FAS Homepage | Gov't Secrecy | Congressional Docs || Index | Search |



105th Congress                                            Rept. 105-135
                        HOUSE OF REPRESENTATIVES

 1st Session                                                     Part 1
_______________________________________________________________________


 
          INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEAR 1998

                                _______
                                

                 June 18, 1997.--Ordered to be printed

_______________________________________________________________________


    Mr. Goss, from the Permanent Select Committee on Intelligence, 
                        submitted the following

                              R E P O R T
	         	       [excerpts]

                             together with

                             MINORITY VIEWS

                        [To accompany H.R. 1775]

      [Including cost estimate of the Congressional Budget Office]

  The Permanent Select Committee on Intelligence, to whom was 
referred the bill (H.R. 1775) to authorize appropriations for 
fiscal year 1998 for intelligence and intelligence-related 
activities of the United States Government, the Community 
Management Account, and the Central Intelligence Agency 
Retirement and Disability System, and for other purposes, 
having considered the same, report favorably thereon with an 
amendment and recommend that the bill as amended do pass.

[...]

                 Committee Findings and Recommendations

    The Committee completed its review of the President's 
fiscal year 1998 budget, carrying out its annual responsibility 
to prepare an authorization based on close examination of 
intelligence programs and proposed expenditures. The review 
continued to reflect the Committee's belief that intelligence 
activities must be examined by function as well as by program, 
thus, was structured across program lines and intelligence 
disciplines and themes. The Committee held seven full Committee 
budget-related hearings and two Subcommittee budget hearings on 
the following issues: Intelligence Requirements; Airborne 
Reconnaissance; Technical Intelligence; Overhead Collection; 
Human Intelligence; Covert Action; Analysis and Production; 
Counterintelligence; and Personnel and Legislative Issues. The 
Committee also held full Committee briefings on subjects such 
as the Future Imagery Architecture, Unconventional SIGNINT 
Capabilities, and some selected sensitive DoD collection 
platforms. There were, in addition, over 100 staff briefings on 
programs, specific activities and budget requests.
    The Committee continued to place heavy emphasis on 
understanding and addressing the future needs of the 
Intelligence Community, and the several distinct roles that it 
plays in national security. At the national level, the goal of 
intelligence is to make the national-level policy maker and 
decision maker aware of impending events so that appropriate 
actions are taken, especially those than might avoid or contain 
conflict. At the other end of the spectrum, intelligence is now 
incorporated into the very fiber of tactical military 
operational activities, whether forces are being utilized to 
conduct humanitarian missions or are engaged in full-scale 
conflict. To serve national security objectives, the 
Intelligence Community must act throughout the spectrum. Too 
often, however, the Intelligence Community has not maintained a 
balance between the diverse strategic and tactical demands it 
now faces and will face in the future. Specifically, in recent 
years, the Community has emphasized fleeting current 
intelligence issues, often at the expense of keeping a watchful 
eye on those areas that are likely to be tomorrow crises. The 
Committee believes that a balance must be reached and 
maintained.
    The value and necessity of intelligent are such now that 
intelligence plays much more than a support role. Whether a 
decision maker is planning policy or responding to a fast-
breaking situation, intelligence is now regularly a part of the 
debate, often a prerequisite. Whether that response involves 
law enforcement, diplomacy or military forces, or even if the 
issue involves our nation's commercial or trade interests, 
intelligence data are the bedrock on which such a response is 
built. Moreover, in an era that is leading to the 
"digitization" of the armed forces, intelligence will be as 
much a part of operations as firing a weapon.
    Techology enhances intelligence capabilities as well as 
provides new intelligence challenges. As suggested previously, 
information technology has created new areas of opportunity in 
intelligence operations. It also greatly facilitates 
intelligence exploitation, analysis and dissemination. But, the 
fact that access to and understanding of various technologies 
are expanding on a world-wide basis, is creating an era in 
which the United States may not enjoy the exclusive 
technological edge that it once had. It also is clear that in-
depth knowledge and usage of technology no longer applies 
exclusively to governments, but is present in organizations and 
individuals as well, some who would do harm to the U.S. or its 
interests. Consequently, although intelligence opportunities 
are enhanced, so too are the threats to our own technology-
based infrastructures. Our ability to protect U.S. systems, 
detect attempts to affect those systems and respond to such 
threats, also rely on an active, strong intelligence 
capability.
    Likewise, our national security is affected by a broader 
set of issues, that, heretofore, have not been so readily 
identified with our global interests. These issues range from 
economics to environmental concerns, and to the mass migration 
of people. Developments in these areas greatly expand the 
universe of problems with which the Community must grapple--
problems than demand a world-wide view and a highly flexible 
set of resource.
    The types of threats that face our nation demand that the 
Intelligence Community be ever vigilant on both the strategic 
and tactical levels. Countering the proliferation of weapons of 
mass destruction, narcotics trafficking, terrorism, and the 
activities ofinternational organized crime, by definition, call 
for the types of intelligence collection, analysis and reporting that 
emphasize the need to produce the hardest information--intentions, for 
example--and that substantiates the need for a dynamic intelligence 
capability. In short, in the world we face today and tomorrow, the 
United States must have its "eyes and ears" more than ever before to 
protect its freedom--politically, economically and militarily.
    With these points in mind, the Committee review was guided 
by two key questions. First, what programs are properly 
structured and sufficiently prepared for future needs and 
requirements, such that we can feel confident about our 
preparedness? And, second, what are our unmet needs? 
Unfortunately, the Committee review suggested a paucity of 
areas where the Intelligence Community is well situated for the 
future and an overabundance of unmet needs. Clearly, there are 
specific areas within specific programs where the Intelligence 
Community is functioning well and is ready for the future. But, 
by and large, the Committee finds several large areas of 
concern. Principal among these are:
          The Community's very limited analytical capabilities 
        to meet the myriad challenges ahead, especially to be 
        more strategic and predictive in viewpoint;
          the uncertain commitment and capability to collect 
        "human intelligence" on a world-wide basis, through 
        espionage;
          the growing capabilities of other nations and groups 
        to deny information, especially from our overhead 
        sensors, by employing "denial and deception" 
        techniques, and the Community's slow realization and 
        limited ability to recognize and overcome these 
        efforts; and
          the ever-growing demand for detailed, actionable 
        intelligence to law enforcement to support 
        prosecutions, while still protecting intelligence 
        sources and methods.
    Therefore, the Committee encourages the Director of Central 
Intelligence to work rapidly toward alleviating these concerns 
during this period when the nation is less at risk, in the 
physical sense, than during the Cold War. This Committee is 
prepared to assist in this effort. To that end, the Committee 
examined the Community's most immediate unmet needs, and has 
begun a process to address them. The basis for many of the 
Committee's decisions was formulated not only from examining 
these needs, but also from a set of themes that are important 
to establishing the type of Community that is vital to our 
future national security. These themes are basically included 
within the first five Areas of Special Interest of this report, 
and will be used to help focus the Committee's activities in 
the future.

