Confrontation Or Collaboration? | Congress and the Intelligence Community Intelligence Basics

Total Page:16

File Type:pdf, Size:1020Kb

Confrontation Or Collaboration? | Congress and the Intelligence Community Intelligence Basics Confrontation or Collaboration? Congress and the Intelligence Community Eric Rosenbach and Aki J. Peritz Confrontation or Collaboration? Congress and the Intelligence Community Eric Rosenbach and Aki J. Peritz With contributions from Hope LeBeau, Cynthia Lobosky, Ya’ara Barnoon, Susan Sypko, David Tohn, Jessica Reitz, Tamara Klajn, Sarah Miller and JP Schnapper-Casteras. The Intelligence and Policy Project Belfer Center for Science and International Affairs John F. Kennedy School of Government Harvard University 79 JFK Street Cambridge, MA 02138 Fax: (617)495-8963 Email: [email protected] Website: http://belfercenter.org Copyright 2009 President and Fellows of Harvard College Printed in the United States of America Design: Tim Duffy The co-sponsors of this report invite liberal use of the information provided in it for educational purposes, requiring only that the reproduced material clearly state: Reproduced from Eric Rosenbach and Aki J. Peritz, Confrontation or Collaboration? Congress and the Intelligence Community (Cambridge, Mass: The Belfer Center, Harvard University, June 2009). With contributions from Hope LeBeau, Cynthia Lobosky, Ya’ara Barnoon, Susan Sypko, David Tohn, Jessica Reitz, Tamara Klajn, Sarah Miller and JP Schnapper-Casteras. Satellite image by GeoEye. Dear Friend, Your work as a lawmaker is one of the toughest and most rewarding jobs in the country. During the course of your service on Capitol Hill, you will undoubtedly need to consider legislation and issues relevant to national security and the Intelligence Community. Your responsibility to oversee the Intelligence Community will not be easy, but I am confident that you will find extraordinary opportunities to protect and pursue America’s interests around the globe. My friends at the Harvard Kennedy School and I strongly believe that an understanding of the inner architecture of the Intelligence Community will allow you to serve the country more effectively. The Community’s size and complexity, however, often confuse and stymie lawmakers attempting to understand intelligence issues. As the 9/11 Commission Report noted, “Few members of Congress have the broad knowledge of intelligence activities or the know-how about technologies employed.” This briefing book attempts to provide you with the foundation to improve your knowledge of intelligence issues. The memos in this book give you important basic information about the Intelligence Community and outline the central issues you will likely encounter during your time in Congress. Although new and unforeseen challenges will certainly arise during your tenure, the ideas presented in this book will provide you with a general framework on many of the issues you will encounter. I thank you for your service. Sincerely, Bob Graham The Belfer Center for Science and International Affairs | The Harvard Kennedy School Table of Contents Background Memos Intelligence Basics 10 Organization of the Intelligence Community 14 Congressional Oversight of the Intelligence Community 18 The Congressional Authorization and Appropriation Processes 24 Informing Congress of Intelligence Activities 28 Covert Action 32 National Intelligence Estimates 36 Defense Intelligence 40 Domestic Intelligence 44 Intelligence and International Cooperation 50 Issue Memos Intelligence Reform 56 Interrogations and Intelligence 62 Electronic Surveillance and FISA 68 Cyber Security and the Intelligence Community 74 Overhead Surveillance 78 The National Interest, Energy Security and the Intelligence Community 82 Terrorist Safehavens and the Intelligence Community 86 The Role of Private Corporations in the Intelligence Community 88 The USA-PATRIOT Act 92 State and Local Fusion Centers 96 Sources 100 Acknowledgments 114 About the Authors 115 Background Memos Intelligence Basics 10 Organization of the Intelligence Community 14 Congressional Oversight of the Intelligence Community 1 The Congressional Authorization and Appropriation Processes 24 Informing Congress of Intelligence Activities 2 Covert Action 32 National Intelligence Estimates 36 Defense Intelligence 40 Domestic Intelligence 44 Intelligence and International Cooperation 50 Intelligence Basics Intelligence is a critical tool lawmakers often use to assess issues essential to U.S. national policy. Understanding the