United States intelligence community oversight: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(wip)
mNo edit summary
 
(53 intermediate revisions by 5 users not shown)
Line 1: Line 1:
<!--working article combining information about the leadership and oversight of the Central Intelligence Agency-->
{{PropDel}}<br><br>
==Introductory observations, not part of the article==
{{subpages}}
The idea of having the effects of actions, and the perception of them by other countries, is not unreasonable. My concern, and there may be ways to address it, is that when another country claims "CIA" did something, the effect upon them may very well have been not from the CIA alone, but from an overall strategy of the US government. Fully recognizing that some Administrations might have had trouble with regime change in a kindergarten, there have been times when covert action, economic policy, military operations, overt propaganda, and other factors were all applying to a given situation. Vietnam, for all of the irrationality at the highest levels (If you haven't read it, I suggest [[H. R. McMaster]]'s ''Dereliction of Duty''<ref
 
name=McMaster1998>{{cite book
{{TOC|right}}
  | author = McMaster, H. R.
The fundamental decisions to do covert actions, and risky clandestine intelligence collection, are in a committee at White House level, although sometimes the decisions are made by the President and a very small number of advisors.  
  | title = Dereliction of Duty: Lyndon Johnson, Robert McNamara, the Joint Chiefs of Staff and the Lies That Led to Vietnam
  | year = 1998| publisher = Perennial}} </ref>), cannot be judged in terms of the Phoenix Program without considering what was being done by the regular military. One cannot judge its decisionmaking without looking at the controversy and manipulation of numbers by, variously, working-level CIA analysts, the Office of the Secretary of Defense, the Military Assistance Command Vietnam, and the White House. Another recommendation is Sam Adams' ''War of Numbers'', During the war in Vietnam, there were constant analytic disputes among the [[Military Assistance Command Vietnam]], the [[Office of the Secretary of Defense]], and the [[Central Intelligence Agency]]<ref
name=Adams1994>{{cite book
  | author = Adams, Sam
  | title = War of Numbers: An Intelligence Memoir
  | year = 1994  | publisher = Steerforth Press| isbn= 188364223X}} </ref>. That the intelligence organizations in the military command were more optimistic is unsurprising, and not even indicative of something being seriously wrong -- as long as there are independent intelligence organizations to cross-check. as well as a thorough reading of the Pentagon Papers. The reality, I believe, that the working level analysts at CIA had some of the most realistic assessments of the situation, but they didn't agree with the preconceptions of Johnson and McNamara any more than realistic assessments of Iraq's WMD capability agreed with Cheney, Rumsfeld, and Bush.


All I ask is that even when a country is chanting "CIA! CIA!", that perception indeed should be noted, but if there is reasonable evidence that CIA's action (or even things they didn't do) are part of a overall United States Government policy, that editors do not take the easy way out of treating CIA as the heart of all that is sinister, when they may have been "following orders". There are cases where
In principle, there is a current  requirement to notify the Congress of certain operations, although the nature of the notification varies with the sensitivity of the project. For the most sensitive, typically eight members are briefed, without staff and without being allowed to take notes. In contrast, the Executive Branch uses experts in planning the proposal.


:::Just to add one part: it may be useful to look at Johnston's work as a means of understanding, in the context of the time, why US (and Soviet, and possibly British & French) intelligence made deals with war criminals. Indeed, one might even go farther into social science literature to understand some of the tribal fear of Communism at the particular time of the deals. While it's really not directly relevant here, Ruth Benedict's ''The Chrysanthemum and the Sword'' is one example of the sort of social science data I have in mind. More complex are historical works like David Bergamini's ''Japan's Imperial Conspiracy''.  For some reason, there is more data on the Japanese societal structure on where some of the high-level war crimes fit. There are plenty on low-level Nazis, and perhaps medium-level, such as Lifton's ''The Nazi Doctors'' and (forgot the Polish author's name) ''Conversations with an Executioner'' and Sereny's ''Into That Darkness''. There is an OK autobiography by Walter Schellenberg, but I don't know of any good, specific sources on Heydrich or Ohlendorf -- at least for Ohlendorf, there's extensive trial transcript. [[User:Hcberkowitz|Howard C. Berkowitz]] ([[User talk:Hcberkowitz|talk]]) 14:44, 11 January 2008 (UTC)
This has certainly not been the case in the past, when there was no Congressional notification, indeed sometimes with senior Congressional leaders saying they did not want to know.  


===Oversight and Approval===
===Oversight and Approval===
The fundamental decisions to do covert actions, and risky clandestine intelligence collection, are in a committee at White House level, although sometimes the decisions are made by the President and a very small number of advisors. There is a requirement to notify the Congress of certain operations, although the nature of the notification varies with the sensitivity of the project. For the most sensitive, typically eight members are briefed, without staff and without being allowed to take notes -- not necessarily the best way to do it. At least one proposal is floating around, from Paul Pillar, about setting up a mechanism that would get appropriate professional staff for the most sensitive analysis. After all, the Executive Branch uses experts in planning the proposal.
While the law is a little vague, the Executive Branch holds it needs to keep Congress informed, rather than obtain its permission. Congress however, can refuse to appropriate the basic budget, and this actually is being threatened. In an opinion column, Robert Novak wrote that "CIA refusal to reveal what it knows about the Sept. 6, 2007 Israeli bombing of a facility in Syria. Only chairmen and ranking minority members of the Intelligence committees, plus members of the congressional leadership, have been briefed. Other members of Congress, including Intelligence Committee members, were excluded. The Intelligence authorization bill, passed by the House and awaiting final action in the Senate, blocks most of the CIA's funding "until each member of the Congressional Intelligence committees has been fully informed with respect to intelligence" about the Syria bombing." <ref name=Novak2007-12-26> {{citation
 
I've detailed things in the [[Classified information in the United States]], and actually for Special Access Programs rather than the Sensitive Compartmented Information (SCI) that is the category that holds the most sensitive intelligence. From a Congressional and budget standpoint, there are three general categories: one where "classified activity" shows up as a line item in the budget, one where the money is hidden but the entire relevant committees are briefed on the details, and on the most sensitive, the money is hidden and only the "Big 8" hear about it.
 
While the law is a little vague, the Executive Branch is simply keeping Congress informed, rather than asking permission. Congress however, can refuse to appropriate the basic budget, and this actually is being threatened. "CIA refusal to reveal what it knows about the Sept. 6 Israeli bombing of Syria's nuclear complex. Only chairmen and ranking minority members of the Intelligence committees, plus members of the congressional leadership, have been briefed. Other members of Congress, including Intelligence Committee members, were excluded. The Intelligence authorization bill, passed by the House and awaiting final action in the Senate, blocks most of the CIA's funding "until each member of the Congressional Intelligence committees has been fully informed with respect to intelligence" about the Syria bombing." <ref name=Novak2007-12-26> {{citation
  | title = A Rogue CIA
  | title = A Rogue CIA
  | first1 = Robert D. | last1 = Novak
  | first1 = Robert D. | last1 = Novak
Line 26: Line 16:
  | date =December 26, 2007
  | date =December 26, 2007
  | url = http://www.cnsnews.com/ViewCommentary.asp?Page=/Commentary/archive/200712/COM20071226a.html
  | url = http://www.cnsnews.com/ViewCommentary.asp?Page=/Commentary/archive/200712/COM20071226a.html
}}</ref>
}}</ref> Novak, however, did not indicate if the CIA was unilaterally withholding information, or if they were under orders from the Director of National Intelligence, National Security Council, or President.


In principle, Congress could pass, with a veto-proof supermajority, legislation to cut off funding on a specific project, which is more or less what led to Iran-Contra after Congress said that money could not be committed to that purpose. Whenever and wherever Iran-Contra is written up, this is one of those areas where the Presidential and Congressional intent is as important, constitutionally, as the covert action itself.
In principle, Congress could pass, with a veto-proof supermajority, legislation to cut off funding on a specific project, which is more or less what led to Iran-Contra after Congress passed the Boland Amendment that money could not be committed to that purpose. This is one of those areas where the Presidential and Congressional intent is as important, constitutionally, as the covert action itself.
 
====Effect of political climate on action decisions====
Budget, of course, is part of oversight. I'll give the total budget, and some indication of how it is allocated. Question: is the history of getting to a point where any budget figures were disclosed appropriate for the main article, or a side page? It is important to understand, broadly, how the money goes, to CIA as well as the larger amount that goes to the military.
Many of the covert operations, from 1945, at least through Vietnam, were based on an internal government assumption that Communism had to be stopped at all costs, including violations of human rights and national sovereignty. Whether or not this belief is now considered correct, it must be remembered, in terms of the orders given to the CIA, that it was in the minds of the policymakers that authorized actions.
What is being overseen?
====Competing Demands====
====Security classification system====
When a hot war is in progress, there are often competing demands between the needs of forces in the field and strategic intelligence. In the Korean War, for example, the pre-CIA OSO clandestine collectors' mission was a CIA activities in Asia-Pacific#Korea|battleground between the Army tactical information requirements and the need for more global information (e.g., what were the Chinese and Soviets planning?).
Widely misunderstood as a classification level or specific clearance is "Sensitive Compartmented Information" (SCI) <ref name=DCID1-7>{{cite web
  | first = Director of Central Intelligence
  | authorlink = Central Intelligence Agency
  | title = Director of Central Intelligence Directive 1/7: Security Controls on the Dissemination of Intelligence Information
  |date=June 1998
  | url = http://www.fas.org/irp/offdocs/dcid1-7.html
  | accessdate = 2000-09-30}}</ref> and "Special Access Program" (SAP)<ref name= nispom>{{cite web
  | first = US Department of Defense
  | authorlink = Department of Defense
  | title = Department of Defense Overprint to the National Industrial Security Program
  |date=February 1995
  | url = http://fas.org/sgp/library/nispom_dod_overprint.pdf
  | accessdate =  }}</ref>.
 
In fact the terms refer to methods of handling certain types of classified information that relate to specific national-security topics or programs whose existence may not be publicly acknowledged, or the sensitive nature of which requires special handling.  
 
To achieve selective separation of program information while still allowing full access to those working on the program, a separate "compartment," identified by a unique codeword (itself sometimes classified), is created for the information. This entails establishing communication channels, data storage, and work locations ([[Sensitive Compartmented Information Facility|SCIF]]—Sensitive Compartmented Information Facility), which are physically and logically separated not only from the unclassified world, but from general Department of Defense classified channels as well. Thus established, all information generated within the compartment is classified according to the general rules above. However, to emphasize that the information is compartmented, all documents are marked with both the classification level and the codeword (or sometimes the caveat "Handle via <compartment name> Channels Only").
 
For example, the NSA domestic telephone surveillance program is almost certainly designated "Handle through COMINT Channels Only", so its documentation would read, at least, TOP SECRET-CCO, probably with a special compartment within CCO, which, hypothetically, would be an arbitrary word such as ORWELL. It is presumably SCI.
 
SAPs are subdivided into three further groups <ref name=nispom />There is no public reference to whether SCI is divided in the same manner, but news reports reflecting that only the "Big 8" Members are briefed on certain intelligence activities, it may be assumed that similar rules apply for SCI. The groups are
:* Acknowledged: appears as a line item as "classified project" or the equivalent in the US budget, although details of its content are not revealed. The budget element will associate the SAP with an organization or major command, such as the Navy or Strategic Command
:* Unacknowledged: no reference in the published budget; its funding is hidden in another entry, often called the "black budget".  The appropriate Congressional committees, however, are briefed on the nature of the SAP and approve it.
:* Waived: no mention in the budget, and briefed only to the "Big 8" members of Congress: Speaker of the House, House Minority Leader, Senate Majority and Minority Leaders, and the Chairman and Ranking Minority Members of the appropriate committees.
 
Examples of compartmented topics are sensitive intelligence activities (SCI), nuclear secrets (Restricted Data), and stealth technology (SAP). One or more compartments may be created for each area, and each of these compartments may contain multiple programs or projects (''e.g.,'' a specific reconnaissance satellite, ICBM, or stealth aircraft), themselves with their own codenames.


So, it is a reasonable assumption that the NSA telephone surveillance program might be a designated a Waived SCI program, with documentation stamped TS-CCO-ORWELL.
Indirectly, this sort of conflict affects covert operations, if the tactical needs of intelligence collection have the covert operations somewhat in the dark. A good example coming from initially covert Direct Action (DA) mission was the POW rescue mission on the Son Tay prison camp. There was some intelligence indicating the POWs had been moved and the facility was empty, but the information was not confirmed and got to the strike force late. Complicating the issue were White House and Pentagon decisions that even if there were no prisoners, having the North Vietnamese know they were vulnerable to DA missions would divert their attention and resources. One could compare this with the effects, unknown to the US at the time, of the early 1942 Doolittle Raid on Japan, which did minimal damage but caused an overreaction on the Japanese side, bringing air defense back to the homeland, and then making an ill-advised attempt to extend their eastern defense line with the Battle of Midway.
====Effect of political climate on action decisions====
:**Many of the covert operations, from 1945, at least through Vietnam, were based on an internal government assumption that Communism had to be stopped at all costs, including violations of human rights and national sovereignty. Whether or not this belief is now considered correct, it must be remembered, in terms of the orders given to the CIA, that it was in the minds of the policymakers that authorized actions.
:**Need some good references here on broad US policies, such as how Kennan's containment drifted into the much more intense anticommunism of the late Truman and then the Eisenhower administration. [[New Look]] covers some of this, but not enough.


:**In like manner to mentioning directors only to the extent they affected the climate, the same thing applies to the White House--either President alone, or when you have strong advisers like Kissinger or some of Kennedy's team.
====When Security Hinders====
Congress, especially Congressional staff, have constantly had problems in gaining access to highly classified intelligence-related information. For the most sensitive operations, there is essentially are compartmented control systems parallel to, or perhaps above the regular security clearance system


:**Some of the references that come to mind may need balancing references, such as Woodward's ''Veil'' when it comes to Casey and Reagan.
===Authority to approve operations===
===Authority to approve operations===
Since [[1954]], oversight of United States [[covert operations]] has been carried out by a series of sub-committees of the [[United States National Security Council]].  Before that time, the process rarely involved more than conversation at a National Security Council meeting. It is likely that in the 1947-1952 period, before the DCI brought the OPC and OSI under his firm control, that there well may have been some operations approved at no higher level than Director of OPC>
{{seealso|Unitary executive theory}}
Since 1954, oversight of United States, high-risk clandestine intelligence collection and covert action  has been carried out by a series of sub-committees of the U.S. National Security Council.  Before that time, the process rarely involved more than conversation at a National Security Council meeting. It is likely that in the 1947-1952 period, before the DCI brought the OPC and OSI under his firm control, that there well may have been some operations approved at no higher level than Director of OPC.


