Failure in the intelligence cycle

Failure in the intelligence cycle

Failure in the intelligence cycle or intelligence failure, while never defined in texts, can be understood to be the outcome of the inadequacies within the intelligence cycle. The intelligence cycle itself consists of six steps that are constantly in motion. The six steps are: requirements, collection, processing and exploitation, analysis and production, dissemination and consumption, and feedback. [cite book
last = Lowenthal
first = Mark M.
authorlink =
title = Intelligence: From Secrets to Policy
publisher = CQ Press
location = Washington, D.C.
date = 2000
pages = 49
doi =
isbn = 1-56802-512-2
]

Requirements

Requirements in the intelligence cycle relate to what the decision maker is requesting the analyst or team of analysts to research or find for him/her. These requirements may fall under any of the collection methods. Also, the requirements put forth should be an adjunct to policy making, not policy making itself. Ideally, the decision maker will provide the analyst with a clear set of requirements when they request information as to make the cycle flow easier. [Lowenthal, Mark M. "Intelligence: From Secrets to Policy." CQ Press. Washington, D.C. 2000. 42-43. ISBN 1-56802-512-2]

However, this is often not the case. Often requirements are too broad or not broad enough and it causes the analyst to make decisions on their own as to how to fill in the gaps in the requirements. However, the analysts could run into the problem of not filling the gaps the wrong way and searching for the wrong information.

Collection

The process of collection in the intelligence cycle refers to the methods used to gather raw data for the later stages of the cycle. There are five collection methods and each have ways in which they can fail. The five methods are: Human Intelligence (HUMINT), Signals Intelligence (SIGINT), Image Intelligence (IMINT), Open Source Intelligence (OSINT), and Measures and Signature Intelligence (MASINT). [cite web
last = Gulf Link
first =
title = A Guide to Intelligence
url=http://www.gulflink.osd.mil/search/intel_sum.html
accessdate = 2008-04-26
] It is common to rely on technology when performing collection, however it can fail and cause more problems than it solves. [cite press release
title = The 9/11 Commission Report
publisher = National Commission on Terrorist Attacks Upon the United States
date = 2004-07-22
url = http://www.yale.edu/lawweb/avalon/sept_11/911Report.pdf
accessdate = 2008-04-27
]

HUMINT

See HUMINT

SIGINT

Signals intelligence is the information collected via the interception of signals. Signals intelligence can further be broken down into Communications Intelligence (COMINT), Electronic Intelligence (ELINT), Telemetry Intelligence (TELINT), and Radar Transmitters (RADINT). [cite web
last = Federation of American Scientists
first =
title = SIGINT Overview
url=http://www.fas.org/spp/military/program/sigint/overview.htm
accessdate = 2008-04-26
] While these systems have their strengths, such as the ability to intercept communication or to gain information about weapons systems, they also have their weaknesses.

COMINT

Gaining accurate communications intelligence can be achieved but more often than not, the adversary will not communicate in such a way that would allow the information to be intercepted easily. The classic case of communications intelligence failure is Operation Gold during the Cold War where the Central Intelligence Agency and the British Secret Intelligence Service planned to tap landline communications to the Soviet Army headquarters in Berlin. The Soviets were alerted to the plan by a mole within the SIS and they allowed the operation to go forward. The information that was given out via the tap was disinformation by the Soviets. Thus leading to a failure in the intelligence itself.

Another set back in communication intelligence is code breaking. This falls into two categories: verbal codes, and transmitted codes. For an analyst listening to an intercepted phone call, the process of gaining information may seem simple. However, the situation becomes complicated when the individuals begin to use "slang" or colloquialisms in their conversation. What seems like a harmless conversation could prove dangerous. Furthermore, the calls themselves may be encrypted as well, further complicating the problem. Secondly, there is the issue of transmitted information being encoded. Lowenthal states in collection portion of his book that codebreakers like to boast that any code that can be created can be solved [cite book
last = Lowenthal
first = Mark M.
authorlink =
title = Intelligence: From Secrets to Policy
publisher = CQ Press
location = Washington, D.C.
date = 2000
pages = 65
doi =
isbn = 1-56802-512-2
] , but the public has access to increasingly stronger cipher programs now [cite web
last = Goebel
first = Greg
title = Frontiers In Crytology
url=http://www.vectorsite.net/ttcode_12.html
accessdate = 2008-04-26
] and these programs are harder to break.

