World Library  
Flag as Inappropriate
Email this Article

Intelligence cycle (target-centric approach)

Article Id: WHEBN0017159890
Reproduction Date:

Title: Intelligence cycle (target-centric approach)  
Author: World Heritage Encyclopedia
Language: English
Subject: Intelligence cycle management, Intelligence, Intelligence (information gathering), Denial and deception, Telemetry intelligence
Publisher: World Heritage Encyclopedia

Intelligence cycle (target-centric approach)

The target-centric approach to intelligence describes a method of intelligence analysis that Robert M. Clark introduced in his book "Intelligence Analysis: A Target-Centric Approach" in 2003[1] to offer an alternative methodology to the traditional intelligence cycle. Its goal is to redefine the intelligence process in such a way that all of the parts of the intelligence cycle come together as a network. It is a collaborative process where collectors, analysts and customers are integral, and information does not always flow linearly.[2]

Target-centric analysis

Intelligence process

"Intelligence Analysis: A Target-Centric Approach" by Robert M. Clark

The most common view of the intelligence process is the model known as the intelligence cycle. In the original concept of this model, the steps are isolated stages where each part has a designated purpose or task. When the contributors and collectors complete data collection, the cycle continues. While this procedure completes each part of the cycle, it may constrain the flow of information.[3] The intelligence community often discusses the problems with this pure model and offers multiple approaches to solving them.

In the pure model, there is limited opportunity for contributors or consumers to ask questions or provide feedback.[4] To fully understand what they analyze, analysts should have the opportunity to ask questions about the sources where collectors gathered information. Likewise, when the decision-maker receives an intelligence estimate, he or she should have the opportunity to ask questions concerning not only how the analyst reached a particular conclusion, but also questions concerning the reliability of sources.

Sherman Kent the "father of intelligence analysis," left a legacy in not only his work, but in the faculty members at the Sherman Kent Center. The faculty teaches intelligence principles to future intelligence analysts. According to Jack Davis, of the Sherman Kent Center, Kent encouraged arguments and dissent among analysts, as well as taking into account a "wide range of outside opinions."[5] Kent also encouraged "collective responsibility for judgment," which supports a network approach to intelligence. In such a network, analysts are directly accountable for the work, and a decision maker or consumer's questions help the intelligence process by leading by pushing the analyst to challenge and refine his or her own work.

It is important to note that agencies constantly modify the traditional, pure model in intelligence practice. For example, various "centers" under the Director of National Intelligence deliberately put collectors and analysts into teams.

The traditional intelligence cycle separates collectors, processors, and analysts and too often results in "throwing information over the wall" to become the next person’s responsibility. Everyone neatly avoids responsibility for the quality of the final product. Because this "compartmentalized process results in formalized and relatively inflexible requirements at each stage, it is more predictable and therefore more vulnerable to an opponent’s countermeasures.”[2]

Kurt April and Julian Bessa examined weaknesses of the competitive intelligence community in their article "A Critique of the Strategic Competitive Intelligence Process within a Global Energy Multinational." They examined two competitive intelligence processes: Competitive Strategic Business Intelligence (CIAD) and Competitive Technical Intelligence (CTI). According to April and Bessa, CIAD is a linear process where the intelligence product moves upward through the layers of the organization. In contrast, CTI is a more networked model. They found that the organizational structure associated with CIAD prevents open-sharing of information and ideas, and is a stumbling block to intelligence analysis.”[6]

Testifying to the House Committee on Homeland Security Mr. Eliot A. Jardines, President of Open Source Publishing, Incorporated, presented a statement and supported the target-centric approach to intelligence. According to Mr. Jardines, Dr. Robert Clark "proposes a more target-centric, iterative and collaborative approach which would be far more effective than our current traditional intelligence cycle."[7] With a target-centric approach to intelligence analysis, intelligence is collaborative, because this model creates a system where it can include all contributors, participants, and consumers. Each individual can question the model and get answers along the way. The target-centric model is a network process where the information flows unconstrained among all participants, who also focus on the objective to create a shared picture of the target.[8] For other models and their limitations, see Analysis of competing hypotheses and cognitive traps for intelligence analysis.

