To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Counterintelligence Field Activity

From Wikipedia, the free encyclopedia

Counterintelligence Field Activity (CIFA) was a United States Department of Defense (DoD) agency whose size and budget were classified. The CIFA was created by a directive (Number 5105.67) from the Secretary of Defense, then Donald Rumsfeld, on February 19, 2002.[1] On August 8, 2008, it was announced that CIFA would be shut down.[2] The Defense Intelligence Agency (DIA) absorbed most of the components and authorities of the CIFA into the Defense Counterintelligence and Human Intelligence Center,[3] which was later consolidated into the Defense Clandestine Service.

YouTube Encyclopedic

  • 1/5
    Views:
    3 450
    3 301
    826
    3 286
    2 653
  • Combat Counterintelligence (1942)
  • SRA 421 Lecture 5.2.1 Counterintelligence Strategy, Operation & Tradecraft Part 1
  • Reforming the FISA Process: Proposals for the Future
  • Organizational structure of the Department of Defense
  • Andrew McCabe at Duke: How the FBI Protects America in the Age of Terror & Trump

Transcription

Mission

CIFA goals were:

  • To effectively and efficiently manage and oversee the Defense Department counterintelligence enterprise.
  • To synchronize Defense counterintelligence activities across the department, in coordination with the national intelligence community.
  • To manage priority counterintelligence plans and projects in fulfillment of national, department and combatant commander requirements.
  • To select and develop unique counterintelligence operational support capabilities and make them available to the wider intelligence community.
  • To serve as the primary source of career development and training for counterintelligence professionals.
  • To identify, develop and field advanced technologies for counterintelligence.
  • To create a joint, interoperable and synchronized approach to counterintelligence as a distinct intelligence discipline.
  • To assess the feasibility of a department-level joint operational element for Defense counterintelligence.[4][failed verification]

Organization

The Director of DoD CIFA reported directly to DoD's Undersecretary of Defense for Intelligence.

The offices of Chief of Staff, Office of General Counsel, and Office of the Inspector General reported directly to the Director of CIFA.

CIFA was then broken into four directorates: Program Management, Information Technology, Operational Support and Training and Development.

Program Management was responsible for budgeting, management and accountability.

Information Technology was responsible for planning and managing special technology needs of the counterintelligence enterprise.

Operational Support planned, directed and managed counterintelligence activities and coordinated offensive counterintelligence campaigns.

Training and Development set performance assessment standards and assured that defense counterintelligence training and education programs, as well as instructors, maintained accreditation and certification.[5]

Joint Protection Enterprise Network (JPEN) database

CIFA managed the database of "suspicious incidents" in the United States or the Joint Protection Enterprise Network (JPEN). It was an intelligence and law enforcement system that was a near real-time sharing of raw non-validated information among DoD organizations and installations. Feeding into JPEN were intelligence, law enforcement, counterintelligence, and security reports, information from DoD's "Threat and Local Observation Notice" (TALON) reporting system of unfiltered information, and other reports.

There were seven criteria taken into account in the creation of a TALON report:

  • Nonspecific threats
  • Surveillance
  • Elicitation
  • Tests of security
  • Repetitive activities
  • Bomb threats
  • Suspicious activities and/or incidents

Army regulation 190-45, Law Enforcement Reporting, stated that JPEN may be used to share police intelligence with DOD law enforcement agencies, military police, the U.S. Army Criminal Investigation Command and local, state, federal, and international law enforcement agencies.

Privacy issues

The domestic collection of data by military agencies was strictly regulated by laws such as the Privacy Act of 1974, which strengthened and specified a United States citizen's right to privacy as noted in the Fourth Amendment United States Constitution. In addition, the Supreme Court of the United States found in Griswold v. Connecticut (1965) the right to privacy against government intrusion was protected by the "penumbras" of other Constitutional provisions. The DoD reflected these in its own guidelines that have been in place since 1982.[6]

CIFA's similar collection and retention of data on peace groups and other activists promoted parallels to be drawn between the two programs by civil rights groups like the ACLU,[7] and intelligence officials[8][9] who found the prospect of the military tracking peace groups again to be worrisome.

After ACLU filed multiple Freedom of Information Act (FOIA) requests regarding information gathering on peace groups and NBC did a report[10] citing a Quaker group planning an anti-enlistment action that was listed as a "threat", a review of CIFA activities was ordered by then Undersecretary of Defense for Intelligence Stephen A. Cambone,[11] who stated at the time that it appeared that there had been several violations.

A complaint requesting the expedition of the FOIA requests[12] by the ACLU was ruled in their favor by a federal court. The released documents showed that at least 126 peace groups' information had been held past required removal dates. The DoD has since stated that it removed all improperly kept data.

Shut down

On April 1, 2008, the Pentagon's top intelligence official (James R. Clapper, the Under Secretary of Defense (Intelligence)) recommended CIFA's dismantling.[13]

On August 8, 2008, it was announced that CIFA would be shut down and its activities would be absorbed by the Defense Intelligence Agency.[14][15]

See also

Citations

  1. ^ "Department of Defense Counterintelligence Field Activity Archived 2008-10-28 at the Wayback Machine". U.S. Department of Defense Directive Number 5105.67, 19 February 2002.
  2. ^ "Unit Created by Rumsfeld Shut Down Archived 2012-02-24 at the Wayback Machine". Gulf Times, 6 August 2008.
  3. ^ "Release".
  4. ^ Counterintelligence Field Activity. "
    • to check International buget NGO,s and
    Strategic Goals Archived 2008-06-23 at the Wayback Machine." cifa.mil.
  5. ^ Organizational Chart Archived 2008-06-12 at the Wayback Machine, cifa.mil.
  6. ^ DoD 5240 1-R Archived 2017-09-22 at the Wayback Machine Procedures on Domestic Intelligence
  7. ^ Documents Shed New Light on Pentagon Surveillance of Peace Activists (10/12/2006)
  8. ^ Pincus, Walter. "Defense Facilities Pass Along Reports of Suspicious Activity." The Washington Post, 11 December 2005, Page A12.
  9. ^ "Freedom's TALON". Archived from the original on 2006-10-14. Retrieved 2007-03-19.
  10. ^ Myers, Lisa et al. "Is the Pentagon spying on Americans?" MSNBC, 14 December 2005.
  11. ^ "DoD Orders Review of Anti-Threat Intel-Gathering System." DoD Press Release, December 2005.
  12. ^ ACLU Complaint
  13. ^ Warrick, Joby. "Intelligence-Gathering Program May Be Halted." Washington Post, 2 April 2008.
  14. ^ "Unit Created by Rumsfeld Shut Down Archived 2012-02-24 at the Wayback Machine." Gulf Times, 6 August 2008.
  15. ^ "DIA to start spy operations against foreigners." USA Today, 6 August 2008.

General and cited references

External links

This page was last edited on 27 August 2023, at 08:10
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.