105th Congress Rept. 105-135 HOUSE OF REPRESENTATIVES 1st Session Part 1 _______________________________________________________________________ INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEAR 1998 _______ June 18, 1997.--Ordered to be printed _______________________________________________________________________ Mr. Goss, from the Permanent Select Committee on Intelligence, submitted the following R E P O R T [excerpts] together with MINORITY VIEWS [To accompany H.R. 1775] [Including cost estimate of the Congressional Budget Office] The Permanent Select Committee on Intelligence, to whom was referred the bill (H.R. 1775) to authorize appropriations for fiscal year 1998 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes, having considered the same, report favorably thereon with an amendment and recommend that the bill as amended do pass. [...] Committee Findings and Recommendations The Committee completed its review of the President's fiscal year 1998 budget, carrying out its annual responsibility to prepare an authorization based on close examination of intelligence programs and proposed expenditures. The review continued to reflect the Committee's belief that intelligence activities must be examined by function as well as by program, thus, was structured across program lines and intelligence disciplines and themes. The Committee held seven full Committee budget-related hearings and two Subcommittee budget hearings on the following issues: Intelligence Requirements; Airborne Reconnaissance; Technical Intelligence; Overhead Collection; Human Intelligence; Covert Action; Analysis and Production; Counterintelligence; and Personnel and Legislative Issues. The Committee also held full Committee briefings on subjects such as the Future Imagery Architecture, Unconventional SIGNINT Capabilities, and some selected sensitive DoD collection platforms. There were, in addition, over 100 staff briefings on programs, specific activities and budget requests. The Committee continued to place heavy emphasis on understanding and addressing the future needs of the Intelligence Community, and the several distinct roles that it plays in national security. At the national level, the goal of intelligence is to make the national-level policy maker and decision maker aware of impending events so that appropriate actions are taken, especially those than might avoid or contain conflict. At the other end of the spectrum, intelligence is now incorporated into the very fiber of tactical military operational activities, whether forces are being utilized to conduct humanitarian missions or are engaged in full-scale conflict. To serve national security objectives, the Intelligence Community must act throughout the spectrum. Too often, however, the Intelligence Community has not maintained a balance between the diverse strategic and tactical demands it now faces and will face in the future. Specifically, in recent years, the Community has emphasized fleeting current intelligence issues, often at the expense of keeping a watchful eye on those areas that are likely to be tomorrow crises. The Committee believes that a balance must be reached and maintained. The value and necessity of intelligent are such now that intelligence plays much more than a support role. Whether a decision maker is planning policy or responding to a fast- breaking situation, intelligence is now regularly a part of the debate, often a prerequisite. Whether that response involves law enforcement, diplomacy or military forces, or even if the issue involves our nation's commercial or trade interests, intelligence data are the bedrock on which such a response is built. Moreover, in an era that is leading to the "digitization" of the armed forces, intelligence will be as much a part of operations as firing a weapon. Techology enhances intelligence capabilities as well as provides new intelligence challenges. As suggested previously, information technology has created new areas of opportunity in intelligence operations. It also greatly facilitates intelligence exploitation, analysis and dissemination. But, the fact that access to and understanding of various technologies are expanding on a world-wide basis, is creating an era in which the United States may not enjoy the exclusive technological edge that it once had. It also is clear that in- depth knowledge and usage of technology no longer applies exclusively to governments, but is present in organizations and individuals as well, some who would do harm to the U.S. or its interests. Consequently, although intelligence opportunities are enhanced, so too are the threats to our own technology- based infrastructures. Our ability to protect U.S. systems, detect attempts to affect those systems and respond to such threats, also rely on an active, strong intelligence capability. Likewise, our national security is affected by a broader set of issues, that, heretofore, have not been so readily identified with our global interests. These issues range from economics to environmental concerns, and to the mass migration of people. Developments in these areas greatly expand the universe of problems with which the Community must grapple-- problems than demand a world-wide view and a highly flexible set of resource. The types of threats that face our nation demand that the Intelligence Community be ever vigilant on both the strategic and tactical levels. Countering the proliferation of weapons of mass destruction, narcotics trafficking, terrorism, and the activities ofinternational organized crime, by definition, call for the types of intelligence collection, analysis and reporting that emphasize the need to produce the hardest information--intentions, for example--and that substantiates the need for a dynamic intelligence capability. In short, in the world we face today and tomorrow, the United States must have its "eyes and ears" more than ever before to protect its freedom--politically, economically and militarily. With these points in mind, the Committee review was guided by two key questions. First, what programs are properly structured and sufficiently prepared for future needs and requirements, such