fbpx
Wikipedia

Military intelligence

Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions.[1] This aim is achieved by providing an assessment of data from a range of sources, directed towards the commanders' mission requirements or responding to questions as part of operational or campaign planning. To provide an analysis, the commander's information requirements are first identified, which are then incorporated into intelligence collection, analysis, and dissemination.

A platoon commander of the 1st Marine Logistics Group, with the battalion interpreter, gather intelligence from local Afghans during a combat logistics patrol to the area, May 9, 2010.

Areas of study may include the operational environment, hostile, friendly and neutral forces, the civilian population in an area of combat operations, and other broader areas of interest.[2] Intelligence activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war, and during a war itself.

Most governments maintain a military intelligence capability to provide analytical and information collection personnel in both specialist units and from other arms and services. The military and civilian intelligence capabilities collaborate to inform the spectrum of political and military activities.

Personnel performing intelligence duties may be selected for their analytical abilities and personal intelligence before receiving formal training.

Levels edit

 
Military intelligence diagram of defense positions during the Battle of Okinawa, 1945

Intelligence operations are carried out throughout the hierarchy of political and military activity.

Strategic edit

Strategic intelligence is concerned with broad issues such as economics, political assessments, military capabilities and intentions of foreign nations (and, increasingly, non-state actors).[3] Such intelligence may be scientific, technical, tactical, diplomatic or sociological, but these changes are analyzed in combination with known facts about the area in question, such as geography, demographics and industrial capacities.

Strategic Intelligence is formally defined as "intelligence required for the formation of policy and military plans at national and international levels", and corresponds to the Strategic Level of Warfare, which is formally defined as "the level of warfare at which a nation, often as a member of a group of nations, determines national or multinational (alliance or coalition) strategic security objectives and guidance, then develops and uses national resources to achieve those objectives."

Operational edit

Operational intelligence is focused on support or denial of intelligence at operational tiers. The operational tier is below the strategic level of leadership and refers to the design of practical manifestation. Formally defined as "Intelligence that is required for planning and conducting campaigns and major operations to accomplish strategic objectives within theaters or operational areas."[4] It aligns with the Operational Level of Warfare, defined as "The level of warfare at which campaigns and major operations are planned, conducted, and sustained to achieve strategic objectives within theaters or other operational areas."[4]

The term operation intelligence is used within law enforcement to refer to intelligence that supports long-term investigations into multiple, similar targets. Operational intelligence, in the discipline of law enforcement intelligence, is concerned primarily with identifying, targeting, detecting and intervening in criminal activity. The use within law enforcement and law enforcement intelligence is not scaled to its use in general intelligence or military/naval intelligence, being more narrowed in scope.

Tactical edit

Tactical intelligence is focused on support to operations at the tactical level and would be attached to the battlegroup. At the tactical level, briefings are delivered to patrols on current threats and collection priorities. These patrols are then debriefed to elicit information for analysis and communication through the reporting chain.[5]

Tactical Intelligence is formally defined as "intelligence required for the planning and conduct of tactical operations", and corresponds with the Tactical Level of Warfare, itself defined as "the level of warfare at which battles and engagements are planned and executed to achieve military objectives assigned to tactical units or task forces".[citation needed]

Tasking edit

Intelligence should respond to the needs of leadership, based on the military objective and operational plans. The military objective provides a focus for the estimate process, from which a number of information requirements are derived. Information requirements may be related to terrain and impact on vehicle or personnel movement, disposition of hostile forces, sentiments of the local population and capabilities of the hostile order of battle.

In response to the information requirements, analysts examine existing information, identifying gaps in the available knowledge. Where gaps in knowledge exist, the staff may be able to task collection assets to target the requirement.

Analysis reports draw on all available sources of information, whether drawn from existing material or collected in response to the requirement. The analysis reports are used to inform the remaining planning staff, influencing planning and seeking to predict adversary intent.

This process is described as Collection Co-ordination and Intelligence Requirement Management (CCIRM).

Process edit

The process of intelligence has four phases: collection, analysis, processing and dissemination.

In the United Kingdom these are known as direction, collection, processing and dissemination.

