Professional Documents
Culture Documents
T2 B21 Lederman - Open Sources 1 of 2 FDR - Robert D Steele - Reports and Presentations On OSINT 783
T2 B21 Lederman - Open Sources 1 of 2 FDR - Robert D Steele - Reports and Presentations On OSINT 783
3 Information Peacekeeping
• It is the active exploitation of information and information technology
to achieve one's policy objectives
• It's three elements are intelligence, information technology or "tools
for truth", and electronic home defense to protect intellectual property
• It is not standard information technology in support of conventional
diplomatic or military operations; it is not traditional psychological
operations relying on deception; it is not covert action operations; and
it is not clandestine operations.
• Information peacekeeping relies on providing low cost unrestricted
access to truthful information, and on assuring open connectivity
between all interested individuals.
• Information peacekeeping and open source intelligence operations
require reliable electronic security that is not handicapped by imposed
government "back doors".
4 Information Strategy
• Connectivity, Content, Coordination, Communications Security
V Miscellaneous Thoughts
Open source intelligence is not a discipline. It is a sub-discipline within each of the
major disciplines, providing commercial imagery, foreign broadcast monitoring, and
overt human intelligence as tip-off, context, and cover in support of the all-source
process.
Open source intelligence can be all-source in the sense that finished intelligence
production which is unclassified can be used to meet critical needs in support of
diplomatic and coalition operations, law enforcement, and business.
We must distinguish between open source intelligence (OSINT) and validated open
source intelligence (OSINT-V), the latter being unclassified intelligence that has been
validated by all-source analysts will full access to all pertinent classified sources.
Intelligence is not synonymous with secrecy. Data is collated into information that is of
generic interest and generally broadcast—intelligence is information that has been
tailored to support a specific decision by a specific person at a specific time and place. [I
realize that all will not agree, but it's time we got away from classified encyclopedic
broadcasting and more into day to day decision-support.]
The open source revolution begun in 1992 in the aftermath of the first Open Source Task
Force has failed. Although both the U.S. and several allied communities have toyed with
open source initiatives, all are a strategic failure and generally only lip-service has been
paid to the need to give analysts improved access to open sources.
The exclusion of the librarians from the open source planning process, and its dominance,
at least in the U.S., by a technical infrastructure, has been one reason for the failure. We
must distinguish between human analysis expertise, human search & retrieval expertise
(the librarians' forte), and technical support.
The most promising technical solutions are now not in collection, but rather in
processing. The technologies for discovering, discriminating, distilling, and delivering
information that has been clustered, weighted, mapped, and visualized, are the next
frontier and not properly pursued despite a decade of lip service.
Electronically available information (both the Internet and the far more substantial
commercial online sources) comprises less than 20% of what we need to know.
The center of gravity for intelligence analysis is the human expert, and the vast majority
of those experts is in the private sector and wants nothing to do with either the
intelligence or the defense communities. We must rapidly develop new means of
interacting with this expertise, to include a dramatic increase in our expectations
regarding academic training, private sector accomplishments prior to hiring, and foreign
language skills proven in the host country environment, also prior to hiring.
Open Source Intelligence: CONFERENCE Proceedings, 1997 Volume IV 6th
International Conference & Exhibit Global Security & Global - Link Page
Previous Forward and Table of Contents
Next The Open Source Revolution: Early Failures and Future Prospects
17*1
and the urgent requirement for a national knowledge strategy. Attached is a
list of five areas for your consideration
/YO
never trust fte intelligence gnn)RVnity Agree to the
realignment of $1 billion a year from the National Foreign Intelligence
Program to the National Infrastructure Initiative to fund the National
Knowledge Foundation, in independent agency responsive to the
intelligence community but completely open to the external
organizations whom the Vice President must harness if he is to nurture
our Nation's "information commons".
MONEYMAKER: Consider the possibility that the DCI may not want to
release the money entirety to a separate entity, but would be satisfied is
a major corporation already trusted by the community were selected to
manage the National Knowledge Foundation. Consider a White Paper
showing how you would staff the Foundation and possible allocations of
the funds to distributed centers of excellence. If possible, include cost-
benefit analysis with suggestive figures for increases in employment,
profits, trade, competitiveness, etcetera, which would result from the
efforts of the Foundation and its supported network of de facto external
intelligence research nodes.
ist
SECOND INTERNATIONAL SYMPOSIUM: NATIONAL SECURITY & NATIONAL
COMPETITIVENESS: OPEN SOURCE SOLUTIONS Proceedings, 1993 Volume I
Link Page
Previous Don't Call It Cyberlaw(tm): Recent Developments in the Law and Policy of Telecommunications and Computer
Database Networks
Next The Intelligence Community as a New Market
Gordon Lederman
another one, I forget where this was published, but the bottom line is that a number of us were very public, very
specific, very articulate, and no one in the US 1C wanted to hear it.
I think the 1C especially, and the USG more generally, TUNES OUT TRUTH and "blocks* iconoclasts from a
hearing. It has become the *anti-thesis* of an intelligence community--! am even seeing articles starting to
emerge that suggest that the classified world makes one certifiably insane and out of touch-there is actually
some truth to that, my own Directorate of Operations having been obscenely proud in the 1980's of having the
highest alcoholism, adultury, divorce, and suicide rates in the USG.
