Counterintelligence Field Activity
   HOME

TheInfoList



OR:

Counterintelligence Field Activity (CIFA) was a
United States Department of Defense The United States Department of Defense (DoD, USDOD or DOD) is an executive branch department of the federal government charged with coordinating and supervising all agencies and functions of the government directly related to national sec ...
(DoD) agency whose size and budget were classified. The CIFA was created by a directive (Number 5105.67) from the
Secretary of Defense A defence minister or minister of defence is a cabinet official position in charge of a ministry of defense, which regulates the armed forces in sovereign states. The role of a defence minister varies considerably from country to country; in so ...
, then
Donald Rumsfeld Donald Henry Rumsfeld (July 9, 1932 – June 29, 2021) was an American politician, government official and businessman who served as Secretary of Defense from 1975 to 1977 under president Gerald Ford, and again from 2001 to 2006 under Preside ...
, on February 19, 2002. On August 8, 2008, it was announced that CIFA would be shut down. The
Defense Intelligence Agency The Defense Intelligence Agency (DIA) is an intelligence agency and combat support agency of the United States Department of Defense, specializing in defense and military intelligence. A component of the Department of Defense (DoD) and the ...
(DIA) absorbed most of the components and authorities of the CIFA into the Defense Counterintelligence and Human Intelligence Center which was later consolidated into the
Defense Clandestine Service The Defense Clandestine Service (DCS) is an arm of the Defense Intelligence Agency (DIA), which conducts clandestine espionage, intelligence gathering activities and classified operations around the world to provide insights and answer national ...
.


Mission

CIFA goals were: * To effectively and efficiently manage and oversee the Defense Department counterintelligence enterprise. * To synchronize Defense counterintelligence activities across the department, in coordination with the national intelligence community. * To manage priority counterintelligence plans and projects in fulfillment of national, department and combatant commander requirements. * To select and develop unique counterintelligence operational support capabilities and make them available to the wider intelligence community. * To serve as the primary source of career development and training for counterintelligence professionals. * To identify, develop and field advanced technologies for counterintelligence. * To create a joint, interoperable and synchronized approach to counterintelligence as a distinct intelligence discipline. * To assess the feasibility of a department-level joint operational element for Defense counterintelligence.


Organization

The Director of DoD CIFA reported directly to DoD's Undersecretary of Defense for Intelligence. The offices of Chief of Staff, Office of General Counsel, and Office of the Inspector General reported directly to the Director of CIFA. CIFA was then broken into four directorates: Program Management, Information Technology, Operational Support and Training and Development. Program Management was responsible for budgeting, management and accountability. Information Technology was responsible for planning and managing special technology needs of the counterintelligence enterprise. Operational Support planned, directed and managed counterintelligence activities and coordinated offensive counterintelligence campaigns. Training and Development set performance assessment standards and assured that defense counterintelligence training and education programs, as well as instructors, maintained accreditation and certification.


Joint Protection Enterprise Network (JPEN) database

CIFA managed the database of "suspicious incidents" in the United States or the Joint Protection Enterprise Network (JPEN). It was an
intelligence Intelligence has been defined in many ways: the capacity for abstraction, logic, understanding, self-awareness, learning, emotional knowledge, reasoning, planning, creativity, critical thinking, and problem-solving. More generally, it can ...
and law enforcement system that was a near real-time sharing of raw non-validated information among DoD organizations and installations. Feeding into JPEN were intelligence, law enforcement, counterintelligence, and security reports, information from DoD's "Threat and Local Observation Notice" (
TALON Talon or talons may refer to: Science and technology * Talon (anatomy), the claw of a bird of prey * Brodifacoum, a rodenticide, also known as the brand Talon * TALON (database), a database maintained by the US Air Force * Talon, an anti-vehicle- ...
) reporting system of unfiltered information, and other reports. There were seven criteria taken into account in the creation of a TALON report: *Nonspecific threats. *Surveillance. *Elicitation. *Tests of security. *Repetitive activities. *Bomb threats. *Suspicious activities and/or incidents Army regulation 190-45, Law Enforcement Reporting, stated that JPEN may be used to share police intelligence with DOD law enforcement agencies, military police, the
U.S. Army Criminal Investigation Command The United States Army Criminal Investigation Division (USACID), previously known as the United States Army Criminal Investigation Command (USACIDC) is the primary federal law enforcement agency of the United States Department of the Army. Its p ...
and local, state, federal, and international law enforcement agencies.