In the U.S. military, Joint Publication 2-0 (JP 2-0) states: "The six categories of intelligence operations are: planning and direction; collection; processing and exploitation; analysis and production; dissemination and integration; and evaluation and feedback."

Collection edit

Many of the most important facts are well known or may be gathered from public sources. This form of information collection is known as open-source intelligence. For example, the population, ethnic make-up and main industries of a region are extremely important to military commanders, and this information is usually public. It is however imperative that the collector of information understands that what is collected is "information", and does not become intelligence until after an analyst has evaluated and verified this information. Collection of read materials, composition of units or elements, disposition of strength, training, tactics, personalities (leaders) of these units and elements contribute to the overall intelligence value after careful analysis.

The tonnage and basic weaponry of most capital ships and aircraft are also public, and their speeds and ranges can often be reasonably estimated by experts, often just from photographs. Ordinary facts like the lunar phase on particular days or the ballistic range of common military weapons are also very valuable to planning, and are habitually collected in an intelligence library.

A great deal of useful intelligence can be gathered from photointerpretation of detailed high-altitude pictures of a country. Photointerpreters generally maintain catalogs of munitions factories, military bases and crate designs in order to interpret munition shipments and inventories.

Most intelligence services maintain or support groups whose only purpose is to keep maps. Since maps also have valuable civilian uses, these agencies are often publicly associated or identified as other parts of the government. Some historic counterintelligence services, especially in Russia and China, have intentionally banned or placed disinformation in public maps; good intelligence can identify this disinformation.

It is commonplace for the intelligence services of large countries to read every published journal of the nations in which it is interested, and the main newspapers and journals of every nation. This is a basic source of intelligence.

It is also common for diplomatic and journalistic personnel to have a secondary goal of collecting military intelligence. For western democracies, it is extremely rare for journalists to be paid by an official intelligence service, but they may still patriotically pass on tidbits of information they gather as they carry on their legitimate business. Also, much public information in a nation may be unavailable from outside the country. This is why most intelligence services attach members to foreign service offices.

Some industrialized nations also eavesdrop continuously on the entire radio spectrum, interpreting it in real time. This includes not only broadcasts of national and local radio and television, but also local military traffic, radar emissions and even microwaved telephone and telegraph traffic, including satellite traffic.

The U.S. in particular is known to maintain satellites that can intercept cell-phone and pager traffic, usually referred to as the ECHELON system. Analysis of bulk traffic is normally performed by complex computer programs that parse natural language and phone numbers looking for threatening conversations and correspondents. In some extraordinary cases, undersea or land-based cables have been tapped as well.

More exotic secret information, such as encryption keys, diplomatic message traffic, policy and orders of battle are usually restricted to analysts on a need-to-know basis in order to protect the sources and methods from foreign traffic analysis.

Analysis edit

Analysis consists of assessment of an adversary's capabilities and vulnerabilities. In a real sense, these are threats and opportunities. Analysts generally look for the least defended or most fragile resource that is necessary for important military capabilities. These are then flagged as critical vulnerabilities. For example, in modern mechanized warfare, the logistics chain for a military unit's fuel supply is often the most vulnerable part of a nation's order of battle.

Human intelligence, gathered by spies, is usually carefully tested against unrelated sources. It is notoriously prone to inaccuracy. In some cases, sources will just make up imaginative stories for pay, or they may try to settle grudges by identifying personal enemies as enemies of the state that is paying for the intelligence. However, human intelligence is often the only form of intelligence that provides information about an opponent's intentions and rationales, and it is therefore often uniquely valuable to successful negotiation of diplomatic solutions.

In some intelligence organizations, analysis follows a procedure. First, general media and sources are screened to locate items or groups of interest, and then their location, capabilities, inputs and environment are systematically assessed for vulnerabilities using a continuously-updated list of typical vulnerabilities.

Filing edit

Critical vulnerabilities are then indexed in a way that makes them easily available to advisors and line intelligence personnel who package this information for policy-makers and war-fighters. Vulnerabilities are usually indexed by the nation and military unit with a list of possible attack methods.

Critical threats are usually maintained in a prioritized file, with important enemy capabilities analyzed on a schedule set by an estimate of the enemy's preparation time. For example, nuclear threats between the USSR and the U.S. were analyzed in real time by continuously on-duty staffs. In contrast, analysis of tank or army deployments are usually triggered by accumulations of fuel and munitions, which are monitored every few days. In some cases, automated analysis is performed in real time on automated data traffic.

