SlideShare a Scribd company logo
1 of 36
CHAPTER 9
THE ROLE OF THE POLICY MAKER
1
THE U.S. NATIONAL SECURITY
POLICY PROCESS
STRUCTURE AND INTERESTS. The five main loci of the U.S. national security policy process are
1. 1 The president, as an individual;
2. 2 The departments, particularly the State Department and the Department of Defense
(DOD), which has two major components: the civilian (the Office of the Secretary of
Defense) and the military (the Joint Chiefs of Staff, or JCS, and the Joint Staff), and
on certain issues, other departments may also be involved [including Justice,
Commerce. Treasury, Agriculture, and, after the September 2001 attacks, the newly
created Department of Homeland Security (DHS);
3. 3 The National Security Council (NSC) staff, which is the hub of the system; there is also
a Homeland Security Council, but it operates at a somewhat lower level;
4. 4 The intelligence community; and
5. 5 Congress, which controls all expenditures, makes policy in its own right, and performs
oversight.
The main national security structure was remarkably stable from its inception in the National
Security Act of 1947 until the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA),
which radically changed the top management structure of the intelligence community.
2
STRUCTURE AND INTERESTS.
• The five groups that carry out the intelligence process have varying
interests. Presidents are transient, mainly concerned about broad policy
initiatives and, eventually, their place in history.
• The bureaucracy tends to be more jaded and, on occasion, to take the
view that it can outlast the president, presidential appointees, and their
preferred policies.
• The principal interest of the State Department is maintaining diplomatic
relations as a means of furthering U.S. policy interests.
• Critics of the State Department argue that Foreign Service officers
sometimes forget which nation they represent, becoming advocates for
the nations on which they have expertise instead of for the United
States.
3
• DOD is primarily concerned with having a military
capability sufficient to deter hostile nations from using force
or to defeat any threats as quickly as possible.
• DHS is responsible for coordinating the activities of many
long-standing agencies, including:
Coast Guard,
Immigration and Naturalization,
Border Patrol,
Secret Service.
• It has also established new components. DHS seeks to
prevent new terrorist attacks in the United States and serves
as a bridge between the federal government and state and
local law enforcement agencies on domestic security issues.
4
The National Security Council is chaired by the President.
Its members are the Vice President, the Secretary of State, the
Secretary of Defense, the National Security Advisor, and the
Secretary of Treasury.
The Chairman of the Joint Chiefs of Staff is the statutory
military advisor to the Council.
The Director of National Intelligence is the statutory intelligence
advisor.
The Director of National Drug Control Policy is the statutory
drug control policy advisor.
The Chief of Staff to the President, Counsel to the President.
The Assistant to the President for Economic Policy
Are also regularly invited to attend NSC meetings.
5
The Attorney General.
The Director of the Office of Management and Budget.
The Director of the Central Intelligence Agency.
Are invited to attend meetings pertaining to their
responsibilities.
The heads of other executive departments and agencies, as
well as other senior officials, are invited to attend meetings
of the NSC when appropriate.
The intelligence community has no policy interests per se,
although it wants to be kept informed about the course of
policy to make a contribution to it.
6
Structure of the United States National Security Council
7
POLICY DYNAMICS
• Policy makers often refer to the "interagency process" or "the interagency." The term reflects the
involvement of any and all necessary agencies and players in the process.
• The goal of the U.S. policy process is to arrive at a consensus that all parties can support. But
consensus in the U.S. bureaucratic system means agreement down to the last detail of any paper
being considered.
• To ensure that an agency is not coerced, the interagency process emphasizes bargaining and
negotiation, steering away from dictating from above or by majority rule. Bargaining has three
immediate effects:
1. It can require a great deal of time to arrive at positions that everyone can accept.
2. The system gives leverage to any agency that refuses to reach an agreement. In the
absence of any override process, the agency that "just says 'no'" can wield enormous power.
3. The necessity of reaching agreement generates substantial pressure in favor of lowest-common-denominator decisions.
• On controversial issues, the system can suffer inertia, as agencies constantly redraft papers that never
achieve consensus or that one agency refuses to support, effectively bringing the system to a halt or
raises the prospect that officials in the holdout agency will be told to support what the president
Wants or to resign.
8
THE ROLE OF THE INTELLIGENCE
COMMUNITY
• Policy makers accept the intelligence community as an important part of the
system but the role of intelligence varies with each administration and
sometimes with each issue within an administration.
• Policy makers have many reasons to find fault with or even to ignore
intelligence. They do not necessarily view intelligence in the same way as those
who are producing it.
• Policy makers also accept that the intelligence community can be called on to
carry out certain types of operations. Again, the willingness to use this capacity
and the specific types of operations that are deemed acceptable vary with the
political leadership.
• The nature of the relationship is captured in a rueful saying among intelligence
officers: "There are only policy successes and intelligence failures. There are no
policy failures and intelligence successes."
9
WHO WANTS WHAT?
• At a high macro level, everyone wants the same thing—successful national security
policy—but this statement is so general that it is misleading. Success can mean
different things to policy makers and intelligence officials.
• The president and an administration's senior political appointees define success as
the advancement of their agenda.
• Policy makers expect support for their policies from the permanent bureaucracy.
• The intelligence community also wants to maintain its objectivity regarding policy.
Intelligence officials do not want to become, or even to be seen as becoming,
advocates for policies other than those that directly affect their activities.
• The policy maker-intelligence community relationship changes the longer the
policy makers stay in office.
• Policy makers become more familiar with the issues the more they tend to have
higher expectations and to become more demanding.
10
• The relationship between the DCI and the president became a factor.
Tenet enjoyed the closest relationship of any DCI to a president, seeing
George W. Bush at least five or six days a week, and sometimes several
times a day.
• Clinton's first DCI, R. James Woolsey (1993-1995), left office in
frustration over his lack of
access.
• The increased access to President Bush was a great gain. But some
observers questioned whether such increased access had an effect on the
DCI's objectivity.
• Critics cited Tenet's enthusiastic report on the likelihood of weapons of
mass destruction (WMD) in Iraq.
11
• A report by the Senate Select Committee on Intelligence said no evidence
existed that the intelligence had been politicized.
• Proximity to the president can also have a cost within the ranks of the
intelligence community, especially if the DNI is not a professional intelligence
officer.
• Only three DCIs were professional intelligence officers
Richard Helms
William Colby
Robert Gates
• Only two had wartime intelligence experience
 Allen Dulles
 William Casey
12
• The other DCIs tended to be treated skeptically at first by the intelligence
community or, more specifically, by the CIA, with some gaining acceptance and
others not.
• The intelligence community also wants to be kept informed about policy
directions and
preferences.
• Intelligence officers are skeptics. Their training teaches them to question and
to doubt.
• At one point, President Bush said the CIA "was just guessing" about potential
outcomes in Iraq, a remark that some intelligence officers found demeaning.
• Policy makers' expectation of support from the permanent bureaucracy extends
to the
intelligence community. But they may be seeking intelligence that supports
known policy preferences, thus running the risk of politicization.
13
How Intelligence Works
14
Intelligence drives our national security policies, and
the Intelligence Community is responsible for
supplying accurate and usable information to those in
charge of national security. The successful intelligence
process converts acquired information into clear,
comprehensible intelligence and delivers it to the
President, policymakers, and military commanders in
a form they can utilize to make educated policy
decisions. Generating reliable, accurate intelligence is
an active, never-ending process commonly referred to
as the intelligence cycle.
15
The process begins with identifying the issues in which
policy makers are interested and defining the answers
they need to make educated decisions regarding those
issues. We then lay out a plan for acquiring that
information and go about collecting it. Once we have the
proper intelligence, we sort through it, analyze what it
means, and prepare summary reports and
recommendations, which we deliver to national security
policy makers. The answers our reports supply often
reveal other areas of concern, which lead to more
questions. In this way, the end of one cycle effectively
leads to the start of the next.
16
THE INTELLIGENCE PROCESS:
POLICY AND INTELLIGENCE
When we’re tasked with a specific project, we follow a five-step process
called the Intelligence Cycle. This process ensures we do our job correctly
as we work through a system of checks and balances. Let’s take a closer
look at each step:
•Planning and Direction
•Collection
•Processing
•Analysis and Production
•Dissemination
17
Planning and Direction
When we are tasked with a specific job, we
begin planning what we’ll do and how. We
move in a specific direction to get the job
done, listing what we know about the issue
and what we need to find out. We discuss
ways to gather the necessary intelligence.
18
Collection
We collect information overtly (openly) and covertly
(secretly). Reading foreign newspapers and magazine
articles, listening to foreign radio, and watching overseas
television broadcasts are examples of “overt” (or open)
