Source Evaluation and Integration in Collection Management
Understand how to protect sensitive sources, rate and evaluate source reliability and information, and integrate multiple intelligence types for analysis.
Summary
Read Summary
Flashcards
Save Flashcards
Quiz
Take Quiz
Quick Practice
What is the primary risk of using intelligence from sensitive sources?
1 of 11
Summary
Source Sensitivity and Protection
Introduction
Intelligence agencies face a fundamental challenge: when they use information from sensitive sources—whether human informants, classified surveillance, or specialized collection methods—simply publishing that information can reveal how they obtained it. This creates a critical tension between sharing intelligence and protecting sources. Understanding how intelligence agencies rate sources, evaluate information quality, and maintain source secrecy is essential to understanding how intelligence works in practice.
Why Source Protection Matters
Intelligence derived from sensitive sources cannot be used without risk. If you share intelligence gathered from a secret informant, you might identify them. If you reveal that you've broken an enemy's communications system, that enemy will immediately change to a different system—and potentially use the old system to feed you false information.
When an adversary discovers that a collection method has been compromised—whether it's a broken cryptosystem, a infiltrated network, or an exposed informant—they face a choice. They may simply abandon the old method and adopt a more secure alternative, cutting off future intelligence. Or they may deliberately continue using the old method while feeding false information through it, a tactic called disinformation. Either way, the intelligence agency loses a valuable source.
Separating Source Identity from Content
To protect sensitive sources while still using their information, intelligence agencies use a systematic process called source anonymization. Early in the collection process—often immediately after receipt—the true identity of the source is stripped away from the report itself.
Instead, reports are divided into three separate components:
True source identity - held in a secure, restricted file
Pseudonyms or code names - used in place of real identities (for example, "Source FALCON" instead of a person's actual name)
Content of the report - the actual intelligence information
This separation allows the intelligence information to circulate more widely through the organization without revealing who provided it. An analyst may work with the content and the code name, but not have access to the true identity. This way, if the report is compromised or shared with an ally, the actual source remains protected.
How Intelligence Sources Are Rated
The U.S. intelligence community uses a systematic two-part rating system to characterize both the reliability of the source and the validity of the information.
The rating consists of:
A source reliability letter (A through F)
An information validity number (1 through 6)
These are typically written together, such as "A-1" or "C-3."
Understanding Source Reliability Ratings
The source reliability letter reflects the agency's assessment of how much to trust the source based on their track record:
A-rated sources are thoroughly trusted. They have consistently provided accurate information over time and have proven their reliability.
E-rated sources have questionable reliability. They may have occasionally provided accurate information but have also been wrong or misleading before.
F-rated sources are unreliable. They have repeatedly provided false or unsubstantiated information.
How Sources Are Evaluated
When rating a source's reliability, analysts consider three key factors:
Reporting history is the track record of the source over time. Has this source consistently proven accurate? Have there been incidents where they were clearly wrong? Sources with long histories of accuracy receive higher ratings than those with mixed records.
Directness of knowledge distinguishes between primary and secondary sources. A primary source has direct knowledge of what they're reporting—they witnessed the event themselves, or received the information from a direct participant. A secondary source has information that is twice removed from the original event—they heard it from someone who heard it from someone else. Primary sources are generally rated higher because information degrades as it passes through multiple people.
Proximity to the event indicates how close the source was to what they're reporting. A direct observer of an event has maximum proximity and should provide the most reliable information. Someone who heard about an event from a participant has less proximity. Someone far removed in time and space has minimal proximity and lower reliability.
Appropriateness means matching the source's expertise to the subject matter. A source who is an expert on nuclear technology may be very reliable (A-rated) when reporting on nuclear weapons, but should be rated much lower when reporting on political movements they know nothing about. The same source can have different ratings for different types of reports.
Evaluating Information Quality
Beyond rating the source itself, intelligence agencies must evaluate the information the source provides. This involves assessing both the quality of the information and whether it makes sense within what analysts already know.
Plausibility Assessment
Plausibility determines whether a piece of information is believable given what we know about how the world works. Information can be:
Certain - clearly true based on supporting evidence
Uncertain - could be true or false; lacks definitive confirmation
Impossible - contradicts established facts or logical reality
However, plausibility assessment requires careful thought about the possibility of deception. Even information that seems certain might be false if it's part of a coordinated disinformation campaign. An adversary might provide accurate information on minor matters to build a source's credibility, then introduce false information on critical topics.
Expectability
Intelligence analysts assess whether information reasonably follows from other known facts—a concept called expectability. If analysts already know facts A, B, and C, and a source reports fact D, analysts should ask: "Does D naturally follow from A, B, and C? Would we expect D to be true given what we already know?"
For example, imagine a source reports that military forces are massing along a border. Traffic analysis (counting vehicle movements) shows a 40% increase in military vehicles in the region. Imagery intelligence reveals new fortifications being constructed. Communications intelligence intercepts show military commanders discussing supply lines for a large operation. Each piece of information alone might be ambiguous, but together they make the expectation of an imminent attack very strong. Each piece of information confirms that the other pieces make sense.
Confirmation and Verification
Once a report is received and rated, there remains the question of confirmation. A single source, no matter how reliable, can be wrong or deceived. Confirming a report means obtaining the same or similar information from independent sources to verify its accuracy.
