Skip to content
Menu
menu
Illustration of hand holding a question mark under a magnifying glass.

Illustration by iStock, Security Technology

The Six Steps in the Intelligence Cycle

Open-Source Intelligence. Human Intelligence. Signals Intelligence. These are common terms thrown around when discussing security intelligence. But what, at its core, is intelligence? What differentiates one type from another? And what role do they play in the intelligence cycle?

For starters, intelligence is collected information that involves threats to countries, people, property, or other interests.

“Intelligence can provide insights not available elsewhere that warn of potential threats and opportunities, assess probable outcomes of proposed policy options, provide leadership profiles on foreign individuals, and inform official travelers of counterintelligence and security threats,” according to the U.S. Office of the Director of National Intelligence.

Intelligence is typically gathered by using a six-step Intelligence Cycle.

 

1024-sectec-infographic-intel-cycle-01.gif

Step One: Planning

Policymakers determine what issues need to be addressed and set intelligence priorities. These priorities guide collection strategies to produce appropriate intelligence products

1024-sectec-infographic-intel-cycle-02.gif

Step Two: Collection

Information is gathered using the six types of intelligence collection:

  • Geospatial Intelligence (GEOINT): Geospatial data and imagery produced by integrating imagery, imagery intelligence, and geographic information.

  • Human-Source Intelligence (HUMINT): Information gathered from human sources, such as using spies or military attaches.

  • Imagery Intelligence (IMINT): Relies on representations of objects reproduced electronically or optically on film, electronic display devices, or other media formats.

  • Measurement and Signature Intelligence (MASINT): Information from scientific and technical sources to describe, locate, or identify targets.

  • Open-Source Intelligence (OSINT): Publicly available information that is printed or in electronic format, such as radio, television, on the Internet, commercial databases, and more.

  • Signals Intelligence (SIGINT): Relies on the interception of signals—between people or machines.

1024-sectec-infographic-intel-cycle-03.gif

Step Three: Processing

Information gathered from the collection phase is organized, refined, and synthesized into a form that analysts can use.

This step may involve:

    • Processing imagery

    • Decoding messages

    • Translating broadcasts

    • Preparing information for computer processing, storage, or retrieval

    • Placing human-source reports into a form and context to make them understandable

1024-sectec-infographic-intel-cycle-04.gif

Step Four: Analysis

Analysts examine and evaluate the processed material and add context, as needed, to integrate into complete products called finished intelligence. Finished intelligence includes assessments of events and judgements about the implications the information may have.

1024-sectec-infographic-intel-cycle-05.gif

Step Five: Dissemination

Finished intelligence is shared with policymakers, military leaders, and other senior government leaders who can use it to make decisions. Requests from these individuals for more information can restart the Intelligence Cycle.

1024-sectec-infographic-intel-cycle-06.gif

Step Six: Evaluation

Evaluation occurs continuously throughout the Intelligence Cycle. It involves evaluating products for accuracy, bias, relevance, and timeliness.

 

Source: How the Intelligence Community Works, U.S. Office of the Director of National Intelligence

arrow_upward