SlideShare a Scribd company logo
1 of 51
Chapter 5: Collection and the Collection
Disciplines
________________________________________
* what is "collection," and what does it
entail?
* what are the overarching themes and
problems concerning collection?
* what are the strengths and weaknesses of
this stage of the intelligence cycle?
-- include mention of different types of
collection activities
The United States and several other
nations use multiple means of collecting
the intelligence they require.
The means of collecting
intelligence are sometimes
referred to as collection
disciplines or INTs.
Several issues within the
collection disciplines tend to
drive many of the debates and
decisions on intelligence
collection.
Decision makers placed greater
emphasis on collection systems
than on the processing and
exploitation needed to deal with
the intelligence collected.
The terrorist attacks in 2001
raised additional questions
about the utility of these
systems, as terrorist targets
require greater use of human
intelligence.
One of the director of national
intelligence (DNI) John Negroponte's
major collection decisions, he ordered
the Boeing Company to stop work on a
system known as the Future Imagery
Architecture (FIA), widely thought to
be the next generation of imagery
satellites.
However, the TPEDs problem
remains and may grow worse
as new collection systems are
launched, as they will have
increased collection
capabilities.
No matter how satisfactory current
collection capabilities are, there
are several impulses to build new
systems: to improve collection
capabilities, to take advantage of
new technologies, and to respond
to changing intelligence priorities.
Reaching the decision to build a new system
involves additional time (sometimes several
years) as intelligence agencies and their policy
customers debate among competing systems in
an always constrained budget about:
 which intelligence needs should take
priority
 which technologies should be pursued
 what trade-offs should be made
One of the major advantages of
having multiple means of collection
is that one system or discipline can
provide tips or clues that can be
used to guide collection by other
systems.
Intelligence community is to
produce all-source intelligence, or
fusion intelligence. Intelligence
based on as many collection sources
as possible to compensate for the
shortcomings of each and to profit
from their combined strength.
At the same time, the diverse
array allows collection managers
to increase collection in
breadth, that is, to increase the
number of issues being covered,
albeit with less depth for a
particular issue.
Although analysts were slow to
understand that Soviet premier
Nikita Khrushchev was willing to
make such a risky move as
deploying medium- and
intermediate-range missiles in
Cuba, the intelligence community
brought a variety of collection
means to bear.
Imagery then provided crucial
intelligence about the status of the
missile sites and the approximate time
before completion, as did Soviet
technical manuals turned over to the
United States by Soviet colonel Oleg
Penkovsky, a spy in the employ of the
United States and Britain.
Imagery then provided crucial
intelligence about the status of the
missile sites and the approximate time
before completion, as did Soviet
technical manuals turned over to the
United States by Soviet colonel Oleg
Penkovsky, a spy in the employ of the
United States and Britain.
It also reflects years of budget
choices by the intelligence
community and Congress that
have favored new collection
systems over improving P&E
capabilities.
As noted, the intelligence
committees find it difficult to put
money into new collection systems
when they are told that only as
many images or signals will be
processed and exploited as was the
case for the previous generations of
collectors.
This refers to the tendency of all
collectors or collection agencies
to collect on an issue that is
deemed important, whether or
not they bring anything useful
to the table or can offer an
appropriate type of collection.
For example, if a high-priority issue
were the cyber-attack capabilities
of a hostile state, little value would
be gained by imagery, although
imagery collection managers might
be tempted to contribute to the
issue based solely on its priority.
Second, the agreement must be
rigorously enforced, and agencies must
not be penalized for not collecting
against issues not suited to them
regardless of the issues' importance
and must be recognized for
concentrating on the issues about
which they can collect needed
intelligence.
The security classifications are
driven by concerns that the
disclosure of capabilities will allow
those nations that are collection
targets to take steps to prevent
collection, thus effectively negating
the collection systems.
Intelligence community has
grown concerned about
protecting intelligence sources
and methods during post-cold
war military operations that
involve cooperation with
nations that are not U.S.
In these cases the need to protect intelligence
sources and methods must be balanced
against the need to share intelligence not only
for the sake of the operation but also to
ensure that military partners in the operation
are not put in a position in which their actions
or inactions prove to be dangerous to U.S.
Thus, classification related to
intelligence collection
underscores both the
importance of the information
and the fragility of its source
something that would be
difficult to replace if disclosed.
The United States and
Britain said they would
provide intelligence on
Iraqi WMD to United
