Raw intelligence

Last updated
The Zimmerman telegram which was sent by Arthur Zimmermann, proposing an alliance between Germany and Mexico in the First World War. When intercepted by the British, this raw intelligence required decryption, translation and confirmation and then was still just part of the overall case made for US entry into the conflict. Zimmermann Telegram as Received by the German Ambassador to Mexico - NARA - 302025.jpg
The Zimmerman telegram which was sent by Arthur Zimmermann, proposing an alliance between Germany and Mexico in the First World War. When intercepted by the British, this raw intelligence required decryption, translation and confirmation and then was still just part of the overall case made for US entry into the conflict.

Raw intelligence is raw data gathered by an intelligence operation, such as espionage or signal interception. Such data commonly requires processing and analysis to make it useful and reliable. To turn the raw intelligence into a finished form, the steps required may include decryption, translation, collation, evaluation and confirmation. [2] [3] [4]

In the period after the First World War, British practise was to circulate raw intelligence with little analysis or context. [5] Such direct intelligence was a strong influence on policy-makers. [5] Churchill was especially keen to see raw intelligence and was supplied this by Desmond Morton during his period outside the government. [6] When Churchill became Prime Minister in 1940, he still insisted on receiving raw intelligence and wanted it all until it was explained that the volume was now too great. [6] A selection of daily intercepts was provided to him each day by Bletchley Park and he called these his "golden eggs". [6]

US intelligence has a different tradition from the British. The key event for the US was the failure to prevent the attack on Pearl Harbor and the inquiries which followed concluded that this was not due to the lack of raw intelligence so much as the failure to make effective use of it. The Central Intelligence Agency was created to collate, analyse and summarise the raw intelligence collected by the other departments. US agencies which focus on the collection of raw intelligence include the National Reconnaissance Office and the National Security Agency. [7]

See also

Related Research Articles

<span class="mw-page-title-main">ECHELON</span> Signals intelligence collection and analysis network

ECHELON (Also known as Echelont), originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement: Australia, Canada, New Zealand, the United Kingdom and the United States, also known as the Five Eyes.

<span class="mw-page-title-main">National Security Agency</span> U.S. signals intelligence organization

The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for global intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The NSA has roughly 32,000 employees.

<span class="mw-page-title-main">Signals intelligence</span> Intelligence-gathering by interception of signals

Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of signals, whether communications between people or from electronic signals not directly used in communication. As classified and sensitive information is usually encrypted, signals intelligence may necessarily involve cryptanalysis. Traffic analysis—the study of who is signaling to whom and in what quantity—is also used to integrate information, and it may complement cryptanalysis.

<span class="mw-page-title-main">Counterterrorism</span> Activity to defend against or prevent terrorist actions

Counterterrorism, also known as anti-terrorism, relates to the practices, military tactics, techniques, and strategies that governments, law enforcement, businesses, and intelligence agencies use to combat or eliminate terrorism and violent extremism.

<span class="mw-page-title-main">Military intelligence</span> Information about military opponents

Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions. This aim is achieved by providing an assessment of data from a range of sources, directed towards the commanders' mission requirements or responding to questions as part of operational or campaign planning. To provide an analysis, the commander's information requirements are first identified, which are then incorporated into intelligence collection, analysis, and dissemination.

<span class="mw-page-title-main">Counterintelligence</span> Offensive measures using enemy information

Counterintelligence (counter-intelligence) or counterespionage (counter-espionage) is any activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or other intelligence activities conducted by, for, or on behalf of foreign powers, organizations or persons.

Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted. In general, the greater the number of messages observed, the greater information be inferred. Traffic analysis can be performed in the context of military intelligence, counter-intelligence, or pattern-of-life analysis, and is also a concern in computer security.

<span class="mw-page-title-main">United States Intelligence Community</span> Collective term for US federal intelligence and security agencies

The United States Intelligence Community (IC) is a group of separate U.S. federal government intelligence agencies and subordinate organizations that work both separately and collectively to conduct intelligence activities which support the foreign policy and national security interests of the United States. Member organizations of the IC include intelligence agencies, military intelligence, and civilian intelligence and analysis offices within federal executive departments.

Intelligence analysis is the application of individual and collective cognitive methods to weigh data and test hypotheses within a secret socio-cultural context. The descriptions are drawn from what may only be available in the form of deliberately deceptive information; the analyst must correlate the similarities among deceptions and extract a common truth. Although its practice is found in its purest form inside national intelligence agencies, its methods are also applicable in fields such as business intelligence or competitive intelligence.

In intelligence gathering, stovepiping is the presentation of information without proper context. It can be caused by the specialized nature or security requirements of a particular intelligence-collection technology. Alternatively, the lack of context may come from a particular group in the national policy structure that chooses to present only information that supports certain conclusions. An example would be how money funded for research is not evenly allocated but instead goes toward one specific ailment remedy.

