National Security

Presidential Findings and Their Impact on U.S. National Security

reagan-presidential-finding-nicaragua_dec1981Presidential Finding signed by President Reagan to authorize the CIA to conduct covert operations in Central America to aid the Contra rebels in their fight against the Communist-backed Sandinista government in Nicaraqua.

During the Vietnam War nearly every kind of intelligence operation you can think of was undertaken by the U.S. Intelligence Community.  The four most heavily engaged agencies, starting with the most utilized first, were: the Central Intelligence Agency, Defense Intelligence Agency, National Security Agency, and the State Department’s Bureau of Intelligence and Research.  As the War dragged on, with public, Congressional, and Presidential frustration mounting, increased pressure was applied on intelligence activities, especially the CIA, to help turn the War in a more positive direction.

Thomas Ahern, a CIA intelligence officer, who started his career in Southeast Asia during the Vietnam War, wrote an excellent book, “Vietnam Declassified,” about the CIA and the many types of intelligence operations undertaken in Vietnam.  He cites an exasperating meeting about a problem with a certain pacification program led by the CIA, during which someone tossed out a new idea. William Colby (future CIA director), who was the CIA’s Saigon station chief at the time, replied that he was willing to try anything—if it would work.  The mounting, across-the-board frustration, left the CIA and its cohort agencies, grasping at straws.

William Colby became the new Director of Central Intelligence (DCI) in September 1973, just a month after American combat activity ceased in Southeast Asia.  Colby’s tenure would be a brief 2 ½ years.  Before the year was over, allegations began to surface in the press about questionable intelligence activities during the War.  Press allegations continued throughout 1974, and murmurings started-up in Congress about possible Intelligence Community improprieties.   By time Colby left office he would arguably hold the distinction of testifying before Congress more than any other DCI.  By January 1975 both the Senate, and House of Representatives, were conducting hearings about the impropriety allegations.  Senator Frank Church chaired one committee, and Congressman Otis Pike chaired a similar investigation committee in the House.

All of this external attention on the Intelligence Community resulted in passage of several new laws to tighten-up accountability and oversight of certain critical, intelligence operations.  For the most part, the type of operations that were closely looked at, and caused the most angst with Congress, were those in which the importance to U.S. National Security was ill-defined; in essence, justifying a direct benefit to the Unites States was a stretch, at best.

U.S. Foreign Policy has a range of options available to the President in order to achieve his goals.  The low end of the scale espouses the use of diplomacy to achieve American goals overseas.  At the opposite end of the spectrum from diplomacy is military intervention.  Starting in the post-World War II era, and continuing to this day, foreign relations between countries have become so complex that often times using pure diplomacy is ineffective; but, military intervention is too much.  The gray area between State Department diplomacy, and Defense Department military operations, is often the domain of the CIA using Covert Action to achieve American foreign policy goals.  It is this genre of intelligence operations that garnered such a strong backlash from Congress and the public after Vietnam.

Regardless the type of intelligence operation being mounted, they all have an appropriate level of Operational Security – “OPSEC.”  OPSEC is usually manifested in three categories:

Clandestine operation:  An operation sponsored or conducted by  a U.S. government department or agency in such a way as to assure secrecy or concealment.  Clandestine operations are the usual means of OPSEC for espionage and/or intelligence collection, which is the “bread n’ butter” spying conducted by the CIA’s National Clandestine Service.  The biggest reason intelligence collection is conducted with clandestine OPSEC is most adversaries, upon detecting espionage activity, move quickly to render useless anything that was purloined.  For example, clandestinely photographing an enemy’s communication code books.  If the collection activity is discovered, the enemy will stop using the compromised codes, and the photographed code book has no further value.  Being undetected is paramount in clandestine operation.

Covert operation: An operation of the United States Government that is planned and executed to influence political, economic, or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly (i.e.; plausible deniability).

Clandestine and Covert operation:  The operation must be undetected, and the sponsor’s identity is concealed.

By the very nature of clandestine operations, they tend to be low-key.  Any sort of violence associated with the operation tends to cause the lack of detection to be tossed right out the window.

Covert operations conducted by the CIA, for example, are less concerned about remaining undetected during the operation, or afterwards.  Of greater concern is running the operation so it cannot be traced back to the United States.  In this sense, it is a fact-of-life that covert operations tend to have more violence attached, destroying property and/or killing enemy personnel to prevent them from reporting who or what they saw.  As noted previously, when diplomacy fails, but, direct military intervention is too heavy handed, a plausibly deniable covert operation often becomes the tool-of-choice for resolving vexing problems.  Up until Colby’s DCI tour, and the Church & Pike Committees, the CIA regularly conducted operations using all three OPSEC categories.  Covert operations bears the majority of public and Congressional opposition.  This led Congress to add language in Title 50 U.S. Code, requiring a documented Presidential Finding for covert operations.

Prior to the law being changed to require a Presidential Finding, an extremely sensitive covert operation was usually briefed to the President for his buy-in.  The law was moot, however, on any formal requirement to seek the President’s buy-in, nor was there a requirement to document the Presidential Briefing in writing, nor to obtain an actual signature by the President, approving the covert action.  Aside from the President’s buy-in, the law was also silent about informing key members of Congress about an impending covert action.

