Intelligence cycle (target-centric approach)

Intelligence cycle (target-centric approach)

The target-centric approach to intelligence describes a method of intelligence analysis that Robert M. Clark introduced in his book "Intelligence Analysis: A Target-Centric Approach" in 2003 citation
title = Intelligence Analysis: A Target-Centric Approach
first = Robert M. | last = Clark
publisher = CQ Press
ISBN-10 =156802830X
year = 2003
] to offer an alternative methodology to the traditional intelligence cycle. Its goal is to redefine the intelligence process in such a way that all of the parts of the intelligence cycle come together as a network. It is a collaborative process where collectors, analysts and customers are integral, and information does not always flow linearly.citation
url =
title = Using Open Source Effectively: Hearings before the Subcommittee on Intelligence, Information and Terrorism Risk Assessment, Committee on Homeland Security, United States House of Representatives
date = 21 June 2005
contribution = Testimony of Eliot A. Jardines
first = Eliot A. | last = Jardines
pages = 11-18

Target-centric analysis

Intelligence process

The most common view of the intelligence process is the model known as the intelligence cycle. In the original concept of this model, the steps are isolated stages where each part has a designated purpose or task. When the contributors and collectors complete data collection, the cycle continues. While this procedure completes each part of the cycle, it may constrain the flow ofinformation. [Clark 2006, p.11.] The intelligence community often discusses the problems with this pure model and offers multiple approaches to solving them.

In the pure model, there is limited opportunity for contributors or consumers to ask questions or provide feedback.citation
title= Semantic Web and Target-Centric Intelligence: Building Flexible Systems that Foster Collaboration
last1= Maynes | first1=Aaron
last2 =Golbeck| first2 = Jennifer
last3 = Hendler| first3=James
] To fully understand what they analyze, analysts should have the opportunity to ask questions about the sources where collectors gathered information. Likewise, when the decision-maker receives an intelligence estimate, he or she should have the opportunity to ask questions concerning not only how the analyst reached a particular conclusion, but also questions concerning the reliability of sources.

Sherman Kent the "father of intelligence analysis," left a legacy in not only his work, but in the faculty members at the Sherman Kent Center. The faculty teaches intelligence principles to future intelligence analysts. According to Jack Davis, of the Sherman Kent Center, Kent encouraged arguments and dissent among analysts, as well as taking into account a "wide range of outside opinions."citation
title = A Policymaker's Perspective On Intelligence Analysis
url =
author = Davis, Jack
journal = Studies in Intelligence
year = 1995
Volume = 38
issue = 5
accessdate = 2007-10-28
] Kent also encouraged "collective responsibility for judgment," which supports a network approach to intelligence. In such a network, analysts are directly accountable for the work, and a decision maker or consumer's questions help the intelligence process by leading by pushing the analyst to challenge and refine his or her own work.

It is important to note that agencies constantly modify the traditional, pure model in intelligence practice. For example, various "centers" under the Director of National Intelligence deliberately put collectors and analysts into teams.

The traditional intelligence cycle separates collectors, processors, and analysts and too often results in "throwing information over the wall" to become the next person’s responsibility. Everyone neatly avoids responsibility for the quality of the final product. Because this "compartmentalized process results in formalized and relatively inflexible requirements at each stage, it is more predictable and therefore more vulnerable to an opponent’s countermeasures.”

Kurt April and Julian Bessa examined weaknesses of the competitive intelligence community in their article "A Critique of the Strategic Competitive Intelligence Process within a Global Energy Multinational." They examined two competitive intelligence processes: "Competitive Strategic Business Intelligence" (CIAD) and "Competitive Technical Intelligence" (CTI). According to April and Bessa, CIAD is a linear process where the intelligence product moves upward through the layers of the organization. In contrast, CTI is a more networked model. They found that the organizational structure associated with CIAD prevents open-sharing of information and ideas, and is a stumbling block to intelligence analysis.”cite web |url=$File/ACritiqueOfTheStrategicCompetitiveIntelligenceProcessWithinAGlobalEnergyMultinational.pdf|title= A Critique of the Strategic Competitive Intelligence Process Within a Global Energy Multinational|accessdate=2008-04-28|last1= April | first1=Kurt
last2 =Bessa| first2 = Julian

Testifying to the House Committee on Homeland Security Mr. Eliot A. Jardines, President of Open Source Publishing, Incorporated, presented a statement and supported the target-centric approach to intelligence. According to Mr. Jardines, Dr. Robert Clark "proposes a more target-centric, iterative and collaborative approach which would be far more effective than our current traditional intelligence cycle." [Jardines 2005, p. 12.] With a target-centric approach to intelligence analysis, intelligence is collaborative, because this model creates a system where it can include all contributors, participants, and consumers. Each individual can question the model and get answers along the way. The target-centric model is a "network process" where the information flows unconstrained among all participants, who also focus on the objective to create a shared picture of the target. [Clark 2006, p.13.] For other models and their limitations, see Analysis of competing hypothesesand cognitive traps for intelligence analysis.

Creating the model

Models in intelligence

Conceptual models are useful for the analytic process, and are particularly helpful to help understand the target-centric approach to intelligence. A conceptual model is an abstract invention of the mind that best incorporates and takes advantage of an analyst's thought process. The model allows the analyst to use a powerful descriptive tool to both estimate current situations and predict future circumstances. [Clark 2006, p.37.]

ources of intelligence information

Once the analyst constructs the skeleton structure of the model, the next step is to add substance. This is where the analyst must research, gather information, and synthesize to populate the model. For an analyst to successfully populate a model for a complex target, he or she must find information from a wide range of both classified and unclassified sources. This includes retrieving information from the body of existing intelligence. [Clark 2006, p.83.] Depending on the target, an analyst may seek out information from open source intelligence (information available to the general public), human intelligence (HUMINT), measures and signatures intelligence (MASINT), signals intelligence (SIGINT), or imagery intelligence (IMINT). Even though open source information is inexpensive or free, and easily accessible, it can be just as useful as the more specialized, technical intelligence sources that are expensive to use. [Clark 2006, p.111.]

