Professional Documents
Culture Documents
IN
TIAL- TELLI
PA G
OS
EN
GE
CE
NATIONAL
AAGENCY
UN
IT
IC
ED R
STAT ME
ES O F A
From the Director
of National Intelligence
As the Director of National Intelligence, I am fortunate to lead an Intelligence Community (IC) composed
of the best and brightest professionals who have committed their careers and their lives to protecting
our national security. The IC is a 24/7/365 organization, scanning the globe and delivering the most
distinctive, timely insights with clarity, objectivity, and independence to advance our national security,
economic strength, and technological superiority.
This, the fourth iteration of the National Intelligence Strategy (NIS), is our guide for the next four years
to better serve the needs of our customers, to help them make informed decisions on national security
issues, and to ultimately keep our Nation safe. The NIS is designed to advance our mission and align
our objectives with national strategies, and it provides an opportunity to communicate national priority
objectives to our workforce, partners, oversight, customers, and also to our fellow citizens.
We face significant changes in the domestic and global environment; we must be ready to meet 21st
century challenges and to recognize emerging threats and opportunities. To navigate today’s turbulent
and complex strategic environment, we must do things differently. This means we must:
• Increase integration and coordination of our intelligence activities to achieve best effect and value
in executing our mission,
• Bolster innovation to constantly improve our work,
• Better leverage strong, unique, and valuable partnerships to support and enable national security
outcomes, and
• Increase transparency while protecting national security information to enhance accountability and
public trust.
This National Intelligence Strategy increases emphasis in these areas. It better integrates counterintelligence
and security, better focuses the IC on addressing cyber threats, and sets clear direction on privacy, civil
liberties and transparency.
We have crucial work before us. Our customers depend on us to help them to make wise national security
decisions, and Americans count on us to help protect the Nation, all while protecting their privacy and civil
liberties. We must provide the best intelligence possible to support these objectives; doing so is a collective
responsibility of all of our dedicated IC professionals and, together with our partners, we can realize our vision.
Our ongoing goal is to continue to be the very best intelligence community in the world. Thank you for your
service and for bringing your talent and commitment to the work of keeping our Nation safe each and every
day. Thank you for your dedication to our mission and to the security of our fellow citizens as we take this
journey together.
2019 NIS
Daniel R. Coats
Director of National Intelligence
3
Strategic
Environment
The strategic environment is changing rapidly, and the United States faces an increasingly
complex and uncertain world in which threats are becoming ever more diverse and
interconnected. While the IC remains focused on confronting a number of conventional
challenges to U.S. national security posed by our adversaries, advances in technology are
driving evolutionary and revolutionary change across multiple fronts. The IC will have to
become more agile, innovative, and resilient to deal effectively with these threats and the
ever more volatile world that shapes them. The increasingly complex, interconnected, and
transnational nature of these threats also underscores the importance of continuing and
advancing IC outreach and cooperation with international partners and allies.
Traditional adversaries will continue attempts In addition to these familiar threats, our adversaries
to gain and assert influence, taking advantage are increasingly leveraging rapid advances in
of changing conditions in the international technology to pose new and evolving threats—
environment—including the weakening of the particularly in the realm of space, cyberspace,
post-WWII international order and dominance of computing, and other emerging, disruptive
Western democratic ideals, increasingly isolationist technologies. Technological advances will enable
tendencies in the West, and shifts in the global a wider range of actors to acquire sophisticated
economy. These adversaries pose challenges within capabilities that were previously available only to
traditional, non-traditional, hybrid, and asymmetric well-resourced states.
military, economic, and political spheres. Russian
efforts to increase its influence and authority are No longer a solely U.S. domain, the democratization
likely to continue and may conflict with U.S. goals of space poses significant challenges for the United
and priorities in multiple regions. Chinese military States and the IC. Adversaries are increasing their
modernization and continued pursuit of economic presence in this domain with plans to reach or
and territorial predominance in the Pacific region and exceed parity in some areas. For example, Russia
beyond remain a concern, though opportunities exist and China will continue to pursue a full range
to work with Beijing on issues of mutual concern, of anti-satellite weapons as a means to reduce
such as North Korean aggression and continued U.S. military effectiveness and overall security.
pursuit of nuclear and ballistic missile technology. Increasing commercialization of space now provides
Despite its 2015 commitment to a peaceful nuclear capabilities that were once limited to global powers
program, Iran’s pursuit of more advanced missile to anyone that can afford to buy them. Many aspects
and military capabilities and continued support for of modern society—to include our ability to conduct
terrorist groups, militants, and other U.S. opponents military operations—rely on our access to and
will continue to threaten U.S. interests. Multiple equipment in space.
adversaries continue to pursue capabilities to inflict
potentially catastrophic damage to U.S. interests Cyber threats are already challenging public
through the acquisition and use of weapons of confidence in our global institutions, governance, and
mass destruction (WMD), which includes biological, norms, while imposing numerous economic costs
chemical, and nuclear weapons. domestically and globally. As the cyber capabilities of
4
our adversaries grow, they will pose increasing threats the potential for greater instability. Some violent
to U.S. security, including critical infrastructure, public extremist groups will continue to take advantage
health and safety, economic prosperity, and stability. of these sources and drivers of instability to hold
territory, further insurgencies, plan external attacks,
Emerging technologies, such as artificial and inspire followers to launch attacks wherever they
intelligence, automation, and high performance are around the world.
computing are advancing computational capabilities
that can be economically beneficial, however these Increasing migration and urbanization of
advances also enable new and improved military and populations are also further straining the capacities
intelligence capabilities for our adversaries. Advances of governments around the world and are likely to
in nano- and bio-technologies have the potential result in further fracturing of societies, potentially
to cure diseases and modify human performance, creating breeding grounds for radicalization. Pressure
but without common ethical standards and shared points include growing influxes of migrants, refugees,
interests to govern these developments, they have and internally displaced persons fleeing conflict
the potential to pose significant threats to U.S. zones; areas of intense economic or other resource
interests and security. In addition, the development scarcity; and areas threatened by climate changes,
and spread of such technologies remain uneven, infectious disease outbreaks, or transnational
increasing the potential to drastically widen the divide criminal organizations.
between so-called “haves” and “have-nots.”
All of these issues will continue to drive global
Advances in communications and the change on an unprecedented scale and the IC must
democratization of other technologies have also be able to warn of their strategic effects and adapt to
generated an ability to create and share vast and meet the changing mission needs in this increasingly
exponentially growing amounts of information farther unstable environment. There will likely be demand
and faster than ever before. This abundance of for greater intelligence support to domestic security,
data provides significant opportunities for the driven in part by concerns over the threat of terrorism,
IC, including new avenues for collection and the the threat posed by transnational illicit drug and
potential for greater insight, but it also challenges human trafficking networks, and the threat to U.S.
the IC’s ability to collect, process, evaluate, and critical infrastructure. Intelligence support to counter
analyze such enormous volumes of data quickly these threats must be conducted in accordance with
enough to provide relevant and useful insight to IC authorities, with appropriate levels of transparency
its customers. to the public, and with adequate protection for civil
liberties and privacy.
These advances in communications and the
democratization of other technologies have
empowered non-state actors and will continue to
exponentially expand the potential to influence
people and events, both domestically and globally. 2019 NIS - STRATEGIC ENVIRONMENT
5
Mission
Objectives
1 Strategic Intelligence
addresses issues of enduring national security interest.
threats to the United States, its
people, property, or interests;
2 Anticipatory Intelligence
addresses new and emerging trends, changing conditions,
and underappreciated developments.
the development, proliferation,
or use of weapons of mass
destruction; or any other matter
The next four mission objectives address specific, topical missions (Executive Order 12333)
of the IC. The topical mission objectives are supported by the
three foundational mission objectives and may contain elements
of these. Other specific regional and functional issues, such
as conflict areas and transnational criminal organizations, are
implicitly covered by the mission objectives.
4
2019 NIS - MISSION OBJECTIVES
5 Counterterrorism
addresses state and non-state actors engaged in terrorism
and related activities.
6 Counterproliferation
addresses state and non-state actors engaged in the proliferation
of weapons of mass destruction and their means of delivery.
7
1
Strategic
Intelligence
8
2
Anticipatory
Intelligence
mitigate threats and exploit opportunities. The IC will expand its apprise them of opportunities.
use of quantitative analytic methods while reinforcing qualitative
methods, especially those that encourage new perspectives and
challenge long-standing assumptions. With evolving intelligence
requirements, anticipatory intelligence is critical for efficient IC
resource allocation. The IC will improve its ability to foresee,
forecast, and alert regarding potential issues of concern and
provide the best possible opportunities for action to our national
security customers.
9
3
Current Operations
Intelligence
10
4
Cyber Threat
Intelligence
Detect and understand cyber threats from state and TO MEET TH IS OBJ EC T I V E,
non-state actors engaged in malicious cyber activity to TH E IC WILL:
inform and enable national security decisionmaking,
cybersecurity, and the full range of response activities.
• Increase our awareness and
understanding of adversaries’ use
Cyber threat intelligence is the collection, processing, of cyber operations—including
analysis, and dissemination of information from all sources leadership plans, intentions,
capabilities, and operations—to
of intelligence on foreign actors’ cyber programs, intentions,
inform decisions and enable action.
capabilities, research and development, tactics, targets,
operational activities and indicators, and their impact or potential • Expand tailored production and
effects on U.S. national security interests. Cyber threat intelligence appropriate dissemination and
also includes information on cyber threat actor information release of actionable cyber threat
systems, infrastructure, and data; and network characterization, or intelligence to support the defense
of vital information networks and
insight into the components, structures, use, and vulnerabilities of
critical infrastructure.
foreign cyber program information systems.
• Expand our ability to enable
diplomatic, information, military,
Despite growing awareness of cyber threats and improving cyber economic, financial, intelligence,
defenses, nearly all information, communication networks, and and law enforcement plans
systems will be at risk for years to come. Our adversaries are and operations to deter and
becoming more adept at using cyberspace capabilities to threaten counter malicious cyber actors
and activities.
our interests and advance their own strategic and economic
objectives. Cyber threats will pose an increasing risk to public
health, safety, and prosperity as information technologies are
integrated into critical infrastructure, vital national networks, and
consumer devices. The IC must continue to grow its intelligence
capabilities to meet these evolving cyber threats as a part of a
comprehensive cyber posture positioning the Nation for strategic
and tactical response. 2019 NIS - MISSION OBJECTIVES
11
Counterterrorism
12
Counterproliferation
13
7
Counterintelligence and
Security
14
Enterprise
Objectives
3 People
seeks to forge and retain a diverse, inclusive, and expert workforce.
4 Innovation
addresses the improvement of mission and business processes through
new technologies, innovative thought, and advancements in tradecraft.
6 Partnerships
seeks to enhance intelligence through partnerships. 2019 NIS - ENTERPRISE OBJECTIVES
17
1
Integrated Mission
Management
18
2
Integrated Business
Management
IC business functions and practices enable the community • Advance a dynamic approach
to perform its missions, activities, and operations. These to continuous evaluation and
functions and practices include the coordinated development, common security practices and
alignment, de-confliction, execution, and monitoring of strategies, standards to strengthen the
policies, plans, and procedures needed to manage and secure security of the IC infrastructure.
the IC and its people, information technology, and physical • Pursue common strategies and
infrastructure. best practices for acquisition
and procurement across the IC
to enhance the cost-effectiveness,
Effectively managing business functions and practices across efficiency, and agility of acquiring
the IC contributes to communication and collaboration, and procuring IC products
supports the efficient use of resources, enables resilience, and and services.
strengthens integration. Common standards, shared services,
• Implement IC-wide financial
and best practices within IC authorities can increase efficiency,
standards, processes, tools, and
effectiveness, and accountability; successfully manage and services to achieve fiscal efficiency,
mitigate risk; and improve business processes through data- accountability, and security.
driven reviews and performance measurements. The IC will
promote and identify best business practices and functions • Enhance strategy-based
performance evaluation across the
to optimize solutions and increase collaboration to create a
IC that leverages both government
culture of continuous learning, innovation, and partnerships
and industry best practices to
across the community. The IC must also develop flexible, enable informed IC business
risk-managed acquisition processes that deliver innovative decisions and guide efficient
capabilities, data, and expertise at mission pace. application of resources.
19
People
21
5
Information Sharing
and Safeguarding
22
Partnerships
23
7
Privacy, Civil Liberties,
and Transparency
Safeguard privacy and civil liberties and practice appropriate TO MEET TH IS OBJ EC T I V E,
transparency to enhance accountability and public trust in TH E IC WILL:
all we do.
• Incorporate privacy and civil
The Principles of Intelligence Transparency for the Intelligence liberties requirements into IC
Community provide general norms for the IC to follow in making policy and programs to ensure
information publicly available that enhances public understanding that national values inform the
of intelligence activities while continuing to protect information intelligence mission.
when disclosure would harm national security.
• Engage proactively with oversight
institutions and our partners to
enhance public understanding and
The IC must be accountable to the American people in carrying out
trust in the IC.
its national security mission in a way that upholds the country’s
values. The core principles of protecting privacy and civil liberties • Practice and promote
in our work and of providing appropriate transparency about our appropriate transparency in the
work, both internally and to the public, must be integrated into the IC to make information publicly
available without jeopardizing
IC’s programs and activities. Doing so is necessary to earn and
national security.
retain public trust in the IC, which directly impacts IC authorities,
capabilities, and resources. Mission success depends on the IC’s
commitment to these core principles.
24
25
Factors Affecting IC Performance:
Accomplishments, Risks, and Challenges
26
achieved greater mission advantage on important • Institutional risk refers to the factors that affect
issues. For example, IC leaders and managers the IC’s ability to execute effective mission and
have promoted a culture of collaboration and business management practices. For example,
integration along with unification of intelligence the likelihood of future unauthorized disclosures
activities to deliver shared IT services and is a known risk that, if realized, may negatively
capabilities across the IC. This integrated affect intelligence collection, relations with
approach will enable the IC to appropriately access domestic and foreign partners, and public
information and tools, regardless of where in the trust. Better governance, auditing, and security
IC they reside. Information that is better organized procedures are needed to mitigate the risk and
and enriched by metadata will enable the transition minimize the impact. The IC must attract and
to information-centered intelligence processes, retain the right, trusted, agile workforce that
while streamlining integrated data, applications, possesses skills such as the critical analytic,
and services. scientific, technological, engineering, math,
cyber, and foreign language skills required to
A pioneering program has developed new methods support current and future mission challenges.
for generating accurate and timely probabilistic This includes continuing to make progress
forecasts on a wide range of intelligence questions. recruiting and hiring a more diverse workforce
These forecasts have been used for National more comparable to external benchmarks, such
Intelligence Estimates and other intelligence as those of the Federal workforce, the private
products. To improve tradecraft, machine learning sector workforce, and the U.S. population.
research has led to new automated methods for
forecasting political instability from social media, • Programmatic (fiscal) risk refers to the
news, financial data, web search queries, and consequences of losing IC capabilities and
thousands of other data streams. These innovative resources due to unplanned or unforeseen
applications are beginning to revolutionize the future factors that impact the effective use of available
of intelligence to better inform our decisionmakers. funds. Continued federal budget uncertainty
strains the IC’s ability to make deliberative and
Risks and Challenges responsive resource decisions. The outcome may
The NIS addresses various sources of risk and be overextended budgets or lack of cost-effective
challenges that IC elements are called upon to solutions to address intelligence issues. The
mitigate. Risk is an uncertain event or condition that IC needs to develop methods to efficiently shift
has a negative effect on the IC’s ability to accomplish resources to mitigate programmatic (fiscal) risk
its mission. Risk factors may have internal (areas the and avoid loss of vital programs, capabilities, and
IC can control) and/or external (areas beyond the IC’s resource investments.
27
Organization of the
Intelligence Community
CI
IC
ES
ST
JU
NS
E
28
Implementing the
National Intelligence Strategy
The DNI, through the Office of the Director of National Intelligence, provides the IC with overarching
oversight, direction, guidance, and coordination. IC elements execute their missions consistent with
their statutory authorities. All members of the IC workforce are responsible for understanding how
they contribute to the mission of the IC and executing their specific role to the best of their ability,
while safeguarding privacy and civil liberties and practicing appropriate transparency.
The NIS provides the IC with the DNI’s strategic direction for the next four years, aligns IC
priorities with other national strategies, and supports the IC’s mission to provide timely,
insightful, objective, and relevant intelligence and support to inform national security
decisions and to protect our Nation and its interests. The IC must fully reflect the NIS in
agency strategic plans, annual budget requests, and justifications for the NIP. The DNI will
assess IC element proposals, projects, and programs toward the objectives of the NIS to
realize the IC’s vision of a Nation made more secure by a fully integrated, agile, resilient,
and innovative Intelligence Community that exemplifies America’s values.
30
31
The National Intelligence Strategy
of the United States of America
IC Vision A Nation made more secure by a fully integrated, agile, resilient, and innovative Intelligence
Community that exemplifies America’s values.
IC Mission Provide timely, insightful, objective, and relevant intelligence and support to inform national
security decisions and to protect our Nation and its interests.
Customer Success
Our Customers
The President National Security Council Congress
Heads of Departments & Chairman of the Joint Chiefs of Staff Others as the DNI
Agencies of the Executive Branch and senior military commanders determines appropriate
Counterterrorism
Counterproliferation
People
Innovation
Partnerships