Methods of Intelligence Collection and Analysis
Intelligence is one of the first lines of defense used by the United States to protect the Country against both foreign and domestic threats (Johnson, 2010). There are many ways and methods of intelligence collections employed by the intelligence community such as “spies, eavesdropping, technical sources, and openly available materials” etc (Clark, 2013). Method used also depends on many factors such as available resources, time, agency involved, and intelligence collection source. U.S Intelligence agencies use different collection and analytical method that suit their collection function, structure and pro¬cess. For example, DNI/OSC relies on open source (OSINT), CIA uses human intelligence (HUMINT) tactic, DIA uses measurements and signatures intelligence (MASINT), NSA employs signals intelligence (SIGINT), and NGA utilizes imagery intelligence (IMINT) techniques for their intelligence collections (Clark, 2013).
In most cases these INTs community compete among each other to provide needed intelligence information to policy makers to justify their budgetary allocations (Lowenthal, 2014). However, intelligence collection can be divided into five main categories referred to as “intelligence collection disciplines” or the “INTs”. These include Human Intelligence (HUMINT), Signals Intelligence
…show more content…
This method of intelligence e collection has advantage of easy accessibility of intelligence information. For instance, one can access bunch of information from browsing the World Wide Web or social media. CIA is responsible for collecting, producing, and promoting open source intelligence through its management of the DNI Open Source Center (OSC), (Central Intelligence Agency,
To accomplish its mission, the CIA engages in research, development, and deployment of high-leverage technology for intelligence purposes. As a separate agency, CIA serves as an independent source of analysis on topics of concern and also works closely with the other organizations in the Intelligence Community to ensure that the intelligence consumer—whether Washington policymaker or battlefield commander—receives the best intelligence possible.
The DNI has modestly more power than the old Directors of Central Intelligence (DCIs), but not enough to give the ODNI/AIS real clout. “Herding cats” remains a decent description of the ODNI’s basic role. The DNI has several duties and responsibilities, but for the subject of improving intelligence information sharing the focus will be directed towards: Improving Analytics, Improving Information Security, Improving Foreign Liaison Relationships, and the end state of Improving Information Sharing.
It contains various organizations and services such as International Association of Chiefs of Police (IACP), Office of Community Oriented Policing Services (COPS), Regional Information Sharing System (RISS), U.S. Drug Enforcement Administration (DEA), etc. (Peterson, 2005). In terms of intelligence, the IACP serves as a resource for police commanders and it’s website provides intelligence policies, information on training workshops, and publications. The International Association of Law Enforcement Intelligence Analysts, Inc. (IALEIA) is a non-profit organization that is comprised of over 50 countries with about 1,800 members (Peterson, 2005). The members are analysts, intelligence officers, and police managers that are dedicated to educating the police community about the benefits of intelligence and analysis (Peterson, 2005). IALEIA have also published documents pertaining to intelligence and
Intelligence is all the information gathered by a country regarding political issues, both internal and external. Intelligence is collected through spies, special agents, internet data collection, pictures and many other sources.
After World War II American intelligence had the need to be transformed. The inexperience along with bureaucracy and poor coordination among American intelligence officers obligated the United States intelligence community to change dramatically in order to confront the new challenges that emerged after the end of WWII. From Early America through WWI the intelligence system of the United States of America was involved in operations in which they had to construct intelligence systems virtually from scratch (Andrew 1995). Human intelligence was already developed, but with certain limitations and other intelligence disciplines were underdeveloped and very seldom sophisticated. After WWI America recessed and settled in a period of peace. The
Perhaps the most important change in how the federal government was reorganized after September 11th is the creation of both the Director of National Intelligence (DNI) position and the Office of the Director of National Intelligence (ODNI) in 2004 with the passage of the same IRTPA that created TSA. This concept had been first suggested in 1955 after a study by Congress then and was recommended time and again but only became a reality after the September 11th attacks drove the need for major intelligence reform home and the 9/11 Commission continued the push for the creation of such a position (ODNI, n.d., paras. 1-5). As one can see from the mission and vision of the ODNI, the importance cannot be overstated. The mission includes leading intelligence integration while having the IC produce the most insightful intelligence products possible and the vision is fully integrating the IC thus making the nation more secure (ODNI, n.d., paras. 1-2).
