Intelligence is the result of analyzing information
Intelligence can be public (open source) or classified
Separate from policy
US Intelligence Community
Collection of information
Production and dissemination of intelligence;
Collection of information concerning, and the conduct of activities to protect against, intelligence activities directed against the US, international terrorist and international narcotics activities, and other hostile activities directed against the US by foreign powers, organizations, persons, and their agents;
Special activities;
Administrative and support activities within the US and abroad necessary for the performance of authorized activities; and
Such other intelligence activities as the President may direct from time to time.
Members of the IC
Director of National Intelligence
Undersecretary of Defense for Intelligence
Air Force Intelligence
Army Intelligence
Central Intelligence Agency
Coast Guard Intelligence
Defense Intelligence Agency
Department of Energy
Department of Homeland Security
Department of State
Types of Intelligence
Human Intelligence (HUMINT) - primarily CIA
Signals Intelligence (SIGINT) - primarily NSA
Imagery Intelligence (IMINT) - primarily NGA
Military Intelligence and Measurement and Signature Intelligence (MASINT) - primarily DIA
National Security Agency
CIA
CIA
FBI
The mission of the FBI is to uphold the law through the investigation of violations of federal criminal law; to protect the United States from foreign intelligence and terrorist activities; to provide leadership and law enforcement assistance to federal, state, local, and international agencies; to perform these responsibilities in a manner that is responsive to the needs of the public and is faithful to the Constitution of the United States.
FBI Directorate of Intelligence
The mission of the Intelligence Program is to optimally position the FBI to meet current and emerging national security and criminal threats by:
Aiming core investigative work proactively against threats to U.S. interests;
Building and sustaining enterprise-wide intelligence policies and capabilities; and
Providing useful, appropriate, and timely information and analysis to the national security, homeland security, and law enforcement communities.
Primary responsibility for domestic intelligence
Other agencies must go through FBI
Classified Information
Intelligence and sensitive information is protected by classification
Individuals are restricted from accessing classified information. Permission is granted only if
The individual has the proper clearance and
The individual has a need to know
Levels of Classification
Unclassified
Confidential
information which would "damage" national security if disclosed.
Secret
Information which would cause "serious damage" to national security.
Top Secret
information that would cause "exceptionally grave damage" to national security if disclosed
Additional Categories
Compartmentalized Information
Sensitive Compartmented Information (SCI) in the IC
Special Access Programs (SAP) in the DoD
Information is further protected, with extra protections around need-to-know
Information is segregated in SCIF areas to limit access
Security Clearances
Difference IC agencies have their own policies for granting clearances
Investigations include
NACLC
SSBI
Polygraph
Top secret clearances can take 6 months to over a year
Sharing Information
There are lots of complex rules and laws that make sharing information and intelligence between agencies difficult
Case study: FBI
FBI Intelligence Cycle
Barriers to Law Enforcement Information Sharing
Policies and practices inhibit routine information exchange
Increasing sophistication of criminal activity
Inadequate safeguards to promote trust and protect privacy
Lack of coordination of information sharing initiatives across law enforcement and homeland security communities
Inadequate technology tools and services
Intelligence Sharing Roadmap to the NIPP
National Criminal Intelligence Sharing Plan
National Model for Intelligence Sharing
A Blueprint to Build or Enhance Intelligence Gathering Systems
Secure & Seamless Technology Architecture
28 Specific Recommendations
Networked Information Sharing
FBI Direct Sharing & Exchange
Share by rule and withhold by exception
A three-level approach
Top Secret-SCI level
Secret level
Unclassified
Share with other law enforcement agencies and share within the FBI