Revisiting The Psychology of Intelligence Analysis: From Rational Actors To Adaptive Thinkers

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Revisiting the Psychology of Intelligence Analysis

From Rational Actors to Adaptive Thinkers

Bess J. Puvathingal and Donald A. Hantula


Temple University

Intelligence analysis is a decision-making process rife nential information explosion. Indeed, analysts with
with ambiguous, conflicting, irrelevant, important, and looming deadlines must manage risk to efficiently ex-
excessive information. The U.S. Intelligence Community ploit relevant information. Rather than relying on an
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

is primed for psychology to lend its voice to the “ana- unsophisticated metaphor and admonishing analysts to
This document is copyrighted by the American Psychological Association or one of its allied publishers.

lytic transformation” movement aimed at improving the connect more dots better, successful reform will focus
quality of intelligence analysis. Traditional judgment on recommendations that are sensitive to the potential
and decision making research serves as a starting point, pitfalls of complex decision making in the IC. Current
though recent developments in decision science advance psychological research in decision sciences is well
additional relevant perspectives that are critical to im- equipped to take the lead in intelligence analytic reform.
proving intelligence analysis. Naturalistic decision mak- Psychology’s scientific insights into behavior make it
ing offers insights into the challenging information uniquely useful for solving problems of social significance.
world of intelligence analysis and expert judgment. Re- From John Dewey in 1900 to Alan Kazdin in 2009, Amer-
search on group decision making shows that group ican Psychological Association presidents have urged the
processes are often dependent on the distribution of field to stay relevant to societal concerns (Kazdin, 2009).
information within the group, while information forag- The growing interest in translational research is evidence
ing theory suggests that intelligence analysts may be that this call to action is being heeded. The National Re-
viewed as “informavores” who use adaptive strategies search Council (2011) advised the Director of National
to form key judgments efficiently. Psychologists should Intelligence to apply the principles and findings of behav-
capitalize on these advances in research and theory to ioral and social science to the IC’s analytic methods. We
engage the intelligence community on its own grounds encourage psychologists to aid this effort by expanding
and take the lead on intelligence analytic reform. A their research on intelligence analysis.
potential research agenda and recommendations to op- The present article, therefore, is geared toward psy-
timize intelligence community effectiveness are offered. chologists and has two primary purposes. The first is to
Keywords: intelligence analysis, judgment and decision promote a dialogue between the psychological community
making, naturalistic decision making, group decision mak- and the IC. The second is to provide a foundation for richer
ing, information foraging discourse by offering psychologists information to expand
research in the psychology of intelligence analysis. We

T he U.S. Intelligence Community (IC) collects


enough information every day to fill the Library of
Congress by noon (Johnson, 2007). Intelligence
analysts are continually confronted with two basic chal-
lenges: information overload and severe time con-
seek to accomplish these dual purposes in four ways. First,
we introduce the world of intelligence analysis to the
broader psychological community. Second, we review
some promising research programs in decision making and
information use that are especially relevant to the IC. We
straints. Indeed, knowing what to look for and where to then use this information to develop a preliminary research
find it are two of the most critical aspects of the analyst’s agenda for the psychology of intelligence analysis. Finally,
job. Catastrophic national security failures such as 9/11 we offer recommendations for psychologists to engage the
prompted the IC to focus on improving the quality of IC more directly.
intelligence analysis in a community-wide movement
known as the Analytic Transformation (Office of the
Director of National Intelligence, 2007). Critics’ accu- This article was published Online First December 26, 2011.
Bess J. Puvathingal and Donald A. Hantula, Department of Psychol-
sations often boil down to intelligence analysts’ seeming ogy, Temple University.
inability to “connect the dots.” Intelligence scholars, We thank Andy Karpinski, Phil Hineline, Jack Levy, Ralph Rosnow,
however, caution against such an overly simplistic rally and Keren Yarhi-Milo for their comments on previous versions of this
for reform (Betts, 2002, 2007; Jervis, 2006). The con- manuscript. We especially appreciate Richard Immerman’s encourage-
ment and guidance throughout this project.
necting-the-dots metaphor is based on an implicit ratio- Correspondence concerning this article should be addressed to
nal choice model that implies that analysts consume all Donald A. Hantula, Department of Psychology, Temple University, Phil-
incoming data, an unrealistic idea in this age of expo- adelphia, PA 19122. E-mail: hantula@temple.edu

