Let's Reimagine the Intelligence Community
Transcript of Let's Reimagine the Intelligence Community
2
Introduction
The United States (US) has created the greatest intelligence collection and analysis
organization the world has ever known. It is capable of utilizing every form of intelligence
collection in virtually any part of the world and does so every day of the week without
interruption. However, this community of intelligence agencies and organizations has developed
over time in an ad hoc manner, leaving us with a structure that is rife with overlapping and often
needlessly redundant responsibilities and capabilities. The Department of Defense (DOD)
currently owns the majority of these capabilities despite the fact that diplomatic efforts led by the
Department of State (DOS) require more analysis and intelligence input on a daily basis as they
are engaged in crafting and implementing the country’s national-security goals. On top of this,
lapses in the proper utilization of intelligence, and the failed analyses that often follow, have led
to significant blunders by the US on the world stage. However, the US Intelligence Community
(USIC) must always maintain a professional distance from those in power in order to discredit
frequent claims of intelligence failure and, conversely, the improper influence of policymakers in
driving analysis for political gain. Additionally, policy makers must be ever-vigilant to ensure
that the USIC does not stray from the legal framework they have constructed to ensure American
civil liberties are maintained.
The USIC is an extraordinary entity that has successfully protected this nation and
thwarted the vast majority of threats. However, like any organization (or, more accurately,
collectivity of organizations), from time to time failures occur for various reasons or elements of
the USIC stray from the narrow mandated path of legal constraints. It is at these times that the
cries for intelligence reform are the loudest. Policy makers believe that when mistakes are made,
changes must ensue to ensure that they never occur again. This tendency to engage in reactive,
3
top-down, large-scale reforms, rather than incremental and continuous ones, has further
exacerbated the often chaotic nature of the USIC and at times hampered its effectiveness.
To better understand where the USIC is now, this paper will begin with a discussion of its
current structure; some enduring reform considerations; and challenges encountered in any
attempt to reform the USIC. Next, it will focus on prior reform efforts; proposals to restructure
the USIC; and a discussion of the issues faced in implementing these proposals. Finally, this
work concludes with a new way forward for the community, taking into consideration the current
threat environment, needs of the nation, budgetary constraints, and lessons learned from prior
reform proposals and actual reforms.
Intelligence Reform
Since the passage of the National Defense Act of 1947, the mission of the USIC has been
to provide decision makers with the information necessary to form educated policies and plans
whether these individuals are in the military, executive or legislative branch, or law enforcement
(LE).1 Over time, missions drift and groups become more specialized, producing products for
select individuals rather than the community as a whole. The process of community-wide reform
allows missions to evolve and agencies to refocus and reengage the target as required.
The term “intelligence reform” is widely used and often misunderstood. Any change of
policy or structure at any level within an intelligence operation could be considered intelligence
reform. Since the mid-1970's, intelligence reform has often come to mean changes designed to
prevent the recurrence of illegal acts or abuses of authority.2 For the purpose of this paper, the
author will limit the term to mean the high-level organization and policy changes that dictate
1 John Deutch, "The Intelligence Community," Federation of American Scientists (n.d.),
http://www.fas.org/irp/offdocs/npr/vp96_intell.htm (accessed November 11, 2014). 2 Mark M. Lowenthal, Intelligence: From Secrets to Policy, Fourth Edition (Washington, D.C.: CQ Press, 2009),
297.
4
authority over broad intelligence areas and methods of collection, how agencies relate to one
another, and the laws that govern the collection and analysis of information and dissemination of
intelligence.
Current Structure
For any intelligence reform to be truly successful, the USIC and policymakers must both
embrace the changes and find a way to implement them in a way that will improve the ability of
the USIC to react quickly to emerging threats and provide unbiased requested analytical support
in a timely fashion. The two main impediments to this are internal rivalries within the USIC and
a lack of understanding of the USIC among policy makers.
Intelligence Community
Since 1947, the USIC has grown into a collection of 17 agencies with the Office of the
Director of National Intelligence (ODNI) tasked with management of the USIC. The DOD
manages eight of these agencies which, for obvious reasons, are relatively well integrated and
able to operate cooperatively.3 With the creation of the National Clandestine Service (NCS) and
the Defense Clandestine Service (DCS), the Central Intelligence Agency (CIA) and DOD have
taken a major step forward in integrating and coordinating their human intelligence (HUMINT)
operations.4 Of course, the relationship between the CIA and DOD continue to be strained due to
the agency’s continued expansion of paramilitary operations5 and control over drone strikes.
6
3 Office of the Director of National Intelligence, “Members of the IC,” Office of the Director of National
Intelligence (n.d.), http://www.dni.gov/index.php/intelligence-community/members-of-the-ic (accessed November
11, 2014). 4 Greg Miller, "Pentagon establishes Defense Clandestine Service, new espionage unit," Washington Post (April 23,
2012), http://www.washingtonpost.com/world/national-security/
pentagon-creates-new-espionage-unit/2012/04/23/gIQA9R7DcT_story.html (accessed November 11, 2014). 5 Central Intelligence Agency, “Paramilitary Operations Officer/Specialized Skills Officer,” Central Intelligence
Agency (April 21, 2007), https://www.cia.gov/careers/opportunities/clandestine/
paramilitary-operations-officer-specialized-skills-officer.html (accessed December 4, 2014). 6 Micah Zenko, “Transferring CIA Drone Strikes to the Pentagon: Policy Innovation Memorandum No. 31,” Council
on Foreign Relations (April 2013), http://www.cfr.org/drones/transferring-cia-drone-strikes-pentagon/p30434
5
The Department of Energy (DOE), Office of Intelligence and Counterintelligence (OIC),
has a unique mission as it is tasked with monitoring and reporting on foreign nuclear weapon
programs. Much of its analysis rests on the collection performed by DOD and CIA elements.
