Intelligence Analysis in the Knowledge Age

Total Page:16

File Type:pdf, Size:1020Kb

Intelligence Analysis in the Knowledge Age Intelligence Analysis in the Knowledge Age An Analysis of the Challenges facing the Practice of Intelligence Analysis Magdalena Adriana Duvenage Thesis presented in fulfilment of the requirements for the degree of Master of Philosophy (Information and Knowledge Management) SUPERVISOR: Prof J Kinghorn STELLENBOSCH UNIVERSITY MARCH 2010 DECLARATION By submitting this thesis electronically, I declare that the entirety of the work contained therein is my own, original work, that I am the owner of the copyright thereof (unless to the extent explicitly otherwise stated) and that I have not previously submitted it for obtaining any qualification. Date: 12 February 2010 Copyright © 2010 Stellenbosch University All rights reserved Afrikaanse Opsomming Die internasionale intelligensie gemeenskap steier steeds na verskeie intelligensie terugslae die afgelope dekade. Voorstelle om intelligensie analise te verbeter het weinig impak terwyl analiste, hulle bestuurders en organisasies voortgaan om vas te hou aan uitgediende bedreigingsperspesies, analitiese metodes en organisatoriese strukture en kulture. Deur die lens van Kennis Bestuur, poog hierdie verhandeling om die verskeie uitdagings wat die Intelligensie Analise praktyk in die Kennis Era in die gesig staar, te identifiseer. Eerstens word bestaande teorieë en konsepte in Intelligensie Analise met dié in Kennis Bestuur vergelyk en die moontlikheid van ‘n nuwe woordeskat vir intelligensie word bespreek. Die tweede uitdaging vir intelligensie analiste is om by die nuwe wêreld en versnellende verandering aan te pas. Hulle word nou gekonfronteer met ‘n bedreigingsprent wat veelvlakkig, kompleks en multi-dissiplinêr is. Die derde uitdaging is om die bestaande analitiese metodologiëe, hulpmiddels en tegnieke te herwaardeer in die lig van hierdie nuwe wêreld. Die vierde uitdaging is om na ander dissiplines, insluitend dié van Kennis Bestuur, uit te reik sodat Intelligensie Analise verbeter kan word deur die toepassing van hierdie dissiplines se analitiese metodes (beide intuitief en gestruktureerd), hul kognitiewe en samewerkings modelle, sowel as organisasie struktuur konsepte. Laastens word geargumenteer dat Intelligensie Analiste dalk gereed is om hulself te vernuwe, maar dat hul intelligensie organisasies nie ‘n nuwe intelligensie paradigma kan ondersteun terwyl hulle voortgaan om bedreigingspersepsies, strukture en bestuurbeginsels toe te pas wat eerder by die Koue Oorlog tuis hoort nie. English Summary The intelligence community throughout the world is still reeling after several intelligence failures. Proposals to improve Intelligence Analysis have had little impact as analysts, their managers and their organisations continue to cling to outdated threat perceptions, methodologies and organisational structures and cultures. This thesis looks through the lens of Knowledge Management at the various challenges that the Intelligence Analysis practice is faced with in the Knowledge Age. Firstly, theories and concepts from Intelligence Analysis are challenged when compared with those in Knowledge Management and the possibility of applying new vocabularies in intelligence is discussed. The second challenge intelligence analysts face is to understand and adapt to the changed world with its connected, non-linear and rapidly enfolding events and patterns which broadens their scope to a multi-faceted, complex and multi-disciplinary threat picture. The third challenge is to re-look the existing analytical methodologies, tools and techniques, realising that these are most probably inadequate in a complex environment. The fourth challenge Intelligence Analysis faces is to reach out to other disciplines and assess how new analytical