While some activities definitely happened without oversight, the initiative for many, such as CIA activities in Cuba|assassination attempts against Fidel Castro and CIA activities in Chile|actions against Salvador Allende of Chile were initiated at the White House. Other operations were proposed by CIA personnel, but moved forward only after higher-level approval.
====Planning Coordination Group====
====Planning Coordination Group====
The '''Planning Coordination Group''' was created by [[President of the United States|President]] [[Dwight D. Eisenhower|Eisenhower]]'s [[Presidential Directive]] 5412/1 on [[March 15]], [[1954]].<ref>{{cite book
The '''Planning Coordination Group''' was created by President of the United States of America|President Dwight D. Eisenhower|Eisenhower's Presidential Directive 5412/1 on 15 March 1954.<ref>{{cite book
|url=http://www.fas.org/sgp/advisory/state/covert.html
|url=http://www.fas.org/sgp/advisory/state/covert.html
|title=Foreign Relations, 1964–1968 Volume XII
|title=Foreign Relations, 1964–1968 Volume XII
|last=Miller
|last=Miller
|first=James E.
|first=James E.
|publisher=[[United States Government Printing Office]]
|publisher=United States Government Printing Office
|date=2001}}</ref> The group, initially, was headed by Special Assistant to the President for Foreign Affairs, [[Nelson Rockefeller]].
|date=2001}}</ref> The group, initially, was headed by Special Assistant to the President for Foreign Affairs, Nelson Rockefeller.


====NSC 5412/2 Special Group====
Eisenhower opposed regular Congressional review. After the U-2 Incident in May 1960, he r discussed the 1960 U-2 incident with senior Congressional leaders, but made it clear that the operational decision had been made on his personal authority, and he did not want deep Congressional investigation into intelligence activities. When Sen. Mike Mansfield asked "What would the President think if there were to be established in the Congress a joint Congressional Committee which would oversee the activities of the CIA? The President responded that his own feeling was that the operation of the CIA was so delicate and so secret in many cases that it must be kept under cover, and that the Executive must be held responsible for it. He said that he would agree to some bipartisan group going down occasionally and receiving reports from the CIA on their activities, but that he would hate to see it formalized--indeed would be against the proposal made by Senator Mansfield.


The '''NSC 5412/2 Special Group''', often referred simply as the '''Special Group''', was an initially secret, but later public, subcommittee of the [[United States National Security Council]] responsible for coordinating government [[covert operation]]s. Presidential Directive NSC 5412/2, issued December 28th 1954, assigned responsibility for co-ordination of covert actions to representatives of the Secretary of State, the Secretary of Defense, and the President respectively.
Senator Richard Russell supported the President in this viewpoint and said that they do have a Congressional group that periodically went over reports. He said that they knew the U - 2 planes were under construction a long time ago. The Senator added that he was not afraid of the Senators on security matters but that he was afraid of staff leaks.<ref name=FRUS-DDE-1960-05-26>{{citation
| url = http://avalon.law.yale.edu/20th_century/vx154.asp
  | journal = Foreign Relations of the United States  
  | title = May - July 1960 : The U-2 Airplane Incident
  | contribution = 154. Memorandum of Conversation: Bipartisan leaders breakfast with the President
| date = 26 May 1960
| author = Dwight D. Eisenhower}}</ref>


The [[Federation of American Scientists]] list of national security documents for the Eisenhower administration does not show a directive 5412/2. It does however show a 5412/1 with a classified title (one of only three such documents for the entire administration).  
====NSC 5412/2 Special Group====
The '''NSC 5412/2 Special Group''', often referred simply as the  '''Special Group''', was an initially secret, but later acknowledged, subcommittee of the National Security Council responsible for coordinating government covert operations.  Presidential Directive NSC 5412/2, issued December 28th 1954,  assigned responsibility for co-ordination of covert actions to representatives of the Secretary of State, the Secretary of Defense, and the President respectively.  <ref>The Federation of American Scientists list of national security documents for the Eisenhower administration does not show a directive 5412/2. It does however show a 5412/1 with a classified title (one of only three such documents for the entire administration).</ref>


A [[National Security Archive]] chronology of the [[Bay of Pigs Invasion]] indicates a membership in December 1960 of [[Allen Welsh Dulles|Allen Dulles]], Chairman of the [[Central Intelligence Agency]] (CIA); [[Gordon Gray]], [[National Security Advisor (United States)|National Security Advisor]]; James Douglas, [[United States Secretary of Defense|Acting Secretary of Defense]]; and [[Livingston T. Merchant]], [[Under Secretary of State for Political Affairs]].<ref>{{cite web
A National Security Archive chronology of the Bay of Pigs Invasion indicates a membership in December 1960 of Director of Central Intelligence#Allen Dulles|DCI Allen Dulles, Chairman of the Central Intelligence Agency (CIA); Gordon Gray, National Security Advisor; James Douglas, United States Secretary of Defense|Acting Secretary of Defense; and Livingston T. Merchant, Under Secretary of State for Political Affairs.<ref>{{cite web
|url=http://www.gwu.edu/~nsarchiv/bayofpigs/chron.html
|url=http://www.gwu.edu/~nsarchiv/bayofpigs/chron.html
|title=Bay of Pigs: 40 Years After - Chronology
|title=Bay of Pigs: 40 Years After - Chronology
Line 92: Line 62:


====303 Committee====
====303 Committee====
The covert actions oversight group was renamed the '''303 Committee''' after [[National Security Directive|National Security Action Memorandum]] No. 303 on [[June 2]], [[1964]][[McGeorge Bundy]], National Security Advisor, became Chairman for the committee.
The covert actions oversight group was renamed the '''303 Committee''' after National Security Action Memorandum No. 303 of 2 June 1964.  McGeorge Bundy, Assistant to the President for National Security Affairs, became Chairman for the committee.


The successor to the Special Group was the 40 Committee. <ref>{{citation
The successor to the Special Group was the 40 Committee. <ref>{{citation
Line 98: Line 68:
|title=Covert Action in Chile: 1963–1973
|title=Covert Action in Chile: 1963–1973
|publisher=United States Department of State}}</ref>
|publisher=United States Department of State}}</ref>
====40 Committee====
====40 Committee====
The '''40 Committee''' was a division of the [[President of the United States|Executive branch]] of the [[United States government]] whose mandate was to review proposed major [[covert operation|covert actions]]. In 1970 the 40 Committee played a major role in so called "Track I" efforts to prevent [[Salvador Allende]] from taking office following the [[Chilean presidential election, 1970|Chilean popular vote of September 4, 1970]].
The '''40 Committee''' was a committee of the National Security Council whose mandate was to review proposed major covert operation|covert actions. In 1970 the 40 Committee approved "Track I" efforts to prevent Salvador Allende from taking office following the Chilean presidential election of 1970, and then to remove him from office. See CIA activities in Chile.
 
====Operations Advisory Group====
====Operations Advisory Group====
On February 18, 1976, 40 committee was replaced by the '''Operations Advisory Group''', in accordance with Executive Order 11905 issued by [[Gerald Ford]].  The new group was composed of the [[National Security Advisor (United States)|President's Assistant for National Security Affairs]], the Secretaries of [[United States Secretary of State|State]] and [[United States Secretary of Defense|Defense]], the [[Chairman of the Joint Chiefs of Staff]], and the [[Director of Central Intelligence]].<ref>{{cite web|url=http://www.state.gov/documents/organization/70138.pdf|title=Note on U.S. Covert Actions|publisher=[[United States Department of State]]}}</ref>
On February 18, 1976, 40 committee was replaced by the '''Operations Advisory Group''', in accordance with Executive Order 11905 issued by Gerald Ford.  The new group was composed of the Assistant to the President for National Security Affairs, the Secretaries of United States Secretary of State|State and United States Secretary of Defense|Defense, the Chairman of the Joint Chiefs of Staff, and the Director of Central Intelligence.<ref>{{cite web|url=http://www.state.gov/documents/organization/70138.pdf|title=Note on U.S. Covert Actions|publisher=United States Department of State}}</ref>
 
====NSC Special Coordination Committee====
====NSC Special Coordination Committee====
The following year, on May 13, 1977 President [[Jimmy Carter]] issued Executive Order 11985 which updated the previous order such that the Operations Advisory Group thereafter would be known as the '''NSC Special Coordination Committee'''<ref>{{cite web|url=http://www.fas.org/irp/offdocs/eo/eo-11985.htm|title=Executive Order 11985|date=May 13th, 1977|publisher=Federation of American Scientists}}</ref>
The following year, on May 13, 1977 President Jimmy Carter issued Executive Order 11985 which updated the previous order such that the Operations Advisory Group thereafter would be known as the '''NSC Special Coordination Committee'''<ref>{{cite web|url=http://www.fas.org/irp/offdocs/eo/eo-11985.htm|title=Executive Order 11985|date=May 13th, 1977|publisher=Federation of American Scientists}}</ref>
 
====National Security Planning Group====
====National Security Planning Group====
Under the Reagan administration, the Special Coordination Committee was replaced by the '''National Security Planning Group''' which included the Vice-President, the Secretary of Defense, the Secretary of State, the Assistant for National Security Affairs, and the Director of the CIA.<ref>{{cite news
Under the Reagan administration, the Special Coordination Committee was replaced by the '''National Security Planning Group''' which included the Vice-President, the United States Secretary of Defense|Secretary of Defense, the United States Secretary of State| Secretary of State, the Assistant to the President for National Security Affairs, and the Director of Central Intelligence.<ref>{{cite news
|title=Covert Action and Accountability: Decision-Making for America's Secret Foreign Policy
|title=Covert Action and Accountability: Decision-Making for America's Secret Foreign Policy
|author=Loch K. Johnson
|author=Loch K. Johnson
|publisher=International Studies Quarterly
|publisher=International Studies Quarterly
|date=March 1989}}</ref>
|date=March 1989}}</ref>
===Competing Demands===
Especially when a hot war is in progress, there are often competing demands between [[Support to Military Operations]] and strategic intelligence. See [[CIA activities in Asia and the Pacific#Korea]] for the way that the pre-CIA OSO clandestine collectors' mission was a battleground between the Army tactical information requirements and the need for more global information (e.g., what were the Chinese and Soviets planning?).  I'm reading the newly declassified NSA history of Southeast Asia, and, while the intelligence collectors in question were NSA and service cryptologic agency, there again were conflicting demands for tactical versus strategic use of limited human and equipment resources.


Indirectly, this sort of conflicts effects covert operations, if the tactical needs of intelligence collection have the covert operations somewhat in the dark. A good example coming from initially covert [[direct action (military)| Direct Action]] (DA) mission was the POW rescue mission on the [[Son Tay]] prison camp. There was some intelligence indicating the POWs had been moved and the facility was empty, but the information was not confirmed and got to the strike force late. Complicating the issue were White House and Pentagon decisions that even if there were no prisoners, having the North Vietnamese know they were vulnerable to DA missions would divert their attention and resources. One could compare this with the effects, unknown to the US at the time, of the early 1942 [[Doolittle Raid]] on Japan, which did minimal damage but caused an overreaction on the Japanese side, bringing air defense back to the homeland, and then making an ill-advised attempt to extend their eastern defense line with the [[Battle of Midway]].
==Impact of Directors and Management Styles==
==Impact of Directors and Management Styles==
See [[Director of Central Intelligence]] for insights into the politics and management styles and actions associated with each director. Let me make some informal, nonchronological comments about knowing about certain directors is significant in understanding the behavior of the CIA.
See Director of Central Intelligence for insights into the politics and management styles and actions associated with each director. Some general observations are in order.
 
For example, three directors, [[Allen Dulles|Dulles]], [[Richard Helms|Helms]] and [[William Colby|Colby]], came through the ranks, counting OSS. Dulles and Helms were clandestine intelligence collectors, while Colby was on the covert action side. I'll count Casey as half a director, as he was an OSS clandestine intelligence officer running the penetrations into Germany, but didn't stay in CIA, and came to the directorship through a political path. I believe that the OSS/CIA experience of these people affected how they ran things.
 
[[Walter Bedell Smith | Smith]] is significant in that he was able to force the disparate operations groups into firm CIA control. Given he was [[Dwight Eisenhower | Eisenhower]]'s WWII Chief of Staff, he presumably enjoyed a Presidential trust that few other DCIs had.
 
[[Stansfield Turner | Turner]] and [[James Schlesinger|Schlesinger]] were disastrous to morale, and probably caused the loss of a good deal of HUMINT corporate knowledge. Turner did have the advantage of being a classmate of [[Jimmy Carter]]'s and enjoyed his trust.


[[John McCone | McCone]] is very interesting to me. If I were to pick the best DCI, it would probably be McCone, who was a manager and engineer, not at all an intelligence specialist. It's also significant that he had a close relationship with JFK, but left because he and LBJ didn't trust one another. It's only speculation, of course, but I believe if he had stayed, he might have injected much more realism into Vietnam. He was known for making sure all sides of an issue were heard. Somewhat surprisingly, I've known people in CIA that said [[George H.W. Bush|Bush]] did that as well.
For example, three directors, Director of Central Intelligence#Allen Dulles|Dulles, Director of Central Intelligence#Richard Helms|Helms and Director of Central Intelligence#William Colby|Colby, came through the ranks, counting OSS. Dulles and Helms were clandestine intelligence collectors, while Colby was on the covert action side. Casey was not a career officer, but did have field experience, as he was an OSS clandestine intelligence officer running the penetrations into Germany, but didn't stay in CIA, and came to the directorship through a political path. I believe that the OSS/CIA experience of these people affected how they ran things.


Some DCIs, I will be the first to admit, really didn't do much to put their stamp on the Agency. In a way, it's worth examining [[William Raborn| Raborn]], a very smart man in other contexts who was completely clueless when it came to intelligence. There are lessons from Raborn, Schlesinger, Turner, and, in a very different way, Dulles, about characteristics you do not want in a DCI.
Director of Central Intelligence#Walter Bedell Smith | Smith is significant in that he was able to force the disparate operations groups into firm CIA control. Given he was Dwight Eisenhower | Eisenhower's WWII Chief of Staff, he presumably enjoyed a Presidential trust that few other DCIs had.


