This article is written like a personal reflection, personal essay, or argumentative essay that states a Wikipedia editor's personal feelings or presents an original argument about a topic.(February 2015) |
This article needs additional citations for verification .(September 2023) |
Failure in the intelligence cycle or intelligence failure, is the outcome of the inadequacies within the intelligence cycle. The intelligence cycle itself consists of six steps that are constantly in motion: requirements, collection, processing and exploitation, analysis and production, dissemination and consumption, and feedback. [1]
also could be fail to intercept
The collection of intelligence is through five methods: Human Intelligence (HUMINT), Signals Intelligence (SIGINT), Image Intelligence (IMINT), Open Source Intelligence (OSINT), and Measures and Signature Intelligence (MASINT). [2] It is common to rely on technology when performing collection, however it can fail and cause more problems than it solves. [3]
Signals intelligence is the information collected via the interception of signals. It can further divided into Communications Intelligence (COMINT), Electronic Intelligence (ELINT), Telemetry Intelligence (TELINT), and Radar Transmitters (RADINT). [4] While these systems have their strengths, such as the ability to intercept communication or to gain information about weapons systems, they also have their weaknesses.
Gaining accurate communications intelligence can be achieved, but more often than not, the adversary will not communicate in such a way that would allow the information to be intercepted easily. The classic case of communications intelligence failure is Operation Gold during the Cold War in which the Central Intelligence Agency and the British Secret Intelligence Service planned to tap landline communications to the Soviet Army headquarters in Berlin. The Soviets were alerted to the plan by a mole within the SIS but allowed the operation to go forward. The information that was given out via the tap was disinformation by the Soviets. That led to a failure in the intelligence itself.
Another setback in communication intelligence is code-breaking. That falls into two categories: verbal codes and transmitted codes. For an analyst listening to an intercepted phone call, the process of gaining information may seem simple. However, the situation becomes complicated when the individuals begin to use "slang" or colloquialisms in their conversation. What seems like a harmless conversation could prove dangerous. Furthermore, the calls themselves may be encrypted as well, further complicating the problem. Also, there is the issue of transmitted information being encoded. Lowenthal states in collection portion of his book that codebreakers like to boast that any code that can be created can be solved, [5] but the public has access to increasingly stronger cipher programs now [6] and those programs are harder to break.
These three "ints" relate to each other and separate discussion of them would be pointless. Simple procedures can be taken to reduce the chances of information being received by a gathering method. As was mentioned before with communication, test data or telemetry data can be encoded before it is sent. It can also be encapsulated and released for pick up. [5]
Imagery intelligence refers to information gathered by planes, unmanned aerial vehicles (UAV), and satellites.
Causes of failures to gain intelligence via satellites included meteorological and human.
Matters of weather play a large role in IMINT failure. Radar imaging can see through clouds, but it is unlikely that a general satellite sweep could find something buried under a few feet of snow or in a frozen lake. [7] Another problem with satellite imagery is that it is a simple snapshot in time. If the satellite that captures the image is not in a geo-synchronous orbit, there is a risk of the target not being there when the satellite passes over the area again.
There is also the possibility of camouflage. For example, the entrance to an underground bunker may be camouflaged with foliage, and it would take an arduous examination of the image to find the information that is needed.
Another potential failure is a satellite being unavailable when it is needed because it is being used for other intelligence purposes, which causes the situation or event of interest to be missed. Images can also be misinterpreted and misleading information and potentially support a bad decision.
Airplanes and UAVs can respond more quickly to requests for data collection than satellites and have fewer issues of failure, but their failures tend to be greater in magnitude. If airplanes and UAVs are sent to the wrong destination, it is unlikely that the information will be collected. If the aircraft is destroyed during the mission, unless information was being transmitted at the time, its data is lost.
Open source information is derived from newspapers, journals, radio and television, and the Internet. [8] There is a growing emphasis on the use of OSINT however, there are several points where collection via OSINT can fail.
