America's Agenda For Global Military Domination


Important Reports

To read the posts on the other issues please use the links named after the different page-subtitles.

For additional information see also the sections
__________________

News & Comments

_______________
Important Reports

VIDEO Sky TV Conspiracies: Iraq / The Great Iraq Heist

VIDEO Arsenal of Hypocrisy

FACT: Watching Lebanon - Washingtons Interests In Israels War

America's War On The Web

The new National Intelligence Strategy Of The United States: Towards An Even More Dangerous International Security Apparatus

The Pentagon Roadmap To Hell: The Pentagon's New Map

US: Pentagon Detention Guidelines Entrench Illegality

US Draws Up List Of Unstable Countries

Pentagon Seeks To Create Robotic Battlefield Surgeon

DoD Press Releases To NMS & NDS

NCIX Introduction Of The National Counterintelligence Strategy

The Metamorphosis Continues: New Pantagon Vision Transforms War Agenda

VIDEO: BBC Panorama - The War Party

VIDEO: Preventive Warriors

"Secret" Air Base for Iraq War started prior 9-11

PNAC: The Project for the New American Century

FLASHBACK: Dick Cheneys Song of America (Defense Strategy for the 1990s)

_______________

Major Strategic Documents


Related Links

Federation of American Scientists

uhuh.com -- Exposing Corruption at the Federal Level

Very Pissed Off Combat Veterans -- And Blueprints For Change By John McCarthy

Agenda for The Empire

- Important Reports -

Home | John McCarthy | CIA | Treason in Wartime | 1941-2001 | Science vs Religion | Reality Or Hoax? | Israel & ME | 9/11 - 3/11 - 7/7 -- Cui Bono? | New World Order | Lies vs Facts | War on Terror - Terrorism of War | Patriotism vs Humanity | War Crimes - Committed 'In All Our Names' | Enviroment & Lobbyism | FOIA & Whistleblowers vs Cover-Ups | Recruiting Lies vs Military Reality | From Democracy to Dictatorship | Empire Agenda | Media Coverage | International (War)Crimes Tribunals | Take Action! - Take Back America! | Summaries & Previews | Index Part 1 | Index Part 2 | Multimedia Index

NCIX Introduction of
The National Counterintelligence Strategy of the United States
________________
 

Honorable Michelle Van Cleave
National Counterintelligence Executive
remarks prepared for delivery
Conference on Counterintelligence for the 21st Century
Bush School of Intelligence, Texas A&M University
March 5, 2005

The National Counterintelligence Strategy of the United States

 

Today marks the anniversary of one of the most celebrated speeches in the history of freedom. At the invitation of President Truman, Winston Churchill traveled to Fulton, Missouri on March 5, 1946 to speak at the small college of Westminister. We have come to know this address for Churchill’s vivid warning that an Iron Curtain had fallen across the Continent of Europe. But he entitled the speech, “The Sinews of Peace” because his message was far more than a warning – it was an overall strategic concept and a call to duty to ensure peace through strength.

His words speak to us across the decades:

The United States stands at this time at the pinnacle of world power. It is a solemn moment for the American democracy. For with this primacy in power is also joined an awe-inspiring accountability to the future.

As Churchill spoke, we were on the eve of Cold War. Dean Acheson, in his great work Present at the Creation, described the national security demands of the post World War II years as just a little less daunting than the task in Genesis. There, the challenge was to create a new world out of chaos; "ours," he said, "to create half a world – the free half – out of the same stuff."

For much of the time since then, the Cold War setting was a kind of artificial peaceful coexistence. We told ourselves that the Soviet Union's hold over the captive nations of Eastern Europe had to be accepted, that this was the price demanded if there was to be stability and peace. And for many years, the nations of Eastern Europe submitted to this fate. As Vaclev Havel explains in his book The Power of the Powerless, Communist control succeeded by reason of the consent of the governed. Not in the positive sense that democracies use those words, but because not enough people were willing to stand up and say no.

But finally, the people of Eastern Europe and within the former Soviet Union itself found the will to say no. All of the enormous military strength and institutionalized terror of the Soviet totalitarian regime was not enough in the face of brave people determined to be free. The courage of those who said no should cause us to reflect with some seriousness on our own values, and on the responsibilities we believe the democracies should assume in looking toward the future, and the opportunities – and dangers – that lie ahead.

