Journal of Scientific Information Research
Keywords
information chain, security intelligence, intelligence process, intelligence operations, security situation, security incidents, security maintenance
Abstract
[Purpose/significance] The security intelligence process is the fundamental path for intelligence to support security governance and decision-making. The incompleteness and even deceptive nature of the information relied up‐on in security intelligence activities, as well as the concealment and adversarial nature of security issues, determine significant differences in the scientific perspective and methodology of constructing security intelligence processes compared to other intelligence processes.
[Method/process] Starting from the analysis of existing problems in the security intelligence process and optimization suggestions, this article constructs a security intelligence process model based on the conceptual model of the intelligence process, based on the information chain theory.
[Result/conclusion] The constructed security intelligence process model emphasizes intelligence requirement management based on security event systems, strategic intelligence research oriented towards conceptualization of security event systems, and operational mechanisms such as the integration of intelligence business flow and security information flow. In addition, this article provides strategies for identifying intelligence requirements, evaluating the reliability of information sources, iterating and upgrading information collection, understanding the meaning of information, protecting intelligence activities, and identifying proactive defense and opportunity creation, among other key questions of the security intelligence process.
First Page
123
Last Page
132
Submission Date
19-Mar-2025
Revision Date
16-Apr-2025
Acceptance Date
21-Apr-2025
Published Date
01-Jul-2025
Reference
[1] GENTTY J A. Lost Promise: How CIA Analysis Misserves the Nation[M]. Lanham, Maryland: University Press of America, 1993.
[2] BERKOWITZ B D, GOODMAN A E. Best Truth: Intelligence in the Information Age[M]. London: Yale University Press, 2000.
[3] LOWENTHAL M M. Intelligence: From Secrets to Policy [M]. 4th ed. Washingtong, D. C. : CQ Press, 2009.
[4] CLARK R M. Intelligence Analysis: A Target-Centric Approach[M]. 2nd ed. Washington, D. C. : CQ Press, 2007.
[5] 高金虎. 军事情报学[M]. 南京: 江苏人民出版社, 2016.
[6] CIA. Fact Book on Intelligence[M]. Washington, D. C. : CIA, 1983.
[7] FBI. Directorate of Intelligence website[EB/OL]. [2024-2-15]. http://www.fbi.gov/about-us/intelligence/intelligence-cycle.
[8] LOWENTHAL M M. Intelligence: From secrets to policy[M]. Washington, D. C. : Congressional Quarterly Press, 2009.
[9] CARL J J, DAVID H. MCELREATH, MELISSA G. Introduction_to_Intelligence_Studies[M]. New York: CRC Press, 2013.
[10] 于伟, 张乐, 苏鹏. 鉴卓识远 刻画事实: 记第59次情报科学读书会[J]. 情报理论与实践, 2022, 45 (12): 208-209.
[11] 钟义信. 统一智能理论[M]. 北京: 科学出版社, 2023.
[12] DON M. Strategic Intelligence: A Handbook for Practitioners, Managers, and Users[M]. UK: The Scarecrow Press Inc, 2009.
[13] 李品. 面向战略决策制定的情报流程模型构建及验证研究[D]. 南京: 南京大学, 2020.
[14] JACK D. A Compendium of analytic tradecraft notes[M]. Washington, D. C. : Center for the study of intelligence, Central intelligence agency, 1997.
[15] 马克·洛文塔尔. 情报: 从秘密到政策[M]. 北京: 金城出版社, 2014.
[16] 李品. 开放科学环境下科技安全的情报保障研究[J]. 情报理论与实践, 2023, 46 (1): 37-44.
[17] 李品. 开放科学环境下科技文献泄密风险防控探析[J]. 情报理论与实践, 2023, 46 (6): 10-16.
[18] 任国军. 美军联合作战情报支援研究[M]. 北京: 军事科学出版社, 2010.
[19] 兰培轩, 魏长春. 情报威慑效果的影响因素研究[J]. 情报杂志, 2023, 42 (6): 19-24, 53.
[20] 靳娟娟. 军事情报活动特点研究[J]. 情报理论与实践, 2000 (4): 248-250.
Digital Object Identifier (DOI)
10.19809/j.cnki.kjqbyj.2025.03.012
Recommended Citation
YANG, Guoli
(2025)
"Research on the Construction and 0perating of Security Intelligence Process Model,"
Journal of Scientific Information Research: Vol. 7:
Iss.
3, Article 12.
DOI: 10.19809/j.cnki.kjqbyj.2025.03.012
Available at:
https://eng.kjqbyj.com/journal/vol7/iss3/12