Describe The Intelligence Process

Great Essays
The intelligence process/piece when it comes to homeland security is a vital component to identifying, deterring and keeping the homeland safe. Without intelligence it would be very hard to assess the threats and know what actions to take to prevent such incidents whether it be international or domestic terrorists attacks. There are many different facets of the complex intelligence gathering and support process. There will a room for improvement in everything we do as a Nation, especially when it comes to the protection of the homeland. The Director of National Intelligence, James Clapper said, “effective information sharing enables better collection, better analysis, and better support to users of intelligence, and intelligence integration …show more content…
It all starts with planning. During the planning cycle this is where it is determined what needs to be addressed and how to go about it. The next cycle begins with the collection of the actual raw intelligence. During the collection cycle this is where various techniques and tools are used to collect such data. These techniques can be wire-tapping, surveillance, the use of human sources and so on. After the raw data is collected it is then sent for processing which begins another cycle. During the processing cycle the raw material is sorted into what is useable and not useable then it is moved on the analysis cycle. The analysis cycle is where the data is turned into useable and potentially actionable intelligence. The last cycle in this process is the dissemination cycle where the prepared intelligence is sent to those policy makers and others responsible for making tough decisions. This is a dynamic and intense process and one that requires dedicated …show more content…
Just as the name implies it use the human as the collection source. This is synonymous with spying and espionage. The primary users are the Central Intelligence Agency (CIA), Department of State (DOS), Department of Defense (DOD), and the Federal Bureau of Investigations (FBI). The clandestine portion is ran by the National Clandestine Service (NCS), which is part of the CIA.
Open-Source Intelligence (OSINT) is the collection of data from the Internet, radio waves, newspaper and so on. It is what we do everyday that feeds this type of intelligence. The primary user of this type is the Foreign Broadcast Information Center.
Geospatial Intelligence (GEOINT) is the collection of data through the use of satellites, maps, and reconnaissance aircraft. This type can be useful in support of national disasters and humanitarian relief efforts. The manager for this type of intelligence is the Director of the National Geospatial Intelligence Agency

Related Documents

  • Great Essays

    Running Head: 1 INTELLIGENCE AGENCIES 1 Intelligent Agencies STS 364 Sadat Cano Arizona State University 3/23/2015 In the U.S national security Umbrella corporations it is composed of many agencies that related to the national security of the United States of America. The U.S national security organizations are composed of many different organizations safe guarding the United of States of American. This organizations serve a purpose to ensure the safety of the United States Citizens and they contribute to the national security of the country. The intelligence is often regard as “intelligence of the enemy”(Troy 1991-92,433), studying the enemy and intelligence organizations collect and analyze data.…

    • 1597 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Fisa Pros And Cons

    • 531 Words
    • 3 Pages

    FISA is also mandated with collection of foreign intelligence which keeps the authorities up to date and on the lookout for external threats against the US. The coordinated efforts by DOJ and FBI have seen the war against terror minimize and has led to effective foreign intelligence gathering of information. Electronic surveillance allows the US to obtain intelligence surveillance on foreign powers such as spies or agents with a connection to international terrorism groups. The Act significantly maintained top secrets for national security matters at the same time providing essential oversight of the judiciary and congress.…

    • 531 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The NSA’s surveillance system is a big help in stopping terrorist attacks and disrupts future plans. PRISM replaced another mass Internet data mining program, the Terrorist Surveillance Program, which was launched by the US government after the 9/11 terrorist attacks but heavily criticized and considered illegal. Through PRISM, the NSA monitor and collect internet communications from internet service providers using Data Intercept Technology.…

    • 63 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Big Brother and Government Surveillance Big Brother is a fictional character and idea in the novel 1984 by George Orwell. It stands for the idea that there is someone that holds power observing and monitoring everyone and their activities to keep control. Even though this is a fictional character and ideal in a novel, since it was published this has been a term people use when they are talking about government surveillance and the ways the government watches everyone.…

    • 519 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IC Ineffectiveness

    • 557 Words
    • 3 Pages

    The United States Intelligence Community (IC) is like a symphony orchestra: each entity offers its own sound to the greater score, and led by the conductor at the front, the President. Intelligence, like music, is an art and a science. Each organization has its own specialty: the Central Intelligence Agency specializes in Human Intelligence, the NSA specializes in Signals Intelligence, the National Geospatial-Intelligence Agency and National Reconnaissance Office specialize in Imagery Intelligence, the Defense Intelligence Agency is responsible for the intelligence gathered by military entities; there is a myriad of other agencies in the alphabet soup of the IC at every level of government: federal, state, and local, which each have their own responsibilities and specialties. As the Commander in Chief and head of the executive branch, the President leads the IC in carrying out their missions and operations. Unlike music, the IC does not let their sound be heard: only those with the “need to know” are ever allowed to experience the inner workings of the IC.…

    • 557 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Edward Snowden Fed Up

    • 711 Words
    • 3 Pages

    Since the 9/11 Terrorist Attacks and the creation of the Patriot Act the United States government has been intruding in the personal lives of its’ citizens. The government barges in on large companies like Verizon to obtain personal information from our daily lives. The claim is that this inform ation that the government is collecting is for our safety, but what are they really keeping us safe from if terrorist attacks are still happening, domestic and nondomestic. How does the information of innocent citizens help find or determine future crimes? CitizenFour documents Edward Snowden’s perspective on the NSA spying scandal in which information of the government’s massive covert-surveillance programs was leaked.…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    After reading the article Domestic Intelligence Today: More Security but less Liberty? I now look at the government a different way. I can see why people would have wanted to establish something similar to the British MI-5 after the attacks of 9/11. The MI-5 collects and analyzes domestic intelligence. Many believe it would not work in this county because Great Britain is a smaller more centralized country that has fewer police forces.…