                       Areas of Special Interest

                   shortfalls in all-source analysis

    The Committee is concerned that the Intelligence Community 
(IC) lacks the analytic depth, breadth and expertise to monitor 
political, military, and economic developments worldwide while 
maintaining in-depth expertise on critical countries and 
issues. Problems associated with analytic shortfalls include: a 
largely inexperienced workforce; lack of foreign language 
skills and limited in-country familiarity among all-source 
analysts; and a predominant focus on current intelligence that 
is eroding the IC's ability to conduct comprehensive strategic 
analysis.
    The Committee believes that the IC must make a concerted 
effort to enhance both substantive and linguistic expertise 
among its analytic corps. Moreover, the IC must maintain a 
basic level of knowledge about trends and developments 
worldwide, while maintaining the capability to warn of 
impending crises and "surge" resources during such crises. In 
addition, the IC must find ways to augment its analytic 
capability during crises without diminishing the ability to 
monitor other areas of the world.
    The Committee is very concerned with the fact that over the 
past several years, the IC has shifted analytic production to 
focus on short-term, event-driven analysis. While such a shift 
provides strong analytic coverage of day-to-day events, it 
comes at the expense of basic research and analysis. Not only 
does basic research and analysis provide the foundation for 
short-term, event-driven analysis, it also is critical to 
producing in-depth, long-term/strategic analysis of issues that 
will pose challenges to U.S. national security in the future.
    The Committee believes that the ability to process and 
analyze all-source information is crucial to the quality and 
utility of all-source analytic products. Unfortunately, the 
IC's ability to do thorough, truly all-source analysis may be 
hampered by the difficulties associated with prioritizing, 
processing, and analyzing the vast amounts of open source data 
available to analysts. Another area of concern in this regard 
is the ability of the IC's all-source analysts truly to have 
access to all sources of information. Bureaucratic barriers 
have been erected that have prevented access by all-source 
analysts to information from other departments, from other 
agencies within the IC and, in some cases, from other offices 
within the same agency. The Committee will continue to monitor 
initiatives to improve the IC's ability to collect, process, 
and analyze open source information, and of the ability of IC 
all-source analysts to gain sufficient access to all sources of 
information.
    Given the fact that resources for the IC are unlikely to 
increase significantly in the future, the Committee believes 
that the IC must find other ways to address shortfalls in 
analytic depth and breadth. The IC must examine the importance 
of all-source analysis relative to the importance of collection 
and support activities. The Committee is particularly concerned 
about the imbalance between collection and "downstream" 
processing of intelligence. Expending resources to collect 
intelligence that is not being analyzed is simply a waste of 
money.
    In order to enhance analytic expertise, the IC must improve 
training and better target its recruitment efforts. In 
addition, the IC must identify ways to fill analytic gaps and 
surge analytic resources without creating gaps elsewhere in the 
process. For the past several years, the Committee has strongly 
urged the IC to develop a "civilian" reserve capability that 
would tap into the expertise of former IC employees, non-IC 
experts, and linguists. Certain elements within the IC already 
have taken steps to augment analytic capabilities; the IC as a 
whole must do the same. In the fiscal year 1998 intelligence 
authorization bill, the Committee again has provided funds for 
the establishment of a pilot civilian reserve program. The 
Committee will closely scrutinize progress made in this area.
    Several new initiatives already are underway that will help 
the IC to maintain a worldwide information "base" and to 
augment existing analytic efforts. The Committee supports 
efforts to create "knowledge databases," including the 
nascent World Basic Information Library (WBIL). Such efforts 
will help to ensure that the IC retains a baseline of knowledge 
on countries that often receive little attention until a crisis 
arises. The Committee also supports the Joint Reserve 
Intelligence Program (JRIP), a cost-effective program that 
utilizes the substantive and linguistic expertise of military 
reservists to augment the IC's analytic efforts.
    The Committee strongly believes that the IC must restore 
its capability to conduct long-term predictive analysis and 
warning. Core groups of analysts should be dedicated to doing 
research-oriented projects aimed at assessing strategic issues. 
In addition, the IC must educate its customers about the 
importance of long-term analysis. If the focus on near-term 
analysis is maintained at the expense of long-term analysis and 
research, the ability of policymakers and military commanders 
to deal effectively with future crises will be severely 
diminished. The main function of the IC is to provide its 
customers with predictive analysis and warning; if the IC loses 
the capability to do so, it will fail to meet its most basic 
mission.

