ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

The Intelligence Cycle

Updated on October 3, 2011


So how does this whole process work? How do we decide what we need to know before going out and trying to get information on everything? And once we do get whatever relevant information, what do we do with it? How do we know if it’s good enough, after all, there’s no professor to give us a grade; is there?


Well, there’s an order to the chaos. It’s called the Intelligence Cycle. This is the continuous process that determines what we need to know, the acquisition of information, assimilation of data into existing information, and a reassessment of the situation.


The first step of the process is Planning and Direction . This is the tasking phase. Think of it as being assigned a research paper in college. This is where we figure out what we do know, what we need to know and how to go about filling in the gaps. This is where you might decide between going to the library, using Google, or interviewing a person knowledgeable on a subject before you started actually doing your research.


Collection is the second phase. It’s where different intelligence collection platforms are tasked with requirements. Below you’ll see a satellite photograph of a U.S. military base that has an airstrip. Pretend for a while that this is an enemy base. Imagery will use satellites to observe an area of interest and report what is visible. In this case, there are a number of aircraft and an airstrip capable of supporting large aircraft that require a longer runway for takeoff. Imagery analysts will be able to identify the C-130s outside the hangars and the AV-8s (an aircraft unique to the U.S. Marines) on the runway. However, there are rows of parking spaces are covered with tents that prevent overhead observation. HUMINT may be tasked to figure out how many of those spaces are occupied by aircraft and how many pilots are available to operate them. Meanwhile, SIGINT can intercept radio traffic between the air traffic control tower and see who they are talking to and what they’re saying. MASINT (which is essentially an electronic version of All-Source Intelligence) will pick up on the aircraft IFF (identification: Friend/Foe) beacon and can pick up on things such as their forward looking infrared radar (FLIR) when it’s active further revealing individual aircraft capabilities. Open source would look for any public information about the area of interest. In this case, the map was acquired from open source and included number of links that provide more information about the base. This particular base has a webpage identifying the units stationed on the base offering insight into the amount of force that can be projected from this location. For your reference, they are below the image.

Satellite Imagery

This is an example of what Imagery Intelligence may come up with during the processing phase and brief to the customer during the Dissemination Phase
This is an example of what Imagery Intelligence may come up with during the processing phase and brief to the customer during the Dissemination Phase

Open source links

http://www.3maw.usmc.mil/external/3dmaw/

Official Page for the 3rd Marine Aircraft Wing

http://www.globalsecurity.org/military/facility/yuma.htm

Provides some history and current mission & capabilities

http://themilitaryzone.com/bases/mcas_yuma.html

Provides history and contemporary information on base size and logistics

As the name says, Processing is where the collected information is processed and organized. This includes things like translating all those tapes Bin Laden likes to send. Also translation of news broadcasts or magazine articles and other open source which will include things beyond the literal translation and include such details as connotations of such as the guy who threw his shows at Bush. It wasn’t just a simple assault as it would have been if it were an American, it was a political and cultural insult as well. The same applied to Iraqis slapping statues of Saddam with their sandals. For SIGINT, saying that certain frequencies were in use doesn’t tell the layperson as much as saying that those frequencies are typically associated with certain equipment used by a specific group that has. And if they intercept messages a transcript may be included. HUMINT may find that the word “watermelon” means bomb and “market” refers to an arms dealer’s house. This location will be depicted on a map or satellite photograph provided by IMINT.

Analysis and production is the heart of the cycle. It’s where all the information is compiled and pieced together. So at the tactical level, when SIGINT intercepts a snippet saying take the watermelons to the market , the analysts will know that there is a weapons delivery taking place. At the operational level, it’s more of looking for trends in everything that we’ve acquired and try to figure out how worried we need to be and how long before we find out right we were. We’ll take a look at what’s causing the situation that we’re looking at, what possible alternate futures may occur and the impact of each of them. At the operational and strategic level you’re more likely to see PMESII analysis. It assesses and analyzes the political, military economic, social, infrastructure and information aspects of an area and can be used as a starting point to project the impact after a given course of action or hypothetical alternate future.

Dissemination is the final stage in which the requested information is reported to the customer who initiated the request. Basically the research paper is turned in. Once they get this they will have a clearer picture of what’s going on. Moving forward from that point, they develop additional intelligence requirements and the cycle starts all over again. In this case, they may want to know more about the base itself such as where the fuel depot is located if they want to keep the aircraft from being able to fly without completely destroying them. Or perhaps they may want to look into the effect of destroying the runway. They’d find that since most of the aircraft on this base are VSTOL capability, it wouldn’t stop combat operations. After this, the cycle would continue until they found all the information they wanted and were able to develop a course of action to achieve their objective.

Was this hub helpful to you? If so, Please Click here

Analysis is possibly the most important part of the Intelligence Cycle

Analyzing Intelligence: Origins, Obstacles, and Innovations
Analyzing Intelligence: Origins, Obstacles, and Innovations

Each chapter, written by a leader within the community, touches on a critical topic in the field of intelligence analysis.

 

Comments

    0 of 8192 characters used
    Post Comment

    • AlexDrinkH2O profile image

      AlexDrinkH2O 

      5 years ago from Southern New England, USA

      I saw a diagram of the Intelligence Cycle virtually every day at the US Army Intelligence School back in the 60s. You should probably define the terms (HUMINT, SIGINT, etc.) in the text (within the bounds of an UNCLAS article of course) for clarity's sake. Good stuff.

    • Lance Crowe profile imageAUTHOR

      Lance Crowe 

      8 years ago

      K9Keystrokes,

      If there's anything in particular that you'd like to see, by all means, just let me know what you're interested in, I take requests. And there's too much paperwork to kill someone, so we'll just keep it between us ;-)

    • K9keystrokes profile image

      India Arnold 

      8 years ago from Northern, California

      Great stuff! Thanks for a genuine look at the process. Would love to read more hubs, should you offer your writing again. Or would telling us anymore require you having to kill us? But seriously quite good and stimulating in fact and pattern. thank you for sharing.

    • Lance Crowe profile imageAUTHOR

      Lance Crowe 

      8 years ago

      The Treasury Deparment's mission is to "promote the conditions for prosperity and stability in the United States and encourage prosperity and stability in the rest of the world." Under this agency is a branch called the Office of Intelligence and Analysis whose job it is to provide intelligence support to the Treasury Department and assist in countering terrorist financing and related activities. So in theory, the cycle is used, but in application, I don't know what to tell you.

    • someonewhoknows profile image

      someonewhoknows 

      8 years ago from south and west of canada,north of ohio

      Too bad we haven't used the intelligence cycle for determining the effectiveness of the federal reserve system at stabilziung the economy! If,anthing just the opposite is true.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)