SlideShare a Scribd company logo
THE INTELLIGENCE PROCESS—A
MACRO LOOK: WHO DOES WHAT
FOR WHOM?
Chapter 4
Intelligence: From Secret To Policy
By Mark Lowenthal
5th edition
* what is meant by a "macro look" at the intel process?
* what does the overall process entail?
* know each step, including strengths and weaknesses/problems
with each
* know how the steps interrelate and affect one another
THE TERM
Intelligence process refers to the steps or
stages in intelligence, from policy makers
perceiving a need for information to the
community’s delivery of an analytical
intelligence product to them.
The seven phases of the intelligence process
are:
1. Identifying requirements
2. Collection
3. Processing and exploitation
4. Analysis and production
5. Dissemination
6. Consumption
7. Feedback
Identifying requirements
Identifying requirements means defining those
policy issues or areas to which intelligence is
Expected to make a contribution, as well as
decisions about which of these issues has priority
over the others.
Some requirements will be better met by specific
types of collection; some may require the Use of
several types of collection.
Collection
In the United States, constant tension
exists over the allocation of resources to
collection and to processing and
exploitation, with collection inevitably
coming out the winner; the result is that
Much more intelligence is collected than
can be processed or exploited.
Identifying requirements, conducting
collection, and processing and
exploitation are meaningless unless the
intelligence is given to analysts who are
experts in their respective fields and can
turn the Intelligence into reports that
respond to the needs of the policy
makers.
Collection
The types of products chosen, the
quality of the analysis and production,
and the continuous tension between
current intelligence Products and longer
range products are major issues.
Collection
Collection
Most discussions of the intelligence process end
here, with the intelligence having reached the Policy
makers whose requirements first set everything in
motion. However, two important phases Remain:
1.Consumption
2.Feedback
Collection
Although feedback does not occur
nearly as often as the intelligence
community might desire, a Dialogue
between intelligence consumers and
producers should take place after the
intelligence has been received.
REQUIREMENTS
Each nation has a wide
variety of national security
and foreign policy interests.
Some nations have more
than others.
REQUIREMENTS
Of these interests, the priority of some is self-
evident— those that deal with large and known
threats, those that deal with neighboring or
proximate states, and those that are more
severe. But the international arena is dynamic
and fluid
REQUIREMENTS
For example, the Soviet Union was
the overwhelming top priority of
U.S. intelligence from 1946 to
1991, after which the country as
we knew it ceased to exist.
REQUIREMENTS
And now terrorism has become a concern of U.S.
national security policy since the 1970s, but the
nature of the terrorism issue changed dramatically
in 2001. So, even for issues that have long been on
the national security agenda, there are shifts in
priorities and in the intrinsic importance of the
issues.
REQUIREMENTS
Intelligence priorities should reflect policy
priorities. Policy makers should have well-
considered and well-established views of their
own priorities and convey these clearly to their
intelligence apparatus.
REQUIREMENTS
Senior policy makers often assume that their needs
are known by their intelligence providers. After all,
the key issues are apparent.
An obvious way to fill the requirements gap left by
policy makers would be for the intelligence
community to assume this task on its own.
REQUIREMENTS
The intelligence community thus faces two
unpalatable choices. The first is to fill the
requirements vacuum, running the risk of being
wrong or accused of having overstepped into the
realm of policy.
REQUIREMENTS
The second is to overlook the absence of defined
requirements and to continue collection and the
phases that follow, based on the last-known
priorities and the intelligence community’s own
sense of priorities, fully realizing that it may be
accused of making the wrong choices.
REQUIREMENTS
In the United States, parts of the community may
reflect the preferences of the policy makers to
whom they are most closely tied. In some cases,
there may be no final adjudicating authority,
leaving the intelligence community to do the best
that it can.
REQUIREMENTS
In the U. S. system, the National Security Council
(NSC) sets the policy and intelligence priorities. The
director of national intelligence (DNI) should be the
final adjudicator within the intelligence community,
but the director’s ability to impose priorities on a
day-to-day basis across the entire intelligence
community remains uncertain. All issues tend to get
shorter shrift when too many are competing for
attention.
REQUIREMENTS
One intellectual means of assessing requirements is to
look at the likelihood of an event and its relative
importance to national security concerns. Of great
concern will be the high likelihood and high-importance
of events. It should be easier to assess importance (which
should be based on known or stated national interests)
than it is to assess likelihood (which is itself an
intelligence judgment or estimate). (Likelihood, however,
is not a prediction.
In both Panel A and Panel B of Figure 4-1, the issues that fall closer to the upper right