Packaging threats and vulnerabilities for decision-makers is a crucial part of military intelligence. A good intelligence officer will stay very close to the policy-maker or war fighter to anticipate their information requirements and tailor the information needed. A good intelligence officer will also ask a fairly large number of questions in order to help anticipate needs. For an important policy-maker, the intelligence officer will have a staff to which research projects can be assigned.

Developing a plan of attack is not the responsibility of intelligence, though it helps an analyst to know the capabilities of common types of military units. Generally, policy-makers are presented with a list of threats and opportunities. They approve some basic action, and then professional military personnel plan the detailed act and carry it out. Once hostilities begin, target selection often moves into the upper end of the military chain of command. Once ready stocks of weapons and fuel are depleted, logistic concerns are often exported to civilian policy-makers.

Dissemination edit

The processed intelligence information is disseminated through database systems, intel bulletins and briefings to the different decision-makers. The bulletins may also include consequently resulting information requirements and thus conclude the intelligence cycle.

Military intelligence organisations edit

See also edit

Intelligence gathering disciplines

References edit

  1. ^ Pedersen, Torben (2005). "HTTPS, Secure HTTPS". Encyclopedia of Cryptography and Security. pp. 268–269. doi:10.1007/0-387-23483-7_189. ISBN 978-0-387-23473-1.
  2. ^ (PDF). US National Intelligence University. Archived from the original (PDF) on 23 January 2012. Retrieved 28 March 2012.
  3. ^ Alfred Rolington. Strategic Intelligence for the 21st Century: The Mosaic Method. Oxford University Press, 2013.
  4. ^ a b (PDF). US Joints Chief of Staff. pp. 162–163. Archived from the original (PDF) on 18 February 2020. Retrieved 10 August 2019.
  5. ^ United States Military Intelligence Handbook. Vol. I: Strategic Information, Procedures and Developments (6th ed.). Washington, DC: International Business Publications, USA. 2011. p. 9. ISBN 9781433056833.

Further reading edit

  • N. J. E. Austin and N. B. Rankov, Exploratio: Military and Political Intelligence in the Roman World From the Second Punic War to the Battle of Adrianople. London: Routledge, 1995.
  • Julius Caesar, The Civil War. Translated by Jane F. Mitchell. Baltimore, MD: Penguin Books, 1967.
  • Cassius Dio, Dio's Roman History. Translated by Earnest Cary. New York: G.P. Putnam's Sons, 1916.
  • Francis Dvornik, Origins of Intelligence Services. New Brunswick, NJ: Rutgers University Press, 1974.
  • Terrance Finnegan, "The Origins of Modern Intelligence, Surveillance, and Reconnaissance: Military Intelligence at the Front, 1914–18", Studies in Intelligence 53#4 (2009) pp. 25–40.
  • J. F. C. Fuller, A Military History of the Western World, Vol. 1: From the Earliest Times to the Battle of Lepanto. New York: Da Capo Press, 1987.
  • Richard A. Gabriel and Karen S. Metz, From Sumer to Rome; The Military Capabilities of Ancient Armies. New York: Greenwood Press, 1991.
  • John Keegan, Intelligence in War. New York: Knopf, 2003.
  • Charles H. Harris & Louis R. Sadler. The Border and the Revolution: Clandestine Activities of the Mexican Revolution 1910–1920. HighLonesome Books, 1988.
  • Ishmael Jones, The Human Factor: Inside the CIA's Dysfunctional Intelligence Culture, New York: Encounter Books, 2010 (ISBN 978-1594032233).
  • Henry Landau, The Enemy Within: The Inside Story of German Sabotage in America. G. P. Putnam Sons, 1937.
  • Sidney F. Mashbir. I Was An American Spy. Vantage, 1953.
  • Nathan Miller. Spying for America: The Hidden History of U.S. Intelligence. Dell Publishing, 1989.
  • Ian Sayer & Douglas Botting. America's Secret Army, The Untold Story of the Counter Intelligence Corps. Franklin Watts Publishers, 1989.
  • Barbara W. Tuchman, The Zimmermann Telegram. Ballantine Books, 1958.
  • "Coast Guard Intelligence Looking For a Few Good Men and Women." Commandant's Bulletin (Jun 10 1983), p. 34.
  • "Coast Guard Investigative Service." Coast Guard (Dec 1996), pp. 24–25.
  • The Coast Guard at War: Volume XII: Intelligence. Washington, DC: Historical Section, Public Information Division, U.S. Coast Guard Headquarters, January 1, 1949.
  • Hinsley, Francis H. "British Intelligence in the Second World War: Its Influence on Strategy and Operations". Cambridge University Press, 1990.
  • Ruiz, Victor H. (2010). "A Knowledge Taxonomy for Army Intelligence Training: An Assessment of the Military Intelligence Basic Officer Leaders Course Using Lundvall's Knowledge Taxonomy". Applied Research Projects, Texas State University, Paper 331.
  • Alfred Rolington. Strategic Intelligence for the 21st Century: The Mosaic Method. Oxford University Press, 2013.
  • Creating Intelligence, Neil Garra.

