Edudorm Facebook

Intelligence Collection Methods

 Intelligence Collection Methods

 

Abstract

Intelligence research methods are methods used to collect and gather intelligence information from different sources to help the government in developing national policies and strategies. The five intelligence collection methods include human intelligence. The second method is signal intelligence. The third one is the measurement and signature intelligence method. The fourth method of intelligence is the imagery intelligence and the final one is the open-source intelligence method. The human intelligence methods involve the human sources whereby information is collected by government representatives and could be done through interviews. The signal intelligence includes signal intercepts that work individually or are combined to enable communication transmissions. The measurement and signature intelligence method involve obtaining information through the assessment of data that is obtained from practical devices. The imagery intelligence analyzes photos or images to get information. The open-source intelligence uses publicly available materials to gain information. In a post 9/11 world, intelligence methods help to identify and disrupt terrorist networks. The intelligence methods have played a major role in protecting the people from terrorists and the government in developing new strategies to become more prepared.

 

 

Introduction

Intelligence is the product of information that has been collected, assessed, integrated, and interpreted. Intelligence supports American diplomacy, military operations, defense planning, and counters activities that threaten the United States' interests. Intelligence collection is the process of collecting and gathering valuable information from different sources. The main objective of collecting intelligence is to collect and analyze information about foreign people, places, events, and activities that is required by the government to develop national policies and decisions for the future.

There are different methods of collecting intelligence and this includes human intelligence. This is a method that involves the collection of information through human sources. The collection can be done openly whereby witnesses or suspects are interviewed or it may be done through covert means (Margolis 2013). Mostly, human intelligence is done by open collectors, for example, government representatives and armed personnel. This method of collection is the oldest method of intelligence collection and is the primary source of intelligence for all governments. Human intelligence involves open, profound, and secret events and the people who are in control of the sources. Open events are conducted openly and the human intelligence collecting the information may include armed personnel, political workforces, and associates of authorized entrustments.

Sensitive human intelligence undertakings may be contingent on similar methods as open undertakings, nevertheless, the one sponsoring the activity has to be protected from disclosure. If a sponsor is disclosed, the outcome may be a political embarrassment, other intelligence operations may be compromised and the sponsoring party could be threatened. Secret human intelligence sources involve representatives that have been employed or have offered to provide information to another nation. They also include individuals from foreign countries that are successful in infiltrating a company with certain information. This happens rarely and if it happens to occur, they guise themselves as political refugees and once they are in, they place themselves where they are in a position to gather important information for their nations. Even with the rise of technical capabilities, human intelligence is still able to offer information better compared to the technical collectors. Human collectors can provide insights on what an adversary’s intentions are while the technical collection system is only limited to determining capabilities (Evans et al. 2013). Human intelligence can be used in revealing the intentions and plans of the adversary as well as reveal the developments of weapons before the technical intelligence systems detect. Human intelligence is capable of providing documentary evidence, for example, copies of adversary strategies, and policy documents among others. Compared with technical collection systems, human intelligence is cost-effective. Within the United States, the FBI is responsible for human intelligence collection, and beyond the U.S borders, human intelligence is collected by the CIA.

Signal intelligence is another collection method that is derived from signal intercepts that comprise of other signals depending on how they are transmitted, either individually or in combination. The signal intercepts comprise all communication intelligence which is one of the main signal intelligence disciplines and includes information that is removed from intercepted communications transmissions. Its main target is the voice, video, facsimile messages, and is collected from the different transmission mediums (Clark 2013). Electronic intelligence involves interception and analysis of transmissions that are non-communicable, for example, radar. It can determine the location of an emitter, identify its feature, and infer the features of supported systems. Foreign instrumentation signals intelligence comprises of intercepts of telemetry from an adversary’s weapons system as they are undergoing testing. Telemetry units offer information to designers about the sample’s regulation system process, the fuel used, and additional factors that are important in understanding the operational features. The available data enables the designer to assess the way the prototype is performing, however, they enable an adversary to assess the ability of the sample. Signal collection can be accomplished through overt ground collection locations, ships, aircraft, and covert locations. Signal intelligence amenities monitor transmissions from communication satellites and terrestrial amenities and the communication satellites are regularly checked by the foreign intelligent amenities. The National security agency is responsible for the signals intelligence activities.

Measurement and signature intelligence is a scientific and technical collection method. It involves obtaining information by qualitative and quantitative assessment of data that results from technical devices. This is done to identify any distinguishing characteristics connected to the source (Cirillo & Poehler 2006). The findings are used to expedite the latter’s dimension and identification. Measurement is data that is collected to acquire set metric restrictions. Signature on the other hand is the data that indicates the distinguishing characteristics of equipment as they are detected by the gathering instruments. The signature becomes familiar with the equipment when its distinguishing characteristics are sensed. Measurement and signature intelligence include radar intelligence, nuclear intelligence, chemical, and biological intelligence. The defense intelligence agency is the principal user of the measurement and signatures intelligence.