Creating the model

Target-centric intelligence cycle

Models in intelligence

Conceptual models are useful for the analytic process, and are particularly helpful to help understand the target-centric approach to intelligence. A conceptual model is an abstract invention of the mind that best incorporates and takes advantage of an analyst's thought process. The model allows the analyst to use a powerful descriptive tool to both estimate current situations and predict future circumstances.[9]

Sources of intelligence information

Once the analyst constructs the skeleton structure of the model, the next step is to add substance. This is where the analyst must research, gather information, and synthesize to populate the model. For an analyst to successfully populate a model for a complex target, he or she must find information from a wide range of both classified and unclassified sources. This includes retrieving information from the body of existing intelligence.[10] Depending on the target, an analyst may seek out information from open source intelligence (information available to the general public), human intelligence (HUMINT), measures and signatures intelligence (MASINT), signals intelligence (SIGINT), or imagery intelligence (IMINT). Even though open source information is inexpensive or free, and easily accessible, it can be just as useful as the more specialized, technical intelligence sources that are expensive to use.[11]

Populating the model

Populating the model forces the analyst to collate the collected data, organize the data, and evaluate evidence for relevance and credibility. Finally, after the analyst examines each piece of data, the analyst must incorporate the information into the target model. As the body of information builds in the model, the analyst can more easily determine where there are inconsistencies in conclusions. This requires the analyst to carry out further research to support or deny a particular conclusion. Also, as the analyst populates the model, the target model shows where gaps exist in the model. These gaps also force the analyst to collect additional information to more completely describe the target.

Organizational analysis

Clark defined an [12]

Applications of the target-centric approach to intelligence

The target-centric approach to intelligence does not aim to deny other intelligence processes. Instead, it offers an alternative method to the established intelligence process. The intelligence cycle, like many other systems, continually needs improvement. In the wake of the 2001 terrorist attacks, the 9/11 commission declared that the US intelligence community needed improvements in gathering and sharing information. According to the National Commission on Terrorist Attacks upon the United States, the US intelligence agencies experienced inadequate coordination and cooperation.[13] This is one example of failure in the intelligence cycle, where a breakdown in the accepted process led to devastating results.

General Stanley A. McChrystal wrote in 2014 about a targeting cycle called "F3EA" used in the Iraq War, which stands for:

  1. Find: A target (person or location) is first identified and located.
  2. Fix: The target is then kept under continuous surveillance to ensure it hasn't moved.
  3. Finish: A raiding force is assigned to capture or kill the target.
  4. Exploit: Intelligence material is secured and mined, with detainees interrogated.
  5. Analyze: Information is studied to identify further targeting opportunities.[14]


According to Heuer, analysts can always strive to improve estimates, and no method guarantees accurate conclusions every time. Analysts should expect intelligence failures, and refine the methodology to learn from what worked and what did not work.[15]

Also, according to Johnston, time constraints are one of the most difficult obstacles for intelligence analysts.[16] A target-centric model, by its very nature, is a network process that, in its ideal form, is more time consuming than the traditional cycle. If analysts back-track to collaborate with collectors and respond to multiple questions from decision makers, the finished product will likely take a longer amount of time to reach the decision maker.


  1. ^ Clark, Robert M. (2003), Intelligence Analysis: A Target-Centric Approach, CQ Press,  
  2. ^ a b Jardines, Eliot A. (21 June 2005), "Testimony of Eliot A. Jardines", Using Open Source Effectively: Hearings before the Subcommittee on Intelligence, Information and Terrorism Risk Assessment, Committee on Homeland Security, (PDF), pp. 11–18 
  3. ^ Clark 2006, p.11.
  4. ^ Maynes, Aaron; Golbeck, Jennifer; Hendler, James, Semantic Web and Target-Centric Intelligence: Building Flexible Systems that Foster Collaboration (PDF), retrieved 2008-04-28 
  5. ^ Davis, Jack (1995), "A Policymaker's Perspective On Intelligence Analysis", Studies in Intelligence 38 (5), retrieved 2007-10-28 
  6. ^ April, Kurt; Bessa, Julian. "A Critique of the Strategic Competitive Intelligence Process Within a Global Energy Multinational" (PDF). Retrieved 2008-04-28. 
  7. ^ Jardines 2005, p. 12.
  8. ^ Clark 2006, p.13.
  9. ^ Clark 2006, p.37.
  10. ^ Clark 2006, p.83.
  11. ^ Clark 2006, p.111.
  12. ^ a b Clark 2006, p.227.
  13. ^ "9/11 Commission Faults US Intelligence", CNN ( 
  14. ^ McChrystal, Stanley A. (2014).  
  15. ^ Heuer, Richards J. Jr. (1999), "Psychology of Intelligence Analysis.", History Staff, Center for the Study of Intelligence, Central Intelligence Agency, retrieved 2007-10-29 
  16. ^ Johnston, Rob (2005), Analytic Culture in the US Intelligence Community: An Ethnographic Study, Center for the Study of Intelligence, Central Intelligence Agency, retrieved 2007-10-29 

This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Hawaii eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.