complexities, mechanics, benefits and limitations of intelligence and the Intelligence Community (IC) will greatly enhance the ability of lawmakers to arrive at well-grounded decisions vital to our nation’s foreign and domestic security. This memo provides an overview of U.S. intelligence and its primary functions, including intelligence collection and analysis, covert action, and counterintelligence activities. What is Intelligence? Intelligence is information that agencies collect, analyze and distribute in response to government leaders’ questions and requirements. Intelligence is a broad term that entails: • Collection, analysis, and production of sensitive information to support national security leaders, including policymakers, military commanders and Members of Congress. • Safeguarding these processes and this information through counterintelligence activities. • Execution of covert operations approved by the President. The IC strives to provide valuable insight on important issues by gathering raw intelligence, analyzing that data in context, and producing timely and relevant products for customers at all levels of national security—from the war-fighter on the ground to the President in Washington. Levels of intelligence include: • Strategic: intelligence needed by policymakers to make policy and military decisions at the national and international level. • Operational: intelligence used by military leaders to plan and accomplish strategic objectives within the operational area. • Tactical: intelligence provided to military leaders in the field to accomplish immediate tactical objectives. Intelligence Cycle The intelligence cycle is the process in which intelligence officers convert collected information into valuable intelligence for national security consumers. The cycle begins with establishing priorities and requirements, often with input from policymakers. The cycle then involves collecting, processing, analyzing, and disseminating information for intelligence customers. Some of the most well-known published intelligence products include: 10 Confrontation or Collaboration? | Congress and the Intelligence Community Intelligence Basics Intelligence Cycle Planning Planning PlanningPlanningThe Intelligence and Cycle Direction begins with estab- lTheishin Intg prioritieselligence and requirements, often PlanningPlanning CycleC beginsycle begins with estawithb esta- The IntPolicymakerswithlishinelligence inputg priorities fr om establish policymak and requirements, requirementsers b- Thelishin IntThewithgelligence priorities Int inputelligence fr and C requirements,ycle begins with of teestano fbte- n for the IC Conomycle various policymak begins topics. with esta Theseb- lishinwithlg ishininput prioritiesg frprioritiesom andpolicymak requirements,and requirements,ers ers often with input from policymakers often with inputguidelines from policymak are used ertos determine the IC’s collection strategies and the types DisseminationDissemination of necessary intelligence products. Providing the results Collection Providing the resultsoof oof pr processing to Disseminationnational security con ocessing to CollectionIntelligencce analysts use six primarry disciplines of intelli- DisseminationDisseminationnational security connsumers.nsumers. The The quality quality Proandviding rele thevance results of the oof processing to IntelligencCollectionCollectiongenceCollectionce colle analystsection useto draf six tprimar finishedry disciplines inntelligence of reporintellit-s Providingand the rele resultsvance of thee disseminate disseminated reports maPrDisseminationyo vidinglead the resultsoofnsumers. processing oof pr ocessing The to qualityed repor to CollectionIntelligenc elligence reports nationalmay securityleadto tore-spec re-specconcificationcification of ofint intelligencets genceIntelligenc colleectioncece analysts analysts to draf uset usefinished six six primar primar innt ry disciplines of intelli- nationalcollectionnational security securityrequirem connsumers. connsumers. The qualityed The reporelligence qualityts gence colle ry disciplines of in and collectionrelevancerequirem requiremof thee disseminatments, thereby complet- IntelligencgenceceRaw analystscolleection ectiondata useisto to gathered drafsix primart finished from overtinntelligence reports and releandvance Therelevance offinished the ofments, the eanalysis disseminat thereb is givened reporto thets draft finishedry disciplines in of intelli- telli- maingy leadthe cytoc re-spece cificationdisseminat ofed int reporelligencey