that we can feel confident about our preparedness? And, second, what are our unmet needs? Unfortunately, the Committee review suggested a paucity of areas where the Intelligence Community is well situated for the future and an overabundance of unmet needs. Clearly, there are specific areas within specific programs where the Intelligence Community is functioning well and is ready for the future. But, by and large, the Committee finds several large areas of concern. Principal among these are: The Community's very limited analytical capabilities to meet the myriad challenges ahead, especially to be more strategic and predictive in viewpoint; the uncertain commitment and capability to collect "human intelligence" on a world-wide basis, through espionage; the growing capabilities of other nations and groups to deny information, especially from our overhead sensors, by employing "denial and deception" techniques, and the Community's slow realization and limited ability to recognize and overcome these efforts; and the ever-growing demand for detailed, actionable intelligence to law enforcement to support prosecutions, while still protecting intelligence sources and methods. Therefore, the Committee encourages the Director of Central Intelligence to work rapidly toward alleviating these concerns during this period when the nation is less at risk, in the physical sense, than during the Cold War. This Committee is prepared to assist in this effort. To that end, the Committee examined the Community's most immediate unmet needs, and has begun a process to address them. The basis for many of the Committee's decisions was formulated not only from examining these needs, but also from a set of themes that are important to establishing the type of Community that is vital to our future national security. These themes are basically included within the first five Areas of Special Interest of this report, and will be used to help focus the Committee's activities in the future. Areas of Special Interest shortfalls in all-source analysis The Committee is concerned that the Intelligence Community (IC) lacks the analytic depth, breadth and expertise to monitor political, military, and economic developments worldwide while maintaining in-depth expertise on critical countries and issues. Problems associated with analytic shortfalls include: a largely inexperienced workforce; lack of foreign language skills and limited in-country familiarity among all-source analysts; and a predominant focus on current intelligence that is eroding the IC's ability to conduct comprehensive strategic analysis. The Committee believes that the IC must make a concerted effort to enhance both substantive and linguistic expertise among its analytic corps. Moreover, the IC must maintain a basic level of knowledge about trends and developments worldwide, while maintaining the capability to warn of impending crises and "surge" resources during such crises. In addition, the IC must find ways to augment its analytic capability during crises without diminishing the ability to monitor other areas of the world. The Committee is very concerned with the fact that over the past several years, the IC has shifted analytic production to focus on short-term, event-driven analysis. While such a shift provides strong analytic coverage of day-to-day events, it comes at the expense of basic research and analysis. Not only does basic research and analysis provide the foundation for short-term, event-driven analysis, it also is critical to producing in-depth, long-term/strategic analysis of issues that will pose challenges to U.S. national security in the future. The Committee believes that the ability to process and analyze all-source information is crucial to the quality and utility of all-source analytic products. Unfortunately, the IC's ability to do thorough, truly all-source analysis may be hampered by the difficulties associated with prioritizing, processing, and analyzing the vast amounts of open source data available to analysts. Another area of concern in this regard is the ability of the IC's all-source analysts truly to have access to all sources of information. Bureaucratic barriers have been erected that have prevented access by all-source analysts to information from other departments, from other agencies within the IC and, in some cases, from other offices within the same agency. The Committee will continue to monitor initiatives to improve the IC's ability to collect, process, and analyze open source information, and of the ability of IC all-source analysts to gain sufficient access to all sources of information. Given the fact that resources for the IC are unlikely to increase significantly in the future, the Committee believes that the IC must find other ways to address shortfalls in analytic depth and breadth. The IC must examine the importance of all-source analysis relative to the importance of collection and support activities. The Committee is particularly concerned about the imbalance between collection and "downstream" processing of intelligence. Expending resources to collect intelligence that is not being analyzed is simply a waste of money. In order to enhance analytic expertise, the IC must improve training and better target its recruitment efforts. In addition, the IC must identify ways to fill analytic gaps and surge analytic resources without creating gaps elsewhere in the process. For the past several years, the Committee has strongly urged the IC to develop a "civilian" reserve capability that would tap into the expertise of former IC employees, non-IC experts, and linguists. Certain elements within the IC already have taken steps to augment analytic capabilities; the IC as a whole must do the same. In the fiscal year 1998 intelligence authorization bill, the Committee again has provided funds for the establishment of a pilot civilian reserve program. The Committee will closely scrutinize progress made in this area. Several new initiatives already are underway that will help the IC to maintain a worldwide information "base" and to augment existing analytic efforts. The Committee supports efforts to create "knowledge