reflect more important intelligence requirements. However, there may not be startling
clarity as to likelihood or there may be a debate as to issues’ relative importance.
[ Insert IMAGE ]
COLLECTION
Each nation has a wide
variety of national security
and foreign policy interests.
Some nations have more
than others.
This admittedly imperfect process can be portrayed as in Figure 4-3. This diagram, although better than
the CIA’s, remains somewhat one-dimensional. A still better portrayal would capture the more than
occasional need to go back to an earlier part of the process to meet unfulfilled or changing
requirements, collection needs, and so on.
COLLECTION
Collection is also the first—and perhaps the most
important—facet of intelligence where budgets and
resources come into play in precise terms (as opposed to
broader discussions when priorities are at issue).
Collection analysts must wade through the material—to
process and exploit it—to find the intelligence that is
really needed.
COLLECTION
Technical collection is extremely expensive and, because
different types of systems offer different benefits and
capabilities, the administration and Congress must make
difficult budget choices.
How much information should be collected? Or, put
another way, does more collection mean better
intelligence? The answer to these questions is
ambiguous.
COLLECTION
In other words, increased collection also increases the
task of finding the truly important intelligence.
For example, concerns over possible threats from cyber-
attacks likely derive little useful intelligence from imagery
as the locus of the threat cannot be captured in a photo.
COLLECTION
For example, the Central Intelligence Agency (CIA) may
put greater store in clandestine human intelligence
(espionage), in part because it is a product of CIA
activities.
Intelligence community, is that different analytical groups
may prefer different types of intelligence.
COLLECTION
On the one hand, the more information that is collected,
the more likely it will include the required intelligence.
Much better intelligence might be derived from signals
intelligence, which can reveal capabilities or intentions.
COLLECTION
The requirements depend on the nature of the issue and
on the types of collection that are available.
Not every issue requires the same types of collection
support.
COLLECTION derives directly from requirements.
On the other hand, not everything that is collected is of
equal value.
COLLECTION
Also, the needs of agencies vary, further complicating the
choices.
This is often referred to as the wheat versus chaff
problem.
An interesting phenomenon, found at least in the U. S.
Meanwhile, other all-source analysts may place greater
emphasis on signals intelligence.
PROCESSING AND EXPLOITATION
Furthermore, technical collection
systems have found greater favor in
the executive branch and Congress
than the systems and personnel
requirements for processing and
exploitation.
Les Aspin, chairman of the House
Armed Services Committee (1985–
1993) and later the secretary of
defense (1993–1994)
PROCESSING AND
EXPLOITATION
Once observed that both Congress and
the executive branch were more
interested in procurement (buying new
weapons) than operations and
maintenance (keeping already
purchased systems functioning).
PROCESSING AND
EXPLOITATION
PROCESSING AND EXPLOITATION
Intelligence collected by technical means
(imagery, signals, test data, and so on)
does not arrive in ready-to-use form.
PROCESSING AND
EXPLOITATION
Collection also has support from the
companies (prime contractors and
their numerous subcontractors)
who build the technical collection
systems and who lobby for follow-
on systems.
PROCESSING AND
EXPLOITATION
Collection is akin to procurement
and is much more appealing than
processing and exploitation.
PROCESSING AND
EXPLOITATION
Processing and exploitation are key
steps in converting technically
collected information into
intelligence.
In the United States, collection far
outruns processing and exploitation.
PROCESSING AND
EXPLOITATION
Processing and exploitation are in-house
intelligence community activities.
Collection advocates argue, usually
successfully, that collection is the bedrock of
intelligence, that without it the entire
enterprise has little meaning.
PROCESSING AND
EXPLOITATION
Buying new systems was more attractive
to decision makers in both branches and,
more important, to defense contractors.
It must be processed from complex
digital signals into images or intercepts,
and these must then be
PROCESSING AND
EXPLOITATION
A similar circumstance, for example, exists in
formation of the defense budget.
Operations and maintenance, although
important, are less exciting and less
glamorous.
One reason for this appeal is emotional.
PROCESSING AND
EXPLOITATION
exploited—analyzed if they are images;
perhaps decoded, and probably translated,
if they are signals.
Much more intelligence is collected than can
ever be processed and exploited.
PROCESSING AND
EXPLOITATION
ANALYSIS AND PRODUCTION
The congressional committees that
oversee intelligence have increasingly
expressed concern about this imbalance,
urging the intelligence community to put
more money into processing and
exploitation.
The large and still growing disparity
between collection and processing and
exploitation results in a great amount of
collected material never being used.
ANALYSIS AND
PRODUCTION
TPEDs refers to tasking, processing,