Anyway, I have no problem if the section with the brief bios of directors is cut back, but I really hoep that we don't lose the effects of different management styles, and, especially with Dulles and Casey, when a DCI is more prone to run rogue. Having Dulles' brother [[John Foster Dulles]] as Secretary of State did not help oversight of CIA.
Director of Central Intelligence#Stansfield Turner | Turner and Director of Central Intelligence#James Schlesinger|Schlesinger were disastrous to morale, and probably caused the loss of a good deal of human-source intelligence corporate knowledge. Turner did have the advantage of being a classmate of Jimmy Carter's and enjoyed his trust.


[[Sidney Souers]], [[Hoyt Vandenberg]], and [[Roscoe H. Hillenkoetter]] almost don't count, as they served before the organization really took shape.
Director of Central Intelligence#John McCone | McCone is often considered one of the best DCIs,  who was a manager and engineer, not at all an intelligence specialist. It's also significant that he had a close relationship with JFK, but left because he and LBJ didn't trust one another. It has been speculated that had he been in office during Vietnam, there might have been much more realistic planning.


A counterexample Director of Central Intelligence#William Raborn| Raborn, a very smart man in other contexts who was completely clueless when it came to intelligence. There are lessons from Raborn, Schlesinger, Turner, and, in a very different way, Dulles, about characteristics you do not want in a DCI.
==Congressional Oversight and Authority==
==Congressional Oversight and Authority==
Congress has, in principle, some level of authority over military operations, clandestine intelligence collection, covert action (at least by the CIA, if not by the [[United States Special Operations Command]] (USSOCOM)), and intelligence analysis. It exerts authority through approving budgets and authorizing the use of funds. It can also pass nonbinding resolutions of Congressional intent. Both of these areas have had little effect under the [[unitary authority]] doctrine of the [[George W. Bush]] Administration
Congress has, in principle, some level of authority over military operations, clandestine intelligence collection, covert action (at least by the CIA, if not by the United States Special Operations Command (USSOCOM)), and intelligence analysis. It exerts authority through approving budgets and authorizing the use of funds. It can also pass nonbinding resolutions of Congressional intent. Both of these areas have had little effect under the unitary executive theory that intelligence operations are a matter of presidential authority, a position strongly held by Dwight D. Eisenhower <ref name=FRUS-DDE-1960-05-26>{{citation
| url = http://avalon.law.yale.edu/20th_century/vx154.asp
| journal = Foreign Relations of the United States
| title = May - July 1960 : The U-2 Airplane Incident
| contribution = 154. Memorandum of Conversation: Bipartisan leaders breakfast with the President
| date = 26 May 1960
| author = Dwight D. Eisenhower}}</ref>, and also a position of the George W. Bush Administration.
===Budgetary===
===Budgetary===
The intelligence budget, for which the total is beginning to be reported, is divided between
The intelligence budget, for which the total is beginning to be reported, is divided between
Line 142: Line 106:
:# the Military Intelligence Program (MIP).  
:# the Military Intelligence Program (MIP).  


[This might be an aside or belong elsewhere, but I was surprised that TIARA, which covered programs directly supported military operations, is not clearly allocated. I honestly don't know, at this point, if it's been moved into the general military budget.
There are various reporting mechanisms where a small military unit might run into something of national importance, and need to pass it up the chain of command. Marking material PINNACLE OPREP-3 and putting it into the general communications system is one way to do that.


[Two things do apply to this area, since you can never fully separate tactical and national. There are various reporting mechanisms where a small military unit might run into something of national importance, and need to pass it up the chain of command. Marking material PINNACLE OPREP-3 and putting it into the general communications system is one way to do that.
Moving information in the other direction is a program called Tactical Exploitation of National Capabilities (TENCAP), which allows military units to access information generally considered of national interest alone. A good example was using the missile launch detection satellites, intended to warn the US of a Soviet strike, to give fast warning of SCUD launches in Iraq. There are cases, however, where the operating military forces made use of CIA data.


[The process also works top to bottome, and, again, this isn't strictly part of the budget. There is a program called Tactical Exploitation of National Capabilities (TENCAP), which allows military units to access information generally considered of national interest alone. A good example was using the missile launch detection satellites, intended to warn the US of a Soviet strike, to give fast warning of SCUD launches in Iraq.  There are cases, however, where the operating miitary forces made use of CIA data.]
The MIP was established in September 2005 and includes all programs from the former Joint Military Intelligence Program (JMIP), which encompassed DOD-wide intelligence programs (i.e., organizations like NSA, DIA, NRO, and NGA, which are part of the United States Intelligence Community|intelligence community but also part of the United States Department of Defense, and most programs from the former Tactical Intelligence and Related Activities (TIARA) category, which encompassed intelligence programs supporting the operating units of the armed services. The Program Executive for the MIP is the Under Secretary of Defense for Intelligence. <ref name=CRS-Best-2007-10-19>{{citation
 
The MIP was established in September 2005 and includes all programs from the former Joint Military Intelligence Program (JMIP), which encompassed DOD-wide intelligence programs (i.e., organizations like NSA, DIA, NRO, and NGA, which are part of the [[Intelligence Community]] but also part of the [[United States Department of Defense]], and most programs from the former Tactical Intelligence and Related Activities (TIARA) category, which encompassed intelligence programs supporting the operating units of the armed services. The Program Executive for the MIP is the Under Secretary of Defense for Intelligence. <ref name=CRS-Best-2007-10-19>{{citation
  | title =Intelligence Issues for Congress
  | title =Intelligence Issues for Congress
  | date = October 19, 2007
  | date = October 19, 2007
Line 156: Line 118:
}}</ref>
}}</ref>


<blockquote>Only a small part of the intelligence budget is made public; the bulk of the $40 billion that media reporting associates with overall intelligence spending is “hidden” within the DOD budget. Spending for most intelligence programs is described in classified annexes to intelligence and national defense authorization and appropriations legislation. (Members of Congress have access to these annexes, but must make special arrangements to read them.)<ref name=CRS-Best-2007-10-19 /> <br /><br />
Only a small part of the intelligence budget is made public; the bulk of the $40 billion that media reporting associates with overall intelligence spending is “hidden” within the DOD budget. Spending for most intelligence programs is described in classified annexes to intelligence and national defense authorization and appropriations legislation. (Members of Congress have access to these annexes, but must make special arrangements to read them.)<ref name=CRS-Best-2007-10-19 />


For a number of years some Members have sought to make public total amounts of intelligence and intelligence-related spending; floor amendments for that purpose were defeated in both chambers during the 105th Congress. In response, however, to a lawsuit filed under the [[Freedom of Information Act]] (FOIA), DCI [[George Tenet]] stated on October 15, 1997 that the aggregate amount appropriated for intelligence and intelligence-related activities for FY1997 was $26.6 billion. He added that the Administration would continue “to protect from disclosure any and all subsidiary information concerning the intelligence budget.” In March 1998, Tenet announced that the FY1998 figure was $26.7 billion. <br /><br />
For a number of years some Members have sought to make public total amounts of intelligence and intelligence-related spending In March 1998, Tenet announced that the FY1998 figure was $26.7 billion.


Figures for FY1999 and subsequent years have not been released and the executive branch has thus far prevailed against legal efforts to force release of intelligence spending figures. On May 23, 2000, the House voted 175-225 to defeat an amendment calling for annual release of an unclassified statement on aggregate intelligence spending. During consideration of intelligence reform legislation in 2004, the Senate at one point approved a version of a bill which would require publication of the amount of the NIP; the House version did not include a similar provision and, with the Senate deferring to the House, the Intelligence Reform Act does not require making intelligence spending amounts public. Provisions requiring public disclosure of the aggregate amount of funds for the NIP are included in the Senate’s version of the FY2008 authorization bill (S. 1538). Section 601 of P.L. 110-53.<br /><br />
The Implementing Recommendations of the 9-11 Commission Act of 2007, requires that the DNI publicly disclose the aggregate amount of funds appropriated for the NIP Jurisdiction over intelligence programs is somewhat different in the House and the Senate. The Senate Intelligence Committee has jurisdiction only over the NIP but not the MIP, whereas the House Intelligence Committee has jurisdiction over both sets of programs. The preponderance of intelligence spending is accomplished by intelligence agencies within DOD and thus in both chambers the armed services committees are involved in the oversight process. Other oversight committees are responsible for intelligence agencies that are part of departments other than DOD.  


Implementing Recommendations of the [[Implementing Recommendations of the 9/11 Commission Act of 2007]], requires that the DNI publicly disclose the aggregate amount of funds appropriated for the NIP although after FY2008 the President could waive or postpone the disclosure upon sending a explanation to congressional oversight committees. However, during floor consideration of the H.R. 3222, the FY2008 defense appropriations act, an amendment was adopted that would preclude funds appropriated in the act from being used to make public disclosure of NIP spending levels. Jurisdiction over intelligence programs is somewhat different in the House and the Senate. The Senate Intelligence Committee has jurisdiction only over the NIP but not the MIP, whereas the House Intelligence Committee has jurisdiction over both sets of programs. The preponderance of intelligence spending is accomplished by intelligence agencies within DOD and thus in both chambers the armed services committees are involved in the oversight process. Other oversight committees are responsible for intelligence agencies that are part of departments other than DOD.
To improve financial control of intelligence, the Council on Foreign Relations proposed a "market constraint" on consumers of intelligence, in which they could only get a certain amount of intelligence from the intelligence community, before they had to provide additional funding.<ref name=CFR1996>{{citation
</blockquote>
| url = http://www.fas.org/irp/cfr.html
 
| title = Making Intelligence Smarter: The Future of US Intelligence
To improve financial control of intelligence, the [[Council on Foreign Relations]] proposed a "market constraint" on consumers of intelligence, in which they could only get a certain amount of intelligence from the intelligence community, before they had to provide additional funding.<ref name=CFR1996 /> A different constraint would be that an agency, to get information on a new topic, must agree to stop or reduce coverage on something currently being monitored for it. Even with this consumer-oriented model, the intelligence community itself needs to have a certain amount of resources that it can direct itself, for building basic intelligence and identifying unusual threats.
| author = Council on Foreign Relations
| accessdate = 2007-10-21}}</ref> A different constraint would be that an agency, to get information on a new topic, must agree to stop or reduce coverage on something currently being monitored for it. Even with this consumer-oriented model, the intelligence community itself needs to have a certain amount of resources that it can direct itself, for building basic intelligence and identifying unusual threats.


<blockquote>"It is important that intelligence officers involved in articulating requirements represent both analysts and collectors, including those from the clandestine side. In addition, collection should be affected by the needs of policymakers and operators. All of this argues strongly against any organizational reforms that would isolate the collection agencies further or increase their autonomy. <ref name=CFR1996 /></blockquote>
<blockquote>"It is important that intelligence officers involved in articulating requirements represent both analysts and collectors, including those from the clandestine side. In addition, collection should be affected by the needs of policymakers and operators. All of this argues strongly against any organizational reforms that would isolate the collection agencies further or increase their autonomy. <ref name=CFR1996 /></blockquote>


Especially in nations with advanced technical sensors, there is an interaction between budgeting and technology. For example, the US has tended, in recent years, to use [[SIGINT Operational Platforms by Nation#United States: Satellite Platforms|billion-dollar SIGINT satellites]], where France has used [[SIGINT Operational Platforms by Nation#France: Satellite Platforms| "swarms" of "microsatellites"]]. The quantity versus quality battle is as evident in intelligence technology as in weapons systems.  The US has also fought a [[stovepipe]] battle, in which SIGINT and IMINT satellites, in a given orbit, were launched by different agencies. New plans put SIGINT, MASINT, and IMINT sensors, appropriate to a [[List of orbits| type of orbit]], on common platforms.
Especially in nations with advanced technical sensors, there is an interaction between budgeting and technology. For example, the US has tended, in recent years, to use National Reconnaissance Office#Future Generation Technology|billion-dollar SIGINT satellites, where France has used SIGINT space-based platforms#France: Satellite Platforms| "swarms" of "microsatellites". The quantity versus quality battle is as evident in intelligence technology as in weapons systems.  The US has also fought a battle of stovepiping, in which SIGINT and IMINT satellites, in a given satellite orbits|orbit, were launched by different agencies.  


Currently and historically, less than a tenth of what the United States spends on intelligence is devoted to analysis; it is the least expensive dimension of intelligence. Not all duplication is wasteful<ref name=CFR1996>{{cite web
Currently and historically, less than a tenth of what the United States spends on intelligence is devoted to analysis; it is the least expensive dimension of intelligence. Not all duplication is wasteful.<ref name=CFR1996 />  This has been a continuing issue with bomb damage assessment, going back to the beginnings of aerial bombardment. Even with considerably improved sensors in 1991, it remains a problem, and, as with the Vietnam case, there tended to be increasingly more pessimistic analyses in the theater command, the Department of Defense, and the CIA.
| url = http://www.fas.org/irp/cfr.html
| title = Making Intelligence Smarter: The Future of US Intelligence
| author = Council on Foreign Relations
| accessdate = 2007-10-21}}</ref>.   This has been a continuing issue with [[Bomb damage assessment]], going back to the beginnings of aerial bombardment. Even with considerably improved sensors in 1991, it remains a problem, and, as with the Vietnam case, there tended to be increasingly more pessimistic analyses in the theater command, the Department of Defense, and the CIA.


===Expertise===
===Expertise===
There is a problem with things that are both sensitive and technical, which is more likely to involve clandestine intelligence collection than covert action,'''another reason not to think of the CIA as an agency that only does covert action'''. This is also a matter where things get confusing between the CIA proper and the Intelligence Community.
There is a problem with things that are both sensitive and technical, which is more likely to involve clandestine intelligence collection than covert action,'''another reason not to think of the CIA as an agency that only does covert action'''. This is also a matter where things get confusing between the CIA proper and the Intelligence Community.
====Changes in responsibility in the Intelligence Community====
====Restructuring in the Intelligence Community====
At one time, before the NGA had been created, CIA and the military jointly ran the [[National Reconnaissance Office]], in charge of the launching and operation of satellites. The next generation of reconnaissance satellites, under the name [[Future Imagery Architecture]], ran into a multibillion dollar overrun, because the contractor was trying to do something beyond the state of the art. The FIA was discussed in public, so it presumably was an Acknowledged program that the committee staff and consultants could discuss.
Long before the Director of National Intelligence was put in nominal charge, there were turf wars within the U.S. intelligence community. Some programs, however, were not under effective oversight.
 