databases," including the nascent World Basic Information Library (WBIL). Such efforts will help to ensure that the IC retains a baseline of knowledge on countries that often receive little attention until a crisis arises. The Committee also supports the Joint Reserve Intelligence Program (JRIP), a cost-effective program that utilizes the substantive and linguistic expertise of military reservists to augment the IC's analytic efforts. The Committee strongly believes that the IC must restore its capability to conduct long-term predictive analysis and warning. Core groups of analysts should be dedicated to doing research-oriented projects aimed at assessing strategic issues. In addition, the IC must educate its customers about the importance of long-term analysis. If the focus on near-term analysis is maintained at the expense of long-term analysis and research, the ability of policymakers and military commanders to deal effectively with future crises will be severely diminished. The main function of the IC is to provide its customers with predictive analysis and warning; if the IC loses the capability to do so, it will fail to meet its most basic mission. "downstream" intelligence activities For the past several years, the Committee has expressed concern about the imbalance between intelligence collection and related "downstream" intelligence activities. The Committee is disturbed by the fact that the IC continues to spend billions on high-tech collection platforms without allocating adequate resources to those who review the raw product, analyze it, and put it before policymakers and military commanders in a useable format. This is not to say that there should be no funding for new collection systems (see the Areas of Special Interest item on Technical Investments), and this year's authorization provides for such investments. But to do so without also planning investment for processing, exploitation, analysis and dissemination, serves to diminish the purpose and utility of the collection. The emphasis on collection at the expense of downstream activities permeates the IC at all levels and in most collection disciplines. The Defense Science Board, for one, has noted the fact that collection platforms have performed extremely well in Bosnia but that the "warfighter" has been overwhelmed by the amount of collected raw data, much of which remains unprocessed. In the Committee's analysis and production budget hearing, witnesses testified that the IC is "binning" (i.e., not exploiting) much of the broad-area search imagery that is collected. In addition, hard target analytic depth studies by the National Intelligence Council (NIC) conclude that the IC is "awash" in unexploited open source information. Finally, program managers consistently budget for satellite and launch requirements for new overhead collection systems, but largely ignore the need for funding sufficient ground processing capabilities. The Committee's fiscal year 1998 budget authorization emphasizes, among other things, the need to address processing, analysis and dissemination activities. For example, the Committee authorizes funds to create an open source requirements management system, enhance Measurement and Signatures Intelligence (MASINT) processing and exploitation, and advance the acquisition and fielding of analytic tools. These efforts, which are important first steps for addressing the collection-downstream imbalance, are only a small part of the solution. The Committee believes that the IC no longer needs, nor can it afford, to continue pouring vast amounts of money into expensive, high-tech collection platforms if the collected data is not exploited. Put simply, collecting information that is not processed and analyzed is simply a waste of taxpayer dollars. In the future, the Committee expects to see greater effort and resources placed on downstream activities and a more rational approach to collection activities. Requirements must be clearly and precisely articulated and collection decisions must be coordinated across the collection "stovepipes." The Committee urges the Director of Central Intelligence (DCI), in concern with IC managers, to address the collection-downstream imbalance in future budget submissions. Clandestine HUMINT Funding The Committee is concerned about the apparently ad hoc nature of annual funding for clandestine Human Intelligence (HUMINT). We believe that such funding should, instead, reflect a periodically adjusted and refined projection of the long-term needs of analysts and consumers for the product of clandestine HUMINT collection. To tie the funding of clandestine HUMINT to these long-term needs, the Committee recommends that the DCI establish an interagency task force to assess long-term collection needs and from that assessment, define the role of the clandestine service in the future and the funding profile necessary to build and sustain its capabilities. Present funding of clandestine HUMINT The Committee is aware of three attempts by analysts in recent years to quantify the importance of the types of intelligence collection: A survey of the January 1993 National Intelligence Daily (NID), the 1994 Strategic Intelligence Review (SIR) process, and the 1995 Comprehensive Capabilities Review (CCR). In all three studies, clandestine HUMINT made a surprisingly strong showing, considering the small part of the intelligence budget that it consumes. In the NID survey, CIA/DO reporting was the dominant source cited for covertly acquired intelligence. In the 1994 SIR process, HUMINT was, in aggregate, the most important source of intelligence for the 376 intelligence needs evaluated. In the CCR, clandestine HUMINT and SIGINT were found to be roughly of the same value in pursuing the various top-tier issues of Presidential Decision Directive 35. Uncounted in any of these studies, and adding enormously to the value of clandestine HUMINT, is its contribution to clandestine technical operations and in compromising foreign cryptographic materials. The importance of the clandestine service in the future has not been lost on those looking at the future of the IC as a whole. Studies undertaken in the last two years by the "Aspin- Brown" Commission, the Council on Foreign Relations, and this Committee have all emphasized that the intelligence targets of the future will be such that clandestine HUMINT will be even more important than it is today. The likely rapid spread of encryption technologies and the move towards declassifying imagery capabilities will only accelerate the reliance on clandestine human sources to crack the hardest targets. Yet, the cost of clandestine HUMINT remains a single digit percentage of the National Foreign Intelligence Program budget and has dropped in real dollar terms. As our actions in the authorization for the CIAP demonstrate, this Committee questions whether the annual funding requests for clandestine HUMINT collection are sufficiently grounded in the long-term needs of policymakers and in the operational requisites for satisfying those requirements. We have, for example, made recommendations for augmenting support for clandestine HUMINT collection that we understand will be necessary for collecting in the new environments of the post-Cold War. Underlying these recommendations, and others, is a concern that funding for the clandestine service enable it to begin to develop operational capabilities and techniques now that it will need to deploy in the future in order to meet the evolving needs of policymakers in changing technical and political environments. Budgeting for the future To achieve a less ad hoc and more forward-looking budget request for clandestine HUMINT collection, we recommend that the DCI appoint a task force to project the needs of policymakers for clandestine HUMINT collection over the next two decades and report its findings to, inter alia, this Committee. Because of the evolving needs of policymakers since the end of the Cold War, the advance of information technologies, and the explosion of open source information, this Committee believes that the all-source analyst is in the best position to predict what information gaps may exist in the future and which gaps cannot be filled except by clandestine HUMINT collection. Accordingly, we recommend the task force be chaired by the Chairman of the NIC with the Deputy Director of Intelligence of the CIA and the Deputy Director for Intelligence Production of the DIA as Vice- Chairs. With these findings in hand, the DDO, as the National HUMINT Collection Manager, should be in the best position to predict what capabilities, techniques, and operational profiles in the clandestine service will best fulfill the needs identified by the all-source analysts. On these bases, the DDO should prepare a long-term fiscal program and strategic plan-- perhaps building on the DO's internally prepared strategic plan of 1995--in consultation with the DS&T, the Defense HUMINT Service, and other operational partners in the Intelligence Community. This program and strategic plan, as validated by the DCI and shared with the CIA Comptroller and this Committee, should then become the program of record for clandestine HUMINT within the Intelligence Community and a major premise for the annual funding request for clandestine HUMINT collection. technical investments The impact of technology--including both commercial and government investments--on the IC has had a dramatic effect in almost all intelligence activities and operations, and the potential for future effects is even greater. The Committee has taken a position in previous authorization bills that technology, and more appropriately, the application of new technologies, are becoming key to the enhancement of all intelligence activities, whether in the form of analytic tool development or technical collection support to clandestine operations. Indeed, the Committee believes the world-wide proliferation of technologies presents new opportunities--and challenges--for intelligence collection operations. Moreover, with the Department of Defense's move toward a "digitized" force, the IC must become more adept at not only collecting, analyzing and reporting tactical information, but must do so within a time frame and in a digital form that is usable to the military. The use of advanced, and in many cases, commercial, technologies is the key to doing this. One of the more substantial areas that can benefit from modern technologies is overhead collection. Although heavily influenced by leading-edge technologies already, those who manage current and future overhead collection programs must deal with new, again, often commercial, technologies that are rapidly developed, made readily available and, in equally rapid fashion, are eclipsed and outdated by even more modern technologies. Those who remain comfortable with unjustifiably long development and procurement times will fail. It should also be noted that the current broad base of technological development expands the commercial availability of many of these evolving technologies. For example, technologies used in overhead imagery, once the sole purview of the Intelligence and Defense communities of the U.S. and only a handful of other nations, are now either verging on, or are already being employed by commercial entities worldwide. Moreover, there are several areas where such technologies are having a definite impact on overhead collection. Technology is allowing for the development of smaller and less costly satellites, which some believe will match, if not surpass, current capabilities. The effective use of these technologies will require increased innovation by the intelligence program managers to ensure that the nation maintains a technological edge over potential foes. At the same time, the availability, and indeed the proliferation of such technologies should allow for streamlined acquisition and significant cost savings. The worldwide development and availability of new technologies, combined with the continuous increase in knowledge and understanding of U.S. collection systems and their capabilities, also will affect how the IC collects information and on what "targets" remain viable. The Committee believes the Community must invest in new and sometimes unanticipated collection areas/techniques to remain viable. In