The responsibility for confirmation depends on the intelligence organization's structure. It may fall to:
Analysts who work with the information and can seek additional sources
Collectors who obtain the original information and can pursue follow-up collection
Both analysts and collectors working together
In practice, confirmation often involves looking for supporting evidence from completely different collection methods. If a human source reports that an adversary is moving weapons, and that report is then confirmed by satellite imagery, the confidence in the information increases dramatically because the two sources are independent and different in nature.
Flashcards
What is the primary risk of using intelligence from sensitive sources?
Exposing the methods or persons providing the information.
Why is the true identity of a source removed from reports early in the collection process?
To protect clandestine sources.
Into what three parts are intelligence reports divided to protect source identity?
True source identity
Pseudonyms or code names
Content of the report
What does an "A" rating indicate regarding an intelligence source?
A thoroughly trusted source.
What does an "E" rating indicate regarding an intelligence source?
A source with questionable reliability.
What three factors determine the rating given to an intelligence source?
Reporting history
Direct knowledge of the subject
Expertise in the reported area
How is a secondary source defined in intelligence reporting?
A source providing information that is twice removed from the original event.
In source evaluation, what does the term "proximity" indicate?
How close the source was to the event.
In source evaluation, what does the term "appropriateness" measure?
Whether the source's expertise matches the subject matter of the report.
What is the function of intelligence analysis management?
Coordinating analysts, resources, and processes to produce coherent intelligence products.
What is the role of intelligence cycle management?
Overseeing the entire process from collection through dissemination.
Quiz
Source Evaluation and Integration in Collection Management Quiz Question 1: Who may be responsible for confirming a report?
- Analysts, collectors, or both. (correct)
- Only senior commanders.
- Only the original source.
- Only the intelligence director.
Source Evaluation and Integration in Collection Management Quiz Question 2: What does an “A” source rating indicate about the source?
- The source is thoroughly trusted (correct)
- The source is somewhat reliable
- The source’s reliability is unknown
- The source is regarded as unreliable
Source Evaluation and Integration in Collection Management Quiz Question 3: What elements are evaluated when assigning a source rating?
- The source’s reporting history, direct knowledge, and expertise (correct)
- The source’s age, nationality, and language proficiency
- The source’s financial status, education, and family ties
- The source’s political affiliation, religious beliefs, and hobbies
Source Evaluation and Integration in Collection Management Quiz Question 4: Which combination of intelligence disciplines can together suggest an imminent attack, making the attack expected?
- Traffic analysis, imagery intelligence, and communications intelligence (correct)
- Human intelligence, open‑source intelligence, and economic analysis
- Signals intelligence, cyber forensics, and weather forecasting
- Geospatial analysis, cultural studies, and bio‑surveillance
Source Evaluation and Integration in Collection Management Quiz Question 5: When an adversary discovers that a cryptographic system they rely on has been broken, which of the following actions best reflects a typical countermeasure?
- Replace or modify the cryptosystem (correct)
- Publicly announce the breach
- Ignore the breach entirely
- Share the broken system with allied nations
Source Evaluation and Integration in Collection Management Quiz Question 6: In the three‑part structure used to protect source identity, which part holds the factual observations and analytical conclusions?
- Report content (correct)
- True source identity
- Pseudonym or code name
- Classification level
Source Evaluation and Integration in Collection Management Quiz Question 7: A plausibility assessment categorizes information as certain, uncertain, or impossible. Which factor is NOT normally considered in this assessment?
- Geographic location of collection (correct)
- Possibility of deliberate deception
- Logical consistency with known facts
- Source reliability rating
Source Evaluation and Integration in Collection Management Quiz Question 8: Which activity falls outside the responsibilities of intelligence cycle management?
- Training analysts in statistical methods (correct)
- Overseeing collection through dissemination
- Prioritizing intelligence requirements
- Evaluating report quality
Who may be responsible for confirming a report?
1 of 8
Key Concepts
Source Management
Source Sensitivity
Source Anonymization
Source Reliability Rating
Information Assessment
Information Validity Rating
Plausibility Assessment
Expectability
Intelligence Collection
Traffic Analysis
Imagery Intelligence (IMINT)
Communications Intelligence (COMINT)
Intelligence Cycle Management
Definitions
Source Sensitivity
Protecting the identity and methods of intelligence sources to avoid exposure and compromise.
Source Anonymization
Removing true source identities from reports and replacing them with pseudonyms or code names.
Source Reliability Rating
A letter‑based system (A‑F) that classifies the trustworthiness of an intelligence source.
Information Validity Rating
A numeric scale (1‑6) that assesses the credibility of specific intelligence content.
Plausibility Assessment
Determining whether reported information is certain, uncertain, or impossible, accounting for possible deception.
Expectability
Judging whether new information logically follows from existing known facts.
Traffic Analysis
Analyzing communication patterns to infer intentions, movements, or upcoming actions.
Imagery Intelligence (IMINT)
Collecting and interpreting visual imagery for intelligence purposes.
Communications Intelligence (COMINT)
Intercepting and analyzing electronic communications to gather intelligence.
Intelligence Cycle Management
Overseeing the complete process from collection through analysis to dissemination of intelligence.