Who Are the Customers for Intelligence?

Total Page:16

File Type:pdf, Size:1020Kb

Who Are the Customers for Intelligence? Association of Former Intelligence Officers From AFIO's The Intelligencer 7700 Leesburg Pike, Suite 324 Journal of U.S. Intelligence Studies Falls Church, Virginia 22043 Web: www.afio.com, E-mail: [email protected] Volume 23 • Number 2 • $15 single copy price Fall 2017 ©2017, AFIO Intelligence Communities — Plural There are four communities that use intelligence: the national security community, the homeland secu- rity community, the law enforcement community, and GUIDE TO THE STUDY OF INTELLIGENCE the private sector. When thinking about intelligence, often the first thought one has is of the national intelligence commu- nity. This is the grouping of 16 agencies (not including the Office of the Director of National Intelligence and Who Are the Customers its several centers) that are involved in intelligence sup- for Intelligence? port to national security, foreign and defense policy, military support, and counterespionage.3 The clients and customers of national security by Peter C. Oleson intelligence include the President and his national security team. While the President and members of ho uses intelligence and why? The short the National Security Council represent the apex of answer is almost everyone and to gain an this team, the national security team extends across advantage. While nation-states are most many departments and agencies of the federal gov- W ernment and geographically to the commanders of closely identified with intelligence, private corpora- 4 tions and criminal entities also invest in gathering the combatant commands and their subordinates. and analyzing information to advance their goals. Since the attacks of 9/11, other intelligence Thus the intelligence process is a service function, communities have evolved in the US senior officials or as Australian intelligence expert Don McDowell of the Department of Homeland Security (DHS) refer describes it, to “homeland security intelligence” (HIS) and the “homeland security intelligence community” as some- Information is essential to the intelligence process. thing distinct from the national intelligence commu- Intelligence… is not simply an amalgam of collected nity.5 This homeland security intelligence community information. It is instead the result of taking infor- mation relevant to a specific issue and subjecting it includes governmental elements not included in to a process of integration, evaluation, and analysis the national intelligence community, including the with the specific purpose of projecting future events intelligence entities within the DHS Immigration and actions, and estimating and predicting outcomes.1 and Customs Enforcement Bureau, the Customs and Border Protection Bureau, the Transportation Secu- It is important to note that intelligence is pro- rity Administration, the US Secret Service, and state spective, or future oriented (in contrast to investiga- and regional intelligence fusion centers throughout tions that focus on events that have already occurred). the US. There is some overlap between the national As intelligence is a service, it follows that it has intelligence community and the homeland security customers for its products. McDowell differentiates intelligence community, as the Department of Home- between “clients” and “customers” for intelligence. land Security Office of Intelligence and Analysis and The former are those who commission an intelligence the US Coast Guard are members of both communi- effort and are the principal recipients of the resulting ties.6 According to a former head of DHS intelligence, intelligence product. The latter are those who have an homeland security intelligence interest in the intelligence product and could use it for their own purposes.2 Most scholars of intelligence do not make this distinction. However, it can be an 3. See http://www.odni.gov for the listing of the organizations of the important one as there is an implied priority associ- national intelligence community. ated with a client over a customer. 4. See the chart “Who Are the US Customers for Intelligence?” on pp. 57-58. 5. Remarks of Charlie Allen, former DHS undersecretary for intel- ligence to the International Association for Intelligence Education, Washington Chapter, September 14, 2010, from the notes of the author. 1. Don McDowell. Strategic Intelligence: A Handbook for Practitioners, 6. For a detailed overview of the HSI enterprise, see Mark A. Randol Managers, and Users, Rev. Ed., (Lanham, Maryland: The Scarecrow 2009, The Department of Homeland Security Intelligence Enterprise: Op- Press, Inc., 2009), 53. erational Overview and Oversight Challenges for Congress, Congressional 2. McDowell, 85. Research Service 7-5700, (2009) http://www.crs.gov, R40602. Fall 2017 Intelligencer: Journal of U.S. Intelligence Studies Page 55 “…needs to be more than just counterterrorism. Instead of the other members of this intelligence community. HSI needs to be a strategic effort based on creating a new Elements of the law enforcement intelligence commu- tradecraft rather than focusing on traditional formulas nity include the Drug Enforcement Administration 7 in terms of intelligence collection.” (DEA); the Bureau of Alcohol, Tobacco, Firearms, and Customers for homeland security intelligence Explosives; the US Marshals Service; the Bureau of include some of the same as above. The President, Prisons; and state, local, and tribal law enforcement the secretary of homeland security, and the