Intelligence gathering network

Last updated
ELAS intelligence network in Aigialeia during World War II. ELAS Intelligence Network Aigialeia.jpg
ELAS intelligence network in Aigialeia during World War II.

An intelligence gathering network is a system through which information about a particular entity is collected for the benefit of another through the use of more than one, inter-related source.[ according to whom? ] Such information may be gathered by a military intelligence, government intelligence, or commercial intelligence network.

Contents

Intelligence assessment employs intelligence analysis to refine information. Foreign embassies subscribe to the newspapers and keep tabs on the news channels of their host countries the information doesn't have to be classified to be considered useful intelligence; indeed, so-called OSINT, or open-source intelligence, is increasing in both quantity and utility with the ascendancy of digital media. Researchers may also be employed to dig through archives and check facts. An important form of intelligence is so-called "signals intelligence", which attempts to intercept electronic communications and other signals sent between parties working for a hostile, or potentially hostile, entity, or between neutral or even friendly parties but discussing that entity.

In established intelligence agencies, such networks usually follow a linear rather than distributed structure. An agent handler directs the activities of a number of persons and sources in order to obtain the necessary facts about the target of the intelligence gathering operation. The two main HUMINT agent types used are infiltration and penetration agents. An infiltration agent is someone who enters the target of the operation from the outside, but on a suitable pretext so that they are not suspected of espionage. A penetration agent would already be in place in the target area, and is recruited by the handler, often by means of the MICE principle. The information so gathered is processed by one or more analysts and turned into an intelligence product. Information is conveyed between nodes of the network by a variety of secure/clandestine means, be they physical or electronic.

History

Turkey

At the turn of the twentieth century, the last Sultan, Abdul Hamid II, demanded daily intelligence reports called djournals (from the word "journal). After decades, he had saved millions of them in "a whole building to itself in the War Office, where a Government Commission is now," Francis McCullagh wrote in 1910, "wading slowly through this amazing accumulation." [1]

Related Research Articles

Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangible benefit. A person who commits espionage is called an espionage agent or spy. Any individual or spy ring, in the service of a government, company, criminal organization, or independent operation, can commit espionage. The practice is clandestine, as it is by definition unwelcome. In some circumstances, it may be a legal tool of law enforcement and in others, it may be illegal and punishable by law.

Earl Edwin Pitts is a former FBI special agent who was convicted of espionage for selling information to Soviet and Russian intelligence services.

<span class="mw-page-title-main">Counterintelligence</span> Offensive measures using enemy information

Counterintelligence is an activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or other intelligence activities conducted by, for, or on behalf of foreign powers, organizations or persons.

<span class="mw-page-title-main">GRU</span> Russian military intelligence agency

The Main Directorate of the General Staff of the Armed Forces of the Russian Federation, formerly the Main Intelligence Directorate, and still commonly known by its previous abbreviation GRU, is the foreign military intelligence agency of the General Staff of the Armed Forces of the Russian Federation. The GRU controls the military intelligence service and maintains its own special forces units.

Tactical or battlefield intelligence became vital to both sides in the field during the American Civil War. Units of spies and scouts reported directly to the commanders of armies in the field. providing details on troop movements and strengths. The distinction between spies and scouts was one that had life or death consequences: if a suspect was seized while in disguise and not in his army's uniform, he was often sentenced to be hanged. A spy named Will Talbot, a member of the 35th Battalion, Virginia Cavalry, was left behind in Gettysburg after his battalion had passed through the borough on June 26–27, 1863. He was captured, taken to Emmitsburg, Maryland, and executed on orders of Brig. Gen. John Buford.

Intelligence assessment, or simply intel, is the development of behavior forecasts or recommended courses of action to the leadership of an organisation, based on wide ranges of available overt and covert information (intelligence). Assessments develop in response to leadership declaration requirements to inform decision-making. Assessment may be executed on behalf of a state, military or commercial organisation with ranges of information sources available to each.

An intelligence officer is a person employed by an organization to collect, compile or analyze information which is of use to that organization. The word of officer is a working title, not a rank, used in the same way a "police officer" can also be a sergeant, or in the military, in which non-commissioned personnel may serve as intelligence officers.

A sleeper agent, also called sleeper cell, is a spy who is placed in a target country or organization not to undertake an immediate mission but to act as a potential asset if activated. Even if unactivated, the "sleeper agent" is still an asset and can still play an active role in sedition, espionage or possibly treason by virtue of agreeing to act if activated. Sleeper agents may also work in groups of a Clandestine cell system with other agents.

<span class="mw-page-title-main">Tradecraft</span> Espionage techniques

Tradecraft, within the intelligence community, refers to the techniques, methods and technologies used in modern espionage (spying) and generally, as part of the activity of intelligence assessment. This includes general topics or techniques, or the specific techniques of a nation or organization.

As early as the 1920s, the Soviet Union, through its GRU, OGPU, NKVD, and KGB intelligence agencies, used Russian and foreign-born nationals, as well as Communists of American origin, to perform espionage activities in the United States, forming various spy rings. Particularly during the 1940s, some of these espionage networks had contact with various U.S. government agencies. These Soviet espionage networks illegally transmitted confidential information to Moscow, such as information on the development of the atomic bomb. Soviet spies also participated in propaganda and disinformation operations, known as active measures, and attempted to sabotage diplomatic relationships between the U.S. and its allies.

<span class="mw-page-title-main">Directorate of Operations (CIA)</span>

The Directorate of Operations (DO), less formally called the Clandestine Service, is a component of the US Central Intelligence Agency. It was known as the Directorate of Plans from 1951 to 1973; as the Directorate of Operations from 1973 to 2005; and as the National Clandestine Service (NCS) from 2005 to 2015.

Clandestine human intelligence is intelligence collected from human sources using clandestine espionage methods. These sources consist of people working in a variety of roles within the intelligence community. Examples include the quintessential spy, who collects intelligence; couriers and related personnel, who handle an intelligence organization's (ideally) secure communications; and support personnel, such as access agents, who may arrange the contact between the potential spy and the case officer who recruits them. The recruiter and supervising agent may not necessarily be the same individual. Large espionage networks may be composed of multiple levels of spies, support personnel, and supervisors. Espionage networks are typically organized as a cell system, in which each clandestine operator knows only the people in his own cell, perhaps the external case officer, and an emergency method to contact higher levels if the case officer or cell leader is captured, but has no knowledge of people in other cells. This cellular organization is a form of compartmentalisation, which is an important tactic for controlling access to information, used in order to diminish the risk of discovery of the network or the release of sensitive information.

The Clandestine HUMINT page adheres to the functions within the discipline, including espionage and active counterintelligence.

Clandestine HUMINT asset recruiting refers to the recruitment of human agents, commonly known as spies, who work for a foreign government, or within a host country's government or other target of intelligence interest for the gathering of human intelligence. The work of detecting and "doubling" spies who betray their oaths to work on behalf of a foreign intelligence agency is an important part of counterintelligence.

<span class="mw-page-title-main">History of espionage</span> Aspect of history

Spying, as well as other intelligence assessment, has existed since ancient times. In the 1980s scholars characterized foreign intelligence as "the missing dimension" of historical scholarship." Since then a largely popular and scholarly literature has emerged. Special attention has been paid to World War II, as well as the Cold War era (1947–1989) that was a favorite for novelists and filmmakers.

The Secret Intelligence Service (SIS), commonly known as MI6, is the foreign intelligence service of the United Kingdom, tasked mainly with the covert overseas collection and analysis of human intelligence in support of the UK's national security. SIS is one of the British intelligence agencies and the Chief of the Secret Intelligence Service ("C") is directly accountable to the Foreign Secretary.

CyberHumint refers to the set of skills used by hackers, within Cyberspace, in order to obtain private information while attacking the human factor, using various psychological deceptions. CyberHumint includes the use of traditional human espionage methodologies, such as agent recruitment, information gathering through deception, traditionally known as Humint, combined with deception technologies known as Social engineering.

The Nachrichten-Abteilung, also known as N, was the naval intelligence department of the German Imperial Admiralty Staff or Admiralstab between 1901–1919. It focused its efforts on France, the United States and above all the United Kingdom, whose Royal Navy was Germany's principal rival for naval supremacy. Although it was able to recruit a worldwide network of agents, drawing on the resources of German shipping companies and the German diplomatic service, the organisation's effectiveness was limited by rivalries within the Imperial German Navy and competition with the German Army's intelligence department. Its activities had little practical impact on the course of the First World War and it was dissolved in 1919 after Germany's defeat in the war.

The 6004th Air Intelligence Service Squadron was "the first covert collection agency in the history of the United States Air Force". Begun by Major Donald Nichols as an impromptu extension of his pre-Korean War espionage in 1950, it was first dubbed "Special Activities Unit Number One". In April or May 1951, it officially became the 6004th Air Intelligence Service Squadron. The 6004th was an unorthodox unit that engaged in espionage and aircrew escape and evasion, as well as collecting information. It was Far East Air Force's primary supplier of intelligence for the war, generating as many as 900 reports per month.

References

  1. McCullagh, Francis (1910). The Fall of Abd-ul-Hamid. London: Methuen & Co. Ltd. pp.  18-19.