Again, the wisdom of Churchill’s counsel endures:

[T]he old doctrine of a balance of power is unsound. We cannot afford, if we can help it, to work on narrow margins, offering temptations to a trial of strength… [W]hat we have to consider here today while time remains, is the permanent prevention of war and the establishment of conditions of freedom and democracy as rapidly as possible in all countries.

Today the threat posed by terrorist networks is different in kind and scope from dangers past. But it should come as no new thought to Americans to hear Churchill’s vision reflected in the Inaugural address President Bush delivered this past January: In plain talk the President said:

[I]t is the policy of the United States to seek and support the growth of democratic movements and institutions in every nation and culture, with the ultimate goal of ending tyranny in our world.

Since the founding of our republic, the pursuit of democracy and freedom has been both an ideal and a bedrock of our security. In the President’s words,

The great objective of ending tyranny is the concentrated work of generations. The difficulty of the task is no excuse for avoiding it. America's influence is not unlimited, but fortunately for the oppressed, America's influence is considerable, and we will use it confidently in freedom's cause.

U.S. counterintelligence also has a role in freedom’s cause.

Each of the major challenges confronting our Nation’s security – defeating global terrorism, countering weapons of mass destruction, ensuring the security of the homeland, transforming defense capabilities, fostering cooperation with other global powers, promoting global economic growth – has an embedded counterintelligence imperative. Specifically, terrorists and tyrants, foreign adversaries and economic competitors, engage in a range of intelligence activities directed against us in order to advance their interests and defeat U.S. objectives. Too often these foreign intelligence activities against the United States have been successful. Collectively, they present strategic threats to the Nation’s security and prosperity. The United States requires a national, systematic perspective and coherent policies to counter them, including a strategic counterintelligence response.

The National Counterintelligence Strategy

It is my privilege today to share with you the principles set forth in the National Counterintelligence Strategy of the United States. The official document, which will be issued later this month by President Bush, will be the first unclassified national strategy for U.S. counterintelligence. It is also significant because it will be the first formal mission statement for strategic CI as an instrument of national security.

Individual departments and agencies may have tailored CI mission statements, for example, to enforce the espionage laws, or to ensure the success of their operations – but never before has the United States set forth the strategic mission of counterintelligence in protecting and advancing the Nation’s security.

The Strategy also foreshadows the elements of a national CI system that will be needed to integrate, direct and enhance U.S. counterintelligence including its role in support of national security decision-making. These are the tools needed to be able to execute the strategic CI mission. It is especially fitting that these matters should be on the table as the first Director of National Intelligence assumes office.

Here are the seven pillars of the counterintelligence strategy of the United States.

First, we will extend the safeguards of strategic counterintelligence to the Global War on Terrorism.

In recent history, the United States has sustained stunning losses to foreign intelligence services, which penetrated virtually every one of the most secret, highly guarded institutions of our national security apparatus. Some of this harm can be attributed to protective security vulnerabilities and failures. But these losses also represent a strategic failure of our CI capabilities. Any one of these major compromises could have had devastating consequences in war. Thankfully, the Cold War ended, as President Reagan said, without either side firing a shot.

Today our Nation is at war, and the potential consequences of intelligence failure more immediate, placing in jeopardy U.S. operations, deployed forces and our citizenry.

September 11 brought home our vulnerabilities and the face of evil. In the President’s words, “My most solemn duty is to protect this nation and its people against further attacks and emerging threats.” All who serve U.S. counterintelligence share that solemn duty.

The intelligence services of state sponsors may represent key links in the global terrorist support network. Terrorist groups perform traditional intelligence activities in the way they gather information, recruit sources, and use assets. Their operations require intelligence preparation – preplanning stages, compartmentation. They may also engage in practices designed to deceive U.S. intelligence and mislead decision makers.

We must ensure that the global war on terrorism is armor-plated with an effective CI strategy to identify and exploit offensive opportunities against terrorist networks, to provide CI support to force protection and operations security in the field, and to help filter truth from deception. And it is vital that we have the ability to execute that strategy.

Historically, CI has grown up around an allocation of responsibility that divided foreign from domestic, and intelligence from law enforcement. While each of these domains has their proper place and rules, the national need for unity of effort far outweighs the legacy practices of division. The global war on terrorism has driven home the truth that there is no longer room for bureaucratic parochialism. Terrorist threats, like threats from foreign intelligence services, are global in reach. They do not respect borders. Our challenge is to ensure that U.S. intelligence and security operations are not rendered less effective by structural divides which the enemy does not recognize.

