According to the world-famous quote, “The one who owns information owns the world”. That is why it is important to stay aware of all current state of affairs and the emergent technologies. In order to do so, a certain well-structured and complex approach to information and its analysis is definitely needed, and the one may be provided by the technique of the Intelligence Cycle. Therefore the aim of this essay will be to introduce and analyze the concept of the Intelligence Cycle, as well as consider the methods of information gathering about potential terrorists, which is one of the greatest challenges of modern society.
There are several perspectives in defining the notion of the Intelligence Cycle. According to the Free Dictionary, it I the “sequence of activities whereby information is obtained, assembled, and
converted into intelligence and made available to users.” The Central Intelligence Agency identifies it as a five-step process which is to be followed within a specific project Central Intelligence Agency, 2013), thus focusing on its basic structure. Bacastow's explanation of the notion goes as following: The Intelligence Cycle is a concept that describes the general intelligence process in both a civilian and military intelligence agency or in law enforcement” (Bacastow, 2010). The last definition perspective is probably the closest one as it outlines its primary functions and the field of its application. Therefore it is also notable to mention that the process insures implementation of work properly and focuses on the needs of so-called intelligence "consumers', who may be military officials, policymakers, or other decision makers who require intelligence in order to perform (Bacastow, 2010).
As it was already mentioned that the Intelligence Cycle is a five-step process, each of the steps needs to be closely investigated. The Cycle consists of the following elements: Planning and Direction, Collection, Processing (or Process Exploitation), Analysis and Production, and Dissemination (Central Intelligence Agency, 2013).
Planning and Direction involves establishing the requirements for certain intelligence and planning the related actions accordingly. As US National Intelligence mentions, it is “the springboard from which all Intelligence Cycle activities are launched”. (US National Intelligence, 2013). The second stage of the Cycle is collection, which implies collecting “raw” data - both overtly (meaning, “open” data like media releases, news reports, information gained through World Wide Web), and covertly, or secretly (through hidden cameras, secret documents, space technologies like satellites, etc.) (Central Intelligence Agency, 2013). The next phase, processing, requires converting the gathered raw data into the appropriate format, as well as information decoding and translation, if necessary. During the next phase, when information is analyzed, estimated, and structurally summarized, raw data turns into applicable products, separating “information” from “intelligence.” (US National Agency, 2013). Finally, the next step, dissemination, implies delivering the finished written analysis. One more stage, though, is also highly advised - evaluation, which is needed to estimate the quality and the outcome of the Intelligence Cycle, as well as to provide feedback on the whole process.
The method of Intelligence Cycle can be applied successfully to fight the terrorism and trace potential terrorists. What is more, certain developments have already been done: the steps to reorganize national security intelligence were developed by congress and administration and included the following: supporting state and local emergency communication, coordinating analysis of federal and local law enforcement and intelligence data, improving federal information technology capabilities, reducing barriers to sharing information among federal agencies.
The growth and improvement in information technologies can ensure more advanced quality of intelligence gathering and boost the transformations in the sphere of homeland security. Data collection must be carried out with the multitude of applied tools and techniques, both overtly and covertly. The example of such innovations may be the fact that new Department of Homeland Security, charged with coordinating domestic intelligence gathering and information sharing, has started collecting data about vulnerabilities in the nation’s critical infrastructure. (Steinberg et al., 2013).
However, gradual changes are not enough, as they don’t bring the desired level of efficiency and security. Policymakers must build a new intelligence system to fight terrorism, claims Steinberg. Thus he suggests replacing the hierarchical, formal, and compartmentalized information strategies of the past with new flexible, decentralized networks of public and private information providers, users, and analysts. While gathering data, the matter of privacy and openness must be taken into account, so that the gathered intelligence would be safe enough. Beside this, Steinberg insists on replacing the formal, hierarchical intelligence structure with a horizontal, cooperative, and fluid architecture, justifying it by the fact that “Hard-wiring” intelligence relationships when targets, actors, and methods aren't certain impairs the capacity to adapt to changing threats and vulnerabilities. (Steinberg et al., 2013). As long as a threat of terrorism is hovering over the world, the nations need to be well-equipped to fight it back, and intelligence gathering strategies may significantly help in it.
References
Bacastow, T. (2010). Intelligence Cycle and Process. The Learner's Guide to Geospatial Analysis.
Retrieved from https://www.e-education.psu.edu/sgam/node/15
Central Intelligence Agency (2013). The Intelligence Cycle. Retrieved from
https://www.cia.gov/kids-page/6-12th-grade/who-we-are-what-we-do/the-intelligence-cycle.html
Steinberg, B. J., Graham, M., Eggers, A. (2003). Building Intelligence to Fight Terrorism. Retrieved
U.S. National Intelligence (2013). The 6 Steps In The Intelligence Cycle. Retrieved from
http://fusioncenter.golearnportal.org/rawmedia_repository/b4e1b56dcf572f53b00ee43a31b34223?/document.pdf