this year's authorization, the Committee is continuing its support for more flexible systems that address the future challenges technology is forcing on the Community. These investments include promoting smaller systems and ensuring that larger systems are technologically and financially justifiable. This also includes investments in a variety of research and development programs, and the Committee hopes the Administration will bring forward its own new ideas in the future. The Committee acknowledges the successes of past overhead collection programs and hopes that the initial steps shown in new efforts such as the Future Imagery Architecture signal recognition of the need for new and innovative approaches to address the challenges of the future. a corporate and flexible community For the past several years, the Committee has emphasized the need for the IC to be more flexible and function as a "corporate" whole. In today's complex world, the IC must have the capability to address many issues simultaneously anywhere in the world. With fewer resources and a more diverse set of challenges, the IC must be able to work across programmatic and "stovepipe" boundaries and be flexible enough to ensure that resources can be shifted or augmented throughout the IC when necessary. The Committee is encouraged by progress toward improving coordination across IC agencies and across collection and analytic disciplines. The DCI's Hard Target working groups have proven that a coherent, multidisciplinary, coordinated approach to collection is an excellent way to identify and address collection gaps. The Committee strongly urges the DCI to consider applying such a "cross-INT" approach to the process of determining collection and production strategies for lower- tier countries. The Committee is less satisfied with the IC's progress in addressing "surge" issues. The Committee believes there are several problems associated with the current method of surging resources. First, when resources are shifted to cover a crisis, collection and analytic gaps may be created elsewhere. Second, it is exceedingly difficult for analysts and some collectors-- particularly HUMINT-- to became instant experts on an area in which they have little experience or background. The Committee believes that although the IC should maintain global coverage, agencies do not need in-house expertise on all topics. Intelligence agencies must, however, be able to determine where expertise resides within the IC and be able to tap that expertise, wherever it exists, when the need arises. In addition, as discussed elsewhere in this report, the IC must consider creating a civilian intelligence reserve capability to augment existing analytic and linguistic expertise. The Committee strongly encourages the IC to continue and expand efforts to work across traditional bureaucratic boundaries and to implement measures to enhance flexibility. The Committee believes that such efforts are absolutely essential if the IC is to succeed in dealing with increasingly complex and diverse threats to U.S. national interests. quadrennial defense review of intelligence The Committee is concerned on several accounts about the handling of intelligence in the 1997 Quadrennial Defense Review (QDR). The Chairman of the Joint Chiefs of Staff (CJCS) has promulgated a set of new operational concepts known as Joint Vision 2010. As the QDR report and the CJCS's congressional testimony stress, information superiority or "dominant battlefield awareness" is the underpinning for the CJCS's concepts. The QDR, however, made almost no changes in the Department's plans for intelligence, the notable exception being the reduction of the planned procurement of Joint Surveillance and Target Attack Radar System (JSTARS) aircraft. This recommendation prompted the National Defense Panel (NDP) to suggest that the Department's investment decisions were not fully in keeping with its emphasis on improving intelligence and surveillance support. The other intelligence issues that the QDR raised were deferred to the normal internal summer budget review process. The QDR was focused, to a large extent, on finding ways to enhance the Department's investment budget. It has been reported that DoD intends to increase the amount of procurement funding steadily over the future years defense play (FYDP), until the level reaches approximately $68 billion in 2003, an increase of over $25 billion over the fiscal year 1997 dollar levels. Yet, intelligence spending is to remain essentially flat. Again, this does not seem to be in synchronization with the Chairman's "dominant battlefield awareness" vision. The Secretary of Defense recently announced the creation of a special task force to find ways to reduce the costs of the Department's infrastructure and support systems, with an emphasis on defense agencies. Since defense agencies make up the overwhelming majority of the National Foreign Intelligence Program, if the task force generates substantial savings, much of these could come from the intelligence budget. Given the need to "rebuild" our intelligence resources to ensure that they can meet future needs, especially within Defense, the Committee believes that such a step could well be disastrous in terms of our military's abilities to engage in whatever situation there might be. The Committee will observe carefully the direction of this effort, with an eye toward examining the long-term effects on the Community and weighing them against the short term gains. Finally, the Committee is very much aware that the aggregate intelligence budget generally increased at a quicker pace than the overall national defense budget during the high- growth period of the 1980s, and that it declined more modestly than the overall defense budget in the years since. Intelligence has clearly received some preferential budgetary consideration, reflecting an appreciation that intelligence plays an increasingly important role in military effectiveness. Therefore, it seems, given the CJCS's focus on information dominance and the increased role of intelligence in military operations, that intelligence programs should continue to be