CIA Uses Its First Public Conference to Stress Value of Human Sources

"The CIA is a learning organization," John Brennan said. "We learn from our past, adopt to the times and refine our methods." "The CIA is a learning organization," John Brennan said. "We learn from our past, adopt to the times and refine our methods." Pablo Martinez Monsivais/AP

The nation’s oldest spy agency remains relevant in the digital age, CIA Director John Brennan told an academic conference on Wednesday, saying his team “still provides intelligence and analysis that social media and foreign partners cannot because nothing can replace the insight that comes from a well-connected human source.”

Brennan spoke at the first-ever CIA-sponsored conference on intelligence issues, an all-day symposium held at Georgetown University under the theme “The Ethos and Profession of Intelligence.” As it happens, the event unfolded the day after a news report that the agency had disciplined 15 employees for workplace harassment.

“The CIA does not hold a lot of public conferences, but our foreign counterparts hold fewer,” Brennan said, meaning they hold zero. “But we must have the trust and confidence of the American people to do our jobs, so we must articulate our motives, values and objectives,” he said in his welcome and later keynote address. “I know our agency will benefit from the discussions and listen to experts. The CIA is a learning organization. We learn from our past, adopt to the times and refine our methods.”

Themes of the discussions dealt with balancing secrecy and transparency, private sector input to intelligence and new threats presented by technology. “Too often the intelligence community is treated as a monolith,” Brennan said, “but the men and women in our service have many dimensions. We really accept that the bar is set higher for us, and there is tension between secrecy and the openness of the society we serve.”

The constant churning of new technology and the enhanced scrutiny from privacy advocates has put “the CIA today at a crossroads,” said the director, a career intelligence officer who previously served as President Obama’s chief counter-terrorism adviser. “This has a prompted a reexamination of the intelligence community at a time when the nation faces threats that, in my view, have few precedents in history.”

Reeling off “a bewildering variety of threats that come all at once,” Brennan cited the dangers from weapons of mass destruction; human trafficking; drug cartels; sectarian fighting; access to food and water; the Nigerian Islamic extremist group Boko Haram; and “cyberattacks from rival nations, criminal groups and hactivists.”

CIA analysts, Brennan added, must “look over the horizon and get all this in advance and present it to policymakers with enough precision that they can act,” he said. “We don’t always get it right. We have made mistakes and try to learn from them. But increasingly governments around the world recognize that, no matter how powerful, no nation can counter the plethora of threats on their own. Good intelligence is the cornerstone of every policy today,” Brennan said, “and without it, the country would make our way in the global arena totally blind.”

That is why today’s CIA -- even as it struggles for a legal framework to establish its appropriate role in an open society -- “has never been more important to the security of the Republic,” Brennan said, invoking the amorality of today’s terrorists who operate using the same boundary-less communications technologies as everyone else. “There are natural limits on how open an intelligence service can be,” he asserted. “Sources, methods, people, all require stewardship, and we must honor that. The CIA is committed to conducting a war, but it must rest on the principles on which this great nation was founded.”

The day before Brennan spoke at Georgetown, the Associated Press released a story reporting that the agency, despite a zero tolerance policy against workplace harassment, last year disciplined 15 employees “for committing sexual, racial or other types of harassment.” That included a supervisor who was removed from the job after engaging in "bullying, hostile behavior," according to an internal message to employees obtained by AP, and “an operative who was sent home from an overseas post for inappropriately touching female colleagues.”

AP said the announcement “shed light on the spy agency's struggles to move past its free-wheeling workplace culture, especially in the National Clandestine Service, the spying arm, which attracts men and women who are willing to lie, cheat and steal for their country.”

At the Georgetown event, Brennan declared himself “excited” about the CIA’s first conference, noting that it had followed the CIA’s first tweet the previous week. “Who knows?” he said. “One of these days we will get our first positive press story. Then we will get really excited.”

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.