National security threats are on the rise. National security professionals rely on accurate intelligence to defend the United States against these threats and to protect critical assets.
Federal agencies such as the Department of Defense, National Security Agency, Federal Bureau of Investigation, and U.S. Army Cyber Command use intelligence to set policies and improve security.
In these agencies, intelligence analysts collect raw data, process it into actionable intelligence and present their findings in intelligence reports. Analysts also develop strategies to address security risks and protect high-risk targets. Sophisticated collection and analytical techniques allow intelligence analysts to track criminal organizations, terrorist groups and foreign spies.
Federal agencies need professionals with skills in intelligence analysis. Earning a degree in intelligence and security studies can prepare individuals for a career as an intelligence analyst.
Intelligence analysis is the process of turning raw information into actionable intelligence. In the security field, intelligence analysts collect and analyze data to create intelligence briefs. These reports help identify national security threats and inform decision-making.
Analyzing information to draw intelligence conclusions is a critical component of protecting national security. Intelligence analysts collect information from diverse sources to fight against terrorism, organized crime and cyberthreats.
Analysts draw on many sources to ground their findings, often combining multiple sources to verify their conclusions. The sources used in intelligence analysis include:
Effective intelligence analysis requires credible sources. Without credible sources, analysts cannot reach reliable conclusions about risk mitigation, threat assessment and security targets.
Intelligence analysts leverage many tools and techniques to gather intelligence. Ultimately, the goals of intelligence analysis include:
In addition to collecting and processing information, the intelligence community recommends strategies to protect national security and counter threats.
Counterintelligence analysis is employed to prevent adversaries from gaining information about the United States. As the number of actors targeting the country continues to grow, counterintelligence analysis is becoming more critical to national security. Analysts who specialize in counterintelligence identify foreign intelligence activities to protect national interests.
In its national counterintelligence strategy report, the National Counterintelligence and Security Center identifies foreign nations with advanced intelligence capabilities, nonstate actors including terrorist organizations and global criminal organizations as entities that may pose a threat to national security.
The number of organizations and assets that are being targeted is also continuing to grow, with adversaries not only targeting government agencies but also private financial institutions, critical infrastructure and academic laboratories. According to the FBI, the country’s critical assets include information and technology in the defense, science, technology, finance and intelligence sectors.
In the evolving field of counterintelligence, analysts must neutralize innovative espionage methods and technologies. For example, specialists in digital counterintelligence monitor trends in cyberattacks to prevent data breaches or penetrations. Counterintelligence analysts also monitor economic espionage, threats to critical infrastructure and attacks targeting sensitive information.
As technologies continue to advance, counterintelligence specialists must modify their tactics. Tools such as unmanned systems, surveillance equipment and biometric devices pose new threats to U.S. interests.
Counterintelligence analysts take both offensive and defensive steps to counter the challenges facing the United States. The goals of counterintelligence analysis include:
Open-source intelligence plays an increasingly important role in security. Also known as OSINT, open source intelligence refers to publicly available data that can be used to proactively identify threats.
In World War II, intelligence analysts tuned into foreign radio broadcasts and read foreign newspapers to collect open-source intelligence. Today, analysts have a wealth of public information available to them. Common OSINT sources include:
However, while OSINT analysts identify vulnerabilities, adversaries use the same tools to identify targets. For example, hackers can collect data on targets through openly available sources for phishing scams or to find weaknesses in computer networks.
Collecting intelligence from open sources poses several challenges to intelligence analysts. First, analysts need a clear idea of what information they’re seeking to identify the best sources to find that information. Then, analysts need to process a large amount of raw data to eliminate unhelpful information. Only after filtering the data can analysts use it to build a reliable intelligence report.
Publicly available information is also used to help confirm intelligence findings from other sources. For example, if human intelligence places a target in a specific location, metadata from that person’s social media accounts could confirm this information. OSINT data must be understood in context to create meaningful intelligence.
The rise of social media has changed the intelligence landscape. Today, billions of people use social media. But how does social media analysis relate to intelligence? A subfield of open-source intelligence, social medial intelligence, or SOCMINT, refers to information that is gathered from social media networks.
For example, government intelligence analysts extract data from social networking sources to track terrorists or organized crime organizations. Analysts can also identify human trafficking networks using social media.
Analysts who specialize in social media identify target’s profiles, collect information found on social media accounts and analyze metadata to provide context for intelligence findings. Social media analysis can also include evaluating interactions between users to understand a target’s network.
Social media analysis poses unique challenges. Unlike other open-source data, some social media data appears only in private groups or chats. But the greatest challenge in SOCMINT analysis is filtering through the vast amounts of data found on social media platforms to find useful information. Though, with the right techniques, analysts can track threats without allowing the volume of information to overwhelm them.
Social media analysis also can run into data privacy issues. Analysts must follow applicable laws and regulations while also achieving their intelligence goals.
