...Maurice E. Simmons INTL 303: Introduction to Intelligence 28 December 2014 American Military University Many of the intelligence community’s (IC) greatest triumphs can be traced back to the use of multiple intelligence methods. As Clark so eloquently stated, “The game of intelligence collection is a multidisciplinary endeavor.” Employment of multiple platforms, sensors, and techniques provides advantages for the analyst to produce valuable strategic intelligence. Collaborative intelligence not only creates accurate and timely information, collaborative intelligence can also reduce wasteful endeavors. For example, a Congressional directed staff committee recently found the IC must increase collaboration among its intelligence systems. On the other hand, information based on a single source is deficient, and does not produce qualitative assessments. According to Anissa Frini, “Stovepiping keeps the output of different collection systems separated from one another and thus, it prevents one discipline from cross-checking another.” The lack of collaborated intelligence can lead to erroneous reporting and deception by the adversary. In order for policymakers to formulate strategic plans, information or rather intelligence gathered must have a holistic and integrated perspective. This paper will begin by highlighting the value of strategic intelligence to policymakers and leadership, the advantages of employing multiple intelligence methods, and will focus on analysis based...
Words: 2641 - Pages: 11
...Intelligence for the Twenty-First Century ALAN DUPONT Strategic discourse over the past decade has been dominated by a debate over the nature of future warfare and whether or not there is a ‘revolution in military affairs’ (RMA). Supporters contend that developments in military technology, especially precision guidance and high-speed data processing, in conjunction with advances in doctrine and strategy, will fundamentally transform the way in which future wars will be fought and privilege RMAcapable forces in the contest to achieve battlefield dominance.1 Sceptics, on the other hand, regard the RMA as being more evolutionary than revolutionary, and argue that many of the technical advances associated with the RMA do not necessarily presage a paradigm shift in warfare.2 However, all agree that timely, accurate and useable intelligence will be critical to the successful conduct of war in the twenty-first century, perhaps more so than in any previous era. It is surprising, therefore, how little academic attention has been devoted to the changes that are taking place in the technology, management and integration of the intelligence systems that will underpin any RMA. It is the contention of this article that the transformation of intelligence architectures, particularly in the West, is no less profound than that of the weapons, platforms and warfighting systems they are designed to support and enhance. Moreover, the cumulative weight of the changes in prospect will redefine the...
Words: 11896 - Pages: 48
...Final Essay Assignment James Peterson What biases, if any, might be common to U.S. intelligence agencies? Give two examples from history or modern day? & Explain what role policymakers play and what problems they face in relation to threat analysis. Course: INTL634 March 3, 2013 What biases, if any, might be common to U.S. intelligence agencies? Give two examples from history or modern day? There are a number of different types of bias mentioned in our text books. In their book, “Analyzing Intelligence” Bruce and Bennett discuss the denial and deception (D&D) bias traps than an analyst can fall into. They mention that there are three major categories: 1) Cultural and personal bias; 2) Organizational bias; & 3) Cognitive heuristics bias. Such biases can taint the analysts opinions based on their type of biases. (George & Bruce. 2008, 127-130) Cultural and personal bias may allow the perception of the intelligence to be tainted by personal beliefs and pre-conceptions that the analyst has developed over his lifetime. This type of bias also may be influenced by personal experiences, morals, customs, habits, and social environments. Organizational bias is “generally associated with the limitations and weaknesses of large bureaucratic organizations”. This type of bias is the result of actual or perceived goals, policies, and traditions of an organization. Bruce also says that the differences are even more extreme when “classified information” is involved...
Words: 2232 - Pages: 9
...Organization The company that I will examine in this paper will be the company that I am currently employed by Phoenix Consulting Group (PCG), Inc. Phoenix is a Department of Defense contractor that offers training services to the Intelligence Community. This company is operated in various places throughout the United States to include a corporate office in Alabama, support offices in Florida and Arizona and a Training Centre in Alexandria Virginia. The office that I work at is the Alexandria Office located at 5453 Richmond Highway. Phoenix prides itself on the training services that are offered to their customers, their specialty is in Human Intelligence (HUMINT). Mission Statement Provide the highest quality intelligence-related training, augmentation support and specialized consultative and research/studies services to our government and private sector customers. Major Services PCG will provide off-the-shelf, or customized off-the-shelf training to meet specific agency needs related to security/intelligence management, organizational, and security/intelligence services, such as, but not limited to: • Security team building • Practical exercises • Trade show elicitation skills • Intelligence team building • Platform instruction • Security techniques • Elicitation techniques • Quality management • Security elicitation techniques • Strategic planning • Counterintelligence techniques • Security elicitation techniques • Training manuals • Presentation...
