TABLE OF CONTENTSINTRODUCTION...........................................................................................................................3Q1. INTELLIGENCE CYCLE CONCEPT.....................................................................................3Q2. CRITICALLY EXAMINE AND ASSESS “COMPUTER WAS BORN TO SPY”...............7Q3. COUNTER INTELLIGENCE AND CHALLENGES.............................................................9CONCLUSION..............................................................................................................................12REFERENCES..............................................................................................................................142
INTRODUCTIONIntelligence agencies are having a great involvement in the social and economicdevelopment. These kinds of organizations are focused towards gathering of information andmeasuring the security and cross nation measures so that better protection can be provided tonation. In present study, functional values and challenges of intelligence cycle is being analysedso that better awareness can be created. Q1. INTELLIGENCE CYCLE CONCEPTIntelligence cycle refers to a fundamental cycle which is mainly used in the militaryagency or in the development of law enforcement which involves the closed path of the regularcoming nodes. There are several stages which are included in this cycle such as issuance whichare required mainly by the decision makers, analysis, processing and in the publication ofintelligence. The circuit which is formulated of the intelligence cycle is been completed with thefeedback and requirements provided by the decision makers (Ducatelle, Caro and Gambardella,2010). This cycle is also known as intelligence process. Further, it is been considered as a mostefficient manner for processing the information and converting them into actionable intelligence.Further, it may be defined as the process for the development of the raw materials to the finalintelligence (Davies and et.al., 2011). This is been used by the policy-makers which is useful indetermining decisions and action. Further, there are mainly five steps which are included inintelligence cycle:3
Planning and direction- In this there is a proper management of the efforts taken by the peopleinvolved in the intelligence process. It includes the identification of the information for the needto deliver the intelligence product to the end user. Further, it is been considered as the startingand the ending point of the entire cycle. It is been said as the beginning point as it includes thedrawing up of the specific collection which are required to complete the process and endingpoint also because the provided intelligence assist in supporting the decisions and helps ingenerating with new requirements (Marrin, 2016). Moreover, the entire cycle is highly based onthe guidance stated by public officials. In this, the policy-makers which includes President andhis aides and the National security council with other departments and agencies which are underthe legal authority are requested for determining the intelligence. In this the Federal governmentof US, for this the requirements can be issued by the White house. Further, the NATO being acommander uses the requirements and start with the intelligence process (Jensen III, McElreathand Graves, 2012). 4Illustration 1: Intelligence Cycle(Source:)
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Threat Analysis: Meaning, Process, and Mitigation Strategieslg...
|17
|2898
|214
Counterintelligence and its Primary Objectiveslg...
|4
|722
|217
Intelligence Failure Problems in Data Analysislg...
|23
|6659
|12
Counter Terrorismlg...
|4
|726
|212
Edward Snowden - A United States Senatorlg...
|15
|3564
|368
SEO Expert for Desklib: Title, Meta Title, Meta Description, Slug, Document Type, Type of Assignment, Summary, Subject, Course Code, Course Name, College/Universitylg...