Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Analysis:
A Target-Centric
Approach
Second Edition
Robert M. Clark
CQPRESS
A Division of Congressional Quarterly Inc.
Washington, D.C.
J
CQ Press To the many graduates of the
1255 22nd St., NW, Suite 400
Washington, DC 20037 Intelligence Community Officers' Course
Phone: 202-729-1900; toll-free, 1-866-4CQ-PRESS (1-866-427-7737) who have helped to shape this second edition
and who must shape the future
Web. www.cqpress com
US. intelligence community.
Copyright 2007 by CQ Press, a division of Congressional Quarterly Inc.
All rights reserved. No pan of this publication may be reproduced or transmitted in any
form or by any means, electronic or mechanical, including photocopy, recording, or
any information storage and retrieval system, without permission in writing from the
publisher.
The paper used in this publication exceeds the requirements of the American Na-
tional Standard for Information SciencesPermanence of Paper for Printed Library
Materials. ANSI: Z39.48-1992.
10 09 08 07 06 1 2 3 4 5
Clark, Robert M.
Intelligence analysis : a target-centric approach / Robert M. Clark 2nd ed.
p. cm.
Includes bibliographical references and index.
ISBN-13: 978-1-933116-93-8 (alk. paper)
ISBN-10: 1-933116-93-5
1. Intelligence serviceMethodology. I. Title.
JF1525.16C548 2006
327.12dc22 2005023267
J
Contents v
Strategic Intelligence 49
Operational Intelligence 50
Tactical Intelligence 50
Preface x The Temporal Analysis Spectrum 51
Long-Term Research versus Current Intelligence 52
Introduction 1 Capabilities, Plans, and Intentions 53
Why We Fail 1 Indications and Warning 54
Failure to Share Information 2 Summary 57
Failure to Analyze Collected Material Objectively 3
Failure of the Customer to Act on Intelligence 4 Part 2 Synthesis: Creating the Model
What the Book Is About 5
Summary 6 5 Overview of Models in Intelligence 58
Creating a Conceptual Model 58
Part 1 Introduction to Target-Centric Analysis Generic Models 59
Lists 59
1 The Intelligence Process 8 Curves 59
The Nature of Intelligence: Reducing Uncertainty in Conflict Comparative Modeling or Benchmarking 61
The Traditional Intelligence Cycle 10 Pattern Models 62
Intelligence as a Target-Centric Process 13 Relationship Models 65
The Target 17 Profiles 72
The Target as a Complex System 17 Process Models 74
The Complex Target as a Network 19 Simulation 75
Summary 22 Combination Models 78
Geospatial Models 78
2 Defining the Intelligence Problem 24 Space-Time Models 80
Statement of the Problem 25 Geographic Profiling 80
The Problem Definition Product 27 Summary 81
Detailed Problem Definition: Strategies-to-Task 27
6 Sources of Intelligence Information 83
Strategies-to-Task and Complex Problems 30
Example; Defining the Counterintelligence Problem 32 Existing Reports 83
Summary 33 A Taxonomy of Intelligence Sburces 84
The Dominant Intelligence Sources 86
3 An Analysis Approach to the Target 35 Open Source 86
The Concept of a Model 36 Human Intelligence 89
Using Target Models for Analysis 39 Communications Intelligence 95
Counterintelligence Analysis 41 Imagery Intelligence 100
Analysis: Targets, Operations, and Linkages 41 Specialized Technical Collection 102
Target Model Combinations 43 Remote Sensing 103
Submodels 43 In Situ Sensors 103
Collateral Models 43 Electronic Intelligence 104
Summary 46 Telemetry 105
vi Contents Contents vii
T wo events between the years 2001 and 2005 focused the world's attention
on apparent failures of the U.S. intelligence communitythe terrorist at-
used in organizational planning and problem solving, science and engineering,
law, and economics. In many cases, these are tools and techniques that have
tacks on U.S. soil of September 11, 2001, and the U.S.-led invasion into Iraq, endured despite dramatic changes in information technology over the past
more commonly called the Iraq war, on March 20, 2003. Each event caused fifty years. All can be useful in making intelligence predictions, even in seem-
enough consternation within the United States to spawn bipartisan commis- ingly unrelated fields. In fact, a number of unifying concepts can be drawn
sions of inquiry, resulting in the 9/11 Commission report (published in Sep- from these disciplines and applied when creating scenarios of the future, as-
tember 2004) and the Iraqi Weapons of Mass Destruction (WMD) Commission sessing forces, and monitoring indicators. The book highlights these concepts
report (published in March 2005). These two documents have provided per- in "Analysis Principles" boxes and treats them as fundamental principles of in-
haps the most detailed assessments of intelligence failures ever written at the telligence analysis. These principles should make the book a valuable refer-
unclassified level. The reports have led directly to dramatic changes in the ence even as the world continues to change.
structure and function of the U.S. intelligence community. This book is written primarily for the practicing intelligence analyst, al-
Most books on intelligence, whether critical or descriptive, focus on struc- though it will be of interest to all intelligence professionals, students, and cus-
ture and function. But if an intelligence comrmmiiy is interested in real im- tomers of intelligence. Intelligence professionals can spend their entire careers
provement, it must begin by rethinking process; the form and structure of a on specialized topics, such as behavioral analysis, and many books are devoted
new community will naturally follow. A major contribution of both the 9/11 to topics covered only briefly here. This book, rather, is intended as a general
and the Iraqi WMD Commissions was their focus on a failed process. Thus, guide, with references to lead the reader to in-depth studies and reports on spe-
the first objective of this book is to redefine the intelligence processspecifi- cific techniques. But it also goes beyond that in defining a better intelligence
cally the analytic processto help make all pans of what is commonly referred analysis process, putting specific analysis techniques in context, and showing
to as the "intelligence cycle" run smoothly and effectively how they interrelate within the process. The book offers insights that intelli-
The intelligence process should accomplish three basic tasks. First, it should gence consumers and analysts alike need to become more proactive in the
make it easy for customers to ask questions. Second, it should use the existing changing world of intelligence and to extract intelligence that is more useful.
base of intelligence information to provide immediate responses to the cus- This second edition has been prepared primarily in response to suggestions
tomer. Third, it should manage the expeditious creation of new information to made by readers. The first edition's wide use in academia and by government
answer remaining questions. To do these things intelligence must be collabora- agencies and contractors resulted in a number of excellent recommendations,
tive and predictive: collaborative to engage all participants while making it easy and 1 have attempted to incorporate those ideas throughout. The format has
for customers to ask questions and get answers; predictive because intelligence been reorganized to present a more logical flow that begins with problem de-
customers above all else want to know what will happen next. finition. Several current examples have been added to emphasize lessons about
What I call a target-centric intelligence process helps analysts and customers the intelligence process. A number of chapters have been rewritten to define a
accomplish these three tasks fay bringing together all participants in process that would address the shortcomings identified in the Iraqi WMD
the production of sound intelligence. Although intelligence communities are Commission report. Specifically, new sections on counterintelligence analysis
organized hierarchically, the target-centric process outlines a collaborative ap- and analysis of competing alternatives are included; a concluding chapter on
proach for intelligence collectors, analysts, and consumers to operate cohesively "The Analyst and the Customer" discusses differences among the many cus-
against increasingly complex enemies. Customers cannot simply be provided tomers of intelligence and how to address their intelligence needs. Three new
with more intelligence; they already have more information than they can chapters focus on technology and systems analysis, denial and deception, and
collection strategies. Finally, the new appendix contrasts two remarkably dif-
xii Preface
ferent National Intelligence Estimates that illustrate the mam points presented
in the book.
All statements of fact, opinion, or analysis expressed are those of the author
and do not reflect the official positions or views of the CIA or any other U.S.
government agency Nothing in the contents should be construed as asserting
or implying U.S. government authentication of information or agency en-
dorsement of the author's views. This material has been reviewed by the CIA Introduction
to prevent the disclosure of classified information.
was closely lied to the Israeli cabinet and often served both as pol- teams that are necessary to deal with complex problems of todaywill quickly
icy advocate and information assessor. Furthermore, Israel's past fall apart.5
military successes had led to a certain amount of hubris and belief Nevertheless, the Iraqi WMD Commission (the Commission on the Intel-
in inherent Israeli superiority: Israel's leaders considered their over- ligence Capabilities of the United States Regarding Weapons of Mass Destruc-
whelming military advantage a deterrent to attack They assumed tion, which issued its formal report to the president in March 2005) found that
that Egypt needed to rebuild its air force and forge an alliance with analysts failed to work as a team.6 They did not effectively share information.
Syria before attacking. In this atmosphere, Israeli intelligence was And the root causes for the failure to share remain, in the U.S. intelligence
vulnerable to what became a successful Egyptian deception opera- community as well as in almost all intelligence services worldwide.
tion. The Israeli intelligence officer who correctly predicted the im- Sharing requires openness. But any organization that requires secrecy to
pending attack had his report suppressed by his superior, the chief perform its duties will struggle with, and often reject, openness.7 Most govern-
intelligence officer of the Israeli Southern Command. The Israeli mental intelligence organizations, including the U.S. intelligence community,
Defense Force was caught by surprise when, without a rebuilt air place more emphasis on secrecy than on effectiveness." The penalty for pro-
force and having kept their agreement with Syria secret, the Egyp- ducing poor intelligence is modest. The penalty for improperly handling clas-
tians launched an attack on Yom Kippur, October 6, 1973. The sified information can be career ending.9 Commercial organizations are more
attack was ultimately repulsed, but only at a high cost in Israeli effective at intelligence sharing because they tend to place more emphasis on
casualties.3 effectiveness than on secrecy; but they also have less risk of losing critical
Falkland islands, 1982. Argentina wanted Great Britain to hand over sources due to compromise.
the Falkland Islands, which Britain had occupied and colonized in Experts on any subject have an information advantage, and they tend to
1837. Britain's tactic was to conduct prolonged diplomatic negotia- use that advantage to serve their own agendas.10 Collectors and analysts are no
tions without giving up the islands. There was abundant evidence different. At lower levels in the organization, hoarding information may have
of Argentine intent to invade, including a report of an Argentine job security benefits. At senior levels, unique knowledge may help protect the
naval task force headed for the Falklands With a marine amphibious organizational budget. So the natural tendency is to share the minimum nec-
force. But the British Foreign and Commonwealth Office did not essary to avoid criticism and to protect the really valuable material. Any bu-
want to face the possibility of an Argentine attack because il would reaucracy has a wealth of tools for hoarding information, and this book dis-
be costly to deter or repulse. Britains Latin America Current Intelli- cusses the most common of them.
gence Group (dominated at the time by the Foreign and Common- Finally, both collectors of intelligence and analysts find it easy to be insu-
wealth OfEce) accordingly concluded, on March 30, 1982, that an lar. They are disinclined to draw on resources outside their own organiza-
invasion was not imminent. On April 2, Argentine marines landed tions." Communication takes time and effort. It has long-term payoffs in ac-
and occupied the Falklands, provoking the British to assemble a cess to intelligence from other sources, but few short-term benefits.
naval task force and retake the islands.4 In summary, collectors, analysts, and intelligence organizations have a
number of incentives to conceal information and see too few benefits in shar-
The common theme of these and many other intelligence failures dis- ing it. The problem is likely to persist until the incentives to share outweigh
cussed in this book is not the failure to collect intelligence. In each of these the benefits of concealment.
cases, the intelligence had been collected. Three themes are common in intel-
ligence failures. Failure to Analyze Collected Material Objectively
to Share Information In each of the cases cited at the beginning of this introduction, intelligence
analysts or national leaders were locked into a mindsetthe consistent thread in
From Pearl Harbor to 9/11 and the Iraqi weapons of mass destruction analytical failures. Falling into the trap that Louis Pasteur warned about in the
(WMD) miscall, the inability or unwillingness of collectors and analysts to observation that I quoted above, they believed because, consciously or uncon-
share intelligence has been a recurring cause of failure. sciously, they wished it to be so. Mindset can manifest itself in the form of many
Intelligence is a team sport. Effective teams require cohesion, formal and biases and preconceptions, a short list of which would include the following;
informal communication, cooperation, shared mental models, and similar
knowledge structures all of which contribute to sharing of information. Ethnocentric bias involves projecting one's own cultural beliefs and
Without such a common process, any team especially the interdisciplinary expectations on others. It leads to the creation of a "mirror-image"
4 Introduction Introduction
model, which looks at others as one looks at oneself, and to the as- In this book I devote considerable discussion to the vital importance of
sumption that others will act "rationally" as that is defined in one's analysts' being able objectively to assess and understand their customers and
own culture- The Yom Kippur attack was not predicted because, their customers' business or field. The first part of the book describes a col-
from Israel's point of view, it was irrational for Egypt to attack with- laborative, "target-centric" approach to intelligence analysis that demands a
out extensive preparation. close working relationship among all stakeholders, including the customer, as
Wishful thinking involves excessive optimism or avoiding unpleas- the means to gain the clearest conception of needs and the most effective re-
ant choices in analysis. The British Foreign Office did not predict sults or products. The last chapter of the book discusses ways to ensure that
an Argentine invasion of the Falklands because, in spite of intelli- the customer takes the best available intelligence into account when making
gence evidence that an invasion was imminent, they did not want decisions.
to deal with it. Josef Stalin made an identical mistake for the same Intelligence analysts have often been reluctant to closely engage one class
reason prior to Operation Barbarossa. of customerthe policymakers. In its early years the CIA attempted to remain
Parochial interests cause organizational loyalties or personal agen- aloof from its policymaking intelligence customers to avoid losing objectivity in
das to affect the analysis process. the national intelligence estimates process.15 The disadvantages of that separa-
tion became apparent, as analysis was not addressing the customer's current in-
Status quo biases cause analysts to assume that events will proceed
terests, and intelligence was becoming less useful to policymaking. During the
along a straight line. The safest weather prediction, after all, is that
1970s CIA senior analysts began to expand contacts with policymakers. As
tomorrow's weather will be like todays. An extreme case is the story
both the Falklands and Yom Kippur examples illustrate, such closeness has its
of the British intelligence officer who, on retiring in 1950 after forty-
risks. But in many cases analysts have been able to work closely with policy-
seven years' service, reminisced: "Year after year the worriers and
makers and to make intelligence analyses relevant without losing objectivity.
fretters would come to me with awful predictions of the outbreak of
war. 1 denied it each time. I was only wrong twice,"12 The status quo What the Book Is About
bias causes analysts to fail to catch a change in the pattern.
This book is for intelligence analysts, and it develops a process for suc-
Premature closure results when analysts make early judgments cessful analysisincluding avoiding those three themes of failure.
aboui the solution to a problem and then defend the initial judg- Studies have found that no baseline, standard analytic method exists in
ments tenaciously This can lead the analyst to select (usually with- the U.S. intelligence community. Any large intelligence community is made up
out conscious awareness) subsequent evidence that supports the of a variety of disciplines, each with its own analytic methodology.16 Further-
favored solution and to reject (or dismiss as unimportant) evidence more, intelligence analysts routinely generate ad hoc methods to solve specific
that conflicts with it.
analytic problems. This individualistic approach to analysis has resulted in a
great variety of analytic methods, more than 160 of which have been identi-
All of these mindsets can lead to poor assumptions and bad intelligence if fied as available to U.S. intelligence analysts.17
not challenged. And as the Iraqi WMD Commission report notes, analysts too There are good reasons for this proliferation of methods. Methodologies
often allow unchallenged assumptions to drive their analysis,13 are developed to handle very specific problems, and they are often unique to
Failure of the Customer to Act on Intelligence a discipline, such as economic dr scientific and technical (S&T) analysis
(which probably has the largest collection of problem-solving methodologies).
In some cases, as in Operation Barbarossa and the Falkland Islands affair, As an example of how methodologies proliferate, after the Soviet Union col-
the intelligence customer failed to understand or make use of the available lapsed, economists who had spent their entire professional lives analyzing a
intelligence.
command economy were suddenly confronted with free market prices and
A senior State Department official once remarked, half in jest, "There are privatization. No model existed anywhere for such an economic transition,
no policy failures; there are only policy successes and intelligence failures."14 and analysts had to devise from scratch methods to, for example, gauge the
The remark rankles intelligence officers, but it should be read as a call to ac- size of Russia's private sector.18
tion. Intelligence analysts should accept partial responsibility when their cus- But all intelligence analysis methods derive from a fundamental process.
tomer fails to make use of the intelligence provided, and also accept the chal- This book is about that process. It develops the idea of creating a model of the
lenges to engage the customer during the analysis process and to ensure that intelligence target and extracting useful information from that model, These
the resulting intelligence is taken into account when the customer must act. two stepsthe first called synthesis and the second called analysismake up
what is known as intelligence analysis. All analysis naturally do this. The key
5. Rob Johnson, Analytic Culture in iheU.S. Intelligence Community (Washington. D.C.: Center for
to avoiding failures is to share the model with collectors of information and the Study of Intelligence, Central Intelligence Agency, 2005). 70.
customers of intelligence. While there are no universal methods that work for 6. Report of the Commission on the Intelligence Capabilities o/lhe United Slates Regarding Weapons of
all problems, a basic process does in fact exist. Mass Destruction, March 31, 2005, Overview
There also are standard, widely used techniques. An analyst must have a 7. Johnson. Analytic Culture, xvi.
repertoire of them to apply in solving intelligence problems. They might in- 8. Ibid., 1 1 .
9. There exists some justification for the harsh penalty placed on improper use of classified in-
clude pattern analysis, trend prediction, literature assessment, and statistical formation; it can compromise and end a billion-dollar collection program or get people killed.
analysis. A number of these techniques are presented throughout the book in 10 Steven D. Leavitt and Stephen J. Dubner, Freakonomics (New York: HarperCollins, 2005), 13.
the form of analysis principles. These analysis techniques together form a 11. Johnson, Anolylie Culture. 29.
problem-solving process that can help to avoid the intelligence blunders dis- 12. Amory Lovins andL. Hunler Lovins, "The Fragility of Domestic Energy," Atlantic Monthly, No-
cussed earlier. vember 1983, 118.
13. Report of the Commission.
Sherman Kent noted that an analyst has three wishes: "To know every- 14. William Prillaman and Michael Dempsey, "Mything the Point. What's Wrong with the Con-
thing. To be believed. And to exercise a positive influence on policy."w This ventional Wisdom about the CIA," Intelligence and National Security 19, no. 1 (March 2004)1
book will not result m an analysts being able to know everythingthat is why 1-28
we will continue to have estimates. But chapters 1 to 14 should help an ana- 15. Harold P Ford, Estimative Intelligence (Lanham, Md.. University Press of America, 1993), 107.
lyst to learn the tradecraft of analysis, and chapter 15 is intended to help an 16. Johnson, Analytic Culture, xvii.
analyst move toward the second and third wishes. 17. Ibid... 72.
18. Center for the Study of Intelligence, Central Intelligence Agency. 'Watching the Bear: Essays
on CIA's Analysis of the Soviet Union," conference, Princeton University, March 2001,
Summary www.cia.gov/cisybooks/watchingthebear/aiticle08.html, p. 8.
Intelligence failures have three common themes that have a long history: 19. Ibid, p. 12.
This book is about an intelligence process that can reduce such failures. A
large intelligence community develops many analytic methods to deal with the
variety of issues that it confronts. But the methods all work within a funda-
mental process: creating a model of the intelligence target (synthesis) and ex-
tracting useful information from that model (analysis). Success comes from
sharing the target model with collectors and customers.
Notes
1. John Hughes-Wilson, Military IfitdKgeftceBlunders (New York: Carrel! and Graf, 1999), 38.
2. Ibid., 102
3 Ibid, 218
4. Ibid., 260
The Intelligence cracess
two or more parties' ideas or interests, conflict is not necessarily physical com-
bat. If competition or negotiation exists, then two or more groups are in conflict.
There can be many different levels of conflict, ranging from friendly competition
to armed combat. Context determines whether another party is an opponent or
G eorge Lucas's original Star Wars movie describes the final stages of a
human intelligence operation. The heroine, Princess Leia, obtains the
How, then, is intelligence any different from the market research that many
companies conduct or from traditional research as it is carried out in labora-
plans for the evil Galactic Empire's ultimate battle machine, ihe Death Star, tories, think tanks, and academia? After all, those types of research are also
from the robot R2-D2, which is functioning as a mobile dead drop.' Leia gives intended to reduce uncertainty. The answer is that most of the methods of in-
the plans to the rebel forces, whose scientific intelligence analyst briefs the telligence and nonintelligence research are identical, with one important dis-
rebel command on the plans, pinpoints (he weak spot on the Death Star, and tinction: In intelligence, when accurate information is not available through
presents a brilliant analysis of the enemy defenses. Rebel fighter jockeys deliver traditional (and less expensive) means, then a wide range of specialized tech-
proton torpedoes to the weak spot and destroy the Death Star. End of movie. niques and methods unique to the intelligence field are called into play. Aca-
This Star Wan vignette accurately summarizes the intelligence process as demics are unlikely to have intercepted telephone communications at their
it is popularly viewed. The people who collect intelligence information and ex- disposal as a means for collection and analysis. Nor must academics deal fre-
ecute the operations get the glory, the press, and the money. The intelligence quently with concealment, denial, or deception.
analyst, working behind the scenes, gets the interesting problems to solve to Because intelligence is about conflict, it supports operations such as mili-
make it all work. tary planning and combat, diplomatic negotiations, trade negotiations and
Although the popular focus is on collection, most of (he major failures in commerce policy, and law enforcement. The primary customer of intelligence
intelligence are due to inadequate or nonexistent analysis, and most of the rest is the person who will act on the informationthe executive, the decision
are due to failure to act on the analysis, as noted in the introduction. The in- maker, the combat commander, or the law enforcement officer. Writers there-
formation is usually there, at least in hindsight. So, unfortunately, is a large fore describe intelligence as being actionable information. Not all actionable in-
volume of irrelevant material that has to be examined and discarded All in- formation is intelligence, however. A weather report is actionable, but it is not
telligence organizations today are saturated wirh incoming information. Fur- intelligence.
thermore, in large intelligence communities critical information about an in- What distinguishes intelligence from plain news is support for operations.
telligence matter may not be effectively shared because the intelligence activity The operations customer does (or should do) something about intelligence,
is organized around the flawed concept of an "intelligence cycle." Before we whereas TV viewers normally do not do anything about the news-though they
explore this flawed concept we should define the term intelligence. may do something about the weather report. The same information can be both
intelligence and news, of course: Food riots in Somalia can be both if the cus-
The Nature of Intelligence: Reducing Uncertainty in Conflict
tomer takes action on the information.
Intelligence is about reducing uncertainty in conflict. Because conflict can Finally, intelligence is always concerned with a target. The target is an
consist of any competitive or opposing action resulting From the divergence of entitytypically a person, organization, network, facility, or piece of equipment
about which the customers knowledge is incomplete or concerning which the
customer has questions. (As we will get to later, the target is also a system.) In gence (HUMINT) operatives have to ask questions of sources with knowledge
the Star Wars example the target was the Death Star. The rebel intelligence ef- of Ethiopian internal affairs.
fort supported operations by locating its weak point. From there, the information has to be processed. Foreign language mater-
Logic dictates that the intelligence process should revolve around how ial must be translated. Encrypted signals must be decrypted. Film or digital sig-
best to approach the target. That is exactly whai the remainder of this book is nals must be translated into visible imagery. Responses from HUMINT sources
concerned with: the steps to solving an intelligence problem, using a target- must be validated and organized into a report format.
centric approach This process is different from that depicted in most intro- The newly collected and processed material must be brought together
ductory texts and courses, but it is the new direction that intelligence is tak- with relevant histoncal material to create intelligence in an analysis phase. An
ing in practice A brief review of the traditional intelligence cycle will illustrate analyst must create outcome scenarios based on the current Ethiopian situa-
why: tion, generate profiles of Ethiopian leaders, and assess their likely responses to
possible events. The analysis phase also typically includes a peer and supervi-
The Traditional Intelligence Cycle sory review of the finished product, except in fast-moving, combat intelligence
Intelligence has traditionally been described as following a series of steps situations, in which simple fusion (discussed in chapter 4) is done.
called the intelligence cycle. Figure 1-1 illustrates (he cycle in elementary form. The finished intelligence must be disseminated to the customer in a writ-
The cycle typically begins with a requirements or needs step, which amounts ten report (usually sent electronically) or a briefing. Then comes a transition
to a definition of the intelligence problem. Usually it takes the form of a rather to new requirements or needs, and a new cycle begins.
general question from an intelligence customer, such as, How stable is the gov- Over the years, the intelligence cycle has become almost a theological con-
ernment of Ethiopia? cept: No one questions its validity. Yet when pressed, many intelligence officers
Then comes planning, or directiondetermining how the other compo- admit that the intelligence process "really doesn't work like that.'' In other
nents of the cycle will address the problem. Collectors have to be tasked to words, effective intelligence efforts are not cycles. Here are some reasons why.
gather missing bits of information. Analysts have to be assigned to do research The cycle defines an antisocial series of steps that constrains the flow of in-
and write a report on Ethiopian government stability formation. It separates collectors from processors from analysts and too often
The cycle then proceeds to collection, or gathering information. Ethiopian results in "throwing information over the wall" to become the next person's re-
newspapers have to be acquired. Communications intelligence (COM1NT) sponsibility. Everyone neatly avoids responsibility for the quality of the final
has to be focused on Ethiopian government communications. Human imelli- product. Because such a compartmentalized process results in formalised and
relatively inflexible requirements at each stage, it is more predictable and there-
fore more vulnerable to an opponent's countermeasures. In intelligence, as in
most forms of conflict, if you can predict what your opponents will do, you can
Figure 1-1 Traditional Intelligence Cycle
defeat them.
The cycle-defined view, when it considers the customer at all, tends to
treat the customer in the abstract as a monolithic entity. The feedback loop in-
herent in a true cycle is absent; a gap exists between dissemination and needs.
Customers, being outside the loop, cannot make their changing needs known.
v
Why does this gap exist?
In government, intelligence officers and policymakers often are almost to-
tally ignorant of one another's business.s In the military the gap may be less se-
verethe importance of intelligence has been ingrained in military culture
over a long time. But as in the civilian side of government, an organizational
demarcation usually exists. Most commanders and their staffs have not had in-
telligence assignments, and intelligence officers usually have not had opera-
tions assignments. They tend to speak different jargons, and their definitions
Note The dotted line represents the transition from one cycle to the of what is important in an operation differ. Military intelligence officers often
next, during which the customer reviews the analysis product and for-
" ' i new requirements and needs. know more about an opponent's capability than they do about their own unit's
capability, and the commander too often has the inverse problem.
In large intelligence organizations, such as those of the U.S. government, The cycle is still with us, however, because it embodies a convenient way
the collection element (see Figure 1-1) typically" is well organized, well funded, to organize and manage intelligence communities like those in large govern-
and automated to handle high volumes of traffic. In comrast, the step wherein ments and large military organizations. And it is in some respects a defensive
one moves from disseminated intelligence to new requirements is almost com- measure; it makes it difficult to pinpoint responsibility for intelligence failures.
pletely unfunded and requires extensive feedback from intelligence consumers. Fifty years ago, the automobile production "cycle" looked a lot like the
The system depends on a consumer's voicing his needs. Military organizations traditional intelligence cycle. Marketing staff would come up with require-
have a formal system for that to occur. Policy makers do not. The policy ments for new cars. Designers would create a design and feed it to production.
maker's input is largely informal, dependent on feedback to the analyst, and
Production would retool the factory and produce the cars in a long assembly
often passes through several intermediaries. And for the newest class of con-
line. The cars came out at the end and went to a sales force that sold the cars
sumers of U.S. intelligencelaw enforcementthe feedback is rudimentary
to customers. And then marketing started on a new requirements set, begin-
No entity has the clear responsibility to close the loop. Analysts and their man-
ning the cycle anew. No one had responsibility for the final result. Today au-
agers, who normally have the closes! ties to intelligence customers, usually de-
tomobile production is a team effortwith marketing, sales, design, and pro-
termine customer needs. But it is too often a hit-or-miss proposition because it
duction staff sitting in the same room with consumer representatives, working
depends on the inclination of analysts who are dealing with other pressing
problems. together on a common target: the new automobile. This complex, interactive,
collaborative, and social process results in faster production of higher quality,
The traditional conception of the intelligence cycle also prevails because it
fits a conventional paradigm for problem solving. It flows logically from the more market-oriented products.
precept that the best way to work on an intelligence problem is lo follow a se- Although producing intelligence is a more complex undertaking than au-
quential, orderly, and linear process, working from the question (the problem) tomobile manufacturing, the interactive approach works for both This book
to the answer (the solution). One begins by understanding the question; the defines an alternative approach, one that is gaining currency in intelligence
next step is to gather and analyze data. Analysis techniques are then applied to communities, for a world where intelligence problems are becoming increas-
answer the question. This pattern of thinking is taught in the simplest problem- ingly complex.
solving texts, and we use it almost instinctively. In fact, conventional wisdom
says that the more complex the problem, the more important it is to follow this Intelligence as a Target-Centric Process
orderly flow. The flaw of this linear problem-solving approach is that it obscures An alternative to the traditional intelligence cycle is to make all stake-
the real, underlying cognitive process: The mind does not work linearlyit holders (including customers) part of the intelligence process. Stakeholders in
jumps around to different parts of [he problem in the process of reaching a so- the intelligence community include collectors, processors, analysts, and the
lution. In practice, intelligence officers might jump from analysis back to col- people who plan for and build systems to support them. U.S. customers on a
lection, then to requirements, to collection again, then back to analysis, in what given issue could include, for example, the president, the National Security
seems a very untidy process, and which in no way resembles a cycle. Council staff, military command headquarters, diplomats, the Department of
U.S. intelligence analysis guru Sherman Kent noted that the problems Homeland Security, local law enforcement, and the commanders of U.S. naval
with the intelligence cyclethe compartmentation of participants, the gap be- vessels. To include them in the intelligence process, the cycle must be rede-
tween dissemination and needs, and the attempt to make linear a nonlinear fined, not for convenience of implementation in a traditional organizational hi-
processare worse in large organisations and in situations far removed from erarchy but so that the process can take full advantage of evolving information
the heat of conflict.4 As Keith Hall, former director of the National Reconnais- technology and handle complex problems.
sance Office, observed, "During crisis the seams go away and all the various Figure 1-2 defines this target-centric, or objective-oriented, view of the in-
players pull together to create end-to-end solutions . . . but we don't do that telligence process. Here the goal is to construct a shared picture of the target,
well in a noncrisis situation.''5
from which all participants can extract the elements they need to do their jobs
In summary, the traditional cycle may adequately describe the structure and to which all can contribute from their resources or knowledge, so as to
and function of an intelligence community, but it does not describe the intel- create a more accurate target picture. It is not a linear process, nor is it a cycle
ligence process. In the evolving world of information technology, the tradi- (though it contains many feedback loops, or cycles); it is a network process, a
tional cycle may be even less relevant. Informal networks (communities of in- social process, with all participants focused on the objective. It has been accu-
terest) increasingly are forming to address the problems that Kent identified rately described within the U.S. intelligence community as a "network-centric
and enable a nonlinear intelligence process using secure Web technology
collaboration process."6
Chapter One The Intelligence process
Figure 1-2 Target-Centric View of the Intelligence Process nancial information from other sources. The operations team focused on find-
ing Escobar; the intelligence analysts who supported them had a more exten-
sive target that included Escobar's family, his business associates, his bankers,
and his agents in the Colombian government. Escobar would not have been
caught if the intelligence search had focused solely on him and had ignored his
network.
In the Escobar case, as in other, less time-critical operations, intelligence
analysis is implicit and pervasive. But it is not all done by analysts. The cus-
Analysis: answers, tomers and the providers of information also participate and will do so
actionable intelligence
whether the analyst welcomes it or not. Both customers and providers possess
valuable insights about the target, and both want their insights included in the
final analytical product. However, someone must make the process work: cre-
In the process depicted in Figure 1-2, customers who have operational ate and maintain the picture of the target, elicit customer needs and change
problems look at the current state of knowledge about the target (the current them into requirements for new information, accept new information and in-
target picture) and identify the information they need. Intelligence analysts, corporate it into the target picture, and then extract actionable intelligence and
working with collectors who share the same target picture, translate the needs ensure that it gets to the customer. All of these are functions that analysts have
into "knowledge gaps" or "information requirements" for the collectors to ad- always performed. In the target-centric process, analysts still perform these
dress. As collectors obtain the needed information, it is incorporated into the functions, but collectors and customers can see into the process and have
shared target picture. From this picture, analysts extract actionable intelligence, more opportunity lo contribute to it. The analyst's job becomes more like that
which they provide to the customers, who may in turn add their own insights of a process manager and a conduit of information to ihe other participants.
to the shared target picture. They may also add new information needs. The team-generated picture of the target is intended to facilitate and en-
Let us bring some meaning to the process shown in Figure 1-2: The date courage interaction among collectors, analysts, and customers, who may be
is December 2,1993. Colombian police lieutenant Hugo Martinez watches the geographically remote from one another, via an electronic web. Because the
signal display on his computer screen and listens to his headphones as his team view is more interactive, or social, than the intelligence cycle view, it is a
police surveillance van moves through the streets of Medellin, Colombia. Elec- better way to handle complex problems. Because all participants share knowl-
tronic intelligence has traced the cell telephone calls of drug kingpin Pablo edge of the target, they are better able to identify gaps in knowledge and un-
Escobar to this neighborhood. Martinez is trying to find the exact house derstand the important issues surrounding the target. The team-gene rated
where a desperate Escobar is talking to his son about getting the family out of view brings the full resources of the team to bear on the target. During U.S.
Colombia. operations in Afghanistan in 2002, intelligence officers used screens similar to
The signal on the computer screen and in the headphones strengthens Internet chat rooms to share data in an interactive process that in no way re-
and peaks. The van stops next to a house, and Martinez looks up to see a fat sembled the traditional intelligence cycle," and they continued that successful
man standing at a window, holding a cell phone. The man turns away, and the pattern during Operation Iraqi Freedom. But the method that has worked at
cell phone conversation abruptly ends. Martinez reports to his commander: the tactical level remains a work in progress at the national intelligence level.
"I've got him located. He's in this house," The commander snaps out orders for As the WMD Commission report says, "Information sharing still depends too
all units to converge and surround the building. Five police officers force their much on physical co-location and personal relationships as opposed to inte-
way in the front door and exchange gunshots with the occupants. Ten minutes grated, Community-wide information networks.""
later, the gunfire stops. On the building rooftop, Pablo Escobar lies dead.7 The process shown in Figure 1-2 is resilient. Because the participants col-
This example, a true story, was the end of an intense cooperative effort be- laborate, there is no single point of failure; another member of the network
tween U.S. and Colombian intelligence officers that had endured for more than could step in to act as facilitator; and the whole team accepts responsibility for
a year. In this case, the intelligence effort had several customersan operations the product.
team comprising the Colombian police, the U.S. Army support team in Colom- The process is also able to satisfy a wide range of customers from a sin-
bia, and the Colombian and U.S. governments, each with different intelligence gle knowledge base. There are usually many customers for intelligence about
needs. The information sources included COMINT focused on Escobars cell a given problem, and each customer has different needs. For example, mili-
phones and those of his associates, HUMINT from Escobar's associates, and fi- tary, foreign relations, financial, and foreign trade organizations all may need
l ne intelligence Process l/
24
26 Chapter Two Defining the Intelligence Problem 27
Subordinates may read and interpret the report, but the message The Problem Definition Product
tends to be distorted as a result. So briefings or (ideally) constant
When the final intelligence product is to be a written report, the problem
customer interaction with the intelligence team during the target-
definition product is usually in precis (summary, abstract, or terms of refer-
centric process helps to get the message through.
ence) form. The precis should include the problem definition or question, no-
What are the real questions? Obtain as much background knowledge tional results or conclusions, and assumptions. For large projects, many intel-
as possible about the problem that lies behind the questions the ligence organizations require the creation of a concept paper or outline that
customer asks, and understand how the answers will affect organi- provides the stakeholders with agreed terms of reference in precis form.
zational decisions. The purpose of this step is to narrow the prob- If the intelligence product is to be a briefing, a set of graphics will become
lem definition. A vaguely worded request for information is usually the final briefing slides. If possible, turn the slides into a "notional briefing"
misleading, and the result will almost never be what the requester (that is, a briefing with assumptions, notional results, and conclusions) and
wanted. show it to the customer; it will improve the chances that the final report will
Be particularly wary of a request that has passed through several nodes in address the issues in the customer's mind.
Either exercise will help all participants (customers, collectors, and ana-
the organization. The layers of an organization, especially those of an intelli-
gence bureaucracy, will sometimes "load" a request, as it passes through, with lysts) understand their assignments or roles in the process. Think of it as a
additional guidance that may have no relevance to the original customer's in- going-in position; no one is tied to the precis or notional presentation should
terests. A question that travels through several such layers often has become the analysis later uncover alternative approachesas it often does.
cumbersome by the time it reaches the analyst. A question about the current Whether the precis approach or the notional briefing is used, the problem
Israeli balance of payments, for example, could wind up on the analyst's desk definition should conclude with a strategies-to-task view of the problem.
as instructions to prepare a complete assessment of the Israeli economy. In Detailed Problem Definition: Strategies-to-Task
such situations, the analyst must go back to the originator of the request and
close the loop. The problem of communication is so pervasive in intelligence The basic technique for defining a problem in detail has had many names.
that it is covered in detail in chapter 7. Nobel laureate Enrico Fermi championed the technique of taking a seemingly
The request should be specific and stripped of unwanted excess. This en- intractable problem and breaking it into a series of manageable subproblems.
tails focused (and perhaps repeated) interaction with the customer responsible The classic problem that Fermi posed for his students was. How many piano
for the original requestthe executive, the policymaker, or the operations of- tuners are there in Chicago? The answer could be reached using the sort of in-
ficer. Ask the customer if the request is correctly framed. The time spent fo- direct approach that is common in the intelligence business: estimating how
cusing the request saves time later during collection and analysis. It also makes many families were in the city, how many families in the city per piano, and
clear what questions the customer does not want answered- When the United how many pianos a tuner can tune a year.fi Glenn Kent of RAND Corporation
States was already involved in Lebanon, in 1983, U.S. policymakers did not uses the name strategies-to-(ask for a similar breakout of U.S. Defense Depart-
want to hear from U.S. intelligence that there was no reasonable way to force ment problems.7
Syrian president Hafez Assad to withdraw from Lebanon.3 The result of the Whatever the name, the process is simple: Deconstruct the highest level
disconnect between intelligence and the customer was a foreign policy deba- abstraction of the problem into its lower level constituent functions until you
cle for the United States: On October 23, 1983, terrorists blew up the Marine arrive at the lowest level of tasks that are to be performed or subproblems that
Corps barracks at Beirut International Airport with a truck bomb that killed are to be dealt with. In intelligence, the deconstruction typically details issues
241 marines. The United States subsequently withdrew from Lebanon. But to be addressed or questions to be answered. Start from the problem definition
policymakers can sometimes choose not to be informed by intelligence on se- statement and provide more specific details about the problem. The process
lected issues. Chapter 15 deals with how to respond when the customer is an- defines intelligence needs from the top level to the specific task level via
tipathetic to intelligence. taxonomya classification system in which objects are arranged into natural or
After answering these five questions, the analyst will have some form of related groups based on some factor common to each object in the group. At
problem statement. On large (rnultiweek) intelligence projects, this problem the top level, the taxonomy reflects the policymaker's or decision maker's view
statement will itself be a formal product. The problem definition product helps and the priorities of that customer. At the task level, the taxonomy reflects the
explain the real questions and related issues. It is then much easier to focus on view of the collection and analysis team. These subtasks are sometimes called
answering the questions that the customer wants answered. bey intelligence questions (KIQs) or essential elements of information (EEIs).
Defining the Intelligence rroDtem
Figure 2-1 Political Situation Strategies-to-Task Problem Breakdown Figure 2-2 Strategies-to-Task Breakdown for an Economic Problem
Strategy Political situation
in Region X Country X Economy
Warning of refugee 1 1 I
Development of democratic
movements institution! and norms Infrastructure/ Econorni
Macroeconomic stability Financial stability
environmental
Stability and prospects
for the regime
Inflation Balance of Banking Currency Stock market/
Budget
payments sector investments
Human Political parties,
Justice Civil-military
rights elections, Insurgency or Budget deficit Foreign Equity price
systems Corruption - Bank failures
performance electoral systems relationships terrorism - exchange changes
External/internal - Bank liquidity
coverage |_ Corporate
borrowing
- Terms of trade - Credit growth bankruptcies
Fiscal spending
Accountability and - Net investment - Loan default rates Financial
Transparency, honesty, Progress toward vs. revenue
Task responsiveness of political - Loan terms | instrument
and legitimacy reform of electoral - Import levels
parties and leaders of elections discounts
systems
- Export levels
Equity prices
'vs. historical
The strategies-to-task approach has an instinctive appeal. We naturally trends
tend to form hierarchical social arrangements and to think about problems hi-
erarchically. The strategies-to-task breakdown follows the classic method for like that shown in Figure 2-2. Because of space limits, the figure shows only
problem solving. It results in a requirements or needs hierarchy that is widely four of thirteen bottom-level question sets. At the bottom level, issues such
used in intelligence organizations. A few examples from different national pol- as terms of trade and corporate bankruptcies can be addressed with relative
icy problem sets will help to illustrate the technique.
ease, compared with high-level questions such as, What is country X's finan-
Figure 2-1 shows part of a strategies-to-task breakdown for political in-
cial stability?
telligence on a given country or region of the world. For simplicity, only one These two strategies-to-task breakdowns are examples of the sons of
pan of the breakdown is shown down to the lowest level.
problems that intelligence analysts typically encounter with respect to a target,
Figure 2-1 illustrates the importance of taking the breakdown to the low- and both are oriented to broad information needs (here, political and eco-
est appropriate level. The top-level question, What is the political situation in nomic). But a strategies-to-task breakdown can be much more specific and
Region XI is difficult to answer without first answering the more specific ques- more oriented to the customer's options for attacking the problem. Figure 2-3
tions lower down in the hierarchy, such as, What progress is being made to- illustrates an exampleintelligence support to the design of economic sanc-
ward reform of electoral systems?
tions against a country, such as might have been used to design sanctions
Another advantage of the linear problem breakdown is that it can be used against Iraq during the 1990s. An intelligence analyst might have difficulty di-
to evaluate how well intelligence has performed against specific problems or rectly answering this question from a policymaker: Tell me what I need to
how future collection systems might perform. Again referring to Figure 2-1, it
know to develop economic sanctions against country X. So the analyst would
is difficult to evaluate how well an intelligence organization is answering the
create a strategies-to-task breakdown of the problem, answer more specific
question, What is the political situation in Region XI It is much easier to eval- questions such as. What impact will sanctions have on the economy? and in-
uate the organization's performance in researching the transparency, honesty,
tegrate the answers to provide an answer to the top-level question.
and legitimacy of elections, because those are very specific issues.
No matter how narrow the top-level intelligence task, it still can likely be
Obviously several different problems can be associated with a given intel- broken out into an array of specific questions. If the job is to assess the capa-
ligence target, or several different targets can be associated with a given prob- bilities of an opponent's main battle tank, then an analyst would consider the
lem. If the problem were an overall assessment of a country's economy, rather tank's speed, range, armor, and firepower. Maintenance requirements, quality of
than its political situation, then the problem breakdown might look very much crew training, logistics, and command and control supporting the tank should
Defining the Intelligence Problem
28 Chapter Two
Equity price
Human Political parties, \ Budget deficit Foreign U Bank failures
|ustice Civil-military Insurgency or changes
rights elections, Corruption - exchange
systems relationships terrorism Extern a I/intern a I coverage \- Bank liquidity \__ Corporate
performance electoral systems
borrowing Credit growth bankruptcies
-Terms of trade
Fiscal spending Loan default rates Financial
- Net investment
vs. revenue L 1 instrument
Accountability and Transparency, honesty, Progress toward Loan terms
- import levels discounts
Task responsiveness of political and legitimacy reform of electoral
of elections systems - Export levels Equity prices
parties and leaders
1vs. historical
trends
The strategies-to-task approach has an instinctive appeal. We naturally
tend to form hierarchical social arrangements and to think about problems hi-
like that shown in Figure 2-2. Because of space limits, the figure shows only
erarchically. The strategies-to-task breakdown follows the classic method for
four of thirteen bottom-level question sets. At the bottom level, issues such
problem solving. It results in a requirements or needs hierarchy that is widely
as terms of trade and corporate bankruptcies can be addressed with relative
used in intelligence organizations. A few examples from different national pol-
ease, compared with high-level questions such as, What is country X's finan-
icy problem sets will help to illustrate the technique.
Figure 2-1 shows part of a strategies-to-task breakdown for political in- cial stability?
These two strategies-to-task breakdowns are examples of the sorts of
telligence on a given country or region of the world. For simplicity, only one
problems that intelligence analysts typically encounter with respect to a target,
part of the breakdown is shown down to the lowest level.
and both are oriented to broad information needs (here, political and eco-
Figure 2-1 illustrates the importance of taking the breakdown to the low-
nomic). But a strategies-to-task breakdown can be much more specific and
est appropriate level. The top-level question, What is the political situation in
more oriented to the customer's options for attacking the problem. "Figure 2-3
Region X? is difficult to answer without first answering the more specific ques-
illustrates an example'intelligence support to the design of economic sanc-
tions lower down in the hierarchy, such as, What progress is being made to-
tions against a country, such as might have been used to design sanctions
ward reform of electoral systems?
against Iraq during the 1950s. An intelligence analyst might have difficulty di-
Another advantage of the linear problem breakdown is that it can be used
rectly answering this question from a policymaker: Tell me what 1 need to
to evaluate how well intelligence has performed against specific problems or
know to develop economic sanctions against country X. So the analyst would
how future collection systems might perform. Again referring to Figure 2-1, it
create a strategies-to-task breakdown of the problem, answer more specific
is difficult to evaluate how well an intelligence organization is answering the
questions such as, What impact will sanctions have on the economy? and in-
question, What is the political situation in Region X? It is much easier to eval-
tegrate the answers to provide an answer to the top-level question.
uate the organization's performance in researching the transparency, honesty,
No matter how narrow the top-level intelligence task, it still can likely be
and legitimacy of elections, because those are very specific issues.
broken out into an array of specific questions. If the job is to assess the capa-
Obviously several different problems can be associated with a given intel-
bilities of an opponent's main battle tank, then an analyst would consider the
ligence target, or several different targets can be associated with a given prob-
tank's speed, range, armor, and firepower. Maintenance requirements, quality of
lem. If the problem were an overall assessment of a country's economy, rather
ciew training, logistics, and command and control supporting the tank should
than its political situation, then the problem breakdown might look very much
Defining the Intelligence Problem 31
Figure 2-3 Economic Sanctions Problem Breakdown antisocial, traditional intelligence cycle.) The stakeholders in the
contraband narcotics problem are on both sides: Among those try-
Design of ing to eliminate contraband narcotics are the Drug Enforcement
Economic Sanctions
Agency, other law enforcement agencies, U.S. Customs, the mili-
1 1
tary, U.S. banks, and governments in drug-producing countries.
Wteakare as and Likely effects of Cooperation required
Stakeholders on the opposing side include the cartel, its support-
vulnera bilities sanctions ers in the foreign government, the financial institutions that it uses
from allies
I
I i for funds laundering, farmers, processors, intermediaries, street
jortand Expected Expected
forces, and drug users. And the stakeholders have different per-
Channels for Ability to Costs to
mport impact on Impact on spectives on the problem. Consider the Pablo Escobar example in
evade or
endencies flow of goods other
economy leadership mitigate countries chapter 1. From the U.S. point of view, the problem was to stem
the flow of narcotics into the United States. From the Colombian
also be examined. Without these less-obvious components, the tank is simply government point of view, the problem was stopping the assassi-
an expensive piece of metal and a threat to no one. nations and bombings that Escobar ordered.
The constraints on the solution, such as limited resources and political
Strategies-toTask and Complex Problems ramifications, change over lime. The target is constantly changing, as
We have learned that the most important step in the intelligence process the Escobar example illustrates, and the customers (stakeholders)
is to understand the problem accurately and in detail. Equally true, however, change their minds, fail to communicate, or otherwise change the
is that intelligence problems today are increasingly complex-often described rules of the game. Colombians didn't want highly visible "gringos"
as nonlinear, or "wicked." They are dynamic and evolving, and thus their involved in the hunt for Escobar, though they relaxed that con-
solutions are, too. This makes them difficult to deal with, and almost impos- straint as they gained confidence in the U.S. operatives.* The U.S.
sible within the traditional intelligence cycle framework. A typical example of government didn't want to be associated with killings of Escobar's
a complex problem is that of a drug cartelthe cartel itself is dynamic and relatives, business associates, and lawyers. The result is that the
evolving, and so are the questions being posed by intelligence consumers who problem definition is dynamic; it cannot be created once and left
have an interest in it. unchanged.
A typical real-world customer's problem today presents an intelligence Because there is no final problem definition, there is no definitive solu-
officer with the following challenges:8
tion. The intelligence process usually ends when time runs out, and
the customer must act on the most current available information.
The problem represents an evolving set of interlocking issues and con- Killing Escobar did not solve the narcotics problems of the United
straints. There is no definitive statement of the problem. The intel- States or Colombia. Instead the rival Cali cartel became the domi-
ligence officer may not understand the problem until he or she has nant narcotics supplier in Colombiaan example of an unin-
finished the analysis, if then. Only by working through the prob- tended consequence. Many^Colombian officials still live in fear of
lem to answers can one understand its ramifications. Often, even assassination.
when the project is complete an analyst learns from the customer
that he or she didn't fully appreciate the issues involved. The nar- Because complex or wicked problems are evolving sets of interlocking is-
cotics example has an evolving set of interlocking issues and con- sues and constraints, and because the introduction of new constraints cannot
straints. Take the constraints on possible solutions: Selectively in- be prevented, the strategies-to-task breakdown of a complex problem must be
troducing poison into the narcotics supply to frighten consumers dynamic; it will change with time and circumstances. As the intelligence cus-
and kill demand might reduce drug use, but it is not an acceptable tomer learns more about the target, his needs and interests will shift.
option for the United States.
Furthermore, the complex problem breakdown should be created as a
There are many stakeholderspeople who care about or have some- network rather than a hierarchy because of the interrelationships among the
thing at stake in how the issue is resolved. (This makes the problem- elements. In Figure 2-1 the political stability block is related to all three of the
solving process a fundamentally social one, in contrast to the lowest blocks under "Political parties, elections, ancl electoral systems," though
32 Chapter Two Defining the Intelligence Problem 33
they appear in different parts of the hierarchy; political stability being en- Figure 2-4 Counterintelligence Problem Breakdown
hanced, for example, when elections are transparent, honest, and legitimate.
In Figure 2-3 "Ability to evade or mitigate" sanctions is clearly related to "Ex-
Foreign Intelligence Service
pected impact on the economy," or "Expected impact on leadership," though
they also are in different pans of the hierarchy Iraq's ability to evade or miti-
gate sanctions during the 1990s was sufficient to minimize the impact on its i i .
leadership but insufficient to keep the Iraqi economy healthy If lines con- ership Tactics Organization General strategy Goals and i
nected all of the relationships that properly exist within these figures, they 1
I 1
would show very elaborate networks. The resulting dynamic network becomes Tactical
quite intricate and difficult to manage at our present stage oI information tech- ethotis Visibility Operations Targets Linkages
trends
nology development.
The linear problem breakdown or strategies-to-task approach may be less
than ideal for real-world, complex problems, but it works well enough if it is But whereas the focus on counterespionage and security is basically de-
constantly reviewed and revised during the analysis process. It allows analysts fensive, the first rule of strategic conflict is that the offense always wins. So, for
to define the problem in sufficient detail and with sufficient accuracy that the intelligence purposes, you are starting out the wrong way if the problem
rest of the process remains relevant. There may be redundancy in a linear hi- breakdown starts with security and catching spies. The Iraq WMD Commis-
erarchy, but the human mind can usually recognize and deal with the redun- sion recognized that flawed approach when it observed that U.S. countenn-
dancy. To keep the problem breakdown manageable, analysts should continue telligence has been criticized as focusing almost exclusively on counter-
to use the strategies-to-task hierarchy, recognizing the need for frequent revi- HUMINT, that is, on catching spies.10
sions, until information technology comes up with a better way. To illustrate, A better approach to problem definition starts with consideration of the
let us take an example of a very complex problem that has all of the challenges real target of counterintelligence: the foreign intelligence service. Good coun-
listed above, that of counterintelligence. terintelligence requires good analysis of the hostile intelligence services. As we
will see in several examples later in the book, if you can model an opponents
Example: Defining the Counterintelligence Problem
intelligence system, you can defeat it. So we start with the target as the core
It is easy to begin with a wrong definition of the intelligence problem. If of the problem and begin a strategies-to-task breakdown. Figure 2-4 illustrates
that happens, and if the problem definition is not revised, as discussed above, the result: a simple, first-level problem breakdown.
then the best analysis in the world will not avert a bad outcome. The counter- If the counterintelligence problem is defined in this fashion, then coun-
intelligence problem has been poorly addressed in many countries for many terintelligence activity will be proactive and will focus on managing foreign
years because the effort to do so began from a wrong problem definition that intelligence perceptions via a combination of covert action, denial, and de-
was never reconsidered. ception. The best way to win the strategic CI conflict is to take the offense
Counterintelligence (CI) in government usually is thought of as contain- (model the target, anticipate the opponent's actions, and defeat him). Instead
ing two subordinate problems: security (protecting sources and methods) and of denying information to the foreign service, for example, you feed it false in-
catching spies (counterespionage). CI posters, literature, and briefings inevit- formation thai eventually degrades the opponent's confidence in his intelli-
ably focus on the spies caughtprobably because their primary purpose is to gence services.
discourage treason. In doing so they are also catering to the popular media To do this one needs a model of the foreign intelligence system that can
perception of counterintelligence. be subjected to target-centric analysis, one that includes its communications
If the problem is defined that waycounterespionage and securitythe channels and nodes, its requirements and targets, and its preferred sources of
response in both policy and operations is defensive: Personnel background se- intelligence. How one uses such a model is discussed in the next chapter.
curity investigations are conducted. Annual financial statements are required
ol all employees. Profiling is used to detect unusual patterns of computer use Summary
that might indicate computer espionage. Cipher-pro tec ted doors, badges, and Before beginning intelligence analysis, the analyst must understand the
personal identification numbers and passwords are used to ensure that only customers problem. That usually involves close interaction with the customer
authorised persons have access to sensitive intelligence. The focus of commu- until the important issues are identified. The problem then has lo be decon-
nications security is on denial, typically by encryption Leaks of intelligence structed in a strategies-to-task process so that collection, synthesis, and analy-
are investigated to identify their source. sis can be effective.
All significant intelligence problems, however, are complex and nonlinear.
The complex problem is a dynamic sec of interlocking issues and constraints,
with many stakeholders and no definitive solution. The linear strategies-to-
lask process is not an optimal way to approach such problems, but it can work
if it is frequently reviewed and updated during the analysis process.
Problem definition is the first step in a process known as structured argu-
mentation. As analysts work through that process, they collect and evaluate rel- 3
evant information, fitting it into a target model (which may or may not look like
the problem breakdown); that pan of the process is discussed in chapters 5 to
7. The analyst identifies information gaps in the target model and plans strate- An Analysis Approach to the Target
gics to fill them (the subjeci of chapters). The analysis of the target model then
provides answers to the questions posed in the problem definition process. The
next chapter discusses the concept of a model and how it is analyzed. I/ we are to think seriously about the world, and act effectively in
it, some sort of simplified map of reality . . . is necessary.
Notes Samuel P Huruington, Tfie Clash of Civilizations and the
1. Stew Magnusiin, "Satellite Data Distribution Lagged, Improved in Afghanistan,' Space News, Remaking of World Order
September 2. 2002, 6.
2. Rob Johnson, .Analytic Culture in the US. Intelligence Community (Washington, D.C.- Center for
the Study of Intelligence, Central Intelligence Agency. 2005), 64.
.5. Jill Jermano, 'Introduction lo Structured Argumentation," Project Genoa Technical Report
(Washington, D.C DARPA, Department of Defense, May 2002)
4 Jack Davis, "Intelligence Changes in Analytic Tradecrafi in CIAs Directorate of Intelligence"
T he target-centric approach and the problem definition process described
in the preceding chapter naturally lead to the creation of a model of the
target, if a model does not already exist. Models are so extensively used in in-
(CLAPES ICATC1ADI-95Q4) (Washington. D.C. Central Intelligence Agency, April 1995). 2. telligence that analysts seldom give them much thought, even as they use them.
5. David Kennedy and Leslie Brunetta, "Lebanon and ihe Intelligence Community." Case Sludy For example;
C15-88-859.0 (Cambridge; Kennedy School of Government. Harvard University, 1988)
6. Hans Christian vim Baeyer, The Fermi Solution (Portland: Random House, 1993).
7. Glenn Kent and William Simon, New Challenges for Defense Planning: Rethinking How Much Is Imagery analysts can recognize a nuclear fuel reprocessing facility
Enough (Santa Monica. RAND Corp , 1994) because they have a mental model of typical facility details, such as
8. E. Jeffrey Conklin, "Wicked Problems and Social Complexity," CogN7exus Institute, the use of heavy reinforced concrete to shield against intense
www.cognexus org/wpl/wickedproblems.pdf, March 24. 2003.
gamma radiation.
9. Mark Bowden, "Martinez Pushes Ahead with (lie Hunt," Philadelphia Inquirer, December 3,
2000. In signals intelligence (SIG1NT) a communications or radar signal
10 Report i)f the Commission on the Intelligence Copofiiiinej of the United States Regarding Weapons of has standard parametersit can be recognized because it fits an
Mass Destruction, Washington, D.C.. March 31, 2005, chap. 11, www.wmd.gov/report/wmd__ existing model in its radio frequency, its modulation parameters,
report.pdf.
and its modes of operation.
Clandestine or covert radio communications signals can be recog-
nized because they fit a specific model: They are designed to avoid
intercept by, for example, using very shore (burst) transmissions or
jumping rapidly from one radio frequency to another.
35
An Analysis Approach to the Target 37
36 Chapter Three
Figure 3-2 Generic Biological Weapons System Process Model Figure 3-4 Collateral Model of a Biological Weapons
Development Organization
Develop military
forces and Figure 3-5 Geographical Collateral Model of Biological Warfare
doctrine Facilities
A
Delivery system
development center
BW deployment site
Prepare Conduct
test area -*
test
Transfer
animals to Analyze
test area data
Summary
All intelligence involves extracting knowledge from a model of the target.
Models in intelligence are normally conceptual and descriptive. The easier
ones to work with are deterministic, linear, static, solvable, or some combina-
tion. Unfortunately, in the intelligence business the target models tend to be
stochastic, nonlinear, dynamic, and simulated.
The Ana|yric Spectrum 49
Nature: Strategic
4 ActMtfes , .
calted fee
Plannin
9 management
The Conflict Spectrum Until September 11, 2001, when terrorists attacked the World Trade Cen-
As we learned in chapter 1, intelligence is about conflict. Military organi- ter and the Pentagon, the U.S. Department of Defense's Central Command
zations commonly define three levels of conflict: strategic, operational, and (CENTCOM) was primarily focused on prevention and deterrence vis-a-vis the
tactical.1 Policymakers, law enforcement officers, and businesses experience Taliban and al Qaeda in Afghanistan. After September 11, CENTCOM moved
similar levels of conflict. Types of intelligence are often defined to mirror these quickly into operational planning and then into tactics for defeating them.
three levels, though the lines between them are often blurred. We have said that intelligence supports operations across the spectrum
Against any opponent in a conflict, three successive levels of action can of conflict. Intelligence, like operations, can be broadly defined at the top level
be taken: prevention, deterrence, or defeat. Figure 4-1 shows a spectrum that in- as being strategic, operational, or tactical.
cludes these levels of action. Preventive operations tend to be strategic and to
focus on planning. Actions intended to deter or defeat are mostly tactical; they Strategic Intelligence
center on executing the plans and managing the developing cnsis. Strategic intelligence deals with long-range issues. For national customers
generally, it is used to create national strategy and policy, monitor the interna-
Prevention. Intelligence customers first try to prevent a disadvanta- tional situation, and support such diverse actions as trade policymaking or na-
geous situation from developing. Examples include preventing the tional industrial policymaking. Strategic intelligence is also produced for the
opponent from acquiring or developing a capability, a strategy, or senior military leadership. It is used to prepare military plans, determine what
a new weapons system; preventing an unfavorable decision from weapon systems to build, and define force structures^ For corporations, it typ-
being made; preventing the opposing negotiations team from tak- ically supports strategic planning.
48
The Analytic Spectrum 49
The Conflict Spectrum Until September 11, 2001, when terrorists attacked the World Trade Cen-
As we learned in chapter 1, intelligence is about conflict. Military organi- ter and the Pentagon, the U.S. Department of Defense's Central Command
zations commonly define three levels of conflict: strategic, operational, and (CENTCOM) was primarily focused on prevention and deterrence vis-a-vis the
tactical.1 Policymakers, law enforcement officers, and businesses experience Taliban and al Qaeda in Afghanistan. After September 11, CENTCOM moved
similar levels of conflict Types of intelligence are often defined to mirror these quickly into operational planning and then into tactics for defeating them.
three levels, though the lines between them are often blurred. We have said that intelligence supports operations across the spectrum
Against any opponent in a conflict, three successive levels of action can of conflict. Intelligence, like operations, can be broadly defined at the top level
be taken: prevention, deterrence, or defeat. Figure 4-1 shows a spectrum that in- as being strategic, operational, or tactical.
tf
cludes these levels of action. Preventive operations tend to be strategic and to
focus on planning. Actions intended to deter or defeat are mostly tactical; they Strategic Intelligence
center on executing the plans and managing the developing crisis. Strategic intelligence deals with long-range issues. For national customers
generally, it is used to create national strategy and policy, monitor the interna-
Prevention. Intelligence customers first try to prevent a disadvanta- tional situation, and support such diverse actions as trade policymaking or na-
geous situation from developing. Examples include preventing the tional industrial policymaking. Strategic intelligence is also produced for the
opponent from acquiring or developing a capability, a strategy, or senior military leadership. It is used to prepare military plans, determine what
a new weapons system; preventing an unfavorable decision from weapon systems to build, and define force structures.2 For corporations, it typ-
being made; preventing the opposing negotiations team from tak- ically supports strategic planning.