exploitation, and dissemination.
Advocates of processing and exploitation
therefore argue that the image or signal that
is not processed and not exploited is
identical to the one that is not collected—it
has no effect at all.
ANALYSIS AND
PRODUCTION
Of the four parts of TPEDs, tasking and
dissemination are the least problematic for
the intelligence community or for Congress.
No proper ratio exists between collection
and processing and exploitation.
The processing and exploitation (P&E) gap is
of highest concern to Congress.
ANALYSIS AND
PRODUCTION
downstream activities (the steps that follow
collection) are also dependent on
technology, the technology is not in the
same league, in terms of contractor profit,
as collection systems.
ANALYSIS AND
PRODUCTION
DISSEMINATION AND CONSUMPTION
• Among the large mass of material being
collected and analyzed each day, what is
important enough to report?
• How much detail should be reported to
the various intelligence consumers?
To which policy makers should it be
reported—the most senior or lower
ranking ones? To many or just a few?
ANALYSIS AND
PRODUCTION
How quickly should it be reported? Is it
urgent enough to require immediate
delivery, or can it wait for one of the
reports that senior policy makers receive
the next morning?
ANALYSIS AND
PRODUCTION
How long should the report be?
What is the best vehicle for reporting
it—one of the items in the product line,
a memo, a briefing?
ANALYSIS AND
PRODUCTION
Are different vehicles needed for
different policy makers, based on their
preferences for consuming intelligence,
their own depth on the issue, and so on?
ANALYSIS AND
PRODUCTION
The intelligence community customarily
makes these decisions taking into
account a number of factors and making
the occasional trade-offs between
conflicting goals.
ANALYSIS AND
PRODUCTION
World Wide intelligence review
The Worldwide Intelligence Review
(WIRe) is an electronically disseminated
analytical product, the successor to the
CIA’s Senior Executive Intelligence Brief
ANALYSIS AND
PRODUCTION
The National Intelligence Daily, both of
which were viewed as early morning
intelligence “newspapers.” WIRe articles
vary in length and detail and include
links and graphics that allow readers to
drill down for more information.
ANALYSIS AND
PRODUCTION
Ideally, the community employs a
layered approach, using a variety of
intelligence products to convey the same
intelligence (in different formats and
degrees of detail) to a broad array of
policy makers.
ANALYSIS AND
PRODUCTION
FEEDBACK
The NIPF does include an evaluation
function in which the various aspects of the
process—collection, analysis, and the utility
of different intelligence products—are
assessed, including input from cabinet-level
policy makers.
FEEDBACK
Ideally, the policy makers should give
continual feedback to their intelligence
producers—detailing what has been useful,
what has not, which areas need continuing
or increased emphasis, which can be
reduced, and so on.
FEEDBACK
Communications between the policy
community and the intelligence community
are at best imperfect throughout the
intelligence process.
The failure to provide feedback is analogous
to the policy makers’ inability or refusal to
help define requirements.
FEEDBACK
In reality, however, the community receives
feedback less often than it desires, and it
certainly does not receive feedback in any
systematic manner, for several reasons.
THINKING ABOUT THE INTELLIGENCE
PROCESS
Initial collection may prove unsatisfactory and
may lead policy makers to change the
requirements; processing and exploitation or
analysis may reveal gaps, resulting in new
collection requirements; Consumers may change
their needs or ask for more intelligence.
THINKING ABOUT THE INTELLIGENCE
PROCESS
Given the importance of the intelligence
process as both a concept and an organizing
principle, it is worth thinking about how the
process works and how best to
conceptualize it.
THINKING ABOUT THE INTELLIGENCE
PROCESS
A more realistic diagram would show that at
any stage in the process it is possible— and
sometimes necessary—to go back to an
earlier step
THINKING ABOUT THE INTELLIGENCE
PROCESS
A policy maker asks not to convey the
possibility that the process might not be
completed in one cycle.
This admittedly imperfect process can be portrayed as in Figure 4-3. This diagram, although better than
the CIA’s, remains somewhat one-dimensional. A still better portrayal would capture the more than
occasional need to go back to an earlier part of the process to meet unfulfilled or changing
requirements, collection needs, and so on.
Figure 4-4 shows how in any one intelligence process issues likely arise (the need for more collection, uncertainties in processing,
results of analysis, changing requirements) that cause a second or even third intelligence process to take place. Ultimately, one
could repeat the process lines over and over to portray continuing changes in any of the various parts of the process and the fact that
policy issues are rarely resolved in a single neat cycle. This diagram is a bit more complex, and it gives a much better sense of how
the intelligence process operates in reality, being linear, circular, and open-ended all at the same time.
 Ad hocs
 Analysis and production
 Collection
 Consumption dissemination
 Downstream activities
 Feedback
 Footnote wars
 Priority creep
 Processing and exploitation
 Requirements
 Tyranny of the ad hocs
KEY TERMS

