• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15

What Do You Understand By The Term 'Intelligence' & What Are Its Major Elements? Examine Critically & Discuss The Element Of 'Collection' & Its Essential Characteristics

Extracts from this document...

Introduction

What Do You Understand By The Term 'Intelligence' & What Are Its Major Elements? Examine Critically & Discuss The Element Of 'Collection' & Its Essential Characteristics Assignment no. 2 Words: 2,500 "Sizing up opponents to assess dangers and distances is the proper course of action" (Sun Tzu) Intelligence is a term that is definite yet broad as it encompasses vast vicinity. Depending on the context, it has different forms. Intelligence has main elements of planning, collection, analysis, processing, production and dissemination. The element of collection is cosmic with an immense amount of sources where intelligence can be gathered from. While the definition and importances of intelligence are somewhat controversial, there is a consensus on the definition relating to security and collection. The essential characteristics of collection are mainly from human sources or open source intelligence. It is widely understood that intelligence is "the ability to learn or understand or to deal with new or trying situations: the skilled use of reason: the ability to apply knowledge to manipulate one's environment or to think abstractly as measured by objective criteria"1 The dictionary meaning defines intelligence as "the capacity to acquire and apply knowledge by means of thought and reason."2 Intelligence can be defined as the "product resulting from the collection, processing, integration, analysis, evaluation and interpretation of available information concerning foreign countries or areas."3 Collection can be defined as the purposeful acquisition of any information that might be desired by an analyst, consumer, or operator. Collection activity can take several overlapping forms: open source collection, clandestine collection, human source collection, and technical collection.4 Modern intelligence gathering has both an electronic and human face. The gathering, or collection, of intelligence is nothing more than stealing someone's secrets. It is done strategically, which means according to some direction, plan, or mission, and it is done competitively, which means that your opponents and allies are also most likely doing it, and it is done non-transparently, or in secret. ...read more.

Middle

Human intelligence is derived from human sources.17 To the public, HUMINT remains synonymous with espionage and clandestine activities, yet, in reality, most HUMINT collection is performed by overt collectors such as diplomats and military attach´┐Żs. HUMINT is the oldest method for collecting information about a foreign power. HUMINT includes overt, sensitive, and clandestine activities and the individuals who exploit, control, supervise, or support these sources. Clandestine HUMINT sources include agents who have been recruited or have volunteered to provide information to a foreign nation, and foreign nationals who successfully infiltrate an organization with a cover story. The latter cases are fairly rare, and generally come to the United States under the guise of being political refugees.18 Once in the United States, they move into positions that allow them to gather political, technical, or economic information for their governments. According to one estimate, over 100 countries currently conduct intelligence operations against the United States.19 Even with the explosion of technical capabilities, HUMINT can still provide information that even the most proficient technical collectors cannot, such as access to internal memoranda and to compartmented information. Most importantly, human collectors can provide key insights into the intentions of an adversary, whereas technical collection systems are often limited to determining capabilities.20 HUMINT can be used to reveal adversary plans and intentions, or uncover scientific and weapons developments before they are used or are detected by technical collection systems. HUMiNT can also provide documentary evidence such as blueprints of facilities, copies of adversary plans, or copies of diplomatic or policy documents. Finally, HUMINT is extremely cost effective compared with technical collection systems and does not require a significant technological production base for support. Signals intelligence is derived from signal intercepts comprising, either individually or in combination, all communications intelligence (COMINT), electronic intelligence (ELlNT), and foreign instrumentation signals intelligence (FISINT), however transmitted.21[9] COMINT, one of the primary SIGINT disciplines, includes information derived from intercepted communications transmissions. COMINT targets voice and teleprompter traffic, video, Morse code traffic, or even facsimile messages. ...read more.