50 Chapter Four
rate data. Intelligence systems that can establish the location of enemy units to
Here an analyst must spend much time building a target model from within a few meters became more important. The rapidly expanding field of
scratch or updating an existing model. There are lots of options. One can con-
geospatial analysis supports such surgical operations with mapping, charting,
sider many possible target models (scenarios), and the situation can evolve in and geodesy data, which can be used for the guidance of "smart" weapons.6
many different ways. Intelligence takes a long-term, analytical view. Much of law enforcement intelligence also tends to be tactical in orienta-
Strategic intelligence involves creating much the same target models tion. Both the Colombian police lieutenant and the Predator operator in chap-
whether in business or government. Both business and government look at the ter 1 were using tactical intelligence while engaged against individual oppo-
political structure and alliances of opponents; both create biographical or lead-
nents. But tactical intelligence is used every day in situations well removed
ership profiles; both assess the opponent's technology. from military actions and law enforcement, as the following example illustrates.
Strategic intelligence is tougher than tactical intelligence. The analyst has
to command more sophisticated analytic techniques. The models will be sim- A satellite photo of the Earth spins slowly on. a large plasma screen, with
ilar or identical to those used for tactical intelligence, but usually are more markers indicating the sources of online threats. At lows of computer work-
complex because of the longer predictive time frame of strategic intelligence. stations, analysis monitor firewalls and other online defenses. The displays,
Another problem is that the intelligence analyst is seldom able to put aside ihe layout, and the security guards all evoke the image of a war roomwhich
short-term, tactical support to customers while developing a clientele having it is, but for a new type of war.
the long-term view.3 The analyst needs a champion in the customer suite to This is Symantec's war room. Here, a different type of intelligence analyst
support him or her in strategic intelligence because tactical intelligence, deal- deals with junk e-mailers who are trying to stay one step ahead of fillers and
ing with immediate issues, usually consumes all available resources. blacklists that block spam; of the hackers that constantly work to bypass
bank firewalls; and of the viruses that can flow into thousands of computers
Operational Intelligence worldwide in a few seconds.
Symantec maintains the war room to defend banks and Fortune 500 firms
Operational intelligence focuses on the capabilities and intentions of ad- against cyber threats. This room was the front line of the battle against SQL
versaries and potential adversaries. It is defined as the intelligence required for Slammer as it surged through the Internet, knocking out police and fire dis-
the planning and execution of specific operations. In the military it is primar- patch centers and hairing freight trains; against MSBlaster, as it clogged cor-
ily used by combatant and subordinate joint force commanders and their com- porate networks and forced web sites offline; and against the graffiti viruses
ponent commanders. It keeps them abreast of events within their areas of re- with such innocuous names as Melissa and ILoveYou 7
sponsibility and ascertains when, where, and in what strength an opponent
will stage and conduct campaigns and major operations."1 Operational intelli- The analysts in Symantec's war room succeed in their tactical combat be-
gence therefore has to be predictive also. cause they have models of viruses, worms, and Trojans instantly available. They
Operational intelligence in diplomatic efforts could support, for example, model the operational patterns of East European organized crime groups that
planning the negotiation of an arms reduction treaty. In law enforcement, it use viruses such as SoBig to track a user's keystrokes and lift passwords and
might support planning the takedown of an organized crime syndicate. In credit card numbers. They have models of the computers that are used to
business inteliigence, it might support a campaign to gain market share in a spread viruses. The great plasma screen itself displays a massive model of the
specific product line. Internet battlefront, where the beginning of new threats can be seen. Using
these models and creating new ones on the fly, these tactical intelligence ana-
Tactical Intelligence lysts can analyze and defeat a new virus in minutes.
Tactical intelligence operates at the front line of any conflict. In the mili- , The Temporal Analysis Spectrum
tary it is used by tactical-level commanders for planning and conducting bat- Figure 4-2 shows how intelligence analysis proceeds on a particular prob-
tles and engagements. Tactical intelligence locates and identifies the oppo- lem or issue over time. As the customer focuses on strategic issues and plan-
nent's forces and weaponry, enhancing a tactical commander's ability to gain a ning, intelligence concentrates on creating the target model via in-depth re-
combat advantage with maneuver, weaponry on target, and obstacles. It allows search, and the focus is on an opponent's capabilities and plans or intentions.
tactical units to achieve positional advantage over their adversaries 5 The intelligence customer's focus is strategic, and so is the intelligence effort.
Tactical intelligence to support military operations became much more Alternative target scenarios are created. Referring again to the illustration in
important during the 1990s because of weapons technology trends. The trend Figure 4-2, on the right side the problem is tactical. The scenario or situation
to highly precise weaponry and operations placed a premium on highly accu-
52 Chapter Four
The Analytic Spectrum 53
shape plans and are determined by looking externallythat is, perceiving the was dominated by the Arab-Israeli situation. Today, indications and warning
situation as the opponent perceives it. The job of strategic intelligence, in this are much more complexmany countries are focusing on the threat of ter-
view, is to assess the opposing organization's capabilities (strengths and weak- rorist attack, particularly an attack using weapons of mass destruction. The
nesses) and its consequent plans (shaped by the opportunities and threats it category of indications and warning also is closely related to (and overlaps
perceives). with) two other categories of intelligencecapabilities, plans, and intentions;
The "specific targets" of intelligence depicted in Figure 4-2 can be tactical, and crisis management and operations support.
strategic, or both. Indications and warning tend to be more tactical; capabilities, The traditional approach to indications and warning has been to develop
plans, and intentions tend to be more strategic. The division is based on the indicators, or norms, for military force deployments and activity. If a U.S. in-
timeliness and quality of intelligence required. dications and warning organization had existed in December 1941, it would
In operational intelligence, an opponent's use of his capabilities to execute have had the following indicators, among others, about Japanese plans and in-
plansspecifically, his intentionsbecomes important. Intent to launch a mil- tentions that year:10
itary attack, intent to impose an embargo, or intent to break off negotiations are
all operational or even tactical. In Figure 4-2, intelligence about "intentions" is In January a HUMINT report from Peru's minister in Tokyo stated
depicted as being somewhere between in-depth research and current intelli- that in the event of trouble between the United States and Japan,
gence. Plans and intentions tend to be lumped together in traditional intelli- the Japanese intended to begin with a surprise attack on Pearl
gence definitions, but they are in fact two different targets, distinguished by Harbor.
their time scale: plans are longer term, intentions are more immediate. Intercepts of Japanese Foreign Ministry traffic on November 19
contained the message, "East wind rain," which some U.S. intelli-
Indications and Warning gence officers interpreted as indicating a decision for war in the
The category indications and warning (commonly referred to as IfiarW) for near future.
governments comprises detecting and reporting time-sensitive information on On November 22 Foreign Minister Togo Shigenon notified Am-
foreign developments that threaten the country's military, political, or eco- bassador Nomura Kichisaburo in Washington, D.C., that negotia-
nomic interests. Providing indications and warning on threats to national se- tions had to be settled by November 29, stating "after that things
curity is traditionally an intelligence organization's highest priority. The failure are going automatically to happen."
of U.S. intelligence to provide indications and warning of the Japanese attack
on Pearl Harbor was the primary reason that a U.S. intelligence community In late November the Japanese began padding their radio traffic
was formed in 1947. The failure of that community to provide I&rW of the with garbled or redundant messagesa classic tactic to defeat
9/11 terrorist attacks directly led to the most significant reorganization of U.S. CO MINT operations.
intelligence since 1947. At the beginning of December the Japanese navy changed its ship
The purpose of indications and warning is to avoid surprise that would call signs, deviating from its normal pattern of changing call signs
damage the organisation's or country's interests. Tactical indications and warn- every six months.
ing can include warning of enemy actions or intentions, imminent hostilities, On December 2 the Japanese Foreign Ministry ordered its em-
insurgency, or terrorist attacks. Indirect and direct threats are the targets of in- bassies and consulates in London, Manila, Batavia, Singapore,
dications and warning, including warnings of coups or civil disorder, third- Hong Kong, and Washington, D.C., to destroy most codes, ci-
party wars, and refugee surges, even if the events may not immediately and di- phprs, and classified documents.
rectly affect the country making the assessment.
In early December the locations of Japan's aircraft carriers and sub-
Although I&W is shown on the right side of Figure 4-2, as if it were tac-
marines were "lost" by U.S. naval intelligence.
tical or current intelligence, it can also be strategic. Strategic indications and
warning involve identifying and forecasting emerging threats. Warnings about Scattered reports came in of recent Japanese naval air practice tor-
instability, new defense technologies, or breakthroughs that could significantly pedo runs against ships anchored in a southern Japanese harbor.
alter the relative advantages of opposing military forces are examples.
For forty years, from 1950 to 1990, U.S. national indications and warn- In hindsight, these bits of intelligence together clearly indicate an im-
ing were dominated by concern about a Soviet strategic attack. A secondary pending Japanese attack on Pearl Harbor. In practice, these bits would have
focus was persistent world hot spots: the likelihood of Arab-Israeli, India- formed a partial picture within a mass of conflicting and contradictory evi-
Pakistan, or Korean conflict. National I&W for many Middle Eastern countries dence, as Roberta Wohlstetter pointed out so well in her book Pear! Harbor:
56 Chapter Four The Analytic Spectrum 57
Decision. "At best, a cautiously worded warning could have been whole blood, recall of diplomatic personnel, recall of military personnel on
issued as to the likelihood and nature of an attack within days. In 1941, how- leave and canceling leave, threats made in the press, and movement of war-
ever, no national indications and warning organization existed. heads out of storage.
Since World War II most countries of any size have created organizations The point is that the indicators must exist for warning to be effective. And
to warn of impending military action and against other types of surprises. De- they must support alternative outcome models, as we will discuss in the fol-
spite some missteps based on poor analysis (e.g., the Yom Kippur and Falk- lowing chapters.
lands Islands surprises discussed in the introduction), I&rW has done reason-
ably well in warning against conventional military attacks. Charlie Allen, CIA Summary
national intelligence officer for warning, issued a warning estimating a 60 per- Intelligence analysis must support operations and policy across the spec-
cent chance of an Iraqi attack against Kuwait on July 25, 1990, more than a trum of conflict. The type of analysis and the speed with which it must be pre-
week before the Gulf War began.u pared and delivered to the customer vary accordingly. Analysis to support
I&rW successes, however, have tended to be in predicting the breakout of strategic intelligence tends to be long-term research focused on capabilities
conventional armed conflict. The indicators of an impending Iraqi attack on and plans and to consider many scenarios. Operational intelligence is more
Kuwait in 1990 were well established and were sufficient to allow a warning near term, involving support for the planning of specific operations. Tactical
to be given. Warning norms for terrorism, instability, low-intensity conflict, intelligence support tends to be rapid-response, or current intelligence, to sup-
and technological breakthroughs are much more difficult to deal with, and the port crisis management and plan execution; it is focused on the current situa-
indicators are more easily concealed. tion and on indications and warning.
Furthermore, the problem of pulling a coherent picture out of the mass of The number of potential model types is large; the next chapter discusses
available information has not become easier since 1941. Lists of the evidence the major types that are used in intelligence analysis.
of an impending terrorist attack on the United States using airplanes have been
compiled since the 9/11 attacks on the Pentagon and World Trade Center. Like Notes
the Pearl Harbor evidence, they can only be judged fairly when placed with all 1 JCSJoim Publication 2-0, "Doctrine [or Intelligence Support to Joint Operations" (Washing-
of the conflicting, contradictory, and often false raw intelligence that the U.S. ton, D.C.: Department of Defense, Joint Chiefs of Staff, March 9, 2000), chap. 3.
2. Ibid.
intelligence community received before the attacks. 3. Bill Flora, "Moving from Tactical to Strategic Intelligence," Competitive intelligence Magazine 4
For commercial organizations, the highest indications and warning prior- (November-December 2001): 44.
ity is on significant threats to the organization's survivalimpending alliances 4. JCS Joint Publication 2-0, chap. 3.
among competitors or a competitor's impending product breakthrough, for ex- 5. Ibid.
6. Geodesy is concerned with the size, shape, and gravitational field of the Earth, its coordinate
ample. But indications and warning have a broader role in business intelli-
systems, and reference frames.
gence. Competitors often send out deliberate signals of their intentions. The 7. Andy Sullivan , "Attack of the Killer Bugs1 Your Computer Could Be Hijacked by Scam Artists
business intelligence analyst must be attuned to those indicators and ensure to Send out Spam and Steal Your Bank Account," Reuters Magazine, January-February 2004.
that the customer is aware of the signals.13 Analysis of the meaning of deliber- 8. John Arquilla and David Ronfeldt, "Looking Ahead. Preparing for Information-Age Conflict,"
ate signals is a special skill that all analysts should possess, because govern- in In Athena's Camp: Preparing/or Conflict in the Information Age, ed. John Arquilla and David
ments send out deliberate signals, too. Ronfeldt (Santa Monica: RAND Corporation, 1997), 468. "Swarm" operations are a modem
extension of the blitzkrieg conceptthe application of coordinated and overwhelming force
Indications and warning intelligence always has had a trade-off problem: against an opponent using all available instruments of power: political, economic, military,
Analysts don't want to miss the indicators and fail to give a warning. That and psychosocial, as appropriate.
problem is complicated by the opponents increasing use of denial and decep- 9. Competent national leaders do think about long-term strategy, bul they seldom want the help
tion. On the other hand, if the analyst sets the warning threshold too low, false of strategic intelligence. In contrast, they are usually avid consumers of tactical intelligence.
alarms result, and the analyst becomes vulnerable to the "cry wolf problem 10. Harold P Ford, Estimative Intelligence (Lanham, Md.: University Press of America, 1993), 3-5
11. Robena Wohlstetter, Pearl Harbor Warning and Decision, (Stanford: Stanford University Press,
customers become desensitized, and in a genuine crisis the alarm is ignored.14 1962). The difference between conflicting and contradictory evidence is discussed in chap 7
The trick is to have a set of indicators that are both necessary and sufficient, 12. Michael R. Gordon and Bernard E. Trainer, The General's War: The inside Story of the Conflict
so that one can successfully navigate between the unfortunate outcomes of m the Gulf (London- Little, Brown, 1996)
false alarms and missed events. Such sets of indicators are assembled through 13. Liam Fancy, Competitors (New York: John Wiley and Sons, 1999), 78.
experience and accumulated knowledge of common indicators. Some stan- 14. MarkM Lowemhal, Intelhgfncei From Secrets to Policy, 2nd ed (Washington, D.C : CQ Press,
2002), 87
dard indicators of impending military attack, for example, are a stockpiling of
Overview of Models in Intelligence 59
58
Figure 5-1 Exponential (or Disaster) Curve Figure 5-3 Normal Curve
tY
Population, pollution,
child abuse, number of
prisoners, or whatever
phenomenon about
which one wants to
predict a disaster.
Time
they often concentrate on one or a few forces that affect an entity, such as the
economy or the environment. They then usually posit some kind of disaster,
based on models that use those variables, leading to the exponential or disaster
quality of a photograph. The quality of a photograph has an average value, in-
curve shown in Figure 5-1. The creators of the disaster curve tend to ignore or
dicated by the zero axis where the curve in Figure 5-3 peaks. But if many (say,
discount the ability of other variablesespecially such responsive or limiting
two hundred) photographs of a scene are taken with the same camera, and
factors as human adaptivity and technologyto change at the same rate or
their quality is plotted, a curve like the one in Figure 5-3 results; a few pho-
faster. A classic older example is the extrapolation of exponential growth in
tographs will be exceptional (falling on the far right side of the curve), and a
telephones, made around 1900, which predicted that by 1920 the entire U.S.
few will be poor (falling on the far left side of the curve).
population would be working as telephone operators.1
Of course, the disaster curve never actually happens. An opposing reac- Comparative Modeling or Benchmarking
tion, feedback, contamination, or some other countervailing force steps in and
Comparative techniques, like lists and curves, represent another simple
retards the exponential growth curve, so that an S curve results (see Figure
but useful form of modeling that typically does not require a computer simu-
5-2). S curves occur so often in synthesis that they are revisited in chapter 14,
lation. Comparative techniques are used in government mostly for weapons
Many phenomena can be modeled by the Gaussian or normal curve, shown
systems and technology analyses. Both governments and business use com-
in Figure 5-3. The intelligence of a population, variation in imagery quality, at-
parative techniques to evaluate a competitor's operational practices, products,
mospheric dispersion of a chemical release, variation in securities pricingall
and technologies. This is called benchmarking.
these and more can be represented by the normal curve. To illustrate, take the
A powerful tool for analyzing a competitor's developments is to compare
them with your own organization's developments. The analyst's own systems
Figure 5-2 S Curve or technologies can provide a benchmark for comparison. One pitfall of com-
parative modeling is that analysts tand to rely on models that they are familiar
Performance with, such as their own country's organizational or industrial process models,
instead of those of the target country. Such so-called mirror-imaging leads to
many erroneous estimates. Other pitfalls of comparative techniques are dis-
cussed in chapter 7.
Comparative models have to be culture specific to avoid mirror-imaging.
A classic example of a culture-specific organization model is the fedrrtsu,
which is unique to Japan, although similar organization models exist else-
where in Asia. A keiretsu is a network of businesses, usually in related indus-
tries, that own stakes in one another and have board members in common as
Time a means of mutual security. A network of essentially captive (dependent on the
J
62 Chapter Five Overview oj Models in Intelligence 63
keiretsu) suppliers provide the raw material for the keiretsu manufacturers, Figure 5-4 Histogram of Opium Production, 1988 to 1996
and the keiretsu trading companies and banks provide marketing services. (in metric tons)
Keiretsu have their roots in prewar Japan, which was dominated by four large
conglomerates called zaibatsus: Mitsubishi, Mitsui, Sumitomo, and Yasuda. 3,000 -|
The zaibatsus were involved in areas such as steel, international trading, and
banking and were controlled by a holding company. 2,500 -
Six keiretsuSumitomo, Mitsubishi, Mitsui, Dai Ichi Kangyo, Sanwa, and
Fuyodominate Japan's economy. Most of the largest one hundred Japanese 2,000 -
corporations are members of one or another of these "big six" keiretsu.2
An intelligence analyst who mirror-images the keiretsu culture onto West- 1,500-
em business practices would underestimate the close keiretsu cooperation be-
1,000 -
tween the supplier and manufacturer and the advantages it gives in continual
product development, quality improvements, and reductions in costs. But the
500-
analyst also would miss the weaknesses inherent in a dependency relationship
that shields the partners from competitive pressures, slows innovation, and
eventually erodes the market position of all the keiretsu parties. 1988 1989 1990 1991 1992 1993 1994 1995 1996
To avoid the problem of mirror-imaging, it can be helpful to create paral-
lel models, side by side, for comparisons. This helps to highlight the differ- Burma Afghanistan D Laos Pakistan
ences between one's own company or country model and that of the target and
thus to catch potential areas of mirror-imaging. Almost all statistical analysis now depends on the use of digital comput-
ers. The statistical software used should provide both a broad range of statis-
Pattern Models
tical routines and a flexible data definition and management capability. The
Many types of models fall under the broad category of pattern models. Pat- statistical software should have basic graphics capabilities to display visually
tern recognition is a cntical element of all intelligence.3 Most criminals and ter- such data as trend lines.
rorists have a modus operandi, or standard operational pattern. Most govern- Histograms, which are bar charts that show a frequency distribution, are
mental and industnal organizations (and intelligence services) also prefer to one example of a simple statistical pattern. An example that might be used in
stick with techniques that have been successful in the past. An important as- intelligence analysis is shown in Figure 5-4; it permits an analyst to examine
pect of intelligence synthesis, therefore, is recognizing patterns of activity and patterns of opium production over time in the major producing countries.4
then determining in the analysis phase (a) whether the patterns represent a de- Chronological. Patterns of activity over time are important for showing
parture from what is known or expected and (b) whether the changes are sig- trends. Pattern changes are often used to compare how things are going now
nificant enough to merit attention. The computer is a valuable ally here; it can with how they went last year (or last decade). Predictive analysis often relies
display trends and allow the analyst to identify them, which is particularly use- on chronological models. ,
ful in cases where trends would be difficult or impossible to find by sorting Timing shapes the consequences of planned events. In sales campaigns,
through and mentally processing a large volume of data. Pattern analysis is one military campaigns, and political campaigns, among others, timing is critical to
way to effectively handle complex issues. making a^i impact. An opponent's strategy often becomes apparent only when
One danger in creating a pattern model is that the analyst may be tempted seemingly disparate events are placed on a timeline 5 Consider, for example, the
to find a pattern too quickly. Once a pattern has been settled on, it is easy to chronological model shown in Figure 5-5. The timeline shows the expected ac-
emphasize evidence that seems to support the pattern and to overlook, exten- tions of a hypothetical European electronics manufacturer that is building a
uate, or explain away evidence that might undermine it. (In the introduction missile guidance system destined for shipment to a Middle Eastern country
we discussed how an intelligence analyst can avoid such missteps.) Such a model can be used to predict an opponent's actions and to time fu-
Here are some of the main types of pattern models used by intelligence ture counteractions. In the example of Figure 5-5, the model could be used by
analysts: the analyst's country's government to block shipment of the guidance system
Statistical Much of pattern synthesis is statistical, and intelligence deals or to disrupt the payment arrangements.
with a wide variety of statistical modeling techniques. Some of the most use- Event-time patterns such as that depicted in Figure 5-5 tell analysts a great
ful are easy to learn and require no previous statistical training. deal; they allow them to infer relationships among events and to examine
Overview of Models in Intelligence 65
Figure 5-5 Chronological ModelActions of a Firm Building a Figure 5-6 Satellite Visibility over Bermuda during One Year
Missile Guidance System
Hour (Greenwich mean time)
Conduct market studies
s 24:00
Negotiate
with software company1
Hire software staff __
18:00
and systems engineers '
Approach customer
with concept cu
06:00
Make payment
arrangements CD
Deliver system
00:00
January |une January |une January lanuary March September November January
2004 2004 2005 2005 2006
Note: Shaded areas mark days and times when activity on Bermuda is visible from a typical low-
orbit satellite.
trends. Activity patterns of a target network, for example, are useful in deter-
mining the best time to collect intelligence. An example is a plot of total tele-
phone use over twenty-four hoursthe plot peaks around 11 a.m., which is CAD/CAM models are useful both in collection and in counterintelligence
the most likely time for a person to be on the telephone. analysis of a facility, CAD/CAM can be used to create a physical security profile
Figure 5-6 shows an example of a type of time series data analysis that is of a facility, allowing an analyst to identify vulnerabilities by examining floor
useful in satellite-based SIGINT or imagery intelligence (IM1NT) collection plans, construction details, and electronic and electrical connections.
planning. The horizontal axis is calibrated in months over the period of one Spatial models of local areas, such as city blocks, facilitate a number of
year; the vertical axis is calibrated in hours of the day over a twenty-four-hour analytic inferences. For example, two buildings located within a common
period (Greenwich Mean Time). The dark areas show the visibility from a spe- security fence can be presumed to have related functions; whereas, if the two
cific, low-orbiting satellite to Bermuda during the year, and the horizontal buildings were protected by separate security fences, no such presumption
curved lines near 1100 and 2300 GMT (Greenwich mean time) show the would follow. Spatial modeling on larger scales is usually called geospatial mod-
points of sunrise and sunset at Bermuda during the year, establishing the lim- eling and is discussed in more detail later in this chapter.
its of daylight If the satellite was carrying a visible-imaging camera, then the
shaded areas during daylight would indicate opportunities for imagery collec- Relationship Models '
tion (or conversely, the unshaded areas could indicate when operations on Relationships among entitiesorganizations, people, places, things, and
Bermuda could be carried out unobserved). Such time pattern correlations are eventsare perhaps the most common subject of intelligence modeling. There
best constructed with the help of computers. Several commercial software are four levels of such relationship models, each using increasingly sophisti-
packages are well designed for computing and displaying time series data. cated analytic approaches: hierarchy, link, matrix, and network models. The
Spatial. Another way to examine data and search for patterns is to use four are closely related, representing the same fundamental idea at increasing
spatial modelingdepicting the locations of objects in space. Spatial model- levels of complexity. The hierarchy model is a simple tree structure. A link
ing can be used effectively on a small scale. Within a building, computer aided model lets one view relationships in more complex tree structures. Matrix mod-
design/computer aided modeling, known as CAD/CAM, can be a powerful tool els show the interrelationship of two or more tree structures at a given level. A
for intelligence synthesis. Layouts of buildings and floor plans are valuable both network model can be thought of as a flexible interrelationship of multiple tree
in physical security analysis and in assessing production capacity, for example. structures at multiple levels.
66 Chapter Five Overview of Models in Intelligence 67
Figure 5-7 Hierarchy Target Model of Missile Guidance System Figure 5-8 Chemical Warfare Agent Relevance Tree
Development
Chemical warfare agents
Sulphur Phosgene
| Lewisite
mustard
Nitrogen Phosgene
mustard oximme Chlorine Ufchjoropicrinj
stole. As with generalized network models, this is a generalized link model; it in-
Figure 5-9 Financial Relationships in a Link Model
cludes people, banks, companies, government organizations, and bank accounts.
-[KudiratAbiola Michael Mathews
Figure 5-9 shows the importance of being able to see second- and third-
order links in pattern synthesis/analysis. Relationships that are not apparent
[Citibank London "Navarrio" || Melanie Walker when each piece of evidence is examined separately become obvious when
Naveed Ahmed link displays are used.
To be useful in intelligence analysis, the links should not only identify re-
Citibank London lationships among data items but also show the nature of the relationships. A
"Navarrio" subject-verb-object display has been used in the intelligence community for
[Morgan Procurement}
Nigerian Federal several years to show the nature of relationships, and it is sometimes used in
Ministry of Women's link displays. A typical subject-verb-object relationship from Figure 5-9 would
Affairs read, Mohammed Abacha (subject) owns (verb) Selcon Airlines (object). This
is a positive relationship and needs to be distinguished from negative rela-
| Citibank N.Y. "Chinquinto" tionships, such as the one between Mohammed Abacha and Kudirat Abiola
(Abacha was charged with Abiola's murder).
Quantitative relationships and time (date stamping) relationships are also
used when the link software has a filtering capability. Filters allow the user to
focus on relationships of interest and can simplify by several orders of magni-
tude the data that are shown in a link display For example, the user could se-
L-jCitibank N.Y. "Celsobella"J 1 Alain Qber lect "Morgan Procurement" in Figure 5-9 as the root (that is, the start, or left
side, of the link diagram) and display a link chart of all the group and personal
associations of Morgan Procurement. The user could then use the filters and
'|(Same connections as foi Mohammed Abacha, above) display the Morgan Procurement network of associations for a specific time
range (say, 1995-1998) and only associations with Swiss banks.
"A. Bagudu" Matrix Models. When attempting to analyze the relationships between
4 Citibank NY "Chinquinto" two hierarchies, one typically takes each hierarchy to the necessary level of de-
Alain Ober
tail and then arrays the two in a two-dimensional matrix. The result is the "in-
teraction matrix," a valuable analytic tool for certain types of synthesis. It ap-
Before the 1970s, link modeling was an arduous and time-consuming en- pears in various disciplines and under different names and is also called a
deavor because graphical trees had to be constructed on paper. Computer soft- parametric matrix or a traceability matrix.0 An interaction matrix is shown in
ware has contributed to the recent expansion of link synthesis/analysis. Soft- Table 5-1. In 2005, four proposed routes were under consideration for a South
ware tools simplify the process by allowing the relational storage of data as it
comes in and by graphically displaying different types of relationships among
the entities. Table 5-1 Interaction MatrixGas Pipeline Proposals
The primary purpose of link modeling is to facilitate the organization and
presentation of data to assist the analytic process. A major pan of many assess- Pipeline proposals Cost Supporters Risks
ments is the analysis of relationships among people, organizations, locations, and
things. Once the relationships have been created in a database system, they can From South Pars field, Iran to
be displayed and analyzed quickly in a link analysis program. Figure 5-9 illus- Karachi $3 billion Iran, Pakistan Technical
trates pan of a link display drawn from an actual case study of funds laundering From Iran to Northern India $4-5 billion Iran, India Political, security,
operations that involved Citibank private bank accounts belonging to Mo- cost
hamrned, Ibrahim, and Abba Sani Abacha. The three men are sons of General From Turkmenistan's $3.2 billion Turkmenistan, Security
Sani Abacha, the dictator who controlled Nigeria from 1993 until his death in Daulatabad field to Pakistan Pakistan
1998. General Abacha is believed to have taken more than $3.5 billion from the Underwater pipeline from $3 billion Qatar, Pakistan Political,
Nigerian treasury during the five years that he was in power.* The figure illus- Qatar to Pakistan technical
trates some of the relationships involved in laundering the funds the general
Overview of Models m Intelligence 71
Figure 5-10 Matrix for Merger and Acquisition Analysis the United Arab Republic. That proposal would not have fared well against
any of the criteria in Figure 5-10, even the one on similar cultures, and in fact,
Merger and Acquisition Criteria Company A Company B Company C the merger subsequently failed.
Network Models. The key limitation of the matrix model is that although
Shared vision of where the industry is heading it can deal with the interaction of two hierarchies at a given level, because it is
and complementary roles each company wants
to play in it a two-dimensional representation it cannot deal with interactions at multiple
levels or with more than two hierarchies. Network synthesis is an extension of
the link or matrix synthesis concept that can handle such complex problems.
Similar cultures and chemistry There are at least three types of network models:
U.S. readers, after enjoying a laugh at this, might stop to reflect that in
most countries, a common stereotype of U.S. national character is that of a
quick-on-the-draw cowboy.
Defining the modal personality type is beyond the capabilities of the jour-
neyman intelligence analyst, and one must turn to experts. 1 offer here only a
Negative i Bank account brief overview of the topic of behavioral profiles to indicate their importance
relationship in the overall decision-modeling problem, which is discussed in chapter 13.
Positive relationship (_) Organization The modal personality model usually includes at least the following elements:
(thickness indicates ^.^
strength) O
Concept of selfthe conscious ideas of what a person thinks he is,
along with the frequently unconscious motives and defenses
against ego-threatening experiences such as withdrawal of love,
community uses an efficient method of drawing network diagrams to make re-
lationships more apparent; ii is illustrated in Figure 5-12. public shaming, guilt, or isolation
Relation to authorityhow an individual adapts to authority figures
Profiles
Modes of impulse control and of expressing emotion
Profiles are models of individualsin national intelligence, the leaders of Processes of forming and manipulating ideas
foreign governments; in business intelligence, the top executives in a compet-
ing organization; in law enforcement, mob leaders and serial criminals. The Three model types are often used for studying modal personalities and
purpose of creating profiles usually is to help predict what the profiled person creating behavioral profiles:
will do in a given set of circumstances.'2 Chapter 13 discusses the use of pro-
files for prediction,
Cuffura! pattern models are relatively straightforward to analyze (see
The pattern of mental and behavioral traits that adult members of a soci- chapter 13) and are useful in assessing group behavior. They have
ety share is referred to as the society's modal personality. Several modal person- less value in the assessment of individuals. Cultural patterns are
ality types may exist in a society, and their common elements are often referred derived from political behavior, religious idea systems, art forms,
to as national character. A recurring quip that reflects widely heldthough mass media, folklore, and similar collective activities.
tongue-in-cheekviews of national character goes:
Child-rearing systems can be studied to allow the projection of adult
Paradise is where the cooks are French, the mechanics are German, the
personality patterns and behavior. They may allow more accurate
police are British, the lovers are Italian, and it is all organized by the Swiss.
assessments of an individual than a simple study of cultural pat-
Hell is where the cooks are Bntish, the mechanics are French, the police
terns, but they cannot account for the wide range of possible pat-
are German, the lovers are Swiss, and it is all organized by the Italians.
tern variations occurnng after childhood.
/t
Overview o/ Models in Intelligence 75
Figure 5-13 Simple Process Model Figure 5-14 Business Process Model
Process Procurement
Input Output
Note The encircled X show? where the input and the feedback combine
before they feed into the process.
can be very large. Such models are widely used in both ihe financial and in-
telligence communities. Intelligence applications include trade, balance of Figure 5-16 Proposed South Asian Natural Gas Pipeline
payments, and worldwide energy analysis models.
Economic modeling also makes use of input-output modeling, a proce-
dure in which the output product of an industrial sector is set equal to the
input consumption of that product by other industries and consumers. Unlike
many other models, input-output models are often very disaggregated and can
therefore show more cause-effect relationships. Input-output models can be
interpreted in terms of block diagrams and matrix algebra techniques. Input-
output modeling has been applied to a variety of economic policy analysis and
forecasting problems.
Combination Models
Most of the models I have described can be merged into combination
models, for example, a relations hip- time display This is a dynamic model in
which link or network relationship lines become thicker (strengthen) or thin-
ner (weaken) over time, and nodes change size or disappear, A commonly
used combination model, and probably the most important for predictive in-
telligence purposes, is the scenario, a very sophisticated model, which is dis-
cussed in chapter 10. The following are some other examples of combination
models that are frequently used in intelligence analysis.
Geospatial Models
and law enforcement units, and the processing part is automated; that is, it in-
The most widely used combination model in intelligence analysis un-
doubtedly is the geospaual model. Geospatial modeling combines imagery, geo- corporates automated scene description and automated target recognition.
spatial information (e.g., maps and charts), and location information from mul- Geospatial models can be very complex and may have many associated
tiple sources to describe, assess, and visually depict physical features and submodels or collateral models. Figure 5-16 presents a geospatial model of a
geographically referenced activities on the Earth. But it is more than combining complex systema South Asian gas pipeline that was proposed during 2005
maps with imagery It is sometimes considered a collection-and-processing dis- to carry natural gas from fields in Iran and Turkmenistan to customers in Pak-
cipline, but it really is an example of the target -centric approach to analysis. istan and India. The map in Figure 5-16 is a simple model showing one pos-
Geospatial modeling typically uses electronically stored maps (of the sible route. The pipeline itself is a complex system that includes a number of
world, of regions, of cities) to display geographically oriented data. The dis- political issues (international agreements that have to be concluded, and the
plays are valuable for visualizing complex spatial relationships. Networks requirement for an unprecedented level of cooperation among traditionally
often can be best understood by examining them in geospatial terms. hostile powers in the region); technical issues (route selection; design and con-
It is a very old analytic technique. Sun Tzu, in his Art of War, published struction of the pipeline); security issues (the pipeline is an obvious target for
around A.D. 500, advocated reliance on geospatial models in planning mili- terrorists); and economic and commercial issues (pricing terms for gas, and
tary movements. He observed, "We are not fit to lead an arm}' on the march which companies and middlemen get what benefits). Once in operation, the
unless we are familiar with the face of the country' its mountains and forests, pipeline would significantly change the economies in the region.
its pitfalls and precipices, its marshes and swamps. " M Sherlock Holmes used The effects of such a pipeline would reach far beyond South Asia. Euro-
geospatial modeling frequently in criminal investigations. pean, Russian, and U.S. companies would compete to build it. When built, it
In practice, geospatial modeling is an "all-source" analysis method that would change the patterns of gas distribution worldwidemore gas would
often incorporates advanced technical collection methods, HUMINT, and flow to customers in South Asia, and less to other regions. Many governmen-
tal intelligence services would have an interest in this very complex system,
COMINT. Every source analysts group constructs geospatial models to solve
and each of them would have many customers in the political, economic, and
analytical problems. The method is also increasingly used by tactical military
military departments of their governments. Commercial firms that stand to
80 Chapter Five
Overview of Models in Intelligence 81
gain or lose from the pipelined construction would conduct their own intelli-
gence efforts. A system for analysis of this example would be global and com- Figure 5-17 Ship TrackingA Combination (SpaceTime) Model
plex. Figure 5-16 shows a simple structural view of the system.n A functional
view would deal with the economic changes that the pipeline would cause. A
process view could show the patterns of gas extraction and delivery, the polit-
ical processes no reach a pipeline agreement, or the security processes to pro-
^&
tect it, among Other things. As discussed in. chapter 3, there would be many
submodels or collateral models of the system. Tracking lost
83
Sources of Intelligence Information 85
84 Chapter Six
Figure 6-2 An Analyst's View of the Collection Taxonomy includes much more than traditional published sources. Large volumes of im-
agery, for example, are becoming publicly available from commercial imaging
Intelligence collection sources satellites. Commercial databases hold vast quantities of economic data that are
available for the price of a subscription. All fit the open source category, though
they are not published in the traditional sense.
Open source material is perhaps the most valuable source of intelligence,
and it is typically the most easily overlooked by government intelligence orga-
Open Human Communications Imagery Specialized nizations in favor of classified information. Its chief value is that it is relatively
intelligence intelligence intelligence technical
source
(HUMINT)
easy to obtain. Analysts should not turn to more expensive collection re-
(COMINT) (IMINT) collection sources until they have exhausted the potential of OSINT; and analysts should
keep coming back to it as the expensive sources provide new leads.
The taxonomy of Figure 6-1 is based on resource control ("turf) consid- Too many analysts mistakenly consider "secret" data collected by coven
erations and, from an analyst's standpoint, is artificial. The taxonomy approach means more meaningful or important than open or unclassified data and to
in this book is quite different. Instead of following the U.S. stovepipes, this weigh it more heavily4 The WMD Commission observed that analysts "rely
book tries for a logical breakout that focuses on the nature of the material too much on secret information and use non-clandestine and public informa-
collected and processed, rather than on the collection means. Figure 6-2 illus- tion too little. Non-clandestine sources of information are critical to under-
trates [his view of collection sources. Each of the dominant and widely used standing societal, cultural, and political trends, but they are underutilitized."''
sources of intelligenceopen source, HUMINT. COMINT, and IMINTis Political analysis draws heavily on open source intelligence. The state-
covered, along with some of the advanced techniques that intelligence en- ments of government leaders tell us much about their attitudes, their person-
compasses. The remainder of the chapter covers some specialized technical alities (for personality profiling), the stresses that may exist within their gov-
collection and processing techniques, many of which tend to be described as ernment, and many other things. Their statements always have to be analyzed
MAS1NTanother term, like S1GINT, that is too general to have much value. in context (whom they are talking to and what agendas they have, for exam-
Although the perspective of Figure 6-2 has more utility for analysts, no ple) and should be assessed with a good understanding of the leaders' national
separation of collection methods is completely satisfactory, or "clean." Over- and organizational cultures. Fine nuances in public statements can convey
laps will occur no matter what taxonomy is selected. much to an experienced political analyst. Economic analysis also relies heav-
ilyin fact, primarilyon open source material, especially the very large
The Dominant Intelligence Sources databases on international trade and national economies that have been as-
Four sources of intelligence dominate in volume and impact: open source, sembled by international organizations sucb as the United Nations. Scientific
plus the three classified sourcesHUMINT, IMINT, and COMINT. All have a and technical (S&T) analysis makes extensive use of open literature in predic-
history in intelligence that goes back hundreds of years. The use of open tion, as discussed in chapter 14.
sources in intelligence probably dates back to the beginnings of written lan- A common misconception is that open source material is less useful for
guage. HUMINT efforts are described in the Old Testament ("Moses sent them military intelligence because the "good" material is classified. On the contrary,
to spy out the land of Canaan") ! COMINT dates back at least to reading sig- one of the major intelligence successes of World War II was based on the skill-
nal flags and smoke signals and deciphering written diplomatic communica- ful use of open sources. Although the Germans maintained censorship as
tions. IMINT predates the camera, if sketches of castles and towns by spies in effectively as anyone else, they did publish their freight tanffs on all goods, in-
the Middle Ages can be considered IMINT. cluding petroleum products. Based on those tariffs, a young U.S. Office of
Open Source Strategic Services analyst, Walter Levy, used geospatial modeling to pinpoint
the exact location of the German refineries, which were subsequently targeted
After exhausting the existing internal knowledge base, analysts can go to by Allied bombers.6 In more recent times, open source has been particularly
the easiest external sources (open literature, on-line databases). Open source effective in providing intelligence about terrorists and insurgent groups.7
information has traditionally meant published material that is publicly avail- As in other areas of intelligence, the general rule for open source is this:
ablenewspapers, books, and periodicals. As such it is sometimes referred to What is said is not so important as who said it. Statements by a head of gov-
as literature intelligence (LITINT) or open source intelligence (OSINT). Today OSINT ernment typically carry more weight than those of a head of state. A finance
88 Chapter Six Sources of Intelligence Information 89
minister's statements on budgetary issues carry more weight than do the same However, some may be found in public libraries as a result of errors in docu-
statements made by a minister of the interior. ment control or distribution, and they can often be obtained by clandestine
Ironically, one problem of open source intelligence is thai it is so abundant; collection (for example, by agents). The in-house publications of many re-
an analyst cannot possibly take advantage of all the available material. In fact, search organizations, even when not restricted, are often more valuable than
an analyst cannot even leam about all of the available ways lo obtain open normal trade journals; they tend to present more detail on work being earned
source materials. Tracking the data sources is a full-time job. The solution is to on within the organization. Conference proceedings, which also fit into the
turn to experts on research. Reference librarians can help search and retrieve gray literature category, usually have more value than the widely distributed
documents from many different databases, including commercial ones. As those journals and magazines.
databases become available worldwide, almost any country or commercial com- The Internet provides an equivalent to gray literature in Web sites and
pany should have an excellent research capability available to its analysts. chat rooms that have password-protected content. Such sites often can have
Historically, most open source material came in printed ("hard") copy. great intelligence value. The challenge, of course, is getting into them.
Today, the most commonly used sources are on-line.
On-Line Data Sources. A wide variety of useful on-line databases are now Human Intelligence
available through the World Wide Web. The number and availability of unclas- Human intelligence, or HUM1NT, encompasses a variety of means for
sified commercial databases are changing so rapidly that this book makes no at- gathering information on foreign developments; its focus is people and their
tempt to catalog them. The rapid expansion of global information networks has access to information on topics of interest. HUM1NT is best used to provide
opened to analysts large volumes of previously unavailable information. information that is not available by other means. It typically is the best source
A persistent problem with on-line data sources remains the difficulty of on an adversary's plans and intentions It usually is the best method of dealing
extracting relevant information from the mass of data. The analyst inevitably
with illicit networks.
encounters information overload. Both government and commercial develop- Compared with the other INTs, HUMINT takes more time to collect be-
ment projects continue to work toward the goal of creating a human-computer
cause of the need to contact the source, even when that source has already
team that would dramatically improve the capability of human analysts to
been developed (that is, recruited). HUMINT is not always on target; collec-
make inferences in complex, data-intensive domains. Such a team would vastly
tors have to take their best shot working with the sources they have. But
increase the ability to identify key facts hidden in immense quantities of irrel-
HUMINT is flexibleinformation that is not available from one source may be
evant information, to assemble large numbers of disparate facts to reach valid
available from another, or from piecing together several sources. HUMINT is
conclusions, and to produce new patterns that assist in further analyses. We
best used to go after targets such as an opponent's plans, trade secrets, or po-
can reasonably expect to see steady progress in techniques for extracting rele-
vant information from the morass. litical stability or for negotiation support. It also provides critical leads for fur-
In the interim, specialized databases offer some relief from the search ther targeting by HUMINT or other INTs.
Governmental HUMINT activities include embassy officers' assessments,
problem. For example, one of the more useful sources of technology informa-
information elicited from contacts, information from paid agents, and docu-
tion for both government and business intelligence is in on-line patent data-
ments or equipment clandestinely acquired by purchase or theft. The human
bases. For many organizations that perform classified research, patents are the
only way to publish their results openly. sources can be diplomats and defense attache's, international conference at-
Hard Copy Sources. Some open source material still is not available tendees, defectors, emigres, or refugees. (An attache is a technical expert on
the diplomatic staff of his or her country at a foreign capital. An emigre is a
through the Web. Hard copy open source literature can be obtained from li-
person who was forced to emigrate, usually for political or economic reasons.)
braries and commercial databases and from scientists and businesspeople who
have frequent dealings with their foreign counterparts. Valuable sources in- Cooperating private individuals and organizations also can supply privi-
clude newspapers, telephone books, monographs, journals, patents, and tech- leged information that they encounter in the course of their work. Non-
nical literature governmental organizations have proliferated in recent years and are increas-
The most useful of such documents are the closed, restricted, and semi- ingly useful sources about foreign developments
classified journals known as gray litemlure. State ministries and large research HUMINT is one of the primary collection methods in law enforcement.
and manufacturing organizations publish journals that contain sensitive or The American Mafia is only a shell of what it used to be, in no small part be-
proprietary information. Some of them are classified. Most of them are con- cause of law enforcement's aggressive use of human sourcesinformers or
trolled, and access is restricted, so it is a bit of a stretch to call them open source. "snitches" in the trade.5
90 Chapter Six Sources af Intelligence Information 91
HUMINT is a major source of intelligence information for many commer- for counterespionage operations using dock workers' unions, and by the Of-
cial organizations, and many governments also use HUMINT for commercial fice of Strategic Services for similar operations against the Fascist government
purposes. Most corporations do not use clandestine HUMINT (for exam- in Sicily. Mafia chief "Lucky" Luciano was released from prison, reportedly for
ple, agents in the employ of their competitors) for ethical reasons. If ethics his assistance in counterintelligence and to help with the Sicilian operation.11
does not constrain corporations, they nevertheless usually avoid clandestine The effectiveness of the Mafia liaison has been hotly debated over the
HUMINT because of the costs associated with exposure. Two examples illus- years, and many intelligence officers argue that intelligence groups should not
trate the exposure hazards of clandestine commercial HUMINT. In 2001 Proc- cooperate with criminal organizations. Their reservations are often summed
tor and Gamble engaged in information collection against rival Unilever that up with the adage, "If you go to bed with dogs, expect to wake up with fleas!"
included the technique known informally as dumpster diving or TRASHINT The contrary argument is that one should use a nonjudgmental approach
sifting through Unilever's off-property trash for documents. Once exposed, when choosing liaisonsif they can help more than they hurt, use them.
Proctor and Gamble reportedly agreed to pay Unilever $10 million as part of Liaison entails a number of risks, one being the problem of false corrobo-
a settlement.9 In 2000 Oracle Corporation admitted that it had hired an in- ration. It is not uncommon for several intelligence services to unwittingly use
vestigator to find documents embarrassing to Microsoft; the tactics used re- the same agent. (After all, if one service will pay you for what you know, oth-
portedly included covert searches of Washington, D.C., political organizations ers may also be willing to do so.) When the agent's information is shared
and payment to janitors for trashed documents showing improper Microsoft among intelligence services via liaison, it will seem to come to the analyst from
activities lo Both incidents resulted in damaging media coverage of the offend- different sourcesthe liaison service and the analyst's own HUMINT service.
ing companies. As a result, a single agent's information will be given added credibility that it
HUMINT collection can cover all phases of a development program, from does not deserve.
concept to production or deployment and operations of systems. HUMINT Another problem with liaison is the necessity to rely on the liaison service
sources have provided biographical information on research scientists, identi- to check out the source's credentials (known as vetting the source). Germany's
fied research institutes, and assessed systems under development. They have federal intelligence service, the END, provided the United States with intelli-
brought to light trends in research programs, identified key sites and equip- gence about Iraq's alleged biological warfare program from a human source
ment, and obtained photographs of sites and platforms. HUMINT data also code-named Curveball. In that case, the Germans themselves apparently were
make the data collected by COMINT, IMINT, and open source intelligence suspicious of the source, but they did not allow U.S. intelligence officers to in-
more comprehensible, and thus more effective, and yield important insights terview him. U.S. analysts nevertheless relied heavily on Curveball's informa-
into data collected by the technical collection systems described later in this tion in reaching an erroneous judgment that Iraq had an active biological
chapter. Access to equipment or technical documentation collected through weapons program in 2002. l2
HUMINT gives an analyst an inside view into performance capabilities or pro- Elicitation. Elicitation is the practice of obtaining information about a
duction techniques that supplements data collected by technical sensors. topic from conversations, preferably without the source knowing what is hap-
The following sections outline HUMINT techniques that utilize liaison re- pening. Elicitation is widely practiced in gatherings of diplomats and military
lationships, elicitation, Emigres and defectors, clandestine sources, sampling, attaches and in the commercial sector during business executives' social hours
and materiel acquisition. Their common theme is that the intelligence is col- and sales conventions. Because the-participants are all aware of the game, the
lected by one person interacting with another person to obtain information. information that is elicited may be tainted. But the gatherings are also valuable
Liaison Relationships. National intelligence organizations typically have avenues for sending signals. Businesses in particular use this channel to signal
liaison relationships with intelligence and law enforcement groups in other competitors informally about their intentions, especially in cases when use of
countries, sometimes even when official relationships between the two coun- more formal channels would violate antitrust law.
tries are cool. Corporate intelligence groups have their own liaison networks Making direct contact with knowledgeable sources in their home country
to share information about such things as terrorist threats to corporate execu- or organization is often difficult, and the setting can be unfavorable for elici-
tives abroad. tation. However, these sources often publish their work or discuss it at inter-
Intelligence liaison also is not uncommon among governmental and non- national conferences and during visits with other professionals. Elicitation is
governmental groups. Nongovernmental organizations provide many oppor- an effective tactic to use at such professional gatherings, particularly ones
tunities for governments or commercial firms to conduct liaison for intelli- where economists, trade specialists, scientists or engineers convene to present
gence gathering. Among the better known historical examples were the World papers. These professionals are a valuable source of HUMINT, and the greater
War II liaisons set up by the U.S. Office of Naval Intelligence with Mafia groups their egos, the more informationand the more valuable informationthey
92 Chapter Six Sources of Intelligence Information 93
are likely to impart. They are connected to others in their field in their home honored tradition of providing governmental protection for defectors; they at
country and in their organizations. Analysts, when they possess the appropri- first refused to prosecute Lopez, and an eventual prosecution was dropped.14
ate credentials, often attend such meetings and do their own collection by Volkswagen eventually paid GM damages in a civil suit. Corporate defectors to
eli citation. a country having less cordial relations with the United States would likely gain
The challenge in getting information from an elicitation source is to ask more protection, as would the company they defected to.
the right questions. Experts have advantages in elicitation because of their Clandestine Sources. Clandestine HUMINT sources (the classical spies,
knowledge of the subject matter and because the elicitation appears to be a moles, or agents of spy fiction) are possibly the highest cost source for the
natural part of their interaction with other experts. Experts, however, bring quantity of information obtained. Therefore, targeting must be done carefully.
their own biases to the process. Clandestine HUMINT may be the best way to determine plans and intentions.
A variation on elicitation is to trade for information. While Peter Schwartz Clandestine HUMINT is usually carried out by intelligence operatives.
was at Royal Dutch Shell, he made regular use of scenarios (a sophisticated They normally work through a network of clandestine sources (agents) who
type of model) as a medium of exchange by presenting talks on them to se- are recruited from the local population.
lected groupsfor example, insights on airline fuel futures to airline execu- In normal times the tight secunty that must surround and protect the
tives. In return, he received information from the executives on airline plan- clandestine source means that substantial time delays occur between the time
ning that he could use to refine his scenarios.13 the source finds out about something and the lime the information reaches
Emigres and Defectors. Government intelligence routinely makes use of an intelligence analyst. Fast communication of perishable data is important in
emigres and defectors. Emigres have departed a country legally, but some crisis or wartime, but speed tends to increase the risk that the source will be
countries would not have allowed them to leave if they had information of sig- exposed.
nificant intelligence value. Defectors have departed the country illegally and Sampling Techniques. Sampling techniques are best known for their use
often have information of value. in public opinion polls. When analysts need to know something about a large
However, both emigres and defectors have voluntarily cut their ties with population (such as the mean sensitivity and standard deviation of sensors de-
their native lands, usually for economic or political reasons. As a consequence, ployed worldwide in large numbers, or the attitudes on Middle East issues
their objectivity on such issues is in question, and their information must be among the Arab population), they do not undertake the difficult or impracti-
carefully screened. As with elicitation sources, asking the right question is im- cal task of surveying each member of the population. Instead analysts make
portant; defectors want to please their new friends, and they may give answers estimates based on a small subset, or sample, of the population. Sampling the-
that do that. ory makes the estimative process more efficient by suggesting strategies for
Corporate intelligence routinely makes use of a different type of emigre or selecting the subset to be used in making an estimate, by defining alternative
defectorone who formerly worked for the competitionto get information methods for making estimates from the subset data, by helping to reduce the
about trade secrets such as marketing strategies, costs, and proprietary cost of taking samples, and by providing techniques for quantifying (in a pre-
processes. Corporate emigres and defectors typically have the same problems dictive sense) the size of the estimative error associated with a given sampling
with objectivity as governmental defectors. In addition, these people carry the or estimation algorithm.
added baggage of former employment agreements and legal issues that the tra- Sampling techniques in intelligence require additional skills besides those
ditional emigre or defector is not forced to carry. When changing corporate required in conventional public opinion polling as it is done in many coun-
loyalties within a country, a corporate emigre or defector cannot expect gov- tries. If one wanted to know the attitudes of narcotics couriers regarding a
ernmental protection if he or she is accused of stealing trade secrets. Interna- pending change in the United Kingdom's drug enforcement policy, for exam-
tionally however, such protection may be available. During 1993 and 1994 ple, telephone polls or direct interviews would not work well. Clandestine
the international automobile industry was the stage for the dramatic defection polling, using indirect approaches to elicit responses, might work. In a well-
of J. Ignacio Lopez de Amortua and six other senior managers from General run clandestine sample, the target audience is never aware that it has been
Motors (GM) to Volkswagenwerk AG. Lopez and his colleagues apparently polledat least not about the issues that the pollster is focusing on.
took a number of sensitive GM documents with them, as any defector should Materiel Acquisition. Materiel acquisition and exploitation are presented
do if he wishes to increase his value to his new organization. Lopez was ac- here as part of HUMINT because the acquisition is usually a clandestine effort
cused of masterminding the theft of more than twenty boxes of documents on that uses human sources. Materiel acquisition (materiel is the equipment, appa-
research, planning, manufacturing, and sales when he left GM to become a ratus, and supplies used by an organization or institution) has long been prac-
Volkswagen executive in 1993. The German government followed the time- ticed in commercial intelligence. Throughout recorded history, manufacturers
94 Chapter Six Sources of Intelligence Information 95
have acquired samples of a competitor's product for evaluation as pan of plan- The Bruneval raid was a success because the British, like the Soviets dur-
ning sales tactics, to copy good ideas, or even for reverse engineering. The Hit- ing the cold war, knew exactly what they wanted. The acquisition team had an
tites of Asia Minor were early targets of materiel acquisition efforts. Middle East- expert analyst intimately involved at every step. Most successes in materiel ac-
erners, at the time using bronze, acquired iron weaponry from the Hittites." quisition since that time have involved carefully focused teams closely tied to
Today most materiel acquisition by governmental intelligence agencies is by pur- analytical expertise. Many failures have resulted when the acquirers, separated
chase, usually through middlemen to conceal the intended destination. Many from the analysts, had no real idea what they were trying to get or why
commercial firms (all automobile manufacturers, for example) purchase their The most expensive single materiel acquisition effort may have been the
competitors' new products for evaluation. Glomar Explorer's effort to raise a sunken Soviet submarine. In April 1968, a So-
The Soviet intelligence services were very good at clandestine acquisiiion. viet Golf class submarine on patrol northwest of Hawaii exploded and sank in
On one occasion they acquired a new IBM computer before it was officially on 17,000 feet of water, carrying all ninety men aboard down with ic. Soviet sal-
[he market. The result must have been less than satisfactory for the Soviets, vage vessels were unable to locate the sunken craft, but the U.S. Navy pin-
however, because none of the IBM sales or maintenance people they subse- pointed its location using its more sophisticated search equipment. At that
quently contacted knew how to make it work. point the CIA entered the picture with a proposal to recover the submarine.
Materiel acquisition can also be done by special operations. One of the best That was the beginning of the project that was reportedly code-named Jennifer.
known materiel acquisition efforts was the Bmneval raid of World War II. lfi In The CIA contracted with Howard Hughes's Summa Corporation to build
fall 1941, Dr. R.V Jones, assistant director of Britain's Royal Air Force Intelli- a 620-foot-long deep-sea recover)' vessel, equipped with huge derricks, and a
gence Section, was zeroing in on a new German antiaircraft fire control radar companion barge to conceal the submarine when it was recovered. The Glo-
that was believed to transmit on a frequency of 570 MHz. One of the more dar- mar Explorer was built under the cover of a deep-sea mining mission and was
ing British reconnaissance pilots finally brought back a picture of a new radar completed in 1973 at a cost of S200 million.
located near Bruneval, France. The British quickly noted that the new radar During July and August 1974 the Glomar Explorer located the submarine
was located less than two hundred yards from the coast. They settled on a com- and began recovery operations. Cables were looped around the submarine,
mando raid to obtain detailed information about the radar and assembled a and winches began slowly pulling it up toward the barge. About halfway up,
company of paratroops to make an airborne assault. A naval assault was too the hull broke apart, and two-thirds of the submarine fell back, to be lost on
risky because of the high cliffs around Bruneval, but a light naval force was as- the bottom. The remaining third was recovered and yielded valuable intelli-
sembled to handle the commandos" evacuation. Jones, in the meantime, had gence, but the sought-after prizesthe code books and nuclear warheads
identified the German radar by nameWurzburgbut still could not confirm reportedly were lost.1G
thai the radar was the source of 570 MHz signals. Although Project Jennifer did not totally succeed, it illustrates the combi-
Jones specified in detail the pans he wanted his selected acquisition nation that makes for collection success: innovation and doing the unexpected.
teamRoyal Engineers and a radar mechanicto bring back. They included U.S. intelligence collection's single biggest assetand possibly its single biggest
the feed antenna for the radar dish, which would establish the operating fre- advantage over other collection servicesis the innovativeness and unpre-
quency of the radar; and the receiver and display equipment, which would re- dictability of Americans. In materiel acquisition, as in HUMINT generally, U.S.
veal whether any antijamming circuits existed. The transmitters would estab- intelligence officers have tried things that other services are too unimaginative
lish German technology for generating 570 MHz signals. Two radar operators or too cautious to try, relying heavily on the U.S. edge in sophisticated techni-
were to be taken prisoner, if possible, so that they could be interrogated about cal collection. Of course, U.S. collection services also have taken more risks
the radar's operation. Finally, if equipment could not be removed, the labels
and consequently gotten into more trouble.
and inspection stamps were to be taken, because they would provide valuable
background information.
Communications Intelligence
The raid, code-named Operation Biting, took place on the night of Febru-
ary 27, 1942. It was an unqualified success. The Bruneval force made off with Communications intelligence, or COMINT, is the interception, process-
the radar receiver, modulator, and transmitter, plus the feed element, which ing, and reporting of an opponent's communications. Communications in this
they sawed off the anienna. They brought back exactly what Jones had asked definition includes voice and data communications, facsimile, Internet mes-
for, except that only one radar operator was captured. 17 With the knowledge sages, and any other deliberate transmission of information. COMINT is col-
gained from this raid the British were able to develop successful counter- lected by aircraft and satellites, oven ground-based sites, a limited number of
measures to the Wurzburg. seaborne collectors, and some covert and clandestine sites.
96 Chapier Six Sources of Intelligence Information 97
COMINT is traditionally considered the province of governments and is ciphered. On the night of August 25, German radio units intercepted messages
generally illegal when conducted by a private entity. But an increasing number that gave the deployment and missions of the two Russian armies. Over the
of countries use COMINT for economic as well as political intelligence, tar- next few days, more intercepted messages gave away the strength, positions,
geting especially satellite communications, and some business enterprises do and movements of the Russian armies. It quickly became apparent to the Ger-
so as well. COMINT collection equipment is readily available in the commer- man commanders that General Samsonovs Second Army was being placed in
cial market worldwide. The best commercial units are not cheap, but they rival an exposed position near the German town of Tannenberg and that Russian
the best units that government COMINT organizations can supply. General Rennenkampf's First Army was not in a position to provide support if
COMINT collection, like HUMINT collection, can provide insighis into Samsonov's army was attacked.
plans and intentions. It can contnbute information about people, organiza- General von Hindenberg, commander of the German Eighth Army, posi-
tions, financial transactions, equipment, facilities, procedures, schedules, bud- tioned his entire force for an attack on the Russian Second Army. On August
gets, operations, testing, deployment, and environmental conditions. COMINT 26 he began the attack, and over the next three days he deployed his units in
gives clues about relationships and organizations, and perhaps about sensitive response to Russian countermoves, being forewarned of them by additional in-
or classified projects. The chief constraint on its use today is that it is labor in- tercepts of Russian radiograms. The result was a spectacular German victory.
tensive, relying as it does on trained linguists. Eventually, machine translation The Russian Second Army was decimated. General Samsonov committed sui-
of speech can be expected to ease this bottleneck. In the past, COMINT seldom cide, and the eastern front ultimately settled into a stalemate.20
provided much detail because it dealt primarily with brief conversations. That An interesting footnote to Tannenberg is the unanimous declarations by
is no longer the case, as large volumes of material are now transmitted by data all of the key German participants that the intercepted information, although
communications or facsimile. useful, was not critical to the outcome. Von Hindenberg himself, in his writ-
Targets of COMINT for strategic intelligence could include government ings, gives the impression that he had no such information on the Russian dis-
leadership, research and design organizations, test facilities, economic activi- positions21 In World War II, General Omar Bradley and Field Marshal Bernard
ties such as international funds transfers, participants in test and operational Montgomery treated the intercepts of the German Enigma cipher machine in
activities, and executive policy discussions. similar fashion, crediting their own operational skill for their victories.22 Such
Military services conduct the hulk of COMINT activity worldwide, in statements deserve a certain amount of skepticism. They are the standard dis-
which linguists monitor the mobile radio communications of opposing forces. claimers of successful generals, statesmen, and corporate executives who have
COMINT that supports ongoing operations, known as tactical COMINT, is good intelligence support. In the intelligence business, openly crediting sources
used heavily in law enforcement work and in countering illicit networks gen- can cause the loss of those sources. Moreover, a leader does not want to give
erally. The case of Pablo Escobar, to which we referred in chapter 1, is a typical too much credit to his intelligence information, because the logical inference
example. Military COMINT is used extensively against air-to-ground, ground- is that the leader with the best intelligencenot the best leadership skills
to-ground, and naval communications. Most involves the intercept of radio will win. The truth probably lies somewhere in the middle.
communications, though the use of underwater sound communications by Encryption technology has outpaced cryptanalysis in the decades since
submarines has spurred the development of COMINT capabilities in under- World War II, and it would be very difficult, if not impossible, to repeat the
water acoustics. Allied successes of that war. The lessons of the war were learned by all coun-
COMINT has achieved a number of successes in wartime. During World tries, and most cryptanalysis successes now come through radio operator mis-
War II the United States scored its Midway victory over the Japanese navy takes, such as those that the Russians made at Tannenberg. Of course, a large
largely because U.S. cryptanalysts had cracked the Japanese naval codes and amount of military and civilian radio traffic remains unencrypted, but the
were able to identify Midway as the Japanese target. In Europe the British suc- trend is to encrypt highly sensitive communications. There are several primary
cess at breaking the German Enigma cipher codes contributed to several techniques for COMINT collection.