attorney agencies. Both the Los Angeles Sheriff’s Department general are all principal customers for such intelli- and the New York Police Department maintain sizable gence. But so are governors and other officials at the intelligence elements. As with the homeland security state, local, and tribal levels of government. Under intelligence community, there is overlap. For example, the US political system, if an incident occurs in a the FBI is a member of all three intelligence commu- state, the governor of that state is the principal in nities, and DEA is a member of the national and law charge of responding. The federal government plays enforcement intelligence communities. a supporting role. The establishment of intelligence Law enforcement intelligence has many of the fusion centers8 in many states represents a significant same customers that homeland security intelligence customer base for homeland security intelligence. does. At the federal level, principal customers would be These fusion centers are managed by state officials or the attorney general and the secretaries of the Treasury a consortium of regional and local law enforcement and homeland security, and the enforcement arms of officials. One example is the regional fusion center in their departments. Principal customers at the state the Cleveland, Ohio area, which is manned by state level include the state police organization and local and local police agencies and DHS assignees. Other jurisdictions, including tribal police. Many of the state fusion centers serve an entire state.9 intelligence fusion centers are “all threat” centers. While there is a strategic aspect to HSI, the great This term means that they focus on criminal activity emphasis is on operational and tactical intelligence other than terrorist activity, such as drug production that will allow prevention of a terrorist incident. and smuggling and gang activity. Principal customers for this level of homeland secu- Intelligence is no longer the exclusive purview of rity intelligence include the enforcement arms of the the government. Intelligence techniques have been DHS, the Department of Justice, state and local police adopted by private businesses seeking to be com- departments, and other first responders.10 Special petitive in an increasingly global marketplace. Many mechanisms have been created to allow the sharing major corporations now employ analysts that utilize of classified national intelligence with often uncleared the intelligence skills and techniques traditionally state, local, and tribal police.11 identified with the national intelligence community. Similarly, with the adoption of the “intelli- These include market analysis for business planning gence-led policing” concept since 2000, there has been and investment, the protection of critical infrastruc- a growing law enforcement intelligence community. tures against criminals and others who would exploit The FBI uses intelligence for more than counterterror- them, and identification and pursuit of counterfeiters ism and counterespionage investigations, as do many of a company’s goods. 7. INSA Insider, November 23, 2010. This is an e-mail sent periodically Uses of Intelligence to Intelligence and National Security Alliance association members. 8. “State and major urban area fusion centers serve as focal points Intelligence has no intrinsic value. Intelligence within the state and local environment for the receipt, analysis, gath- collected, analyzed, and put on the shelf is worthless. ering, and sharing of threat-related information between the Federal Government and state, local, tribal, territorial, and private sector It is wasteful of expensive and often dangerous efforts. partners.” US National Intelligence: An Overview 2013, at http://www. Intelligence is a service, and should be evaluated as ODNI.gov. 9. Briefing by the Cleveland fusion center to the annual AFIO confer- such. Its raison d’être is to assist others in the accom- ence in 2011. plishment of their goals. This could be a national 10. See Chapter 2 of Carter, D. L. (2009). Law Enforcement Intelligence:
Recommended publications
  • Killing Hope U.S
    Killing Hope U.S. Military and CIA Interventions Since World War II – Part I William Blum Zed Books London Killing Hope was first published outside of North America by Zed Books Ltd, 7 Cynthia Street, London NI 9JF, UK in 2003. Second impression, 2004 Printed by Gopsons Papers Limited, Noida, India w w w.zedbooks .demon .co .uk Published in South Africa by Spearhead, a division of New Africa Books, PO Box 23408, Claremont 7735 This is a wholly revised, extended and updated edition of a book originally published under the title The CIA: A Forgotten History (Zed Books, 1986) Copyright © William Blum 2003 The right of William Blum to be identified as the author of this work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. Cover design by Andrew Corbett ISBN 1 84277 368 2 hb ISBN 1 84277 369 0 pb Spearhead ISBN 0 86486 560 0 pb 2 Contents PART I Introduction 6 1. China 1945 to 1960s: Was Mao Tse-tung just paranoid? 20 2. Italy 1947-1948: Free elections, Hollywood style 27 3. Greece 1947 to early 1950s: From cradle of democracy to client state 33 4. The Philippines 1940s and 1950s: America's oldest colony 38 5. Korea 1945-1953: Was it all that it appeared to be? 44 6. Albania 1949-1953: The proper English spy 54 7. Eastern Europe 1948-1956: Operation Splinter Factor 56 8. Germany 1950s: Everything from juvenile delinquency to terrorism 60 9. Iran 1953: Making it safe for the King of Kings 63 10.