                 "downstream" intelligence activities

    For the past several years, the Committee has expressed 
concern about the imbalance between intelligence collection and 
related "downstream" intelligence activities. The Committee 
is disturbed by the fact that the IC continues to spend 
billions on high-tech collection platforms without allocating 
adequate resources to those who review the raw product, analyze 
it, and put it before policymakers and military commanders in a 
useable format. This is not to say that there should be no 
funding for new collection systems (see the Areas of Special 
Interest item on Technical Investments), and this year's 
authorization provides for such investments. But to do so 
without also planning investment for processing, exploitation, 
analysis and dissemination, serves to diminish the purpose and utility 
of the collection.
    The emphasis on collection at the expense of downstream 
activities permeates the IC at all levels and in most 
collection disciplines. The Defense Science Board, for one, has 
noted the fact that collection platforms have performed 
extremely well in Bosnia but that the "warfighter" has been 
overwhelmed by the amount of collected raw data, much of which 
remains unprocessed. In the Committee's analysis and production 
budget hearing, witnesses testified that the IC is "binning" 
(i.e., not exploiting) much of the broad-area search imagery 
that is collected. In addition, hard target analytic depth 
studies by the National Intelligence Council (NIC) conclude 
that the IC is "awash" in unexploited open source 
information. Finally, program managers consistently budget for 
satellite and launch requirements for new overhead collection 
systems, but largely ignore the need for funding sufficient 
ground processing capabilities.
    The Committee's fiscal year 1998 budget authorization 
emphasizes, among other things, the need to address processing, 
analysis and dissemination activities. For example, the 
Committee authorizes funds to create an open source 
requirements management system, enhance Measurement and 
Signatures Intelligence (MASINT) processing and exploitation, 
and advance the acquisition and fielding of analytic tools. 
These efforts, which are important first steps for addressing 
the collection-downstream imbalance, are only a small part of 
the solution.
    The Committee believes that the IC no longer needs, nor can 
it afford, to continue pouring vast amounts of money into 
expensive, high-tech collection platforms if the collected data 
is not exploited. Put simply, collecting information that is 
not processed and analyzed is simply a waste of taxpayer 
dollars. In the future, the Committee expects to see greater 
effort and resources placed on downstream activities and a more 
rational approach to collection activities. Requirements must 
be clearly and precisely articulated and collection decisions 
must be coordinated across the collection "stovepipes." The 
Committee urges the Director of Central Intelligence (DCI), in 
concern with IC managers, to address the collection-downstream 
imbalance in future budget submissions.

                       Clandestine HUMINT Funding

    The Committee is concerned about the apparently ad hoc 
nature of annual funding for clandestine Human Intelligence 
(HUMINT). We believe that such funding should, instead, reflect 
a periodically adjusted and refined projection of the long-term 
needs of analysts and consumers for the product of clandestine 
HUMINT collection. To tie the funding of clandestine HUMINT to 
these long-term needs, the Committee recommends that the DCI 
establish an interagency task force to assess long-term 
collection needs and from that assessment, define the role of 
the clandestine service in the future and the funding profile 
necessary to build and sustain its capabilities.

