Types of Intelligence Analysis

An intelligence director talks to a team of intelligence analysts working on their computers.

National security threats are on the rise. National security professionals rely on accurate intelligence to defend the United States against these threats and to protect critical assets.

Federal agencies such as the Department of Defense, National Security Agency, Federal Bureau of Investigation, and U.S. Army Cyber Command use intelligence to set policies and improve security.

In these agencies, intelligence analysts collect raw data, process it into actionable intelligence and present their findings in intelligence reports. Analysts also develop strategies to address security risks and protect high-risk targets. Sophisticated collection and analytical techniques allow intelligence analysts to track criminal organizations, terrorist groups and foreign spies.

Federal agencies need professionals with skills in intelligence analysis. Earning a degree in intelligence and security studies can prepare individuals for a career as an intelligence analyst.

What Is Intelligence Analysis?

Intelligence analysis is the process of turning raw information into actionable intelligence. In the security field, intelligence analysts collect and analyze data to create intelligence briefs. These reports help identify national security threats and inform decision-making.

Analyzing information to draw intelligence conclusions is a critical component of protecting national security. Intelligence analysts collect information from diverse sources to fight against terrorism, organized crime and cyberthreats.

Analysts draw on many sources to ground their findings, often combining multiple sources to verify their conclusions. The sources used in intelligence analysis include:

  • Human-source intelligence (HUMINT): Human sources provide intelligence for many intelligence agencies. Effectively making use of HUMINT requires an in-depth understanding of the reliability and vulnerability of the source.
  • Geospatial intelligence (GEOINT) and imagery intelligence (IMINT): Intelligence that relies on imagery and geospatial data often involves satellite or aerial reconnaissance. Analysts need high-level technical skills to be able to draw intelligence from GEOINT and IMINT sources.
  • Measurement and signature intelligence (MASINT) and signals intelligence (SIGINT): These forms of intelligence focus on technical information that can locate or identify targets. SIGINT, for example, is gathered by intercepting signals to track networks. Analysts must have technical and analytical skills to be able to effectively extract intelligence from these sources.
  • Open-source intelligence (OSINT): OSINT is based on public-access sources, including the internet and social media. Newspapers, online databases and public videos can all contribute to open-source intelligence, and analysts must have strong data processing skills to be able to search for what they need.

Effective intelligence analysis requires credible sources. Without credible sources, analysts cannot reach reliable conclusions about risk mitigation, threat assessment and security targets.

Goals of Intelligence Analysis

Intelligence analysts leverage many tools and techniques to gather intelligence. Ultimately, the goals of intelligence analysis include:

  • Evaluate sources: Actionable intelligence requires reliable information. The intelligence analysis process involves assessing the credibility of sources and the reliability of data collection methods.
  • Identify vulnerabilities: Intelligence analysis relies on identifying potential targets and vulnerabilities within the United States to protect national security. This process also includes identifying gaps in intelligence sources to improve intelligence reports.
  • Threat assessment: Based on their assessment of information, intelligence analysts make judgments about the threat posed by foreign actors, hackers and other adversaries. Sharing raw intelligence with allies can also play an important role in threat assessment.
  • Risk mitigation: Analysts provide intelligence to decision-makers in order to mitigate risk and prevent attacks before they occur. This process also includes addressing vulnerabilities before adversaries exploit them.

In addition to collecting and processing information, the intelligence community recommends strategies to protect national security and counter threats.

What Is Counterintelligence Analysis?

Counterintelligence analysis is employed to prevent adversaries from gaining information about the United States. As the number of actors targeting the country continues to grow, counterintelligence analysis is becoming more critical to national security. Analysts who specialize in counterintelligence identify foreign intelligence activities to protect national interests.

In its national counterintelligence strategy report, the National Counterintelligence and Security Center identifies foreign nations with advanced intelligence capabilities, nonstate actors including terrorist organizations and global criminal organizations as entities that may pose a threat to national security.

The number of organizations and assets that are being targeted is also continuing to grow, with adversaries not only targeting government agencies but also private financial institutions, critical infrastructure and academic laboratories. According to the FBI, the country’s critical assets include information and technology in the defense, science, technology, finance and intelligence sectors.

In the evolving field of counterintelligence, analysts must neutralize innovative espionage methods and technologies. For example, specialists in digital counterintelligence monitor trends in cyberattacks to prevent data breaches or penetrations. Counterintelligence analysts also monitor economic espionage, threats to critical infrastructure and attacks targeting sensitive information.