At one time, before the NGA had been created, CIA and the military jointly ran the National Reconnaissance Office, in charge of the launching and operation of satellites. The next generation of reconnaissance satellites, under the name National Reconnaissance Office#Future Imagery Architecture|Future Imagery Architecture (FIA), ran into a multibillion dollar overrun, because the contractor was trying to do something beyond the state of the art. The FIA was discussed in public, so it presumably was an Acknowledged program that the committee staff and consultants could discuss.


The NSA telephone surveillance program, however, is one of the blackest of black programs, and has not been reviewed by other than the "Big 8" members, none of whom have a relevant technical background.
The George W. Bush Administration NSA telephone surveillance program, however, is one of the blackest of black programs, and has not been reviewed by other than the "Big 8" members, none of whom have a relevant technical background. Nevertheless, earlier domestic surveillance, such as Project MINARET and SHAMROCK, were also under minimal oversight, sometimes when legislators explicitly said they did not want details.
====Actually reading intelligence documents: White House, Congress, and the need for Staff====
Yet another issue, not one of approval but interpretation, is whether the Executive Branch had adequately evaluated the intelligence the [[George W. Bush]] Administration had used to justify the very overt action, as the [[2003 invasion of Iraq]].


Paul Pillar, who was National Intelligence Officer for the Middle East between 2000 and 2005, observed "Intelligence affects the nation's interests through its effect on policy. No matter how much the process of intelligence gathering itself is fixed, the changes will do no good if the role of intelligence in the policymaking process is not also addressed.... But a few steps, based on the recognition that the intelligence-policy relationship is indeed broken, could reduce the likelihood that such a breakdown will recur.<ref name=Pillar>{{citation
====Actually reading intelligence documents====
Yet another issue, not one of approval but interpretation, is whether the Executive Branch had adequately evaluated the intelligence the George W. Bush Administration had used to justify the very overt action, as the Iraq War.
 
Paul Pillar, a controversial CIA analytic officer and now an academic, observed "Intelligence affects the nation's interests through its effect on policy. No matter how much the process of intelligence gathering itself is fixed, the changes will do no good if the role of intelligence in the policymaking process is not also addressed.... But a few steps, based on the recognition that the intelligence-policy relationship is indeed broken, could reduce the likelihood that such a breakdown will recur.<ref name=Pillar>{{citation
| url = http://www.foreignaffairs.org/20060301faessay85202/paul-r-pillar/intelligence-policy-and-the-war-in-iraq.html
| url = http://www.foreignaffairs.org/20060301faessay85202/paul-r-pillar/intelligence-policy-and-the-war-in-iraq.html
| title = Intelligence, Policy,and the War in Iraq
| title = Intelligence, Policy,and the War in Iraq
| author = Pillar, Paul R.
| author = Paul Pillar  
| journal = Foreign Affairs
| journal = Foreign Affairs
| date = March/April 2006
| date = March/April 2006
| accessdate = 2007-10-30}}</ref></blockquote>
| accessdate = 2007-10-30}}</ref> Pillar, whose views are not universally shared among advocates of oversight, sees the British approach as a model. It is U.K. policy that its intelligence services are not to be matters of public debate. At the same time, the U.K. Government takes serious political responsibility for inappropriate politicization, a serious step in a parliamentary system. "In the United Kingdom, Prime Minister Tony Blair accepted a commission of inquiry's conclusions that intelligence and policy had been improperly commingled in such exercises as the publication of the "dodgy dossier," the British counterpart to the United States' Iraqi WMD white paper."  Pillar suggested the equivalent U.S. approach could be "congressional resolution and be seconded by a statement from the White House, a process that could discourage future administrations from politicize intelligence analyses to support a preconceived policy. It would also give some leverage to intelligence officers in resisting any such future attempts."  He assumes that the White House and Congress will cooperate, and that a resolution in the U.S. system would have the force of an action that could cause the fall of a parliamentary government.
 
<blockquote>"On this point, the United States should emulate the United Kingdom, where discussion of this issue has been more forthright, by declaring once and for all that its intelligence services should not be part of public advocacy of policies still under debate. In the United Kingdom, Prime Minister Tony Blair accepted a commission of inquiry's conclusions that intelligence and policy had been improperly commingled in such exercises as the publication of the "dodgy dossier," the British counterpart to the United States' Iraqi WMD white paper, and that in the future there should be a clear delineation between intelligence and policy. An American declaration should take the form of a congressional resolution and be seconded by a statement from the White House. Although it would not have legal force, such a statement would discourage future administrations from attempting to pull the intelligence community into policy advocacy. It would also give some leverage to intelligence officers in resisting any such future attempts.<ref name=Pillar /> </blockquote>


<blockquote>"The proper relationship between intelligence gathering and policymaking sharply separates the two functions....Congress, not the administration, asked for the now-infamous October 2002 National Intelligence Estimate (NIE) on Iraq's unconventional weapons programs, although few members of Congress actually read it. (According to several congressional aides responsible for safeguarding the classified material, no more than six senators and only a handful of House members got beyond the five-page executive summary.) As the national intelligence officer for the Middle East, I was in charge of coordinating all of the intelligence community's assessments regarding Iraq; the first request I received from any administration policymaker for any such assessment was not until a year into the war.</blockquote>
<blockquote>"The proper relationship between intelligence gathering and policymaking sharply separates the two functions....Congress, not the administration, asked for the now-infamous October 2002 National Intelligence Estimate (NIE) on Iraq's unconventional weapons programs, although few members of Congress actually read it. (According to several congressional aides responsible for safeguarding the classified material, no more than six senators and only a handful of House members got beyond the five-page executive summary.) As the national intelligence officer for the Middle East, I was in charge of coordinating all of the intelligence community's assessments regarding Iraq; the first request I received from any administration policymaker for any such assessment was not until a year into the war.</blockquote>


<blockquote>"The legislative branch is the appropriate place for monitoring the intelligence-policy relationship. But the oversight should be conducted by a nonpartisan office modeled on the Government Accountability Office (GAO) and the Congressional Budget Office (CBO). Such an office would have a staff, smaller than that of the GAO or the CBO, of officers experienced in intelligence and with the necessary clearances and access to examine questions about both the politicization of classified intelligence work and the public use of intelligence. As with the GAO, this office could conduct inquiries at the request of members of Congress. It would make its results public as much as possible, consistent with security requirements, and it would avoid duplicating the many other functions of intelligence oversight, which would remain the responsibility of the House and Senate intelligence committees." </blockquote>
While oversight should come from Congress, Pillar recommends the creation of a "nonpartisan office modeled on the Government Accountability Office (GAO) and the Congressional Budget Office (CBO). Such an office would have a staff, smaller than that of the GAO or the CBO, of officers experienced in intelligence and with the necessary clearances and access to examine questions about both the politicization of classified intelligence work and the public use of intelligence. As with the GAO, this office could conduct inquiries at the request of members of Congress. It would make its results public as much as possible, consistent with security requirements, and it would avoid duplicating the many other functions of intelligence oversight, which would remain the responsibility of the House and Senate intelligence committees."  


Pillar's proposal is certainly not the only way in which Congress would arrange the time and expertise for thorough examination of intelligence proposals, but it is a start. Just as the [[General Accounting Office]] (GAO, a Congressional agency now called the General Accountability Office) does not duplicate the size of the Executive Branch in order to audit it, an intelligence analysis office reporting to the Congress need not duplicate the [[United States intelligence community|intelligence community]] (IC). Its personnel would need all-source intelligence clearances, and, in many cases, the experts might have gained some of their knowledge while working in the IC.
Just as the General Accountability Office (GAO) does not duplicate the size of the Executive Branch in order to audit it, an intelligence analysis office reporting to the Congress need not duplicate the United States intelligence community|intelligence community (IC). Its personnel would need all-source intelligence clearances, and, in many cases, the experts might have gained some of their knowledge while working in the IC.


==Independent government reviews==
==Independent government reviews==
Several investigations (e.g., [[Church Committee]], [[United States President's Commission on CIA activities within the United States|Rockefeller Commission]], [[Pike Committee]]), as well as released declassified documents, reveal that the CIA, at times, operated outside its charter. In some cases, such as during [[Watergate]], this may have been due to inappropriate requests by White House staff. In other cases, there was a violation of Congressional intent, such as the [[Iran-Contra affair]].
Several investigations (e.g., Church Committee, United States President's Commission on CIA activities within the United States|Rockefeller Commission, Pike Committee), as well as released declassified documents, reveal that the CIA, at times, operated outside its charter. In some cases, such as during Watergate, this may have been due to inappropriate requests by White House staff. In other cases, there was a violation of Congressional intent, such as the Iran-Contra affair.
===1949 Eberstadt Report (First Hoover Commission)===
===1949 Eberstadt Report (First Hoover Commission)===
The first major analysis, following the [[National Security Act of 1947]], was chaired by former President [[Herbert Hoover]], with a Task Force on National Security Organization under [[Ferdinand Eberstadt]], one of the drafters of the National Security Act and a believer in centralized intelligence.
The first major analysis, following the National Security Act of 1947, was chaired by former President Herbert Hoover, with a Task Force on National Security Organization under Ferdinand Eberstadt, one of the drafters of the National Security Act and a believer in centralized intelligence.


The task force concluded that the system of the day led to an adversarial relationship, with little effective coordination, among the CIA, the military, and the State Department.  "In the opinion of the task force, this produced duplication on one hand, and, on the other, departmental intelligence estimates that "have often been subjective and biased."  In large measure, the military and State Department were blamed for their failure to consult and share pertinent information with the CIA.  The task force recommended "that positive efforts be made to foster relations of mutual confidence between the [CIA] and the several departments and agencies that it serves."
The task force concluded that the system of the day led to an adversarial relationship, with little effective coordination, among the CIA, the military, and the State Department.  "In the opinion of the task force, this produced duplication on one hand, and, on the other, departmental intelligence estimates that "have often been subjective and biased."  In large measure, the military and State Department were blamed for their failure to consult and share pertinent information with the CIA.  The task force recommended "that positive efforts be made to foster relations of mutual confidence between the [CIA] and the several departments and agencies that it serves."


This report stressed that the CIA "must be the central organization of the national intelligence system." It recommended a "...top echelon [of] an evaluation board or section composed of competent and experienced personnel who would have no administrative responsibilities and whose duties would be confined solely to intelligence evaluation."  It also favored a civilian DCI with a long term in office.
This report stressed that the CIA "must be the central organization of the national intelligence system." It recommended a "...top echelon [of] an evaluation board or section composed of competent and experienced personnel who would have no administrative responsibilities and whose duties would be confined solely to intelligence evaluation."  It also favored a civilian DCI with a long term in office.  


<blockquote>"In the arena of covert operations and clandestine intelligence, the Eberstadt Report supported the integration of all clandestine operations into one office within CIA, under NSC supervision. To alleviate concerns expressed by the military who viewed this proposal as encroaching upon their prerogatives, the report stated that clandestine operations should be the responsibility of the Joint Chiefs of Staff (JCS) in time of war."</blockquote>
In operations, the report recommended consolidation of OPC and OSO into CIA, with NSC supervision. The authors agreed that the authority over such operations should transfer to the Joint Chiefs of Staff in wartime.


The report declared that the failure to appraise scientific advances (e.g.,  biological and chemical warfare, electronics, aerodynamics, guided missiles, atomic weapons, and nuclear energy) in hostile countries might have more immediate and catastrophic consequences than failure in any other field of intelligence.  It urged the US to develop a centralized capability for tracking these developments.
The report declared that the failure to appraise scientific advances (e.g.,  biological and chemical warfare, electronics, aerodynamics, guided missiles, atomic weapons, and nuclear energy) in hostile countries might have more immediate and catastrophic consequences than failure in any other field of intelligence.  It urged the US to develop a centralized capability for tracking these developments.
Line 224: Line 184:
}} </ref>The Jackson-Dulles-Correa report held an opposite view on clandestine collection to the Eberstadt Report, interesting in that Dulles was a clandestine collection specialist.
}} </ref>The Jackson-Dulles-Correa report held an opposite view on clandestine collection to the Eberstadt Report, interesting in that Dulles was a clandestine collection specialist.


Like the Hoover Commission, this group was chartered at the request of President Truman, and was made up of [[Allen W. Dulles]], who had served in the Office of Strategic Services (OSS) during the Second World War and would become DCI in 1953, [[William Harding Jackson|William Jackson]], a future Deputy DCI, and [[Matthias Correa]], a former assistant to Secretary of Defense James V. Forrestal when the latter had served as Secretary of the Navy during the war.  Chaired by Dulles, the ISG presented its findings, known as the Dulles-Jackson-Correa Report, to the National Security Council on January 1, 1949. Partially declassified in 1976, it "contained fifty-six recommendations, many highly critical of the CIA and DCI. In particular, the report revealed problems in the agency's execution of both its intelligence and operational missions.  It also criticized the quality of national intelligence estimates by highlighting the CIA's--and, by implication, the DCI's--"failure to take charge of the production of coordinated national estimates."  The report went on to argue that the CIA's current trend in clandestine intelligence activities should be reversed in favor of its mandated role as coordinator of intelligence."  It was "particularly concerned about the personnel situation at CIA, including internal security, the high turnover of employees, and the excessive number of military personnel assigned to the agency."  See the continuing concern about personnel in the [[#1954 Doolittle Report on Covert Activities| 1954 Doolittle Report]] To add "continuity of service" and the "greatest assurance of independence of action," the report argued that the DCI should be a civilian and that military appointees be required to resign their commissions.
The authors were Allen W. Dulles, who had served in the Office of Strategic Services (OSS) during the Second World War and would become DCI in 1953, William Jackson, a future Deputy DCI, and Matthias Correa, a former assistant to Secretary of Defense James Forrestal when the latter had served as Secretary of the Navy during the war.  Chaired by Dulles, the ISG presented its findings to the National Security Council on 1 January 1949. Partially declassified in 1976, it "contained fifty-six recommendations, many highly critical of the CIA and DCI. In particular, the report revealed problems in the agency's execution of both its intelligence and operational missions.  It also criticized the quality of national intelligence estimates by highlighting the CIA's--and, by implication, the DCI's--"failure to take charge of the production of coordinated national estimates."  The report went on to argue that the CIA's current trend in clandestine intelligence activities should be reversed in favor of its mandated role as coordinator of intelligence."  It was "particularly concerned about the personnel situation at CIA, including internal security, the high turnover of employees, and the excessive number of military personnel assigned to the agency."  See the continuing concern about personnel in the #1954 Doolittle Report on Covert Activities| 1954 Doolittle Report To add "continuity of service" and the "greatest assurance of independence of action," the report argued that the DCI should be a civilian and that military appointees be required to resign their commissions.