Present funding of clandestine HUMINT

    The Committee is aware of three attempts by analysts in 
recent years to quantify the importance of the types of 
intelligence collection: A survey of the January 1993 National 
Intelligence Daily (NID), the 1994 Strategic Intelligence 
Review (SIR) process, and the 1995 Comprehensive Capabilities 
Review (CCR). In all three studies, clandestine HUMINT made a 
surprisingly strong showing, considering the small part of the 
intelligence budget that it consumes. In the NID survey, CIA/DO 
reporting was the dominant source cited for covertly acquired 
intelligence. In the 1994 SIR process, HUMINT was, in 
aggregate, the most important source of intelligence for the 
376 intelligence needs evaluated. In the CCR, clandestine 
HUMINT and SIGINT were found to be roughly of the same value in 
pursuing the various top-tier issues of Presidential Decision 
Directive 35. Uncounted in any of these studies, and adding 
enormously to the value of clandestine HUMINT, is its 
contribution to clandestine technical operations and in 
compromising foreign cryptographic materials.
    The importance of the clandestine service in the future has 
not been lost on those looking at the future of the IC as a 
whole. Studies undertaken in the last two years by the "Aspin-
Brown" Commission, the Council on Foreign Relations, and this 
Committee have all emphasized that the intelligence targets of 
the future will be such that clandestine HUMINT will be even 
more important than it is today. The likely rapid spread of 
encryption technologies and the move towards declassifying 
imagery capabilities will only accelerate the reliance on 
clandestine human sources to crack the hardest targets.
    Yet, the cost of clandestine HUMINT remains a single digit 
percentage of the National Foreign Intelligence Program budget 
and has dropped in real dollar terms. As our actions in the 
authorization for the CIAP demonstrate, this Committee 
questions whether the annual funding requests for clandestine 
HUMINT collection are sufficiently grounded in the long-term 
needs of policymakers and in the operational requisites for 
satisfying those requirements. We have, for example, made 
recommendations for augmenting support for clandestine HUMINT 
collection that we understand will be necessary for collecting 
in the new environments of the post-Cold War. Underlying these 
recommendations, and others, is a concern that funding for the 
clandestine service enable it to begin to develop operational 
capabilities and techniques now that it will need to deploy in 
the future in order to meet the evolving needs of policymakers 
in changing technical and political environments.

Budgeting for the future

    To achieve a less ad hoc and more forward-looking budget 
request for clandestine HUMINT collection, we recommend that 
the DCI appoint a task force to project the needs of 
policymakers for clandestine HUMINT collection over the next 
two decades and report its findings to, inter alia, this 
Committee. Because of the evolving needs of policymakers since 
the end of the Cold War, the advance of information 
technologies, and the explosion of open source information, 
this Committee believes that the all-source analyst is in the 
best position to predict what information gaps may exist in the future 
and which gaps cannot be filled except by clandestine HUMINT 
collection. Accordingly, we recommend the task force be chaired by the 
Chairman of the NIC with the Deputy Director of Intelligence of the CIA 
and the Deputy Director for Intelligence Production of the DIA as Vice-
Chairs.
    With these findings in hand, the DDO, as the National 
HUMINT Collection Manager, should be in the best position to 
predict what capabilities, techniques, and operational profiles 
in the clandestine service will best fulfill the needs 
identified by the all-source analysts. On these bases, the DDO 
should prepare a long-term fiscal program and strategic plan--
perhaps building on the DO's internally prepared strategic plan 
of 1995--in consultation with the DS&T, the Defense HUMINT 
Service, and other operational partners in the Intelligence 
Community. This program and strategic plan, as validated by the 
DCI and shared with the CIA Comptroller and this Committee, 
should then become the program of record for clandestine HUMINT 
within the Intelligence Community and a major premise for the 
annual funding request for clandestine HUMINT collection.

                         technical investments

    The impact of technology--including both commercial and 
government investments--on the IC has had a dramatic effect in 
almost all intelligence activities and operations, and the 
potential for future effects is even greater. The Committee has 
taken a position in previous authorization bills that 
technology, and more appropriately, the application of new 
technologies, are becoming key to the enhancement of all 
intelligence activities, whether in the form of analytic tool 
development or technical collection support to clandestine 
operations. Indeed, the Committee believes the world-wide 
proliferation of technologies presents new opportunities--and 
challenges--for intelligence collection operations. Moreover, 
with the Department of Defense's move toward a "digitized" 
force, the IC must become more adept at not only collecting, 
analyzing and reporting tactical information, but must do so 
within a time frame and in a digital form that is usable to the 
military. The use of advanced, and in many cases, commercial, 
technologies is the key to doing this.
    One of the more substantial areas that can benefit from 
modern technologies is overhead collection. Although heavily 
influenced by leading-edge technologies already, those who 
manage current and future overhead collection programs must 
deal with new, again, often commercial, technologies that are 
rapidly developed, made readily available and, in equally rapid 
fashion, are eclipsed and outdated by even more modern 
technologies. Those who remain comfortable with unjustifiably 
long development and procurement times will fail.
    It should also be noted that the current broad base of 
technological development expands the commercial availability 
of many of these evolving technologies. For example, 
technologies used in overhead imagery, once the sole purview of 
the Intelligence and Defense communities of the U.S. and only a 
handful of other nations, are now either verging on, or are 
already being employed by commercial entities worldwide.
    Moreover, there are several areas where such technologies 
are having a definite impact on overhead collection. Technology 
is allowing for the development of smaller and less costly 
satellites, which some believe will match, if not surpass, 
current capabilities. The effective use of these technologies 
will require increased innovation by the intelligence program 
managers to ensure that the nation maintains a technological 
edge over potential foes. At the same time, the availability, 
and indeed the proliferation of such technologies should allow 
for streamlined acquisition and significant cost savings.
    The worldwide development and availability of new 
technologies, combined with the continuous increase in 
knowledge and understanding of U.S. collection systems and 
their capabilities, also will affect how the IC collects 
information and on what "targets" remain viable. The 
Committee believes the Community must invest in new and 
sometimes unanticipated collection areas/techniques to remain 
viable.
    In this year's authorization, the Committee is continuing 
its support for more flexible systems that address the future 
challenges technology is forcing on the Community. These 
investments include promoting smaller systems and ensuring that 
larger systems are technologically and financially justifiable. 
This also includes investments in a variety of research and 
development programs, and the Committee hopes the 
Administration will bring forward its own new ideas in the 
future. The Committee acknowledges the successes of past 
overhead collection programs and hopes that the initial steps 
shown in new efforts such as the Future Imagery Architecture 
signal recognition of the need for new and innovative 
approaches to address the challenges of the future.