    [Show full text]
  • Cyber, Intelligence, and Security
    Cyber, Intelligence, and Security Volume 3 | No. 1 | May 2019 European Countries Facing the Challenge of Foreign Influence on Democracy—Comparative Research David Siman-Tov and Mor Buskila The Threat of Foreign Interference in the 2019 Elections in Israel and Ways of Handling it Pnina Shuker and Gabi Siboni The INF Treaty and New START: Escalation Control, Strategic Fatalism, and the Role of Cyber Stephen J. Cimbala Iranian Cyber Capabilities: Assessing the Threat to Israeli Financial and Security Interests Sam Cohen Outsourcing in Intelligence and Defense Agencies: A Risk of an Increase in the Proliferation of Cyber Weapons? Omree Wechsler The Academization of Intelligence: A Comparative Overview of Intelligence Studies in the West Kobi Michael and Aaron Kornbluth Forty-Five Years Since the Yom Kippur War: Intelligence and Risk Management in the Thirty Hours Preceding the War Shmuel Even National Cyber Security in Israel Yigal Unna Cyber, Intelligence, and Security Volume 3 | No. 1 | May 2019 Contents European Countries Facing the Challenge of Foreign Influence on Democracy—Comparative Research | 3 David Siman-Tov and Mor Buskila The Threat of Foreign Interference in the 2019 Elections in Israel and Ways of Handling it | 27 Pnina Shuker and Gabi Siboni The INF Treaty and New START: Escalation Control, Strategic Fatalism, and the Role of Cyber | 41 Stephen J. Cimbala Iranian Cyber Capabilities: Assessing the Threat to Israeli Financial and Security Interests | 71 Sam Cohen Outsourcing in Intelligence and Defense Agencies: A Risk of an Increase in the Proliferation of Cyber Weapons? | 95 Omree Wechsler The Academization of Intelligence: A Comparative Overview of Intelligence Studies in the West | 117 Kobi Michael and Aaron Kornbluth Forty-Five Years Since the Yom Kippur War: Intelligence and Risk Management in the Thirty Hours Preceding the War | 141 Shmuel Even National Cyber Security in Israel | 167 Yigal Unna The purpose of Cyber, Intelligence, and Security is to stimulate Cyber, and enrich the public debate on related issues.
    [Show full text]
  • Democratization of Intelligence
    Does “national character” correlate with the nature of national, strategic intelligence across a major region of the world? This question remains open and important, given that the intelligence services of any country by DEMOCRATIZATION defi nition ideally provide an institutional guarantee of national survival. In the end, public consciousness of the intelligence function can contribute OF INTELLIGENCE directly to the positive evolution of intelligence as one of the oldest of political institutions, in such a way that we can begin to identify a MELDING STRATEGIC INTELLIGENCE phenomenon of “democratization” of national intelligence. AND NATIONAL DISCOURSE Russell G. Swenson and Susana C. Lemozy Editors As may be inferred from most of the essays in this book, the emphasis on state security and control of violent criminal activity is a strong, distinctive feature of the intelligence services across the region. One possibility is to extend the research carried out for this book to a systematic comparison of the institutional framework and operational emphases in other regions where, as we know through an emerging body of comparative research, there is an impetus to institutionalize democratic reform and improve the integration of law enforcement and strategic intelligence. Intelligence studies are on the brink of making the leap to a level where they will have practical relevance. This book edited by Russell Swenson and Susana Lemozy holds importance for its presentation of usefully detailed essays and for the impetus it gives for theoretically oriented comparative studies. The book should be required reading for scholars interested in the combination of intelligence, strategic culture, security and democracy.