sources for us. Other information sources can be “covert”
(or secret), such as information collected with listening
devices and hidden cameras. We can even use space-age
technology like satellite photography. For instance, some
analysts could actually view how many airplanes are
present at a foreign military base by looking at a picture
taken from a satellite in space.
19
Analysis and Production
During this step, we take a closer look at all
the information and determine how it fits
together, while concentrating on answering
the original tasking. We assess what is
happening, why it is happening, what might
occur next, and how it affects US interests.
20
Dissemination
In this final step, we give our final written
analysis to a policymaker, the same
policymaker who started the cycle. After
reading the final analysis and learning the
answer to the original question, the
policymaker may come back with more
questions. Then the whole process starts
over again.
21
Our Organization
Is divided into four teams, commonly referred to as directorates. When we’re assigned
a major task, we break it down into small pieces. Each team works on a certain piece
according to their area(s) of expertise. When the work is complete, the teams put
together a big picture for analysis. It’s a proven way to work, taking advantage of the
many diverse skills of our people.
The four teams are:
 National Clandestine Service (NCS)
 Directorate of Science and Technology (DS&T)
 Directorate of Intelligence (DI)
 Directorate of Support (DS)
The first two teams collect intelligence. The third analyzes the intelligence and writes
finished papers about it. The fourth team provides support to ensure the whole
process operates smoothly.
22
National Clandestine Service
• The NCS is probably the best known of these teams. NCS
employees are often called spies; some NCS personnel go
“undercover” abroad to collect foreign intelligence. They recruit
“agents,” who help gather human intelligence (or, as we say,
HUMINT).
• These intelligence officers work to discover secrets that could
affect US security. They operate secretly, and by themselves, to
complete their missions. The work these brave intelligence
officers do every day is not really like what you see in the
movies, but there can be some challenging situations.
23
Directorate of Intelligence
The DS&T is responsible for gathering
intelligence covertly through electronic and
satellite photography. This directorate also
collects intelligence from radio and TV
broadcasts, magazines, and newspapers – what
we call open sources.
24
Directorate of Intelligence
NCS and DS&T employees turn over all the
information they gather to their teammates in
the DI. These DI analysts interpret the
intelligence and produce written reports,
which are distributed to policymakers.
25
Directorate of Support
DS employees support their teammates in the
other directorates by providing a diverse range
of support. These critical support officers
provide safety, supply necessary tools and
training, hire new employees, help ensure
employees’ health, and sustain and operate
complicated communications equipment,
among other jobs.
26
POLICYMAKERS AND INTELLIGENCE
COLLECTION
• In several instances, policy makers have intervened in intelligence
collection for political reasons.
In Cuba, at the onset of the missile crisis in 1962, Secretary of
State Dean Rusk opposed sending U-2s over the island because a
Chinese Nationalist U-2 had recently been shot down over China
and an Air Force U-2 had accidentally violated Soviet air space in
Siberia.
27
POLICYMAKERS AND INTELLIGENCE
COLLECTION
 In Iran, several successive U.S. administrations imposed limits on intelligence collection.
Basically, intelligence officers were not allowed to have contact with those in the souks
(markets and bazaars) who were opposed to the shah, because the shah's regime would be
offended Instead, U.S. intelligence had to rely on the shah's secret police, Savak, which had an
institutional interest in denying that any opposition existed. Thus, as the shah's regime
unraveled in 1978-1979.
Again, regarding Cuba, President Jimmy Carter unilaterally suspended U-2 flights as a
gesture to improve bilateral relations. Carter came to regret his decision in 1980, when he
faced the possibility that a Soviet combat brigade was in Cuba and he required better
intelligence on the issue.
• The intelligence community has a greater understanding, as would be expected, of the limits of
collection at any given time. Intelligence officials know that they are not collecting everything
28
INTELLIGENCE UNCERTAINTIES AND
POLICY
• In 1987 U 5.-Soviet negotiations were drawing to a close on the
Intermediate Nuclear Forces(INF) Treaty. The US intelligence
community had three methods for estimating the number of
Soviet INF missiles that had been produced-all of which had to be
accounted for and destroyed. Meanwhile, any final number given
by the Soviets would be suspect.
• The senior intelligence officer responsible for the issue decided,
that all three numbers had to go to President Ronald Reagan.
Some agency representatives argued that this was simply
spineless dodging. But the intelligence officer argued that the
president had to be aware of the intelligence uncertainties and the
possible range of missile numbers before he signed the treaty.
That was the right answer, instead of choosing, perhaps
haphazardly, among the organizations.
29
THE LIMITS OF INTELLIGENCE AND
POLICY: HURRICANE KATRINA
Intelligence officers are fond of using Hurricane Katrina as an
example of the limits of intelligence and the role of policy makers,
even though it was not a foreign intelligence issue The intelligence
on Katrina was nearly perfect the size and strength of the storm,
the likely track of the storm and the unique nature of the threat
that it posed to New Orleans in particular because of that city's
topography were all known In fact, these were known for days
before the storm hit New Orleans However, policy makers in New
Orleans and at the state level in Louisiana reacted much too late,
thereby increasing the effect of the storm on an unprepared
population. The lesson is that even perfect intelligence is useless
unless someone acts on it.
30
SETTING THE RIGHT
EXPECTATIONS
• During the briefings that each new administration receives, an incoming
undersecretary of state was meeting with one of his senior intelligence officers on the
issue of narcotics. The intelligence officer laid out in detail all the intelligence that
could be known about narcotics: amounts grown, shipping routes, street prices, and
so forth "That said," the intelligence officer concluded, "there is very little you will be
able to do with this intelligence"
• The undersecretary asked why the briefing had ended in that manner. "Because," the
intelligence officer replied, "this is an issue where the intelligence outruns policy's
ability to come up with solutions You are likely to grow frustrated by all of this
intelligence while you have no policy levers with which to react. I want to prepare you
for this at the outset of our relationship so as to avoid problems later on."
• The undersecretary understood.
31
COVERT ACTION
• The intelligence community harbors a certain ambivalence about covert
action. A covert action gives the intelligence community an opportunity to
display its capabilities in an area that is of extreme importance to policy
makers. Covert action is also an area in which the intelligence community's
skills are unique and are less subject to rebuttal or alternatives than is the
community's analysis.
• Disagreement over covert action is highly probable if policy makers request
an operation that intelligence officials believe to be unlikely to succeed or
inappropriate. Once the intelligence community is committed to an
operation, it does not want to be left in the lurch by the policy makers.
• In paramilitary operations, the intelligence community likely feels a greater
obligation to the forces it has enlisted, trained, and armed than the policy
makers do. The two communities do not view in similar ways a decision to
end the operation.
32
POLICY MAKER BEHAVIORS
• Just as certain analyst behaviors matter, so do certain policymaker
behaviors. Not every policy maker consumes intelligence in the same
way.
• The best policy makers know what they do not know and take steps to
learn more. Some are less self-aware and either learn as they go along
or fake it.
• The most dreaded reaction to bad news is killing the messenger,
referring to the practice of kings who would kill the herald who brought
bad news.
• Messengers—including intelligence officers—are no longer killed for
bringing bad news, but bureaucratic deaths do occur. An intelligence
official can lose access to a policy maker or be cut out of important
meetings.
33
•Policy makers can also be a source of
politicization in a variety of ways
Overtly—by telling intelligence officers the
the policy maker prefers or expects;
Covertly—by giving strong signals that have the
same result; or
Inadvertently—by not understanding that
are being interpreted as a request for a certain
outcome.
34
THE USES OF INTELLIGENCE
• One of the divides between policy makers and intelligence officers is the use to which the
intelligence is put. Policy makers want to take action; intelligence officers, although
sympathetic and sometimes supportive, are concerned about safeguarding sources and
methods and maintaining the community's ability to collect intelligence.
• Partisan politics has also become a factor in the policy-intelligence relationship. Although
differences in emphasis developed from one administration to another (such as the greater
emphasis on political covert action)
• The argument made in favor of changing DCIs (now DNIs) when a new administration
takes office is that presidents must have an intelligence community leader with whom they
are comfortable. But back in the days of a nonpartisan DCI, many people in Washington,
D.C., emphasized the professional nature of the DCI (even DCIs who were not career
intelligence officers) and had the sense that intelligence is in some way different from the
rest of the structure that each president inherits and fills with political appointees. An
objective intelligence community was not to be part of the partisan spoils of elections.
35
A number of issues are likely to create tension
between policy makers and the intelligence
community, conflict is not the mainstay of the
policy-intelligence relationship. Close and
trusting working relationships prevail between
policy makers and intelligence officers at all
levels. But a good working relationship is not a
given, and it cannot be fully appreciated without
understanding all of the potential sources of
friction.
36