techniques, both intuitive and structured, as well as cognitive models, collaborative and organisational structure concepts from within the Knowledge Management discipline can improve Intelligence Analysis’ grasp of the Knowledge Age. In conclusion, it is argued that intelligence analysts might be ready to reinvent themselves to address Knowledge Age issues, but that intelligence organisations are not able to support a new intelligence paradigm while still clinging to threat perceptions and structures befitting the Cold War. Dedication I would like to dedicate this thesis to my husband, Awie, for his unwavering support and patience when I struggled to find balance between my studies and the demands of being a mom and entrepreneur. To my sons, Armand and Cornel, this thesis bears testimony that studies can be fun and rewarding when you love what you’re doing. I hope you fulfil all your dreams! Prof Johan Kinghorn, my study leader, allowed me enough leeway to exploit a new topic - the nexus between Knowledge Management and Intelligence Analysis. I am grateful for his enthusiasm and guidance. My friends and colleagues, both from South Africa and those overseas, have added value and insight to my arguments - giving this thesis a much broader application value than what I could have achieved on my own. Above all, the faithfulness of my Lord, Jesus Christ, has proved yet again infallible – I am truly blessed! Table of Contents 1. Introduction ……………………. 1 1.1. Focus of the thesis ……………………. 2 1.2. Literature study ……………………. 3 2. New vocabulary and concepts ……………………. 5 2.1. Intelligence ……………………. 5 2.1.1. Intelligence as organisation ……………………. 5 2.1.2. Intelligence as an activity or process ……………………. 8 2.1.3. Intelligence as a product ……………………. 14 2.2. Intelligence in the recent South African context ……………………. 16 2.3. Knowledge and the Knowledge Age ……………………. 18 2.4. The Knowledge worker ……………………. 20 2.5. The generations of Knowledge Management …………………… 22 2.5.1. The first generation of Knowledge Management …………………. 19 2.5.2. The second generation of Knowledge Management ……………. 20 2.5.3. The third generation of Knowledge Management……………………. 24 2.6. Intelligence Analysis through the lens of the third KM generation………….. 29 3. A Changed world ……………………. 33 3.1. Speed and connectivity ……………………. 34 3.2. The impact of the information revolution on Intelligence Analysis…………… 35 3.3. The widened scope ……………………. 38 3.4. Complexity principles applied to intelligence ……………………. 40 3.4.1. Unpredictability and uncertainty ……………………. 42 3.4.2. Connectivity, interdependence and co-evolution……………………. 45 3.5. Conclusion ……………………. 46 4. Analysing intelligence ……………………. 43 4.1. Thinking pitfalls ……………………. 49 4.1.1. Cultural biases ……………………. 50 4.1.2. Organisational biases ……………………. 50 4.1.3. Cognitive biases ……………………. 50 4.2. Analytical and thinking approaches, methods and techniques …………….. 53 4.2.1. The unaided analytical judgement/intuitive approach …………….. 55 4.2.1.1. Inductive reasoning ……………………. 55 4.2.1.2. Deductive reasoning ……………………. 56 4.2.1.3. Abductive reasoning ……………………. 56 4.2.1.4. Scientific method ……………………. 57 4.2.2. Alternative/structured analysis approach ……………………. 57 4.2.2.1. Decomposition and visualisation ……………………. 61 4.2.2.2. Idea generation techniques ……………………. 63 4.2.2.3. Scenarios, indicators and signposts ……………………. 65 4.2.2.4. Hypothesis generation and testing ……………………. 67 4.2.2.5. Cause and effect analysis ……………………. 70 4.2.2.6. Reframing techniques ……………………. 71 4.2.2.7. Challenge analysis techniques ……………………. 72 4.2.2.8. Decision support analysis ……………………. 75 4.3. Conclusion ……………………. 78 5. The New Intelligence Analysis …………………… 80 5.1. New Cognitive models …………………… 81 5.1.1. The prismatic reasoning/thinking paradigm ……………………. 81 5.1.2. New Intelligence Analysis cognitive models ……………………. 