Intelligence assessment

Last updated

Intelligence assessment, or simply intel, is the development of behavior forecasts or recommended courses of action to the leadership of an organisation, based on wide ranges of available overt and covert information (intelligence). Assessments develop in response to leadership declaration requirements to inform decision-making. Assessment may be executed on behalf of a state, military or commercial organisation with ranges of information sources available to each.

Contents

An intelligence assessment reviews available information and previous assessments for relevance and currency. Where there requires additional information, the analyst may direct some collection.

Intelligence studies is the academic field concerning intelligence assessment, especially relating to international relations and military science.

Process

The intelligence cycle Intelligence Cycle.jpg
The intelligence cycle

Intelligence assessment is based on a customer requirement or need, which may be a standing requirement or tailored to a specific circumstance or a Request for Information (RFI). The "requirement" is passed to the assessing agency and worked through the intelligence cycle, a structured method for responding to the RFI.

The RFI may indicate in what format the requester prefers to consume the product.

The RFI is reviewed by a Requirements Manager, who will then direct appropriate tasks to respond to the request. This will involve a review of existing material, the tasking of new analytical product or the collection of new information to inform an analysis.

New information may be collected through one or more of the various collection disciplines; human source, electronic and communications intercept, imagery or open sources. The nature of the RFI and the urgency placed on it may indicate that some collection types are unsuitable due to the time taken to collect or validate the information gathered. Intelligence gathering disciplines and the sources and methods used are often highly classified and compartmentalised, with analysts requiring an appropriate high level of security clearance.

The process of taking known information about situations and entities of importance to the RFI, characterizing what is known and attempting to forecast future events is termed "all source" assessment, analysis or processing. The analyst uses multiple sources to mutually corroborate, or exclude, the information collected, reaching a conclusion along with a measure of confidence around that conclusion.

Where sufficient current information already exists, the analysis may be tasked directly without reference to further collection.

The analysis is then communicated back to the requester in the format directed, although subject to the constraints on both the RFI and the methods used in the analysis, the format may be made available for other uses as well and disseminated accordingly. The analysis will be written to a defined classification level with alternative versions potentially available at a number of classification levels for further dissemination.

Target-centric intelligence cycle

Target-centric intelligence cycle Target centric intelligence cycle.jpg
Target-centric intelligence cycle

This approach, known as Find-Fix-Finish-Exploit-Assess (F3EA), [1] is complementary to the intelligence cycle and focused on the intervention itself, where the subject of the assessment is clearly identifiable and provisions exist to make some form of intervention against that subject, the target-centric assessment approach may be used.

The subject for action, or target, is identified and efforts are initially made to find the target for further development. This activity will identify where intervention against the target will have the most beneficial effects.

When the decision is made to intervene, action is taken to fix the target, confirming that the intervention will have a high probability of success and restricting the ability of the target to take independent action.

During the finish stage, the intervention is executed, potentially an arrest or detention or the placement of other collection methods.

Following the intervention, exploitation of the target is carried out, which may lead to further refinement of the process for related targets. The output from the exploit stage will also be passed into other intelligence assessment activities.

Intelligence Information Cycle Theory

The Intelligence Information Cycle leverages secrecy theory and U.S. regulation of classified intelligence to re-conceptualize the traditional intelligence cycle under the following four assumptions:

  1. Intelligence is secret information
  2. Intelligence is a public good
  3. Intelligence moves cyclically
  4. Intelligence is hoarded

Information is transformed from privately held to secretly held to public based on who has control over it. For example, the private information of a source becomes secret information (intelligence) when control over its dissemination is shared with an intelligence officer, and then becomes public information when the intelligence officer further disseminates it to the public by any number of means, including formal reporting, threat warning, and others. The fourth assumption, intelligence is hoarded, causes conflict points where information transitions from one type to another. The first conflict point, collection, occurs when private transitions to secret information (intelligence). The second conflict point, dissemination, occurs when secret transitions to public information. Thus, conceiving of intelligence using these assumptions demonstrates the cause of collection techniques (to ease the private-secret transition) and dissemination conflicts, and can inform ethical standards of conduct among all agents in the intelligence process. [2] [3]

See also

Related Research Articles

<span class="mw-page-title-main">Espionage</span> Clandestine acquisition of confidential information

Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence). A person who commits espionage is called an espionage agent or spy. Any individual or spy ring, in the service of a government, company, criminal organization, or independent operation, can commit espionage. The practice is clandestine, as it is by definition unwelcome. In some circumstances, it may be a legal tool of law enforcement and in others, it may be illegal and punishable by law.

