Cia Overveiw

In: Other Topics

Submitted By carney2015
Words 2144
Pages 9
The United States has carried out intelligence activities since the days of George Washington, but only since World War II have they been coordinated on a government-wide basis. President .Franklin D. Roosevelt appointed New York lawyer and war hero, William J. Donovan, to become first the Coordinator of Information, and then, after the US entered World War II, head of the Office of Strategic Services (OSS) in 1942. The OSS – the forerunner to the CIA – had a mandate to collect and analyze strategic information. After World War II, however, the OSS was abolished along with many other war agencies and its functions were transferred to the State and War Departments.
It did not take long before President Truman recognized the need for a postwar, centralized intelligence organization. To make a fully functional intelligence office, Truman signed the National Security Act of 1947 establishing the CIA. The National Security Act charged the CIA with coordinating the nation’s intelligence activities and correlating, evaluating and disseminating intelligence affecting national security.
On December 17, 2004, President George W. Bush signed the Intelligence Reform and Terrorism Prevention Act which restructured the Intelligence Community by abolishing the position of Director of Central Intelligence (DCI) and Deputy Director of Central Intelligence (DDCI) and creating the position the Director of the Central Intelligence Agency (D/CIA). The Act also created the position of Director of National Intelligence (DNI), which oversees the Intelligence Community and the National Counterterrorism Center (NCTC).
The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. The Director of the Central Intelligence Agency (D/CIA) is nominated by the president with the advice and consent of the Senate. The Director manages the…...

Similar Documents

Containing Communism Through Cia Covert Operations

...Containing Communism Through CIA Covert Operations Kurt Trendle PS335-01 American Foreign Policy Dr. Holzhauer 11/25/12 Kurt Trendle PS335-01 Major Film Analysis In my film analysis I chose three films that deal with previous U.S. administrations and more specifically the CIA's covert operations in supporting and aiding groups in other countries that ultimately opposed communism. The support of these groups was a way to perpetuate the containment policy. Chile: The Other 9/11 (2003), color, 60 minutes. British Broadcasting Corporation (BBC).:d Nicholas White; p Nicholas White; c Chris Openshaw Chile: The Other 9/11 is a documentary by the BBC which details the hour-by hour events of the military coup that led General Augusto Pinochet to power during the Cold War. On September 11th, 1973 President Salvador Allende was warned of a possible rebellion but continued on to the Presidential Palace of La Moneda in Santiago, Chile. That day President Allende sent out a broadcast that he will not step down. Allende was the first Marxist to be democratically elected. He put into place reforms that raised wages, lowered prices, and advocated for free education and healthcare. He nationalized banks and industries such as American-owned copper mines which really infuriated President Nixon (White 2003). On September 11th, the military, led by the Commander of the Army General Augusto Pinochet, surrounded the palace demanding that President Allende......

Words: 2362 - Pages: 10

Cia Triad

...Anthony Bellamy Phase 1 IP CSS150-1301A-01 Instructor Cordero Ctu Online 1/15/2013 The CIA Triad was found to have vulnerabilities so the Expanded CIA Triad was created. This Expanded CIA Triad has seven different categories. I will be discussing these seven different categories, summarizing their security goals, and discuss how the goals can be accomplished with the use of software or hardware. Availability permits authorized user whether person or computer systems to presence of data or systems at all times or whenever needed, without intrusion or impediment. Users are required to be able to access required and permitted data when needed by the users. The security goal for availability is to make the information and data available to authorized users in the required formatting. Availability may be accomplished through reliable software systems that can recover data and information easily and automatically. Accuracy is data that is free errors and mistakes and is presented in the value that is expected of the end user. The security goal of accuracy is to provide correct information, with no errors, and with the proper value. Avoidance of any such errors of mistakes is to be accomplished by accuracy. This is achievable with software that is thorough and preforms testing and verification of information. Authentication is the state of being authentic or quality of information or data versus it being a reproduction or manufactured fake. The goal of......

