Difference between revisions of "Military intelligence" - New World Encyclopedia

From New World Encyclopedia
 
 
(23 intermediate revisions by 7 users not shown)
Line 1: Line 1:
 
[[Category:Politics and social sciences]]
 
[[Category:Politics and social sciences]]
[[Category:Anthropology]]
+
[[Category:Law]]
 +
{{Copyedited}}{{Paid}}{{Approved}}{{Images OK}}{{Submitted}}
 +
'''Military intelligence''' (abbreviated “MI” or “int.” in [[Commonwealth of Nations|Commonwealth]] countries; “Intel” in the [[United States|U.S.]]), is a [[military]] discipline that focuses on the gathering, analysis, protection, and dissemination of information of both strategic (long range actions intended to destroy military potential) and tactical (smaller operations of immediate significance in the field) value. This includes information about the enemy, terrain, and weather in an area of operations or area of interest, as well as information about political decision-making, military intentions, and dissidents. Intelligence activities are conducted both during peacetime and in [[war]].
 +
{{toc}}
 +
Most militaries maintain a military intelligence corps with specialized intelligence units for collecting information in specific ways. Intelligence officers and enlisted soldiers assigned to military intelligence may be selected for their analytical abilities or scores on [[intelligence test]]s. Although many technological advances have ensued as a result of military intelligence operations, as human society has advanced the possibility that all people can cooperate to accomplish shared goals offers a valid alternative.
  
 +
==Military Intelligence in History==
 +
Attempts to gather tactically important information are seemingly as old as [[war]] itself. [[espionage|Spying]] is mentioned in both [[Homer]]’s ''[[Iliad]]'' and the [[Bible]]. The [[Roman Empire|Romans]] had a network of spies and embassies that they used to collect valuable information, including the environment and socio-political information about neighboring states and peoples.<ref>D. F. Buck, [http://ccat.sas.upenn.edu/bmcr/1994/94.04.08.html “Review of A.D. Lee, ''Information and Frontiers: Roman Foreign Relations in Late Antiquity''] (Cambridge: Cambridge University Press, 1993, ISBN 052139256X),” ''Bryn Mawr Classical Review'' 94.04.08. Retrieved August 28, 2007.</ref> Theoretical works on information gathering were written around 500 B.C.E. in ancient [[China]], and reconnaissance was used to gather information by the Carthaginian general [[Hannibal]] (c. 200 B.C.E.), and [[Alexander the Great]] (c. 340 B.C.E.).<ref>Wojciech Pieciak, [http://www.worldpress.org/Europe/1832.cfm “History of Intelligence: The World's Second-Oldest Profession,”] ''World Press Review'' (April 2004). Retrieved August 28, 2007.</ref>
  
{{history of war}}
+
As [[government]]s became more organized, so did their militaries and military intelligence systems, eventually evolving into the complex and multi-faceted organizations of today. Technological advancements such as [[radio]] led to advancements in areas like [[cryptography]], as well as more advanced systems to intercept and decode messages. MI has fueled many technological advances; the first world-wide [[computer]] network, for example, was not the [[internet]], but the international network connecting surveillance stations.<ref>Duncan Campbell, [http://www.heise.de/tp/r4/artikel/6/6929/1.html “Inside Echelon,”] Telepolis (July 25, 2000). Retrieved August 28, 2007.</ref>
'''Military intelligence''' (abbreviated MI, int. [[Commonwealth of Nations|Commonwealth]], or intel. [[U.S.]]), is a [[military]] discipline that focuses on the gathering, analysis, protection, and dissemination of information about the enemy, terrain, and weather in an area of operations or area of interest. Intelligence activities are conducted at all levels from tactical to strategic, during peacetime and in war.
 
  
Most militaries maintain a military intelligence corps with specialized intelligence units for collecting information in specific ways.  Militaries also typically have intelligence staff personnel at each echelon down to battalion level.  [[Intelligence officer]]s and enlisted soldiers assigned to military intelligence may be selected for their analytical abilities or scores on intelligence tests.  They usually receive formal training in these disciplines.
+
==The Intelligence Process ==
  
The term is often used rhetorically as an [[oxymoron]].
+
Intelligence is conducted on two levels&mdash;strategic and tactical&mdash;both of which are intended to allow decisions to be made in the most effective manner. Strategic intelligence is used to formulate long-term policies on the national and international scale and is concerned with broad issues such as economics, military capabilities of foreign countries, and political assessments. Tactical intelligence is more focused on the specific objectives and situation of military commanders in the field. These types of intelligence basically consist of the same type of information, only differing in terms of scope.
 
 
== The intelligence process ==
 
The process of intelligence has four phases: collection, analysis, processing and dissemination.
 
  
 
=== Collection ===
 
=== Collection ===
  
Many of the most important facts are well known, or may be gathered from public sources. For example, the population, ethnic make-up and main industries of a region are extremely important to military commanders, and this information is usually public. The tonnage and basic weaponry of most capital ships and aircraft are also public, and their speeds and ranges can often be reasonably estimated by experts, often just from photographs. Ordinary facts like the lunar phase on particular days, or the ballistic range of common military weapons are also very valuable to planning, and are habitually collected in an intelligence library. 
+
A great deal of information that MI agencies collect is publicly available. The population, ethnic make-up, and main industries of a region are examples of publicly available information that has great military significance. The tonnage and basic weaponry of most capital [[ship]]s and [[aircraft]] are often publicly available, and their speeds and ranges can often be reasonably estimated by experts using this information in conjunction with photographs. Intelligence libraries (many of which are now contained on a vast computer network) contain a vast amount of information including the ballistic range of common military weapons. Information is also routinely gathered from [[newspaper]]s and [[radio]]. Intelligence agencies often study the main newspapers and journals of every nation, as well as local [[television]] and radio programs.
 
 
A great deal of useful intelligence can be gathered from photointerpretation of detailed high-altitude pictures of a country.  Photointerpreters generally maintain catalogs of munitions factories, military bases and crate designs, in order to interpret munition shipments and inventories.
 
 
 
Most intelligence services maintain or support groups whose only purpose is to keep maps. Since maps also have valuable civilian uses, these agencies are often publicly associated or identified as other parts of the government.  Some historic counter-intelligence services, especially in Russia and China, have intentionally banned or placed disinformation in public maps; good intelligence can identify this disinformation.
 
  
It is commonplace for the intelligence service of large countries to read every published journal of the nations in which it is interested, and the main newspapers and journals of every nation.  This is a basic source of intellligence.
+
Most intelligence services maintain or support groups whose sole purpose is to keep maps. Since maps also have valuable civilian uses, these agencies are often publicly associated or identified as other parts of the government. Some historic counter-intelligence services, especially in [[Russia]] and [[China]], have intentionally banned or placed disinformation in public maps.
  