This dependence creates a close relationship and a desire to be open with its products.7 The
Department of Treasury (DOT), Office of Intelligence and Analysis (OIA), has grown much
closer to its USIC counterparts in large part due to the ongoing war on terror. The power that
resides within OIA to designate entities as terrorists and terror organizations thereby freezing
their financial assets has made them indispensable to the collective fight against these groups.8
The Drug Enforcement Administration (DEA), Office of National Security Intelligence (ONSI)
has proven exceedingly useful in the war on terror as it is the repository of over 30 years of drug
cartel tactics, techniques, and procedures (TTPs). These same TTPs are now being utilized by
terror groups to further their plans. ONSI plays a vital role by sharing the lessons learned from
the war on drugs and helping to apply those lessons to the war on terror.9
The Federal Bureau of Investigation (FBI) is the lead agency for all terror-related matters
within the US.10
In support of this, the Department of Homeland Security’s (DHS) Intelligence
and Analysis (I&A), OIA, ONSI, and US Coast Guard Intelligence (USCGI) coordinate their
counterterror efforts with the FBI and in conjunction with state and local authorities utilizing the
Joint Terrorism Task Force (JTTF) system based within the various FBI divisions.11
This model
(accessed December 4, 2014). 7 Steven Aftergood, "Department of Energy: Office of Intelligence," Federation of American Scientists (May 12,
2009), http://www.fas.org/irp/agency/doe (accessed November 11, 2014). 8 U.S. Department of the Treasury, "About: Terrorism and Financial Intelligence, Office of Intelligence and Analysis
(OIA)," U.S. Department of the Treasury (August 16, 2012), http://www.treasury.gov/about/
organizational-structure/offices/Pages/Office-of-Intelligence-Analysis.aspx (accessed November 11, 2014). 9 United States Drug Enforcement Administration, "Intelligence," (n.d.), http://www.justice.gov/dea/ops/intel.shtml
(accessed November 11, 2014). 10
"28 CFR 0.85 - General Functions" (July 1, 2010), http://www.gpo.gov/fdsys/pkg/CFR-2011-title28-
vol1/pdf/CFR-2011-title28-vol1-sec0-85.pdf (accessed November 11, 2014), (l). 11
The Federal Bureau of Investigation, "Joint Terrorism Task Forces," The Federal Bureau of Investigation (n.d.),
6
has proven very effective in responding to and investigating the various tips that are reported to
the JTTF’s member agencies. The investigations are run out of the FBI, but the JTTF squads are
comprised of agents and officers from the member agencies.
The domestic and foreign intelligence systems just described are designed to protect the
US homeland and its interests from attack, but there appears to be a divide between the two
groups. Those involved in foreign intelligence (DOD, CIA, etc.) are prohibited from domestic
collection under Presidential Executive Order 12333.12
Meanwhile, the domestic agencies (FBI,
DHS, etc.) collect and work in the homeland as well as on foreign intelligence matters.13
This
simultaneous overlap and divide creates an unusual separation of responsibilities in the USIC.
The foreign intelligence agencies are responsible for foreign threats, but they do not have the
authority to track them once they contact a US person or enter the homeland. Meanwhile, the
domestic agencies can track them outside of the US as well, but they also have the authority to
track their activities within the US. This has created tensions in the past due to the line that the
majority of the USIC cannot cross. Any intelligence reform must address this matter in a way
that will better balance the responsibilities delegated to the respective agencies. This has not
happened, though, and in fact the recent intelligence reform acts have strengthened the domestic
side’s ability to track targets outside of the US.14
Policy Community
The policy community is the other side of any potential intelligence reform effort. It is
comprised of the various elected and appointed officials in the Executive Branch and Congress
http://www.fbi.gov/about-us/investigate/terrorism/terrorism_jttfs (accessed November 11, 2014). 12
The President of the United States of America, "Executive Order 12333--United States Intelligence Activities,"
Federation of American Scientists (December 4, 1981), https://www.fas.org/irp/offdocs/eo/eo-12333-2008.pdf
(accessed November 11, 2014). 13
The Federal Bureau of Investigation, "Joint Terrorism Task Forces." 14
107th Congress, "United and Strengthening America by Providing Appropriate Tools Required to Intercept and
Obstruct Terrorism (USA Patriot Act )Act of 2001" (October 26, 2001), http://www.gpo.gov/fdsys/pkg/
PLAW-107publ56/pdf/PLAW-107publ56.pdf (accessed November 11, 2014).
7
who are responsible for the passage and implementation of laws. In the current two-party
political environment, consensus is difficult to find and compromise even more so. The only
constant is the requirement that the current party in charge make their mark on the government.
A prime example of the lack of cohesion when discussing policy makers’ stances on
intelligence operations can be found with the current President and his senior advisors. Then-
Senator Barack Obama was strongly against President Bush’s application of the expansion of the
Foreign Intelligence Surveillance Act of 1978 (FISA) and the Uniting and Strengthening
America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of
2001 (USA Patriot Act or Patriot Act) calling the programs excessive and illegal.15
However, on
December 28, 2012, President Obama signed the latest FISA extension, allowing the act to
remain in effect through 2017 without any reduction in scope or power.16
FISA and other legislation that provide additional authorities to the USIC and LE are
powerful tools that facilitate the collection of vital information and communications. Those in
the USIC understand the utility of such legislation as well as the danger of overreaching. Policy
makers have been informed of this understanding and need for these tools countless times in
Congressional hearings and information papers. Those elected to office that hold the power to
authorize, expand, and/or remove these tools are caught between the need to provide what is
necessary for the USIC to maintain the safety of the country while ensuring that civil liberties are
protected. This delicate balance will always push legislation one way or the other, creating an
15
Caroline Houck, "Barack Obama on surveillance, then and now," Tampa Bay Times: PolitiFact.com (June 13,
2013), http://www.politifact.com/truth-o-meter/article/2013/jun/13/barack-obama-surveillance-then-and-now/
(accessed November 11, 2014). 16
Bill Chappell, "President And Congress Extend FISA Wiretapping Act To 2017 [Updated]," NPR (December 28,
2012), http://www.npr.org/blogs/thetwo-way/2012/12/28/168220266/
congress-extends-fisa-wiretapping-act-to-2017-awaits-obamas-signature (accessed November 11, 2014).
8
environment where the USIC cannot be sure that the tools required for their mandated missions
will be available.
Enduring Reform Considerations
The USIC is an exceptional collection of agencies capable of extraordinary achievements.
It works every day to ensure the US, its citizens, and allies remain safe and secure. That being
said, there are four critical enduring issues that will spell the success or failure of the USIC in
future: information sharing, USIC-policymaker interaction, duplication of effort, and the ever-
present budget concerns of funding the largest and most capable intelligence apparatus in the
history of the world. Each of these four areas possesses the potential to lead to disaster for the
community and the nation as a whole.
Information Sharing
The 9/11 Commission found that the USIC could have predicted the impending attack as
all the relevant information was collected by the various agencies. The problem was that the
information was not shared between the agencies and therefore no predictive assessment could
be made. The Patriot Act, The Homeland Security Act of 2002 (HSA), and Intelligence Reform
and Terrorism Prevention Act of 2004 (IRTPA) were designed to remove the domestic statutory
barriers and enhance the USIC-wide framework for information sharing. Additionally, under
IRTPA the Director of National Intelligence (DNI) was given authority and responsibility to
ensure information flowed throughout the USIC.17
The capacity for USIC information sharing was upheld in a White House review of the
2009 Christmas day bombing attempt. The report stated, “Though all of that information was
available to all-source analysts at the CIA and the National Counterterrorism Center (NCTC)
17
108th Congress, "Intelligence Reform and Terrorism Prevention Act of 2004" (December 17, 2004),
http://www.gpo.gov/fdsys/pkg/PLAW-108publ458/pdf/PLAW-108publ458.pdf (accessed November 11, 2014), 8.
