Intelligence_ From Secrets to Policy - Mark M. Lowenthal [79]
Figure 5-1 Intelligence Collection: The Composition of the INTs
Table 5-1 A Comparison of the Collection Disciplines
The cost of collection was rarely an issue during the cold war because of the broad political agreement on the need to stay informed about the Soviet threat. In the post-cold war world, prior to the September 2001 attacks, the absence of any overwhelming strategic threat made the cost of collection systems more difficult to justify. As a result, some people questioned whether a need existed for the level of collection capability that the United States maintained during the cold war. Prior to the terrorist attacks, the United States experienced greatly diminished threats to its national security but faced ongoing concerns that are more diverse and diffuse than was the largely unitary Soviet problem, raising new collection challenges. As horrific as the September 2001 attacks were, terrorism still does not pose the same potentially overwhelming threat to the existence of the United States as did a hostile nuclear-armed Soviet missile force. Ultimately, no yardstick can measure national security problems against a collection array to determine how much collection is enough. For the near future, collection requirements likely will continue to outrun collection capabilities.
KEY TERMS
agent acquisition cycle
all-source intelligence
ASAT (antisatellite)
asset validation system
automatic change extraction
collection disciplines
content analysis
cryptographers
dangles
deception
denial
denied areas
denied targets
developmental
echo
encrypt
espionage
foreign liaison
geosynchronous orbit
indication and warning
key-word search
negation search
noise versus signals
non-official cover
official cover
pitch
resolution
risk versus take
shutter control
source
sources and methods
spies
sub-sources
sun-synchronous orbits
swarm ball
traffic analysis
walk-ins
wheat versus chaff
FURTHER READINGS
For ease of use, these readings are grouped by activity. Although there are numerous books by spies and about spying, few of them have good discussions of the craft of espionage and the role it plays, as opposed to its supposed derring-do aspects.
General Sources on Collection
Best, Richard A., Jr. Intelligence, Surveillance, and Reconnaissance (ISR) Programs: Issues for Congress. Washington, D.C.: Congressional Research Service, updated August 24, 2004.
Burrows, William. Deep Black: Space Espionage and National Security. New York: Random House, 1986. Wohlstetter, Roberta. Pearl Harbor: Warning and Decision. Stanford: Stanford University Press, 1962.
Espionage
Burgstaller, Eugen F. “Human Collection Requirements in the 1980’s.” In Intelligence Requirements for the 1980’s: Clandestine Collection. Ed. Roy F. Godson. Washington, D.C.: National Strategy Information Center. 1982.
Hitz, Frederick P. “The Future of American Espionage.” International Journal of Intelligence and Counterintelligence 13 (spring 2000): 1-20.
—. The Great Game: The Myth and Reality of Espionage. New York: Alfred Knopf, 2004.
Hulnick, Arthur S. “Intelligence Cooperation in the Post-Cold War Era: A New Game Plan?” International Journal of lntelligence and Counterintelligence 5 (winter 1991-1992): 455-465.
Phillips, David Atlee. Careers in Secret Operations: How to Be a Federal Intelligence Officer. Frederick, Md.: Stone Trail Press, 1984.
Wirtz. James J. “Constraints on Intelligence Collaboration: The Domestic Dimension.” International Journal of Intelligence and Counterintelligence, 6 (spring 1993): 85-89.
Imagery
Baker, John C., Kevin O’Connell, and Ray A. Williamson, eds. Commercial Observation Satellites: At the