In any event, the bottom line is that the 1C is not committed to knowing the truth, it is not committed to "Global
Coverage", it is not commited to ethics of intelligence, and it is not committed to the public interest.
3/22/2004
What is the Secretary of Labor trying to tell us that the Director of
Central Intelligence needs to help his staff to understand?
/ft
competitive, raise the are policy matters that are not yet
competitiveness of the Nation. on the "official" Nil table.
lit
Internally, we appear to require a Again, the corporate world
national connectivity plan and a has a responsibility here as well. If
national information exchange we understand and accept the N1M
system which enables every person concept, then foreign multi-media
having access to that system both to multi-lingual information collected
consume information, and to and processed (e.g. translated) by
produce and disseminate U.S. corporations and citizens must
information. Corporations must be also be entered into the commons.
able to tap in easily to the diverse One can only speculate as to the
talents contained in our universities, enormous redundancy between
and indeed in some of our high corporations, and between the
schools. There is a quid pro quo private sector and the government,
here: the universities can collect with respect to what the U.S.
some information and process some Intelligence Community calls
information (e.g. graduate student "encyclopedic intelligence", i.e.
translations of selected competitor basic information about foreign
nation technical publications), but countries, companies, personalities,
our corporations must also systems, and conditions.
contribute collected and processed
information to the "information On the Matter of Openness
commons".
Externally, the U.S. Intelligence There have been many articles,
Community, and all elements of the and many speeches, equating
federal government represented business with warfare, competition
overseas, have an obligation to with combat, sales personnel with
enter into the "information "front line troops". There has also
commons" all unclassified been a natural tendency in the
information which has been business community to adopt the
collected at taxpayers expense. traditional military-industrial
perspective on secrecy, on
The failure to introduce this maintaining high barriers to entry,
information into the commons, and so on.
which by definition is electronic-
digital--may force the issue of Where Alvin Toffler really
whether or not a substantial portion distinguishes himself from other
of the U.S. intelligence community pundits of the day is in focusing on
should be privatized. knowledge as an inexhaustible
resource; a resource easily shared,
**?
re-usable many times over; a On the Empowerment of People
resource able to support "win-win"
approaches to competition.
It has always been fashionable to
What is happening here is that give lip-service to the claim that
"world is becoming mind", and the "people are our most important
principles of cybernetics are asset". More often than not, this
replacing the principles of physics has been an out and out lie, belied
as the governing "rules of the by abysmal working conditions,
game". In cybernetics, a closed non-existent tools, and oppressive
system is subject to entropy. In management oversight levied on our
cybernetics, success, and "best & our brightest".
particularly success in adaptation
and survival, comes from having a Robert Carkhuff, in The
shorter faster feedback loop than Exemplar (Human Resources
your competitor, and from having Development Press, 1984),
as many sensors as possible. Those invented the term "gold collar"
corporations that spend 80% of worker, or "knowledge worker",
their information capital on keeping and set forth the basic principles for
the barn door closed are going to managing smart people in the age
lose to those corporations that of information warfare.
spend 80% of their information
capital on bringing as many people These are not new ideas,
through the door as possible. although some of the hot properties
on the lecture circuit would pretend
In the age of information they were. Before Carkhuff there
warfare, "security" comes from was Harold Wilensky, with his
being so good at dealing with Organizational Policy: Knowledge
information that you have and Policy in Government and
formulated your strategy and set Industry (Basic, 1967), and before
implementation in motion before Wilensky there was Chester I.
your competitor realizes the Barnard, with The Functions of the
opportunity for innovation even Executive (Harvard, 1938). And
exists. And you must do this many others. The difference between
times over, day after day, product their times and ours is that now we
after product, without ever missing must mind them, or lose our place
a beat. in the world.
Corporate Intelligence Strategy consumer to organized data (don't
collect what you won't process,
don't process what you won't
Of all the books available in the disseminate, organize data to serve
fields of intelligence, information, the end-user executive, not the
strategy, marketing, and intermediary librarian or analyst);
management, the best, the one that
captures how a corporate 6) Emphasize top-level focus on
intelligence strategy can leverage optimization of employee
good people into a protected and productivity through insistence on
profitable productive capability, is best tools, best training, best data,
Carkhuff s. His principles are and elimination of middle-
simple: management obstacles to direct
communication between your "gold
1) Emphasize data availability to collars".
the employee (this includes, in
today's terms, digitization of hard The Bottom Line: We Have Seen
copy and automated the Enemy and He is Us
routing/flagging of data);
2) Emphasize global unrestricted What does this all mean? It is
data flow (i.e. provide online fairly straight forward, and in total
connectivity between employees and contradiction to everything they
everyone else, in and out of the ever taught us in business school.
corporation);
1) Invest in your best employees,
3) Emphasize decentralized data even if you don't like the way the
exploitation (applies to both dress, talk, or act. Smart people
collection and production); can only get smarter and more
profitable, if you give them the
4) Emphasize data-based policy training and tools and connectivity
(includes automation of historical to information that they require.
memory and insistence of fresh
"reviews of the bidding" prior to 2) W_hit you make or sell is not as
each major milestone in any given important as bow good you make
program); it, how fast you sell it, and how
quickly you can change over to
5) Emphasize increased data making something completely
products and direct access by the different.