More Related Content

What's hot

Administrative law
Administrative lawAdministrative law
Administrative lawtaratoot
 
THE CIVIL SERVICE COMMISSION AND THE SALIENT FEATURES OF RA 6713
THE CIVIL SERVICE COMMISSION AND THE SALIENT FEATURES OF RA 6713THE CIVIL SERVICE COMMISSION AND THE SALIENT FEATURES OF RA 6713
THE CIVIL SERVICE COMMISSION AND THE SALIENT FEATURES OF RA 6713VERNALYN TOBIAS
 
Philippine Administrative System (PAS)
Philippine Administrative System  (PAS)Philippine Administrative System  (PAS)
Philippine Administrative System (PAS)Jo Balucanag - Bitonio
 
Admin concept and procedure
Admin concept and procedureAdmin concept and procedure
Admin concept and proceduremarco ray gleyo
 
Administrative Code of 1987 - Book 1
Administrative Code of 1987 - Book 1Administrative Code of 1987 - Book 1
Administrative Code of 1987 - Book 1ppy13sseayp43
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligenceDoing What I Do
 
Public enterprise and economic development administration complete
Public enterprise and economic development administration completePublic enterprise and economic development administration complete
Public enterprise and economic development administration completeApril Medes
 
INTERGOVERNMENTAL RELATIONS
INTERGOVERNMENTAL RELATIONSINTERGOVERNMENTAL RELATIONS
INTERGOVERNMENTAL RELATIONSNesto Mark
 
Handbook on security sector governance
Handbook on security sector governanceHandbook on security sector governance
Handbook on security sector governanceKayode Fayemi
 