More Related Content

What's hot

Concepts of Intelligence Led Policing
Concepts of Intelligence Led PolicingConcepts of Intelligence Led Policing
Concepts of Intelligence Led Policinggroundskeeper20
 
KGB, Active Measures, Disinformation and Subversion
KGB, Active Measures, Disinformation and SubversionKGB, Active Measures, Disinformation and Subversion
KGB, Active Measures, Disinformation and Subversion
Peter Hammond
 
Future challenges to international security
Future challenges to international securityFuture challenges to international security
Future challenges to international security
Paras Bhutto
 
Humanitarian Intervention
Humanitarian InterventionHumanitarian Intervention
Humanitarian InterventionCRRC-Armenia
 
THE MODEL POLICE ACT, 2006
THE MODEL POLICE ACT, 2006THE MODEL POLICE ACT, 2006
THE MODEL POLICE ACT, 2006Mumbaikar Le
 
POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptx
Roland994165
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
Splunk
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
AishaAL9
 
top intelligence agencies of the world
top intelligence agencies of the worldtop intelligence agencies of the world
top intelligence agencies of the world
Zubair
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision Makers
Deborah Osborne
 
Espionage
EspionageEspionage
Espionage
Tom Clowers
 
Counterintelligence Paper
Counterintelligence PaperCounterintelligence Paper
Counterintelligence PaperLori A. Ruff
 
International Security Basics
International Security BasicsInternational Security Basics
International Security Basics
tiiupohl
 
National Security .pptx
National Security .pptxNational Security .pptx
National Security .pptx
JoerelAganon
 
UK Counter Terrorism Case Study
UK Counter Terrorism Case Study UK Counter Terrorism Case Study
UK Counter Terrorism Case Study Dr Paul Norman
 
TERRORISM PRESENTATION.pptx
TERRORISM PRESENTATION.pptxTERRORISM PRESENTATION.pptx
TERRORISM PRESENTATION.pptx
JohnMarkDomingo6
 
5 public order
5   public order5   public order
5 public order
Ankit Agarwal
 
Eidws 112 intelligence
Eidws 112 intelligenceEidws 112 intelligence
Eidws 112 intelligenceIT2Alcorn
 

What's hot (20)

Concepts of Intelligence Led Policing
Concepts of Intelligence Led PolicingConcepts of Intelligence Led Policing
Concepts of Intelligence Led Policing
 
KGB, Active Measures, Disinformation and Subversion
KGB, Active Measures, Disinformation and SubversionKGB, Active Measures, Disinformation and Subversion
KGB, Active Measures, Disinformation and Subversion
 
Future challenges to international security
Future challenges to international securityFuture challenges to international security
Future challenges to international security
 
Humanitarian Intervention
Humanitarian InterventionHumanitarian Intervention
Humanitarian Intervention
 
THE MODEL POLICE ACT, 2006
THE MODEL POLICE ACT, 2006THE MODEL POLICE ACT, 2006
THE MODEL POLICE ACT, 2006
 
POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptx
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
 
top intelligence agencies of the world
top intelligence agencies of the worldtop intelligence agencies of the world
top intelligence agencies of the world
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision Makers
 
Espionage
EspionageEspionage
Espionage
 
Chapter Thirteen
Chapter ThirteenChapter Thirteen
Chapter Thirteen
 
Counterintelligence Paper
Counterintelligence PaperCounterintelligence Paper
Counterintelligence Paper
 
International Security Basics
International Security BasicsInternational Security Basics
International Security Basics
 
National Security .pptx
National Security .pptxNational Security .pptx
National Security .pptx
 
UK Counter Terrorism Case Study
UK Counter Terrorism Case Study UK Counter Terrorism Case Study
UK Counter Terrorism Case Study
 
TERRORISM PRESENTATION.pptx
TERRORISM PRESENTATION.pptxTERRORISM PRESENTATION.pptx
TERRORISM PRESENTATION.pptx
 
5 public order
5   public order5   public order
5 public order
 
Counterterrorism strategy
Counterterrorism strategyCounterterrorism strategy
Counterterrorism strategy
 
Eidws 112 intelligence
Eidws 112 intelligenceEidws 112 intelligence
Eidws 112 intelligence
 

Similar to Chapter 4 the intelligence process a macro look who does what for whom

Chapter 6 analysis
Chapter 6 analysisChapter 6 analysis
Chapter 6 analysis
Doing What I Do
 
Confrontation or CollaborationCongress and the Intelligen.docx
Confrontation or CollaborationCongress and the Intelligen.docxConfrontation or CollaborationCongress and the Intelligen.docx
Confrontation or CollaborationCongress and the Intelligen.docx
maxinesmith73660
 
Ic and policymaker integration a studies in intelligence anthology
Ic and policymaker integration a studies in intelligence anthologyIc and policymaker integration a studies in intelligence anthology
Ic and policymaker integration a studies in intelligence anthology
https://www.cia.gov.com
 
Essay About Background
Essay About BackgroundEssay About Background
Essay About Background
Pay To Write Paper Greenwood
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
E Hacking
 
250 words agree or disagreePlease discuss the various limitation.docx
250 words agree or disagreePlease discuss the various limitation.docx250 words agree or disagreePlease discuss the various limitation.docx
250 words agree or disagreePlease discuss the various limitation.docx
vickeryr87
 
Intelligence cycle
Intelligence cycleIntelligence cycle
Intelligence cycle
Nicolae Sfetcu
 
IA article (Margaret S. Marangione) (1)
IA article (Margaret S. Marangione) (1)IA article (Margaret S. Marangione) (1)
IA article (Margaret S. Marangione) (1)Margaret Marangione
 
Candor - open analytics nyc
Candor  - open analytics nycCandor  - open analytics nyc
Candor - open analytics nycOpen Analytics
 
paper on forecasting terrorism
paper on forecasting terrorismpaper on forecasting terrorism
paper on forecasting terrorismAjay Ohri
 
15 hauer making safety management knwledge based
15 hauer making safety management knwledge based15 hauer making safety management knwledge based
15 hauer making safety management knwledge based
Sierra Francisco Justo
 
Strategic informer spring 2012
Strategic informer spring 2012Strategic informer spring 2012
Strategic informer spring 2012IBCworld
 