Nations (UN) inspectors
but not necessarily all
available intelligence.
Some controversy arose after DCI Tenet
said the United States was cooperating
fully but the CIA later revealed that it had
shared intelligence on 84 of 105 suspected
priority weapons sites, which some
members of Congress felt was not what
they had understood to be the agreed
level of intelligence sharing.
First, all of the technical Collection disciplines
geospatial intelligence (GEOINT, formerly
imagery or IMINT), signals intelligence (SIGINT),
and measurement and signatures intelligence
(MASINT) and the nontechnical human
intelligence (HUMINT), or espionage, have end-
to-end processes, from collection through
dissemination.
The INTs sometimes vie with one
another to respond to requests for
intelligence largely as a means of
ensuring continuing funding levels
regardless of which INT is best
suited to provide the required
intelligence.
These mission managers report to
both the deputy DNIs for analysis
and Collection and are responsible
for ensuring that the two aspects of
intelligence work together to
improve both collection and
analysis.
A targeted nation can use
knowledge about the collection
capabilities of an opponent to avoid
collection (known as denial); the
target can use the same knowledge
to transmit information to a
collector.
Does the United States require the same
extensive array of collection systems to deal
with post- cold war intelligence issues? Also,
some of the leading intelligence issues the so-
called transnational issues such as narcotics,
Terrorism, and crime may be less susceptible to
the technical collection capabilities built to deal
with the Soviet Union or other classic political-
military intelligence problems.
Theoretically, the greater
availability of open- source
intelligence should make the
intelligence community's job
easier.
Moreover, the intelligence
community harbors some
institutional prejudice against open-
source intelligence, as it seems to
run counter to the purposes for
which the intelligence community
was created.
The United States is extremely
dependent on satellites for
intelligence collection, for
communications, and for a host
of commercial applications.
Imagery capabilities have become
better known, states can take steps
to deceive collection using
camouflage or dummies or to
preclude collection by conducting
certain activities at times when they
are unlikely or less likely to be
observed.
The agency's actions expanded the
overall collection capability of the
United States and allowed it to
reserve more sophisticated imagery
capabilities for those areas where
they were most needed, while
IKONOS took up other collection
tasks.
Bush signed a directive stating that the United
States would rely on commercial imagery "to the
maximum practical extent" for a wider range of
requirements: "military, intelligence, foreign
policy, homeland security and civil uses." This
refers to the need to consider the value of the
intelligence that is going to be collected (the
take) against the risk of discovery either in
political terms or in the collection technology
that may then be revealed to another nation.
As with the other collection
disciplines, SIGINT was
developed to collect
intelligence on the Soviet
Union and other nations.
Intelligence to change
the rules under which
they collect SIGINT
within the United
States.
At the same time, all nations know
that the UN is an excellent
intelligence collection target as
virtually all nations of the world
have missions and representatives
there.
Is this person a double agent who is
collecting information on your intelligence
agency's HUMINT techniques and
capabilities even as he or she passes
information to you? Such an idea runs
counter to the concept of an all-source
intelligence process that seeks to apply as
many Collection disciplines as possible to a
given intelligence need.
Clearly, having a collection system
that is strong and flexible and can
be modulated to the intelligence
requirement at hand is better than
one that swings between
apparently opposed fashions of
technical and human collection.
For the United States, at least, it
remains important to view HUMINT
as part of a larger collection
Strategy instead of as the single INT
that meets the country's most
important intelligence needs.
Even during the height of the
cold war, according to one
senior intelligence official, at
least 20 percent of the
intelligence about the Soviet
Union came from open sources.
In addition to GEOINT,
SIGINT, HUMINT, OSINT, and
MASINT, intelligence officers,
in their lighter moments,
speak of other INTs
(collection disciplines).
DNI McConnell has referred to
OSINT as the starting point for
collection, as have others before
him in other words, looking for the
needed intelligence in open sources
first before tasking classified
collection sources, either technical
or human.
Putting this seemingly obvious plan into
practice has proven difficult over the years
for a number of reasons, including
preferences within the intelligence
community and among policy makers for
classified sources and the difficulty that the
intelligence community's open source
activity has had in keeping pace with the
explosion of open sources.
Second, it is able to apply
more than one collection INT
to an issue, which enhances
the likelihood of meeting the
collection requirements for
that issue.
However, the intelligence
community cannot provide answers
to every question that is asked, nor
does it have the capability to meet
all possible requirements at any
given time. The collection system is
simultaneously powerful and
limited.