It is also common for diplomatic and journalistic personnel to have a secondary goal of collecting military intelligence. For western democracies, it is extremely rare for journalists to be paid by an official intelligence service, but they may still patriotically pass on tidbits of information they gather as they carry on their legitimate business. Also, much public information in a nation may be unavailable from outside the country. This is why most intelligence services attach members to foreign service offices.
+
In addition to the collection of publicly available data, MI agencies also use specialized information gathering techniques and equipment to acquire data. High altitude and [[satellite]] pictures are examined by photointerpreters, often to keep tabs on munitions shipments and inventories. MI operatives also eavesdrop continuously on the entire radio spectrum, interpreting it in real time. In addition to public broadcasts, local military traffic, [[radar]] emissions, and even [[microwave]]d [[telephone]], [[telegraph]], and satellite traffic are monitored. One of the most famous [[telecommunication]] traffic monitoring programs is the United States' "Echelon" system, part of an international system that monitors [[mobile phone]]s and international long distance, among other things. Analysis of bulk traffic is normally performed by complex computer programs that parse natural language and phone numbers looking for threatening conversations and correspondents. In some cases, undersea or land-based cables have been tapped. In addition to mass monitoring systems, surveillance devices are often used to bug foreign embassies and dignitaries.
  
Some industrialized nations also eavesdrop continuously on the entire radio spectrum, interpreting it in real time. This includes not only broadcasts of national and local radio and television, but also local military traffic, radar emissions, and even microwaved telephone and telegraph traffic, including satellite traffic. The U.S. in particular is known to maintain satellites able to intercept cell-phone and pager traffic. Analysis of bulk traffic is normally performed by complex computer programs that parse natural language and phone numbers looking for threatening conversations and correspondents. In some extraordinary cases, undersea or land-based cables have been tapped, as well.
+
While a vast amount of information is collected through electronic means, human intelligence, gathered by spies, remains an essential part of MI. Spies who are able to infiltrate an organization and get close to the decision makers are often able to provide information about an individual's motives, rationales, and thought processes, information that is uniquely valuable to the successful negotiation of diplomatic solutions. It is also common for intelligence agencies to use diplomatic and journalistic personnel to collect and disseminate information. Oftentimes, journalists may have useful perspectives or analyses of international or political situations, even if they are not privy to classified information.<ref name=tinker> “Tinker, Tailor, Journalist, Spy,” Hardnews (August 2006).</ref> 
  
More exotic secret information, such as encryption keys, diplomatic message traffic, policy and orders of battle are usually restricted to analysts on a need-to-know basis, in order to protect the sources and methods from foreign traffic analysis.
+
=== Analysis and Dissemination ===
  
=== Analysis ===
+
Simply having information is not enough; information must be assessed and verified. A great deal of collected information may be inaccurate. "Counter-intelligence" agencies routinely work to prevent and control the dissemination of information, and often spread disinformation in order to confuse or mislead the enemy. For example, during the [[Cold War]] both [[United States|American]] and [[Soviet Union|Soviet]] agencies used journalists to disseminate "exclusives" containing doctored and misleading information.<ref name=tinker/> In other cases, greed or revenge may drive sources to divulge false information.
  
Analysis consists of assessment of an adversary's capabilities and vulnerabilities. In a real sense these are threats and opportunities.  Analysts generally look for the least defended or most fragile resource that is necessary for important military capabilities.  These are then flagged as critical vulnerabilities.  For example, in modern mechanized warfare, the logistic train for a military unit's fuel supply is often the most vulnerable part of a nation's order of battle.
+
Once information is verified, it is assessed in order to determine another's capabilities and vulnerabilities. In many cases, enemy capabilities are analyzed on a set schedule. Imminent threats, such as those between the United States and the Soviet Union during the Cold War, may be continually monitored, while munitions depots may be monitored on a less frequent cycle.
  
Human intelligence, gathered by spies, is usually carefully tested against unrelated sources. It is notoriously prone to inaccuracy: In some cases, sources will just make up imaginative stories for pay, or they may try to settle grudges by identifying personal enemies as enemies of the state that is paying for the intelligence.  However, human intelligence is often the only form that provides information about an opponent's intentions and rationales, and it is therefore often uniquely valuable to successful negotiation of diplomatic solutions.
+
Critical threats are usually maintained in a prioritized file, with important data, places, or situations analyzed on a set schedule. For example, nuclear threats between the USSR and the U.S. were analyzed in real time by staff working round the clock. In contrast, analyses of tank or army deployments are usually triggered by accumulations of fuel and munitions, which are monitored on slower, every-few-days cycles.  
  
In some intelligence organizations, analysis follows a procedure, screening general media and sources to locate items or groups of interest, and then systematically assessing their location, capabilities, inputs and environment for vulnerabilities, using a continuously-updated list of typical vulnerabilities.
+
Packaging threats and vulnerabilities for decision makers is a crucial part of military intelligence. While intelligence agents do not develop policy or plans of attack, a good intelligence officer will often work closely with decision makers to anticipate their information requirements and tailor the information needed. The quality and amount of information intelligence provides can mean the difference between a successful decision and a disastrous one.
 
 
=== Packaging ===
 
 
 
Critical vulnerabilities are then indexed in a way that makes them easily available to advisors and line intelligence personnel who package this information for policy-makers and war-fighters.  Vulnerabilities are usually indexed by the nation and military unit, with a list of possible attack methods.
 
 
 
Critical threats are usually maintained in a prioritized file, with important enemy capabilities analyzed on a schedule set by an estimate of the enemy's preparation time.  For example, nuclear threats between the USSR and the US were analyzed in real time by continuously on-duty staffs.  In contrast, analysis of tank or army deployments are usually triggered by accumulations of fuel and munitions, which are monitored on slower, every-few-days cycles.  In some cases, automated analysis is performed in real time on automated data traffic.
 
 
 
Packaging threats and vulnerabilities for decision makers is a crucial part of military intelligence. A good intelligence officer will stay very close the policy-maker or war fighter, to anticipate their information requirements, and tailor the information needed. A good intelligence officer will ask a fairly large number of questions in order to help anticipate needs, perhaps even to the point of annoying the principal.  For an important policy-maker, the intelligence officer will have a staff to which research projects can be assigned.
 
 
 
Developing a plan of attack is not the responsibility of intelligence, though it helps an analyst to know the capabilities of common types of military units.  Generally, policy-makers are presented with a list of threats, and opportunities.  They approve some basic action, and then professional military personnel plan the detailed act and carry it out.  Once hostilites begin, target selection often moves into the upper end of the military chain of command.  Once ready stocks of weapons and fuel are depleted, logistic concerns are often exported to civilian policy-makers.
 
 
 
== Strategic intelligence ==
 
 
 
[[Strategic]] intelligence is concerned with broad issues such as economics, military capabilities of foreign countries, and political assessments.  Relevant changes may be scientific, technical, tactical, or diplomatic, but these changes are analyzed in combination with known facts about the area in question, such as [[geography]], [[demographics]], and industrial capacities.
 
  
 
== United States ==
 
== United States ==
The [[United States Armed Forces]] has various styles of referring to its intelligence functions.  The numbering system was borrowed from the French General Staff around the period of [[World War I]]. In French usage, the second office ([[deuxième bureau]]) performed the intelligence function. 
 