Strategic Informer Spring 2012
Strategic Informer Spring 2012Strategic Informer Spring 2012
Strategic Informer Spring 2012
Matt Pedersen
 
The intelligence community has not always learned the lessons of i.docx
The intelligence community has not always learned the lessons of i.docxThe intelligence community has not always learned the lessons of i.docx
The intelligence community has not always learned the lessons of i.docx
cherry686017
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
mark-smith
 
Information Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxInformation Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docx
annettsparrow
 
Eidws 111 opsec
Eidws 111 opsecEidws 111 opsec
Eidws 111 opsecIT2Alcorn
 
Inteligencia e Politicas Publicas: Dinamicas operacionais e condiçoes de legi...
Inteligencia e Politicas Publicas: Dinamicas operacionais e condiçoes de legi...Inteligencia e Politicas Publicas: Dinamicas operacionais e condiçoes de legi...
Inteligencia e Politicas Publicas: Dinamicas operacionais e condiçoes de legi...
Frederico Alencar
 
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxOSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
loganta
 

Similar to Chapter 4 the intelligence process a macro look who does what for whom (20)

Chapter 6 analysis
Chapter 6 analysisChapter 6 analysis
Chapter 6 analysis
 
Confrontation or CollaborationCongress and the Intelligen.docx
Confrontation or CollaborationCongress and the Intelligen.docxConfrontation or CollaborationCongress and the Intelligen.docx
Confrontation or CollaborationCongress and the Intelligen.docx
 
Ic and policymaker integration a studies in intelligence anthology
Ic and policymaker integration a studies in intelligence anthologyIc and policymaker integration a studies in intelligence anthology
Ic and policymaker integration a studies in intelligence anthology
 
Essay About Background
Essay About BackgroundEssay About Background
Essay About Background
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
 
250 words agree or disagreePlease discuss the various limitation.docx
250 words agree or disagreePlease discuss the various limitation.docx250 words agree or disagreePlease discuss the various limitation.docx
250 words agree or disagreePlease discuss the various limitation.docx
 
Intelligence cycle
Intelligence cycleIntelligence cycle
Intelligence cycle
 
IA article (Margaret S. Marangione) (1)
IA article (Margaret S. Marangione) (1)IA article (Margaret S. Marangione) (1)
IA article (Margaret S. Marangione) (1)
 
Candor - open analytics nyc
Candor  - open analytics nycCandor  - open analytics nyc
Candor - open analytics nyc
 
paper on forecasting terrorism
paper on forecasting terrorismpaper on forecasting terrorism
paper on forecasting terrorism
 
15 hauer making safety management knwledge based
15 hauer making safety management knwledge based15 hauer making safety management knwledge based
15 hauer making safety management knwledge based
 
Strategic informer spring 2012
Strategic informer spring 2012Strategic informer spring 2012
Strategic informer spring 2012
 
Strategic Informer Spring 2012
Strategic Informer Spring 2012Strategic Informer Spring 2012
Strategic Informer Spring 2012
 
The intelligence community has not always learned the lessons of i.docx
The intelligence community has not always learned the lessons of i.docxThe intelligence community has not always learned the lessons of i.docx
The intelligence community has not always learned the lessons of i.docx
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
 
Information Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxInformation Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docx
 
Eidws 111 opsec
Eidws 111 opsecEidws 111 opsec
Eidws 111 opsec
 
Inteligencia e Politicas Publicas: Dinamicas operacionais e condiçoes de legi...
Inteligencia e Politicas Publicas: Dinamicas operacionais e condiçoes de legi...Inteligencia e Politicas Publicas: Dinamicas operacionais e condiçoes de legi...
Inteligencia e Politicas Publicas: Dinamicas operacionais e condiçoes de legi...
 
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxOSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
 

More from Doing What I Do

Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
Doing What I Do
 
403 10
403 10403 10
403 14
403 14403 14
403 12
403 12403 12
403 13
403 13403 13
403 11
403 11403 11
Intelligence agencys
Intelligence agencysIntelligence agencys
Intelligence agencys
Doing What I Do
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence community
Doing What I Do
 
Chapter 8 covert action
Chapter 8 covert actionChapter 8 covert action
Chapter 8 covert action
Doing What I Do
 
Chapter 2 part 2 major historical development
Chapter 2 part 2 major historical developmentChapter 2 part 2 major historical development
Chapter 2 part 2 major historical development
Doing What I Do
 
Chapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligenceChapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligence
Doing What I Do
 
Chapter 1 what is intelligence
Chapter 1 what is intelligenceChapter 1 what is intelligence
Chapter 1 what is intelligence
Doing What I Do
 

More from Doing What I Do (19)

Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
 
403 10
403 10403 10
403 10
 
403 14
403 14403 14
403 14
 
403 12
403 12403 12
403 12
 
403 13
403 13403 13
403 13
 
403 2
403 2403 2
403 2
 
403 11
403 11403 11
403 11
 
403 9
403 9403 9
403 9
 
403 8
403 8403 8
403 8
 
403 4
403 4403 4
403 4
 
403 3
403 3403 3
403 3
 
403 1
403 1403 1
403 1
 
Tsa's positive 1
Tsa's positive 1Tsa's positive 1
Tsa's positive 1
 
Intelligence agencys
Intelligence agencysIntelligence agencys
Intelligence agencys
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence community
 