As with the Eberstadt Report, the Dulles Report also expressed concern about the inadequacies in scientific intelligence and the professionalism of the service intelligence organizations, and urged that the CIA provide greater coordination.  This led to a recommendation for increased coordination between the DCI and the Director of the [[Federal Bureau of Investigation]] (FBI) in the arena of counterespionage.  In turn, the report recommended that the Director of FBI be elevated to membership in the committee to help the DCI coordinate intelligence and set intelligence requirements.
Both the Eberstadt and Dulles-Jackson-Correa Reports also saw inadequacies in scientific intelligence and in the service intelligence organizations, and urged that the CIA provide greater coordination.  This led to a recommendation for increased coordination between the DCI and the Director of the Federal Bureau of Investigation (FBI) in the arena of counterespionage.  In turn, the report recommended that the Director of FBI be elevated to membership in the committee to help the DCI coordinate intelligence and set intelligence requirements.


The report proposed a large-scale reorganization of CIA. Even though it emphasized intelligence analysis and coordination over operations, it  
The report proposed a large-scale reorganization of CIA. Even though it emphasized intelligence analysis and coordination over operations, like the Eberhardt Report, it recommended bringing OPC and OSO into CIA. While the proposed directorates were not the same as came to pass, a four-directorate structure was proposed, with units for coordination, estimates, intelligence analysis and operations. The heads of the new offices would be included in the immediate staff of the DCI so that he would have "intimate contact with the day-to-day operations of his agency and be able to give policy guidance to them.
<blockquote>suggested incorporating covert operations and clandestine intelligence into one office within CIA. ... the Office of Special Operations (OSO), responsible for the clandestine collection of intelligence, and the Office of Policy Coordination (OPC), responsible for covert actions, be integrated into a single division within CIA. [It] recommended replacing existing offices with four new divisions for coordination, estimates, research and reports, and operations.</blockquote>


The heads of the new offices would be included in the immediate staff of the DCI so that he would have "intimate contact with the day-to-day operations of his agency and be able to give policy guidance to them."  These recommendations would become the start of the model for the future organization and operation of the present-day CIA. Until the DNI creation, estimates were in a separate office reporting to the DCI, coordination was a job of the DDCI (later assisted by the Intelligence Community Staff), research and reports became the Directorate of Intelligence, and operations was first, euphemistically, called the Directorate of Plans. Directorates for Support (originally called Administration), and Science & Technology, were also created.
Until the DNI creation, estimates were in a separate office reporting to the DCI, coordination was a job of the DDCI (later assisted by the Intelligence Community Staff), research and reports became the Directorate of Intelligence, and operations was first, euphemistically, called the Directorate of Plans. Directorates for Support (originally called Administration), and Science & Technology, were also created.


===1954 Doolittle Report on Covert Activities===
===1954 Doolittle Report on Covert Activities===
Gen. [[Jimmy Doolittle|James Doolittle]] did an extensive report on covert actions, specifically for President [[Dwight D. Eisenhower]].<ref name=CIADoolitle>{{citation
Gen. Jimmy Doolittle|James Doolittle did an extensive report on covert actions, specifically for President Dwight D. Eisenhower.<ref name=CIADoolitle>{{citation
  | first =James | last = Doolittle  
  | first =James | last = Doolittle  
  | title = Report on the Covert Activities of the Central Intelligence Agency
  | title = Report on the Covert Activities of the Central Intelligence Agency
  | url = http://www.foia.cia.gov/search.asp
  | url = http://www.foia.cia.gov/search.asp
  | date = 30 September 1954
  | date = 30 September 1954
  | comment=There is no direct link. At the CIA FOIA reading room page, search on COVERT OPERATIONS|DOOLITTLE REPORT
  | comment=There is no direct link. At the CIA FOIA reading room page, search on COVERT OperationS|DOOLITTLE REPORT
}}</ref>  
}}</ref>  
   
   
The report's first recommendation dealt with personnel. It recommended releasing a large number of current staff that could never be more than mediocre, aggressively recruit new staff with an overall goal of increasing the workforce, and intensify training, with 10% of the covert staff time spent in training. The Director should  be nonpolitical.
The report's first recommendation dealt with personnel. It recommended releasing a large number of current staff that could never be more than mediocre, aggressively recruit new staff with an overall goal of increasing the workforce, and intensify training, with 10% of the covert staff time spent in training. The Director should  be nonpolitical.
   
   
Security was the next concern, starting with a drive to reduce interim and provisional [[security clearance]]s. The report strongly endorsed use of the [[polygraph]] both for initial recruits and existing staff. [[Counter-intelligence#offensive counterintelligence| Counterespionage]] needed to be strengthened, and field stations needed both to report on their staff and periodically be inspected. Consolidating the Washington workforce, which was scattered among buildings, into one or a few main buildings was seen as a way of improving the security of classified information.  
Security was the next concern, starting with strengthening security clearance procedures, Counterintelligence#offensive counterintelligence| Counterespionage, and field reporting and inspection.
   
   
Coordination in the [[intelligence community]] was seen as a problem, especially agreeing on clear understandings between CIA and military intelligence organizations. The overall IC program for eliciting information from defectors needed improvement, with contributions from multiple agencies.  
Coordination in the United States intelligence community|intelligence community was seen as a problem, especially agreeing on clear understandings between CIA and military intelligence organizations. The overall IC program for eliciting information from defectors needed improvement, with contributions from multiple agencies.  


As far as organization and management, the report described the structure of the Directorate of Plans (i.e., the clandestine service) as too complex and in need of simplification. The Inspector General needed an agency-wide mandate. The role of the Operations Coordinating Board, the covert and clandestine oversight staff of the [[National Security Council]] needed to be strengthened, with operations clearly approved and guided from the highest levels of government.
As far as organization and management, the report described the structure of the Directorate of Plans (i.e., the clandestine service) as too complex and in need of simplification. The Inspector General needed an agency-wide mandate. The role of the Operations Coordinating Board, the covert and clandestine oversight staff of the National Security Council needed to be strengthened, with operations clearly approved and guided from the highest levels of government.


The report addressed the classic problem of increasing performance while reducing costs. This meant better review of the budgets of covert and clandestine activities by a Review Board, except for the most sensitive operations. It meant providing the Comptroller with enough information, even if sanitized, to do a thorough job.
The report addressed the classic problem of increasing performance while reducing costs. This meant better review of the budgets of covert and clandestine activities by a Review Board, except for the most sensitive operations. It meant providing the Comptroller with enough information, even if sanitized, to do a thorough job.
===1956 Bruce-Lovett Report===
===1956 Bruce-Lovett Report===
In his biography of the late Robert Kennedy, historian Arthur Schlesinger Jr in briefly discussed a report he said was located in the Kennedy papers. There is no such report in the Kennedy papers, the CIA archives, the National Archives, the Eisenhower Library or other likely archives, and no documentation exists that an actual report ever existed. Schlesinger said that soon after [[President]] [[Dwight D. Eisenhower]] created the [[President's Foreign Intelligence Advisory Board|President's Board of Consultants on Foreign Intelligence Actitivites]], that Board requested that [[Robert A. Lovett]] and [[David K.E. Bruce]] examine CIA's covert operations.<ref name=RFKtimes>{{citation
In his biography of the late Robert Kennedy, historian Arthur Schlesinger, Jr. in briefly discussed a report he said was located in the Kennedy papers. There is no such report in the Kennedy papers, the CIA archives, the National Archives, the Eisenhower Library or other likely archives, and no documentation exists that an actual report ever existed. Schlesinger said that soon after President Dwight D. Eisenhower created the President's Intelligence Advisory Board|President's Board of Consultants on Foreign Intelligence Actitivites, that Board requested that Robert Lovett and David Bruce|David K.E. Bruce examine CIA's covert operations.<ref name=RFKtimes>{{citation
  | title = Robert Kennedy and His Times
  | title = Robert Kennedy and His Times
  | first = Arthur Jr. | last =  Schlesinger
  | first = Arthur Schlesinger, Jr.
  | year = 1978
  | year = 1978
  | pages = 454-458
  | pages = 454-458
  | url = http://cryptome.org/ic-black5602.htm
  | url = http://cryptome.org/ic-black5602.htm
}}</ref>. This information comes from [[Arthur M. Schlesinger, Jr.|Arthur Schlesinger]]'s book about [[Robert F. Kennedy]], cited by cryptome.org. ""Bruce was very much disturbed," Lovett told the Cuba board of inquiry in 1961. "He approached it from the standpoint of 'what right have we to go barging into other countries buying newspapers and handing money to opposition parties or supporting a candidate for this, that or the other office?' He felt this was an outrageous interference with friendly countries. . . . He got me alarmed, so instead of completing the report in thirty days we took two months or more.""
}}</ref>. This information comes from Arthur M. Schlesinger, Jr.|Arthur Schlesinger's book about Robert F. Kennedy, cited by cryptome.org. ""Bruce was very much disturbed," Lovett told the Cuba board of inquiry in 1961. "He approached it from the standpoint of 'what right have we to go barging into other countries buying newspapers and handing money to opposition parties or supporting a candidate for this, that or the other office?' He felt this was an outrageous interference with friendly countries. . . . He got me alarmed, so instead of completing the report in thirty days we took two months or more.""


Schlesinger went on to argue that, "The 1956 report, written in Bruce's spirited style, condemned
Schlesinger went on to argue that, "The 1956 report, written in Bruce's spirited style, condemned
<blockquote>the increased mingling in the internal affairs of other nations of bright, highly graded young men who must be doing something all the time to justify their reason for being.... Busy, moneyed, and privileged [the CIA] likes its "King Making" responsibility (the intrigue is fascinating -- considerable self-satisfaction, sometimes with applause, derives from "successes" -- no charge is made for "failures" -- and the whole business is very much simpler than collecting covert intellignece on the USSR through the usual CIA methods!).</blockquote>  
<blockquote>the increased mingling in the internal affairs of other nations of bright, highly graded young men who must be doing something all the time to justify their reason for being.... Busy, moneyed, and privileged [the CIA] likes its "King Making" responsibility (the intrigue is fascinating -- considerable self-satisfaction, sometimes with applause, derives from "successes" -- no charge is made for "failures" -- and the whole business is very much simpler than collecting covert intelligence on the USSR through the usual CIA methods!).</blockquote>  


According to cryptome's account of the Schlesinger book, "Bruce and Lovett could discover no reliable system of control. "there are always, of course, on record the twin, well-born purpose of 'frustrating the Soviets' and keeping others 'pro-western' oriented. Under these almost any [covert] action can be and is being justified.... Once having been conceived, the final approval given to any project (at informal lunch meetins of the OCB [Operations Coordinating Board] inner group) can, at best, be described as pro forma." One consequence was that "no one, other than those in the CIA immediately concerned with their day to day operation, has any detailed knowledge of what is going on." With "a horde of CIA representatives" swarming around the planet, CIA covert action was exerting "significant, almost unilateral influences... on the actual formulation of our foreign policies... sometimes completely unknown" to the local American ambassador." Bruce and Lovett concluded with an plea about taking control of covert operations and their consequences:
According to cryptome's account of the Schlesinger book, "Bruce and Lovett could discover no reliable system of control. "there are always, of course, on record the twin, well-born purpose of 'frustrating the Soviets' and keeping others 'pro-western' oriented. Under these almost any [covert] action can be and is being justified.... Once having been conceived, the final approval given to any project (at informal lunch meetings of the OCB [Operations Coordinating Board] inner group) can, at best, be described as pro forma." One consequence was that "no one, other than those in the CIA immediately concerned with their day to day operation, has any detailed knowledge of what is going on." With "a horde of CIA representatives" swarming around the planet, CIA covert action was exerting "significant, almost unilateral influences... on the actual formulation of our foreign policies... sometimes completely unknown" to the local American ambassador." Bruce and Lovett concluded with an plea about taking control of covert operations and their consequences:


<blockquote>Should not someone, somewhere in an authoritative position in our government, on a continuing basis, be... calculating... the long-range wisdom of activities which have entailed a virtual abandonment of the international "golden rule," and which, if successful to the degree claimed for them, are responsible in a great measure for stirring up the turmoitl and raising the doubts about us that exist in many countries of the world today?... Where will we be tomorrow?
<blockquote>Should not someone, somewhere in an authoritative position in our government, on a continuing basis, be... calculating... the long-range wisdom of activities which have entailed a virtual abandonment of the international "golden rule," and which, if successful to the degree claimed for them, are responsible in a great measure for stirring up the turmoil and raising the doubts about us that exist in many countries of the world today?... Where will we be tomorrow?  "Bruce was very much disturbed," Lovett told the Cuba board of inquiry in 1961. "He approached it from the standpoint of 'what right have we to go barging into other countries buying newspapers and handing money to opposition parties or supporting a candidate for this, that or the other office?' He felt this was an outrageous interference with friendly countries.... </blockquote>
| "Bruce was very much disturbed," Lovett told the Cuba board of inquiry in 1961. "He approached it from the standpoint of 'what right have we to go barging into other countries buying newspapers and handing money to opposition parties or supporting a candidate for this, that or the other office?' He felt this was an outrageous interference with friendly countries.... </blockquote>