                   a corporate and flexible community

    For the past several years, the Committee has emphasized 
the need for the IC to be more flexible and function as a 
"corporate" whole. In today's complex world, the IC must have 
the capability to address many issues simultaneously anywhere 
in the world. With fewer resources and a more diverse set of 
challenges, the IC must be able to work across programmatic and 
"stovepipe" boundaries and be flexible enough to ensure that 
resources can be shifted or augmented throughout the IC when 
necessary.
    The Committee is encouraged by progress toward improving 
coordination across IC agencies and across collection and 
analytic disciplines. The DCI's Hard Target working groups have 
proven that a coherent, multidisciplinary, coordinated approach 
to collection is an excellent way to identify and address 
collection gaps. The Committee strongly urges the DCI to 
consider applying such a "cross-INT" approach to the process 
of determining collection and production strategies for lower-
tier countries.
    The Committee is less satisfied with the IC's progress in 
addressing "surge" issues. The Committee believes there are 
several problems associated with the current method of surging 
resources. First, when resources are shifted to cover a crisis, 
collection and analytic gaps may be created elsewhere. Second, 
it is exceedingly difficult for analysts and some collectors--
particularly HUMINT-- to became instant experts on an area in 
which they have little experience or background. The Committee 
believes that although the IC should maintain global coverage, 
agencies do not need in-house expertise on all topics. 
Intelligence agencies must, however, be able to determine where 
expertise resides within the IC and be able to tap that 
expertise, wherever it exists, when the need arises. In 
addition, as discussed elsewhere in this report, the IC must 
consider creating a civilian intelligence reserve capability to 
augment existing analytic and linguistic expertise.
    The Committee strongly encourages the IC to continue and 
expand efforts to work across traditional bureaucratic 
boundaries and to implement measures to enhance flexibility. 
The Committee believes that such efforts are absolutely 
essential if the IC is to succeed in dealing with increasingly 
complex and diverse threats to U.S. national interests.

               quadrennial defense review of intelligence

    The Committee is concerned on several accounts about the 
handling of intelligence in the 1997 Quadrennial Defense Review 
(QDR). The Chairman of the Joint Chiefs of Staff (CJCS) has 
promulgated a set of new operational concepts known as Joint 
Vision 2010. As the QDR report and the CJCS's congressional 
testimony stress, information superiority or "dominant 
battlefield awareness" is the underpinning for the CJCS's 
concepts. The QDR, however, made almost no changes in the 
Department's plans for intelligence, the notable exception 
being the reduction of the planned procurement of Joint 
Surveillance and Target Attack Radar System (JSTARS) aircraft. 
This recommendation prompted the National Defense Panel (NDP) 
to suggest that the Department's investment decisions were not 
fully in keeping with its emphasis on improving intelligence 
and surveillance support. The other intelligence issues that 
the QDR raised were deferred to the normal internal summer 
budget review process.
    The QDR was focused, to a large extent, on finding ways to 
enhance the Department's investment budget. It has been 
reported that DoD intends to increase the amount of procurement 
funding steadily over the future years defense play (FYDP), 
until the level reaches approximately $68 billion in 2003, an 
increase of over $25 billion over the fiscal year 1997 dollar 
levels. Yet, intelligence spending is to remain essentially 
flat. Again, this does not seem to be in synchronization with 
the Chairman's "dominant battlefield awareness" vision.
    The Secretary of Defense recently announced the creation of 
a special task force to find ways to reduce the costs of the 
Department's infrastructure and support systems, with an 
emphasis on defense agencies. Since defense agencies make up 
the overwhelming majority of the National Foreign Intelligence 
Program, if the task force generates substantial savings, much 
of these could come from the intelligence budget. Given the 
need to "rebuild" our intelligence resources to ensure that 
they can meet future needs, especially within Defense, the 
Committee believes that such a step could well be disastrous in 
terms of our military's abilities to engage in whatever 
situation there might be. The Committee will observe carefully 
the direction of this effort, with an eye toward examining the 
long-term effects on the Community and weighing them against 
the short term gains.
    Finally, the Committee is very much aware that the 
aggregate intelligence budget generally increased at a quicker 
pace than the overall national defense budget during the high-
growth period of the 1980s, and that it declined more modestly 
than the overall defense budget in the years since. 
Intelligence has clearly received some preferential budgetary 
consideration, reflecting an appreciation that intelligence 
plays an increasingly important role in military effectiveness. 
Therefore, it seems, given the CJCS's focus on information 
dominance and the increased role of intelligence in military 
operations, that intelligence programs should continue to be 
specifically and staunchly supported as the Administration 
carries out its renewed and appropriate commitment to increase 
funding for modernization. Therefore, again, the Committee will 
closely watch these budgeting developments.