400
3) The private sector is now 5) National intelligence is not
recognized as comprising the hulk going to be helpful to U.S.
of the national intelligence enterprises unless the private sector
community; YOU are part of the focuses on and accept the need for
national information continuum; a government-private sector
and YOU are a major player in partnership, and the private sector
establishing your national takes the lead in discussing these
competitiveness. issues and opportunities with
Members of Congress..
4) Education and intelligence are
two sides of the same coin. To be 6) We have a national intelligence
competitive, a corporation must be community spending approximately
thoroughly integrated into our $28 billion a year, and a national
educational establishments on the "virtual" intelligence community
one hand, and fully supportive of a spending approximately $500
national intelligence effort on the billion a year, and both are in
other. disarray. Reform must start in the
private sector.
SECOND INTERNATIONAL SYMPOSIUM: NATIONAL SECURITY & NATIONAL
COMPETITIVENESS: OPEN SOURCE SOLUTIONS Proceedings, 1993 Volume I
Link Page
Previous The Intelligence Community as a New Market
Next The Role of Grey Literature and Non-Traditional Agencies in Informing Policy Makers and Improving National
Competitiveness
A Critical Evaluation of
U.S. National Intelligence
Capabilities
United States national and defense intelligence capabilities, while strong in many
respects, are unbalanced because of their excessive emphasis on technical
collection, inadequate human and open source collection. They are completely
unsuited for and constrained in analysis and dissemination. Also unbalanced are
their direction and responsiveness to the full gamut of consumers of intelligence,
across all departments of government, and at all levels: strategic, theater, tactical,
and technical.
At the same time, how the United States "does" intelligence is fundamentally
flawed. On the one hand, intelligence professionals keep their consumers at arm's
length. In fact, the intelligence community itself long ago decided which
consumers would have the "privilege" of being supported. On the other hand, the
intelligence community has completely ignored the flood of unclassified
information reaching the consumer, arrogantly assuming that the consumer would
pay greater heed to its classified "nuggets." This aloof attitude has led consumers
to rely far more on the 90 percent of their information that is unclassified and
unanalyzed.
Robert David Steele has had more than 18 years of experience in intelligence,
including service as Deputy Director of the United States Marine Corps
Intelligence Center. He is president of Open Source Solutions, Inc.. a non-profit
educational clearinghouse advising governments and businesses on how to
improve their unclassified intelligence sources and methods.
173
174 ROBERT DAVD STOLE
NTERNATONAL JOURNAL OF
A CRITICAL EVALUATKM OF U*. NATIONAL MTELUQENCE CAPAtUTES 175
Operational C D B B
Level (D) (F) <C) (C)
Tactical D C D D
Level CF> (D) (F) (F)
Technical B B C B
Level (C) (C) (D) (D)
At the operational level, the concern is with the United States's lack of an
effective system for monitoring stability in close coordination with the Country
Teams and with an eye for non-military problems. This is particularly important
because the multitude of influences causing regional stability are non-military
and often cloaked in cultural intangibles against which U.S. intelligence analysts
simply "do not compete."
At the tactical level, the United States is unprepared to deal with the four
warrior classes it must deal with in the future:
(1) The High-Tech Brutes similar to the United States — those relying on
expensive technical capabilities and huge logistic trains.
(2) The Low-Tech Brutes such as narcotics traffickers and tenorists — those
presenting the "needle-in-lhe-haysiack" problem.
(3) The Low-Tech Seers such as the Islamic Fundamentalists or Asian gangs
operating within Western cities — those whose "weapons" are of a
cultural kind and difficult for a Westerner to understand and address.
(4) The High-Tech Seers such as highly skilled and knowledgeable computer
engineers — those whose ultra-sophisticated "weapons" lie in their
ability to penetrate the most advanced computer and telecommunications
networks.
The United States has spent 40 years building command, control, communica-
tions, computer and intelligence (C4!) systems designed to wage conventional
battle with the High-Tech Brutes (enemies and potential enemies). These largely
static capabilities (the North American Treaty Organization's C4! architecture
comes to mind) are relatively useless in confronting the other three warrior
Z-T/
176 ROBERT PAVDSTEELE
MTEftNATONAL JOURNAL OF
177
'General Alfred M. Gray, "Global Intelligence Challenge* in the 1990'c," American Intelligence
Journal (Winter 1989-1990). pages 37-41. printed in U.S. Marine Corps Command and Staff
College, INTELLIGENCE: Selected Readings — Book One (Marine Corps University. Marine
Corps Combat Development Command. AY 1992-93).
2USMC Intelligence Center, Overview of Planning and Programming Factors for Expeditionary
Operations in the Third World (Marine Corps Combat Development Command, March 1990). The
three unclassified volumes are Overview, Supporting Documentation, and Country Profits.
3Col. Bruce Brunn, USMC, then Director of the USMC Intelligence Center, speaking to the
Council of Defense Intelligence Producers at their 1992 meeting.
* Strategic Level
— Direction. No trocking system for consumer scrtisfoctlon, no
outomoted integrated muttidiscipiine requirements database,
non-traditional consumers not well represented
— Collection. Superb but ossified capability with limited utility
against emerging threats
KTERNATIOMAL JOURNAL OF
A CRITICAL EVAUMTOH OF U.8. NATIONAL MTEUJ6ENCECAMMUTIS 179
• Operational Level
interactive voice). He could not communicate well with foreign military, foreign
government, and international relief organizations.4 Finally, when Stackpole
asked his intelligence officer for information about disaster conditions, the officer
reputedly said: "General, we only do threat intelligence." A new J-2 was soon
found.