83 5.1.2.1. Waltz’s integrated reasoning process ……………………. 84 5.1.2.2. A Cognitive Task Analysis (CTA) model of Intelligence Analysis ……………………. 87 5.1.2.3. Analytical rigour matrix ……………………. 90 5.2. Applying Sensemaking theories …………………… 92 5.3. New organisational structures? …………………… 96 5.4. Collaboration and information sharing …………………… 99 5.4.1. Collaboration across organisations and disciplines …….. …………… 100 5.4.2. Collaboration with the private sector ……………………. 102 5.4.3. Collaboration across national borders ……………………. 102 5.5. Outsourcing …………………… 104 5.6. Analytical technological tools …………………… 105 6. Accepting the challenges …………………… 107 6.1. Understanding post-modern intelligence ……………………. 107 6.2. Promoting the value of the intelligence analyst as a knowledge worker …….. 109 6.3. Learning from Knowledge Management theories and practices ……………. 111 6.4. Adopting a mindset of resilience, mindfulness and double-loop learning……. 113 6.5. Conclusion ……………………. 115 Bibliography …………………….. 116 List of Figures Page Figure 1: Intelligence Cycle 8 Figure 2: Treverton's "Real" Intelligence Cycle 10 Figure 3: Johnston’s Systems Model of the Intelligence Cycle 11 Figure 4: Clarke's Target-Centric Intelligence Process 13 Figure 5: Nonaka and Takeuchi's SECI model 23 Figure 6: Snowden's Cynefin model 27 Figure 7: The continuum of Intelligence Analysis complexity 31 Figure 8: A convergence of focus for the US intelligence community 39 Figure 9: Continuum of Estimates of Likelihood 44 Figure 10: Summary of traditional vs. transnational targets 47 Figure 11: Difference between intuitive and structured analysis 60 Figure 12: Telephone Link Analysis Chart 62 Figure 13: Mind map used in crime intelligence 63 Figure 14: A screenshot from the US intelligence community's Intellipedia wiki 64 Figure 15: Alternative Futures Technique 66 Figure 16: Multiple Scenario Generation Technique 67 Figure 17: Screen shot from ACH software on the Washington DC sniper 69 Figure 18: Structured self critique 72
Recommended publications
  • Intel Management Model for Europe
    INTELLIGENCE MANAGEMENT MODEL FOR EUROPE PHASE ONE Guidelines for standards and best practice within the analysis function Contents Foreword 5 Acknowledgements 6 1. Executive Summary 7 Recruitment 8 Trainee Analyst - The Benefits 9 Training Programme for Police Analysts 10 Intelligence Training for Law Enforcement Personnel 10 Career Structure for Analyst Personnel 11 2. Recruitment 12 Person Specification 12 Pre-Selection 15 The Interview 15 3. Trainee Analyst - The Benefits 17 The Police Service of Northern Ireland 17 Belgian Federal Police 19 4. Training Programme for Police Analysts 20 Approach 1: The Police Service of Northern Ireland 20 Approach 2: The Belgian Federal Police 21 Approach 3: National Criminal Intelligence Service (NCIS) UK 22 5. Intelligence Training for Law Enforcement Personnel 23 Probationary Officers 23 Intelligence Officers 24 Analyst Managers 26 6. Career Structure for Analyst Personnel 28 7. Recommended References 30 3 List of Figures Figure 1: The Intelligence Cycle 7 Figure 2: Person Specification for Intelligence Analyst 14 Figure 3: PSNI Analyst Development Programme 18 Figure 4: Organisational Structure for Analysts - Strathclyde Police 28 Figure 5: Organisational Structure for Analysts - PSNI 29 4 Foreword The first tentative steps towards the development of an Intelligence Management Model for Europe were taken during early 2001. It was then that consideration was given to a proposed agenda for the forthcoming European Heads of Training Conference to be held in Scotland in June that same year. Many such conferences, in all disciplines, provide useful guidance and information to those in attendance. Often however there is little or no resultant legacy in terms of actual and tangible continuous development.
