Online Book Reader

Home Category

Intelligence_ From Secrets to Policy - Mark M. Lowenthal [45]

By Root 584 0
under President Bill Clinton. Once the system was introduced near the middle of his presidency, Clinton was not interested in visiting the relative rankings again. Without his input the priorities could not be changed, resulting in a set of priorities that were increasingly divorced from international realities and that came to be dominated by issues pushed to higher priorities by their intelligence managers.

Moreover, if a requirement cannot be met with current collection systems, developing the technical systems or the human sources will take time. Thus, uncertainty about requirements or lower priorities for some of them will affect the development of collection capabilities.

COLLECTION


Collection derives directly from requirements. Not every issue requires the same types of collection support. The requirements depend on the nature of the issue and on the types of collection that are available. For example, concerns over possible threat from cyber attacks likely derive little useful intelligence from imagery as the locus of the threat cannot be captured in a photo. Much better intelligence might be derived from signals intelligence, which can reveal capabilities or intentions. Collection is also the first—and perhaps the most important—facet of intelligence where budgets and resources come into play in precise terms (as opposed to broader discussions when priorities are at issue). Technical collection is extremely expensive and, because different types of systems offer different benefits and capabilities, the administration and Congress must make difficult budget choices. Also, the needs of agencie vary, further complicating the choices.

How much information should be collected? Or, put another way, does more collection mean better intelligence? The answer to these questions is ambiguous. On the one hand, the more information that is collected, the more likely it will include the required intelligence. On the other hand, not everything that is collected is of equal value. Analysts must wade through the material—to process and exploit it—to find the intelligence that is really needed. This is often referred to as the “wheat versus chaff problem.” In other words, increased collection also increases the task of finding the truly important intelligence.

An interesting phenomenon, found at least in the U.S. intelligence community, is that different analytical groups may prefer different types of intelligence. For example, the Central Intelligence Agency (CIA) may put greater store in clandestine human intelligence (espionage), in part because it is a product of CIA activities. Meanwhile, other all-source analysts may place greater emphasis on signals intelligence.

PROCESSING AND EXPLOITATION


Intelligence collected by technical means (imagery, signals, test data, and so on) does not arrive in ready-to-use form. It must be processed from complex digital signals into images or intercepts, and these must then be exploited—analyzed if they are images; perhaps decoded, and probably translated, if they are signals. Processing and exploitation are key steps in converting technically collected information into intelligence.

In the United States, collection far outruns processing and exploitation. Much more intelligence is collected than can ever be processed and exploited. Furthermore, technical collection systems have found greater favor in the executive branch and Congress than the systems and personnel requirements for processing and exploitation. One reason for this appeal is emotional. A similar circumstance, for example, exists in formation of the defense budget. Les Aspin. chairman of the House Armed Services Committee (1985-1993) and later the secretary of defense (1993-1994), once observed that both Congress and the executive branch were more interested in procurement (buying new weapons) than operations and maintenance (keeping already purchased systems functioning). Buying new systems was more attractive to decision makers in both branches and, more important, to defense contractors. Operations and maintenance,

Return Main Page Previous Page Next Page

®Online Book Reader