Chapter 8 covert action
Chapter 8 covert actionChapter 8 covert action
Chapter 8 covert action
 
Chapter 2 part 2 major historical development
Chapter 2 part 2 major historical developmentChapter 2 part 2 major historical development
Chapter 2 part 2 major historical development
 
Chapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligenceChapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligence
 
Chapter 1 what is intelligence
Chapter 1 what is intelligenceChapter 1 what is intelligence
Chapter 1 what is intelligence
 

Recently uploaded

Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
Antti Rautiainen
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
oklahomajudicialproc1
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
SERUDS INDIA
 
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our OrganizationUp the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
uptheratios
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
evkovas
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
ehbuaw
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
ukyewh
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
Paul Smith
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
ahcitycouncil
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
ClaudioTebaldi2
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
ahcitycouncil
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
ILC- UK
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
ehbuaw
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
ehbuaw
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
RIDPRO11
 
Counting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptxCounting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptx
Revenue Department Kerala State
 

Recently uploaded (20)

Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
 
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our OrganizationUp the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
 
Counting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptxCounting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptx
 

Chapter 4 the intelligence process a macro look who does what for whom

  • 1. THE INTELLIGENCE PROCESS—A MACRO LOOK: WHO DOES WHAT FOR WHOM? Chapter 4 Intelligence: From Secret To Policy By Mark Lowenthal 5th edition
  • 2. * what is meant by a "macro look" at the intel process? * what does the overall process entail? * know each step, including strengths and weaknesses/problems with each * know how the steps interrelate and affect one another
  • 3. THE TERM Intelligence process refers to the steps or stages in intelligence, from policy makers perceiving a need for information to the community’s delivery of an analytical intelligence product to them.
  • 4. The seven phases of the intelligence process are: 1. Identifying requirements 2. Collection 3. Processing and exploitation 4. Analysis and production 5. Dissemination 6. Consumption 7. Feedback
  • 5. Identifying requirements Identifying requirements means defining those policy issues or areas to which intelligence is Expected to make a contribution, as well as decisions about which of these issues has priority over the others. Some requirements will be better met by specific types of collection; some may require the Use of several types of collection.
  • 6. Collection In the United States, constant tension exists over the allocation of resources to collection and to processing and exploitation, with collection inevitably coming out the winner; the result is that Much more intelligence is collected than can be processed or exploited.
  • 7. Identifying requirements, conducting collection, and processing and exploitation are meaningless unless the intelligence is given to analysts who are experts in their respective fields and can turn the Intelligence into reports that respond to the needs of the policy makers. Collection
  • 8. The types of products chosen, the quality of the analysis and production, and the continuous tension between current intelligence Products and longer range products are major issues. Collection
  • 9. Collection Most discussions of the intelligence process end here, with the intelligence having reached the Policy makers whose requirements first set everything in motion. However, two important phases Remain: 1.Consumption 2.Feedback
  • 10. Collection Although feedback does not occur nearly as often as the intelligence community might desire, a Dialogue between intelligence consumers and producers should take place after the intelligence has been received.
  • 11. REQUIREMENTS Each nation has a wide variety of national security and foreign policy interests. Some nations have more than others.
  • 12. REQUIREMENTS Of these interests, the priority of some is self- evident— those that deal with large and known threats, those that deal with neighboring or proximate states, and those that are more severe. But the international arena is dynamic and fluid
  • 13. REQUIREMENTS For example, the Soviet Union was the overwhelming top priority of U.S. intelligence from 1946 to 1991, after which the country as we knew it ceased to exist.
  • 14. REQUIREMENTS And now terrorism has become a concern of U.S. national security policy since the 1970s, but the nature of the terrorism issue changed dramatically in 2001. So, even for issues that have long been on the national security agenda, there are shifts in priorities and in the intrinsic importance of the issues.
  • 15. REQUIREMENTS Intelligence priorities should reflect policy priorities. Policy makers should have well- considered and well-established views of their own priorities and convey these clearly to their intelligence apparatus.
  • 16. REQUIREMENTS Senior policy makers often assume that their needs are known by their intelligence providers. After all, the key issues are apparent. An obvious way to fill the requirements gap left by policy makers would be for the intelligence community to assume this task on its own.
  • 17. REQUIREMENTS The intelligence community thus faces two unpalatable choices. The first is to fill the requirements vacuum, running the risk of being wrong or accused of having overstepped into the realm of policy.
