RemNote Community
Community

Source Evaluation and Integration in Collection Management

Understand how to protect sensitive sources, rate and evaluate source reliability and information, and integrate multiple intelligence types for analysis.
Summary
Read Summary
Flashcards
Save Flashcards
Quiz
Take Quiz

Quick Practice

What is the primary risk of using intelligence from sensitive sources?
1 of 11

Summary

Source Sensitivity and Protection Introduction Intelligence agencies face a fundamental challenge: when they use information from sensitive sources—whether human informants, classified surveillance, or specialized collection methods—simply publishing that information can reveal how they obtained it. This creates a critical tension between sharing intelligence and protecting sources. Understanding how intelligence agencies rate sources, evaluate information quality, and maintain source secrecy is essential to understanding how intelligence works in practice. Why Source Protection Matters Intelligence derived from sensitive sources cannot be used without risk. If you share intelligence gathered from a secret informant, you might identify them. If you reveal that you've broken an enemy's communications system, that enemy will immediately change to a different system—and potentially use the old system to feed you false information. When an adversary discovers that a collection method has been compromised—whether it's a broken cryptosystem, a infiltrated network, or an exposed informant—they face a choice. They may simply abandon the old method and adopt a more secure alternative, cutting off future intelligence. Or they may deliberately continue using the old method while feeding false information through it, a tactic called disinformation. Either way, the intelligence agency loses a valuable source. Separating Source Identity from Content To protect sensitive sources while still using their information, intelligence agencies use a systematic process called source anonymization. Early in the collection process—often immediately after receipt—the true identity of the source is stripped away from the report itself. Instead, reports are divided into three separate components: True source identity - held in a secure, restricted file Pseudonyms or code names - used in place of real identities (for example, "Source FALCON" instead of a person's actual name) Content of the report - the actual intelligence information This separation allows the intelligence information to circulate more widely through the organization without revealing who provided it. An analyst may work with the content and the code name, but not have access to the true identity. This way, if the report is compromised or shared with an ally, the actual source remains protected. How Intelligence Sources Are Rated The U.S. intelligence community uses a systematic two-part rating system to characterize both the reliability of the source and the validity of the information. The rating consists of: A source reliability letter (A through F) An information validity number (1 through 6) These are typically written together, such as "A-1" or "C-3." Understanding Source Reliability Ratings The source reliability letter reflects the agency's assessment of how much to trust the source based on their track record: A-rated sources are thoroughly trusted. They have consistently provided accurate information over time and have proven their reliability. E-rated sources have questionable reliability. They may have occasionally provided accurate information but have also been wrong or misleading before. F-rated sources are unreliable. They have repeatedly provided false or unsubstantiated information. How Sources Are Evaluated When rating a source's reliability, analysts consider three key factors: Reporting history is the track record of the source over time. Has this source consistently proven accurate? Have there been incidents where they were clearly wrong? Sources with long histories of accuracy receive higher ratings than those with mixed records. Directness of knowledge distinguishes between primary and secondary sources. A primary source has direct knowledge of what they're reporting—they witnessed the event themselves, or received the information from a direct participant. A secondary source has information that is twice removed from the original event—they heard it from someone who heard it from someone else. Primary sources are generally rated higher because information degrades as it passes through multiple people. Proximity to the event indicates how close the source was to what they're reporting. A direct observer of an event has maximum proximity and should provide the most reliable information. Someone who heard about an event from a participant has less proximity. Someone far removed in time and space has minimal proximity and lower reliability. Appropriateness means matching the source's expertise to the subject matter. A source who is an expert on nuclear technology may be very reliable (A-rated) when reporting on nuclear weapons, but should be rated much lower when reporting on political movements they know nothing about. The same source can have different ratings for different types of reports. Evaluating Information Quality Beyond rating the source itself, intelligence agencies must evaluate the information the source provides. This involves assessing both the quality of the information and whether it makes sense within what analysts already know. Plausibility Assessment Plausibility determines whether a piece of information is believable given what we know about how the world works. Information can be: Certain - clearly true based on supporting evidence Uncertain - could be true or false; lacks definitive confirmation Impossible - contradicts established facts or logical reality However, plausibility assessment requires careful thought about the possibility of deception. Even information that seems certain might be false if it's part of a coordinated disinformation campaign. An adversary might provide accurate information on minor matters to build a source's credibility, then introduce false information on critical topics. Expectability Intelligence analysts assess whether information reasonably follows from other known facts—a concept called expectability. If analysts already know facts A, B, and C, and a source reports fact D, analysts should ask: "Does D naturally follow from A, B, and C? Would we expect D to be true given what we already know?" For example, imagine a source reports that military forces are massing along a border. Traffic analysis (counting vehicle movements) shows a 40% increase in military vehicles in the region. Imagery intelligence reveals new fortifications being constructed. Communications intelligence intercepts show military commanders discussing supply lines for a large operation. Each piece of information alone might be ambiguous, but together they make the expectation of an imminent attack very strong. Each piece of information confirms that the other pieces make sense. Confirmation and Verification Once a report is received and rated, there remains the question of confirmation. A single source, no matter how reliable, can be wrong or deceived. Confirming a report means obtaining the same or similar information from independent sources to verify its accuracy. The responsibility for confirmation depends on the intelligence organization's structure. It may fall to: Analysts who work with the information and can seek additional sources Collectors who obtain the original information and can pursue follow-up collection Both analysts and collectors working together In practice, confirmation often involves looking for supporting evidence from completely different collection methods. If a human source reports that an adversary is moving weapons, and that report is then confirmed by satellite imagery, the confidence in the information increases dramatically because the two sources are independent and different in nature.
Flashcards
What is the primary risk of using intelligence from sensitive sources?
Exposing the methods or persons providing the information.
Why is the true identity of a source removed from reports early in the collection process?
To protect clandestine sources.
Into what three parts are intelligence reports divided to protect source identity?
True source identity Pseudonyms or code names Content of the report
What does an "A" rating indicate regarding an intelligence source?
A thoroughly trusted source.
What does an "E" rating indicate regarding an intelligence source?
A source with questionable reliability.
What three factors determine the rating given to an intelligence source?
Reporting history Direct knowledge of the subject Expertise in the reported area
How is a secondary source defined in intelligence reporting?
A source providing information that is twice removed from the original event.
In source evaluation, what does the term "proximity" indicate?
How close the source was to the event.
In source evaluation, what does the term "appropriateness" measure?
Whether the source's expertise matches the subject matter of the report.
What is the function of intelligence analysis management?
Coordinating analysts, resources, and processes to produce coherent intelligence products.
What is the role of intelligence cycle management?
Overseeing the entire process from collection through dissemination.

Quiz

Who may be responsible for confirming a report?
1 of 8
Key Concepts
Source Management
Source Sensitivity
Source Anonymization
Source Reliability Rating
Information Assessment
Information Validity Rating
Plausibility Assessment
Expectability
Intelligence Collection
Traffic Analysis
Imagery Intelligence (IMINT)
Communications Intelligence (COMINT)
Intelligence Cycle Management