Words: 902 - Pages: 4
...year 2009 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes. 1 Be it enacted by the Senate and House of Representa- 2 tives of the United States of America in Congress assembled, 3 4 SECTION 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE.—This Act may be cited as the 5 ‘‘Intelligence Authorization Act for Fiscal Year 2009’’. 6 (b) TABLE OF CONTENTS.—The table of contents for hsrobinson on PROD1PC76 with BILLS 7 this Act is as follows: Sec. 1. Short title; table of contents. Sec. 2. Definitions. TITLE I—BUDGET AND PERSONNEL AUTHORIZATIONS VerDate Aug 31 2005 21:15 Jul 18, 2008 Jkt 069200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6211 E:\BILLS\H5959.PCS H5959 2 Sec. Sec. Sec. Sec. Sec. Sec. 101. 102. 103. 104. 105. 106. Authorization of appropriations. Classified Schedule of Authorizations. Personnel ceiling adjustments. Intelligence Community Management Account. Limitation on the use of covert action funds. Prohibition on use of funds to implement ‘‘5 and out’’ program of the Federal Bureau of Investigation. TITLE II—CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM Sec. 201. Authorization of appropriations. Sec. 202. Technical modification to mandatory retirement provision of the Central Intelligence Agency Retirement...
Words: 24825 - Pages: 100
...Be Fought in the 21st Century Intelligence in Recent Public Literature Nicholas Negroponte, head of MIT’s Media Lab, observed that the information age is fast replacing atoms with bits; movies on film with packets on the Internet; print media with digital media; and wires with digital radio waves. Negroponte does not apply the bits-for-atoms principle to warfare, but Bruce Berkowitz, in The New Face of War, does. According to Berkowitz, a senior analyst at RAND and a former intelligence officer, future wars will not be won by having more atoms (troops, weapons, territory) than an opponent, but by having more bits . . . of information. Berkowitz argues that atoms that used to be big winners will become big losers to information technology. Reconnaissance sensors will quickly find massed troops, enabling adversaries to zap those troops with precision-guided weapons. Fortifications will tie armies down to fixed locations, making them sitting ducks for smart bombs. Cheap cyber weapons (e.g., computer viruses) will neutralize expensive kinetic weapons (e.g., missile defenses). Berkowitz sums up the growing dominance of bits over atoms: “The ability to collect, communicate, process, and protect information is the most important factor defining military power.” The key word here is: “the most important factor.” The New Face of War gives many historical examples of information superiority proving to be an important factor in defining military power, such as the allies breaking...
Words: 1344 - Pages: 6
...correction. Outstanding attendance record and dependability. • Administrative Skills • Good Communication Skills (Written and Verbal) • Strong Organizational and Prioritization Skills • Ability to Multi-Task • Preparation of Reports and Presentations • Basic Project Management Skills • Attention to Detail • Excellent Problem Solving Technical Skills • MS Office XP and Outlook Express • Average User of Word, and Excel • Internet Navigation and Research • Type 65+ WPM • Proficient with MIDB, QueryTree, Google Earth, Analyst Notebook, Palentir, ArcGIS, Intelink, M3, FireTruck, and mIRC • Work History and Responsibilities Oct 2010 to Present United States Air Force Wright Patterson AFB, Ohio Operational Intelligence Analyst Global Threat Group • Responsible for documenting and tracking various AF reports; managing multi-system databases, lead training expert on several systems and database programs, as well as liaison to all upper ranking personnel Apr 2011 through May 2011 United States Air Force Balad AB, IZ All-Source...
