Criminology
Comparing and Contrasting Intelligence Processes
July 10th, 2013
Introduction
Intelligence may in the most basic definitions be termed as information. In the sense that it is used in security and security –related organizations, intelligence may better be looked at as the sum of processes that goes into collecting and analyzing data and converting it into useful information which may be used to strategize for improved security. In this context the security is that of the United States of America. This paper compares and contrasts between intelligence processes used in different institutions in the United States that exist for purposes of providing security. These institutions include United Stets Homeland Security department, the United States Military, law enforcement institutions and private sector intelligence organizations. The paper analyses the different approaches taken in intelligence processing in different organizations, their involvement in terms of human resource and technology, their demands in terms of financial and other resources, their productivity and their effectiveness as methods.
Similarities
Gill et al (2009) first and foremost asserts that intelligence and the purpose of all intelligence processes is to provide data that may be converted to information that could prove useful in defending oneself against a real or perceived enemy and to help the party on the defense to know how well to prepare and strategize for a perceived or impending attack. Such attchsk may be in form of physical threats such as bombs or gun fire attacks by enemy troops. They may also be biological weapon such as the release of viruses at a targeted population. They may also be chemical weapon such as the release of harmful gases into the airspace of a particular region thus putting the population in that region in danger of death or harm from breathing in the chemicals. Other chemical weapons may include the poisoning of water sources or other communal ingestible ere sources. In this modern era of technology technological weapons may also be used, such as the designing and deploying of computer viruses to destroy the proper flow of information within an organization .in more simple yet equally threatening circumstances such as those faced by law enforcement agencies such as police departments, homicide and robbery cases are also attacks to guard against (Rolington,2013).
One of the most outstanding similarities in intelligence processing among different organizations regardless of scope and nature of job is that the same basic procedures or stages are involved. Where it is the Military, FBI , Homeland security or private sector security organization such as the kind that protect banks, the same intelligence processing cycle is followed : collection of data and information( physical or verbal ) ,analysis of the data in various ways , processing of the data to determine meanings and implications of the information collected and finally dissemination of the data to various departments or individuals to whom it is helpful. Although the ways in which this collection, analysis, processing and dissemination is done might differ, the same basic processes remain necessary (Gilletal, 2009).
Among the key similarities of intelligence among most intelligence institutions in America, notably the Federal Bureau of Investigation (FBI) the Military , Homeland security and many private organizations is that the main purposes for which they are used. The purposes for any security organization may fall into any or all of the following categories; to help collect information that may aid in strategizing to defend against enemies, to help in providing adapt that may help an organization better make use of its resources and thus optimize their usefulness and to possibly predict attacks from enemies and put into effect mitigation strategies against the same (Rolington, 2013). The military for instance uses intelligence to help guide in critical decision making. Such decisions usually involve the risk of many people’s lives and risk instability of country-to – country relations (Gonzales, 2007).
All security organization utilizing intelligence, no matter how diverse and different their activities have one of these purposes
Another similarity in intelligence processes in the different security institutions is the fact that technology plays a major role. Technology has constantly been used to develop systems that help in the processing of data and in intelligence to ensure that error is minimized, and that information obtained is more accurate. Mathematical, geometrical and other statistical kinds of computations that are a marked feature of intelligence processes have greatly benefited from the use of technology as the margin of error greatly minimized (Barger,2005).
The United States military for instance uses large machines to conduct its intelligence. These include large submarines in the ocean or large spacecrafts in the air. These are normally operated and run by sophisticated computers, which are able to both operate the vessels and collect information needed to form credible intelligence. The Central Intelligence Agency in America also makes use of sophisticated machines to perform analysis on data –either physical of virtual-collected to determine whether it may have meaning and whether it may form clues to helping defense against attackers. The Federal Bureau of investigation (FBI ) has also invested in a great deal of technology in ICT, forensics and biological processes to optimize the analysis data that may lead to credible information on enemies and their plans().The intelligence gathered by such large organization sis put to use to provide credible and dependable security for the country, its people and its leaders(Barger,2005).
In almost all security organizations, intelligence and intelligence processing are used as an auxiliary as opposed to the primary element of defense or attack. In the military for instance, intelligence processing is used as an auxiliary element of war, and its main function is to complement and supplement available efforts and information. Tactical, environmental and political intelligence are used to help make important decisions concerning the activities of the military (Gonzales, 2007). However the key element of war remains the development of troops on the ground to fight the war. The same is true for law enforcement and Homeland security. They use intelligence as a secondary element of their plan to help them execute their primary element of attack and defense well-actual combat, war and tackle with the enemy.