    [Show full text]
  • Open Source Intelligence (OSINT)
    ATP 2-22.9 Open-Source Intelligence July 2012 DISTRIBUTION RESTRICTION: Unlimited Distribution Headquarters, Department of the Army *ATP 2-22.9 Army Techniques Publication Headquarters No. 2-22.9 (FMI 2-22.9) Department of the Army Washington, DC, 10 July 2012 Open-Source Intelligence Contents Page PREFACE.............................................................................................................. iv INTRODUCTION .................................................................................................... v Chapter 1 OPEN-SOURCE INTELLIGENCE (OSINT) FUNDAMENTALS ........................ 1-1 Definition and Terms .......................................................................................... 1-1 Characteristics .................................................................................................... 1-1 The Intelligence Warfighting Function ................................................................ 1-2 The Intelligence Process .................................................................................... 1-3 The Planning Requirements and Assessing Collection Process ........................ 1-4 The Military Decisionmaking Process ................................................................ 1-4 Intelligence Preparation of the Battlefield ........................................................... 1-5 Chapter 2 PLANNING AND PREPARATION OF THE OSINT MISSION ............................. 2-1 Section I – Planning OSINT Activities ...........................................................
    [Show full text]
  • Outsourcing Intelligence Analysis: Legal and Policy Risks
    STUDENT NOTE Outsourcing Intelligence Analysis: Legal and Policy Risks Joshua R. Storm* INTRODUCTION Intelligence reduces uncertainty in con¯ict, whether in trade negotiations between allies with similar, but individual interests, or in combat operations against a foreign state or terrorist group.1 Providing this intelligence involves col- lecting, processing, analyzing, and disseminating information to decision mak- ers.2 Key among these is analysis, de®ned by the R AND Corp. as ªthe process by which the information collected about an enemy is used to answer tactical ques- tions about current operations or to predict future behavior.º3 Beyond the tactical level, analysis is also necessary to provide the strategic and operational intelli- gence required to establish overarching policies and to develop operational plans to execute those policies. 4 In this manner, analysis is one of the most critical func- tions provided by the civilian and military entities that make up the intelligence community (IC). At the same time, analysis often is not performed by govern- ment personnel. For example, of core contract personnel within the intelligence community, 19 percent directly supported analysis and production as of 2007.5 This note explores the rise of outsourcing in the intelligence community and examines the legal and policy implications of outsourcing intelligence analysis in particular. First, it discusses the organizational and operational pressures that led to the increased use of contractors in the intelligence community after the September 11, 2001 attacks. Next, it identi®es the origins of the inherently gov- ernmental function test, used to determine when a government activity be out- sourced.
    [Show full text]
  • Perspectives and Opportunities in Intelligence for U.S. Leaders
    Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE September 2018 CORTNEY WEINBAUM, JOHN V. PARACHINI, RICHARD S. GIRVEN, MICHAEL H. DECKER, RICHARD C. BAFFA Perspectives and Opportunities in Intelligence for U.S. Leaders C O R P O R A T I O N Contents 1. Introduction ................................................................................................. 