On March 11, 2014, California Senator Dianne Feinstein gave this statement regarding Senate Intelligence Committee's oversight review of the Detention and Interrogation Program of the CIA. She gives a timeline of the overview's activities and describes how the members accessed CIA documents.
Author: Charles E. Berger National Interest Online
Charles Berger writes that the FBI has always been a national security agency that uses both its law enforcement and intelligence authorities as means to counter the most significant threats to the United States, despite claims to the contrary.
The annual worldwide threat briefings of the intelligence community began with Director of National Intelligence James Clapper's briefing to the U.S. Senate, during which he discussed the top threats facing the United States in 2014. In his article, Micah Zenko discusses the one thing that will remain shrouded from the American public—exactly who the United States is at war with.
Annually, the Director of National Intelligence testifies before the Senate Select Committee on Intelligence and before the House Permanent Select Committee on Intelligence to discuss the current and potential threats to United States' security and priorities for the Department of Defense budget. The assessment usually covers terrorism threats, cyber attacks, counterintelligence, proliferation, mass atrocities, regional and country-by-country threats, and other state and non state intelligence threats such as health threats, water security and transnational crime.
President Barack Obama delivered these remarks at the Department of Justice on January 17, 2014. He discussed changes to the National Security Agencies' operations regarding intelligence collection of American citizens' records.
"Perhaps Ahmadullah no longer feels that his life is at risk. Unlike al-Qaeda, the Taliban have emerged from the past decade remarkably unscathed. Many of the group's leaders have vanished into tribal areas along the Afghanistan-Pakistan border, and others live in urban areas—such as Quetta and Karachi—where U.S. drones could not reasonably operate. Still, if Ahmadullah who is no older than forty-seven, has any hope of playing a role in Afghanistan's future, he will have to emerge at some point from 'under the grave.'"
This resolution was adopted December 18, 2013. It discusses the rights of citizens to privacy and free expression and the restrictions on the collection of personal data online by governments, companies, or other individuals.
The President's Review Group on Intelligence and Communications Technologies released this report on December 18, 2013. The document details forty-six recommendations for protecting national security and foreign policy interests while continuing to value privacy, civil liberties, and the public's trust.
"[Keeping the phone metadata collection program] was the first in a series of decisions by Obama to institutionalize some of the most controversial national-security policies of the Bush Administration. Faced with a long list of policies to roll back…reining in the N.S.A.'s surveillance programs might have seemed like a low priority. As core members of Al Qaeda were killed, the danger shifted to terrorists who were less organized and more difficult to detect, making the use of the N.S.A.'s powerful surveillance tools even more seductive."
Micah Zenko reviews 'Covert Capital': U.S. Empire in the Suburbs of Northern Virginia, which he says "provides an original and entertaining narrative showing how Cold War planning and operations permanently changed the suburbs of Washington."
Julia Sweig reflects on Washington's inconsistent response to outrage from foreign leaders at revelations of NSA spying, and on the roots and the implications of the United States' Euro-centric diplomacy.
Recent media stories about National Security Agency surveillance address unauthorized disclosures of two different intelligence collection programs. These programs arise from provisions of the Foreign Intelligence Surveillance Act. However, they rely on separate authorities, collect different types of information, and raise different policy questions. As such, where possible, the information contained in this report distinguishes between the two."
"Recent media stories about National Security Agency surveillance address unauthorized disclosures of two different intelligence collection programs. These programs arise from provisions of the Foreign Intelligence Surveillance Act. However, they rely on separate authorities, collect different types of information, and raise different policy questions. As such, where possible, the information contained in this report distinguishes between the two."
The NSA released this document on August 9, 2013, after Edward Snowden leaked classified documents related to the U.S. government's telephone and internet data collection and surveillance programs. This document details the history and mission of the NSA, the authority and process under which it operates, and the estimated size of its data operations.
Learn more about CFR’s mission and its work over the past year in the 2016 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass. Read and download »