9
prior to the attempted attack, the dots were never connected, and as a result, the problem appears
to be more about a component failure to ‘connect the dots,’ rather than a lack of information
sharing.”18
This is not a ringing endorsement of the analytical skills of the USIC, but it does have
the silver lining that information did flow as required however restricted it may have been. The
report further details the issues the USIC faces with the large volume of information that it
collects daily and the overwhelming task of attempting to sort through the information to make
the best assessments possible. Information sharing among all the various components of the
USIC has created a situation where, as the ODNI stated, “Terabytes of foreign intelligence
information come in each day, vastly exceeding the entire text holdings of the Library of
Congress, which is estimated at 10 terabytes.”19
“Big data” is, and will remain, one of the central
issues for the USIC. The accumulation of data will necessitate the consolidation of intelligence
databases and new information systems capable of searching and correlating data points in order
to improve the chance that analysis will make the necessary connections.
The flip side to the praise the USIC has received in its efforts to share information
between the various partners, regardless of the overwhelming task of sorting through it all, is the
failure of the FBI to share information in its possession regarding Nidal Hassan leading up to the
2009 Fort Hood shootings. As the FBI’s own internal report on the matter states, “The FBI did
not share the Hassan information with any DOD employees other than…” those assigned to the
FBI task force in San Diego.20
The issue of information sharing, while improving USIC-wide,
appears to remain a challenge at the FBI in spite of the efforts of the FBI’s JTTF program.
18
Office of the Press Secretary, "White House Review Summary Regarding 12/25/2009 Attempted Terrorist Attack,"
The White House (January 7, 2010), http://www.whitehouse.gov/the-press-office/
white-house-review-summary-regarding-12252009-attempted-terrorist-attack (accessed November 28, 2014). 19
Office of the Director of National Intelligence, "Questions & Answers on the Intelligence Community Post 9/11,"
Homeland Security Digital Library (2010), https://www.hsdl.org/?view&did=21398 (accessed November 11, 2014),
3. 20
William H. Webster et al., "Final Report of the William H. Webster Commission on The Federal Bureau of
10
USIC-Policymaker Interaction
Intelligence is consumer driven. The entire USIC exists to provide information and
analysis to those who make decisions. The hope of the USIC is that their work will help guide
those decisions in the direction that is best for the nation without regard to what individual
analysts and senior intelligence officers think that direction should be. One problem with that
view is that policy makers know what decisions they want to make before they receive the
USIC’s analysis. Intelligence, to them, is often a tool to support their political (as opposed to
policy) efforts and derail their political opponents’ plans.21
As the ultimate decision makers, they
must know the direction in which they want the nation to go, but they must not allow party
platform, personal desires, or other political excuses to guide and shape their decisions. The
vision of the potential future course of events that the USIC provides them should be their guide.
Sticking with these political biases can cause policy makers to push the USIC for intelligence
that only fits their view point or ignoring the USIC entirely. Policy makers decide what they are
willing to fund, who will do it, where it will be done, to some extent how it will be done, and for
how long. This makes the relationship between the two sides very lopsided and can lead to a very
adversarial approach to intelligence-reform legislation.
The policy makers know what they want from the USIC, but they do not necessarily
understand what goes into creating those products. The President and his staff only have the
intelligence experience they bring with them into office due a lack of formal and congressionally
mandated intelligence community training for senior policy makers. This can leave a lack of
understanding of what the USIC brings to the table and the context in which policy makers
Investigation, Counterterrorism Intelligence, and the Events at Fort Hood, Texas on November 5, 2009," The
Federal Bureau of Investigation (2012), http://www.fbi.gov/news/pressrel/press-releases/
final-report-of-the-william-h.-webster-commission (accessed November 11, 2014), 73. 21
Richard K. Betts, Enemies of Intelligence: Knowledge & Power in American National Security (New York:
Columbia University Press, 2007), 66-71.
11
should approach and use intelligence. The USIC knows its craft better than anyone in the world,
but it does not know what the leadership of the nation wants as an end game for all situations.
This disconnect is fundamental to the relationship. The concept of politicization is the proverbial
kryptonite to a USIC that fears having its products tainted by it. Therefore, the USIC stays out of
politics as much as possible to avoid the calls of bending analysis to the political whims of the
current governmental leaders.22
As long as the USIC is afraid to become involved in the
intelligence-policy process, intelligence reform will be led by those with a lesser understanding
of the USIC.
Duplication of Effort
“The Director of National Intelligence shall ensure the elimination of waste and
unnecessary duplication within the intelligence community.”23
As Erwin notes the DNI has
dedicated more time to increasing the USIC’s information-sharing capability and
counterterrorism rather than this statutory requirement to reduce redundancy.24
Tactical efforts
such as counterterrorism, by their nature, require some degree of redundancy to ensure that the
sheer volume of threat reporting is covered.25
At other times, duplicative tactical-level analysis
can simply overtask groups and waste time and resources. One such situation occurs when there
are multiple naval battle groups or independent vessels operating in the same geographic region.
Logically, there should be a single organization that is responsible for the analysis for the region,
but that is not the case in many instances. Often each battle group undertakes the burden of
producing daily analysis of all potential threats in a region independent of any other entity. This
22
Ibid., 74. 23
108th Congress, "Intelligence Reform and Terrorism Prevention Act of 2004," Title I, Subtitle A, Sec 102A(f)(5). 24
U.S. Library of Congress, Congressional Research Service, Intelligence Issues for Congress, by Marshall C.
Erwin, CRS Report R42061 (Washington, DC: Office of Congressional Information and Publishing, April 23, 2013),
4. 25
Office of the Press Secretary, "White House Review Summary Regarding 12/25/2009 Attempted Terrorist Attack."
12
author experienced this waste first hand and saw what a detriment it was to the overall efficiency
and effectiveness of the intelligence capabilities of the region. One solution that a senior Navy
intelligence officer put into practice was federating the intelligence burden based of the inherent
mission and talents of each element available in the region. Amphibious groups were responsible
for tracking coastal activities; air assets were responsible for tracking threat air targets; etc. It
spread the burden of massive analysis across the entire fleet and reserved the final fusion of all
products at the fleet level ensuring that all areas were covered and all commanders were
provided the same analytical picture.