1 2. Reconstituting Strategic Warning for the Digital Age .................................5 3. Unifying Tasking, Collection, Processing, Exploitation, and Dissemination (TCPED) Across the U.S. Intelligence Community ...............16 4. Managing Security as an Enterprise .........................................................25 5. Better Utilizing Publicly Available Information ..........................................31 6. Surging Intelligence in an Unpredictable World .......................................44 7. Conclusion .................................................................................................56 Abbreviations ................................................................................................57 References ....................................................................................................58 Acknowledgments ........................................................................................64 About the Authors .........................................................................................64 The RAND Corporation is a research organization that develops solutions to public policy challenges to help make
    [Show full text]
  • ATP 2-33.4 Intelligence Analysis
    ATP 2-33.4 Intelligence Analysis JANUARY 2020 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes ATP 2-33.4, dated 18 August 2014. Headquarters, Department of the Army This publication is available at Army Knowledge Online (https://armypubs.army.mil), and the Central Army Registry site (https://atiam.train.army.mil/catalog/dashboard). *ATP 2-33.4 Army Techniques Publication Headquarters No. 2-33.4 Department of the Army Washington, DC, 10 January 2020 Intelligence Analysis Contents Page PREFACE............................................................................................................. vii INTRODUCTION ................................................................................................... xi PART ONE FUNDAMENTALS Chapter 1 UNDERSTANDING INTELLIGENCE ANALYSIS ............................................. 1-1 Intelligence Analysis Overview ........................................................................... 1-1 Conducting Intelligence Analysis ........................................................................ 1-5 Intelligence Analysis and Collection Management ............................................. 1-8 The All-Source Intelligence Architecture and Analysis Across the Echelons ..... 1-9 Intelligence Analysis During Large-Scale Ground Combat Operations ........... 1-11 Intelligence Analysis During the Army’s Other Strategic Roles ........................ 1-13 Chapter 2 THE INTELLIGENCE ANALYSIS PROCESS ..................................................
    [Show full text]
  • Going Dark: Impact to Intelligence and Law Enforcement and Threat Mitigation
    GOING DARK: IMPACT TO INTELLIGENCE AND LAW ENFORCEMENT AND THREAT MITIGATION Bonnie Mitchell Krystle Kaul G. S. McNamara Michelle Tucker Jacqueline Hicks Colin Bliss Rhonda Ober Danell Castro Amber Wells Catalina Reguerin Cindy Green-Ortiz Ken Stavinoha ACKNOWLEDGEMENTS We would like to first thank the Office of the Director of National Intelligence (ODNI) for its generous funding and support for our study and learning journey to the DEFCON hacking conference. We are also very grateful to the Department of Homeland Security (DHS) for its support during the duration of the program. We could not have completed this study without the unwavering support and dedication of Ms. Bonnie Mitchell, ODNI Deputy National Intelligence Manager for the Western Hemisphere and the Homeland, our devoted Team Champion who steered us throughout this study and helped turn an idea into a product. We would like to acknowledge and thank each member of our public-private sector working group for their tireless efforts from around the U.S., which includes Krystle Kaul, G. S. McNamara, Michelle Tucker, Jacqueline Hicks, Colin Bliss, Rhonda Ober, Danell Castro, Amber Wells, Catalina Reguerin, Cindy Green- Ortiz and Ken Stavinoha. We are very thankful for all the unique insight we received from interviewees who contributed to this report by educating our group on the many aspects of ‘going dark,’ and we take full responsibility for any and all errors of fact or interpretation implied or explicit in this paper. Our interviewees include the Village sponsors at DEF CON, private sector industry experts and government officials. We are thankful for the interesting and diverse perspectives particularly from senior government officials and private sector experts.
