The examples and perspective in this article deal primarily with the United States and do not represent a worldwide view of the subject. (September 2022) |
The intelligence cycle is an idealized model of how intelligence is processed in civilian and military intelligence agencies, and law enforcement organizations. It is a closed path consisting of repeating nodes, which (if followed) will result in finished intelligence. The stages of the intelligence cycle include the issuance of requirements by decision makers, collection, processing, analysis, and publication (i.e., dissemination) of intelligence.[1] The circuit is completed when decision makers provide feedback and revised requirements. The intelligence cycle is also called intelligence process by the U.S. Department of Defense (DoD) and the uniformed services.[2]
Conceptual model
editDirection
editIntelligence requirements are determined by a decision maker to meet his/her objectives. In the federal government of the United States, requirements (or priorities) can be issued from the White House or the Congress.[citation needed] In NATO, a commander uses requirements (sometimes called Essential elements of information (EEIs)) to initiate the intelligence cycle.
Collection
editIn response to requirements, an intelligence staff develops an intelligence collection plan applying available sources and methods and seeking intelligence from other agencies. Collection includes inputs from several intelligence gathering disciplines, such as HUMINT (human intelligence), IMINT (imagery intelligence), ELINT (electronic intelligence), SIGINT (Signals Intelligence), OSINT (open source, or publicly available intelligence), etc.
Processing and exploitation
editOnce the collection plan is executed and the data arrives, it is processed for exploitation. This involves the translation of raw intelligence materials from a foreign language, evaluation of relevance and reliability, and collation of the raw data in preparation for exploitation.
Analysis
editAnalysis establishes the significance and implications of processed intelligence, integrates it by combining disparate pieces of information to identify collateral information and patterns, then interprets the significance of any newly developed knowledge.
Dissemination
editFinished intelligence products take many forms depending on the needs of the decision maker and reporting requirements. The level of urgency of various types of intelligence is typically established by an intelligence organization or community. For example, an indications and warning (I&W) bulletin would require higher precedence than an annual report.
Feedback
editThe intelligence cycle is a closed loop; feedback is received from the decision maker and revised requirements issued.
Intelligence information cycle theory
editThe intelligence information cycle leverages secrecy theory and U.S. regulation of classified intelligence to re-conceptualize the traditional intelligence cycle under the following four assumptions:
- Intelligence is secret information
- Intelligence is a public good
- Intelligence moves cyclically
- Intelligence is hoarded
Information is transformed from privately held to secretly held to public based on who has control over it. For example, the private information of a source becomes secret information (intelligence) when control over its dissemination is shared with an intelligence officer, and then becomes public information when the intelligence officer further disseminates it to the public by any number of means, including formal reporting, threat warning, and others. The fourth assumption, intelligence is hoarded, causes conflict points where information transitions from one type to another. The first conflict point, collection, occurs when private transitions to secret information (intelligence). The second conflict point, dissemination, occurs when secret transitions to public information. Thus, conceiving of intelligence using these assumptions demonstrates the cause of collection techniques (to ease the private-secret transition) and dissemination conflicts, and can inform ethical standards of conduct among all agents in the intelligence process.[3][4]
See also
edit- Decision cycle
- DIKW pyramid
- Intelligence analysis
- Intelligence assessment
- Intelligence cycle (target-centric approach)
- Intelligence cycle management
- Intelligence collection management
- Intelligence analysis management
- Intelligence dissemination management
- Learning cycle
- List of intelligence gathering disciplines
- OODA loop
References
edit- ^ "The Intelligence Cycle" (HTML). Central Intelligence Agency (CIA). 23 March 2013. Archived from the original (HTML) on 08 May 2020. Retrieved 30 September 2021.
- ^ "Joint Publication 2-0, Joint Intelligence" (PDF). Defense Technical Information Center (DTIC). Department of Defense. 22 June 2007. pp. GL–11. Archived from the original (PDF) on 13 June 2016. Retrieved February 22, 2013.
- ^ Stottlemyre, Steven (2022). "Reconceptualizing Intelligence after Benghazi". doi:10.13140/RG.2.2.19732.99204.
{{cite journal}}
: Cite journal requires|journal=
(help) - ^ Stottlemyre, Steven (2021). "The United States Intelligence Community, Secrecy and the 'Steele Dossier': Reconceptualizing the Intelligence Process". Journal of European and American Intelligence Studies. 4 (2): 11–28.