The DIA started in 1958. The organizational structure of the DoD and U.S. foreign intelligence came to a new shape with the establishment of DIA. It was Robert McNamara, then Secretary of Defense, who came up with the concept of DIA in 1961. DIA gathers human source intelligence, analyzes technical intelligence, distributes intelligence/reports to the intelligence agencies, provides advice and support to the Joint Chiefs of Staff with foreign military intelligence, and provides military intelligence to combatant commands as its operational functions. A DIA director is supposed to be a three-star military general and DIA is believed to have employed at least 7,500 staff worldwide today. The DIA is a defense intelligence agency that prevents strategic surprises and delivers a decision advantage to warfighters, defense planners, and to policymakers. This paper will try to evaluate DIA’s role in US national security in present condition of massive budget deficits and increased congressional oversight, plus the intelligence capabilities of the Regional Combatant Commanders and the individual services like CIA and NSA.
According to one source, after September 11, 2001, intelligence budget grew more. But now we are in another cycle of budget cut again. It is said President Obama proposed the budget amount of $52.6 billion for fiscal year 2013 to fund the National Intelligence Program. This budget amount is said to be less than the $55 billion sought last year. The unstable budget is believed to be hampering U.S. intelligence missions. As the budget pressure mounted, the redundancy in US intelligence increased too, according to the same source. With the budget deficits, the DIA budget didn’t authorized to expand its payroll. It is said DI...
... middle of paper ...
...igence-agencies-what-is-the-difference-between-the-dia-nsa-cia-and-fbi/ (accessed January 7, 2014).
Paul, Ron. “Congressional Oversight.” Global Intelligence News. December 11, 2012, http://globalintelnews.wordpress.com/tag/congressional-oversight/ (accessed January 7, 2014)
Pincus, Walter and Greg Miller. “Federal budget 2013: Intelligence agencies would get 4.4 percent less.” WP Politics, February 13, 2012, http://www.washingtonpost.com/blogs/44/post/federal-budget-2013-intelligence-agencies-would-get-44-percent-less/2012/02/13/gIQAEvFDBR_blog.html (accessed January 7, 2014)
Nedzi (D-Mich.), Luclen N. “Oversight or Overlook: Congress and the US Intelligence Agency.” A Congressman talk to the CIA senior seminar, November 14, 1979, https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol18no2/pdf/v18i2a02p.pdf (accessed January 7, 2014).
“President Bush has stated that about a hundred detainees were held under the Central Intelligence Agency secret detention program, about a third of whom were questioned using “enhanced interrogation techniques. The CIA has a way of very publicly blowing their cover seeming to pop up wherever turmoil, and political problems arise. The CIA exists to prevent threats, its operations involve covert actions or spying through various means to gather critical intelligence data. The CIA dates back to 1947. The qualifications and skills are above average. The job of the CIA is to anticipate and quickly assess rapidly evolving international developments and their impact, both positive and negative, on US policy concerns. When researching the career of
Anonymous. "DIA Provides Strategic Warning for the Next Generation." Www.dia.mil. Defense Intelligence Agency, 11 May 2012. Web. 13 Nov. 2013
“President Obama’s FY2014 base budget request of $552.0 billion in discretionary budget Authority for the Department of Defense (DOD) and defense-related programs of other agencies (excluding war costs), exceeded by $53.9 billion the legally binding cap on defense funding for FY2014 that was enacted in 2011 as part of the BCA.” Similarly, in their initial actions on the annual defense funding bills for FY2014, the House and the Armed Servi...
This article demonstrates how decisions were made based on intuition rather than credible data. The end result was data that was deceptive. It was suggested that the CIA told employees not to work with other security departments; the primary Iraq staff work was done by political appointees that never communicated with the Bush organization and that the groupthink process lead to deceitful information fed to Congress.
...concern of the Congress concerning the activity of the NSA is very unlikely to finish and the researchers are of the opinion that amidst attacks on NSA, members of the European parliaments and the members of the Congress jointly may come up and criticize not only the operations and activities as undertaken by the NSA but also its roles and missions. Funding for the efforts being undertaken on part of the NSA has widespread results from the consideration of geopolitical as well as technological work environments that needs to be put into some sort of balance against other prevalent requirements. (Jeremy S. 2000) And more so to a much enhanced degree as compared to that of the past, the Congress is expected to continue to indulge itself in internal challenges in the agency designed to gain in capabilities from the perspective of boosting the technological framework.
Erwin, Marshall, & Belasco, Amy. "Intelligence Spending and Appropriations: Issues for Congress." Congressional Research Service: Informing the Legislative Debate Since 1914. https://www.fas.org/sgp/crs/intel/R42061.pdf (accessed April 27, 2014).