April 2012 ● American Psychologist 199


© 2011 American Psychological Association 0003-066X/12/$12.00
Vol. 67, No. 3, 199 –210 DOI: 10.1037/a0026640
WMD in Iraq was instrumental in the decision to invade
Iraq (Betts, 2007). Critics cried that the IC did not connect
the dots enough to prevent the 9/11 attacks but then con-
nected too many dots in its “slam dunk” case for WMD. As
the political firestorm after these events branded the IC as
the cause of two national security failures in quick succes-
sion, the government was forced to act.
Interagency communication and the quality of intelli-
gence analysis were perceived to be the underlying reasons
for such failures. IC reform became a national priority, and
Congress passed the Intelligence Reform and Terrorism
Prevention Act of 2004 (Public Law 108-458). To address
interagency communication, this legislation created the Of-
fice of the Director of National Intelligence (ODNI), which
was mandated to oversee and increase communication be-
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

tween all IC agencies. To address the analysis problem,


This document is copyrighted by the American Psychological Association or one of its allied publishers.

Intelligence Community Directive 203 (ODNI, 2007) out-


lined standards for the IC’s renewed focus on analytic
tradecraft. The Analytic Transformation movement thus
began. Offices were formed and programs were developed
Bess J. with a central priority to improve intelligence analysis (for
Puvathingal a history of IC reform, see Immerman, 2011).
What Is Intelligence Analysis?
Intelligence analysis is a decision-making process rife with
The Intelligence Community’s Analytic ambiguous, conflicting, irrelevant, important, and exces-
Transformation sive information. Former National Security Advisor Brent
Scowcroft (2000) stated that the goal of intelligence is to
The National Security Act of 1947 formed the Central “inform and narrow the range of uncertainty within which
Intelligence Agency (CIA) as the first peacetime U.S. in- a decision must be made. . .and keep policy within reason-
telligence agency. At that time, national security focused able bounds” (p. A18). At the most basic level, the ana-
on state actors, primarily the Soviet Union. Intelligence lyst’s job is to answer questions, provide warnings, and
processes and agencies formed around this well-defined assess current developments (Fingar, 2011).
problem. In Executive Order No. 12,333 (1981), President The IC is an essential component of national security,
Reagan delegated responsibilities amongst agencies and consisting of 16 agencies providing timely information and
provided a framework for how the IC should function in key judgments to policymakers to inform national security
service to national security interests. decisions. There are approximately 100,000 IC employees,
The emergence of increased numbers of state actors 20% of whom are intelligence analysts (Fingar, 2011).
and nonstate actors (e.g., terrorism, weapons proliferation, Though there is no one community-wide definition of the
cyber threats) relevant to U.S. national security rendered intelligence process, the general practice involves collect-
the old ways of thinking obsolete. In the past, it might have ing, processing, and analyzing intelligence to produce re-
been sufficient to have only, for example, a Yemen eco- ports for policymakers, with the requirements for these
nomic analyst and an Afghanistan political analyst. But reports typically being defined by the policymakers (Lo-
discrete silos of traditional state expertise can leave gaping wenthal, 2009). Analysts are continually barraged with
holes in knowledge; ever-increasing nonstate threats cre- incoming information, and one of their most critical tasks is
ated a need for counterterrorism analysts who cut across choosing which information to use. A variety of sources are
these state boundaries. Moreover, because many intelli- integrated to serve as the foundation for analytic products,
gence analysts began as Soviet experts, emerging threats including
meant these analysts had to be retrained quickly. Fiscal
constraints forced intelligence agencies to shift analysts ● open source intelligence (OSINT)—publicly avail-
frequently among different accounts, contributing to a tu- able information (e.g., newspapers),
multuous period of balancing increased flexibility with ● human intelligence (HUMINT)— overt information
decreased expertise. (e.g., from diplomatic personnel) and covert infor-
This increasingly strained system continued in much mation (e.g., from clandestine sources, foreign gov-
the same way as it started until the 2000s. But then the IC ernment contacts),
received the lion’s share of the blame following the 9/11 ● signals intelligence (SIGINT)— data transmissions
attacks, and shortly thereafter, the flawed National Intelli- (e.g., communications), and
gence Estimate on weapons of mass destruction (WMD) in ● geospatial intelligence (GEOINT)— geographical
Iraq sealed its fate. This report’s judgment that there were information (e.g., satellite images).