  
Joint intelligence staffs work for the [[J-2 (officer)|J-2]], while multinational intelligence is under a C-2. Each may have a G-2 (military/ground intelligence)/N-2 (naval intelligence)/A-2 (air intelligence) staff subordinated to it.
+
While spies and information gathering processes were heavily used during conflicts like the [[American Revolution]] and the [[American Civil War]], there was no official organization devoted to military intelligence until May 1917. Called the MIS (Military Intelligence Section), it grew from a mere three officers and two clerks at inception to 282 officers and 948 civilians by the end of the first [[World War I|World War]]. MIS produced daily and weekly intelligence summaries covering military, political, social, and economic topics, which were distributed to high level positions like the army chief of staff, the secretary of state, and the president.<ref>[http://www.universityofmilitaryintelligence.us/mi_library/documents/briefmi.pdf “Winning Smart: A Brief History of Military Intelligence,”] The University of Military Intelligence at Fort Huachuca. Retrieved August 28, 2007.</ref> 
  
The lead agency for joint United States military intelligence operations as well as strategic defense-related intelligence is the [[Defense Intelligence Agency]][[DIA]] unifies the Department of Defense in regard to intelligence analysis and collection.
+
The modern-day U.S. intelligence community is made up of many organizations, including the [[National Security Agency]] (NSA), the [[Central Intelligence Agency]] (CIA), the Defense Intelligence Agency, and organizations within each military branch. Military intelligence is primarily the responsibility of the DIA and intelligence groups within the armed services, but other agencies provide valuable support. Each agency has its own primary function; for example, the NSA is responsible for collecting, processing, and reporting SIGINT (Signals Intelligence), a type of intelligence derived from transmitted signals, including electronic and communication intelligence.
  
=== U.S. Army ===
+
== United Kingdom ==
Within the U.S. military, the term ''military intelligence'' is specific to the intelligence components of the U.S. Army, not the other services or the armed forces as a whole.  There is no standard nomenclature within all the services; they use a variety of different names to refer to intelligence sections.
 
 
 
The [[United States Army]] refers to the chief intelligence officer assigned to a [[General|general officer]]'s staff as a [[G-2]].  Intelligence officers of lower units are referred to as [[S-2 (officer)|S-2]]s.  In Combat Arms battalions, this post is usually held by a [[captain]], with a first or second lieutenant as a deputy and a [[Master Sergeant]] (pay grade E-8) or [[Sergeant First Class]] (pay grade E-7) as a staff [[NCO]].  Larger military units such as a division or separate brigade have military intelligence [[Warrant Officers]] assigned as technical experts in the various intelligence disciplines.
 
 
 
==== Active units ====
 
 
 
* [[312th Military Intelligence Battalion, 1st Cavalry Division]]
 
* [[501st Military Intelligence Battalion, 1st Armored Division]]
 
* [[101st Military Intelligence Battalion, 1st Infantry Division]]
 
* [[102nd Military Intelligence Battalion, 2nd Infantry Division]]
 
* [[103rd Military Intelligence Battalion, 3rd Infantry Division]]
 
* [[104th Military Intelligence Battalion]], 4th Infantry Division
 
* [[125th Military Intelligence Battalion, 25th Infantry Division]]
 
* [[313th Military Intelligence Battalion, 82nd Airborne Division]]
 
* [[311th Military Intelligence Battalion, 101st Airborne Division (Air Assault)]]
 
 
 
* [[504th Military Intelligence Brigade, III Corps, Ft. Hood, TX]]
 
** [[15th Military Intelligence Battalion]]
 
** [[163rd Military Intelligence Battalion]]
 
** [[303rd Military Intelligence Battalion]]
 
 
 
 
 
* [[205th_MI|205th Military Intelligence Brigade, V Corps - Germany]]
 
** [[165th Military Intelligence Battalion]]
 
** [[302nd Military Intelligence Battalion]]
 
** [[1st Military Intelligence Battalion]]
 
 
 
* [[525th Military Intelligence Brigade|525th Military Intelligence Brigade, XVIII Corps (Airborne) - Ft. Bragg, NC]]
 
** [[224th Military Intelligence Battalion]]
 
** [[319th Military Intelligence Battalion]]
 
** [[325th Military Intelligence Battalion]]
 
** [[519th Military Intelligence Battalion]]
 
 
 
* [[501st Military Intelligence Brigade, - Republic of Korea]]
 
** [[524th Military Intelligence Battalion]]
 
** [[3rd Military Intelligence Battalion]]
 
** [[532nd Military Intelligence Battalion]]
 
** [[527th Military Intelligence Battalion]]
 
 
 
* [[513th Military Intelligence Brigade, - Ft. Gordon, GA]]
 
** [[201st Military Intelligence Battalion]]
 
** [[202nd Military Intelligence Battalion]]
 
** [[204th Military Intelligence Battalion]]
 
** [[297th Military Intelligence Battalion]]
 
 
 
* [[66th Military Intelligence Group - Darmstadt, Germany]]
 
** [[109th Military Intelligence Battalion - Menwith Hill Station, UK]]
 
** [[2nd Military Intelligence Battalion - Darmstadt, Germany]]
 
 
 
* [[704th Military Intelligence Brigade, Ft. Meade, Maryland]]
 
** [[741st Military Intelligence Battalion]]
 
** [[742nd Military Intelligence Battalion]]
 
** [[743rd Military Intelligence Battalion]]
 
 
 
* [[902nd Military Intelligence Group, Ft. Meade, Maryland]]
 
** [[308th Military Intelligence Battalion]]
 
** [[310th Military Intelligence Battalion]]
 
 
 
* [[500th Military Intelligence Brigade, United States Army Pacific Command, Hawaii]]
 
** [[205th Military Intelligence Battalion]]
 
** [[301st Military Intelligence Battalion]]
 
** [[441st Military Intelligence Battalion]]
 
** [[732nd Military Intelligence Battalion]]
 
 
 
* [[116th Military Intelligence Group - Ft. Gordon, GA]]
 
** [[206th Military Intelligence Battalion]]
 
 
 
==== Training ====
 
The U.S. Army trains military intelligence (MI) officers and noncomissioned officers (Paygrade E5-E9) at [[Fort Huachuca]], [[Arizona]].  Newly commissioned officers attend the Military Intelligence Officer Basic Course (MIOBC) before going to their first duty assignment.  After their first duty assignment, usually within 3-5 years of attending MIOBC, they come back to Ft. Huachuca, Arizona, to attend the Military Intelligence Officer Advanced Course (MIOAC). [[Fort Holabird, Maryland]] and [[Camp Ritchey, Maryland]] and [[Fort Devens, Massachusetts]] were posts previously used by the US Army's military intelligence organization for training.
 
 
 
Many U.S. Army intelligence officers are "branch-detailed" to a combat arms branch (Infantry, Armor, Air Defense, etc) for approximately four years before undergoing training to become military intelligence officers.  This reasoning behind this is because there is a greater need for Captains in the military intelligence field rather than Lieutenants.  Secondly, this affords the officers the opportunity to gain valuable leadership experience by serving in combat arms branches in their first assignments.  This allows them to understand the needs of the combatant commander when they are later in positions of gathering, analyzing and providing intelligence to maneuver units.  These "branch-detailed" officers come to Fort Huachuca for an Military Officer Intelligence Transition Course before attending the MIOAC. 
 
