the intelligence cycle - pae•knowledge of the cycle allows us to understand the adversary’s...
TRANSCRIPT
-
1
THE
INTELLIGENCE
CYCLE
-
2
Instructional Objectives
• Identify the intelligence cycle
• Identify the collection categories
and techniques
-
3
Planning &
Direction
Phases of the Intelligence Cycle
-
4
Planning & Direction
• Identification of a need for data
• Prioritizing requirements
• Validating requirements
• Translating requirements
• Preparing collection plans
• Issuing requests for information
-
5
Collection
• Acquiring information
• Providing information to processing
and production elements
-
6
• Collection depends on secure, rapid,
redundant and reliable
communication
• Information is correlated and
forwarded for processing and
production
Collection (Cont.)
-
7
Categories of Collection
Methods
Four Primary Categories
• HUMINT (Human Intelligence)
• IMINT (Imagery Intelligence)
• SIGINT (Signals Intelligence)
• MASINT (Measurements and
Signature Intelligence)
-
8
HUMINT
Derived from or collected by
human sources.
-
9
IMINT
Imaging techniques range from
satellites systems to hand-held
cameras.
-
10
SIGINT
Intelligence derived from signals
intercept either individually or in
combination from communications,
electronic, & foreign instrumentation.
-
11
SIGINT (Cont.)
Consists of three sub-categories
COMINT
(Communications Intelligence)
Targets voice and teleprinter traffic,
video, Morse code, or facsimile.
-
12
SIGINT (Cont.)
Consists of 3 sub-categories
ELINT
(Electronic Intelligence)
Information derived from interception
and analysis of non-communications
transmissions such as radar. It
identifies the location of an emitter.
-
13
SIGINT (Cont.)
Consists of 3 sub-categories
FISINT
(Foreign Instrumentation
Signals Intelligence)
Information intercepted from telemetry
from an opponents weapons systems
as they are being tested.
-
14
MASINT
Intelligence information obtained by
quantitative and qualitative analysis
of data from technical sensors.
-
15
Collection Methods
The following are the most used
methods:
• Volunteers
• Surveillance & Surreptitious entry
• Specialized technical operations
• Classic agent recruitment
• Taskings of foreign employees of
U.S. firms
-
16
Collection Methods (Cont.)
The following are the most used
methods:
• Elicitation during international
conferences and trade fairs
• Foreign government use of private
sector organizations, front
companies and joint ventures
• Tasking of liaison officers at
government-to-government
projects
-
17
Collection Methods (Cont.)
The following are the most used
methods:
• Open source data
-- Public media
-- Environmental Impact Statements
-- Internal use documents
-- Freedom of Information Act
-- Congressional records
-
18
Collection Methods (Cont.)
Open source information is most
valued by our adversaries because:
• it is collected cheaply,
• it reveals much information, and
• involves little risk
-
19
Processing
• Conversion of collected information
into a form suitable for production
• Includes translation of intercepted
messages into written format
• Information correlated and evaluated
• Conclusions drawn
-
20
Production
• Analyzes, evaluates, interprets, and
integrates raw data and information
into finished products
• Products should be effective, timely,
and accurate
-
21
Dissemination
• Conveyance of intelligence to
consumer in usable form
• Provided in wide range of formats
--- Verbal reports
--- Written reports
--- Imagery products
--- Intelligence databases
-
22
Awareness of the Cycle
• We need to be aware of the cycle to
be cognizant of the range of threats
• Knowledge of the cycle allows us to
understand the adversary’s
collection methods and patterns
• Allows us to develop effective
countermeasures
-
23
Current Intelligence
Collection Threat
• Current threat different from the past
• A number of factors influenced this
change:
-- Information has value
-- Information more readily available
-- Availability of collection assets
-- Interconnected communications
systems
-
24
SUMMARY
• Identified the phases of the intelligence
cycle
- Planning & Direction
- Collection
- Processing
- Production
- Dissemination
• Identified collection methods
• Identified current intelligence threats
-
25
Any Questions?