ELINT, TELING, RADINT

These three "ints" relate to each other and separate discussion of them would be pointless. Simple procedures can be taken to reduce the chances of information being received by a gathering method. As was mentioned before with communication, test data or telemetry data can be encoded before it is sent. It can also be encapsulated and released for pick up. [cite book
last = Lowenthal
first = Mark M.
authorlink =
title = Intelligence: From Secrets to Policy
publisher = CQ Press
location = Washington, D.C.
date = 2000
pages = 65
doi =
isbn = 1-56802-512-2
]

IMINT

Imagery intelligence refers to information gathered by planes,unmanned aerial vehicles(UAV), and satellites. The common misconception with this type of intelligence is that the word image refers directly to a photograph. However, that is not always the case as in infra-red images of a location. The advantages to this type of intelligence are immense, however the ways in which it can fail are equally important to note.

Satellites

Failures to gain intelligence via satellites varies from the meteorological to the human, all of which are important to explaining why this important method of collection fails.

Matters of weather play a large role in IMINT failure. While radar imaging can see through clouds, it is unlikely that a general satellite sweep could find something buried under a few feet of snow or in a frozen lake. [cite web
last = Patterson
first = Tom
authorlink =
coauthors = N. Kelso
title = Hal Shelton Revisited: Designing and Producing Natural-Color Maps with Satellite Land Cover Data
work =
publisher = Journal of the North American Cartographic Information Society
date = 2004
url = http://www.shadedrelief.com/shelton/b.html
format =
doi =
accessdate = 2008-04-26
] Another problem with satellite imagery is that it is a simple snapshot in time. If the satellite that captures the image is not in a geo-synchronous orbit, you run the risk of the target not being there when the satellite passes over the area again. There is also the case of camouflage. The entrance to an underground bunker may be camouflaged with foliage and it would take a arduous examination of the image to find the information needed.

If you can account for all of these factors, then you reduce the chance of the information failing by a great amount. However, there are two more factors that come into play. The tasking of the satellite itself is key to getting the information at the correct time. If the analyst is unable to secure the use of a satellite, then there is a chance that the image that they needed will not be there when their chance to task the satellite comes up. There is also the problem of analyzing the image. Depending on the level of training of the analyst, a call about an image may be poorly handled causing the image crucial image to fall by the wayside.

Airplanes and UAV's

Airplanes and UAV's provide a quick response to the tasking issue of satellites. They have fewer issues of failure, however their failures tend to be greater in magnitude. Intelligence failure with planes and UAV's is limited to three situations. The first situation is poor tasking. If the plane or the UAV is sent to the wrong destination or the coordinates were misinterpreted, then it is unlikely that the information will be collected. Secondly there is the issue of the aircraft being destroyed. Unless the pilot was transmitting their imagery directly to headquarters, the information would not survive. Lastly, and this applies to planes only, capture of the pilot or the plane is a failure to collect the information.

OSINT

Open source information is derived from newspapers, journals, radio and television, and the Internet. [Citation
last1 = Best Jr. | first1 = Richard A.
author1-link =
last2 = Cumming | first2 = A.
last3 = | first3 =
last4 = | first4 =
title = Open Source Intelligence (OSINT): Issues for Congress
date = 2007-12-05
year = 2007
url = http://www.fas.org/sgp/crs/intel/RL34270.pdf
accessdate = 2008-04-26
.
] There is a growing emphasis on the use of OSINT however, there are several points where collection via OSINT can fail.

Information Reliability

Source reliability is one of the major points that hinders collection with this method. If you are viewing the paper of country where the dictator government runs the media, it is unlikely that you are reading an ubiased account of the facts. The same thing applies to use of the internet to gain information. Censorship controls over the internet in some countries will limit the amount of information that is made available.