200 April 2012 ● American Psychologist


nitive biases to describe the limitations faced by intelli-
gence analysts. Rooted in psychological science, it is a
worthy resource and an excellent start to applying psycho-
logical findings to a critical national security problem. On
the other hand, it is only a start. Almost 50% of Heuer’s
citations are from the 1970s and fewer than 10% are from
the past decade; thus to rely solely on this resource is not
to take advantage of the rapidly advancing decision science
research.
Heuer (1999) argued that confirmation bias is a par-
ticularly challenging issue facing intelligence analysts, and
he offered the Analysis of Competing Hypotheses (ACH),
an eight-step strategy designed to mitigate it. The key
component is a hypothesis-testing matrix, with columns
representing potential hypotheses and rows representing
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

available evidence. Cells contain ratings of the extent to


This document is copyrighted by the American Psychological Association or one of its allied publishers.

which evidence is consistent or inconsistent with hypoth-


eses. The winning hypothesis is the one with the least
inconsistent evidence. ACH is presumed to combat two
tendencies: (a) focusing on a single hypothesis and (b)
Donald A. seeking only evidence confirming that hypothesis.
Hantula While ACH is perhaps the most celebrated application
of psychology in the IC, two issues call into question its
dominant role in analytic tradecraft. First, empirical evi-
dence for confirmation bias is mixed, suggesting that a
Analytic products are becoming an increasingly col-
strategy focused on its assumed ubiquity may be mis-
laborative effort, ranging from current intelligence (e.g.,
guided. Early empirical support for confirmation bias fo-
Syria’s current security situation) to strategic, long-range
cused on simple decisions (e.g., rule identification tasks;
reports (e.g., Iran’s nuclear capabilities in 10 years). In
Wason, 1960). However, later research failed to find the
addition to specific topics requested by policymakers (e.g.,
description of Libyan opposition forces), Lowenthal (2009) bias in rule identification tasks (Ayton, 1992) or pseudodi-
highlighted ongoing products such as agnosticity tasks (Crupi, Tentori, & Lombardi, 2009);
when confirmation bias is found, simple behavioral primes
● the President’s Daily Brief (PDB)—a daily report remediate the bias (Evans, Venn, & Feeney, 2002). In
for the president produced with community-wide contrast, Tolcott, Marvin, and Lehner (1989) explored con-
input that highlights current intelligence and na- firmation bias with Army tactical intelligence analysts in a
tional security issues, complex battlefield analysis task and found support for the
● the Worldwide Intelligence Review (the WIRe)—a bias, whereas Jervis (2010) pointed to confirmation bias in
daily intelligence “newspaper” produced by the CIA postmortem analyses of intelligence failures. Still, the in-
and delivered each morning to policy, security, and consistent findings on confirmation bias suggest that simply
military personnel, and assuming its pervasive presence in the IC may not be the
● the National Intelligence Estimate (NIE)—the Na- most effective means of developing psychologically in-
tional Intelligence Council report for senior policy- formed strategies for analytic tradecraft.
makers that highlights future trends in major na- The second issue is again an empirical one. Even if
tional security issues. confirmation bias is assumed to exist, there is little research
The Psychology of Intelligence on ACH as a means of mitigating it. In a rare empirical
study addressing both the existence of confirmation bias
Analysis: The Current State of the and ACH as a potential remediating strategy, Lehner, Adel-
World man, Cheikes, and Brown (2008) explored whether exper-
Parallels between intelligence analysis and the broader tise and use of ACH influenced the extent to which partic-
science of decision making have not gone unnoticed by the ipants displayed confirmation bias. They found
IC. The IC has largely focused on applications of judgment confirmation bias, primarily in the form of overweighting
and decision making (JDM), a psychologically informed neutral or confirming evidence, as opposed to distorting
response to normative economic models describing deci- disconfirming evidence as confirming. Confirmation bias
sion anomalies. JDM contends that heuristics (Tversky &
Kahneman, 1974) lead to cognitive biases, which cause 1
Alternative responses to classical economic decision making in-
errors in judgment.1 Heuer’s (1999) The Psychology of clude social psychology’s motivated cognition (Fiske & Taylor, 1991),
Intelligence Analysis, considered one of the foremost tools political psychology’s expert political judgment (Tetlock, 2005), and
in the intelligence analyst’s toolkit, focuses on these cog- political science’s bureaucratic politics (Allison & Zelikow, 1999).