External links edit

  • Office of the Director of National Intelligence
  • Reference
  • S2 Creating Intelligence

military, intelligence, defense, intelligence, redirects, here, other, uses, defense, intelligence, disambiguation, military, intelligence, disambiguation, this, article, multiple, issues, please, help, improve, discuss, these, issues, talk, page, learn, when,. Defense intelligence redirects here For other uses see Defense intelligence disambiguation and Military Intelligence disambiguation This article has multiple issues Please help improve it or discuss these issues on the talk page Learn how and when to remove these template messages This article needs additional citations for verification Please help improve this article by adding citations to reliable sources Unsourced material may be challenged and removed Find sources Military intelligence news newspapers books scholar JSTOR December 2015 Learn how and when to remove this template message This article includes a list of general references but it lacks sufficient corresponding inline citations Please help to improve this article by introducing more precise citations April 2009 Learn how and when to remove this template message Learn how and when to remove this template message Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions 1 This aim is achieved by providing an assessment of data from a range of sources directed towards the commanders mission requirements or responding to questions as part of operational or campaign planning To provide an analysis the commander s information requirements are first identified which are then incorporated into intelligence collection analysis and dissemination A platoon commander of the 1st Marine Logistics Group with the battalion interpreter gather intelligence from local Afghans during a combat logistics patrol to the area May 9 2010 Areas of study may include the operational environment hostile friendly and neutral forces the civilian population in an area of combat operations and other broader areas of interest 2 Intelligence activities are conducted at all levels from tactical to strategic in peacetime the period of transition to war and during a war itself Most governments maintain a military intelligence capability to provide analytical and information collection personnel in both specialist units and from other arms and services The military and civilian intelligence capabilities collaborate to inform the spectrum of political and military activities Personnel performing intelligence duties may be selected for their analytical abilities and personal intelligence before receiving formal training Contents 1 Levels 1 1 Strategic 1 2 Operational 1 3 Tactical 2 Tasking 3 Process 3 1 Collection 3 2 Analysis 3 3 Filing 3 4 Dissemination 4 Military intelligence organisations 5 See also 6 References 7 Further reading 8 External linksLevels edit nbsp Military intelligence diagram of defense positions during the Battle of Okinawa 1945Intelligence operations are carried out throughout the hierarchy of political and military activity Strategic edit Strategic intelligence is concerned with broad issues such as economics political assessments military capabilities and intentions of foreign nations and increasingly non state actors 3 Such intelligence may be scientific technical tactical diplomatic or sociological but these changes are analyzed in combination with known facts about the area in question such as geography demographics and industrial capacities Strategic Intelligence is formally defined as intelligence required for the formation of policy and military plans at national and international levels and corresponds to the Strategic Level of Warfare which is formally defined as the level of warfare at which a nation often as a member of a group of nations determines national or multinational alliance or coalition strategic security objectives and guidance then develops and uses national resources to achieve those objectives Operational edit Operational intelligence is focused on support or denial of intelligence at operational tiers The operational tier is below the strategic level of leadership and refers to the design of practical manifestation Formally defined as Intelligence that is required for planning and conducting campaigns and major operations to accomplish strategic objectives within theaters or operational areas 4 It aligns with the Operational Level of Warfare defined as The level of warfare at which campaigns and major operations are planned conducted and sustained to achieve strategic objectives within theaters or other operational areas 4 The term operation intelligence is used within law enforcement to refer to intelligence that supports long term investigations into multiple similar targets Operational intelligence in the discipline of law enforcement intelligence is concerned primarily with identifying targeting detecting and intervening in criminal activity The use within law enforcement and law enforcement