The U.S. Intelligence Community

Front Cover
Westview Press, 1999 - Political Science - 526 pages
10 Reviews
This book provides a detailed overview of America’s vast intelligence empire—its organizations, its operations (from spies on the ground to satellites thousands of miles in space), and its management structure. Relying on a multitude of sources, including hundreds of official documents, it provides an up-to-date picture of the U.S. intelligence community that will provide support to policymakers and military operations into the next century.
  

What people are saying - Write a review

User ratings

5 stars
3
4 stars
2
3 stars
4
2 stars
0
1 star
1

Review: The US Intelligence Community

User Review  - Adam - Goodreads

Dry but informative. Read full review

Review: The US Intelligence Community

User Review  - Barrett Dylan Brown - Goodreads

A decent, if now outdated, attempt to catagorize and map out the various US Agencies with an investment in Intelligence. Read full review

Contents

III
1
IV
2
V
3
VI
5
VII
6
VIII
8
IX
12
X
13
LXXII
258
LXXIII
262
LXXIV
266
LXXV
268
LXXVI
269
LXXVII
273
LXXVIII
274
LXXIX
279

XI
16
XII
30
XIII
36
XIV
40
XV
47
XVI
55
XVII
67
XVIII
71
XIX
74
XX
75
XXI
80
XXII
87
XXIII
98
XXIV
100
XXV
104
XXVI
106
XXVII
108
XXVIII
110
XXIX
113
XXX
116
XXXI
118
XXXII
120
XXXIII
123
XXXIV
124
XXXV
127
XXXVI
130
XXXVII
133
XXXVIII
137
XL
138
XLI
141
XLII
143
XLIV
150
XLV
152
XLVI
167
XLVII
170
XLVIII
173
XLIX
180
L
185
LI
191
LII
197
LIII
201
LIV
202
LV
203
LVI
205
LVII
214
LVIII
216
LIX
220
LX
223
LXI
231
LXIII
235
LXIV
241
LXV
243
LXVI
246
LXVII
248
LXVIII
250
LXIX
251
LXX
252
LXXI
257
LXXX
282
LXXXI
286
LXXXII
291
LXXXIII
292
LXXXIV
296
LXXXV
298
LXXXVI
299
LXXXVII
302
LXXXVIII
303
LXXXIX
304
XC
305
XCI
307
XCII
308
XCIII
309
XCIV
315
XCV
316
XCVI
319
XCVIII
323
XCIX
324
C
329
CI
332
CII
333
CIII
334
CIV
337
CV
339
CVI
343
CVII
345
CVIII
349
CIX
350
CX
351
CXI
352
CXII
356
CXIII
357
CXV
358
CXVI
374
CXVII
384
CXVIII
396
CXIX
398
CXX
404
CXXI
406
CXXII
412
CXXIII
416
CXXIV
419
CXXV
421
CXXVI
424
CXXVII
425
CXXVIII
437
CXXIX
445
CXXX
451
CXXXI
452
CXXXII
457
CXXXIII
461
CXXXIV
467
CXXXV
469
CXXXVI
472
CXXXVII
477
CXXXVIII
493
Copyright

Common terms and phrases

Popular passages

Page 17 - Council — (1) to advise the National Security Council in matters concerning such intelligence activities of the Government departments and agencies as relate to national security; (2) to make recommendations to the National Security...
Page 17 - Intelligence shall be responsible for protecting intelligence sources and methods from unauthorized disclosure; (4) to perform, for the benefit of the existing intelligence agencies, such additional services of common concern as the National Security Council determines can be more efficiently accomplished centrally...
Page 17 - ... (4) to perform, for the benefit of the existing intelligence agencies, such additional services of common concern as the National Security Council determines can be more efficiently accomplished centrally; (5) to perform such other functions and duties related to intelligence affecting the national security as the National Security Council may from time to time direct.
Page 17 - Government as relate to the national security; (3) to correlate and evaluate intelligence relating to the national security, and provide for the appropriate dissemination of such intelligence within' the Government using where appropriate existing agencies and facilities...
Page 236 - Department of Energy National Security and Military Applications of Nuclear Energy Authorization Act of 1982".
Page 430 - Information shall not be considered for classification unless it concerns: (a) military plans, weapons systems, or operations; (b) foreign government information; (c) intelligence activities (including special activities), intelligence sources or methods, or cryptology; (d) foreign relations or foreign activities of the United States, including confidential sources...
Page 431 - These officials shall keep the number of these programs at an absolute minimum, and shall establish them only upon a specific finding that: (1) the vulnerability of, or threat to, specific information is exceptional; and (2) the normal criteria for determining eligibility for access applicable to information classified at the same level are not deemed sufficient to protect the information from unauthorized disclosure; or (3) the program is required by statute.
Page 358 - Samuel P. Huntington, The Clash of Civilizations and the Remaking of World Order (New York: Simon & Schuster, 1996).

References to this book

All Book Search results »

About the author (1999)

Jeffrey T. Richelson received his Ph.D. in political science from the University of Rochester in 1975, and has taught at the University of Texas, Austin, and the American University, Washington. A senior fellow at the National Security Archive in Washington, he lives in Alexandria, Virginia.

Bibliographic information