Clinton creates counterintelligence czar

President Clinton last week issued a directive overhauling federal efforts to fight against terrorism and creating a new counterintelligence "czar."

The directive is the result of efforts by senior officials at the CIA, the FBI, the Defense Department and the National Security Council to expand their recent efforts to work together on counterespionage efforts.

The President's directive institutionalizes a set of reforms called "Counter-Intelligence 21," which are designed to facilitate a level of cooperation never seen before among the FBI, the CIA and the Pentagon, and will, for the first time, engage the rest of the government and the private sector as well.

In the process, "CI-21", as it's known to insiders, may also force lawmakers and the American public to rethink long-accepted notions about what constitutes national security and the once-clear boundaries between domestic law enforcement, foreign intelligence gathering and defense preparedness.

"Everyone who works this problem has quickly realized that the old paradigm of the threats to U.S. national security-hostile nations and their intelligence services-is far too narrow a definition in the post-Cold War era. There are countless potential bad guys capable of doing us significant harm," says John MacGaffin, a former CIA operative and FBI consultant who spearheaded the "CI-21" effort. "Because the policy community has not defined or prioritized the 'crown jewels' of American prosperity and national security, we in the intelligence community cannot tell if those assets are being threatened or adequately protected."

Clinton's order creates a National Counterintelligence Executive with independent resources and a staff to act as the leader of antiterrorist activities and serve as a conduit between policy-makers, lawmakers and private industry on the one hand, and the intelligence, law enforcement and defense communities on the other.

This czar will be appointed by, and answer to, a National Counterintelligence Board of Directors consisting of the FBI director, the deputy director of the CIA, the deputy secretary of Defense and a senior official from the Justice Department. He or she will coordinate closely with a senior deputies committee, under the National Security Council, with members drawn from across relevant agencies.

The key responsibility of the czar will be to develop a national counterintelligence strategy identifying and prioritizing the keys to American prosperity and security. Informed by such a strategic analysis, the czar will then coordinate the efforts of the intelligence, defense and law enforcement communities.

The new reforms advance an evolution that began in the mid-1990s when the CIA and FBI were forced by circumstances to begin abandoning their long rivalry and history of animosity.

"CI-21 is a manifestation of a process that began five or six years ago, when we all began to realize that the threats to U.S. security were changing in a way that our traditional organizations and structures couldn't match," says MacGaffin. "Globalization and technology were lowering traditional boundaries between what constitutes an international or domestic threat, and terrorists, drug cartels, spies and hackers were all leaping those boundaries with impunity."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.