complets t- gence colleection ntelligence repor may leading the cyle.cle. and covertto draf sourcest finished in orderinntelligence to reports ts collectionmaytopolicymaker. lead re-specrequirem to re-speccificationments,cification thereb of intelligence ofy comple intelligencet- collection requirem ing collectionthe cyrequiremcle. requiremments,ments, thereb thereby compley complet- t- produce finished intelligence. ing theing cy cthle.e cycle. Processing ProcessingConverting colleollected information into a form suitableble for analysis or the produc- AnalysisAnalysis ConProcessingverting colleollected information into a ProcessingConvetionrting of colleintelligence. formCon
Recommended publications
  • The Future of Weapons of Mass Destruction an Update
    A NATIONAL INTELLIGENCE UNIVERSITY PRESIDENTIAL SCHOLAR’S PAPER THE FUTURE OF WEAPONS OF MASS DESTRUCTION AN UPDATE By John P. Caves, Jr. NIU Presidential Scholar November 2019 – November 2020 and W. Seth Carus THE FUTURE OF WEAPONS OF MASS DESTRUCTION AN UPDATE John P. Caves, Jr. and W. Seth Carus National Intelligence University National Intelligence Press Washington, DC February 2021 The views expressed in this paper are solely those of the authors and do not necessarily reflect those of the National Intelligence University, National Defense University, or any other part of the U.S. government. ACKNOWLEDGMENTS While the authors are solely responsible for the final content of this paper, they benefited greatly from the time, expertise and support freely availed to them by many knowledgeable individuals and organizations. They include Mr. Caves’ colleagues at National Intelligence University (NIU), where he worked on this paper while on a detail assignment from National Defense University (NDU). Mr. Caves expresses par- ticular gratitude to Dr. Brian Holmes, dean of the Anthony G. Oettinger School of Science and Technol- ogy Intelligence, for his leadership, knowledge, and support. Dr. Sharon Adams, Ms. Beverly Barnhart, Mr. George Clifford, Dr. LaMesha Craft, and Dr. R. Carter Morris offered helpful comments on the paper at various stages. They and Mr. Damarius Alston, LTC Jeffrey Bacon, Lt Col Frances Deutch, Ms. Thelma Flamer, Mr. Julian Meade, and Ms. Christina Sanders were among others at NIU whose assistance and support made Mr. Caves’ assignment at NIU enjoyable as well as productive. Both authors are deeply indebted to their colleagues at NDU’s Center for the Study of Weapons of Mass Destruction (CSWMD), especially Mr.
    [Show full text]
  • Appendix File Anes 1988‐1992 Merged Senate File
    Version 03 Codebook ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ CODEBOOK APPENDIX FILE ANES 1988‐1992 MERGED SENATE FILE USER NOTE: Much of his file has been converted to electronic format via OCR scanning. As a result, the user is advised that some errors in character recognition may have resulted within the text. MASTER CODES: The following master codes follow in this order: PARTY‐CANDIDATE MASTER CODE CAMPAIGN ISSUES MASTER CODES CONGRESSIONAL LEADERSHIP CODE ELECTIVE OFFICE CODE RELIGIOUS PREFERENCE MASTER CODE SENATOR NAMES CODES CAMPAIGN MANAGERS AND POLLSTERS CAMPAIGN CONTENT CODES HOUSE CANDIDATES CANDIDATE CODES >> VII. MASTER CODES ‐ Survey Variables >> VII.A. Party/Candidate ('Likes/Dislikes') ? PARTY‐CANDIDATE MASTER CODE PARTY ONLY ‐‐ PEOPLE WITHIN PARTY 0001 Johnson 0002 Kennedy, John; JFK 0003 Kennedy, Robert; RFK 0004 Kennedy, Edward; "Ted" 0005 Kennedy, NA which 0006 Truman 0007 Roosevelt; "FDR" 0008 McGovern 0009 Carter 0010 Mondale 0011 McCarthy, Eugene 0012 Humphrey 0013 Muskie 0014 Dukakis, Michael 0015 Wallace 0016 Jackson, Jesse 0017 Clinton, Bill 0031 Eisenhower; Ike 0032 Nixon 0034 Rockefeller 0035 Reagan 0036 Ford 0037 Bush 0038 Connally 0039 Kissinger 0040 McCarthy, Joseph 0041 Buchanan, Pat 0051 Other national party figures (Senators, Congressman, etc.) 0052 Local party figures (city, state, etc.) 0053 Good/Young/Experienced leaders; like whole ticket 0054 Bad/Old/Inexperienced leaders; dislike whole ticket 0055 Reference to vice‐presidential candidate ? Make 0097 Other people within party reasons Card PARTY ONLY ‐‐ PARTY CHARACTERISTICS 0101 Traditional Democratic voter: always been a Democrat; just a Democrat; never been a Republican; just couldn't vote Republican 0102 Traditional Republican voter: always been a Republican; just a Republican; never been a Democrat; just couldn't vote Democratic 0111 Positive, personal, affective terms applied to party‐‐good/nice people; patriotic; etc.
    [Show full text]
  • Geopolitics, Oil Law Reform, and Commodity Market Expectations
    OKLAHOMA LAW REVIEW VOLUME 63 WINTER 2011 NUMBER 2 GEOPOLITICS, OIL LAW REFORM, AND COMMODITY MARKET EXPECTATIONS ROBERT BEJESKY * Table of Contents I. Introduction .................................... ........... 193 II. Geopolitics and Market Equilibrium . .............. 197 III. Historical U.S. Foreign Policy in the Middle East ................ 202 IV. Enter OPEC ..................................... ......... 210 V. Oil Industry Reform Planning for Iraq . ............... 215 VI. Occupation Announcements and Economics . ........... 228 VII. Iraq’s 2007 Oil and Gas Bill . .............. 237 VIII. Oil Price Surges . ............ 249 IX. Strategic Interests in Afghanistan . ................ 265 X. Conclusion ...................................... ......... 273 I. Introduction The 1973 oil supply shock elevated OPEC to world attention and ensconced it in the general consciousness as a confederacy that is potentially * M.A. Political Science (Michigan), M.A. Applied Economics (Michigan), LL.M. International Law (Georgetown). The author has taught international law courses for Cooley Law School and the Department of Political Science at the University of Michigan, American Government and Constitutional Law courses for Alma College, and business law courses at Central Michigan University and the University of Miami. 193 194 OKLAHOMA LAW REVIEW [Vol. 63:193 antithetical to global energy needs. From 1986 until mid-1999, prices generally fluctuated within a $10 to $20 per barrel band, but alarms sounded when market prices started hovering above $30. 1 In July 2001, Senator Arlen Specter addressed the Senate regarding the need to confront OPEC and urged President Bush to file an International Court of Justice case against the organization, on the basis that perceived antitrust violations were a breach of “general principles of law.” 2 Prices dipped initially, but began a precipitous rise in mid-March 2002.
    [Show full text]
  • Intellipedia-Wrangler.Pdf
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 81322A 28 April 2017 JOHN GREENEWALD Dear Mr. Greenewald: This is our final response to your Freedom of Information Act (FOIA) request of 22 May 2015, for Intellipedia pages on WRANGLER. As stated in our previous response, dated 27 May 2015, your request was assigned Case Number 81322. A copy ofyour request is enclosed. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. There are no assessable fees for this request. Your request has been processed under the FOIA. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD. Intellipedia pages are living documents that may be originated by any user organization, and any user organization may contribute to or edit pages after their origination.
    [Show full text]
  • Wikileaks and the Institutional Framework for National Security Disclosures
    THE YALE LAW JOURNAL PATRICIA L. BELLIA WikiLeaks and the Institutional Framework for National Security Disclosures ABSTRACT. WikiLeaks' successive disclosures of classified U.S. documents throughout 2010 and 2011 invite comparison to publishers' decisions forty years ago to release portions of the Pentagon Papers, the classified analytic history of U.S. policy in Vietnam. The analogy is a powerful weapon for WikiLeaks' defenders. The Supreme Court's decision in the Pentagon Papers case signaled that the task of weighing whether to publicly disclose leaked national security information would fall to publishers, not the executive or the courts, at least in the absence of an exceedingly grave threat of harm. The lessons of the PentagonPapers case for WikiLeaks, however, are more complicated than they may first appear. The Court's per curiam opinion masks areas of substantial disagreement as well as a number of shared assumptions among the Court's members. Specifically, the Pentagon Papers case reflects an institutional framework for downstream disclosure of leaked national security information, under which publishers within the reach of U.S. law would weigh the potential harms and benefits of disclosure against the backdrop of potential criminal penalties and recognized journalistic norms. The WikiLeaks disclosures show the instability of this framework by revealing new challenges for controlling the downstream disclosure of leaked information and the corresponding likelihood of "unintermediated" disclosure by an insider; the risks of non-media intermediaries attempting to curtail such disclosures, in response to government pressure or otherwise; and the pressing need to prevent and respond to leaks at the source. AUTHOR.