More Related Content

What's hot

Cyber Deception After Detection: Safe Observation Environment Using Software ...
Cyber Deception After Detection: Safe Observation Environment Using Software ...Cyber Deception After Detection: Safe Observation Environment Using Software ...
Cyber Deception After Detection: Safe Observation Environment Using Software ...Shimanaka Tohru
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersDeborah Osborne
 
Information warfare.11
Information warfare.11Information warfare.11
Information warfare.11Dr. Alok Yadav
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect usLuis Borges Gouveia
 
Intelligence presentation
Intelligence presentationIntelligence presentation
Intelligence presentationiChange
 
Counterintelligence Paper
Counterintelligence PaperCounterintelligence Paper
Counterintelligence PaperLori A. Ruff
 
Deception technology for advanced detection
Deception technology for advanced detectionDeception technology for advanced detection
Deception technology for advanced detectionJisc
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic ViewCisco Canada
 
POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxRoland994165
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringJeremiah Tillman
 
Tactical Convoy Operations
Tactical Convoy OperationsTactical Convoy Operations
Tactical Convoy OperationsWilliam Perkins
 
Yom kippur war 1973
Yom kippur war 1973Yom kippur war 1973
Yom kippur war 1973Veer Salaria
 
Jesús Alcalde & Daniel Gonzalez- - OSINT: La verdad está ahí fuera [rooted2018]
Jesús Alcalde & Daniel Gonzalez- - OSINT: La verdad está ahí fuera [rooted2018]Jesús Alcalde & Daniel Gonzalez- - OSINT: La verdad está ahí fuera [rooted2018]
Jesús Alcalde & Daniel Gonzalez- - OSINT: La verdad está ahí fuera [rooted2018]RootedCON
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18David Sweigert
 

What's hot (20)

Cyber Deception After Detection: Safe Observation Environment Using Software ...
Cyber Deception After Detection: Safe Observation Environment Using Software ...Cyber Deception After Detection: Safe Observation Environment Using Software ...
Cyber Deception After Detection: Safe Observation Environment Using Software ...
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision Makers
 
Information warfare.11
Information warfare.11Information warfare.11
Information warfare.11
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
Intelligence presentation
Intelligence presentationIntelligence presentation
Intelligence presentation
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
Counterintelligence Paper
Counterintelligence PaperCounterintelligence Paper
Counterintelligence Paper
 
Deception technology for advanced detection
Deception technology for advanced detectionDeception technology for advanced detection
Deception technology for advanced detection
 
Basic intelligence
Basic intelligenceBasic intelligence
Basic intelligence
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptx
 
Agent handling
Agent handlingAgent handling
Agent handling
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
 
Tactical Convoy Operations
Tactical Convoy OperationsTactical Convoy Operations
Tactical Convoy Operations
 