 
 
Once officers complete MIOAC they usually attend the Combined Services Staff School (CAS3) en route to their next unit.  For the most part, but certainly not always, new graduates of MIOAC will go to Divisional units or Brigade Units of Action to serve as staff intelligence officers before given a command of an intelligence company.  Some military intelligence officers are offered commands of Headquarters, Headquarters Company (HHC) of infantry or armor battalions and brigades.
 
 
 
==== Qualifications ====
 
 
 
U.S. Army Intelligence Officers and NonCommissioned Officers (Paygrade E5-E9) are primarily known for their high level of intelligence, often having I.Q.'s that place them in the top ten percent of the population.  Because they often have to deal with foreign intelligence officers from non-friendly nations and organizations, Army Intelligence Officers and NonCommissioned officers go through an exhaustive selection process, with standards that are much higher than most regular military units, with the exception of special operation forces.  These standards include physical, psychological and criminal screenings.
 
 
 
Standards also include an extremely detailed background check in order to obtain a TS-SCI level of clearance (Top Secret-Sensitive Compartmented Information).  TS-SCI applicants have often found out that their investigation file takes almost two years to complete and can contain information from their as far back as their childhood during the interview process. This type of thoroughness is necessary due to the fact that an Army Intelligence Officer and Non Commissioned Officers must be found qualified to be granted access to a large variety of sensitive and highly classified materials that they will be exposed to when analyzing data.
 
 
 
====Sub-specialties ====
 
US intelligence personnel have many sub-specialties, including the following.
 
* HUMINT (Human Intelligence)
 
* SIGINT (Signals Intelligence), which consists of...
 
:* COMINT (Communications Intelligence)
 
:* ELINT (Electronic Intelligence)
 
:* FISINT (Foreign Instrumentation Systems Intelligence)
 
* IMINT (Imagery Intelligence)
 
* MASINT (Measurement and Signatures Intelligence), which consists of...
 
:* RADINT (Radar Intelligence)
 
:* IRINT (Infrared Intelligence)
 
:* NUCINT (Nuclear Intelligence)
 
* ACOUSINT (Acoustic Intelligence)
 
* OSINT (Open Source Intelligence)
 
* CI (Counterintelligence).
 
 
 
CI Agents are sworn military law enforcement agents, given powers of arrest under Article 136b of the [[Uniform Code of Military Justice]] (UCMJ). At one time they ranged in military rank from Private (E1) to Chief Warrant Officer - 5 (CW5), and Officers who had completed Counterintelligence Additional Skill Training. Since October 1st 2005, new US Army Counterintelligence Agents have been required to be of the rank of Sergeant (E5) or above. Current CI Agents who are below the rank of Sergeant have until September 2009 to reach Sergeant before losing their positions.
 
 
 
HUMINT agents are informally called "Case Officers" and make direct contact with persons of non-US citizenship to collect intelligence information.  Some famous Case Officers have included [[Henry Kissinger]] who reputedly recruited an entire German village to collect intelligence about Soviet troop movements immediately following World War Two.  An agent, "Armando" was the Case Officer for [[Manuel Noriega|General Noriega]] of Panama, guiding him through a rise through the Panamanian military ranks from Sergeant to "El Jefe" and dictator.
 
 
 
SIGINT personnel collect and analyze information collected by the world wide operations of the [[National Security Agency]] (NSA) and the lower-echelon MI units in combat zones.  An Army Warrant Officer Astronaut went into space aboard a Space Shuttle to deploy SIGINT assets in orbit. The first soldier killed in the Vietnam conflict was a SIGINT collector.
 
 
 
IMINT personnel analyze imagery collected by the many "platforms" used by the MI community. These platforms range from orbiting satellite systems to planes, such as the U-2, to hand-held cameras specially modified for clandestine collection.
 
 
 
==== Museum ====
 
The U.S. Army Intelligence Museum is located at [[Fort Huachuca]], [[Arizona]]. It features the history of Army intelligence from the Revolutionary war to present.
 
 
 
=== United States Navy and Marine Corps ===
 
The [[United States Navy|USN]] refers to intelligence officers on a [[Admiral|flag officer]]'s staff  as the [[N2 Officer|N2]].  At this level, the N2 is usually a senior officer, such as a [[Captain#Naval|Captain]] or [[Commander]].  When the senior-most officer is a Captain or lower, the intelligence officer is called an [[INTELOFF]] or INTEL and is usually a [[Lieutenant Commander]] or [[Lieutenant]] with senior enlisted personnel on hand, such as [[Master Chief Petty Officer]]s or below.
 
 
 
The U.S. Navy also maintains its own intelligence section, the [[Office of Naval Intelligence]] (ONI).  ONI is the oldest continuously operating intelligence service in the nation. While its mission has taken many different forms over its evolution, the main purpose has not changed from its inception. ONI’s primary mission remains to keep the fleet, national leaders and decision makers informed with critical war fighting information to assure a winning margin over any navy that would challenge this country’s interests.  Located in the Federal Center in Suitland, Maryland, the [[National Maritime Intelligence Center]], or NMIC, is the home and nerve center of ONI. The NMIC also supports the United States [[Coast Guard]] Intelligence Coordination Center (USCG ICC), the Navy Information Warfare Activity (NIWA), and a component of the [[Marine Corps Intelligence Activity]] (MCIA).
 
The [[United States Marine Corps]]'s intelligence structure largely follows the same rules as the Army; however, while at sea naval terminology is used.
 
 
 
The Navy trains USN and USMC military intelligence officers at the [[Navy and Marine Corps Intelligence Training Center]] at [[Naval Air Station, Dam Neck]].
 
 
 
=== United States Air Force ===
 
Within the [[United States Air Force|USAF]], the standard office symbol for intelligence sections within units is IN. The Air Force's intelligence operations are most commonly referred to as ISR (Intelligence, Surveillance, and Reconnaissance). Air intelligence components of combined (multinational) or joint (multi-service) commands refer to air intelligence section heads as A-2. Additionally, the Air Force refers to its intelligence assets as ''air intelligence.'' These assets include satellites, U-2s, E3 AWACS (Airborne Warning And Control System), unmanned UAVs like the Predator, Darkstar, and Global Hawk, and RC-135s and many derivatives of the RC-135 (often focusing on a very specific discipline, like ELINT or MASINT).
 
 
 
The Air Force's intelligence operations are designed to contribute primarily to air superiority, special operations, mobility, ground support, force protection, Search And Rescue (SAR), Battle Damage Assessment (BDA), and Military Operations Other Than War (MOOTW), such as disaster relief.
 
  
The Air Force's intelligence fields focus on intelligence applications, SIGINT, ELINT, IMINT, Communications Security (COMSEC), HUMINT, OSINT, and cryptologic linguists. The Air Force trains intelligence officers and enlisted intelligence operators at [[Goodfellow Air Force Base]] in [[San Angelo, Texas]]. The other services also send personnel to Goodfellow for specific training.
+
In the [[United Kingdom]], there are also a number of agencies devoted to different aspects of military intelligence, including the Secret Intelligence Service (SIS), the Security Service, and the Defense Intelligence Staff (DIS). The SIS, also referred to by its historical name "MI6" (Military Intelligence 6), originated in 1909 as the Foreign Section of the Secret Service Bureau, responsible for gathering intelligence overseas. After [[World War I]], it became a separate agency and began to be referred to as the SIS. The Security Service, also known as "MI5" (Military Intelligence 5), also originated in 1909 as part of the Secret Service Bureau, and was responsible for domestic intelligence.  
  