Source reliability is one of the major points that hinders collection with this method. Reading the paper of country in which a dictator<s government runs the media is unlikely to lead to an unbiased account of the facts. The same thing applies to use of the internet to gain information. Censorship controls over the internet in some countries limit the amount of information that is made available.
From the standpoint of the analyst themselves, there are also issues regarding the use of OSINT. Most individuals scan a webpage for the information they need, and if it is not there, they move on. That transfers to the analytic community as well. Secondly, it is difficult for an analyst to get information via the internet when most analysts lack the use of the internet in their agencies. Thirdly, the volume of data alone is often too much for an analyst to sift through causing important knowledge to slip by. [8]
Measurement and Signature Intelligence (MASINT) is scientific and technical intelligence information obtained by quantitative and qualitative analysis of data (metric, angle, spatial, wavelength, time dependence, modulation, plasma, and hydromagnetic) derived from specific technical sensors for the purpose of identifying any distinctive features associated with the source, emitter, or sender and to facilitate subsequent identification and/or measurement of the same. [9]
MASINT is hardly understood by most analysts or the decision-makers who look at it, which is in itself is one of its major drawbacks. It also suffers from finance issues because of the expensive nature of the items needed to do the actual collection itself. Also, its exploitation and analysis often take longer because highly-trained analysts are needed to examine the information.
Processing and exploitation involves converting the vast amount of information collected to a form usable by analysts. This is done through a variety of methods including decryption, language translation, and data reduction. Processing includes the entering of raw data into databases where it can be exploited for use in the analysis process. [10]
The problem within this step of the process is that there is often too much information but there are too few analysts to process it. That leads to large amounts of information that was collected never being utilized because they do not meet the exact needs for the collection requirement. Thus, important data may be cast aside and never used even if it may be relevant again later.
Analysts are the voice of the intelligence community. [11] Therefore, the analysis that they perform is expected to be accurate on a regular basis. Failure in analysis can be approached from two points of view: the tactical/operational point of view and the analysts point of view.
A problem occurs at current issues are looked at as opposed to long-term issues. Ideally, the tasking should be 50/50 so that no type of issue gets more analysis than the other. In an ever-changing world, there is a tendency to place more emphasis on tactical/current issues. That hinders the operational and long-term issues by putting analysis of them off in favor of current issues.
The tasking itself is not the only way in which analysis can fail. The human component of analysis is just as important. One of the leading causes of analyst failure is cognitive biases, mental errors that are caused by our simplified information processing strategies. In other words, cognitive biases result not from any emotional or intellectual predisposition toward a certain judgment but rather from subconscious mental procedures for processing information. [12] Those biases can occur not only with a single analyst but also with an entire office of them, which leads to a biased form of "groupthink."
Other forms of bias such as cultural, organizational, or bias from the analysts self-interest and need to succeed. The need to succeed coupled with the level of competition within the community to get their analysis on the desk of a top decision maker. Another point of failure is with the training of the analysts or the lack of. The Iraq Intelligence Commission found that a lack of analysts with the proper scientific or technological training who are needed to perform proper analysis contributed to a failure of analysis. [11]
When the decision-maker receives a report from an analyst and reviews it, that process is referred to as dissemination and consumption. In the intelligence community, there are several types of documents that get disseminated regularly. For example, the President's Daily Brief (PDB) is a document that is disseminated to the president of the United States on a daily basis and includes the recent information on important matters. The goal of dissemination is simple, get the information that is relevant to the decision maker in a timely fashion while being accurate.
Perhaps the greatest failure in dissemination of information is the failure to get the information to the proper decision-maker. A report on crop futures in Burkina Faso would not be of interest to the Secretary of Education for example.
Another issue to consider for the crop report would be if it is important enough to report. If the information does not meet a certain requirement there is a chance that it will not be reported. However, if it is important enough to report, the question is how quickly it should be reported.
If the information is time-sensitive but is not disseminated in enough time to have the desired effect, the process will fail. Compartmentalization in the isolation of planners from flow of intelligence or the invocation of need to know among analysts strongly contributes to failures in dissemination.