intelligence is not scaled to its use in general intelligence or military naval intelligence being more narrowed in scope Tactical edit Tactical intelligence is focused on support to operations at the tactical level and would be attached to the battlegroup At the tactical level briefings are delivered to patrols on current threats and collection priorities These patrols are then debriefed to elicit information for analysis and communication through the reporting chain 5 Tactical Intelligence is formally defined as intelligence required for the planning and conduct of tactical operations and corresponds with the Tactical Level of Warfare itself defined as the level of warfare at which battles and engagements are planned and executed to achieve military objectives assigned to tactical units or task forces citation needed Tasking editIntelligence should respond to the needs of leadership based on the military objective and operational plans The military objective provides a focus for the estimate process from which a number of information requirements are derived Information requirements may be related to terrain and impact on vehicle or personnel movement disposition of hostile forces sentiments of the local population and capabilities of the hostile order of battle In response to the information requirements analysts examine existing information identifying gaps in the available knowledge Where gaps in knowledge exist the staff may be able to task collection assets to target the requirement Analysis reports draw on all available sources of information whether drawn from existing material or collected in response to the requirement The analysis reports are used to inform the remaining planning staff influencing planning and seeking to predict adversary intent This process is described as Collection Co ordination and Intelligence Requirement Management CCIRM Process editThe process of intelligence has four phases collection analysis processing and dissemination In the United Kingdom these are known as direction collection processing and dissemination In the U S military Joint Publication 2 0 JP 2 0 states The six categories of intelligence operations are planning and direction collection processing and exploitation analysis and production dissemination and integration and evaluation and feedback Collection edit Many of the most important facts are well known or may be gathered from public sources This form of information collection is known as open source intelligence For example the population ethnic make up and main industries of a region are extremely important to military commanders and this information is usually public It is however imperative that the collector of information understands that what is collected is information and does not become intelligence until after an analyst has evaluated and verified this information Collection of read materials composition of units or elements disposition of strength training tactics personalities leaders of these units and elements contribute to the overall intelligence value after careful analysis The tonnage and basic weaponry of most capital ships and aircraft are also public and their speeds and ranges can often be reasonably estimated by experts often just from photographs Ordinary facts like the lunar phase on particular days or the ballistic range of common military weapons are also very valuable to planning and are habitually collected in an intelligence library A great deal of useful intelligence can be gathered from photointerpretation of detailed high altitude pictures of a country Photointerpreters generally maintain catalogs of munitions factories military bases and crate designs in order to interpret munition shipments and inventories Most intelligence services maintain or support groups whose only purpose is to keep maps Since maps also have valuable civilian uses these agencies are often publicly associated or identified as other parts of the government Some historic counterintelligence services especially in Russia and China have intentionally banned or placed disinformation in public maps good intelligence can identify this disinformation It is commonplace for the intelligence services of large countries to read every published journal of the nations in which it is interested and the main newspapers and journals of every nation This is a basic source of intelligence It is also common for diplomatic and journalistic personnel to have a secondary goal of collecting military intelligence For western democracies it is extremely rare for journalists to be paid by an official intelligence service but they may still patriotically pass on tidbits of information they gather as they carry on their legitimate business Also much public information in a nation may be unavailable from outside the country This is why most intelligence services attach members to foreign service offices Some industrialized nations also eavesdrop continuously on the entire radio spectrum interpreting