Intelligence (information gathering): Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
No edit summary
imported>Howard C. Berkowitz
No edit summary
Line 7: Line 7:
While methods and their selection are discussed, at length, in [[intelligence collection management]] and discipline-specific models of technique, the major categories are:
While methods and their selection are discussed, at length, in [[intelligence collection management]] and discipline-specific models of technique, the major categories are:
*[[Human-source intelligence]] ('''HUMINT'''): Information collected from humans, including [[interrogation]], documents, and willing cooperation; the latter includes such things as scouts and diplomats as well as spies
*[[Human-source intelligence]] ('''HUMINT'''): Information collected from humans, including [[interrogation]], documents, and willing cooperation; the latter includes such things as scouts and diplomats as well as spies
*[[Signals intelligence]]('''SIGINT'''): Information collected from deliberate signals, including human-understandable (e.g., radio messages and captured encrypted documents) and machine-to-machine (e.g., radar analysis)
*[[Signals intelligence]] ('''SIGINT'''): Information collected from deliberate signals, including human-understandable (e.g., radio messages and captured encrypted documents) and machine-to-machine (e.g., radar analysis)
*[[Measurement and signature intelligence]] ('''MASINT'''): Information extracted from inadvertent signals, environmental disturbances (e.g., acoustic noise, chemical emissions, magnetic fields)
*[[Measurement and signature intelligence]] ('''MASINT'''): Information extracted from inadvertent signals, environmental disturbances (e.g., acoustic noise, chemical emissions, magnetic fields)
*[[Imagery intelligence]] ('''IMIINT'''): Information generically from picture-taking, although it extends to exact placement of the images with respect to location ([[geospatial intelligence]]) and the analysis of non-image components of the picture (e.g., heat or color)
*[[Imagery intelligence]] ('''IMIINT'''): Information generically from picture-taking, although it extends to exact placement of the images with respect to location ([[geospatial intelligence]]) and the analysis of non-image components of the picture (e.g., heat or color)
Line 13: Line 13:
*[[Financial intelligence]] ('''FININT'''): Information obtained from formal and informal financial transactions, analysis of expenditures, etc.
*[[Financial intelligence]] ('''FININT'''): Information obtained from formal and informal financial transactions, analysis of expenditures, etc.
*[[Technical intelligence]] (('''TECHINT'''): Information obtained from the detailed engineering analysis of captured, purchased, or stolen equipment and supplies
*[[Technical intelligence]] (('''TECHINT'''): Information obtained from the detailed engineering analysis of captured, purchased, or stolen equipment and supplies
*[[Counterintelligence]] is a related discipline that attempts to defeat the process of collection; it overlaps but is subtly different from [[deception]], where one creates information to be collected but that will give the wrong impression.
==Intelligence analysis: models==
==Intelligence analysis: models==
Broadly speaking, there are four major paradigms for intelligence analysis:
Broadly speaking, there are four major paradigms for intelligence analysis:
Line 27: Line 29:
  | title = Occasional Papers: Volume 1, Number 5: Sherman Kent and the Profession of Intelligence Analysis  
  | title = Occasional Papers: Volume 1, Number 5: Sherman Kent and the Profession of Intelligence Analysis  
   | url = https://www.cia.gov/library/kent-center-occasional-papers/pdf/OPNo5.pdf  
   | url = https://www.cia.gov/library/kent-center-occasional-papers/pdf/OPNo5.pdf  
}}</ref> and analytic techniques, and examining [[cognitive traps for intelligence analysis]] based on knowledge of error in the social sciences.<ref name=CIA-Heuer-1999-2>{{cite web  
}}</ref> and analytic techniques. It includes, as introduced by [[Dick Heuer]], examining [[cognitive traps for intelligence analysis]] based on knowledge of error in the social sciences.<ref name=CIA-Heuer-1999-2>{{cite web  
  | author = Heuer, Richards J. Jr.  
  | author = Heuer, Richards J. Jr.  
  | title =  Psychology of Intelligence Analysis. Chapter 2. Perception: Why Can't We See What Is There To Be Seen?
  | title =  Psychology of Intelligence Analysis. Chapter 2. Perception: Why Can't We See What Is There To Be Seen?
Line 35: Line 37:
  | accessdate = 2007-10-29
  | accessdate = 2007-10-29
}}</ref>
}}</ref>
*Social science with philosophical and ideological assessment of intentions, based on understanding of the actors rather than specific knowledge. This makes a firm distinction from social science, where the sources are not deliberately trying to deceive; [[deception]] is an advanced doctrine with many nations.  <ref>{{cite journal
*Social science with philosophical and ideological assessment of intentions, based on understanding of the actors rather than specific knowledge. [[Abram Shulsky]] and Gary Schmitt, make sophisticated, as he points out that the classical social science do not routinely deal with the deliberate [[deception]] faced by intelligence analysts, and cite [[counterintelligence]] as absolutely vital to reliable analysis. <ref name=Shulsky>{{citation
| title = Silent Warfare: Understanding the world of intelligence
| author = Abram Shulsky and Gary Schmitt
| year = 2002
| edition = Third Edition
| publisher = Potomac Books
| isbn = 1574883453}}, pp. 171-172</ref> Following this argument, they show that [[counterintelligence]] is inherent to the [[intelligence cycle management|intelligence cycle]].This makes a firm distinction from social science, where the sources are not deliberately trying to deceive; [[deception]] is an advanced doctrine with many nations.  <ref>{{cite journal
  | journal = Airpower Journal
  | journal = Airpower Journal
  | date = Spring 1988
  | date = Spring 1988