Yom kippur war 1973
Yom kippur war 1973Yom kippur war 1973
Yom kippur war 1973
 
Jesús Alcalde & Daniel Gonzalez- - OSINT: La verdad está ahí fuera [rooted2018]
Jesús Alcalde & Daniel Gonzalez- - OSINT: La verdad está ahí fuera [rooted2018]Jesús Alcalde & Daniel Gonzalez- - OSINT: La verdad está ahí fuera [rooted2018]
Jesús Alcalde & Daniel Gonzalez- - OSINT: La verdad está ahí fuera [rooted2018]
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18
 

Viewers also liked

Chapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligenceChapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligenceDoing What I Do
 
Chapter 1 what is intelligence
Chapter 1 what is intelligenceChapter 1 what is intelligence
Chapter 1 what is intelligenceDoing What I Do
 
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy makerDoing What I Do
 

Viewers also liked (6)

Chapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligenceChapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligence
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Chapter 8 covert action
Chapter 8 covert actionChapter 8 covert action
Chapter 8 covert action
 
Chapter 1 what is intelligence
Chapter 1 what is intelligenceChapter 1 what is intelligence
Chapter 1 what is intelligence
 
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
 
Intelligence Cycle
Intelligence CycleIntelligence Cycle
Intelligence Cycle
 

Similar to Chapter 5 collection and the collection disciplines

· One pageThe Secret Universe of the CellDocumentary - The Hid.docx
· One pageThe Secret Universe of the CellDocumentary - The Hid.docx· One pageThe Secret Universe of the CellDocumentary - The Hid.docx
· One pageThe Secret Universe of the CellDocumentary - The Hid.docxoswald1horne84988
 
Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligencehfrancob
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacksClifford Stone
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on TerrorTpeisi Nesby
 
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docxINTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docxdoylymaura
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacEvonCanales257
 
Information Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxInformation Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxannettsparrow
 
IA article (Margaret S. Marangione) (1)
IA article (Margaret S. Marangione) (1)IA article (Margaret S. Marangione) (1)
IA article (Margaret S. Marangione) (1)Margaret Marangione
 
Ic and policymaker integration a studies in intelligence anthology
Ic and policymaker integration a studies in intelligence anthologyIc and policymaker integration a studies in intelligence anthology
Ic and policymaker integration a studies in intelligence anthologyhttps://www.cia.gov.com
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GOllieShoresna
 
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Mark Raduenzel
 
Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...528Hz TRUTH
 
1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalyticsDaniel John
 
Chapter4 brunt
Chapter4 bruntChapter4 brunt
Chapter4 bruntokeee
 
Osint data mining
Osint data miningOsint data mining
Osint data miningDaniel John
 
Nato osint reader final 11 oct02
Nato osint reader final 11 oct02Nato osint reader final 11 oct02
Nato osint reader final 11 oct02Steph Cliche
 

Similar to Chapter 5 collection and the collection disciplines (20)

· One pageThe Secret Universe of the CellDocumentary - The Hid.docx
· One pageThe Secret Universe of the CellDocumentary - The Hid.docx· One pageThe Secret Universe of the CellDocumentary - The Hid.docx
· One pageThe Secret Universe of the CellDocumentary - The Hid.docx
 
Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligence
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacks
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Foreig~1 (1)
Foreig~1 (1)Foreig~1 (1)
Foreig~1 (1)
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on Terror
 
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docxINTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
INTL304 – Intelligence CollectionStrategic and Tactical Intelligen.docx
 
Wizards of-langley
Wizards of-langleyWizards of-langley
Wizards of-langley
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
Information Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxInformation Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docx
 
IA article (Margaret S. Marangione) (1)
IA article (Margaret S. Marangione) (1)IA article (Margaret S. Marangione) (1)
IA article (Margaret S. Marangione) (1)
 
Ic and policymaker integration a studies in intelligence anthology
Ic and policymaker integration a studies in intelligence anthologyIc and policymaker integration a studies in intelligence anthology
Ic and policymaker integration a studies in intelligence anthology
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
 
ABI White Paper
ABI White PaperABI White Paper
ABI White Paper
 
Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...
 