April 2012 ● American Psychologist 201


was much weaker for the intelligence analysts than for the challenged analytic performance. Analysts reported that
nonanalysts, and ACH did not mitigate it in intelligence timelines to produce reports were increasingly shorter,
analysts, although it did for nonanalysts. It is possible that sometimes “channel[ing] thinking down a certain path”
there is an expertise threshold above which confirmation (Hutchins et al., p. 298). Further, they reported that ad-
bias does not significantly impact decision processes and vances in technology dramatically increased potentially
ACH is no longer effective. Although the results of one useful information, challenging analysts’ ability to process
study are not conclusive, Lehner et al.’s findings suggest it all. Many of these technological tools varied in quality
that focusing on confirmation bias and ACH might be too and were incompatible with one another. For example,
narrow an approach. At the very least, incorporating ad- information in a CIA database may not be available in a
vances in decision research can provide insights relevant to National Security Agency database, hindering interagency
the IC’s decision making and its complex world. collaboration.
Hutchins et al. (2007) painted a rich picture of the
Alternative Perspectives complexities of intelligence analysis, but their findings are
Naturalistic Decision Making limited by the typical criticism of NDM: Its methodology is
“soft” (Yates, 2001). Because qualitative methods (e.g.,
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

Naturalistic decision making (NDM) researchers explore cognitive task analyses) do not adhere to the rigor of true
This document is copyrighted by the American Psychological Association or one of its allied publishers.