Issues with Analysts

From the standpoint of the analyst themselves, there are also issues regarding the use of OSINT. Most individuals scan a webpage for the information they need and if it is not there, they move on. This transfers to the analytic community as well. Secondly, it is hard for an analyst to get information via the internet when most analysts lack the use of the internet in their agencies. Thirdly, the volume of data alone is often too much for an analyst to sift through causing important knowledge to slip by. [Citation
last1 = Best Jr. | first1 = Richard A.
author1-link =
last2 = Cumming | first2 = A.
last3 = | first3 =
last4 = | first4 =
title = Open Source Intelligence (OSINT): Issues for Congress
date = 2007-12-05
year = 2007
url = http://www.fas.org/sgp/crs/intel/RL34270.pdf
accessdate = 2008-04-26
.
]

MASINT

Measurement and Signature Intelligence (MASINT) is scientific and technical intelligence information obtained by quantitative and qualitative analysis of data (metric, angle, spatial, wavelength, time dependence, modulation, plasma, and hydromagnetic) derived from specific technical sensors for the purpose of identifying any distinctive features associated with the source, emitter, or sender and to facilitate subsequent identification and/or measurement of the same. [cite web
last = Federation of American Scientists
first =
title = Measurement and Signals Intelligence
url=http://www.fas.org/irp/program/masint.htm
accessdate = 2008-04-26
]

Points of failure for MASINT

MASINT is hardly understood by most analysts or the decision makers that look at it and that in itself is one of its major drawbacks. It also suffers from finance issues due to the expensive nature of the items needed to do the actual collection itself. Lastly, the exploitation, and analysis often take longer due to the need for highly trained analysts to examine the information.

Processing And Exploitation

Processing and exploitation involves converting the vast amount of information collected to a form usable by analysts. This is done through a variety of methods including decryption, language translation, and data reduction. Processing includes the enteringof raw data into databases where it can be exploited for use in the analysis process. [cite paper
author = David L. Carter PhD.
title = Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies
date = 2004
url =http://www.cops.usdoj.gov/mime/open.pdf?item=1396
format = PDF
accessdate = 2008-04-27
]

Failures in Processing

The problem within this step of the process is that there is often too much information and not enough analysts to process it. This leads to large amounts of information that was collected never being utilized because it does not meet the "exact" needs for the collection requirement. Thus important data may be cast aside and never used even though it may be relevant again at a latter date.

Analysis And Production

Analysts are the voice of the Intelligence Community. [cite press release
title = The Commission on theIntelligence CapabilitiestheUnited StatesRegardingWeapons ofMass Destruction
publisher =The Commission on theIntelligence Capabilitiesof theUnited StatesRegardingWeapons ofMass Destruction
date = 2005-03-31
url = http://www.wmd.gov/report/wmd_report.pdf
accessdate = 2008-04-28
] Therefore the analysis that they perform is expected to be accurate on a regular basis. Failure in analysis can be approached from two points of view: the tactical/operational point of view and the analysts point of view.

Tactical/Operational

A problem occurs when looking at current issues versus longterm issues. Ideally the tasking should be 50/50 so that no one type of issue gets more analysis than the other. In an ever changing world there is a tendency to place more emphasis on tactical/current issues. This hinders the operational/long term issues by putting analysis of them off in favor of current issues.

Analysts

The tasking itself is not the only way in which analysis can fail. The human component of analysis is just as important. One of the leading causes of analyst failure is cognitive bias.Cognitive biases are mental errors caused by our simplified information processing strategies. In other words, a cognitive bias does not result from any emotional or intellectual predisposition toward a certain judgment, but rather from subconscious mental procedures for processing information. [cite book
last = Heuer Jr.
first = Richards J
authorlink =
title = Psychology of Intelligence Analysis
publisher = Center for the Study of Intelligence
location = Berlin
date = 1999
pages = 111
doi = 10.1007/b62130
isbn = 1 929667-00-0
] These biases can occur within not only a single analyst but to an entire office of them leading to a biased form of "groupthink". Other forms of bias such as cultural, organizational, or bias from the analysts self-interest and need to succeed. The need to succeed couples with the level of competition within the community to get their analysis on the desk of a top decision maker. Another point of failure is with the training of the analysts or the lack of. The The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction Report to the President of the United States found that there is a lack of analysts with the proper scientific or technological training needed to perform proper analysis, thus contributing to failure of analysis. [cite press release
title = The Commission on theIntelligence CapabilitiestheUnited StatesRegardingWeapons ofMass Destruction
publisher =The Commission on theIntelligence Capabilitiesof theUnited StatesRegardingWeapons ofMass Destruction
date = 2005-03-31
url = http://www.wmd.gov/report/wmd_report.pdf
accessdate = 2008-04-28
]

