Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Explain the intelligence cycle essay intro to intelligence
Explain the intelligence cycle essay intro to intelligence
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Introduction
The Intelligence Cycle is an [effective], but outdated model. Essentially, it attempts to visualise intelligence as a process, and not merely a product. As such, by attempting a simple outline of a complex procedure, the cycle will be prone to misrepresenting dynamic changes; operational realities and either over, or under value particular parts of the process. However, it’s core strengths lie in it’s simplicity: shifting through the alphabet soup that is the Intelligence Community and making sense of the entire process is daunting: the Intelligence Cycle attempts to define its movement. This offers people within and outwith the Intelligence Community the ability to understand the essential tenets, or goals, within intelligence; that it is essentially a service . Further, simplicity allows change to better suit the environment.
However, as is evident from the recent criticisms of the Intelligence Community (IC), throughout the West in particular , there is a dramatic necessity to reform. In particular, each step of the process, and it’s relationship to the others, is misrepresented in the Intelligence Cycle. Briefly, the Direction phase has to re-evaluate it’s position due to the change in political environment; the collection and anlysis phases are inundanted due to the information age; and the dissemination phase is often misused by policymakers.
The following will suggest that the cycle can be changed to better reflect operational realities; a more productive solution than a complete revolution. Comparing it with a more complex Systems model; and suggest a more detailed model of the traditional intelligence cycle will do this. Understanding the need for these changes will in turn illustrate the dra...
... middle of paper ...
...lins, A., (ed) Contemporary Security Studies, US, Oxford University Press, 2007, p256.
Dupont, 2003, p18.
Dupont, 2003, p21.
Dupont, 2003, p26.
Mercado, S., ‘Sailing the Sea of OSINT in the Information Age’, Studies in Intelligence, Vol.48(3), p45-55.
Bartz, D., ‘Information Management Processes and the Intelligence Cycle’, Journal of Australian Institute of Professional Intelligence Officers, Vol.14(1)
US Government, A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis, Centre for the Study of Intelligence, March 2009
Heuer Jr., R., ‘Psychology of Intelligence Analysis’, Center for the Study of Intelligence, Central Intelligence Agency, 1999, Chapter 2 on perception in particular.
Gookins, 2008, p70.
Hulnick, 2006, p961-962.
Lowenthal, 2006, p62-64.
Gookins, 2008, p68.
Hulnick, 2006, p965-966.
For the American intelligence community, George Washington is considered the father of intelligence. The introduction of the intelligence concept and its application in some missions during the early days of America helped America’s Founding Fathers to succeed against t...
Intelligence failure was one of the main reasons why the Tet offensive happened. The allies undergo a failure of intelligence before Tet, a failure that helped plan the stages for changes in the strategies of the US. The four parts of intelligence are crucial in determining the actions of the enemy. The four tasks consist of collection of information, the analysis of the information, the decision to respond to a warning issued in the analytical stage, dissemination of the order to respond to the field co...
Nedzi (D-Mich.), Luclen N. “Oversight or Overlook: Congress and the US Intelligence Agency.” A Congressman talk to the CIA senior seminar, November 14, 1979, https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol18no2/pdf/v18i2a02p.pdf (accessed January 7, 2014).
Through the progression of the years, the intelligence operation within the United States government has changed tremendously over the last decades for both domestic and foreign intelligence. The intelligence community has grown and has evolved into executing different roles within the government; this includes law enforcement and government agencies. Both law enforcement and intelligence organizations have recognized the necessity to collaborate and exchange data in eliminating high security risks. The September 11 attacks also led to the expansion of more agencies and organizations to combat
Homeland security entities are proactive in the fight against terrorism on American soil. Their mandate is to collect information relating to potential attacks and analyze it to find a solution to the danger. With this in mind, these entities employ numerous spying techniques to collect intelligence for safeguarding of the nation. Homeland security entities have spies in almost all the countries in the world, especially those that show aggression towards America. The main aim of these spies is to carry out espionage to determine threat levels and find ways of neutralizing threats (Randol, 2009). This involves deployment of secret agents to areas or countries that exhibit terrorism activity in a bid to collect information. The spies interact with local people and members of terrorist groups using aliases that enable them conceal their identities.