decisions fraught with high stakes, time pressure, uncer- experimental design, quantitative psychologists question its
tainty, and the messiness inherent in “real” decisions. They value. In response to this criticism, Hoffman, Crandall, and
argue that “real” decisions are made by experts nested Shadbolt (1998) reported high interrater and test–retest
within the contexts of their professional worlds and must reliability across studies. Lipshitz et al. (2001) argued that
therefore be studied that way. This focus on “real” deci- using the same standards to evaluate both laboratory and
sions made by “real” decision makers necessitates a shift observational studies is not appropriate; methods should
from JDM’s laboratory research to applied settings with a drive evaluative methodological standards rather than the
variety of professions, including the military (Hoffman, reverse.2
2007), firefighting (Klein, 2001), and law enforcement (Al- NDM and JDM: Rivals or partners in intel-
ison, Barrett, & Crego, 2007). ligence analysis? Though NDM appears to be the
As a counterpoint to the choice models of classical, antithesis of JDM, Kahneman and Klein (2009) largely
neoclassical, and JDM decision research, the essential pro- agreed on the conditions under which intuition can be
cess in NDM is how individuals assess situations and trusted. They argued that the environment plays the great-
develop expert intuition rather than how they choose est role in whether intuition leads to skilled judgment; it
among available options. Recognition-primed decision must be predictable and provide opportunities for clear
making (Klein, Calderwood, & MacGregor, 1989) is cen- feedback. Expert intuition is gained through ongoing ex-
tral to developing intuition. Experts poll their experience perience in this environment. In an unpredictable environ-
quickly to recognize a relevant prior situation and then use ment without clear feedback, however, decision makers are
mental simulations to imagine how that course of action prone to biased judgment by relying on simple heuristics to
might presently occur. If the outcome is satisfactory, they guide intuition rather than experience-driven skills.
act. If not, they modify it or scroll to the next plausible One might wonder whether NDM models are suitable
scenario. This model has been replicated with various for intelligence analysis, a world where clear feedback on
professionals (e.g., naval commanders, pilots, infantry of- analytic insights is not the norm. The answer is not a simple
ficers) and has been shown to be the most common strategy yes or no. Analytic products come in many forms; some
used by experienced decision makers, representing 80%– types of analyses may be prone to biased judgment,
95% of cases studied (Lipshitz, Klein, Orasanu, & Salas, whereas others may best be described by NDM’s intuitive
2001). expertise model. For example, Tetlock and Mellers (2011)
NDM and intelligence analysis. Hutchins, contended that anticipating the outcome of the third-gen-
Pirolli, and Card (2007) explored decision processes em- eration North Korean succession process is a long-range
ployed by tactical and strategic military intelligence ana- political event with little opportunity for clear feedback
lysts. Analysts’ strategies conformed to Klein et al.’s (and thus subject to biased judgment), whereas directing
(1989) recognition-primed decision making, and informa- Predator drone attacks is a high-frequency event with clear
tion processing and system constraints were identified. feedback opportunities (giving rise to skilled judgment).3
There were two basic information challenges: data uncer- Hence, the psychology of intelligence analysis should nei-
tainty and overload. Analysts processed conflicting infor- ther focus solely on JDM models nor abandon JDM in
mation and made probabilistic judgments on ambiguous
data while simultaneously juggling several reports, adding
significantly to the workload. Moreover, analysts reported 2
Lipshitz et al. (2001) offered credibility and transferability as two
pressure to process all incoming information regardless of potential criteria. Credibility refers to a consistent logic maintained
its volume. One participant described this process as look- throughout the study. While NDM studies intentionally avoid extrapolat-
ing findings from their samples to the population writ large, the transfer-
ing for “the little jewels in the huge data stream” (Hutchins ability criterion argues that general features of a case study should transfer
et al., p. 298) while knowing that the vast majority of the to other situations.
stream was irrelevant. Time and technology constraints 3
Special thanks to a reviewer for suggesting the use of this example.

202 April 2012 ● American Psychologist


favor of NDM models. Research is necessary to uncover and Klein (2009) suggested, however, the notion of an
the types of analytic work that would benefit from each optimal decision is perhaps not as applicable to the murky
model, and future decision research should not give short waters of intelligence analysis.
shrift to either. In research on group decision processes, a group can
NDM is a promising approach that heeds the call for be a distinct information-processing unit (Hinsz, Tindale,
psychology to be more inclusive in what it considers to be & Vollrath, 1997), and the quality of the group’s decision
worthwhile methods in service to important questions (Ro- is a function of distribution of information in the group.
zin, 2009). In addition to identifying the conditions under Stasser and Titus’s (1985) classic study found a collective
which expert intuition can be trusted in the IC, applying information sharing bias, whereby shared information
NDM to intelligence analysis offers insights into fruitful (i.e., information possessed by all members prior to discus-
avenues for future quantitative research. The complemen- sion) was more predictive of group decisions than was
tary nature of qualitative and quantitative research suggests unshared information (i.e., information known only to one
that NDM studies can and should serve as a springboard for member prior to discussion), even when shared information
further quantitative analyses. Indeed, Hutchins et al. (2007) favored an inferior decision. Stasser and Titus concluded
pointed to information-processing challenges as a recurring that groups did not pool information optimally, resulting in
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

theme in intelligence analysis. Focusing research on how inferior decisions when prediscussion information was bi-
This document is copyrighted by the American Psychological Association or one of its allied publishers.