Dissemination And Consumption

When the decision maker receives a report from an analyst and reviews it, this process is referred to as dissemination and consumption. In the intelligence community, there are several types of documents that get disseminated regularly. For example, the Presidents Daily Brief (PDB) is a document that is disseminated to the president of the United States on a daily basis and includes the recent information on important matters. The goal of dissemination is simple, get the information that is relevant to the decision maker in a timely fashion while being accurate.

Failures in Dissemination

Perhaps the greatest failure in dissemination of information is the failure to get the information to the proper decision maker. A report on crop futures in Burkina Faso would not be of interest to the Secretary of Education for example. Another issue to consider for the crop report would be if it is important enough to report. If the information does not meet a certain requirement there is a chance that it will not be reported. However, if it is important enough to report, how quickly should it be reported? If the information is time sensitive but it is not disseminated in enough time to have the desired effect then the process fails.

Feedback

Feedback is the last step in the intelligence process. The goal of the feedback part of the cycle is to give feedback to the analysts about the quality of the product they produced.

Failures in Feedback

The main failure when it comes to feedback is when the decision maker fails to offer it to the analyst. It is possible for there to be feedback failure even if feedback is offered. This occurs when the decision maker fails to get the feedback to the analyst in a timely order that would assist in the production of the next report to them.

References


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • Intelligence cycle (target-centric approach) — The target centric approach to intelligence describes a method of intelligence analysis that Robert M. Clark introduced in his book Intelligence Analysis: A Target Centric Approach in 2003 citation title = Intelligence Analysis: A Target Centric… …   Wikipedia

  • Intelligence cycle management — This article is at the top level of a series of articles about Intelligence Cycle Management.Within the context of government, military and business affairs, intelligence (the gathering and analysis of accurate, reliable information) is intended… …   Wikipedia

  • The Diamond Age —   …   Wikipedia

  • Intelligence (information gathering) — Intelligence (abbreviated int. or intel. ) is not information, but the product of evaluated information, valued for its currency and relevance rather than its detail or accuracy mdash;in contrast with data which typically refers to precise or… …   Wikipedia

  • The Cantos — by Ezra Pound is a long, incomplete poem in 120 sections, each of which is a canto . Most of it was written between 1915 and 1962, although much of the early work was abandoned and the early cantos, as finally published, date from 1922 onwards.… …   Wikipedia

  • The Blitz — London Blitz redirects here. For the London based American football team, see London Blitz (American football). For other uses, see Blitz (disambiguation). The Blitz Part of Second World War, Home Front …   Wikipedia

  • The Operative: No One Lives Forever — For the similarly titled James Bond novel, see Nobody Lives for Ever. The Operative: No One Lives Forever The game s box art displays protagonist Cate Archer …   Wikipedia

  • The Guns of Navarone (film) — Infobox Film name = The Guns of Navarone caption = film poster by Howard Terpning imdb id = 0054953 amg id = 1:21177 producer = Carl Foreman director = J. Lee Thompson writer = Alistair MacLean (novel) Carl Foreman starring = Gregory Peck David… …   Wikipedia

  • Cognitive traps for intelligence analysis — This article deals with a subset of the intellectual process of intelligence analysis itself, as opposed to intelligence analysis management, which in turn is a subcomponent of intelligence cycle management. For a complete hierarchical list of… …   Wikipedia

  • Central Intelligence Agency — CIA redirects here. For other uses, see CIA (disambiguation). Central Intelligence Agency Official Seal of the CIA Agency overview Formed September 18, 1947 …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”