Executive branch agencies that are not part of the US Intelligence Community (IC) can still get access to classified intelligence and to IC information technology systems under certain conditions.
But they must follow procedures that were spelled out last month in new policy guidance from Director of National Intelligence Daniel R. Coats.
In a nutshell, the non-IC agency must have an identifiable need for access to intelligence information and must be able to meet required physical security standards for safeguarding the information.
“The originating [IC] element must receive confirmation from the [non-IC] Federal Partner that all applicable safeguarding requirements in law and policy are met prior to gaining access to the data.”
See Federal Partner Access to Intelligence Community Information Technology Systems, Intelligence Community Policy Guidance 404.1, June 16, 2017.
The Director of the Central Intelligence Agency is responsible for monitoring the activities of non-IC personnel who are present on IC networks “to ensure access is consistent with U.S. legal and policy requirements, and report any variance.”
The Pentagon’s new report provides additional context and useful perspectives on events in China that took place over the past year.
Successful NC3 modernization must do more than update hardware and software: it must integrate emerging technologies in ways that enhance resilience, ensure meaningful human control, and preserve strategic stability.
The FY2026 National Defense Authorization Act (NDAA) paints a picture of a Congress that is working to both protect and accelerate nuclear modernization programs while simultaneously lacking trust in the Pentagon and the Department of Energy to execute them.
For Impact Fellow John Whitmer, working in public service was natural. “I’ve always been around people who make a living by caring.”