APPENDIX B

THE INTELLIGENCE THREAT


1. Introduction. Adversaries and potential adversaries collect and analyze information about US military operations in order to determine current capabilities and future intentions. To perform this function, most adversaries have created intelligence organizations and systems. The capabilities and levels of sophistication of these threats differ greatly, but they all share certain core characteristics. The most important of these are how intelligence is developed and how it is collected. This appendix will describe those characteristics.

2. The Intelligence Cycle. All intelligence systems follow a process. This process begins with a consumer (a commander or decisionmaker) requesting answers to certain questions and ends with the intelligence system providing those answers. Figure B-1 illustrates a typical intelligence cycle (in this case, the intelligence cycle described in Joint Pub 2-0). Understanding the concept of the intelligence cycle is basic to understanding the total adversary intelligence threat to friendly operations in general and to the specific threat to the critical information that OPSEC seeks to protect.


Figure B-1. The Intelligence Cycle>

  1. Planning and Direction

  2. Collection

  3. Processing. Collected information must be processed into a form that is suitable for the production of intelligence. For example, imagery film must be developed and signals must be processed before they can be evaluated, analyzed, and interpreted for significance.

  4. Production

  5. Dissemination. In this step, the product is delivered to the consumer. There are as many forms of delivery as there are products and consumers. Automated means are becoming increasingly important in many intelligence systems.

3. Intelligence Sources

  1. Human Intelligence (HUMINT). HUMINT uses people to gain information that is often inaccessible by other collection means. Although it is the oldest and most basic form of intelligence collection, HUMINT remains significant because it is often the only source with direct access to the opponent's plans and intentions. Clandestine HUMINT collection is done in a fashion that maintains the secrecy of the collection operation.

  2. Imagery Intelligence (IMINT)

  3. Signals Intelligence (SIGINT). SIGINT is derived from communication (COMINT), electronics (ELINT), and foreign instrumentation signals (FISINT).

  4. Measurement and Signature Intelligence (MASINT). MASINT is scientific and technical intelligence obtained by the quantitative and qualitative analysis of data (metric, angle, spatial, wavelength, time dependence, modulation, etc.) derived from specific technical sensors for the purpose of identifying any distinctive features associated with the source, emitter, or sender and to facilitate subsequent identification and/or measurement of the same. MASINT includes other intelligence sources such as acoustical intelligence (ACINT), laser intelligence (LASINT), and nuclear intelligence (NUCINT).

  5. Open Source Intelligence (OSINT). OSINT is information of intelligence value that is available to the general public. OSINT is available from such sources as the news media, public affairs announcements, unclassified government documents and publications, public hearings, and contracts and contract-related material.

  6. Technical Intelligence (TECHINT). TECHINT is derived from the exploitation of foreign material and equipment. It results from the analysis of captured or otherwise obtained foreign equipment.

12-20-1996; 17:07:58