It all starts with planning. During the planning cycle this is where it is determined what needs to be addressed and how to go about it. The next cycle begins with the collection of the actual raw intelligence. During the collection cycle this is where various techniques and tools are used to collect such data. These techniques can be wire-tapping, surveillance, the use of human sources and so on. After the raw data is collected it is then sent for processing which begins another cycle. During the processing cycle the raw material is sorted into what is useable and not useable then it is moved on the analysis cycle. The analysis cycle is where the data is turned into useable and potentially actionable intelligence. The last cycle in this process is the dissemination cycle where the prepared intelligence is sent to those policy makers and others responsible for making tough decisions. This is a dynamic and intense process and one that requires dedicated …show more content…
Just as the name implies it use the human as the collection source. This is synonymous with spying and espionage. The primary users are the Central Intelligence Agency (CIA), Department of State (DOS), Department of Defense (DOD), and the Federal Bureau of Investigations (FBI). The clandestine portion is ran by the National Clandestine Service (NCS), which is part of the CIA.
Open-Source Intelligence (OSINT) is the collection of data from the Internet, radio waves, newspaper and so on. It is what we do everyday that feeds this type of intelligence. The primary user of this type is the Foreign Broadcast Information Center.
Geospatial Intelligence (GEOINT) is the collection of data through the use of satellites, maps, and reconnaissance aircraft. This type can be useful in support of national disasters and humanitarian relief efforts. The manager for this type of intelligence is the Director of the National Geospatial Intelligence Agency