. George Clifford, Dr. LaMesha Craft, and Dr. R. Carter Morris offered helpful comments on the paper at various stages. They and Mr. Damarius Alston, LTC Jeffrey Bacon, Lt Col Frances Deutch, Ms. Thelma Flamer, Mr. Julian Meade, and Ms. Christina Sanders were among others at NIU whose assistance and support made Mr. Caves’ assignment at NIU enjoyable as well as productive. Both authors are deeply indebted to their colleagues at NDU’s Center for the Study of Weapons of Mass Destruction (CSWMD), especially Mr. -
Inside Russia's Intelligence Agencies
EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat. -
Wikileaks and the Institutional Framework for National Security Disclosures
THE YALE LAW JOURNAL PATRICIA L. BELLIA WikiLeaks and the Institutional Framework for National Security Disclosures ABSTRACT. WikiLeaks' successive disclosures of classified U.S. documents throughout 2010 and 2011 invite comparison to publishers' decisions forty years ago to release portions of the Pentagon Papers, the classified analytic history of U.S. policy in Vietnam. The analogy is a powerful weapon for WikiLeaks' defenders. The Supreme Court's decision in the Pentagon Papers case signaled that the task of weighing whether to publicly disclose leaked national security information would fall to publishers, not the executive or the courts, at least in the absence of an exceedingly grave threat of harm. The lessons of the PentagonPapers case for WikiLeaks, however, are more complicated than they may first appear. The Court's per curiam opinion masks areas of substantial disagreement as well as a number of shared assumptions among the Court's members. Specifically, the Pentagon Papers case reflects an institutional framework for downstream disclosure of leaked national security information, under which publishers within the reach of U.S. law would weigh the potential harms and benefits of disclosure against the backdrop of potential criminal penalties and recognized journalistic norms. The WikiLeaks disclosures show the instability of this framework by revealing new challenges for controlling the downstream disclosure of leaked information and the corresponding likelihood of "unintermediated" disclosure by an insider; the risks of non-media intermediaries attempting to curtail such disclosures, in response to government pressure or otherwise; and the pressing need to prevent and respond to leaks at the source. AUTHOR. -
ASD-Covert-Foreign-Money.Pdf
overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology �������������������������������������������������������������������������������������������������� -
Swire. “The Declining Half-Life of Secrets”
CYBERSECURITY INITIATIVE New America Cybersecurity Fellows Paper Series - Number 1 THE DECLINING HALF -LIFE OF SECRETS And the Future of Signals Intelligence By Peter Swire July 2015 © 2015 NEW AMERICA This report carries a Creative Commons license, which permits non-commercial re-use of New America content when proper attribution is provided. This means you are free to copy, display and distribute New America’s work, or in- clude our content in derivative works, under the following conditions: ATTRIBUTION. NONCOMMERCIAL. SHARE ALIKE. You must clearly attribute the work You may not use this work for If you alter, transform, or build to New America, and provide a link commercial purposes without upon this work, you may distribute back to www.newamerica.org. explicit prior permission from the resulting work only under a New America. license identical to this one. For the full legal code of this Creative Commons license, please visit creativecommons.org. If you have any questions about citing or reusing New America content, please contact us. ABOUT THE AUTHOR Peter Swire, Nancy J. and Lawrence P. Huang Professor of Law and Ethics, Scheller College of Business, Georgia Institute of Technology; Senior Counsel, Alston & Bird LLP; and New America Cybersecurity Fellow ABOUT THE CYBERSECURITY INITIATIVE ACKNOWLEDGEMENTS The Internet has connected us. Yet the policies and debates that sur- Many thanks to Ross Anderson, Ashkan round the security of our networks are too often disconnected, disjoint- Soltani and Lee Tien for assistance with ed, and stuck in an unsuccessful status quo. This is what New Ameri- this draft, and to the fellow members ca’s Cybersecurity Initiative is designed to address. -
Offensive Capabilities
