U.S. National Security and the Intelligence Services While there are books that cover national security, intelligence collec- tion, intelligence analysis and various intelligence services, U.S. National Security and the Intelligence Services is the first, all- inclusive book to exam- ine intelligence agencies as a direct function of national security. It serves as a comprehensive text for students and a resource for those in the intel- ligence profession and national security scholars. The book offers an i n- depth understanding of the important role that the intelligence services provide to the national security of a nation. It also includes information on the various types of intelligence, collec- tion methods, tradecraft and intelligence analysis methods, as well as intelligence- related resources. Coverage provides an overview of what national security is and its relationship with intelligence services of the United States, its key allies and hostile nations. Key Features: • Identifies the various national security threats and details the numerous U.S. and key allied intelligence services that work and collaborate to mitigate such threats • Reviews the types of intelligence – outlining intelligence collec- tion methods and intelligence tradecraft • Explores how to determine the value of the intelligence collected, explaining the various methods of intelligence analysis and opti- mal methods to present conclusions The roles the various agencies in the intelligence services play are as vital as the intelligence collected, the means by which it’s collected and the meth- odology in which it is disseminated and analyzed. U.S. National Security and the Intelligence Services provides a handy reference outlining the frame- work, and the processes, that comprise the U.S. intelligence apparatus. U.S. National Security and the Intelligence Services Daniel J. Benny First edition published 2023 by CRC Press 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487- 2742 and by CRC Press 4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN CRC Press is an imprint of Taylor & Francis Group, LLC © 2023 Daniel J. Benny Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, repro- duced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, access www.copy- right.com or contact the Copyright Clearance Center, Inc. ( CCC), 222 Rosewood Drive, Danvers, MA 01923, 978- 750-8 400. For works that are not available on CCC please contact mpkbooksper- [email protected] Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe. ISBN: 9 78- 1-0 32- 21999- 8 ( hbk) ISBN: 978- 1- 032- 21998- 1 ( pbk) ISBN: 978- 1- 003- 27084-3 (e bk) DOI: 10.4324/9 781003270843 Typeset in Palatino LT Std by codeMantra CONTENTS Acknowledgments xi Author biography xiii 1 National Security and the Need for Intelligence 1 National Security 1 National Security Act of 1947 5 Intelligence 6 United States Espionage Acts of 1917 7 United States Economic Espionage Act of 1996 9 Uniformed Trade Secrets Act 9 Homeland Security Act of 2002 9 Intelligence Reform and Terrorism Prevention Act of 2004 10 Sharing Intelligence 11 National Security Threats from Hostile Nations 13 People’s Republic of China 13 Russian Federation 15 Democratic People’s Republic of Korea AKA North Korea 15 Islamic Republic of Iran 16 Islamic Emirate of Afghanistan 16 National Security Threats from Terrorism 17 Review Exercise 21 References 21 2 United States Intelligence Services 25 United States National Intelligence Community 25 Office of the Director of National Intelligence 25 Central Intelligence Agency 26 National Security Agency 27 Special Collection Service 28 National Geospatial Intelligence Agency 28 National Reconnaissance Agency 28 National Underwater Reconnaissance Office 28 Contents National Security Council 29 United States Law Enforcement Intelligence Community 29 Department of Justice Office of Intelligence 29 Federal Bureau of Investigation 29 Department of Homeland Security Office of Intelligence Analysis 31 Department of State Bureau of Intelligence and Research 31 Department of the Treasury Office of Intelligence Analysis 32 Department of Energy Office of Intelligence and Counterintelligence 33 Drug Enforcement Administration Office of National Security Intelligence 33 United States Secret Service Intelligence 33 United States