Words: 635 - Pages: 3

Cia World Factbook

...CIA WORLD FACTBOOK The CIA World Factbook is a reference resource produced by the Central Intelligence Agency of the United States with almanac-style information about the countries of the world. The website’s main page states that their goal as to provide information on the history, people, government, economy, geography, communications, transportation, military, and transnational issues for 267 world entities. The CIA itself is a faction of the United States of America operating as an independent US Government agency responsible for providing national security intelligence to senior US policy makers. The website provides a broad range of information about most countries including but not limited to geographic conditions, social/ political climate, economic status and military advancement. Each country has a detailed portfolio of original information as well as brief comparisons to American states and landmarks for better comprehension of the scale and size of countries/ regions. I found the website’s information particularly helpful and informative in providing social context to countries that I was familiar with personally, leading me to believe it would be a useful tool in assessing a country as far as social climate to choose the correct product/ service to market in said country. The information on the diversity and distribution of religion throughout the country is also relevant to part 1 of the term project. Religion has a massive influence on people and greatly......

Words: 362 - Pages: 2

7 Expanded Layers of the Cia Triad

...meaningful use. The goal of utility is to make proper use of information and handling of data. Without proper utilization of information, security will be breached where the information can be misused. Utility can be accomplished be reviewing the company’s Acceptable Use Policy (AUP), standards and by implementing them. Possession is the ownership of the information. Security’s goal of possession is to ensure information is under the control of the right people. It can be accomplished by ensuring confidentiality and implementing encryption techniques and security policies. By making sure all physical areas are locked and secure will reduce the opportunity of possession from happening. In summery fundamental security principles represented in CIA ensure that both the data and the information system that processes the data are protected this takes into account different forms of controls, physical security, technical security and human actions. Put together, the triad preserves and protects sensitive information, whether it is personal or proprietary....

Words: 675 - Pages: 3

Expanded Cia Triangle.

...Sara Williams CSS150-1301B-01 Phase 1 Individual Project 2-23-2013 “The CIA Triad is a venerable, well-known model for security policy development, used to identify problem areas and necessary solutions for information security.” CIA stands for Confidentiality, Integrity, and availability. The CIA Triad was developed so that people think about the important aspects of IT security. The 7 different categories of the Expanded CIA triangle are: Confidentiality, Integrity, Availability, Accuracy, Utility and Possession. Confidentiality is important when protecting sensitive information from others that don’t have the authorization to access it. A user can separate information into collections organized, and can pick who will have access to it and how sensitive they want it. Some use encryption to keep data confidential. The open source tools will also keep data safe from unauthorized people in the network. There are many methods to keep important data confidential. Integrity protects the data from modification or being deleted by unauthorized people. It also ensure that the authorized people can fix there mistakes. Some data can not be changed incorrectly, like the user account controls. If there are changes made the wrong way it can lead to service disturbances and confidentiality breaches the most common measures to guarantee integrity are traditional backups and version control......

Words: 532 - Pages: 3

George Tenent and the Last Days of Cia

...George Tenet and the Last Great Days of the CIA Lasheona Starr Dingle November 10, 2012 PAD 500: Modern Public Administration Professor Timothy Smith On July 11, 1997 at the age of 44, George Tenet was sworn into the CIA as the Director of Central Intelligence, better known as the DCI. (Stillman, 2010). Although he had no previous military experience, managed any large organizations, or shaped American foreign policy. (Stillman, 2010). Tenet was Director of Central Intelligence during William (Bill) J. Clinton’s and the majority of George W. Bush’s administration. Tenet wanted to build the reputation of the CIA, which had declined since the Cold War. He also wanted to improve the morale and gain additional funding for better technology within the CIA. When George W. Bush came into office, Tenet had built supporters on both sides of the political parties. Tenet had also built support inside the intelligence community, crucially and particularly in the Directorate of Operations [DO] at the CIA. He had won support from everyone including the new President Bush. (Coll, 2006) Although Tenet had the intentions of being a great leader and rebuilding the trust of the American people there were many ethical dilemmas experienced that led to his demise. One of these dilemmas was the violation of national and international human rights. Tenet was also the “go-between” or the “mediator” with Yasser Arafat and......

