SlideShare a Scribd company logo
POL 403
Spring 2019
Intelligence Collection and Analysis
Intelligence Collection and Analysis
 Instruments vary by impact:
 Military Force (Political)
 Economic Statecraft (Economic)
 Moral and Cultural Suasion (Social/Cultural)
 Begin with the “academic” instrument—
Intelligence Collection and Analysis
 What intelligence should we gather?
 From whom should we gather it?
 When should we obtain it?
 Where should we obtain it?
Intelligence Collection and Analysis
DAN COATS
Intelligence Collection and Analysis
 Daily summary of high-level, all-source information
and analysis on national security issues.
 The PDB is coordinated and delivered by the ODNI
 Contributions from the CIA as well as other IC elements
 PDB has evolved to meet needs and preferences of
and has expanded to include more information
 In 2014, the PDB transitioned to electronic delivery
 Most historical PDB’s remain classified due to
sensitive information.
Intelligence Collection and Analysis
INSTRUCTIONS
In groups of 3-4, design a presidential daily briefing for PresidentTrump using your
phones and computers to gather information.
In your briefing, answer these questions:
What policy issues should he be aware of today?
Where are they located?
How should we collect the intelligence we need?
Harry S.Truman signed the National Security Act into law in 1947,
Intelligence Collection and Analysis
 President, Vice President, Secretary of
State, Secretary of Defense, and others
 Discuss both long-term problems and more
immediate national security crises.
 Presidents have given NSC different
degrees of importance and influence.
Intelligence Collection and Analysis
Intelligence Collection and Analysis
Intelligence Collection and Analysis
Intelligence Collection and Analysis
Intelligence Collection and Analysis
The terrorist attacks on
September 11, 2011
changed the structure of
the U.S. government
and the Intelligence
Community.
Intelligence Collection and Analysis
Intelligence Collection and Analysis
Intelligence Collection and Analysis
Intelligence Collection and Analysis
Intelligence Collection and Analysis
 Service: Nation,Agency before Unit, Mission before Self
 Integrity: Highest standards of conduct; Accountability
 Excellence: Best of backgrounds/expertise; self-aware
 Courage: Difficult and dangerous tasks; manage risk
 Teamwork: Stand by Others; Collaboration; Inclusion
 Stewardship: Protect Information and Methods
Intelligence Collection and Analysis
DIRECTORATE OF OPERATIONS
(NATIONAL CLANDESTINE SERVICE)
 Undercover arm of CIA
 Authority on all clandestine
operations throughout the
world
 Chief of Station (COS) –Top
CIA officer in a given country
 Case Officers
(Operational Officers)
DIRECTORATE OF SCIENCE
ANDTECHNOLOGY
 Devoted to applying
technology to espionage
 Conduct R&D on gadgetry
used by CIA
 Examples: Lock picks,
mechanical birds
 Scientists develop antidotes
for foreign nerve agents and
other biological weapons.
DIRECTORATEOF SUPPORT
 Organizational and
administrative functions
to significant units
DIRECTORATEOF ANALYSIS
(DIRECTORATEOF INTELLIGENCE)
 Analyze intelligence
information
 Assists with decision-making
about national security
DIRECTORATEOF DIGITAL INNOVATION
 Focus is working with
digital, cyber, and IT
infrastructure
 Provide agents and others
with technologies needed
to carry out mission
Intelligence Collection and Analysis
Intelligence Collection and Analysis
 Purpose: CIA and other organizations (producers) in
Intelligence Community provide policymakers
(consumers) with information in advance of decisions
 Threat Assessment: Ranking of threats facing U.S.
 Targeting: Selection of intelligence targets (tasking)
 POTUS Input and Congress Non-Input
 Current Intelligence and Research Intelligence
 Technical Intelligence (TECHINT)
 Signals Intelligence (SIGINT)
 Geospatial Intelligence (GEOINT)
 Measurement and Signals Intelligence (MASINT)
 Human Intelligence (HUMINT)
 Open-Source Intelligence (OSINT)
INSTRUCTIONS
Complete the worksheet as a group, identifying the
type of intelligence you would employ in each situation.
Intelligence Collection and Analysis
 Who are analysts? What is their role?
 The Presidential Daily Briefing (PDB)
 Current Intelligence
 The National Intelligence Estimate (NIE)
 Research Intelligence
Intelligence Collection and Analysis
 Issue of politicization of intelligence
 How could the relationship between
producers and consumers of intelligence be
improved?
Intelligence Collection and Analysis
Intelligence Collection and Analysis
Intelligence Collection and Analysis
In a 8-0 decision, the Supreme Court ruled
against Nixon’s claim of executive privilege.
Intelligence Collection and Analysis
Intelligence Collection and Analysis
Intelligence Collection and Analysis