it in real time This includes not only broadcasts of national and local radio and television but also local military traffic radar emissions and even microwaved telephone and telegraph traffic including satellite traffic The U S in particular is known to maintain satellites that can intercept cell phone and pager traffic usually referred to as the ECHELON system Analysis of bulk traffic is normally performed by complex computer programs that parse natural language and phone numbers looking for threatening conversations and correspondents In some extraordinary cases undersea or land based cables have been tapped as well More exotic secret information such as encryption keys diplomatic message traffic policy and orders of battle are usually restricted to analysts on a need to know basis in order to protect the sources and methods from foreign traffic analysis Analysis edit Analysis consists of assessment of an adversary s capabilities and vulnerabilities In a real sense these are threats and opportunities Analysts generally look for the least defended or most fragile resource that is necessary for important military capabilities These are then flagged as critical vulnerabilities For example in modern mechanized warfare the logistics chain for a military unit s fuel supply is often the most vulnerable part of a nation s order of battle Human intelligence gathered by spies is usually carefully tested against unrelated sources It is notoriously prone to inaccuracy In some cases sources will just make up imaginative stories for pay or they may try to settle grudges by identifying personal enemies as enemies of the state that is paying for the intelligence However human intelligence is often the only form of intelligence that provides information about an opponent s intentions and rationales and it is therefore often uniquely valuable to successful negotiation of diplomatic solutions In some intelligence organizations analysis follows a procedure First general media and sources are screened to locate items or groups of interest and then their location capabilities inputs and environment are systematically assessed for vulnerabilities using a continuously updated list of typical vulnerabilities Filing edit Critical vulnerabilities are then indexed in a way that makes them easily available to advisors and line intelligence personnel who package this information for policy makers and war fighters Vulnerabilities are usually indexed by the nation and military unit with a list of possible attack methods Critical threats are usually maintained in a prioritized file with important enemy capabilities analyzed on a schedule set by an estimate of the enemy s preparation time For example nuclear threats between the USSR and the U S were analyzed in real time by continuously on duty staffs In contrast analysis of tank or army deployments are usually triggered by accumulations of fuel and munitions which are monitored every few days In some cases automated analysis is performed in real time on automated data traffic Packaging threats and vulnerabilities for decision makers is a crucial part of military intelligence A good intelligence officer will stay very close to the policy maker or war fighter to anticipate their information requirements and tailor the information needed A good intelligence officer will also ask a fairly large number of questions in order to help anticipate needs For an important policy maker the intelligence officer will have a staff to which research projects can be assigned Developing a plan of attack is not the responsibility of intelligence though it helps an analyst to know the capabilities of common types of military units Generally policy makers are presented with a list of threats and opportunities They approve some basic action and then professional military personnel plan the detailed act and carry it out Once hostilities begin target selection often moves into the upper end of the military chain of command Once ready stocks of weapons and fuel are depleted logistic concerns are often exported to civilian policy makers Dissemination edit The processed intelligence information is disseminated through database systems intel bulletins and briefings to the different decision makers The bulletins may also include consequently resulting information requirements and thus conclude the intelligence cycle Military intelligence organisations editSee also List of intelligence agencies Defence Intelligence Organisation Australia Canadian Forces Intelligence Command Canada Intelligence Branch Canadian Forces Military Intelligence Czech Republic Direction du Renseignement Militaire France Bundesnachrichtendienst BND German Federal Intelligence Service and Militarischer Abschirmdienst MAD German Military Counter Intelligence Directorate General of Forces Intelligence Bangladesh Military Intelligence and Reconnaissance Egypt Egypt Strategic Intelligence Agency Indonesia Defence Intelligence Agency India Directorate of Military Intelligence