<span class="mw-page-title-main">Intelligence agency</span> Agency dealing with secret intelligence

An intelligence agency is a government agency responsible for the collection, analysis, and exploitation of information in support of law enforcement, national security, military, public safety, and foreign policy objectives.

<span class="mw-page-title-main">Military intelligence</span> Information about military opponents

Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions. This aim is achieved by providing an assessment of data from a range of sources, directed towards the commanders' mission requirements or responding to questions as part of operational or campaign planning. To provide an analysis, the commander's information requirements are first identified, which are then incorporated into intelligence collection, analysis, and dissemination.

<span class="mw-page-title-main">Cold War espionage</span> Aspect of the Cold War

Cold War espionage describes the intelligence gathering activities during the Cold War between the Western allies and the Eastern Bloc. Both relied on a wide variety of military and civilian agencies in this pursuit.

The Venona project was a United States counterintelligence program initiated during World War II by the United States Army's Signal Intelligence Service and later absorbed by the National Security Agency (NSA), that ran from February 1, 1943, until October 1, 1980. It was intended to decrypt messages transmitted by the intelligence agencies of the Soviet Union. Initiated when the Soviet Union was an ally of the US, the program continued during the Cold War, when the Soviet Union was considered an enemy.

<span class="mw-page-title-main">Aldrich Ames</span> CIA analyst and Soviet spy (born 1941)

Aldrich Hazen Ames is an American former CIA counterintelligence officer who was convicted of espionage on behalf of the Soviet Union and Russia in 1994. He is serving a life sentence, without the possibility of parole, in the Federal Correctional Institution in Terre Haute, Indiana. Ames was known to have compromised more highly classified CIA assets than any other officer until Robert Hanssen, who was arrested seven years later in 2001.

<span class="mw-page-title-main">Counterintelligence</span> Offensive measures using enemy information

Counterintelligence (counter-intelligence) or counterespionage (counter-espionage) is any activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or other intelligence activities conducted by, for, or on behalf of foreign powers, organizations or persons.

<span class="mw-page-title-main">Oleg Gordievsky</span> Former colonel of the KGB (born 1938)

Oleg Antonovich Gordievsky, CMG is a former colonel of the KGB who became KGB resident-designate (rezident) and bureau chief in London. He was a double agent, providing information to the British Secret Intelligence Service (MI6) from 1974 to 1985. After being recalled to Moscow under suspicion, he was exfiltrated from the Soviet Union in July 1985 under a plan code-named Operation Pimlico. The Soviet Union subsequently sentenced him to death in absentia.

<span class="mw-page-title-main">Operation Gold</span> US/UK intelligence-gathering operation

Operation Gold was a joint operation conducted by the American Central Intelligence Agency (CIA) and the British MI6 Secret Intelligence Service (SIS) in the 1950s to tap into landline communication of the Soviet Army headquarters in Berlin using a tunnel into the Soviet-occupied zone. This was a much more complex variation of the earlier Operation Silver project in Vienna.

<span class="mw-page-title-main">Foreign Intelligence Service (Russia)</span> Russias primary external intelligence agency

The Foreign Intelligence Service of the Russian Federation or SVR RF is Russia's external intelligence agency, focusing mainly on civilian affairs. The SVR RF succeeded the First Chief Directorate (PGU) of the KGB in December 1991. The SVR has its headquarters in the Yasenevo District of Moscow.

<span class="mw-page-title-main">Oleg Penkovsky</span> British spy in the USSR (1919–1963)

Oleg Vladimirovich Penkovsky, codenamed Hero and Yoga was a Soviet military intelligence (GRU) colonel during the late 1950s and early 1960s. Penkovsky informed the United States and the United Kingdom about Soviet military secrets, most importantly, the appearance and footprint of Soviet intermediate-range ballistic missile installations and the weakness of the Soviet intercontinental ballistic missile program. This information was decisive in allowing the US to recognize that the Soviets were placing missiles in Cuba before most of them were operational. It also gave US President John F. Kennedy, during the Cuban Missile Crisis that followed, valuable information about Soviet weakness that allowed him to face down Soviet leader Nikita Khrushchev and resolve the crisis without a nuclear war.