4U.S. theaters commands have either a regional focus (such as the Atlantic and Pacific Commands)
or a functional focus (such as the Transporution, Space, and Special Operations Commands).
Country Teams are the Embassy principals representing the major functional agencies (State,
Defense, Commerce, Othen) in each country where an official U.S. presence is maintained. Pvent
agencies, themselves fragmented into smsller fiefdoms, constitute the third pan of the
coordination triangle. If we add to (his C4! morass allies, regional coalition partners, international
relief organitations, and host country government and private sector parties with whom C*l ties
are necessary, the difficulties of non-traditional campaign planning become apparent.
KTERNATCNAL JOURNAL OF
A CRfTXALE VALUATOR Of UJ. NATION At ITOJJKMaCAPABIUmS 181
Tactical Level
* Technical Level
Radically altering the relationship between the analyst and the consumer by
substituting the concept of distributed analysis for that of distributed production
is important, as is including the analyst as a member of the policy team.5
Legislation might not be the vehicle by which to resolve some of the
intelligence community's deficiencies, but the restructuring efforts of both the
Secretary of Defense (through the Assistant Secretary responsible for these
matters) and the Director of Central Intelligence, are helpful in forcing an
evaluation and discourse upon certain aspects of U.S. intelligence structure and
its approach to the task of performing the national intelligence function.
One final comment: the Vice President of the United States and his competent
staff have studiously avoided (1) scrutiny of the intelligence community and
(2) integration of the intelligence community into the information policy and
'An evaluation of the two bilk from the Senate Select Committee on Intelligence, and die House
Permanent Select Committee on Intelligence it provided elsewhere. See my articles "The National
Security Act of 1992," American Intelligence Journal (Winter/Spring 1992); "Applying the New
Paradigm: How to Avoid Strategic Intelligence Failures in the Future." American InitUigence
Journal (Autumn 1991); and "Intelligence in the 1990's: Recasting National Security in a
Changing World." American InieUigence Journal (Summer/Fall 1990).
IfTERNATONAl JOURNAL OF
A CRITICAL EVALUATION OF UJ. NATIONAL MTEUIGENCC CAfAlttJTES 183
*This latter phrase is an adaptation from David Otbome and Ted Oaebler's Reinventing
Government: Hew ike Entrepreneural Spirit it Transforming the Fubtie Sector From Schoolnouse
to Siauhouse, City Hall to the Pentagon (Addison-Wcitey, 1992). David Otbome U an advisor 10
President Clinlon and an influential participant in the Vice-President's task force to evaluate and
"reinvent" the U.S. federal government. Several books discuss the "privatization of intelligence,"
including Alvin Toffler's PowtrShifi (Bantam Books. 1990) and his forthcoming book on
information warfare and national knowledge strategies litkd War end Anti-War, u well as Jon
Sigurdson and Yael Tagerud (ed.), Tke Intelligent Corporation: The Privatization of Intelligence
(Taylor Graham, 1992). This last book is dedicated to Slevan Dedijer (• member of the editorial
board of the MIC), a former member of the Office of Strategic Services, who has been very
influential in developing this area of both scholastic inquiry aid business practice.
7Both Vice-President Gore and Secretary of Commerce Ron Brown have been invited to speak at
Mr. Steele's forthcoming Second International Symposium on "National Security &
Competitiveness: Open Source Solutions," to be held in Washington, DC, 2-4 November 1993.
•Other than classroom materials prepared by Jack Davis, and those at Harvard by Richard Neustadt.
Ernest Msy. and Gregory Treverton, no one has consolidated these perspectives into a simple
public article. I used an earlier version of this article as background reading in a course on
-Intelligence and the Commander," that I help teach at the Marine Corps Command and Staff
College.
MTEANATONAL JOURNAL Of
A CRITICAL EVAUUTOH OP US. NATIONAL MrEUJQENCE CAPAB&JTES 185
INT£LUGENCt ANALYSIS
The process of producing written and oral assessments designed to
improve the pollcymaMng process by helping policy officials better
understand and deal more effectively with current and prospective
national security Issues. Including opportunities as well as threats to U.S.
interests.
ESTIMATING
INTELLIGENCE FAILURE
Analyst* fotteymaktn
• Facts/Disengaged Beliefs/Accountable
• Objective Intuitive
• "Balanced* View Agenda-Driven
• Long-Term View Short-Term View
« Descriptive Action-Oriented
« Employer-Driven Constituency-Driven
Protect Information Use Information
International Focus Domestic Focus
Perfect ion/Accuracy "Good Enough* /Utility
Written Compendiums Oral Shorthand
Facts/Things People/Personalities
Tenure/Continuity Short Tours
Generic Audience Specific Audience
Single Output Multiple Inputs
MTERNATONAL JOURNAL OF
AOimCALEVALUATK)MOFU^.NATK)NALWTEUJGENCEC«PABIJm8 187
amount of consolidated authority at the DC1 level will be effective in curing our
ills.