specifically and staunchly supported as the Administration carries out its renewed and appropriate commitment to increase funding for modernization. Therefore, again, the Committee will closely watch these budgeting developments. intelligence system interoperability The President's fiscal year 1998 budget request included significant funding for Command, Control, Communications, Computer and Intelligence (C4I) support, system development and interoperability, and for establishing a virtual intelligence analysis environment. The systems included the following programs: 1. The Joint Intelligence Virtual Architecture (JIVA); 2. The Joint Deployable Intelligence Support System (JDISS); 3. The All Source Analysis System (ASAS); 4. The Joint Maritime Communications Information System (JMCIS); 5. The Combat Intelligence System (CIS); 6. The Intelligence Analysis System (IAS); 7. The JDISS--Special Operations Command Research, Analysis, and Threat Evaluation System (SOCRATES). The Committee supports the Department's efforts to provide an interoperable intelligence dissemination architecture and a "virtual" analytic environment with which analysts world-wide can collaborate. The Committee believes, however, that the various projects reflected in the President's request do not have the necessary direction and control to require the sharing of developments and to ensure that duplication of effort is minimized. This is easily determined by a thorough review of the various budget request documents. Further, the Committee believes that these systems, can be broken down into the basic components of (1) a high powered workstation with communications; (2) an operating environment that, by direction of the Assistant Secretary of Defense (C3I) must be Defense Intelligence Infrastructure (DII) Common Operating Environment (COE) compliant; and (3) a set of applications software. Although a common stated goal of the above systems is to provide support to analysts and operators, the program managers of these separate systems rarely, if ever, work together to achieve the common goals by sharing ideas and developments. The Committee is convinced there is a need to establish a management structure and focal point within the Department that would include representation from each of the service and agency system program offices. The mission of this organization would be to provide oversight, integration and development of collaborative applications for the associated C4I systems. The function of this organization would not be to dictate specific service/agency hardware solutions or unique software applications, but to provide for the development of common applications, act as a conduit for sharing analytical ideas and processes, and to ensure world-wide interoperability via standards. The Committee does not support the concept of centralizing funding for these efforts, since these systems are the responsibilities of the various services and agencies. The Committee would however, support the ability of such a coordinating organization to be an approval authority for expending service/agency funds. The Committee believes both the JDISS program office and, particularly, the Joint Reserve Intelligence Program have been at the forefront of C41 system collaboration, and would be good candidates to be chartered with this integration. Therefore the Committee is fencing 50 percent of all authorized and appropriated fiscal year 1998 funding for the above systems, until the Assistant Secretary of Defense (C3I) provides to the defense and intelligence authorizing committees a plan for creating a management structure and focal point within the Department with a charter encompassing the goals outlined above. FBIS Reorganization The Committee supports the further establishment and maintenance of a strong open source capability within the IC. A comprehensive open source collection, translation, and analytic effort is crucial to the IC's ability to maintain global coverage and to understand developments both in "lower" and "higher" tier countries. Not only do open sources provide insight into open societies, careful scrutiny of "closed society" media (e.g., Iran, North Korea) can also reveal valuable information on trends, new developments, and leadership plans and intentions. The Foreign Broadcast Information Service (FBIS) re- engineering strategy calls for using more modern and commercially available technologies as FBIS's operational linchpin and to transition from traditional large-scale, static collection and processing centers toward a more agile and less expensive architecture. The Committee applauds CIA's efforts to adapt FBIS's infrastructure and operating practices to incorporate new technologies and to meet intelligence requirements more efficiently. The Committee has several concerns, however, about the current FBIS re-engineering plan. First, the Committee is concerned that important resource allocation decisions are being made without fully taking into consideration "customer" requirements; there currently is no formal, direct open source requirements system that can be tapped to help translate requirements into rational resource allocation decisions. In addition, it is unclear to many FBIS customers what regions of the world will be affected by significant decreases in collection, translation an analytical activities. The Committee believes that open source customers must be kept fully informed of what changes in services they will see as a result of the re-engineering. The Committee also believes that open source collection should be driven by the direct input of major customers, particularly the all-source analysts who best understand where their information gaps lie. It should be noted that the Committee will closely scrutinize any fiscal year 1997 FBIS reprogramming request to determine whether the request fits into the overall reengineering strategy. The Committee requests that it be kept fully and currently informed of the plans and implementation of the re-engineering effort. In addition, the Committee requests that the DCI submit a report on the FBIS re-engineering plan to the intelligence oversight Committees by 1 September 1997. The report should include the following information: What is the timeline for implementing the re- engineering plan? What is the mechanism for reviewing the progress and effects of the re-engineering plan? For what countries/regions/issues will FBIS reduce its coverage (collection, translation, analysis)? What countries/regions/issues will FBIS no longer cover? How will the "new way" of doing business be managed (i.e., telecommuting employees, regional hubs, etc.)