Words: 1165 - Pages: 5

Cia Extended Triad

...CSS150-1302B-01: Introduction to Computer Security Week 1 Individual Project Brian Frank Colorado Technical University Online 5/27/2013 Name and describe the seven different categories of the Expanded CIA triangle. The seven expanded categories to the Expanded CIA Triad include Confidentiality, Integrity, Availability, Accuracy, Authenticity, Utility, and Possession (Northeastern University, n.d.). * Confidentiality is only allowing access of data to authorized personnel (Kim and Solomon, 2012). * Integrity is the accuracy and validity of data, only authorized persons can edit information (Kim and Solomon, 2012). * Availability is the amount of time authorized users can use an application, data, and/or a system (Kim and Solomon, 2012). * Accuracy is data free from errors or mistakes and has the value that the end user expects (Northeastern University, n.d.) * Authenticity is the original state of data and not a reproduction (Northeastern University, n.d.). * Utility is the state of having value or quality for some purpose (Northeastern University, n.d.). * Possession is the control state of ownership of an item (Northeastern University, n.d.). Provide a summary of the security goal of each category of the Expanded CIA triangle. * Confidentiality keeps unauthorized persons from data sensitive to the nature of its business, clients, or users (Kim and Solomon, 2012). This keeps unauthorized persons from......

Words: 1086 - Pages: 5

Cia Agent-Best Job

...The most rewarding occupation that one could have would be one in the field of Criminal Justice, especially as a Secret or Central Intelligence Agency (CIA) Agent. The average CIA Agent can make a six figured salary each year. The job of being a Secret Agent is also filled with thrills and excitement. The CIA Agent not only makes a nice salary and has an exciting job, but the CIA Agent also helps to ensure the safety the society. The US government trusts this group of highly qualified individuals to protect American citizens in various locations around the world. The job of a CIA Agent pays well monetarily, is exciting and provides safety and security to our nation. A CIA agent or spy can make a salary of more than $100,000 per year. A salary of that sum can provide the agent and his or her family with a very comfortable lifestyle. Some critics may argue that “money isn’t everything”, but money is very useful and needed in order to have a certain quality of life. Money pays for food, shelter, education and so much more. Just because of the money alone, a secret agent is a very rewarding occupation. However, money alone doesn’t make the occupation of CIA Agent the best occupation, but also the excitement that comes along with being a spy. As a CIA Agent, you’re trained to investigate real crimes, criminals, suspected criminals, and perceived threats, and doing it secretively. It is full of excitement and adventure, as the professionals travel across the world in two......

Words: 545 - Pages: 3

Fbi vs. Cia

...FBI vs. CIA FBI and CIA organizations have become popular world-wide because of the movies and shows that are based on them. The movies have created an allure about the secretive missions that are carried by these agencies that help protect the United States against threats that even the public is not aware of. Federal Bureau of Investigation (FBI) is a government agency that works under the United States Department of Justice. They are responsible for protecting the citizens of United States nationwide. FBI serves as a federal criminal investigative body as well as internal intelligence agency. Its main purpose is to protect the United States internally against threats such as terrorism, criminal activities, cyber criminal activities, etc. They are also responsible for digging up and recording information that is related to the security of the United States. The FBI was established in 1908 under name of Bureau of Investigation, which was then changed to Federal Bureau of Investigation in 1935. The headquarters of the agency is located in Washington D.C., with offices located all over the United States. The FBI is divided into areas such as National security, criminal, cyber, response, and services, human resources, science technology, and information technology. Central Intelligence Agency (CIA) is an independent civilian intelligence agency of the United States that is responsible for providing intelligence regarding national security to the US policymakers. They are...

