Intelligence cycle

Last updated

The intelligence cycle is an idealized model of how intelligence is processed in civilian and military intelligence agencies, and law enforcement organizations. It is a closed path consisting of repeating nodes, which (if followed) will result in finished intelligence. The stages of the intelligence cycle include the issuance of requirements by decision makers, collection, processing, analysis, and publication (i.e., dissemination) of intelligence. [1] The circuit is completed when decision makers provide feedback and revised requirements. The intelligence cycle is also called intelligence process by the U.S. Department of Defense (DoD) and the uniformed services. [2]

Contents

Conceptual model

The intelligence process or cycle The Intelligence Process JP 2-0.png
The intelligence process or cycle
Intelligence reflects a progressive refinement of data and information Relationship of data, information and intelligence.png
Intelligence reflects a progressive refinement of data and information

Direction

Intelligence requirements are determined by a decision maker to meet his/her objectives. In the federal government of the United States, requirements (or priorities) can be issued from the White House or the Congress.[ citation needed ] In NATO, a commander uses requirements (sometimes called Essential elements of information (EEIs)) to initiate the intelligence cycle.

Collection

In response to requirements, an intelligence staff develops an intelligence collection plan applying available sources and methods and seeking intelligence from other agencies. Collection includes inputs from several intelligence gathering disciplines, such as HUMINT (human intelligence), IMINT (imagery intelligence), ELINT (electronic intelligence), SIGINT (Signals Intelligence), OSINT (open source, or publicly available intelligence), etc.

Processing and exploitation

Once the collection plan is executed and the data arrives, it is processed for exploitation. This involves the translation of raw intelligence materials from a foreign language, evaluation of relevance and reliability, and collation of the raw data in preparation for exploitation.

Analysis

Analysis establishes the significance and implications of processed intelligence, integrates it by combining disparate pieces of information to identify collateral information and patterns, then interprets the significance of any newly developed knowledge.

Dissemination

Finished intelligence products take many forms depending on the needs of the decision maker and reporting requirements. The level of urgency of various types of intelligence is typically established by an intelligence organization or community. For example, an indications and warning (I&W) bulletin would require higher precedence than an annual report.

Feedback

The intelligence cycle is a closed loop; feedback is received from the decision maker and revised requirements issued.

Intelligence information cycle theory

The intelligence information cycle shows the transition of information from private- to secret- to public information. The transition points, "collection" and "dissemination," are points of conflict in this transition. Intelligence Information Cycle.png
The intelligence information cycle shows the transition of information from private- to secret- to public information. The transition points, "collection" and "dissemination," are points of conflict in this transition.

The intelligence information cycle leverages secrecy theory and U.S. regulation of classified intelligence to re-conceptualize the traditional intelligence cycle under the following four assumptions:

  1. Intelligence is secret information
  2. Intelligence is a public good
  3. Intelligence moves cyclically
  4. Intelligence is hoarded

Information is transformed from privately held to secretly held to public based on who has control over it. For example, the private information of a source becomes secret information (intelligence) when control over its dissemination is shared with an intelligence officer, and then becomes public information when the intelligence officer further disseminates it to the public by any number of means, including formal reporting, threat warning, and others. The fourth assumption, intelligence is hoarded, causes conflict points where information transitions from one type to another. The first conflict point, collection, occurs when private transitions to secret information (intelligence). The second conflict point, dissemination, occurs when secret transitions to public information. Thus, conceiving of intelligence using these assumptions demonstrates the cause of collection techniques (to ease the private-secret transition) and dissemination conflicts, and can inform ethical standards of conduct among all agents in the intelligence process. [3] [4]

See also

Related Research Articles

<span class="mw-page-title-main">Military intelligence</span> Information about military opponents

Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions. This aim is achieved by providing an assessment of data from a range of sources, directed towards the commanders' mission requirements or responding to questions as part of operational or campaign planning. To provide an analysis, the commander's information requirements are first identified, which are then incorporated into intelligence collection, analysis, and dissemination.

Intelligence assessment, or simply intel, is the development of behavior forecasts or recommended courses of action to the leadership of an organisation, based on wide ranges of available overt and covert information (intelligence). Assessments develop in response to leadership declaration requirements to inform decision-making. Assessment may be executed on behalf of a state, military or commercial organisation with ranges of information sources available to each.

<span class="mw-page-title-main">Bureau of Intelligence and Research</span> Intelligence agency in the U.S. State Department

The Bureau of Intelligence and Research (INR) is an intelligence agency in the United States Department of State. Its central mission is to provide all-source intelligence and analysis in support of U.S. diplomacy and foreign policy. INR is the oldest civilian element of the U.S. Intelligence Community and among the smallest, with roughly 300 personnel. Though lacking the resources and technology of other U.S. intelligence agencies, it is "one of the most highly regarded" for the quality of its work.

<span class="mw-page-title-main">Geoinformatics</span> Application of information science methods in geography, cartography, and geosciences

Geoinformatics is a scientific field primarily within the domains of Computer Science and technical geography. It focuses on the programming of applications, spatial data structures, and the analysis of objects and space-time phenomena related to the surface and underneath of Earth and other celestial bodies. The field develops software and web services to model and analyse spatial data, serving the needs of geosciences and related scientific and engineering disciplines. The term is often used interchangeably with Geomatics, although the two have distinct focuses; Geomatics emphasizes acquiring spatial knowledge and leveraging information systems, not their development. At least one publication has claimed the discipline is pure computer science outside the realm of geography.

The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic of classified information beginning in 1951. Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments.

Intelligence analysis is the application of individual and collective cognitive methods to weigh data and test hypotheses within a secret socio-cultural context. The descriptions are drawn from what may only be available in the form of deliberately deceptive information; the analyst must correlate the similarities among deceptions and extract a common truth. Although its practice is found in its purest form inside national intelligence agencies, its methods are also applicable in fields such as business intelligence or competitive intelligence.

<span class="mw-page-title-main">Under Secretary of Defense for Intelligence and Security</span>

The under secretary of defense for intelligence and security or USD(I&S) is a high-ranking civilian position in the Office of the Secretary of Defense (OSD) within the U.S. Department of Defense (DoD) that acts as the principal civilian advisor and deputy to the secretary of defense (SecDef) and deputy secretary of defense (DepSecDef) on matters relating to military intelligence and security. The under secretary is appointed as a civilian by the president and confirmed by the Senate to serve at the pleasure of the president.

Commercial intelligence is a form of open-source intelligence practiced by diverse international and local businesses. Business Intelligence is a misnomer for data mining and enterprise dashboards that present useful patterns or distillations of internal information to the executive.

<span class="mw-page-title-main">United States Army Intelligence and Security Command</span> U.S. Army direct reporting unit

The United States Army Intelligence and Security Command (INSCOM) is a direct reporting unit that conducts intelligence, security, and information operations for United States Army commanders, partners in the Intelligence Community, and national decision-makers. INSCOM is headquartered at Fort Belvoir, Virginia.

Policy studies is a subdiscipline of political science that includes the analysis of the process of policymaking and the contents of policy. Policy analysis includes substantive area research, program evaluation and impact studies, and policy design. It "involves systematically studying the nature, causes, and effects of alternative public policies, with particular emphasis on determining the policies that will achieve given goals." It emerged in the United States in the 1960s and 1970s.

Most federal regulatory agencies in the United States government must comply with specific peer review requirements before the agencies publicly disseminate certain scientific information. These requirements were published in a Peer Review Bulletin issued by the White House Office of Management and Budget (OMB), which establishes "government-wide standards concerning when peer review is required and, if required, what type of peer review processes are appropriate."

Intelligence collection management is the process of managing and organizing the collection of intelligence from various sources. The collection department of an intelligence organization may attempt basic validation of what it collects, but is not supposed to analyze its significance. There is debate in U.S. intelligence community on the difference between validation and analysis, where the National Security Agency may try to interpret information when such interpretation is the job of another agency.

Intelligence cycle management refers to the overall activity of guiding the intelligence cycle, which is a set of processes used to provide decision-useful information (intelligence) to leaders. The cycle consists of several processes, including planning and direction, collection, processing and exploitation, analysis and production, and dissemination and integration. The related field of counterintelligence is tasked with impeding the intelligence efforts of others. Intelligence organizations are not infallible but, when properly managed and tasked, can be among the most valuable tools of management and government.

Intelligence dissemination management is a maxim of intelligence arguing that intelligence agencies advise policymakers instead of shaping policy. Due to the necessity of quick decision-making in periods of crisis, intelligence analysts may suggest possible actions, including a prediction of the consequences of each decision. Intelligence consumers and providers still struggle with the balance of what drives information flow. Dissemination is the part of the intelligence cycle that delivers products to consumers, and intelligence dissemination management refers to the process that encompasses organizing the dissemination of the finished intelligence.

Intelligence requirements (IR) are a ranking of topics or issues by priority which are used to inform the allocation of resources for intelligence collection. They define the intended end product, prescribe required resources, and identify gaps in capabilities for collection management. Once an intelligence requirement is identified, it is the responsibility of the decision maker's intelligence staff or if requested, supporting intelligence organization(s), to collect and disseminate the required information. The identification of intelligence requirements and the collection and dissemination of the required information are parts of the intelligence cycle. In the United States Intelligence Community (IC), requirements must comply with the National Intelligence Priorities Framework (NIPF).

Failure in the intelligence cycle or intelligence failure, is the outcome of the inadequacies within the intelligence cycle. The intelligence cycle itself consists of six steps that are constantly in motion: requirements, collection, processing and exploitation, analysis and production, dissemination and consumption, and feedback.

The target-centric approach to intelligence is a method of intelligence analysis that Robert M. Clark introduced in his book "Intelligence Analysis: A Target-Centric Approach" in 2003 to offer an alternative methodology to the traditional intelligence cycle. Its goal is to redefine the intelligence process in such a way that all of the parts of the intelligence cycle come together as a network. It is a collaborative process where collectors, analysts and customers are integral, and information does not always flow linearly.

An intelligence collection plan (ICP) is the systematic process used by most modern armed forces and intelligence services to meet intelligence requirements through the tasking of all available resources to gather and provide pertinent information within a required time limit. Creating a collection plan is part of the intelligence cycle.

Geographic information systems (GIS) play a constantly evolving role in geospatial intelligence (GEOINT) and United States national security. These technologies allow a user to efficiently manage, analyze, and produce geospatial data, to combine GEOINT with other forms of intelligence collection, and to perform highly developed analysis and visual production of geospatial data. Therefore, GIS produces up-to-date and more reliable GEOINT to reduce uncertainty for a decisionmaker. Since GIS programs are Web-enabled, a user can constantly work with a decision maker to solve their GEOINT and national security related problems from anywhere in the world. There are many types of GIS software used in GEOINT and national security, such as Google Earth, ERDAS IMAGINE, GeoNetwork opensource, and Esri ArcGIS.

<span class="mw-page-title-main">TASC, Inc.</span>

TASC, Inc., formerly known as The Analytic Sciences Corporation, is an American private defense contractor based outside Washington, D.C., in Chantilly, Virginia. Northrop Grumman owned TASC from 2001 to 2009, when it sold the unit to comply with new government conflict of interest rules.

References

  1. "The Intelligence Cycle" (HTML). Central Intelligence Agency (CIA). 23 March 2013. Archived from the original (HTML) on 08 May 2020. Retrieved 30 September 2021.
  2. "Joint Publication 2-0, Joint Intelligence" (PDF). Defense Technical Information Center (DTIC). Department of Defense. 22 June 2007. pp. GL–11. Archived from the original (PDF) on 13 June 2016. Retrieved February 22, 2013.
  3. Stottlemyre, Steven (2022). "Reconceptualizing Intelligence after Benghazi". doi:10.13140/RG.2.2.19732.99204.{{cite journal}}: Cite journal requires |journal= (help)
  4. Stottlemyre, Steven (2021). "The United States Intelligence Community, Secrecy and the 'Steele Dossier': Reconceptualizing the Intelligence Process". Journal of European and American Intelligence Studies. 4 (2): 11–28.