World War II successes, including the Normandy landing,19 Microphones and Audio Transmitters. The micro phone -and-wire is an
One of the earliest and most significant successes for COMINT occurred old technology still widely used by some intelligence services. It is cheap, re-
at the Battle of Tannenberg, late in August 1914, during the opening moves of liable, and long lasting. Unfortunately, it is also relatively easy for counterin-
World War I. The Russian First and Second Annies were advancing through telligence units to find.
East Prussia toward the German Eighth Army. Communications among the The audio transmitter, popularly known as the bug, also has been a useful
Russian headquarters were handled by high-frequency radio, which can be re- technical intelligence tool for decades. Because it transmits a radio signal,
ceived over a wide geographic region, and some of the messages were not en- rather than using a wire, it is simpler to put in place than the microphone-and-
wire. It also is cheap and requires no great technical skill lo use, so it is par- When used as a specialized type of microphone, the accderometer picks
ticularly popular among the less-sophisticated intelligence organizations and up mechanical vibrations directly from the building structure and transmits
in industrial espionage. The audio transmitter typically uses low radiated the audio out of a facility via wire or a radio transmitter. Whether the vibra-
power to avoid detection, has its own power supply (unless it can tap into the tions are from voice or machine noise, the accelerometer can effectively receive
building's power system), and is small enough to be effectively concealed. In- sound from several rooms away. Typically, the accelerometer is placed in a
creasingly, bugs can provide video as well as audio. structural beam that runs into the area to be monitored. When the vibrations
Advancing technologies in miniaturization, power sources, and transmis- from conversations in that room travel along that structural beam, the ac-
sion techniques have provided these capabilities. Burst transmissions (very celerometer will pick them up.
short radio signals, usually one second or less), spread spectrum (typically sig- Fluidics, as a method to surreptitiously collect audio information, exploits
nals that look like noise), and other techniques are available to reduce the the way in which acoustic energy travels with relatively low loss in liquids, or
probability of signal intercept. Difficult-to-detect infrared links are also avail- in gases if channeled. Thus, if a water pipe picks up acoustic energy, the audio
able. Remote command and control techniques can switch transmitters on and signal will travel long distances within the pipe. Electrical conduit or air ducts
off, reducing the probability of detection and conserving batter}' life. will also propagate audio over substantial distances. The old-style audio head-
Telephone Surveillance. Telephone conversations are perhaps the most sets that passengers used in many commercial airliners took advantage of this
common source of COMINT. The traditional approach is to monitor the tele- channeling effect in an air conduit.
phone of interest via a tap. In addition to monitoring normal telephone con- Since the 1960s radio frequency flooding of installations has been used for
versations, some devices take advantage of the fact diat telephone instruments intelligence data collection. The flooding signals usually operate in the mi-
can transmit room conversations (audio) along telephone lines when the tele- crowave range and are used to collect data remotely, much as a radar senses its
phone handset is resting in its cradle (on hook). Some telephone instruments, target. Flooding depends on the fact that objects, especially metal ones, vibrate
as designed, pass audio while on hook; others may do so inadvertently be- slightly in response to audio in a room. A beam of microwave energy striking
cause of faulty installation or damage. The introduction of new and sophisti- the metal object will be reflected from it with some weak modulation imposed
cated computer-based telephone systems has greatly expanded the possibilities by the audio vibrations. If the reflected energy can be collected and demodu-
of this technical surveillance technique. lated, conversations in the area can be monitored. Innocuous signals such as
Telephone conversations also can be intercepted in bulk by COMINT those emanating from a television or radio station can be used successfully to
equipment, if the equipment is properly positioned to collect microwave point- flood an installation. Flooding has also been directed at devices such as type-
to-point transmissions from the telephone company's trunk lines. Unencrypted writers. Signals directed at the typewriters are modulated by the keystrokes,
cellular telephone networks are also an easy target. A major problem with such and the modulated signal is received by nearby antennas, thereby compro-
intercepts on civil systems is that the quantity of conversation that must be mising the information typed.
processed can swamp the COMINT processorsespecially if the language Perhaps the best known instance of radio frequency flooding was that
must be translated. Some means of specific telephone recognition must be conducted by the Soviets against the U.S. Embassy in Moscow early in the cold
found to allow selection of the conversations of interest. In modern telephone war. The Soviets had concealed a passive sound pickup device in the great seal
systems, that can be difficult indeed. of the United States that they presented to the U.S. ambassador and that sub-
Much international telephone and data traffic is carried via communica- sequently decorated the ambassador's study. The device was a small, U-shaped
tions satellites. This traffic can be intercepted by many unintended recipients. metal support for a strip of spring steel. The steel strip would vibrate slightly
Such activity for commercial intelligence purposes is likely to increase in the in response to sounds from within the office. When the seal was illuminated
future, though it is illegal under international law. A number of governments with a strong microwave signal from a nearby Soviet-con trolled building, the
routinely intercept satellite communications, sifting them for information of U-shaped support acted as an antenna and would pick up the microwave en-
value, including information that will permit their own companies to compete ergy and reradiate it, modulated by the audio signal from within the room. A
in international markets. nearby receiver would pick up and demodulate the reradiated signal.25
Other COMINT Techniques. If an intelligence service cannot gain access Laser radar techniques have been used to exploit audio vibrations from win-
to a facility to install a micro phone-and-wire or audio transmitter, it can some- dows or fixtures within an office since the 1960s. The principle is the same as
times use one of several remote acoustic monitoring techniques. All such tech- for radio frequency flooding. An infrared laser (which is invisible to the human
niques depend on the ability of structural or emplaced objects in a room to eye) can be aimed at an office window from distances ranging up to hundreds
pick up sound and vibrate mechanically. of yards. If the proper infrared band is selected for the laser, the window glass
100 Chapter Six
will reflect the energy. Conversations inside the office will cause the window- Photography and Video. The important role that short-range imagery
handheld photography and video camerasplays in intelligence is often over-
pane to vibrate slightly, and those audio vibrations will modulate the reflected
looked because remote sensing technologies, especially satellite imagery, tend
laser energy. An optical receiver located near the laser transmitter can then pick
to get more attention. Handheld imagery is nevertheless still important in a
up the backscattered energy, demodulate it, and recover the audio. The tech-
wide range of intelligence. Handheld imagery has provided details about in-
nology to use such laser devices is now widely available.24
dustrial products and allowed performance analysis of aircraft, tanks, ships,
Imagery Intelligence and submarines, as well as permitted thorough examination of the instruments
Imagery intelligence, or IMINT, is traditionally thought of as visible pho- on board the vehicles. It is useful in obtaining the size and characteristics of
tographywhether with a handheld camera or from aircraft and spacecraft. objects for technical evaluation, as well as personal photographs (mug shots)
Most imagery, in fact, is of this type. Increasingly, though, imagery from radar for counterintelligence and countemarcotics operations. Video is increasingly
and from the infrared spectrum is important in intelligence. valuable for continuous surveillance of a target, and video shots of foreign
IMINT can identify deployed military units, test facilities, and participants leaders are useful in making physiological or behavioral assessments of them.
in exercises or operational missions. When used with COMINT and HUM1NT, Imaging Radar. When mounted on aircraft or spacecraft, radars can
it has located research and development facilities and provided detailed infor- rapidly search large areas of the Earth's surface. Microwave radars use fre-
mation about the equipment used at the test areas, it can tip off other collec- quencies that are not greatly affected by water vapor, and microwave radars are
tors when aircraft or ships have left their home bases, have arrived at their not affected by darkness, so they operate well at night and under most weather
staging bases, or are participating in tests, operational exercises, or operational conditions. They have the added advantage of being able to see through vege-
missions. That tip-off allows the coordinated use of non-IMINT collection, tation and most camouflage netting, and sometimes even through the top lay-
such as COMINT or specialized technical collection, to cover the activity. ers of dry soil. They can penetrate nonmetallic walls and roofs of buildings.
Commercial imagerythat is, images acquired by either government or Airborne or spaceborne imaging radars have the potential to detect and
commercial organizations that are sold to the general publicis taking over a identify targets nearly as well as visible imagery can. Most such radars are
role formerly reserved for government intelligence agencies. It is steadily im- called synthetic aperture radars (SARs). They take advantage of the Doppler
proving in quality and availability. Commercial satellite imagery increasingly is (motion) effect of the moving vehicle and thereby produce high-resolution im-
being treated as open literature. Governments and commercial firms know of ages with a small antenna. With an antenna beam the radar illuminates a patch
its existence, its coverage, and its quality. Almost anyone can buy it for any on the ground off to the side of the satellite or aircraft platform. As the SAR
purpose, so imagery exploitation for a wide range of governmental and non- moves past a ground target, the frequency of the radar return from the target
governmental intelligence purposes has become an accepted practice. shifts downward due to the Doppler effect, much as the sound frequency
In effect, this type of imageryvisible, radar, and multispectralis avail- (pitch) of a locomotive whistle drops as the train passes by By tracking this
able as open source, and its quality is becoming good enough to be useful for shift in its signal processor, the SAR is able to create an image of the target. The
a number of intelligence applications. The wide availability of satellite imagery image will have the same resolution as it would if the antenna were as long as
has several effects, positive and negative: the distance traveled by the aircraft or spacecraft, within certain limits. Good
quality SAR imagery is becoming widely available commercially.
Fewer and fewer secrets are discovered by imagery. Its capabilities Electro-optical Imaging Systems. Electro-optical imaging systems are at-
are well known, and the number of imagery satellites of all types is tractive because they can cover large areas of earth's surface with resolution
steadily increasing. Because of that, governments, terrorist groups, sufficient for imagery interpretation. However, their optics do not function
and organized crime groups are increasingly hiding sensitive activ- through clouds, haze, fog, or precipitation. The original spaceborne imaging
ities underground, using concealment and deception, or schedul- sensors were cameras using film that was returned to earth by deorbiting
ing sensitive activities to avoid imagery satellites. "buckets." The U.S. KH-4 CORONA satellite used one such system. Today,
Wide availability may also be driving government imagery intelli- electro-optical imagers use arrays of light-sensitive detectors that are much like
gence to new technical areas or new capabilities. Governments will those in digital cameras and transmit the images to a ground station.
likely push the resolution or nature of their classified imagery so as Electro-optical images are taken in both the visible spectrum and the in-
not to duplicate commercially available images. frared spectrum. Infrared imaging uses wavelengths somewhat longer than
that of visible light and can function at night as well as in daylight. At wave-
On the plus side, commercial imagery can be shared among coali-
lengths near that of visible light (called near infrared), the image depends on
tion forces without revealing sources and methods.
102 Chapter Six
Sources of Intelligence Information 10.3
light reflected from the earth's surface, in the same way that visible imaging ring phenomena. The collection sensors used divide broadly into either remote
does. Color infrared images using this near infrared light are often called false- sensing or in situ sensing, though some sensors may blur the difference.
color images. Objects that are normally red appear green, green objects (except
vegetation) appear blue, and infrared objects, which normally are not seen Remote Sensing
at all, appear red. Vegetation studies rely heavily on color infrared imagery. Remote sensing is often denned as sensing of the Earth's surface from
Healthy green vegetation is a very strong reflector of infrared radiation and ap- satellites or aircraft using some part of the electromagnetic spectrum. It also in-
pears bright red in color infrared images. cludes me sensing of aircraft or satellites from the earth. Optical sensors work
At longer wavelengths, farther removed from those of visible light (far in- in the ultraviolet to infrared regions. Radars operate in the microwave and mil-
frared), the image is created by heat radiated from the earth and objects on it, limeter wave region.
rather than from reflected light. Far infrared is useful for detecting human- As we move toward higher frequencies in the spectrum, moisture, clouds,
made objects such as vehicles and power plants at night. and even darkness tend to decrease the sensor's effectiveness by reducing
Multispectral and hyperspectral sensors use the light reflected or emitted the amount of energy the sensor receives. For detection reliability, a sensor
from the surface of an object or feature to identify that object or feature. They should operate under all weather and light conditions. But at higher frequen-
operate mostly in the infrared spectrum but may include the visible spectrum cies the resolution of the sensor generally improves. Good resolutionthe
as well. Multispectral imagery permits people to examine moisture patterns ability of the sensor to distinguish small objectsallows the identification of
and locate buried objects. Different surface features show up prominently on specific vehicles, for example. With poor resolution, the objects are blurred or
different frequency bands of the mukispectral imager. If the proper wave- indistinguishable.
lengths are selected, mukispectral images can be used to detect camouflage, Remote sensors' main advantage over other sensors is that they can cover
thermal emissions, and hazardous wastes, for example. Hyperspectral imaging a large area of the Earth quickly They achieve this because they can have a
uses the same technique but samples a much larger number of spectral bands very wide swath width, allowing the sensor to search a wide area in one pass.
(in the hundreds). A wide range of environmental intelligence and crop fore- Normally one faces trade-offs between swath width and resolution. Good res-
casting techniques use hyperspectral imaging. Detection of chemical or bio- olution is essential for detecting small objects on the surface. However, sensors
logical weapons, assessment of bomb damage to underground structures, and that have wide swath widths generally have poor resolution, and sensors with
foliage penetration to detect troops and vehicles are examples of the potential good resolution usually have small swath widths.
uses of hyperspectral imaging. Remote sensors divide into two general classes: active and passive. Active
sensors (radars) transmit a signal and then interpret the signals that are reflected
Specialized Technical Collection off the target. Passive sensors exploit natural emissions or use an alternative il-
There are many specialized techniques for collecting and processing in- lumination source, such as the sun. Most passive sensors operate in. the micro-
telligence, most of which focus on specific classes of targets and provide spe- wave, millimeter wave, or optical bands. Most remote sensors used in Earth re-
cific intelligence answers. Most either use novel sensors or process raw data sources sensing create images, but a few do not. Each class and frequency band
from conventional sensors in special ways. In the United States many of these has unique advantages and disadvantages. And each class encompasses several
techniques are lumped together under the name measurements and signatures specific sensor types that have advantages and disadvantages.
intelligence (MAS1NT)a term that embraces a diverse set of collection and
processing techniques. Others are designated as S1GINT. The range of special- In Situ Sensors
ized collection techniques is too large for a complete list, and the field is con-
The alternative to remote sensing is to use devices that sense changes in
stantly changing, but the following describes some of them.
the medium (air, water, earth) immediately surrounding the sensor. Such in
Specialized technical collection employs sensors such as radar, radio fre-
situ sensors measure phenomena within an object or nearby and typically de-
quency antennas, lasers, passive electro-optical sensors, nuclear radiation de-
tect sound, electrical currents, temperature, contaminants, radiation, or mag-
tectors, and seismic or acoustic sensors for the purposes of gathering informa-
netic fields. Air sampling equipment, carried aloft by reconnaissance aircraft to
tion. These instruments gather measurements such as radar cross sections,
detect the debris from atmospheric nuclear tests, is an example of an in situ
radiant intensities, or temperatures to characterize military operations and tac-
sensor. Telemetry equipment provides readings about the radiation belts from
tics; to assess missile, aircraft, and propulsion systems performance; to moni-
tor research, development, testing and production facilities; and to understand in situ sensors located on spacecraft. The number and variety of these sensors
cultural and economic activities, environmental effects, and naturally occur- make it impractical to discuss the technical details of each.
Sources of Intelligence Information 105
Most in situ sensors do not have the broad-area search potential of the re- pinpoint targets for air attack and to locate threat radars so that attacking air-
mote sensors. Compared with sensors mounted on air and space vehicles, they craft can avoid the defenses the radars control.
have either relatively slow search rates or relatively small ranges, or both. Con- Operational ELINT can also use fine-grain signatures of radar signals to
sequently, all of them are limited to covering much smaller areas than the re- identify and track specific radars. This technique is called specific emitter iden-
mote sensors. tification or fingerprinting because, just as no two fingerprints are identical, no
In situ sensors can be used to track ships or submarines. As ships or sub- two radars have identical signal parameters, even though they may be physi-
marines move through the water, [hey leave behind trace chemicals. Metals are cally identical otherwise.
continuously deposited in the water by corrosion and erosion of the hull. Lu-
bricants, waste flushed from sanitary tanks, hydrogen gas discharged from a Telemetry
submarine's life support systemall are deposited in a ship's wake. Neutron Vehicles that are undergoing testingmissiles, aircraft, and even farm trac-
radiation from a nuclear power generator can cause detectable changes in sea- tors and earth-moving equipmentcarry instruments called transducers that
water. All these contaminants leave a "track" in the ocean that can be followed monitor pressures, temperatures, and subsystems performance. The instru-
by the appropriate sensors located on a trailing ship or submarine. ment readings are typically recorded for later laboratory analysis. In vehicles in
Two classes of in situ sensorsbiosensors and chemical sensorshave be- which the recorder might not survive a catastrophic failure (aircraft) or where
come much more prominent as a result of the growing worldwide threat of bi- recorder recovery is impractical (missiles and satellites), the readings are trans-
ological or chemical warfare terrorism. Biosensors can identify specific patho- mitted via radio back to a ground site. Such transmissions are called telemetry.
gens such as anthrax and smallpox. Chemical sensors can identify all of the Complex and expensive systems such as missiles and satellites have a
chemical warfare agents shown in Figure 5-8. large number of instrument readings to transmit, and it is impractical to de-
Electronic Intelligence vote a separate transmission link to each reading. Telemetry systems therefore
combine the signals from the readings in a process called multiplexing for trans-
Electronic intelligence (ELINT) refers to the information gained from the re- mission using a single transmitter. Each signal occupies a "channel" in the
mote sensing of noncommunications signalsincluding those emitted by multiplex system. At the receiver, the channels are separated (demultiplexed)
radar, beacons, jammers, missile guidance systems, and altimeters. Though the and sent to separate displays or recorders.
acronym may be unfamiliar, ELINT is widely used in countries such as the Interpretation of intercepted telemetry is difficult, in part because of the
United States. The detector that some motorists use to detect police radar is an scaling problem. The engineers running the instrumentation know the scales
ELINT device. ELINT divides broadly into two types: technical and operational. for the readings they receive and which channels of telemetry come from
Technical ELINT. Technical ELINT is used to assess a radar's capabilities which instrument. The intercepting party must often infer both the nature of
and performance, to determine the level of technology used in building the the instrument and the scale of the readings from external evidencecorre-
radar, and to find weaknesses in the radar to help electronic warfare designers lating the readings with external events such as aircraft or missile altitude or
defeat it. Technical ELINT collection and processing typically concentrate on speed.
signals that already have been identified and on evolutionary modifications to Because telemetry involves the deliberate transmission of information, its
the signals. However, the highest priority signals for ELINT collection are al- interception could be considered a part of COMINT But because of its spe-
ways new and unidentified signals because they presumably represent the cialized nature and fairly narrow customer base, telemetry intercept is included
most advanced capability. Newly developed radars would radiate only for as part of specialized technical collection.
short periods, in tests, and only during times when it was believed that hos-
tile intercept potential was si a minimum. Therefore, short-duration intercepts Radar Intelligence
are the best one can hope for on such radars. Radar traditionally is used to locate and track a target in space. One spe-
Operational ELINT. Operational ELINT is primarily of interest to military cial type of radar sensing, usually called RADINT, uses radars to collect intelli-
field commanders and law enforcement officers for tactical intelligence. Oper- gence regarding the physical characteristics and capabilities of radar targets.
ational ELINT involves locating deployed radars and determining their opera- RADINT targets have included satellites, missiles, ships, aircraft, and battlefield
tional status; it is an important contributor to creating the geospatial intelli- vehicles. RADINT can image the target, determine its radar cross-section, iden-
gence models discussed in chapter 5. A ship, aircraft, or surface-to-air missile tify and discriminate among targets, precisely measure components, divine the
unit can often be tracked best by continuously pinpointing the location of the motion of the target or its components, and measure the targets radar reflec-
radar(s) it carries. Operational ELINT is used extensively in modem warfare to tance and absorption characteristics. Radar returns can be used to reconstruct
0] IHJI/
106 Chapter 5bc
Figure 6-3 Radar Image of the Space Shuttle Furthermore, inrentional radiation can sometimes be used to obtain target
signatures because moving pans on the target modulate a nearby radio fre-
quency signal. The signal of a radar or radio mounted on an aircraft, for exam-
ple, will be modulated by the aircraft propellers or jet turbine blades The mod-
ulation, though weak, can identify both the aircraft type and the specific aircraft.
The concept is similar to the use of microwaves or lasers to illuminate an object
and pick up conversations as audio vibrations that modulate the signal.
Geophysical Intelligence
Geophysical intelligence involves the collection, processing, and exploita-
tion of environmental disturbances transmitted through the Earth (ground,
water, or atmosphere). Magnetic sensing can detect the presence or motion of
vehicles and ships or submarines by the weak changes that they create in the
Earth's magnetic field. Magnetometers mounted on aircraft have been used to
detect submerged submarines at short distances (on the order of a few hun-
the trajectories of missiles and convey the details and configuration of the mis- dred meters).
sile reentry vehicle itself. Unintentional emission or modulation of sound waves (acoustic energy)
For several decades the United States and other countries have used high- can provide the same types of intelligence information as those for radio fre-
resolution microwave radars for remote identification of targets. Such radars quency energy This specialized area of unintentional emissions intelligence is
have particular advantages in aircraft or space object identification when com- called either ACfNT (for underwater sound) or ACOUSIINT (sound in air).
pared with optical imaging devices. Microwave radars are able to operate Acoustic energy collection works best in environments where sound carries
through long atmospheric paths and in cloud or weather conditions that well over long distances, as underwater sound does. The use of passive sonar
would render an optical system ineffective. Also, such radars offer a rich vari- to obtain the signatures of submarines is well known. The submarine's turbines,
ety of waveforms and associated processing techniques, which can be used propellers, and other on-board machinery generate acoustic noise that can be
both to create images of and to observe operations of satellites and aircraft. detected and used for identification at ranges of many kilometers in water.
Figure 6-3 shows a radar image of the Space Shuttle created using such tech- Closely related to acoustic intelligence is seismic intelligence, the mea-
niques. The quality of radar imaging does not nearly match that of optical surement of seismic waves that travel through the Earth as a result of a major
imaging. The image requires interpretation and an understanding of how satel- disturbance, such as an underground or underwater explosion. If a number of
lites or aircraft are designed. The objects at the top and bottom of the image appropriate in situ sensors are deployed around the globe, signal analysts can
in Figure 6-3 are the wings, and the shuttle nose is at the left. locate the source of such an explosion by comparing the times of the signal's
arrival at each sensor.
Radio Frequency Intelligence
Radiometry and Spectrometry
A variety of equipment emits radio frequency energy: internal combustion
engines, electrical generators, switches. These emissions are typically weak, All objects at temperatures above absolute zero emit radio frequency en-
but sensitive equipment can detect the signals and locate the emitter or use the ergy. As the target becomes hotter, both the strength and the frequency of
characteristic "signature" of the emission to identify the target. In addition to emissions increase. Very hot objects radiate in the visible range (a lamp fila-
highly sensitive receiving equipment, processors need highly sophisticated sig- ment, for example). Anyone who has ever waiched iron being heated to red-
nal processing equipment to deal with unintentional radiation signals and de- or white-hot temperature has observed this phenomenon.
rive useful intelligence from them. Different objects radiate differently. Rock, earth, seawater, and vegetation
Specific pieces of equipment can often be identified by their unique radio all have different emission patterns. Factories or vehicles, when in use, tend to
frequency signatures. The functions being performed within a factory building radiate more strongly, and the presence of hot spots on a building or vehicle
and the rates of production, for example, can sometimes be determined by provides information about the nature and status of the vehicle or the use of
monitoring the radio frequency emission patterns. the building.
108 Chapter Six
Sources of Intelligence Information 109
Conversely, because threat assessments have not been made, they devote too Trapdoors. The trapdoor is a set of instructions that permits easy access
few resources to areas that are under attack. to a computer's software or operating system. It normally bypasses the secunty
The threat of sophisticated penetration attempts, however, is increasing. routines so that it can be used to enter the system at any time for running tests,
The proliferation of computer capabilities around the world and the develop- upgrading systems, or fixing problems. Normally, trapdoors are eliminated
ment of commercial computer espionage capabilities have resulted in the rapid when a system becomes operational. However, trapdoors may be left open by
expansion of such attempts. Commercial computer espionage will continue to mistake or to permit continuing maintenance. They may also be deliberately
increase during this decade, and it will become even more difficult to distin- planted to permit access at a later date.
guish such efforts from national security targeting. When a hacker enters a sys- The best known trapdoor existed only in the movies. In the movie
tem, as the previous examples illustrate, the victim usually cannot identify [he WarGames the hero, a computer hacker, discovers a trapdoor called Joshua
real source of the attack. Although the use of computer attack for commercial that allows him access to the North American Aerospace Defense Command's
espionage is illegal in most countries, such attacks are increasing because they strategic defense software, starting a chain of events in which the war game be-
have a high payoff.
comes much too realistic.
Attacks on information processing equipment are possible by exploiting The trapdoor is perhaps the primary tool for industrial computer espi-
equipment emanations or by obtaining direct or indirect access to the equip- onage. In many systems a trapdoor gives unlimited access to data in the sys-
ment software. Networks can make remote access to data much easier. The fol- tem. Valuable corporate proprietary information has been acquired time and
lowing describes some commonly used techniques for exploiting computer again from competitors via trapdoors.29
systems in intelligence. Because this is a rapidly changing and highly techni- Collecting Emanations. If a computer emits compromising electromag-
cal field, these descriptions are only introductory and omit some of the more netic signals, sensors placed close by can recover information being processed.
sophisticated collection methods.
Electronic and magnetic signals can radiate from the area both in space and
Viruses and Worms, Viruses are well known in the computer business. through power lines or other conducting paths. Sensitive in detail and difficult
They may have some application in information warfare, such as in actions to detect, these types of attacks are a capability of sophisticated adversaries.
against an opponents computer networks, but they are not common tools for The U.S. government's concern about protecting against the collection of em-
collecting intelligence. Because most computer systems have virus protection, anations spawned a sizable industry known as TEMPEST. TEMPEST technol-
the trend is to make a computer virus polymorphicthat is, stealthy and able ogy uses shielding and other electronic design techniques to reduce radiated
to change its code and form to avoid detection. electromagnetic signals.
Worms are more selective and focused than viruses. The distinguishing
characteristic of a virus is its ability to replicate itself and spread through a net- Summary
work. A worm performs some type of illicit operation within a computer sys- The traditional U.S. taxonomy of intelligence collection was created be-
tem but does not contain instructions to replicate itself. Worms are used, for cause of historical precedent or for bureaucratic reasons. It divides intelligence
example, to instruct a bank computer to transfer money to an illicit account. collection into open source, SIGINT, MINT, HUMINT, and MASINT. This
They can also be used to transmit controlled data to unauthorized recipients, chapter presents an alternative view of the sources of intelligence, one that is
and that is how they are used in intelligence collection. more relevant for intelligence analysts. This alternative taxonomy includes the
Trojan Horses. The Trojan horse is a seemingly innocent program that four sources that most analysts use-open source, COMINT, IMINT, and
conceals its primary purposeto infiltrate the user's computer system for HUMINTand specialized technical collection, which includes newer and
illicit purposes. A Trojan horse may contain a virus or worm, for example. very focused collection techniques that depend heavily on technology.
Operating systems software and almost any applications software package In gathering information for synthesizing the target model, analysts start
spreadsheets, word processors, database managerscould be Trojan horses with the more readily available and inexpensive sources (internal files and open
Trojan horses predate viruses and have been used for years to enter high-level source material) and move to the more obscure and expensive ones (HUMINT,
accounts that were protected by passwords. A simple Trojan horse in a word COMINT, and IMINT).
processor might, for example, make a copy of all files that the word processor Open source material is perhaps the most valuable source of intelligence
saves and store the copies in a location where the horse's "master" can access but is typically the most easily overlooked by government intelligence organi-
them later. Another simple Trojan horse, once activated, waits until the user zations in favor of classified information. Open source information has tra-
attempts to fog off. It then simulates a real logoff while keeping the user on- ditionally meant published material that is publicly availablenewspapers,
line. When the user next attempts to log on, the Trojan horse captures the books, and magazines. Increasingly it includes the Internet and commercially
user's password for its master and simulates a logon. available imagery sources.
112 Chapter Six Sources of Intelligence Information 113
HUMINT includes clandestine sources (the traditional spy); liaison (the 11. Richard Eels and Peter Nehemkis, Corporate Intelligence and Espionage (Old Tappan, N.J.:
Macmillan, 1984), 59; Charles D. Amennger. U.S. foreign Intelligence (Lanliam, Md . Lexing-
sharing of intelligence with other intelligence services or nongovernmental or-
ganizations); and materiel acquisition (acquiring and exploiting equipment or ton Books, 1990), 170
12. Report of the Commission, 80.
samples). It also includes acquiring information from emigres and defectors 13. Peter Schwartz, The Art o/ the Lang View (New York- Doubleday, 1990,78.
and through clandestine polling. Elidtationthe practice of obtaining infor- 14. Charlotte W Craig, "Germany Drops Spy Case against Lopez; Former GM Exec Musi Give
mation about a topic from conversations, preferably without the source's know- Money to Charity," Detroit Free Press, July 28, 1998, www.auto.corn/industry/qlopez28.htm.
University ol California at Davis, Department of Geology, "The Age of Iton," www.geology.
ing what is happeningis widely practiced in both governmental and com- 15.
ucdavis.edu/-GELl 15/115CH5 html,"March 22, 2003.
mercial intelligence.
The full details of this real-life spy thriller can be. found in Alfred Prices book Instruments of
16.
COMINT, or communications intelligence, is the interception, processing, Darkness (London: William Kimber, 1967), SO-87
and reporting of an opponent's communications. It includes bugs and the tra- 17. Ibid
ditional microphone-and-wire, but also advanced technology, to collect voice, 18. "Project Jennifer," http:/Aveb ukonline.co.uk/aj.cashmore/.features/artides/jennifer-text.html.
data, and facsimile communications, March 22, 2003.
19 EW Winterbotham, The Ultra Secret (New York: Dell, 1974).
IMINT includes short-range imageryboth still pictures and videoand 20. Fot more information, see Wilhelm Hicke, War Secrets in ihe Ether (Laguna Hills, Calif.: Aegean
remote sensing (from distances ranging from miles to thousands of miles). It Park Press, 1994), 4-12.
ranges across the electromagnetic spectrum, including radar, infrared, and vis- 21. Ibid.
ible spectrum images. Newer technology, such as multispectral and hyper- 22. Douglas H. Dearth and Thomas R. Goodden, Strategic Intelligence: Theory and Application,
2nd ed. (Washington, D.C : U.S Army War College and Defense Intelligence Agency, 1995),
spectral imaging, uses information about the spectral signature of a target to
provide insights that are not available otherwise. 111
23. John Wingfield, Bugging (London: Robert Hale Ltd., 1984), 21-22.
For specialized intelligence needs, a wide range of sophisticated technical
24. Ibid., 52-53.
collection techniques is available. Electronic intelligence is perhaps the most 25. Sir Arthur Conan. Doyle, "A Study in Scarlet," in The Complete Sherlock Holmes (London1
widely used of these, especially in supporting the military and law enforce- Hamlyn, 1984), 26.
26. John D Woodward Jr., "Super Bowl Surveillance: Facing Up to Biometrics," Intelligencer. Jour-
ment. Telemetry collection is used to assess the performance of aircraft and
nal of U.S. intelligence Studies, Summer 2001, 37
missiles. Information operations (such as computer hacking) are used to ob- 27. Clifford Stall, The Cuckoo's Egg: Tracking a Spy through the Maze oj Computer Espionage (New
tain intelligence from computers and data networks. The number of such tech- York: Simon and Schuster, 1989)
nical collection methods is substantial today, and new ones continue to be de- 28. Association oj Foreign Intelligence Officers (AFIQ) Weekly Intelligence Note 36-02, September 9,
veloped as new technologies develop or evolve. 20Q2; available from the association by contacting afio@afio.com
29. John McAfee and Colin tlaynes, Computer Viruses, Worms. Data Diddlers, Killer Programs, ami
We turn in the next chapter to how to evaluate the information that is
Other Threats to Your System (New York: St. Martin's Press, 1989), 79.
gathered from these different sources and to fitting information into the target
model, a discussion that will continue throughout the book.
Notes
1 Report of the Commission tin (he intelligence Capabilities of the United States Regarding Weapons of
Moss Destruction, March 31, 2005, www.wmd.gov/reporc/wmd_repoft pdf, p. 400
2. Rob Johnson, Analytic Culture in the U.S lnldl.igc.ncc Community (Washington, D.C.: Center for
the Study of Intelligence. Central Intelligence Agency1, 2005), 22.
3 The Kingjames Bible, Numbers 13:17.
4. Johnson, Analytic Culture, 24
5. Report of the Commission, 13.
6. Walter Laqueur, The Uses and Limit? of Intelligent? (Somerset, K.J.; Transaction Publishers,
1993), 43
7. Susan B Glasser, "Probing Galaxies of Data for Nuggets,' Washington Post, November 25.
2005, A35
8. Clarence Walker, 'A Special Investigative Report1 American Mafia Recruits Sicilian Mafia.'
www.ameticanmafia.com, August 2004
9. Arthur Weiss, "How Far Can Primary Research Go'" Competitive Intelligent.! Magazine.
November-December 2001, 18
iO. Ibid
Populating the Model 115
Populating the Model Weighing evidence entails three steps: (a) evaluating the source, (b) eval-
uating the communications channel through which the information arrived,
What is truth? and (c) evaluating the evidence itself. The communications channel is often ig-
Pontius Pilate nored, but it is a critical piece of the reliability puzzle, as we shall see.
At the heart of the evaluation process is one of the oldest analytic princi-
ples, Occam's razor. The name comes from William of Occam, who said, "It is
vain to do with more what can be done with fewer."2 In modem-day English,
M ost synthesis involves aggregating data or establishing data relationships
in the target model using the data sources discussed in the previous
chapter. This step in the intelligence process is often called collation: the orga-
we know this as the KISS principle: Keep it simple, stupid! Possibly the most
common example of Occam's razor is the standard first step one is advised to
nizing of relevant information in a coherent way, looking at source and con- take when a piece of electronic equipment doesn't work: Check to see if it is
text. It involves evaluating the information for relevance, credibility, and in- plugged in. Occam's razor is not an infallible principle; sometimes the correct
ferential force and incorporating it into the target model. explanation for a set of facts is very complex or convoluted. Conventional wis-
The collation concept introduced here is further developed in succeeding dom is often wrong. And counterintelligence, especially denial and deception,
chapters. The process normally starts with a model template, or template set, is a possibility that the sciences do not have to contend with. However, ana-
of the sort described in chapter 5. Next, the job is to fit the relevant informa- lysts can make data fit almost any desired conclusion, especially if they selec-
tion into the templates. We talk about templates in the plural because we wind tively discard inconvenient facts. So the razor is a valuable part of the analyst's
up with several of them when dealing with complex problemsboth collateral toolkit (Analysis Principle 7-1).
models, as discussed in chapter 3, and alternative models. As David Schum has Evaluating the Source
noted, "The generation of new ideas in fact investigation usually rests upon ar-
ranging or juxtaposing our thoughts and evidence in different ways."' To do Accept nothing at face value. Evaluate the source of evidence carefully,
that we need multiple, alternative models. and beware of the source's motives for providing the information. Evaluating
This chapter describes how to establish the credentials of evidence. It con- the source involves answering three questions:
tinues with a discussion of widely used informal methods of combining evi-
dence, followed by an introduction to structured argumentation methods (Wig- Is the source competent (knowledgeable about the information
more's evidence charting and Bayesian analysis). A number of other structured being given)?
argumentation methods are used in prediction: Scenario creation is covered in Did the source have the access needed to get the information?
chapter 10; chapter 11 discusses influence nets and influence diagrams. Does the source have a vested interest or bias?
Evaluating Evidence In the HUMINT business, this is called determining bona /ides for human
The fundamental problem in weighing evidence is determining its credi- sources. Even when not dealing with HUMINT, one must ask these same three
bility In the end, weighing evidence involves subjective judgments that the an- questions.
alyst alone must make. (Some helpful insights on reliability are contained in Competence. The Anglo-American judicial system deals effectively with
the preceding chaptersee the sections on COMINT and HUMINT for some competence: It allows people to describe what they observed with their senses
analytical pitfalls.) because, absent disability, we are presumed competent to sense things. The
114
116 Chapter Seven
Populating the Model 117
judicial system does not allow the average person to interpret what he or she
on the researchers' foreign contacts. The usual approach is to exaggerate the
sensed, unless the person can be qualified as an expert in such interpretation.
importance of their foreign counterparts' work, as a ploy to encourage more
Source evaluators must apply the same criteria. I( is too easy, in a raw in-
funding for their own work. A report does not necessarily have more validity
telligence report, to accept not only the source's observations, but also the in-
simply because it came from a citizen of one's own country rather than from a
ferences that the source has drawn. Always ask. What was the basis for this
foreigner, as the following example illustrates.
conclusion? If no satisfactory answer is forthcoming, use the source's conclu-
sions with caution or not at all. It is no secret anymore that U.S. intelligence services used our academic
experts to get information from their Russian counterparts in the days of the
A radar expert talking about an airborne intercept radar's performance is
cold war. In one case a U.S. expert on ionospheric research came back from a
credible. If he goes on to describe the aircraft's performance, he is considerably
Moscow conference with a report that his Russian counterpart was investigat-
less credible. An economist assessing inflation prospects in a country might
ing the use of the ionosphere for a new form of long-range communications.
have credibility, but if he or she goes on to assess the likely political impact of
the inflation, be skeptical. The report caused some concern in the Defense Department, and to keep the
Soviets from getting a jump up on the United States, the Defense Advance Re-
Access. Usually, source access does not come up, or is not an issue, be-
search Projects Agency (DARPA) funded a U S. research effort in that area.
cause it is assumed that the source had access. Where there is reason to be sus-
Some of the research money, of course, went to the expert who brought the re-
picious about the source, however, check whether the source might not have
had the claimed access. port home.
In what became an unholy alliance, the Soviet scientist in turn called his
In the legal world, checks on source access come up regularly in witness
government's attention to the new U.S. research work. The Soviet government,
cross-examinations. One of the more famous examples was the so-called
figuring that there must be something there if the Americans were working on
Almanac Trial of 1858, in which Abraham Lincoln conducted the cross-
it, funded the Soviet scientist to conduct similar research and experiments.
examination. It was the dying wish of an old friend that Lincoln represent his
The research never really provided anything of interest outside academia, ex-
friends son, Duff Armstrong, who was on tnal for murder. Lincoln gave his
cept possibly a useful lesson on source evaluation for both sides.
client a tough, artful, and ultimately successful defense. In the trial's highlight,
Vested interest and bias are common problems in dealing with experts
Lincoln consulted an almanac to discredit a prosecution witness who had
when applying comparative modeling and analysis (benchmarking) tech-
claimed that he saw the murder clearly because the moon was high in the sky.
niques (chapters 5 and 14).
The almanac showed that the moon was lower on the horizon, and the wit-
When comparing systems or technologies, it is usual to compare system
ness's accessthat is, his ability to see the murderwas called into question.3
or technology performance, as measured in one's own test and evaluation pro-
Access can be critical in evaluating a source. When they prepared the Na-
grams, with estimates or data on the performance of the target's system, test-
tional Intelligence Estimate concerning possible Iraqi weapons of mass de-
ing and evaluation having been essential parts of systems development. In as-
struction, CIA analysts believed that the now-infamous source Curveball was
sessing systems that use advanced technologies, test and evaluation are
reliable because his knowledge was detailed, technically accurate, and corrob-
important because so many techniques work in theory but not in practice.
orated by another source's reporting. But, as a CIA group chief pointed out, the
However, an intelligence organization faces a problem in using its own
corroborating information simply established that Curveball had been to a
parent organization's (or country's) ;est and evaluation results because many of
given location, not that+ he had any knowledge of biological warfare activities
being conducted there. them have been contaminated. Some of the tests are faked; some contain dis-
tortions or omit key points. An honestly conducted, objective test may be a
Vested Interest or Bias. In HUMINT analysts occasionally encounter the
rarity. Several reasons for this problem exist: Tests are sometimes conducted to
"professional source," who sells information to as many bidders as possible
prove or disprove a preconceived notion and are thus unconsciously slanted.
and has an incentive to make the information as interesting as possible. Even
Some tests are faked because otherwise they would show the vulnerability or
the densest source will quickly realize that more interesting information gets
him more money ineffectiveness of a system and because procurement decisions often depend
on the test outcomes. Though the majority of cases probably are never dis-
Official reports from government organizations have a similar vested in-
covered, history provides many examples of this problem.
terest problem. Be skeptical of this information; it deserves no automatic cred-
During World War II both the British and the Germans conducted tests that
ibility because of the source. One seldom finds outright lies in such reports, but
were rigged to prove a point.5 In the example of Sims's continuous aim naval
government officials occasionally distort or conceal facts to support their pol- gunnery system (chaprer 12), the U.S. Navy tested a proposed new technique
icy positions or to protect their personal interests. U.S. researchers have long for gunnery. The test was designed to confirm the preconceived notion that the
provided to U.S. government intelligence organizations distorted information technique would not work, not to test a concept.
118 Chapter Seven
Populating the Model 119
directly with a human source, and secondary sources for information learned lion. Second, intelligence that has impact is more likely to be used. In this case
through an intermediary, a publication, or on-line. This division downplays the lesson comes from the customers, who cite the reports for years because
the many gradations of reliability, and national intelligence organizations com- they were so interesting and provocative. When the customers were told that
monly do not use the primary/secondary source division. Some national intel- the reports were not valid, their response was typically, "Well, they should be!"
ligence collection organizations use the term collateral to refer to intelligence
gained from other collectors, but it does not have the same meaning as the Evaluating the Credentials of Evidence
terms primary and secondary as used in business intelligence. The major credentials of evidence, as noted earlier, are credibility, relia-
But neither the primary-versus-secondary distinction nor the collateral- bility, and inferential force. Credibility refers to the extent to which we can be-
evidence distinction serves a useful purpose; it is more important to look at lieve something. Reliability means consistency or replicability Inferential force
the communications channel itself. Ask about the channel, What was it? Is this means that the evidence carries weight, or has value, in supporting a conclu-
information being intentionally provided? If so, what part of it is true? Is it de- sion. The credibility of tangible evidence depends on its authenticity, accuracy,
ception, or is it a message or signal to the opponent? If it is a message or sig- and reliability. The credibility of testimonial evidence depends on the veracity,
nal, what is the message, and what is the reason for it? objectivity (and memory), and observational sensitivity of the testifier9
The hearsay rule as applied in judicial proceedings is a recognition of the U.S. government intelligence organizations have come up with a set of de-
application of Shannon's theory and of entropy in human affairs. Under the finitions to distinguish levels of credibility of intelligence;
hearsay rule, a witness cannot testify about what a person said to prove the
truth of what was said; in the court's view, the message has traveled through Fact. Verified information, something known to exist or to have
too many intermediate nodes to be credible. Entropy has an effect on the cred- happened.
ibility of some intelligence, and credibility degrades in direct proportion to the Information. The content of reports, research, and reflection on an
number of nodes traversed. intelligence issue that helps one evaluate the likelihood that some-
Entropy has another effect in intelligence. An intelligence assertion that "X thing is factual and thereby reduces uncertainty.
is a possibility" very often, over time and through diverse communication Direct Information. Information that can be considered factual be-
channels, becomes "X may be true," then "X probably is the case," and even- cause of the nature of the source (imagery, intercepts, observations).
tually "X is a fact," without a shred of new evidence to support the assertion.
In intelligence, we refer to this as the "creeping validity" problem. The Iraqi Indirect Information. Information that may or may not be factual be-
WMD Commission noted this as a major analytical failing; the premise that cause of some doubt about the sources reliability, the source's lack
Iraq had hidden weapons of mass destruction became, over time, a presump- of direct access, or the complex (nonconcrete) character of the
tion and eventually an unrebmtable conclusion.8 content (hearsay from clandestine sources, foreign government re-
Earlier we discussed bias in the source. Bias can also be a problem in the ports, or local media accounts).10
communications channel. Years back, one U.S. intelligence organization had
This division sounds suspiciously like the primary and secondary source
the good fortune to obtain an audio tap into a highly classified foreign instal-
division used in business intelligence. It downplays the real-world situation:
lation. The problem with the tap was that the audio was very weak and in a
that intelligence has a continuum of credibility and that direct information,
foreign language. One could barely discern that it was speech. One translator
such as signal intercepts or imagery, can be misleading or false as a result of
with very sharp ears was able to produce transcripts, however, and the prod-
denial and deception.
uct was some exciting and very disturbing intelligence; several reports went to
top levels of the U.S. government. In weighing evidence, the usual approach is to ask the three questions that
are embedded in the oath that witnesses take before giving testimony in U.S.
The transcribed material was very goodtoo good, in fact, and techni-
cally inconsistent. An investigation revealed that the translator wasn't translat- courts:
ing; he was making it all up out of a fertile imagination and some knowledge
of what was of current intelligence interest. The reports were withdrawn and Is it true?
the translator fired. On withdrawing them, we learned another basic rule of in- Is it the whole truth?
telligence: The surest way to get a customer to read a report is to retract it. Is it nothing but the truth? (Is it relevant or significant?)
Two lessons emerge from this example; First, if the source or a person in
the communications channel has something to gain by providing interesting Is It True? Is the evidence fact or opinion (someone else's analysis)? If it is
material, be wary. In this case the translator earned recognition and a promo- opinion, unless the source quotes evidence to support it, question its validity
Chapter Seven
Populating the Model 123
How does it fit with other evidence? The relating of evidencehow it fits guidance system in the expert's office. The Soviet visitors were impressed with
inis best done in the synthesis phase. The data from different collection the new technology, and the entire visit centered on the details of the guidance
sources are most valuable when used together. The synergistic effect of com- system and how it was manufactured. What the U.S. expert did not mention
bining data from many sources both strengthens the conclusions and increases
the analyst's confidence in them. was that for the system to work some components had to be machined to a
precision that was beyond either U.S. or Soviet capabilities. It was a failed de-
HUMINT arid COMINT data can be combined with EL1NT data to sign, but the problem would not become apparent until (as we heard later) the
yield a more complete picture of a radar. Soviets had spent many months and much money trying to replicate it. The
U.S. expert told no lieshe simply omitted a critical truth.
HUMINT and open source are often melded together to give a
Is It Nothing but the Truth? It is worthwhile at this point to distinguish
more comprehensive picture of people, programs, products, facili-
between data and evidence. Data become evidence only whert the data are rel-
ties, and research specialties. This is excellent background infor-
evant to the problem or issue at hand. The simple test of relevance is whether
mation to interpret data derived from COMINT and IMINT.
the material affects the likelihood of a hypothesis about the target. Does it help
Data on environmental conditions during tests, collected using answer a question that has been asked? Or does it help answer a question that
specialized technical collection, can be used with EL1NT and should be asked? Customers seldom impart in iheir preliminary or initial guid-
COMINT data obtained during the same test event to evaluate the ance what they really need to knowanother reason to keep them in the loop
capabilities of active sensor systems.
via the target-centric process.
Identification of research institutes and their key scientists and re- Medical doctors often encounter the relevance problem. They must syn-
searchers can be made initially through HUMINT, COMINT, or thesize evidence (symptoms and test results) to make a diagnosis: a model of
open sources. Once the organization or individual has been iden- the patient's present state. Doctors encounter serious difficulties when they
tified by one INT, the other ones can usually provide extensive ad- must deal with a patient who has two pathologies simultaneously. Some of the
ditional information. symptoms are relevant to one pathology; some to the other. If the doctor tries
Successful analysis of COMINT data may require correlating raw to fit all of the symptoms into one diagnosis, he or she is apt to make the
COMINT data with external information, such as ELINT and wrong call. This is a severe problem for doctors, who must deal with only a
IMINT, or with knowledge of operational or technical practices. few symptoms. It is a much worse problem for intelligence analysts, who typ-
ically deal with a large volume of data, most of which is irrelevant.
One of the best examples of synthesis comes from the extensive efforts U.S. As a simple example of the relevance problem, suppose that the Naples,
intelligence made during the 1960s through the 1980s to assess the perfor- Italy, port authorities discover a cache of arms and explosive devices in a cargo
mance of Soviet ballistic missiles. Satellite photography was compared with container on the docks. COMINT reporting later indicates that six members of
telemetry to check hypotheses about the weight and size of missiles. Pho- a known terrorist group met in a Naples harbor cafe on the day that the illicit
tographs of missiles on a launch pad could be used to alert telemetry collectors. cargo was discovered. An analyst might be inclined to put the two facts to-
Radar tracking of the boost phase could be cross-checked with telemetry to de- gether in the same target model of a planned terrorist act. Bui the two facts
termine booster performance, and the same cross-checks on reentry vehicles could be completely unrelated.
could be used to estimate reentry vehicle size and weight more confidently.11 The converse problem in fitting-evidence into the model is the risk of dis-
Is It the Whole Truth? Answering this question requires source analysis. carding relevant evidence. Avoid discarding evidence simply because it does
In HUMINT, that means looking at such things as the source's reporting his- not seem to fit the model. Anomalies may indicate that something is wrong
tory or psychological profile. (Is the source loose-lipped? A conniver? Or a with the model or that another model is more appropriate. Alternatively, as
straight shooter?) We all have ad hoc profiles of the people we deal with, based with the two-pathologies problem, the evidence should be partitioned and fit
on such things as first impressions or reputation. Sometimes we need more into two distinct models.
a psychological profile, for example.
An incomplete picture can mislead as much as an outright lie. During the Pitfalls in Evaluating Evidence
cold war, Soviet missile guidance and control experts regularly visited their There are at least seven pitfalls to avoid in weighing evidence.
counterparts in the United States to do some informal elicitatiort. Alerted to Vividness Weighting. In general, the channel for communication of intel-
yet another impending Soviet visit, U.S. intelligence, working with a leading ligence should be as short as possible; but when could a short channel become
U.S. expert, set up an elaborate display of a new and highly accurate missile a problem?
124 ChapterSeven
Populating the Model 125
If [he channel is too short, [he result is vividness weighting[he phenom- The analyst has to remember this tendency and compensate for it. It some-
enon that evidence that is experienced directly is the most convincing ("See- times helps to go back to the original (older) intelligence and reread it to bring
ing is believing"). Customers place the most weight on evidence that they col- it more freshly to mind.
lect themselvesa dangerous pitfall that senior executives fall into repeatedly Favoring or Disfavoring the Unftnown. Most analysts find it hard to de-
and that makes them vulnerable to deception. Strong and dynamic leaders are cide how much weight to give to answers when little or no information is
particularly vulnerable: Franklin Roosevelt, Winston Churchill, and Henry Kis- available for or against each one. Some analysts give an answer too much
singer are examples of statesmen who occasionally did their own collection weight when evidence is absent; some give it too little. Former CIA analyst
and analysis, sometimes with unfortunate results.
Richards J. Heuer Jr. cites this "absence of evidence" problem in the example
There is danger in judging any evidence by its presentation, yet we con- of two groups of automobile mechanics who were given a choice of reasons
tinue to do it. Statistics are the least persuasive form of evidence; abstract why a car would not start, with the last choice on the list being "other." The
(general) text is next; concrete (specific, focused, exemplary) text is a more mechanics were told to estimate what percentage of failures was attributable to
persuasive form; and visual evidence, such as imagery or video, is most per- each reason. One group received a shortened list that omitted several of the
suasive. Of course, vividness can work for the analyst. She can use the impact reasons. That group tended to overweight the remaining reasons on the list
of certain types of evidence to make the presentation of her conclusions more and underweight the category "other."12
effective.
Trusting Hearsay. The chief problem with HUMINT is that it is hearsay
An example of the powerful impact that vivid evidence can have is the evidence. As noted earlier, the courts long ago learned to distrust hearsay for
murder of Wall Street Journal reporter Daniel Pearl in Pakistan during Febru- good reasons, including the biases of the source and the collector. Sources may
ary 2002. The videotape of the murder and decapitation of Pearl evoked strong deliberately distort or misinform because they want to influence policy or in-
public reaction. Sometimes decision makers can be unduly affected by vivid crease their value to the collector. Moreover, the analyst lacks the nonverbal
evidence.
details of the conversationthe setting, the context, facial and body expres-
Weighting Based on the Source. One of the most difficult traps for an an- sionsto aid judgment.
alyst to avoid is that of weighing evidence based on its source. HUM1NT op- COMINT, like HUMINT, is hearsay, for two reasons: First, much inter-
eratives repeatedly value information gained from clandestine sourcesthe pretation goes into a COMINT report, and the COMINT analyst who translates
classic spyabove that from refugees, emigres, and defectors. COMINT and interprets the conversation may not do so objectively. COMINT analysts,
gained from an expensive emplaced telephone tap is valued (and classified) like HUMINT sources, know that exciting or provocative reports are more
above that gleaned from high-frequency radio communications (which almost likely to be published than mundane ones. Second, some COMINT targets
anyone can monitor). The most common pitfall, however, is to downplay the know that they are being monitored and deliberately use the collector as a con-
significance of open source material; being the most readily available, it is duit for information. Intelligence analysts have to use hearsay, but they must
deemed to be the least valuable. This particular form of snobbery is rampant weigh it accordingly.
in government intelligence organizations, which have highly classified sources Unquestioning Reliance on Expert Opinions. Expert opinion is often used
available to them. Using open sources well is a demanding analytic skill, but as a tool for analyzing data and making estimates. Any intelligence community
it can pay high dividends to those who have the patience to master it. Collec- must often rely on its nation's leading scientists, economists, and political and
tors may make the mistake of equating source with importance. Having spent social scientists for insights into foreign developments. These experts can and
a sizable portion of their organisation's budget in collecting a body of mater- do make valuable contributions, but they often are not entirely objective. With
ial, they may believe that its value can be measured by the cost of collecting it. experts an analyst also gets all of their biasesthe axes the experts have to
No competent analyst should ever make such a mistake. grind and the ego that convinces them that there is only one right way to do
Favoring the Most Recent Evidence. Analysts often give the mosi recently things (their way). British counterintelligence officer Peter Wright once ob-
acquired evidence (he most weight. The danger of doing that is implied by our served, "On the big issues, the experts are very rarely right " l3 The fallibility of
application of the second law of thermodynamics to intelligence, discussed experts has been noted in many cases. They can be useful in pointing out flaws
earlier. As the representation in Figure 7-1 suggests, the value of information in logic. But studies have found that experts are no better than simple statisti-
or the weight given it in a report tends to decrease with time. The freshest in- cal models at making predictions.1*
telligencecrisp, clear, and the focus of the analyst's attentionoften gets Both analysts and HUMINT collectors bave a long history of dealing with
more weight than the fuzzy and half-remembered (but possibly more impor- experts, especially scientists, who inflate reports on foreign developments to
tant) information that has had to travel down the long telephone lines of time. further their own research work. More than a few scientific experts consulted
126 Chapter Seven Populating the Model 127
liquid oxygen. All five were consistent in attributing light weights to the rocket
Analysis Principle 7-3 and warhead. Jones subsequently and correctly reported to the British war
cabinetover the objections of British rocket expertsthat the V-2 weighed
Principles of Impotence twelve tons and carried a one-ton warhead.16
Fundamental limits are well known and valid in physics: It is generally accepted Though experts have frequently led us astray, their contribution has on
that one can neither travel faster than the speed of light nor reduce the temperature the whole been positive. Some say that experts are harder to deceive. In the
of an object to absolute. R.V Jones described such postulates as "principles of impo- words of one author, "It is hard for one specialist to deceive another for very
tence" and pointed out that they pose a special danger for scientific experts. Having long."17 By this view, deception can be beaten more easily with expert help.
tried an experiment or development and failed, the expert is strongly tempted to in- Maybe. On the other hand, many experts, particularly scientists, are not men-
voke a principle of impotence and say, "It can't be done."
tally prepared to look for deception, as intelligence officers should be. Some
are naiveeven gullible. A second problem, as in the examples of the "princi-
ples of impotence," is that experts often are quite able to deceive themselves
by intelligence organizations have been guilty of report inflation at one time or without any help from opponents.
another. When experts are used as evaluaters, the same problem can arise. An- Varying the way expert opinion is used is one way to attempt to head off
alysts should treat expert opinion as HUMINT and be wary when the expert the problems cited above. Using a panel of experts to make analytical judg-
makes extremely positive comments ("That foreign development is a stroke of ments is a common method of trying to reach conclusions or to sort through
genius!") or extremely negative ones ("It can't be done"). a complex array of interdisciplinary data. Yet such panels have achieved mixed
The negative comments frequently stem from what former British intelli- results at best. A former CIA office director has observed that "advisory panels
gence officer RV Jones, whom we met in chapter 6, described as "principles of of eminent scientists are usually useless. The members are seldom willing to
impotence." An expert will find it more reassuring to decide that something is commit the time to studying the data to be of much help "1B The quality of the
impossible than to conclude that it is possible but he failed to accomplish it. conclusions such panels reach depends on variables such as the panel's
Having made such a judgment, an expert will always defend it vigorously, for
the same reasons that intelligence analysts find it difficult to change their con- expertise
clusions, once made (Analysis Principle 7-3).
Jones encountered several examples of principles of impotence during his motivation to produce a quality product,
tenure, such as, "It is impossible to make a bulletproof fuel tank"; "Radio waves understanding of the problem area to be addressed
cannot be generated in the centimeter band (above 3,000 MHz)"; and "Photo- effectiveness in working as a group
conductive materials cannot be made to detect wavelengths longer than two
microns. 1 All of these "impossibilities" later became realities.
A major advantage of the target-centric approach is that it formalizes the
During 1943 to 1944, aerial photography of the German rocket test cen- process of obtaining expert opinions. It also lends itself readily to techniques,
ter at Peenemunde revealed the existence of a rocket about forty-five feet long such as Delphi, for avoiding negative group dynamics. Delphi is a systematic
and six feet in diameter. As was the case with many other interesting analytic version of the panel consensus designed to eliminate some of the traditional
problems of World War II, this one fell to RV Jones to puzzle through. panel shortcomings. It uses anonymous inputs to help obtain an objective
British experts of the time were familiar only with rockets that burned consensus from initially divergent expert opinion. One objective of the Delphi
cordite in a steel case. A simple calculation showed that a cordite-burning method is the encouragement, rather than the suppression, of conflicting or
rocket of that size would weigh approximately eighty tons and would have to divergent opinionsspecifically, the development of alternative target models.
have a warhead weighing on the order of ten tons to be worthwhile. To the
Participants explain their views, and others review the explanations absent the
British cabinet, the prospect of rockets as heavy as railroad locomotives, carry-
personality, status, and debating skills that are brought to bear in conferences.
ing ten tons of high explosives and landing on London was appalling.