Lastly most intelligence processing regardless of setting, context and mandate will usually need personnel who are trained in information processing. The degree of this training varies in accordance to the size, sophistication and mandate of the organization (Rolington, 2013 ).
Differences
Differences in intelligence processing activities among different intelligence organizations include the manner in which data collection, analysis, processing and dissemination is conducted. Some organizations have very elaborate and precise ways of conducting each stage of intelligence processing. Others are however more flexible and rely more on the context and situation( Kahan,2013) . Law enforcement authorities for instance tend to collect and analyze data in the natural setting. For instance crime scenes by law enforcement are often cordoned out and an analysis of the scene is made in detail. Larger organizations like the CIA, Homeland security or FBI however tend to focus more on the carrying away of data for intense analysis by very sophisticated machines and experts (Logan, 2010).
Another difference in intelligence processing is in the amount of secrecy and confidentiality with which information is treated. Large institutions whose security assignments are of a sensitive nature , such as those charged to protect the president (CIA ) or those charged to defend the country against terrorist such as the military and the FBI tend to maintain a very high degree of secrecy in their intelligence processing. All the processes from collection of information, to its analysis, processing and dissemination is conducted with utmost secrecy. Homeland security for instance has levels of clearance which allow some personnel access to certain information and deny pothers the same. Such secrecy is necessary because of the sensitive nature of the work they do. They do so to limit the possibility of being infiltrated by spies or traitors, whose betrayal might lead to more serious consequences in fatalities as compared to law enforcement (Kahan,2013).
There is a contrast in the scope with which different security organization choose to conduct their intelligence processing. Homeland security for instance as an organization conducts its intelligence processing on a very wide scope. This is because of the nature and purpose of that intelligence. Since it is charged with the responsibility of protecting the country against terrorist threats and enemy attacks, the nature of its intelligence has to have a wide scope and reach. Information is collected from all over the country and even outside the United States boarders. In contrast intelligence collected by law enforcement agencies tends to be localized to the area or region of operation. The Los Angeles Police Department (LAPD) for instance will usually limit its intelligence to Los Angeles where most of the threats they deal with occur. Extending their intelligence the whole country might strain their resources and would not fall within their mandate (Gill et al, 2009).
Different Organizations also employ different kinds of intelligence in accordance to the nature of the work that the organization exists to do. The United States Military for instance usually concentrates on the tactical, environmental, demographical, political and weaponry intelligence. This is mostly because these are the areas that concern their mandate and tasks ( Gonzales,2007). In contrast, private sector security organizations that provide security for high profile individuals tend to concentrate on intelligence concerning specific individual or groups which they perceive as threats.
Different organizations also differ in the kind of expertise they require for their intelligence processing. Smaller security organizations for instance often rely on the services of usual staff. Police departments usually rely on the services of their officers to be involved in all the processes of intelligence. They collect the data and information needed, analyze it, process it, seek to find and determine meanings it might have and disseminate it to those whom it concerns. Larger organizations like the Military and Homeland security tend to categorize their intelligence processing to departments. Hired experts and personnel are trained for and hired to concentrate on a specific part of intelligence. There are professionals who have expertise in collecting information and other experts who are thoroughly trained in information analysis and processing (Kahan,2013).
Conclusion
Intelligence processing has become necessary in any security organization that seeks to properly defend its interests. Although many differences mainly result from the nature of task an organization exists for, most organizations will largely have the same basic processes that constitute intelligence processing. With the advancement of technology globally, intelligence processing is set to be improved and made more efficient.
References
Gill, P., Marrion, S, & Phythian, M.(2009).Intelligence Theory: Key Questions and Debates.
New York: Routledge.
Barger ,D.G. (2005). Towards a Revolution in Intelligence. Santa Monica , CA:Rand.
Rolington, A. (2013).Strategic Intelligence for the 21st Century: The Mosaic Method.
London: Oxford University Press.
Logan, K.G. (2010).Homeland Security and Intelligence. New York: Praeger Security
International.
Gonzales,L. (2007).The U.S. Military: Defending the Nation. New York: Rosen Publishing.
Kahan, J. H. (2013). What’s in a Name ?:The Meaning of Homeland Security. The Journal of
Homeland Security, Vol2, 1-18. http://www.journalhse.org/v2jeromekahan.html