  • 18. REQUIREMENTS The second is to overlook the absence of defined requirements and to continue collection and the phases that follow, based on the last-known priorities and the intelligence community’s own sense of priorities, fully realizing that it may be accused of making the wrong choices.
  • 19. REQUIREMENTS In the United States, parts of the community may reflect the preferences of the policy makers to whom they are most closely tied. In some cases, there may be no final adjudicating authority, leaving the intelligence community to do the best that it can.
  • 20. REQUIREMENTS In the U. S. system, the National Security Council (NSC) sets the policy and intelligence priorities. The director of national intelligence (DNI) should be the final adjudicator within the intelligence community, but the director’s ability to impose priorities on a day-to-day basis across the entire intelligence community remains uncertain. All issues tend to get shorter shrift when too many are competing for attention.
  • 21. REQUIREMENTS One intellectual means of assessing requirements is to look at the likelihood of an event and its relative importance to national security concerns. Of great concern will be the high likelihood and high-importance of events. It should be easier to assess importance (which should be based on known or stated national interests) than it is to assess likelihood (which is itself an intelligence judgment or estimate). (Likelihood, however, is not a prediction.
  • 22. In both Panel A and Panel B of Figure 4-1, the issues that fall closer to the upper right reflect more important intelligence requirements. However, there may not be startling clarity as to likelihood or there may be a debate as to issues’ relative importance. [ Insert IMAGE ]
  • 23. COLLECTION Each nation has a wide variety of national security and foreign policy interests. Some nations have more than others.
  • 24. This admittedly imperfect process can be portrayed as in Figure 4-3. This diagram, although better than the CIA’s, remains somewhat one-dimensional. A still better portrayal would capture the more than occasional need to go back to an earlier part of the process to meet unfulfilled or changing requirements, collection needs, and so on.
  • 25. COLLECTION Collection is also the first—and perhaps the most important—facet of intelligence where budgets and resources come into play in precise terms (as opposed to broader discussions when priorities are at issue). Collection analysts must wade through the material—to process and exploit it—to find the intelligence that is really needed.
  • 26. COLLECTION Technical collection is extremely expensive and, because different types of systems offer different benefits and capabilities, the administration and Congress must make difficult budget choices. How much information should be collected? Or, put another way, does more collection mean better intelligence? The answer to these questions is ambiguous.
  • 27. COLLECTION In other words, increased collection also increases the task of finding the truly important intelligence. For example, concerns over possible threats from cyber- attacks likely derive little useful intelligence from imagery as the locus of the threat cannot be captured in a photo.
  • 28. COLLECTION For example, the Central Intelligence Agency (CIA) may put greater store in clandestine human intelligence (espionage), in part because it is a product of CIA activities. Intelligence community, is that different analytical groups may prefer different types of intelligence.
  • 29. COLLECTION On the one hand, the more information that is collected, the more likely it will include the required intelligence. Much better intelligence might be derived from signals intelligence, which can reveal capabilities or intentions.
  • 30. COLLECTION The requirements depend on the nature of the issue and on the types of collection that are available. Not every issue requires the same types of collection support. COLLECTION derives directly from requirements. On the other hand, not everything that is collected is of equal value.
  • 31. COLLECTION Also, the needs of agencies vary, further complicating the choices. This is often referred to as the wheat versus chaff problem. An interesting phenomenon, found at least in the U. S. Meanwhile, other all-source analysts may place greater emphasis on signals intelligence.
  • 32. PROCESSING AND EXPLOITATION Furthermore, technical collection systems have found greater favor in the executive branch and Congress than the systems and personnel requirements for processing and exploitation.
  • 33. Les Aspin, chairman of the House Armed Services Committee (1985– 1993) and later the secretary of defense (1993–1994) PROCESSING AND EXPLOITATION
  • 34. Once observed that both Congress and the executive branch were more interested in procurement (buying new weapons) than operations and maintenance (keeping already purchased systems functioning). PROCESSING AND EXPLOITATION
  • 35. PROCESSING AND EXPLOITATION Intelligence collected by technical means (imagery, signals, test data, and so on) does not arrive in ready-to-use form. PROCESSING AND EXPLOITATION
  • 36. Collection also has support from the companies (prime contractors and their numerous subcontractors) who build the technical collection systems and who lobby for follow- on systems. PROCESSING AND EXPLOITATION
  • 37. Collection is akin to procurement and is much more appealing than processing and exploitation. PROCESSING AND EXPLOITATION
  • 38. Processing and exploitation are key steps in converting technically collected information into intelligence. In the United States, collection far outruns processing and exploitation. PROCESSING AND EXPLOITATION
  • 39. Processing and exploitation are in-house intelligence community activities. Collection advocates argue, usually successfully, that collection is the bedrock of intelligence, that without it the entire enterprise has little meaning. PROCESSING AND EXPLOITATION
  • 40. Buying new systems was more attractive to decision makers in both branches and, more important, to defense contractors. It must be processed from complex digital signals into images or intercepts, and these must then be PROCESSING AND EXPLOITATION
  • 41. A similar circumstance, for example, exists in formation of the defense budget. Operations and maintenance, although important, are less exciting and less glamorous. One reason for this appeal is emotional. PROCESSING AND EXPLOITATION