The Policy Staff View
The third and final version of these differences, reflecting the realities of policy
staffers at senior levels at the Department of Defense, was ably articulated by
Sumner Benson — a former CIA senior analyst (Figure 9).
When evaluating the intent and utility of the two congressional bills, the
analyst should be thinking about how to increase the intellectual and the political
"authority" of the analyst in terms of credibility and consumer respect. As Andy
Shepard — a senior analyst manager now serving on the Community
Management Staff—has noted elsewhere, such authority must rest in part on the
analyst's direct access to the consumer, and a corresponding familiarity on the
pan of the analyst with the consumer's day-to-day, as well as mid- and long-term
concerns. Changing the organization, funding, and authority of the DCI will not
significantly alter This fundamental deficiency in the U.S. national intelligence
community.
Signal Bani^t
International — complexity of International — ambiguity
world affairs; multiple interests of Information- noise;
and actors; national cultural paradigm bios; deception;
differences; impact of U.S. domestic collection
actions. confusion or gaps In
understanding.
PO//CK — misperception of Policy — threat distortion;
foreign actors (policy distrust of analysts;
mirroring); wishful thinking; hoarding and manipulating
policy momentum. of Information.
Organization — resource Organization — mixed
limitations; emphasis on management signals If not
authoritative publications active subversion;
and predefined missions and resistance to alternate
rotes; fragmentation of views; Information choke
missions, functions, points (both Internal and
knowledge, and data. external).
Analysis — substantive biases Analysis — arrogance or
and cognitive traps; overconfidence If not
parochialism; monasticism; naivete, tunnel vision;
lock of exposure, to the real resistance to outside views
world. and priorities.
MTERNATIONAL JOURNAL OF
ACftrrK^EVALUATttNOFUANATKWALWTELUQENCECAPWUnES 189
PottHclont
Executive Leadership
Legtstatrve Leadership
Personal & Professional Staffs
WTEWaTIONAl JOURNAL OF
Z4-C-
A CRITICAL EVALUATION Of U*. NATIONAL MTELUQENCC CAPAB&mES 191
CONCLUSION
Who is the customer? What do they need? How can they be sure of getting what
they need? These issues have not been considered as fully as necessary in
executive restructuring efforts, nor have they been adequately addressed in the
proposed legislation.
Most individuals contemplating improvements to U.S. national and defense
intelligence capabilities appear to be thinking about block and wire diagrams and
funding authority, when they should be thinking about truly changing the way
business is done as indicated in Figure 13. The intelligence community must take
full advantage of rapidly expanding sources of unclassified information, while
also empowering its dwindling work force.
If the United States does not come to grips with these basics, then neither the
executive initiatives nor the proposed congressional legislation will make any
real difference in its national security or national competitiveness.
MTERHATIONAL JOURNAL OF
A CRITICAL EVALUATON OF UJ. NATIONAL MTELU8ENCE CAPABIUHES 193
A great deal is "right" with U.S. intelligence, of course, and many unsung
heros have proven themselves developing "work arounds" in extremis. But the
reality is that U.S. intelligence has built up an enormous and relatively
cumbersome intelligence community which has gradually isolated itself, both
from its consumers, and from the "real world" of cultural complexity, fast-
moving events, and changing priorities. Neither the role of the private sector as
an alternative source of "national" intelligence, nor the need to substantially
improve the ability of nations, organizations, and individuals to exchange
"intelligence" at will, in fluid coalitions of the moment, have been addressed
here. Therein lies the future.
This article focuses on three modest and redirected expansion of our Union and major economic powers. To
concerns of mine which are central to clandestine human intelligence collection be clear on this problem:
ensuring (hat the restructuring effort is capability;
meaningful. First, what "sins" of strate- (a) It will continue to be diffi-
gic intelligence persist in the face of re- (3) Severe shortcomings in cult for our policy-makers and senior
structuring? Second.howmustthenature control over intelligenceresources - those intelligence managers to focus on the
of the individual intelligence analyst, their responsible for billions of dollars in each need for changed priorities because our
working conditions, and their relationship year's budget have no capability to intelligence and foreign affairs commu-
to policy-makers change if we are to evaluate relative returns on investment nities are at least two generations away
avoid strategic intelligence failures in the across programs or elements of the in- from fully understandingtheThirdWorld
future? And third, how must we relate telligence cycle, and no adequate and dimensions of change outside the
defense intelligence restructuring to a mechanisms for ensuring government- political-military and transnational eco-
broader national effort to establish a truly owned capabilities are shared and not nomic environment. We do not have an
national knowledge management and duplicated. adequate methodology for studying the
information technology strategy, a strat- preconditions and precipitants of revolu-
egy to empower our enterprises and tionary change (including ideo-cultural,
schools while enabling our government techno-demographic, and natural-geo-
to make informed policy decisions in all graphic change), and no indications and
areas? ...there are shortcomings warning (I&W) capability suited to this
in evaluating relative re- challenge.