    [Show full text]
  • Espionage and Intelligence Gathering Other Books in the Current Controversies Series
    Espionage and Intelligence Gathering Other books in the Current Controversies series: The Abortion Controversy Issues in Adoption Alcoholism Marriage and Divorce Assisted Suicide Medical Ethics Biodiversity Mental Health Capital Punishment The Middle East Censorship Minorities Child Abuse Nationalism and Ethnic Civil Liberties Conflict Computers and Society Native American Rights Conserving the Environment Police Brutality Crime Politicians and Ethics Developing Nations Pollution The Disabled Prisons Drug Abuse Racism Drug Legalization The Rights of Animals Drug Trafficking Sexual Harassment Ethics Sexually Transmitted Diseases Family Violence Smoking Free Speech Suicide Garbage and Waste Teen Addiction Gay Rights Teen Pregnancy and Parenting Genetic Engineering Teens and Alcohol Guns and Violence The Terrorist Attack on Hate Crimes America Homosexuality Urban Terrorism Illegal Drugs Violence Against Women Illegal Immigration Violence in the Media The Information Age Women in the Military Interventionism Youth Violence Espionage and Intelligence Gathering Louise I. Gerdes, Book Editor Daniel Leone,President Bonnie Szumski, Publisher Scott Barbour, Managing Editor Helen Cothran, Senior Editor CURRENT CONTROVERSIES San Diego • Detroit • New York • San Francisco • Cleveland New Haven, Conn. • Waterville, Maine • London • Munich © 2004 by Greenhaven Press. Greenhaven Press is an imprint of The Gale Group, Inc., a division of Thomson Learning, Inc. Greenhaven® and Thomson Learning™ are trademarks used herein under license. For more information, contact Greenhaven Press 27500 Drake Rd. Farmington Hills, MI 48331-3535 Or you can visit our Internet site at http://www.gale.com ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced or used in any form or by any means—graphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution or information storage retrieval systems—without the written permission of the publisher.
    [Show full text]
  • Skills, Traits, Competencies
    9BCyber Intelligence - Skills, Traits, Competencies Table of Contents Cyber Intelligence – Skills, Traits, Competencies ............................................................................ 2 Analysts Being Hired 2013 .............................................................................................................. 3 To Improve Core Competencies and Skills ..................................................................................... 4 Cyber Intelligence Skills, Traits, Competencies Today .................................................................... 5 Bad Guys – Good Guys .................................................................................................................... 7 Reverse the Asymmetric Trend....................................................................................................... 9 Limit Tunnel Vision or Mirror Imaging .......................................................................................... 10 Takeaway ...................................................................................................................................... 11 Notices .......................................................................................................................................... 12 Page 1 of 12 0BCyber Intelligence – Skills, Traits, Competencies Cyber Intelligence – Skills, Traits, Competencies 9 **009 From our first research with the Cyber Intelligence Tradecraft project from 2013, we met with almost 30 companies, and they gave us some insight
    [Show full text]
  • The U.S. Department of Energy (DOE) Traces Its Origin to the Manhattan
    The U.S. Department of Energy (DOE) traces its origin to the Manhattan Project, which enlisted scientists studying fundamental physics to produce the first atomic weapons, and to the various energy-related programs that were dispersed throughout the federal government prior to DOE’s creation in 1977. Today, the Department of Energy contributes to the future of the nation by… …ensuring our energy security… …producing and maintaining our nuclear stockpile… …promoting nuclear nonproliferation, and… …fostering fundamental science, advanced computing and technological innovation. Transformative science and technology are central to DOE’s mission, and in this arena the Department’s capabilities are unmatched: • DOE’s workforce includes thousands of scientists, engineers and experts who hold security clearances, enabling them to engage in work essential to national security. • DOE is the Nation’s largest supporter of research in the physical sciences, investing $5 billion annually. • Research supported by the Department has yielded over 100 Nobel prizes. • The Department is home to three of the world’s five most powerful supercomputers. DOE’s Office of Intelligence and Counterintelligence deploys this world-class scientific and technical expertise to meet America’s greatest national security challenges. The mission of the U.S. Department of Energy’s Office of Intelligence and Counterintelligence is to identify and mitigate threats to U.S. national security and the DOE Enterprise and inform national security decisionmaking through scientific and technical expertise. The Office functions within the U.S. Intelligence Community (IC), with accountability to both the Secretary of Energy and the Director of National Intelligence. Our primary missions are in the following areas: Scientifically Informed Intelligence Analysis Analysts at the National Laboratories and DOE headquarters specialize in employing scientific and technical expertise, including experimentally verified analysis, to tackle the most difficult challenges facing our country’s national security leaders.