As technologies continue to advance, counterintelligence specialists must modify their tactics. Tools such as unmanned systems, surveillance equipment and biometric devices pose new threats to U.S. interests.

Goals of Counterintelligence Analysis

Counterintelligence analysts take both offensive and defensive steps to counter the challenges facing the United States. The goals of counterintelligence analysis include:

  • Protect critical assets: Counterintelligence analysts proactively protect critical assets, including U.S. intelligence, from adversaries. Threat assessment and vulnerability assessments play a significant role in protecting these assets.
  • Prevent espionage: With many foreign actors attempting to infiltrate American organizations, counterintelligence focuses on preventing spying. This includes tracking the intelligence capabilities of adversaries.
  • Take countermeasures: Analysts present the results of their counterintelligence analysis to decision-makers, often with recommendations for countermeasures to protect U.S. assets.
  • Counterterrorism: Intelligence is collected on foreign and domestic terrorist organizations, sometimes by infiltrating these organizations. Intelligence offers a valuable resource for preventing terrorist attacks.

What Is Open-Source Intelligence?

Open-source intelligence plays an increasingly important role in security. Also known as OSINT, open source intelligence refers to publicly available data that can be used to proactively identify threats.

In World War II, intelligence analysts tuned into foreign radio broadcasts and read foreign newspapers to collect open-source intelligence. Today, analysts have a wealth of public information available to them. Common OSINT sources include:

  • Directories with personal identifying information
  • Social media accounts
  • Public and government records
  • Media sources such as newspapers and news sites
  • Online discussion forums and blog posts

However, while OSINT analysts identify vulnerabilities, adversaries use the same tools to identify targets. For example, hackers can collect data on targets through openly available sources for phishing scams or to find weaknesses in computer networks.

OSINT Challenges

Collecting intelligence from open sources poses several challenges to intelligence analysts. First, analysts need a clear idea of what information they’re seeking to identify the best sources to find that information. Then, analysts need to process a large amount of raw data to eliminate unhelpful information. Only after filtering the data can analysts use it to build a reliable intelligence report.

Publicly available information is also used to help confirm intelligence findings from other sources. For example, if human intelligence places a target in a specific location, metadata from that person’s social media accounts could confirm this information. OSINT data must be understood in context to create meaningful intelligence.

What Is Social Media Analysis?

The rise of social media has changed the intelligence landscape. Today, billions of people use social media. But how does social media analysis relate to intelligence? A subfield of open-source intelligence, social medial intelligence, or SOCMINT, refers to information that is gathered from social media networks.

For example, government intelligence analysts extract data from social networking sources to track terrorists or organized crime organizations. Analysts can also identify human trafficking networks using social media.

Analysts who specialize in social media identify target’s profiles, collect information found on social media accounts and analyze metadata to provide context for intelligence findings. Social media analysis can also include evaluating interactions between users to understand a target’s network.

SOCMINT Challenges

Social media analysis poses unique challenges. Unlike other open-source data, some social media data appears only in private groups or chats. But the greatest challenge in SOCMINT analysis is filtering through the vast amounts of data found on social media platforms to find useful information. Though, with the right techniques, analysts can track threats without allowing the volume of information to overwhelm them.

Social media analysis also can run into data privacy issues. Analysts must follow applicable laws and regulations while also achieving their intelligence goals.

The Intelligence Cycle

How does intelligence analysis work in practice? The intelligence cycle describes how intelligence agencies set priorities, collect data and create intelligence reports. If any step in the process falters, it can put national security at risk.

Step 1: Planning

In the planning step, policymakers work together with intelligence agencies to determine the most critical issues and to prioritize intelligence targets.

In areas such as counterterrorism, intelligence efforts are ongoing, though policymakers may identify new priorities due to current events or international affairs.

Step 2: Collection

Before analyzing data, intelligence operatives must collect usable information. The collection step often casts a broad net, identifying multiple relevant sources to confirm information identified through other sources.

Intelligence collection sources can include geospatial imagery, intelligence from human sources, photographic or digital evidence and publicly available information.

Step 3: Processing

Processing raw data allows analysts to evaluate information and produce intelligence. In this step, analysts may process images, apply algorithms to filter out irrelevant data or decode encrypted messages.

Step 4: Analysis

In the analysis step, intelligence analysts evaluate the processed information to make assessments. They then produce reports that present the sources and intelligence. These reports also indicate any reservations the analyst has about the data or conclusions.