The Delphi method arrives at a consensus by pooling the two separate items
In June 1944 a V-2 rocket crashed in Sweden, and British intelligence of- involved in any estimate:
ficers had an opportunity to examine the fragments. They reported that two
liquids fueled the rocket, one of them liquid oxygen. Armed with this evi-
dence, Jones was able to sort through the volumes of conflicting HUMINT re- expert information or knowledge
ports about the German rocket and to select the five reports that mentioned goodjudgment, analysis, and reasoning
Populating the Model 129
128 Chapter Seven
Although a Delphi participant may not initially be well informed on a given For some time before 1962, Cuban refugees had flooded Western intelli-
question, that person still can contribute judgment, analysis, and reasoning gence services, embassies, and newspapers with reports of missiles being hid-
concerning the information and arguments that other respondents advance. den in Cuba. When the reports about the deployment of medium-range bal-
When panels are used, several other techniques are available to make the listic missiles began to sift into the CIA and the Defense Intelligence Agency in
panel input more effective. In general, the techniques apply whenever collab- 1962, they were by and large disregardedintelligence analysts had heard
orative analysis is used, as it inevitably will be if the target-eentnc approach is false reports too many times. Only as the weight of evidence from several in-
applied. dependent sources, including photographic evidence and ship movement pat-
If the analysis is a group effort and qualitative, a method for combining the terns, began to grow was it possible to change the collective mind of the in-
various opinions must be determined in advance and approved by the partici- telligence community.19
pants. The analysis may be as simple as creating a list of all the participants' The way the Cuban missile crisis unfolded illustrates the problem that
comments, or as difficult as reducing variance among opinions to the point that Princeton University professor Klaus Knorr described as "philosophical predis-
one combined opinion can be generated. If the analysis is quantitative, it has to position," meaning a situation in which expectations fail to apply to the facts.20
be decided whether all the participants' votes will be averaged or whether the Before 1962, the Soviets had never deployed nuclear weapons outside their di-
group will be asked to come to consensus. rect control, and U.S. analysts assumed that they therefore would not deploy
In determining a voting method, consider the level of expertise of each nuclear warhead-equipped missiles in Cuba. They discounted information that
voter. Often, analyses include persons from different organizations with vary- contradicted this assumption. The counterintelligence technique of deception
ing viewpoints and levels of expertise. But it is rarely feasible politically to ac- thrives on this tendency to ignore evidence that would disprove an existing as-
cord greater weight to those voters who are better informed. Instead, seek con- sumption (a subject to which we will return in chapter 9). Furthermore, once
sensus among voters. In this process, each person's vote is posted before the an intelligence agency makes a firm estimate, it has a propensity in future esti-
group. All votes are then viewed to determine a median or mode. If there ap- mates to ignore or explain away conflicting information. Denial and deception
pears to be great dispersion among the votes, a mediator intervenes and asks succeed if one opponent can get the other to make a wrong initial estimate.
the voters on opposing ends to explain their positions to each other. In many The Iraqi WMD Commission identified what it described as a "textbook
cases a disparity in knowledge is the cause of the polarized opinions. example" of premature closure. Iraq was attempting to acquire aluminum
Premature Closure and Philosophical Predisposition. In the introduction, tubes for its Medusa rocket, and a CIA officer suggested that the CIA try to
we discussed the failures caused by premature closure. Premature closure vio- learn the precise rocket dimensions, so as to determine if the tubes were in fact
lates several tenets of good problem-solving procedures, in particular the tenet intended for the rockets. The CIA rejected the request because analysts had al-
of postponing evaluation and judgment until all relevant data are available. ready concluded that Iraq really was acquiring the tubes for gas centrifuges to
Collection processors as well as analysts fall into the trap of reaching conclu- support its nuclear weapons program.21
sions too early. ELINT analysts, COMINT analysts IMINT analysis too often Fortunately, there are several problem-solving approaches that help to
focus on one explanation for an intercept, an image, or a MASINT signature prevent premature closure and overcome the bias of philosophical predisposi-
and exclude the others. tion in the sifting of data. We will return to this point in the discussion of al-
The primary danger of premature closure is not that one might make a ternative models later in this chapter. Understanding the ways to combine dif-
bad assessment because the evidence is incomplete. Rather, the greater danger ferent types of evidence also helps.
is that when a situation is changing quickly or when a major, unprecedented Combining Evidence
event occurs, the analyst will become trapped by the judgments already made
Chances increase that he or she will miss indications of change, and it becomes To draw conclusions from evidence, an analyst must weigh the evidence
harder to revise an initial estimate, as intelligence analysts found out during in some way, and make a judgment as to what conclusions the evidence sup-
the Cuban missile crisis. ports and to what extent. In most cases and for most analysts, this is a quali-
Few intelligence successes make headlines. Failures make headlines. One tative judgment that involves combining disparate types of evidence.
exception was the Cuban missile crisis, in which U.S intelligence services ob- Convergent and Divergent Evidence
tained information and made assessments that helped policymakers act in time
Two items of evidence are said to be conflicting or divergent if one item
to make a difference. The assessments would have been made sooner, except
favors one conclusion and the other favors a different conclusion. Two items
for the difficulty of changing a conclusion once reached and the tendency that
existed to ignore the Cuban refugees who "cried wolf too often. of evidence are said to be converging if they favor the same conclusion.
130 Chapter Seven Populating (lie Model 131
For example, a HUMINT cable reports that the Chinese freighter Kiang Some redundancy does exist in geographical coordinatesa message that has
Kwan has left Shanghai bound for the Indian Ocean. A COMINT report on the coordinates "5 degrees 88 minutes South," clearly has an error, since min-
radio traffic from the Kiang Kwan as it left port states that the ship's destination utes of latitude and longitude never exceed 59. However, it is unclear what the
is Colombia. Ships seldom sail from Shanghai to Colombia via the Indian correct latitude should be. It is common practice to spell out or repeat num-
Ocean, so the two reports point to two different conclusions; they are diver- bers in such a message, or even to repeat the entire message, if a chance of a
gent. Note that both items of divergent evidence can be true (for example, the garble exists; that is, the sender introduces corroborative redundancy to en-
ship could make an intermediate stop at an Indian Ocean port); they simply sure that the correct coordinates are received.
lead to differing conclusions. The evidence that Iraq was acquiring aluminum Cumulative Redundancy. Now, suppose instead that the HUMINT report
tubes that fit the dimensions of its Medusa rocket, cited above, diverged from in the previous example says that a Chinese freighter left port in Shanghai on
the conclusion that the tubes were for gas centrifuges, but both conclusions May 21, carrying AK-47 nfles and ammunition destined for Tanzanian rebels.
nevertheless could have been true. The Iraqis could have purchased the tubes The report does not duplicate information contained in the COMINT report,
for both purposes. but it adds credibility to both reports. Furthermore, it leads to a more detailed
In contrast, two items of evidence are contradictory if they say logically op- conclusion about the nature of the illicit arms transfer.
posing things. A COMINT report says that the Kiang Kwan left Shanghai yes- The second report, in this case, adds cumulative redundancy to the first
terday at 1800 hours; a HUMINT report says that the ship was in Singapore report. Both reports are given more weight, and a more complete estimate can
this morning. Given the distance between these ports and the maximum speed be made than if only one report had been received.
of merchant ships, only one report can be true.
Structured Argumentation
Redundant Evidence The preceding section discussed some qualitative and intuitive ap-
Convergent evidence can also be redundant. To understand the concept proaches for combining evidence. It often is important to combine the evi-
of redundancy in evidence, it helps to understand its importance in commu- dence and demonstrate the logical process of reaching a conclusion based on
nications theory. Information comes to an analyst by several different channels. that evidence via careful argument.22 The formal process of making such an ar-
It often is incomplete, and it sometimes amves in garbled form. As stated in gument is called structured argumentation.
Analysis Principle 7-2, entropy takes its toll on any information channel. In Formal graphical or numerical processes for combining evidence are time
communications theory, redundancy is one way to improve the chances of get- consuming to apply and are not widely used in intelligence analysis. They are
ting the message right. usually reserved for cases in which the customer demands them, whether be-
Redundant, or duplicative, evidence can have corroborative redundancy cause the issue is critically important, because the customer wants to examine
or cumulative redundancy. In both types, the weight of the evidence piles up the reasoning process, or because the exact probabilities associated with each
to reinforce a given conclusion. A simple example illustrates the difference. alternative are important to the customer. Two such formal processes of struc-
Corroborative Redundancy. An analyst following clandestine arms trans- tured argumentation are Wigmore's charting method and Bayesian analysis.
fer networks receives two reports. A COMINT report indicates that a Chinese
freighter carrying a contraband arms shipment will be at coordinates 05-485, Wigmore's Charting Method
39-52E on June 13 to transfer the arms to another boat. A separate HUMINT John Henry Wigmore (1863-^943) was the dean of the Northwestern
report says that the Chinese freighter Kiang Kwan will rendezvous for an arms University Law School and author of a ten-volume treatise commonly known
transfer south of Pemba Island on June 13. Both reports say the same thing; a as Wigmore on Evidence. In that treatise he defined some principles for rational
quick map check confirms that the coordinates lie near Pemba Island, off the inquiry into disputed facts and methods for rigorously analyzing and ordering
Tanzanian coast, so no new information (except the ship's name) is gained possible inferences from those facts.23
from the second report. The second report has value for confirmatory pur- Wigmore argued that structured argumentation brings into the open and
poses and helps establish the validity of both sources of information. makes explicit the important steps in an argument and thereby makes it easier
In communications theory, an analogous situation might be a noisy tele- to judge both their soundness and their probative value.21 One of the best ways
type channel. Message errors are not a concern when one is dealing with text to recognize any inherent tendencies one may have to make biased or illogical
only, because text has inherent redundancy: If "Chinese freighter will ren- arguments is to go through a body of evidence using Wigmore's method.
dezvous," is sent, but the recipient gets the printout "Chinese freighter will The method is quite complex and is not detailed here. It is, however, a
rentezvous," the message will probably be understood in spite of the error. The very powerful tool for comparing alternative models or hypotheses. It requires
coordinates of the rendezvous point, however, have less inherent redundancy. the construction of elaborate diagrams that incorporate all important evidence
13.1 Chapter ieven
Populating the Model 133
(.3) (.4) tradiaory,34 and that message quickly becomes embedded in any
P(conc\usion | event) =
727 = .6 analysis culture. A similar motivation long ago led judicial systems
to adopt the principle of stare decisis: let previous decisions stand,
One problem with Bayesian analysis is that it does not deal well with ig- wherever possible. Both analysts and judges face the same tension:
norance. That is, if [he analyst assigns probabilities to either conclusions or Do you want to be consistent, or do you want to come up with the
events based on very little knowledge, contradictions can result. The solution right answer?
to this problem in Bayes's rule is to use a more formal methodology called the
Dempster-Shafer approach to combining evidence. The Dempster-Shafer ap- The problem has at times been so serious that the U.S. intelligence com-
proach is mathematically complex and is not described in detail here.25 munity has been directed to empower independent groups to provide alterna-
Both Bayes's rule and Dempster-Shafer rely on placing a numerical weight tive target models. In 1976, the President's Foreign Intelligence Advisory Board
on bits of evidence. There are three approaches to numerical weighting: ordi- and Director of Central Intelligence George H.W Bush created an independent
nal scale, interval scale, and ratio scale weighting. Ordinal scales simply indi- analysis team, known as Team B, to provide an alternative National Intelligence
cate rank or order, but no mathematical operations are possible. Interval scales Estimate on Soviet strategic objectives and capabilities.35 The effort engendered
have equal intervals between numbers, but the lack of an absolute zero refer- considerable resentment among analysts who had prepared the Team A estimate.
ence does not allow multiplication or division. Only ratio scaling, which has Building alternative models takes time. Analysts, always rushed, don't want
an absolute zero reference, allows the multiplication and division required for to do it. But it is important to keep more than one possible target model in mind,
Bayesian or Dempster-Shafer analysis. especially as conflicting or contradictory intelligence information is collected.
Sometimes the policymakers provide an alternative target model. For ex-
Alternative Target Models
ample, in 1982 the United States committed U.S. Marines to Lebanon in an
Alternative models are an essential part of the synthesis process. In stud- ambitious attempt to end a civil war. force occupying Israeli and Syrian armies
ies describing the analytic pitfalls that hampered past assessments, one of the out of Lebanon, and establish a stable government. The U.S. administration
most prevalent is failure to consider alternative scenarios, hypotheses, or mod- withdrew from Lebanon eighteen months later, its policy discredited and its
els.30 Analysts seem to be addicted to single-outcome scenarios. One national reputation damaged, with more than 250 Americans dead, most of them
intelligence officer has observed that "analysts . . . arely engage in systematic marines killed in a terrorist bombing. The U.S. intelligence community had
testing of alternative hypotheses."31 The Iraqi WMD Commission noted, "The one assessment of the Lebanon situation; the Washington policymaking com-
disciplined use of alternative hypotheses could have helped counter the nat- munity had a strikingly different assessment that envisioned Lebanon as a role
ural cognitive tendency to force new information into existing paradigms."32 model for future Middle East governments.3ft Table 7-1 shows a parallel list
There are a number of reasons why analysts do not make use of alternative comparing these two alternative models of the Lebanon situation
models, either initially or as new evidence conies in to suggest that a different Note that this is far from a complete picture of Lebanon, which today, as
target model is more appropriate, in 1982, has all the elements of a complex problem as defined in chapter 2.
The table also is more than a target model; it contains a number of analytical
Analysts are usually facing tight deadlines. The temptation is to judgments or hypotheses that were drawn from two competing target models.
go with the model that best fits the evidence, without considering
alternatives.
Summary
Presented with two or more target models, customers always pick
Once a model template has been selected for the target, it becomes nec-
the one that they like best, but that may or may not be the most
essary to fit the relevant information (collected from the sources discussed in
likely model. Analysts know this.
the previous chapter) into the template. Fitting the information into the model
Maintaining a corporate judgment is a pervasive and often an un- template requires a three-step process:
stated norm in the intelligence community.33 Customers tend to
view a change m judgment as indicating that the original judgment Evaluating the source by determining whether the source (a) is
was wrong, not that new evidence forced the change. competent, that is, knowledgeable about the information being
It has been noted that it serves the interest of any intelligence given; (b) had the access needed to get the information; and (c) had
agency to be perceived as decisive rather than academic and con- a vested interest or bias regarding the information provided.
Populating the Model lit
136 Chapter Seven
1, Sir Ed. Stafford to draw what he can from the Venetian Amb.
2, To procure some correspondence of the Fr, K. agent in Spain.
139
3. To take order with some in Rouen to have frequent advertisements telligence services, such as Israel's Mossad, and a number of multinational cor-
from such as arrive out of Spain at Nantes, Newhaven (i.e., Le Havre] porations can be successful within the areas where they have concentrated their
and Dieppe. intelligence expertise. They also have all of the advantages that accrue to a
4. To make choice of two especial persons, French, Flemings, or Italians, small, tightly knit organization. However, U.S. government collection capabil-
to go along the coast to see what preparations are a making there. To ities are unquestionably the best in the world. The U.S. intelligence commu-
furnish them with letters of credit. nity has the most resources and does the best systems planning. It innovates
constantly and attempts things few other services would try In breadth and
5. To have two intelligencers in the court of Spainone of Finale, an- depth of coverage, the United States remains the best, and therein lies its prob-
other of Genoa. To have intelligence at Brussels, Leyden, Bar.2 lem. Because U.S. intelligence can do so much, it is asked to do too much. Ex-
pensive collection assets are used too often where cheaper ones might suffice.
Clearly Walsingham had a target model, one focused on England's most As a result, the U.S. intelligence requirements structures have received
important strategic target, Spain, and its plans to attack England. He also had considerable cnticism, and repeated attempts to define such a structure over
a strategies-to-task problem breakdown. He knew what the gaps were in his decades suggest that something may be fundamentally wrong with the con-
knowledge and what collection assets were available. So he gave very specific cept. One critic said of the requirements process as it has been practiced in re-
guidance on how to fill the gaps. Things were so simple then. (Walsingham s cent years,
problem was not collection; it was getting his leaders to believe his intelli-
gence, a subject for chapter 15.) Analysts themselves often thought that loo many people were employed and
too much activity was oriented solely to generating "intelligence require-
The U.S. Collection Management Problem ments"; a better job could probably have been done by a few experienced
Contrast Walsingham's plan with the collection challenges facing a large in- people, working with the available data, and therefore aware of what was
telligence service such as that of the United States, which has many collection missing. Instead intelligence requirements were the object of repeated stud-
1
ies and reorganization efforts.
assets and many targets. Management of information acquisition is a major ef-
fort in large intelligence communities, where high-volume collection is based
on a formalized process of defining requirements, needs, and information gaps. Analysts believe that the existing requirements process is a bureaucratic
beast that consumes resources but adds little value. In spite of that view, for-
The U.S. intelligence community has for decades attempted to create structures
mal requirements structures are necessary in dealing with high-volume satellite
for handling requirements. As a result, there are thirteen separate processes and
IMINT and COMINT and with open source material, where many potential
systems in the U.S. intelligence community to initiate collection activity (count-
targets exist and where a large customer suite with competing priorities wants
ing just the major ones, excluding special access programs).
more collection than could be accomplished with the entire national budget.
Collection requirements form a hierarchy. Chapter 2 illustrated some re-
There are several things wrong with this requirements structure, however.
quirements hierarchies that result from the strategies-to-task problem break- First, as one senior U.S. intelligence official noted, everyone tasks the system,
down. Lower elements in the hierarchy are more specific and, in a well-drafted but no one prioritizes.5 No one is willing to fight the special interests and say.
requirements hierarchy, are linked to the higher elements by some measures We don't need this badly enough to spend resources on it. In contrast, busi-
that indicate their relative value in the overall scheme of things. The number nesses tend to watch their overhead costs closely and are willing to cut low-
of specific lower level targets will be in the dozens for targeting a business firm, payoff functions. Second, if information is available from unclassified sources,
in the hundreds for even a small country or a consortium, and in the thou- intelligence collection assets should not be used to get it, except where cross-
sands for a targeted illicit network such as an international narcotics operation. checking is essential, for example, in countering suspected deception. Increas-
A typical requirement at the lower levels might read, "Locate all armored ve- ingly, commercial sources such as commercial imaging satellites can do collec-
hicles in the battlefield area"; "Obtain a copy of Ambassador Smythes negoti- tion that once required national intelligence assets and can do it more cheaply
ating notes for tomorrow's trade negotiations"; or "Determine the intentions of Third, formal requirements structures tend to focus on bean counting. Con-
the Cuban leadership on seaborne migration." tent, not quantity, is the critical measure, and formal requirements structures
The collection requirements problem stems in part from the success that do not handle content evaluation well. Only analysts and customers can eval-
the United States has had in developing collection assets. Intelligence literature uate content and thereby place a value on collection.
often makes a point of criticizing U.S. intelligence collection capabilities as When these problems are not addressed, then the bulk of raw data col-
being cumbersome and inefficient.3 It is true that some small government in- lected by the INTs is irrelevant. For example, most new overhead (aircraft- or
Chapter Eight
Collection Strategies H3
Figure 8-1 Model of a Figure 8-2 Customer Connections to the Problem Breakdown
Money-Laundering Process Problem breakdown
Integration
is easy for an analyst to omit important points or fail to take full advantage of
Reinvestment of the funds in an ostensibly ihe information sources without an explicit interrelationship diagram. An ex-
legitimate business. plicit representation of the interrelationship, following the examples given in
this chapter, is useful for the veteran analyst and essential for the novice.
Figure 8-2 features a generic, top-level problem breakdown for money
of illicit proceeds into mainstream commerce and other funds transactions de- laundering. But the money laundering problem has many associated target
signed to conceal the source, ownership, or use of the funds. Criminal organi- models. There are many independent networks engaged in money laundering
zations, terrorist groups, and pariah states use money laundering to evade in- worldwide. Consider one target that we discussed in chapter 3: the Abacha
ternational sanctions. Money laundering can be thought of as a process having family's laundering of stolen Nigerian government funds. The Abachas placed
three distinct stagesplacement, followed by layering, followed by integra- money in a Citibank London account; "layered" the funds by moving them
tionas shown in the simple process model of Figure 8-1.7 among different Citibank London and Citibank New York accounts (shown in
The problem of constraining money laundering naturally divides into Figure 5-9), as well as through Citibank AG Frankfurt and Swiss banks; and
dealing with the three stages, and the three stages form the first level of the "integrated" the funds using individuals and the shell (dummy) companies
problem breakdown. But different customers of intelligence will be interested Morgan Procurement and Selcon Airlines.9 So a model of the Abacha funds-
in different stages. Countermeasures, it turns out, have been most effective laundering target might look like the one in Figure 8-3 (which only shows part
when aimed at the placement stage. It is easier to detect money laundering in of the Abacha network) overlaid on the top-level problem breakdown.
that first stage, and most law enforcement and regulatory work has concen- If we did no more, collectors could use this as a starting point for collec-
trated on detecting the placement of illicit funds." Therefore, law enforcement tion. HUM1NT collection is likely to be most useful against the placement and
organizations such as Interpol or the U.S. Financial Crimes Enforcement Net- integration stages, where well-placed human sources can monitor and report
work might focus on the placement stage, though they would want intelli- on unusual transactions. COM1NT collection is well positioned to help in
gence from all three stages. Financial regulatory customers, such as the United tracking the financial transactions associated with layering because such trans-
Kingdom's Financial Services Authority, focus on both placement and layenng. actions are typically made via international data transmission. Open source in-
Business regulatory customers, such as the U.S. Securities and Exchange Com- telligence can be useful in analyzing the business activities involving integra-
mission or state regulatory agencies, might focus on the integration stage. As tion. But we can do more to help the collector.
indicated in Figure 8-2, each of these customers has interests in specific pans
of the overall problem. Identifying Gaps
The first step an analyst takes is to interrelate the customer's problem When the analyst has defined the problem, as discussed in chapter 2, he
model and the target model for both information-gathering and analysis pur- or she must ask questions such as, How do 1 pull information out of the tar-
poses. Veteran analysts do this naturally, seldom making the interrelationships get model to address the problem that is before me? Does tlie target model, in
explicit. For simple problems, explicit definition may be unnecessary. How- its present form, give me everything I need to answer my customer's questions?
ever, when we deal with complex (nonlinear) problems, the target model or If not, where arc the gaps in knowledge of the target, and how can I fill those
scenario should be made explicit. Even when dealing with simple problems, it gaps? This section describes a formal process that an analyst might go through
Collection Strategies 147
Figure 8-3 Abacha Funds-Laundering Target Model are within easy reach, and write a report. They never get to gap analysis. The
opposite and equally poor approach is to keep looking for the one last scrap
of information that makes the other pieces fall into place. An analyst almost
Nigerian never gets that last piece of the puzzle. So gap analysis (and filling gaps) has
Federal to be done but not overdone; the analyst needs to know when to stop.
Ministry of
Women's Identifying data gaps is a continual and iterative processas new data
Main comes in and is fitted into the model, new gaps can be identified. Gap analy-
sis is the process of
is prudent to avoid re-creating solutions that already have been tried at least
Figure 8-4 Abacha Funds-Laundering Gaps once before. Begin by looking at what has succeeded in the past.
Start with a review of the collection strategies previously used against sim-
Nigerian
ilar targets and look at their results. Each specialized substantive area of intel-
Federal ligence has its own collection techniques that have been tested over the years.
Ministry of Political intelligence traditionally has relied on a combination of open source
Women's and HUMINT, with some COM1NT thrown m. Military intelligence relies heav-
Affairs
ily on COM1NT and IMINT, along with some specialized technical collection.
Weapons systems intelligence, discussed in chapter 14, uses all sources but re-
lies most heavily on specialized technical collection, 1M1NT, and open source.
Analyzing previous strategies and their results will illuminate the prospects for
future strategies.
An analyst cannot rely only on previous strategies, however. As chapter 9
will note, a predictable collection strategy can be defeated. Also, simply shift-
ing tasking from one target to another usually opens gaps in other areas.10
If possible, develop innovative approaches to using existing assets. Collectors
must be encouraged not to repeat collection that does not obtain the needed
information but instead to try new ideas. Techniques that work in economic
or political intelligence problems may be applied to problems in other areas,
such as military or scientific and technical intelligence.
Before designing a collection strategy to fill a gap, it is important to un- In identifying collection strategies, be sure to distinguish collectors' current
derstand the nature of the gap. Some intelligence gaps exist because analysis contributions from their potential contributions. In some cases, gaps can be
of the problem has been nonexistent or inadequate, not because of lack of col- closed by applying collection resources where they now contribute very little.
lection. Other gaps need research to determine what part collection can play A HUMINT source that reports on political affairs may also be able to obtain
An analyst should not treat all gaps as collection gaps; the collector will sim- economic information. A COMINT source that provides order of battle infor-
ply collect again without solving the problem, in some cases compounding the mation may also have insights into the personalities of enemy field comman-
problem by adding more unneeded data to be analyzed. ders.11 However, major reorientation of collection assets often requires consid-
Using Existing Collection Assets erable planning and may have to be considered a long-term solution.
For straightforward collection problems, collection planning can be done
Acquiring new data to fill gaps is a matter of making good use of existing quickly and efficiently using the approach that is summarized in Figure 8-5,
collection assets. These assets are the agents already in place, the open litera- continuing with the Abacha case model. Starting with a given target model and
ture that is coming in and being translated, the collection satellites or aircraft a detailed problem breakdown, the analyst and collectors identify gaps in
currently flying, and so on. The process of asking for use of these assets to fill knowledge of the target that must be filled to satisfy the customers' needs.
gaps is called "tasking." After reviewing their collection assets and capabilities, they define a collection
Analysts rely on their judgment in putting together the best collection strategy and ask specific INTs to go after specific elements of the target to fill
strategy for tasking to fill gaps. Analysts traditionally initiate the tasking and
must pull together the incoming information to form a coherent picture. In the the gaps.
On more complex collection problems, the general approach is the same,
collaborative environment envisioned in chapter 1, formulating a collection but a formal process may be needed to develop and compare alternative col-
strategy would be a team effort, with input from collectors and processors. The lection strategy packages. This is a resource allocation stepan effort to fill
following describes how it would proceed. short-term gaps (immediate needs) by identifying possible collection mecha-
Basic Collection Strategy Development. Most collection strategies are de- nisms and selecting the most promising combination of collection assets. The
veloped as a result of past experience. Making use of existing methods is a collection plan illustrated in Figure 8-5, for example, represents one possible
good way to save effort, time, and cost. Stated another way, most collection combination of collection assets, or one strategy, to fill the gaps identified in
problems are old ones; only the specific questions to be answered are new. It
i^napter tight
Collection Strategies 151
Figure 8-5 Abacha Funds-Laundering Collection Plan Overlaid on Based on the existence of previous HUMINT reporting about Yaya
the Target Model
Abubakar, the analyst knows that a HUMINT source has access to
Abubakar. The analyst would logically turn first to HUMINT for
Open source
additional intelligence as indicated in Figure 8-5, requesting more
details on the path of funds to Abubakar and amounts he received.
HUMINT Nigerian
Federal In developing collection strategies, time the collection so that it occurs
Ministry of when the probability of getting desirable content will be highest. For example:
Women's
Affairs
Missile range testing has consistent patterns. When a pattern of
vehicle deployments indicates that a missile test is about to take
place, it is the right time to task collection assets.
People consistently use the telephone heavily at certain times of
CitibankNY day. Ask for COMINT collection during those times.
......
"Chinquinto Questioning technical staff at professional conferences elicits more
HUMINT useful information than questioning them at other times.
Nole: Solid lines indicate connections; broken lines show intelligence collection targeting.
Also, an analyst can obtain synergistic benefits by intelligently timing col-
lection by different resources. Coordinated collection by different INTs at the
Figure 8-4 and 10 gain more information. Let us look in detail at how it was same time can provide insights that those INTs could not provide individually.
developed, recognizing that this is a hypothetical example. In the missile range testing example, 1MINT collection of the missile on its
launch pad should take place just before the telemetry collection of the mis-
First, the detailed problem breakdown may have indicated a need sile in launch phase, and specialized technical collection (e.g., RADINT) of the
for more information about the banks involved. A HUMINT source missile in flight and during reentry should be timed to follow the launch
connected to any of the banks involved with the Abachas could phase. The combination of all these collection activities can tell far more about
have identified the suspicious transactions that indicated place- the missile's performance than can any one of them alone.
ment and integration. In fact, bank personnel were aware of and The key to success with any collection strategy is a close and enduring re-
concerned about a sudden influx of more than $20 million into the lationship with the collectors. Simply writing collection requirements and
New York accounts, a transfer of $5 million to an unfamiliar per- "throwing them over the wall" doesn't work. If collectors have access to and
son, and the discovery that the Abacha sons were conducting busi- understand the target model and the problem breakdown, they can respond
ness in Libya, which had no apparent connection to the supposed much more effectively. This usually requires developing and maintaining per-
source of funds in the accounts. These transactions were out of line sonal contacts with collectors. Analysts in business intelligence, law enforce-
with the account history. ment intelligence, and tactical military intelligence are much closer to their
sources and are able to provide detailed, explicit collection guidance. It is dif-
Based on past collection experience, an analyst knows that
ficult to do at the national level for large communities such as the United
COMINT has the potential to identify the patterns of funds move-
States has. But it can be done and increasingly is being done on high-priority
ments among banks that are a sign of layering activity and also may
be able to fill the two gaps in knowledge indicated by question problems.
Advanced Collection Strategy Development: Cost-Benefit Analysis. The
marks in Figure 8-5. So the analyst would provide the diagram
with a request to COMINT collectors. result of the effort discussed thus far should be a strategy packagea combi-
nation of strategies for closing the gaps. On very large and high-priority efforts,
U.S. Department of Transportation records and similar open alternative strategies can be compared and the best alternative selected. This
sources are a good first place to look for details on the use of Sel- is seldom done in practice because it takes both much planning and a high
con Airlines as a shell company for the funds integration stage. level of understanding of the various available sources. Topics such as locating
152 Chapter Eight
Collection Strategics 153
A target-centric approach to the intelligence process forces collection per- This planning is normally the responsibility of the collectors. Developing
formance [o focus on content, not on quantity If collected material does not
new capabilities is a long-term process. In developing new HUMINT sources,
belong in any target modelthat is, if it has no intelligence valueit quickly
the lead time can be one to five years or more. New satellite SIGINT or IMINT
becomes obvious to all concerned, and the collector is more likely to take ac-
tion to make future intelligence relevant to the targets. collection systems take ten years to develop and deploy during peacetime,
though experience indicates that they can be deployed much faster in crisis or
Dealing with Enigmas wartime. Planning the development requires time and expertise that analysts
do not have. Thus the analyst has to depend on the collectors to do the long-
While identifying knowledge gaps in the target model, an analyst will oc-
range planning.
casionally encounter a type of gap that is common in the intelligence business:
the unidentified entity, or enigma. The analyst's normal contribution to the long-term gap problem is to de-
fine long-term requirements and leave the rest to the collector. One problem
An enigma is a different type of thing for the analyst than for the collector. with filling long-term gaps is that a formal requirements system tends LO focus
For analysts, the enigma is something that the analyst knows exists but of
on today's needs and gaps. Major intelligence problems, such as proliferation
which he has no physical evidence. Examples include a communications link
of weapons of mass destruction, terrorism, and international criminal activity,
that has to exist from narcotics suppliers to distributors, a fabrication facility
tend to endure. But they change in relative importance, and new problems
that must exist somewhere if eel! phones are being produced, or an unnamed
arise. In 2020 environmental problems, pandemics, mass migration, and basic
terrorist organization that must be responsible for recent acts of violence The
resource (food and water) shortages might be more important than today's
gap may be in identifying the communications link, in finding evidence that the
problems. The existing U.S. collection requirements structure is not well suited
facility exists, or in naming the terrorist organization and identifying its leader.
to dealing with the future, and it has difficulty dealing with denial and decep-
For collectors, the enigma is a physical object [hat cannot be fit into ex-
tion. Chapters 10 to 12 deal with the predictive problem generally. The next
isting models. Among IMINT collectors, if occurs as the mysterious facility ob-
chapter deals with the denial and deception problem.
served in imagery whose purpose cannot be determined. Among ELINT col-
lectors, it is the strange new radar signal. Among COMINT collectors, it is the Summary
encrypted communications link between two unidentified organizations. The
A large intelligence community such as that of the United States experi-
gaps here may be in identifying the funaion of the radar or in establishing the
identities of the organizations. ences considerable difficulty in planning for and managing collection. Though
analytic shortfalls are responsible for most failures, analysts cannot analyze in-
One of the better-known current enigmas is a large underground complex
telligence that they don't have. A large intelligence community needs a care-
that Russia is building at Yamaritau Mountain in the Urals. The complex, un-
fully planned set of collection strategies against high-priority targets. Analysts
der construction for the past twenty-five years, has been the subjeci of atten-
have to help make the collection process work effectively. They can do so by-
tion and speculation in Congress and the press, but its purpose remains an
enigma. being heavily involved in developing collection strategies.
Four steps are commonly used in developing collection strategies: The
Dealing with enigmas requires analyst-collector teamwork in using the
customer problem breakdown of chapter 2 and the target model of chapter 7
target model. The target model must identify entities that, in the analysts view,
are used together, first in identifying gaps in knowledge, and later in produc-
have to exist. The collector's input to the model must note potentially relevant,
ing finished intelligence. Step 1 is to interrelate the target model with collec-
unidentified facilities and signals and communications links, and analysts
tion sources so that you can plan collection to fill gaps in knowledge, making
must respond by helping the collectorstypically by finding a model into
which the collector's unidentified entities fit. use of the best available sources.
Step 2 is identifying gaps in your knowledge of the target. The gaps usu-
Planning for Future Collection: Filling the Long-Term Gaps ally become fairly obvious when the target model and problem breakdown are
compared, but they have to be made explicit. Collectors can help with this
A distinctly separate problem arises when the need \s not to task existing
and the following steps, if they have access to the target model and problem
collectors but to fill gaps that no existing collector is able to fill. Then the re-
breakdown.
quirement is either to develop new capabilitiesrecruit a new agent with the
Defining a collection strategy', step 3, involves using existing assets to deal
necessary access, acquire new open source publications, develop a new SIGINT
with the gaps. Past experience with collection against similar targets can help
or IMINT collection system, and the likeor to find a new way 10 use existing
systems. in this step. Looking at the sources that were used in populating the existing
target model can help identify what sources are best positioned to fill gaps.
Using a good understanding of the target lo time collection improves the
chance that the effort will obtain useful information. The most success in col-
lection strategy comes from having a close relationship with collectors. On
large collection efforts against high-priority targets, it may be worthwhile to
develop and compare alternative strategies using cost-benefit analysis.
Planning for future collection systems development, step 4, is primarily
the collectors' responsibility. It involves assessing both existing and likely fu-
ture needs and gaps, including planning to deal with denial and deception.
These steps form an iterative process. They are listed in sequential order
to facilitate understanding, but in practice they tend to be worked in varying Denial, Deception, and Signaling
orders, and several iterations of the process will occur over time.
(Votes All warfare is based on deception.
1. Steven D. Leavitt and Stephen J. Dubner, Freakonomics (New York: HarperCollins, 2005), 89. Sun Tzu
2. Stephen Budiansky, Hfi Majesty's Spytnaster (New York: Viking Penguin, 2005), 199
3 See, for example, Roy Godson, Intelligence Requirements for the 1990s (Lanham, Md : Lexing-
ton Books, 1989).
4 |ohn Prados, The Soviet Estimate (Princeton: Princeton University Press, 1987), 181.
5. Godson, Intelligence Requirements, 68.
6. Report of the Commission on the Intelligence Capabilities of the United States Regarding Weapnisqj
I n evaluating evidence and developing a target model, an analyst must con-
stantly take into account thai evidence may be deliberately shaped by an
opponent's actions. That is, the analyst is seeing (or not seeing) what the op-
Mass Destruction, March 31, 2005, wwwwmd.gov/report/wm d_report.pdf. ponent wants him to see (or not to see). This usually means considering the
7. Joseph M. Myers, "International Strategies to Combat Money Laundering," speech lo [he In- possibility of denial and deception. Denial and deception (called D&D) are
ternational Symposium on the Prevention and Control of Financial Fraud, Beijing, October
19-22, 1998. major weapons in the counterintelligence arsenal of a country or organization.
8. Ibid They may be the only weapons available to many countries against highly so-
9 "Minority Staff Report for Permanent Subcommittee on InvestigationsHearing on Private phisticated technical intelligence (especially against IMINT and S1GINT).
Banking and Money Laundering: A Case Study of Opportunities and Vulnerabilities," Novem- At the opposite extreme, the opponent may be shaping what the analyst
ber 9, 1999, www.senate.gov/~govt-aff)'110999_repott.htm.
10. sees to send a message or signal. It is important to be able to recognize signals
In response to the attacks of September 11, the United States shifted a large segment of its in-
telligence collection and analysis capability onto [he terrorism target. The knowledge gaps
and to understand their meaning.
that have been opened in other areas will take years to close. Unfortunately, ihe shifted re-
sources could not be used efficiently, for reasons that are explained by the Brooks curves (see
Denial and Deception
chapter 13). Denial and deception come in many forms. Denial is somewhat more
11
The Department of Defense defines 'order of battle" as "the idemificalion, strength, command straightfo rward:
structure, and disposition of the personnel, units, and equipment of any military force." See
DOD Ditiwnaiy of Military Terms, www.dlie.mil/doctnne/jcl/doddict/, April 10, 2003. Communications and radar signals can be denied to S1GINT by op-
12 Prados, The Soviet Estimate, 96-102. erational practices such as intermittent operation or use of land
13. Congressional Record, June 19, 1997, H3943. lines instead of radiopractices commonly known as emissions
control (EMCON). More technically sophisticated opponents use
encryption or a wide range of technical approaches known collec-
tively as low-probability-of-intercept (LPI) techniques. Signals can
also be denied by the more aggressive tactic of jamming the SIGINT
system with interfering signals.
Denial against IMINT may take the form of camouflage netting, ob-
scuring or masking techniques, or placing sensitive operations in
underground facilities (protecting them against attack at the same
time); blinding sensors with lasers; conducting operations during
darkness or cloud cover to hide military force movements or ille-
gal activity; and moving units often to avoid their being targeted.
157
Denial of technical intelligence collection could include scrubbing objective is to mislead the competitor without misleading the public (which in
gas emissions (cleaning them up by removing telltale chemicals) countries such as the United States can result in lawsuits) and without doing
and processing effluents to conceal the nature of the process at a anything illegal. In a number of areas, however, such as positioning for com-
plant. petitive contract bidding and in mergers and acquisitions, deception is a com-
mon and accepted pan of the game.
Deception techniques are limited only by our imagination. Passive decep- Defense against denial and deception starts with one's own denial effort,
tion might include use of decoys or having the intelligence target emulate an that is, the protection of sources and methods of collecting and analyzing
activity that is not of intelligence interestmaking a chemical warfare plant intelligence.
look like a medical drug production facility, for example. Decoys that have
been widely used in warfare include dummy ships, missiles, and tanks. Defense against D&D: Protecting Intelligence
Active deceptions include misinformation (false communications traffic, Sources and Methods
signals, stories, and documents), misleading activities, and double agents (agents
In the intelligence business, it is axiomatic that if you need information,
who have been discovered and "turned" to work against their former employ-
ers), among others. someone will try to keep it from you. And we have repeatedly noted that if an
opponent can model a system, he can defeat it. So your best defense is to deny
Illicit groups such as terrorists conduct most of the deception that intelli-
your opponent an understanding of your intelligence capabilities. Without such
gence must deal with. Illicit arms traffickers (known as "gray" arms traffickers)
and narcotics traffickers have developed an extensive repertoire of deceptive understanding, the opponent cannot effectively conduct D&D.
techniques to evade international restrictions. They use middlemen to hide fi- For small governments, and in the business intelligence world, protection
nancial transactions. They change ship names or aircraft tall signs en route to of sources and methods is relatively straightforward. Selective dissemination
mislead law enforcement officials. One airline changed its corporate structure of, and tight controls on, intelligence information are possible. But a large gov-
and name overnight after its name became linked to illicit activities.1 Gray ernment has too many intelligence customers to justify such tight restrictions.
arms traffickers use front companies and false end-user certificates^ The fol- Those bureaucracies therefore have established an elaborate system simulta-
lowing are some of the standard deception techniques that illicit arms carrier neously to protect and disseminate intelligence information. This protection
aircraft use: system is loosely called compartmenlation, because it puts information in com-
partments and restricts access to the compartments.
registering the aircraft in one country, then chartering it by com- There are two levels of protection for intelligence information. The levels
panies registered in another, with crews that are hired in yet other distinguish between the product of intelligence and the sources and methods;
countries, and basing the aircraft somewhere else usually the product is accorded less protection than the sources and methods.
Why? The product, if lost, reveals only itself and not how it was obtained. In-
using another aircraft's call sign
formation about the product is typically classified "Secret" or below, though
flying into an airport with one registration number and then flying "Top Secret" reports are used to protect especially sensitive information. Infor-
out with a different one mation that might reveal the identity of the source (the agent) is given the
making an unscheduled landing on the way to the approved des- highest level of protection. Loss of that information usually results in someone
tination and unloading illicit cargo being imprisoned or killed; the source is lost permanently, and other potential
making an unscheduled landing to load illicit cargo en route and sources are discouraged from coming forward.
then shipping the additional load under cover of the legal cargo In the U.S. intelligence community the intelligence product, sources, and
methods are protected by the Sensitive Compartmented Information (SCI) sys-
In another, actual example, a pilot was told to give the destination of his tem. The SCI system uses an extensive set of code words to protect sources and
aircraft as N'Djamena in Chad, but when he arrived in Cairo he was told to file methods. Usually only the collectors and processors have access to the code
a new flight plan giving his destination as Muscat, Oman. Once the plane was word materials. The product is mostly protected only by standard markings
on its way to Oman, the crew were told to divert to Mukalla Airport, near such as Secret and Top Secret, and access is granted to a wide range of people.
Riyan, in South Yemen, and then to fly a specific, circuitous route over Saudi Under the SCI system, protection of sources and methods is extremely
Arabian airspace.5 high for two types of COMINT. Clandestine COMINTusually acquired
Commercial entities also engage in deception to mislead competitors, but through taps on telecommunications systemsis heavily protected because it
a company must usually tread a fine line in conducting such deception. The is expensive to set up and provides high-quality intelligence, and its loss has a
Denial, Deception, and Signaling 161
severe and often permanent impact. COMINT based on decryption is the sec-
ond highly protected type. Successes at breaking encryption are tightly com- quently has to be multi-INT, or a "swarm" attack, to be effective. Increasingly,
partmented because an opponent can readily change the encryption code, and various countries are using carefully planned and elaborate, multi-INT D&D.
breaking the new code is laborious.
Such efforts even have been given a different nameperception management
Most IMINT, on [he other hand, has no special controls because the in- that focuses on the result that the effort is intended to achieve.
formation needs (o be made available quickly 10 field commanders. Very little Perception management can be very effective against an intelligence orga-
protection of its sources and methods is needed anyway, because when a re- nization that, through hubris or bureaucratic politics, is reluctant to change
connaissance aircraft flies overhead, it is obvious to the enemy that you are its initial conclusions about a topic. If the opposing intelligence organization
taking their picture. Most aerial photography has been classified Secret or makes a wrong initial estimate, then long-term deception is much easier to
below, and a substantial amount of satellite photography is now unclassified. pull off. If denial and deception are successful, the opposing organization faces
High security protection is reserved for unusual IMINTunique capabilities an unlearning process: its predispositions and settled conclusions have to be
that are not obvious to the opponent.
discarded and replaced. Highly adaptive organizations have the capacity to un-
Open source intelligence has little or no protection because the source learn and are therefore less vulnerable to denial and deception. Large, bureau-
material is unclassified, However, the techniques for exploiting open source cratic organizations find unlearning very difficult.
material and the specific material of interest can tell an opponent much about The best perception management results from highly selective targeting,
an intelligence service's targets. For this reason, intelligence agencies that intended to get a specific message to a specific person or organization. This re-
translate open source often restrict its dissemination, using marking such as quires knowledge of that person's or organization's preferences in intelligence.
"Official Use Only" A restrictive marking also allows a government to avoid All of which makes it difficult to do well, but the payoff of a successful per-
copyright laws while limiting use of the material. Corporations make use of ception management effort is very high. It can result in an opposing intelli-
similar restrictive markings on material that is translated or reproduced for in- gence service making a miss-call or cause it to develop a false sense of secu-
house use for the same reasonsconcealment of their interest and avoidance rity. If you are armed with a well-developed model of the three elements of a
of copyright problems.
foreign intelligence strategy described in chapter 3targets, operations, and
A more serious reason for protecting open source methods is that if an op- linkagesan effective CI counterattack in the form of perception management
ponent knows what the intelligence target materials are, it is easier for him to or covert action is possible, as the following examples show.
take deceptive countermeasures. For example, the United States has long been
aware that many intelligence services translate and avidly read Aviation Week The Man Who Never Was
and Space Technology. When the Defense Department wishes to mislead or de- During World War II the British had a very good model of German intel-
ceive another country about U.S. aerospace capabilities and intentions, this ligence, including a good understanding of German operations in Spain and
magazine would be a logical place to plant the misleading story' the close linkages between German and Spanish intelligence. Armed with this
The protection given to specialised technical collection varies greatly knowledge, the British were able to plant on the Spanish coastline a body that
across the many INTs involved. ELINT is classified Secret or below. When an apparently was that of a British staff officer carrying documents that indicated
opponent uses a radar, he has to assume that someone will intercept it, and the targets of the next Allied invasion. The deception succeeded because the
denial is very difficult. In contrast, the ability to break out the telemetry chan- British had an excellent model of how the German and Spanish services worked
nels and determine the meaning of each channel signal is the important together, and they knew what form oT information the Germans were likely 10
method (o protect. FISINT therefore resembles COMINTthe processing part believe. A fake operations plan probably would have aroused German suspi-
is accorded tight compartmentation protection. Information operations are cions. Instead, the key document was a masterpiece of subtlety in the form of
given a high degree of protection for a similar reason; they are easily defeated a personal letter hinting that the next invasions would hit Sardinia and Greece
if their success becomes known to an opponent. and that Sicily (the actual invasion target) was a feint. The Germans were com-
pletely deceived. The story of the deception has been told in a book and a mo-
Higher Level Denial and Deception
tion picture, both titled The Man Who Never Was.4
An earlier section illustrated some straightforward examples of denial and
deception. Deception must follow a careful path; it has to be hard to pick up The Cuban Missile Crisis
(otherwise, it is too obviously deception) but not so hard that your opponent In early 1962, the Soviets decided to place nuclear-equipped SS-4 and SS-5
misses it. It is commonly used in HUMINT, but in the modern world it fre- ballistic missiles in Cuba to counter the increasing U.S. edge in ballistic mis-
siles aimed at the USSR. The deployment was to be hidden from U.S. intelligence
162 Chapter Nine Denial, Deception, and Signaling 163
by an elaborate denial and decepcion program thac combined HUMINT, IMINT, because the Soviets used large-hatch ships such as the Poltava to
open source, and diplomatic deception. deliver such missiles.
Had a vessel experienced mechanical failure en route, the captains
Military units designated for the Cuban assignment were told that were told to explain to any ships offering assistance that they were
they were going to a cold region. They were outfitted with skis, felt exporting automobiles. If this had occurred, it would have been a
boots, fleece-lined parkas, and other winter equipment. tip-off to analysts that something was amiss because the USSR was
Officers and missile specialists traveled to Cuba as machine opera- not an automobile exporter at the time.
tors, imgation specialists, and agricultural specialists. Once deployed, the units were not well concealed from aerial re-
Missiles were shipped from eight Soviet ports to hide the size of the connaissance. They had a characteristic imagery signature that the
effort; the missiles were loaded under cover of darkness. Soviets did not change and which led to the U.S. discovery of the
The missile crates and launchers were shielded with metal sheets San Cristobal missile site in October and the beginning of the
to defeat infrared photography. Cuban missile crisis.6
Ordinary automobiles, tractors, and harvesters were placed on the
In summary, the Soviet deception was a remarkably well crafted, multi-
top decks to convey the impression that the ships were carrying
INT denial and deception effort that succeeded for a long time because the
only agricultural equipment.
Soviets had a very good understanding of U.S. intelligence capabilities.
The ships made false declarations when exiting the Black Sea and
the Bosporus. They altered the cargo records and declared tonnage The Farewell Dossier
well below what was being carried. They often listed Conakry, Detailed knowledge of an opponent is the key to successful counterintel-
Guinea, as their destination. ligence, as the "Farewell" operation shows. In 1980, the French internal secu-
In Cuba, anything that resembled agricultural equipment was un- rity service. Direction de la Surveillance du Territoire (DST), recruited Soviet
loaded in the daytime. Weaponry was unloaded only at night and KGB Lt. Col. Vladimir I. Vetrov, code-named "Farewell." Col. Vetrov gave the
was moved directly to the missile bases along back roads at night. French some four thousand documents, detailing an extensive KGB effort to
Radio Moscow regularly reported that the USSR was supplying clandestinely acquire technical know-how from the West, primanly the United
Cuba with "machine tools, wheat, and agricultural machinery . . . States. In 1981 French president Francois Mitterrand shared the source and
and fertilizer.'' the documents (which DST named "the Farewell Dossier") with U.S. president
Ronald Reagan.
In what proved to be a brilliant move, the Soviets leaked accurate The documents revealed a far-reaching and successful intelligence opera-
information about the deployment to mask it. They funneled ac- tion that had already acquired highly sensitive military technology on radars,
curate details through counterrevolutionary Cuban organizations computers, machine tools, nuclear weaponry, and manufacturing techniques.
in the United States. The CIA discounted the information, because But the specific targets on the list provided the guidance for an effective
they did not regard the groups as credible, and dismissed the sub- counterstrike.
sequent stream of reports from Cubans, tourists, and foreign diplo- In early 1982, the Defense Department, the FBI, and the CIA began de-
mats in Cubasome of which were validas simply more of the veloping a counterattack. Instead of simply improving U.S. defenses against
same.
the KGB efforts, the U.S. team used the KGB shopping list to feed back,
During September, Soviet diplomats gave repeated assurances to through CIA-controlled channels, the items on the listaugmented with "im-
top U.S. officials that they had no intention of putting offensive provements" that were designed to pass acceptance testing but would fail ran-
weaponry in Cuba.3 domly in service. Flawed computer chips, turbines, and factor)' plans found
their way into Soviet military and civilian factones and equipment. Mislead-
The deception was not perfect. There were some slips; ing information on U.S. stealth technology and space defense flowed into So-
viet intelligence reporting. The resulting failures were a severe setback for
The Soviets used the freighter Polfava to carry missiles. Some U.S. major segments of Soviet industry. The most dramatic single event resulted
experts speculated that the ship might be carrying ballistic missiles from the United States' providing gas pipeline management software that was
164 Chapter Nine Denial, Deception, and Signaling 165
installed in the Soviets' trans-Siberian gas pipeline. The software had a feature test was contemplated and to focus U.S. attention on a possible
that would at some point cause pressure in the pipeline to build up to a level ballistic missile test.
far above its tolerance. The result was the Soviet gas pipeline explosion of At the same time, they began preparations for a missile test at their
1982, described as the "most monumental non-nuclear explosion and fire ever Chandipur missile test range, more than a thousand miles from the
seen from space."7 Pokharan site. The Indians actually tested a surface-to-air missile,
Mounting a deception campaign often requires extensive effort, but some- but they moved additional equipment into the test range so that the
times the payoff is worth it. The Farewell deception exacted high costs but test appeared to be an intermediate-range ballistic missile test. 12
produced many benefits; it may have hastened the end of the cold war.
In many ways, the Farewell deception was the perfect counterintelligence As a result, U.S. reconnaissance satellites reportedly were focused on the
response. Even its subsequent exposure did not reduce the effectiveness of the Chandipur missile site, with only minimal coverage of the nuclear test site at
deception, since the exposure called into question all of the successful KGB the time of the test.13 The deception was helped along by the U.S. govern-
technology acquisitions and discredited the KGB's technology collection effort ment's mindset that because the Indians wanted to improve trade relations,
within the USSR.8 The deception would not have been possible without the they would not provoke a crisis by testing a nuclear weapon.14
detailed knowledge that Col. Vetrov provided, which allowed the United
States to create detailed models of the KGB targets, the nature of the KGB op- Countering Denial and Deception
erations, and the linkagesthat is, the use of other Warsaw Pact country in- Many of the standard techniques for countering denial and deception were
telligence services in the technology acquisition effort- developed back in World War II, and they continue to work, with new twists
and new technologies. However, when collection becomes too predictableas
The Indian Nuclear Test
can happen in large intelligence organizationstactics for countering denial
Other intelligence services often learn of U.S. collection capabilities through and deception no longer work. If opponents can model the collection process,
the actions of policymakers. Demarches9 and public statements that that are they can defeat it. U.S. intelligence learned that lesson in HUMINT against nu-
based on intelligence results inevitably reveal something about intelligence ca- merous Soviet targets after some painful losses. There is a tendency to believe
pabilities. India used such knowledge in developing a strategic deception plan that overhead (satellite) IMINT and SIGINT are less vulnerable to countermea-
to cover its test of a nuclear device on May 11, 1998, On that date, the Indi- sures. However, critics have pointed out that not only denial but also effective
ans conducted three underground nuclear tests at their Pokharan nuclear test deception is possible against both IMINT and SIGINT if the opponent knows
site in the country's northwestern desert. The test came as a complete surprise enough about the collection system.15 The effectiveness of hostile denial and
to the U.S. government. deception is a direct reflection of the predictability of collection.
The deception succeeded because the Indian government had excellent The best way to defeat denial and deception is for all of the stakeholders
understanding of the keys that U.S. imagery analysts used to detect test prepa- in the target-centric approach to work closely together. The two fundamental
rations. The U.S. government had succeeded in deterring an earlier plan by rules of collection form a complementary set; One rule is intended to provide
India to stage the tests. In December 1995, U-S. reconnaissance satellites ob- incentive for collectors to defeat denial and deception, and the other suggests
served test preparations at the Pokharan site, including the movement of ve- ways to defeat it.
hicles and the deployment of testing equipment. The U.S. ambassador to India The first rule is to establish an effective feedback mechanism. Relevance of
showed the imagery to top Indian officials in a successful demarche to per- the product to intelligence questions is the correct measure of collection effec-
suade them not to test.10 tiveness, and analysts and customersnot collectorsdetermine relevance.
Using the knowledge they gained from that demarche, the Indians The system must enforce a content-oriented evaluation of the product because
planned an elaborate denial and deception campaign to conceal preparations content is the measure of relevance. This implies that a strong feedback sys-
for the 1998 tests. The denial campaign involved, among other things, bury- tem exists between analyst and collector and generally that collectors have es-
ing the cables and wires running into the test shaft.11 The deception campaign tablished close links to the analysts. The link has to work both ways. Collec-
had at least two major elements: tors need to see clearly how their product was used to modify the target model.
At one point in history, intelligence services did very well at countering
The Indian government issued a number of public statements just denial and deception. During World War II both the British and the Germans
prior to the test, designed to reassure Washington that no nuclear had efficient systems for identifying D&D techniques and countering them.
166 Chapter Nine
Denial, Deception, and Signaling 167
(The successful Allied deception covering the 1944 Normandy invasion was a
pabilities, disrupt their warning programs, and discredit their intelligence ser-
notable exception.) Few denial and deception tactics worked for very long.
vices. Chapter 6 discussed Project Jennifer, the U.S. use of the Glomar Explorer
Britain and Germany owed their World War II successes to a tight feedback
to raise a sunken Soviet submarine. Project Jennifer was protected by an elab-
loop in their intelligence processes. Intelligence analysts interacted constantly
orate deception program. Its intent was to convince Soviet intelligence that the
with IMINT and SIGINT collectors to develop counter-counter-measures. As a
Glomar Explorer's purpose was deep-sea mining, and the ship's operations were
result, there existed a constant action-counteraction process, much like the
carefully planned to support that impression. The deception apparently suc-
one that has existed in the electronic warfare and radar communities in the
past sixty years. ceeded, in pan because U.S. intelligence knew that Moscow would pay very
little attention to a ship having only a commercial purpose.
The second rule is to make collection smarter and less predictable. Don't
In analysis, the first defense against D&D involves maintaining alternative
optimize systems for quality and quantity; optimize for content, One might,
for example, move satellite-based collectors to less desirable orbits to achieve target models, as discussed in chapter 7. Another important step is constantly
surprise or keep opponents off balance. At the opposite extreme in sophistica- to develop new techniques for sensor fusion or synthesis of intelligence data.
tion, in collecting discarded papers (TRASHINT), don't keep coming back to An analyst can often beat denial and deception simply by using several types
the same dumpster ever)' day at the same time. of intelligenceHUMINT, COMINT, and so onin combination, simultane-
Apply sensors in new ways. Analysis groups typically have thought of ously, or successively It is relatively easy to defeat one sensor or collection
ways to do this in their areas of responsibility. Also, techniques for defeating channel. It is more difficult to defeat all types of intelligence at the same time.
denial and deception that have been developed for one problem (counternar- Hyperspectral imaging, for example, is a valuable weapon against IMINT de-
cotics, for example) may be applicable to others (weapons proliferation). ception because it can be used to measure so many different aspects (signa-
Consider provocative techniques against denial and deception targets. In tures) of a target. Increasingly, opponents can be expected to use swarm D&D
the U.S. Air Force airborne reconnaissance programs dating back to the 1950s, against several INTs in a coordinated attack like the one the Soviets orches-
provocation was used effectively to overcome the practice of emissions control trated in the Cuban missile crisis. Such complex operations, however, as in
by the Soviets. In emissions control, one keeps all nonessential signals off the that example, inevitably have their weak points. The analyst has to find them.
air until the SIGINT collector has left the area. The U.S. response was to send
an aircraft on a penetration course toward the Soviet border, for example, and Signaling
turn away at the last minute, after the Soviets had turned on their entire air de- Signaling is the opposite of denial and deception. It is the process of de-
fense network to deal with the threat. Probing an opponent's system and liberately sending a message, usually to an opposing intelligence service. It is
watching the response is a useful tactic for learning more about the system. included here because, like denial and deception, its use depends on a good
Even so, probing may have its own undesirable consequences: The Soviets knowledge of how the opposing intelligence service obtains and analyzes
would occasionally chase and shoot down the reconnaissance aircraft to dis- knowledge. Recognizing and interpreting an opponent's signals is one of the
courage the probing practice.
more difficult challenges an analyst must face. Depending on the situation, sig-
Hit the collateral or inferential targets. If an opponent engages in denial or nals can be made verbally, by actions or displays, or by very subtle nuances
deception about a specific facility, then supporting facilities may allow infer- that depend on the context of the signal.
ences to be made that would expose the deception. Security measures around In negotiations, signals can be both verbal and nonverbal. True signals
a facility and the nature and status of nearby communications, power, or trans- often are used in place of open declarations to provide information while pre-
portation facilities may provide a more complete picture. A sequel to the suc- serving deniability. False signals are used to mislead, usually to gain a negoti-
cessful British commando raid on the Bruneval radar, described earlier, was
ating advantage.
that the Germans protected all of their Wiirzburg radars near the coast with One signal that has gained more use with the increase in satellite imagery
barbed wire entanglements. The barbed wire showed up clearly on aerial pho-
is to display items in an imaged area to send a message. Massing troops on a
tography and made it relatively easy for RV Jones's photo interpreters to locate
frontier as an intimidation tactic is one example of signaling. It is such a well-
all of the radars that the Germans had successfully concealed up until then.
known tactic that in July 1990, Saddam Hussein's massing of troops on the
Finally, use deception to protect a collection capability. Military tacticians
Kuwait border initially was interpreted as a signal, putting pressure on Kuwait
claim that the best weapon against a tank is another tank, and the best weapon
to gain economic concessions.
against a submarine is another submarine. Similarly, the best weapon against
In business, signals are often conveyed by actions rather than words. A
denial and deception is to mislead or confuse opponents about intelligence ca- competitor's product price increase or decrease; an acquisition; a new product
168 Chapter Nine Denial, Deception, and Signaling 169
Figure 9-1 Cultural Differences in Signaling leaders moved aggressively on several fronts to signal their intention to in-
tervene militarily if the advances continued. Diplomatic notes, press releases,
High and oven troop movements all were used to send the signal. U.S. policy-
makers and military leaders either dismissed or failed to understand the sig-
Japanese nals, and the Chinese intervention came as a surprise.1'
Arabs
Latin Americans In July 1990, the U.S. State Department unintentionally sent several sig-
X
nals that Saddam Hussein apparently interpreted as a green light to attack
s Italians/Spanish
i
u French
Kuwait. State Department spokesperson Margaret Tutwiler said, "We do not
have any defense treaties with Kuwait... ." The next day. Ambassador April
North Amerleans Glaspie told Saddam Hussein, "We have no opinion on Arab-Arab conflicts
Scandinavians
like your border disagreement with Kuwait." And two days before the inva-
sion, Assistant Secretary of State John Kelly testified before the House Foreign
Germans
Affairs Committee that there was no obligation on our part to come to the de-
Swiss
Low fense of Kuwait if it was attacked.17
The Kuwait example illustrates the other side of signalingthat intelli-
Explicit
Message Implicit gence analysts need to support the customer. Clearly, it is important to be able
Source: Edward T. Hall, Beyond Culture (Garden City, N.Y. 1976). to tell a policymaker what the opponent's signals are and interpret them. But
it is equally important to let a policymaker know how his or her signals,
whether intentional or not, are likely to be interpreted by the opponent.
line; or a major reorganization; among other things, can be a signal of its fu-
ture intentions in the market. Analytic Tradecraft in a World of D&D
Analyzing signals requires examining the content of the signal, its context,
its timing, and its source. Statements made to the press are quite different from Analysts tend to view intelligence analysis as an an or a craft, but not as
a formal discipline with a tested and validated methodology16 And in fact, in-
statements made through diplomatic channelsthe latter usually carry more
weight. As an example of context, a statement that the Egyptian ambassador telligence professionals refer to the techniques of analysis as tradecraft. The ar-
makes to a U.S. military attache at an embassy function could easily be a sig- gument has been made that intelligence analysis should become a profes-
nal; the ambassador knows that he is speaking to an intelligence officer. sionwhich means a repeatable process that is standardized, with established
Signaling between members of the same culture can be quite subtle, with best practices. Writers often make the analogy that intelligence analysis is like
high success rates of having the signal understood. Two U.S. corporate execu- the medical profession." Analysts and doctors weigh evidence and reach con-
tives can signal to each oiher with confidence; they both understand the rules. clusions in much the same fashion. In fact intelligence analysis, like medicine,
A U.S. executive and an Indonesian executive would face far greater risks of is a combination of art, tradecraft, and science.20 Different doctors can draw
misunderstanding each other's signals. The cultural differences in signaling can different conclusions from the same evidence. Different analysts do likewise
be substantial. Cultures differ in their reliance on verbal versus nonverbal sig- And intelligence analysts have a different type of problem than doctors.
nals to communicate their messages. The more people rely on nonverbal sig- Scientific researchers and medical professionals do not usually deal with de-
nals and context, the greater the complexity For instance, the Japanese and nial and deception. They typically do not have an opponent who is trying to
Chinese rely heavily on nonverbal signals, and the context of the signal is deny them knowledge In medicine, once doctors have a process for treating a
highly significant. As Figure 9-1 indicates, the Swiss are at the opposite ex- pathology, it will always work. The human body won't develop countermea-
treme; their messages are verbal, explicit, and independent of context. sures to the treatment.21 But in intelligence, the opponent may be able to iden-
Signaling is an art, and interpreting signals is an art. Failure to understand tify the analysis process and counter it. If analysis becomes standardized, then
the signals can have severe consequences. an opponent can predict how you will analyze the available intelligence, and
then denial and deception, become much easier to pull off. Intelligence collec-
During the Korean War, as U.S. and U.N forces advanced North of the 38th tion and analysis, by their nature, have to evolve. One cannot establish a
parallel, China decided that a North Korean defeat was unacceptable China^ process and blithely retain it indefinitely.