In particular, we must have actionable and reliable intelligence to support a proactive strategy of prevention to counter terrorist threats. The national strategy of prevention places a premium on effective CI to ensure the reliability of enabling intelligence, and to protect operational initiatives. It also requires that U.S. counterintelligence in all its dimensions – strategy and execution – seize the initiative and become more proactive.

And that is the second pillar of the National Counterintelligence Strategy: We will shift emphasis from a posture of reacting to a proactive strategy of seizing advantage.

The proactive strategic approach to counterintelligence is a departure from past practices. If you look back on the record of U.S. CI, especially counter-espionage, you will see that most CI has been based on tolerating some level of loss – extremely grave loss in the case of some long-serving, well-placed spies – that, once discovered, triggers intensive investigations and prosecutions. This ability to react quickly and effectively will always be a vital core of CI. But U.S. CI also needs to go on the offense.

What does it mean to go on the offense? Conceptually, there are two parts: First, a global CI assessment and engagement of adversary presence, capabilities and intentions; and second, a CI doctrine for attacking foreign intelligence services systematically via strategic CI operations.

The proactive approach to counterintelligence requires a generous dose of creativity to turn threat into opportunity. We don’t want to sit back and discover, years and years after the fact, that while we have investigated every reported security breach, spies have stolen our secrets or cyber thieves have exploited our networks. Instead, we need to think offensively.

We need to ask, what are the indicators that might give us early warning of intelligence operations against us? We need to ask, what can we do to discern and defeat such operations? Investigations are one among a suite of tools that the operational CI elements can employ; and there are others. And I look to the security-focused CI offices within the Cabinet departments and agencies to provide the knowledge, programs, and creative insights to engage the operational CI resources of the government to proactive ends.

In wartime, we must be able to defeat the adversary’s intelligence capabilities, including their ability to deceive or mislead us. Experience with Iraq reminded us that neutralizing the intelligence services of the adversary is a crucial element in winning the war; and that it is far better to plan well in advance than on a last minute basis. We need to ensure that the lessons learned from the CI successes against Iraq are applied to all future war planning. Standing operational planning should include a national-level strategy for defeating the adversary’s intelligence objectives, as well as tactical CI operational plans and order of battle. Strategic CI planning can also increase the options available to decision makers for advancing national objectives while avoiding war.

At home, the strategic CI mission calls for a coordinated, community-wide effort of aggressive operational activity and analysis to obtain the intelligence necessary to neutralize the inevitable penetrations of our government. Within the United States, the operational and analytic focus must transform from a case-driven approach to a strategic CI assessment and engagement of adversary presence, capabilities and intentions. Strategic CI analysis must drive operations. This will also require looking beyond the customary targets of known intelligence officers to the larger population of diverse foreign visitors and others serving foreign intelligence purposes, who find our free and open society a rich playing field for the illicit collection of national security secrets and other valuable information that confers advantage.

Which brings me to the third pillar of the Strategy: It is the objective of U.S. counterintelligence to help protect the vital technology secrets that are the bedrockof our strategic security.

America’s national defense rests on its continuing technological superiority. The United States cannot maintain its dynamic technological superiority without a corresponding intelligence and counterintelligence superiority.

A national defense strategy based on transformation places a premium on the sensitive capabilities and technologies that give advantage. The single most effective strategy to defeat U.S. plans to ensure superiority through transformation is to capture those essential secrets, in order to incorporate them into adversary weapons systems and to develop countermeasures. Foreign militaries that acquire controlled U.S. technologiesare able to leapfrog technological barriers that would otherwise slow or even prevent the production of more sophisticated weapons.

Espionage has long proven the most cost-effective means of defeating U.S. capabilities. We may spend billions of dollars to develop a given weapons system, the effectiveness of which rests on essential technological, operational or design secrets that give us advantage. If those essential secrets are stolen, both our investments and our advantage can be lost. The cost-benefit ratio of espionage is sharply in the adversary’s favor.

The most successful espionage – the kind that goes undetected – is all the more effective, because what is not known cannot be remedied. And the risks are growing. The marvels of modern information technology and microelectronics have revolutionized espionage tradecraft, enabling the clandestine extraction of vast volumes of data in miniaturized storage media or across computer networks at the press of a “send” button.