Feedback is the last step in the intelligence process. The goal of the feedback part of the cycle is to give feedback to the analysts about the quality of the product that was produced.
The main failure in feedback is when the decision maker-fails to offer it to the analyst. It is possible for there to be feedback failure even if feedback is offered. That occurs when the decision-makers fail to get the feedback to the analyst in a timely order, which would assist in the production of the next report to them.
Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of signals, whether communications between people or from electronic signals not directly used in communication. As classified and sensitive information is usually encrypted, signals intelligence may necessarily involve cryptanalysis. Traffic analysis—the study of who is signaling to whom and in what quantity—is also used to integrate information, and it may complement cryptanalysis.
Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions. This aim is achieved by providing an assessment of data from a range of sources, directed towards the commanders' mission requirements or responding to questions as part of operational or campaign planning. To provide an analysis, the commander's information requirements are first identified, which are then incorporated into intelligence collection, analysis, and dissemination.
Open source intelligence (OSINT) is the collection and analysis of data gathered from open sources to produce actionable intelligence. OSINT is primarily used in national security, law enforcement, and business intelligence functions and is of value to analysts who use non-sensitive intelligence in answering classified, unclassified, or proprietary intelligence requirements across the previous intelligence disciplines.
Measurement and signature intelligence (MASINT) is a technical branch of intelligence gathering, which serves to detect, track, identify or describe the distinctive characteristics (signatures) of fixed or dynamic target sources. This often includes radar intelligence, acoustic intelligence, nuclear intelligence, and chemical and biological intelligence. MASINT is defined as scientific and technical intelligence derived from the analysis of data obtained from sensing instruments for the purpose of identifying any distinctive features associated with the source, emitter or sender, to facilitate the latter's measurement and identification.
Intelligence officer is a person with corresponding Academic Degree in Crime Laboratory, Specifically in Logical and Theory of lnvestigation, Trained in PARA Military Tactics, Warfares and Police Manuevering. Field Operations, employed of Government Organization or Non-Governmental Organization worldwide.
The intelligence cycle is an idealized model of how intelligence is processed in civilian and military intelligence agencies, and law enforcement organizations. It is a closed path consisting of repeating nodes, which will result in finished intelligence. The stages of the intelligence cycle include the issuance of requirements by decision makers, collection, processing, analysis, and publication of intelligence. The circuit is completed when decision makers provide feedback and revised requirements. The intelligence cycle is also called intelligence process by the U.S. Department of Defense (DoD) and the uniformed services.
In the United States, geospatial intelligence (GEOINT) is intelligence about the human activity on Earth derived from the exploitation and analysis of imagery, signals, or signatures with geospatial information. GEOINT describes, assesses, and visually depicts physical features and geographically referenced activities on the Earth. GEOINT, as defined in US Code, consists of imagery, imagery intelligence (IMINT) and geospatial information.
Intelligence analysis is the application of individual and collective cognitive methods to weigh data and test hypotheses within a secret socio-cultural context. The descriptions are drawn from what may only be available in the form of deliberately deceptive information; the analyst must correlate the similarities among deceptions and extract a common truth. Although its practice is found in its purest form inside national intelligence agencies, its methods are also applicable in fields such as business intelligence or competitive intelligence.
Signals intelligence operational platforms are employed by nations to collect signals intelligence, which is intelligence-gathering by interception of signals, whether between people or between machines, or mixtures of the two. As sensitive information is often encrypted, signals intelligence often involves the use of cryptanalysis. However, traffic analysis—the study of who is signalling whom and in what quantity—can often produce valuable information, even when the messages themselves cannot be decrypted.
Intelligence collection management is the process of managing and organizing the collection of intelligence from various sources. The collection department of an intelligence organization may attempt basic validation of what it collects, but is not supposed to analyze its significance. There is debate in U.S. intelligence community on the difference between validation and analysis, where the National Security Agency may try to interpret information when such interpretation is the job of another agency.