Directorate of Naval Intelligence Directorate of Air Intelligence Directorate of Military Intelligence Ireland Aman Israel Centro Intelligence Interforze Italy Inter Services Intelligence and Military Intelligence of Pakistan Centro de Informacoes e Seguranca Militares CISMIL Portugal Glavnoye Razvedyvatel noye Upravleniye GRU Russian Military Intelligence Military Intelligence Agency VOA Serbia Defence Intelligence and the Intelligence Corps UK United States Intelligence Community Defense Intelligence Agency G 2 US Army unit Military Intelligence Corps Defence Intelligence SANDF South Africa See also editAdmiralty code Aesopian language Battlespace Classified information Company Level Intelligence Cell Counterintelligence Cultural intelligence Cryptography Disinformation Deuxieme Bureau Edmund Charaszkiewicz Electronic warfare Espionage Fog of war Intelligence information gathering Intelligence gathering network Intelligence Surveillance Target Acquisition and Reconnaissance Intelligence outsourcing Interrogation Medical intelligence Meteorological intelligence Military secrets Reconnaissance Scenario planning Spy satellite Strategic intelligence Tactical Ground Intercept Facility Technical intelligence Intelligence gathering disciplinesList of intelligence gathering disciplinesReferences edit Pedersen Torben 2005 HTTPS Secure HTTPS Encyclopedia of Cryptography and Security pp 268 269 doi 10 1007 0 387 23483 7 189 ISBN 978 0 387 23473 1 University Catalog 2011 2012 Master Courses pp 99 size 17MB PDF US National Intelligence University Archived from the original PDF on 23 January 2012 Retrieved 28 March 2012 Alfred Rolington Strategic Intelligence for the 21st Century The Mosaic Method Oxford University Press 2013 a b DOD Dictionary of Military and Associated Terms PDF US Joints Chief of Staff pp 162 163 Archived from the original PDF on 18 February 2020 Retrieved 10 August 2019 United States Military Intelligence Handbook Vol I Strategic Information Procedures and Developments 6th ed Washington DC International Business Publications USA 2011 p 9 ISBN 9781433056833 Further reading editN J E Austin and N B Rankov Exploratio Military and Political Intelligence in the Roman World From the Second Punic War to the Battle of Adrianople London Routledge 1995 Julius Caesar The Civil War Translated by Jane F Mitchell Baltimore MD Penguin Books 1967 Cassius Dio Dio s Roman History Translated by Earnest Cary New York G P Putnam s Sons 1916 Francis Dvornik Origins of Intelligence Services New Brunswick NJ Rutgers University Press 1974 Terrance Finnegan The Origins of Modern Intelligence Surveillance and Reconnaissance Military Intelligence at the Front 1914 18 Studies in Intelligence 53 4 2009 pp 25 40 J F C Fuller A Military History of the Western World Vol 1 From the Earliest Times to the Battle of Lepanto New York Da Capo Press 1987 Richard A Gabriel and Karen S Metz From Sumer to Rome The Military Capabilities of Ancient Armies New York Greenwood Press 1991 John Keegan Intelligence in War New York Knopf 2003 Charles H Harris amp Louis R Sadler The Border and the Revolution Clandestine Activities of the Mexican Revolution 1910 1920 HighLonesome Books 1988 Ishmael Jones The Human Factor Inside the CIA s Dysfunctional Intelligence Culture New York Encounter Books 2010 ISBN 978 1594032233 Henry Landau The Enemy Within The Inside Story of German Sabotage in America G P Putnam Sons 1937 Sidney F Mashbir I Was An American Spy Vantage 1953 Nathan Miller Spying for America The Hidden History of U S Intelligence Dell Publishing 1989 Ian Sayer amp Douglas Botting America s Secret Army The Untold Story of the Counter Intelligence Corps Franklin Watts Publishers 1989 Barbara W Tuchman The Zimmermann Telegram Ballantine Books 1958 Coast Guard Intelligence Looking For a Few Good Men and Women Commandant s Bulletin Jun 10 1983 p 34 Coast Guard Investigative Service Coast Guard Dec 1996 pp 24 25 The Coast Guard at War Volume XII Intelligence Washington DC Historical Section Public Information Division U S Coast Guard Headquarters January 1 1949 Hinsley Francis H British Intelligence in the Second World War Its Influence on Strategy and Operations Cambridge University Press 1990 Ruiz Victor H 2010 A Knowledge Taxonomy for Army Intelligence Training An Assessment of the Military Intelligence Basic Officer Leaders Course Using Lundvall s Knowledge Taxonomy Applied Research Projects Texas State University Paper 331 Alfred Rolington Strategic Intelligence for the 21st Century The Mosaic Method Oxford University Press 2013 Creating Intelligence Neil Garra External links edit nbsp Wikimedia Commons has media related to Military intelligence Office of the Director of National Intelligence Intelligence Resource Program of the Federation of American Scientists Reference Joint Publication 2 0 S2 Creating Intelligence Retrieved from https en wikipedia org w index php title Military intelligence amp oldid 1217155721, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.