    [Show full text]
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • Introduction
    1 Introduction Intelligence collection is one of the earliest recorded organized human activ- ities, along with war. The earliest writing about intelligence collection dates from the seventh and sixth centuries BCE: Caleb the spy in the Book of Numbers and The Art of War by Sun Tzu. It is striking that two cultures, ancient Hebrew and Chinese, geographically remote from one another and undoubtedly unknown to one another, should both discuss the importance of intelligence collection at roughly the same time in an early part of human history. But the precept is elementary at its core—information confers power. Whoever is best at gathering (and exploiting) relevant information tends to win. In the twenty-fi rst century, the U.S. Intelligencedistribute Community (IC) is premier in its capabilities for doing both. Collection in the IC generally refers to fi ve ordisciplines (or sources): Open Source Intelligence (OSINT), Human Intelligence (HUMINT), Signals Intel- ligence (SIGINT), Geospatial Intelligence (GEOINT), and Measurement and Signature Intelligence (MASINT). A great deal of mystery and myth surrounds the subject of those sources and the capabilities and uses implied. And many popular perceptions are far afi eld from reality. That is why we have written this book. Our intentionpost, is to give readers an approachable but detailed picture of U.S. intelligence collection capabilities. To that end, each chapter follows a similar construct. We discuss the unique origin and history of the INT, or intelligence collection discipline, which is important to under- stand in terms of both its development and how it is used today. We discuss the types of intelligencecopy, issues that each INT is best suited for and those for which it is of little help.
    [Show full text]
  • Intelligence Services Roles and Responsibilities in Good Security Sector Governance
    SSR BACKGROUNDER Intelligence Services Roles and responsibilities in good security sector governance About this series The SSR Backgrounders provide concise introductions to topics and concepts in good security sector governance (SSG) and security sector reform (SSR). The series summarizes current debates, explains key terms and exposes central tensions based on a broad range of international experiences. The SSR Backgrounders do not promote specific models, policies or proposals for good governance or reform but do provide further resources that will allow readers to extend their knowledge on each topic. The SSR Backgrounders are a resource for security governance and reform stakeholders seeking to understand but also to critically assess current approaches to good SSG and SSR. About this SSR Backgrounder This SSR Backgrounder explains the roles and responsibilities of intelligence services in good security sector governance (SSG). Intelligence services perform an essential security function by providing governments with timely and relevant information necessary to protect the security of states and their societies. Applying the principles of good SSG to intelligence services makes them both effective and accountable within a framework of democratic governance, the rule of law and respect for human rights. This SSR Backgrounder answers the following questions: What are intelligence services? Page 2 What do intelligence services do? Page 2 How is intelligence produced? Page 4 What intrusive legal powers do intelligence services hold?