  • 42. exploited—analyzed if they are images; perhaps decoded, and probably translated, if they are signals. Much more intelligence is collected than can ever be processed and exploited. PROCESSING AND EXPLOITATION
  • 43. ANALYSIS AND PRODUCTION The congressional committees that oversee intelligence have increasingly expressed concern about this imbalance, urging the intelligence community to put more money into processing and exploitation.
  • 44. The large and still growing disparity between collection and processing and exploitation results in a great amount of collected material never being used. ANALYSIS AND PRODUCTION
  • 45. TPEDs refers to tasking, processing, exploitation, and dissemination. Advocates of processing and exploitation therefore argue that the image or signal that is not processed and not exploited is identical to the one that is not collected—it has no effect at all. ANALYSIS AND PRODUCTION
  • 46. Of the four parts of TPEDs, tasking and dissemination are the least problematic for the intelligence community or for Congress. No proper ratio exists between collection and processing and exploitation. The processing and exploitation (P&E) gap is of highest concern to Congress. ANALYSIS AND PRODUCTION
  • 47. downstream activities (the steps that follow collection) are also dependent on technology, the technology is not in the same league, in terms of contractor profit, as collection systems. ANALYSIS AND PRODUCTION
  • 48. DISSEMINATION AND CONSUMPTION • Among the large mass of material being collected and analyzed each day, what is important enough to report? • How much detail should be reported to the various intelligence consumers?
  • 49. To which policy makers should it be reported—the most senior or lower ranking ones? To many or just a few? ANALYSIS AND PRODUCTION
  • 50. How quickly should it be reported? Is it urgent enough to require immediate delivery, or can it wait for one of the reports that senior policy makers receive the next morning? ANALYSIS AND PRODUCTION
  • 51. How long should the report be? What is the best vehicle for reporting it—one of the items in the product line, a memo, a briefing? ANALYSIS AND PRODUCTION
  • 52. Are different vehicles needed for different policy makers, based on their preferences for consuming intelligence, their own depth on the issue, and so on? ANALYSIS AND PRODUCTION
  • 53. The intelligence community customarily makes these decisions taking into account a number of factors and making the occasional trade-offs between conflicting goals. ANALYSIS AND PRODUCTION
  • 54. World Wide intelligence review The Worldwide Intelligence Review (WIRe) is an electronically disseminated analytical product, the successor to the CIA’s Senior Executive Intelligence Brief ANALYSIS AND PRODUCTION
  • 55. The National Intelligence Daily, both of which were viewed as early morning intelligence “newspapers.” WIRe articles vary in length and detail and include links and graphics that allow readers to drill down for more information. ANALYSIS AND PRODUCTION
  • 56. Ideally, the community employs a layered approach, using a variety of intelligence products to convey the same intelligence (in different formats and degrees of detail) to a broad array of policy makers. ANALYSIS AND PRODUCTION
  • 57. FEEDBACK The NIPF does include an evaluation function in which the various aspects of the process—collection, analysis, and the utility of different intelligence products—are assessed, including input from cabinet-level policy makers.
  • 58. FEEDBACK Ideally, the policy makers should give continual feedback to their intelligence producers—detailing what has been useful, what has not, which areas need continuing or increased emphasis, which can be reduced, and so on.
  • 59. FEEDBACK Communications between the policy community and the intelligence community are at best imperfect throughout the intelligence process. The failure to provide feedback is analogous to the policy makers’ inability or refusal to help define requirements.
  • 60. FEEDBACK In reality, however, the community receives feedback less often than it desires, and it certainly does not receive feedback in any systematic manner, for several reasons.
  • 61. THINKING ABOUT THE INTELLIGENCE PROCESS Initial collection may prove unsatisfactory and may lead policy makers to change the requirements; processing and exploitation or analysis may reveal gaps, resulting in new collection requirements; Consumers may change their needs or ask for more intelligence.
  • 62. THINKING ABOUT THE INTELLIGENCE PROCESS Given the importance of the intelligence process as both a concept and an organizing principle, it is worth thinking about how the process works and how best to conceptualize it.
  • 63. THINKING ABOUT THE INTELLIGENCE PROCESS A more realistic diagram would show that at any stage in the process it is possible— and sometimes necessary—to go back to an earlier step
  • 64. THINKING ABOUT THE INTELLIGENCE PROCESS A policy maker asks not to convey the possibility that the process might not be completed in one cycle.
  • 65.
  • 66. This admittedly imperfect process can be portrayed as in Figure 4-3. This diagram, although better than the CIA’s, remains somewhat one-dimensional. A still better portrayal would capture the more than occasional need to go back to an earlier part of the process to meet unfulfilled or changing requirements, collection needs, and so on.
  • 67. Figure 4-4 shows how in any one intelligence process issues likely arise (the need for more collection, uncertainties in processing, results of analysis, changing requirements) that cause a second or even third intelligence process to take place. Ultimately, one could repeat the process lines over and over to portray continuing changes in any of the various parts of the process and the fact that policy issues are rarely resolved in a single neat cycle. This diagram is a bit more complex, and it gives a much better sense of how the intelligence process operates in reality, being linear, circular, and open-ended all at the same time.
  • 68.  Ad hocs  Analysis and production  Collection  Consumption dissemination  Downstream activities  Feedback  Footnote wars  Priority creep  Processing and exploitation  Requirements  Tyranny of the ad hocs KEY TERMS