More Related Content

PPTX
Counterintelligence
PPT
Information Gathering in Intelligence Agencies
PPTX
Intelligence and counter terrorism
PPTX
402 chapter 7 counterintelligence
PPTX
POLICE INTELLIGENCE ppt.pptx
PPTX
Basic intelligence
PPTX
Espionage
Counterintelligence
Information Gathering in Intelligence Agencies
Intelligence and counter terrorism
402 chapter 7 counterintelligence
POLICE INTELLIGENCE ppt.pptx
Basic intelligence
Espionage

What's hot (20)

PPT
Intelligence Cycle
PDF
Open source intelligence information gathering (OSINT)
PPTX
Cyber threat intelligence: maturity and metrics
PPTX
Incident Response Triage
PPTX
OSINT: Open Source Intelligence gathering
PDF
Cyber Threat Intelligence
PPT
Espionage (m)
PPT
Intelligence presentation
PPTX
How to Use Open Source Intelligence (OSINT) in Investigations
PPT
Improving Police/Community Relations
PDF
Cyber Threat Intelligence
PDF
Rothke secure360 building a security operations center (soc)
PPTX
Fundamentalsof Crime Mapping 1
PPTX
Chapter 4 the intelligence process a macro look who does what for whom
PPTX
Digital Forensics
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PPTX
World's Top 6 Intelligence Agencies
PDF
How MITRE ATT&CK helps security operations
Intelligence Cycle
Open source intelligence information gathering (OSINT)
Cyber threat intelligence: maturity and metrics
Incident Response Triage
OSINT: Open Source Intelligence gathering
Cyber Threat Intelligence
Espionage (m)
Intelligence presentation
How to Use Open Source Intelligence (OSINT) in Investigations
Improving Police/Community Relations
Cyber Threat Intelligence
Rothke secure360 building a security operations center (soc)
Fundamentalsof Crime Mapping 1
Chapter 4 the intelligence process a macro look who does what for whom
Digital Forensics
Effective Threat Hunting with Tactical Threat Intelligence
World's Top 6 Intelligence Agencies
How MITRE ATT&CK helps security operations
Ad

Similar to Intelligence Collection and Analysis (20)

PDF
Cengage Advantage Books The Politics of United States Foreign Policy 6th Edit...
PDF
Cengage Advantage Books The Politics of United States Foreign Policy 6th Edit...
PDF
Cengage Advantage Books The Politics of United States Foreign Policy 6th Edit...
PPT
Intelligence.ppt
PPTX
Analyzing Intelligence
DOCX
Analysis and ProductionInformation collected in the previous ste.docx
DOCX
Confrontation or CollaborationCongress and the Intelligen.docx
PPT
Eidws 112 intelligence
PPTX
PPTX
2016 ISSA Conference Threat Intelligence Keynote philA
PPTX
CIA power point Zach Barber
PDF
Ic and policymaker integration a studies in intelligence anthology
PDF
Presentation democracy ethics vs. intelligencε security.
PDF
Smart intelligence
PPTX
How to build a cyber threat intelligence program
PDF
Presentation Outline
PPTX
How Intelligence Skills Transfer Between Government and Business
PDF
Chapter 3 the us intelligence community
Cengage Advantage Books The Politics of United States Foreign Policy 6th Edit...
Cengage Advantage Books The Politics of United States Foreign Policy 6th Edit...
Cengage Advantage Books The Politics of United States Foreign Policy 6th Edit...
Intelligence.ppt
Analyzing Intelligence
Analysis and ProductionInformation collected in the previous ste.docx
Confrontation or CollaborationCongress and the Intelligen.docx
Eidws 112 intelligence
2016 ISSA Conference Threat Intelligence Keynote philA
CIA power point Zach Barber
Ic and policymaker integration a studies in intelligence anthology
Presentation democracy ethics vs. intelligencε security.
Smart intelligence
How to build a cyber threat intelligence program
Presentation Outline
How Intelligence Skills Transfer Between Government and Business
Chapter 3 the us intelligence community
Ad

More from atrantham (20)

PPTX
PPOL 511 Course Introduction
PPTX
Financial Scandals
PPTX
Bureaucracy
PPTX
More Sex Scandals
PPTX
Clinton and Lewinsky
PPTX
Plunkitt of Tammany Hall
PPTX
Political Machines
PPTX
State Legislatures
PPTX
Governors and Executives
PPTX
State Legislatures
PPTX
Political Parties and Interest Groups
PPTX
Political Attitudes and Participation
PPTX
Presidency
PPTX
Congress
PPTX
Civil Rights
PPTX
Civil Liberties
PPTX
POL 375 Trust Legitimacy Support for Government
PPTX
Pol 375 Defining Scandal and Corruption
PPTX
POL 318 State Consitutions
PPTX
POL 318 Federalism
PPOL 511 Course Introduction
Financial Scandals
Bureaucracy
More Sex Scandals
Clinton and Lewinsky
Plunkitt of Tammany Hall
Political Machines
State Legislatures
Governors and Executives
State Legislatures
Political Parties and Interest Groups
Political Attitudes and Participation
Presidency
Congress
Civil Rights
Civil Liberties
POL 375 Trust Legitimacy Support for Government
Pol 375 Defining Scandal and Corruption
POL 318 State Consitutions
POL 318 Federalism