    [Show full text]
  • Information Sources on the Web – Intelligence Bibliographies, Newsletters, Blogs, and Webliographies
    Staying Informed: Information Sources on the Web – Intelligence Bibliographies, Newsletters, Blogs, and Webliographies Peter C. Oleson For those educators and interested parties who try to keep up with the world of intelligence the flood of information can be daunting. Newspaper articles, new books, scholarly journals, and web blogs that address intelligence are numerous. Many are politically motivated; none is comprehensive. Unclassified sources lack much of the primary material. Classified sources, unless leaked, are not available. Nevertheless, the following are useful resources, presented in alphabetical order. AFCEA International (Armed Forces Communications and Electronics Association) publishes Signal magazine monthly, which contains numerous intelligence-related articles and news. AFCEA also publishes via its website webinars and white papers related to intelligence. www.afcea.org. AFCEA also has a monthly intelligence- related blog, the MAZZINT Blog. Air University has an excellent compilation of intelligence-related materials with many links to articles and relevant websites at its “Gateway to Intelligence.” http://www.au.af.mil/au/awc/awcgate/awc-ntel.htm. The American Enterprise Institute’s Critical Threats project tracks and provides analysis of key and emerging threats to national security. http://www.aei.org/feature/critical-threats-project/. The Association of Former Intelligence Officers (AFIO) is an education-oriented national association and has two major recurring publications. The Weekly Intelligence Notes (WIN), available to paid members, provides synopses and links to major intelligence-related news stories. The WINs also have a comprehensive calendar of intelligence-related events, including for the International Spy Museum in Washington, D.C. AFIO’s journal, Intelligencer, carries articles, opinion pieces, book reviews, and association news.
    [Show full text]
  • Periscope Newsletter of Afio
    NEWSLETTER OF AFIO NATIONAL AND CHAPTER PERISCOPE EVENTS, PLANS & NEWS Association of Former Intelligence Offi cers Volume XXV, Numbers 1 and 2, 2002 Gates rose through the ranks to the top job; but, incredibly, he didn’t C O N T E N T S bunki “get it”! Or perhaps he just forgot the e ng fundamental difference between a Debunking the CIA Case Offi cer D CIA “case offi cer” and an indigenous Myth by Fred Rustmann, Jr. .............. 1 “agent.” President’s Message and SpyCruise by Gene Poteat.................................. 2 More recent criticism has been What’s New in AFIO directed at the Agency by a few former by Roy Jonkers................................... 4 disgruntled junior case offi cers (who AFIO Board Actions on Bylaws ............ 6 also don’t get it, or don’t want to get it). Ballot for Election of New Board They claim that the Agency’s Members for 2003............................. 7 effectiveness, particularly regarding AFIO’s Strategic Plan Update .............. 8 Middle Eastern terrorist targets, is Honors Lists for 2001 - Donors, New hamstrung by the lack of case offi cers Member-Getters, Corporate Partners, with the requisite foreign language fl u- Volunteers .........................................10 the CIA Case Officer Myth ency, cultural knowledge and physical Welcome to the Board ........................13 characteristics to blend into a foreign Chapter Reports ...................................14 operational environment with the ease In Memorium .......................................15 Frederick W. Rustmann Jr. of a native of that country. They call Researchers Needing Assistance ..........16 July 23, 2002 for a recruitment drive to attract such Forthcoming Events/ souls, and that call has been fueled by Conferences ......................................17 Several years ago I was among a the press and others ever since.
