By Sgt. Tim,

Senior Editor Outlaw Patriot News, Hagmann Report Contributor

For most Americans, the intelligence community is this shadowy web of agencies entwined together with seemingly no distinguishing factors between all of the various acronyms and names. Even with revelations coming from dubious sources that seem to explain the inter-workings of these agencies and the people within them, it can be difficult to untangle the twisted mass into anything that makes sense. Even more complicated can be where the missions and responsibilities between the various agencies overlap and lines are blurred. It is my hope in writing this article, as someone with over 20 years of experience within this community to untangle the web just a little and show why assertions by some within the CIA that Russia “hacked” the US election should be disregarded as a non-story and hopefully the reader will understand that this agenda being pushed by the MSM and establishment politicians is the real “fake news”.

First, let’s define intelligence. At its most basic level, intelligence is simply information. Regardless of the means of collection of the information or agency, it is simply information. It can be information that is freely available via the internet or news media, through conversation with experts or individuals connected to people that have the sought information, through interview of those that come forward with information, or information collected through any number of covert means. The difference between intelligence information and raw information is that once that information is taken, analyzed for bits and pieces that are of value, and collected together into a form that delivers those most valuable pieces to national policy and decision makers, it becomes intelligence. This intelligence information is then classified at the level that represents the harm that could potentially result in that information becoming openly available, to include the means of collection of this information and the source of this information. Often times, it is not the information itself that garners such a high classification, but the means and source, and the need to protect those means and sources.

Intelligence work is divided into several different disciplines, which correlate to the overall means and source of the intelligence collected. The six major types of intelligence are: SIGINT (Signals Intelligence), IMINT (Imagery Intelligence), MASINT (Measurement and Signature Intelligence), HUMINT (Human-Source Intelligence), OSINT (Open Source Intelligence), and GEOINT (Geo-Spatial Intelligence). These are defined as follows from the Office of the Director of National Intelligence (ODNI) website here:

SIGINT: Signals intelligence is derived from signal intercepts comprising — however transmitted — either individually or in combination: all communications intelligence (COMINT), electronic intelligence (ELINT) and foreign instrumentation signals intelligence (FISINT).

The National Security Agency is responsible for collecting, processing, and reporting SIGINT. The National SIGINT Committee within NSA advises the Director, NSA, and the DNI on SIGINT policy issues and manages the SIGINT requirements system.

IMINT: Imagery Intelligence includes representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media. Imagery can be derived from visual photography, radar sensors, and electro-optics.

NGA is the manager for all imagery intelligence activities, both classified and unclassified, within the government, including requirements, collection, processing, exploitation, dissemination, archiving, and retrieval.

MASINT: Measurement and Signature Intelligence is technically derived intelligence data other than imagery and SIGINT. The data results in intelligence that locates, identifies, or describes distinctive characteristics of targets. It employs a broad group of disciplines including nuclear, optical, radio frequency, acoustics, seismic, and materials sciences.

Examples of this might be the distinctive radar signatures of specific aircraft systems or the chemical composition of air and water samples. The Directorate for MASINT and Technical Collection (DT), a component of the Defense Intelligence Agency, is the focus for all national and Department of Defense MASINT matters.

HUMINT: Human intelligence is derived from human sources. To the public, HUMINT remains synonymous with espionage and clandestine activities; however, most of HUMINT collection is performed by overt collectors such as strategic debriefers and military attaches. It is the oldest method for collecting information, and until the technical revolution of the mid to late twentieth century, it was the primary source of intelligence.

OSINT: Open-Source Intelligence is publicly available information appearing in print or electronic form including radio, television, newspapers, journals, the Internet, commercial databases, and videos, graphics, and drawings. While open-source collection responsibilities are broadly distributed through the IC, the major collectors are the DNI’s Open Source Center (OSC) and the National Air and Space Intelligence Center (NASIC).

GEOINT: Geospatial Intelligence is the analysis and visual representation of security related activities on the earth. It is produced through an integration of imagery, imagery intelligence, and geospatial information.