1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics
 
Chapter4 brunt
Chapter4 bruntChapter4 brunt
Chapter4 brunt
 
Osint data mining
Osint data miningOsint data mining
Osint data mining
 
Nato osint reader final 11 oct02
Nato osint reader final 11 oct02Nato osint reader final 11 oct02
Nato osint reader final 11 oct02
 

More from Doing What I Do (16)

403 10
403 10403 10
403 10
 
403 14
403 14403 14
403 14
 
403 12
403 12403 12
403 12
 
403 13
403 13403 13
403 13
 
403 2
403 2403 2
403 2
 
403 11
403 11403 11
403 11
 
403 9
403 9403 9
403 9
 
403 8
403 8403 8
403 8
 
403 4
403 4403 4
403 4
 
403 3
403 3403 3
403 3
 
403 1
403 1403 1
403 1
 
Tsa's positive 1
Tsa's positive 1Tsa's positive 1
Tsa's positive 1
 
Intelligence agencys
Intelligence agencysIntelligence agencys
Intelligence agencys
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence community
 
Chapter 10 oversight and accountability 1
Chapter 10  oversight and accountability 1Chapter 10  oversight and accountability 1
Chapter 10 oversight and accountability 1
 
Chapter 2 part 2 major historical development
Chapter 2 part 2 major historical developmentChapter 2 part 2 major historical development
Chapter 2 part 2 major historical development
 

Recently uploaded

Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxSwastiRanjanNayak
 
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakurbest call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha ThakurSUHANI PANDEY
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisChristina Parmionova
 
World Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - PosterWorld Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - PosterChristina Parmionova
 
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Dipal Arora
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processNAP Global Network
 
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.Christina Parmionova
 
SMART BANGLADESH I PPTX I SLIDE IShovan Prita Paul.pptx
SMART BANGLADESH  I    PPTX   I    SLIDE   IShovan Prita Paul.pptxSMART BANGLADESH  I    PPTX   I    SLIDE   IShovan Prita Paul.pptx
SMART BANGLADESH I PPTX I SLIDE IShovan Prita Paul.pptxShovan Prita Paul .
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORSPPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORSgovindsharma81649
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfSamirsinh Parmar
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learningNAP Global Network
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...aartirawatdelhi
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...nservice241
 

Recently uploaded (20)

Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptx
 
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
 
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakurbest call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental Crisis
 
World Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - PosterWorld Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - Poster
 
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
 
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
 
SMART BANGLADESH I PPTX I SLIDE IShovan Prita Paul.pptx
SMART BANGLADESH  I    PPTX   I    SLIDE   IShovan Prita Paul.pptxSMART BANGLADESH  I    PPTX   I    SLIDE   IShovan Prita Paul.pptx
SMART BANGLADESH I PPTX I SLIDE IShovan Prita Paul.pptx
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition PlansSustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
 
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
 
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORSPPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdf
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learning
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
 