Words: 842 - Pages: 4
...(Potts) Ana Belen Montes – The “Queen of Cuba” 11 February 2014 * Montes blindsided the intelligence community with blatant acts of treachery. Montes was the pinnacle Analyst for the Defense Intelligence Agency (DIA), yet, in her secret life, her true fervor showed as she worked for Fidel Castro and the Cuban Intelligence Services, Dirección de Inteligencia, (DI), translated in English as the Intelligence Directorate of Cuba. Montes listened to coded messages over shortwave radio, passed secret files to handlers in busy public locales, and snuck into the Communist country adorned with a fake passport. “Your honor, I engaged in the activity that brought me before you because I obeyed my conscience rather than the law. I believe our government's policy towards Cuba is cruel and unfair, profoundly unneighborly, and I felt morally obligated to help the island defend itself from our efforts to impose our values and our political system on it.” (Montes, 2012) Montes gave this statement to the presiding judge who presided over Magistrate Number: 01-0568M. (United States of America versus Ana Belen Montes, Defendant., 2002) Montes showed no remorse, no contrition, and no regret for her actions through her career as an agent for the DI. The purpose of this brief is to explain the life, career working for the United States (U.S.) Government and Cuban government, the downfall which resulted, and the sentencing of DIA Analyst General Schedule (GS)-14 Ana Belen Montes...
Words: 3749 - Pages: 15
...WHITE PAPER MATURING A THREAT INTELLIGENCE PROGRAM Discover the state of your threat intelligence capabilities and uncover a roadmap to getting ahead of today’s threats. The threat intelligence landscape is an emerging one. Even in the most sophisticated IT organizations, resource constraints often dictate that threat intelligence (TI) is the responsibility of a sole analyst sifting through incident alerts looking for patterns and trends which may indicate that a threat exists. Threat intelligence is more than that. Yet, with very few industry standards around what TI is and what it isn’t, we feel Gartner’s definition[1] comes the closest: “Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace or hazard.” The Need to Know Clearly, going beyond simple event-based data analysis is a prerequisite for any useful threat intelligence program. The problem is that many organizations don’t know enough about the threats they face or their own security posture to defend themselves adequately. Instead they’re stuck in a reactive “stop the bleeding” or compliance-driven approach to cyber security with no clear vision or blueprint for reaching any other state. So it goes that in the rush to keep up with the TI trend, organizations are purchasing standalone...
Words: 3324 - Pages: 14
...Intelligence Cycle by D.Fritz Abstract The essay provides an overview of Intelligence cycle model and how they work together interdependently to create intelligence. This essay also gives an overview of how the intelligence community operates and how it interacts with the policy makers. [Title Here, up to 12 Words, on One to Two Lines] Why do intelligence exist? According to Mark M. Lowenthal, “intelligence exist because governments seek to hide some information from other governments”(p.1). Eventually, governments also want to find out information other governments are hiding. The role of intelligence is to provide these information to our government, specifically, the policy makers. To accomplish this mission involves tasking, collecting, processing, exploiting, disseminating and storing intelligence, also referred as the intelligence cycle. Tasking is the first stage of the intelligence cycle. During this stage, one needs to know what are the specific requirements of the intelligence and how it can be satisfied. On the top of the “intelligence chain” the director of national intelligence (DNI) would have to determine what intelligence the intelligence community would need to pursue and the priority of the intelligence based mainly on the preferences of the policy makers. Once determined, the information is passed all the way down the chain to the analysts to prioritize the collection requirements. Collection is divided into four categories: HUMINT, SIGINT,...
Words: 677 - Pages: 3
...Explain which International Relations theory is best suited to conducting strategic insight? Introduction In this paper, I will give a brief overview about Strategic Intelligence and in the process define the key terms so that there is no ambiguity about the topic being examined. I will define the concepts of strategy, insight and strategic intelligence before moving on to analyze the need for an international relations theory for conducting strategic insight. The paper will then explain constructivism and why it is the most appropriate theory for carrying out strategic insight. Strategy The concept of strategy has been around for as long as there have been organizations and wars. Strategy is a method or plan chosen to bring about a desired future, such as achievement of a goal or solution to a problem. 1Strategy is also about achieving and sustaining a position of lead over rivals through the successive capitalization of known or developing possibilities rather than restricting to any specific fixed plan designed at the onset. It can be said that strategy becomes a central plan through which an organization can affirm its essential continuity while at the same time purposefully handling its adjustment to the changing environment to gain competitive superiority. Strategy can also be viewed as a response to external opportunities and threats and to internal strengths and weaknesses; a means of achieving a long range competitive advantage, and a favorable...
