Intelligence (information gathering): Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(gutting this for now)
 
(18 intermediate revisions by 3 users not shown)
Line 1: Line 1:
{{subpages}}
{{PropDel}}<br><br>{{subpages}}
'''Intelligence,''' in the context of '''information gathering''', refers to a wide range of techniques for [[intelligence cycle management|picking and prioritizing]] the subjects of interest, [[intelligence collection management|collecting and validating]] raw information, and inferring meaning by [[intelligence analysis management|analyzing]] (ideally) multiple sources of information on a given subject. Once the analytical results are available, they must be [[intelligence dissemination management|disseminated]] to the people that need it.
'''Intelligence,''' in the context of '''information gathering''', refers to a wide range of techniques for picking and prioritizing the subjects of interest, collecting and validating raw information, and inferring meaning by analyzing (ideally) multiple sources of information on a given subject. Once the analytical results are available, they must be disseminated to the people that need it.


In a military, law enforcement, business, and national intelligence process, some of the means of collection, and possibly analysis, may be secret, for if the opponent knew the methods were in use, that person or organization could take precautions against them. Therefore, there is a delicate balance between the number of people that receive the analyzed material, and the risk of revealing "sources and methods".  The discipline of [[counterintelligence]] focuses on protecting one's own sensitive information, not just one's intelligence processes, from an opponent.
In a military, law enforcement, business, and national intelligence process, some of the means of collection, and possibly analysis, may be secret, for if the opponent knew the methods were in use, that person or organization could take precautions against them. Therefore, there is a delicate balance between the number of people that receive the analyzed material, and the risk of revealing "sources and methods".  The discipline of counterintelligence focuses on protecting one's own sensitive information, not just one's intelligence processes, from an opponent.
 
==Intelligence collection==
While methods and their selection are discussed, at length, in [[intelligence collection management]] and discipline-specific models of technique, the major categories are:
*[[Human-source intelligence]] ('''HUMINT'''): Information collected from humans, including [[interrogation]], documents, and willing cooperation; the latter includes such things as scouts and diplomats as well as spies
*[[Signals intelligence]] ('''SIGINT'''): Information collected from deliberate signals, including human-understandable (e.g., radio messages and captured encrypted documents) and machine-to-machine (e.g., radar analysis)
*[[Measurement and signature intelligence]] ('''MASINT'''): Information extracted from inadvertent signals, environmental disturbances (e.g., acoustic noise, chemical emissions, magnetic fields)
*[[Imagery intelligence]] ('''IMIINT'''): Information generically from picture-taking, although it extends to exact placement of the images with respect to location ([[geospatial intelligence]]) and the analysis of non-image components of the picture (e.g., heat or color)
*[[Open source intelligence]] ('''OSINT'''): Information obtained from published or broadcast sources; '''verified OSINT (V-OSINT)''' confirms it with non-public methods
*[[Financial intelligence]] ('''FININT'''): Information obtained from formal and informal financial transactions, analysis of expenditures, etc.
*[[Technical intelligence]] (('''TECHINT'''): Information obtained from the detailed engineering analysis of captured, purchased, or stolen equipment and supplies
 