    [Show full text]
  • Learning with Professionals
    Joint Military Intelligence College LEARNING WITH PROFESSIONALS Selected Works from the Joint Military Intelligence College EL INT LIG Y E R N A C T E I L C I O M L L T E N G I E O J 1962 The Joint Military Intelligence College supports and encourages research on intelligence issues that distills lessons and improves support to policy-level and operational consumers Learning With Professionals: Selected Works from the Joint Military Intelligence College is a collection of writings by present or former faculty and students at the Joint Military Intelligence College. The purpose of the book is to provide an academic resource for students, teachers, and practitioners of intelligence. The growth of the field as an academic discipline has been accompanied by a growth in its body of literature, and some of the most significant writings have come from a center of excellence in the field, the Joint Military Intelligence College. Those presented here represent a cross section of subdisciplines, some with a very timely element, some timeless. Though many of the writings were published outside of the College, those published within are available from the College, and are accessible by Intelink or from the National Technical Information Service (www.ntis.gov). For more details, please contact the Center for Strategic Intelligence Research at the College ([email protected]). This product has been reviewed by senior experts from academia and government, and has been approved for unrestricted distribution by the Directorate for Freedom of Information and Security Review, Washington Headquarters Services, Department of Defense.
    [Show full text]
  • Intelligence Analysis Mark M
    INCIDENTAL PAPER Seminar on Intelligence, Command, and Control Intelligence Analysis Mark M. Lowenthal Guest Presentations, Spring 2004 Carol A. Haave, Mark M. Lowenthal, Robert B. Murrett, John C. Gannon, Joan A. Dempsey, Gregory J. Rattray, Robert Liscouski, Arthur K. Cebrowski, Aris Pappas May 2004 Program on Information Resources Policy Center for Information Policy Research Harvard University The Program on Information Resources Policy is jointly sponsored by Harvard University and the Center for Information Policy Research. Chairman Managing Director Anthony G. Oettinger John C. B. LeGates Copyright © 2004 by the President and Fellows of Harvard College. Not to be reproduced in any form without written consent from the Program on Information Resources Policy, Harvard University, Maxwell Dworkin 125, 33 Oxford Street, Cambridge MA 02138. (617) 495-4114 E-mail: [email protected] URL: http://www.pirp.harvard.edu ISBN I-879716-89-5 I-04-1 May 2004 PROGRAM ON INFORMATION RESOURCES POLICY Harvard University Center for Information Policy Research Affiliates AT&T Corp. PDS Consulting Australian Telecommunications Users Group PetaData Holdings, Ltd. BellSouth Corp. Samara Associates The Boeing Company Skadden, Arps, Slate, Meagher & Booz Allen Hamilton Flom LLP Center for Excellence in Education Strategy Assistance Services Commission of the European Communities TOR LLC Critical Path TransMedia Exchange CyraCom International United States Government: Ellacoya Networks, Inc. Department of Commerce Hanaro Telecom Corp. (Korea) National Telecommunications and Hearst Newspapers Information Administration Hitachi Research Institute (Japan) Department of Defense IBM Corp. National Defense University Korea Telecom Department of Health and Human Lee Enterprises, Inc. Services Lexis–Nexis National Library of Medicine John and Mary R.
    [Show full text]
  • America's Alleged Intelligence Failure in The
    University of Calgary PRISM: University of Calgary's Digital Repository Graduate Studies The Vault: Electronic Theses and Dissertations 2017 America’s Alleged Intelligence Failure in the Prelude to Operation Iraqi Freedom: A Study of Analytic Factors Cake, Timothy Cake, T. (2017). America’s Alleged Intelligence Failure in the Prelude to Operation Iraqi Freedom: A Study of Analytic Factors (Unpublished doctoral thesis). University of Calgary, Calgary, AB. doi:10.11575/PRISM/24784 http://hdl.handle.net/11023/3688 doctoral thesis University of Calgary graduate students retain copyright ownership and moral rights for their thesis. You may use this material in any way that is permitted by the Copyright Act or through licensing that has been assigned to the document. For uses that are not allowable under copyright legislation or licensing, you are required to seek permission. Downloaded from PRISM: https://prism.ucalgary.ca UNIVERSITY OF CALGARY America’s Alleged Intelligence Failure in the Prelude to Operation Iraqi Freedom: A Study of Analytic Factors by Timothy Cake A DISSERTATION SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY GRADUATE PROGRAM IN MILITARY, SECURITY, AND STRATEGIC STUDIES CALGARY, ALBERTA APRIL, 2017 © Timothy Cake 2017 ABSTRACT In the prelude to Operation Iraqi Freedom (OIF), notables in the G. W. Bush administration declared Iraq to be an existential threat as it had weapons of mass destruction (WMD) and connections to transnational terrorist groups. After the 2003 invasion of that state, coalition forces engaged in a search effort that found no significant evidence of WMD.