Words: 531 - Pages: 3

George Tenet and the Last Days of the Cia

...George Tenet and the Last Days of the CIA Nadine Collins Strayer University Dr. Aristole Mante PAD500 Modern Public Administrations October 11, 2013 George Tenet and the Last Days of the CIA George Tenet served as Director of the Central Intelligence Agency from 1997 to 2004, under the administration of Bill Clinton and George W Bush. An intense period covering the terrorist attacks on September 11 and the U.S. invasion of Afghanistan and Iraq. (Stillman, 2010) This outline describes the ethical obligations of Tenets’ career. The Concept of Ethical Obligations is concerned with the process by which we clarify what is right and wrong and by which we act on what we take to be right; ethics involves the use of reasons in determining a proper course of action. Ethics is also the search for moral standards (Denhardt/Denhardt, 2010) or rules that determine the way a person behave. (?) In this case study, George Tenet and the Last Great Days of the CIA. The CIA Director, George Tenet was challenged with major cross-coded ethical dilemmas in his agency, which impact his leadership abilities. First, ethical dilemma that impact his leadership skills was during the Wye Oak negotiations, Tenet was serving as the go-between for Yasser Arafat and Israeli Prime Minister Binyamin Netanyahu (White, 2008) Members within the government did not think it was right for Tenet to play a significant role as it cause doubts in his cabinet and administration.......

Words: 542 - Pages: 3

Cia (Ideal Position)

...Ideal Organization: Central Intelligence Agency (CIA) After serving nine years in the Marine Corps, I have come to the conclusion that the ideal organization for me would be the Central Intelligence Agency (CIA). I have tried several companies in the civilian sector and have been unable to adapt because I enjoy the adrenaline and excitement law enforcement has to offer. Although the CIA does have plenty of organizational stressors, they have their solutions. I will discuss task demands, role demands, physical demands, and interpersonal demands of working with the CIA as well as analyze critical elements for effective group and work team performance to determine the necessary steps it would take to develop an effective team. I will evaluate conflict management styles and explain which style is most appropriate for the potential sources of conflict. Lastly, potential barriers to communication and how these barriers may impact group and work team performance. The CIA has several divisions and positions. There are two specific positions that I would apply for: Support Integration Officer (SIO) or Military Analyst, which both have heavy task demands, role demands, and physical demands. As a SIO, I would be responsible for supporting worldwide missions. They are required to deploy (which I have already experienced) to resolve tactical issues, while applying and creating new processes and procedures to fit requirements specific to their location. The job description for a special......

Words: 1242 - Pages: 5

Georgr Tanet and the Cia

...Introduction George tenet and the last great days of the CIA cases focus on ethics and public administration ,it is important to those who are studying in public administration because this case illustrate when the executive in public sectors confront with ethical dilemma which is the problem that usually face when working in public services because public sector are not private sectors which have the efficiency goal and make profits ,but those who work in public sectors are confront with the choice among efficiency equity moral and duty. The Facts and Chronology George Tenet was the Director of the Central Intelligence Agency from 1997 to 2004. Tenet graduated from the Georgetown University in 1976 with bachelor’s degree in foreign affairs, and received a master’s degree from Columbia in 1978. George Tenet is a product of Washington, during his career at Washington he was named to be workaholic straightforward and loyalty. After he had spent four years as a lobbyist, he stared his career in Capitol Hill as a legislative assistant for Senator John Heinz. In 1985 he began working for the Senate Select Committee on Intelligence (SSCI) which he had a reputation as an “effective and efficient staffer who served his boss well” Because of his loyalty, impressed by Oklahoma senator David Boren, he was appointed to be the director of the SSCI, one of the most prestigious positions on the Hill. Later, Tenet joined President Bill Clinton's national security transition team in...