The key to protecting America’s qualitative defense advantage is to draw upon all of the tools of statecraft, national policy, law enforcement and public awareness to deny adversary acquisition of essential technology secrets. These things must be done in concert. That is a policy call. But CI needs to supply insights into the foreign intelligence threats against vital technologies, and options to counter those threats. That will require focused and creative collection activities, strategic analytic exploitation, and coordinated operational discipline. In this manner, CI can make a seminal contribution to the overall national technology protection effort.

Fourth, it is the objective of U.S. counterintelligence to safeguard the integrity of intelligence and to identify and defeat foreign denial, deception and covert influence operations.

Successful foreign penetrations both human and technical have netted foreign intelligence services an enormous amount of U.S. classified information, enabling debilitating countermeasures to U.S. intelligence collection and analysis. There is a market for stolen U.S. secrets, which can be sold or bartered to third party states or terrorist organizations that have their own uses for the information. The knowledge gained of U.S. intelligence sources and methods –through spies, unauthorized disclosures, and even some authorized disclosures – has aided in extensive concealment and denial programs that increase our uncertainty about foreign capabilities and intentions, and deception operations to mislead us.

As a result of sensitive knowledge gained about U.S. intelligence, many nations have learned how to deny and deceive the United States in order to present a false picture of reality. These foreign denial and deception practices may lead analysts to faulty judgments, when vital information has not been collected, or when deception distorts understanding. The danger is that useless or deceptive information – whether from human or technical collection – may be integrated into U.S. intelligence and disseminated to policymakers, weapons designers, war-fighters and even the warning community as if it were true. It is the job of counterintelligence collection and analysis to protect and validate U.S. intelligence and to reveal otherwise unknown strengths and weaknesses and threats posed by U.S. adversaries.

It has been said that “counterintelligence is to intelligence as epistemology is to philosophy. Both go back to the fundamental question of how we know things, [and] both challenge what we are inclined to take most for granted…” (Thomas Powers, The Man Who Kept Secrets).

If that is too esoteric for you, consider that risk is inherent in the pursuit of intelligence: in technical collection, in clandestine operations, and in analytic judgments. It is the job of CI – integrated into system design and operations security, validation of assets and information, and counter-D&D analyses – to help minimize that risk while supporting the positive intelligence mission. CI supplies the techniques by which the reliability of a collection system, the bona fides of an asset, or the soundness of an analytic judgment, can be established, operationally tested, and revalidated to ensure the integrity of the product. The statesman’s maxim of “trust – but verify” is the clarion call for effective counterintelligence.

Fifth, it is the objective of U.S. counterintelligence to help level the economic playing field so that U.S. business and industry are not disadvantaged by unfair intelligence practices of foreign competitors.

The protection of American strategic information and technology has long been an element of the nation's security, including the propriety commercial information that brings competitive advantage. Lead responsibility for that job of course falls to the private sector owners of that information and technology. But government also has a role to play. As a first and obvious step, government can provide information about the threat, to the extent that intelligence is available and can be confidently shared. But it is up to business and industry to decide what to do. There will always be some level of risk. Deciding how to manage that risk, in order to carry out operations effectively, is the real security challenge.

CI and security cannot be afterthoughts imposed on corporate R&D personnel, businessmen or mid-level managers. Heightened awareness, and intelligent security practices that protect the valuable secrets of the corporation, are the best guarantors of success against the foreign intelligence threat. While our principal focus must remain the terrorist threat, we will also enhance outreach to the private sector to increase awareness of the economic intelligence threat facing our Nation as a whole, through providing threat information, and educating especially the S&T community, to the variety of ways our adversaries acquire and steal information from us.

Sixth, the Strategy directs that the national security decision-making process be informed by counterintelligence insights.

The intelligence activities of adversaries or allies, competitors or partners, are a window into their respective interests, purposes and plans. For instance, our insights into the foreign intelligence activities of the other main centers of global power will confirm or otherwise shape prospects for cooperative action. In other words, solid counterintelligence information, properly analyzed, always has a positive intelligence dimension.

In this manner, CI can supply insights into the actions of our adversaries and the actions directed against us, as well as opportunities for advancing our interests, which can inform and enable sound policy decisions. Good CI analysis can help discover and connect the seemingly disconnected, illuminate hidden relationships, identify unseen linkages, or reveal patterns of activity and behavior heretofore unobserved. CI analysts are the ones who zero in on the things Yoggi Berra deemed “too coincidental to be a coincidence.” Damage assessments of espionage cases also have insights to contribute to decision-makers. These include the direct impact of the damage on U.S. intelligence and national security plans and programs, as well as the vulnerabilities revealed, and managerial, security and operational lessons learned.