GCHQ and UK Mass Surveillance Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and its allies, including the UK’s GCHQ.i The global surveillance infrastructure and hacking tools described in the previous chapters are not only used for obtaining information to be fed into intelligence reports and tracking terrorists. The agencies are also developing cyber-warfare capabilities, with the NSA taking the lead within the US armed forces. This militarisation of the internet saw U.S. intelligence services carried out 231 offensive cyber-operations in 2011ii. The UK's National Strategic Defence and Security Review from 2010 made hostile attacks upon UK cyberspace a major priorityiii. It is fair to assume that many countries are following suit and building cyber-warfare capabilities. Der Spiegel terms the development of these aggressive hacking tools as Digital Weapons. In their view D weapons which should join the ABC (Atomic, Biological and Chemical) weapons of the 20th century because of their indiscriminate nature. Here lies a fundamental problem. The modern world with connected global communications networks means that non-state actors such as civilians and businesses are now affected by the agencies’ activities much more frequently than before. The internet is used by everyone – cyberspace is mainly a civilian space – and the opportunity for collateral damage is huge. The papers leaked to Der Spiegel appear to show that signal agencies have little regard for the security and wellbeing of anyone who gets caught in the path of their operations. -
Typologies of the Use of Preventive Measures of Financial Institutions for Crime Detection and Risk Assessment
ЕВРАЗИЙСКАЯ ГРУППА по противодействию легализации преступных доходов и финансированию терроризма EURASIAN GROUP on combating money laundering and financing of terrorism EAG TYPOLOGY PROJECT TYPOLOGIES OF THE USE OF PREVENTIVE MEASURES OF FINANCIAL INSTITUTIONS FOR CRIME DETECTION AND RISK ASSESSMENT TYPOLOGICAL STUDY REPORT 2021 Contents General ....................................................................................................................... 3 Preventive Measures and Suspicious Transaction Reporting in the EAG members 3 Approaches Used by FIUs for Analyzing Incoming STRs and Service Denial Reports ....................................................................................................................... 9 Feedback on STRs ................................................................................................... 16 Trends and risks in the spread of COVID-19 .......................................................... 21 Impact of COVID-19 on AML/CFT supervisory activities and implementation of preventive measures ................................................................................................ 24 Summary of recommendations following the results of the study: ......................... 26 General Application by entities engaged in transactions with funds or other assets of preventive measures as well as identification of suspicious transactions and submission of suspicious transaction reports (STRs) to the financial investigation units (FIUs) is one of the most important measures aimed -
Unclassified Summary Special Study of NSA Controls to Comply With
NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE INSPECTOR GENERAL REPORT Unclassified Summary Special Study of NSA Controls to Comply with Signals Intelligence Retention Requirements 12 December 2019 OFFICE OF THE INSPECTOR GENERAL Pursuant to the Inspector General Act of 1978, as amended, and in accordance with NSA/CSS Policy 1-60, the NSA/CSS Office of the Inspector General (OIG) conducts independent oversight that promotes Agency respect for Constitutional rights, adherence to laws, rules, and regulations, and the wise use of public resources. Through investigations and reviews, we detect and deter waste, fraud, abuse, and misconduct and promote the economy, the efficiency, and the effectiveness of Agency operations. AUDIT The Audit Division comprises three sections: Cybersecurity and Technology, Financial Audits, and Mission and Mission Support. The Division’s audits and evaluations examine the economy, efficiency, and effectiveness of NSA programs and operations; assess Agency compliance with laws, policies, and regulations; review the operation of internal information technology and controls; and determine whether the Agency’s financial statements and other fiscal reporting are fairly and accurately presented. Audits are conducted in accordance with auditing standards established by the Comptroller General of the United States. INSPECTIONS The Inspections Division performs organizational inspections and functional evaluations to assess adherence to regulations and policies and to promote the effective, efficient, and economical management of an organization, site, or function. OIG inspection reports recommend improvements and identify best practices across a broad range of topics, to include mission operations, security, facilities, and information technology systems. The Inspections Division also partners with Inspectors General of the Service Cryptologic Elements and other Intelligence Community (IC) entities to jointly inspect consolidated cryptologic facilities. -
Intelligence Services Roles and Responsibilities in Good Security Sector Governance
