background preloader


The Federal Bureau of Investigation (FBI) is a governmental agency belonging to the United States Department of Justice that serves as both a federal criminal investigative body and an internal intelligence agency (counterintelligence). Also, it is the government agency responsible for investigating crimes on Native American reservations in the United States[2] under the Major Crimes Act. The FBI has investigative jurisdiction over violations of more than 200 categories of federal crime.[3] The bureau was established in 1908 as the Bureau of Investigation (BOI). Its name was changed to the Federal Bureau of Investigation (FBI) in 1935. Budget, mission and priorities In the fiscal year 2012, the bureau's total budget was approximately $8.12 billion.[4] Currently, the FBI's top investigative priorities are:[5] In August 2007, the top categories of lead criminal charges resulting from FBI investigations were:[6] Indian reservations Legal authority History Background Creation J. National security Related:  United States of America US

DOJ United States Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is the U.S. federal executive department responsible for the enforcement of the law and administration of justice, equivalent to the justice or interior ministries of other countries. The Department is led by the Attorney General, who is nominated by the President and confirmed by the Senate and is a member of the Cabinet. The current Attorney General is Eric Holder. History[edit] The Attorney General was initially a one-person, part-time job. A second bill was introduced to Congress by Rhode Island Representative Thomas Jenckes on February 25, 1870, and both the Senate and House passed the bill. With the passage of the Interstate Commerce Act in 1887, the federal government began to take on some law enforcement responsibilities, with the Department of Justice tasked to carry out these duties.[6] In 1884, control of federal prisons was transferred to the new department, from the Department of Interior.

CIA The entrance of the CIA New Headquarters Building (NHB) of the George Bush Center for Intelligence. The Central Intelligence Agency (CIA) is one of the principal intelligence-gathering agencies of the United States federal government. The CIA's headquarters is in Langley, Virginia, a few miles west of Washington, D.C.[7] Its employees operate from U.S. embassies and many other locations around the world.[8][9] The only independent U.S. intelligence agency, it reports to the Director of National Intelligence.[10] Several CIA activities have attracted criticism. Purpose The CIA succeeded the Office of Strategic Services (OSS), formed during World War II to coordinate secret espionage activities against the Axis Powers for the branches of the United States Armed Forces. According to its fiscal 2013 budget, the CIA has five priorities:[4] Organizational structure The CIA has an executive office and several agency-wide functions, and four major directorates: Executive Office Executive staff Budget

United States Cyber Command United States Cyber Command (USCYBERCOM) is an armed forces sub-unified command subordinate to United States Strategic Command. The command is located in Fort Meade, Maryland and centralizes command of cyberspace operations, organizes existing cyber resources and synchronizes defense of U.S. military networks. Mission statement[edit] "USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries The text "9ec4c12949a4f31474f299058ce2b22a", which is located in the command's emblem, is the MD5 hash of their mission statement.[2] Organization[edit] USCYBERCOM is an armed forces sub-unified command subordinate to United States Strategic Command. Service components[edit]

Information Awareness Office The Information Awareness Office (IAO) was established by the Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to U.S. national security, by achieving "Total Information Awareness" (TIA).[4][5][6] This was achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant.[7] This information was then analyzed to look for suspicious activities, connections between individuals, and "threats".[8] Additionally, the program included funding for biometric surveillance technologies that could identify and track individuals using surveillance cameras, and other methods.[8] History[edit]

Central Security Service The Central Security Service (CSS) is an agency of the United States Department of Defense, which was established in 1972 to integrate the National Security Agency (NSA) and the Service Cryptologic Elements (SCE) of the United States Armed Forces in the field of signals intelligence, cryptology and information assurance at the tactical level.[1] In 2002, the CSS had about 25,000 uniformed members.[2] History[edit] After World War II had ended, the United States had two military organizations for the collection signals intelligence (SIGINT): the Army Security Agency (ASA) and the Naval Communications Intelligence Organization (OP-20-G). The latter was deactivated and reorganized into the much smaller Communications Support Activities (CSA) in 1946, leaving ASA as the main US SIGINT agency. Tactical military intelligence was traditionally collected by specialized soldiers, sailors, airmen, marines and coast guardsmen deployed around the world. Structure[edit] Tasks[edit] Emblem[edit]

Air Force Seeks Fake Online Social Media Identities The military has issued a request for bids on software to let it spread messages and make online friends using non-existent identities on social media sites. The United States Air Force is taking an unusual approach to cyber-security with a request for bids for "Persona Management Software," which would let someone command an online unit of non-existent identities on social media sites. The move became a major topic last week following the release of emails from private security firm HBGary, which were disclosed after an attack by Wikileaks competitor and collaborator According to Solicitation Number: RTB220610 , the armed services division sought a software program that could manage 10 personas per user, including background; history; supporting details, and cyber presences that are " technically, culturally and geographacilly [sic] consistent. At least one individual was surprised that the proposal was published openly. "This is posted on open source. More Insights

U.S. Central Command 'friending' the enemy in psychological war The U.S. Central Command is stepping up psychological warfare operations using software that allows it to target social media websites used by terrorists. The Tampa, Fla.-based military command that runs the wars in Iraq and Afghanistan recently bought a special computer program that troops use to create multiple fake identities on the Internet. The program is aimed at helping troops create and maintain realistic online personalities that will persuade extremists to allow them into chat rooms and bulletin boards by creating the appearance that they are logging on and posting messages or other contributions from anywhere in the world. Information operations generally are carried out by U.S. special-operations forces. The software is used for what the military calls “information operations” that use “classified social media activities outside the United States to counter violent extremist ideology and enemy propaganda,” Centcom spokesman Cmdr. Defense Secretary Robert M. Under Mr.

There is an NSA/CIA Hybrid Agency That May Explain Snowden’s Involvement in SIGINT and HUMINT (L) State Department Communications Annex (R) NSA/CIA Special Collection Service (SCS) – Beltsville, MD The media is quoting a number of intelligence “insiders” who are questioning NSA whistleblower Edward Snowden’s involvement in National Security Agency (NSA) signals intelligence and meta-data mining programs like PRISM and CIA human intelligence (HUMINT) operations. However, the U.S. intelligence “insiders” may be trying their best to cover up the operations of a little-known hybrid NSA-CIA organizations known as the Special Collection Service (SCS), known internally at NSA as “F6,” and which is headquartered in Beltsville, Maryland in what appears to be a normal office building with a sign bearing the letters “CSSG” at its front driveway off of Springfield Road. CSSG is listed in area phone directories as Communications Systems Support Group, 11600 Springfield Road, Laurel, Maryland, 20708-3528, with a phone number of (301) 210-1776. WayneMadsenReport (Subscription Only) Like this: