the intelligence cycle - pae•knowledge of the cycle allows us to understand the adversary’s...

25
1 THE INTELLIGENCE CYCLE

Upload: others

Post on 09-Feb-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

  • 1

    THE

    INTELLIGENCE

    CYCLE

  • 2

    Instructional Objectives

    • Identify the intelligence cycle

    • Identify the collection categories

    and techniques

  • 3

    Planning &

    Direction

    Phases of the Intelligence Cycle

  • 4

    Planning & Direction

    • Identification of a need for data

    • Prioritizing requirements

    • Validating requirements

    • Translating requirements

    • Preparing collection plans

    • Issuing requests for information

  • 5

    Collection

    • Acquiring information

    • Providing information to processing

    and production elements

  • 6

    • Collection depends on secure, rapid,

    redundant and reliable

    communication

    • Information is correlated and

    forwarded for processing and

    production

    Collection (Cont.)

  • 7

    Categories of Collection

    Methods

    Four Primary Categories

    • HUMINT (Human Intelligence)

    • IMINT (Imagery Intelligence)

    • SIGINT (Signals Intelligence)

    • MASINT (Measurements and

    Signature Intelligence)

  • 8

    HUMINT

    Derived from or collected by

    human sources.

  • 9

    IMINT

    Imaging techniques range from

    satellites systems to hand-held

    cameras.

  • 10

    SIGINT

    Intelligence derived from signals

    intercept either individually or in

    combination from communications,

    electronic, & foreign instrumentation.

  • 11

    SIGINT (Cont.)

    Consists of three sub-categories

    COMINT

    (Communications Intelligence)

    Targets voice and teleprinter traffic,

    video, Morse code, or facsimile.

  • 12

    SIGINT (Cont.)

    Consists of 3 sub-categories

    ELINT

    (Electronic Intelligence)

    Information derived from interception

    and analysis of non-communications

    transmissions such as radar. It

    identifies the location of an emitter.

  • 13

    SIGINT (Cont.)

    Consists of 3 sub-categories

    FISINT

    (Foreign Instrumentation

    Signals Intelligence)

    Information intercepted from telemetry

    from an opponents weapons systems

    as they are being tested.

  • 14

    MASINT

    Intelligence information obtained by

    quantitative and qualitative analysis

    of data from technical sensors.

  • 15

    Collection Methods

    The following are the most used

    methods:

    • Volunteers

    • Surveillance & Surreptitious entry

    • Specialized technical operations

    • Classic agent recruitment

    • Taskings of foreign employees of

    U.S. firms

  • 16

    Collection Methods (Cont.)

    The following are the most used

    methods:

    • Elicitation during international

    conferences and trade fairs

    • Foreign government use of private

    sector organizations, front

    companies and joint ventures

    • Tasking of liaison officers at

    government-to-government

    projects

  • 17

    Collection Methods (Cont.)

    The following are the most used

    methods:

    • Open source data

    -- Public media

    -- Environmental Impact Statements

    -- Internal use documents

    -- Freedom of Information Act

    -- Congressional records

  • 18

    Collection Methods (Cont.)

    Open source information is most

    valued by our adversaries because:

    • it is collected cheaply,

    • it reveals much information, and

    • involves little risk

  • 19

    Processing

    • Conversion of collected information

    into a form suitable for production

    • Includes translation of intercepted

    messages into written format

    • Information correlated and evaluated

    • Conclusions drawn

  • 20

    Production

    • Analyzes, evaluates, interprets, and

    integrates raw data and information

    into finished products

    • Products should be effective, timely,

    and accurate

  • 21

    Dissemination

    • Conveyance of intelligence to

    consumer in usable form

    • Provided in wide range of formats

    --- Verbal reports

    --- Written reports

    --- Imagery products

    --- Intelligence databases

  • 22

    Awareness of the Cycle

    • We need to be aware of the cycle to

    be cognizant of the range of threats

    • Knowledge of the cycle allows us to

    understand the adversary’s

    collection methods and patterns

    • Allows us to develop effective

    countermeasures

  • 23

    Current Intelligence

    Collection Threat

    • Current threat different from the past

    • A number of factors influenced this

    change:

    -- Information has value

    -- Information more readily available

    -- Availability of collection assets

    -- Interconnected communications

    systems

  • 24

    SUMMARY

    • Identified the phases of the intelligence

    cycle

    - Planning & Direction

    - Collection

    - Processing

    - Production

    - Dissemination

    • Identified collection methods

    • Identified current intelligence threats

  • 25

    Any Questions?