SSR BACKGROUNDER Intelligence Services Roles and responsibilities in good security sector governance About this series The SSR Backgrounders provide concise introductions to topics and concepts in good security sector governance (SSG) and security sector reform (SSR). The series summarizes current debates, explains key terms and exposes central tensions based on a broad range of international experiences. The SSR Backgrounders do not promote specific models, policies or proposals for good governance or reform but do provide further resources that will allow readers to extend their knowledge on each topic. The SSR Backgrounders are a resource for security governance and reform stakeholders seeking to understand but also to critically assess current approaches to good SSG and SSR. About this SSR Backgrounder This SSR Backgrounder explains the roles and responsibilities of intelligence services in good security sector governance (SSG). Intelligence services perform an essential security function by providing governments with timely and relevant information necessary to protect the security of states and their societies. Applying the principles of good SSG to intelligence services makes them both effective and accountable within a framework of democratic governance, the rule of law and respect for human rights. This SSR Backgrounder answers the following questions: What are intelligence services? Page 2 What do intelligence services do? Page 2 How is intelligence produced? Page 4 What intrusive legal powers do intelligence services hold? -
Policy Directive 28: Signals Intelligence Activities
PRIVACY & CIVIL LIBERTIES OVERSIGHT BOARD (U) Report to the President on the Implementation of Presidential Policy Directive 28: Signals Intelligence Activities TABLE OF CONTENTS (U) Part I Introduction .............................................................. .............................................. 1 (U) Part II Significant Changes in Practice due to the Issuance of PPD-28 .......................... 5 (U) Part III Analysis and Recommendations ........................................................................... 12 (U) Part IV Conclusion .. ... ... ............. ......................................................................................... 18 (U) Annexes: (U) A. Separate Statement by Board Members Rachel Brand and Elise beth Collins ............ 20 (U) B. Separate Statement by Board Members James Dempsey and Patricia Wald .. ........... 23 I. (U) Introduction (U) On January 17, 2014, President Obama signed Presidential Policy Directive- 28, Signals Intelligence Activities ("PPD-28"), which provides principles to guide "why, whether, when, and how the United States conducts signals intelligence activities[.]"l The directive recognizes both that "[t]he collection of signals intelligence is necessary for the United States to advance its national security and foreign policy interests and to protect its citizens (U) See Presidential Policy Directive - 28, Signals Intelligence Activities (January 17, 2014) (h ereinafter "PPD-28"), available at https:/ j www.whitehouse.gov / the-press- office / 2014/ 01/ 17j presidential-policy-directive-signals-intelligence-activities. -
DETAILED ASSESSMENT REPORT on ISRAEL ANTI-MONEY
Strasbourg, 22 August 2008 MONEYVAL (2008) 01 EUROPEAN COMMITTEE ON CRIME PROBLEMS (CDPC) COMMITTEE OF EXPERTS ON THE EVALUATION OF ANTI-MONEY LAUNDERING MEASURES AND THE FINANCING OF TERRORISM (MONEYVAL) DETAILED ASSESSMENT REPORT on ISRAEL 1 ANTI-MONEY LAUNDERING AND COMBATING THE FINANCING OF TERRORISM Memorandum prepared by the Secretariat Directorate General of Human Rights and Legal Affairs (DG-HL) 1 Adopted by the MONEYVAL Committee at its 27 th Plenary Session (Strasbourg, 7-11 July 2008). All rights reserved. Reproduction is authorised, provided the source is acknowledged, save where otherwise stated. For any use for commercial purposes, no part of this publication may be translated, reproduced or transmitted, in any form or by any means, electronic (CD-Rom, Internet, etc) or mechanical, including photocopying, recording or any information storage or retrieval system without prior permission in writing from the MONEYVAL Secretariat, Directorate General of Human Rights and Legal Affairs, Council of Europe (F-67075 Strasbourg or [email protected]). 2 TABLE OF CONTENTS I. PREFACE.................................................................................................................................................... 7 II. EXECUTIVE SUMMARY........................................................................................................................ 8 III. MUTUAL EVALUATION REPORT .................................................................................................... 15 1. GENERAL ...................................................................................................................................