Conclusion

9 Central Intelligence Agency, Intelligence: The Acme of Skill (Washington, D.C.: CIA, n.d.), pp.6-7. Central Intelligence Agency, Fact Book in Intelligence (Washington, D.C.: CIA, 1993), pp.10-11. 10 Berkowitz, Bruce D. "Information Age Intelligence." Foreign Policy, Summer 1996, no. 103, p. 35-50 11 Troy, T. (1991). "The Correct Definition of Intelligence" International Journal of Intelligence and Counterintelligence 5(4):433-54. 12 Jeffrey T. Richelson, (1995) The U.S. Intelligence Community. Westview Publishers, U.S.A, p.326 13 Troy, T. (1991). "The Correct Definition of Intelligence" International Journal of Intelligence and Counterintelligence 5(4):433-54. 14 The Joint Staff, Doctrine for Intelligence Support to Joint Operations, Washington, DC: Office of the Joint Chiefs of Staff. June 30. 1991. 15 Joint Chiefs of Staff, U.S. Department of Defence Dictionary of Military Terms (New York: Arco Publishing, 1988), p. 328 16 Interagency OPSEC Support Staff, Compendium of OPSEC Terms, Greenbelt, MD: IOSS, April 1991. 17 Interagency OPSEC Support Staff, Compendium of OPSEC Terms, Greenbelt, MD: IOSS, April 1991. 18 Suzanne Wood, Katherine L. Herbig, and Peter A. W. Lewis, American Espionage, 1945-1989, Monterey, CA: Defence Personnel Security Research and Education Centre, 1990. 19 Defence Science Board, Report of the Defence Science Board Summer Study Task Force on Information Architecture for the Battlefield, Washington, DC: Office of the Under Secretary of Defence for Acquisition and Technology, October 1994. 20 Jeffrey Richelson, American Espionage and the Soviet Target, New York: William Morrow, 1987. 21 Intelligence Community Staff, Glossary of Intelligence Terms and Definitions, Washington, DC: ICS, June 1989 22 William Rosenau,"A Deafening Silence: U.S. Policy and the SIGINT Facility at Lourdes," Intelligence and National Security, 9:4 (October 1994), pp. 723-734. 23 Daniel B. Sibbet, "Commercial Remote-Sensing," American Intelligence Journal, Spring/Summer 1993, p. 37, and Testimony of Robin Armani before the Senate Select Committee on Intelligence, Public Hearing on Commercial Remote Sensing, November 17. 1993 24 On-Site Inspection Agency, "Fact Sheet: The Open Skies Treaty," May 1993, and U.S. Arms Control and Disarmament Agency, Treaty on Open Skies (Official Text), April 10, 1992. ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. Apple Incorporation - Case Analysis

    Apple's product differentiation in the iPod and iTunes sector will be short-lived since it has a dependency on third parties and also because competitors can easily enter the market. Apple must position itself as the only competitor in the market with stem-to-stern computing solutions.

  2. Describe the key elements of research methodology

    As with any research the results will depend on the quality of the questions. Interviews: * Individual - Interviews are likely to be in-depth conversations with individuals concerning a particular topic. The individual interviewed will depend on what the researcher wants to find out.

  1. Business report on Marks and Spencer.

    Given the vital role it's essential constantly to appraise the effectiveness of the systems to ensure they provide the maximisation possible benefits for the business. 22 Marks and Spencer Creates Contracts Management System with Microsoft Windows NT 22.1 Marks and Spencer is a leading high street retailer with three hundred stores in the U.K.

  2. the dragons den

    A small amount of the companies which he is backing currently are Afa Systems, Ceravision, Mathengine, Palmchip and Vocalis. He first made his millions by trading the world's financial market. The business markets he is involved in currently are; Software, biotechnology, different diseases and conditions, semiconductors, retail, Nanotechnology, food scanning,

  1. Business Report on Manchester Airport PLC.

    - to ensure that they are achieved. This process also forces managers to ensure consistency between objectives and to overcome traditional functional barriers within the organisation. Customer customers and other important stakeholders see a business is critical, but financial measures do not directly provide this view.

  2. Case Study: World Wrestling Federation

    McMahon learned to use medias to manipulate market trend as same as other companies in New York do. McMahon had opportunities to learn, try and develop his business strategy. So, with his vision to dominate the business, his position provided him abundant resources to do so.

  1. Free essay

    Managing information

    * Non-availability of on-line reference material. * Many institutions does not recognise a specific qualification. * English knowledge must be satisfactory. * Overestimation of time available. * learners experience frustration going through all their mail messages. Limitations of Computers * Computer networks are costly to develop.

  2. ASB Statement of principles: Chapter Three - The qualitative characteristics of financial information.

    character of both the entity's earnings and cash generating processes and the investors process of evaluation.'1 The second main characteristic of information is reliability. The definition of reliability is as follows: Information that is a complete and a faithful representation of the entity's actions There are five characteristics of reliable information.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work