Public Policy & Program Administration
Public Policy & Program AdministrationPublic Policy & Program Administration
Public Policy & Program AdministrationJo Balucanag - Bitonio
 
Sources of funds for the national government
Sources of funds for the national governmentSources of funds for the national government
Sources of funds for the national governmentbenedick ledesma
 
Foreign policy
Foreign policyForeign policy
Foreign policyMMumpower1
 
The Evolution and Practices of Public Administration
The Evolution and Practices of Public  AdministrationThe Evolution and Practices of Public  Administration
The Evolution and Practices of Public AdministrationJo Balucanag - Bitonio
 

What's hot (20)

Administrative law
Administrative lawAdministrative law
Administrative law
 
THE CIVIL SERVICE COMMISSION AND THE SALIENT FEATURES OF RA 6713
THE CIVIL SERVICE COMMISSION AND THE SALIENT FEATURES OF RA 6713THE CIVIL SERVICE COMMISSION AND THE SALIENT FEATURES OF RA 6713
THE CIVIL SERVICE COMMISSION AND THE SALIENT FEATURES OF RA 6713
 
Local Government Admin
Local Government AdminLocal Government Admin
Local Government Admin
 
Models of Public Administration
Models of Public AdministrationModels of Public Administration
Models of Public Administration
 
Philippine Administrative System (PAS)
Philippine Administrative System  (PAS)Philippine Administrative System  (PAS)
Philippine Administrative System (PAS)
 
Admin concept and procedure
Admin concept and procedureAdmin concept and procedure
Admin concept and procedure
 
Governance
Governance Governance
Governance
 
Administrative Code of 1987 - Book 1
Administrative Code of 1987 - Book 1Administrative Code of 1987 - Book 1
Administrative Code of 1987 - Book 1
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Public enterprise and economic development administration complete
Public enterprise and economic development administration completePublic enterprise and economic development administration complete
Public enterprise and economic development administration complete
 
INTERGOVERNMENTAL RELATIONS
INTERGOVERNMENTAL RELATIONSINTERGOVERNMENTAL RELATIONS
INTERGOVERNMENTAL RELATIONS
 
Handbook on security sector governance
Handbook on security sector governanceHandbook on security sector governance
Handbook on security sector governance
 
Public Policy & Program Administration
Public Policy & Program AdministrationPublic Policy & Program Administration
Public Policy & Program Administration
 
Sources of funds for the national government
Sources of funds for the national governmentSources of funds for the national government
Sources of funds for the national government
 
Pnp patrol plan_2030-guidebook
Pnp patrol plan_2030-guidebookPnp patrol plan_2030-guidebook
Pnp patrol plan_2030-guidebook
 
Foreign policy
Foreign policyForeign policy
Foreign policy
 
Local Government
Local GovernmentLocal Government
Local Government
 
RA 3019.ppt
RA 3019.pptRA 3019.ppt
RA 3019.ppt
 
Administrative Accountability
Administrative Accountability  Administrative Accountability
Administrative Accountability
 
The Evolution and Practices of Public Administration
The Evolution and Practices of Public  AdministrationThe Evolution and Practices of Public  Administration
The Evolution and Practices of Public Administration
 

Viewers also liked

POLICY MAKING PROCESS
POLICY MAKING PROCESSPOLICY MAKING PROCESS
POLICY MAKING PROCESSYammie Daud
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence communityDoing What I Do
 
STAKEHOLDERS : their role and influence in public policy
STAKEHOLDERS : their role and influence in public policySTAKEHOLDERS : their role and influence in public policy
STAKEHOLDERS : their role and influence in public policyDeanne Mitzi Somollo
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesDoing What I Do
 
Chapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligenceChapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligenceDoing What I Do
 
American Government - Chapter 16 - Foreign Policy
American Government - Chapter 16 - Foreign PolicyAmerican Government - Chapter 16 - Foreign Policy
American Government - Chapter 16 - Foreign Policycyruskarimian
 
Five basic principles of american government
Five basic principles of american governmentFive basic principles of american government
Five basic principles of american governmentdnm_mccoy
 
Covert action
Covert actionCovert action
Covert actionkelsports
 
Chapter 1 what is intelligence
Chapter 1 what is intelligenceChapter 1 what is intelligence
Chapter 1 what is intelligenceDoing What I Do
 
6 major principles constitution
6 major principles constitution6 major principles constitution
6 major principles constitutionLauren Bernat
 
US Foreign Policy: A Commemoration Through The Years
US Foreign Policy: A Commemoration Through The YearsUS Foreign Policy: A Commemoration Through The Years
US Foreign Policy: A Commemoration Through The YearsEling Price
 
We’re Leaking, and Everything’s Fine: How and Why Companies Deliberately Leak...
We’re Leaking, and Everything’s Fine: How and Why Companies Deliberately Leak...We’re Leaking, and Everything’s Fine: How and Why Companies Deliberately Leak...
We’re Leaking, and Everything’s Fine: How and Why Companies Deliberately Leak...Ian McCarthy
 
The 7 Principles of the Constitution
The 7 Principles of the Constitution The 7 Principles of the Constitution
The 7 Principles of the Constitution Terry History
 
Principles of the Constitution
Principles of the ConstitutionPrinciples of the Constitution
Principles of the ConstitutionLina Nandy
 
The Seven Principles Of Government
The Seven Principles Of GovernmentThe Seven Principles Of Government
The Seven Principles Of GovernmentTim Cunningham
 

Viewers also liked (20)

Policy Makers
Policy MakersPolicy Makers
Policy Makers
 
POLICY MAKING PROCESS
POLICY MAKING PROCESSPOLICY MAKING PROCESS
POLICY MAKING PROCESS
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence community
 
Chapter 8 covert action
Chapter 8 covert actionChapter 8 covert action
Chapter 8 covert action
 
Intelligence agencys
Intelligence agencysIntelligence agencys
Intelligence agencys
 
STAKEHOLDERS : their role and influence in public policy
STAKEHOLDERS : their role and influence in public policySTAKEHOLDERS : their role and influence in public policy
STAKEHOLDERS : their role and influence in public policy
 
Policy formulation and processes
Policy formulation and processesPolicy formulation and processes
Policy formulation and processes
 
Cover overt
Cover overtCover overt
Cover overt
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
Chapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligenceChapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligence
 