Here are the major sins we are turns on investmentacross
committing today: (b) Our entire intelligence
programs or elements on structure, our designs and methods, do
(1) Excessive collection of the intelligence cycle... not lend them selves to being restructured
technical intelligence (including much andreconsb'tuted. It is as if, after decades
too much emphasis on repetitive collec- of learning how to build Cadillacs, our
tion against higher priorities instead of very fine Cadillac, accustomed to travel-
baseline collection against lower, e.g. ing the same super-highway back and
Third World, priorities); (4) Mindset inertia. We still forth, must suddenly be taken apart and
have very senior bureaucrats and ap- put back together as an off-road vehicle
(2) Cursory attention to both pointees insisting that we maintain our able to deal with the treacherous terrain
open source collection, and the need for a traditional priorities against the Soviet and back roads of the Third World. It is
Gordon Lederman
Bodansky, staff director of the GOP Task Force on Terrorism, who went on to write the book on Bin Laden: The
Man Who Declared War on America (published prior to 9-11, but no one wanted to listen), wrote the attached and
presented it to my 1992 conference.
From 1988-2001, a succession of DCIs, including the current DCI, turned a blind eye to lower tier festering issues,
including terrorism, and refused to listen to all of us who were sounding the alarm about either terrorism
(Bodansky) or our loss of perspective on being thorough and professional about how we carried out the business
of intelligence (Steele at first, others joining over time).
3/22/2004
BILL McCOLLUM FLORIDA VAUGHN S FORREST
CHAIRMAN CHIEF OF STAFF
JIM LIGHTFOOT IOWA HOUSE REPUBLICAN RESEARCH COMMITTEE 1622 LONGWORTH BUILDING
202/2250871
BOB LIVINGSTON LOUISIANA
DAVID O'B MARTIN. NEW YORK ' U.S. HOUSE OF REPRESENTATIVES
FRANK 0 RlGGS. CALIFORNIA
JAMES F SENSENBRENNER JR WISCONSIN WASHINGTON. D.C 20515
OLYMPIA J. SNOWE. MAINE
C w BILL YOUNG FLORIDA
Washington, DC
1-3 December, 1992
THE GOP TERRORISM TASK FORCE:
RESEARCH TECHNIQUES AND PHILOSOPHY
"I am constantly being asked tional threat is generally associated with repetitious, and largely bureaucraiicized
fora bottom-line defense number. I don't a government, conventional or nuclear in way of doing "analysis"; the emerging
owofany logical way to arrive at such nature, represented by static orders of threats, in sharp contrast, simply cannot
figure without analyzing the threat: battle, linear in the development and be spotted, assessed, fixed, and neutral-
without determining what changes in our deployment of its capabilities, employed ized by our existing capabilities.
strategy should be made in light of the in accordance with well-understood rules
changes in the threat; and then determin- of engagement and doctrine, relatively The "war on drugs", and our
ing what force structure and weapons concern over arms control (not just veri-
easy to detect in its mobilization, and
programs we need to carry out this re- fication of Soviet reductions but also
supported by generally recognizable in-
vised strategy." -Senator Sam Nunn telligence assets. control of nuclear and bio-chemical
weapons proliferation in the Third
This article will discuss the World) are both representative of these
changing threat in terms of six challenges The emerging threat...cannot be new threats.
critical to our over-all national security assessed...by our existing capa-
posture in the 1990's. To adapt intelli- bilities. Narcotics, in both the intelli-
gence to our new threat and fiscal envi- gence and the operational worlds, must
ronments, we must make radical and be seen as representative of a "type"
comprehensive changes in how we man- threat, not as an odious and undesirable
age and conceptualize intelligence. The emerging threat, by con- distraction from the "real" threat
trast, is non-govemmenial, non-conven-
Our Environment tional, dynamic or random, non-linear,
with no constraints or predictable doc- Narcotics. Js a 'type' threat...not
We find ourselves in a multi- trine, almost impossible to detect in ad- a distraction from the 'real'
polar and multi-dimensional'environ- vance, and supported by an unlimited 5th threat.
ment in which a critical distinction must column of criminals and drug addicts.
be drawn between the conventional
threat and the emerging threat. The conventional threat lends
itself very well to conventional intelli- The multi-dimensional nature
This distinction, first presented gence collection capabilities which in- of change in our multi-polar world must
Jic Commandant's article in the Win- clude a strong ability at stand-off techni- also be considered as we evaluate how
ter issue, is straight-forward: the conven- cal collection, and a fairly methodical, best to meet these threats.
AD 31 Summer/Fall 1990
We must also completely out-dated within 6-18 months, and off the This situation is largely of our
reevaluate what we want to protect, and market within 36 months. We are better own making; Service and professional
what we mean by "confidential", "se- off concentrating on staying ahead fragmentation has been allowed to con-
cret", "lop secret", and "sensitive com- than on keeping the other folks behind. tinue within a resource-rich environment
partmenied information" (SCI). The where inter-opcrability and inter-
system is so fragmented and inconsistent We must recast our domestic as changeability of information technolo-
that even the most loyal individuals have well as our international security re- gies (and related multi-discipline data-
difficulty taking it seriously. sources to better blend the efforts of those bases) were not required. The infrastruc-
responsible for law enforcement, physi- ture within the Department of Defense
Although efforts have been cal security, background investigations, has at least a modicum of cohesion; the
made to address these issues, we simply offensive counter-intelligence, and op- same is not true for the array of law
cannot resolve the contradictions of erations. Counter-intelligence cannot be enforcement, civilian government agen-
counterintelligence without an over- treated as a separate discipline in isola- cies, and private enterprises, including
arching strategy that includes person- tion; it must permeate all aspects of na- universities, which have had little occa-
nel compensation and quality of life tional operations in the same way that sion in the past to require direct electronic
issues as well as a comprehensive ap- "administration" crosses all boundaries. connectivity. Now we are discovering
proach to the management and secu- that knowledge is indeed power, and that
rity administration of both electronic "Operational security" the shorter the loop in exploiting knowl-
and hard-copy information across (OPSEC) requires much greater empha- edge, the more competitive our Nation.