Populating the model

Populating the model forces the analyst to collate the collected data, organize the data, and evaluate evidence for relevance and credibility. Finally, after the analyst examines each piece of data, the analyst must incorporate the information into the target model. As the body of information builds in the model, the analyst can more easily determine where there are inconsistencies in conclusions. This requires the analyst to carry out further research to support or deny a particular conclusion. Also, as the analyst populates the model, the target model shows where gaps exist in the model. These gaps also force the analyst to collect additional information to more completely describe the target.

Organizational analysis

Clark defined an organization as a system that "can be viewed and analyzed from three perspectives: structure, function, and process." [Clark 2006, p.227.] "Structure" describes the parts of the whole organization, emphasizing people who are part of the organization, and their relationships with one another as part of that whole. "Function" describes the product of the organization and emphasizes decision-making. Finally, "Process" describes the activities and knowledge that formulate the final product. An analyst must consider each of these components while examining a particular target organization. Most importantly, when an analyst successfully describes the target organization with a full understanding of its structure, function, and process, the model demonstrates the target's strengths and weaknesses to the analyst. Weaknesses or changes in the target organization aid the analyst in constructing a predictive, reliable analysis. [Clark 2006, p.227.]

Applications of the target-centric approach to intelligence

The target-centric approach to intelligence does not aim to deny other intelligence processes. Instead, it offers an alternative method to the established intelligence process. The intelligence cycle, like many other systems, continually needs improvement. In the wake of the 2001 terrorist attacks, the 9/11 commission declared that the US intelligence community needed improvements in gathering and sharing information. According to the National Commission on Terrorist Attacks upon the United States, the US intelligence agencies experienced inadequate coordination and cooperation.citation |url=|title= 9/11 Commission Faults US Intelligence
] This is one example of failure in the intelligence cycle, where a breakdown in the accepted process led to devastating results.


According to Heuer, analysts can always strive to improve estimates, and no method guarantees accurate conclusions every time. Analysts should expect intelligence failures, and refine the methodology to learn from what worked and what did not work.citation
last = Heuer | first = Richards J. Jr.
title = Psychology of Intelligence Analysis.
work = History Staff, Center for the Study of Intelligence, Central Intelligence Agency
year = 1999
url =
accessdate = 2007-10-29

Also, according to Johnston, time constraints are one of the most difficult obstacles for intelligence analysts.citation
last = Johnston | first= Rob
title =Analytic Culture in the US Intelligence Community: An Ethnographic Study
year = 2005
publisher = Center for the Study of Intelligence, Central Intelligence Agency
] A target-centric model, by its very nature, is a network process that, in its ideal form, is more time consuming than the traditional cycle. If analysts back-track to collaborate with collectors and respond to multiple questions from decision makers, the finished product will likely take a longer amount of time to reach the decision maker.


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Intelligence cycle — The traditional Intelligence cycle is a concept that describes the fundamental cycle of intelligence processing in a civilian or military intelligence agency or in law enforcement as a closed path consisting of repeating nodes. The stages of the… …   Wikipedia

  • Intelligence dissemination management — This article is part of a series on intelligence cycle management, and deals with the dissemination of processed intelligence. For a hierarchical list of articles, see the intelligence cycle management hierarchy. It is a classic maxim of… …   Wikipedia

  • Measurement and signature intelligence — (MASINT) is a branch of intelligence gathering activities. MASINT, may have aspects of intelligence analysis management, since certain aspects of MASINT, such as the analysis of electromagnetic radiation received by signals intelligence are more… …   Wikipedia

  • Cognitive traps for intelligence analysis — This article deals with a subset of the intellectual process of intelligence analysis itself, as opposed to intelligence analysis management, which in turn is a subcomponent of intelligence cycle management. For a complete hierarchical list of… …   Wikipedia

  • Signals intelligence — SIGINT redirects here. For the UNIX signal, see SIGINT (POSIX). RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UK USA Security Agreement. Signals intelligence (often contracted to SIGINT) is intelligence gathering… …   Wikipedia

  • Market Intelligence — (often contracted to MARKINT) is a relatively new intelligence discipline that exploits open source information gathered from global markets. It relies solely on publicly available information such as market prices and ancillary economic and… …   Wikipedia

  • Counter-intelligence and counter-terrorism organizations — Counterintelligence, and closely related counterterrorism, may well be a source of positive intelligence on the opposition s priorities and thinking, not just a defensive measure. Still, foreign intelligence capability is an important part of… …   Wikipedia

  • Open-source intelligence — (OSINT) is a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence. In the intelligence community (IC), the term… …   Wikipedia

  • Network-Centric Service-Oriented Enterprise (NCSOE) — is a new generation enterprise capable of conducting collaboration and management of internal and external information. Using Network Centric Enterprise Services (NCES) , the enterprise can now enforce information and decision superiority in a… …   Wikipedia

  • Materials MASINT — Intelligence Cycle Management Collection Management MASINT Electro optical MASINT Nuclear MASINT Geophysical MASINT Radar MASINT Materials MASINT Radiofrequency MASINT Materials MASINT is one of the six major disciplines generally accepted to… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”