and ensure resilience to disasters. In order to achieve these goals, intelligence is necessary. The Office of Intelligence and Analysis, a subsection to the DHS focuses on obtaining and analyzing intelligence and puts them into the Homeland Security Enterprise which primarily
Signal Intelligence (SIGINT) consider one of essential method these day in collection. The development of technology and using electronic and transiting messages, images, and data are increasing every day in multiple locations and regions around the world. SININT has its challenges too, like OSINT and other collections discipline. Since World War I, Zimmerman telegram, World War II, Cold War, until 9/11 attacks. SIGINT always has a role in intelligence community and reports to decision makers. After 9/11 NSA increased SIGINT collection to monitor, encrypt, and follow all terrorist groups. This increased more challenges to the collection effort due to the 4th amendment, and all the act regulate the SIGINT collection discipline. "[W]hat became
Intelligence is a dependable instrument of its own to generate information that establishes the base of National Security in the United States. Intelligence has been used since the beginning of history to provide information on enemy threats and how to prevent a mass disasters. It has been used for wars, national security, military tactics, etc. Intelligence has been available since the revolutionary war and our first president George Washington and other leaders of the world have used intelligence to protect their countries. Intelligence is the dominant and the backbone of homeland Security and it is ceaseless learning about it. National Intelligence agents train tirelessly to fight and create
The United States Intelligence community draws on advanced technology and analytical techniques. An intelligence process that sets objectives, collects, analyzes, and report findings, with feedback loops integrated throughout. Explicitly, the intelligence community advantages technology and tradecraft within a proscribed process. However, estimation of threats and decision-making are outcomes of human thinking. Analysts and policymakers create mental models, or short cuts to manage complex, changing environments. In other words, to make sense of ambiguous or uncertain situations, humans form cognitive biases. Informed because of personal experience, education, and specifically applied to intelligence analysis, Davis
National intelligence estimates are defined by the U.S. Department of Defense as a "strategic estimate of the capabilities, vulnerabilities, and probable courses of action of foreign nations produced at the national level as a composite of the views of the intelligence community (belfercenter.edu). NIEs are also considered classified documents prepared for policymakers. The National Intelligence Estimate, according to the National Strategic Intelligence Act, 1994, "means the product of the process of considering and weighing the possibilities, probabilities and facts disclosed by national security intelligence with regard to any situation, and of drawing conclusions from such possibilities, probabilities and facts"(belfercenter.edu). NIE’s
HUMINT is the oldest discipline of collecting methods. To be HUMINT collector it need a significant amount of time, training, language training, and familiarize with culture of targeted area. After 9/11 and reform the intelligence community. HUMINT collection is become essential to support all the other collected intelligence like SIGINT, GEOINT, MASINT, without HUMINT, no analyst can put the pieces together for any intelligence subject or target. " The lack of HUMINT in intelligence operations leaves analysts staring at pictures, frantically searching through communications, reading newspapers, and measuring emissions to ascertain what is going on. HUMINT gives operations valuable direction by uncovering intentions and capabilities to corroborate
Data can be collected through human sources, satellites, wiretapping, signals, and internet traffic. However, intelligence organizations must be in compliance with the law to ensure that they are not illegally collecting information (Chesney, 2012). Collection occurs because a threat is likely to occur or agencies are trying to find out what information our foreign adversaries possess about the nation’s assets. Intelligence collection occurs in both domestic and foreign territories. Intelligence agencies collect information about foreign adversaries in order to exploit their weaknesses or vulnerabilities (Gentry, 2008). Furthermore, government agencies and political leaders want to discover which of the nation’s assets are seen as vulnerable to the enemy (Gentry, 2008).
Counterintelligence (CI) involves actions aimed at protecting the United States against foreign intelligence operations and espionage from penetration and disruption by hostile nations or their intelligence services (Lowenthal, 2014). Three main components of Counterintelligence include collection, defensive and offensive. The collection is the ability to gather intelligence information about rivalry capabilities against own nation; defensive part of CI involves measures to prevent and thwart other nations ' attempts to penetrate into own nation 's intelligence system; while an offensive aspect deal with running double agents to penetrate, manipulate, exploit, and control targeted adversaries. CI is said to be the most essential aspect of the intelligence disciplines, in the sense that it helps in collecting vast quantities of secret information and produce an excellent analysis of intelligence, although, ineffective counterintelligence measures may diminish confidence in the final results (Van Cleave, 2013).
Open Source Intelligences (OSINT) has been an unofficial source of intelligence for many years dating back before WWII, through the Cold War, and into present times. In 2005 the DNI Open Source Center was created to supervise and organize the formal creation of OSINT within the IC. Their mission was to, “we apply our expertise in searching, acquiring and analyzing the world’s publicly available information to inform and enable those who make US policy and defend our nation” (Hamilton) It wasn’t until 2007 that OSINT was officially recognized. On July 16-17 2007, the Inaugural DNI Open Source Conference was held that formally announced OSINT into the Intelligence Community (IC). This conference was the first to ever be open to the public in the entire history of the IC. According to Michael Taylor, “Open Source intelligence, provides