In addition to strategic deployment, the defense budget should be reformed to allocate more money towards specialized, agile units and counterterrorism efforts. By doing so, the United States would be more efficient in fighting the small terrorist groups that pose such a large threat today. In his article supporting defense reform, Berger points out, “many analysts have pointed out in the wake of the September 11, 2001, attacks, future threats to the United States are likely to come from relatively small terrorist organizations and not from state entities which could not realistically defeat us.” The most prevalent danger regarding military within the continental U.S. is not an invasion by another nation, but rather unexpected acts of terror.
Bruno, Greg, and Sharon Otterman. "National Intelligence Estimates." Council on Foreign Relations. Council on Foreign Relations, 14 May 2008. Web. 19 Jan. 2014. http://www.cfr.org/iraq/national-intelligence-estimates/p7758
... Sept. 11th, 2001, terrorist attack on theWorld Trade Center and the unreliability of U.S. intelligence onWeapons of mass Destruction in Iraq have been a focus of intense scrutiny in the U.S. in 2004 particularly in the context of the 9/11 Commision , the continuing armed resistance against U.S. occupation of Iraq, and the widely perceived need for systematic review of the respective roles of the CIA, FBI and the Defense Intelligence Agency. On July 9th, 2004 the Senate report of Pre-war Intelligenceon Iraq of the Senate Intelligence Committe stated that the CIA described the danger presented by Weapons of Mass Destruction in Iraq in an unreasonable way, largely unsupported by the available intelligence. In a briefing held Sept 15th, 2001 George Tenet presented the Worldwide Attack Matrix, a "top-secret" document describing covert CIA anti-terror operations in 80 countries in Asia, the Middle East, and Africa. The actions, underway or being recommended, would range from "routine propaganda to lethal covert action in preparation for military attacks". The plans, if carried out, "would give the CIA the broadest and most lethal authority in its history".
In the middle of 1946, the Central Intelligence Agency Act laid the foundations and placed strict guidelines on responsibility of the agency’s officials. Until 1955, the CIA did not have a central headquarters, but in August of that year President Eisenhower funded forty-six million dollars for the construction of a headquarters for the CIA (“Key Events” 1). In March of 1991 the
The NSA or the National Security Agency, is “the largest intelligence agency in the US, which is responsible for collecting and analyzing communications and signals intelligence, plus cybersecurity” ( MacAskill, Borger, and Greenwald par. 1-2). Since its inception, “the very existence of the National Security Agency was not revealed more than two decades after its establishment in 1952” ( MacAskill, Borger, and Greenwald par. 1). and since “its structure and activities remain largely unknown. Hence its wry nickname: No Such Agency” ( MacAskill, Borger, and Greenwald par.1). “Once President Harry Truman established the NSA, its purpose was to collect data and information across the country and internationally. The task originally gi...
Twenty- first century American intelligence is worlds away from President Franklin D. Roosevelt’s Office of Strategic Services (OSS). Not only is intelligence now a multi-agency effort, but the way in which intelligence is collected reflects the products of a technologically advanced society. Early espionage was reliant on human intelligence officers, and for the most part, that was the extent of the intelligence resources. Today, the intelligence collection toolbox is comprised of humans, plus drones, satellites, wiretaps, and other technological innovations. With the introduction of new ways of spying, some experts say that human intelligence (HUMINT) is outdated and is not an effective use of the intelligence community’s time or money due
According to Donavan (1986) policy looks to intelligence for a logic of evidence, and analysis, looks for policy to serve. Despite the common goal of advancing national security interest, the relations between producers and consumers of intelligence assessments are not naturally harmonious. According to The Politicization of Intelligence History (2006), there are fewer accusations which carry more weight within the intelligence community than claims that the analysis and reporting of intelligence have been influenced by political considerations. The process and pressures by which political influence effected the Iraq Weapons of Mass Destruction (WMD) estimates, the Soviet Union military capabilities and the Vietnam military predictions will be discussed, in order to emphasis the safeguards needed to successfully manage the relationship between intelligence providers and consumers.
The Central Intelligence Agency’s main responsibility is stated in its Vision statement: “We will provide knowledge and take action to ensure the national security of the United States and the preservation of American life and ideals” (www.cia.gov). The CIA’s job is to provide pertinent, timely, and un-biased foreign intelligence. They also act as an unseen force by conducting undercover action as ordered by the President in order to preempt threats or achieve objectives of the United States. The CIA is the only intelligence organization that is not subject to cabinet prerogative, making it reliable in it is unbiased in its reports, because it has no political agenda. There are six main types of intelligence by which the CIA collects information. Human intelligence (HUMINT) is information gathered by field operatives through overt and covert techniques (www.cia.gov). Communications intelligence (COMINT) is acquired from intercepted foreign communications (www.cia.go...
"Annual Report Shows Slight Decrease." FBI. FBI, 25 Nov. 2013. Web. 26 May 2014. .