Once the law took effect, all covert actions had to be documented in a signed Presidential Finding, and it had to contain an explanation of why it was necessary to conduct the operation, including the identifiable foreign policy objectives of the United States, and the covert action’s importance to U.S. National Security.  Lastly, the Presidential Finding must be presented to both Congressional intelligence committees.

Steve Miller, (c) Copyright 2016

Standard
National Security

Academically speaking, what is “Security” in This Day and Age?

national-security-graphic_oct2016

The first factor to consider in discussing “Security,” or as it’s more commonly known, “National Security,” is some basic definitions applicable to any country.  These “basics” are not all inclusive, but, they represent the most common National Security factors that are intrinsic to any country’s sovereignty.

  1. Citizen protection, health & well being;
  2. Protecting a country’s strategic infrastructure;
  3. Physical protection of a country’s sovereign territory;
  4. Ensure the security of a country’s natural resources;
  5. Ensuring the political stability of the country’s governmental institutions (i.e.; executive branch, legislature, and judiciary);
  6. Maintain a country’s free access to adjacent international waters and airspace.

Every country has the right to at least the preceding National Security measures without encroachment by any other state actor, non-state actor, or by externally encouraged insurrection.

Most third world countries are incapable of looking beyond these six basic National Security factors.  The truth be told, many third world nations are challenged to the hilt just trying to keep their basic factors from encroachment.  In a general sense, third world countries are so self-absorbed just trying to get the six basics right, that there’s little means, opportunity or time to concern themselves with a crisis brewing in a far off land, and whether that other country’s strife could somehow effect their own country.  An example of this might be a country like Laos, and the ISIS conflict raging in Syria and Iraq.  It is unlikely the ISIS conflict has any direct or even indirect affect on Laotian National Security.  And if the ISIS conflict did have an impact on Laos, what could Laos do about it? Nothing.

But, could the same be said for ISIS’ impact on Great Britain?  No, it could not.  The larger the economy, the greater the infrastructure, the increased sophistication of a country’s society or industry, a higher degree of advanced education systems (i.e.; colleges, trade schools, etc), the higher per capita worker earnings, and Gross Domestic Product means a country like Great Britain has more tactical and strategic interest of problems brewing in other countries.  Great Britain may have a great need for Middle-eastern oil, or they have significant business interests in foreign countries, etc.  In a nutshell, a world economic and military power like Great Britain would not be able to maintain the security and prosperity it has attained by only concerning itself with the “basic six.”

The U.S. Congress enacted legislation over six years ago, requiring the President to publish every five years, a National Security Strategy.  I have pasted a hyperlink below, so you can review the 2015 NSS yourself.  Two definitions pasted below are the U.S. Government’s official position:

Security: 1. Measures taken by a military unit, activity, or installation to protect itself against all acts designed to, or which may, impair its effectiveness.  2. A condition that results from the establishment and maintenance of protective measures that ensure a state of inviolability from hostile acts or influences. 3. With respect to classified matter, the condition that prevents unauthorized persons from having access to official information that is safeguarded in the interests of national security.

National Security: A collective term encompassing both national defense and foreign relations of the United States with the purpose of gaining: a. A military or defense advantage over any foreign nation or group of nations; b. A favorable foreign relations position; or c. A defense posture capable of successfully resisting hostile or destructive action from within or without, overt or covert.

The 2015 NSS did not change the 2010 U.S. National Enduring Interests that form the backbone of the current NSS:

  1. The security of the United States, its citizens, and U.S. allies and partners;
  2. A strong, innovative, and growing U.S. economy in an open international economic system that promotes opportunity and prosperity;
  3. Respect for universal values at home and around the world, and;
  4. A rules-based international order advanced by U.S. leadership that promotes peace, security, and opportunity through stronger cooperation to meet global challenges.

The 2015 NSS listed the following top strategic risks to U.S. interests:

  1. Catastrophic attack on the U.S. homeland or critical infrastructure;
  2. Threats or attacks against U.S. citizens abroad and our allies;
  3. Global economic crisis or widespread economic slowdown;
  4. Proliferation and/or use of weapons of mass destruction;
  5. Severe global infectious disease outbreaks;
  6. Climate change;
  7. Major energy market disruptions, and;
  8. Significant security consequences associated with weak or failing states (including mass atrocities, regional spillover, and transnational organized crime).

The United States learned 115 years ago under the leadership of President Theodore Roosevelt, that America no longer had the ability to remain isolated; the relationship to other countries, was now of strategic interest to American prosperity.  This is why the U.S. Armed Forces are deployed globally to ensure a number of issues do not affect the United States.  The 9/11 terrorist attacks demonstrated what can and will happen on U.S. soil, if the U.S. fails to project their security interests worldwide.  The U.S. can no longer remain insulated and expect the problems overseas to remain there.  Problems & crises elsewhere will come to our shores if our National Security interests do not go beyond the basic six.

http://www.dtic.mil/doctrine/doc…

     Steve Miller, Copyright (c) 2016

 

Standard