agency boundaries. sis, especially in the countemarcotics
arena and particularly in the execution of We must get serious about cy-
We must move quickly to de- interdiction operations. We have given bernetics, and exploiting knowledge in
velop an effective means of organizing the narcotics community years in which relation rather than in isolation. This
and "lagging: our electronic records with to build up billion-dollar war chests and requires the development of a national
essential information about their source, capabilities that in some cases exceed our electronic information & records man-
classification, and control parameters, own. We must be much smarter about agement architecture that goes far be-
and we must develop inter-agency meth- how we plan and conduct operations in yond the existing plethora of database
ods of electronic sharing which maxi- this environment. management applications and isolated
mize our exploitation of information proprietary or domain/agency specific
while affording us much greater auto- As with I&W, CI must protect databases. Every traditional function of
mated auditing and alert capabilities es- the nation against the massive costs asso- "hardcopy" records management must
sential to identify unauthorized or inap- ciated with treason and compromise, or be automated and integrated into every
propriate diversions of knowledge. with terrorism unleashed on our popula- organization's knowledge management
tion and infrastructure. Financial & architecture.
We must carefully redefine economic counterintelligence should
both intellectual and physical properties ' become a recognized sub-discipline. Reliable and tested multilevel
that we wish to protect, with special ref- For the latter to be successful, there must security operating systems are critical to
erence to both technology and our own be a closer working relationship between our national knowledge management
national infrastructure (water, power government and the private sector, a strategy and must be fielded before a
grids, lines of communication). We willingness on the part of the private
should pay particular attention to "criti- sector to identify and correct its areas of
cal" nodes in our technical systems vulnerability, and a national recognition OPSEC requires much greater
which would if sabotaged or penetrated that international finance &, trade compe- emphasis, especially in the
render irreparable harm to our gross na- tition is the "second front" of the 1990's counternarcotocs arena...
tional production and general security & (drugs & terrorism comprising the first
public welfare capabilities. front).
We should be less concerned Challenge Number Four: Developing serious program of cross-Agency and
about the "illegal" export of technology - an Information Technology Strategy federal to private data sharing & exploi-
advanced information technology appli- tation can be considered. Much greater
cations and capabilities, for instance, are We need a national information emphasis at the policy level is required on
developing so fast they have usually left technology architecture and manage- this topic, for without this capability four
the country years before they can be ment infrastructure that integrates tele- of the six challenges cannot be fully
added to the "dual use" list of controlled communications, computing, and analy- addressed. It bears comment that multi-
items. More to the point, information sis, and enables the full exploitation and level security may finally enable us to
technology (to take one example) integration of data from human, signals, link operators directly to analysts, and
evolves so fast that whatever is stolen is imagery, and open sources. break down the "green door" that has
AU 32 Summer/Fall 1990
isolated intelligence for so long from its knowledge management tools impera- We have absolutely no way of
consumers. tive; the primary way we will be able to evaluating our "return on investment"
improve our national productivity in by intelligence discipline or by element
In addition, it is critical that the the 1990's is with a major national of the intelligence cycle.
Services, agencies, and private industry investment strategy focusing on ad-
work closely together to avoid at all costs vanced information technologies and The continued fragmentation of
incompatible interfaces and applications automated knowledge exploitation. the intelligence community into disci-
that have in the past restricted the transfer plines with their own "pipelines" for
of data between applications and be- Challenge Number Five: Establishing tasking of subordinate units and report-
tween users. A total commitment by all A Responsive Requirements System ing of information back to their head-
information technology vendors to quarters will make serious all-source
"open systems" is vital to national We need a national intelli- fusion a virtual impossibility unless, as
productivity and competitiveness in gence requirements system that is General Gray points out in his own ar-
the 1990's. useful in the management of re- ticle:
sources; is cross-disciplinary, auto-
An important element of this mated,&"zero-sum";andisresponsive "Capabilities must be inte-
information technology or knowledge to individual customers, allowing them grated both vertically and horizontally -
management strategy must be a commit- to (rack the satisfaction of their require- inter-agency policies and practices must
ment to fund a global program to capture ments by discipline, topic, country, or be developed which permit the fusion of
and make available to both government timeframe.
and private industry those essential open
source print and voice records necessary There are a number of contrib- We have absolutely no way of
to compete in all dimensions on interna- uting factors, some of which are being evaluating our 'return on invest-
tional life. This will satisfy the addressed, some of which will take years ment' by intelligence discipline
President's desire to help U.S. business to work out.
while avoiding the dangers inherent in or by element of the intelligence
attempting to pass classified information The greatest problem lies in the cycle.
o selected enterprises. complete fragmentation of intelligence
management over-all; between disci-
As outlined by General Gray in plines, between major management ar- information at every hierarchical level,
his article, this would include digitization eas, and between levels and types of beginning with the Country Team. Atthe
of newspapers and journals from Third organizations, each committed to doing same time, we should avoid redundant
World countries (and should include business "it's way". processing of the same information by
technical journals from such countries as every agency and service."