Imagery intelligence which sometimes referred to as photo intelligence is a collection method that analyzes images. It includes images of objects that are produced by electronic means or through film among other means. Imagery intelligence involves the use of data to sense and determine items and is formed from hard or soft copies. The hard copy is from the film while the soft copy is shown from the electric devices. They are evaluated and interpreted for different uses and by different individuals (Burk, Deschapelles, Doty Gayek & Gurlitz 2002). The increase of these systems has increased the use of the products including even in the nations that did not have access to them in the previous years. The imagery commercial market is likely to grow at a higher rate with additional collection systems being developed. The benefit to imagery is that it allows activities to be discovered, it targets features that are observed in detail hence providing a comprehensive outcome.

Imagery intelligence has limitations because the quality can be degraded by a lack of light or hostile weather conditions. This gives the target company ample time to indulge in undertakings that they would not want to be revealed. If a company knows that imagery is their target, they can use different strategies to hide what they are doing or give a confusing picture to the party that is observing them (Firschein & Strat 1997). When the deceptive strategies are used effectively, it can cause an adversary to draw the wrong conclusions about the organization's activities and abilities. Imagery intelligence method of collection requires well educated and technically competent analysts and this is an ability that will be beyond some adversaries. The national geospatial-intelligence agency is responsible for processing and using the imagery.

Open-source intelligence refers to the use of resources that are accessible to the public. It includes information that is obtained from the media, such as newspapers, television, radio, and professional records such as papers and conferences. It also includes information obtained from public data such as government reports, demographics, and speeches among others. Open-source intelligence is not the responsibility of any particular agency but the entire intelligence community. The main advantage of open source intelligence is that it is accessible. With the rise of electric records, it is easy to collect a quantitative amount of data and come up with concrete information (Lowenthal & Clark 2016). This method of intelligence is capable of providing information based on the changing aspects of an organization, practical processes, and the assessment undertakings. When the information is put together, it becomes possible to obtain top-secret data. Analysis of journal articles that have been published by different publishers provides an understanding of research and the developing efforts. Open-source intelligence collection has limitations which include, knowing to what extent the available information is valuable. It is also hard to determine the source of the data and how reliable it is.

 In a post 9/11 world, intelligence is important in identifying and disrupting terrorist networks. The intelligence methods empower law enforcement by finding out about their operations and enable them to identify and disrupt plots before they are executed. Intelligence methods play a significant role in providing evidence at criminal trials. Through them, members of terrorist networks have been identified and their plots have been detected even before they thought of execution (Patel 2013). They have helped to gather important information through interrogation and this has led to the terrorists giving valuable information about the terrorist groups and planned activities. They have helped to protect the intelligence, including the sources and the methods which aided in identifying and disrupting the wrongdoer and his activities. They have helped to guide important decisions concerning who should be brought to justice and how it should be done to ensure success. Otherwise dangerous terrorists could be freed and intelligence lost and this could be putting innocent lives to risk. The intelligence methods have played a major role in protecting the people from terrorists and other dangers and the government in developing new strategies to become more prepared. The police departments have put their focus on intelligence methods towards collecting and gathering information that will help them in the areas that they serve.

 

 

Conclusion

Intelligent collection methods are used to collect and gather valuable information from different sources.  The main aim is to develop national policies and decisions for the future and with the best’s interests of the nation. The human intelligence method involves the collection of information through human sources by interviews or covert means. The signal intelligence method involves signal intercepts that work individually or are combined to enable communication transmissions. Measurement and signature intelligence involves obtaining information through the assessment of data that is obtained from practical devices. Imagery intelligence is a method that analyzes imagery to acquire information. Open-source intelligence uses materials that are available to the public to gain information. Intelligence methods in a post 9/11 world are used to provide information and evidence concerning terrorist activities and groups. They have also helped the police departments in collecting and gathering information that is helpful to them.

 

 

 

 

 

 

References

Burk, R. C., Deschapelles, C., Doty, K., Gayek, J. E., & Gurlitz, T. (2002). Performance analysis

in the selection of imagery intelligence satellites. Military Operations Research, 45-60.

 

Cirillo, F. R., & Poehler, P. L. (2006). U.S. Patent No. 7,136,010. Washington, DC: U.S. Patent

and Trademark Office.

 

Clark, R. M. (2013). Intelligence collection. Washington DC : CQ Press, 2013.

Evans, J. R., Meissner, C. A., Ross, A. B., Houston, K. A., Russano, M. B., & Horgan, A. J.

(2013). Obtaining guilty knowledge in human intelligence interrogations: Comparing accusatorial and information-gathering approaches with a novel experimental paradigm. Journal of Applied Research in Memory and Cognition, 2(2), 83-88.

 

Firschein, O., & Strat, T. M. (Eds.). (1997). RADIUS: Image understanding for imagery

intelligence. Morgan Kaufmann.

 

Lowenthal, M. M., & Clark, R. M. (2016). The five disciplines of intelligence collection. Thousand Oaks, California : CQ Press, an imprint of Sage Publications, Inc. C

Margolis, G. (2013). The Lack of HUMINT: A Recurring Intelligence Problem. Global Security

Studies, 4(2).

 

Patel, F. (2013). Domestic Intelligence: Our Rights and Safety. Brennan Center for Justice.

 

2027 Words  7 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...