Denial, Deception, and Signaling 171
170 Chapter Nine
The opposite of D&rD, yet closely related to it, is the practice of signaling:
Intelligence analysis is in fact analogous to poker, especially Seven Card deliberately sending a message to the opposing intelligence service. Like D&D,
Stud or Texas Hold 'Em. You have an opponent. Some of the opponent's re- its success depends on a good understanding of the opponent to whom a sig-
sources are in plain sight; some are hidden. You have to observe the opponent's nal is sent. Signals can be verbal or can be actions or displays. Analysts have
actions (bets, timing, facial expressions, which incorporates art and tradecraft) to be alert to the presence of signals and adept at interpreting their meaning.
and do pattern analysis (using statistics and other tools of science). Revisiting When signals must be sent between different cultures, they often are missed
Sun Tzu's quote that begins this chapter, poker, like warfare, is based on de-
ception. And intelligence, like poker, is about warfare. There are lots of poker or misinterpreted.
Intelligence analysis is a combination of art, tradecraft, and science. In large
"methodologies," just as there are lots of intelligence methodologies. No single part the reason is that analysts must constantly deal with denial and deception,
one works universally, and all can be defeated once they are understood. and dealing with D&rD is primarily a matter of artfully applying tradecraft.
Some underlying principles are common to poker and intelligence analy-
sis. In poker, you create a model of the opponent, based on observations of his
Notes
es
past behavior; and you create a model of the current hand, based on the model i
Brian Wood and Johan Peleman, The Arms Fixers (Oslo, Norway: International Peace Research
of your opponent, evidence of his behavior during the current hand, and a sta- Institute [PR1O]. 1999). www.nisat OTg/publications/armsfixers, chap 5.
tistical analysis of what can be observed (e.g., the exposed cards). You analyze 2. International legal protocol surrounding the shipment of lethal weapons requires that the
shipper have a certificate of "end use,'' in which the buyer declares that the weapons are for
those models and make judgments. In intelligence analysis, you do the same.
its use only and will not be transshipped.
Summary 3. Wood and Peleman, The Arms Fixers, chap. 3.
4. Ewen Montagu, The Man Who Never Was (Annapolis, Md i Naval Institute Press, 1953).
In evaluating raw intelligence, analysts must constantly be aware of the 5. James H. Hansen, "Soviet Deception m the Cuban Missile Crisis," CIA- Studies in Intelligence
potential that they are seeing material that was deliberately provided by the 46, no 1, wwwcia.gov/csi/studies/vol46nol/article06.htrnl.
opposing side. Most targets of intelligence efforts practice some form of denial. 6. Ibid.
7. Thomas C. Reed, At the Abyss: An insider's History of the Cold War (Novato, Calif.: Presidio
Deceptionproviding false informationis less common because it takes
Press, 2004)
more effort, and it can backfire. 8. Gijs W Weiss, "The Farewell Dossier,' CIA: Studies in Intelligence 39 (1996), no. 5, www.cia.
Defense against D&D starts with your own denial of your intelligence ca- gov/cst/studies/9 6unclass.
9. A demarche is a political or diplomatic step, such as a protest or diplomatic representation
pabilities to opposing intelligence services. Some collection sources and meth-
ods have to be heavily protected or they will become vulnerable to D&rD. made to a [oreign government.
10. Tim Weiner and James Risen, "Policy Makers, Diplomats. Intelligence Officers All Missed
Names of HUMINT sources, the nature of COMINT or specialized technical India's Intentions," New fork Times, May 25, 1998
collection, and the decryption of encrypted messages all fail into this category'. 11. Ibid
In contrast, the information that a source provides is accorded less protection 12 "Strategic Deception at Pokharan Reported." Delhi Indian Express in English., May 15, 1998, 1.
than details about the source itself because the information provided needs to 13. Weiner and Risen, "Policy Makers, Diplomats, Intelligence Officers "
go to many intelligence customers. IMINT and open sources usually receive less 14. Ibid.
15. Angelo Codevilla, informing Statecraft (New York: Free Press, 1992), 159-165.
source protection than HUMINT, COMINT, or specialized technical collection. 16. EK. Rose, "Two Strategic Intelligence Mistakes in Korea, 1950," Studies in Intelligence, Fall/
Where one intelligence service has extensive knowledge of another ser- Winter 2001, wwwcis.gov/csi/studies|ifall_wmter_2001/aTtick06.html.
vice's sources and methods, more ambitious and elaborate D&rD efforts are pos- 17. Jude Wanniski, "Where Did Saddam Hussein Come From?" Wall Street Journal, February 19,
sible. Often called perception management, these involve developing a coordi- 1998.
18. Rob Johnson, Analytic Culture in the U.S. Intelligence Community (Washington, D.C.: Center for
nated, multi-INT campaign to get the opposing service to make a wrong initial the Study of Intelligence, Central Intelligence Agency, 2005), 20.
estimate. Having done so, the opposing service faces an unlearning process, 19. Steven Marin, "Intelligence Analysis: Turning a Craft into a Profession," http.//analy^is.mitre
which can be very difficult. A high level of knowledge also permits covert ac- org/proceedings/ Final_Parjers_Files/97_Camera_Ready_Paper pdf.
tions to disrupt and discredit the opposing service. 20. Johnson, Analytic Culture, 43
21. This analog)1 has its limits, of course: microbes do develop resistance to antibiotics over lime.
A collaborative, target-centric process helps to stymie denial and decep-
tion by bringing in different perspectives from the customer, the collector, and
the analyst. Collectors can be more effective in a D&D environment with the
help of analysts. Working as a team, they can make more use of deceptive, un-
predictable, and provocative collection methods that have proved effective in
defeating D&D.
Prediction 173
10 yond that.
Also, intelligence predictions can affect the future that they predict. Often
the predictions are acted on by policymakerssometimes on both sides. CIA
reports released to the press by Congress and by President Carter warned that
Prediction Soviet oil production was likely to plateau by the early 1980s and then decline,
to the point where the USSR would become a net importer of oil. Production
did in fact fall, but the Sovietsperhaps warned by the published CIA esti-
Your problem is that you are not able to see things before mateshifted investment to their energy sector and changed their extraction
they happen. and exploration policies to avert the worst.' As another example, the publica-
Wotan to Fricka, in Richard Wagner's opera Die Walhure tion of the Yugoslavia National Intelligence Estimate (see the appendix) has-
tened the breakup of Yugoslavia that it predicted.
The first step in making any prediction is to consider the phenomena that
D escribing a past event is not intelligence analysis; it is history The high-
est form of intelligence analysis requires structured thinking that results
in a prediction of what is likely to happen. True intelligence analysis is always
are involved to determine whether prediction is even possible.
Convergent and Divergent Phenomena
predictive.
In chapter 7 we discussed convergent and divergent evidence. Items of ev-
However, policymaking customers tend to be skeptical of predictive anal-
idence were convergent if they tended to reinforce the same conclusion and di-
ysis unless they do it themselves. They believe that their own opinions about
vergent if they pointed to different conclusions. In considering trends and
the future are at least as good as those of intelligence analysts. So when an an-
events for predictive purposes, we use the same terminology: Convergent phe-
alyst offers a prediction without a compelling supporting argument, he or she
nomena make prediction possible; divergent phenomena frustrate prediction.
should not be surprised to have the policymaker ignore it.
A basic question to ask at the outset of any prediction attempt is. Does the
On the other hand, policymakers and executives will accept and make use
pnnciple of causation apply? That is, are the phenomena we are to examine and
of predictive intelligence if it is well reasoned and if they can follow the ana-
make predictions about governed by the laws of cause and effect? One of the
lysts logic. Former national security adviser Brent Scowcroft observed, "What
basic principles of classical physics was that of causation. The behavior of any
intelligence estimates do for the policymaker is to remind him what forces are
system could be predicted from the average behavior of its component parts.
at work, what the trends are, and what are some of the possibilities that he has
Scientist Irving Langmuir defined such behavior as convergent phenomena.
to consider."1 A predictive intelligence assessment that does those things will
The events leading up to World War I, which Barbara Tuchman superbly
be readily accepted. This chapter and the two following it discuss how to pre-
pare such assessments, outlines in The Guns of August, had an inevitable quality about them, as befits
convergent phenomena. World War I was predictableit had been predicted,
Introduction to Prediction in fact, by many astute observers at the time. No one person or event actually
"started" World War I; the assassination of Archduke Francis Ferdinand and
Intelligence can handle predictions of routine developments. Extrapola-
his wife, Sophie, in Sarajevo merely triggered a process for which groundwork
tionthe act of making predictions based solely on past observationsserves
had been laid over many years. Likewise, a war between the United States and
us reasonably well in the short term for events that involve established trends
and organizational actions. Japan was predictable (and both sides had predicted it) throughout most of
1941. The Japanese aggression in China and Indochina, the consequent U.S.
Long-term prediction is considerably more challenging because it is con-
imposition of a petroleum embargo on Japan, the freezing of funds by both
strained by the second law of thermodynamics, as introduced in chapter 7: En-
sides, the steady deterioration in American-Japanese relations during fall
tropy (chaos, randomness) always increases with time. And when you reach a
1941all events converged toward war.3 Also, a pattern of continued al
turning point, a major shift of some kind, then prediction becomes highly un-
Qaeda terrorist attacks on U.S. interests worldwide was predictable and had
certain. We do not readily grasp fundamental changes, and we are skeptical of
been predicted before September 11, 2001, when terrorists flew airplanes into
172
174 Chapter Ten
Prediction 175
the Pentagon and the World Trade Center. In the 1940s and 1950s Ambas-
sador George Kennan identified perhaps the most significant convergent phe- Trade Center attack. But tactical warning is not the same as prediction. All
nomenon of the last century when he defined his "containment" polity for the such specific events can be described by probabilities, but they cannot be pre-
United States to pursue against the USSR. He argued that if contained, the So- dicted in the same fashion as the larger events they were immersed inWorld
viet Union would evenmally collapse because of its overdeveloped military War I, the collapse of Nazi Germany, and increasing conflict between the
and underdeveloped economic system. United States and al Qaeda.
In contrast, many phenomena are not governed by the laws of cause and One of the watershed moments in personal computing was clearly a di-
effect. Quantum physics deals with the individual atom or basic particles and vergent phenomenon. In 1980 IBM was searching for software to run on its
has found that their behavior is as unpredictable as the toss of a coin; they can planned personal computer (PC) and had zeroed in on a small start-up com-
be dealt with only by the laws of probability* Such behavior can, from a small pany named Microsoft Corporation, located in Bellevue, Washington. Microsoft
beginning, produce increasingly large effectsa nuclear chain reaction, for ex- could provide the languages that programmers would use to write software for
ample. Langmuir described those phenomena as divergent In the terms of chaos the PC, but IBM wanted more; it needed an operating system. Microsoft did not
theory, such phenomena are the result of what are called Strange attracWrs- have an operating system and was not positioned to write one, so Bill Gates,
those creators of unpredictable patterns that emerge out of the behavior of pur- Microsoft's president, steered IBM to Digital Research Intergakctic (DRI).
poseful actors.5 When dealing with divergent phenomena, we have almost in- An intelligence analyst assessing the likely future of personal computing
surmountable difficulty making predictions. in 1980 would have placed his bets on DRI. DRI built the CP/M operating sys-
To contrast the predictability of the two types of phenomena, consider tem, at that time the most popular operating system for computers using the
three CIA predictions: CIA analysts warned policymakers of Russia's looming Intel processor. It had the basic features IBM needed. Gates arranged an ap-
economic crisis two months before the August 1998 ruble crash; they also sub- pointment between the IBM team and Gary Kildall, DRI's president, in Pacific
sequently identified the economic rebound in the Russian economy long before Grove, California.
business and academic experts did.6 Both events involved convergent phenom- Instead of meeting with the IBM team, however, Kildall chose to take a
ena and were predictable. In contrast, the CIA was unable to predict the rise of flight in his new airplane. Miffed, the IBM team told Gates to find or write an
Vladimir Putin to the Russian presidency until his handling of the Chechen war operating system himself. Gates found one from a small software company in
dramatically increased his popularity But in early 1999, Putin himself probably the Seattle area and called it the Disk Operating System (DOS), which later be-
did not foresee that happening.7 It was a divergent phenomenon. came the most widely used personal computer operating system and a major
A good example of a divergent phenomenon in intelligence is the coup contributor to Microsoft's dominance of the personal computer business. A
d'etat. Policymakers often complain that their intelligence organizations have single event, a decision by one man not to keep an appointment, shaped the
failed to predict coups. But a coup event is conspiratorial in nature, limited to future of personal computing worldwide.8
a handful of people, and dependent on preservation of secrecy for its success. In summary, the principles of causation apply well to convergent phe-
If a foreign intelligence service knows of the event, then secrecy has been com- nomena, and prediction is possible. Divergent phenomena, such as the actions
promised and the coup is almost certain to failthe countrys internal security of an individual person, are not truly predictable and must be handled by dif-
services will probably forestall it. The conditions that encourage a coup at- ferent techniques, such as those of probability theory. Where prediction is pos-
tempt can be assessed, and its likelihood estimated using probability theory, sible, analysts typically use force'synthesis/analysis, which we will discuss in
but the timing and likelihood of success are not "predictable."1 this chapter.
The failed attempt to assassinate Hitler in 1944, for example, had more of
the "what if?" hypothetical quality that characterizes a divergent phenomenon. The Predictive Approach
Assassinations, such as that of Israeli prime minister Yitzhak Rabin in 1995, The target-centric analytic approach to prediction follows a pattern long es-
are simply not predictable. Specific terrorist acts, such as those on September tablished in the sciences, in organizational planning, and in systems synthesis/
11, 2001, similarly are not predictable in detail, though some kind of terrorist analysis. In intelligence analysis, we are concerned with describing the past
attempt was both predictable and predicted. In all such divergent cases, from and current state of the target to make a prediction about its future state.
the Sarajevo assassination to the World Trade Center bombing, some tactical Prediction is as old as engineering. No large projectstemples, aqueducts,
warning might have been possible. An agent within the Serbian terrorist orga- pyramidswere undertaken without some type of predictive process. Many
nization, the Black Hand, could have warned of the Sarajevo assassination prediction techniques have evolved over the past five centunes as mathemat-
plan. An agent within al Qaeda might have warned of the planned World ics and science have evolved.9 They frequently reappear with new names, even
though their underlying principles are centuries old.
176 Chapter Ten Prediction 177
The predictive synthesis/analysis process discussed in this chapter and the Figure 10-1 The Prediction Methodology
next is derived from a predictive approach that has been formalized in sev-
eral professional disciplines. In management theory, the approach has several Unchanged Force 2
names, one of which is the Kempner Tregoe Rational Management Process.10 /
Scenario 1:
In engineering, the forrnalization is called the Kalman Filter. In the social sci- Past Present
Extrapolated
target target
ences, ii is called the Box-Jenkins method. Though there are differences among future target
model model Unchanged
them, all are techniques for combining complex data and incorporating new model
Force 1
data to estimate the present state, or predict the future state, of an entity.
The approach is a method of combining data to estimate an entity's pres- Uncharweo Force 2
ent stale and evaluating the forces acting on the entity to predict its future
Scenano 2:
state. The conceptto identify the forces acting on an entity, to identify likely Projected
future forces, and to predict the likely changes in old and new forces over time, Changing
future target model
Force 1
along with some indicator of confidence in the judgmentsis the key to suc-
cessful prediction. It takes into account redundant and conflicting data, as well Estimation
as the analyst's degree of confidence in those data. It can be made quantitative Unchanged Force 2
if time permits and if confidence in the data can be quantified. But the con-
cept can be applied qualitatively by subjectively assessing the forces acting on Scenano 3:
the entity. Figure f 0-1 shows an overview of this predictive methodology. The Forecast
future target
key is to start from the present target model (preferably along with a past tar-
model
get model) and move to one of the future models based on an analysis of [he Changing
Force!
forces involved. Other texts on predictive analysis describe these forces as is-
sues, trends, factors, or drivers.11 All of the terms have the same meaning: Note: Arrows vary in thickness Lo indicate the strength of their respective forces. Thicker arrows
They are the entities that shape the future.11 In most cases, the future target represent stronger forces; thinner arrows, weaker ones.
models will be in the form of scenarios, as Figure 10-1 indicates.
The methodology' uses three predictive mechanisms that will be discussed
in detail in chapter 11; extrapolation, projection, and forecasting. All three existing forces (Force 1) is shown as causing a projected future
predictive mechanisms follow the approach of assessing forces that act on an state that is different from the extrapolation (Scenario 2).
entity An extrapolation assumes that those forces do not change between the In making a forecast, start from the projection, and then identify
present and future states; a projection assumes that they do change; and a fore- the new forces that may act on the entity and incorporate their ef-
cast assumes that they change and that new forces are added The methodol- fect. In the figure, one new force is shown as coming to bear, re-
ogy follows these steps: sulting in a forecast future state that differs from the projected future
state (Scenario 3).
First, estimate at least one past state and the present state of the Determine the likely future "state of the entity based on an assess-
entity In intelligence, this entity is the target model, and it can be
ment of the forces. Strong and certain forces are weighted most
a model of almost anythinga terrorist organization, a country, a heavily in this prediction. Weak forces and those in which the an-
clandestine trade network, an industry, a technology, or a ballistic alyst lacks confidence (high uncertainty about the nature or effect
missile.
of the force) are weighted least.
Determine the forces that acted on the entity to bring it to its pres-
ent state. In the figure, these forces (Forces 1 and 2) are shown Figure 10-2 shows how the process of Figure 10-1 works in practice: It is
graphically, with the thickness of the arrow indicating strength. iterative. In this figure we are concerned with some target (technology, system,
These same forces, acting unchanged, would result in the future person, organization, industry, country, situation, or some combination) that
state shown as an extrapolation (Scenario 1). changes over time. We want to describe or characterize the entity at some future
In making a projection, estimate the changes that are likely to point. We might want to establish the future performance of an aircraft or mis-
occur in the existing forces. In the figure, a decrease in one of the sile, the future state of a country^ economy, the future morale and effectiveness
178 Chapter Ten Prediction 179
Figure 10-2 Applying an Iterative A CIA assessment of Mikhail Gorbachev's economic reforms in 1985 to
Approach to the Prediction Methodology 1987 correctly predicted that his proposed reforms risked "confusion, eco-
nomic disruption, and worker discontent" that could embolden potential ri-
vals to his power. ^ That projection was based on assessing the changing forces
in Soviet society along with the historical forces that would resist change.
New and
changing Introduction to Force Synthesis/Analysis
forces
Force synthesis/analysis has many namesforce field analysis and system
dynamics are two.16 It is a technique for prediction that involves finding out
what the existing forces are, how they are changing, in what direction, and
Changing how rapidly (see Analysis Principle 10-1). Then, for forecasting, the analyst
forces must identify new forces that are likely to come into play. Most of the follow-
Extrapolated ing chapters focus on identifying and measuring those forces. One of the most
future state important comes from the feedback mechanism, which is discussed in chap-
Historical model
ter 12. An analyst can (wrongly) shape the outcome by concentrating on some
forces
continued
forces and ignoring or downplaying the significance of others.
Four factors, or instruments of national power, are usually cited as the
"levers" that a policymaker can pull in international relations. Three are well
Historical
established: political (or diplomatic), economic, and military instruments. The
forces fourth was once called psychosodal but more commonly is called a social in-
strument. Some authors divide social into psychological and informational.17
Others, reflecting the current stress on information, call the four instruments
diplomatic, economic, military, and information. In the business world, they
are almost the same: political, economic, environmental, and social. The argu-
of a terrorist organization, or the future economic health of an industry. The ment can be made that technology is a fifth major instrument of national
models are created in an iterative process, each one building on the results of the power, or of business power, on the same level as the other four. Technology
previous ones. They become more difficult to create as one moves upward in the certainly is a factor (and often the critical factor) in intelligence assessments.
figure.
Note that these factors of national power or industrial power can be exter-
Designing good predictive scenarios requires an iterative process such as nal, internal, or feedback forces. For instance, regulatory forces, discussed in
Figure 10-2 indicates. Iteration is the key to dealing with complex patterns chapter 12, are a political feedback forcethat is, they result from monitoring
and complex models.B The basic analytic paradigm, is to create a model of the
past and present state of the target, followed by predictive models of its possi-
ble future states, usually created in scenario form. Following are two examples
of its use in practice. Analysis Principle 10-1
CIA's Office of Soviet Analysis predicted in late 1987 that Moscow could
force Analysis According to Sun Tzu
not effectively counter the U-S. Strategic Defense Initiative (SDl) without se-
verely straining the Soviet economy, discounting Moscow's assertions that it Factor or force synthesis/analysis is an ancient predictive technique. Successful
could do so quickly and cheaply. The prediction was made by a straightfor- generals have practiced it in warfare for thousands of years, and one of its earliest
ward extrapolation of the state of the Soviet economy without its attempting known proponents was a Chinese general named Sun Tzu. He described the art of
war as being controlled by five factors, all of which must be taken into account in pre-
to counter SDl, followed by a projection in which a new forcethe burden on
dicting the outcome of an engagement. The five tactors he called Moral Law, Heaven,
the economy of countenng SDl-was added. The analysts correctly predicted Earth, the Commander, and Method and Discipline. In modem terms, the five would
the alternative outcome; that Moscow instead would push arms control mea- be called social, environment, geospaoal, leadership, and organizational factors.
sures to gain U.S. concessions on SDI.H
Prediction 181
the state of an economy or an industry, for example, and taking regulatory ac- Figure 10-3 Predictive Model of Possible Future States of al Qaeda
tions to change that state. Contamination, also in chapter 12, is an internal
force that can be social, environmental, or both.
Forecast state
Qualitative Force Synthesis/Analysis (bioterrorist al
Qaeda)
Qualitative force synthesis/analysis is the simplest approach to both pro- Past state 2
(1990 to Sept
jection and forecasting and the easiest to do. It usually is done by an analyst
11,2001)
who is an expert in the subject area and who answers the following questions;
From the present state the analyst devises three future states: extrapolated,
Why Use Scenarios?
projected, and forecast. In the extrapolated state, al Qaeda continues to decline
under the combination of unchanging military, economic, and political pres- The purpose of scenario planning is to highlight large forces that shape
sures. Remaining cells are hunted down, but followers continue to be recruited the future. Scenario planning makes those forces visible, so that if they do hap-
(social force continues unchanged). Funding to the group decreases as gov- pen, the intelligence officer will at least recognize them.19 Scenario planning
ernments continue to close down the sources of funding, and the organiza- helps the intelligence officer and the customer anticipate the future and better
tion eventually cannot train or equip its cells to carry out significant terrorist respond to events.
activity Scenarios have great power to communicate the sense or feel of situations
In the projected state, changes occur in the political and economic forces that do not and may never exist, a power that is at once an asset and a danger.
that allow al Qaeda to arrest its decline. Most governments turn to other con- They give users a feel for what might happen if they pursue a certain course of
cerns or perceive that they have done enough to deal with the terrorism threat, action in a complex situation that cannot be quantified. An example would be
and funding and recruitment resume. Al Qaeda continues to lose cells through a scenario that describes the likely pattern of daily life in the future under
U.S. and British efforts, but new cells are created as new followers, attracted to specified assumptions about nuclear power plant regulation. Depending on
the cause by admiration of the group's willingness to fight the United States (a the views of the scenario planner, the scenario could be used to support or
pro-growth social force) join.
oppose increased regulation. A supporter of regulation would likely develop
The forecast state is much the same as the projected state, except that new scenarios that included a series of Three Mile Island or Chernobyl disasters ab-
technology forces are added to the target model, and the result affects the other sent regulation. An opponent of regulation would be more likely to devise sce-
forces. Specifically, new methods of terrorism are developed and employed, as
narios that showed a world of high electric power costs, atmospheric pollution
al Qaeda uses its new funding to develop a genetic engineering capability With
from smokestack power plants, and declining economies resulting from the in-
that capability it creates a series of virulent and deadly bioorganisms and uses
creasing energy costs of regulation. An intelligence analyst must have the ob-
them in attacks on the United States and allied countries. Political and military-
jectivity to avoid such slanted scenarios.
forces against al Qaeda weaken, as public sentiment in the United States and
elsewhere changes from a desire to battle al Qaeda to a wish for an accommo- Scenarios are used in strategic planning in business, for instance, to ex-
dation that would end the bioterrorist attacks. The resulting negotiations with amine merger candidates or consider a new product line. These are often
al Qaeda strengthen its position as the defender of Islam against the infidels global scenarios. Scenarios are used also in tactical or operational planning
worldwide. for example, for interdicting illicit traffic such as narcotics. In narcotics inter-
Note that the three outcomesextrapolated, projected, and forecast diction, the scenario would include a geospatial target model of narcotics
represent alternative scenarios, and the fact that the forecast state incorporates growing and processing areas and drug transshipment routes, possibly with
both new and changing forces does not make it the most likely outcome. None timeline models showing when transshipments take place. The scenario would
of the three scenarios could happen, or all three could happen in turn. Because also include relationship models (link or network diagrams) showing the pat-
most intelligence predictions, like [his example, are in scenario form, the next tern of funds laundering. For operational planning, the scenario would then
section discusses how to develop scenarios. be modified to show the effect of specific narcotics interdiction actionsfor
example, deployment of radar surveillance aircraft into the Caribbean or a pro-
Scenarios gram to pay farmers not to grow the crop. Because of the analyst's knowledge
Intelligence scenarios are descriptions in story form of a future target of the target, he or she is a key participant in incorporating such effects into
model. Scenarios are used primarily for planning and decision making. Sce- the scenario.
nario planning is normally used to explore possible future conditions given a Once scenarios are created, the job of the intelligence analyst is to track
set of assumptions. Each scenario represents a distinct, plausible picture of a indicators that point toward a specific one of them (for example, favorable
segment of the future.
consumer reaction to the new product line or the increased flow of narcotics
Because it is impossible to know the future precisely, the solution is to cre- through a specific location). How the analyst does this is discussed later.
ate several scenarios. These are essentially specially constructed stories about In an alternative future as depicted by a scenario, a decision maker can
the future, each one modeling a distinct, plausible outcome. The scenarios es- identify relationships among forces, the probable impacts of those forces on
tablish the boundaries of our uncertainty and the limits to plausible futures. an organization or situation, the key decision points for taking action, and
Prediction 185
A second common technique for building scenarios is contextual mapping. Find the Best (Most Likely) Solutions). Having built a set of potential fu-
This technique is used to identify plausible sequences of development in a ture scenarios, examine them in light of the original question. Does the idea of
given field and to relate those sequences to potential developments in a differ- paying farmers not to grow coca crops have favorable outcomes in all of the
ent field. The method is at least as useful for forcing a fresh perspective as it is counter-narcotics scenarios? Perhaps a common outcome in the scenarios is
for predicting actual developments. Its use requires experienced, experts fa- that new groups of farmers start growing coca crops to qualify for the pay-
miliar both with the method and with the topic of" inquiry. ments, or a bidding war starts between the drug cartels and the government.
Contextual mapping has been used largely in technological forecasting ap- The customers of intelligence, the operations people who are informed by the
plications. As an example, one might specify expected future developments in scenarios, need to understand these possible outcomes and prepare their op-
miniaturized chips, combined with a projection of future sensor and wide tions accordingly.
radio frequency bandwidth transmitter technologies, to define a unique small, The final scenarios need to describe relationships among objects or enti-
cheap video surveillance device of the future. Such future developments are ties (tanks, missiles, airplanes, and units in a military scenario; companies,
ihen treated as external forces that alter the likely future state of a systemfor governments, technologies, and weapons systems in a nonproliferation sce-
example, a crime deterrence system. The output is usually a graphic display, nario; governments, farmers, drug cartels, banks, and drug users in a counter-
often with timelines, showing the interconnecting paths that lead to the pro- narcotics scenario). In a dynamic scenario, the objects must then change in
jected development. space and time according to known rules (patterns of business competition;
The third common technique, cross-impact analysis, supports system-change military doctrine in military scenarios; past patterns of clandestine trade and
scenarios. It usually shows interactions among events or developments, spec- of systems development in a nonprolife ration scenario). A military scenario,
ifying how one event will influence the likelihood, timing, and mode of im- which can be well defined by existing scenario definition tools, is quite differ-
pact of another event in a different but associated field. As a simple example, ent from a nonproliferation or counter-narcotics scenario. It is not the same in
the development of the Global Positioning System (GPS) enabled the devel- format, content, event descriptions, or the types of objects being manipulated.
opment of relatively cheap and highly precise munitions (bombs and missiles). However, the basics remain the same; relationship analysis, for example, is
These developments in turn required increased emphasis on providing very pretty much the same in all scenarios.
precise, real-time geospatial intelligence to the military, driving a demand for
Indicators and the Role of Intelligence
continuous battlefield reconnaissance from, for example, unmanned aeronau-
tical vehicles. And the combination of all these developments forced opposing The final step in Peter Schwartz's process comes after the scenarios are
military organizations into creating highly mobile force units that constantly completed. The job of the intelligence officer becomes one of monitoring. The
move during combat to avoid being hit. It also increased the value of denial analyst has to look for the leading indicators that would tell which of the sce-
and deception. nariosor which combination of scenariosis actually taking place. As Bab-
The essential idea behind a cross-impact model is to examine all of the son College professor Liam Fahey has pointed out, indicators will also give im-
pairwise connections within a set of forecast developments. Specifically, the portant insights into what scenarios are not taking place.32
analyst might ask how the prior occurrence of one event would affect other The monitoring job may involve watching trends. An intelligence analyst
might monitor demographic and economic trends, tbe spread of infectious
events or trends in the set. When those relationships have been specified, the
diseases, changes in pollution levels, or proliferation of terrorist cells. A polit-
analyst creates a scenario by letting events "happen"either randomly, in ac-
ical or economic analyst might look at the questions that opponents ask and
cordance with their estimated probability, or in some prearranged wayand
the positions they take in trade negotiations. A military intelligence analyst
assessing how each development affects others in the sequence. Repeating the
might monitor troop movements and radio traffic for signals as to which sce-
process with different event sequences creates contrasting scenarios.
nario is developing.
Cross-impact analysis has been used extensively to model the interaction
These indicators suggest movement toward a particular scenario.Y> They
of future events and trends. In the 1970s the Futures Group developed an ap-
provide a means to decide which options should be the focus of a customer's
proach called trend impact analysis that became well established and is still in decisions. Specifically, they help identify which outcomes should be prepared
use.-51 Network analysis methodologies, described in chapter 1.3, naturally for, possibly by use of some of the instruments of national power, and which
support cross-impact analysis.
potential outcomes can be disregarded.
Prediction 193
Scenarios, like target models, serve different purposes for different partic-
ipants The purpose of scenarios for executives and intelligence customers is is, looking at how events or developments in one area will affect events or de-
to inform decision making. For inteliigen.ee analysts, they serve the additional velopments in a different area.
purpose of helping to identify needs, that is, to support intelligence collection. Once scenarios are completed, intelligence has to monitor incoming in-
Intelligence can have one of two roles in scenarios. If an organization has telligence. The intelligence provides indicators that help determine which sce-
a planning group thai develops scenarios, the intelligence officer should par- nario appears to be developing.
ticipate in [he scenario development. Then the role of intelligence is to draw
the indicators from the forces and to tell the planner or decision maker how Notes
1. WoodrowJ. Kuhns, "Intelligence Failure? Forecasting and the Lessons ot Epistemology," in
the scenanos are playing out based on those indicators. We want to know Paradoxes of Strategic. Intelligence: Essays in Honor of Michael Handel, edited by Richard K Beets
which forces and indicators need to be monitored to give an early signal of ap- and Thomas G. Mahnken (London: Frank Ca5s Publishers, 2003), 96.
proaching change and point to more likely outcomes. The planning culture in 2. CIA Center for the Study of Intelligence, "Watching the Bear: Essays iin CIA's Analysis of
man}' organizations is still heavily biased toward single-point forecasting In the Soviet Union." conference, Princeton University, March 2001, www.cia.gov/cis/books/
such cases, the intelligence customer is likely to say. Tell me what the future watchingthebear/articleOS html; p. 6,
3. Roberta Wholstetter, Pearl Harbor: Warning and Decision (Stanford. Stanford University Press,
will be; [hen I can make my decision. The customer is likely to complain that 1962).
several "forecasts" are more confusing, and less helpful, than a single one. If no 4. Irving Langmuir, "Science, Common Sense, and Decency," Snenie 97 (January 1943): 1-7.
scenario-planning group exists, then the intelligence officer must develop the 5. Jamshld Gharajedaghi, Syslems Thinking: Managing Chans and Complexity (Boston: Butterworlh-
scenarios herself to address the questions posed by the decision maker. In this Heinemann, 1999), 52
case, intelligence synthesis/analysis generally will focus on more narrowly 6. CIA Cemer, "Watching the Bear," 11.
7. Ibid.
drawn scenarios than planners use, and they are likely to be more tactical than 8. Paul Carroll, Big Blues (New York: Crown, 1993), 18
strategic. For example, an intelligence-gene rated battlefield scenario would 9. George Likourezos, "Prologue to Image Enhanced Estimation Melhods," Proceedings of ike In-
probably involve looking only at enemy forces and what their actions will be, stitute oj Electrical and Bectromca Engineers 18 (June 1993): 796.
while ignoring the actions tha[ friendly forces might be taking, 10. Thomas Kempner and B.E. Tregoe, The New Rational Manage! (Princeton: Princeton Research
Press, 1981).
Summary 11. M.S. Loescher, C Schroeder, and C W Thomas, Pfoleus: Slights from 2020 (ULrecht, Nether-
lands: Copernicus Institute Press, 2000), A-iv.
Intelligence analysis, to be useful, must be predictive. Some events or fu- 12 Andrew Sleigh, ed., Project Insigh! (Famborough, U.K. Centre for Defence Analysis, Delence
ture states of a target are predictable because they are driven by convergent Evaluation and Research Agency, 1996), 17.
phenomena. Some are not predictable because they are driven by divergent 13 Gharajedaghi, Systems Thinking, 51.
phenomena. 14. CIA Center, "Watching the Bear," 4.
15. Ibid., 5.
Analysis involves predicting the future state of a target using one of three
16. Gharajedaghi, Systems Thinking, 122.
meansextrapolation (unchanging forces), projection (changing forces), and 17. David Jablonsky, "National Power," Parameters, Spring 1997, 34-54.
forecasting (changing and new forces). The task is to assess, from the present 18. The time frame for most predictions extends over years. On a last-developing situation, the
state of the intelligence target, the transition process thai takes the target to its appropriate time frame for force analysis may be months or even days, rather than years.
future state and the forces that shape that transition. Chapter 11 discusses in 19. T.E Mandel, "Futures Scenarios and Their Use m Corporate Strategy/' in The Strategic Man-
more detail how extrapolation, projection, and forecasting are done in the in- agemenl Handbook, ed. K.J. Albert (New York: McGraw-Hill, 1983), 10-21.
telligence business. 20. WI. Boucher, "Scenario and Scenario Writing," in NrmeclrajJolalive Meihods in Business fore-
casting, ed.J.S Mendell (Westpori, Conn.: Quorum Books, 1985), 47-60
Most predictive analysis results in some form of scenarioa descnption 21. Herman Kahn and Anthony Wiener, Die Year 2000 (New York: Macrnillan, 1967).
of the future state of the target. Typically, several alternative scenarios are cre- 22.Loescher, Schroeder, and Thomas, Proteus.
ated based on different assumptions about the forces involved. Two scenarios 23.Inertia and countervailing forces are discussed in detail in chapter 12.
most used in intelligence are the driving-force scenario, a type of projection, 24.Peter Schwartz, The Art of the Long View (New York: Currency Doubleday, 1996).
25.Lawrence Wilkinson, "How to Build Scenanos," www.wired.com/wired/scenarios/ build.hi.ml.
and the system-change, a forecast. Chapters 12 to 14 describe some of the February 12, 2002
forces to consider in creating a driving-force scenario. System-change scenar- 26 Ibid.
ios are very demanding to construct; they require cross-impact analysis, (hat 27 LiamFahey, Cnmpftilcrs (New York1 John Wiley and Sons, 1999), 452.
28 Ibid., 453.
194 Chapter Ten
Predictive Techniques
It's hard to mahe predictions, especially about the future.
Attributed to Yogi Berra and Neils Bohr, among others
T he value of a prediction lies in the assessment of the forces that will shape
future events and the state of the target model. If the analyst accurately as-
sesses those forces, he or she has served the intelligence customer well, even
if the prediction that the analyst derived from that assessment is wrong. A
competent customer will probably make his own predictions anyway, but the
force assessments help him to make a more reasoned prediction and to refine
it as new events unfold. In the best cases, the analyst's prediction will not come
true because the customer will act on the intelligence to change the predicted
outcome to a more favorable one.
In this chapter we develop the three approaches introduced in chapter 10
for predicting the future state of a targetextrapolation, projection, and fore-
casting. Different authors use different terms for these. Babson College profes-
sor liam Fahey uses the terms simple projection to refer to extrapolation and
complex projection to refer to both projection and forecasting,11 treat projection
and forecasting separately, to emphasize the differences in the forces involved.
An extrapolation predicts future events by assuming that the current forces in-
fluencing the target go unchanged. A projection assumes that those forces will
change, and a forecast assumes the same, with the addition of new forces along
the way
Two types of bias exist in predictive analysis: pattern biaslooking for ev-
idence that confirms rather than rejects a hypothesis; and heuristic bias
using inappropriate guidelines or rules to make predictions.2 In this chapter
we address how to deal with boththe first, by having alternative models [or
outcomes; the second, by defining a set of appropriate guidelines for making
predictions, amplified on in succeeding chapters.
Two points are worth noting at the beginning of the discussion:
One must make careful use of the tools used in synthesizing the
model, as some will fail when applied to prediction. Expert opinion,
195
Predictive Techniques 197
Extrapolation
An extrapolation is a statement of what is expected to happen based only
on past observations. Extrapolation is the most conservative method of pre- 1930 1950 1970 1990
diction. In its simplest form, extrapolation extends a linear curve on a graph Note: Each dot represents a different type of aircraft. Ton-miles per hour is [he cargo load times the
based on historical performance. When there is little uncertainty about the distance traveled over time.
present state of a target model, ana1 when an analyst is confident that he or
she knows what forces are acting on the target, the prediction begins from the
present and propagates forward along the direction of an unchanged system (measured as cargo load times distance traveled over time) from the 1930s to
(straight line extrapolation). In this low-uncertainty, high-confidence situa- 1970, when technology shifted from piston engines to jets and electronic oper-
tion, new information is given relatively low weight. But when uncertainty ations took over for manual ones.'' However, the graph also shows one pitfall of
about the state of the model is high, then new information is accorded high a straight-line trend extrapolation. The straight segment of an S curve can look
value in prediction; when uncertainty about the forces acting on the target is like a straight line. In such a case, the curve will not continue its climb indefi-
high, then prediction uncertainty is high. nitely, but will level off, as it did in this example; the more recent C-17 did not
Extrapolation is usually accurate in the short run, assuming an accurate match the performance of the older C-5A and 747E Chapter 14 has a section
starting point and a reasonably accurate understanding of the direction of on S curves that offers some clues to help select the right type of extrapolation.
movement. The assumption is that the forces acting on the target do not Figure 11-2 shows a type of extrapolation that is used to predict periodic
change. Inertia (the tendency to stay on course and resist change, discussed in (repeating) phenomena. The technique used, called autocorrelation, works well
chapter 12) is what typically causes a straight-line extrapolation to work. when dealing with a cyclical (sinusoidal) behavior such as wave action. Pre-
Where inertia! effects are weak, extrapolation has a shorter lifetime of accuracy. diction of sunspot number (the number of "spots" or dark areas observed on
Where they are strong, extrapolation can give good results over time, the sun, shown in Figure 11-2), economic cycles, and automobile and lawn-
mower sales are examples.
Extrapolation Techniques
Adaptive techniques are a more sophisticated method of extrapolating
Figure 11-1 shows the simplest type of extrapolation. This example is a based on new observations. The Box-Jenkins is one such technique. Box-
trend extrapolation in the aircraft industry from the DC-3 aircraft to the C-17. Jenkins is useful for quickly spotting changing forces in a target model. It
The graph shows a remarkably consistent growth in performance of the aircraft uses a variable's past behavior, such as the sunspot occurrences shown in Fig-
ure 11-2, to select the best forecasting model from a general class of models.
Predictive Techniques 199
200 h Argentina i
Lebanon
Colombia* Mexico
10
100
1950 1960 1970 1980 1990 2000 100 1,000 10,000 100,000
GNP per capita (U.S. dollars)
Nate.- SuiKpot number is the number of "spots" or dark areas observed on the sun.
time is not a variable. But an extrapolation would probably not account for
Box-Jenkins provides some of the most accurate short-term forecasts. How- major technological changes, such as the subsequent proliferation of cellular
ever, it requires a very large amount of data, and it is complex and time-con-
suming to apply. telephone systems in many of the countries listed. To do that we have to aban-
don the correlation graphic and deal with the more sophisticated analytical
Correlation and Regression tools of projection or forecasting.
Correlation is a measure of the degree of association between two or more Limitations of Extrapolation
sets of data, or a measure of the degree to which two variables are related. Re- Extrapolation has two major shortcomings. First, it is inaccurate in the
gression is a technique for predicting the value of some unknown variable long run because it is narrowly focused and assumes that the static forces that
based only on information about the current values of other variables. Regres- operate on the model will continue unchanged, with no new forces being
sion makes use of both the degree of association among variables and the added. As noted earlier, this method depends on inertia. Second, extrapolation
mathematical function that is determined to best describe the relationships
will be inaccurate if the original target model was inaccurate. If the extrapola-
among variables. If values from only one independent variable are used to pre-
tion starts from the wrong point, it will almost certainly be even farther off as
dict values for another dependent variable, then the process is referred to as
it is extended forward in time. Both problems were present in every National
bivariate regression. Multivariate regression involves using values from more
Intelligence Estimate predicting the future development of Soviet military
than one independent variable to predict values for a dependent variable.
forces from 1974 to 1986. They all overestimated the rate at which Moscow
Figure 11-3 shows an example of a correlation analysis that was used to would modernize its strategic forces.5 All of those estimates relied on extra-
project the number of telephones that a country will install. The correlation
polation, without fully considering restraining forces, and used starting points
with gross national product, as the figure shows, is high, so a straight-line ex- that were, at best, shaky.
trapolation would allow one to predict the changes in numbers of telephone
sets as a function of predicted changes in a country's gross national product. Projection
The graph can be used simply for straight-line extrapolation; it bears a Before moving on to projection and forecasting, we need to differentiate
striking similarity to the straight-line extrapolation of Figure 11-1, except that them from extrapolation. An extrapolation is an assertion about how some
200 Chapter Eleven freaictive techniques 2\}i
element will materialize in the future. In contrast, a projection or a forecast is come can (and should) be broken down further. A revised list containing four
a probabilistic statement about some element. The underlying form of such alternative outcomes might be as follows:
statements is, If A occurs, plus some allowance for unknown or unknowable
factors, then we can expect B or something very much like B to occur, or at Technology is used:
least B will become more probable. Successfully.
But the result is a flawed product.
Projection is more reliable than extrapolation. It predicts a range of likely
futures based on the assumption that the forces that have operated in the past Technology is not used:
will change, whereas extrapolation assumes that the forces do not change. The And no new technology is introduced into the process.
changing forces produce a change from the extrapolation line, as shown by the But a variant or alternative technology is used.
C-17 entry in Figure 11-1.
This list illustrates the way that specifying all possible (and relevant) out-
Both projection and forecasting make use of two major analytical tech-
comes can expand one's perspective. The expanded possibilities often can gen-
niques. One technique, force synthesis/analysis, was discussed in chapter 10. erate useful insights into problems. For example, the alternative that a differ-
After completing a qualitative force synthesis/analysis, the next step in projec- ent technology is used in lieu of the technology in question suggests that
tion and forecasting is to apply probabilistic reasoning to it. Probabilistic rea- intelligence analysis focus on whether the target organization has alternative
soning is a systematic attempt to make subjective estimates of probabilities research and development under way
more explicit and consistent. It can be used at any of several levels of com- The key is to list all the outcomes that are meaningful. It is far easier to
plexity (each successive level of sophistication adding new capability and com- combine multiple outcomes than it is to think of something new that wasn't
pleteness). But even the simplest level, generating alternatives, helps to pre- listed, or to think of separating one combined-event outcome into its sub-
vent premature closure and serves to add structure to complicated problems. components. The list can serve both as a reminder that multiple outcomes can
occur and as a checklist to decide how any item of new intelligence might af-
Generating Alternatives fect an assessment of the relative likelihoods of the diverse outcomes listed.
The first step to probabilistic reasoning is no more complicated than stat- The mere act of generating a complete, detailed list often provides a useful per-
ing formally that more than one outcome is possible. One can generate alter- spective on a problem.
natives simply by listing all possible outcomes of the problem under consid- When generating a set of outcomes, beware of using generic terms (such
eration. As discussed in chapter 10, the possible outcomes can be defined as as "other"). As illustrated by the story of the automobile mechanics in chap-
alternative scenarios. ter 7, we do not easily recall the vast number of things that could fall under
Ideally the alternatives should be mutually exclusive (only one can occur, that seemingly simple label A catchall outcome label should be included only
not two or more simultaneously) and exhaustive (nothing else can happen; when a complete list of all alternatives cannot be generated first. In intelli-
gence, it is rare that all possible future states can be included. Also, do not
one of the alternates listed must occur).6 For instance, suppose that an analyst
overlook the possibility of nothing happening. For instance, if an analyst is
is tracking an opponent's research and development on a revolutionary new
creating a list of all the things that the French government might do regarding
technology The analyst could list two outcomes only:
a tariff issue, one item on the list should be, "Nothing at all."
The technology is used in producing a product (or weapons system). Influence Trees or Diagrams
* The technology is not used. A list of alternative outcomes is the first step in projection. A simple pre-
diction might not go beyond that. But for more formal or rigorous analysis, the
This list is exhaustive and the alternatives are mutually exclusive. If a third next step typically is to identify the things that influence the possible outcomes
option, called "Technology is used within two years," were added, the mutu- and indicate the interrelationship of those influences. This is frequently done
ally exclusive principle would have been violated (unless the first outcome had using an influence tree. Influence trees and diagrams represent a systematic
been reworded to "The technology is used after two years"). approach to the force analysis introduced in chapter 10.
This brief list of outcomes may or may not be very useful, with just two For instance, let us assume that an analyst wants to assess the outcome of
alternative outcomes. If the analyst is interested in more details, then the out- an ongoing African insurgency. There are three obvious possible outcomes:
202 Chapter Eleven
The insurgency will be crushed, the insurgency will succeed, or there will be Figure 11-4 Influence Tree for an Insurgency
a continuing stalemate. Other alternative outcomes may be possible, but we
can assume that they are so unlikely as not to be worth including. The three Poverty Economic Insurgency
outcomes for the influence diagram are then: program conditions
- Fails
Succeeds
Regime wins. Improved
Insurgency wins.
Fails
Stalemate. Succeeds
Succeeds Unchanged
Stalemate
The analyst now describes those forces that will influence the assessment
of the relative likelihood of each outcome. For instance, the insurgency's suc-
cess may depend on whether economic conditions improve, remain the same, Worse
Stalemate
or become worse during the next year. It also might depend on the success
of a new government poverty relief program. The assumptions about these
Fails
"driver" events are currently described as linchpin premises in U.S. intelligence
Succeeds
practice, and these assumptions need to be made explicit.7 Improved
Stalemate
After listing all of the influencing, or driver, events, the analyst next fo-
cuses on two questions: - Fails
Succeeds
Fails Unchanged
Do any of the influencing events influence each other?
Is it possible to assess the relative likelihood of the outcomes of the Fails
influencing events directly, or do the outcomes of those events de- Succeeds
Worse
pend in turn on other influencing events (and outcomes)? Stalemate
If the answer to the first question is that the events influence each other, an "audit trail") by which she arrived at the influence tree. The audit trail is
then the analyst must define the direction of influence. In the case at hand, we particularly useful in showing colleagues what the analyst's thinking has been,
have two influencing eventseconomic conditions and the poverty relief pro- especially if she desires help in upgrading the diagram with things that she
gram. One can argue that each event influences the other to some extent, but may have overlooked. Software packages for creating influence trees allow the
it seems reasonable that the poverty relief program will have more influence inclusion of notes that create the audit trail.
on economic conditions than the converse, so we are left with the following In the process of generating the alternative lists, the analyst must address
relationship: the issue of whether the event (or outcome) being listed actually will make a
difference in the assessment of the relative likelihood of the outcomes of any
Poverty relief program influences economic conditions, which influence the of the events being listed. For instance, in the economics example, if she knew
outcome of the insurgency. that it would make no difference to the success of the insurgency whether eco-
nomic conditions improved or remained the same, then the analyst has no
Having established the uncertain events that influence the outcome, the need to differentiate those as two separate outcomes. She should instead sim-
analyst proceeds to the first stage of an influence tree, which is shown in Fig- plify the diagram.
ure 11-4. This tree simply shows all of the different outcomes in the hierarchy The second question, having to do with additional influences not yet
of dependency shown on the diagram, allows the analyst to extend this pictorial representation
The thought process that is invoked when generating the list of influenc- of influences to whatever level of detail she considers necessary. Note, however,
ing events and their outcomes can be useful in several ways. It helps identify that an analyst should avoid adding unneeded layers of detail. Making things
and document factors that are relevant in judging whether an alternative out- more detailed than necessary can degrade, rather than improve, the usefulness
come is likely to occur. The analyst may need to document the process (create of this diagramming technique.
204 Chapter Eleven Predictive Techniques 205
The thought process also should help identify those events that contain Figure 11-5 Influence Tree with Probabilities
no uncertainty. For example, the supply of arms to both government and in-
Poverty Economic Ins urgency Outcome
surgent forces will have a strong influence on the outcomes. We assume that, condition* probability
Program
in this problem, these are not uncertain events because intelligence officers
0.8
have high confidence in their estimates of the future arms supply. They are not Fails 0.224
linchpins. The analyst will undoubtedly take these influences into account in 0.4 0.1
Succeeds 0.028
Improved
her analysis. In fact, she would make use of this information when assessing 0.1
Stalemate 0.028
the relative likelihoods of the main event (the insurgency) outcome, which will 0.7
Fails 0.196
be done next; but she does not need to include it in her diagram of uncertain 0.4 0.1
0.7 Succeeds 0.028
events. Succeeds Unchanged 0.2
Probabilistic reasoning is used to evaluate outcome scenarios. A relative Stalemate 0.056
likelihood must be assigned to each possible outcome in the tree in Figure 0.5
Fails 0.070
11-4. We do this by starting at the left and estimating the likelihood of the out- 0.2 0.2
- Succeeds 0.028
come, given that all of the previous outcomes in that branch of the tree have Worse 0.3 0.042
occurred. This is a subjective process, done by evaluating the evidence for and
against each outcome using the evaluative techniques discussed in chapter 7. 0.7
Figure 11-5 shows the result. Note that the sum of the likelihoods for each - Fails 0.042
0.2 0.1
branch point in the tree equals 1.00, and that the cumulative likelihood of a - Succeeds 0.006
Improved 0.2
particular outcome (on the far right) is the product of the probabilities in the - Stalemate 0.012
branches that reach that point. (For example, the outcome probability of the 0.6
- Fails 0.054
poverty program succeeding, economic conditions improving, and the insur- 0.3 0.3 0.1
gency failing is .224 = 0.7 X 0.4 X 0.8.) - Succeeds 0.009
Fails Unchanged 0.3
The final step in the evaluation is to sum the probabilities on the right in 0.027
Figure 11-5 for each outcome-"fails," "succeeds," and "stalemate." When we 0.3
Fails 0.045
do this we get the following probabilities: 0.5 0.3
- Succeeds 0.045
Worse 0.4 - "italfimatp 0.060
Insurgency fails .631
Insurgency succeeds . 144
Stalemate .225
mate affects economic conditions. If feedback loops emerge and are needed in
This influence tree approach to evaluating possible outcomes is more con- influence diagrams, the analyst will need to use techniques designed to han-
vincing to customers than an unsupported analytic judgment about the dle dynamic feedback situations, such as simulation modeling.
prospects for the insurgency. Human beings tend to do poorly at such com- S
plex assessments when they approach them in a subjective manner, totally un- Influence Nets
aided; that is, when the analyst mentally combines the force assessments in an Influence net modeling is an alternative to the influence tree. It is a pow-
unstructured way. On the other hand, numerical methods such as the influ- erful tool for projection and forecasting of complex target models where the
ence tree have the inherent disadvantage of implying (merely because numbers influence tree would be too cumbersome. Influence net modeling is a combi-
are used) a false degree of accuracy. The numbers are precise and unambigu- nation of two established methods of decision analysis: Bayesian inference net
ous in meaning, but they are no more accurate than the subjective feelings analysis, originally employed by the mathematical community, and influence
they represent. diagramming techniques, such as the insurgency example, which were origi-
The probability calculations and the tree structuring technique demand nally employed by operations researchers. Influence net modeling is an intu-
that no feedback loops exist, or that the feedback is so small that it can be ig- itive, graphical method.
nored. A feedback loop would exist, for example, if economic conditions sig- To create an influence net, the analyst defines influence nodes, which de-
nificantly affect the poverty relief program, or if a continuing insurgency stale- pict events that are part of cause-effect relations within the target model. They
Figure 11 -6 Example Influence Net Model
mulated to determine the probability distribution of the outcome.
The probability of intercepting a weak radar signal in ELINT, for
Withdrawal would be Hussein believes he
politically costly for
example, is often estimated using a Monte Carlo simulation.
is in control of
Hussein's regime. events.
Generally, these techniques and others of their genre require modeling of
Hussein believes Hussein believes events and estimations of probability functions.
annexation of Kuwait annexation of Kuwait will Most of the predictive problems we deal with in intelligence use subjec-
will help him politically. help Iraq financially. tive probability estimates. Formal probability estimates, such as Monte Carlo
simulations, are used infrequently, either because we do not have enough data
Coalition enforces UN Hussein believes or because the value of a formal process is not worth the time involved. We
Saddam Hussein decides to United States
export and import withdraw from Kuwait
has resolve to push
routinely use subjective estimates of probabilities both in snap decision mak-
embargo on Iraq. peacefully (1990). ing and in the broad issues for which no objective estimate is feasible. An es-
Jraq out of Kuwait.
timate about the probability of a major terrorist attack occurring somewhere
Note: The arrows come from boxes (haL support the decision For Hussein (o withdraw from Kuwait in the United Kingdom next week, for example, would inevitably be subjec-
peacefully. The filled dots tome from boxes thai do not support the decision.
tive; there would not be enough hard data to make a formal quantitative esti-
mate. An estimate of the probability that the Chinese economy will grow by
also create "influence links" between cause and effect that graphically illustrate more than 5 percent next year could be made using formal quantitative tech-
the causal relation between the connected pair of events. The influence can be niques because quantitative data are available.
either positive (supporting a given decision) or negative (decreasing the likeli- Even if a formal probability estimate is used, it will always have a strong
hood of the decision), as identified by the link "terminator." The terminator is subjective element. A subjective component is incorporated in every estimate
either an arrowhead (positive influence) or a filled circle (negative influence). of future probability; it is a basis for the weighting of respective outcomes to
The resulting graphical illustration is called the influence net topology. An ex- which no numerical basis can be assigned.
ample topology, showing some of the influences on Saddam Hussein's decision Sensitivity Analysis
whether to withdraw from Kuwait in 1990, is pictured in Figure 11-6".H The
decision is stated as, Saddam Hussein decides to withdraw from Kuwait peace- When a probability estimate is made in projection or forecasting, it is usu-
fully. The arrows come from boxes that support that decision; the filled circles ally worthwhile to conduct a sensitivity analysis on the result. For example,
come from boxes that support the opposite decision, that is, not to withdraw. the occurrence of false alarms in a security system can be evaluated as a prob-
abilistic process. The effect of introducing alarm maintenance procedures can
Making Probability Estimates be included in the evaluation by means of sensitivity analysis.
Probabilistic projection and probabilistic forecasting are used to predict The purpose of sensitivity analysis is to evaluate the relative importance
the probability of future events for some time-dependent random process, or impact of changes in the values assigned to influencing-event outcomes.
such as the health of the Japanese economy. A number of these probabilistic The inputs to the estimate are varied in a systematic manner to evaluate their
techniques are used in industry for projection and forecasting. Two that we use effect on possible outcomes. This process lets an analyst identify variables
in intelligence analysis are the following: whose variation has little or no effect on possible outcomes.
A number of tools and techniques are available for sensitivity analysis.
Point and interval estimation. This method attempts to describe the Most of them are best displayed and examined graphically. Figure 11-7 shows
probability of outcomes for a single event. An example would be a the results of an analysis of the likelihood of a manufacturer successfully cre-
country's economic growth rate, and the event of concern might be ating a new biological warfare virus. Three possibilities are assumed to exist:
an economic depression (the point where the growth rate drops The process will create the new virus; the process will fail; or the manufacturer
below a certain level). will abandon the project before it is conclusive. These three possibilities add
up to a likelihood of 1.0 at any point on the graph in Figure 11-7. One of the
Monte Carlo simulation. This method simulates all or part of a elements in the analysis is the probability that a new genetic engineering tech-
process by running a sequence of events repeatedly, with random nology will emerge to aid the development of the biological warfare virus (the
combinations of values, until sufficient statistical material is accu- horizontal axis in the figure). The sensitivity analysis indicates that success in
Predictive Techniques 209
Figure 11-7 Sensitivity Analysis for Biological Warfare Virus opment of alternative futures is essential for effective strategic decision making.
Prediction Since there is no single predictable future, customers need to formulate strat-
egy in the context of alternative future states of the target. To that end, it is nec-
Likelihood
of outcome 1.0 essary to develop a model that will make it possible to show systematically the
interrelationships of the individually forecast trends and events. A forecast at-
tempts to identify new forces that will affect the targetto consider the possi-
Vims is developed. ble effects of new developments in distantly related fields, such as new tech-
nologies in the realm of plastics, or new constraints posed by the sociological
impact of pollution, or new forms of life created through genetic engineering,
and to present them all to the customer as possibilities. In forecasting, one also
Project abandoned before must look at forces such as synergy, feedback, inertia, contamination, and
completion.
countervailing forcesall discussed in chapter 12.
Customers generally prefer that the highest possible level of predictive
analysis (forecasting) be provided so that they can be confident in it. Confidence
for some customers might mean that the analysis is conducted according to
0 .1 .2 3 .4 .5 .6 .7 .8 .9 1.0 some sort of accepted (preferably quantitative) methodology. For other cus-
Probability that new technology will be developed to aid in virus creation tomers, it might mean confidence in the person producing the analysis.
A forecast is not a blueprint of the future, and it normally starts from ex-
trapolations or projections. Forecasters then must expand their scope to admit
producing the virus is relatively sensitive to the genetic engineering technol- and juggle many additional forces or factors. They must examine key tech-
ogy (the success line goes up sharply as the probability increases that the tech- nologies and developments that are far afield but that nevertheless affect the
nology works). If the probability of success for the new technology is above subject of the forecast.
.55, ihen the process is more likely to succeed (likelihood of new virus cre-
ation above .5 on the vertical scale); it is more likely to fail if the probability The Nonlinear Approach to Forecasting
of success is less than .55. The graph also indicates that the manufacturers A forecasting methodology requires analytic tools or principles. It also re-
possible decision not to complete the project is relatively insensitive to the quires analysts who have significant understanding of many technologies and
technology's success, because the likelihood of project abandonment does not disciplines and the ability to think about issues in a nonlinear fashion. As with
change much as the probability of technology success increases; such a deci- the intelligence process discussed in chapter 1, an analyst cannot effectively
sion might be made for political or economic reasons, for example, rather than approach forecasting in a linear mannergathering data, analyzing it, and for-
technical reasons. The chart is simplistic, of course; in fact, the straight lines mulating a solution. Such a linear and mechanistic view of the universe has
would typically be curves with sharp "knees" at points where the probabilities never served us well for forecasting, and it is inappropriate for dealing with
start changing at different rates. complex targets. The natural pattern of thinking about the future appears
chaotic on the surface, but it is chaos with a purpose. Futuristic thinking ex-
Forecasting amines deeper forces and flows across many disciplines that have their own
Projections usually work out better than extrapolations over the short to order and pattern. In predictive analysis we may seem to wander about, mak-
medium term. But even the best-prepared projections often seem very conser- ing only halting progress toward the solution. That nonlinear process is not a
vative when compared to the reality years later New political, economic, so- flaw; rather it is characteristic of a natural learning process when individuals
cial, technological, or military developments will create results that were not deal with complex and nonlinear matters.
foreseen even by experts in a field. Typically, these new developments are de- The son of person who can do such multidisciplinary analysisanalysis
scribed as disruptive technologies or disruptive events. To take these disrup- of what will happen in the futurehas a broad understanding of the principles
tive developments into account, we are forced to go to forecasting techniques that cause a physical phenomenon, a chemical reaction, or a social reaction to
A major objective of forecasting in intelligence is to define alternative occur. People who are multidisciplinary can pull together concepts from sev-
futures of the target model, not just the most likely future. These alternative eral technical fields and assess political, economic, and social factors, as well
futures are usually scenarios, as discussed in the preceding chapter. The devel- as technical ones. Such breadth of understanding recognises the similarity of
frecttcave techniques
these principles and the underlying forces that make them work. It might The future cannot be predicted, but taking explicit account of un-
also be called "applied common sense," but unfortunately it is not very com- certainty, it can be forecast probabilistically.
mon. Analysts instead tend to specialize because in-depth expertise is so highly Forecasts will be misleading if they do not sweep widely across
valued by both intelligence management and the intelligence customer. The possible future developments in such areas as demography, values
CIA, for example once had a Soviet canned goods analyst and a Soviet timber and lifestyles, technology, economics, law and regulation, and in-
analyst.9
stitutional change.
In 1950, U.S. intelligence had two major failures in prediction in six
months, resulting from a combination of mindset and failure to do multidisci- Alternative futures, including the "most likely" future, are defined
plmary analysis. On June 25 of that year, the North Korean People's Army in- primarily by human judgment, creativity, and imagination.'2
vaded South Korea. United Nations forces intervened to defend South Korea
and pushed the invading forces back into the North. In October and Novem- For executives and policymakers, the purpose of defining alternative fu-
ber, responding to the impending defeat of the North Koreans, the Chinese tures is to try to determine how to create a better future than the one that would
People's Liberation Army attacked and drove the UN forces back into South materialize if we merely kept doing what we're doing. In intelligence, the aim
Korea. Both the North Korean and the Chinese attacks were surprises is to predict an opponent's actions so that a response can be formulated.
