A National Counter Intelligence ( Ci ) Strategy

1304 Words6 Pages
Three of the potential roadblocks associated with the implementation of a National Counter Intelligence (CI) strategy that I believe are the most important rest within resources, information and risk, outlined in Michelle Van Cleave’s article “Strategic Counterintelligence What Is It and What Should We Do about It?” The idea of a national level effort is not a new idea. The National Security Act of 1947 provided basis of our intelligence and CI functions. DoD naturally took the mission of CI activity which fit within the DoD scope. Up and until the 1980s a series of failures within the CI world, such as the failed hostage rescue in 1980 helped to place emphasis on the lack of coordination between DoD services. A new definition of CI was…show more content…
The FBI along with other government agencies created a separate counterterrorism group called the National Counterterrorism Center (NCTC). December 28, 2000 saw the creation of the National Counterintelligence Executive (NCIX) appointment by the President Bill Clinton in response to CIA mole Aldrich Ames. Initially the NCIX was to set policy for counterintelligence in areas of counterespionage, information security and critical infrastructure protection. It was in this position that Michelle Van Cleave as the National CI Executive outlined the need for a national level system. A system that could coordinate and strategically apply a CI mission against a foreign threat in a unified cohesive manner. The road blocks that Michelle Van Cleave outlined, show a common issue within the U.S. government and also a picture of the CI effort in its essence of trying to overcome an ever existing problem with expounded complexities. Michelle Van Cleave wants to take CI to a clearer objective in the offensive realm of CI. To take the efforts to the foreign state rather than waiting to react to the foreign state acting in the U.S. Within Michelle Van Cleave’s writing there is a strong sense given that we have a sharp tool to use, but we have not taken full advantage of its capabilities. The use of CI provides a power to take advantage of the opponent’s
Open Document