- •Додаткова
- •Інформаційні ресурси
- •Us army intelligence analisis
- •1 July 2009 tc 2-33.4 2-5
- •Intellectual Humility
- •Intellectual Courage
- •1 July 2009 tc 2-33.4 2-7
- •Intellectual Empathy
- •Intellectual Integrity
- •Intellectual Perseverance
- •Intellectual Autonomy
- •Inductive reasoning
- •1 July 2009 tc 2-33.4 2-9
- •1 July 2009 tc 2-33.4 2-11
- •1 July 2009 tc 2-33.4 2-13
- •1 July 2009 tc 2-33.4 2-13
- •1 July 2009 tc 2-33.4 2-17
- •1 July 2009 tc 2-33.4 2-19
- •1 July 2009 tc 2-33.4 2-21
1 July 2009 tc 2-33.4 2-21
FOR OFFICIAL USE ONLY
Link diagrams.
Network diagrams.
2-102. For more information on link analysis, see chapter 5.
NODAL COMPONENT ANALYSIS
2-103. A node is a point at which subsidiary parts originate or center. Nodal component analysis is the
analysis of how the nodes of a designated system function in relation to one another. Similar to functional
analysis, nodal component analysis assists in identifying critical nodes of the system. A critical node is an
element, position, or command and control entity whose disruption or destruction immediately degrades
the ability of a force to command, control, or effectively conduct operations.
2-104. Analysts working with nodes will spend a great deal of time working with various pieces of
information to assist them in understanding relationships. Relationships can exist between people,
organizations, entities, locations, or any combination of the above. How the various groups interact is as
important as knowing who knows (or should know) who. Relationships are also present within a network
itself. A network is a complex, interconnected group or system which, in some manner, concerns itself with
a specific operation or mission such as mortar fire or IEDs.
PATTERN ANALYSIS
2-105. Pattern analysis is the process of deducing the doctrinal principles and TTP that enemy forces
prefer to employ by carefully observing and evaluating patterns in their activities. When using this
technique, the premise that enemy activities reflect certain identified and interpreted characteristic patterns
is its primary basis. Pattern analysis can be critically important when facing an enemy whose doctrine is
undeveloped or unknown and it is necessary to create a new threat model and threat templates. Combating
insurgency operations is a prime example of this type of analysis. For further information on pattern
analysis, see chapter 5.
ANALYTICAL TERMS
2-106. In order to fully understand intelligence analysis and analytical methodologies used to develop
intelligence products, it is essential to understand the following terms that support analytical production:
Correlation is the process of gathering like or associated information and data. This includes the
use of automated systems to receive data, display data, and parse information into databases.
Under most circumstances computer networks or systems are used to conduct correlation. For
example, reports from a collection system about the 28th Mechanized Infantry Division will be
collected and put into a database on the 28th Mechanized Infantry Division.
Collation is the process of gathering or arranging information in proper sequence and comparing
critically in order to verify and integrate. Computers receive data and collate like items in order
to compare points of agreement or disagreement. Computers can often do a large amount of
work in order to assemble data into a logical arrangement, but it takes an analyst to look at the
information and draw conclusions about the data. It also requires an analyst to provide meaning
to the data, turning it into information and knowledge. Collation is a function conducted by both
humans and computers.
Fusion is the process of taking information from similar or different sources or intelligence
disciplines and creating knowledge. Fusion requires a human to conduct analysis and the
correlation and collation efforts of automated systems to do fusion quickly and effectively. For
example, an analyst may receive reports from a HUMINT source, a UAS, and a SIGINT system
about a particular enemy unit. Taking all three reports, the analyst uses fusion to identify the unit
type and location on the battlefield.