Chapter 5 collection and the collection disciplines

  • 1. Chapter 5: Collection and the Collection Disciplines ________________________________________ * what is "collection," and what does it entail? * what are the overarching themes and problems concerning collection? * what are the strengths and weaknesses of this stage of the intelligence cycle? -- include mention of different types of collection activities
  • 2.
  • 3. The United States and several other nations use multiple means of collecting the intelligence they require.
  • 4. The means of collecting intelligence are sometimes referred to as collection disciplines or INTs.
  • 5. Several issues within the collection disciplines tend to drive many of the debates and decisions on intelligence collection.
  • 6. Decision makers placed greater emphasis on collection systems than on the processing and exploitation needed to deal with the intelligence collected.
  • 7. The terrorist attacks in 2001 raised additional questions about the utility of these systems, as terrorist targets require greater use of human intelligence.
  • 8. One of the director of national intelligence (DNI) John Negroponte's major collection decisions, he ordered the Boeing Company to stop work on a system known as the Future Imagery Architecture (FIA), widely thought to be the next generation of imagery satellites.
  • 9. However, the TPEDs problem remains and may grow worse as new collection systems are launched, as they will have increased collection capabilities.
  • 10. No matter how satisfactory current collection capabilities are, there are several impulses to build new systems: to improve collection capabilities, to take advantage of new technologies, and to respond to changing intelligence priorities.
  • 11. Reaching the decision to build a new system involves additional time (sometimes several years) as intelligence agencies and their policy customers debate among competing systems in an always constrained budget about:  which intelligence needs should take priority  which technologies should be pursued  what trade-offs should be made
  • 12. One of the major advantages of having multiple means of collection is that one system or discipline can provide tips or clues that can be used to guide collection by other systems.
  • 13. Intelligence community is to produce all-source intelligence, or fusion intelligence. Intelligence based on as many collection sources as possible to compensate for the shortcomings of each and to profit from their combined strength.
  • 14. At the same time, the diverse array allows collection managers to increase collection in breadth, that is, to increase the number of issues being covered, albeit with less depth for a particular issue.
  • 15. Although analysts were slow to understand that Soviet premier Nikita Khrushchev was willing to make such a risky move as deploying medium- and intermediate-range missiles in Cuba, the intelligence community brought a variety of collection means to bear.
  • 16. Imagery then provided crucial intelligence about the status of the missile sites and the approximate time before completion, as did Soviet technical manuals turned over to the United States by Soviet colonel Oleg Penkovsky, a spy in the employ of the United States and Britain.
  • 17. Imagery then provided crucial intelligence about the status of the missile sites and the approximate time before completion, as did Soviet technical manuals turned over to the United States by Soviet colonel Oleg Penkovsky, a spy in the employ of the United States and Britain.
  • 18. It also reflects years of budget choices by the intelligence community and Congress that have favored new collection systems over improving P&E capabilities.
  • 19. As noted, the intelligence committees find it difficult to put money into new collection systems when they are told that only as many images or signals will be processed and exploited as was the case for the previous generations of collectors.
  • 20. This refers to the tendency of all collectors or collection agencies to collect on an issue that is deemed important, whether or not they bring anything useful to the table or can offer an appropriate type of collection.
  • 21. For example, if a high-priority issue were the cyber-attack capabilities of a hostile state, little value would be gained by imagery, although imagery collection managers might be tempted to contribute to the issue based solely on its priority.
  • 22. Second, the agreement must be rigorously enforced, and agencies must not be penalized for not collecting against issues not suited to them regardless of the issues' importance and must be recognized for concentrating on the issues about which they can collect needed intelligence.
  • 23. The security classifications are driven by concerns that the disclosure of capabilities will allow those nations that are collection targets to take steps to prevent collection, thus effectively negating the collection systems.
  • 24. Intelligence community has grown concerned about protecting intelligence sources and methods during post-cold war military operations that involve cooperation with nations that are not U.S.
  • 25. In these cases the need to protect intelligence sources and methods must be balanced against the need to share intelligence not only for the sake of the operation but also to ensure that military partners in the operation are not put in a position in which their actions or inactions prove to be dangerous to U.S.
  • 26. Thus, classification related to intelligence collection underscores both the importance of the information and the fragility of its source something that would be difficult to replace if disclosed.
  • 27. The United States and Britain said they would provide intelligence on Iraqi WMD to United Nations (UN) inspectors but not necessarily all available intelligence.