Privacy issues

The domestic collection of data by military agencies was strictly regulated by laws such as the
Privacy Act of 1974 The Privacy Act of 1974 (, ), a United States federal law, establishes a Code of Fair Information Practice that governs the collection, maintenance, use, and dissemination of personally identifiable information about individuals that is maintain ...
, which strengthened and specified a United States citizen's
right to privacy The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 150 national constitutions mention the right to privacy. On 10 December 194 ...
as noted in the Fourth Amendment
United States Constitution The Constitution of the United States is the supreme law of the United States of America. It superseded the Articles of Confederation, the nation's first constitution, in 1789. Originally comprising seven articles, it delineates the natio ...
. In addition, the
Supreme Court of the United States The Supreme Court of the United States (SCOTUS) is the highest court in the federal judiciary of the United States. It has ultimate appellate jurisdiction over all U.S. Federal tribunals in the United States, federal court cases, and over Stat ...
found in '' Griswold v. Connecticut (1965)'' the right to privacy against government intrusion was protected by the ''"
penumbra The umbra, penumbra and antumbra are three distinct parts of a shadow, created by any light source after impinging on an opaque object. Assuming no diffraction, for a collimated beam (such as a point source) of light, only the umbra is cast. T ...
s"'' of other Constitutional provisions. The DoD reflected these in its own guidelines that have been in place since 1982. CIFA's similar collection and retention of data on peace groups and other activists promoted parallels to be drawn between the two programs by civil rights groups like the
ACLU The American Civil Liberties Union (ACLU) is a nonprofit organization founded in 1920 "to defend and preserve the individual rights and liberties guaranteed to every person in this country by the Constitution and laws of the United States". ...
, and intelligence officials who found the prospect of the military tracking peace groups again to be worrisome. After ACLU filed multiple
Freedom of Information Act Freedom of Information Act may refer to the following legislations in different jurisdictions which mandate the national government to disclose certain data to the general public upon request: * Freedom of Information Act 1982, the Australian act * ...
(FOIA) requests regarding information gathering on peace groups and NBC did a report citing a
Quaker Quakers are people who belong to a historically Protestant Christian set of denominations known formally as the Religious Society of Friends. Members of these movements ("theFriends") are generally united by a belief in each human's abili ...
group planning an anti-enlistment action that was listed as a "threat", a review of CIFA activities was ordered by then Undersecretary of Defense for Intelligence Stephen A. Cambone, who stated at the time that it appeared that there had been several violations. A complaint requesting the expedition of the FOIA requests by the ACLU was ruled in their favor by a federal court. The released documents showed that at least 126 peace groups' information had been held past required removal dates. The DoD has since stated that it removed all improperly kept data.


Shut down

On April 1, 2008, the Pentagon's top intelligence official (James R. Clapper, the Under Secretary of Defense (Intelligence)) recommended CIFA's dismantling. On August 8, 2008, it was announced that CIFA would be shut down and its activities would be absorbed by the
Defense Intelligence Agency The Defense Intelligence Agency (DIA) is an intelligence agency and combat support agency of the United States Department of Defense, specializing in defense and military intelligence. A component of the Department of Defense (DoD) and the ...
.DIA to start spy operations against foreigners
" ''USA Today,'' 6 August 2008.


See also

*
Authorization for Use of Military Force Against Terrorists The Authorization for Use of Military Force (AUMF) (, ) is a joint resolution of the United States Congress which became law on September 18, 2001, authorizing the use of the United States Armed Forces against those responsible for the September ...
(2001) *
Authorization for Use of Military Force Against Iraq Resolution of 2002 The Authorization for Use of Military Force Against Iraq Resolution of 2002,USA PATRIOT Act The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of the United States Congress, signed into law by President George W. Bush. The formal name of the statute is the Uniting and Strengthening America by Providing Appro ...
, specifically
USA PATRIOT Act, Title II The USA PATRIOT Act was passed by the United States Congress in 2001 as a response to the September 11, 2001 attacks. It has ten titles, each containing numerous sections. Title II: Enhanced Surveillance Procedures granted increased powers of sur ...
entitled '' Enhanced Surveillance Procedures'' *
Fourth Amendment to the United States Constitution The Fourth Amendment (Amendment IV) to the United States Constitution is part of the Bill of Rights. It prohibits unreasonable searches and seizures. In addition, it sets requirements for issuing warrants: warrants must be issued by a judge o ...
*
Economic Espionage Act of 1996 The Economic Espionage Act of 1996 () was a 6 title Act of Congress dealing with a wide range of issues, including not only industrial espionage (''e.g.'', the theft or misappropriation of a trade secret and the National Information Infrastruc ...
*
Privacy Act of 1974 The Privacy Act of 1974 (, ), a United States federal law, establishes a Code of Fair Information Practice that governs the collection, maintenance, use, and dissemination of personally identifiable information about individuals that is maintain ...
*
Counter-terrorism Counterterrorism (also spelled counter-terrorism), also known as anti-terrorism, incorporates the practices, military tactics, techniques, and strategies that governments, law enforcement, business, and intelligence agencies use to combat or ...


Notes


References


DoD Directive Number 5105.67Military Police bulletin, April 2006Pentagon admits errors in spying on protesters


External links



- ''Documents Describe Organization and Operations of Controversial Agency and Database'',
National Security Archive The National Security Archive is a 501(c)(3) non-governmental, non-profit research and archival institution located on the campus of the George Washington University in Washington, D.C. Founded in 1985 to check rising government secrecy. The N ...
,
The George Washington University , mottoeng = "God is Our Trust" , established = , type = Private federally chartered research university , academic_affiliations = , endowment = $2.8 billion (2022) , presid ...
, September 17, 2007 {{Intelligence agencies of USA Government agencies established in 2002 Government agencies disestablished in 2008 Defunct United States intelligence agencies Defense Intelligence Agency 2002 establishments in the United States Counterintelligence agencies