West Germany and Japan); the establish-
ment of a central repository of govern- FRAGMENTATION OF It is vital that the existing re-
ment-owned open source data bases such INTELLIGENCE MANAGEMENT quirements system, which includes
as those developed by the Foreign Broad- means of specifying topics of immediate
cast Information Service (FBIS); A na- Disciplines interest to policy-makers as well as pri-
tional program to digitize hard-copy rec- IMINT orities for topics of mid-range and
ords pertinent to our national interests in SIGNINT longer-term interest, be automated and
the Third World; and expansion of the HUMINT structured so that all capabilities at all
Defense Gateway Information System OSINT levels are working in consonance with
(DG1S) to include management of the one another. Whilesomedisciplinesare
latter initiatives. Decision Areas undeniably more effective than others
Design & Methods at obtaining partkular types of infor-
U.S. business overseas can Funding mation, they should be managed in
make a significant contribution by as- Collection Mgmt unison and at the lowest possible level.
suming responsibility for digitizing open Production Mgmt
sources in specific countries or technical The second greatest difficulty is
areas. The data entry problem is so Levels of Effort the absence of a clear consensus within
large, only private assumption of this National the community over the purposes of our
responsibility will permit the national Theater various requirements documents and
•ategy to succeed. Departmental processes. Although a document exists
Country Team to forecast future intelligence require-
The downward trend of our ments and is intended to guide invest-
demography makes an investment in ments in new designs & methods, in fact
AU 35 Summer/Fall 1990
identify multiple challenges and oppor- from base a full forty percent - twenty per perspectives, such as we have never been
tunities within our multi-polar and multi- cent to new initiatives tailored to the willing to muster.
dimensional world in time to be effective. emerging threat, and twenty per cent to
BASIC research & development in criti- Top down strategic guidance
Lastly, if we are to meet the first cal areas such as artificial intelligence, will probably not be forthcoming before
five of these challenges, we must develop cognitive mapping, and the general the- FY 92, if then; in the interim, "bottom up"
a process for realigning resources in this ory of cybernetics. We must also protect common sense, and individual efforts to
era of radical change. We cannot be the mission/program manager respond- move in these directions when we can,
content with simply "cutting back" ing to strategic direction from Congress may be our best means of continuing u>
across the board. Recognizing new and the President, and buffer them from earn the "trust and confidence" of our
needs, developing new initiatives, and intermediate authorities seeking to President and our public.
funding research & development in all undermine if not destroy new initiatives.
dimensions will be critical to our strate- We in the intelligence commu-
gic longevity. The complexity and lethality of nity, like it or not, must play a leadership
the emerging threat, and the severely role if then national security community
constrained fiscal environment within is to responsibly decide how to train,
Realignments must occur, and which we must plan for national security, equip, and organize its forces and capa-
occur quickly. We in the national intelli- require vision, energy, a commitment to bilities for the 1990's.
gence community should plan on giving cross-agency and service cooperation,
up any increase over base, and taking and an understanding of Third World ********************
GTE
GOVERNMENT SYSTEMS CORPORATION
Electronic Defense Communications
* Intelligence Communications Architectures
* Systems Integrator for:
- PORTS Imagery Communications
- Wideband Multilevel Security Systems
* Intelligence Communications Interface Design (Ada)
* INFOSEC / COMSEC Systems
* LPI/LPD Special Communications Systems
Intelligence Communications Center
9400 Key West Avenue
Rockvitte, Maryland 20850
Tel: (301) 294-8517
AU 36 Summer/Fall 1990
FIRST INTERNATIONAL SYMPOSIUM: NATIONAL SECURITY & NATIONAL
COMPETITIVENESS: OPEN SOURCE SOLUTIONS Proceedings, Volume I - Link
Page
Previous Applying the 'New Paradigm': How to Avoid Strategic Intelligence Failures in the Future
Next Caveat and National Intelligence and the American Enterprise: Exploring the Possibilities
EXECUTIVE OUTLINE
R. D. Steele
Special Assistant
U8MC Intelligence center
18 May 1991
-- As Individuals
— As Members of a Group
' Stress must be placed on the fact that this does not mean
more production, it means better more relevant, timely, and
ACTIONABLE production.
7 The trade-off between security & the value of free access
to information can be reduced through the implementation of
multi-level security programs and the development of artificial
intelligence programs which routinely sanitize & declassify
information for possible human validation & release. In cases
where "sources & methods" are involved, it is possible to use
REVERSE POINTERS which inform the owner of the sensitive
information of a query, permitting a tailored response as
appropriate. Right now the multiple pipelines of unintegrated
information (both by intelligence discipline and by organization)
are shackling the ability of our government to understand the
— Emphasize global unrestricted data flow
- Online connectivity between Country Team,
analysts, and policy-makers
- Complete review & restructuring of defense
communications to eliminate dedicated channels
and accommodate digital mapping data, video
teleconferencing, secondary imagery dissemination,
and multi-media electronic mail
- Analyst access to "operational" traffic
- Automated sanitization as required
— Quality of Tools
- Establish a generic intelligence analyst's
workstation along the lines of the CATALYST
Project at the Office of Scientific £ Weapons
Research, Central Intelligence Agency*
- Provide central system planning & procurement