Note that in many of these definitions of types of intelligence it also designates which agencies of the intelligence community are responsible for which types of intelligence. However, the Central Intelligence Agency is not listed within this. Part of this is because of the old system of hierarchy that was established under the National Security Act of 1947, which created the current defense structure under the four armed services, and also the intelligence community structure in which the Central Intelligence Agency, under the Director of Central Intelligence, was the primary lead for intelligence activities. Under the old system, the CIA was the primary for distribution of responsibilities and dissemination of information. However, the Intelligence Reform and Terrorism Prevention Act of 2004 restructured the intelligence community, abolishing the position of the Director of Central Intelligence and creating the position of the Director of the Central Intelligence Agency. It also created the position of the Director of National Intelligence to be the head of the new intelligence infrastructure. As you can see from this description of HUMINT on the CIA website, its National Clandestine Service (NCS) is responsible for HUMINT activities.

From that same page, you see the description of how HUMINT information is gathered:

  • Clandestine acquisition of photography, documents, and other material
  • Overt collection by people overseas
  • Debriefing of foreign nationals and U.S. citizens who travel abroad
  • Official contacts with foreign governments

Nowhere within there does it discuss any cyber component. Now, there is the CIA Office of Science and Technology, but from their own page here, we see that they aren’t engaged in cyber forensics, defense, or operations, either, but are instead focused on aiding the NCS in carrying out their covert operations. Therefore, any information that the CIA has regarding Russian hackers influencing the elections has to be from one of the means of HUMINT collection listed above, which breaks down into primarily someone saying they hacked the elections or know someone who did. In order for this information to be vetted, there would need to be corroborating reports or information derived from other sources that back this information up. So who would corroborate this information?

From the FBI’s own website, we have an article from July of this year which lines out the responsibilities of the agency in the new US Cyber Security Policy. It is Presidential Policy Directive 41, and it states: The Department of Justice, acting through the FBI and the National Cyber Investigative Joint Task Force (NCIJTF), will be taking the lead on threat response activities. It implies that the NCIJTF is a cyber forensics task force that once a threat is detected, can go in and “fingerprint” the threat, detect all of the various systems compromised, and follow the trail back to the likely initiator of the threat. Regardless of where the threat originated, cyber breaches are criminal activities, and as such, fall under the purview of the Department of Justice, and the investigation would likely be conducted with the FBI as the lead agency.

So what does the FBI say about the possibility of Russian hackers influencing the US elections?This article goes into an FBI briefer before Congress and the response of the FBI to claims that the Russians aided Trump in his bid for the White House. FBI investigations have not gained any evidence into the fact that Russia aided the Trump campaign or even attempted to influence the US election, though one certainly could understand if they did attempt to avert the coming World War that would ensue should Hillary Clinton be sworn in to office.

So now that we know that the “evidence” supposed CIA agents have that shows Russian influence over US elections and Russian hackers influencing US elections is basically hearsay, what possible reason would the MSM and the establishment have in running with this story? It is very clear if you look at the rhetoric of the establishment and the Clinton campaign towards Russia in the final months of the run up to the election. They want war with Russia, they want Clinton in the White House to more easily make the war happen, and they want to discredit the movement that has taken hold in this country and around the world away from globalization by discrediting Trump himself and painting anyone associated with the movement as compromised by the Russians. This is exactly the kind of “vast conspiracy” Clinton has been talking about for years, only she insisted it was a right-wing conspiracy. Hmmm…projection?

I hope that this has helped to explain some of the inside work of the intelligence community and why our policy makers cannot and should not rely on simply one intelligence discipline in making decisions of intentions. I also hope that it shows clearly why this story should be regarded as exactly the kind of “fake news” the MSM is purporting to be cropping up all over (again, a Russian influence of us all is implied…and again…projecting much?). This is a non-story that is attempting to drive the drums of war and discredit much of the American population. We must reject this narrative and call the media to account for its manufacture of fake news in its attempt to hold on to relevance and influence the population for the fulfillment of its agenda. Freedom of the press comes with the responsibility to inform the people, not manipulate them. And this is exactly what the business of the MSM has become and why the American people are rejecting it.

As heard on The Hagmann Report