As the DNI noted, at the strategic level, redundancy in analysis can provide a check-and-
balance system against inherent biases of individual analysts and organizations.26
At a certain
point, however, it is simply a waste of analytical time and resources to have every organization
looking at the same problem set. ISIS is one such current example of analytical over-focus.
Every federal law enforcement agency is utilizing their intelligence assets to assess the potential
threat ISIS poses to the homeland. Additionally, US Central Command’s intelligence assets (as
well as all of their subordinate elements), Defense Intelligence Agency (DIA), CIA, and US
European Command are all assessing ISIS for potential threats. As the DNI noted, additional
analysis from different organizations can help curb bias, but having essentially every element of
the USIC focused on a single problem that has not yet demonstrated an ability to strike heavily at
or even reach the US is a waste of resources.
26
Office of the Director of National Intelligence, "Questions & Answers on the Intelligence Community Post 9/11,"
The Atlantic (July 19, 2010), http://cdn.theatlantic.com/static/mt/assets/politics/question_and_answer_ic.pdf
(accessed November 28, 2014), 1.
13
Budgetary Concerns
After the Cold War, the USIC was reduced by 23% throughout the 1990s.27
Since 9/11,
the budget of the USIC nearly doubled that of the height of the Cold War.28
However,
sequestration is now the law of the land and will require a 7% budget cut to the USIC. This will
mandate reduced manning, system updates, collection capability, and analytical training. It took
10 years to generate the capacity that is now available within the USIC to combat terror
organizations, and if that capability is again decimated through budget reductions our nation will
once again be open to anther intelligence failure such as the one that led to 9/11.
Under sequestration, the USIC budget has been significantly reduced $75.4 billion in
FY12 to a requested budget of $67 billion for FY15.29
Part of the problem is that the USIC
budget is it is split into two components: the National Intelligence Program (NIP) and the
Military Intelligence Program (MIP). The DNI requests the NIP and the DOD requests the MIP
in addition to defense appropriations. The intention of the NIP is to focus the nonmilitary
intelligence community efforts on strategic level analysis and decision maker support. The
problem is that 90% of the NIP goes to support DOD controlled programs.30
With the continued
threat of sequestration cuts to the overall federal budget, the DOD has found a method to avoid
some of the cuts by having the NIP fund a large portion of their intelligence programs. The
purpose of the USIC is not solely to support military efforts. The USIC has a war component, but
the overall mission is to support all decision makers to ensure the safety and security of the US
27
Senate Select Committee for Intelligence, "Current and Projected National Security Threats to the United States
(Video)," United States Senate (March 12, 2013),
http://www.senate.gov/isvp/?comm=intel&type=live&filename=intel031213&stt=22:25&dur=135: (accessed
November 13, 2014), 47:08. 28
Erwin, Intelligence Issues for Congress, 4. 29
Steven Aftergood, "Intelligence Budget Data," Federation of American Scientists (n.d.), http://fas.org/irp/budget/
(accessed November 28, 2014). 30
U.S. Library of Congress, Congressional Research Service, Intelligence Spending and Appropriations: Issues for
Congress, by Marshall C. Erwin and Amy Belasco, CRS Report R42061 (Washington, DC: Office of Congressional
Information and Publishing, September 18, 2013), 11.
14
and its citizens. Statutory changes must be made to ensure the intelligence budget goes where it
is needed and all parties are accountable.
Post 9/11 Reforms
Since 9/11, there have been three main acts passed by Congress in an attempt to correct
the structural and procedural issues that they believe lead to the attacks. The Patriot Act was
designed to provide the USIC and LE with broader authority and more tools to combat terrorism
both domestically and abroad. The Homeland Security Act (HSA) was designed to change the
structure of the domestic LE and intelligence agencies to provide for greater coordination and
consolidated oversight. The Intelligence Reform and Terrorism Prevention Act (IRTPA) was the
capstone structural change following the 9/11 and Iraq weapons of mass destruction (WMD)
investigations. The following sections will discuss these acts in greater detail.
USA Patriot Act
Following the 9/11 attacks, Congress accused the USIC of a lack of coordination and
information sharing, which it asserted had directly led to the tragedy of 9/11. To ensure that
another attack of this nature would not occur due to the LE and USIC’s ability to gather and
share required information, Congress passed the Patriot Act, which eased restrictions on
collection of personal information communications in domestic criminal cases and foreign
intelligence operations and eliminated the statutory barriers which limited information sharing
within the USIC.31
These expanded authorities initiated a debate regarding the need to protect the
civil liberties enjoyed in the US and the requirement to conduct thorough national-security
investigations.32
31
107th Congress, "USA Patriot Act of 2001." 32
U.S. Library of Congress, Congressional Research Service, Government Collection of Private Information:
Background and Issues Related to the USA PATRIOT Act Reauthorization, by Anna C. Henning, Elizabeth B. Bazan,
Charles Doyle, and Edward C. Liu, CRS Report R40980 (Washington, DC: Office of Congressional Information and
15
The First and Fourth Amendment issues with the Patriot Act continue to be of serious
concern. In particular, this includes the fear of a government restriction on First Amendment
rights stemming from the collection of private information or a stifling of public discussions, and
the non-disclosure requirements that are attached to LE orders for business records.33
The Fourth
Amendment concerns stem from the issue of collection of communication records without a
warrant.34
All of these issues are of valid concern to the public and continue to lead policymakers
to question whether the Patriot Act is of enough utility to trump these concerns.
Homeland Security Act
The HSA was enacted following the 9/11 attacks and established the DHS as an executive
branch department. The mission of DHS was to prevent another terrorist act in the US. To that
end, multiple agencies were consolidated under the DHS umbrella, including US Customs and
Border Protection (CBP), Federal Emergency Management Agency (FEMA), US Immigration
and Customs Enforcement (ICE), Transportation Security Administration (TSA), US Coast
Guard (USCG), and Secret Service (USSS).35
Originally, many called for the FBI’s placement in
DHS, but those efforts did not come to fruition. Further, the HSA tasks DHS with the mission of
preventing further terrorist acts within the US, but the Attorney General assigned primary
authority to investigate and prosecute terror cases to the FBI. Any case that is started with a DHS
agency that is found to have ties to terrorist must be turned over to the FBI as the lead agency.36
The original intention of the HSA was to consolidate the agencies responsible for the
protection of the homeland and provide for a more streamlined system. The DHS continues to
Publishing, March 2, 2010), 1. 33
Ibid., 3-4. 34
Ibid., 2-3. 35
107th Congress, "Homeland Security Act of 2002" (November 25, 2002),
http://www.dhs.gov/xlibrary/assets/hr_5005_enr.pdf (accessed November 11, 2014). 36
"28 CFR 0.85 - General Functions," (l).
