{"id":166,"date":"2014-04-20T13:38:18","date_gmt":"2014-04-20T20:38:18","guid":{"rendered":"http:\/\/www.usacounterterrorism.com\/blog\/?p=166"},"modified":"2014-04-20T14:47:14","modified_gmt":"2014-04-20T21:47:14","slug":"the-intelligence-cycle","status":"publish","type":"post","link":"http:\/\/www.usacounterterrorism.com\/blog\/the-intelligence-cycle\/","title":{"rendered":"The Intelligence Cycle"},"content":{"rendered":"<p>The Intelligence Cycle<br \/>\nThe intelligence cycle is the process of developing raw information into finished intelligence for<br \/>\npolicymakers, military commanders, and other consumers to use in making decisions. The cycle<br \/>\nis highly dynamic and never-ending and often includes a sixth stage of evaluation. Evaluation<br \/>\noccurs for each of the stages individually and for the cycle as a whole. It is sometimes referred<br \/>\nto as feedback.<br \/>\nSix steps constitute the intelligence cycle:<br \/>\nPlanning and Direction: Establish the intelligence requirements of the consumer.<br \/>\nPlanning and direction is the opening stage for the intelligence cycle. It is the<br \/>\nspringboard from which all intelligence activities are launched. Ironically, the direction<br \/>\nportion will most often come first, whereby the consumer places a requirement for a<br \/>\nspecific product. The product may be a report, graphic, or at times raw intelligence. From<br \/>\nthat, the intelligence organization being tasked will plan its activity.<br \/>\nCollection: Gather the raw data required to produce the desired finished product.<br \/>\nCollection is accomplished by using any combination of the five basic intelligence<br \/>\nsources or disciplines (Geospatial Intelligence, Human Intelligence, Measurement<br \/>\nand Signature Intelligence, Open-Source Intelligence, and Signals Intelligence). The raw<br \/>\ninformation gathered includes, but is not limited to, newspaper reporting, aerial<br \/>\nimagery, satellite imagery, documents, and more.<\/p>\n<p>Processing and Exploitation: Convert the raw data into comprehensible form that is usable for<br \/>\nproducing the finished product.<br \/>\nProcessing and exploitation involves the use of highly trained, specialized personnel and<br \/>\nequipment to turn the data into usable and understandable information. Translation,<br \/>\ndecryption, and interpretation of film and imagery are only a few examples of the processes<br \/>\nand methods used for film, magnetic, and other media used for collecting and storing data.<br \/>\nAnalysis and Production: Integrate, evaluate, analyze, and prepare the processed information<br \/>\nfor inclusion in the finished product.<br \/>\nAnalysis and production requires highly trained, specialized personnel\u2014analysts\u2014to give<br \/>\nmeaning and priority to the information. Synthesizing the processed information into<br \/>\nan actionable finished intelligence product allows the information to be useful to the<br \/>\ncustomer. It is important to note however, that in some cases, the cycle may skip this stage,<br \/>\nfor example, when the consumer needs only the factual reporting or products such as raw<br \/>\nimagery. This was the case during the Cuban Missile Crisis (October 1962) when President<br \/>\nKennedy needed only the actual count of Soviet equipment in Cuba or facts concerning<br \/>\nSoviet activity with no analysis since that was implied by the numbers and activity reported.<br \/>\nDissemination: Deliver the finished product to the consumer who requested it and to others as applicable.<\/p>\n<p>Dissemination is self-explanatory. Consumers who requested the information receive the<br \/>\nfinished product, usually via electronic transmission. This is accomplished most often<br \/>\nusing mechanisms such as Web sites, electronic mail, Web 2.0 collaboration tools, and<br \/>\nhardcopy. The final and finished product is referred to as finished intelligence. After the<br \/>\nproduct is disseminated, new intelligence gaps may be identified and the intelligence<br \/>\ncycle begins again.<br \/>\nEvaluation: Acquire continual feedback during the cycle that aids in refining each individual<br \/>\nstage and the cycle as a whole.<br \/>\nEvaluation is an assumed stage of the intelligence cycle and is not often discussed<br \/>\nseparately. One viewpoint maintains, however, that this stage must be understood and<br \/>\nimplemented along with the original five. Evaluation and feedback are important to allow<br \/>\nthe cycle and those using it to adjust and refine their activities and analysis to better meet<br \/>\nconsumers\u2019 information demands in the modern era.<\/p>\n<p>&nbsp;<\/p>\n<p><img alt=\"\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Intelligence Cycle The intelligence cycle is the process of developing raw information into finished intelligence for policymakers, military commanders, and other consumers to use in making decisions. The cycle is highly dynamic and never-ending and often includes a sixth &hellip; <a onclick=\"javascript:pageTracker._trackPageview('\/outgoing\/www.usacounterterrorism.com\/blog\/the-intelligence-cycle\/');\"  href=\"http:\/\/www.usacounterterrorism.com\/blog\/the-intelligence-cycle\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[4],"class_list":["post-166","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-intelligence"],"_links":{"self":[{"href":"http:\/\/www.usacounterterrorism.com\/blog\/wp-json\/wp\/v2\/posts\/166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.usacounterterrorism.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.usacounterterrorism.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.usacounterterrorism.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.usacounterterrorism.com\/blog\/wp-json\/wp\/v2\/comments?post=166"}],"version-history":[{"count":4,"href":"http:\/\/www.usacounterterrorism.com\/blog\/wp-json\/wp\/v2\/posts\/166\/revisions"}],"predecessor-version":[{"id":173,"href":"http:\/\/www.usacounterterrorism.com\/blog\/wp-json\/wp\/v2\/posts\/166\/revisions\/173"}],"wp:attachment":[{"href":"http:\/\/www.usacounterterrorism.com\/blog\/wp-json\/wp\/v2\/media?parent=166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.usacounterterrorism.com\/blog\/wp-json\/wp\/v2\/categories?post=166"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.usacounterterrorism.com\/blog\/wp-json\/wp\/v2\/tags?post=166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}