Words: 913 - Pages: 4

Cia Factbook

...According to CIA factbook The GDP real growth rate was -1.4% in 2012 and is ranked 200 in the world. It was .4% in 2011 It was -.3% in 2010 GDP composition by sector Agriculture 3.3% Industry 24.4% Services 72.6% Labor force is 23.11 million which is 28th in world Unemployment rate is 26%, which is 175th in the world. (it was 21.7% in 2011) 21.1% of the population is below the poverty line the budget deficit is 7.4% of GDP which is 189th in the world. The inflation rate is 2.4% (it was 3.1% in 2011) in the world The industrial production growth rate is 5.9% which is 51st in the world The exports are $303.8 billion (was $309.6 billion in 2011) which is 19th in the world Exports include machinery, motor vehicles, foodstuffs, pharmaceuticals, medicines, other consumer goods The export partners are: france 17.8%, Germany 10.6%, Portugal 8.3%, Italy 8.3%, UK 6.7% Imports are $322.7 billion ($364.9 billion in 2011) which is 18th in the world Imported commodities include: machinery & equipment, fuels, chemicals, semifinished goods, foodstuffs, consumer goods, measuring & medical control insturments Import partners: Germany 13%, France 11.8%, Italy 6.7%, China 5.8%, Netherlands 5%, UK 4.5% (2011) They have 152 airports 36th in world ,15293 km of railways 18th in world, 681,298 km of roadways10th in the world, 1000 km of waterways (64th in the world),...

Words: 256 - Pages: 2

Cia Assignment

...CIA ASSIGNMENT Bob works for Company A and Company B and splits his time between both with his laptop. Bob physically works from both offices and needs to access resources on the Active Directory domain of each company. Unfortunately, no trust relationship exists between these two domains. The IT staff has developed three possible solutions and they want your input (as an Information Security Analyst) on which is the most ‘secure’. Solution 1. Set Bob up with a network account under each active directory domain: have him log in to whichever one he needs access to at the time. Although he may be physically working from Company A, he will likely still need to access resources from Company B and vice versa. Solution 2. Create a local profile on Bob’s laptop and have him manually map to the resources he needs access to and set his passwords to never expire on both domains. Solution 3. Because Company A and Company B are both bound by internal and industry regulations regarding maximum password age, a third (hybrid) solution was developed. This involves Bob working from a local profile (as seen in solution 2) but having to log into each domain once per password cycle to change his passwords before expiration. In this scenario, the best solution that allows a greater amount of availability and a relatively higher level of security would be solution 3. Granted that Bob would follow other protocols and secure his laptop at all times, this solution will allow him to access to...

Words: 427 - Pages: 2

George Tenet and the Last Great Days of the Cia

...George Tenet and the Last Great Days of the CIA George Tenet was the Director of the Central Intelligence Agency from 1997-2004. He was good at what he did; he was so good that he was asked to stay on as the Director of the CIA when President Bush won the Presidency. The one thing Tenet experienced with the Bush administration that he did not experience with the Clinton Administration is he became part of the President’s inner circle. Once George Tenet experienced the inner circle, he no longer was able to focus on rebuilding the agency (Stillman 2000). In George Tenet and the Last Great Days of the CIA, Richard White, Jr. gives us the rise and fall of the CIA under CIA Director George Tenet. With any profession ethics always plays an important role. We run across many ethical situations and it always come down to what should you do? In George Tenet’s case it was no different. During his political career Tenet had faced many ethical dilemmas, some of those ethical dilemmas include him serving as a go-between person making his job politically complicated, not being able to openly disagree and communicate with the members of President Bush administration, even when he knew the President was wrong he still backed him, and being in a cross road for performing the duties of his job and being loyal to the president. Tenet had always seen the role of CIA as an “honest broker that avoided direct involvement in foreign policy making”......

Words: 1551 - Pages: 7