16
have issues with coordination and information-sharing with agencies within and outside the
department. The issues that brought about the need for the HSA continue.
Intelligence Reform and Terrorism Prevention Act of 2004
The IRTPA was enacted in response to the 9/11 Commission report and the intelligence
failure regarding WMDs in Iraq. The IRTPA created the position of the DNI, designated DHS as
responsible for preflight watch list screenings, and established the NCTC.37
The DNI position was created in response to the 9/11 Commission’s assessment that the
Director of Central Intelligence (DCI) could not adequately manage the USIC while also leading
the CIA. Therefore, the DNI position was created in an effort to separate the nominal head of the
USIC from any one agency to foster impartiality towards all agencies’ analysis.38
The IRTPA was a good start at reorganizing the USIC in order to consolidate and
strengthen the entities responsible for protecting our country, but the DNI’s position remains
weak without any true control over the USIC. The elements of the USIC remain disparate
agencies answering to multiple masters, and the DOD maintains control over the bulk of
intelligence agencies, allowing for the dominance of military matters in the larger intelligence
effort.
The National and Defense Clandestine Services
On October 13, 2005, DNI John Negroponte and Director of the CIA Porter Goss
announced the creation of the NCS within the CIA. The NCS was created to bring HUMINT
operations under a single umbrella. The NCS is responsible for coordination, de-confliction, and
37
108th Congress, "Intelligence Reform and Terrorism Prevention Act of 2004." 38
National Commission on Terrorist Attacks Upon the United States, "The 9/11 Commission Report," National
Commission on Terrorist Attacks Upon the United States (2004), http://www.9-
11commission.gov/report/911Report.pdf (accessed November 11, 2014), 399.
17
assessment of all HUMINT operations across the USIC.39
On April 23, 2012, the Washington Post leaked the DOD’s plans to create a similar entity,
the DCS, under the DIA. The article stated that the DCS would work closely with the NCS on all
HUMINT matters.40
This consolidation and promise of coordination will hopefully increase the
ability of the USIC to obtain verifiable HUMINT, increase the professional capabilities of all
HUMINT professionals, and ensure validated targets are not tasked by multiple organizations for
collection.
Prior Proposed Reforms
For decades, there have been calls to reorganize the USIC into a more modern and
focused entity. Many of these plans have called for centralized control by one entity or another
based on the proposer’s experience and personal desires. One item these proposals have in
common is recognition that the current Cold War structure of the USIC does not fully meet the
needs of the current threat environment or budget constraints. The following sections will discuss
three prior proposals for setting the USIC on a new path for a new era.
The Lederman Proposal
In 2005, Gordon Nathaniel Lederman wrote an article discussing the history of reforms
within the USIC and the future direction that must be taken in order to ensure the integrity and
relevance of the community in the future. In his vision, the DNI must take a strong role in
controlling and directing the USIC backed by a supportive President.41
Specifically, he called for
the DNI to develop common security requirements for the community, common and modern
39
Central Intelligence Agency, "Establishment of the National Clandestine Service," Central Intelligence Agency
(October 13, 2005), https://www.cia.gov/news-information/press-releases-statements/
press-release-archive-2005/pr10132005.html (accessed November 11, 2014). 40
Miller, "Pentagon establishes Defense Clandestine Service, new espionage unit." 41
Gordon Nathaniel Lederman, "Restructuring the Intelligence Community," in The Future of American
Intelligence, ed. Peter Berkowitz, (Stanford, CA: Hoover Institution Press, 2005), 100.
18
information systems, and personnel procedures and policies to transform the community into a
network. The ultimate end state of Lederman’s vision is not a community at all but a
transformation into a unified network where the heads of each agency report to the DNI and
through him to the president.42
Further he viewed the way forward for a US Intelligence Network
as the National Intelligence Centers.43
Lederman understood that the USIC is more than simply
collection and analysis. It must be utilized to formulate and inform diplomacy and economic
programs.44
His plan calls for a more powerful DNI who is able to control personnel actions,
policies, operations, and provide direction and guidance throughout the 17 agencies that for the
USIC without any real structural changes to the existing organization. This plan is likely the
simplest to implement as it only requires the President to entrust more authority into an existing
position which already has nominal control over the noted areas. The real issues exist where the
rubber meets the road: How likely are the various agency heads to allow an outsider control over
their personnel and programs, especially the DOD? This proposal requires the 17 agencies,
including the 4 military services, to subordinate their plans to those put forth by the DNI.
The Raschke Proposal
Diana Raschke provided an innovative set of recommendations for the future of the USIC
in 2008. Her view of the current state of the USIC is that it is a hold-over structure from the Cold
War where the US built organizations and established programs to match and compete with the
USSR without regard for the future or other concerns in the world. This created a community
comprised of specialists who only focus on their specific “INT” within their agency, with little
coordination or information sharing. Further, she states that within agencies, they keep a close
hold on their data and analysis, only releasing redacted database access or tearlines to their
42
Ibid., 101. 43
Ibid., 101. 44
Ibid., 102.
19
products, promoting a sense of distrust within the community.45
If we are all members of the
same community, tasked with the same mission, and possess the same clearance, why do we not
have access to the same information and analysis? Compartmentalization has its uses, but when
propriety approaches become the norm, the USIC and our national security suffer. Radschke’s
solution to the problem is a complete reorganization of the USIC into two groups: collectors and
analysts. In the center of this new system a technical core of collection capabilities and personnel
would serve an analytical corps as their sole customer. With this technical core all processing and
dissemination activities would be centralized thereby significantly reducing costs and redundant
processes. The analytical corps of this new intelligence apparatus would be organized by
mission, both geographical and functional. There would exist, as currently does in many major
agencies, geographically focused analytical groups as well as those focused on specific mission
areas such as cyber threats or threat finance. This reorganization would be dissimilar to previous
reshufflings that have focused more on efficiency for efficiency’s sake or to appease Congress.
This plan seeks to remake the community based on the current future threats to this nation.
Raschke claims that the current IC structure is not prepared for the current asymmetric threat,
and that her plan will provide a much-needed nimbleness that the community currently lacks.
The most innovative and potentially game-changing component of her plan is the removal of the
need-to-know requirement for intelligence for those possessing the required clearance. In her
plan, any analyst with the proper clearance would have access to all available information on any
target.46
This single change would revolutionize the way the community creates analytical
products. All analysts, regardless of parent organization, would have the capability to produce
more complete analytic products using information fused from many sources.