American Government - Chapter 16 - Foreign Policy
American Government - Chapter 16 - Foreign PolicyAmerican Government - Chapter 16 - Foreign Policy
American Government - Chapter 16 - Foreign Policy
 
Five basic principles of american government
Five basic principles of american governmentFive basic principles of american government
Five basic principles of american government
 
Covert action
Covert actionCovert action
Covert action
 
Chapter 1 what is intelligence
Chapter 1 what is intelligenceChapter 1 what is intelligence
Chapter 1 what is intelligence
 
6 major principles constitution
6 major principles constitution6 major principles constitution
6 major principles constitution
 
US Foreign Policy: A Commemoration Through The Years
US Foreign Policy: A Commemoration Through The YearsUS Foreign Policy: A Commemoration Through The Years
US Foreign Policy: A Commemoration Through The Years
 
We’re Leaking, and Everything’s Fine: How and Why Companies Deliberately Leak...
We’re Leaking, and Everything’s Fine: How and Why Companies Deliberately Leak...We’re Leaking, and Everything’s Fine: How and Why Companies Deliberately Leak...
We’re Leaking, and Everything’s Fine: How and Why Companies Deliberately Leak...
 
The 7 Principles of the Constitution
The 7 Principles of the Constitution The 7 Principles of the Constitution
The 7 Principles of the Constitution
 
Principles of the Constitution
Principles of the ConstitutionPrinciples of the Constitution
Principles of the Constitution
 
The Seven Principles Of Government
The Seven Principles Of GovernmentThe Seven Principles Of Government
The Seven Principles Of Government
 

Similar to Chapter 9 the role of the policy maker

What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxphilipnelson29183
 
Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceAmber Wheeler
 
20070717 release
20070717 release20070717 release
20070717 releasekcmani15
 
20070717 release
20070717 release20070717 release
20070717 releasekcmani16
 
Ctp small group facilitator presentation
Ctp small group facilitator presentationCtp small group facilitator presentation
Ctp small group facilitator presentationWilliam Perkins
 
20070717 release
20070717 release20070717 release
20070717 releaseeditprofile
 
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docxW4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docxmelbruce90096
 
Gabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docxGabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docxhanneloremccaffery
 
Office of the Director of National Intelligence
Office of the Director of National IntelligenceOffice of the Director of National Intelligence
Office of the Director of National Intelligenceroycekitts
 
CIA Stratergic Communication - September 2004
CIA Stratergic Communication - September 2004CIA Stratergic Communication - September 2004
CIA Stratergic Communication - September 2004Khairi Aiman
 
Tabakian Pols 7 Fall/Spring 2014 Power 8
Tabakian Pols 7 Fall/Spring 2014 Power 8Tabakian Pols 7 Fall/Spring 2014 Power 8
Tabakian Pols 7 Fall/Spring 2014 Power 8John Paul Tabakian
 
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...GiulianoBo45
 
White7e ppt ch14
White7e ppt ch14White7e ppt ch14
White7e ppt ch14difordham
 

Similar to Chapter 9 the role of the policy maker (14)

What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docx
 
Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military Intelligence
 
20070717 release
20070717 release20070717 release
20070717 release
 
20070717 release
20070717 release20070717 release
20070717 release
 
Ctp small group facilitator presentation
Ctp small group facilitator presentationCtp small group facilitator presentation
Ctp small group facilitator presentation
 
20070717 release
20070717 release20070717 release
20070717 release
 
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docxW4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
 
Gabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docxGabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docx
 
Office of the Director of National Intelligence
Office of the Director of National IntelligenceOffice of the Director of National Intelligence
Office of the Director of National Intelligence
 
CIA Stratergic Communication - September 2004
CIA Stratergic Communication - September 2004CIA Stratergic Communication - September 2004
CIA Stratergic Communication - September 2004
 
Tabakian Pols 7 Fall/Spring 2014 Power 8
Tabakian Pols 7 Fall/Spring 2014 Power 8Tabakian Pols 7 Fall/Spring 2014 Power 8
Tabakian Pols 7 Fall/Spring 2014 Power 8
 
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
 
White7e ppt ch14
White7e ppt ch14White7e ppt ch14
White7e ppt ch14
 
WritingSampleNo.2
WritingSampleNo.2WritingSampleNo.2
WritingSampleNo.2
 

More from Doing What I Do (15)

403 10
403 10403 10
403 10
 
403 14
403 14403 14
403 14
 
403 12
403 12403 12
403 12
 
403 13
403 13403 13
403 13
 
403 2
403 2403 2
403 2
 
403 11
403 11403 11
403 11
 
403 9
403 9403 9
403 9
 
403 8
403 8403 8
403 8
 
403 4
403 4403 4
403 4
 
403 3
403 3403 3
403 3
 
403 1
403 1403 1
403 1
 
Tsa's positive 1
Tsa's positive 1Tsa's positive 1
Tsa's positive 1
 
Chapter 2 part 2 major historical development
Chapter 2 part 2 major historical developmentChapter 2 part 2 major historical development
Chapter 2 part 2 major historical development
 
Chapter 6 analysis
Chapter 6 analysisChapter 6 analysis
Chapter 6 analysis
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whom
 

Recently uploaded

Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCNAP Global Network
 
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...gajnagarg
 
9867746289 Independent Call Girls in Mumbai Airport 24/7 - Mumbai Escorts
9867746289 Independent Call Girls in Mumbai Airport 24/7 - Mumbai Escorts9867746289 Independent Call Girls in Mumbai Airport 24/7 - Mumbai Escorts
9867746289 Independent Call Girls in Mumbai Airport 24/7 - Mumbai EscortsPooja Nehwal
 
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girlsPakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girlsMonica Sydney
 
2024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 322024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 32JSchaus & Associates
 
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgergMadhuKothuru
 
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...kumargunjan9515
 
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...Call Girls Mumbai
 
Genuine Call Girls in Salem 9332606886 HOT & SEXY Models beautiful and charm...
Genuine Call Girls in Salem  9332606886 HOT & SEXY Models beautiful and charm...Genuine Call Girls in Salem  9332606886 HOT & SEXY Models beautiful and charm...
Genuine Call Girls in Salem 9332606886 HOT & SEXY Models beautiful and charm...Sareena Khatun
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processNAP Global Network
 
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...Sareena Khatun
 
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...Namrata Singh
 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.Christina Parmionova
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlEdouardHusson
 