Recently uploaded (20)

PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Insiders guide to clinical Medicine.pdf
PDF
Business Ethics Teaching Materials for college
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
master seminar digital applications in india
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
102 student loan defaulters named and shamed – Is someone you know on the list?
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Insiders guide to clinical Medicine.pdf
Business Ethics Teaching Materials for college
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
master seminar digital applications in india
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Abdominal Access Techniques with Prof. Dr. R K Mishra
Microbial disease of the cardiovascular and lymphatic systems
O7-L3 Supply Chain Operations - ICLT Program
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Complications of Minimal Access Surgery at WLH
Module 4: Burden of Disease Tutorial Slides S2 2025
STATICS OF THE RIGID BODIES Hibbelers.pdf
Anesthesia in Laparoscopic Surgery in India
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Classroom Observation Tools for Teachers
Renaissance Architecture: A Journey from Faith to Humanism

Intelligence Collection and Analysis

  • 4.  Instruments vary by impact:  Military Force (Political)  Economic Statecraft (Economic)  Moral and Cultural Suasion (Social/Cultural)  Begin with the “academic” instrument— Intelligence Collection and Analysis
  • 5.  What intelligence should we gather?  From whom should we gather it?  When should we obtain it?  Where should we obtain it?
  • 9.  Daily summary of high-level, all-source information and analysis on national security issues.  The PDB is coordinated and delivered by the ODNI  Contributions from the CIA as well as other IC elements  PDB has evolved to meet needs and preferences of and has expanded to include more information  In 2014, the PDB transitioned to electronic delivery  Most historical PDB’s remain classified due to sensitive information.
  • 11. INSTRUCTIONS In groups of 3-4, design a presidential daily briefing for PresidentTrump using your phones and computers to gather information. In your briefing, answer these questions: What policy issues should he be aware of today? Where are they located? How should we collect the intelligence we need?
  • 12. Harry S.Truman signed the National Security Act into law in 1947,
  • 14.  President, Vice President, Secretary of State, Secretary of Defense, and others  Discuss both long-term problems and more immediate national security crises.  Presidents have given NSC different degrees of importance and influence.
  • 20. The terrorist attacks on September 11, 2011 changed the structure of the U.S. government and the Intelligence Community.
  • 26.  Service: Nation,Agency before Unit, Mission before Self  Integrity: Highest standards of conduct; Accountability  Excellence: Best of backgrounds/expertise; self-aware  Courage: Difficult and dangerous tasks; manage risk  Teamwork: Stand by Others; Collaboration; Inclusion  Stewardship: Protect Information and Methods
  • 28. DIRECTORATE OF OPERATIONS (NATIONAL CLANDESTINE SERVICE)  Undercover arm of CIA  Authority on all clandestine operations throughout the world  Chief of Station (COS) –Top CIA officer in a given country  Case Officers (Operational Officers) DIRECTORATE OF SCIENCE ANDTECHNOLOGY  Devoted to applying technology to espionage  Conduct R&D on gadgetry used by CIA  Examples: Lock picks, mechanical birds  Scientists develop antidotes for foreign nerve agents and other biological weapons.
  • 29. DIRECTORATEOF SUPPORT  Organizational and administrative functions to significant units DIRECTORATEOF ANALYSIS (DIRECTORATEOF INTELLIGENCE)  Analyze intelligence information  Assists with decision-making about national security
  • 30. DIRECTORATEOF DIGITAL INNOVATION  Focus is working with digital, cyber, and IT infrastructure  Provide agents and others with technologies needed to carry out mission
  • 33.  Purpose: CIA and other organizations (producers) in Intelligence Community provide policymakers (consumers) with information in advance of decisions  Threat Assessment: Ranking of threats facing U.S.  Targeting: Selection of intelligence targets (tasking)  POTUS Input and Congress Non-Input  Current Intelligence and Research Intelligence
  • 34.  Technical Intelligence (TECHINT)  Signals Intelligence (SIGINT)  Geospatial Intelligence (GEOINT)  Measurement and Signals Intelligence (MASINT)  Human Intelligence (HUMINT)  Open-Source Intelligence (OSINT)
  • 35. INSTRUCTIONS Complete the worksheet as a group, identifying the type of intelligence you would employ in each situation.
  • 37.  Who are analysts? What is their role?  The Presidential Daily Briefing (PDB)  Current Intelligence  The National Intelligence Estimate (NIE)  Research Intelligence
  • 39.  Issue of politicization of intelligence  How could the relationship between producers and consumers of intelligence be improved?
  • 43. In a 8-0 decision, the Supreme Court ruled against Nixon’s claim of executive privilege.