The mindset in Washington that permeated political, military, and intelli- Forecasting starts from our experiences or with examination of the chang-
gence thinking at the time was that the Soviet Union was the dominant Com- ing political, military, economic, and social environments. We identify issues
munist state, exercising near-absolute authority over other Communist states. or concerns that may require attention. These issues or concerns are then de-
The resulting perception was that only the USSR could order an invasion by fined in terms of their component forces. Forecasts of changes to those forces
its client states, and such an act would be a prelude to a world war. Washing- (mostly in the form of trends and events) are generated and subsequently in-
ton was confident that Moscow was not ready to take such a step, so no attack terrelated using techniques such as cross-impact analysis. A "most likely" fore-
was expected. This mindset persisted after the invasion, with the CIA Daily cast future is written in scenario fonnat from the trend and event forecasts;
Summary reporting that the invasion was a "clear-cut Soviet challenge to the outlines of alternatives to that future are generated by synthesis/analysis or by
United States." As evidence mounted of a subsequent Chinese intervention, cross-impact modelingpairwise connection of forecast developments, as dis-
CIA analyses continued to insist that the Soviets would have to approve any- cussed in chapter 10.
Chinese action in Korea,10 If the forecast is done well, these scenarios stimulate the customer of in-
In fact, quite the opposite was true. Moscow opposed Chinese interven- telligencethe executiveto make decisions that are appropriate for each
tion because of fear that it could lead to a general war involving the USSR. The scenario. The decisions can be analyzed for their robustness across scenarios.
U.S. mindset of Soviet decision-making supremacy was abetted by the failure The purpose is to arrive at a set of decisions that effectively address the issues
of the CIA to consider the multidisciplinary factors that led to both invasions. and concerns identified in the initial stage of the process. The decisions are
Cultural, historical, and nationalistic factors in fact dominated North Korean then implemented in action plans.13
and Chinese decision making. Kim II Sung, North Korea's leader, was deter-
mined to unify Korea under his leadership; he apparently believed that the Evaluating Forecasts
South Korean population would rise up to support the invasion and that the Forecasts are judged on the following criteria:
s
United States would not intervene." After the U.S. advance into North Korea,
China's strategic interests were threatened by the possibility of a hostile Korea Clarity. Are the objects of the forecast and the forecast itself intelli-
on its border. The CIA analyses took none of this into account. gible? Is it clear enough for practical purposes? Users may, for ex-
ample, be incapable of rigorously defining gross national product or
Techniques and Analytic Tools of Forecasting
the strategic nuclear balance, but they may still have a very good
Both projection and forecasting use the tools described in this and suc- ability to deal with forecasts on those subjects. On the other hand,
ceeding chapters. In chapter 2 we introduced the idea of a conceptual model. they may not have the least familiarity with the difference between
The conceptual model on which projection and forecasting are based is an as- households and families and thus be puzzled by forecasts in that
sessment of the dynamic forces acting on the entity being studied. Forecasting area. Most users have difficulty interpreting the statistics used in
is based on a number of assumptions, among them the following: forecasting (for example, medians and interquartile ranges).
Predictive Techniques 213
214
216 Chapter Twelve
Shaping Forces 217
the ship's inertial movement, the aiming device failed, proving to the navy that Applications of this pnnciple, called Newton's third law, are found in all
continuous-aim firing was impractical. organizations and groups, commercial, national, and civilizational. As Samuel
Sims, however, was as persistent and bold as the person he next contacted E Huntington notes, "We know who we are . . . often only when we know who
with his ideaPresident Theodore Roosevelt. Roosevelt forced the navy to we are against."2 The rallying cry of Japan's Komatsu Corporation, and the de-
lake the device and give it a fair test. Simss device was subsequently adopted finition of its being, was summed up in its slogan, "Beat Caterpillar!"Cater-
and significantly improved naval gunnery accuracy1 pillar Inc. being Komatsu's chief competitor worldwide.
The organizational resistance to change that Sirns encountered is com- In Isaac Asimov's brilliant short story The Last Tramp, the Archangel
mon. The U.S. Navy is a highly organized society, and Sims's innovation di- Gabnel sounds the last trumpet and Judgment Day arrives (on January 1, 1957,
rectly threatened that society by making some skills less essential. The navy re- to be precise). Earth's residents (and former residents, who are coming hack to
sisted his innovation, and it took someone outside the societythe president life in their last corporeal form) slowly realize that boredom, not the fire and
of the United Statesto force the change. Organizations are societies just as a ice of Dante's Inferno, is the ultimate Hell. Etheriel, Earth's guardian angel,
U.S. Navy ship's crew is a society. They possess a basic antipathy to changes meanwhile is appealing to a higher courtthe Almightyfor an ex post facto
that threaten their structure. Most research and development groups restrict reversal of the Judgment Day order. Finally Etheriel, realizing who has actually
their members' freedom to innovate: Ideas that don't fit the mold of the group won the final battle for the souls of mankind, asks, "Is then the Adversary your
are unwelcome. servant also?" God invokes Newton's third law in his reply: "Without him I can
From an analysts point of view, inertia is an important force in prediction. have no other . . . for what is Good but the eternal fight against Evil?"5
Established factories will continue to produce what they know how to pro- A predictive analysis will always be incomplete unless it identifies and as-
duce. In the automobile industry, it is no great challenge to predict that next sesses opposing forces. All forces eventually meet counterforces. An effort to
year's autos will look much like this year's. A naval power will continue to expand free trade inevitably arouses protectionist reactions. One country's ex-
build ships for some time even if a large navy ceases to be useful. pansion of its military strength always causes its neighbors to react in some
fashion. If laws bar access to obscenity on-line, then you can count on offshore
Countervailing Forces evasion of restrictions and growing pressures for free speech.
All forces are likely to have countervailing or resistive forces that must be Counterforces need not be of the same nature as the force they are coun-
considered. The pnnciple is summarized well by another of Newton's laws of tering. A prudent organization is not likely to play to its opponent's strengths.
physics: For every action there is an equal and opposite reaction (Analysis Today's threats to U.S. national security are asymmetric; that is, there is little
Principle 12-2). threat of a conventional force-on-force engagement by an opposing military,
This analysis principle indicates that no entity (country, organization, ini- but there is a threat of an unconventional yet highly lethal attack by a loosely
tiative or project) can expand unopposed. Opponents will always arise. Every organized terrorist group, as the events of September 11, 2001, demon-
action creates an equal and opposite reaction. If the force reaction is not equal, strated.4 Asymmetric counterforces are common in industry as well. Industrial
then a change in momentum (in physics) or in the situation (in the social sci- organizations try to achieve cost asymmetry using defensive tactics that have a
ences) occurs until the action and reaction balance. large favorable cost differential between their organisation and that of an op-
ponent.'' Any intelligence assessment of the consequences of a policymaker's
or field commander's decision should take countervailing forces into account
because the opponents will react and are likely to react asymmetrically.
Analysis Principle 12-2 *-
Contamination
Newton's Third Law (the Dialectic) Contamination is the degradation of any political, social, economic, or
technical entity through an infectionlike process (Analysis Principle 12-3).
Newton's third law of physics states that whenever one body exerts a force on
Corruption is a form of social contamination. Money laundering is a form of
another, the second always exerts on the first a force that is equal in magnitude but
oppositely directed. In the social sciences, HegeLs dialectic is the philosophical economic contamination.
equivalent of Newton^ third law. Hegel described a process of thesis-antithesis- Nobel Laureate living Langmuir described the contamination phenome-
synthesis, by which views of one type lead, by theii internal contradictions, to the non using this story about a glycerin refinery:
creation of views of the opposite type.
Glycerin is commonly known as a viscous liquid, even at low temperatures.
Yet if crystals are once formed, they melt only at 64 degrees Fahrenheit. If a
twave Shaping t-orces
rate tracking system could discriminate between slow-moving chaff end, selects one combination. The usual job of the intelligence analyst is to
and a fast-moving aircraft. evaluate the likely effects of a given combination, though in some cases he may
The radars antijam circuits eliminated conventional noise jamming. also formulate likely combinations for the executive.
Most of the major innovations and changes that make straight-line extra-
polation obsolete occur because of some form of synergy. Synergy was a major
The U.S. Air Force's Strategic Air Command (SAC) put its electronic war-
factor in the spread of television, CB radio, and personal computing. It should
fare planners on the problem because the Nike-Hercules capabilities could be
be constantly on the analyst's mind as he or she evaluates the factors going into
expected to appear in future radars that SAC'S B-52s would face. SAC's planners
found that a combination of the three techniquesnoise jamming, with an a forecast.
S maneuver in which chaff was dropped when she aircraft track was perpen- Feedback
dicular to the radar bearingconsistently defeated the tracking radar. The se-
In analyzing any complex system, it is important to evaluate its feedback
cret to the success of what became called the "sidestep" maneuver was synergy.
mechanism. Feedback is ihe mechanism whereby the system adapts, that is,
In electronics warfare, it is now well known that a weapons system may
learns and changes itself. Feedback was introduced as a third class of force
be unaffected by a single countermeasure; however, it may be degraded by a
(along with internal and external forces) in chapter 10; the following discus-
combination of countermeasures, each of which fails individually to defeat it.
sion provides more detail about how feedback works to change a system.
The same principle applies in a wide range of systems and technology devel-
Many techniques for prediction depend on the assumption that the
opments: The combination may be much greater than the sum of the compo-
process being analyzed can be described, using systems theory, as a closed-loop
nents taken individually.
system. Under the mathematical theory of such systems, feedback is a control-
An example of synergy on a large scale is that between the fields of com-
ling force in which the output is compared with the objective or standard, and
puters and communications. These once-distinct technical areas have been
the input or process corrected as necessary to bring the output toward a desired
merging over three decades, as we expand our ability to use one to enhance
state, as shown in Figure 12-1. The results (the output) are evaluated, and the
performance of the other. Managing the merger of these two required techni-
result of the evaluation fed back as an input to the system at the point shown
cal knowledge in both, plus an understanding of political issues (regulation in
in the figure. The feedback function therefore determines the behavior of the
communications) and economic issues (cost-performance trade-offs of central
total system with time. Only one feedback loop is shown in the figure, but
versus distributed computing). It also required a keen market sense that de-
many feedback loops can exist, and usually do in a complex system.
termined the willingness of large numbers of people to take advantage of the
The model shown in Figure 12-1 is a generalized one that is used exten-
merger, as people have done in using networks such as the Internet.
sively in electrical engineering to describe the operation of mechanical and
Synergy is the foundation of the "swarm" approach that military forces
electrical control systems. It also has been found to represent many social
have applied for centuriesthe coordinated application of overwhelming
processes, especially adaptation by organizations. Although its general validity
force. The massed English longbows at the Battle of Crecy in 1346 were more
has not been tested, the model is accepted here as having some validity in pre-
lethal than the sum of many single longbows might indicate. In planning a
business strategy against a competitive threat, a company will often put in dicting the future state of the system.
place several actions tbat taken alone would not succeed. But the combination
can be very effective. As a simple example, a company might use several tac- Figure 12-1 Feedback Process
tics to cut sales of a competitor's new product: start rumors of the release of its
own improved product, circulate reports on the defects or expected obsoles- Positive or negative feedback
cence of the competitors product, raise buyers' costs of switching from their
own to the competitor's product, and tie up suppliers via exclusive contracts.
Each action, taken separately, might have little impact, but the synergythe
"swarm" effect of the actions taken in combinationmight shatter the com- Process
petitor's market. Output
Input
In intelligence support to policy, the same rule holds. A combination of
policy actions may be much more effective than any single action. The policy- Now: The circled X shows where the input and the feedback combine before they flow into vhe
maker or executive usually identifies the possible combinations and, in the process
An analyst should not consider a prediction complete until she or he has ments, for example, may be much more difficult to identify and take longer to
assessed the potential effects of feedback. Such an assessment requires the an- observe than the costs.
alyst to predict the nature and extent of feedback. Feedback can be positive It is fairly common, on the other hand, for benefits to be perceived more
and encourage more output, or it can be negative and encourage less output. quickly than costs. The drug industry has provided us with examples of this
Feedback can also be strong and have a greater effect on output, or be weak phenomenon, one of the most dramatic of which occurred with the drug
and have a lesser effect. Finally, feedback can be immediate and be reflected thalidomide. First introduced in Europe in 1956 as a sedative and to combat
immediately in the output, or its effect can be delayed, so that it changes the morning sickness in pregnant women, thalidomide was withdrawn from the
output at some future time. market in 1961, but only after it was found to have caused severe birth defects
Strength in thousands of infants.6
The delayed effects of environmental pollution have provided other ex-
Most systems are adaptive. Feedback causes changes in the input and amples of such "false positive" feedback. The nuclear power industry, however,
should also cause the management assessment and innovation parts of a has probably provided the most spectacular examples. The industry benefited
process to change. The measure of this adaptivity is the strength of feedback. for some years from extensive government-supported efforts to advance the
In most systems, a change in the output (type, quantity, and so on) changes technology The resulting pace of nuclear power technology development was
the input as the result of an evaluatory process. In positive feedback systems, too rapid to allow adequate mitigation of the risks.9 As a result, the United
where benefits outweigh costs, the output causes a reinforcement of the input, States suffered from the Three Mile Island reactor incident, which released ra-
and the output therefore tends to grow at a rate determined in part by the dioactive material into the air, creating widespread panic, and Russia had its
amount of positive feedback. In negative feedback systems, where costs out- Chernobyl disastera reactor meltdown that contaminated a wide area in the
weigh benefits, output is fed back in such a manner as to decrease input, and Ukraine and caused several deaths.
the output tends to stabilize or decrease. As the examples suggest, delays in negative feedback are a continuing prob-
The rate of change in forces due to feedback is a result of weighing the ob- lem in areas of rapid technological advance. The rapid advances depend on
served benefits of a development (positive feedback) against costs (negative technology diffusion mechanisms that work extremely well in the United States,
feedback). This is the evaluation or decision-making step. with its efficient communications networks and high mobility of workers.
Organizations tend to act to reduce the strength of feedback in two ways. Multinational corporations are also a powerful technological diffusion mecha-
First, all organizations try to hold things constant so they can deal with them, nism. The advance of technology is fast, compared with the technology evalua-
and that is a powerful constraint on feedback.7 Few organizations can readily tion process, leading to examples of "technology-driven" systems in which the
cope with the uncertainty that comes from adaptivity; Sims's problem with in- constraining effects of regulatory, human resources, organizational, and man-
troducing his gunner)' innovation is one of many examples of the problem. agement factors are too slow to exert much power. The pharmaceutical, com-
Second, feedback must reach decision makers or action takers to be ef- munications, and computer industries have displayed this technology' drive m
fective. Only in that way can it shape future actions. But the organization it- action for several decades. Genetic engineering is a current technology-dnven
selfits administrative layers and staffdiffuses, weakens, misdirects, and field that could produce serious problems worldwide in coming decades.
delays feedback, effectively reducing its strength. A large bureaucratic organi-
zation or a centralized economy, with its relative inflexibility and numerous Regulation
layers of administrators, keeps feedback at a feeble level. Funding is set Any analysis of an industry or'organization must take into account the
through political processes that have only an indirect relation to previous in- role of government regulatory forces. Some such forces are positive, but more
dustrial successes and failures. The market provides poor feedback in a cen- government support does not necessarily mean success. An examination of
tralized or command economy. protected industries yields some examples.
Time Df lay European governmental ownership of, and participation in, European
businesses increased in the 1970s. A driving force was the need to rescue Eu-
All feedback loops, whether in technological or social systems, have in- ropean businesses from failure or foreign takeover, especially in the aftermath
herent delay. The time lag causes a problem when it results m the feedback's of the 1973 oil shortage. When the computer industry merger of Honeywell-
sending the wrong signal. Sometimes feedback of positive benefits comes more Bull was being negotiated in France in the 1970s, the French government
slowly than feedback of a negative kind, so that the system receives negative agreed to the merger on the conditions that no employees would lose their
feedback when it should not. The benefits of deregulation or free trade agree- jobs and no plants would be closed. Because the merger created an estimated
statute to thwart it. Second, the unintended consequences of this tax-raising
Analysis Principle 12-4 statute were vast, so much so that it has been called the most important single
piece of legislation in the Anglo-American law of property. Specifically, the law
The Law of Unintended Consequences gave rise both to the modem law of trusts and to modern methods of trans-
The taw of unintended consequences, simply stated, says that: ferring real estate. The British Parliament's reaction to the Statute of Uses also
led to the law of Wills as we know it.
Any deliberate change to a complex (social or technical) system will have The Statute of Uses also is one of the few known exceptions to the rule
unintended (and usually unforeseen) consequences, and that unintended consequences are usually undesirable. It had highly beneficial
The consequences are normally undesirable.
results for succeeding generations, though not for Henry Mil.
The law of unintended consequences has an analogy in the world of data
processing. In a modern, distributed processing network, or in a very complex
15,000 surplus employees, those conditions placed a heavy burden on the software package, one cannot predict all the effects of changes. But it is pre-
new firm. The result was low plant utilization, and Honeywell-Bull was not dictable that most of the unintended consequencessystem crashes, lockouts,
competitive in France in spile of a guaranteed market in French government- and so forthwill be undesirable ones.
controlled firms. The law of unintended consequences may be merely an elegant expres-
Over the past century, governments have increased their regulatory influ- sion of Murphy's law (which slates that anything that can go wrong, will) or
ence over industrial decisions worldwide. In some countries, the intervention simply an expression of human inability to foretell the outcome of a complex
has predominantly been for worker safety and health, environmental protec- social process. One facet of the law has been described as " counterintuitive-
tion, and so forth. Other governments have intervened primarily to protect ness." One generic model of a welfare system demonstrated that expanding a
jobs and promote the economy. In some countries the intent has been to ben- welfare system to reduce the number of poor families in a community actually
efit the government leadership financially. (and counterinmitively) increases iheir numbers.'2 Another model indicated
Governments are at a disadvantage in this kind of intervention: They seem that making drugs illegal as a way to curb drug abuse and reduce other soci-
to look at things one facet at a time, in a relatively simplistic manner. In part etal problems had the opposite effect.15 As another example, during the cold
because of slower feedback processes and a more cumbersome structure, gov- war. Soviet secrecy forced U S. defense planners to assume the worst-case sce-
ernments are not as quick on their feet as the corporations they deal with. And nario and provoked a military buildup that the Soviets did not want.
in their interventions, governments continually encounter the law of unin- The impact of regulation is difficult to measurenot only are the conse-
tended consequences; that is, actions taken to change a complex system will quences unexpected but they are often difficult to trace back to the regulations
have unintended, and usually adverse, consequences (Analysis Pnnciple 12-4). that spawned them. One measure of these consequences occurs when an in-
The classic illustration of the law of unintended consequences dates back dustry is deregulated, as when the United States deregulated the telecommuni-
to Tudor England. In England before 1535, real property passed by descent lo cations industry. The effect in telecommunications was dramatic: new industries
the oldest son at his father's death. At that transfer, a tax was owed to the king. sprang up. Spurred by the competitive threat, AT&T became more innovative
Over the years, feudal lawyers had created a device called the Use, which al- and market oriented than it had been in the past. The application of new tech-
lowed trustees to hold legal title to land in trust for the true owner so that, un- nologies, such as packet switching for data communications, got a boost.
less all of the trustees died at once, the land could be repeatedly passed from Just as government support does not mean automatic success, so govern-
father to son without the requirement that a tax be paid. ment opposition does not mean automatic failure. Worldwide, the narcotics
The story goes that King Henry VIII, as his financial needs increased, industry marches on in spite of strong opposition from many governments.
''contemplated the state of his exchequer with great dismay."10 A survey of the During the Prohibition era in the United States, the liquor industry thrived.
kingdom's assets revealed to Henry how England's landowners were avoiding
his taxes through the device of the Use. In 1535 Henry prevailed upon a re- Summary
luctant Parliament to pass the Statute of Uses.11 The statute was simple and di- Predictive analysis relies on assessing the impact of forces that shape or-
rect: It vested legal title in the land's true owner, not in the trustee, so that taxes ganizations, lead to new developments, and motivate people:
would be due upon the death of the true owner.
The statute is remarkable for iwo reasons: First, it totally failed in its Inertia, or resistance to change, is common in established organi-
re venue-raising purpose. Within a few years the British lawyers, who were no zations. Organizations naturally seek to establish and maintain a
less clever then than tax lawyers are today, had found enough loopholes in the stable state.
226 Chapter Twelve
These shaping forces should be a first stop in any predictive analysis about
O ne can use a number of analytical techniques to assess the major forces
that shape most entities. We apply the techniques to answer questions
about force impact, as discussed in chapter 10, and to construct influence
a target model. The following two chapters give some examples of their appli-
trees. Most forces can be analysis targets, as well as forces in another analysis.
cation in organizational and systems analysis.
A country's information technology for example, might be the target of a tech-
Notes nology assessment The results of that assessment would be a force to be con-
1 Elting Mornsan, Men, Machines, and Modern Times (Cambridge MIT Press, 1966). sidered in an analysis of the country's information warfare capability. The re-
2 Samuel R Huntington, The Clash o/ Civilisations and the Remaking of World Order (New York: sults would also be a force to consider in an organizational assessment, such
Simon and Schuster, 1996), 21. as an assessment of an industrial concern located in the country An organiza-
3. Isaac Asimov, "The Last Trump," in Isaac Asitnov. The Complete Stones, vol. 1 (New York. Dou- tional assessment of the country's software development firms would be a
bleday, 1990), 106-119
4, Another thoughtful perspective on the use of asymmetric attack against the United States is
significant input into an analysis of the country's information technology. Or-
presented in the book Unrestricted Warfare, by Chinese People's Liberation Army colonels ganizational and technological forces are important in predictive aualyses of
Qiao Liang and Wang Xiangsui (Beijing: PLA Literature and Arts Publishing House, February many targets, and that is why they are the subjects of this chapter and the next.
The typical organization is a system that, as noted in chapter 1, can be
5 Michael E. Porter, Competitnt Advantage (New York: Free Press, 1985), 500. viewed (and analyzed) from three perspectives: structure, function, and process.
6. Irving Langmuir. "Science, Common Sense, and Decency," Science 97 (January 1943): 1-7.
7. Donald A. Schon, Organisational Learning (Boston: Addison-Wesley, 1978).
Structure refers to the components of the organization, especially people and
8. Crohn's and Colitis Foundation of America, "Thalidoraide and 1BD," March 10, 2003, www their relationships. Function refers to the outcome or results produced and
ccfa org/weekly/v.'kly828 htm. tends to focus on decision making. 'Process describes the sequences of activi-
9. Ibid. ties and the expertise needed to produce the results or outcome. Babson Col-
10. John E. Cribbet. Principles of the Law of Properly (New York. Foundation Press, 1975). lege professor Liam Fahey, in his assessment of organizational infrastructure,
11. Ibid
describes four perspectives; structure, systems, people, and decision-making
12. Jamshid Gharajedaghi, Systems Thinking: Managing Oiaoi and Complexity (Boston: Bulterworth-
Hememann, 1999), 49. processes.1 Whatever their names, all three perspectives (or four, following
13. Ibid., 48. Fahey's example) need to be considered.
For the analyst, one goal of organizational analysis is to understand the
strengths and weaknesses of the target organization. Another goal is predictive:
to forewarn of change in the target organization's structure, function, or process
due to changing forces. Policy-oriented customers can use the analysis in plan-
ning strategy; operations units can use it to adversely affect the target, possibly
with information warfare. Depending on the goal, an analyst may need to assess
227
ittirteen Organizational Analysis 229
the organization's mission, its power distribution, its human resources, and its enue than the previous increment did. As rates rise even higher, revenue actu-
decision-making processes. The analyst might ask questions such as. Where is ally begins to drop, as taxation drives people away from the activity being taxed.
control exercised? Which elements provide support services? Are their roles This curve has a similar application for organizations. For organizations
changing? Network analysis tools, discussed later in this chapter, are valuable the vertical axis would be mission effectiveness, and the horizontal axis would
for this son of organizational analysis. describe how well the organizational structure is matched to its mission and
An analyst identifies vulnerable points in the target organization so that environment. The organization must have a mission that it can accomplish but
intelligence customers the decision makers can select the appropriate tar- which is not too narrowly defined. If the organization's size and capabilities are
get to act on, that is, to identify where perception management or coercive inadequate for the mission and environment (the left side of the graph in Fig-
techniques would be most effective. For example, the analyst's customers may- ure 13-1) the result is frustration and loss of focus. A mission that is too nar-
want to know when and how to convey to the opponent that it can expect rowly defined for organizational size and capabilities can result in stagnation
strong retaliatory actions if it behaves in a certain way. and loss of opportunities, or worse.
Network Analysis
Network analysis, sometimes referred to as relationship analysis, is a well-
developed discipline for analyzing organizational structure. The traditional hi-
erarchical description of an organizational structure does not sufficiently dis-
Tax rate tinguish entities and their relationships. Social network analysis, in which all of
inmeen
Organizational Analysis 231
Figure 13-2 Social Network Analysis Diagram can comprise few or many actors and many kinds of relations between pairs
of actors. To build a useful understanding of a social network, a complete and
(Actor) rigorous description of a pattern of social relationships is a necessary starting
Relationship point for analysis. Ideally, we should know about all of the relationships be-
tween each pair of actors in the population.
We prefer to use mathematical and graphical techniques in social network
analysis to represent the descriptions of networks compactly and systemati-
cally. This also enables us to use computers to store and manipulate the infor-
mation quickly and more accurately than we could by hand. Suppose we had
information about trade flows of fifty different commodities (coffee, sugar, tea,
copper, bauxite, and so on) among 170 or so nations during a given year. The
170 nations can be thought of as nodes, and the amount of each commodity
exported from each nation to each of the other 169 can be thought of as the
strength of a direct tie from the focal nation to the other. An intelligence ana-
lyst might be interested in how the networks of trade in mineral products dif-
fer from networks of trade in vegetable products. To answer this fairly simple
(but important) question, a huge amount of data manipulation is necessary It
could take years to do by hand; a computer can do it in a few minutes.
Another reason for using "formal" methods (mathematics and graphs) for
representing social network data is that the techniques of graphing and the
rules of mathematics themselves suggest things that we might look for in our
datathings that might not have occurred to us if we presented our data using
Note: The letter A marks [he node whose removal will have the greatest effect on the network.
descriptions in words. It is fairly easy to see, in Figure 13-2, that taking out
node A will have the most impact on the network. It might not be so obvious
if all the relationships were described textually.
the network nodes are persons, is widely used in the social sciences, especially Several analytic concepts come along with social network analysis, and
in studies of organizational behavior. In intelligence we more frequently use they also apply to generalized network analysis. The most useful concepts
generalized network analysis, in which the nodes can be persons, organizations, are centrality and equivalence. These are used today in the analysis of intelli-
places, or things. The Abacha funds-laundering network in chapter 5 (Figure gence problems related to terrorism, arms networks, and illegal narcotics
5-9) illustrates the need to include entities such as banks, airlines, and bank organizations.
accounts as nodes. However, the basic techniques of social network analysis Centrality refers to the sources and distribution of power in a social struc-
apply to generalized network analysis as well.
ture. The network perspective suggests that the power of individual actors
Network analysis has been used for years in the U.S. intelligence commu- arises from their relations with othere. Whole social structures may be seen as
nity for targets such as terrorist groups and narcotics traffickers and is becom- displaying high levels or low levels of power, as a result of variations in the pat-
ing increasingly important in business intelligence. As Fahey notes, competi- terns of lies among actors. Furthermore, the degree of inequality or concen-
tion in many industries is now as much competition between networked tration of power in an organization and among organizations can be estimated.
enterprises (companies such as Cisco and Wal-Mart that have created collab- Power arises from occupying advantageous positions in social networks.
orative business networks) as it is between individual, stand-alone firms.* The An actor's position in the network tells us much about the extent to which that
Netwar model of multidimensional conflict between opposing networks is actor may be constrained by, or may constrain, others. The extent to which an
more and more applicable to all intelligence, and network analysis is our tool actor can reach others in the network may be useful in describing the actor's
for examining the opposing network.
opportunities. Three basic sources of advantage are high degree, high closeness,
Social Network Analysis. A social network is a set of individuals, referred and high betweenness.
to as actors (shown graphically as nodes on Figure 13-2), that are connected The more ties an actor has to other actors, the more power (the higher de-
by some form of relationship (shown as lines on Figure 13-2). Such networks gree) that actor has. In Figure 13-3, actor A has degree five (ties to five other
232 Chapter Thirteen 233
Figure 13-3 Social Network Analysis gree of network centrality of the individuals removed will determine the ex-
A Star Network tent to which their removal impedes continued operation of the activity Thus,
centrality is an important ingredient (but by no means the only one) in con-
sidering the identification of network vulnerabilities.
The second analytic concept that accompanies social network analysis is
equivalence. The disruptive effectiveness of removing one individual or set of
individuals from a network (for example, by making an arrest or by hinng a
Actor key executive away from a business competitor) depends not only on their
centrality, but also on some notion of their uniqueness, that is, on whether or
not they have equivalents. The notion of equivalence is useful for strategic tar-
geting and is closely tied to the concept of centrality. If nodes in the social net-
work have a unique role (no equivalents), they will be harder to replace. The
most valuable targets are both central and without equivalents.
Network analysis literature offers a variety of conceptions of equivalence.
Three in particular are quite distinct and seem to capture among them most of
the important ideas on the subject. They are substitutdbility, stochastic equiva-
lence, and role equivalence. Each can be important in specific analysis and tar-
actors); all other actors have degree one (ties to just one other actor). Actor A's geting applications.
high degree gives him more opportunities and alternatives than other actors in Substitulability is easiest to understand; it could best be described as "in-
the network. If actor D elects to not provide A with a resource, A has other terchangeability" Two objects or persons in a category are substitutable if they
places to go to get it: but if D elects to not exchange with A, then D will not have identical relationships with ever)' other object in the category If a target
be able to exchange at all. Actors who have more ties have greater opportuni- individual has no substitute, then his removal will cause more damage to the
ties because they have choices. That autonomy makes them less dependent operation of the network than if a substitute exists. If another individual can
and hence more powerful. take over the same role and already has the same connections, then to damage
The second reason why actor A is more powerful than the others in the the network one would need to remove or incapacitate not only the target in-
"star network" depicted in Figure 13-3 is that actor A is closer (high closeness) dividual but all other substitutable individuals as well. Individuals who have
to more actors than any other actor. Power can be exerted by direct bargain- no available network substitutes make more worthwhile targets.
ing and exchange, but power also comes from being a center of attention Substitutability also has relevance to detecting the use of aliases. The use
whose views are heard by more actors. Actors who are able to reach other ac- of an alias by a criminal might show up in a network analysis as the presence
tors by shorter paths, or who are more reachable by other actors by shorter of two or more substitutable individuals (who are in reality the same person,
paths, have favored positions. Such a structural advantage can be translated with an alias). The interchange ability of the nodes actually indicates the inter-
into power. changeability of the names.
The third reason that actor A is advantaged is that he lies between all other Stochastic equivalence is a slightly more sophisticated idea. Two network
pairs of actors (high betweenness), and no other actors lie between A and nodes are stochastically equivalent if the probabilities of their being linked to
other actors. If A wants to contact F, A may do so directly. If F wants to con- any other particular node are the same. Narcotics dealers working for one dis-
tact B, she must do so by way of A. This gives actor A the capacity to broker tribution organization could be seen as stochastically equivalent if they, as a
contacts among other actorsto extract "service charges" and to isolate actors group, all knew roughly 70 percent of the group, did not mix with dealers
or prevent contacts. from any other organizations, and all received their narcotics from one source
In simple structures such as the star, the advantages all tend to accrue to Role equivalence means that two individuals play the same role in different
one actor. In more complex and larger networks, an actor may be located in a organizations, even if they have no common acquaintances at all. Substi-
position that is advantageous in some ways and disadvantageous in others. tutability implies role equivalence, but not the converse. For example, the chief
Let us look at a terrorist network to illustrate the concept of centrality. In financial officer (CFO) of company A can be mapped onto the CFO of com-
seeking to disrupt terrorists, one obvious approach is to identify the central pany B, if companies A and B are similar enough (the two CFOs have similar
players and then target them for assessment, surveillance, or removal. The de- roles and responsibilities). Or an explosives expert in terrorist group A can be
234 Chapter Thirteen Organizational Analysis
mapped onto a biological weapons expert in terrorist group B, if group A spe- As implemented in software, generalized network analysis tools have to
cializes in use of explosives against its target and group B specializes in use of convey dynamic information to be of the most value to intelligence analysts.
biological terrorism. Stochastic equivalence and role equivalence are useful in That is, links should appear and disappear, expand or contract in size, change
creating generic models of target organizations and in targeting by analogy intensity, change color, all to convey additional information to the user. Nodes
for example, the explosives expert is analogous to the biological weapons ex- should move up or down, closer or farther away (or have size changes) on the
pert in planning collection, analyzing terrorist groups, or attacking them. display to indicate importance.
Generalized Network Analysis. As we said above, in intelligence work we
usually apply an extension of social network analysis that retains its basic con- Function
cepts. But whereas all of the entities in social network analysis are people, in Functional analysis of an organization tends to focus on behavioral analy-
generalized network analysis they can be anythingorganizations, places, and sis, specifically on predicting decisions. The purpose of behavioral analysis is
objects, for example. In charting out a generalized network diagram for a ter- always predictive: How will the target react to a given situation? In all behav-
rorist organization, it will be important to include associated organizations, ioral analysis, but especially in decision prediction, three aspects of the deci-
weapons, locations, and means of conducting terrorist activities (vehicles, sion process have to be consideredrational, cultural, and emotional.7
types of explosives). The purpose of such generalized network displays is usu-
ally to reveal such things as the patterns of operations, likely future targets, Rational Aspect
and weaponry. Generalized network analysis thereby includes some aspects of Wharton business school professor Russell Ackoff, in his entertaining
functional analysis and process analysis. book The Art of Problem Solving: Acfeojfs Fables, tells the story of a household
In intelligence, generalized network analysis tends to focus on networks appliance manager who claimed that consumers are often irrational. The man-
in which the nodes are organizations or people within organizations. Fahey ager cited the example of an improved dishwasher that had been poorly re-
has described several such networks and denned five principal types: ceived, whereas new cooktops and ovens that offered no new features and
Vertical networks: ones organized across the value chain; for exam- were more expensive had been very successful. Ackoff and the manager agreed
ple, 3M Corporation activities go from mining raw materials to de- to an experimentthey would put the failed products on one side of a room,
livering finished products. the successes on the other, and the two would tour the room together with a
Technology networks: alliances with technology sources that allow a fresh eye. Within a minute after entering the room, the manager retracted his
firm to maintain technological superiority, such as the Cisco Sys- assertion about consumer irrationality. He saw that consumers could use all of
tems network. the successful appliances without bending or climbing, but all of the failed
products required bending or climbing.3
Development networks: alliances focused on developing new prod- The opponent is seldom irrational, and consumers are almost never irra-
ucts or processes, such as the multimedia entertainment venture
tional, but both are often misunderstood. Rational decision making is broadly
Dream-works SKG.
defined as a logical and normally quantitative procedure for thinking about
Ownership networks: as when a dominant firm owns pan or all of difficult problems. Stated formally, rational decision making requires the sys-
its suppliers, as do the Japanese keiretsu. tematic evaluation of costs or benefits accruing to courses of action that might
Political networks: those focused on political or regulatory gains be taken. It entails identifying the Choices involved, assigning values (costs and
for their members, for example the National Association of Manu- benefits) to possible outcomes, and expressing the probability of those out-
facturers.5 comes' being realized.
Predictive intelligence analysis often attempts to identify the option that
Hybrids of the five are possible, and in some cultures, such as the Middle a decision maker is most likely to select in a given situation. The approach is
East and East Asia, family can be the basis for a type of hybrid business network. based on the assumption that decisions are made on an explicit or implicit cost-
Generalized network analysis may become one of the principal tools for benefit analysis, also known as "expected utility theory." The theory's origins are
dealing with complex systems, thanks to the new, computer-based analytical in the study of economic decision making and behavior, notably in the work of
methods. Prospects include future systems that can learn from the analysts and John von Neumann and Oskar Morgenstem.9 The theory views decision making
create models from data. But any system that purports to organize massive as behavior that maximizes utility. An individual faced with a decision will, con-
amounts of data will produce many false alarms. The analyst still will have to sciously or subconsciously, identify the available options, the possible outcomes
do cognitive correlation and evaluate sources.6 associated with each option, the utility of each option/outcome combination,
236 Chapter Thirteen Organizational Analysis 237
and the probability that each option/outcome combination will occur. The deci- timing and workday length. Furthermore, major increases in worker morale
sion maker will then choose an option that is likely to yield, in his or her own and health, along with decreases in absenteeism, were observed throughout the
terms, the highest overall utility. test period.11
Rational decision prediction, based on expected utility theory, is the place The Hawthorne Experiment became a management science classic be-
to scan any predictive analysis, but it is not the end point. In chapter 7 we in- cause of the insights it gave into motivating workers. For our purposes, the im-
troduced R.V Jones's "principles of impotence"a false assumption that a portant point is that the workers knew they were being measured and thus
particular problem is unsolvable. Principles of impotence have been applied in changed their behavior to affect the measurement. In short, the attempt to
intelligence to unnecessarily constrain thinking, but fundamental limits do measure changed the behavior being measured.
exist, and one applies both in physics and in the analogous field of behavioral The uncertainty principle has several applications in intelligence analysis.
analysis. In physics, we know it as Heisenberg's uncertainty principle, which In any analysis, the result tends to affect the entity being measured. The publi-
states that it is impossible to measure accurately both the velocity and the po- cation of economic trend predictions affects those trends. A broker's "strong
sition of a single elementary panicle. It is therefore impossible to predict with buy" rating on a stock causes people to buy the stock and the price to rise, mak-
certainty the movement of a single particle. The limitation occurs because the ing it a self-fulfilling prediction. As noted in chapter 10, intelligence predictions
act of measurement affects the object being measured. shape the future because both sides often act based on the predictions.
This principle applies to a wide range of phenomena in both the physical In summary, the utility theory (rational) approach is useful in decision
and the social sciences. Although physicists can predict the average behavior prediction but must be used with caution for two reasons: First, people will
of large groups of panicles, the behavior of any one particle, as Heisenberg seldom make the effort to find the optimum action in a decision problem. The
said, cannot be predicted with certainty. The analogy for human behavior is complexity of any realistic decision problem dissuades them. Instead, they se-
that it is possible to predict the behavior of groups of people (as political poll- lect a number of possible outcomes that would be "good enough." They then
sters know well) but not the behavior of an individual. choose a strategy or an action that is likely to achieve one of the good-enough
A second fundamental principle from Heisenberg has to do with feed- outcomes.12 Second, the social sciences version of the uncertainty principle
back. In chapter 12 we discussed feedback as a basic shaping force. It is also places limits on how well we can predict decisions based on rationality. To im-
a significant factor in decision prediction. Heisenberg's uncertainty principle prove the decision prediction, we have to include cultural and emotional fac-
says that the process of measurement alters the quantity being measured. In tors. They are the factors that often cause an opponent's decision to be labeled
other words, the more precisely you try to measure a phenomenon, the more "irrational."
you affect the result. When pollsters take a sample of public opinion, the ques-
tions they ask tend to alter the opinions of the group polled. A thermometer, Cultural Aspect
measuring the temperature of an object, alters that temperature slightly."1 At- A critical component of decision modeling is the prediction of a single
tempts to measure an employee's performance skew that employee's behavior. human's behavior, within the limitations of the uncertainty principle. And be-
The problem is one of unintentional feedback. In management theory, the havior cannot be predicted with any confidence without putting it in the
principle was perhaps first documented in the Hawthorne Experiment. actor's social and cultural context. An analyst needs to understand such ele-
In 1927 the Western Electric Company began an investigation into the ef- ments of a culture as how it trains its youth for adult roles and how it defines
fectiveness of lighting on the productivity of factory workers. Western Electnc what is important in life. In behavioral analysis, culture defines the ethical
chose its Hawthorne Works for the experiment. The test involved varying the norms of the collective that a decision maker belongs to. It dictates values and
illumination levels within the plant and observing the effect on production. constrains decisions.11 In general, culture is a constraining social or environ-
The researchers were surprised to observe that production increased whether mental force. Different cultures have different habits of thought, different val-
the lights were made brighter, dimmed, or left constant. Only by reducing the ues, and different motivations. Straight modeling of a decision-making process
lighting to levels approaching darkness could the researchers cause production without understanding this can lead the analyst into the "irrational behavior"
to drop. trap, as happened to U.S. and Japanese planners in 1941.
The researchers followed up with a more carefully designed study of the Before Japan attacked Pearl Harbor, both the United States and Japan
effects of rest periods and length of the work day. The study lasted five years, made exceptionally poor predictions about the other's decisions. Both sides in-
from 1927 to 1932. Again, the work teams whose performance was being mea- dulged in "mirror-imaging"that is, they acted as though the opponent would
sured steadily increased their production independent of changes in rest period use a "rational" decision-making process, as they defined "rational."
238 Chapter Thirteen
OrganizaKonal Analysis 239
U.S. planners reasoned that the superior military, economic, and industrial aniine the similarities to and differences from those of her own culture. To il-
strength of the United States would deter attack; Japan could not win a war
lustrate, let's try a guessing game. The following are some proverbs from dif-
against the United States, so a Japanese derision to attack would be irrational.1''
ferent cultures. Try to guess the culture or country of origin (the answers are
The Japanese also knew that a long-term war with the United States was in the endnotes):
not winnable because of the countries' disparity in industrial capacity But
Japan's leadership believed that a knockout blow at Pearl Harbor would en- Culture 1
courage the United States to seek a negotiated settlement in the Pacific and East Without bread and wine even love will pine.
Asia.15 To validate this assumption, the Japanese drew on their past experience: Better a good dinner than a fine coat.
A similar surprise attack on the Russian fleet at Port Arthur in 1904 had even- When the hostess is handsome the wine is good.15
tually resulted in the Japanese obtaining a favorable negotiated settlement. The
Japanese did not mirror-image the United States with themselves but with the Culture 2
Russians of 1904 and 1905. Japan believed that the U.S. government would be- Study others' advantages, and they will become your own.
have much as the tsanst government had. We learn little from victory, much from defeat.
Such errors in predicting an opponent's decision-making process are com- It is not wise to stay long when the husband is not at home.
mon when the analyst does not take cultural factors into account. Cultural dif- Proclaim by your deeds who your ancestors are.
ferences cause competitors not to make the "obvious" decision. Intelligence Women should associate with women.
A single arrow is easily broken, but not ten in a bundle.
analysts have to understand these different motivations, or they can be caught
Two birds of prey do not keep each other company.
in the sort of surprise that U.S. television manufacturers encountered during It is the nail that slicks out that is struck.20
the 1960s. At that time, all TV manufacturers foresaw a glut of TV sets on the
market. U.S. manufacturers responded by cutting back production, assuming Culture 3
that other manufacturers would follow suit, Japanese manufacturers, working The weapon of a woman is her tears.
on different assumptions (giving priority to capturing market share, instead of My brother and I against my cousin; my cousin and I against a stranger.
maintaining short-term profit) kept production up. As U.S. manufacturers' Be contrary and be known.
market share dropped, they found that their per-unit costs were rising, while He who reproduces does not die.
the Japanese per-unit costs were dropping through economies of scale. The We say, "It's a bull"; he says, "Milk it."!1
U.S. television industry never recovered.
Culture is too often ignored or downplayed in both organizational and be- Culture 4
havioral analysis. But history tells us that national declines are preceded by In war there can never be too much deception.
cultural declines.10 Of immediate concern to intelligence analysis, organiza- Sit atop the mountain and watch the tigers fight.
tional declines follow cultural declines. Culture has been described as repre- Life and shame are never equal to death and glory.
Kill the chicken to frighten the monkey
senting the heartbeat and lifeblood of an organization.17 Therefore, cultural
Fight only when you can win; move away when you cannot."
analysis should always be a part of both organizational analysis and behavioral
analysis. s
Culture 5
For most countries and ethnic groups, a considerable volume of material If you are sitting on his cart you must sing his song.
is available to aid in cultural analysis, thanks to the work of many cultural an- To live is either to beat or to be beaten."
thropologists worldwide. Liam Fahey, in his book Competitors, has described a
methodology for cultural analysis that highlights four elements of an organi- Organizations also have their own cultures, distinct from the national cul-
zational culture: values, beliefs, norms, and behaviors. Fahey provides an ex- ture; but only long-established companies are likely to have standard sayings
ample of the contrast in these four elements between a culture that is product that are the equivalent of proverbs, and many of them no longer define the cul-
or technology oriented and one that is customer or marketplace oriented.l8 But tureif they ever did. Finding the information needed to assess an organiza-
suppose that an analyst knows nothing about a country's culture and needs a tional culture can be difficult. Clues are sometimes available from unofficial
quick lesson. How would she start?
(that is, not sponsored by the company) Web sites that feature comments from
An informal but effective way to grasp quickly some elements of a culture ex-employees. Those sites have to be used with caution, however; they rarely
is to look at the culture's proverbs or "old wives' tales." The analyst should ex- present the positive side of the organizations culture.
Part of assessing the culture of an organization is assessing the people in ers traditionally have tended to stay with one company for a long time, though
ittheir attitudes or motivation, their educational background, and their the pattern may be changing in both countries.
commitment to the organization. It is in those features that countries and or-
ganizations vary markedly from their peers. Emotional Aspect
Some guidelines for assessing the motivations of the people in an organi- The final aspect of the decision process to consider when analyzing be-
zation were defined years ago by Professor A.H. Maslow and are widely known havior is the emotional aspect. We do many things because they are exciting
as the Maslow hierarchy of needs. Humans, according 10 this theory, have a or challenging. Russell Ackoff tells the story of a hand tool manufacturer
basic set of prioritized needs, and as each need in turn is satisfied, the next need whose executive team was eager to get into the business of manufacturing the
becomes predominant. The needs, in hierarchical order, are the following: (then) newly discovered transistornot because they knew what a transistor
was, but because they were bored with their existing business and wanted a
Physiological: food, shelter, the essentials of survival new challenge.16 Pnde and revenge are also motivators. Business leaders, gen-
erals, and even presidents of the United States make some decisions simply be-
Safety: freedom from physical danger
cause they want to pay back an opponent for past wrongs. The emotional as-
BelongLngness: friends and affection pect of behavioral prediction cannot be ignored, and personality profiling is
Esteem: self-respect and the esteem of others one way to grasp it.
Self-actualization: to "be all that you can be"24 Business intelligence analysts have developed a methodology for person-
ality profiling of competitors that is based on the lesson that personal idiosyn-
The effectiveness of organizations in developed countries depends on crasies and predisposition will have a greater bearing on an executive's deci-
their ability to meet the higher order needs in the hierarchy. In less developed sions than will a calculated assessment of resources and capabilities. The
countries, food, shelter, and safety may be the upper limit of employee expec- resulting profile is a model that can be used to assess likely decisions "
tations. Innovation, in particular, depends on satisfying the need of the inno- In evaluating the likely decision of an executive, it may help to apply the
vators for self-actualization. Myers-Briggs model discussed in chapter 5. A decision by one Myers-Briggs
Finally, all organizations have what is called a psychological contract with type will predictably be different from a decision made by another Myers-
their membersan unwritten agreement on the rules each side is expected to Briggs type. An executive who was the linebacker of the college football team
follow.25 People form bonds with organizations and develop expectations of will likely have a completely different decision-making style than an executive
how organizations should behave toward them. The strength of the employ- who was president of the chess club.2G
ees' commitment and the strength of the organizational culture depend on Collective Decision Making
how well the organization lives up to its half of the contract.
Educational background as a part of culture involves more than simply Very often a decision will be made by a group instead of by one person.
counting the number and levels of university degrees in the organization. Par- Such cases require a collective-decision prediction approach. It is somewhat
ticularly in comparing organizations in different countries, one important ed- easier to predict what a group will decide than to predict what an individual
ucational trade-off is that of breadth of knowledge versus depth of speciali- will decidewhich is not to say that it is easy. In such decision modeling, one
zation. Each has its advantages. Universities in countries such as Japan and must identify the decision makersoften the most difficult step of the
Russia tend to develop specialists who are highly trained in a field that is cur- processand then determine the likely decisions. The organization and man-
rently needed by industry. For example, each year Russia graduates large num- agement structures that make collective decisions vary from company to com-
bers of "engineers," hut a breakdown of specialties shows that many of them pany and from country to country.
are welding engineers or have some similarly narrow specialty In fact, most Some analytical tools and techniques can predict the likely outcome of
Russian engineers have no particular interests outside their specialty and are group decision making. These tools and techniques are based on the theories
remarkably inflexible, but they tend to be very good within their narrow spe- of social choice expounded by the Marquis de Condorcet, an eighteenth-
cialty. U.S. universities, in contrast, have tended to develop generalistspeo- century mathematician. He suggested that the prevailing alternative should be
ple who have a broad area of expertise, who tend to be more flexible and to the one that is preferred by a majority over each of the other choices in an ex-
draw on disciplines outside their primary field. The U.S. employment pattern haustive series of pairwise comparisons. Another technique is to start by draw-
tends to reinforce that flexibility; white-collar workers have high mobility and ing an influence diagram that shows the persons involved in the collective de-
change companies and fields easily. Japanese and Russian white-collar work- cision. Collective decisions tend to have more of the rational elements and less
Organizational Analysis 243
of the emotional. But unless the decision participants come from different cul- ability analysis, capacity planning, expansion capability determination, and
tures, the end decision will be no less cultural in nature.
quality control.
The collective decisions of an organization are usually formalized in its Linear programs are simply systems of linear equations or inequalities that
plans, especially its strategic plans. The best way to assess a strategic plan is to are solved in a manner that yields an optimum valuethe best way to allocate
identify, and then attempt to duplicate, the target organization's strategic plan- limited resources, for example.31 The optimum value is determined based on
ning process. If the analyst comes from the same culture as the target, that may some single goal statement (provided to the program in the form of what is
be relatively easy to do. If not, it may be necessary to hire some executives called a linear objective function). Linear programming is often used in intelli-
from that culture and have them attempt the duplication. The analyst also can gence for estimating production rates, although it is applicable in a wide range
order a collection operation to determine which strategic planning books the of disciplines.
target's planners have read or which approach they favor. Suppose that an analyst is trying to establish the maximum number of
Process tanks per day that a tank assembly plant can produce. Intelligence indicates
that the primary limits on tank production are the availability of skilled
The functions of an organization are carried out by processes. Different welders and the amount of electricity that can be supplied to the plant. These
types of organizationscivil government and law enforcement, military, and two limits are called constraints in linear programming. The plant produces
commercial organizationswill have markedly different processes. Even sim- two types of tanks:
ilar types of organizations will have different processes, especially in different
cultures. The processes that a terrorist organization such as al Qaeda uses are The T-76 requires 30 hours of welder time and 20 kilowatt-hours
quite different from those used by the Tamil Tigers of Sri Lanka. There are a of electricity per tank.
correspondingly large number of analytical techniques for analyzing processes,
The T-81 requires 40 hours of welder time and 5 kilowatt-hours of
many of which are industry specific. Analysts tend over time to develop process
electricity per tank.
methodologies that are unique to their area of responsibility. Political, military,
economic, and weapons systems analysts all use specialized process analysis
The plant has 100 kilowatt-hours of electricity and 410 hours of welder
techniques. Here we address a few that are widely used: operations research,
time available per day. The goal statement, or objective function, is to deter-
schedule, and cost. Chapter 14 discusses some process analysis techniques
that are specific to weapons systems analysis. mine the maximum possible number of tanks produced per day, where
Concept
demonstration
Schedule
total number of tanks produced. Anywhere on this dotted line, the total num- A new systemwhether a banking system, a weapons system., or com-
ber of tanks produced is a constant, which changes as the line is moved up puter softwaredevelops and evolves through a process commonly known as
and to the right, or down and to the left; we start the line at a total of fifteen the program cycle or system life cycle. Beginning with the system requirement
tanks produced, and move it down and left, as indicated by the large arrow, and progressing to production, deployment, and operations, each phase bears
until it touches a point that meets both constraints. This pointapproxi- unique indicators and opportunities for collection and synthesis/analysis. Cus-
mately eight T-81s and three T-76s, for a total of eleven tanksrepresents the tomers of intelligence want to know where a major system is in this life cycle.
optimal solution to the problem.
Each country, industry, or company has its own version of the program
Another operations research technique widely used in intelligence is net- cycle. Figure 13-5 illustrates the major components of a generic program
work analysis. We previously introduced the concept of network analysis as cycle. Different types of systems may evolve through different versions of the
applied to relationships among entities. Network analysis in an operations re- cycle, and product development differs somewhat from systems development
search sense is not the same. Rather, in this context networks are intercon- It is therefore important for the analyst first to determine the specific names
nected paths over which things move. The things can be automobiles (in and functions of the cycle phases for the target country, industry, or company
which case we are dealing with a network of roads), oil (with a pipeline sys- and then to determine exactly where the target program is in that cycle. With
tem), electricity (with wiring diagrams or circuits), information signals (with that information, analytic techniques can be used to predict when the program
communication systems), or people (with elevators or hallways). might become operational or begin producing output.
In intelligence against such networks, we frequently are concerned with It is important to know where a program is in the cycle to make accurate
such things as maximum diroughput of the system, the shortest (or cheapest) predictions. In assessing both Libya's and Iraq's WMD capabilities, analysts
route between two or more locations, or bottlenecks in the system. Network tended to take procurement actions as indicating that a weapons capability ex-
analysis is frequently used to identify the vulnerable points in a complex sys- istedthough the two occur at quite different phases in the program cycle. The
tem for attack or countermeasures,
tendency was partially a result of receiving a large volume of procurement-
related intelligence, possibly leading analysts to overestimate its importance.32
Figure 13-6 Brooks Curves for Projects Most small projects fit the curve shown at the lower left of the figure,
Time t Time t
which is a combination of the first two curves. In this case a project can be
partitioned into subtasks, but the time it takes for people working on different
Cotton picking Baby production
subtasks to communicate with one another will eventually balance out the
time saved by adding workers, and the curve levels off.
Large projects tend to be dominated by communication. At some point
shown as the bottom point of the lower right-hand curve in Figure 13-6
adding more workers begins to slow the project because all workers have to
Number of workers Number of workers spend more time in communication. The result is simply another form of the
familiar bathtub curve. Failure to recognize this pattern or to understand
Time Time t where a project is on the curve has been the ruin of many large projects. As
Brooks observed, adding workers to a late project makes it later.34
Small project Large project
Risk Analysis. Analysts too often assume that the programs and projects
they are evaluating will be completed on time and that the target system will
work perfectly They would seldom be so foolish in evaluating their own proj-
ects or the performance of their own organizations. Risk analysis needs to be
done in any assessment of a target program. It is typically difficult to do and,
Number of workers Number of workers once done, difficult to get the customer to accept. But it is important to do it
because intelligence customers, like many analysts, also tend to assume that an
A general rule of thumb is that the more phases in the program cycle, the opponent's program will be executed perfectly.
longer the process will take, all other things being equal. Countries and orga- One fairly simple but often overlooked approach to evaluating the proba-
nizations with large, stable bureaucracies typically have many phases, and the bility of success is to examine the success rate of similar ventures. In planning
process, whatever it may be, takes that much longer. the 1980 Iranian hostage rescue attempt, the Carter administration could have
Project or Program Loading. The duration of any stage of the cycle shown looked at the Vietnam prisoner of war rescue attempts, only 21 percent of
in Figure 13-5 is determined by the type of work involved and the number which succeeded. The Carter team did not study those cases, however, deem-
and expertise of workers assigned. Fred Brooks, one of the premier figures in ing them irrelevant, even though the Iranian mission was more complex."
computer systems development, denned four types of projects in his well- Similar miscalculations are made every day in the world of information tech-
known book The Mythical Man-Month.31 Each type of project has a unique re- nology. Most software projects fail. The failure rate is higher for large projects,
lationship between the number of workers needed (the project loading) and although the failures typically are covered up.
the time it takes to complete the effort. Risk analysis, along with the project-loading review discussed above, is a
The graph at the upper left of Figure 13-6 shows the time-labor profile common tool for predicting the likely success of programs. Risk analysis is an
for a perfectly partitionable taskthat is, one that can be completed in half iterative process in which an analyst identifies and prioritizes risks associated
the time by doubling the number of workers. It is referred to as the "cotton- with a program, assesses the effects of the nsks, and then identifies alternative
picking curve"; twice as many workers can pick a cotton field in half the time. actions to reduce the risks. Known risk areas can be readily identified from
Few projects fit this mold, but it is a common misperception of management past experience and from discussions with technical experts who have been
that people and time are interchangeable on any given project, such that a proj- through similar projects. The risks fall into four major categories for a pro-
ect done in ten months by one person could be completed in one month by gramprogrammatic, technical, production, and engineering. Analyzing po-
ten. Brooks notes that that is the dangerous and deceptive myth that gave his tential problems requires identifying specific potential risks from each cate-
book its title, gory, such as the following:
A second type of project involves the unpartitionable task, and its profile
is shown at the upper right of Figure 13-6. The profile is referred to here as Programmatic: funding, schedule, contract relationships, political
the "baby production curve" because no matter how many women are as- issues
signed to the task, it takes nine months to produce a baby. Technical: feasibility, survivability, system performance
Organizattonal Analysis 249
Production: manufacturability, lead times, packaging, equipment
Engineering: reliability, maintainability, training, operations
Figure 13-7 Cost-Utility Graph
Risk assessment assesses risks quantitatively and ranks them to establish Benefit
or utility
those of most concern. A typical ranking is based on the risk factor, which is a
mathematical combination of the probability of failure and the consequence of
failure. Such an assessment requires a combination of expertise and software
tools, in a structured and consistent approach to ensure that all risk categories
are considered and ranked.
Risk management is the definition of alternative actions to minimize risk
arid criteria on which to initiate or terminate the activities. It includes identi-
fying alternatives, options, and approaches to mitigation. Examples are ini-
tiation of parallel developments (for example, funding two manufacturers to
build a satellite when only one satellite is needed), extensive development test-
ing, addition of simulations to check performance predictions, design reviews
by consultants, or focusing management attention on specific elements of the
program. A number of decision analysis tools are useful for risk management.
The most widely used tool is the Program Evaluation and Renew Technique
(PERT) chart, which shows the interrelationships and dependencies among
tasks in a program on a time line.
Cost
Risk management is of less concern to the intelligence analyst than risk as-
sessment; but one factor m evaluating the likelihood of a program failure is Note: X = Alternative
how well the target organization can assess and manage its program risks.
Cost
tary's decision whether to produce a new weapons system, it is a useful place
Estimating the cost of a system is usually a matter of comparative model- to start. But the analyst must be sure to take "rationality" into account. As
ing. You start with an estimate of what it would cost your organization or an noted earlier, what is "rational" differs across cultures and from one individual
industry in your country to build something. You multiply that number by a to the next. It is important for the analyst to understand the logic of the deci-
factor that accounts for the difference in the costs to the target organization sion maker, that is, how the opposing decision maker thinks about topics such
(and they will always be different). The result is a fairly straightforward cost as cost and utility. The Chinese decision to have a manned space program can
estimate that is only as good as your understanding of the differences in the be subjected to cost-utility analysis, but doing so illustrates the pitfalls. Hard-
ways the two firms build a system. There is much room for error in this un- ware and launch costs can be estimated fairly well. Utility is measurable to
derstanding, especially when the two firms are located in different countries. some extentby most standards, it is low. The benefits in prestige and ad-
Another way is to start by applying the problem breakdown methodology vancements in Chinese space technology have to be quantified subjectively
of chapter 2 to the system, breaking it down into its component pans. Then but probably were dominant in the decision-ma king process.
produce estimates for building each, component of the system and for each In performing cost-utility analysis, the analyst must match cost figures to
phase of the system development process shown in Figure 13-5. In more so- the same time horizon over which utility is being assessed. This will be a dif-
phisticated versions of this approach, the analyst can run multiple simulations ficult task if the horizon is more than a few years away. Life cycle cost should
of each component cost, in effect "building" the system on a computer re- be considered for new systems, and most new systems have life cycles in the
peated times to get a most likely cost. tens of years.
When several alternative system models are being considered, cost-utility Perhaps the most widely used approach to cost-utility analysis of com-
analysis may be necessary Cost-utility analysis is an important part of decision peting alternatives is to simply create a graph in which cost and utility are the
prediction. Many decision-making processes, especially ones that require re- two axes. An example of such a graph is shown in Figure 13-7. The Xs in the
source allocation, make use of cost-utility analysis. In assessing a foreign mili- graph represent the alternatives being considered. Each alternative has a util-
ity and a cost, and they determine its place on the graph. The alternatives that
lie high and to the left (low cost, high utility) generally form a curve known as
Organizational Analysis 251
the Pareio frontier. The optimal choices lie along this frontier, although as the
curve levels out, utility increases only at higher and higher costs. 6. See Defense Advanced Research Projects Agency, "DARPA Evidence Extraction and Link Dis-
covery Pamphlet," www.darpa.mil/iso2/EELD/BAA01-27PlPhtm, November 22, 2002
The total set of options usually group into a roughly oval shape, as shown 7. Jamshid Gharajetlaghi, Systems Thinking Managing Chan*, anil Complexity (Boston Buiter-
in Figure 13-7. This oval is often referred to as the "football" in cost-utility worth-Heinemann, 1999), 34
analyses. All of the options lying on the interior of the football are subopti- 8. Russell Ackoff, The An of Problem Solving (New York: John Wiley and Sons, 1978), 62.
mum choices, compared with those lying on the Pareto frontier. 9 Oskar Morgenstem and John von Neumann, Theory of Games and EiOnarnu. Behavior (Prince-
ton: Princeton University Press, 1980)
Summary 10. M.R. Wehr andJ.A Richards, Physics of the Atom (Boston1 Addison-Wesley, I960), 199.
11. Ralph M. Barnes, Mohan and Time Study: Design and Measurement of Wink (New \ork' Wiley,
To analyze an organization, examine its structure, function, and process. 1968), 662-663.