How does intelligence analysis work in practice? The intelligence cycle describes how intelligence agencies set priorities, collect data and create intelligence reports. If any step in the process falters, it can put national security at risk.
In the planning step, policymakers work together with intelligence agencies to determine the most critical issues and to prioritize intelligence targets.
In areas such as counterterrorism, intelligence efforts are ongoing, though policymakers may identify new priorities due to current events or international affairs.
Before analyzing data, intelligence operatives must collect usable information. The collection step often casts a broad net, identifying multiple relevant sources to confirm information identified through other sources.
Intelligence collection sources can include geospatial imagery, intelligence from human sources, photographic or digital evidence and publicly available information.
Processing raw data allows analysts to evaluate information and produce intelligence. In this step, analysts may process images, apply algorithms to filter out irrelevant data or decode encrypted messages.
In the analysis step, intelligence analysts evaluate the processed information to make assessments. They then produce reports that present the sources and intelligence. These reports also indicate any reservations the analyst has about the data or conclusions.
Analysts must also evaluate the collection and processing stages to eliminate unreliable information.
In the dissemination step, intelligence agencies share their findings with decision-makers, including senior government leaders, military commanders and policymakers. These intelligence briefings provide actionable information and recommendations.
Once intelligence reaches decision-makers outside of the intelligence community, analysts may need to respond to questions, provide context or conduct further investigations.
Intelligence analysts constantly evaluate their sources, methods and conclusions to identify gaps, biases or errors. They also evaluate intelligence reports for errors in judgment. As a result, this final step occurs throughout the intelligence cycle.
Intelligence analysts may specialize in any of a number of areas, including analyzing foreign military capabilities, national security intelligence or technical intelligence. In each of these specialty areas, intelligence analysts require many of the same skills, including strong teamwork and analytical skills.
Analyzing raw data to distill intelligence requires strong critical thinking and judgment skills. Analysts apply diverse analytical techniques, including data interpretation methods, to reach conclusions.
When interpreting information, intelligence analysts must avoid cognitive biases and watch for assumptions that could influence their judgment.
Whether they are analyzing satellite images or evaluating network vulnerabilities, intelligence analysts need strong technical skills. Those working with geospatial or imagery intelligence need to know how to interpret raw images to reach intelligence conclusions. Similarly, specialists in digital intelligence need high-level technical skills.
A background in data science helps intelligence analysts determine the quality of their data and methodologies.
Sifting through raw information to identify valuable intelligence requires a detail-oriented outlook. In addition, intelligence analysts benefit from strong organizational skills.
The FBI hiring process for intelligence analysts incorporates several tests to identify candidates’ problem-solving, analytical and information assessment skills.
Intelligence analysts collaborate with fellow analysts, policymakers, intelligence sources and others to do their jobs. They need to have excellent teamwork and collaboration skills, as well as strong communication abilities.
For example, intelligence analysts draw on their writing skills to create threat reports and recommend security measures. When hiring intelligence analysts, the FBI incorporates a writing assessment early in the hiring process to screen for strong communication skills.
Intelligence analysts require specialized training to enter the field. Positions in federal intelligence agencies typically require a bachelor’s degree or higher. For example, FBI intelligence analysts qualify for the GS-7 level with a bachelor’s degree or the GS-9 level with a graduate degree.
Training in the following areas benefits intelligence analysts:
Degree programs that prepare intelligence analysts should also focus on key soft skills such as collaboration, problem-solving and critical thinking.
The critical field of intelligence analysis needs qualified analysts. While a bachelor’s degree can help you launch a career in intelligence analysis, a master’s degree opens more doors. The Master of Arts in Intelligence and Security Studies program at Augusta University Online helps students build the advanced knowledge and skills needed for a career in this in-demand field.
Students in the intelligence and security studies program explore security threats from terrorism to cyberwar. They examine the causes of global conflict, counterterrorism strategies and intelligence analysis. With concentrations in technical intelligence analysis, social influence, and general intelligence and security studies, students can customize the program based on their interests and career goals.
Contact AU Online today to learn how a master’s in intelligence and security studies can help you advance in intelligence analysis.
Sources:
FBI, “Candidate Information: Intelligence Analyst Selection Process”
FBI, Counterintelligence
FBI Jobs, Intelligence Analysts
IBM, “What Is Open-Source Intelligence (OSINT)?”
Indeed, “What Does an Intelligence Analyst Do? (With Salary)”
National Counterintelligence and Security Center, National Counterintelligence Strategy
Office of the Director of National Intelligence, How the IC Works
Office of the Director of National Intelligence, Intelligence Analysis
Office of the Director of National Intelligence, “What Is Intelligence?”
OSINT Telegraph, “Social Media Intelligence (SOCMINT): Unveiling the Power of Open Source Intelligence”
Scientia Militaria, “Social Media Intelligence: The National Security-Privacy Nexus”
U.S. Department of State, “Open Source Intelligence Strategy”