Signals intelligence by alliances, nations and industries comprises signals intelligence (SIGINT) gathering activities by national and non-national entities; these entities are commonly responsible for communications security (COMSEC) as well.

Intelligence cycle management refers to the overall activity of guiding the intelligence cycle, which is a set of processes used to provide decision-useful information (intelligence) to leaders. The cycle consists of several processes, including planning and direction, collection, processing and exploitation, analysis and production, and dissemination and integration. The related field of counterintelligence is tasked with impeding the intelligence efforts of others. Intelligence organizations are not infallible but, when properly managed and tasked, can be among the most valuable tools of management and government.

Intelligence Analysis Management is the process of managing and organizing the analytical processing of raw intelligence information. The terms "analysis", "production", and "processing" denote the organization and evaluation of raw information used in a phase informally called "connecting the dots", thus creating an "intelligence mosaic". The information may result in multiple analytic products, each with different security classifications, time scales, and levels of detail. Intelligence analysis goes back to the beginning of history. Sherman Kent is often considered the father of modern intelligence analysis. His writings include a 1947 book, Strategic Intelligence for American World Policy.

Intelligence dissemination management is a maxim of intelligence arguing that intelligence agencies advise policymakers instead of shaping policy. Due to the necessity of quick decision-making in periods of crisis, intelligence analysts may suggest possible actions, including a prediction of the consequences of each decision. Intelligence consumers and providers still struggle with the balance of what drives information flow. Dissemination is the part of the intelligence cycle that delivers products to consumers, and intelligence dissemination management refers to the process that encompasses organizing the dissemination of the finished intelligence.

National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there are a wide range of potential threats, so threat assessment, if complete, is a complex task. Governments try to protect three things:

Failure in the intelligence cycle or intelligence failure, is the outcome of the inadequacies within the intelligence cycle. The intelligence cycle itself consists of six steps that are constantly in motion: requirements, collection, processing and exploitation, analysis and production, dissemination and consumption, and feedback.

The Central Intelligence Agency (CIA) is a United States intelligence agency that "provides objective intelligence on foreign countries." The CIA is also informally known as the Agency, or historically informally referred to simply as "the Company". The CIA is part of the United States Intelligence Community, is organized into numerous divisions. The divisions include directors, deputy directors, and offices. The CIA board is made up of five distinct entitles called Directorates. The CIA is overseen by the Director of Central Intelligence. Under the Director of Central Intelligence is the Deputy Director of Central Intelligence. Under this the CIA is divided into four directorates. These directorates are as follows:

<span class="mw-page-title-main">United States Air Force Security Service</span> Former signals intelligence service of the US Air Force

Initially established as the Air Force (USAF) Security Group in June, 1948, the USAF Security Service (USAFSS) was activated as a major command on 20 October 1948.

Cyber threat intelligence (CTI) is a subfield of cybersecurity that focuses on the structured collection, analysis, and dissemination of data regarding potential or existing cyber threats. It provides organizations with the insights necessary to anticipate, prevent, and respond to cyberattacks by understanding the behavior of threat actors, their tactics, and the vulnerabilities they exploit. Cyber threat intelligence sources include open source intelligence, social media intelligence, human Intelligence, technical intelligence, device log files, forensically acquired data or intelligence from the internet traffic and data derived for the deep and dark web.

References

  1. Clark, J. Ransom (2007), "Intelligence and National Security: A Reference Handbook", Contemporary Military, Strategic, and Security Issues, Greenwood: 47, ISBN   9780275992989, ISSN   1932-295X
  2. "Intelligence Branch". fbi.gov . Raw intelligence is often referred to as "the dots"—individual pieces of information disseminated individually. Finished intelligence reports "connect the dots" by putting information in context and drawing conclusions about its implications.
  3. Phythian, Mark (18 July 2013). Understanding the Intelligence Cycle. Routledge. ISBN   978-1136765919. Raw intelligence reports generally include what the collector thinks the analyst needs to know from the source; however, processing the raw intelligence often throws up gaps, ambiguities, uncertainties and conflicts in the raw reporting.
  4. Oseth, John M. (1985), Regulating U.S. Intelligence Operations, University Press of Kentucky, p. 12, ISBN   9780813115344
  5. 1 2 Jeffrey, Keith (1987), A. Robertson (ed.), "British Military Intelligence Following World War I", British and American Approaches to Intelligence, Springer, pp. 55–84, ISBN   9781349084180
  6. 1 2 3 Andrew, Christopher (2012), Michael I. Handel (ed.), "Churchill and Intelligence", Leaders and Intelligence, Routledge, p. 181, ISBN   9781136287169
  7. Davies, Philip (2002), "Ideas of intelligence: Divergent National Concepts and Institutions", Harvard International Review, 24 (3): 62–66