The result should be a series of models, usually in scenario form, that describe 12. David W Miller and Mann K. Starr, Executive Decisions and Operations Research (Englewood
likely future states of [he structure, function, and process to track the indica- Cliffs. NJ.. Prentice-Hall, 1961), 45-47.
tors of organizational change- 13. Gharajedaghi, Systems Thinking, 35.
14. Harold P Ford, Ettimative Intelligence (Lanham, Md.. University Press of America, 1993), 17.
Within the organizational structure, relationship analysis usually is of 15. Ibid., 29.
most intelligence interest. Structural position confers power. A powerful indi- 16. Gharajedaghi, Systems Thinking, 174.
vidual has high centrality, meaning high degree (many ties to other members), 17 Fahey, Competitors, 444.
18. ibid., 419
high closeness (being close to many other members), and high betweenness
19. The proverbs are French. Wolfgang Mieder, Illuminating Wit. Inspiring Wisdom (Englewood
(being the only connection between members). Another important measure of Cliffs, NJ.: Prentice Had, 1Q98).
individuals in an organization is their uniqueness, that is, whether or not they 20. The proverbs arejapanese. Guy A. Zona, Even Withered Trees Give Prosperity to the Mountain
have equivalents. (New York: Touchstone, 1996)
Functional analysis tends to focus on behavior, specifically the decision- 21. The proverbs are Arabic. The last one, "We say, 'It's a bull'; he says, 'Milk it,'" is another way
making process. Decision making has three aspectsrational, emotional, and of saying, "Don't confuse me with the facts." Pnmrose Amander and Ashkhain Skipwith, The
Son of a Duck !< a Floater (London: Stacey International, 1985).
cultural, with the cultural probably being the dominant aspect.
22 The proverbs are Chinese. The second one, "Sit atop the mountain and watch the tigers light,"
Many process analysis techniques exist, and they vary by organization means, "Watch two opponents contend and hope that they will eliminate each other." The
type and across cultures. Operations research techniques are useful for many fourth one, "Kill the chicken to frighten the monkey,' means "Punish the less-important to
types of process analysis. Linear programming is used to establish optimum warn the real culprit." Theodora Lau, Best Loved Chinese Proverbs (New York. HarperCollins,
1995).
values for a process. Network analysis is used to define flows and vulnerable
2.3 The proverbs are Russian. Mieder, Illuminating Wu, 32, 135.
points within a physical network, such as a communications or transportation 24 A.H Maslow, "A Theory of Human Motivation," in Psychological Review 50 (194.3). 370-396.
network. Intelligence also is commonly interested in measuring programs' 25. Harry Levinson, Psychological Man (Cambridge, Mass.: The Lcvinson Institute. 1976), 90.
probabilities of success. Comparative analysis and risk analysis are frequently 26. Ackoff, The Art of Problem Solving, 22
used to measure those probabilities. Cost-utility analysis is often used to sup- 27. Walter D Barndljr, User-Directed Competitive Intelligence (Westport, Conn. Quorum Books,
1984), 78, 93.
port predictions about an opponent's program decisions. Most leaders go
28 Comment by Michael Pitcher, nee president ofi2Go.com. in Competitive Intelligence Magazine,
through some form of cost-utility analysts in making major decisions; the trick 3 (July-September 2000): 9.
is to apply the proper cultural and individual biases to both cost and utility 29. Brian McCue, V-Boats in the Bay of Biscay (Washington, D C : National Defense University
What appears to be a high cost in the analyst's culture can appear to be very Press, 1990) "
modest in the target's culture. 30. TheodoreJ Gordon and MJ. Raffensperger. "The Relevance Tree Method for Planning Basic
Research," in A Practical Guide to Technological Forecasting, ed. James R Bright and Milton E
Organizational analysis is almost always a significant force to consider in
F Schoeman (Englewood Cliffs, NJ.: Prentice-Hall, 1973), 129.
predicting the development or use of a technology, and we return to it in the 31 The two sides of an equation are connected by an "equals" or "=" sign. The two sides of an
next chapter,
inequality are connected by an inequality sign, such as ''is less than (<)'' or '"is equal LO or less
than (s) "
Notes
32. Report of the Commission on the Intelligence Capabilities of the United States Regarding Weapons of
1. Liam Fahey. Competitors (New York' John Wiley and Sons, 1999), 403. Mass Destruction, March 31. 2005. wwwwmd guv/reportAvmd_reporl.pdf; p.261
2. The curve 15 named after Professor An Laffer, an adviser to President Reagan in the 19805. 33. Ibid., 16-19.
3. Antony Jay, Management and Machtavetli (London- Bantam, 1967), 67 34. Frederick P Brooks jr., The Mythical Man-Month (Reading, Mass Addison-Wesley, 1975),
4 Fahey, Competitors, 237. 16-25.
5 Ibid , 238. 35 Hossem Askari, "It's Time to Make Peace with Iran," Harvard Business Revieu; September-
October 1993, 13.
nology involved in the project eventually appears somewhere in the open lit-
erature; scientists and technologists want to publish their results, usually for
reasons of professional reputation. This rule holds true even with respect to
targets that heavily censor their open publications; one merely has to know
where to look. For example, a collector can trace even the most sensitive U.S.
14 defense or intelligence system developments simply by following the right ar-
ticles over an extended period of time in journals such as Aviation Week and
Space Technology.
Technology Assessment The key to using open source material in technical intelligence is identi-
fying and analyzing the relationships among programs, persons, technologies,
and Systems Analysis and organizations, and that depends on extensive use of relationship or net-
work analysis (chapter 13).
Technology helps shape intelligence predictions and is the object of pre-
A weapon has no loyalty but to the one who wields it. dictions. The three general types of technology predictions have to do with the
Ancient Chinese proverb following;
252
Chapter Fourteen Technology Assessment and Systems Analysis 255
publications now routinely track citation counts and publish citation analysis Figure H-l S Curve for Technology Development
results.
A technology assessment methodology must correctly characterize the Performance'
performance of the technology; that is, it must use the correct measures of per-
formance. For example, one useful measure of high-power microwave tube
technology is average power as a function of frequency. Second, the method-
ology must identify the critical supponing technologies (forces) thai can make
a difference in the target technology's performance. Third, it must allow com-
parison of like developments; it is misleading, for example, to compare the
performance of a one-of-a-kind laboratory device with the performance of a Full production
product ion-line component or system. Finally, the methodology must take
time into accountthe time frame for development in the country or organi-
zation of interest, not another country's or organizations time framesince the Production prototype
methodology requires a projection into the future. Item fabrication
A five-stage, generic target model has been used for describing the devel- Basic research
opment of a technology or product. It is commonly used to predict future de- Time
velopment of a technology The five stages of technology growth are often rep-
resented on the S curve introduced in chapter 5. The technology has a slow
start, followed by rapid growth and, ultimately, maturity, wherein additional
performance improvements are slight.4 The vertical axis of the curve can rep- solution to a particular problem, and the absence of fundamental laws pro-
resent many things, including the performance of the technology according to hibiting such advance.5 If those criteria have been met, one looks for an inno-
some standard, or its popularity or the extent of its use. vative development using the techniques described in this section.
Transitions between stages are difficult to establish because there is a nat- Innovation is a divergent, not a convergent, phenomenon; no body of ev-
ural overlap and blending between stages. The scheme provides for develop- idence builds up to an inevitable innovation in a technical field. Predicting in-
ment milestones that can be measured based on how much or how little has novation is an art rather than a science. As noted earlier, the U.S. intelligence
been published on the research involved in the technology community long ago gave up trying to predict a divergent act such as a coup,
In the S curve in Figure 14-1, which shows the progress of a technology for good reasons.6 When we attempt to predict innovation, we are trying to
through the five stages of its lifetime, the vertical axis represents the number predict a breakthrough, which is of the same nature as a coup. A breakthrough
of patents or publications about the technology. Another type of S curve mea- is a discontinuity in the S curve of technology development. We cannot pre-
sures the performance improvement of the technology at some stage of its de- dict when an innovation will happen, but we can determine when conditions
velopment, generally at the fourth (production) stage, though it can be drawn are right for it, and we can recognize when it starts to develop.
for all stages simultaneously. The horizontal axis for both curves is time. A Because technology development follows the 5 curve, we have some pros-
technology is available for industrial use when it reaches the steepest slope on pects for success. Guidelines based on past experiences with innovation can
the S curve, as Figure 14-1 illustrates. In this region, the technology is a "hot" sometimes help predict who will produce an innovation. We say sometimes be-
item and is being widely publicized. cause innovation often comes from a completely unexpected source, as noted
When the S curve for technology use flattens, the technology is mature, below. Finally, standard evidence-gathering and synthesis/analysis techniques
and only incremental performance improvements are possible. Generally, at can help determine what the innovation will be, but only very late in the
this point, the technology has reached some fundamental limit defined by process.
physical laws. Incremental improvements may flow from clever design tech- Predicting the Timing of Innovation. Predicting when the timing is nght
niques, increases in scale size, or improvements in materials, but the changes for innovation in a technology is a matter of drawing the S curve of perfor-
will bring only modest improvements in the technology's performance. mance versus time for the technology. When the curve reaches the saturation
level and flattens out, the timing is right. The replacement technology normally
Predicting Innovation will start to take over sometime after that point and will eventually reach a
The general nature of advances in any field of technology can be foreseen higher level of performance. It will not necessarily start at a higher level. Over
through the use of such cntena as current activity in the field, the need for a time in a given field, we obtain a series of S curves on one graph. In each case
Technology Assessment and Systems Analysis 257
years, the Soviets would admit that "Lysenkoism" set back their effort in genet- ing to prove that the transistor would work. As Thurow so clearly puts it,
ics by about twelve years. "There were five companies in America that made vacuum tubes and not a sin-
Intelligence analysts sometimes looked on the Lysenko affair as an aber- gle one of them ever successfully made transistors or semiconductor chips.
ration. It was in fact a fairly accurate picture of the research environment of They could not adjust to the new realities." If GE had spun off a new company
the USSR. Although there were no more cases as dramatic as Lysenko's, the based solely on the viability of the transistor, then GE might now have all the
contamination of Lysenkoism spread to many other scientific fields in the patents and Nobel prizes and revenues from the transistor that Bell enjoyed.
USSR during the 1930s and 1940s. Restrictions on freedom to innovate con- More important, GE would also have been in a better position to benefit from
tributed substantially to the USSR's economic decline. Most of the restrictions the revolution in miniaturization that came with the introduction of the tran-
stemmed from two phenomenathe risk aversion that is common to most sistor. Instead, GE ended up having to buy transistors and semiconductors
large, established organizations and the constraints of central economic plan- from suppliers.7
ning that are unique to state-ran economies such as that of the USSR. The lesson of these examples for the analyst is this: In evaluating the abil-
The Soviet Union was organized for central economic planning, and meet- ity of an organization or a country to develop a new technology, look at the
ing the plan had first priority. That gave Soviet industries a powerful incentive culture. Is it a risk-accepting or risk-averse culture? Does it place a high pri-
to continue their established lines. Inertial forces, discussed in chapter 12, ority on protecting its current product line? What political, economic, organi-
dominated. If current production declined, a plant manager would strip his re- zational, or social constraints does the organization place on development of
search and development organization to maintain production. Furthermore, technology?
central planning seems inevitably to imply short supplies. Supplies would be-
come even shorter if a plan manager attempted to innovate, and new types of Technology Vse, Transfer, and Diffusion
supplies needed for innovation wouldn't be available at all. The Soviet plant Use. In tracking a technology that may have military use, analysts use a
that needed something out of the ordinarya special type of test instrument, generic target model called the bathtub curvea time-versus-visibility curve
for examplehad to build the device itself at a high cost in resources. shaped like a bathtub. The basic research on a technology is usually visible, as
Moreover, Soviet management subscribed, at least in principle, to Marx's scientists and engineers need to communicate their findings. As this research
labor theory of value, in which if one device takes twice as much labor to pro- is applied to a military system or moves toward production, the work becomes
duce as another, it should command twice the price. Such theories provide a more secret and disappears from publication (the bottom of the "bathtub"). Fi-
powerful deterrent to both innovation and automation. nally, as a weapons system emerges from the research and development stage
In sum, the Soviet industrial structure provided severe penalties for risk and enters testing, the program becomes visible again.
taking if a project failed. It provided little reward if the project succeeded, and Keeping track of a technology on the bathtub curve requires skillful use
it provided no special penalty for doing nothing. This set of pressures often led of a combination of open literature and classified sources. The technique has
the Soviet or East European plant manager to an interesting response when he enabled analysts to determine the capabilities of a technology and the time
was required to start a new project: Because there were no rewards for success, phases of technical developments and innovations even when the program
and severe penalties for failure, the manager would choose an expendable was at the bottom of the "bathtub."
workerusually someone who was due to retire shortlyand place him in Patents are a valuable source for determining what use is being made of a
charge of the project. When the project failed-and the cards were always technology. There are several guidelines for working with patents:
stacked against itthe plant manager could blame his carefully prepared
scapegoat and fire or retire him. Obtain the names of all coauthors and any institutional affiliations
A poor innovation climate has on occasion adversely affected U.S. firms. in a patent. In sifting through the great volume of patents, the first
General Electric (GE), in its race with Bell Laboratories to invent the transis- search an experienced open literature analyst usually makes is of
tor, paid dearly for the inenial constraint of dependence on familiar technol- names or institutions; this preliminary screening allows relevant
ogy. As Lester Thurow described in his article "Brainpower and the Future of work to be identified. The second screening is on the specific tech-
Capitalism," Bell Laboratories developed the transistor exactly one day ahead nology discussed in the patent.
of GE. The reason that Bell was able to trump GE, in spite of GE's large tech- Abstracts are useful for screening and identifying patents of inter-
nological edge in the field, was that GE gave the job of testing the transistor to est, but the full text is essential for technology evaluation. The full
its vacuum tube engineers, who spent three years trying to prove that the tran- text also may contain indicators that a patent is of interest to the
sistor would not work. Bell Laboratories, on the other hand, spent its time try- military or to a particular company
Chapter fourteen
icarnotogy Amumm mmpwems tvwysu
Some patent literature describes patented devices that have been the new technology and the high costs of converting the established produc-
introduced in industry These provide a filtered set of the most in- tion line. These factors are particularly important in a large and complex in-
teresting patentsthose that are sufficiently applications oriented dustry such as the automotive industry, where new technology is welcome
to be used by an industry. only if it is incremental and evolutionary.
As a consequence, revolutionary technologies often are brought to the
In assessing the usage of a technology, it is easy to become entranced with market hy outsiders after being rejected by leaders in the relevant industry.
Witness Kodak's rejection of Dr. Edwin H. Land's instant photography process
its performance and promise. Technology does not exist in a vacuum; it is a re-
and its subsequent development by Polaroid; or the refusal of several large
source like any other, and it can be well applied or poorly applied. Not just
corporations to accept the challenge of commercializing the photocopying
the technology itself, but what an organization does with it matters. Through-
out the 1970s and 1980s, Xerox Corporation funded a think tank called the process that led to the creation of Xerox.
Transfer or Diffusion. It is often important to assess the effectiveness of
Palo Alto Research Center (PARC). PARC's staff was perhaps the greatest gath-
technology transfer or diffusionan especially critical topic in the fields of
ering of computer science talent ever assembled. PARC developed the concept
WMD and weapons proliferation. In assessing the effectiveness of technology
of the desktop computer long before IBM launched its PC- It created a proto-
type graphical user interface of icons and layered screens that evolved into diffusion, an analyst has to consider several factors:
Microsoft Windows. It developed much of the technology underlying the Is the technology available, and if so, in what form? In transferring
Internet. But despite PARC's many industry-altering breakthroughs, Xerox re- software, for example, a receiving organization can do far more
peatedly failed to exploit the financial potential of the achievements (although with the source code than with the compiled code.
the return on investment to Xerox from laser printers alone more than paid for Does the receiving organization reach out for new technologies or
PARC). PARC's culture was well suited to developing new technologies but not resist their introduction? Resistance to change is a severe constraint
so well suited to exploiting them for financial gain. on technology diffusion. Everyone knows that, but intelligence an-
The various constraints on innovation also may constrain use of a new alysts often ignore it, blithely assuming that instant diffusion exists
technology. A technology may carry with it risks of liability or action by gov- and forgetting about inertial forces and the "not-invented-here"
ernment regulatory agencies. Pollution control regulations increasingly shape factor (see chapter 12).
technology decisions. Possible tort liability or patent infringement suits are What mechanisms are used Co transfer? Some transfer mechanisms
risks that might cause a technology to be rejected. are very effective, others less so. Figure 14-2 summarizes the effec-
The assessment of regulatory forces (discussed in chapter 12) has become tiveness of various transfer mechanisms.
a key decision point for innovations in recent years. Analysts need to ask: Can
the product be produced within environmental restrictions on air and water Technology transfer and diffusion occur rapidly in countries that are open,
pollution? Does it meet government safety standards? Does it face import bar- relatively free from government interference, and technologically advanced.
riers in other countries? Can the innovation be protected, either by patents or Technology diffusion works extremely well in the United States, with its high
trade secrets, long enough to obtain a payoff of production costs? mobility of workers and information. The lower mobility of Japan's workers
Within the framework of questions such as these, large and small compa- slows its diffusion mechanism somewhat, but Japan does better at acquiring
nies have strikingly different approaches to the acquisition of new technology and assimilating foreign technology because of other, unique aspects of its cul-
Within large companies, the rejection rate of new technology is high. Less than ture. Multinational corporations provide a powerful international technological
one idea in a hundred is taken up, and when commercialized, two of three diffusion mechanism because they use the most effective of the mechanisms
new products fail. Institutional resistance to change is endemic, and new tech-
enumerated in Figure 14-2 to transfer technology among their subsidiaries.
nologies face enormous hurdles-even though a large company's access to new In contrast, technology diffusion was extremely poor in the former USSR
technologies is typically much greater than that of small companies. because of a tight companmentation system and Soviet insistence on secrecy;
In large companies, a "champion" of a major new technology typically which were especially severe in defense industries but carried over into the civil
must emerge before the company will accept the new technology. Such cham-
industries as well. The condition was aggravated by the low mobility of Soviet
pions, also described as "change agents," are innovators who are willing to risk
workers, so technology did not spread in that fashion, either. As a result, a tech-
their personal and professional future for a development of doubtful success. nology that found application in naval weapons systems, for example, would
The unpopularity of such champions in large companies is understandable be-
be totally unknown in the rest of the military and in civil industries.
cause of two circumstances: the vulnerability of established product lines to
Technolcgy Assessment and Systems Analysis 263
Identifying Future Systems performance, including its suitability in its environment or in per-
The first step in analyzing future systems, and particularly future weapons forming the mission it was designed for;
systems, is to identify the system(s) under development. Two approaches have cost; and
been applied in weapons systems analysis, deductive and inductive. schedule for development and associated risks.
The air force and the Defense Intelligence Agency (DIA) produced esti- to compare the Backfire to the slightly larger U.S. B-1A, which was an inter-
mates from McDonnell Douglas engineers that the Backfire had a range of be- continental bomber under development at the time. The risk in comparative
tween 4,500 and 6,000 miles. The CIA produced estimates from a different set performance analysis is therefore one of mirror-imaging, much the same as can
of McDonnell Douglas engineers that showed a range of between 3,500 and occur in decision making. U.S. analysts of Soviet military developments made
5,000 miles. Each side accused the other of slanting the evidence. a number of bad calls over the cold war years as a result of mirror-imaging. It
The range of the Backfire bomber became even more important because is useful to review some of the major differences we observed in the Soviet case.
the issue became enmeshed in Strategic Arms Limitation Talks (SALT). A So- Technological asymmetry. Technology is not used in the same way every-
viet intercontinental bomber would have to be counted in the Soviet total of where. An analyst in a technologically advanced country, such as the United
strategic weaponry. The Russians eventually agreed, as part of the SALT II States, tends to take for granted that certain equipmenttest equipment, for
process, to produce no more than thirty Backfires a year and not to equip them examplewill be readily available and will be of a certain quality This is a bad
for in-flight refueling; the United States agreed not to count the Backfires as in- assumption with respect to the typical state-run economy.
tercontinental bombers. In later years, evidence made clear that Backfire was U.S. intelligence frequently overestimated the capability of Soviet military
in fact a somewhat overdesigned peripheral attack bomber, never intended for research and development institutes, based on the large number of engineers
intercontinental attack missions. that they employed. It took some time to recognize how low the productivity
The Backfire bomber case illustrates some of the analytical traps that were of those engineers could be, and the reasons had nothing to do with their com-
discussed in the introduction: premature closure, in that analysts were trapped petence. Soviet engineers often had to build their own oscilloscopes and volt-
by previous predictions that the Soviets would develop a new intercontinental metersitems available in the United States at a nearby Radio Shack. Some-
bomber; and parochial interests that led analysts to make judgments in con- times plant engineers would be idle for weeks while they wailed for a resistor,
formity with their organizations interests. It also illustrates the difficulty of ap- so that they could finish the oscilloscope they needed to test the microwave
plying multidisciplinary analysis in systems analysis. A serious consideration tube for the radar they were supposed to build.
of Soviet systems designs and requirements, and of what the Soviets foresaw As a result, Soviet weapons systems might be designed quite differently to
as threats at the time, would likely have led analysts to zero in more quickly take advantage of the country's technology strengths and compensate for
on the Backfire's mission of peripheral attack. weaknesses. For example, the United States and the USSR took stnkingly dif-
The case also illustrates the common systems analysis problem of present- ferent paths in ballistic missile development. U.S. missiles had simple rocket
ing the worst-case estimate: National security plans often are made on the basis engines operating at fixed thrust, with very sophisticated guidance systems
of a systems estimate, so it is better to base the estimate on the worst case that using onboard computers. The Soviets could build good rocket engines but
is reasonably possible. Analysts tend to present the worst case in fear that the had difficulty building guidance systems for their missiles. So they used more
policymaker will otherwise become complacent. Hunger for recognition also sophisticated, variable-thrust engines, with simple guidance systems having
tends to drive analysts to the more disturbing conclusion. For example, the almost no onboard computation capability. The Soviet approach had the ad-
WMD Commission noted that "the Intelligence Community made too much of vantages of simplicity and quick achievement of satisfactory reliability H
an inferential leap, based on very little hard evidence, in judging that Iraq's un- Unexpected simplicity. In effect, the Soviets applied a version of Occams
manned aerial vehicles were being designed for use as biological warfare deliv- razor (choose the simplest explanation that fits the facts at hand) in their in-
ery vehicles and that they might be used against the United States'"3a case dustrial practice. Because they were cautious in adopting new technology, they
of moving to the most disturbing conclusion. tended to keep everything as simple as possible. They liked straightforward,
The Backfire bomber example illustrates the importance of having alter- proven designs. When they copied a design, they simplified it in obvious ways
native target models. It also illustrates the two main techniques of performance and got rid of the frills that the United States tends to put on its weapons sys-
analysis: comparative performance analysis and simulation. tems. The Soviets made maintenance as simple as possible because the hardware
Comparative Performance Analysis. Comparative performance analysis is was going to be maintained by people who did not have extensive training.
similar to benchmarking, discussed previously, but it has a different focus. It in- In a comparison of Soviet and U.S. small jet engine technology, the U.S.
cludes analysis of one group's system or product performance versus an oppo- model engine was found to have 2.5 times the materials cost per pound of
nents. The method has a number of pitfalls; for example, the opponent's system weight. It was smaller and lighter than the Soviet engine, of course, but it re-
or product (such as an airplane, missile, tank, or supercomputer) may be de- quired twelve times as many maintenance hours per flight hour as the Soviet
signed to do different things or serve a different market than the one with which model, and overall the Soviet engine's life cycle cost was half that of the U.S.
it is being compared. U.S. Air Force analysts in the Backfire bomber case tended engine.15 The ability to keep things simple was the Soviets' primary advantage
268 Chapter fourteen Technology Assessment and Systems Analysis 269
over the United States in technology, especially military technology This was There are many examples of the "We did itthey did it" sort of intelli-
a major pitfall in the attempt to compare the Backfire bomber with U.S. gence problem, especially in industries where competitors typically develop
bombers; a U.S. bomber of Backfire's size and configuration could easily have similar products. The United States developed intercontinental ballistic mis-
had intercontinental range. siles (ICBMs); the Russians developed ICBMs. Both sides developed amiballis-
A narrowly defined mission. The Soviets built their systems to perform spe- tic missile systems and missile-firing submarines. Many countries build air-
cific, relatively narrow (by U.S. standards) functions. The MIG-25 is an exam- craft, cruise missiles, tanks, electric power distribution systems, computers,
ple of an aircraft built this wayoverweight and inefficient by U.S. standards and so on. In these cases the intelligence officer's analysis problem is not so dif-
but simple and effective for its intended mission. The Backfire also was de- ficult because he can turn to his own country's or organization's experts on that
signed for a very specific mission-countering U.S. naval forces in the North particular system or product for help.
Atlantic. The United States tends to optimize its weapons systems for a broad For example, in World War II both the British and the Germans developed
range of missions. and used radar. So when, in 1942, a British reconnaissance aircraft photo-
The advantage of being number two. A country or organization that is not a graphed a bowl-shaped antenna near the French coast, British intelligence
leader in technology development has the advantage of learning from the could determine, with help from their experts, that it was a radar, Because the
leader's mistakes, an advantage that helps it keep research and development radar, which was later nicknamed the Wurzburg, posed a threat to British air-
costs low and avoid wrong paths. A basic rule of engineering is that you are craft attacks on Germany, the British undertook some rather direct technical
halfway to a problem solution when you know that there is one, and three collection means to gather additional information about it. The result was the
quarters there when you know how a competitor solved the problem. It took Bruneval raid, described in chapter 6.
much less time for the Soviets to develop atomic and hydrogen bombs than Analysis of the Wurzburg also provides a good example of some pitfalls
U.S. intelligence had predicted. The Soviets had no principles of impotence or that can exist when a country uses its own experts. The Wtirzburgs were nor-
doubts to slow them down. They knew that the bombs would work. mally deployed in pairs, one radar in a pair having one to three searchlights
Quantity may replace quality. U.S. analysts often underestimated the num- collocated with it. British radar experts believed that the second radar was a
ber of units that the Soviets would produce. The United States needed fewer spare, to be used when the first radar was inoperative, since that was the nor-
units of a given system to perform a mission, since each unit had more flexi- mal British practice. British intelligence officer R.V Jones, however, argued that
bility, quality, and performance ability than its Soviet counterpart. The United the Wurzburg with searchlights was intended to track bombers, whereas the
States forgot a lesson that it had learned in World War IIU.S. Sherman tanks second radar had the job of tracking the fighters that would be guided to the
were inferior to the German Tiger tanks in combat, but the United States de- bomber. Bntish experts disagreed, since this would require an accuracy in co-
ployed a lot of Shermans and overwhelmed the Tigers with numbers. ordinate transformation that was beyond their technical skill at that time. They
Patterns of Comparative Modeling. Comparative modelingcomparing failed to appreciate the accuracy with which German radars operated as a mat-
your country's or organization's developments with those of an opponentcan ter of course. As it turned out, Jones, armed with a better understanding of the
involve four distinct fact patterns. Each pattern poses challenges of vested in- German way of building defense systems, was correct.
terest or bias. The first possible pattern is that Country A has developed a cer- In the second case, "We did itthey didn't do it," the intelligence officer
tain capability (for example, a weapon, a technology, or a factory process), and runs into a real problem: It is almost impossible to prove a negative in intelli-
so has opponent Country B. In this case the analyst from Country A has the gence. The fact that no intelligence information exists about an opponent's de-
job of comparing Country B's capability with that of Country A. The other velopment cannot be used to show that no such development exists.
three possible patterns are that Country A has developed a particular capabil- After the British created the magnetron (a microwave transmitter tube
ity but Country B has not; that Country A has not developed a particular ca- widely used in radar) and discovered what wonders it could do for a radar sys-
pability, but Country B has; or that neither country has developed the capa- tem, their constant worry was that the Germans would make a similar discov-
bility. In short, the possibilities can be described as follows: ery and that the British would then have to face radars with capability equal
to their own. In fact, the Germans only learned about the magnetron when
We did itthey did it. they captured one from a downed British aircraft late in the war, but the threat
kept British intelligence on edge.
We did itthey didn't do it.
The third pattern, "We didn't do itthey did it," is the most dangerous
We didn't do itthey did it. type that we encounter. Here the intelligence officer has to overcome opposi-
We didn't do itthey didn't do it. tion from skeptics in his country. R.V Jones faced a case like this when he
270 Chapter Fourteen Technology Assessment and Systems Analysis 271
pieced together the operating principles of a new German aircraft navigation they didn't do it." The United States didn't build one and neither did the So-
system called Knickebein. viets; in fact, no one could.
Knickebein was a radio beam system that the Germans used to guide their
Systems Simulation
bombers to their bomb drop point (usually London) at night. At one point,
when Jones was attempting to convince top government officials to send A conceptual model that is to be used in a simulation (usually referred to
radio-equipped aircraft aloft to search for the Knickebein signal, he was op- as a "simulation model" to distinguish it from other model types) was intro-
posed by Britain's leading authority on radio wave propagationThomas F_ck- duced in chapter 5. Systems models are often created and run as simulations.
ersley, of the Marconi Company Eckersley argued that radio waves would not Simulation models have several applications in intelligence.
propagate sufficiently far at 30 megahertz to be observed over London. Fortu-
Simulations Used in Intelligence Analysis
nately for Jones, the EL1NT search aircraft collected the signal before its flights
could be halted. Intelligence analysts use simulation models extensively to assess the per-
The central premise of the movie The Hunt for Red October is another ex- formance of foreign weapons systems, military forces, and economies. These
ample of this type. In the movie, the Soviets had developed a low-noise cater- simulations comprise computer programs that solve individual equations or
pillar drive for their submarine the Red October, making it almost undetectable systems of equations and graphically portray the results. They should be in-
when under way. The United States had no equivalent development, so un- teractive; the analyst has to see what the result looks like and change it as new
derstanding the submarine's quiet performance was difficult. intelligence information is received.
"We didn't do itthey didn't do it": This seems to be a ridiculous case. Weapons Systems Simulations. These are well-defined problems ranging
After all, if we haven't developed a weapon and they haven't developed a in complexity from simulating the performance of a single entity, such as an
weapon, who cares? The answer is that people do care, and intelligence ana- aircraft, to simulating that of an elaborate, interconnected system such as an
lysts spend a great deal of their time on just this son of problem. air defense system. Even simulating the performance of a single weapon can
Back in World War II, British intelligence received reports about classified be a complex undertaking. For example, the design of a nuclear weapon re-
testing going on at a secret installation inside Germany. According to the re- quires complex modeling and simulation of the weapon detonation process.
ports, automobiles driving near this installation would suddenly stall and High-speed computers and sophisticated simulation codes are necessary. The
could not be started again. After a while a German sentry would step out of models used to support your own nuclear weapons development can be used
the nearby woods, tell the automobile drivers they could proceed, and the au- to assess the performance of another country's nuclear weaponry.
tomobiles would stan and run normally again. Many weapons system simulation models already exist. The U.S. Depart-
As one might imagine, the thought of a weapon that could stall internal ment of Defense and its contractors possess a large suite of performance mod-
combustion engines caused British intelligence some concern, since British els of missiles, ships, submarines, and air and missile defense systems that they
tanks, trucks, and airplanes relied on such engines. Although the threat was a use to evaluate their own systems. These models can be modified to simulate
continuing concern to British intelligence, they found out after the war that the performance of foreign systems. The Backfire bomber case involved two
the order of events had become transposed in the reports. What actually hap- competing simulation models, both derived from existing models of U.S. air-
pened was that the Germans were testing very sensitive radio equipment that craft. Commercial simulation models also are available to simulate the perfor-
was vulnerable to automobile ignition noise. When testing was under way, mance of radars and communications systems and the orbits of satellites. Both
German sentries throughout the area around the plant would force all auto- the U.S. and foreign intelligence services, for example, use commercial soft-
mobiles to stop and shut down their ignitions until testing was over. ware to create satellite orbit simulations to identify the times of hostile satel-
This sort of transposition of cause and effect is not uncommon in human lite surveillance for D&D purposes.
source reporting. Pan of the skill of an intelligence analyst is to avoid the trap Military Simulations. These are closely related to weapons systems simu-
of taking sources too literally. Occasionally, intelligence analysts must spend lations and often incorporate them. They are used by defense organizations in
more time than they should on problems that are even more fantastic or im- planning systems acquisition and determining force mixes and for training.
probable than that of the German engine killer. During the 1970s and early Some examples include force-on-force and campaign models that simulate
1980s the United States expended considerable intelligence and scientific re- combat between opposing forces; logistics models; vulnerability and weapons
search effort on the threat that the USSR was building a particle beam weapon effects models; and system reliability models. As with weapons systems simu-
capable of destroying ballistic missile warheads in flight. In retrospect, the par- lations, the Defense Department and its contractors possess and regularly use
ticle beam weapon appears to have been a classic case of "We didn't do it these, and they can be adapted to assessing foreign military systems. In models
272 Chapter Fourteen Technology Assessment and Systems Analysis 273
thai simulate combat, the intelligence and military operations communities Formulate the Problem. Start with problem definition (discussed in chap-
have to work together because the military operations analysts understand your ter 2). Then identify the parts of the overall problem that can be answered by
side, the intelligence analysts understand the opponent, and both inputs are simulation. As part of this effort, it is almost always necessary to define the de-
necessary to make the simulation run effectively. sired outputs of the simulation. The outputs are measurements of such things
Economic Simulations. Econometric models were introduced in chapter as benefit, impact, effectiveness, or affordability of the system. These analytic
5. They can be used to simulate the performance of an entire economy or any measures are often called measures of effectiveness. They are also known as .fig-
segment of it, such as a particular industry Intelligence analysts often run ures of merit and are used to quantify how well a system meets its objectives.
econometric models to support trade negotiations. For example, an analyst In commercial ventures, return on investment is such a measure. In aircraft
can create a simulation of another country's economy to show that his own performance, top speed is a measure of effectiveness. In an air defense system,
government's trade proposals will benefit the other country's economy. A par- probability of kill (Pt) is a measure. Measures of effectiveness are used exten-
ticularly effective technique is to obtain and run the other country's econo- sively in systems performance analysis.
metric model, since it should be more credible with the opposing negotiation Identify the Needed Input Information. Simulation models usually don't
team. work if input data are missing. You have to begin by identifying information
Political and Social Simulations. Simulations of political and social sys- that is already available; then identify information that it may be possible to
tems have been developed to analyze such diverse topics as the interactions of collect; and finally identify information that probably will not be available
political parties, the clash of cultures, and population migration patterns. One under any circumstances. The answers will help define the model used for the
interactive simulation, Simcity, has even been produced as an educational com- simulation.
puter game. The CIA has used a simulation model of political processes. Poll- Select the Simulation Software. Depending on the topic, a simulation
ton, to assess topics such as these: model may already be available either commercially or in the government. It
usually will require some modification to adequately simulate the target sys-
What policy is Egypt likely to adopt toward Israel? tem. If no usable model exists, one has to be built. Fortunately, there are a
What is the Philippines likely to do about U.S. bases? number of commercial modeling packages that can be used to build even very
What stand will Pakistan take on the Soviet occupation of sophisticated models. Many of these require an experienced modeler, but in-
Afghanistan? creasingly analysts find packages that they can use without extensive simula-
tion training.
To what extent is Mozambique likely to accommodate with the West? Develop a Valid and Credible Model, Once developed, a simulation
What policy will Beijing adopt toward Taiwan's role in the Asian model has to be validated. That is, you must confirm that the model accurately
Development Bank? simulates what it is supposed to simulate. It is far preferable to use a proven,
How much support is South Yemen likely to give to the insurgency validated model, such as one that has had its simulations checked repeatedly
in North Yemen? against real-world results. If this is not possible, a number of standard meth-
What is the South Korean government likely to do about large- ods exist for validating a model. But sophisticated models can be very com-
scale demonstrations? plex, and independent checks are difficult to run on them. Examining the re-
sults to see if they "feel" right may'be the best possible check.
What will Japan's foreign trade policy look like?
As an example of the validation problem, it is well known that combat
What stand will the Mexican government take on official corrup- models tend to overrate an opponent's defense. One of the better-known ex-
tion?16 amples of the problem is modeling that was done of the offense and defense
prior to the B-52 strikes on Hanoi during the Vietnam War. The pre-sirike
However, political and social simulations have not gained the wide ac- model predictions were that enemy fire would inflict significant losses on U.S.
ceptance within the intelligence community that military and weapons sys- forces. In the initial raids, however, no losses were suffered. A similar dispar-
tems simulations enjoy. In part, that is a result of attitudes of the customers of ity existed in models of allied force losses in the Desert Storm operation in
political analysis, which we will take up in chapter 15. Iraq.
These are examples of the observation that models tend to be overbal-
Creating and Running a Simulation anced in favor of the defense in the initial stage of any conflict. The reason is
The process of developing and running a simulation is similar to the that most such models assume a steady state; that is, they assume that both of-
analysis process described in chapters 2 and 3. fense and defense have some awareness of what is going to happen. But in the
274 Chapter Fourteen
Technology Assessment and Systems Analysis 275
initial stages of an engagement, the offense has a big advantage: it can dictate nology evolutions and improvements come from within establishment organi-
ihe rules of engagement, knows what it has to do, and has the advantage of zations; innovation seldom does. The shaping forces discussed in chapter
surprise. The defense must prepare for the estimated threat and react. Fur- 12inertia, contamination, synergy, and feedbackall promote or constrain
thermore, the defense must make every link in the chain strong, the offense innovation. Organizational forces, especially culture and the decision-making
only needs to find the weak link in a system, then attack it. Al Qaeda opera- process, are often critical in determining whether a technology will be devel-
tives demonstrated the very large advantage that a determined offense has in oped, or used when it has been developed.
their September 11, 2001, attacks on the World Trade Center and the Penta- Most technology predictions rely on open literature, and publications pat-
gon. Islamic militants again demonstrated the attacker's advantage in Great tern analysis is used both to tell where a technology is on the S curve and to
Britain on July 7, 2005, when they killed fifty-two bus and subway passengers identify emerging innovations in the technology.
in coordinated suicide bombing attacks with no warning. It is very difficult for Future systems analysis can take an inductive or a deductive approach,
a model to take this initial offensive advantage, and defensive disadvantage, but the deductive approach works better in practice. In predicting systems de-
into account.
velopments as much as five years into the future, extrapolations work reason-
Run the Simulation and Interpret the Results. Once a model has been de- ably well; five to fifteen years into the future, projections usually fare better.
veloped and validated, the analyst runs the simulation and analyzes the results. The predictions typically require analysis of a systems performance, cost, and
Analyzing the results of any modeling effort requires that one do a "sanity schedule. Comparative performance analysis is widely used in such predic-
check" on the model results. In intelligence simulations, where considerable tions. Simulations are used to prepare more sophisticated predictions of a sys-
uncertainty often exists about the input data, it usually will be necessary to tems performance.
make many runs with different possible inputs to do sensitivity analysis and to Simulations have long been a tool to assess the capabilities of an oppo-
compare alternative conclusions. Another type of validation becomes impor- nent's military hardware such as aircraft, tanks, and naval vessels. They are in-
tant here. A valid model can give invalid results if the inputs are improper. creasingly being used to assess the performance of larger systemsair defense
Econometric models, for example, can produce almost any desired simulation systems or entire economies, for example. Such complex targets are best ana-
results, depending on the different inputs chosen. A smart customer of intelli- lyzed using simulation models.
gence knows this and will want to know not only what model was used but Most simulation models are systems of equations that must be solved for
what the inputs were. different input assumptions. The critical issues in dealing with simulation
Summary models are to define the problem to be solved, validate the model (ensure that
it approximates reality), and select appropriate measures of effectiveness for
Technology analysis is used in business intelligence, where it can provide the output.
a competitive advantage to companies, and in military intelligence for assess-
ing the performance of current and future weapons systems. It can be used to Notes
assess the future performance of a technology, the use or transfer of the tech- \. Francis Narin, Mark P Carpenter, and Patricia Woolf. "Technological Performance Assess-
nology, or in forecasts of technology breakthroughs. The most difficult task is ments Based on Patents and Patent Citations," IEEE Transactions on Engineering Management 4
to assess how a technology will be used, and it is the use to which it is put, (November 1984); 172
not the technology itself, that matters. 2. Ibid.
3. Ibid.
The natural starting point for technology performance analysis is to pro- 4. Joseph P Martino, "Trend Extrapolation," in A Practical Guide to Technotogiwl Forecasting, ed
ject how the technology will evolve assuming no major breakthroughs. It is James R. Bright and Milton E.E Schoeman (Englewood Cliffs, NJ. Prentice-Hall, 1973), 106.
necessary to identify' the supporting or ancillary technologies that drive such 5. Herbert C. Rothenberg, "Identifying the Future Threat," Studies in Intelligence 12, no. 4 (1968):
evolution. All technologies evolve through an S curve of performance im- 13-21.
6. John Prados, The Soviel Estimate (Princeton: Princeton University Press, 1987), 324.
provement, eventually reaching the top of the S and becoming mature. When 7. Lester Thurow. "Brainpower and the Future ol Capitalism," in The Knowledge Advantage: Four-
a technology is mature, the analyst should be alert for the advent of a replace- teen Visionaries Define Marketplace Success in the New Economy, ed. Rudy Ruggles and Dan
ment technology. Holtshouse (New York: John Wiley/Capstone, 1999).
The next step is identifying innovative developments that represent a 8. Report of the Commission on ihe Intettlgeme Capabilities of the United States Regarding Weapons of
Mass Deslracfion, March 31, 2005, wwwwmd.gov/report/wmd_report pdf, p.13.
break in the S curve. This step is an art, not a science. The technique is to iden-
9. Rothenberg, "Identifying the Future Threat."
tify new forces or technologies, or synergies among existing technologies, and 10. Ibid.
look outside the established companies or organizations in an industry. Tech- 11. David S. Brandwein, "Maxims for Analysts," Studies in Intelligence 22, no. 4; 31-35.
12. Roihenberg. "Identifying the Future Threat.'
13. Repot of the Commission, 143.
H. David S. Brandwein, "Interaction in Weapons R&tD,n Studies in Intelligence 12, no. 1: 13-20.
15 Arthur J. Alexander, "The Process of Soviet Weapons Design," Technology Trends Collo-
quium, U.S. Naval Academy; Annapolis, Md., March 29-April 1, 1979
16. Bruce Bueno de Mesquita, "The Methodical Study of Politics," New York University and
Hoover Institution, October 30, 2002, www.yale.edu/probmelh/Bueno_De_Mesquita.tioc. 15
The Analyst and the Customer
Intelligence is best done by a minimum number of men and
women of the greatest possible ability.
R.V Jones, Assistant Director of Britain's Royal Air Force
Intelligence Section during World War II
Objectivity
It may seem obvious that to remain objective is a credible analyst's first
commandment. She knows that a search for evidence to support preconceived
notions has no place in intelligence. She knows that she cannot discard ob-
servations because they are contrary to what she expected. In fact, she knows
that her goal is to function like the physical scientist: In the physical sciences,
an astronomer is not emotionally affected by finding that stars follow a certain
development pattern. An astronomer does not think that this is good or bad;
it simply is.
Unfortunately, intelligence analysts are typically in a position more like
that of a social scientist. Their thinking may be complicated by an inability to
isolate their own emotional needs from the problem being studied. Put simply
they care about the outcome. But if an analyst wishes to assess foreign events.
277
For example, he or she must put aside personal opinions about war, poverty, makers or executives who control industries, military forces, and governmen-
racism, police brutality, and governmental corruption, to name a few tough tal organizations today earned their credentials ten Co twenty years ago. Their
ones. For instance, "political corruption" is a normal way of life in many areas organizations thus are bureaucracies shaped by the worldview of key control-
of the world. Neither good nor bad in an absolute sense, it is merely the ac- ling individuals who likely retain biases based on the lessons they learned
cepted standard of conduct. An analyst who receives the task of assessing the through earlier experience. An analyst cannot comprehend the present shape of
international narcotics trade cannot begin with [he view that the traffickers are an organizationpublic or privateor predict its likely evolution and organi-
opportunistic scum. Instead, she must practice empathy, or the concept of zational behavior without an understanding of what has happened within it
putting herself in the shoes of the target. Empathy is a tool of objectivity in during its history. One cannot understand the 1989 crackdown by the Peoples
that it allows the analyst to check her biases. The analyst must try to see things Republic of China on student demonstrators in Tiananmen Square, and the av-
from the traffickers' perspectivethey are a group of small businesspeople erage Chinese person's view of the crackdown, without understanding the Cul-
working to uphold the free enterprise system in the face of excessive govern- tural Revolution and its impact on the Chinese people.1 And it is important to
ment regulation. (As an aside, a well-rounded analyst who has read Machi- learn a nation's history as they teach itwhich may be quite different from
avelli sometime in the past might find it helpful to reread it, this time from the what you were taught.3
analyst's vantage point. One of Machiavelli's great strengths was his ability to And a historical perspective requires more than just knowledge of the last
assess conduct rather than values.) few decades. The study of organizations, management, and decision making
If the intelligence customer is in the business world, the challenge of keep- has gone on for centuries, and some of the most pertinent observations on
ing an objective attitude reaches new heights. In business the intelligence ana- these subjects trace back to the thinking of Machiavelli, Sun Tzu, or Plato.
lyst often must make a recommendation, though without specifically telling the
decision maker what to do.1 Intelligence professionals in government and mil- Analyst as Team Player
itary service would undoubtedly be amused at the suggestion that they should The target-centric approach requires teamwork, and analysts should ex-
offer advice such as, "General, you should move your tank battalions to the po- pect that customers will be part of the team. Given that many people have
sitions I have indicated," or "Madam Secretary, it would be prudent if your am- something at stake in how an intelligence question is answered, the process of
bassador in Botswana initiated a dialogue with the rebel alliance." Recommen- getting to the answer, especially the answers to complex intelligence problems,
dations such as these are career enders for government intelligence officers, is fundamentally a social one. Most complex problems involve many stake-
who typically have neither the policymaking or operations experience nor the holders: Some of them, such as the analyst's managers, are involved in defining
current knowledge of operational factors needed to give such advice. Con- the problem that needs intelligence; others, such as the customers, may add
versely, in many companies the business intelligence analyst has both the op- constraints to the solution. Teams working on related projects have a particu-
erations expertise and the credibility to make operational recommendations. It larly large stake because one team's answer is the next team's problem. For in-
remains a valid question whether the government intelligence officer should be stance, an economic analyst's assessment that the economy of Egypt is headed
more like the business intelligence analystqualified to make judgments on for senous trouble would present a number of challenges to an analytical team
policy or operational issues. In a collaborative environment that includes the assessing the political future of Egypt. Any member of the teama collector, an
customer, that is likely to happen. But when analysts make recommendations, analyst, a customeris no longer confined to using his or her expertise in just
they End objectivity tough to maintain. one area or at just one time during the process. Instead, synergistic discoveries
and opportunities occur, as pooled expertise and talents are brought to bear on
Broad Perspective
one relevant focus: the target model that was introduced in chapter 3.
Successful analysts have an inherent inquisitiveness and a lifelong interest No team leader is brilliant or experienced enough to go off and solve com-
in learning about subjects and ideas that may seem to have little or no rele- plex problems alone. It is not even possible to assemble a team of brilliant peo-
vance to their current subject area. Relevant and wide-ranging reading on ple to go off and solve the problem, because the moment they go off they leave
ocher cultures, their economies, military traditions, religious and political doc- behind stakeholders whose input is essential. Again, a target-centric approach
trines, philosophy and the like, gives analysts a breadth of substantive com- helps solve this problem by emphasizing the shanng of information and exper-
petence that will serve them well throughout their careers. tise among stakeholders. In this way the approach breaks down the long-held
A long-term, historical perspective is essential in making predictions about compartrnenial barriers that collectors, analysts, and customers have tradition-
a culture, a government, an industry, a system, or a technology. Each of these ally experienced in solving intelligence problems. All stakeholders contribute to
concerns, even technology, has a long history. With few exceptions, the policy- the target model, which is an initial representation of the intelligence problem.
280 Chapter Fifteen
The Analyst and the Customer 281
The model remains accessible to all the participants and available for their input throughs, synergies, connections, and allies. The skillful team man-
as it evolves. Thus interpersonal skills (including the ability to express and pre- ager drives for making decisions quickly even before the team is
sent ideas clearly) cannot be overemphasized. Admittedly, analysts who live by ready, knowing that decisions and partial solutions will flush out
logic and the scientific method are not often described as "naturals" when it new contributions. This is equivalent to the concept of rapid proto-
comes to soft skills. But practicing empathy, conflict resolution techniques, fa- typing in software development.
cilitation skills, and the art of knowing when and how to advocate, versus when
to follow and reflect, are crucial to analysis and the resulting product. These Perhaps most important, the team leader must manage the scope
project management skills, along with some mastery over one's ego, can be of the problem; determine which stakeholders to include in the
learned (albeit sometimes through painful trial and error). Even the most logi- process and how to include them; choose which constraints to be
cal and objective creature in popular television history, Star Trek's Mr. Spock, ruled by, which to bend, and which to ignore. In this way, the an-
was a consummate listener, dialoguer, and when appropriate, advocate. alyst can make conscious and responsible choices about the scope
There are likely several thousands of books nowadays dedicated to the art of the problem.
of teamwork, if there is a single key to successful team outcomes it is efficient
collaboration built on mutual trustsomething that is very difficult to build Once the fact-finding and analysis have been completed, it is time for the
and very easy to destroy in a large intelligence organization. Effective teams re- analyst to set aside objectivity and become the oppositepersuasive. With the
quire cohesion, formal and informal communication, cooperation, shared men- first two phases finished, the analyst must turn his or her attention toward get-
tal models, and similar knowledge structures. Without such a common process, ting the team's results read or heard and understood. This means presenting
an interdisciplinary team will quickly fall apart.4 them to the customer in the most compelling way possible. Before the presen-
Precisely because a coordinated team approach will have been imple- tation, however, the analyst must first seek to know the customer.
mented, an analyst will consistently produce credible analysis reports of ex- The Customer
cellent quality by following these imperatives:
The body of customers of intelligence has expanded steadily over the last
As pan of the analyst's interpersonal skill set, he or she must be a century from the traditional two: military and national leadership. In the
strong team leader, who can execute a team intelligence effort, but United States, a diverse customer set has developed since 9/11 that includes
who also understands and is committed to the inclusive nature of groups such as law enforcement and emergency response teams. In countries
complex problem solving. This person must be capable of fostering such as China and France, commercial firms have become major customers of
active participation by the customer community, which will im- government-provided commercial intelligence because of the competitive ad-
prove the quality of the synthesis and analysis of intelligence prob- vantage that such intelligence gives them.
lems, as well as improve support for the results. When customers Policymakers
are integrated into the study process, not only is their assistance in-
valuable but they will have confidence in, and use, the product. A Policymakers in the political, economic, and S&rT arenas are strikingly
competent team leader also recognizes how difficult it is for one different in how they interact with analysts. Policymakers in the political arena
team member to confront or criticize another, the disincentive are probably the most difficult customers. They frequently understand politics
being strongest when a junior analyst must oppose a veteran.5 better than the analysts do and have their own sources of information inde-
pendent of the intelligence community They got where they are because of
In managing this process, the analyst should encourage every pos-
great interpersonal skills, and they believe that they read people well, inde-
sible form of communication: welcome disagreement as a sign that
pendent of cultural background. Customers of S&T and weapons intelligence
the stakeholders are putting their cards on the table and use meet-
are more likely not to be able to match the technical competence of the ana-
ings as occasions for learning and building shared mental models.
lyst and accordingly will give the analyst's opinions more respect. Customers
Finally, the analyst should use technologies that suppon commu-
of economic intelligence tend to fall in between those extremes.
nication among the stakeholders and promote the value of captur-
The Policymaker's Environment. A typical senior government executive
ing and sharing soft information, such as ideas, questions, prob-
works under severe time pressures in a disruptive environment. Former secre-
lems, objections, opinions, assumptions, and constraints.
tary of defense Robert McNamara was typical of executives and policymakers.
The analyst should remember that he or she is managing an On his Vietnam mistakes, he observed, "One reason [we] failed to take an or-
opportunity-driven process and look for opportunities for break- derly, rational approach . . . was the staggering variety and complexity of the
1-riupter fijteen
The Analyst and ihe Customer 283
other issues we faced. Simply put, we faced a blizzard of problems, there were
only twenty-four hours in a day, and we often did not have time to think and since. His policy was to accept incoming information from his
straight. This predicament is not unique to the administration in which I served far-flung intelligence network that supported his preconceived ideas
or to the United States. It has existed at all times and in most countries."6 The and to avoid or ignore anything that contradicted them.10 Like
implications are clear: Government executives need good analytical insights to many executives since, Philip II was prone to wishful thinking.
deal with complex problems in a short time frame. But as a result, A CIA analyst in 1951 was studying the movements of the Chinese
and had reached the conclusion that the Chinese had surrepti-
The policymaker has little time to make his needs known or to di- tiously introduced their forces into North Korea. He briefed the as-
alogue with the analyst; sistant secretary of state for Far Eastern affairs, Dean Rusk, who
The intelligence message has to be clear, unequivocal, and usually later was the secretary of state under Presidents Kennedy and John-
briefon one page, or even in the title of the article; son. Rusk listened politely to the briefing, and at the end of it he
Policymakers have short memories; they need to be reminded of said, "Young man, they wouldn't dare."11 Weeks later, the Chinese
past materialyou cannot assume past knowledgeand they usu- forces attacked UN forces in Korea.
ally don't retain copies of prior intelligence;7 Even directors of central intelligence have been trapped in mind-
They have a "today's news" orientation; they tend to prefer current sets. Former DCI Stansfield Turner believed that Ayatollah Khomeni
intelligence, and in-depih analysis often is not valued. Long-term was just another politician, and despite the arguments of his ana-
research has to answer a question that the policymaker considers lysts he briefed the National Security Council that after the over-
important. throw of the shah of Iran things would go on pretty much as they
had before.12
The Policymaker Mindset. Policymakers frequently adopt a mindset, and
Business Leaders
after that point the evidence must be overwhelming to change it. Their recep-
tivity to intelligence changes over (ime. At the start of a new administration, Business consumers of intelligence are very similar to political policy-
intelligence analysts have their greatest impact. As policy views begin to makers for many of the same reasons. They like to feel that they are in control
harden, it takes more and more evidence to change anyone's mind.8 Policy- and that they understand the competitive environment better than their busi-
makers demand more proof if intelligence negatively affects their agenda, and ness intelligence staff. They have mindsets. They face constant time pressures
they accept a much lower standard of proof when intelligence complements and are action oriented. But because they pay for their intelligence, they are
their agenda. more inclined to give specific guidance, more willing to listen, and more apt
Many policymakers want to see the raw intelligence, often to select items to to take the analyst to task for poor outcomes.
support their mindsets. National security adviser Zbigniew Brzezinski insisted
Military Leadership
on seeing raw intelligence, claiming that the intelligence community could not
provide the broad, sweeping, and bold insights into the future that he needed.g The military customer is usually clear about what he wants from intelli-
The policymaker or leader mindset has existed since there were leaders: gence. Intelligence is an integral pan of his world; he's used to seeing it and
understands its value. Mil itary "leaders, like policymakers, vary greatly in ar-
Perhaps the earliest example recorded (in the Bible) occurred when ticulating needs. All of them, to some degree, want to act as their own ana-
the Israelites spied out the land of Canaan. Their leaders objective lyststhough policymakers are probably most inclined to do that.
(and mindset) was to conquer Canaan. His spies brought back un- Most executives, including policymakers and military leaders, are guided
welcome news, reporting, "They are stronger than we There we in decision making by a principle known as prospect theory. Prospect theory says
saw the giants" (Numbers 13: 31-33). The Israelites wound up that people will pay a higher price, or risk more, to prevent losses than they
spending forty more years in the wilderness (there is no indication will to seek gains. Executives, especially in large bureaucracies, tend to be con-
what happened to the spies). Not surprisingly, there were no giants servative and cautious. So they tend to want intelligence that warns of losses
in the reports from the next set of spies, forty years later. and to pay less attention to intelligence that suggests opportunities for gain.
In the sixteenth century Philip II ruled the Spanish empire. Philip One opportunity for gain that will always catch the policymaker's or mil-
was the ultimate "hands-on" executive and typical of leaders before itary leader's attention, however, is the chance to deliver an asymmetric re-
sponse. While asymmetric response is currently a phrase with cachet, it is an old
The Analyst and the Customer 285
Law enforcement officials fall somewhere between policymakers and mil- Getting the Customer to Understand the Message:
itary operations consumers. Some, such as countemarcotics teams, have ex- Analyst as Communicator
perience in dealing with intelligence. Local police traditionally have had very A major problem of intelligence in sixteenth-century Europe was that
little experience with, or understanding of, intelligence. Increasingly, however, spies could readily acquire information, but governments could not readily
law enforcement groups have crime fusion centers that correlate and analyze grasp its significance and act accordingly.15 Issues are much more complex
intelligence and deliver it to the police officer. Cyber and computer crime cen- today, and the challenge for analysts is still to help customers grasp the signif-
ters have been created in many states to bring together intelligence from na- icance of intelligence.
tional and local sources. Acceptance of the value of intelligence analysis is in- If one is to be an effective analyst, one must learn the skills of effective
creasing in the U.S. law enforcement community
communication, both in writing and speaking. There are procedures for writ-
The classification of intelligence is an ongoing problem for law enforce- ing a report or presenting a briefing, some generally recognized across profes-
ment. Raw reporting from HUMINT, IMINT, or COMINT sources is typically sions and some that are institution specific. It is the responsibility of the ana-
classified at the Secret level or higher, and local law enforcement officials nor- lyst to learn his particular intelligence organization's technical quality and style
mally have no security clearance. Conventionally this problem is handled by requirements and then pay strict attention to them. An analyst must both fol-
sharing information without source details"1 can't tell you why, b u t . . , " Law low standards for finished intelligence publications and use terminology that
enforcement officers are comfortable with that; they are used to taking unver-
the customer understands, addressing problems and issues that interest the
ified tips. Intelligence officers also frequently use fictional sources, often creat-
customer. In general, analysts who develop communications skills present re-
ing very elaborate reports to conceal the true source and get the material re-
sults that
leased at a lower classification. You have to deal with the trade-off between
protecting sources and misleading analysts (who will evaluate a report de-
Are forward looking, including detailed predictions of the future
pending on its source). Ideally, you use a fictional source having the same gen-
eral level of credibility. developments or of major trends in the subject area and descrip-
tions of the factors driving those trends;
nupttr njceen The Analyst ana tne <_uswmer
Contain clearly stated conclusions supported by thorough research it. In operations, especially military operations, that may be the case. Unfortu-
and technical reasoning; and nately, at least in policy support, intelligence is more like insuranceit has to
Include clear tutorials or explanations of complex technical sub- be sold, and buyers have to be convinced that they are getting a good product.
jects, aimed at the expected customer. One problem of looking at intelligence as sales, especially in policy mat-
ters, is that it raises the danger of telling customers what they want to hear.19
A major cause of intelligence failure is what has been referred to as the Another challenge is that you need a good sense of timing (as every salesman
"pathology of communication"; that is 10 say, it is often hard to get the cus- knows).20
tomer to believe intelligence judgments where policy issues are concerned.1S Although the proper analytic attitude is one of objectivity, once analysis is
Furthermore, analysts have to convey areas of uncertainty and gaps in their finished, political realities set in. The analyst must sell the product because
knowledge. The Iraqi WMD Commission noted, "Analysis also have a respon- here again he quickly encounters one of the fundamental principles of physics
sibility to tell customers about important disagreements within the Intelligence that is also a fundamental principle in intelligence (Analysis Principle 12-2, al-
ready discussed): Every action produces an equal and opposite reaction If the
Community. . . . In addition to conveying disagreements, analysts must also
analyst's results are at all worthwhile, they likely will meet with skepticism or
find ways to explain to policymakers degrees of uncertainty in their work."17
To do that without causing the customer to totally disregard the intelligence is outright opposition.
a challenge. Furthermore, if the customer is a U.S. government policymaker, the ana-
lyst typically must interact with lawyers, a relationship that is much different
The answer to both these problems lies in the target-centric process intro-
from what analysts are used to and one in which advocacy skills are useful.
duced in chapter 2. You have to make the customer a part of the intelligence
Lawyers prefer to use intelligence experts as they would use scientific experts in
processdifficult in the case of the busy policymaker. But once the customer is
a courtroom: receiving testimony on the facts and opinions, cross-examining,
engaged in the process, communicating the results becomes much less difficult,
determining the key issues, and deciding. The existence of controversy and of
and the customer is much more likely to understand and use the intelligence.
differing opinions is essential, in the lawyer's view, to establishing the truth.