The CIA itself would like more detail on this so-called report, a copy of which could not be found, in 1995, by the Agency's History Staff.<ref name=CIAhistBruce>{{citation
The CIA itself would like more detail on this so-called report, a copy of which could not be found, in 1995, by the Agency's History Staff.<ref name=CIAhistBruce>{{citation
Line 280: Line 239:
<blockquote>"Having reached a dead end, we consulted the author of the Dulles biography, Peter Grose. Grose told us that he had not seen the report itself but had used notes made from it by historian Arthur M. Schlesinger for ''Robert F. Kennedy and His Times'' (1978). Professor Schlesinger informed us that that he had seen the report in Robert Kennedy's papers before they were deposited at the John F. Kennedy Presidential Library in Boston. He had loaned Grose his notes and does not have a copy of these notes or of the report itself.</blockquote>
<blockquote>"Having reached a dead end, we consulted the author of the Dulles biography, Peter Grose. Grose told us that he had not seen the report itself but had used notes made from it by historian Arthur M. Schlesinger for ''Robert F. Kennedy and His Times'' (1978). Professor Schlesinger informed us that that he had seen the report in Robert Kennedy's papers before they were deposited at the John F. Kennedy Presidential Library in Boston. He had loaned Grose his notes and does not have a copy of these notes or of the report itself.</blockquote>


<blockquote>"This raises an interesting question: how did a report on the CIA written for President Eisenhower in 1956 end up in the RFK papers? We think we have the answer. Robert Lovett was asked to testify before Gen. [[Maxwell Taylor]]'s board of inquiry on the 1961 [[Bay of Pigs]] operation. Robert Kennedy was on that board and may have asked Lovett for a copy of the report. But we do not have the answer to another question: where is the "Bruce-Lovett" report? The JFK Presidential Library has searched the RFK papers without success. Surely the report will turn up some day, even if one government agency and four separate archives so far haven't been able to find it. But this episode helps to prove one of the few Iron Laws of History: the official who keeps the best records gets to tell the story."</blockquote>
<blockquote>"This raises an interesting question: how did a report on the CIA written for President Eisenhower in 1956 end up in the RFK papers? We think we have the answer. Robert Lovett was asked to testify before Gen. Maxwell Taylor's board of inquiry on the 1961 Bay of Pigs operation. Robert Kennedy was on that board and may have asked Lovett for a copy of the report. But we do not have the answer to another question: where is the "Bruce-Lovett" report? The JFK Presidential Library has searched the RFK papers without success. Surely the report will turn up some day, even if one government agency and four separate archives so far haven't been able to find it. But this episode helps to prove one of the few Iron Laws of History: the official who keeps the best records gets to tell the story."</blockquote>


Schlesinger himself said the "report" had no influence on the CIA or on Eisenhower at the time; indeed no one at the time ever mentioned it.
Schlesinger himself said the "report" had no influence on the CIA or on Eisenhower at the time; indeed no one at the time ever mentioned it.


===1975 investigations===
===1975 investigations===
The 1975 [[United States President's Commission on CIA activities within the United States]], better known as the Rockefeller Commission investigated questionable practices including assassination attempts and inappropriate domestic operations.  Larger Congressional investigations followed in 1975, first the [[Church Committee]] of the [[United States Senate]], followed by the [[Pike Committee]] of the [[United States House of Representatives]]. Eventually, these interim committees were replaced by the [[U.S. Senate Select Committee on Intelligence]] and the [[U.S. House Permanent Select Committee on Intelligence]].
The 1975 United States Commission on CIA activities within the United States, better known as the Rockefeller Commission investigated questionable practices including assassination attempts and inappropriate domestic operations.  Larger Congressional investigations followed in 1975. Eventually, these interim committees were replaced by the U.S. Senate Select Committee on Intelligence|Senate  and House Permanent Select Committee on Intelligence|House permanent intelligence committees.
 
===1996 reports===
===1996 reports===
In 1996, the [[U.S. House Permanent Select Committee on Intelligence]] issued a congressional report estimating that: "Hundreds of employees on a daily basis are directed to break extremely serious laws in countries around the world in the face of frequently sophisticated efforts by foreign governments to catch them. A safe estimate is that several hundred  
In 1996, the House Permanent Select Committee on Intelligence issued a congressional report estimating that: "Hundreds of employees on a daily basis are directed to break extremely serious laws in countries around the world in the face of frequently sophisticated efforts by foreign governments to catch them. A safe estimate is that several hundred  
times every day (easily 100,000 times a year) DO officers engage in highly illegal activities (according to foreign law) that not only risk political embarrassment to the US but also endanger the freedom if not lives of the participating foreign nationals and, more than occasionally, of the clandestine officer himself."<ref name = "memoryhole"> {{cite web
times every day (easily 100,000 times a year) DO officers engage in highly illegal activities (according to foreign law) that not only risk political embarrassment to the US but also endanger the freedom if not lives of the participating foreign nationals and, more than occasionally, of the clandestine officer himself."<ref name = "memoryhole"> {{cite web
| title =The CIA Commits Over 100,000 Serious Crimes Per Year
| title =The CIA Commits Over 100,000 Serious Crimes Per Year
Line 298: Line 258:


===2007 documents ===
===2007 documents ===
On [[27 June]] [[2007]] the CIA released  two collections of previously classified documents which outlined various activities of doubtful legality. The first collection, the "[[Family jewels (Central Intelligence Agency)|Family Jewels]]," consists of almost 700 pages of responses from CIA employees to a 1973 directive from Director of Central Intelligence [[James Schlesinger]] requesting information about activities inconsistent with the Agency's charter.<ref>{{cite news
On 27 June 2007, the CIA released  two collections of previously classified documents which outlined various activities of doubtful legality. The first collection consists of almost 700 pages of responses from CIA employees to a 1973 directive from Director of Central Intelligence#James Schlesinger|DCI James Schlesinger requesting information about activities inconsistent with the Agency's charter.<ref>{{cite news
|url=http://www.nytimes.com/2007/06/27/washington/27cia.html?pagewanted=all
|url=http://www.nytimes.com/2007/06/27/washington/27cia.html?pagewanted=all
|title=Files on Illegal Spying Show C.I.A. Skeletons From Cold War  
|title=Files on Illegal Spying Show C.I.A. Skeletons From Cold War  
|author=Mark Mazzetti and Tim Weiner
|first1=Mark | last1= Mazzetti |first2 = Tim | last2 = Weiner
|publisher=The New York Times
|publisher=The New York Times
|date=2007-06-27}}</ref>
|date=2007-06-27}}</ref>
Line 311: Line 271:
}}</ref>
}}</ref>


 
==Evaluation of intelligence quality==
 
H. R. McMaster, a historian and active U.S. Army general, <ref
 
name=McMaster1998>{{cite book
 
  | author = H. R. McMaster
 
  | title = Dereliction of Duty: Lyndon Johnson, Robert McNamara, the Joint Chiefs of Staff and the Lies That Led to Vietnam
  | year = 1998| publisher = Perennial}} </ref>, suggests that Vietnam War intelligence and decisionmaking without looking at the controversy and manipulation of numbers by, variously, working-level CIA analysts, the Office of the Secretary of Defense, the Military Assistance Command Vietnam, and the White House.  <ref name=Adams1994>{{cite book
  | author = Adams, Sam
  | title = War of Numbers: An Intelligence Memoir
  | year = 1994  | publisher = Steerforth Press| isbn= 188364223X}} </ref>. That the intelligence organizations in the military command were more optimistic is unsurprising, and not even indicative of something being seriously wrong -- as long as there are independent intelligence organizations to cross-check. as well as a thorough reading of the Pentagon Papers. Working level analysts at CIA had some of the most realistic assessments of the situation, but they didn't agree with the preconceptions of Johnson and McNamara any more than realistic assessments of Iraq's WMD capability agreed with Cheney, Rumsfeld, and Bush.
{{seealso|Double Cross System}}
In the Second World War, Germany believed what the Allies wanted them to believe, because their intelligence analysts depended overly on spies, who were actually controlled by the British Double-Cross system as part of a larger deception campaign under the London Controlling Staff. Even when intelligence professionals became convinced the Normandy invasion was the real Allied main effort, Hitler's "intuitions" could not be challenged.
{{seealso|Office of Special Plans}}
There have been several efforts to take a nontraditional approach to intelligence analysis, considered appropriate use of ideological understanding by its proponents, and politicized analysis by its detractors. Abram Shulsky argues that a pure social science analytical model will not work when active deception is involved; he was one of the key individuals in the Office of Special Plans that developed outside-the-intelligence-community analysis for the George W. Bush Administration.


==Notes==
==Notes==
{{reflist |2}}
{{reflist |2}}
[[Category:Suggestion Bot Tag]]

Latest revision as of 12:00, 3 November 2024

This article may be deleted soon.
To oppose or discuss a nomination, please go to CZ:Proposed for deletion and follow the instructions.

For the monthly nomination lists, see
Category:Articles for deletion.


This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

The fundamental decisions to do covert actions, and risky clandestine intelligence collection, are in a committee at White House level, although sometimes the decisions are made by the President and a very small number of advisors.

In principle, there is a current requirement to notify the Congress of certain operations, although the nature of the notification varies with the sensitivity of the project. For the most sensitive, typically eight members are briefed, without staff and without being allowed to take notes. In contrast, the Executive Branch uses experts in planning the proposal.

This has certainly not been the case in the past, when there was no Congressional notification, indeed sometimes with senior Congressional leaders saying they did not want to know.

Oversight and Approval

While the law is a little vague, the Executive Branch holds it needs to keep Congress informed, rather than obtain its permission. Congress however, can refuse to appropriate the basic budget, and this actually is being threatened. In an opinion column, Robert Novak wrote that "CIA refusal to reveal what it knows about the Sept. 6, 2007 Israeli bombing of a facility in Syria. Only chairmen and ranking minority members of the Intelligence committees, plus members of the congressional leadership, have been briefed. Other members of Congress, including Intelligence Committee members, were excluded. The Intelligence authorization bill, passed by the House and awaiting final action in the Senate, blocks most of the CIA's funding "until each member of the Congressional Intelligence committees has been fully informed with respect to intelligence" about the Syria bombing." [1] Novak, however, did not indicate if the CIA was unilaterally withholding information, or if they were under orders from the Director of National Intelligence, National Security Council, or President.

In principle, Congress could pass, with a veto-proof supermajority, legislation to cut off funding on a specific project, which is more or less what led to Iran-Contra after Congress passed the Boland Amendment that money could not be committed to that purpose. This is one of those areas where the Presidential and Congressional intent is as important, constitutionally, as the covert action itself.

Effect of political climate on action decisions

Many of the covert operations, from 1945, at least through Vietnam, were based on an internal government assumption that Communism had to be stopped at all costs, including violations of human rights and national sovereignty. Whether or not this belief is now considered correct, it must be remembered, in terms of the orders given to the CIA, that it was in the minds of the policymakers that authorized actions.

Competing Demands

When a hot war is in progress, there are often competing demands between the needs of forces in the field and strategic intelligence. In the Korean War, for example, the pre-CIA OSO clandestine collectors' mission was a CIA activities in Asia-Pacific#Korea|battleground between the Army tactical information requirements and the need for more global information (e.g., what were the Chinese and Soviets planning?).

Indirectly, this sort of conflict affects covert operations, if the tactical needs of intelligence collection have the covert operations somewhat in the dark. A good example coming from initially covert Direct Action (DA) mission was the POW rescue mission on the Son Tay prison camp. There was some intelligence indicating the POWs had been moved and the facility was empty, but the information was not confirmed and got to the strike force late. Complicating the issue were White House and Pentagon decisions that even if there were no prisoners, having the North Vietnamese know they were vulnerable to DA missions would divert their attention and resources. One could compare this with the effects, unknown to the US at the time, of the early 1942 Doolittle Raid on Japan, which did minimal damage but caused an overreaction on the Japanese side, bringing air defense back to the homeland, and then making an ill-advised attempt to extend their eastern defense line with the Battle of Midway.

When Security Hinders

Congress, especially Congressional staff, have constantly had problems in gaining access to highly classified intelligence-related information. For the most sensitive operations, there is essentially are compartmented control systems parallel to, or perhaps above the regular security clearance system

Authority to approve operations

See also: Unitary executive theory

Since 1954, oversight of United States, high-risk clandestine intelligence collection and covert action has been carried out by a series of sub-committees of the U.S. National Security Council. Before that time, the process rarely involved more than conversation at a National Security Council meeting. It is likely that in the 1947-1952 period, before the DCI brought the OPC and OSI under his firm control, that there well may have been some operations approved at no higher level than Director of OPC.

While some activities definitely happened without oversight, the initiative for many, such as CIA activities in Cuba|assassination attempts against Fidel Castro and CIA activities in Chile|actions against Salvador Allende of Chile were initiated at the White House. Other operations were proposed by CIA personnel, but moved forward only after higher-level approval.

Planning Coordination Group

The Planning Coordination Group was created by President of the United States of America|President Dwight D. Eisenhower|Eisenhower's Presidential Directive 5412/1 on 15 March 1954.[2] The group, initially, was headed by Special Assistant to the President for Foreign Affairs, Nelson Rockefeller.

Eisenhower opposed regular Congressional review. After the U-2 Incident in May 1960, he r discussed the 1960 U-2 incident with senior Congressional leaders, but made it clear that the operational decision had been made on his personal authority, and he did not want deep Congressional investigation into intelligence activities. When Sen. Mike Mansfield asked "What would the President think if there were to be established in the Congress a joint Congressional Committee which would oversee the activities of the CIA? The President responded that his own feeling was that the operation of the CIA was so delicate and so secret in many cases that it must be kept under cover, and that the Executive must be held responsible for it. He said that he would agree to some bipartisan group going down occasionally and receiving reports from the CIA on their activities, but that he would hate to see it formalized--indeed would be against the proposal made by Senator Mansfield.

Senator Richard Russell supported the President in this viewpoint and said that they do have a Congressional group that periodically went over reports. He said that they knew the U - 2 planes were under construction a long time ago. The Senator added that he was not afraid of the Senators on security matters but that he was afraid of staff leaks.[3]

NSC 5412/2 Special Group

The NSC 5412/2 Special Group, often referred simply as the Special Group, was an initially secret, but later acknowledged, subcommittee of the National Security Council responsible for coordinating government covert operations. Presidential Directive NSC 5412/2, issued December 28th 1954, assigned responsibility for co-ordination of covert actions to representatives of the Secretary of State, the Secretary of Defense, and the President respectively. [4]

A National Security Archive chronology of the Bay of Pigs Invasion indicates a membership in December 1960 of Director of Central Intelligence#Allen Dulles|DCI Allen Dulles, Chairman of the Central Intelligence Agency (CIA); Gordon Gray, National Security Advisor; James Douglas, United States Secretary of Defense|Acting Secretary of Defense; and Livingston T. Merchant, Under Secretary of State for Political Affairs.[5]

303 Committee

The covert actions oversight group was renamed the 303 Committee after National Security Action Memorandum No. 303 of 2 June 1964. McGeorge Bundy, Assistant to the President for National Security Affairs, became Chairman for the committee.

