Online Book Reader

Home Category

Intelligence_ From Secrets to Policy - Mark M. Lowenthal [79]

By Root 567 0
than one collection INT to an issue, which enhances the likelihood of meeting the collection requirements for that issue. However, the intelligence community cannot provide answers to every question that is asked, nor does it have the capability to meet all possible requirements at any given time. The collection system is simultaneously powerful and limited.

Figure 5-1 Intelligence Collection: The Composition of the INTs

Table 5-1 A Comparison of the Collection Disciplines

The cost of collection was rarely an issue during the cold war because of the broad political agreement on the need to stay informed about the Soviet threat. In the post-cold war world, prior to the September 2001 attacks, the absence of any overwhelming strategic threat made the cost of collection systems more difficult to justify. As a result, some people questioned whether a need existed for the level of collection capability that the United States maintained during the cold war. Prior to the terrorist attacks, the United States experienced greatly diminished threats to its national security but faced ongoing concerns that are more diverse and diffuse than was the largely unitary Soviet problem, raising new collection challenges. As horrific as the September 2001 attacks were, terrorism still does not pose the same potentially overwhelming threat to the existence of the United States as did a hostile nuclear-armed Soviet missile force. Ultimately, no yardstick can measure national security problems against a collection array to determine how much collection is enough. For the near future, collection requirements likely will continue to outrun collection capabilities.

KEY TERMS


agent acquisition cycle

all-source intelligence

ASAT (antisatellite)

asset validation system

automatic change extraction

collection disciplines

content analysis

cryptographers

dangles

deception

denial

denied areas

denied targets

developmental

echo

encrypt

espionage

foreign liaison

geosynchronous orbit

indication and warning

key-word search

negation search

noise versus signals

non-official cover

official cover

pitch

resolution

risk versus take

shutter control

source

sources and methods

spies

sub-sources

sun-synchronous orbits

swarm ball

traffic analysis

walk-ins

wheat versus chaff

FURTHER READINGS


For ease of use, these readings are grouped by activity. Although there are numerous books by spies and about spying, few of them have good discussions of the craft of espionage and the role it plays, as opposed to its supposed derring-do aspects.

General Sources on Collection


Best, Richard A., Jr. Intelligence, Surveillance, and Reconnaissance (ISR) Programs: Issues for Congress. Washington, D.C.: Congressional Research Service, updated August 24, 2004.

Burrows, William. Deep Black: Space Espionage and National Security. New York: Random House, 1986. Wohlstetter, Roberta. Pearl Harbor: Warning and Decision. Stanford: Stanford University Press, 1962.

Espionage


Burgstaller, Eugen F. “Human Collection Requirements in the 1980’s.” In Intelligence Requirements for the 1980’s: Clandestine Collection. Ed. Roy F. Godson. Washington, D.C.: National Strategy Information Center. 1982.

Hitz, Frederick P. “The Future of American Espionage.” International Journal of Intelligence and Counterintelligence 13 (spring 2000): 1-20.

—. The Great Game: The Myth and Reality of Espionage. New York: Alfred Knopf, 2004.

Hulnick, Arthur S. “Intelligence Cooperation in the Post-Cold War Era: A New Game Plan?” International Journal of lntelligence and Counterintelligence 5 (winter 1991-1992): 455-465.

Phillips, David Atlee. Careers in Secret Operations: How to Be a Federal Intelligence Officer. Frederick, Md.: Stone Trail Press, 1984.

Wirtz. James J. “Constraints on Intelligence Collaboration: The Domestic Dimension.” International Journal of Intelligence and Counterintelligence, 6 (spring 1993): 85-89.

Imagery


Baker, John C., Kevin O’Connell, and Ray A. Williamson, eds. Commercial Observation Satellites: At the

Return Main Page Previous Page Next Page

®Online Book Reader