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budgetkumargunjan9515
 
Private Call Girls Bidar 9332606886Call Girls Advance Cash On Delivery Service
Private Call Girls Bidar  9332606886Call Girls Advance Cash On Delivery ServicePrivate Call Girls Bidar  9332606886Call Girls Advance Cash On Delivery Service
Private Call Girls Bidar 9332606886Call Girls Advance Cash On Delivery Servicekumargunjan9515
 
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...kumargunjan9515
 
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie WhitehouseTime, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie Whitehousesubs7
 

Recently uploaded (20)

Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
 
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
 
9867746289 Independent Call Girls in Mumbai Airport 24/7 - Mumbai Escorts
9867746289 Independent Call Girls in Mumbai Airport 24/7 - Mumbai Escorts9867746289 Independent Call Girls in Mumbai Airport 24/7 - Mumbai Escorts
9867746289 Independent Call Girls in Mumbai Airport 24/7 - Mumbai Escorts
 
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girlsPakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
 
2024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 322024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 32
 
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
 
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
 
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
Bhubaneswar Call Girls Bhubaneswar 👉👉 9777949614 Top Class Call Girl Service ...
 
Genuine Call Girls in Salem 9332606886 HOT & SEXY Models beautiful and charm...
Genuine Call Girls in Salem  9332606886 HOT & SEXY Models beautiful and charm...Genuine Call Girls in Salem  9332606886 HOT & SEXY Models beautiful and charm...
Genuine Call Girls in Salem 9332606886 HOT & SEXY Models beautiful and charm...
 
Panchayath circular KLC -Panchayath raj act s 169, 218
Panchayath circular KLC -Panchayath raj act s 169, 218Panchayath circular KLC -Panchayath raj act s 169, 218
Panchayath circular KLC -Panchayath raj act s 169, 218
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
 
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
 
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
 
Private Call Girls Bidar 9332606886Call Girls Advance Cash On Delivery Service
Private Call Girls Bidar  9332606886Call Girls Advance Cash On Delivery ServicePrivate Call Girls Bidar  9332606886Call Girls Advance Cash On Delivery Service
Private Call Girls Bidar 9332606886Call Girls Advance Cash On Delivery Service
 
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
 
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie WhitehouseTime, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
 