Finally, in preparing intelligence on technical subjects, there is always an Lawyers are uncomfortable with a single expert opinion and with the intelli-
easier way, always a clearer way, always a more accurate way to say something. gence compartmentation system. To them, the intelligence community's tradi-
Unfortunately, they are not the same way Precision of expression is a special tional compartmentation system for protecting sources and methods is suspect
problem in the engineering disciplines. It is almost axiomatic that if a report is because it tends to conceal evidence and is therefore inconsistent with the goal
readable and understandable, it is technically inaccurate. Only a masterly an- of the discovery process in civil litigation.
alyst can achieve technical accuracy and readability in one document. The an- Most intelligence analysts have difficulty being advocates because it goes
swer? Don't place consuming emphasis on technical accuracy It is far more against their objective nature. The advocacy process is an adversarial one, and
important to have the message understood. the guidelines for conduct come from the legal profession, in which advocacy
Getting Buy-In: Analyst as Advocate has been raised to a fine an and the pitfalls of improper advocacy are well un-
derstood. R.Y Jones, during World War II, quoted an Operations Research So-
If analysis is done as discussed in this book, then the customer will usu- ciety of America report when he said, "When an analyst participates in an ad-
ally accept and make use of the analysis results. But if the customer does not, versary process he is, and should conduct himself as, and should expect to be
the analyst must shift his or her interpersonal skills in the direction of advo- treated as, an advocate. The rules for an adversary process are different from
cacy and act as a spokesperson for the analytic conclusions. those of research. The former permit biased or slanted testimony and the lat-
In chapter 2 we said that determining requirements and needs is mar- ter are directed toward objective evaluation."21 Jones noted his approval of the
ketingfinding out what the customer wants. This section is about sales passage he was quoting but reserved judgment as to whether the giving of "bi-
getting the intelligence customer to want (and use) what you have. Recognize, ased or slanted testimony" was compatible with honor in a scientist."
however, that this is a controversial recommendation. The Iraqi WMD Com- One answer to this dilemma is the same one that Machiavelli gave to his
mission report criticized this tendency, saying, "In ways both subtle and not so Prince: The conduct that I am describing may not be proper or honorable, but
subtle, the daily reports seemed to be 'selling' intelligencein order to keep it seems to work where proper and honorable conduct does not.23 Jones him-
its customers, or at least the First Customer, interested."18 self went on to cite some examples of how he had slanted or strained the evi-
Analysis often have no choice but to sell the product. Ideally, intelligence dence when, in his judgment, it was the right thing to do. The opposite answer
would be a commodity like foodconsumers would buy it because they need is the one that most analysts would give: Slanting the intelligence reporting is
L
unethical and always a bad idea, even if the customer consequently makes a
bad decision. Support Every Analytic Conclusion
Furthermore, obtaining acceptance from any customer depends on your All conclusions must be clearly traceable to the results of your effort and
reputation as an analyst. A reputation for credibility in the customer commu- explained in the body of the report. Provide, explain, and emphasize key in-
nity is your most valuable asset, h takes a long time to build and can be lost telligence insights. The reader should be able to follow your reasoning at every
in a day. You need to make the customer pay attention, but you cannot sacri- turn. Highlight key words, phrases, or sentences to stress their importance.
fice credibility to do it. If you do, you might as well get out of the business. A Often an analyst is so close to a study that results and conclusions are
few examples: clear to him or her but not so clear to someone not involved in the study. Fur-
thermore, results and conclusions should be carefully scrubbed for both ap-
The KGB was discredited in the eyes of Soviet leadership when the parent and actual contradictions. Consider having several nonparticipants re-
Farewell deception became public, and all of its materiel acquisi- view your results and conclusions prior to the presentation. Take advantage of
tion results were called into question. every opportunity you get for a peer review of your final product. Your peers
can provide excellent feedback on the flow, logic, and clarity of your message.
During the Vietnam War, the CIA discounted and underestimated
Most reports include two levels of detail: a brief but complete summary
the magnitude and significance of the North Vietnamese support
for decision makers and another, more detailed description for fellow analysts.
reaching the Viet Cong through Cambodia's port of Sihanouk-
Your detailed description can contain as much detail as you deem necessary
ville. Subsequent information from a newly recruited source in the
for a technical audience, but you should generally provide sufficient detail to
Cambodian port showed that the agency's estimates were wrong
allow duplication of your results with the proper tools.
and the military's were more accurate. Afterward, whenever the
The final written study report should include a concise executive summary
CIA disagreed with the Pentagon, the White House would ask DCI
Richard Helms: "What about Sihanoukville?"24 right up front to allow the busy reader to get "the bottom line" without poring
through page after page of details. Limit your executive summary to one page.
The Iraqi WMD miscall damaged the credibility of several intelli-
gence community analysis groups, especially the CIA's; it will take Write or Brief with a Purpose
years to overcome that damage.
Because most intelligence products provide information, your customers
expect to hear clear, concisely stated conclusions and projections up front.
Presenting Analysis Results
This means that you write with a purposewhich, if you began by defining
Even if you have followed the guidance in chapter 2 in detail, you still, in the problem as you should have, will be straightforward.
the end, need a vehicle to communicate the results. In intelligence, that almost
always means either a written report or a verbal report (typically, a briefing). Separate Facts from Analysis
The remainder of this chapter concentrates on delivering the presentation and Make it abundantly clear when you move from fact to analysis. Never cover
getting feedback.
up evidence with slick writing. As noted in chapter 7, you inevitably have to
An intelligence presentation may require a written report or the develop- work with incomplete and conflicting information. For this reason your fin-
ment of a briefing, either of which can be a time-consuming activity. Each has ished presentation has to clearly articulate what is known (the facts), how it is
its advantages. The report gets wider circulation and typically has a longer life. known (the sources), what drives the judgments (linchpin assumptions), the
Most analysis projects conclude with some type of written report. The briefing impact if these drivers change (alternative outcomes), and what remains un-
allows direct and immediate feedback to the analyst. Briefings are probably the known. Customers expect logical and objective arguments. Detailed facts may
primary communication method for executives. They usually value the two- or may not be appropriate, depending on the scope of the topic and the tech-
way exchange, and you in turn should value the feedback. nical sophistication, interest, and need of the audience. But the reader or lis-
The important thing is to fit your presentation to the style of the key tener should never be in doubt about whether they are getting facts or analysis.
customer. Although most executives prefer briefings, some like written re- State the Facts. As noted earlier, a typical segment of intelligence includes
ports; an increasing number want an e-mail. You may have to conduct an in- a summary or brief description of relevant facts, written by answenng these
telligence effort on the key customer (which his or her staff will usually coop- questions:
erate in). Find out the customer's favorite way to get information. Some prefer
more lext, some want graphics; a few may want lots of facts and figures. Fol- Who?
lowing are some guidelines for presenting analysis results:
What?
Tne Analyst ana the customer
When? tered the subject area. The audience in a work environment is drastically dif-
Where? ferent. Consequently the style and technical content of your products should
How? change, too.
In intelligence work, the expert is the presenter, not the customer. Hence,
Occasionally, you have to present results that conflict with what the cus- you must write to inform rather than to impress This means that you must
tomer wants to hearthey undercut existing policy, for example. Facts be- make certain that your intended message is absolutely clear to your audience.
come critical in such a case. Your only chance to change a policy decision (and You cannot assume that the reader will be familiar with technical jargon or
a slim chance, at that) is to present concrete, persuasive evidence, and solid, with the consequences or implications of observations or calculations. To com-
factual evidence is the best kind. municate effectively, you must use vocabulary familiar to both ourselves and
Analyze the Facts. The Who -what- when- where-how? questions elicit the the reader. You can introduce new terms, but you must start from some com-
facts of the situation. Then the second part of the segment answers, typically, mon ground, some common understanding. It is this commonalty of under-
two other questions: standing that permits us to introduce something new. The new term or con-
cept then becomes common and can be used in turn to introduce something
Why? else that is new. You must work from old to new, and you must do so in a log-
So what? ical, easy-to-follow manner.
295
3. There will be a protracted armed uprising by Albanians in Kosovo. Yugoslavia. The NIE was prepared in two successive drafts. Both involved
A full-scale, inter republic war is unlikely, but serious intercom- force field analysis, but they differed in the conclusions drawn from the analy-
munal conflict will accompany the breakup and will continue af- sis because they created starkly different target models.
terward. The violence will be intractable and bitter.
4. There is little the United States and its European allies can do to First Draft (the "Muddle-Through" NIE)
preserve Yugoslav unity. Yugoslavs will see such efforts as contra- Van Heuven initially assigned the task of drafting the NIE to a State De-
dictory to advocacy of democracy and self-determination. partment analyst who had extensive background on Yugoslavian and Eastern
European affairs. In the first draft, which was completed dunng summer 1990,
I focus on the Yugoslavia NIE because it illustrates prediction using force the author reviewed the evidence for and against the probability of Yugoslavia's
field analysis and the creation of alternative target models in the form of sce- disintegration and concluded that there was more reason for the republics to
narios. It also is an example oi clear and unequivocal communication to that stay together than to split apart. That first draft is sometimes referred to as the
most difficult of intelligence consumers, the policy-maker. Finally, it was about "muddle-through" NIE because, as van Heuven noted, it predicted that Yu-
a country torn apart by religious and ethnic divisions, but which U.S. policy goslavia would somehow muddle through. It identified a number of forces that
was determined to try to keep together; and Yugoslavia was a place where U.S. were working to hold Yugoslavia together. Those forces are summarized in the
troops might wind up in harm's way It is a scenario that continues to have rel- influence net shown in Figure A-l (see chapter 11 for a discussion of influence
evance. The same scenario appeared in the 1980s U.S. involvement in Lebanon nets). The primary forces for cohesion that it identified were the following;
and more recently in Iraq.
The threat of Soviet intervention had held Yugoslavia together dur-
The Setting ing Tito's life and for ten years after his death.
Yugoslavia, a federation ol six republics, had a long history of instability. The numerically dominant Serbs strongly preferred a united Yu-
It was created in the aftermath of World War I, and for political reasons it goslavia. The officer corps of the Yugoslav Army (the JNA) was over-
united three distinct nationsSerbs, Croats, and Slovenes. Yugoslavia's inter- whelmingly Serbian and was thought to be in a position to prevent
nal boundaries roughly reflected ethnic and historical divisions, but the pop- the nation's collapse.
ulation was so thoroughly mixed that it proved impossible to separate the var-
Economic incentives for remaining integrated were strong, since
ious ethnic groups clearly. This was especially true of the dominant ethnic
the republics' economies by themselves were too small to be viable.
group, the Serbs, who were widely dispersed in the republics. Nationalist ten-
sions had long plagued the region. Religious divisions added to the problems: Fear of the future, specifically fear of ethnic and religious conflict,
the Croats and Slovenes were Catholic, the Serbs were Eastern Orthodox, and was considered a force that would restrain potential breakaway
Bosnia-Herzegovina and Kosovo had large Muslim populations. However, republics.
strongman Iosip Broz Tito ruled Yugoslavia from 194^ until his death in 1980,
and he proved very effective at suppressing tensions and keeping the country
united. Figure A-l Influence Net ModelYugoslavia NIE First Draft
In 1990, though, Tito was gone. The federal central government that was
Tito's legacy was not working well. Foreign debt, inflation, and unemployment
Breakup makes no The Yugoslav national army
had created a troublesome situation. The economy was in trouble, and na- (|NA) will act against
economic sense.
tionalist pressures were causing increasing instability. In March and April 1990 breakaway republics.
Slovenia and Croatia held their first multiparty elections in almost fifty years.
The Communist reformers lost to parties favoring national sovereignty within
Yugoslavia.
The national intelligence officer (NIO) for Europe in 1990 was Marten van
Heuven. In May of that year he visited Yugoslavia to assess the situation. He Yugoslavia will
Fear of the future. hold together. Soviet threat.
concluded that pressures were building for a collapse of the federation. The
ethnic problems alone, he thought, were fast becoming irresolvable. After re-
Noif The arrowi come from boxes that support the conclusion thai Yugoslavia will hold
turning from Belgrade, van Heuven directed the preparation of an NIE on together
ATakofTwoNIEs 299
Some of the failures of objectivity discussed in the introduction to this book Figure A-2 Influence Net ModelYugoslavia NIE Second Draft
may have influenced the first NIE. The U.S. State Department had a vested in-
terest in preserving Yugoslavia as a state, or at least seeing a peaceful breakup if No strong central leader
Yugoslavia could not hold together, an organisational bias that may have shaped has replaced Tito.
the analysis. Wishful thinking may also have played its pan. One of the forces
Croatia and Slovenia
keeping Yugoslavia together was "fear of the future." But it appears that the fear would be better off The |NA is weakening.
was on the U.S. side. When a National Security Council staff member cold the economically as
Slovenes and Croats that a declaration of independence would start a war, they independent states.
replied, "So what?" Finally, in Yugoslavia the United States encountered a dif-
ferent way of thinking, and ethnocentric biases may have been at work. Both the
Ethnic, religious, and Yugoslavia will History of suspicion
U.S. culture and its legal system stress religious and ethnic tolerance. The re- break apart.
nationalistic differences. and hostility.
publics of Yugoslavia have a long history of religious and ethnic strife and in-
tolerance. The first NIE draft simply didn't take this critical force into account. Note: The arrows come from boxes thai support the conclusion lhat Yugoslavia will break apart.
Van Heuven was skeptical of the conclusions; they didn't fit with the sit-
uation he had observed in his visit to the region. He wanted to see an alterna-
tive model, and he got it in the form of a second draft NIE.
The resulting NIE was remarkable in several respects. All of the major
Second Draft: Force Field Analysis contributors to it agreed on the facts. Most NIEs have footnotes indicating (hat
Van Heuven assigned the task of producing a second NIE draft to other a segment of the intelligence community disagrees with some of the conclu-
experienced observers of events in Yugoslavia, including CIA analyst Harry sions, but this one did not. The predictions that I quoted at the beginning of
Yeide, who had served in the region and was intimately familiar with the is- this appendix were exceptionally accurate. And the NIE had almost no effect
sues involved. The second NIE draft presented an alternative model or sce- on U.S. policy.
nario of the future. It concluded that the forces that had held Yugoslavia to-
gether in the past were weak or nonexistent and that current forces were acting The Customer View
to tear Yugoslavia apart. Those forces are summarized in the influence net di- From a policymakers point of view, the Yugoslavia NIE was unwelcome.
agram in Figure A-2: It predicted what would happen, but it gave the policymakers nothing to do.
U.S. policy preferences were, first, to keep Yugoslavia together. Failing that,
The Yugoslav National Army was less inclined than before to inter- the policymakers wanted a peaceful breakup, and if all else failed, a managed
vene unless Serbian interests were seriously threatened. It would disaster. They got none of those. The disintegration began in 1991, and it was
not intervene in Croatia in any event, since Croatia had no Serbs. brutal and bloody. The fighting and "ethnic cleansing" that resulted claimed
No strong central leadership had replaced that of Tito. about 200,000 lives.
The Soviet threat was long gone. If the NIE had a flaw, it was that it did not constructively engage the
policymaker. The key judgments flatly predicted a breakup accompanied by
The breakup made no economic sense for Yugoslavia taken as a
long and bitter conflict but offered no suggestions for what might ease the im-
whole, as the first draft indicated, but Croatia and Slovenia would
be better off economically as independent states. pact of the breakup. Furthermore, U.S. government attention at the time was
rapidly becoming focused on events in the Middle East, where Iraq was about
The first draft downplayed what were probably the dominant to invade Kuwait. So, as one analyst said, the United States simply stopped
forces in action: the ethnic and nationalistic differences among the caring until the atrocities mounted.
peoples of Yugoslavia, the history of hostility and suspicion, and Furthermore, the NIE apparently was leaked to the New York Times. Its
the religious divisions. publication in the Times may have hastened the dissolution of Yugoslavia by
Fear of the future was not a factor. As noted earlier, the United indicating to all of the parties involved that the United States recognized the
States may have feared the future, but the breakaway states of inevitable. The argument could be made that, as a result of its open publica-
Croatia and Slovenia did not. tion, the NIE was a net disservice to the U.S. government.
300 Appendix AToIeo/TwoNIEs 301
The Iraqi Weapons of Mass Destruction NIE that point. A broader look at Iraq's overall military capability would have found
In October 2002, at the request of members of Congress, the National In- more logical explanations for some of the evidence. For example,
telligence Council produced an NIE on the Iraqi weapons of mass destruction
(WMD) program. That document concluded In March 2001, intelligence reporting indicated that Iraq was ac-
quiring high-strength aluminum alloy tubes.3 CIA and Defense In-
That Iraq was reconstituting its nuclear weapons program and was telligence Agency analysts concluded that Iraq's purchase of alu-
actively pursuing a nuclear device; minum tubes was intended to support a gas centrifuge uranium
enrichment program. Focusing only on whether the tubes could be
That it possessed a biological weapons capability that was larger
used for centrifuges, analysts ignored evidence that the tubes were
and more advanced than before the Gulf War and that included
better suited for use in rockets. The tubes in fact had precisely the
mobile biological weapons production facilities;
same dimensions and were made of the same material as tubes
That Iraq had renewed production of chemical weapons, including used in Iraq's conventional rockets. In a classic example of prema-
mustard, Sarin, GF (cyclosarin), and VX, and that it had accumu- ture closure, CIA cited the existing judgment as a reason for re-
lated chemical stockpiles of between 100 and 500 metric tons; and jecting the suggestion of one of its officers that they obtain the pre-
That it possessed unmanned aerial vehicles (UAVs) that were prob- cise specifications of the rocket to evaluate the possibility that the
ably intended for the delivery of biological weapons.2 tubes were in fact intended for rockets (57, 68).
The NIE concluded that Iraq was developing small UAVs that were
All of these conclusions were wrong. Concerning this NIE, the Commis- probably intended to deliver biological weaponry agents. In reach-
sion on the Intelligence Capabilities of the United Slates Regarding Weapons ing this conclusion, the community (except for the Air Force) failed
of Mass Destruction (the WMD Commission) said: to consider other possible uses for the UAVs and dismissed coun-
tervailing evidence. As one CIA analyst explained, the purpose of
We conclude that the Intelligence Community was dead wrong in almosi all
the NIE was to discuss Iraq's WMD programs, so the analysis did
of its pre-war judgments about Iraq's weapons of mass destruction. This was
a major intelligence failure. Its principal causes were the Intelligence Com- not explore other possible uses (145). A broader problem definition
munity's inability to collect good information about Iraq's WMD programs, would probably have concluded, correctly, that the preponderance
serious errors in analyzing what information it could gather, and a failure to of evidence indicated that the UAVs were intended for battlefield
make clear just how much of its analysis was based on assumptions, rather reconnaissance.
than good evidence, (quoted from the WMD Commission report cover letter)
A better problem definitionone that required inputs from political, eco-
There were failures in both collection and analysis, and the WMD Com- nomic, and military analysts, as well as weapons systems analystswould
mission report covers them exhaustively I focus here on the analytic failures, probably have avoided some of the most serious analytic lapses in the NIE. As
beginning with one that the WMD Commission report touched on but did not the WMD Commission noted, multidisciplinary issues were in fact key. The
emphasize. Yugoslavia NIE considered military, political, economic, and social forces. But
there was little serious analysis of the sociopolitical situation in Iraq or the mo-
Poor Problem Definition tives and intentions of Iraqi leadership. Weapons systems analysts are not
Poor problem definition was perhaps the root cause of the NIE's analytic likely to ask questions such as, Is Saddam bluffing? or, Could he have decided
failures. The effort failed at its beginning because the NIE began by failing to to suspend his weapons programs until sanctions are lifted? An analyst of Iraq's
ask the right question. A problem breakdown that is too narrowly constrained, politics and culture likely would ask such questions (13).
as this one was, overly restricts both the target model and the conclusions.
Most of the other failures derived from failing to properly define the problem. Poor Evaluation of Sources and Evidence
The problem definition focused solely on the question of whether Iraq had The WMD Commission faulted analysts for making judgments based on
WMD programs, and if so, what they were. By focusing on weapons of mass insufficient evidence. Analysts were too willing to find confirmation of their
destruction, analysts had a tendency to fit all evidence into a WMD model. An- judgments in evidence that should have been recognized at the time to be of
alysts assumed that Iraq had WMD programs, and analysis proceeded from dubious reliability. They readily accepted any evidence that supported their
302 Appendix ATaieo/TwoNIEs 303
theory that Iraq had stockpiles and was developing weapons programs, and sites. They apparently did not consider an alternative hypothesis
they explained away or simply disregarded evidence that pointed in the other that the trucks might be used for other purposes, as turned out to
direction. Two of the most egregious examples were the evaluation of a key be the case. And they failed to recognize thai the more frequent ob-
human source on Iraq's biological weapons program and of both human and served activity of the trucks was an artifact of increased imagery
imagery sources on Iraq's chemical weapons program. collection (122,125). The trucks were simply observed more often
The conclusions about Iraqi biological weapons (BW) relied heavily on a because of more imagery reporting.
single source, an Iraqi chemical engineer nicknamed "Curveball." This source One of the human sources, an Iraqi chemist, provided extensive re-
claimed that Iraq had several mobile units for producing BW agents. The evi- porting, about half of which was absurd. Despite evidence that he
dence Curveball presented fell short of being credible by the criteria advanced might not be a credible source, analysts used his report that Iraq
in chapter 7: had successfully stabilized the nerve agent VX in the N1E because
it fit their existing mindset (127). Another source reported that
Competence. Curveball was variously described as a drinker, unsta- Iraq was producing mustard and binary chemical agents but also
ble, difficult to manage, "out of control," and exhibiting behavior reported on Iraq's missile, nuclear, and biological programs. Given
that is typical of fabricators (91, 97). Iraq's known use of compartmentation to protect sensitive weapons
Access. There was no evidence of access to BW laboratories. Cor- programs, analysts should have recognized that the source was un-
roborating evidence only established that Curveball had been to a likely to have had access to all these programs (128).
particular location, not that he had any knowledge of BW activities
being conducted there (113). Failure to Consider Alternative Target Models
Vested interest or bias. Curveball had a motivation to provide inter- The Iraqi WMD NIE contained numerous examples of analysts' selecting
esting intelligence to obtain resettlement assistance and permanent a single hypothesis (or target model) and attempting to fit all evidence into
asylum (96). that model. The failure to seriously consider alternative missions for Iraq's
Communications channel The reporting came through liaison with UAV program and alternative uses for the aluminum lubes have already been
noted. In addition, analysis
the German intelligence service, and U.S. intelligence officials were
not provided direct access to Curveball, The communications chan-
Failed to consider flaws in the larget model they were using. If Iraq
nel between Curveball and U.S. WMD analysts therefore had many
had used all the aluminum tubes ihey were acquiring for cen-
intermediate nodes, with consequent possibilities for the analysts to
trifuges, they would wind up with 100,000-150,000 machines, far
receive a distorted message.
more than any nuclear weapons proliferaiors would build (85). All
Analysts evaluating Curveballs information were aware of some of these target models should undergo a saniiy check: Does ihe model in-
problems but nonetheless took his reporting as reliable and continued to make luitively make sense?
it the basis for judgments in the N1E and subsequent judgments about Iraq's They also failed to consider the Occam's razor aliemaiive (see
biological weapons program. They dismissed imagery evidence of flaws in chapter 7)that the reason the^ could find no mobile BW labora-
Curveball's reporting as being due to denial and deception by the Iraqis (92). tories after an intensive search was that the labs didn't exist (93). It
That Curveball was a fabricator was subsequently confirmed. is virtually impossible to prove a negative in the intelligence busi-
The N1E also erroneously concluded that Iraq had restarted chemical ness, but the negative at least deserves to be considered.
weapons production and increased its chemical weapons stockpiles; the con-
Poor Analytic Methodology
clusions were based on poor evaluation of both imagery and human sources:
The raw intelligence that was available to analysts was mostly historical,
Analysts relied heavily on imagery showing the presence of largely as a result of Iraq's denial and deception programs. Intelligence about
"Samaria-type" tanker trucks at suspected chemical weapons (CW) developments since the late 1990s depended heavily on IMINT and some ques-
facilities. The distinctive trucks had been associated with CW ship- tionable HUMINT, MASINT, COMINT, and open sources contributed very lii-
ments in the 1980s and during the Gulf War. Analysts also be- tle (165). As a result, analysts had, in effect, to "predict" the present state of the
lieved that they were seeing increased Samarra truck activity at the WMD programs.
304 Appendix ATaleo/TwoNIEs 305
They did so by extrapolation based on past history. The intelligence com- did not adequately communicate to the policymakers their uncertainties.
munity, prior to the 1991 Gulf War, had underestimated Iraq's nuclear program Many of the analytic products obscured how heavily their conclusions rested
and had failed to identify all of its chemical weapons storage sites. That history on inferences and assumptions (12). The NIE started out on the wrong foot
shaped the community's selection of the forces acting to shape Iraq's WMD ef- with a poor problem definition. It ended badly, as the WMD Commission
fort. Specifically, Iraq had the same leadership, presumably with the same ob- noted (3), in a failure to communicate.
jectives concerning WMD; a history of WMD development; and a history of con-
cealment. Those forces provided the starting point for what was a straight-line Notes
extrapolation, much like the extrapolation that resulted in the "muddle-through" 1. The (acts in this appendix are taken from a case study prepared by Thomas \V Shreevc for the
Naiional Defense University in May 2003. tilled "A National Inlelligence Estimate on Yugo-
Yugoslavia NIE draft. Analysts assumed that the forces that were present in 1991
slavia." See Thomas W Shreeve, "The Intelligence Community Case Method Program1 A Na-
were still present, with no allowance for changes since 1991. The constant inter- tional Intelligence Estimate on Yugoslavia," in Intellige nrr and the National Seainly Strategist: En-
national scrutiny and the consequent high risk that any continuing WMD pro- during Issuer and Challenges, ed. Roger Z. George and Robert D Kline (Washington. O C i
gram would be discovered and bring on additional sanctions or military action National Defense University Press, 2004)
were not taken into account. And a continuing, very important force was not 2 Report of the Commission on the Intelligence Capabilities oj the United States Regardmg Weapons of
considered: Saddam's ambition to be a major player in Mideast power politics, a Mass Destruction, Match 31, 2005, wwv..wriid.gov/repon/wm<J_repoit.pd(, pp. 8-9
!5 Report o/lfte Commission, 55. Subsequent references to the repoil are by page number m the
motivation that would cause him to conceal his lack of weapons of mass de- appendix text.
struction. The result of a combination of poor force field analysis and lack of in-
telligence was an estimate based on extrapolations (16&-169).
The UAV estimate, for example, was based heavily on a straight-line ex-
trapolation. Before the Gulf War, Iraq had been in the early stages of a project
to convert MiG-21 jet aircraft into UAVs for biological weapons delivery. Iraq
had also experimented in 1990 with a BW spray system, designed to be used
with the MiG-21 UAV In the mid-1990s Iraq began testing another modified
jet aircraft, the L-29, as a UAV Analysts concluded that the L-29 was a follow-
up to the MiG-21 program. When the new and smaller UAVs made their ap-
pearance, analysts wrongly extrapolated that these UAVs were simply a con-
tinuation of the BW delivery program (141-145).
The most compelling analytic methodology failure, however, was the one
that Martin van Heuven avoided. As the national intelligence officer in charge
of the Yugoslavia NIE, van Heuven forced the consideration of a second target
model, which ultimately was used in the NIE. The Iraqi weapons NIE drafters
gravitated to a single model and apparently failed to consider a logical, top-level
alternative hypothesis or model: that Iraq had abandoned its WMD programs.
306
308 Index
Egypt, 2, 4, 70 rules for combining evidence, 129 Foreign instrumentation signals intelligence cultural aspect, 237-241
Electromechanical switch, 257 source evaluation, 115-118 (F1SINT), 85 emotional aspect, 241
Electro-optical imaging systems, 101-102 structured augmentation, 131-134 Force synthesis/analysis, 179-180, models, 59
EhcHation, 91-92 synergism of combined data, 122 214-225. See also Extrapolation; predictive behavioral analysis, 240
EL1NT (electronic intelligence), 85, Existing reports, 83-84 Forecasting, Prediction; Projection; rational aspects, 235-238
104-105 Expert opinion, 125-126 Scenarios; Simulation Fusion, 53
in collection taxonomies, 85 Exploratory scenarios, 186 contamination, 180, 217-218, 226 Future, See also Forecasting; Prediction;
combining with other data, 122 Exponential (disaster) curves, 60-61 countervailing forces, 216-217 Scenarios
computer emanations, collecting, 109 Extrapolation, 176, 196-199. See also definition of, 179 predicting organizational, 180-182
definition of, 104 Force synthesis/analysis; Forecasting; driving force scenarios, 184-185 technological performance, 253-254
Monte Carlo simulations, 206-207 Prediction; Projection; Scenarios; feedback process, 221-223
operational, 104-105 Simulation forecasting and, 209 Gap analysis, 145-147,286
protection of sources and methods, 159 analysis of alQaeda. 180-182 freedom and incentive, 257-258 Gas pipeline, South Asia, 79-80
purposes of, 104 autocorrelation, 197 inertia, 196, 214-216 Gates, Bill, 175
technical, 104 Box-Jenkins, 197-198 influence trees and diagrams, 201-205 Gaussian (normal) curves, 60-61
in warfare, 104, 220 correlation analysis and, 198-199 Kalman filter and, 176-177 General Electric, 258-259
Electronics warfare, 220 definition of, 196, 199-200 national power, instruments of, 179-180 Generalized network analysis, 19, 71, 230,
Emigres, 92 forces and, 197-198 projection and forecasting, 200 234-235
Emergent scenarios, 188 inertia and, 196 qualitative, 180 General Motors, 92-93
Emission control (EMCQN), 157 limits of, 199 regulatory forces, 223-225 Genetic research, 257-258
Emotional analysis, 241 projection and forecasting contrasted scenario construction, 178, 184 Geophysical intelligence, 107
Empathy, 278 with, 195-196 Sun Tzus The Art of War, 179 Geospatial intelligence (GE01NT), 78-80,
Encryption, 160 straight-line, 196, 198 synergy, 219-221 85,87
Engineering risks, 248 techniques, 196-197 unintended consequences, law of, Germany. See also World War II
England, 2, 139-140, 207, 220, 224-225. 224-225 and counterintelligence, 41, 42
See also British intelligence Facts Forecasting, 17, 66, 208-212, See also Volkswagen corporate defectors and,
steelworkers, 215 definition, 121 Extrapolation, Force synthesis/analysis; 92-93
Enigmas, 154 Fahey, Liam, 191, 195, 227, 230, 234, 238 Prediction; Projection; Scenarios; in World War 1, 87,94-95, 96-97, 161,
Entropy, 119-120 Failures, intelligence, 1-5, 6 Simulation 166,269,270
Environmental theory, of genetics, 257-258 in acting on intelligence, 4-5, 6 analysis ofal Qaeda, 180-182 Global positioning system (GPS), 75
Equation-based modeling, 77-78 in analysis, 3-4, 6 assumptions, 210-211 Glomer Explorer, 95, 167
Equivalence, 231, 233-234 in sharing information, 2-3, 6 conceptual model, 210-211 Gorbachev, Mikhail, 179
Escobar, Pablo, 12-13, 31, 37-38, 46, 96 Falkland Islands conflict, 2, 4, 5 definition of, 208-209 Graphics, in presentations, 292
Escobar drug cartel, 17-18 False alarms, 56 evaluation criteria, 211-212 Graphing. See also Curves; Models and
Essential elements of information (EEls), False-positive feedback, 223 failures in, 210 modeling; Presentation, of analysis results
27 False signals, 167 force synthesis/analysis, 209 chronological models, 44. 46, 63-64
Estimation, point and interval, 206 farewell deception campaign, 163-164, influence net models, 205-206 correlation and regression, 198-199
Ethnocentric bias, 3-4 288 Kalman Filter and, 176-177 cost and utility, 249-250
Evaluation, of evidence, 114-129 Feedback and feedback loops, 11, nonlinear approach, 209-210 geospatial modeling, 78-80, 87
Evidence, weighing of, 114-136. See also 165-166, 221-223, 226. See also Force objectives of, 209 histograms, 63
Collection of intelligence, Sources of synthesis/analysis probabilistic reasoning, 200, 204 linear programming, 243-244
intelligence countering deception and, 165 probability estimates, 206-207 in presentation of results, 66
alternative target models, 134-135, 137 definition of, 221 sensitivity analysis, 207-208 social networks, 231
anomalies, 123 false-positive, 223 single-point, 191 timelines, 190
bias, 116-118 Heisenberg's Uncertainty Principle, techniques, 210-211 Gray literature, 88-89
communications channel evaluation, 236-237 France, 9 Great Britain. See British intelligence,
118-121 influence trees and, 204-205 and counterintelligence, 41, 42 England World War II
convergent and divergent evidence, nuclear power example, 223 Francis Ferdinand, Archduke, 173 Gresham's Law of Currency, 217-218
129-130 positive and negative, 222-223 Freedom, and technological innovation, Gunnery method, naval, 215-216
credibility of intelligence, 121-123 in process models, 74-75 257-258 Guns o/August, The, 173
data vs. evidence, 123 process of, 221 Function, in organizational analysis, 227,
hearsay evidence, 120 time delays, 222-223 235-242 Hackers, 109-110
Occam's razor, 115 Fermi, Enrico, 27 Functional and behavioral analysis, Hall, Keith, 12
pitfalls, 123-129 Fingerprint (radar signals), 105 235-242. See aiso Organizational analysis Hawthorne Works experiment, 236-237
redundant evidence, 130-131 Fluidics, 99 collective decision making, 241-242 Hearsay evidence, 120, 125
312 Index Index 313
Hegel, Georg Wilhelm Friednch. 216 photography and video, 101 research, 53 Kodak, 261
Heisenberg's uncertainty principle, protection of sources and methods, 159 as target-cenmc process, 9-10. 13-17 Korean War, 210, 283
236-237 radar, 101 target as complex system, 17-18 Kormatsu Corporation, 217
Heuer, Richard].,Jr., 125 time series data analysis, 64 target as network, 19-20 Knickebein, 270
Hierarchy models, 65-67 Impotence principles, 126-127, 236 traditional cycle 10-13, 22 Kuwait, 56, 169, 206
Hierarchy of needs, 240 Incentive, and technological innovation, Intentions, in tactical intelligence, 54
Histograms, 63 257-258 Interaction matrix, 70 Lafler curve, 228-229
Hmites, 94 India, nuclear tests, 164-165 Intercontinental ballistic missiles, 269 Land, Edwin D., 261
Honeywell-Bull merger, 223-224 Indications and warning (l&W), 54-57 Internet, 9, 109 See also Computers and Langmuir, Irving, 217
Hughes, Howard, 95 Individual assessments, 74 computer software Laser radar techniques, 99-100
HUMINT (human intelligence), 85, 89-95, Inertia, 186, 196, 214-216,225 computer viruses and worms, 110 Last Trump, The (Asimov), 217
112 Inferential force, 121 and network-centric approach, 22 Law enforcement
advantages and disadvantages, 89 Influence net modeling, 205-206 and open source intelligence, 88 as customers of intelligence, 9, 284
bona fides, determining, 115 on Yugoslavia, 297,299 security issues, 109-110, 187 and human intelligence, 89
clandestine sources, 90, 93, 124 Influence trees and diagrams, 201-205 Trojan horses, 110 and informants, 89
collection performance, 153 Information, See also Evidence, weighing of: Interpol, 42, 143 and link modeling, 67
in collection taxonomies, 85 Sources of intelligence Interval estimation, 206 and network models, 71-72
combining with other data, 90, 122, 130 actionable, 9 Ionospheric research, 117 and operational intelligence, 50
commercial purposes, 90 automation of data handling, 83 Iraq, 56, 245 and tactical intelligence, 51
denial and deception, 160, 165 definition, 121 commission on WMD, 3, 15, 33, 129, Law of unintended consequences, 224-225
elicitaiion. 91-92 direct vs. indirect, 121 142 Layering stage, 144
Emigres and defectors, 92-93 glut, 16 Saddam Hussein, 167, 169, 206 Leadership profiles, 50
ex pen opinion, 125-126 operations, 21, 109-111 Israel, 2, 135 Lebanon, 26, 135
as hearsay evidence, 125 Information processing systems. See Iteration alternative models for. 136
history of, 86 Computers and computer software approach to predictive analysis, 178 Levy, Walter, 87
liaison relationships, 90-91 Innovation. See also Technology assessment refinement process, 75 Libya, 245
materiel acquisition, 93-95 champions (change agents), 260-261 Liaison relationships, 90-91
and open source intelligence, 89-95, 122 climate, 256-259 Japan, 186 Licensing, of technology, 263
placement and integration stage, 145 in divergent phenomenon 255 economic probability estimation, 206 Linchpin premises, 202
sampling techniques, 93 Duponi products, 256 keiretsu (business networks). 61-62 Lincoln, Abraham, 116
source analysis, 116-117, 122 freedom and incentive, 257-258 technology diffusion, 261 Linear models, 28, 38
sources of, 89 inertia, effect of, 216 television industry, 238 Linear programming, 243-244
in traditional intelligence cycle, 10 prediction of, 254-255 worker mobility, 261 Link models, 67-69
validated, 11 regulatory forces and external factors, 260 in World War II, 55, 173, 237-238 Links, in networks, 18, 19
Hum for Red October, The, 270 resistance to, 260 Jones, R. V, 126-127, 143, 236, 269-270, Lists and outlines, 59
Huntington, Samuel P. 36, 217 sources, 256 287-288 Literature intelligence (LITINT), 86, 87
Huxley, Aldous, 185 and synergy, 220 Journals, 86 Lopez de AmortuaJ. Ignacio, 92-93
Hyperspectral imagery, 102 timing, 254, 255-256 Los Angeles Police Department, 67
In situ sensors. 103-104 Kahn, Herman, 184 Lowenthal, Mark, 17
IBM, 175,260 Insurgency, influence tree for, 203-204 Kalman Filter prediction method, 176-177 Lucas, George, 8
IMINT (imagery intelligence), 41, Integration stage, 144 Keiretsu (Japanese business network),, Lysenko, Trofim D., 257-258
100-102, 112, 151 Intelligence (INT) process, 8-23- See also 61-62
collection performance, 153 Analysis; Analytic spectrum. Collection of Kelly, John, 169 Machiavelli, Niccolo, 278
in collection taxonomies, 85 intelligence; Denial and deception; Kelly, William, 215 Mafia, American, 90-91
combining with other data. 100 Evidence, weighing of; Force Kemper Tregoe Rational Management Magnetic sensing, 107
commercial imagery, 87, 100 synthesis/analysis; Models and modeling; Process, 176 Magnetron, 269
definition and purposes of, 100 Organizational analysis. Presentation, of Kennan, George, 174 Maktab al-Khidarnat (MAK), 180
denial and deception techniques, analysis results; Prediction; Problem Kent, Glenn, 27 Man Who Never Was, The, 161
157-158, 160 definition model; Sources of intelligence; Kent, Sherman, 12 Maslow, A. H.,240
electro-optical imaging systems, Target-centric approach; Target model; Key intelligence questions (KlQs), 27 Market research, 9, 189
101-102 Technology assessment Kildall, Gary, 174 Martinez, Hugo, 14
history of, 86 analysis!" 271-2 74 Kim II Sung, 210 Materiel acquisition, 93-95
hyperspectral imagery, 102 collection method, 84 Knorr, Klaus. 129 Matrix models, 65, 70-71
muliispectral imagery, 102 failures, 1-5 Knowledge gaps, 14. 15, 142, 145-147, McDonnell Douglas, 266
open source, 84, 100, 141 reducing uncertainty, 8-9, 22 286 McNamara, Robert, 281
L
Measurement and signatures intelligence link and social network models, 67-69, definition of, 19 Operation Barbarossa (1941), 1, 4
(MASINT), 102 71 equivalence, 231, 233-234 Operation Iraqi Freedom, 15
m collection taxonomies, 85 lists, 59 generalized networks, 230, 234-235 Operations research, 9, 242-244
Measures of effectiveness, 273 matrix, 65, 70-71 geospatial modeling, 7880, 87 Opportunity costs, 152
keiretsu Qapanese business network), Organizational analysis, 227-250. See aha
Mergers and acquisition ''mirror imaging," 61-62
61-62 Business and commercial intelligence;
case-based reasoning and, 189 network models, 71-72
law enforcement, 71-72 Functional and behavioral analysis;
Honeywell-Bull, 223-224 normative, 37
models of, 71-72 Networks, Structural analysis
interactive matrix model of, 70 pattern models, 62-65
netware (network-centric warfare), antipathy to change, 214-215
Mexico. 20 pitfalls, 61
20-22 centrality, 231
Microphones, 97-98 premature closure of, 4, 128-129
network-centric collaboration process, 13 collateral modeling, 43-46
Microsoft Corporation, 175 process, 44, 58, 74-75
nodes of, 18, 19,230-231 collective decision making, 241-242
Microwaves, 254 profiles and modal personality models,
electromagnetic spectrum, 103 72-74 in operation research, 244 comparative analysis, 266-268
opposing, 19-21 contamination phenomenon, 180,
radar imaging, 269 relationship, 65-66
radio frequency flooding, 99 relationship-time displays, 78 organizational structure analysis, 217-218,226
radiometers, 107-108 229-234 cultural aspect of decision making.
relevance tree, 66-67
remote sensing, 103 social networks, 229234 237-241
simulation, 38-39, 75-77
star networks, 232 emotional aspect of decision making,
space object identification radars, 106 space-time, 80
Military leadership, 283-284 spatial, 64-65 targets as, 18, 19-22 241
Military systems simulation, 271-272 statistical, 62-63 types of generalized, 234 equivalence, 231, 233-234
"Mirror imaging," 61-62 Newton's First Law (inertia), 214-215 feedback process, 221-223, 226
strategic intelligence and, 49-50
Misinformation, 158 Newton's Third Law (dialectic), 216 force impact and, 217
structural, 39, 44, 59
Missile guidance systems, 219-220 New York Times, 299 hierarchies modeling, 66
submodels, 43
Nike-Hercules missile, 219-220 keiretsu (business networks), 61-62
chronological model of, 63-64 synthesis/analysis approach, 5, 69
hierarchy target model of, 66 systems, 59 Nodes motivation assessment, 240
in influence net modeling, 205-206 network analysis, generalized, 230,
Modal personality, 72-73 tactical intelligence and, 50-51
Modeis and modeling, 58-82. See also validation, 273-274 in networks, 18, 19 234-235
in social networks, 230-231 network analysis, overview of, 229-230
Curves; Prediction; Problem definition uses, 35-36
Nonlinear models, 38 network analysis, social, 229-234
model: Scenarios; Simulations; Sources of Money laundering, 68-69, 143-144, 145,
intelligence; Target-centric approach; 146, 148, 149-151,217,230 Normal (Gaussian) curves, 60-61 objectives, 217-218
Target model Normative models, 37, 186 perspectives on, 227-228
Monte Carlo model, 76, 206-207
case-based, 188-189 Montgomery, Bernard, 97 North Korea, 210 predictive behavioral analysis, 240
chronological. 46, 63-64 Morgan Procurement, 69 Nuclear sensors, 102, 108 program cycle, 243-246
collateral. 43-45 Morgenstem, Oscar, 235 Nuclear tests, 164-165 project loading, 246
communication network, 71 rational aspect of decision making,
Motivation assessment, 240
comparative (benchmarking), 61-62, MOVEINT (movement intelligence), 80 Objectivity, of analysts, 5, 277-278 235-238
268-270 Multiplexing, 105 Occam's razor, 115, 267 risk analysis, 247-248
conceptual, 37. 58-59 Multispectral imagery, 102 Openness, to share information, 3 specialization vs. flexibility, 240
curves, 59-61 Multivariate regression, 198 Open source inielligence (OPINT), 9, 84. structural effectiveness, 229
defining relevant system for, 58-59 Murphy s Law, 225 See also Sources of intelligence structure size and capabilities, 228-229
definition of, 36 Myers-Briggs Type Indicator, 74 abundance of, 88 Oracle Corporation, 90
descriptive, 37-39 Mythical Man-Month, The (Brooks), 246 analyzing business activities, 145 Orwell, George, 185
in collection taxonomies, 84 " Ownership networks, 234
econometric and input-output, 77-78
equations as, 77-78 Naples, Ilaly, 123 combining with other data, 122
functional, 44, 59 commercial imagery, 87, 100 Palo Alto Research Center (PARC), 260
National Geospatial-Intelligence Agency, 85
generalized network, 71 hard copy sources, 88-89 Parochial interests, 4
National Intelligence Estimates, 265
generic, 46, 59-61 case studies on, 295-305 and imagery intelligence, 84, 100 Particle beam weapon, 270
geographic profiling, 80-81 National Security Council, 283 on-line data sources, 88 Pasteur, l.ouis, 3
geospatial, 78-80, 87, 183 Natural gas pipeline, 79-80 political analysis and, 87 Patents, 253, 259-260
protection of methods, 160 Pattern models and analysis, 62-65, 253
hierarchy models, 65-67 Negative feedback delays, 222-223
hierarchy of, 36-37, 140 Netwar, 20-22 technology and the "bathtub" curve, Pearl, Daniel, 124
253, 259-260 Pearl Harbor, 2, 54, 55-56, 237-238
interactive, 70-71, 75 Networks. See ako Organizational analysis
iterative refinement of, 46, 75, 178 types of information, 86-87 Perception management, 161, 170
analysis. 244
Kalman Filter prediction method, value of, 87 Performance analysis, of technology,
centrality, 231
176-177 communications. 118-120 Operational intelligence, 50 265-268
Index 317
Personality modeling, 72-73 overview, 172-173 program cycle, 245-246 Radio signals, covert, 35
Philosophical disposition, 128-129 probabilistic reasoning, 200, 204 project loading, 246 RAND Corporation, 20, 27, 184
Photography, 101, 122 probability eslimation, 206-207 risk analysis, 247-248 Redundant evidence, 130-131
Physical models, 37 projection, 176 Proctor and Gamble, 90 Regression analysis, 198-199
Pipeline, gas. South Asia, 79-80 rational decision prediction, 235-236 Production risks, 248 Regulation, 179-180, 183, 223-225, 226
Placement stage, 144 scenarios, 182-191 Profiles assessment of, 260
Plans and planning, 54 sensitivity analysis, 207-208 geographic, 80-81 Relationship analysis, 229 See also
opportunities and threats, 53-54 synergy, 219-221 modeling of, 72-74 Networks
strategic planning, 49-50, 53-54 technological analysis as aid to, 252 psychological, 122 in scenarios, 183-184, 190-191
in traditional intelligence cycle, 10 of technological innovation, 254-255 Program cycle, 245-246 Relevance of forecasts, 212
Plausibility of forecasts, 212 technology prediction types, 252 Program Evaluation and Review Technique Relevance tree, 66-67
Point estimation, 206 Premature closure, 4, 128-129 (PERT), 148 Reliability, 121
Poker analogy, 170 Presentation, of analysis results. See also Program loading, 246 Remote sensing, 103
Polaroid, 261 Analysis; Collection of intelligence; Programmatic risks, 247 Reasoning, case-based, 188-189
Policymakers, 174, 281-283, 287 Graphing Projection, 176. See also Extrapolation; Research and development (R&D), 264
Political networks, 234 acronyms, use of, 292 Forecasting; Force synthesis/analysis; Resource costs, 152
analysis, 149 analyzing facts, 290 Prediction; Projection; Scenarios; Risk analysis, 152, 247-248
political issues as scenarios factors, 187 getting to the point, 290 Simulation Risk management, 248
strategies-to-task breakdown, 29 graphics, 292 alternative outcomes for, 200-203 Role equivalence, 233-234
Polls, 93, 236 informing, 290-291 analysis of al Qaeda, 180-182 Ronfeldt, David, 20, 52
Populating the model See Evidence, purpose, 289 correlation and regression, 198-199 Roosevelt, Theodore, 216
weighing of stating facts, 289-290 definition of, 195, 199-200 Royal Dutch Shell, 21, 186
Positive feedback systems, 222 types of, 288 force synthesis/analysis and, 200 Rusk, Dean. 283
Power Prevention tactics, 48-49 influence net modeling, 205-206 Russia See fllio Soviet Union
levers of national, 179-180, 191 Primary sources, 120 influence trees and diagrams, 201-205 and counterintelligence, 41, 42
in social networks. 231-232 Probabilistic reasoning, 200, 204 probabilistic reasoning, 200, 204 in World War 1, 96-97
Predator Unmanned Aeronautical Vehicle, Probability estimates, 206-207 probability estimates, 206-207
17,39 Problem definition model, 24-34. See abo sensitivity analysis, 207-208 Saddam Hussein, 167, 169, 206, 301
Prediction, 41, 172-192. See also Models and modeling Project loading, 246 Sampling techniques, 93
Extrapolation; Forecasting; Force complex problems, 30-32 Proleus, 185 Samsonov Aleksandr Vasiliyevich, 96-97
synthesis/analysis; Projection; Scenarios; counterintelligence problem breakdown Proverbs, and cultural analysis, 239 Sarajevo assassination, 173, 184
Simulation 32-33 Psychological contract, 240 Satellites, 19. See also MINT
behavioral analysis, 240 customer identification, 24, 25 Psychological profile, 122 commercial imagery, 87, 100
chronological models, 63-64 deadlines, 25 Putin, Vladimir, 174 communications interception, 98
confidence, 208 dynamic nature of, 31 photography, 122
convergent and divergent phenomena, evolving set of interlocking issues, 30 Qualitative force synthesis/analysis, 180 radar observation of, 106-107
173-175 initial questions and clarification, 25-26 Quantitative relationships, 69 reconnaissance, 189
correlation and regression, 198-199 problem breakdown vs. target model, Quantum physics, 174 Scenarios, 182-191. See also Extrapolation;
cultural aspect, 237-241 143-145 Force synthesis/analysis, Models and
extrapolation, 172, 176, 196-199 problem definition, 24-26, 34 Rabin, Yitzhak, 174 modeling. Prediction; Projection;
feedback and, 179 problem definition product, 27 Radars Simulation
force analysis as technique for, 176-177, problem statement, 25-26 Bruneval Raid (1941), 94-95, 166, 269 case-based reasoning, 188-189
179-180,216-217 product, forms of, 25-26, 27 counterrneasures, 219-220 constrained what-if scenario, 188
forecasting, 176-177, 191-192, purpose, 25 electronmagnetic spectrum, 103 construction of, 186-191
208-212 strategies-to-task breakdowns, 27-29, 33 ELINT interceptions, 104 contextual mapping, 189-190
history of, 175-176 structured augmentation, 24-25 intelligence collected with (RAD1NT), cross-impact analysis, 185. 190
influence nets, 205-206 target model interrelation with, 142 106-107 decision making and, 182
influence trees, 201-205 Process, in organizational analysis, 227, jammers, 118 definition of, 182
Kalman Filter prediction method, 242-250 laser techniques, 99-100 demonstration, 184
176-177 Process models and analysis, 58, 250. See Nike-Hercules, 219-220 driving force, 184-185, 188
methodology of 175-178 abo Models and modeling radar imagery, 101 emergent, 188
multidisciplmary analysis, 209-210, 219 biological weapons system model, 234 RADINT (radar intelligence), 106-107, 151 exploratory vs. normative perspective,
nonlinear approach, 209-210 comparative modeling, 268-271 Radio frequency flooding, 99 186
organization, predictive analysis of, definition of, 44, 74-75 Radio frequency intelligence, 107-108 forecasting and, 176-177, 191-192
180-182 generic models, 59-61, 245 Radiometry, 107-108 identifying solutions, 188-190
318 Index
indicators, 191 Singapore, military defeat at, 1 Cuban Missile Crisis, 128-129, effectiveness, 228
information trades and, 92 Slice-of-time scenarios, 185 161-163,167 equivalence, 233
intelligence roles in, 191-192 Social contamination, 218-219 extrapolation of economy, 174, 178 generalized network analysis, 230,
in Kalman Filter, 176 Social dynamics, as scenario factors, 186 Farewell deception campaign, 163-164, 234-235
momentum scenarios. 18ft Social network models, 67-69, 71, 288 models, 59
monitoring of, 191 229-234 genetic research, 257-258 network analysis, overview of. 229-230
purpose ol, 183-134, 191 Social systems simulation, 272 innovation, lack of, 256, 257-258 size and capabilities, 228-229
relationship analysis, 183-184, 190-191 Solutions, identifying, 188-191 ionospheric research, 117 social network analysis, 67-69, 71,
shce-of-time, 185 Sources of intelligence, 83-112. See also Korean War, 210 229-234
system change, 185 Collection of intelligence; COMINT, liaison relationships, 42 substitu lability, 233
types of, 184-185 HUMINT; IMINT; Open source misled about missile guidance system, 123 types of structures, 229
unconstrained what-if scenario, 188 intelligence oil production, 173 Structure, in organizational analysis, 227,
Schum, David, 114 access of, 116 Operation Barbarossa (1941), 1, 4 228-235
Schwartz, Peter, 92, 186, 191 bathtub curve, 259 particle beam weapon, 270 Structured augmentation, 131-134. 136
Scientific: and technical (S&T) intelligence, bias of, 116-117 radio frequency flooding by, 99 Submarines
5, 252, 281. See oho Technology biometrics, 108-109 resistance to change, 215 deep-water salvage attempts, 95
assessment collection taxonomies, 84-86, 111 submarine salvage attempts, 95 and magnetic sensing, 107
Scowcroft, Brent, 172 communications intelligence (COMINT), submarine technology, 270 in World War II, 242
"5" curves, 60-61, 254-255 85,95-100, 105, 112 technology diffusion, 261 Submodels, 43
Secondary sources, 120 competence, 115-116 U-2 surveillance of, 152-153 Substilutability, 233
Secret classifications. 159 differential treatment, 83 unexpected simplicity, 267-268 Summa Corporation, 95
Sensitive Compartmented Information electronic intelligence (EL1NT), 85, Space shuttle, 106 SunTzu, 78, 179
(SCI) system. 159-160 104-105 Spam, 139-140, 282-283 Sustainabilily, 233
Sensitivity analysis, 207-208 evaluation of, 115-118 Spatial models, 64-65 Symantec, 51,58, 147
September 11, 2001, terrorist attacks, 54, existing knowledge, 83-84 Specific emitter identification, 105 Synergy, 122,219-221,226
173-174,217,274 geophysical intelligence, 107 Spectrometry, 107-108 Synthesis, 58. See also Models and
Shannon, Claude, 119, 120 history of, 86 Spreadsheets, 77 modeling
Sherman tanks, U.S., 268 human intelligence (HUMINT), 85, 112 Stalemate, 202 Syria, 2, 70, 135
SIGINT (signal intelligence), 25, 35 imagery intelligence (IMINT), 85, Stalin, Josef, 1.257 System change scenarios, 185
denial and deception techniques, 157, 100-102, 112 Static models, 38 Systems analysis. See also Network analysis;
166 information operations, 109-111 Statistical analysis, 62-63 Organizational analysis; Technological
models and, 35 materials intelligence, 108 correlation and regression, 198-199 assessment
specialized techniques, 102 measurement and signatures intelligence pattern modeling, 62-65 computer systems intelligence, 108-109
time series data analysis, 64 (MASINT), 85, 102 sampling techniques, 93 defining relevant system for model, 58-59
Signaling, 167-169 nuclear sensors, 102, 108 Status quo biases, 4 feedback, and close-loop systems,
business actions, 167-168 open source, 84, 86-89, 111 Statute of Uses, 224-225 221-223
cultural differences, 168 radar intelligence (RAD1NT), 105-106 Stocastic equivalence, 233 generalized relationship analysis,
Simple projection, 195 radio frequency intelligence, 106-107 Stocastic models, 37 234-235
Sims, Wilham, 215-216, 222 radiometry and spectrometry, 107-108 Stoll, Clifford, 109 identifying future systems, 263-264
Simulation. See also Extrapolation; remote sensing, 103 Straight-line extrapolation 196, 198 models, 268-270
Forecasting; Force synthesis/analysis; signals intelligence (SIGINT), 85 Strategic Arms Limitation Talks (SALT), 266 performance analysis, 265-268
Prediction; Projection; Scenarios in silu sensors, 103-104 Strategic intelligence, 49-50 program tycle, 245-246
computer software, 273 specialization, 84 capabilities vs. plans, 53-54 simulation, 271-274
continuous, 76-77 specialized technical collection, 102111 forecasting and. 208-209 structure, function, and process, 227
creating and running, 272-273 synergistic effect of combining, 122 indications and warning, 54-57 target as complex system, 263
definition of, 75 telemetry, 105 long-term focus, 49
discrete event models, 76-77 testing results, 118 scenarios and, 49-50, 183 Tactical intelligence, 50-51
economic, 272 weighting based on, 124 Strategies-to-task breakdown, 27-29. See Tanks, 52-53, 243-244
military, 271-272 South Korea, 210 also Problem definition model Tannenberg, Germany, 96-97
models, 38-39, 76 Soviet Union. See also Russia stakeholders in, 30-31, 33 Target-centric approach, 5, 9-10, 13-17.
Monte Carlo, 76 Afghanistan invasion, 180, 189 Strowger. Almon D., 257 154, 175 See also Models and modeling;
political, 272 and alternative target models, 135 Structural analysis. See also Network Networks; Problem definition model;
social, 272 Backfire bomber, 265-267, 268 analysis; Organizational analysis Target model
systems, 271-274 ballistic missiles, 122, 270 and decentralization, 229 analyst's role, 14, 19
weapons systems, 271 clandestine materiel acquisition, 94 definition of, 227 at a complex system, 17-18
320 Index Index, 321
customer involvemem, 13, 14, 15-16, regulatory forces and external factors. 260 U-2 reconnaissance, 152-153 problem definition, 300-301
36, 40, 43, 286 scenarios, technological factors in, 187 Uncertainty use. of secret information, 87
demand for details, 16 Soviet/U.S comparison, 261 Heisenberg's principle, 236-237 systems analysis, 263
Escobar case example, 12-13 stages of technology development, 254 modeling, 76 Weapons systems
and expert opinions, 127, 195-196 systems analysis, 260-270 reducing, 8-9, 22 development, 264
information glut, 16 transfers, 261-263 Unconstrained whanf scenario, 188 simulation, 271
as nonlinear process, 13, 16 types of technology prediction, 252 Uniform distribution, 76 technology trends, 50-51
targets as networks, 13, 19-22 unexpected simplicity, 267-268 Unintended consequences, law of, Western Electric Company, 236-237
team-generated view, 15 use of technology, 259-260 224-225 Wiener. Anthony, 184
Target model, 9-10. See also Models and weapons systems, 50-51 United Arab Republic, 71 Wigmore, John Henry, charting method o f ,
modeling, Problem definition model; Technology transfer, 261-263 Urgency of forecasts, 212 122,131-133
Target-centric: approach Telecommunications U.S Air Force Strategic Command (SAO, Wishful thinking. 4
alternative, 134-135, 137,303 Strowger switch, 257 220 WMD commission See Weapons of mass
complex, 19-22 Telemetry, 105 U.S. Defense Department destruction (WMD) commission
customer problem model interrelation, Telephone net work-centric warfare, 21-22 Wohlstelter, Roberta, 55
24, 25, 142, 143-145, 154 correlation with GNE; 199 simulations, 271 World Trade Center, 174, 274 See a/so
gap analysis, 145-147, 286 surveillance, 98, 124, 142, 159-160 U S. Financial Crimes Enforcement September 11, 2001. terrorist attacks
generic, 254 Televisions, 238 Network. 144 World War I, 96-97, 173. 174
hierarchy, 36-37, 65-67 TEMPEST technology, 111 U S National Reconnaissance Office, 185 World War II
knowledge gaps, 14, 15, 142, 145-147 Terrorist organizations, 187 U S Navy, 216 British/German comparative modeling,
and problem breakdown, 40, 142-145 and role equivalence, 233 U.S. Securities and Exchange Commission, 161
targets as complex system, 17-18, 36 September 11, 2001, attacks against 144 Bruneval Raid (1941), 94-95, 166, 269
targets in networks, 18, 10-22 U.S., 54, 173-174,217,274 U.S. Slate Department, 24, 169 communications intelligence, 96-97
Taxes, Laffer curve for, 228-229 Testing results, 117-118 U.S. Strategic Defense Initiative (SD1). 178 denial and deception countering
Taxonomies, collection, 84-85 Thahdomide, 223 Utility theory. Sec Cost/utility theory techniques, 165-166
Teamwork, 2-3, 279-281 Thermodynamics, second law of, 118-119, German aircraft navigation system, 270
team-generated model view, 15 172 V-2 rocket, 127-127 German freight tanffs information, 87
Technical quality of forecasts, 212 Three Mile Island, 223 Validation, of models, 273-274 impotence, principles during, 126-127
Technical risks, 247 Thurow, Lester, 258-259 Vavilov, N. I., 257 intelligence failures during, 1. 2, 54,
Technological asymmetry, 267 Tiananmen Square, 279 Vertical networks. 234 55-56
Technology assessment, 252-275 See also Tiger tanks, German, 268 Vested interests. 5ee Bias and intelligence liaison, 90-91
Innovation, Network analysis; Timing and timeliness. See ofso Feedback Video imagery, 101 Japanese intention indicators, 55-56
Organizational analysis; Systems analysis and feedback loops; Force Vietnam, 247. 288 and open source intelligence, 87
altemalive outcomes, 200-201 synthesis/analysis Viruses, computer, 110 and operations research techniques,
asymmetry, technological, 267 chronological models, 63-64 Vividness weighting, 124 242-244
citation analysis, 253-254 of collection, 147-148 Volkswagen, corporate defectors and, 92-93 U S. vs. German tanks, 268
comparative modeling problems, 62 evidence weighting, 124-125 von I ieuven, Marten, 296-298 World Wide Web See Internet
comparative performance assessment, feedback loops, time delays in, 222-223 von Neumann, John, 235 Worms, computer. 110
266-268 graphing, 190 Wright, Peter, 125
contextual mapping, 189 of innovation, 254, 255-255 Wal-Mart. 22 Writing reports. 289-292
Dupom innovations, 256 of technology transfers, 263 Walsingham, Francis, 139-140 , Wurzburg radar, 94, 166, 269
effectiveness of technology transfers, 262 temporal synthesis/analysis spectrum, Weapons of mass destruction (WMD)
encryption technology, 160 51-54 commission, 2, 3, 4, 152. 286 Xerox Corporation, 260
freedom and incentive forces, 256-258 Tito, Josip Broz, 296 alternative target models, 303
identifying future systems, 264-265 Trade secrets, 89 analytical methodology, 266, 303-304 Yamamau Mountain, 154
inertia, 215 Transistors, 258-259 case study on, 300-305 Yeide, Harry, 298
innovation prediction, 254-255 Transposition, of cause and effect, 270 U.S. collection strategies, 142 Yom Kippur attack (1973), 2, 4. 5
measures of effectiveness, 273 Trapdoors, 111 evaluation of sources and evidence, Yugoslavia
negative feedback delays, 222-223 Traps, in performance analysis, 265-266 301-303 case study on, 173, 295-299
network analysis, 234 TRASHINT, 90, 166 interaction with collectors and history of, 296
open sources and the "bathtub" curve, Trojan Horses, 110 customers, 304-305
253,259-260 Truth analysis, 121-123 knowledge gaps, 286 Zapatista National Liberation Army, 20
patents, 253, 259-260 Tuchman, Barbara, 173
performance measurement, 254 Turner, Stansfeld, 283
publications pattern analysis, 253-254 Tutwiler, Margaret, 169