  • 28. Some controversy arose after DCI Tenet said the United States was cooperating fully but the CIA later revealed that it had shared intelligence on 84 of 105 suspected priority weapons sites, which some members of Congress felt was not what they had understood to be the agreed level of intelligence sharing.
  • 29. First, all of the technical Collection disciplines geospatial intelligence (GEOINT, formerly imagery or IMINT), signals intelligence (SIGINT), and measurement and signatures intelligence (MASINT) and the nontechnical human intelligence (HUMINT), or espionage, have end- to-end processes, from collection through dissemination.
  • 30. The INTs sometimes vie with one another to respond to requests for intelligence largely as a means of ensuring continuing funding levels regardless of which INT is best suited to provide the required intelligence.
  • 31. These mission managers report to both the deputy DNIs for analysis and Collection and are responsible for ensuring that the two aspects of intelligence work together to improve both collection and analysis.
  • 32. A targeted nation can use knowledge about the collection capabilities of an opponent to avoid collection (known as denial); the target can use the same knowledge to transmit information to a collector.
  • 33. Does the United States require the same extensive array of collection systems to deal with post- cold war intelligence issues? Also, some of the leading intelligence issues the so- called transnational issues such as narcotics, Terrorism, and crime may be less susceptible to the technical collection capabilities built to deal with the Soviet Union or other classic political- military intelligence problems.
  • 34. Theoretically, the greater availability of open- source intelligence should make the intelligence community's job easier.
  • 35. Moreover, the intelligence community harbors some institutional prejudice against open- source intelligence, as it seems to run counter to the purposes for which the intelligence community was created.
  • 36. The United States is extremely dependent on satellites for intelligence collection, for communications, and for a host of commercial applications.
  • 37. Imagery capabilities have become better known, states can take steps to deceive collection using camouflage or dummies or to preclude collection by conducting certain activities at times when they are unlikely or less likely to be observed.
  • 38. The agency's actions expanded the overall collection capability of the United States and allowed it to reserve more sophisticated imagery capabilities for those areas where they were most needed, while IKONOS took up other collection tasks.
  • 39. Bush signed a directive stating that the United States would rely on commercial imagery "to the maximum practical extent" for a wider range of requirements: "military, intelligence, foreign policy, homeland security and civil uses." This refers to the need to consider the value of the intelligence that is going to be collected (the take) against the risk of discovery either in political terms or in the collection technology that may then be revealed to another nation.
  • 40. As with the other collection disciplines, SIGINT was developed to collect intelligence on the Soviet Union and other nations.
  • 41. Intelligence to change the rules under which they collect SIGINT within the United States.
  • 42. At the same time, all nations know that the UN is an excellent intelligence collection target as virtually all nations of the world have missions and representatives there.
  • 43. Is this person a double agent who is collecting information on your intelligence agency's HUMINT techniques and capabilities even as he or she passes information to you? Such an idea runs counter to the concept of an all-source intelligence process that seeks to apply as many Collection disciplines as possible to a given intelligence need.
  • 44. Clearly, having a collection system that is strong and flexible and can be modulated to the intelligence requirement at hand is better than one that swings between apparently opposed fashions of technical and human collection.
  • 45. For the United States, at least, it remains important to view HUMINT as part of a larger collection Strategy instead of as the single INT that meets the country's most important intelligence needs.
  • 46. Even during the height of the cold war, according to one senior intelligence official, at least 20 percent of the intelligence about the Soviet Union came from open sources.
  • 47. In addition to GEOINT, SIGINT, HUMINT, OSINT, and MASINT, intelligence officers, in their lighter moments, speak of other INTs (collection disciplines).
  • 48. DNI McConnell has referred to OSINT as the starting point for collection, as have others before him in other words, looking for the needed intelligence in open sources first before tasking classified collection sources, either technical or human.
  • 49. Putting this seemingly obvious plan into practice has proven difficult over the years for a number of reasons, including preferences within the intelligence community and among policy makers for classified sources and the difficulty that the intelligence community's open source activity has had in keeping pace with the explosion of open sources.
  • 50. Second, it is able to apply more than one collection INT to an issue, which enhances the likelihood of meeting the collection requirements for that issue.
  • 51. However, the intelligence community cannot provide answers to every question that is asked, nor does it have the capability to meet all possible requirements at any given time. The collection system is simultaneously powerful and limited.