The successor to the Special Group was the 40 Committee. [6]

40 Committee

The 40 Committee was a committee of the National Security Council whose mandate was to review proposed major covert operation|covert actions. In 1970 the 40 Committee approved "Track I" efforts to prevent Salvador Allende from taking office following the Chilean presidential election of 1970, and then to remove him from office. See CIA activities in Chile.

Operations Advisory Group

On February 18, 1976, 40 committee was replaced by the Operations Advisory Group, in accordance with Executive Order 11905 issued by Gerald Ford. The new group was composed of the Assistant to the President for National Security Affairs, the Secretaries of United States Secretary of State|State and United States Secretary of Defense|Defense, the Chairman of the Joint Chiefs of Staff, and the Director of Central Intelligence.[7]

NSC Special Coordination Committee

The following year, on May 13, 1977 President Jimmy Carter issued Executive Order 11985 which updated the previous order such that the Operations Advisory Group thereafter would be known as the NSC Special Coordination Committee[8]

National Security Planning Group

Under the Reagan administration, the Special Coordination Committee was replaced by the National Security Planning Group which included the Vice-President, the United States Secretary of Defense|Secretary of Defense, the United States Secretary of State| Secretary of State, the Assistant to the President for National Security Affairs, and the Director of Central Intelligence.[9]

Impact of Directors and Management Styles

See Director of Central Intelligence for insights into the politics and management styles and actions associated with each director. Some general observations are in order.

For example, three directors, Director of Central Intelligence#Allen Dulles|Dulles, Director of Central Intelligence#Richard Helms|Helms and Director of Central Intelligence#William Colby|Colby, came through the ranks, counting OSS. Dulles and Helms were clandestine intelligence collectors, while Colby was on the covert action side. Casey was not a career officer, but did have field experience, as he was an OSS clandestine intelligence officer running the penetrations into Germany, but didn't stay in CIA, and came to the directorship through a political path. I believe that the OSS/CIA experience of these people affected how they ran things.

Director of Central Intelligence#Walter Bedell Smith | Smith is significant in that he was able to force the disparate operations groups into firm CIA control. Given he was Dwight Eisenhower | Eisenhower's WWII Chief of Staff, he presumably enjoyed a Presidential trust that few other DCIs had.

Director of Central Intelligence#Stansfield Turner | Turner and Director of Central Intelligence#James Schlesinger|Schlesinger were disastrous to morale, and probably caused the loss of a good deal of human-source intelligence corporate knowledge. Turner did have the advantage of being a classmate of Jimmy Carter's and enjoyed his trust.

Director of Central Intelligence#John McCone | McCone is often considered one of the best DCIs, who was a manager and engineer, not at all an intelligence specialist. It's also significant that he had a close relationship with JFK, but left because he and LBJ didn't trust one another. It has been speculated that had he been in office during Vietnam, there might have been much more realistic planning.

A counterexample Director of Central Intelligence#William Raborn| Raborn, a very smart man in other contexts who was completely clueless when it came to intelligence. There are lessons from Raborn, Schlesinger, Turner, and, in a very different way, Dulles, about characteristics you do not want in a DCI.

Congressional Oversight and Authority

Congress has, in principle, some level of authority over military operations, clandestine intelligence collection, covert action (at least by the CIA, if not by the United States Special Operations Command (USSOCOM)), and intelligence analysis. It exerts authority through approving budgets and authorizing the use of funds. It can also pass nonbinding resolutions of Congressional intent. Both of these areas have had little effect under the unitary executive theory that intelligence operations are a matter of presidential authority, a position strongly held by Dwight D. Eisenhower [3], and also a position of the George W. Bush Administration.

Budgetary

The intelligence budget, for which the total is beginning to be reported, is divided between

  1. the National Intelligence Program (NIP; formerly the National Foreign Intelligence Program or NFIP)
  2. the Military Intelligence Program (MIP).

There are various reporting mechanisms where a small military unit might run into something of national importance, and need to pass it up the chain of command. Marking material PINNACLE OPREP-3 and putting it into the general communications system is one way to do that.

Moving information in the other direction is a program called Tactical Exploitation of National Capabilities (TENCAP), which allows military units to access information generally considered of national interest alone. A good example was using the missile launch detection satellites, intended to warn the US of a Soviet strike, to give fast warning of SCUD launches in Iraq. There are cases, however, where the operating military forces made use of CIA data.

The MIP was established in September 2005 and includes all programs from the former Joint Military Intelligence Program (JMIP), which encompassed DOD-wide intelligence programs (i.e., organizations like NSA, DIA, NRO, and NGA, which are part of the United States Intelligence Community|intelligence community but also part of the United States Department of Defense, and most programs from the former Tactical Intelligence and Related Activities (TIARA) category, which encompassed intelligence programs supporting the operating units of the armed services. The Program Executive for the MIP is the Under Secretary of Defense for Intelligence. [10]

Only a small part of the intelligence budget is made public; the bulk of the $40 billion that media reporting associates with overall intelligence spending is “hidden” within the DOD budget. Spending for most intelligence programs is described in classified annexes to intelligence and national defense authorization and appropriations legislation. (Members of Congress have access to these annexes, but must make special arrangements to read them.)[10]

For a number of years some Members have sought to make public total amounts of intelligence and intelligence-related spending In March 1998, Tenet announced that the FY1998 figure was $26.7 billion.

The Implementing Recommendations of the 9-11 Commission Act of 2007, requires that the DNI publicly disclose the aggregate amount of funds appropriated for the NIP Jurisdiction over intelligence programs is somewhat different in the House and the Senate. The Senate Intelligence Committee has jurisdiction only over the NIP but not the MIP, whereas the House Intelligence Committee has jurisdiction over both sets of programs. The preponderance of intelligence spending is accomplished by intelligence agencies within DOD and thus in both chambers the armed services committees are involved in the oversight process. Other oversight committees are responsible for intelligence agencies that are part of departments other than DOD.

To improve financial control of intelligence, the Council on Foreign Relations proposed a "market constraint" on consumers of intelligence, in which they could only get a certain amount of intelligence from the intelligence community, before they had to provide additional funding.[11] A different constraint would be that an agency, to get information on a new topic, must agree to stop or reduce coverage on something currently being monitored for it. Even with this consumer-oriented model, the intelligence community itself needs to have a certain amount of resources that it can direct itself, for building basic intelligence and identifying unusual threats.

"It is important that intelligence officers involved in articulating requirements represent both analysts and collectors, including those from the clandestine side. In addition, collection should be affected by the needs of policymakers and operators. All of this argues strongly against any organizational reforms that would isolate the collection agencies further or increase their autonomy. [11]

Especially in nations with advanced technical sensors, there is an interaction between budgeting and technology. For example, the US has tended, in recent years, to use National Reconnaissance Office#Future Generation Technology|billion-dollar SIGINT satellites, where France has used SIGINT space-based platforms#France: Satellite Platforms| "swarms" of "microsatellites". The quantity versus quality battle is as evident in intelligence technology as in weapons systems. The US has also fought a battle of stovepiping, in which SIGINT and IMINT satellites, in a given satellite orbits|orbit, were launched by different agencies.

Currently and historically, less than a tenth of what the United States spends on intelligence is devoted to analysis; it is the least expensive dimension of intelligence. Not all duplication is wasteful.[11] This has been a continuing issue with bomb damage assessment, going back to the beginnings of aerial bombardment. Even with considerably improved sensors in 1991, it remains a problem, and, as with the Vietnam case, there tended to be increasingly more pessimistic analyses in the theater command, the Department of Defense, and the CIA.

Expertise

There is a problem with things that are both sensitive and technical, which is more likely to involve clandestine intelligence collection than covert action,another reason not to think of the CIA as an agency that only does covert action. This is also a matter where things get confusing between the CIA proper and the Intelligence Community.

Restructuring in the Intelligence Community

Long before the Director of National Intelligence was put in nominal charge, there were turf wars within the U.S. intelligence community. Some programs, however, were not under effective oversight.

At one time, before the NGA had been created, CIA and the military jointly ran the National Reconnaissance Office, in charge of the launching and operation of satellites. The next generation of reconnaissance satellites, under the name National Reconnaissance Office#Future Imagery Architecture|Future Imagery Architecture (FIA), ran into a multibillion dollar overrun, because the contractor was trying to do something beyond the state of the art. The FIA was discussed in public, so it presumably was an Acknowledged program that the committee staff and consultants could discuss.

The George W. Bush Administration NSA telephone surveillance program, however, is one of the blackest of black programs, and has not been reviewed by other than the "Big 8" members, none of whom have a relevant technical background. Nevertheless, earlier domestic surveillance, such as Project MINARET and SHAMROCK, were also under minimal oversight, sometimes when legislators explicitly said they did not want details.

Actually reading intelligence documents

Yet another issue, not one of approval but interpretation, is whether the Executive Branch had adequately evaluated the intelligence the George W. Bush Administration had used to justify the very overt action, as the Iraq War.

Paul Pillar, a controversial CIA analytic officer and now an academic, observed "Intelligence affects the nation's interests through its effect on policy. No matter how much the process of intelligence gathering itself is fixed, the changes will do no good if the role of intelligence in the policymaking process is not also addressed.... But a few steps, based on the recognition that the intelligence-policy relationship is indeed broken, could reduce the likelihood that such a breakdown will recur.[12] Pillar, whose views are not universally shared among advocates of oversight, sees the British approach as a model. It is U.K. policy that its intelligence services are not to be matters of public debate. At the same time, the U.K. Government takes serious political responsibility for inappropriate politicization, a serious step in a parliamentary system. "In the United Kingdom, Prime Minister Tony Blair accepted a commission of inquiry's conclusions that intelligence and policy had been improperly commingled in such exercises as the publication of the "dodgy dossier," the British counterpart to the United States' Iraqi WMD white paper." Pillar suggested the equivalent U.S. approach could be "congressional resolution and be seconded by a statement from the White House, a process that could discourage future administrations from politicize intelligence analyses to support a preconceived policy. It would also give some leverage to intelligence officers in resisting any such future attempts." He assumes that the White House and Congress will cooperate, and that a resolution in the U.S. system would have the force of an action that could cause the fall of a parliamentary government.

"The proper relationship between intelligence gathering and policymaking sharply separates the two functions....Congress, not the administration, asked for the now-infamous October 2002 National Intelligence Estimate (NIE) on Iraq's unconventional weapons programs, although few members of Congress actually read it. (According to several congressional aides responsible for safeguarding the classified material, no more than six senators and only a handful of House members got beyond the five-page executive summary.) As the national intelligence officer for the Middle East, I was in charge of coordinating all of the intelligence community's assessments regarding Iraq; the first request I received from any administration policymaker for any such assessment was not until a year into the war.

While oversight should come from Congress, Pillar recommends the creation of a "nonpartisan office modeled on the Government Accountability Office (GAO) and the Congressional Budget Office (CBO). Such an office would have a staff, smaller than that of the GAO or the CBO, of officers experienced in intelligence and with the necessary clearances and access to examine questions about both the politicization of classified intelligence work and the public use of intelligence. As with the GAO, this office could conduct inquiries at the request of members of Congress. It would make its results public as much as possible, consistent with security requirements, and it would avoid duplicating the many other functions of intelligence oversight, which would remain the responsibility of the House and Senate intelligence committees."

Just as the General Accountability Office (GAO) does not duplicate the size of the Executive Branch in order to audit it, an intelligence analysis office reporting to the Congress need not duplicate the United States intelligence community|intelligence community (IC). Its personnel would need all-source intelligence clearances, and, in many cases, the experts might have gained some of their knowledge while working in the IC.

Independent government reviews

Several investigations (e.g., Church Committee, United States President's Commission on CIA activities within the United States|Rockefeller Commission, Pike Committee), as well as released declassified documents, reveal that the CIA, at times, operated outside its charter. In some cases, such as during Watergate, this may have been due to inappropriate requests by White House staff. In other cases, there was a violation of Congressional intent, such as the Iran-Contra affair.

1949 Eberstadt Report (First Hoover Commission)

The first major analysis, following the National Security Act of 1947, was chaired by former President Herbert Hoover, with a Task Force on National Security Organization under Ferdinand Eberstadt, one of the drafters of the National Security Act and a believer in centralized intelligence.

The task force concluded that the system of the day led to an adversarial relationship, with little effective coordination, among the CIA, the military, and the State Department. "In the opinion of the task force, this produced duplication on one hand, and, on the other, departmental intelligence estimates that "have often been subjective and biased." In large measure, the military and State Department were blamed for their failure to consult and share pertinent information with the CIA. The task force recommended "that positive efforts be made to foster relations of mutual confidence between the [CIA] and the several departments and agencies that it serves."

This report stressed that the CIA "must be the central organization of the national intelligence system." It recommended a "...top echelon [of] an evaluation board or section composed of competent and experienced personnel who would have no administrative responsibilities and whose duties would be confined solely to intelligence evaluation." It also favored a civilian DCI with a long term in office.

In operations, the report recommended consolidation of OPC and OSO into CIA, with NSC supervision. The authors agreed that the authority over such operations should transfer to the Joint Chiefs of Staff in wartime.

The report declared that the failure to appraise scientific advances (e.g., biological and chemical warfare, electronics, aerodynamics, guided missiles, atomic weapons, and nuclear energy) in hostile countries might have more immediate and catastrophic consequences than failure in any other field of intelligence. It urged the US to develop a centralized capability for tracking these developments.

1949 Dulles-Jackson-Correa Report

The Eberstadt report was soon eclipsed by what may have been the most influential policy paper. "On January 8, 1948, the National Security Council established the Intelligence Survey Group (ISG) to "evaluate the CIA's effort and its relationship with other agencies."[13]The Jackson-Dulles-Correa report held an opposite view on clandestine collection to the Eberstadt Report, interesting in that Dulles was a clandestine collection specialist.