=== United States Coast Guard ===
+
For much of the twentieth century, The Security Service dealt primarily with subversion and Soviet espionage. After the end of the [[Cold War]], the primary focus was changed, and the Security Service considered international counter-[[terrorism]] its primary priority. The DIS, part of the Ministry of Defence, was created in 1964, merging the separate intelligence staffs of the armed forces as well as civilian intelligence staff. The primary purpose of the DIS is to analyze intelligence gathered and provide assessments and strategic warnings to the armed forces and other decision makers.
  
[The information in this section came from a U.S. Coast Guard web site. Since the Coast Guard is an agency of the United States Government, its works are in the [[public domain]].]
+
==Russia and the Soviet Union==
  
Coast Guard Intelligence / CGI
+
During the [[Cold War]], the [[Soviet Union]] had one of the most well known groups of MI and security agencies: the [[KGB]]. After the collapse of the Soviet Union, [[Russia]] restructured much of the KGB, and, in 1995, formed the FSB (a Russian acronym for "Federal Security Service of the Russian Federation"), responsible for much of Russia's military counterintelligence. The GRU ("Main Intelligence Directorate") is one of the only organizations to retain most of its Soviet-era organization and approach. The main source of Russian military intelligence, the GRU engages in worldwide espionage and intelligence gathering. Other organizations include the SVR ("Foreign Intelligence Service"), a civilian intelligence collection agency which grew out of the KGB's First Chief Directorate, and FAPSI (Federal Agency for Government Communications and Information), created from the KGB's Eighth Chief Directorate, Eighteenth Administration, and Communication Troops. FAPSI's main objective is similar to the United States' NSA, and focuses primarily on electronic intelligence and counter-intelligence, or SIGINT.<ref>Victor Yasmann, [http://www.jamestown.org/publications_details.php?volume_id=1&issue_id=13&article_id=162 “The KGB has spawned a large set of offspring, but the central purpose of the Russian security services remains the same—the defense of the Russian political elite from domestic and foreign challenges,”] ''PRISM'' 1(4) (May 26, 1995). The Jamestown Foundation. Retrieved August 28, 2007.</ref>
  
Coast Guard intelligence came into existence in 1915 by the assignment of a "Chief Intelligence Officer" in Headquarters.  Article 304 in the first set of Coast Guard Regulations provided for the establishment of a Chief Intelligence Officer who was to be attached to the Office of Assistant Commandant.  The Chief Intelligence Officer's duties were spelled out in Article 614 of those same Regulations: "securing of information which is essential to the Coast Guard in carrying out its duties; for the dissemination of this information to responsible officers, operating units of the Coast Guard, the Treasury Department and other collaborating agencies; and the maintenance of adequate files and records of law enforcement activities."
+
==France==
  
The office was relatively unknown until the enactment of the Prohibition Act when CGI grew to a cadre of 45 investigators. CGI was extremely successful during prohibition and an Intelligence Division was established at Headquarters in 1930, followed by district intelligence offices in 1933.
+
Like many other countries, [[France]] utilized [[espionage|spies]] long before the advent of a modern intelligence community in the nineteenth century. Spies were used during the [[Middle Ages]], and military intelligence played an important role during the [[Napoleon]]ic era and the Age of Empire. When [[World War I]] began, France had one of the most organized and skilled intelligence forces in the world.<ref>Adrienne Lerner, [http://www.espionageinfo.com/Fo-Gs/France-Intelligence-and-Security.html “France, Intelligence and Security,”] The Thomson Corporation. Retrieved August 28, 2007.</ref> 
  
During World War II, CGI was concerned with internal and domestic intelligence and counterintelligence. It was charged with conducting all necessary investigation of Coast Guard personnel, and all applicants for positions therein, as well as investigations of applicants for merchant marine documentation. Further, Coast Guard Intelligence was charged with conducting investigations in connection with the Coast Guard's regulatory functions, except Marine Inspection Regulations.
+
There are MI divisions within each of France's military branches (Army, Navy, and Air Force), as well as within the Ministry of Defense; all are coordinated by the SGDN (National Defense General Secretariat). The DSGE (Directorate for External Security), an agency under the Ministry of Defense, was formed by merging various agencies after [[World War II]], and is responsible for military intelligence, strategic information, electronic intelligence, and counterespionage. The DPSD (Directorate for Defense Protection and Security) is primarily responsible for military counterintelligence and other military securities issues. The BRGE (Intelligence and Electronic Warfare Brigade) was created in 1993, and deals primarily in SIGINT intelligence, operating a number of monitoring facilities.<ref>John Pike, [http://www.fas.org/irp/world/france/defense/index.html SGDN - National Defense General Secretariat,] Federation of American Scientists: Intelligence Resource Program. Retrieved August 28, 2007.</ref> 
  
In 1948, CGI became the primary investigative arm of the service.  This mandate for an "investigative service" required that special agents conduct criminal, counterintelligence and personnel security investigations within the Coast Guard's area of responsibility.  The majority of these investigations involved those criminal offenses which are in violation of the UCMJ.
+
==China==
  
In 1996, in compliance with the President's Council on Integrity and Efficiency, the Coast Guard reorganized all criminal investigative and protective-services functions into the Coast Guard Investigative Service, or CGIS.  The centralization of CGIS meant reorganization from the top down.  Special agents now worked for a regional Special Agent-in-Charge (SAC). The SACs were located in seven regional offices in Boston, Portsmouth, VA, Miami, Cleveland, New Orleans, Alameda, CA, and Seattle. The SACs, in turn, reported to the director of CGIS at Headquarters who reported to the Chief of Operations and the vice commandant. At this time, CGIS was comprised of 282 special agents and support personnel.
+
Historically, the Communist Party has controlled much of the military intelligence in [[China]]. Before the [[Communism|communists]] took power in 1949, they used intelligence provided by the Central Department of Social Affairs, enabling them to emerge victorious on the battlefield. Once the Communist Party came to power, the Central Investigation Department was formed. During the 1950s, the Central Investigation Department had an office in every Chinese embassy. In 1977, intelligence officers were recalled from Chinese embassies, instead to be later sent out posing as businessmen, scholars, and journalists. In 1983, the Central Investigation Department was merged with counter-intelligence elements of the Public Security Ministry, and renamed the Ministry of State Security.<ref>John Pike, [http://www.fas.org/irp/world/china/mss/history.htm Ministry of State Security History,] Federation of American Scientists: Intelligence Resource Program. Retrieved August 28, 2007.</ref> 
  
Sources:
+
==Global Impact of Military Intelligence==
  
"Coast Guard Intelligence Looking For a Few Good Men and Women." Commandant's Bulletin (Jun 10 1983), p. 34.
+
Military intelligence operations have had an obvious impact on world history. Not only has the acquisition of intelligence, both accurate and inaccurate, influenced the outcome of [[war]]s and political negotiations, but it has also greatly influenced the development of [[technology]], particularly in the area of signals intelligence. Without worldwide pressure to develop better and more secure methods of [[communication]] (as well as the means of intercepting each newly developed technology), it is unlikely that such advances in the world's communications systems would have occurred as quickly if at all.
  
