Cybersecurity: Intelligence Cycle and Disciplines

The ongoing process of intelligence operations remains a vital strategy for implementation by governments and businesses around the world. Both public and private entities assert a specific definition for the concept of intelligence and use a proven strategy in order to transform initial intelligence gathering into counter intelligence measures. Intelligence refers to the collection, analysis and dissemination of information regarding an adversary’s capabilities (Chapple & Seidl, 2015, p. 77). Nearly all organizations use computer networks to transfer private information between different interconnected devices, often using encryption, virtual private networks and other forms of threat detection and mitigation in order to secure information. Organizations that conduct intelligence operations seek ways to access an adversary’s computer networks in order to analyze private information that can lead to them gaining a competitive advantage during governmental or corporate operations. Intelligence plays a significant role in the development of business and military strategies that can ensure that companies and governments can prevent or defend against an adversary through counter intelligence. 

The intelligence cycle functions as a paradigm for collection efforts by public and private entities that gather information in a proven, systematic way that will allow them to use data in order to prepare for counter intelligence measures. The planning and direction stage require decision makers to determine the types of information organizations will seek to collect and the methods for gaining access to private information. The collection phase occurs when organizations use their assets in order to gain access to computer networks that will allow them the opportunity to gather an adversary’s information (Chapple & Seidl, 2015, p. 81). One of the most significant parts of the intelligence cycle, the processing and exploitation phase, refers to the analysis of collected intelligence and its transformation into practical counter intelligence through the use of visual or textual documents that explain strategies that businesses and governments can use to maintain a competitive advantage. The analysis and production phase verify the reliability of the targeted counter intelligence strategy found in the previous step, and checks it for any errors before its submission to the initial requestor of information. Dissemination, the final step, refers to the submission of all intelligence products to the requesting decision makers. The intelligence cycle is the most frequently applied intelligence strategy in many corporations and governments throughout the world.  

Decision makers use a variety of collection methods known as intelligence disciplines in order to gather information from humans, computer networks and other forms of technology like satellites and radar systems. Human intelligence concerns the ability to collect information from people who interact with others (Chapple & Seidl, 2015, p.84). Signals intelligence, one of the most frequently used intelligence disciplines, collects information by gaining access to networks in order to gather data from communications devices and electronic signals like web traffic and telephone calls. Open source intelligence refers to the collection of information from public sources including internet, newspapers and radio. Geospatial intelligence, which provides significant support to governments looking to acquire intelligence on terrain both domestic and abroad, includes the use of technology to produce photographs, maps and other visual intelligence in order to gain an accurate perception of how an adversary conducts its operations. Measurement and signature intelligence concern the ability to identify and describe the details of an adversary’s operations (Chapple & Seidl, 2015, p. 91). Signals intelligence and measurement and signature intelligence are often combined within the intelligence cycle in order to create a way to discover information that can relate to an adversary developing inappropriate technologies like weapons programs. Decision makers at organizations pinpoint the type of information it seeks to gather and determine the best intelligence discipline to use during its offensive and defensive cybersecurity strategies.   

References

Chapple, M., & Seidl, D. (2015). Cyberwarfare: Information Operations in a Connected World. Burlington, MA: Jones & Bartlett.

Exit mobile version