    [Show full text]
  • Robert and Renée Belfer Center for Science and International Affairs Annual Report 2020
    Robert and Renée Belfer Center for Science and International Affairs Annual Report 2020 ANNUAL REPORT 2020 A The Robert and Renée Belfer CONTENTS Center for Science and International Affairs CORE From the Director ..........................................................................1 Annual Report Center-Wide Activities .................................................................8 2020 Publications & Communications ...........................................12 DIRECTOR PROJECT UPDATES Ash Carter [email protected] Arctic Initiative .............................................................................18 CO-DIRECTOR Avoiding Great Power War .....................................................19 Eric Rosenbach [email protected] Cyber Project ................................................................................20 Defending Digital Democracy................................................21 EXECUTIVE DIRECTOR Aditi Kumar Defense Project ...........................................................................22 [email protected] Economic Diplomacy Initiative ..............................................23 DIRECTOR OF GLOBAL COMMUNICATIONS AND STRATEGY Environment and Natural Resources ..................................24 Josh Burek [email protected] Europe and the Transatlantic Relationship .......................25 Future of Diplomacy ..................................................................26 Geopolitics of Energy ................................................................27
    [Show full text]
  • FOIA Request Log for Office of the Director of National Intelligence (ODNI), FY 2013
    Description of document: FOIA Request Log for Office of the Director of National Intelligence (ODNI), FY 2013 Requested date: 15-July-2013 Released date: 25-October-2013 Posted date: 19-September-2016 Source of document: Freedom of Information Act Request Director, Information Management Division Office of the Director of National Intelligence Washington, D.C. 20511 Fax: (703) 874-8910 Email: [email protected] The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. Office of the Director of National Intelligence Information Management Division Washington, DC 20511 OCT 2 5 2013 Reference: ODNI Case# DF-2013-00155 This is in response to your email dated 15 July 2013, received in the Information Management Division of the Office of the Director of National Intelligence (ODNI) on 16 July 2013.
    [Show full text]
  • Law Enforcement Intelligence: a Guide for State, Local, and Tribal Law Enforcement Agencies
    David L. Carter, Ph.D. School of Criminal Justice Michigan State University Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies November 2004 David L. Carter, Ph.D. This project was supported by Cooperative Agreement #2003-CK-WX-0455 by the U.S. Department of Justice Office of Community Oriented Policing Services. Points of view or opinions contained in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice or Michigan State University. Preface The world of law enforcement intelligence has changed dramatically since September 11, 2001. State, local, and tribal law enforcement agencies have been tasked with a variety of new responsibilities; intelligence is just one. In addition, the intelligence discipline has evolved significantly in recent years. As these various trends have merged, increasing numbers of American law enforcement agencies have begun to explore, and sometimes embrace, the intelligence function. This guide is intended to help them in this process. The guide is directed primarily toward state, local, and tribal law enforcement agencies of all sizes that need to develop or reinvigorate their intelligence function. Rather than being a manual to teach a person how to be an intelligence analyst, it is directed toward that manager, supervisor, or officer who is assigned to create an intelligence function. It is intended to provide ideas, definitions, concepts, policies, and resources. It is a primer- a place to start on a new managerial journey. Every effort was made to incorporate the state of the art in law enforcement intelligence: Intelligence-Led Policing, the National Criminal Intelligence Sharing Plan, the FBI Intelligence Program, the array of new intelligence activities occurring in the Department of Homeland Security, community policing, and various other significant developments in the reengineered arena of intelligence.
    [Show full text]
  • William Kunstler: Disturbing the Universe a Film by Emily Kunstler and Sarah Kunstler
    William Kunstler: Disturbing the Universe A film by Emily Kunstler and Sarah Kunstler POV www.pbs.org/pov DISCUSSION GUIDE William Kunstler: Disturbing the Universe POV Letter frOm the fiLmmakers NEw YorK , 2010 Dear Colleague, William kunstler: Disturbing the Universe grew out of conver - sations that Emily and I began having about our father and his impact on our lives. It was 2005, 10 years after his death, and Hurricane Katrina had just shredded the veneer that covered racism in America. when we were growing up, our parents imbued us with a strong sense of personal responsibility. we wanted to fight injustice; we just didn’t know what path to take. I think both Emily and I were afraid of trying to live up to our father’s accomplishments. It was in a small, dusty Texas town that we found our path. In 1999, an unlawful drug sting imprisoned more than 20 percent of Tulia’s African American population. The injustice of the incar - cerations shocked us, and the fury and eloquence of family members left behind moved us beyond sympathy to action. while our father lived in front of news cameras, we found our place behind the lens. our film, Tulia, Texas: Scenes from the Filmmakers Emily Kunstler and Sarah Kunstler. Photo courtesy of Maddy Miller Drug War helped exonerate 46 people. one day when we were driving around Tulia, hunting leads and interviews, Emily turned to me. “I think I could be happy doing this for the rest of my life,” she said, giving voice to something we had both been thinking.
    [Show full text]