Chapter 9 the role of the policy maker

  • 1. CHAPTER 9 THE ROLE OF THE POLICY MAKER 1
  • 2. THE U.S. NATIONAL SECURITY POLICY PROCESS STRUCTURE AND INTERESTS. The five main loci of the U.S. national security policy process are 1. 1 The president, as an individual; 2. 2 The departments, particularly the State Department and the Department of Defense (DOD), which has two major components: the civilian (the Office of the Secretary of Defense) and the military (the Joint Chiefs of Staff, or JCS, and the Joint Staff), and on certain issues, other departments may also be involved [including Justice, Commerce. Treasury, Agriculture, and, after the September 2001 attacks, the newly created Department of Homeland Security (DHS); 3. 3 The National Security Council (NSC) staff, which is the hub of the system; there is also a Homeland Security Council, but it operates at a somewhat lower level; 4. 4 The intelligence community; and 5. 5 Congress, which controls all expenditures, makes policy in its own right, and performs oversight. The main national security structure was remarkably stable from its inception in the National Security Act of 1947 until the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA), which radically changed the top management structure of the intelligence community. 2
  • 3. STRUCTURE AND INTERESTS. • The five groups that carry out the intelligence process have varying interests. Presidents are transient, mainly concerned about broad policy initiatives and, eventually, their place in history. • The bureaucracy tends to be more jaded and, on occasion, to take the view that it can outlast the president, presidential appointees, and their preferred policies. • The principal interest of the State Department is maintaining diplomatic relations as a means of furthering U.S. policy interests. • Critics of the State Department argue that Foreign Service officers sometimes forget which nation they represent, becoming advocates for the nations on which they have expertise instead of for the United States. 3
  • 4. • DOD is primarily concerned with having a military capability sufficient to deter hostile nations from using force or to defeat any threats as quickly as possible. • DHS is responsible for coordinating the activities of many long-standing agencies, including: Coast Guard, Immigration and Naturalization, Border Patrol, Secret Service. • It has also established new components. DHS seeks to prevent new terrorist attacks in the United States and serves as a bridge between the federal government and state and local law enforcement agencies on domestic security issues. 4
  • 5. The National Security Council is chaired by the President. Its members are the Vice President, the Secretary of State, the Secretary of Defense, the National Security Advisor, and the Secretary of Treasury. The Chairman of the Joint Chiefs of Staff is the statutory military advisor to the Council. The Director of National Intelligence is the statutory intelligence advisor. The Director of National Drug Control Policy is the statutory drug control policy advisor. The Chief of Staff to the President, Counsel to the President. The Assistant to the President for Economic Policy Are also regularly invited to attend NSC meetings. 5
  • 6. The Attorney General. The Director of the Office of Management and Budget. The Director of the Central Intelligence Agency. Are invited to attend meetings pertaining to their responsibilities. The heads of other executive departments and agencies, as well as other senior officials, are invited to attend meetings of the NSC when appropriate. The intelligence community has no policy interests per se, although it wants to be kept informed about the course of policy to make a contribution to it. 6
  • 7. Structure of the United States National Security Council 7
  • 8. POLICY DYNAMICS • Policy makers often refer to the "interagency process" or "the interagency." The term reflects the involvement of any and all necessary agencies and players in the process. • The goal of the U.S. policy process is to arrive at a consensus that all parties can support. But consensus in the U.S. bureaucratic system means agreement down to the last detail of any paper being considered. • To ensure that an agency is not coerced, the interagency process emphasizes bargaining and negotiation, steering away from dictating from above or by majority rule. Bargaining has three immediate effects: 1. It can require a great deal of time to arrive at positions that everyone can accept. 2. The system gives leverage to any agency that refuses to reach an agreement. In the absence of any override process, the agency that "just says 'no'" can wield enormous power. 3. The necessity of reaching agreement generates substantial pressure in favor of lowest-common-denominator decisions. • On controversial issues, the system can suffer inertia, as agencies constantly redraft papers that never achieve consensus or that one agency refuses to support, effectively bringing the system to a halt or raises the prospect that officials in the holdout agency will be told to support what the president Wants or to resign. 8
  • 9. THE ROLE OF THE INTELLIGENCE COMMUNITY • Policy makers accept the intelligence community as an important part of the system but the role of intelligence varies with each administration and sometimes with each issue within an administration. • Policy makers have many reasons to find fault with or even to ignore intelligence. They do not necessarily view intelligence in the same way as those who are producing it. • Policy makers also accept that the intelligence community can be called on to carry out certain types of operations. Again, the willingness to use this capacity and the specific types of operations that are deemed acceptable vary with the political leadership. • The nature of the relationship is captured in a rueful saying among intelligence officers: "There are only policy successes and intelligence failures. There are no policy failures and intelligence successes." 9
  • 10. WHO WANTS WHAT? • At a high macro level, everyone wants the same thing—successful national security policy—but this statement is so general that it is misleading. Success can mean different things to policy makers and intelligence officials. • The president and an administration's senior political appointees define success as the advancement of their agenda. • Policy makers expect support for their policies from the permanent bureaucracy. • The intelligence community also wants to maintain its objectivity regarding policy. Intelligence officials do not want to become, or even to be seen as becoming, advocates for policies other than those that directly affect their activities. • The policy maker-intelligence community relationship changes the longer the policy makers stay in office. • Policy makers become more familiar with the issues the more they tend to have higher expectations and to become more demanding. 10
  • 11. • The relationship between the DCI and the president became a factor. Tenet enjoyed the closest relationship of any DCI to a president, seeing George W. Bush at least five or six days a week, and sometimes several times a day. • Clinton's first DCI, R. James Woolsey (1993-1995), left office in frustration over his lack of access. • The increased access to President Bush was a great gain. But some observers questioned whether such increased access had an effect on the DCI's objectivity. • Critics cited Tenet's enthusiastic report on the likelihood of weapons of mass destruction (WMD) in Iraq. 11
  • 12. • A report by the Senate Select Committee on Intelligence said no evidence existed that the intelligence had been politicized. • Proximity to the president can also have a cost within the ranks of the intelligence community, especially if the DNI is not a professional intelligence officer. • Only three DCIs were professional intelligence officers Richard Helms William Colby Robert Gates • Only two had wartime intelligence experience  Allen Dulles  William Casey 12
  • 13. • The other DCIs tended to be treated skeptically at first by the intelligence community or, more specifically, by the CIA, with some gaining acceptance and others not. • The intelligence community also wants to be kept informed about policy directions and preferences. • Intelligence officers are skeptics. Their training teaches them to question and to doubt. • At one point, President Bush said the CIA "was just guessing" about potential outcomes in Iraq, a remark that some intelligence officers found demeaning. • Policy makers' expectation of support from the permanent bureaucracy extends to the intelligence community. But they may be seeking intelligence that supports known policy preferences, thus running the risk of politicization. 13
  • 15. Intelligence drives our national security policies, and the Intelligence Community is responsible for supplying accurate and usable information to those in charge of national security. The successful intelligence process converts acquired information into clear, comprehensible intelligence and delivers it to the President, policymakers, and military commanders in a form they can utilize to make educated policy decisions. Generating reliable, accurate intelligence is an active, never-ending process commonly referred to as the intelligence cycle. 15
  • 16. The process begins with identifying the issues in which policy makers are interested and defining the answers they need to make educated decisions regarding those issues. We then lay out a plan for acquiring that information and go about collecting it. Once we have the proper intelligence, we sort through it, analyze what it means, and prepare summary reports and recommendations, which we deliver to national security policy makers. The answers our reports supply often reveal other areas of concern, which lead to more questions. In this way, the end of one cycle effectively leads to the start of the next. 16
  • 17. THE INTELLIGENCE PROCESS: POLICY AND INTELLIGENCE When we’re tasked with a specific project, we follow a five-step process called the Intelligence Cycle. This process ensures we do our job correctly as we work through a system of checks and balances. Let’s take a closer look at each step: •Planning and Direction •Collection •Processing •Analysis and Production •Dissemination 17
  • 18. Planning and Direction When we are tasked with a specific job, we begin planning what we’ll do and how. We move in a specific direction to get the job done, listing what we know about the issue and what we need to find out. We discuss ways to gather the necessary intelligence. 18