45
Diana Raschke, "Asymmetric Warfare Requires Intelligence Community Reorganization," AFCEA (April 2008),
http://www.afcea.org/content/?q=node/1553 (accessed October 31, 2014). 46
Ibid.
20
The Kindsvater Proposal
Larry Kindsvater stated in his 2007 proposal that the USIC, despite numerous calls for
fundamental change, is essentially the same as it was in 1947, focusing on collection rather than
the analytical and support requirements of national security. He believed that the greatest issue
within the community was the focus on type of collection rather than on supporting any
particular analytical mission. Therefore, his proposal seeks to wrest control of the USIC away
from a primarily DOD-focused effort and return power and authority to the CIA. He envisions
the DCI as the head of the USIC with mission centers under his control. Within these mission
centers, representatives of the various collection agencies would work with expert analysts in
order to support the specific mission of the center. Each center would report directly back to the
DCI and not to any other agency. Further, Kindsvater proposed that each USIC agency head be
appointed by and report directly to the DCI and not to the DOD or other department heads as the
community currently works.47
As a career CIA officer, he has an obvious and understandable
CIA bias, but his mission-center concept is in line with others’ proposals and provides the
community with a flexible and powerful system to continue to combat the current and future
threats the US faces.
Challenges to Prior Proposals
As Kindsvater noted in 2007, every attempt to place a functional figure with real and
substantial community-wide authority at the head of the USIC has been ignored.48
Committee
after committee and expert after expert has trotted out their solution to the obvious issues within
the community, but all of them have been ignored. Why will the President, DNI, DCI, DOD, and
47
Larry C. Kindsvater, "The Need to Reorganize the Intelligence Community," Central Intelligence Agency (May 8,
2007), https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol47no1/html/v47i1a03p.htm
(accessed October 31, 2014), 34-7. 48
Ibid., 34.
21
Congress not act to fix the systematic issues present in the USIC? Richard Best stated that one of
the largest issues in instituting any significant changes to the USIC is the predominance of the
DOD in community matters.49
Since the DOD receives 90% of the entire intelligence budget and
reform efforts would prove problematic without revamping the way the military engages as part
of the USIC.50
Further, the House and Senate Armed Services Committees would lose significant
authority over intelligence activities due to this type of reorganization.51
These three groups
provide a significant and weighty roadblock to any meaningful change. Another significant
community commentator, Richard Betts, stated in 2004 that any attempt to remove the
intelligence agencies from the DOD would result in a political bloodbath in Congress, the DOD,
and White House.52
Simply allowing the situation to continue, however, is not a solution either.
There must come a time when Congress and the President recognize that the USIC cannot
continue in its current configuration and hope to provide the required analysis and support to
national security. Hopefully, that time will come prior to another significant failure and loss of
life.
Recommendations
Intelligence failures have happened and will continue to happen in the future. The goal of
any intelligence reform should be to minimize those failures in frequency and scope, not to
eliminate them entirely—an objective that is simply impossible to achieve. With this
understanding, the following USIC structural realignment recommendation is based on the
premises that the USIC knows how to train analysts and collectors to hold themselves and those
49
U.S. Library of Congress, Congressional Research Service, Intelligence Community Reorganization: Potential
Effects on DOD Intelligence Agencies, by Richard A. Best Jr., CRS Report RL32515 (Washington, DC: Office of
Congressional Information and Publishing, December 21, 2004), 10. 50
Erwin, Intelligence Spending and Appropriations: Issues for Congress, 11. 51
Best, Intelligence Community Reorganization: Potential Effects on DOD Intelligence Agencies, 9-10. 52
Richard K. Betts, "The New Politics of Intelligence: Will Reforms Work This Time?" Foreign Affairs 83,
(May/June 2004), pages 2-8., 6.
22
around them to the highest professional standards while avoiding all of the potential cognitive
biases.
The “spread” of the USIC across 17 agencies in 7 departments without a clear leader in
charge of budget and direct management of the community will continue to lead to infighting and
a failure to coordinate efforts and share information and analysis. The following sections of this
work will outline, in broad strokes, a plan to create a new Executive Branch Department, the
Department of Information Management (DIM), to consolidate intelligence operations under a
single leader capable of coordinating and directing the actions of the USIC.
Secretary of Information Management
The first and most fundamental aspect of this proposal is that the current Office of the
Director of National Intelligence will transition to the Secretary of Information Management
(SIM) creating a single cabinet member in charge of the entire USIC, including budgetary
matters. This will give the SIM the authority to direct the USIC in a way that the current DNI
does not possess. Additionally, the removal of the various intelligence agencies from their home
departments will reduce the burden on the agencies in terms of reporting and support since they
will have a single chain of command.
Department of Information Management
The DIM, under the leadership of the SIM, will be a unique Department in the Executive
Branch where members of the other departments will transfer and work in the various agencies
for set periods of time or entire careers. The first set of agencies that will be brought under the
DIM will be the DOD USIC agencies: DIA, National Geospatial-Intelligence Agency (NGA),
National Reconnaissance Office (NRO), and National Security Agency (NSA). The obvious
problem with bringing the service-element agencies into the new construct, at least initially, is
23
that it would be extraordinarily difficult to accomplish without an entire overhaul of the DOD
and USCG. Nonetheless, the transfer of the above-named agencies will place the major elements
of defense intelligence under the authority of the DIM. The service members who support these
agencies for their designated tours will continue to do so, but it will be considered an inter-
agency tour instead of the current designation as a joint tour.
The DCS program will be removed from DIA and brought entirely into the CIA. The
CIA’s HUMINT mission will continue as currently executed with the expansion to include
defense HUMINT requirements. This consolidation will provide a single agency in charge of all
HUMINT operations worldwide, minimizing duplication of sources and mission sets.
Similar to Raschke’s 2008 plan, the various collection agencies will be collected under
the DIM and provide direct support to the analysts. Collection priorities will be managed and
tasked from within the DIM to ensure collection platforms and resources are properly managed
to meet national-security support requirements.
National Analysis Directorate
The CIA’s Directorate of Analysis (DI) will be removed from the agency and
consolidated with DIA, DOS Bureau of Intelligence and Research (INR), OIC, OIA, I&A, and
ONSI. The new agency will be named the National Analysis Directorate (NAD), and it will be in
charge of all analysis in support of policy, defense, and national security matters. This
consolidation will ensure a consistency of analysis and reduce much of the redundancy in the
components scattered throughout the USIC.