In effect, under this Strategy counterintelligence will have a guest seat at the policy table, in order to present an array of strategic CI insights and operational options in foreign and defense policy for the President and his national security leadership team. Proactive CI operations, put into a larger context, may be useful in shaping a threat, influencing adversary decisions, masking vulnerabilities, advancing diplomatic objectives, or conferring advantage at the negotiating table or on the battlefield. Such an iterative process will also enable the policy direction and integration of CI operations with other national goals and instruments.

Finally, the Strategy directs that we build a national CI system to enable its execution.

The recently passed Intelligence reform legislation represents the most sweeping revision of the basic National Security Act in the almost 50 years since its passage. The Counterintelligence Enhancement Act, which is incorporated within the new law, places my office and the strategic CI mission directly under the new DNI. Our job is to provide strategic direction, comprehensive threat assessments, global operational priorities, and effective program and budget guidance to execute the national CI mission.

This mission extends far beyond any individual Department or Agency’s ability to fulfill. Nor is this mission simply the sum of the individual elements supporting their Department or Agency mission. Today there is a great deal of bilateral cooperation and information sharing across the several agencies responsible for U.S. counterintelligence. But that is not the same thing as orchestrating the diverse CI resources of the government to achieve common objectives against a defined intelligence threat.

Foreign intelligence services don’t target an individual FBI field office, or a CIA station, or a military unit; they target the United States. The several arms of the federal government, along with state and local authorities and industry partners, must work as one team. For the future, each of the participating members of this community must be prepared to assume new responsibilities, and join together in a unity of effort, as the National CI Strategy matures. This necessary systemic transformation will not happen overnight but it has begun with the issuance of the national Strategy. We are already working on national-level implementation guidance, and detailed guidance will also need to be developed and incorporated into the CI planning, programs, budgets and ethos of the individual Departments and Agencies.

We must also look to the professionalization of the CI discipline. U.S. counterintelligence capabilities are only as strong as the quality of the people entrusted with their execution. The complexity of the subject requires the mastery of many disciplines and skills, including the strategic perspective of CI. The CI profession needs its own set of standards that are common across the many CI missions as well as specific to CI specialties. We will need to reach across the several Departments and Agencies to find the centers of training excellence, address deficiencies, and upgrade the content, quality and availability of CI instruction. We also need to recruit new entrants into the profession, who bring creativity and imagination, along with the highest standards of integrity and dedication, to the CI workforce – a select profession in which all Americans have invested so much trust.

To the students here today, let me say if you have these qualities, please check in with the recruiters.

Conclusion

The National Counterintelligence Strategy of the United States is a sharp departure from past practices. Historically, by waiting for intelligence threats to mature before taking action, we have ceded the initiative to the adversary. No longer will we wait until we have been harmed to act. The President has charged U.S. counterintelligence with a clear strategic mission: 1) to identify and assess what foreign intelligence services are doing against U.S. interests and how they are doing it, and 2) to develop doctrine, assign resources and implement operations to neutralize those activities proactively at home and abroad.

This is the mission. Under the President’s leadership, and in freedom’s cause, U.S. counterintelligence in the 21st century will step forward to help meet the “aweinspiring accountability to the future” of which Winston Churchill spoke on this date, not so very long ago.

 

Source: (Requires Adobe Reader for viewing)

National Counterintelligence Strategy of the United States

________________________________________
 

Office of the National Counterintelligence Executive

 
Google results:

Check for latest Site-Updates

Index of Posted Articles

or copy and paste the URL into Google Translate

Important note:

We neither promote nor condone hate speech in any way, shape or form. We have created this website to search for truthful facts that can shape unconventional conclusions and restore historical integrity. The work is therefore protected by the First Amendment of the US Constitution as well as by Article 19 of the UN Declaration of Human Rights: “Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.”

In accordance with Title 17 U.S.C. Section 107, the articles posted on this website are distributed for their included information without profit for research and/or educational purposes only. This website has no affiliation whatsoever with the original sources of the articles nor are we sponsored or endorsed by any of the original sources.

 
Copyright John McCarthy 2005 if not indicated otherwise

 
Ages ago, I taught my children "never to point with a naked finger towards dressed people" and I usually keep that for myself as well but for this website I have to quote:
"The Emporer Has NO Clothes On!"
Traude
 

 
Want to get in touch? You can send email at:
 

or

Disclaimer And Fair Use