"Coast Guard Investigative Service." Coast Guard (Dec 1996), pp. 24-25.
+
==Notes==
 +
<references/>
  
The Coast Guard at War: Volume XII: Intelligence. Washington, DC: Historical Section, Public Information Division, U.S. Coast Guard Headquarters, January 1, 1949.
+
==Further Reading ==
  
== United Kingdom ==
+
*Austin, N. J. E. and N. B. Rankov. 1995. ''Exploratio: Military and Political Intelligence in the Roman World From the Second Punic War to the Battle of Adrianople''. London: Routledge. ISBN 0415183014
 
+
*Caesar, Julius. ''The Civil War''. Translated by Jane F. Mitchell, 1967. Baltimore, MD: Penguin Books.  
Intelligence requirements for the [[British Army]] are provided by the [[Intelligence Corps]], the [[Royal Air Force]] being supported by an [[RAF Intelligence| intelligence]] Branch. Whilst the [[Royal Navy]] does not have a dedicated Intelligence Branch officers from each of the professional branches are employed in intelligence roles, an Operational Intelligence branch does exist in the [[Royal Naval Reserve]]. Personnel are frequently employed in a joint environment, with staffs being formed from all three services.
+
*Dio, Cassius. ''Dio's Roman History''. Translated by Cary, Earnest. 1916. New York: G.P. Putnam's Sons.
 
+
*Dvornik, Francis. 1974. ''Origins of Intelligence Services''. New Brunswick, NJ: Rutgers University Press. ISBN 0813507642
Strategic level intelligence is provided to the [[Ministry of Defence (United Kingdom)|Ministry of Defence]] and other government departments by the [[Defence Intelligence Staff]] (DIS).
+
*Fuller, J. F. C. 1987. ''A Military History of the Western World, Vol. 1: From the Earliest Times to the Battle of Lepanto''. New York: Da Capo Press. ISBN 0306803046
 
+
*Gabriel, Richard A. and Karen S. Metz. 1991. ''From Summer to Rome; The Military Capabilities of Ancient Armies''. New York: Greenwood Press. ISBN 0313276455
Training for all three services is carried out at [[Chicksands]] in [[Bedfordshire]].
+
*Harris, Charles H. and Louis R. Sadler. 1988. ''The Border and the Revolution: Clandestine Activities of the Mexican Revolution 1910-1920''. HighLonesome Books. ISBN 0944383076
 
+
*Keegan, John. 2003. ''Intelligence in War''. New York: Knopf. ISBN 0375400532
 
+
*Landau, Henry. 1937. ''The Enemy Within: The Inside Story of German Sabotage in America''. New York: G.P. Putnam Sons.
The abbreviation MI is used in the popular names of the Security Service ([[MI5]]) and the [[Secret Intelligence Service]] (MI6) reflecting a historical name in the 1920s when they were an element of the [[Directorate of Military Intelligence]]. Whilst the designation has not been used since the 1920s they remain common in the media and popular perception.
+
*Mashbir, Sidney F. 1953. ''I Was An American Spy''. Vantage.
 
+
*Miller, Nathan. 1989. ''Spying for America: The Hidden History of U.S. Intelligence''. Dell Publishing. ISBN 1557781869
== See also ==
+
*Sayer, Ian and Douglas Botting. 1989. ''America's Secret Army: The Untold Story of the Counter Intelligence Corps''. Franklin Watts Publishers. ISBN 0531150976
* [[Battlespace]]
+
*Tuchman, Barbara W. 1958. ''The Zimmerman Telegram''. Ballantine Books. ISBN 0345324250
* [[Cryptography]]
 
* [[Counter-intelligence]]
 
* [[Defense Intelligence Agency]]
 
* [[Defense Language Institute]]
 
* [[Disinformation]]
 
* [[Doublespeak]]
 
* [[Edmund Charaszkiewicz]]
 
* [[Electronic warfare]]
 
* [[Espionage]]
 
* [[Ground Surveillance]]
 
* [[Ground Sensors]]
 
* [[GRU]] (Russian Military Intelligence)
 
* [[Intelligence cycle]]
 
* [[Interrogation]]
 
* [[Military secret]]s
 
* [[Propaganda]]
 
* [[Reconnaissance]]
 
* [[Rembass (i-Rembass)]]
 
* [[Scenario planning]]
 
* [[Spy satellite]]
 
* [[United States Army Intelligence Center]]
 
* [[Voice Interception]]
 
* [[Intelligence, Surveillance, Target Acquisition, and Reconnaissance]]
 
  
 
==External links==
 
==External links==
 +
All links retrieved November 9, 2022.
  
*[http://ODNI.gov Office of the Director of National Intelligence]
+
*[http://ODNI.gov Office of the Director of National Intelligence] &ndash; United States
*[http://www.fas.org/main/content.jsp?formAction=325&projectId=6 Intelligence Resource Program of the Federation of American Scientists] Reference
 
 
 
== References ==
 
 
 
*N.J.E. Austin and N.B. Rankov, ''Exploratio: Military and Political Intelligence in the Roman World From the Second Punic War to the Battle of Adrianople''. London: Routledge, 1995.
 
*Julius Caesar, ''The Civil War''. Translated by Jane F. Mitchell. Baltimore, MD: Penguin Books, 1967.
 
*Cassius Dio, ''Dio's Roman History''. Translated by Earnest Cary. New York: G.P. Putnam's Sons, 1916.
 
*Francis Dvornik, ''Origins of Intelligence Services''. New Brunswick, NJ: Rutgers University Press, 1974.
 
*[[J.F.C. Fuller]], ''A Military History of the Western World, Vol. 1: From the Earliest Times to the Battle of Lepanto''. New York: Da Capo Press, 1987.
 
*Richard A. Gabriel and Karen S. Metz, ''From Summer to Rome; The Military Capabilities of Ancient Armies''. New York: Greenwood Press, 1991.
 
*[[John Keegan]], ''Intelligence in War''.  New York: Knopf, 2003.
 
*Charles H. Harris & Louis R. Sadler. ''The Border and the Revolution: Clandestine Activities of the Mexican Revolution 1910-1920''. HighLonesome Books, 1988.
 
*Henry Landau, ''The Enemy Within: The Inside Story of German Sabotage in America''. G.P. Putnam Sons, 1937.
 
*Sidney F. Mashbir. ''I Was An American Spy''. Vantage, 1953.
 
*Nathan Miller. ''Spying for America: The Hidden History of U.S. Intelligence''. Dell Publishing, 1989.
 
*Ian Sayer & Douglas Botting. ''America's Secret Army, The Untold Story of the Counter Intelligence Corps''. Franklin Watts Publishers, 1989.
 
*Barbara W. Tuchman, ''The Zimmerman Telegram''. Ballantine Books, 1958.
 
