Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
9 11 Commission Report — Part 3
Page 34
34 / 81
Field Office intelligence Operations
in order to. ensure that FBl-wide collection plans and directives (requirements, collection
tasking, analysis, and dissemination) are incorporated into field offices, on September 12,
2003, we directed all field offices to establish a Field intelligence Group (F/G), We followed
up that directive with the issuance of formal guidelines for irnplernentation and. operation
of FiGs on October 18, 2003. All field offices have established and aré now operating
FIGs
The FIG is the centralized intelligence component in each field office, responsible for the
management, execution, and coordination of intelligence functions. FIGs vary in size. and
structure according. to the size of the diviston and other factors. An Assistant Special
Agent in Charge (ASAC) in each field office is assigned responsibility for intelligence-
related functions and has oversight of the FiG. The three field offices headed by an
Assistant Director in Charge (the New York, Los Angeles, arid Washington Field Offices)
must nave both an SAC and an ASAC so designated
FIG personnel analyze and disseminate the intelligence collected in their field office. They
conduct intelligence assessments and generate intelligence products in accordance with
the FBI's Intelligence Assessment Process CONOP and other intelligence production
guidelines. They also support the 24-hour intelligence cycle of the FBI by employing all
appropriate resources ta drive the collection and dissemination of threat information,
investigative developments (urgent reports), and other significant intelligence to meet the
information needs of all consumers
Requirements Process
FBI agents have always been excellent collectors of information, but this ability to gather
information was never fully integrated into an FBl-wide process for identifying and collecting
needed intelligence. The Counterintelligence Division has long operated according to a
centralized requirernents-driven process for the collection and analysis of intelligence,
and that capacity has been critical to tts successes over the years against Soviet spying,
Vth
=
ay
ik
Bape
sa
economic espionage, and other efforts to steal our national secrets and penetrate our ‘s
institutions. However, because counterintelligence traditionally was conducted without oe
significant overlap with other Bureau programs, that intelligence capacity largely remained Ze
limited to. the Counterintelligence Program.
Since September 11, 2001, we have expanded this requirements process by establishing
a formal FBI-wide process for promuigating intelligence requirements and issuing appropriate
collection taskings to operational divisions both at Headquarters and in the field. These
requirements derive from the National Intelligence Priorities Framework as approved by
the National Security and Homeland Security Councils. The new requirements process
ensures that a continuing cycle for determining where we have intelligence gaps and
targeting our information collection activities to fill those gaps. This cycle takes place at
both the fieid and Headquarters levels and has four steps’
Step 1 — Finding out what we know and don’t know
First, we survey all available intelligence across the organization, including
intelligence from outside partners, to determine where we have intelligence gaps.
These gaps, also known as intelligence requirements, are unanswered questions
that we need to answer if wé are to have a complete picture of threats in priority
areas. The Ol consolidates these gaps and communicates them to supervisors
and analysts throughout the Bureau. Analysts in Headquarters operational divisions
and in each FIG, tap info all available sources to try to resolve the gaps.
28
MISC DOC. #5_ 000000367
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
investigation
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic