Big Money: The US Intelligence Budget

The US intelligence budget has two major components: the National Intelligence Program and the Military Intelligence Program. The National Intelligence Program includes all programs, projects, and activities of the intelligence community as well as any other intelligence community programs designated jointly by the DNI and the head of department or agency, or the DNI and the President. The MIP is devoted to intelligence activity conducted by the military departments and agencies in the Department of Defense that support tactical US military operations. In addition, other departments and agencies may engage in certain activities related to intelligence for their own mission needs that are not captured here.  icontherecord

The total amounts spent from 2007 to 2014 are as follows:

  • 2007 - $63 Billion,
  • 2008 – $70.4 Billion,
  • 2009 - $76.2 Billion,
  • 2010 - $80.1Billion,
  • 2011 - $78.6 Billion,
  • 2012 - $75.4 Billion,
  • 2013 - $67.6 Billion
  • 2014 - $67.9 Billion

The US National Intelligence Program budget request was first publicly disclosed in February 2011 as a requirement by Congress of the Intelligence Authorisation Act of 2010. The Military Intelligence Program budget request was first released in 2012. For a perspectve, the combined US intelligence budget in 2014 equates to the entire UK Defence budget of the same year when the UK was ranked 5 in a table of national military expenditures.

« Are Cyber War & Cyber Terrorism Insurable?
South Africa: Serious About Cyberwarfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Trinexia

Trinexia

Trinexia (formerly Credence Security) is a specialty Value-added Distributor of Cyber Security, Digital Forensics, Security Awareness, Data Security & Governance solutions.

Haltdos

Haltdos

Haltdos is an AI driven website protection service that secures websites against today's cyber threats.

Tessian

Tessian

Tessian (formerly CheckRecipient) is a next-generation email security platform that helps enterprises counteract human error and significantly reduce the risk of data loss.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

ThriveDX

ThriveDX

ThriveDX, the world’s premier EdTech provider (formerly HackerU), champions digital transformation training as a means of empowering individuals to thrive in the age of digital disruption.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

McCrary Institute - Auburn University

McCrary Institute - Auburn University

The McCrary Institute seeks practical solutions to real-world problems in the areas of cyber and critical infrastructure security.

IronClad Encryption (ICE)

IronClad Encryption (ICE)

Ironclad Encryption is Dynamic Encryption. The encryption sequence changes continuously so there is never a correlation between data sent and data received.

Moss Adams

Moss Adams

Moss Adams is a fully integrated professional services firm dedicated to assisting clients with growing, managing, and protecting prosperity.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

UFS Technology

UFS Technology

UFS, the bank technology outfitter for community banks, provides purpose-built, bank-exclusive technology services and solutions including cybersecurity.

Velaspan

Velaspan

Velaspan design, deploy, and manage enterprise wireless networks and cybersecurity solutions for leading businesses and brands.

Adili Group

Adili Group

Adili Group is a leading pan-African corporate advisory firm. We deliver tailored solutions in regulation and compliance, risk management, and improving business efficiency.