                  intelligence system interoperability

    The President's fiscal year 1998 budget request included 
significant funding for Command, Control, Communications, 
Computer and Intelligence (C4I) support, system development and 
interoperability, and for establishing a virtual intelligence 
analysis environment. The systems included the following 
programs:
          1. The Joint Intelligence Virtual Architecture 
        (JIVA);
          2. The Joint Deployable Intelligence Support System 
        (JDISS);
          3. The All Source Analysis System (ASAS);
          4. The Joint Maritime Communications Information 
        System (JMCIS);
          5. The Combat Intelligence System (CIS);
          6. The Intelligence Analysis System (IAS);
          7. The JDISS--Special Operations Command Research, 
        Analysis, and Threat Evaluation System (SOCRATES).
    The Committee supports the Department's efforts to provide 
an interoperable intelligence dissemination architecture and a 
"virtual" analytic environment with which analysts world-wide 
can collaborate. The Committee believes, however, that the 
various projects reflected in the President's request do not 
have the necessary direction and control to require the sharing 
of developments and to ensure that duplication of effort is 
minimized. This is easily determined by a thorough review of 
the various budget request documents.
    Further, the Committee believes that these systems, can be 
broken down into the basic components of (1) a high powered 
workstation with communications; (2) an operating environment 
that, by direction of the Assistant Secretary of Defense (C3I) 
must be Defense Intelligence Infrastructure (DII) Common 
Operating Environment (COE) compliant; and (3) a set of 
applications software. Although a common stated goal of the 
above systems is to provide support to analysts and operators, 
the program managers of these separate systems rarely, if ever, 
work together to achieve the common goals by sharing ideas and 
developments.
    The Committee is convinced there is a need to establish a 
management structure and focal point within the Department that 
would include representation from each of the service and 
agency system program offices. The mission of this organization 
would be to provide oversight, integration and development of 
collaborative applications for the associated C4I systems. The 
function of this organization would not be to dictate specific 
service/agency hardware solutions or unique software 
applications, but to provide for the development of common 
applications, act as a conduit for sharing analytical ideas and 
processes, and to ensure world-wide interoperability via 
standards. The Committee does not support the concept of 
centralizing funding for these efforts, since these systems are 
the responsibilities of the various services and agencies. The 
Committee would however, support the ability of such a 
coordinating organization to be an approval authority for 
expending service/agency funds. The Committee believes both the 
JDISS program office and, particularly, the Joint Reserve 
Intelligence Program have been at the forefront of C41 system 
collaboration, and would be good candidates to be chartered 
with this integration.
    Therefore the Committee is fencing 50 percent of all 
authorized and appropriated fiscal year 1998 funding for the 
above systems, until the Assistant Secretary of Defense (C3I) 
provides to the defense and intelligence authorizing committees 
a plan for creating a management structure and focal point 
within the Department with a charter encompassing the goals 
outlined above.

                          FBIS Reorganization

    The Committee supports the further establishment and 
maintenance of a strong open source capability within the IC. A 
comprehensive open source collection, translation, and analytic 
effort is crucial to the IC's ability to maintain global 
coverage and to understand developments both in "lower" and 
"higher" tier countries. Not only do open sources provide 
insight into open societies, careful scrutiny of "closed 
society" media (e.g., Iran, North Korea) can also reveal 
valuable information on trends, new developments, and 
leadership plans and intentions.
    The Foreign Broadcast Information Service (FBIS) re-
engineering strategy calls for using more modern and 
commercially available technologies as FBIS's operational 
linchpin and to transition from traditional large-scale, static 
collection and processing centers toward a more agile and less 
expensive architecture. The Committee applauds CIA's efforts to 
adapt FBIS's infrastructure and operating practices to 
incorporate new technologies and to meet intelligence 
requirements more efficiently. The Committee has several 
concerns, however, about the current FBIS re-engineering plan.
    First, the Committee is concerned that important resource 
allocation decisions are being made without fully taking into 
consideration "customer" requirements; there currently is no 
formal, direct open source requirements system that can be 
tapped to help translate requirements into rational resource 
allocation decisions. In addition, it is unclear to many FBIS 
customers what regions of the world will be affected by 
significant decreases in collection, translation an analytical 
activities. The Committee believes that open source customers 
must be kept fully informed of what changes in services they 
will see as a result of the re-engineering. The Committee also 
believes that open source collection should be driven by the 
direct input of major customers, particularly the all-source 
analysts who best understand where their information gaps lie.
    It should be noted that the Committee will closely 
scrutinize any fiscal year 1997 FBIS reprogramming request to 
determine whether the request fits into the overall 
reengineering strategy. The Committee requests that it be kept 
fully and currently informed of the plans and implementation of 
the re-engineering effort. In addition, the Committee requests 
that the DCI submit a report on the FBIS re-engineering plan to 
the intelligence oversight Committees by 1 September 1997. The 
report should include the following information:
          What is the timeline for implementing the re-
        engineering plan?
          What is the mechanism for reviewing the progress and 
        effects of the re-engineering plan?
          For what countries/regions/issues will FBIS reduce 
        its coverage (collection, translation, analysis)?
          What countries/regions/issues will FBIS no longer 
        cover?
          How will the "new way" of doing business be managed 
        (i.e., telecommuting employees, regional hubs, etc.)?
          What disruptions in service are anticipated? and
          How will FBIS work with "customers" to ensure their 
        requirements are being met?