*[[Counterintelligence]] is a related discipline that attempts to defeat the process of collection; it overlaps but is subtly different from [[deception]], where one creates information to be collected but that will give the wrong impression.
==Intelligence analysis: models==
Broadly speaking, there are four major paradigms for intelligence analysis:
#Social and experimental science with hypothesis testing, first formulated by [[Sherman Kent]], <ref>{{cite book
| author = Kent, Sherman
| authorlink = Sherman Kent
| title = Strategic Intelligence for American World Policy
| publisher = Princeton Univ Press
| year =  1947 (2000 reprint)
| ISBN = 0691021600}}
</ref>, elaborated into specifying requirements<ref name = DavisV1I5>{{cite web
| author = Davis, Jack
| work = The Sherman Kent Center for Intelligence Analysis
| title = Occasional Papers: Volume 1, Number 5: Sherman Kent and the Profession of Intelligence Analysis
  | url = https://www.cia.gov/library/kent-center-occasional-papers/pdf/OPNo5.pdf
}}</ref> and analytic techniques. It includes, as introduced by [[Dick Heuer]], examining [[cognitive traps for intelligence analysis]] based on knowledge of error in the social sciences.<ref name=CIA-Heuer-1999-2>{{cite web
| author = Heuer, Richards J. Jr.
| title =  Psychology of Intelligence Analysis. Chapter 2. Perception: Why Can't We See What Is There To Be Seen?
| work = History Staff, Center for the Study of Intelligence, Central Intelligence Agency
| year = 1999
| url = http://www.au.af.mil/au/awc/awcgate/psych-intel/art5.html
| accessdate = 2007-10-29
}}</ref>
#Social science with philosophical and ideological assessment of intentions, based on understanding of the actors rather than specific knowledge. [[Abram Shulsky]] and Gary Schmitt, make sophisticated, as he points out that the classical social science do not routinely deal with the deliberate [[deception]] faced by intelligence analysts, and cite [[counterintelligence]] as absolutely vital to reliable analysis. <ref name=Shulsky>{{citation
| title = Silent Warfare: Understanding the world of intelligence
| author = Abram Shulsky and Gary Schmitt
| year = 2002
| edition = Third Edition
| publisher = Potomac Books
| isbn = 1574883453}}, pp. 171-172</ref> Following this argument, they show that [[counterintelligence]] is inherent to the [[intelligence cycle management|intelligence cycle]].This makes a firm distinction from social science, where the sources are not deliberately trying to deceive; [[deception]] is an advanced doctrine with many nations.  <ref>{{cite journal
| journal = Airpower Journal
| date = Spring 1988
| title = Soviet Maskirovko
| author = Smith, Charles L.
| url = http://www.airpower.maxwell.af.mil/airchronicles/apj/apj88/spr88/smith.html
}}</ref> Another difference from social science is that the adversary may try to overload the analyst, making the [[signal-to-noise ratio]] infeasible for structured analysis.<ref>{{cite book
  | author = Luttwak, Edward
  | title = Coup D'Etat: A Practical Handbook
  | publisher = Harvard University Press
  | year = 1997
}} </ref>  Pessimistic "red teaming" considers the enemy not thinking by one's own assumptions.<ref name=APJ>{{citation
| title = The "Red Team": forging a well-conceived contingency plan
| journal = Aerospace Power Journal
| date = Summer, 2002 | author =  Timothy G. Malone, Reagan E. Schaupp 
| url = http://findarticles.com/p/articles/mi_m0ICK/is_2_16/ai_90529724/?tag=content;col1}}</ref> This sort of red teaming can, however, be overwhelmed if one's own ideology convinces analysts that the enemy must be up to something, for which there is no evidence.
#Law, where the "is it possible" comes into play: Vice President Cheney expressed a guiding principle shortly after 9/11: <blockquote>if there was even a 1 percent chance of terrorists getting a weapon of mass destruction — and there has been a small probability of such an occurrence for some time — the United States must now act as if it were a certainty.<ref name=Suskind-One>{{citation
| author = Ron Suskind
| title = The One Percent Doctrine: Deep Inside America's Pursuit of its Enemies Since 9/11
| publisher = Simon and Schuster
| year= 2006
| isbn = 9780743271097}}, p. 62</ref></blockquote>
#Engineering, where the emphasis is on capability rather than assessment.  Another aspect of "red teaming" is to do pessimistic analysis of what the enemy could do had he perfect knowledge of one's own systems. <ref name=LATimes>{{citation
| 'Red Team' Gets Into Soviet Frame of Mind in 'Star Wars' Planning
| journal = Associated Press | author = Bryan Brumley
| url = http://articles.latimes.com/1986-08-31/local/me-15072_1
| date = 31 August 1986 }}</ref> A classic example of where Paradigm 2 failed is [[Douglas MacArthur]]'s belief that while the Chinese could intervene in the [[Korean War]], they would not do so.


==References==
==References==
{{reflist|2}}
{{reflist|2}}

Latest revision as of 14:17, 23 June 2024

This article may be deleted soon.
To oppose or discuss a nomination, please go to CZ:Proposed for deletion and follow the instructions.

For the monthly nomination lists, see
Category:Articles for deletion.


Intelligence, in the context of information gathering, refers to a wide range of techniques for picking and prioritizing the subjects of interest, collecting and validating raw information, and inferring meaning by analyzing (ideally) multiple sources of information on a given subject. Once the analytical results are available, they must be disseminated to the people that need it.

In a military, law enforcement, business, and national intelligence process, some of the means of collection, and possibly analysis, may be secret, for if the opponent knew the methods were in use, that person or organization could take precautions against them. Therefore, there is a delicate balance between the number of people that receive the analyzed material, and the risk of revealing "sources and methods". The discipline of counterintelligence focuses on protecting one's own sensitive information, not just one's intelligence processes, from an opponent.

References