The primary problems in intelligence collection strategy are associated mainly with the five steps in the process of levying the requirements: 1. Defining the requirement, or locating intelligence gaps. Requirements and intelligence gaps are to be clear to the intelligence collector at the onset. The intelligence analyst no matter how scarce the source of intelligence information to be collected must spend his time wisely by not wasting time stressing on the gaps.
Gaps must be stated in terms of possible avenues of approach to solve concerns and issues and not merely in general terms (Bundy, W. P. ). 2. Stating the requirement for the collector. The requirement should seek feasible particular answers that bear on the desired conclusion. Whoever the collector may be, an expert scientist or just a layman, trained or untrained collector, the analyst must be able to pitch the requirement, can stress the precise gaps and go over ways to meet them (Bundy, W. P. ). 3.
Selecting the appropriate collection system. A collection system must be able to persuade an analyst to provide appropriate information. The chosen collectors must be motivated, conscious to the collection problems and capacities, and there is the presence of assistance and advice coming from the requirements staff. 4. Servicing the return, including supplemental requirements. After the collector has the useful information on hand, there arises the problem of servicing the return so that it can be most useful.
Great time pressure, availability of source for re-interrogation, further visits to the target, or the need of more searches of files may yet to contribute to an incomplete information and even misunderstanding of data collected. 5. Making specific evaluations and appraising the collector’s reporting. Lack of steady evaluations or limitations in the evaluation efforts can cause collectors being not sure where they stand with respect to the adequacy in their job (Bundy, W. P. ). Bundy may have missed in pointing out a more serious quality control problem from the possibility that an agent has been “doubled”.
An agent or collector may be secretly working for his supposed target and that the information he is providing to his supposed employers is intended to deceive them (Shulsky, A. ). References Bundy , W. P. “The Guiding of Intelligence Collection”. Retrieved June 30, 2009. https://www. cia. gov/library/center-for-the-study-of-intelligence/kent-csi/vol3no1/html/v03i1a04p_0001. htm Shulsky, A. N. , Schmitt G. J. “Human Intelligence Collection”. Retrieved June 30, 2009. http://www. pbs. org/wgbh/pages/frontline/shows/khadr/readings/humint. html