[...]

                            declassification

    The Committee has authorized additional resources in the 
fiscal year 1998 budget for CIA classification management, 
including declassification activities in support of Executive 
Order 12958. It should be noted, however, that the Committee is 
highly skeptical that the true costs of declassification have 
been determined accurately. It is possible that additional 
resources for declassification may be required to ensure that 
it is accomplished without compromise of intelligence sources 
and methods. In addition, the Committee is very concerned about 
the criteria and techniques used in the process of 
declassifying intelligence documents. Over the next year, the 
Committee will study carefully a range of declassification and 
collateral intelligence sharing activities across the NFIP to 
determine what resources are needed for these efforts and 
whether current declassification and intelligence sharing 
activities adequately protect sources and methods.
    Specifically, the Committee will examine the 
declassification programs of various intelligence agencies, 
including issues relating to personnel qualifications, 
contractor support and training in declassification 
methodologies. As part of this review, the Committee will 
examine the implementation of bulk declassification 
techniques--that may be used in lieu of page-by-page review--
and consider the applicability of both methods for 
declassifying documents with differing classification levels. 
In addition, the Committee will review specific 
declassification case histories to assess the performance of 
the "risk management" approach to declassification. 
Furthermore, the review will examine the process and progress 
of Community-wide efforts to declassify archival records. Any 
lessons learned from problems and successes related to current 
declassification activities should be used to redirect present 
day information handling and storage policies and make future 
declassification efforts less problematic.
    The Committee also will examine the Community's processes 
for sharing intelligence with military consumers and allied 
partners. The Committee also believes that in the area of 
intelligence information management, there is a need for improved 
security controls and audit capabilities. Likewise, the Committee will 
examine issues relating to risk management, personnel training and 
qualifications, accountability, and record keeping.
    Finally, the Committee will focus in detail on the GULFLINK 
case. The recent GULFLINK damage assessment report concluded 
that the declassification process associated with Gulf War 
intelligence documents resulted in serious damage to 
intelligence sources and methods. Those working on 
declassifying Gulf War intelligence documents were directed to 
declassify an enormous amount of documents in a relatively 
short amount of time. Furthermore, the Department of Defense 
directed those declassifying these documents to err on the side 
of declassification and post documents on the GULFLINK Internet 
site unless instructed otherwise on a case-by-case basis, by 
officials at the highest levels of the Department of Defense. 
Clearly, the reported damage done to intelligence sources and 
methods in the case of GULFLINK are directly due to these 
declassification criteria. The Committee will closely examine 
the declassification processes and requirements used in the 
GULFLINK project to ensure that such mistakes are not made in 
future declassification projects.

[...]