    • 771 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The SPI targets specific problems, the NSI is attempting to implement the SAR program, CAT gathers information specific to certain types of businesses and, the TVCI identifies violent crime data that may impact terrorism prevention. Sounds like a lot but it’s not, the future of terrorism will rely on technology. Radicalization is increasing along with the gap between the rich nations and the poor nations. The internet will continue to be one of the most important vehicles in recruiting terrorists and operation planning.…

    • 1166 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    FBI Role In The US

    • 1788 Words
    • 8 Pages

    The FBI must gather, analyze, exploit, and disseminate its intelligence in order to make threats toward the United States less menacing. Federal, state, local, and even tribal partners are an integral to disrupt plots that are harmful. Unlike the other major organizations within the Intelligence Community who focuses on broader networks of threats overseas, the FBI focuses on more domestic cases which compliments the works of the Intelligence…

    • 1788 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Most critics of surveillance argue about how it is an abuse of power, a violation of people 's privacy, and most importantly, unconstitutional, while proponents of surveillance claim the benefit of surveillance is a reduction in the probability of high-cost events such as terrorism. Government surveillance programs, when conducted in controlled situations and closely audited by independent organizations, do not directly harm innocent civilians, especially when they benefit the safety of the general public. Surveillance, by definition, is the act of carefully watching someone or something especially in order to prevent or detect a crime. If that definition was used when discussing the issue of government surveillance, most public safety activities,…

    • 1195 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Crowdsourcing is one of the most significant and controversial developments in Web 2.0 (Hakley, M., 2009). Crowdsourcing pulls data from many sources such as social media, personal geographic data, or surveys (Goranson, C, et al and Sui D. Z. et al, 2011). The new use of crowdsourced data, the rise of social networking, and use of GIS has transformed rapid responses to political unrest and natural disasters has shaped how data privacy and ethical uses of data is used (Raymond, N, et al, 2012). With the use of volunteered geographic information, the privacy of individual, locational, and groups of data is under scrutiny such that the data is being collected, also known as data scooping, based on personal or industrial motives (e.g., google street view) (Streitfield, D. et al, 2012). Along with privacy of data collection, the ethics of collecting data and information requires to have standards and safety of people due to that data that is collected can be used against them (e.g. terrorism or…

    • 396 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Intelligence in Homeland Security Introduction After the attack of 9/11 on the United States the Nation learned there were many areas that needed improvement in regards to the security of the homeland. The Department of Homeland Security (DHS) had to take into account the lessons learned from 9/11, especially the shortfalls that were seen in intelligence gathering and make some major changes. The DHS is not the only agency that is responsible for gathering information for the Nation’s safety, there are many different national agencies that provide intelligence for homeland security. Some of the National agencies include offices that many have heard of like Customs and Border Patrol, the U.S. Coast Guard or the Secret Service, but there are other National agencies that contribute that most Americans may not know about.…

    • 1699 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    There are quite a few government and intelligence agencies including the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), the Department of Homeland Security (DHS), and also state and local law enforcement agencies. With modern day technology becoming so advanced, agencies must find new ways to stay ahead and on top of the security for the nation. The National Security Agency’s mass surveillance has expanded in the years since September 11, 2001. Many people happen to be against government monitoring only because they are unaware of how data is retrieved, analyzed, and stored by the government networks. The process is more than just collecting information from phone calls, emails, and other online communications.…

    • 729 Words
    • 3 Pages
    Improved Essays
  • Brilliant Essays

    Intelligence In The Intelligence Community

    • 2133 Words
    • 9 Pages
    • 4 Works Cited

    Within the IC there are 16 separate member organizations, with each falling within or under one of the following groups: independent intelligence agencies, military intelligence, and civilian intelligence and analysis offices within federal executive departments. Within this maze there is a direct line of authority and a line of coordination connecting these elements into a manageable soup. The Director of National Intelligence (DNI), who reports to the President of the United States, leads the IC. Although this office is not listed as a member of the Intelligence Community, the DNI exerts leadership of the IC primarily through the statutory authorities under which he: Controls the National Intelligence program budget; Establishes objectives, priorities, and guidance for the IC; Manages and directs the tasking of, collection, analysis, production, and dissemination of national intelligence by elements of the IC. However, the DNI has no authority to direct and control any element of the IC except his own…

    • 2133 Words
    • 9 Pages
    • 4 Works Cited
    Brilliant Essays
  • Improved Essays

    The United States currently faces many challenges, including a very widespread lack of confidence in its ability to carry out its many missions competently as well as legally. Counterintelligence (CI) is one of the most vital arenas within the United States Intelligence Community (IC), and is aimed at achieving the main goal of protecting the country, both from insider threats and foreign intruders. It is our nation’s shield and sword. While many improvements to this vital system have been made or need to be made, many issues still remain as no system will ever be perfect.…

    • 845 Words
    • 4 Pages
    Improved Essays