What you will be able to do
After completing this curriculum, you will be able to:
- Distinguish military intelligence from informational, neurological, and sociological conceptions of intelligence
- Describe the five phases of the intelligence cycle and explain how they relate to each other
- Identify the six major collection disciplines and explain the strengths and limitations of each
- Explain how counterintelligence relates to intelligence collection as its defensive complement
- Describe adversarial epistemology and explain why intelligence work differs from scientific inquiry
- Articulate how the emergence of synthetic adversarial ecologies challenges classical intelligence assumptions
Prerequisites
- Familiarity with the distinction between militarism and sociology as disciplines in this library
- No prior knowledge of intelligence work is assumed
Sequence
Lesson 1: What intelligence is and isn’t
Read the intelligence discipline overview. Pay attention to the scope and distinction section — the boundaries between military intelligence and the informational, neurological, and sociological treatments of intelligence are conceptually important and recur throughout the curriculum.
Self-check: Can you explain why the same word — “intelligence” — names different things in neurology, information theory, and military practice? What makes the military usage operationally distinct?
Answer
Military intelligence is knowledge organized for decision under adversarial threat. Neurological intelligence is a property of minds. Informational intelligence concerns signal processing and communication theory. The military concept is operational — it exists to reduce uncertainty for people making decisions under lethal constraint, not to describe cognitive capacity or information flow.
Lesson 2: The intelligence cycle
Read the intelligence cycle concept note. Focus on how each phase feeds the next and how the cycle is recursive rather than linear.
Self-check: A satellite photographs a military formation at a railhead. Walk through each phase of the intelligence cycle for this observation: who directed collection, how the image was collected, what processing is required, what analysis would produce, and how the assessment would be disseminated. What new requirements might analysis generate?
Answer
Direction: a commander or intelligence requirement identified railhead monitoring as a priority, perhaps because rail movement could indicate deployment for attack. Collection: an IMINT satellite tasked to photograph the railhead at a specific time. Processing: the raw image is converted to a standard format, geolocated, and compared against baseline imagery. Analysis: an analyst identifies unit types from vehicle signatures, estimates force size, assesses whether the formation is consistent with deployment, exercise, or routine rotation, and considers this observation alongside SIGINT and HUMINT reporting. Dissemination: the assessment is delivered to the requesting commander in a format and timeline that allows decision-making. New requirements: analysis might generate questions that require HUMINT collection (what is the unit’s mission?) or SIGINT collection (are communications patterns consistent with deployment orders?).
Lesson 3: Collection disciplines
Read the collection disciplines concept note and then each of the individual term definitions: HUMINT, SIGINT, IMINT, OSINT, MASINT, GEOINT.
Self-check: For each of the six collection disciplines, name one thing it can do that no other discipline can, and one limitation that requires another discipline to compensate.
Answer
HUMINT: uniquely accesses intent and context (a source can explain why a formation exists); limited by speed of development and vulnerability to fabrication (requires SIGINT or IMINT corroboration). SIGINT: can collect against many targets simultaneously and intercept operational orders; dependent on adversary using electronic communications (requires HUMINT when the adversary uses couriers). IMINT: provides physical evidence of ground conditions; cannot explain purpose or intent (requires HUMINT or SIGINT context). OSINT: cheapest and most accessible; cannot access classified or concealed information (requires clandestine collection). MASINT: can identify physical properties that are impossible to fabricate (chemical composition, seismic signature); narrow in scope (requires other disciplines for strategic context). GEOINT: integrates spatial data into unified operational picture; depends on IMINT and other inputs for the data it integrates.
Lesson 4: Counterintelligence and the adversarial condition
Read the counterintelligence and wilderness of mirrors term definitions, then the adversarial epistemology concept note.
Self-check: Why is intelligence work fundamentally different from scientific research, even though both produce knowledge through structured inquiry? What does the adversary’s active participation in the information environment do to the analyst’s epistemic position?
Answer
Scientific inquiry assumes nature doesn’t actively deceive; intelligence assumes the adversary is purposefully denying access and feeding false information. The adversary’s participation means every signal in the intelligence environment is potentially contaminated — sources may be doubled, communications may be plants, images may be staged, patterns may be manufactured. The analyst must produce assessments while acknowledging that the information environment itself is hostile. This creates recursive loops that can produce paralysis (the wilderness of mirrors) when the analyst can no longer distinguish genuine intelligence from adversary deception.
Lesson 5: The synthetic turn
Read Agents of Angletonian Wilding (at minimum: sections 1, 2, 5, and 8) and Blakean Lunacy for Post-Angletonian Wildernesses (at minimum: sections 1, 3, 5, and 7).
Self-check: Classical adversarial epistemology assumes human adversaries with stable identities and coherent intentions. What happens to attribution when the adversary is an autonomous computational system with no identity, no intent, and no strategy? How does the Blakean framework propose to maintain analytic coherence under these conditions?
Answer
Attribution collapses across all three components: identity becomes a shifting distribution of forking instances, action fragments across systems and contexts, and intent becomes undecidable because emergent behavior replaces strategic planning. The Blakean framework proposes replacing verification with coherence, identity with relation, prediction with structural insight, and paranoia with disciplined multi-perspectival perception. Instead of asking “who did this and why,” the analyst asks “what relational structures are generating these effects and what constraints define the space of possible futures.”
Next steps
After completing this introductory sequence, deepen your understanding through:
- Pattern Before Person — the Stasi’s analogue precursor to modern pattern-first surveillance
- The Puritan Covenants paper — the institutional genealogy of American intelligence culture
- The combat systems topic, particularly Martial Gesture Grammar — to understand intelligence as field awareness at the individual scale