Intelligence cycle management refers to the overall activity of guiding the intelligence cycle, which is a set of processes used to provide decision-useful information (intelligence) to leaders. The cycle consists of several processes, including planning and direction, collection, processing and exploitation, analysis and production, and dissemination and integration. The related field of counterintelligence is tasked with impeding the intelligence efforts of others. Intelligence organizations are not infallible but, when properly managed and tasked, can be among the most valuable tools of management and government.
Intelligence Analysis Management is the process of managing and organizing the analytical processing of raw intelligence information. The terms "analysis", "production", and "processing" denote the organization and evaluation of raw information used in a phase informally called "connecting the dots", thus creating an "intelligence mosaic". The information may result in multiple analytic products, each with different security classifications, time scales, and levels of detail. Intelligence analysis goes back to the beginning of history. Sherman Kent is often considered the father of modern intelligence analysis. His writings include a 1947 book, Strategic Intelligence for American World Policy.
The United States Intelligence Community A-Space, or Analytic Space, is a project started in 2007 from the Office of the Director of National Intelligence's (ODNI) Office of Analytic Transformation and Technology to develop a common collaborative workspace for all analysts from the USIC. It is accessible from common workstations and provides unprecedented access to interagency databases, a capability to search classified and unclassified sources simultaneously, web-based messaging, and collaboration tools. The Defense Intelligence Agency (DIA) is the executive agent for building the first phase of A-Space. Initial operational capability was scheduled for December 2007. A-Space went live on the government's classified Joint Worldwide Intelligence Communications System 22 September 2008. A-Space is built on Jive Software's Clearspace application.
The target-centric approach to intelligence is a method of intelligence analysis that Robert M. Clark introduced in his book "Intelligence Analysis: A Target-Centric Approach" in 2003 to offer an alternative methodology to the traditional intelligence cycle. Its goal is to redefine the intelligence process in such a way that all of the parts of the intelligence cycle come together as a network. It is a collaborative process where collectors, analysts and customers are integral, and information does not always flow linearly.
Geographic information systems (GIS) play a constantly evolving role in geospatial intelligence (GEOINT) and United States national security. These technologies allow a user to efficiently manage, analyze, and produce geospatial data, to combine GEOINT with other forms of intelligence collection, and to perform highly developed analysis and visual production of geospatial data. Therefore, GIS produces up-to-date and more reliable GEOINT to reduce uncertainty for a decisionmaker. Since GIS programs are Web-enabled, a user can constantly work with a decision maker to solve their GEOINT and national security related problems from anywhere in the world. There are many types of GIS software used in GEOINT and national security, such as Google Earth, ERDAS IMAGINE, GeoNetwork opensource, and Esri ArcGIS.
Target analysis is an examination of potential targets to determine military importance, priority of attack, and weapons required to obtain a desired level of damage or casualties. The Central Intelligence Agency defines it as, "network analysis techniques and specialized analytical tools to identify and detail key figures and organizations who may pose a threat to US interests."
The Defence Intelligence Fusion Centre (DIFC) is based at RAF Wyton in Cambridgeshire. Largely created from the staff of the National Imagery Exploitation Centre and then known for several years as the Defence Geospatial Intelligence Fusion Centre, it can trace its history back to clandestine reconnaissance operations at the beginning of the Second World War by Sydney Cotton on behalf of MI6 and then MI4, and the formation of the Allied Central Interpretation Unit at RAF Medmenham.
Raw intelligence is raw data gathered by an intelligence operation, such as espionage or signal interception. Such data commonly requires processing and analysis to make it useful and reliable. To turn the raw intelligence into a finished form, the steps required may include decryption, translation, collation, evaluation and confirmation.
All-source intelligence is a term used to describe intelligence organizations, intelligence analysts, or intelligence products that are based on all available sources of intelligence collection information.
{{cite journal}}
: Cite journal requires |journal=
(help)