Within the NAD, centers of excellence focusing on geographic regions (aligned with
DOD Combatant Commands [COCOMS]) and functional areas (cyber, threat finance,
transportation, and space) will provide the specific analytical support to decision makers and
24
military operations. This consolidation will provide the entire US government with a clearer
analytical picture of the threat environment while removing the agency biases and internal
political games that currently plague national-level analysis.
One final item also in line with Raschke’s 2008 proposal is the removal of the “need to
know” requirement for intelligence. All analysts who have the required level of security
clearance will have access to all intelligence at that level. As previously discussed, this flattening
of the field will remove a large portion of the “my rice bowl” mentality that currently pervades
the community. Information, intelligence, and analysis should not belong to any one person,
group, or agency. It must be available to all in the community to ensure that all fusion products
are as complete as possible, providing the best assessments to decision makers.
Federal Counterterrorism Bureau
The FBI stands as the lead agency, clearing house, and coordinating body for
counterterrorism efforts within the borders of the US. Additionally, it is tasked as the premier
criminal investigative body for the federal government. This requires the FBI’s agents to transfer
between two mentalities; reactive and proactive. Criminal cases are reactive in nature, requiring
the agents to gather evidence to identify and eventually prosecute the perpetrators. In
counterterrorism, the goal is to determine who the perpetrators will be and intervene prior to any
criminal act. These two skill sets are often contradictory in nature, and it does not serve the
national good to have individuals bounce between each instead of mastering one. Current FBI
agents are the premier criminal investigative professionals in the world. They should be allowed
to focus solely on criminal matters to further deter those types of crimes and foster an elite cadre
of investigators.
25
A new agency within the DIM must be created to further the nation’s counterterrorism
efforts. This agency would utilize the intelligence provided by the other DIM agencies to track
and deter terrorist acts within the US and have the LE authority to collect evidence for a
prosecutorial case against those individuals. The current FBI Counterterrorism Divisions will be
removed from the FBI and used as the basis for this new agency. The removal of these assets
from the FBI’s current mission would allow the FBI to focus exclusively on criminal matters and
the new agency, the Federal Counterterrorism Bureau (FCB), to focus on the protection of this
nation from current and future terrorist threats. The FCB would carryover the JTTF program
ensuring that the outstanding efforts made by these groups would continue in the future. A
greater cross assignment of agents and officers from other federal investigative and regulatory
agencies must be required as well. To allow the FCB to serve as the counterterrorism agency, the
authorities granted to it would be expanded to include foreign operations as well. Additionally,
the intelligence agencies of the DIM would provide the analytical support necessary to create a
true force against domestic and international terrorism. The FCB should become the premier and
one-stop shop for all matters relating to domestic and international counterterrorism. The
placement of the FCB within the DIM would ensure that the congressionally mandated mission
of countering terrorist threats against the homeland would be upheld.53
As NCTC is the premier counterterrorism watch and analysis organization and is a
component of the ODNI.54
It is only logical that it should continue its mission within the DIM in
support of the FCB’s mission to protect the US from terror attacks.
53
107th Congress, "Homeland Security Act of 2002," sec. 101.b.1.A-G. 54
Office of the Director of National Intelligence, “Overview,” National Counterterrorism Center (n.d.),
http://www.nctc.gov/overview.html (accessed December 4, 2014).
26
Conclusion
The USIC is a powerful and vital organization that provides support to every level of
government involved in national security. It has served this nation well over the past 67 years
and has the potential to continue doing so. However, the threat environment has changed
dramatically since the founding of the community. The USSR no longer exists and there are no
super-powers seeking to destroy us at every turn. The current and future threat picture is
comprised of small, flexible groups and individuals seeking to conduct asymmetric warfare
against the US and its allies. Regional powers and rogue states, along with international criminal
organizations, round out the list of adversaries. They seek to destabilize the current world order
in order to further their own agendas, and the USIC is not structured to combat this threat. It has
done well over the last 12 years and kept American citizens safe, but the dynamic nature of the
threat demands an equally dynamic and flexible intelligence apparatus. The USIC must change
to meet and defeat the enemy, and those in charge must not only allow it but encourage it.
27
Bibliography
107th Congress. "Homeland Security Act of 2002" (November 25, 2002).
http://www.dhs.gov/xlibrary/assets/hr_5005_enr.pdf (accessed November 11, 2014).
—. "United and Strengthening America by Providing Appropriate Tools Required to Intercept
and Obstruct Terrorism (USA Patriot Act )Act of 2001" (October 26, 2001).
http://www.gpo.gov/fdsys/pkg/PLAW-107publ56/pdf/PLAW-107publ56.pdf (accessed
November 11, 2014).
108th Congress. "Intelligence Reform and Terrorism Prevention Act of 2004" (December 17,
2004). http://www.gpo.gov/fdsys/pkg/PLAW-108publ458/pdf/PLAW-108publ458.pdf
(accessed November 11, 2014).
"28 CFR 0.85 - General Functions" (July 1, 2010). http://www.gpo.gov/fdsys/pkg/
CFR-2011-title28-vol1/pdf/CFR-2011-title28-vol1-sec0-85.pdf (accessed November 11,
2014).
Aftergood, Steven. "Department of Energy: Office of Intelligence." Federation of American
Scientists (May 12, 2009). http://www.fas.org/irp/agency/doe (accessed November 11,
2014).
—. "Intelligence Budget Data." Federation of American Scientists (n.d.).
http://fas.org/irp/budget/ (accessed November 28, 2014).
Betts, Richard K. Enemies of Intelligence: Knowledge & Power in American National Security.
New York: Columbia University Press, 2007.
—. "The New Politics of Intelligence: Will Reforms Work This Time?" Foreign Affairs 83,
(May/June 2004): 2-8.
Burch, James. "The Domestic Intelligence Gap: Progress Since 9/11?" Homeland Security
Affairs (2008). http://www.hsaj.org/?special:fullarticle=0.2.2 (accessed October 31,
2014).
Central Intelligence Agency. "Establishment of the National Clandestine Service." Central
Intelligence Agency (October 13, 2005). https://www.cia.gov/news-information/
press-releases-statements/press-release-archive-2005/pr10132005.html (accessed
November 11, 2014).
—. “Paramilitary Operations Officer/Specialized Skills Officer.” Central Intelligence Agency
(April 21, 2007). https://www.cia.gov/careers/opportunities/clandestine/
paramilitary-operations-officer-specialized-skills-officer.html (accessed December 4, 2014).
28
Chappell, Bill. "President and Congress Extend FISA Wiretapping Act To 2017 [Updated]."