The authors were Allen W. Dulles, who had served in the Office of Strategic Services (OSS) during the Second World War and would become DCI in 1953, William Jackson, a future Deputy DCI, and Matthias Correa, a former assistant to Secretary of Defense James Forrestal when the latter had served as Secretary of the Navy during the war. Chaired by Dulles, the ISG presented its findings to the National Security Council on 1 January 1949. Partially declassified in 1976, it "contained fifty-six recommendations, many highly critical of the CIA and DCI. In particular, the report revealed problems in the agency's execution of both its intelligence and operational missions. It also criticized the quality of national intelligence estimates by highlighting the CIA's--and, by implication, the DCI's--"failure to take charge of the production of coordinated national estimates." The report went on to argue that the CIA's current trend in clandestine intelligence activities should be reversed in favor of its mandated role as coordinator of intelligence." It was "particularly concerned about the personnel situation at CIA, including internal security, the high turnover of employees, and the excessive number of military personnel assigned to the agency." See the continuing concern about personnel in the #1954 Doolittle Report on Covert Activities| 1954 Doolittle Report To add "continuity of service" and the "greatest assurance of independence of action," the report argued that the DCI should be a civilian and that military appointees be required to resign their commissions.

Both the Eberstadt and Dulles-Jackson-Correa Reports also saw inadequacies in scientific intelligence and in the service intelligence organizations, and urged that the CIA provide greater coordination. This led to a recommendation for increased coordination between the DCI and the Director of the Federal Bureau of Investigation (FBI) in the arena of counterespionage. In turn, the report recommended that the Director of FBI be elevated to membership in the committee to help the DCI coordinate intelligence and set intelligence requirements.

The report proposed a large-scale reorganization of CIA. Even though it emphasized intelligence analysis and coordination over operations, like the Eberhardt Report, it recommended bringing OPC and OSO into CIA. While the proposed directorates were not the same as came to pass, a four-directorate structure was proposed, with units for coordination, estimates, intelligence analysis and operations. The heads of the new offices would be included in the immediate staff of the DCI so that he would have "intimate contact with the day-to-day operations of his agency and be able to give policy guidance to them."

Until the DNI creation, estimates were in a separate office reporting to the DCI, coordination was a job of the DDCI (later assisted by the Intelligence Community Staff), research and reports became the Directorate of Intelligence, and operations was first, euphemistically, called the Directorate of Plans. Directorates for Support (originally called Administration), and Science & Technology, were also created.

1954 Doolittle Report on Covert Activities

Gen. Jimmy Doolittle|James Doolittle did an extensive report on covert actions, specifically for President Dwight D. Eisenhower.[14]

The report's first recommendation dealt with personnel. It recommended releasing a large number of current staff that could never be more than mediocre, aggressively recruit new staff with an overall goal of increasing the workforce, and intensify training, with 10% of the covert staff time spent in training. The Director should be nonpolitical.

Security was the next concern, starting with strengthening security clearance procedures, Counterintelligence#offensive counterintelligence| Counterespionage, and field reporting and inspection.

Coordination in the United States intelligence community|intelligence community was seen as a problem, especially agreeing on clear understandings between CIA and military intelligence organizations. The overall IC program for eliciting information from defectors needed improvement, with contributions from multiple agencies.

As far as organization and management, the report described the structure of the Directorate of Plans (i.e., the clandestine service) as too complex and in need of simplification. The Inspector General needed an agency-wide mandate. The role of the Operations Coordinating Board, the covert and clandestine oversight staff of the National Security Council needed to be strengthened, with operations clearly approved and guided from the highest levels of government.

The report addressed the classic problem of increasing performance while reducing costs. This meant better review of the budgets of covert and clandestine activities by a Review Board, except for the most sensitive operations. It meant providing the Comptroller with enough information, even if sanitized, to do a thorough job.

1956 Bruce-Lovett Report

In his biography of the late Robert Kennedy, historian Arthur Schlesinger, Jr. in briefly discussed a report he said was located in the Kennedy papers. There is no such report in the Kennedy papers, the CIA archives, the National Archives, the Eisenhower Library or other likely archives, and no documentation exists that an actual report ever existed. Schlesinger said that soon after President Dwight D. Eisenhower created the President's Intelligence Advisory Board|President's Board of Consultants on Foreign Intelligence Actitivites, that Board requested that Robert Lovett and David Bruce|David K.E. Bruce examine CIA's covert operations.[15]. This information comes from Arthur M. Schlesinger, Jr.|Arthur Schlesinger's book about Robert F. Kennedy, cited by cryptome.org. ""Bruce was very much disturbed," Lovett told the Cuba board of inquiry in 1961. "He approached it from the standpoint of 'what right have we to go barging into other countries buying newspapers and handing money to opposition parties or supporting a candidate for this, that or the other office?' He felt this was an outrageous interference with friendly countries. . . . He got me alarmed, so instead of completing the report in thirty days we took two months or more.""

Schlesinger went on to argue that, "The 1956 report, written in Bruce's spirited style, condemned

the increased mingling in the internal affairs of other nations of bright, highly graded young men who must be doing something all the time to justify their reason for being.... Busy, moneyed, and privileged [the CIA] likes its "King Making" responsibility (the intrigue is fascinating -- considerable self-satisfaction, sometimes with applause, derives from "successes" -- no charge is made for "failures" -- and the whole business is very much simpler than collecting covert intelligence on the USSR through the usual CIA methods!).

According to cryptome's account of the Schlesinger book, "Bruce and Lovett could discover no reliable system of control. "there are always, of course, on record the twin, well-born purpose of 'frustrating the Soviets' and keeping others 'pro-western' oriented. Under these almost any [covert] action can be and is being justified.... Once having been conceived, the final approval given to any project (at informal lunch meetings of the OCB [Operations Coordinating Board] inner group) can, at best, be described as pro forma." One consequence was that "no one, other than those in the CIA immediately concerned with their day to day operation, has any detailed knowledge of what is going on." With "a horde of CIA representatives" swarming around the planet, CIA covert action was exerting "significant, almost unilateral influences... on the actual formulation of our foreign policies... sometimes completely unknown" to the local American ambassador." Bruce and Lovett concluded with an plea about taking control of covert operations and their consequences:

Should not someone, somewhere in an authoritative position in our government, on a continuing basis, be... calculating... the long-range wisdom of activities which have entailed a virtual abandonment of the international "golden rule," and which, if successful to the degree claimed for them, are responsible in a great measure for stirring up the turmoil and raising the doubts about us that exist in many countries of the world today?... Where will we be tomorrow? "Bruce was very much disturbed," Lovett told the Cuba board of inquiry in 1961. "He approached it from the standpoint of 'what right have we to go barging into other countries buying newspapers and handing money to opposition parties or supporting a candidate for this, that or the other office?' He felt this was an outrageous interference with friendly countries....

The CIA itself would like more detail on this so-called report, a copy of which could not be found, in 1995, by the Agency's History Staff.[16] Referring to reports such as the Dulles-Jackson-Correa, Doolittle, Pike, Church, and Rockefeller reports, the Staff "recently ran across a reference to another item, the so-called "Bruce-Lovett" report, that it would very much like to read--if we could find it! The report is mentioned in Peter Grose's recent biography Gentleman Spy: The Life of Allen Dulles. According to Grose, [Bruce and Lovett] prepared a report for President Dwight Eisenhower in the fall of 1956 that criticized CIA's alleged fascination with "kingmaking" in the Third World and complained that a "horde of CIA representatives" was mounting foreign political intrigues at the expense of gathering hard intelligence on the Soviet Union.

The History Staff checked the CIA files on the President's Board of Consultants on Foreign Intelligence Activities (PBCFIA). They checked with the Eisenhower Library. They checked with the National Archives, which holds the PBCFIA records. They checked with the Virginia Historical Society, the custodian of David Bruce's papers. None had a copy.

"Having reached a dead end, we consulted the author of the Dulles biography, Peter Grose. Grose told us that he had not seen the report itself but had used notes made from it by historian Arthur M. Schlesinger for Robert F. Kennedy and His Times (1978). Professor Schlesinger informed us that that he had seen the report in Robert Kennedy's papers before they were deposited at the John F. Kennedy Presidential Library in Boston. He had loaned Grose his notes and does not have a copy of these notes or of the report itself.

"This raises an interesting question: how did a report on the CIA written for President Eisenhower in 1956 end up in the RFK papers? We think we have the answer. Robert Lovett was asked to testify before Gen. Maxwell Taylor's board of inquiry on the 1961 Bay of Pigs operation. Robert Kennedy was on that board and may have asked Lovett for a copy of the report. But we do not have the answer to another question: where is the "Bruce-Lovett" report? The JFK Presidential Library has searched the RFK papers without success. Surely the report will turn up some day, even if one government agency and four separate archives so far haven't been able to find it. But this episode helps to prove one of the few Iron Laws of History: the official who keeps the best records gets to tell the story."

Schlesinger himself said the "report" had no influence on the CIA or on Eisenhower at the time; indeed no one at the time ever mentioned it.

1975 investigations

The 1975 United States Commission on CIA activities within the United States, better known as the Rockefeller Commission investigated questionable practices including assassination attempts and inappropriate domestic operations. Larger Congressional investigations followed in 1975. Eventually, these interim committees were replaced by the U.S. Senate Select Committee on Intelligence|Senate and House Permanent Select Committee on Intelligence|House permanent intelligence committees.

1996 reports

In 1996, the House Permanent Select Committee on Intelligence issued a congressional report estimating that: "Hundreds of employees on a daily basis are directed to break extremely serious laws in countries around the world in the face of frequently sophisticated efforts by foreign governments to catch them. A safe estimate is that several hundred times every day (easily 100,000 times a year) DO officers engage in highly illegal activities (according to foreign law) that not only risk political embarrassment to the US but also endanger the freedom if not lives of the participating foreign nationals and, more than occasionally, of the clandestine officer himself."[17]

In the same document, the committee wrote, "Considering these facts and recent history, which has shown that the [Director of the Central Intelligence Agency], whether he wants to or not, is held accountable for overseeing the [Clandestine Service], the DCI must work closely with the Director of the CS and hold him fully and directly responsible to him."[13]

2007 documents

On 27 June 2007, the CIA released two collections of previously classified documents which outlined various activities of doubtful legality. The first collection consists of almost 700 pages of responses from CIA employees to a 1973 directive from Director of Central Intelligence#James Schlesinger|DCI James Schlesinger requesting information about activities inconsistent with the Agency's charter.[18]

The second collection, the CAESAR-POLO-ESAU papers, consists of 147 documents and 11,000 pages of research from 1953 to 1973 relating to Soviet and Chinese leadership hierarchies, and Sino-Soviet relations.[19]

Evaluation of intelligence quality

H. R. McMaster, a historian and active U.S. Army general, [20], suggests that Vietnam War intelligence and decisionmaking without looking at the controversy and manipulation of numbers by, variously, working-level CIA analysts, the Office of the Secretary of Defense, the Military Assistance Command Vietnam, and the White House. [21]. That the intelligence organizations in the military command were more optimistic is unsurprising, and not even indicative of something being seriously wrong -- as long as there are independent intelligence organizations to cross-check. as well as a thorough reading of the Pentagon Papers. Working level analysts at CIA had some of the most realistic assessments of the situation, but they didn't agree with the preconceptions of Johnson and McNamara any more than realistic assessments of Iraq's WMD capability agreed with Cheney, Rumsfeld, and Bush.

See also: Double Cross System

In the Second World War, Germany believed what the Allies wanted them to believe, because their intelligence analysts depended overly on spies, who were actually controlled by the British Double-Cross system as part of a larger deception campaign under the London Controlling Staff. Even when intelligence professionals became convinced the Normandy invasion was the real Allied main effort, Hitler's "intuitions" could not be challenged.

See also: Office of Special Plans

There have been several efforts to take a nontraditional approach to intelligence analysis, considered appropriate use of ideological understanding by its proponents, and politicized analysis by its detractors. Abram Shulsky argues that a pure social science analytical model will not work when active deception is involved; he was one of the key individuals in the Office of Special Plans that developed outside-the-intelligence-community analysis for the George W. Bush Administration.

Notes

  1. Novak, Robert D. (December 26, 2007), "A Rogue CIA", CNSNews.com Commentary
  2. Miller, James E. (2001). Foreign Relations, 1964–1968 Volume XII. United States Government Printing Office. 
  3. 3.0 3.1 Dwight D. Eisenhower (26 May 1960), 154. Memorandum of Conversation: Bipartisan leaders breakfast with the President, "May - July 1960 : The U-2 Airplane Incident", Foreign Relations of the United States
  4. The Federation of American Scientists list of national security documents for the Eisenhower administration does not show a directive 5412/2. It does however show a 5412/1 with a classified title (one of only three such documents for the entire administration).
  5. Bay of Pigs: 40 Years After - Chronology. The National Security Archive.
  6. Covert Action in Chile: 1963–1973, United States Department of State
  7. Note on U.S. Covert Actions. United States Department of State.
  8. Executive Order 11985. Federation of American Scientists (May 13th, 1977).
  9. Loch K. Johnson. "Covert Action and Accountability: Decision-Making for America's Secret Foreign Policy", International Studies Quarterly, March 1989.
  10. 10.0 10.1 Best, Richard A. Jr. (October 19, 2007), "Intelligence Issues for Congress", CRS Reports for Congress
  11. 11.0 11.1 11.2 Council on Foreign Relations, Making Intelligence Smarter: The Future of US Intelligence. Retrieved on 2007-10-21
  12. Paul Pillar (March/April 2006), "Intelligence, Policy,and the War in Iraq", Foreign Affairs. Retrieved on 2007-10-30
  13. 13.0 13.1 Permanent Select Committee on Intelligence, House of Representatives, 104th Congress (2006-07-16), "IX. Clandestine Service", The Intelligence Community in the 21st Century,
  14. Doolittle, James (30 September 1954), Report on the Covert Activities of the Central Intelligence Agency
  15. Robert Kennedy and His Times, 1978, at 454-458
  16. "The Elusive "Bruce-Lovett Report"", Center for the Study of Intelligence Newsletter, Spring 1995
  17. The CIA Commits Over 100,000 Serious Crimes Per Year. www.thememoryhole.org (2006-07-16).
  18. Files on Illegal Spying Show C.I.A. Skeletons From Cold War, The New York Times, 2007-06-27.
  19. Central Intelligence Agency, CIA Releases Two Significant Collections of Historical Documents
  20. H. R. McMaster (1998). Dereliction of Duty: Lyndon Johnson, Robert McNamara, the Joint Chiefs of Staff and the Lies That Led to Vietnam. Perennial. 
  21. Adams, Sam (1994). War of Numbers: An Intelligence Memoir. Steerforth Press. ISBN 188364223X.