    [Show full text]
  • Assessing the Tradecraft of Intelligence Analysis
    THE ARTS This PDF document was made available from www.rand.org as a public CHILD POLICY service of the RAND Corporation. CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY The RAND Corporation is a nonprofit research POPULATION AND AGING organization providing objective analysis and effective PUBLIC SAFETY solutions that address the challenges facing the public SCIENCE AND TECHNOLOGY and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE Support RAND Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Security Research Division View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation technical report series. Reports may include research findings on a specific topic that is limited in scope; present discus- sions of the methodology employed in research; provide literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research profes- sionals, and supporting documentation; or deliver preliminary findings.
    [Show full text]
  • Pay for Performance at the CIA: Restoring Equity, Transparency and Accountability
    Pay for Performance at the CIA: Restoring Equity, Transparency and Accountability The Assessment of the Independent Panel on the Central Intelligence Agency’s Compensation Reform Proposals January 2004 Business Executives for National Security − January 2004 The Assessment of the Independent Panel on the CIA’s Compensation Reform Proposals TABLE OF CONTENTS Preface .............................................................................................................................................. iii 1. Executive Summary ...................................................................................................................... 1 2. The BENS Independent Panel ....................................................................................................... 5 3. Overview of Federal Civil Service Reform .................................................................................... 7 4. The Central Intelligence Agency’s Case for Compensation Reform ............................................. 11 5. The Central Intelligence Agency’s Compensation Reform Proposals........................................... 13 6. Observations of the BENS Independent Panel ............................................................................ 15 7. Comparison with Private Sector Best Practices ........................................................................... 21 8. Findings and Recommendations ............................................................................................... 25 Appendices A — Terms of
    [Show full text]
  • FOIA CASE LOGS for the Central Intelligence Agency (CIA)
    Description of document: FOIA CASE LOGS for: The Central Intelligence Agency (CIA) for FY 2005 – FY 2007 Requested date: 21-October-2007 Released date: 19-February-2008 Posted date: 29-April-2008 Title of Document FY 2005, FY 2006, FY 2007 Case Log Date/date range of document: 01-October-2004 – 21-November-2007 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: (703) 613-3007 The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file Central Intelligence Agency Washington, o.c. 20505 • FEB 19 lOW Reference: F-2008-00211 This is a final response to your 21 October 2007 Freedom ofInformation Act (FOIA) request for "FOIA Case Logs for CIA for the time period FY2005 and FY2006 and FY2007-to-date." We processed your request in accordance with the FOIA, 5 U.S.C. § 552, as amended, and the CIA Information Act, 50 U.S.c. § 431, as amended.
    [Show full text]
  • Central Intelligence Agency (CIA) and Made It an Independent Agency Within the Executive Branch of the President
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Central Intelligence Agency Washington, D.C. 20505 MAY 0 9 2018 Mr. John Greenewald, Jr. 27305 W. Live Oak Road Suite #1203 Castaic, CA 91384 Reference: F-2016-01968 Dear Mr. Greenewald: On 4 May 2018, the office of the Information and Privacy Coordinator received your 4 May 2018 letter and phone call asking for clarification regarding our response to your 8 October 2014 Freedom of Information Act request for the Intellipedia entries for the Central Intelligence Agency. Enclosed is another copy of our 19 March 2018 response to your request. Sincerely, Allison Fong Information and Privacy Coordinator Enclosures Central Intelligence Agency Washington, D.C. 20505 19 March 2018 Mr. John Greenewald, Jr. 27305 W. Live Oak Road Suite #1203 Castaic, CA 91384 Reference: F-2016-01968 Dear Mr. Greenewald: In the course of processing your 8 October 2014 Freedom of Information Act (FOIA) request for information on the Intellipedia entries for the Central Intelligence Agency, the National Security Agency (NSA) located CIA material and referred it to us on 6 June 2016 for review and direct response to you. We have determined that three documents can be released in segregable form with deletions made on the basis of FOIA exemption (b )(3).
    [Show full text]