? What disruptions in service are anticipated? and How will FBIS work with "customers" to ensure their requirements are being met? [...] declassification The Committee has authorized additional resources in the fiscal year 1998 budget for CIA classification management, including declassification activities in support of Executive Order 12958. It should be noted, however, that the Committee is highly skeptical that the true costs of declassification have been determined accurately. It is possible that additional resources for declassification may be required to ensure that it is accomplished without compromise of intelligence sources and methods. In addition, the Committee is very concerned about the criteria and techniques used in the process of declassifying intelligence documents. Over the next year, the Committee will study carefully a range of declassification and collateral intelligence sharing activities across the NFIP to determine what resources are needed for these efforts and whether current declassification and intelligence sharing activities adequately protect sources and methods. Specifically, the Committee will examine the declassification programs of various intelligence agencies, including issues relating to personnel qualifications, contractor support and training in declassification methodologies. As part of this review, the Committee will examine the implementation of bulk declassification techniques--that may be used in lieu of page-by-page review-- and consider the applicability of both methods for declassifying documents with differing classification levels. In addition, the Committee will review specific declassification case histories to assess the performance of the "risk management" approach to declassification. Furthermore, the review will examine the process and progress of Community-wide efforts to declassify archival records. Any lessons learned from problems and successes related to current declassification activities should be used to redirect present day information handling and storage policies and make future declassification efforts less problematic. The Committee also will examine the Community's processes for sharing intelligence with military consumers and allied partners. The Committee also believes that in the area of intelligence information management, there is a need for improved security controls and audit capabilities. Likewise, the Committee will examine issues relating to risk management, personnel training and qualifications, accountability, and record keeping. Finally, the Committee will focus in detail on the GULFLINK case. The recent GULFLINK damage assessment report concluded that the declassification process associated with Gulf War intelligence documents resulted in serious damage to intelligence sources and methods. Those working on declassifying Gulf War intelligence documents were directed to declassify an enormous amount of documents in a relatively short amount of time. Furthermore, the Department of Defense directed those declassifying these documents to err on the side of declassification and post documents on the GULFLINK Internet site unless instructed otherwise on a case-by-case basis, by officials at the highest levels of the Department of Defense. Clearly, the reported damage done to intelligence sources and methods in the case of GULFLINK are directly due to these declassification criteria. The Committee will closely examine the declassification processes and requirements used in the GULFLINK project to ensure that such mistakes are not made in future declassification projects. [...] Section 403--Protection of CIA facilities Section 403 expands the law enforcement jurisdiction of the CIA special police 500 feet beyond the confines of Agency facilities, and also onto the Federal Highway Administration ("FHWA") property immediately adjacent to the CIA Headquarters Compound, subject to certain limits on the exercise of that law enforcement authority. This expanded authority is required to enable the CIA to respond effectively to an increasing threat of terrorist attack against Agency personnel and facilities. Under existing law, CIA special police officers lack authority to investigate suspicious activity near but outside the boundaries of CIA facilities. Currently, the CIA special police must call the local police to respond to a suspicious vehicle near a CIA facility. Local police response time varies, however. A delay could result in Agency personnel having little or no warning of the detonation of a bomb. This provision seeks to protect the CIA's rank and file employees from potential harm. With the authority provided under this section, the CIA special police could immediately investigate a threatening situation if presented with reasonable grounds to believe a threat to the CIA's employees or property existed. Such investigation would at least allow the CIA special police to decide if a sufficient threat existed to justify evacuation of CIA personnel. The CIA special police could also seek to question and identify an individual in the 500-foot zone or on the FHWA property they reasonably believed, based on specific and articulable facts, was surveilling an Agency facility as a precursor to a terrorist attack. Although the main rationale for the broader authority is to enable more effective response to terrorist threats, the authority would not be limited solely to countering such threats. The provision also would enable a special police officer to investigate (and, if allowable by law, detain) individuals or activities within the 500 foot zone, consistent with the law enforcement authorities of other federal police officers. The section