NPR (December 28, 2012). http://www.npr.org/blogs/thetwo-way/2012/12/28/
168220266/congress-extends-fisa-wiretapping-act-to-2017-awaits-obamas-signature
(accessed November 11, 2014).
Deutch, John. "The Intelligence Community." Federation of American Scientists (n.d.).
http://www.fas.org/irp/offdocs/npr/vp96_intell.htm (accessed November 11, 2014).
Eland, Ivan. "The Failed Intelligence Reorganization Needs Reorganizing." The Independent
Institute (May 8, 2006). http://www.independent.org/newsroom/article.asp?id=1720
(accessed October 31, 2014).
Houck, Caroline. "Barack Obama on surveillance, then and now." Tampa Bay Times:
PolitiFact.com (June 13, 2013). http://www.politifact.com/
truth-o-meter/article/2013/jun/13/barack-obama-surveillance-then-and-now/ (accessed
November 11, 2014).
Kindsvater, Larry C. "The Need to Reorganize the Intelligence Community." Central
Intelligence Agency (May 8, 2007). https://www.cia.gov/library/
center-for-the-study-of-intelligence/kent-csi/vol47no1/html/v47i1a03p.htm (accessed
October 31, 2014).
Lederman, Gordon Nathaniel. "Restructuring the Intelligence Community." in The Future of
American Intelligence, edited by Peter Berkowitz, 65-102. Stanford, CA: Hoover
Institution Press, 2005.
Lowenthal, Mark M. Intelligence: From Secrets to Policy, Fourth Edition. Washington, D.C.:
CQ Press, 2009.
Miller, Greg. "Pentagon establishes Defense Clandestine Service, new espionage unit."
Washington Post (April 23, 2012). http://www.washingtonpost.com/world/
national-security/pentagon-creates-new-espionage-unit/2012/04/23/
gIQA9R7DcT_story.html (accessed November 11, 2014).
National Commission on Terrorist Attacks Upon the United States. "The 9/11 Commission
Report." National Commission on Terrorist Attacks Upon the United States (2004).
http://www.9-11commission.gov/report/911Report.pdf (accessed November 11, 2014).
Office of the Director of National Intelligence. “Members of the IC.” Office of the Director of
National Intelligence (n.d.). http://www.dni.gov/index.php/intelligence-community/
members-of-the-ic (accessed November 11, 2014).
29
—. “Overview.” National Counterterrorism Center (n.d.). http://www.nctc.gov/overview.html
(accessed December 4, 2014).
—. "Questions & Answers on the Intelligence Community Post 9/11." Homeland Security
Digital Library (2010). https://www.hsdl.org/?view&did=21398 (accessed November 11,
2014).
—. "Questions & Answers on the Intelligence Community Post 9/11." The Atlantic (July 19,
2010). http://cdn.theatlantic.com/static/mt/assets/politics/question_and_answer_ic.pdf
(accessed November 28, 2014).
Office of the Press Secretary. "White House Review Summary Regarding 12/25/2009 Attempted
Terrorist Attack." The White House (January 7, 2010). http://www.whitehouse.gov/
the-press-office/
white-house-review-summary-regarding-12252009-attempted-terrorist-attack (accessed
November 28, 2014).
Pillar, Paul R. Intelligence and U.S. Foreign Policy (New York: Columbia University Press,
2011).
Raschke, Diana. "Asymmetric Warfare Requires Intelligence Community Reorganization."
AFCEA (April 2008). http://www.afcea.org/content/?q=node/1553 (accessed October 31,
2014).
Senate Select Committee for Intelligence. "Current and Projected National Security Threats to
the United States (Video)." United States Senate (March 12, 2013).
http://www.senate.gov/isvp/
?comm=intel&type=live&filename=intel031213&stt=22:25&dur=135: (accessed
November 13, 2014).
The Federal Bureau of Investigation. "Joint Terrorism Task Forces." The Federal Bureau of
Investigation (n.d.). http://www.fbi.gov/about-us/investigate/terrorism/terrorism_jttfs
(accessed November 11, 2014).
The President of the United States of America. "Executive Order 12333--United States
Intelligence Activities." Federation of American Scientists (December 4, 1981).
https://www.fas.org/irp/offdocs/eo/eo-12333-2008.pdf (accessed November 11, 2014).
U.S. Department of the Treasury. "About: Terrorism and Financial Intelligence, Office of
Intelligence and Analysis (OIA)." U.S. Department of the Treasury (August 16, 2012).
http://www.treasury.gov/about/organizational-structure/offices/Pages/
Office-of-Intelligence-Analysis.aspx (accessed November 11, 2014).
30
U.S. Library of Congress. Congressional Research Service. Government Collection of Private
Information: Background and Issues Related to the USA PATRIOT Act Reauthorization,
by Anna C. Henning, Elizabeth B. Bazan, Charles Doyle, and Edward C. Liu. CRS
Report R40980. Washington, DC: Office of Congressional Information and Publishing,
March 2, 2010.
—. Congressional Research Service. Intelligence Community Reorganization: Potential Effects
on DOD Intelligence Agencies, by Richard A. Best Jr. CRS Report RL32515.
Washington, DC: Office of Congressional Information and Publishing, December 21,
2004.
—. Congressional Research Service. Intelligence Issues for Congress, by Marshall C. Erwin.
CRS Report R42061. Washington, DC: Office of Congressional Information and
Publishing, April 23, 2013.
—. Congressional Research Service. Intelligence Spending and Appropriations: Issues for
Congress, by Marshall C. Erwin and Amy Belasco. CRS Report R42061. Washington,
DC: Office of Congressional Information and Publishing, September 18, 2013.
—. Congressional Research Service. Proposals for Intelligence Reorganization, 1949-2004, by
Richard A. Best Jr. CRS Report RL32500. Washington, DC: Office of Congressional
Information and Publishing, September 24, 2004.
United States Drug Enforcement Administration. "Intelligence." United States Drug
Enforcement Administration (n.d.). http://www.justice.gov/dea/ops/intel.shtml (accessed
November 11, 2014).
William H. Webster et al. "Final Report of the William H. Webster Commission on The Federal
Bureau of Investigation, Counterterrorism Intelligence, and the Events at Fort Hood,
Texas on November 5, 2009." The Federal Bureau of Investigation (2012).
http://www.fbi.gov/news/pressrel/press-releases/
final-report-of-the-william-h.-webster-commission (accessed November 11, 2014).
Zenko, Micah. “Transferring CIA Drone Strikes to the Pentagon: Policy Innovation
Memorandum No. 31.” Council on Foreign Relations (April 2013).
http://www.cfr.org/drones/transferring-cia-drone-strikes-pentagon/p30434 (accessed
December 4, 2014).