            Section 403--Protection of CIA facilities
    Section 403 expands the law enforcement jurisdiction of the 
CIA special police 500 feet beyond the confines of Agency 
facilities, and also onto the Federal Highway Administration 
("FHWA") property immediately adjacent to the CIA 
Headquarters Compound, subject to certain limits on the 
exercise of that law enforcement authority.
    This expanded authority is required to enable the CIA to 
respond effectively to an increasing threat of terrorist attack 
against Agency personnel and facilities. Under existing law, 
CIA special police officers lack authority to investigate 
suspicious activity near but outside the boundaries of CIA 
facilities.
    Currently, the CIA special police must call the local 
police to respond to a suspicious vehicle near a CIA facility. 
Local police response time varies, however. A delay could 
result in Agency personnel having little or no warning of the 
detonation of a bomb. This provision seeks to protect the CIA's 
rank and file employees from potential harm.
    With the authority provided under this section, the CIA 
special police could immediately investigate a threatening 
situation if presented with reasonable grounds to believe a 
threat to the CIA's employees or property existed. Such 
investigation would at least allow the CIA special police to 
decide if a sufficient threat existed to justify evacuation of 
CIA personnel. The CIA special police could also seek to 
question and identify an individual in the 500-foot zone or on 
the FHWA property they reasonably believed, based on specific 
and articulable facts, was surveilling an Agency facility as a 
precursor to a terrorist attack.
    Although the main rationale for the broader authority is to 
enable more effective response to terrorist threats, the 
authority would not be limited solely to countering such 
threats. The provision also would enable a special police 
officer to investigate (and, if allowable by law, detain) 
individuals or activities within the 500 foot zone, consistent 
with the law enforcement authorities of other federal police 
officers. The section does not change the special police 
officers' authority under current law to approach and, on a 
consensual basis, question and seek identification from 
individuals in the 500-foot zone or on the FHWA property.
    Section 403 does not, however, provide a statutory basis to 
patrol within the 500 foot zone. The Committee understands that 
CIA special police officers currently conduct such external 
perimeter patrols of the CIA Headquarters property pursuant to 
the authority granted the Director of Central Intelligence 
under Section 5 of the CIA Act of 1949. That statute does not 
authorize follow-up by the officers should the need arise. The 
Committee appreciates the need to continue such external 
perimeter patrols, but also understands the need to follow-up 
or investigate any potential criminal activity that likely 
threatens the CIA, its employees, or property. The Committee, 
however, in no way, envisions a general grant of police 
authority in the 500 foot zone of protection created by this 
legislation, but does intend that CIA special police officers 
can function as federal police within that 500 foot zone, with 
all attendant authorities, capabilities, immunities, and 
liabilities, when the need arises, for the limited purpose of 
protecting CIA employees and property. Any detentions or 
arrests executed by the special police shall only be for a 
limited duration (i.e., only long enough to turn the suspects 
over to the appropriate state, local, or federal law 
enforcement authorities).
    There would be several limits on the new authority. First, 
it is restricted to the open areas within 500 feet of a CIA 
facility, and to the FHWA property immediately adjacent to the 
CIA Headquarters Compound.
    Second, the authority can be exercised only where the CIA 
special police officer identifies specific and articulable 
facts giving the officer reason to believe that the exercise of 
such functions is necessary to protect the security of CIA 
installations, property, or employees. Thus, special police 
officers would not be authorized to issue traffic tickets in 
the 500-foot zone, or on the FHWA property. Also, once the 
special police officer does begin to investigate suspected 
criminal activity, the special police officer's actions must 
conform with the well-established legal standards in Terry v. 
Ohio, 392 U.S. 1 (1967), and its progeny, as to investigative 
stops of private citizens.
    Third, the new authority would not preclude or limit in any 
way the authority of any federal, state, or local law 
enforcement agency or of any other federal police orfederal 
protective service. The CIA will seek agreements with such other 
agencies and/or services as to the exercise of the new authority, 
including the statutory violations the CIA special police would plan to 
act on in the 500-foot zone or on the FHWA property. With regard to the 
FHWA property, the Agency's intent is to execute a formal agreement 
with the FHWA that addressed not only the statutory violations issue 
but also the broader range of operational, administrative, and 
transactional matters that would be presented by the new authority and 
interagency relationship.
    Finally, the Agency rules and regulations, including those 
enforced by criminal penalties, that apply within the CIA 
facilities are not extended into the 500-foot zone or to the 
FHWA property. This means, for example, as with current law, 
that individuals in the 500-foot zone outside CIA facilities 
would not be barred from having cameras or taking pictures of 
CIA facilities.

[...]

               security personnel at agency installations

  Sec. 15. (a)(1) The Director may authorize Agency personnel 
within the United States to perform the same functions as 
special policemen of the General Services Administration 
perform under the first section of the Act entitled "An Act to 
authorize the Federal Works Administrator or officials of the 
Federal Works Agency duly authorized by him to appoint special 
policemen for duty upon Federal property under the jurisdiction 
of the Federal Works Agency, and for other purposes" (40 
U.S.C. 318), with the powers set forth in that section, except 
that such personnel shall perform such functions and exercise 
such [powers only within Agency installations, and the rules 
and regulations enforced by such personnel shall be rules and 
regulations promulgated by the Director.] powers--
          (A) within the Agency Headquarters Compound and the 
        property controlled and occupied by the Federal Highway 
        Administration located immediately adjacent to such 
        Compound and in the streets, sidewalks, and the open 
        areas within the zone beginning at the outside boundary 
        of such Compound and property and extending outward 500 
        feet; and
          (B) within any other Agency installation and in the 
        streets, sidewalks, and open areas within the zone 
        beginning at the outside boundary of any such 
        installation and extending outward 500 feet.
  (2) The performance of functions and exercise of powers under 
paragraph (1) shall be limited to those circumstances where 
such personnel can identify specific and articulable facts 
giving such personnel reason to believe that their performance 
of such functions and exercise of such powers is reasonable to 
protect against physical attack or threats of attack upon the 
Agency installations, property, or employees.
  (3) Nothing in this subsection shall be construed to 
preclude, or limit in any way, the authority of any Federal, 
State, or local law enforcement agency or of any other Federal 
police or Federal protective service.
  (4) The rules and regulations enforced by such personnel 
shall be the rules and regulations promulgated by the Director 
and shall only be applicable to the areas referred to in 
paragraph (1).
  (5) On December 1, 1998, and annually thereafter, the 
Director shall submit a report to the Permanent Select 
Committee on Intelligence of the House of Representatives and 
the Select Committee on Intelligence of the Senate that 
describes in detail the exercise of the authority granted by 
this subsection, and the underlying facts supporting the 
exercise of such authority, during the preceding fiscal year. 
The Director shall make such report available to the Inspector 
General of the Agency.

[...]




FAS Homepage | Gov't Secrecy | Congressional Docs || Index | Search |