The Intelligence Community draws much of its authority and guidance from the body of law contained in this collection.
INTRODUCTION .................................................................................................................. iii
TABLE OF CONTENTS........................................................................................................ vii
THE CONSTITUTION OF THE UNITED STATES OF AMERICA ................................................. 1
PRINCIPLES OF PROFESSIONAL ETHICS FOR THE IC........................................................... 22
PRINCIPLES OF INTELLIGENCE TRANSPARENCY FOR THE IC............................................. 24
NATIONAL SECURITY ACT OF 1947 .................................................................................. 26
INTELLIGENCE REFORM AND TERRORISM PREVENTION ACT OF 2004 (INFORMATION SHARING, PRIVACY AND CIVIL LIBERTIES, AND SECURITY CLEARANCES)..................................................................................................................193
CENTRAL INTELLIGENCE AGENCY ACT OF 1949 .............................................................234
NATIONAL SECURITY AGENCY ACT OF 1959...................................................................275
DEPARTMENT OF DEFENSE TITLE 10 AUTHORITIES .........................................................287
NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY TITLE 10 AUTHORITIES.......................301
HOMELAND SECURITY ACT OF 2002 ...............................................................................311
TITLE 10, CHAPTER 83, UNITED STATES CODE, CIVILIAN DEFENSE INTELLIGENCE EMPLOYEES.................................................................................................................386
COUNTERINTELLIGENCE AND SECURITY ENHANCEMENTS ACT OF 1994 .........................397
COUNTERINTELLIGENCE ENHANCEMENT ACT OF 2002 ...................................................401
CLASSIFIED INFORMATION PROCEDURES ACT.................................................................407
FOREIGN INTELLIGENCE SURVEILLANCE ACT OF 1978....................................................416
PROCEDURES FOR THE RETENTION OF INCIDENTALLY ACQUIRED COMMUNICATIONS ..........................................................................................................533
NATIONAL SECURITY LETTER STATUTES......................................................................536
DETAINEE TREATMENT ACT OF 2005 ...........................................................................554
LIMITATION ON INTERROGATION TECHNIQUES............................................................561
TITLE 10, CHAPTER 47A, UNITED STATES CODE, MILITARY COMMISSIONS ...................564
FREEDOM OF INFORMATION ACT.....................................................................................612
PRIVACY ACT ..................................................................................................................631
E-GOVERNMENT ACT OF 2002 (PRIVACY IMPACT ASSESSMENTS) ...............................651
JUDICIAL REDRESS ACT OF 2015 .....................................................................................653
FEDERAL INFORMATION SECURITY MODERNIZATION ACT OF 2014 ................................657
WAR CRIMES ACT OF 1996..............................................................................................681
INTERCEPTION OF WIRE, ELECTRONIC, AND ORAL COMMUNICATIONS (18 U.S.C. § 2511)...........................................................................................................685
FEDERAL AGENCY DATA MINING REPORTING ACT OF 2007...........................................691
PUBLIC INTEREST DECLASSIFICATION ACT OF 2000........................................................694
CYBERSECURITY ACT OF 2015 ........................................................................................706
COMMITTEE ON FOREIGN INVESTMENT IN THE UNITED STATES (CFIUS).....................774
EXECUTIVE ORDER 11858: FOREIGN INVESTMENT IN THE UNITED STATES .................791
EXECUTIVE ORDER 12139: EXERCISE OF AUTHORITY FOR ELECTRONIC SURVEILLANCE................................................................................................................796
EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES ...........................798
EXECUTIVE ORDER 12949: FOREIGN INTELLIGENCE PHYSICAL SEARCHES .....................825
EXECUTIVE ORDER 12968: ACCESS TO CLASSIFIED INFORMATION .................................827
EXECUTIVE ORDER 13388: STRENGTHENING THE SHARING OF TERRORISM INFORMATION .................................................................................................................842
EXECUTIVE ORDER 13462: PRESIDENT'S INTELLIGENCE ADVISORY BOARD AND INTELLIGENCE OVERSIGHT BOARD .................................................................................846
EXECUTIVE ORDER 13467: SUITABILITY FOR GOVERNMENT EMPLOYMENT AND ELIGIBILITY FOR ACCESS TO CLASSIFIED NATIONAL SECURITY INFORMATION...............852
EXECUTIVE ORDER 13491: ENSURING LAWFUL INTERROGATION ...................................860
EXECUTIVE ORDER 13526: CLASSIFIED NATIONAL SECURITY INFORMATION.................865
EXECUTIVE ORDER 13587: SECURITY OF CLASSIFIED NETWORKS AND CLASSIFIED INFORMATION SHARING................................................................................................900
EXECUTIVE ORDER 13636: IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY..............................................................................................................907
PRESIDENTIAL POLICY DIRECTIVE 19: PROTECTING WHISTLEBLOWERS WITH ACCESS TO CLASSIFIED INFORMATION ........................................................................916
PRESIDENTIAL POLICY DIRECTIVE 21: CRITICAL INFRASTRUCTURE SECURITY AND RESILIENCE..........................................................................................................923
PRESIDENTIAL POLICY DIRECTIVE 28: SIGNALS INTELLIGENCE ACTIVITIES ...................939
PRESIDENTIAL MEMORANDUM: NATIONAL INSIDER THREAT POLICY AND MINIMUM STANDARDS FOR EXECUTIVE BRANCH INSIDER THREAT PROGRAMS..........................950
INTELLIGENCE SHARING PROCEDURES FOR FOREIGN INTELLIGENCE AND FOREIGN COUNTERINTELLIGENCE INVESTIGATIONS CONDUCTED BY THE FBI...............................964
GUIDELINES FOR DISCLOSURE OF GRAND JURY AND ELECTRONIC, WIRE, AND ORAL INTERCEPTION INFORMATION IDENTIFYING UNITED STATES PERSONS.........................970
GUIDELINES REGARDING DISCLOSURE TO THE DIRECTOR OF CENTRAL INTELLIGENCE AND HOMELAND SECURITY OFFICIALS OF FOREIGN INTELLIGENCE ACQUIRED IN THE COURSE OF A CRIMINAL INVESTIGATION ............................................974
GUIDELINES REGARDING PROMPT HANDLING OF REPORTS OF POSSIBLE CRIMINAL ACTIVITY INVOLVING FOREIGN INTELLIGENCE SOURCES ...............................................983
GUIDELINES TO ENSURE THAT THE INFORMATION PRIVACY AND OTHER LEGAL RIGHTS OF AMERICANS ARE PROTECTED IN THE DEVELOPMENT AND USE OF THE INFORMATION SHARING ENVIRONMENT..........................................................................986
CRITERIA ON THRESHOLDS FOR REPORTING INTELLIGENCE OVERSIGHT MATTERS ........995
MEMORANDUM OF UNDERSTANDING: REPORTING OF INFORMATION CONCERNING FEDERAL CRIMES ............................................................................................................999
INTELLIGENCE COMMUNITY AND GOVERNMENT WEBSITES..........................................1012
This reference book would be a valuable resource for intelligence professionals and other members of the federal government.
Product Details
- Intelligence Activities
- Law and Legislation
- Public Law
- Intelligence Services
- Legal Research
- Counterinteligence
- Electronic Surveillance