Since, as he establishes, leadership’s political priorities were critical to the ultimate decision in the CIA’s actions, the degree to which the CIA actually concentrated on this mission of collection and analysis depended on the perceived threats from the top. Consequently, the actual level of reliable analysis deteriorated as demonstrated by the example of ORE analysists who were “normatively risk averse” and trying to “get it right,” and provide analysis that fit into the view of their leadership. Lacking trust in their analysists’ conclusions, the CIA proved unable to supply reliable intelligence and forge “collaboration and integration.” Rather than addressing institutional problems the CIA developed a pattern that continued throughout its entire history. Even though it refers to the Reagan era, Immerman’s conclusion that in a time of crisis the CIA deemed that they “required a change in leadership more than an institutional adjustment,” could easily apply to any other period. This application of psychology to history while enlightening does detract from the reader’s understanding of a formation of a CIA “culture” that limited its intelligence analysis efficiency. Without this fundamental comprehension of a CIA “culture,” some of Immerman’s later
Probabilistic reasoning is difficult. People prefer to reject ambiguity and demand that concrete predictions be made. However, intelligence is inherently ambiguous. In intelligence forecasting, it is difficult to determine what information constitutes a signal, and what constitutes noise. In “Connecting the Dots: The Paradoxes of Intelligence Reform”, Malcolm Gladwell analyzes several high-profile “intelligence failures”, such as the Yom Kippur War, September 11th, Pearl Harbor, and the Bay of Pigs fiasco, as well as several psychological studies, and comes to the conclusion that: (1) there is no such thing as a perfect intelligence system - all systems require tradeoffs; (2) failures do not constitute the limitations of the intelligence community,
Most researchers believe that we are born with a certain intelligence or potential intelligence. They also believe that the intelligence we are born with is difficult to change. Psychologists use short-answer tests to assess one’s intelligence (Gardner papers). It was believed that intelligence was a single inherited thing. Human beings start out initially as a blank slate and could be trained to learn anything, provided that it was presented in an appropriate way (Multiple Intelligences and Education). Currently an “increasing number of researchers believe the opposite. Gardner defined intelligence as: “the ability to create an effective product or offer a service that is valued in culture; a set ...
Counterintelligence (CI) is defined as, “information gathered and activities conducted to identify, deceive, exploit, disrupt, or protected against espionage, other intelligence activities, sabotage, or assassination conducted for or on behalf of foreign powers, organizations or persons, or their agents, or international terrorist organizations or activities. ” The citizenry of the United States on the U.S. Government is the focus of the examination of counter intelligence of citizenry on its national government. Data collected and research performed by James Riedel seeks to establish the citizens as a network of spies on the U.S. Government. The spying of citizens on the government is referred to as “espionage” . Counter Intelligence as acts of espionage committed by U.S. citizens is described by Riedel as short in duration and “poorly paid” .
Lycan, W. G. (1980) Reply to: "Minds, brains, and programs", The B.B.S. 3, p. 431.
The Central Intelligence Agency’s main responsibility is stated in its Vision statement: “We will provide knowledge and take action to ensure the national security of the United States and the preservation of American life and ideals” (www.cia.gov). The CIA’s job is to provide pertinent, timely, and un-biased foreign intelligence. They also act as an unseen force by conducting undercover action as ordered by the President in order to preempt threats or achieve objectives of the United States. The CIA is the only intelligence organization that is not subject to cabinet prerogative, making it reliable in it is unbiased in its reports, because it has no political agenda. There are six main types of intelligence by which the CIA collects information. Human intelligence (HUMINT) is information gathered by field operatives through overt and covert techniques (www.cia.gov). Communications intelligence (COMINT) is acquired from intercepted foreign communications (www.cia.go...
In order to see how artificial intelligence plays a role on today’s society, I believe it is important to dispel any misconceptions about what artificial intelligence is. Artificial intelligence has been defined many different ways, but the commonality between all of them is that artificial intelligence theory and development of computer systems that are able to perform tasks that would normally require a human intelligence such as decision making, visual recognition, or speech recognition. However, human intelligence is a very ambiguous term. I believe there are three main attributes an artificial intelligence system has that makes it representative of human intelligence (Source 1). The first is problem solving, the ability to look ahead several steps in the decision making process and being able to choose the best solution (Source 1). The second is the representation of knowledge (Source 1). While knowledge is usually gained through experience or education, intelligent agents could very well possibly have a different form of knowledge. Access to the internet, the la...
Sternberg, R. J. (1985). Beyond IQ: A triarchic theory of intelligence. New York: Cambridge University Press.
It is essential to know about what privacy means for the intelligence community (IC). The IC is interested in breaching the privacy of the “bad guys”, however the issue is how to do that without breaching the privacy of others. Figure 3 lists the three main areas related to privacy protection: accuracy, access and accountability (Landwehr, 2006 cited in Wacks, 2010, p.46).
Howard Gardner, a professor at Harvard, introduced his theory of multiple intelligences in 1983. Multiple intelligence’s is a theory about the brain that says human beings are born with single intelligence that cannot be changed, and is measurable by a psychologist. Gardner believes that there are eight different intelligences in humans. The eight are verbal linguistic, visual spatial, bodily kinesthetic, mathematical logic, musical, intrapersonal, interpersonal, and naturalist. Understanding these intelligence’s will help us to design our classroom and curriculum in a way that will appeal to all of our students. We might also be able to curve discipline problems by reaching a student in a different way. One that will make more sense to them and more enjoyable. We can include all of the intelligences in lessons to accommodate all of the students’ different learning styles at once. By reaching each students intelligence we can assume that a student will perform better which, could mean students retaining more important information. A students learning style can also help lead them into a more appropriate career direction. As a teacher you can also learn your own personal learning style or intelligence to help improve the way you learn and teach.