Analysts must also evaluate the collection and processing stages to eliminate unreliable information.

Step 5: Dissemination

In the dissemination step, intelligence agencies share their findings with decision-makers, including senior government leaders, military commanders and policymakers. These intelligence briefings provide actionable information and recommendations.

Once intelligence reaches decision-makers outside of the intelligence community, analysts may need to respond to questions, provide context or conduct further investigations.

Step 6: Evaluation

Intelligence analysts constantly evaluate their sources, methods and conclusions to identify gaps, biases or errors. They also evaluate intelligence reports for errors in judgment. As a result, this final step occurs throughout the intelligence cycle.

Critical Skills for Intelligence Analysts

Intelligence analysts may specialize in any of a number of areas, including analyzing foreign military capabilities, national security intelligence or technical intelligence. In each of these specialty areas, intelligence analysts require many of the same skills, including strong teamwork and analytical skills.

Analytical Judgment

Analyzing raw data to distill intelligence requires strong critical thinking and judgment skills. Analysts apply diverse analytical techniques, including data interpretation methods, to reach conclusions.

When interpreting information, intelligence analysts must avoid cognitive biases and watch for assumptions that could influence their judgment.

Technical Skills

Whether they are analyzing satellite images or evaluating network vulnerabilities, intelligence analysts need strong technical skills. Those working with geospatial or imagery intelligence need to know how to interpret raw images to reach intelligence conclusions. Similarly, specialists in digital intelligence need high-level technical skills.

A background in data science helps intelligence analysts determine the quality of their data and methodologies.

Detail Orientation and Organizational Skills

Sifting through raw information to identify valuable intelligence requires a detail-oriented outlook. In addition, intelligence analysts benefit from strong organizational skills.

The FBI hiring process for intelligence analysts incorporates several tests to identify candidates’ problem-solving, analytical and information assessment skills.

Collaboration and Communication Skills

Intelligence analysts collaborate with fellow analysts, policymakers, intelligence sources and others to do their jobs. They need to have excellent teamwork and collaboration skills, as well as strong communication abilities.

For example, intelligence analysts draw on their writing skills to create threat reports and recommend security measures. When hiring intelligence analysts, the FBI incorporates a writing assessment early in the hiring process to screen for strong communication skills.

Intelligence Analyst Training

Intelligence analysts require specialized training to enter the field. Positions in federal intelligence agencies typically require a bachelor’s degree or higher. For example, FBI intelligence analysts qualify for the GS-7 level with a bachelor’s degree or the GS-9 level with a graduate degree.

Training in the following areas benefits intelligence analysts:

  • National security studies
  • Data analytics
  • Cybersecurity
  • International affairs
  • Information science

Degree programs that prepare intelligence analysts should also focus on key soft skills such as collaboration, problem-solving and critical thinking.

Work in Intelligence Analysis With a Master’s in Intelligence and Security Studies From Augusta University Online

The critical field of intelligence analysis needs qualified analysts. While a bachelor’s degree can help you launch a career in intelligence analysis, a master’s degree opens more doors. The Master of Arts in Intelligence and Security Studies program at Augusta University Online helps students build the advanced knowledge and skills needed for a career in this in-demand field.

Students in the intelligence and security studies program explore security threats from terrorism to cyberwar. They examine the causes of global conflict, counterterrorism strategies and intelligence analysis. With concentrations in technical intelligence analysis, social influence, and general intelligence and security studies, students can customize the program based on their interests and career goals.

Contact AU Online today to learn how a master’s in intelligence and security studies can help you advance in intelligence analysis.

Sources:
FBI, “Candidate Information: Intelligence Analyst Selection Process”
FBI, Counterintelligence
FBI Jobs, Intelligence Analysts
IBM, “What Is Open-Source Intelligence (OSINT)?”
Indeed, “What Does an Intelligence Analyst Do? (With Salary)”
National Counterintelligence and Security Center, National Counterintelligence Strategy
Office of the Director of National Intelligence, How the IC Works
Office of the Director of National Intelligence, Intelligence Analysis
Office of the Director of National Intelligence, “What Is Intelligence?”
OSINT Telegraph, “Social Media Intelligence (SOCMINT): Unveiling the Power of Open Source Intelligence”
Scientia Militaria, “Social Media Intelligence: The National Security-Privacy Nexus”
U.S. Department of State, “Open Source Intelligence Strategy”

Like
Like Love Haha Wow Sad Angry
Avatar photo
Written by
AU Online
View all articles