  • 19. Collection We collect information overtly (openly) and covertly (secretly). Reading foreign newspapers and magazine articles, listening to foreign radio, and watching overseas television broadcasts are examples of “overt” (or open) sources for us. Other information sources can be “covert” (or secret), such as information collected with listening devices and hidden cameras. We can even use space-age technology like satellite photography. For instance, some analysts could actually view how many airplanes are present at a foreign military base by looking at a picture taken from a satellite in space. 19
  • 20. Analysis and Production During this step, we take a closer look at all the information and determine how it fits together, while concentrating on answering the original tasking. We assess what is happening, why it is happening, what might occur next, and how it affects US interests. 20
  • 21. Dissemination In this final step, we give our final written analysis to a policymaker, the same policymaker who started the cycle. After reading the final analysis and learning the answer to the original question, the policymaker may come back with more questions. Then the whole process starts over again. 21
  • 22. Our Organization Is divided into four teams, commonly referred to as directorates. When we’re assigned a major task, we break it down into small pieces. Each team works on a certain piece according to their area(s) of expertise. When the work is complete, the teams put together a big picture for analysis. It’s a proven way to work, taking advantage of the many diverse skills of our people. The four teams are:  National Clandestine Service (NCS)  Directorate of Science and Technology (DS&T)  Directorate of Intelligence (DI)  Directorate of Support (DS) The first two teams collect intelligence. The third analyzes the intelligence and writes finished papers about it. The fourth team provides support to ensure the whole process operates smoothly. 22
  • 23. National Clandestine Service • The NCS is probably the best known of these teams. NCS employees are often called spies; some NCS personnel go “undercover” abroad to collect foreign intelligence. They recruit “agents,” who help gather human intelligence (or, as we say, HUMINT). • These intelligence officers work to discover secrets that could affect US security. They operate secretly, and by themselves, to complete their missions. The work these brave intelligence officers do every day is not really like what you see in the movies, but there can be some challenging situations. 23
  • 24. Directorate of Intelligence The DS&T is responsible for gathering intelligence covertly through electronic and satellite photography. This directorate also collects intelligence from radio and TV broadcasts, magazines, and newspapers – what we call open sources. 24
  • 25. Directorate of Intelligence NCS and DS&T employees turn over all the information they gather to their teammates in the DI. These DI analysts interpret the intelligence and produce written reports, which are distributed to policymakers. 25
  • 26. Directorate of Support DS employees support their teammates in the other directorates by providing a diverse range of support. These critical support officers provide safety, supply necessary tools and training, hire new employees, help ensure employees’ health, and sustain and operate complicated communications equipment, among other jobs. 26
  • 27. POLICYMAKERS AND INTELLIGENCE COLLECTION • In several instances, policy makers have intervened in intelligence collection for political reasons. In Cuba, at the onset of the missile crisis in 1962, Secretary of State Dean Rusk opposed sending U-2s over the island because a Chinese Nationalist U-2 had recently been shot down over China and an Air Force U-2 had accidentally violated Soviet air space in Siberia. 27
  • 28. POLICYMAKERS AND INTELLIGENCE COLLECTION  In Iran, several successive U.S. administrations imposed limits on intelligence collection. Basically, intelligence officers were not allowed to have contact with those in the souks (markets and bazaars) who were opposed to the shah, because the shah's regime would be offended Instead, U.S. intelligence had to rely on the shah's secret police, Savak, which had an institutional interest in denying that any opposition existed. Thus, as the shah's regime unraveled in 1978-1979. Again, regarding Cuba, President Jimmy Carter unilaterally suspended U-2 flights as a gesture to improve bilateral relations. Carter came to regret his decision in 1980, when he faced the possibility that a Soviet combat brigade was in Cuba and he required better intelligence on the issue. • The intelligence community has a greater understanding, as would be expected, of the limits of collection at any given time. Intelligence officials know that they are not collecting everything 28
  • 29. INTELLIGENCE UNCERTAINTIES AND POLICY • In 1987 U 5.-Soviet negotiations were drawing to a close on the Intermediate Nuclear Forces(INF) Treaty. The US intelligence community had three methods for estimating the number of Soviet INF missiles that had been produced-all of which had to be accounted for and destroyed. Meanwhile, any final number given by the Soviets would be suspect. • The senior intelligence officer responsible for the issue decided, that all three numbers had to go to President Ronald Reagan. Some agency representatives argued that this was simply spineless dodging. But the intelligence officer argued that the president had to be aware of the intelligence uncertainties and the possible range of missile numbers before he signed the treaty. That was the right answer, instead of choosing, perhaps haphazardly, among the organizations. 29
  • 30. THE LIMITS OF INTELLIGENCE AND POLICY: HURRICANE KATRINA Intelligence officers are fond of using Hurricane Katrina as an example of the limits of intelligence and the role of policy makers, even though it was not a foreign intelligence issue The intelligence on Katrina was nearly perfect the size and strength of the storm, the likely track of the storm and the unique nature of the threat that it posed to New Orleans in particular because of that city's topography were all known In fact, these were known for days before the storm hit New Orleans However, policy makers in New Orleans and at the state level in Louisiana reacted much too late, thereby increasing the effect of the storm on an unprepared population. The lesson is that even perfect intelligence is useless unless someone acts on it. 30
  • 31. SETTING THE RIGHT EXPECTATIONS • During the briefings that each new administration receives, an incoming undersecretary of state was meeting with one of his senior intelligence officers on the issue of narcotics. The intelligence officer laid out in detail all the intelligence that could be known about narcotics: amounts grown, shipping routes, street prices, and so forth "That said," the intelligence officer concluded, "there is very little you will be able to do with this intelligence" • The undersecretary asked why the briefing had ended in that manner. "Because," the intelligence officer replied, "this is an issue where the intelligence outruns policy's ability to come up with solutions You are likely to grow frustrated by all of this intelligence while you have no policy levers with which to react. I want to prepare you for this at the outset of our relationship so as to avoid problems later on." • The undersecretary understood. 31
  • 32. COVERT ACTION • The intelligence community harbors a certain ambivalence about covert action. A covert action gives the intelligence community an opportunity to display its capabilities in an area that is of extreme importance to policy makers. Covert action is also an area in which the intelligence community's skills are unique and are less subject to rebuttal or alternatives than is the community's analysis. • Disagreement over covert action is highly probable if policy makers request an operation that intelligence officials believe to be unlikely to succeed or inappropriate. Once the intelligence community is committed to an operation, it does not want to be left in the lurch by the policy makers. • In paramilitary operations, the intelligence community likely feels a greater obligation to the forces it has enlisted, trained, and armed than the policy makers do. The two communities do not view in similar ways a decision to end the operation. 32
  • 33. POLICY MAKER BEHAVIORS • Just as certain analyst behaviors matter, so do certain policymaker behaviors. Not every policy maker consumes intelligence in the same way. • The best policy makers know what they do not know and take steps to learn more. Some are less self-aware and either learn as they go along or fake it. • The most dreaded reaction to bad news is killing the messenger, referring to the practice of kings who would kill the herald who brought bad news. • Messengers—including intelligence officers—are no longer killed for bringing bad news, but bureaucratic deaths do occur. An intelligence official can lose access to a policy maker or be cut out of important meetings. 33
  • 34. •Policy makers can also be a source of politicization in a variety of ways Overtly—by telling intelligence officers the the policy maker prefers or expects; Covertly—by giving strong signals that have the same result; or Inadvertently—by not understanding that are being interpreted as a request for a certain outcome. 34
  • 35. THE USES OF INTELLIGENCE • One of the divides between policy makers and intelligence officers is the use to which the intelligence is put. Policy makers want to take action; intelligence officers, although sympathetic and sometimes supportive, are concerned about safeguarding sources and methods and maintaining the community's ability to collect intelligence. • Partisan politics has also become a factor in the policy-intelligence relationship. Although differences in emphasis developed from one administration to another (such as the greater emphasis on political covert action) • The argument made in favor of changing DCIs (now DNIs) when a new administration takes office is that presidents must have an intelligence community leader with whom they are comfortable. But back in the days of a nonpartisan DCI, many people in Washington, D.C., emphasized the professional nature of the DCI (even DCIs who were not career intelligence officers) and had the sense that intelligence is in some way different from the rest of the structure that each president inherits and fills with political appointees. An objective intelligence community was not to be part of the partisan spoils of elections. 35
  • 36. A number of issues are likely to create tension between policy makers and the intelligence community, conflict is not the mainstay of the policy-intelligence relationship. Close and trusting working relationships prevail between policy makers and intelligence officers at all levels. But a good working relationship is not a given, and it cannot be fully appreciated without understanding all of the potential sources of friction. 36