    [Show full text]
  • Fm 2-22.3 (Fm 34-52)
    FM 2-22.3 (FM 34-52) HUMAN INTELLIGENCE COLLECTOR OPERATIONS HEADQUARTERS, DEPARTMENT OF THE ARMY September 2006 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. NOTE: All previous versions of this manual are obsolete. This document is identical in content to the version dated 6 September 2006. All previous versions of this manual should be destroyed in accordance with appropriate Army policies and regulations. This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil). *FM 2-22.3 (FM 34-52) Field Manual Headquarters No. 2-22.3 Department of the Army Washington, DC, 6 September 2006 Human Intelligence Collector Operations Contents Page PREFACE ............................................................................................................... vi PART ONE HUMINT SUPPORT, PLANNING, AND MANAGEMENT Chapter 1 INTRODUCTION...................................................................................................1-1 Intelligence Battlefield Operating System .............................................................1-1 Intelligence Process..............................................................................................1-1 Human Intelligence ...............................................................................................1-4 HUMINT Source....................................................................................................1-4 HUMINT Collection and
    [Show full text]
  • MCWP 2-22 Signals Intelligence ______C-3
    MCWP 2-22 (formerly MCWP 2-15.2) Signals Intelligence U.S. Marine Corps DISTRIBUTION STATEMENT A: approved for public release; distribution is unlimited PCN 14300006300 MCCDC (C 42) 13 Jul 2004 E R R A T U M to MCWP 2-22 SIGNALS INTELLIGENCE 1. Change the publication short title to read “MCWP 2-22” (vice MCWP 2-15.2). PCN 143 000063 80 DEPARTMENT OF THE NAVY Headquarters United States Marine Corps Washington, D.C. 20380-1775 22 February 1999 FOREWORD Marine Corps Warfighting Publication (MCWP) 2-22, Signals Intelligence, serves as a basic reference for understanding concepts, operations, and proce- dures for the conduct of signals intelligence (SIGINT) operations in support of the Marine air-ground task force. This publication complements and expands on Marine Corps Doctrinal Publication 2, Intelligence, and MCWP 2-1, Intelli- gence Operations, which provide doctrine and higher order tactics, techniques, and procedures for intelligence operations. The primary target audience of this publication is intelligence personnel respon- sible for planning and executing SIGINT operations. Personnel who provide support to SIGINT or who use the results from these operations should also read this publication. MCWP 2-22 describes aspects of SIGINT operations, including doctrinal fun- damentals, equipment, command and control, communications and information systems support, planning, execution, security, and training. Detailed informa- tion on SIGINT operations and tactics, techniques, and procedures is classified and beyond the scope of this publication. MCWP 2-22 supersedes Fleet Marine Force Manual 3-23, (C) Signals Intelli- gence/Electronic Warfare Operations (U), dated 21 September 1990. Reviewed and approved this date.
    [Show full text]
  • Intelligence Support for Military Operations Using the Arcgis® Platform
    Intelligence Support for Military Operations Using the ArcGIS® Platform April 2016 Copyright © 2016 Esri All rights reserved. Printed in the United States of America. The information contained in this document is the exclusive property of Esri. This work is protected under United States copyright law and other international copyright treaties and conventions. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or by any information storage or retrieval system, except as expressly permitted in writing by Esri. All requests should be sent to Attention: Contracts and Legal Services Manager, Esri, 380 New York Street, Redlands, CA 92373-8100 USA. The information contained in this document is subject to change without notice. Esri, the Esri globe logo, ArcGIS, ModelBuilder, esri.com, and @esri.com are trademarks, service marks, or registered marks of Esri in the United States, the European Community, or certain other jurisdictions. Other companies and products or services mentioned herein may be trademarks, service marks, or registered marks of their respective mark owners. The information presented in this document is based on standard Esri commercial off-the-shelf (COTS) technologies and commercial data. Use of the information presented in this document is subject to all applicable US export control laws and regulations including the US Department of Commerce Export Administration Regulations (EAR) and Department of State International Traffic
    [Show full text]