Words: 2992 - Pages: 12
...Most political and military agendas require some level of intelligence operations, legal compliance and minimization procedures; whether it is strategic, operational or tactical, information must be exploited through the collection and analysis process better known as the intelligence cycle. Within this cycle are numerous disciplines that create an entire technical arena such as Signals Intelligence, Imagery Intelligence, Counterintelligence, Human Intelligence, ALL-SOURCE and BIOMETRICS, just to name a few and the Judge Advocate General’s Office or (JAG), regarding any related legal matters. These facets, among others, provided me with an in-depth picture of the tasks or assignments at hand, and, in conjunction with the rules and regulations...
Words: 752 - Pages: 4
...How ‘social intelligence’ can guide decisions By offering decision makers rich real-time data, social media is giving some companies fresh strategic insight. NOVEMBER 2012 • Martin Harrysson, Estelle Metayer, and Hugo Sarrazin Source: Business Technology Office In This Article * ------------------------------------------------- Exhibit 1: Social media is changing the old-school intelligence cycle. * ------------------------------------------------- Exhibit 2: An explosion in new analytical tools gives companies new ways to tap expertise. * ------------------------------------------------- About the authors * ------------------------------------------------- Comments (7) In many companies, marketers have been first movers in social media, tapping into it for insights on how consumers think and behave. As social technologies mature and organizations become convinced of their power, we believe they will take on a broader role: informing competitive strategy. In particular, social media should help companies overcome some limits of old-school intelligence gathering, which typically involves collecting information from a range of public and proprietary sources, distilling insights using time-tested analytic methods, and creating reports for internal company “clients” often “siloed” by function or business unit. Today, many people who have expert knowledge and shape perceptions about markets are freely exchanging data and viewpoints through social...
Words: 2507 - Pages: 11
...Session 2 The Intelligence Process Information is material of every description, including that derived from observations, surveillance, reports, rumors, and other sources. The information itself may be true or false, accurate or inaccurate, confirmed or unconfirmed, relevant or irrelevant. Although the intelligence process requires that information be stored, organized, and retrieved, the production of intelligence requires much more. Intelligence is the product resulting from the collection, evaluation and interpretation of information. Thus, intelligence can be viewed as information to which something has been added. The something added is the result of analysis—an explanation of what the information means. Intelligence may be general or specialized in nature. General intelligence focuses on a broad range of criminal activities, typically in smaller agencies or jurisdictions. Specialized intelligence focuses on a particular type of criminal activity or entity, such as narcotics, industrial espionage, or organized crime. Intelligence has both tactical and strategic applications. Tactical intelligence is directed towards a short term law enforcement objective or active case, with an immediate impact in mind—arrest, forfeiture, seizure. Strategic intelligence deals with larger, more long-term issues and goals, such as the identification of major criminal individuals or syndicates, projections of growth in types of criminal activity, and the establishment...
Words: 2395 - Pages: 10
...Ability to present clear and concise information consistent with the targeted audience As the acting J1 and Staff officer for the Defense Intelligence Support Office-Afghanistan (DISO-A), I was required to present technical information in a variety of settings: through briefings, slide presentations, video teleconferences, Tandberg’s, meetings and/or emails for the Defense Forward Element (DFE), DISO-A Chief, Directorate Deployment Mission Managers (DDMM), Global Force Management Office, Deployment Readiness Center and J1 Rear. I also provided information via VTC and Tandberg on a weekly basis to the Staff Components at the Defense Intelligence Agency reference all personnel actions and status. Experience in reviewing and editing complex material As the Security Specialist, in my current organization, I am responsible for researching and analyzing Industrial and Special Security policies, thus advising management on compliance issues. In my capacity as A Cryptologic Technician Administrative Assistant, I had the opportunity to research and review classified documents and reports to make final determinations from protected disclosure. As the Staff Officer for DISO-A, I was responsible for reviewing and editing all award submissions, appraisals, extension request and any/all personal action request. Experience in managing projects As the Staff Officer for (DISO-A), I was responsible for developing and managing the implementation of submitting the NATO Medal...
Words: 458 - Pages: 2