Revision as of 12:17, 18 August 2009

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

Intelligence, in the context of information gathering, refers to a wide range of techniques for picking and prioritizing the subjects of interest, collecting and validating raw information, and inferring meaning by analyzing (ideally) multiple sources of information on a given subject. Once the analytical results are available, they must be disseminated to the people that need it.

In a military, law enforcement, business, and national intelligence process, some of the means of collection, and possibly analysis, may be secret, for if the opponent knew the methods were in use, that person or organization could take precautions against them. Therefore, there is a delicate balance between the number of people that receive the analyzed material, and the risk of revealing "sources and methods". The discipline of counterintelligence focuses on protecting one's own sensitive information, not just one's intelligence processes, from an opponent.

Intelligence collection

While methods and their selection are discussed, at length, in intelligence collection management and discipline-specific models of technique, the major categories are:

  • Human-source intelligence (HUMINT): Information collected from humans, including interrogation, documents, and willing cooperation; the latter includes such things as scouts and diplomats as well as spies
  • Signals intelligence (SIGINT): Information collected from deliberate signals, including human-understandable (e.g., radio messages and captured encrypted documents) and machine-to-machine (e.g., radar analysis)
  • Measurement and signature intelligence (MASINT): Information extracted from inadvertent signals, environmental disturbances (e.g., acoustic noise, chemical emissions, magnetic fields)
  • Imagery intelligence (IMIINT): Information generically from picture-taking, although it extends to exact placement of the images with respect to location (geospatial intelligence) and the analysis of non-image components of the picture (e.g., heat or color)
  • Open source intelligence (OSINT): Information obtained from published or broadcast sources; verified OSINT (V-OSINT) confirms it with non-public methods
  • Financial intelligence (FININT): Information obtained from formal and informal financial transactions, analysis of expenditures, etc.
  • Technical intelligence ((TECHINT): Information obtained from the detailed engineering analysis of captured, purchased, or stolen equipment and supplies
  • Counterintelligence is a related discipline that attempts to defeat the process of collection; it overlaps but is subtly different from deception, where one creates information to be collected but that will give the wrong impression.

Intelligence analysis: models

Broadly speaking, there are four major paradigms for intelligence analysis:

  • Social and experimental science with hypothesis testing, first formulated by Sherman Kent, [1], elaborated into specifying requirements[2] and analytic techniques. It includes, as introduced by Dick Heuer, examining cognitive traps for intelligence analysis based on knowledge of error in the social sciences.[3]
  • Social science with philosophical and ideological assessment of intentions, based on understanding of the actors rather than specific knowledge. Abram Shulsky and Gary Schmitt, make sophisticated, as he points out that the classical social science do not routinely deal with the deliberate deception faced by intelligence analysts, and cite counterintelligence as absolutely vital to reliable analysis. [4] Following this argument, they show that counterintelligence is inherent to the intelligence cycle.This makes a firm distinction from social science, where the sources are not deliberately trying to deceive; deception is an advanced doctrine with many nations. [5] Another difference from social science is that the adversary may try to overload the analyst, making the signal-to-noise ratio infeasible for structured analysis.[6],
  • Law, where the "is it possible" comes into play: Vice President Cheney expressed a guiding principle shortly after 9/11:

    if there was even a 1 percent chance of terrorists getting a weapon of mass destruction — and there has been a small probability of such an occurrence for some time — the United States must now act as if it were a certainty.[7]

  • Engineering, where the emphasis is on capability rather than assessment.

References

  1. Kent, Sherman (1947 (2000 reprint)). Strategic Intelligence for American World Policy. Princeton Univ Press. 
  2. Davis, Jack. Occasional Papers: Volume 1, Number 5: Sherman Kent and the Profession of Intelligence Analysis. The Sherman Kent Center for Intelligence Analysis.
  3. Heuer, Richards J. Jr. (1999). Psychology of Intelligence Analysis. Chapter 2. Perception: Why Can't We See What Is There To Be Seen?. History Staff, Center for the Study of Intelligence, Central Intelligence Agency. Retrieved on 2007-10-29.
  4. Abram Shulsky and Gary Schmitt (2002), Silent Warfare: Understanding the world of intelligence (Third Edition ed.), Potomac Books, ISBN 1574883453, pp. 171-172
  5. Smith, Charles L. (Spring 1988). "Soviet Maskirovko". Airpower Journal.
  6. Luttwak, Edward (1997). Coup D'Etat: A Practical Handbook. Harvard University Press. 
  7. Ron Suskind (2006), The One Percent Doctrine: Deep Inside America's Pursuit of its Enemies Since 9/11, Simon and Schuster, ISBN 9780743271097, p. 62