does not change the special police officers' authority under current law to approach and, on a consensual basis, question and seek identification from individuals in the 500-foot zone or on the FHWA property. Section 403 does not, however, provide a statutory basis to patrol within the 500 foot zone. The Committee understands that CIA special police officers currently conduct such external perimeter patrols of the CIA Headquarters property pursuant to the authority granted the Director of Central Intelligence under Section 5 of the CIA Act of 1949. That statute does not authorize follow-up by the officers should the need arise. The Committee appreciates the need to continue such external perimeter patrols, but also understands the need to follow-up or investigate any potential criminal activity that likely threatens the CIA, its employees, or property. The Committee, however, in no way, envisions a general grant of police authority in the 500 foot zone of protection created by this legislation, but does intend that CIA special police officers can function as federal police within that 500 foot zone, with all attendant authorities, capabilities, immunities, and liabilities, when the need arises, for the limited purpose of protecting CIA employees and property. Any detentions or arrests executed by the special police shall only be for a limited duration (i.e., only long enough to turn the suspects over to the appropriate state, local, or federal law enforcement authorities). There would be several limits on the new authority. First, it is restricted to the open areas within 500 feet of a CIA facility, and to the FHWA property immediately adjacent to the CIA Headquarters Compound. Second, the authority can be exercised only where the CIA special police officer identifies specific and articulable facts giving the officer reason to believe that the exercise of such functions is necessary to protect the security of CIA installations, property, or employees. Thus, special police officers would not be authorized to issue traffic tickets in the 500-foot zone, or on the FHWA property. Also, once the special police officer does begin to investigate suspected criminal activity, the special police officer's actions must conform with the well-established legal standards in Terry v. Ohio, 392 U.S. 1 (1967), and its progeny, as to investigative stops of private citizens. Third, the new authority would not preclude or limit in any way the authority of any federal, state, or local law enforcement agency or of any other federal police orfederal protective service. The CIA will seek agreements with such other agencies and/or services as to the exercise of the new authority, including the statutory violations the CIA special police would plan to act on in the 500-foot zone or on the FHWA property. With regard to the FHWA property, the Agency's intent is to execute a formal agreement with the FHWA that addressed not only the statutory violations issue but also the broader range of operational, administrative, and transactional matters that would be presented by the new authority and interagency relationship. Finally, the Agency rules and regulations, including those enforced by criminal penalties, that apply within the CIA facilities are not extended into the 500-foot zone or to the FHWA property. This means, for example, as with current law, that individuals in the 500-foot zone outside CIA facilities would not be barred from having cameras or taking pictures of CIA facilities. [...] security personnel at agency installations Sec. 15. (a)(1) The Director may authorize Agency personnel within the United States to perform the same functions as special policemen of the General Services Administration perform under the first section of the Act entitled "An Act to authorize the Federal Works Administrator or officials of the Federal Works Agency duly authorized by him to appoint special policemen for duty upon Federal property under the jurisdiction of the Federal Works Agency, and for other purposes" (40 U.S.C. 318), with the powers set forth in that section, except that such personnel shall perform such functions and exercise such [powers only within Agency installations, and the rules and regulations enforced by such personnel shall be rules and regulations promulgated by the Director.] powers-- (A) within the Agency Headquarters Compound and the property controlled and occupied by the Federal Highway Administration located immediately adjacent to such Compound and in the streets, sidewalks, and the open areas within the zone beginning at the outside boundary of such Compound and property and extending outward 500 feet; and (B) within any other Agency installation and in the streets, sidewalks, and open areas within the zone beginning at the outside boundary of any such installation and extending outward 500 feet. (2) The performance of functions and exercise of powers under paragraph (1) shall be limited to those circumstances where such personnel can identify specific and articulable facts giving such personnel reason to believe that their performance of such functions and exercise of such powers is reasonable to protect against physical attack or threats of attack upon the Agency installations, property, or employees. (3) Nothing in this subsection shall be construed to preclude, or limit in any way, the authority of any Federal, State, or local law enforcement agency or of any other Federal police or Federal protective service. (4) The rules and regulations enforced by such personnel shall be the rules and regulations promulgated by the Director and shall only be applicable to the areas referred to in paragraph (1). (5) On December 1, 1998, and annually thereafter, the Director shall submit a report to the Permanent Select Committee on Intelligence of the House of Representatives and the Select Committee on Intelligence of the Senate that describes in detail the exercise of the authority granted by this subsection, and the underlying facts supporting the exercise of such authority, during the preceding fiscal year. The Director shall make such report available to the Inspector General of the Agency. [...]