d. Intelligence Operations Require Imagination and Foresight.
Policies and procedures that limit the imagination or initiative of subordinate agencies are avoided.
Intelligence personnel and agencies must be resourceful so that available information can be
developed and exploited to produce intelligence for the user.
e. The Nature of Intelligence Requires Employment of Continuous Security Measures.
Unauthorized personnel must be denied information about operations of intelligence agencies, sources
of information, and the intelligence product.
The effects of compromise of complete intelligence studies and estimates are obvious. The cumulative
effects of compromise of fragmentary information are also dangerous. The compromise of a source
may result in loss or decreased value of that source to the intelligence element exploring it. Some
sources are so susceptible to this that elaborate security systems are required for protection.
Intelligence processing requires the free, complete, and timely exchange of information and intelligence
to permit production of a complete and usable product. Care must be taken to resolve the conflict
between security measures and timely dissemination of information or intelligence to those who need it.
5. Intelligence Cycle.
The activities connected with intelligence operations generally follow a four-phase cycle oriented on the
commander's mission. Supervising and planning are inherent functions involved in all phases of the
intelligence cycle. The four phases are:
Directing the collection effort.
Collecting the information.
Processing the collected information.
Disseminating and using the resulting intelligence.
The intelligence cycle is continuous and all four phases may take place concurrently. At the same time
that new information is being collected by intelligence assets, other information previously collected is
analyzed, processed, and disseminated.