 
 
  
{{Credit1|Military_intelligence|89053752|}}
+
{{Credit2|Military_intelligence|89053752|Counter-intelligence|88845258|}}

Latest revision as of 10:58, 10 March 2023


Military intelligence (abbreviated “MI” or “int.” in Commonwealth countries; “Intel” in the U.S.), is a military discipline that focuses on the gathering, analysis, protection, and dissemination of information of both strategic (long range actions intended to destroy military potential) and tactical (smaller operations of immediate significance in the field) value. This includes information about the enemy, terrain, and weather in an area of operations or area of interest, as well as information about political decision-making, military intentions, and dissidents. Intelligence activities are conducted both during peacetime and in war.

Most militaries maintain a military intelligence corps with specialized intelligence units for collecting information in specific ways. Intelligence officers and enlisted soldiers assigned to military intelligence may be selected for their analytical abilities or scores on intelligence tests. Although many technological advances have ensued as a result of military intelligence operations, as human society has advanced the possibility that all people can cooperate to accomplish shared goals offers a valid alternative.

Military Intelligence in History

Attempts to gather tactically important information are seemingly as old as war itself. Spying is mentioned in both Homer’s Iliad and the Bible. The Romans had a network of spies and embassies that they used to collect valuable information, including the environment and socio-political information about neighboring states and peoples.[1] Theoretical works on information gathering were written around 500 B.C.E. in ancient China, and reconnaissance was used to gather information by the Carthaginian general Hannibal (c. 200 B.C.E.), and Alexander the Great (c. 340 B.C.E.).[2]

As governments became more organized, so did their militaries and military intelligence systems, eventually evolving into the complex and multi-faceted organizations of today. Technological advancements such as radio led to advancements in areas like cryptography, as well as more advanced systems to intercept and decode messages. MI has fueled many technological advances; the first world-wide computer network, for example, was not the internet, but the international network connecting surveillance stations.[3]

The Intelligence Process

Intelligence is conducted on two levels—strategic and tactical—both of which are intended to allow decisions to be made in the most effective manner. Strategic intelligence is used to formulate long-term policies on the national and international scale and is concerned with broad issues such as economics, military capabilities of foreign countries, and political assessments. Tactical intelligence is more focused on the specific objectives and situation of military commanders in the field. These types of intelligence basically consist of the same type of information, only differing in terms of scope.

Collection

A great deal of information that MI agencies collect is publicly available. The population, ethnic make-up, and main industries of a region are examples of publicly available information that has great military significance. The tonnage and basic weaponry of most capital ships and aircraft are often publicly available, and their speeds and ranges can often be reasonably estimated by experts using this information in conjunction with photographs. Intelligence libraries (many of which are now contained on a vast computer network) contain a vast amount of information including the ballistic range of common military weapons. Information is also routinely gathered from newspapers and radio. Intelligence agencies often study the main newspapers and journals of every nation, as well as local television and radio programs.

Most intelligence services maintain or support groups whose sole purpose is to keep maps. Since maps also have valuable civilian uses, these agencies are often publicly associated or identified as other parts of the government. Some historic counter-intelligence services, especially in Russia and China, have intentionally banned or placed disinformation in public maps.

In addition to the collection of publicly available data, MI agencies also use specialized information gathering techniques and equipment to acquire data. High altitude and satellite pictures are examined by photointerpreters, often to keep tabs on munitions shipments and inventories. MI operatives also eavesdrop continuously on the entire radio spectrum, interpreting it in real time. In addition to public broadcasts, local military traffic, radar emissions, and even microwaved telephone, telegraph, and satellite traffic are monitored. One of the most famous telecommunication traffic monitoring programs is the United States' "Echelon" system, part of an international system that monitors mobile phones and international long distance, among other things. Analysis of bulk traffic is normally performed by complex computer programs that parse natural language and phone numbers looking for threatening conversations and correspondents. In some cases, undersea or land-based cables have been tapped. In addition to mass monitoring systems, surveillance devices are often used to bug foreign embassies and dignitaries.

While a vast amount of information is collected through electronic means, human intelligence, gathered by spies, remains an essential part of MI. Spies who are able to infiltrate an organization and get close to the decision makers are often able to provide information about an individual's motives, rationales, and thought processes, information that is uniquely valuable to the successful negotiation of diplomatic solutions. It is also common for intelligence agencies to use diplomatic and journalistic personnel to collect and disseminate information. Oftentimes, journalists may have useful perspectives or analyses of international or political situations, even if they are not privy to classified information.[4]

Analysis and Dissemination

Simply having information is not enough; information must be assessed and verified. A great deal of collected information may be inaccurate. "Counter-intelligence" agencies routinely work to prevent and control the dissemination of information, and often spread disinformation in order to confuse or mislead the enemy. For example, during the Cold War both American and Soviet agencies used journalists to disseminate "exclusives" containing doctored and misleading information.[4] In other cases, greed or revenge may drive sources to divulge false information.

Once information is verified, it is assessed in order to determine another's capabilities and vulnerabilities. In many cases, enemy capabilities are analyzed on a set schedule. Imminent threats, such as those between the United States and the Soviet Union during the Cold War, may be continually monitored, while munitions depots may be monitored on a less frequent cycle.

Critical threats are usually maintained in a prioritized file, with important data, places, or situations analyzed on a set schedule. For example, nuclear threats between the USSR and the U.S. were analyzed in real time by staff working round the clock. In contrast, analyses of tank or army deployments are usually triggered by accumulations of fuel and munitions, which are monitored on slower, every-few-days cycles.

Packaging threats and vulnerabilities for decision makers is a crucial part of military intelligence. While intelligence agents do not develop policy or plans of attack, a good intelligence officer will often work closely with decision makers to anticipate their information requirements and tailor the information needed. The quality and amount of information intelligence provides can mean the difference between a successful decision and a disastrous one.

United States

While spies and information gathering processes were heavily used during conflicts like the American Revolution and the American Civil War, there was no official organization devoted to military intelligence until May 1917. Called the MIS (Military Intelligence Section), it grew from a mere three officers and two clerks at inception to 282 officers and 948 civilians by the end of the first World War. MIS produced daily and weekly intelligence summaries covering military, political, social, and economic topics, which were distributed to high level positions like the army chief of staff, the secretary of state, and the president.[5]

The modern-day U.S. intelligence community is made up of many organizations, including the National Security Agency (NSA), the Central Intelligence Agency (CIA), the Defense Intelligence Agency, and organizations within each military branch. Military intelligence is primarily the responsibility of the DIA and intelligence groups within the armed services, but other agencies provide valuable support. Each agency has its own primary function; for example, the NSA is responsible for collecting, processing, and reporting SIGINT (Signals Intelligence), a type of intelligence derived from transmitted signals, including electronic and communication intelligence.

United Kingdom

In the United Kingdom, there are also a number of agencies devoted to different aspects of military intelligence, including the Secret Intelligence Service (SIS), the Security Service, and the Defense Intelligence Staff (DIS). The SIS, also referred to by its historical name "MI6" (Military Intelligence 6), originated in 1909 as the Foreign Section of the Secret Service Bureau, responsible for gathering intelligence overseas. After World War I, it became a separate agency and began to be referred to as the SIS. The Security Service, also known as "MI5" (Military Intelligence 5), also originated in 1909 as part of the Secret Service Bureau, and was responsible for domestic intelligence.