Military Intelligence Community 34 Defense Intelligence Agency 34 Department of the Navy Office of Naval Intelligence 34 United States Marine Corps Intelligence Division 35 United States Coast Guard Intelligence 36 Department of the Army Intelligence and Security Command 36 Department of the Air Force Intelligence 37 United States Space Force Intelligence 38 Review Exercise 38 References 38 3 United States Key Allied Intelligence Services 41 United Kingdom Intelligence Community 41 Secret Intelligence Service ( MI6) 41 Security Service ( MI5) 42 Government Communications Headquarters 43 Metropolitan Police “ Scotland Yard” Directorate of Intelligence 43 Defense Intelligence 44 Canadian Intelligence Community 45 Canadian Security Intelligence Service 45 Royal Canadian Mounted Police 45 Israeli Intelligence Community 46 Agaf Modin or Aman IDF Intelligence 46 Shabak or Shin Bet 46 Mossas 46 German Intelligence Community Bundesnachrichtendienst ( BDN) 46 Bundesant fur Verfassungsschuts ( BFV) 47 French Intelligence Community 47 vi Contents Directorate General for External Security ( DGSE) 47 Directorate General for Internal Security ( DGSI) 47 Directorate of Military Intelligence ( DRM) 47 Australian Intelligence Community 48 Office of National Intelligence ( ONI) 48 Department of Home Affairs 48 Australian Secret Intelligence Service ( ASIS) 48 Australian Signals Directorate ( ASDO) 48 Australian Geospatial Intelligence Organization ( AGO) 48 Department of Foreign Affairs and Trade ( DFAT) 48 Australian Security Intelligence Organization ( ASIO) 49 Australian Federal Police ( AFP) 49 Australian Transaction Reports and Analysis Center ( AUSTRAC) 49 Japanese Intelligence Community 49 Public Security Intelligence Agency 49 Review Exercise 49 References 50 4 Key Hostile Nations Intelligence Services 51 People’s Republic of China Intelligence Community 51 Ministry of State Security 51 Intelligence Bureau of the Joint Staff 51 Russian Federation Intelligence Community 51 Foreign Intelligence Service of the Russian Federation 51 Federal Security Service 52 Democratic People’s Republic of Korea Intelligence Community 52 Reconnaissance General Bureau 52 Ministry of State Security 52 Intelligence Bureau of the Joint Staff 52 Islamic Republic of Iran Intelligence Community 53 Islamic Revolutionary Guard Corps 53 Review Exercise 53 References 53 5 Categories of Intelligence 55 Open Source ( OPINT) 55 Media 55 Internet 55 vii CoNteNtS Professional Publications 56 Academic Publications 56 Government 56 Legal 57 Commercial and Corporate 57 Grey Data 57 Public Meeting Locations 57 Dumpster Diving 57 Human ( HUNIMT) 58 Targeted Assets 58 Walk- In Assets 59 Informants 59 Human Intelligence Tradecraft in Hostile Nations 59 Imagery ( IMINT) 62 Geospatial ( GEOINT) 64 Signals ( SIGINT) 64 Measures and Signatures ( MASINT) 65 Intelligence Tradecraft and Operations Case Studies 65 The Bay of Pigs of 1961 and the Cuban Missile Crises of 1962 65 Bay of Pigs Covert Operation 65 The Cuban Missile Crises 71 The Rational Choice Theory and Intelligence Operations – Falkland Islands War of 1982 72 The Rational Choice Theory 72 Historical Overview of the Falkland Island War 73 Rational Choice Theory and Argentine Intelligence During the War 75 Rational Choice Theory and British Intelligence During the War 76 Conclusion 78 Review Exercise 79 References 80 6 Intelligence Collection, Processing, Analysis and Dissemination Methods 83 Central Intelligence Agency Intelligence Cycle 83 Planning and Direction 83 Collection 83 Processing 84 All- Source Analysis and Production 84 Dissemination 84 Director of National Intelligence Intelligence Cycle 84 viii CoNteNtS Planning 84 Collection 85 Processing 85 Analysis 85 Dissemination 85 Evaluation 85 Target- Centric 85 Review Exercise 86 References 86 7 Determining the Value of Intelligence 89 Sources 89 Reliability 89 Relevance 90 Timeliness 90 Accuracy 90 Objectivity and Bias 90 Usability 91 Review Exercise 91 References 92 8 Intelligence Analysis 93 The Intelligence Analysts and the Policymakers 93 Timelines 94 Short Term 94 Long Term 94 Scope 95 Strategic 95 Tactical 95 Operational 95 Intelligence Drivers 96 Customer Driven 96 Analysts Driven 96 Events Driven 96 Scheduled Driven 96 Intelligence Mindset 97 Intelligence Product 97 Review Exercises 97 References 98 ix