Intelligence cycle management

[2] Despite the most powerful computers, the human mind remains at the core of intelligence, discerning patterns and extracting meaning from a flood of correct, incorrect, and sometimes deliberately misleading information (also known as disinformation).

Imagery intelligence (IMINT), for instance, may depend on weather, satellite orbits or the ability of aircraft to elude ground defenses, and time for analysis.

If, for example, the movement of a ship was learned through Enigma COMINT, a reconnaissance aircraft was sent into the same area, and allowed to be seen by the Axis, so they thought the resulting sinking was due to IMINT.

Finally, the idea that decision-makers wait for the delivery of intelligence before making policy decisions is equally incorrect.

Depending on the sensitivity of a line item, it may be identified simply as "classified activity,"not broken out, but briefed to full oversight committees, or only revealed to a small number of officials.

"It is important that intelligence officers involved in articulating requirements represent both analysts and collectors, including those from the clandestine side.

FBI and DEA agents operating abroad should not be allowed to act independently of either the ambassador or the CIA lest pursuit of evidence or individuals for prosecution cause major foreign policy problems or complicate ongoing intelligence and diplomatic activities.

What is needed most is a Washington-based interagency mechanism involving officials from intelligence, law enforcement, and foreign policy to sort out individual cases.

"At home, law enforcement should have priority and the intelligence community should continue to face restraints in what it can do vis-à-vis American citizens."

Regardless, the ability of intelligence agencies to give law enforcement incidentally acquired information on U.S. citizens at home or overseas ought to be continued.

[8] President Harry S. Truman had legitimate concerns about creating a "Gestapo," so he insisted that the new CIA not have law enforcement or domestic authority.

Japan, with a history of blurred lines between industry and government, may regard a policy (for them) as perfectly ethical, which would be questionable in North America or Eastern Europe.

Economic measures also may be used to pressure specific countries—for example, South Africa while it sustained a policy of apartheid, or Sudan while there is widespread persecution in Darfur.

While these reports and briefings convey critical information, they lack the full context in which the intelligence cell assembled them.

Conversely, security constraints may prevent the analyst from explaining exactly why a particular command decision might compromise existing intelligence gathering operations.

At the highest level of direction, rational policies, the effects of personalities, and culture can dominate the assignments given to the intelligence services.

However, it is in long-term analysis of familiar subjects and broad trends where secret information tends to be less critical and government analysts are, for the most part, no better and often not as good as their counterparts in academia and the private sector.

To the extent long-term estimates are produced, it is important that they be concise, written by individuals, and that sources justifying conclusions be shown as they would in any academic work.

While it is valuable to point out consensus, it is more important that areas of dispute be highlighted than that all agencies be pressured to reach a conclusion that may represent a lowest common denominator.

While initial news reports may be fragmentary, this particular part of OSINT is a powerful component of warning, but not necessarily of detailed analyses.

[13] "The danger of politicization-the potential for the intelligence community to distort information or judgment in order to please political authorities-is real.

For example, one World War II failure occurred when Office of Strategic Services (OSS) field agents broke into the Japanese Embassy in Lisbon, and stole cryptographic materials, which allowed past communications to be read.

The net effect of this operation was disastrous, as the particular cryptosystem had been broken by cryptanalysis, who were reading the traffic parallel with the intended recipients.

[15] In World War II, the United Kingdom kept its Secret Intelligence Service principally focused on HUMINT, while the Special Operations Executive was created for direct action and support of resistance movements.

In the case of the U.S., these abuses of resources involved instances such as Iran-Contra and support to the "plumbers unit" of the Nixon campaign and administration, as well as infiltrating legal groups using a justification of force protection.

This has become increasingly difficult for clandestine services, such as diplomats, in response to budget pressures, and has reduced its presence that could otherwise provide official cover.

"This is not meant to preclude the service intelligence chiefs from carrying out those clandestine collection activities specifically related to the tactical needs of their military departmental customers or field commanders."

Clandestine HUMINT and covert action involve the only part of governments that are required, on a routine basis, to break foreign laws.

Military strategist John Boyd created a model of decision and action, originally for air-to-air fighter combat, but which has proven useful in many areas of conflict.

If the cycle works properly, the actor has initiative, and can orient, decide, and act even faster in the second and subsequent iterations of the Boyd loop.

The Intelligence Process or Cycle
Relationship of Data, Information and Intelligence
CCIRM takes information requests and routes them to collection elements
Interactions between commanders and the Boyd loop
Interactions between the intelligence cycle and the Boyd loop