For much of the twentieth century, The Security Service dealt primarily with subversion and Soviet espionage. After the end of the Cold War, the primary focus was changed, and the Security Service considered international counter-terrorism its primary priority. The DIS, part of the Ministry of Defence, was created in 1964, merging the separate intelligence staffs of the armed forces as well as civilian intelligence staff. The primary purpose of the DIS is to analyze intelligence gathered and provide assessments and strategic warnings to the armed forces and other decision makers.

Russia and the Soviet Union

During the Cold War, the Soviet Union had one of the most well known groups of MI and security agencies: the KGB. After the collapse of the Soviet Union, Russia restructured much of the KGB, and, in 1995, formed the FSB (a Russian acronym for "Federal Security Service of the Russian Federation"), responsible for much of Russia's military counterintelligence. The GRU ("Main Intelligence Directorate") is one of the only organizations to retain most of its Soviet-era organization and approach. The main source of Russian military intelligence, the GRU engages in worldwide espionage and intelligence gathering. Other organizations include the SVR ("Foreign Intelligence Service"), a civilian intelligence collection agency which grew out of the KGB's First Chief Directorate, and FAPSI (Federal Agency for Government Communications and Information), created from the KGB's Eighth Chief Directorate, Eighteenth Administration, and Communication Troops. FAPSI's main objective is similar to the United States' NSA, and focuses primarily on electronic intelligence and counter-intelligence, or SIGINT.[6]

France

Like many other countries, France utilized spies long before the advent of a modern intelligence community in the nineteenth century. Spies were used during the Middle Ages, and military intelligence played an important role during the Napoleonic era and the Age of Empire. When World War I began, France had one of the most organized and skilled intelligence forces in the world.[7]

There are MI divisions within each of France's military branches (Army, Navy, and Air Force), as well as within the Ministry of Defense; all are coordinated by the SGDN (National Defense General Secretariat). The DSGE (Directorate for External Security), an agency under the Ministry of Defense, was formed by merging various agencies after World War II, and is responsible for military intelligence, strategic information, electronic intelligence, and counterespionage. The DPSD (Directorate for Defense Protection and Security) is primarily responsible for military counterintelligence and other military securities issues. The BRGE (Intelligence and Electronic Warfare Brigade) was created in 1993, and deals primarily in SIGINT intelligence, operating a number of monitoring facilities.[8]

China

Historically, the Communist Party has controlled much of the military intelligence in China. Before the communists took power in 1949, they used intelligence provided by the Central Department of Social Affairs, enabling them to emerge victorious on the battlefield. Once the Communist Party came to power, the Central Investigation Department was formed. During the 1950s, the Central Investigation Department had an office in every Chinese embassy. In 1977, intelligence officers were recalled from Chinese embassies, instead to be later sent out posing as businessmen, scholars, and journalists. In 1983, the Central Investigation Department was merged with counter-intelligence elements of the Public Security Ministry, and renamed the Ministry of State Security.[9]

Global Impact of Military Intelligence

Military intelligence operations have had an obvious impact on world history. Not only has the acquisition of intelligence, both accurate and inaccurate, influenced the outcome of wars and political negotiations, but it has also greatly influenced the development of technology, particularly in the area of signals intelligence. Without worldwide pressure to develop better and more secure methods of communication (as well as the means of intercepting each newly developed technology), it is unlikely that such advances in the world's communications systems would have occurred as quickly if at all.

Notes

  1. D. F. Buck, “Review of A.D. Lee, Information and Frontiers: Roman Foreign Relations in Late Antiquity (Cambridge: Cambridge University Press, 1993, ISBN 052139256X),” Bryn Mawr Classical Review 94.04.08. Retrieved August 28, 2007.
  2. Wojciech Pieciak, “History of Intelligence: The World's Second-Oldest Profession,” World Press Review (April 2004). Retrieved August 28, 2007.
  3. Duncan Campbell, “Inside Echelon,” Telepolis (July 25, 2000). Retrieved August 28, 2007.
  4. 4.0 4.1 “Tinker, Tailor, Journalist, Spy,” Hardnews (August 2006).
  5. “Winning Smart: A Brief History of Military Intelligence,” The University of Military Intelligence at Fort Huachuca. Retrieved August 28, 2007.
  6. Victor Yasmann, “The KGB has spawned a large set of offspring, but the central purpose of the Russian security services remains the same—the defense of the Russian political elite from domestic and foreign challenges,” PRISM 1(4) (May 26, 1995). The Jamestown Foundation. Retrieved August 28, 2007.
  7. Adrienne Lerner, “France, Intelligence and Security,” The Thomson Corporation. Retrieved August 28, 2007.
  8. John Pike, SGDN - National Defense General Secretariat, Federation of American Scientists: Intelligence Resource Program. Retrieved August 28, 2007.
  9. John Pike, Ministry of State Security History, Federation of American Scientists: Intelligence Resource Program. Retrieved August 28, 2007.

Further Reading

  • Austin, N. J. E. and N. B. Rankov. 1995. Exploratio: Military and Political Intelligence in the Roman World From the Second Punic War to the Battle of Adrianople. London: Routledge. ISBN 0415183014
  • Caesar, Julius. The Civil War. Translated by Jane F. Mitchell, 1967. Baltimore, MD: Penguin Books.
  • Dio, Cassius. Dio's Roman History. Translated by Cary, Earnest. 1916. New York: G.P. Putnam's Sons.
  • Dvornik, Francis. 1974. Origins of Intelligence Services. New Brunswick, NJ: Rutgers University Press. ISBN 0813507642
  • Fuller, J. F. C. 1987. A Military History of the Western World, Vol. 1: From the Earliest Times to the Battle of Lepanto. New York: Da Capo Press. ISBN 0306803046
  • Gabriel, Richard A. and Karen S. Metz. 1991. From Summer to Rome; The Military Capabilities of Ancient Armies. New York: Greenwood Press. ISBN 0313276455
  • Harris, Charles H. and Louis R. Sadler. 1988. The Border and the Revolution: Clandestine Activities of the Mexican Revolution 1910-1920. HighLonesome Books. ISBN 0944383076
  • Keegan, John. 2003. Intelligence in War. New York: Knopf. ISBN 0375400532
  • Landau, Henry. 1937. The Enemy Within: The Inside Story of German Sabotage in America. New York: G.P. Putnam Sons.
  • Mashbir, Sidney F. 1953. I Was An American Spy. Vantage.
  • Miller, Nathan. 1989. Spying for America: The Hidden History of U.S. Intelligence. Dell Publishing. ISBN 1557781869
  • Sayer, Ian and Douglas Botting. 1989. America's Secret Army: The Untold Story of the Counter Intelligence Corps. Franklin Watts Publishers. ISBN 0531150976
  • Tuchman, Barbara W. 1958. The Zimmerman Telegram. Ballantine Books. ISBN 0345324250

External links

All links retrieved November 9, 2022.

Credits

New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here:

The history of this article since it was imported to New World Encyclopedia:

Note: Some restrictions may apply to use of individual images which are separately licensed.