<span class="mw-page-title-main">Finnish Security Intelligence Service</span> National security and intelligence agency of Finland

The Finnish Security Intelligence Service, formerly the Finnish Security Police, is the security and intelligence agency of Finland in charge of national security, such as counter-intelligence and counter-terrorism, under the jurisdiction of the Ministry of the Interior. The agency had a distinct role during the Cold War in monitoring communists as well as in the balance between Finnish independence and Soviet appeasement. After the 1990s, Supo has focused more on countering terrorism and in the 2010s, on preventing hybrid operations.

As early as the 1920s, the Soviet Union, through its GRU, OGPU, NKVD, and KGB intelligence agencies, used Russian and foreign-born nationals, as well as Communists of American origin, to perform espionage activities in the United States, forming various spy rings. Particularly during the 1940s, some of these espionage networks had contact with various U.S. government agencies. These Soviet espionage networks illegally transmitted confidential information to Moscow, such as information on the development of the atomic bomb. Soviet spies also participated in propaganda and disinformation operations, known as active measures, and attempted to sabotage diplomatic relationships between the U.S. and its allies.

The intelligence cycle is an idealized model of how intelligence is processed in civilian and military intelligence agencies, and law enforcement organizations. It is a closed path consisting of repeating nodes, which will result in finished intelligence. The stages of the intelligence cycle include the issuance of requirements by decision makers, collection, processing, analysis, and publication of intelligence. The circuit is completed when decision makers provide feedback and revised requirements. The intelligence cycle is also called intelligence process by the U.S. Department of Defense (DoD) and the uniformed services.

CovertAction Quarterly was an American journal in publication from 1978 to 2005, focused primarily on watching and reporting global covert operations. It is generally critical of US Foreign Policy, the Central Intelligence Agency, and capitalism. CovertAction relaunched in May 2018 as CovertAction Magazine.

Intelligence cycle management refers to the overall activity of guiding the intelligence cycle, which is a set of processes used to provide decision-useful information (intelligence) to leaders. The cycle consists of several processes, including planning and direction, collection, processing and exploitation, analysis and production, and dissemination and integration. The related field of counterintelligence is tasked with impeding the intelligence efforts of others. Intelligence organizations are not infallible but, when properly managed and tasked, can be among the most valuable tools of management and government.

Clandestine HUMINT asset recruiting refers to the recruitment of human agents, commonly known as spies, who work for a foreign government, or within a host country's government or other target of intelligence interest for the gathering of human intelligence. The work of detecting and "doubling" spies who betray their oaths to work on behalf of a foreign intelligence agency is an important part of counterintelligence.

Technical Intelligence (TECHINT) is intelligence about weapons and equipment used by the armed forces of foreign nations. The related term, scientific and technical intelligence, addresses information collected or analyzed about the broad range of foreign science, technology, and weapon systems.

Russian espionage in the United States has occurred since at least the Cold War, and likely well before. According to the United States government, by 2007 it had reached Cold War levels.

<span class="mw-page-title-main">History of espionage</span>

Spying, as well as other intelligence assessment, has existed since ancient history. In the 1980s scholars characterized foreign intelligence as "the missing dimension" of historical scholarship." Since then a largely popular and scholarly literature has emerged. Special attention has been paid to World War II, as well as the Cold War era (1947–1989) that was a favorite for novelists and filmmakers.

References

  1. Jeremy Scahill (October 15, 2015). "Find, Fix, Finish". The Intercept_. Retrieved October 30, 2016.
  2. Stottlemyre, Steven (2022). "Reconceptualizing Intelligence after Benghazi". doi:10.13140/RG.2.2.19732.99204.{{cite journal}}: Cite journal requires |journal= (help)
  3. Stottlemyre, Steven (2021). "The United States Intelligence Community, Secrecy and the 'Steele Dossier': Reconceptualizing the Intelligence Process". Journal of European and American Intelligence Studies. 4 (2): 11–28.

Further reading

Surveys
World War I
World War II
1931–1945
Cold War Era
1945–1991