decision makers seek, collect, and share information under ased against the best alternative, a phenomenon also known
risky and time-sensitive conditions may be a first step to
as the common knowledge effect (Gigone & Hastie, 1993).
understanding decision making in the IC. The following
This effect implies clear challenges to analytic teamwork in
perspectives build on theories of information use to high-
the IC. Consider a hypothetical team of analysts in Novem-
light areas in which the IC can benefit from the predictions
of a rigorous psychological science. ber 1941 asked to anticipate the location of the next attack
against Allied Forces. Each analyst individually holds lim-
Group Decision Making ited unique information of an imminent attack on Pearl
Intelligence analysis is undergoing a shift from its tradi- Harbor and a great deal of shared information of an attack
tional role as an essentially individual activity toward a on Burma. The shared information bias predicts that the
new definition of analysis as a collaborative effort. Indeed, team will pool the shared information supporting a Burma
ODNI’s (2008) Vision 2015: A Globally Networked and attack, thereby missing the attack on Pearl Harbor.
Integrated Intelligence Enterprise calls for collaboration to There are several explanations for this information
move “away from coordination of draft products toward sharing bias. Stasser and Stewart (1992) argued that the
regular discussion of data and hypotheses, early in the collective information sharing bias is the result of proba-
research phase” (p. 13). Accordingly, to align with this bility; there are more sampling opportunities for shared
focus, psychology’s contribution to the IC Analytic Trans- information simply because it is known by more members.
formation should include findings from research on group Social psychologists suggest that probabilistic accounts are
decision making. incomplete and instead argue for the mutual enhancement
Early research on group decision making in the con- effect (Wittenbaum, Hubbell, & Zuckerman, 1999), claim-
text of national security decisions focused on groupthink ing that individuals prefer shared information because of
(Janis, 1972), a concept developed largely from a case resulting positive evaluations. Individuals are perceived as
study of the Bay of Pigs, a failed covert CIA mission to more knowledgeable and credible when they offer infor-
overthrow the Castro regime at the height of the Cold War. mation that others already know. On the other hand, cog-
Though groupthink has contributed greatly to the field by nitive psychologists turn toward biased information recall
spawning a wealth of group decision research, its current (Schulz-Hardt, Frey, Lüthgens, & Moscovici, 2000), a ten-
relevance is questionable because of its equivocal empirical dency to remember information supporting one’s initial
support and the changed international security picture since preference and to forget information not supporting it,
the Bay of Pigs fiasco in 1961. rendering one less likely to recall the very information that
Empirical research on groups has since focused on must be pooled to make the best decision. Straus et al.
two major areas: group performance and group decision (2011) offer an escalation-of-commitment paradigm,4 the-
making. Group performance research explores the product orizing that individuals tend to persist in their initial judg-
of group decision making (e.g., solution, decision). Groups ments despite being confronted with contradictory infor-
often do not achieve the optimal level of performance and mation. Finally, Lightle, Kagel, and Arkes (2009) offer the
exhibit “process loss” (Hill, 1982; Steiner, 1972); subse- group correction factor, which suggests that groups are
quent to these findings, much of the group performance
literature explored group suboptimality. Not recognizing
and using experts within the group (Moreland & Argote, 4
Straus et al. (2011) invoked escalation of commitment on the basis
2003) and high-stress situations (Brown & Miller, 2000) of a quasi-rational choice view that escalation is a decision error resulting
were implicated in suboptimal group performance. Straus, from attempts to justify past choices. An alternative empirically supported
behavior economic model views escalation not as an error but as an
Parker, and Bruce (2011) noted confirmation bias, over- adaptation to decision dilemmas and an equivocal environment, such as
confidence, and group polarization effects as potential that faced in the IC, by seeking additional information (Bragger, Hantula,
sources of process loss in analytic teams. As Kahneman Bragger, Kirnan, & Kutcher, 2003).

April 2012 ● American Psychologist 203


able to correct errors in the recall of shared information behavioral ecological account of foraging, humans are in-
better than errors in unshared information. formavores who attempt to maximize information gain
Though the mechanism remains unclear, several fac- while minimizing the costs of obtaining it. Humans search
tors exacerbate the information sharing bias (Straus et al., for information in various patches (e.g., journals, books,
2011). First, tasks with a clear solution are less prone to the colleagues), handle it (e.g., information processing), and
bias than are those involving judgments in ambiguous consume it (e.g., use information in task-relevant ways).
situations (Stasser & Stewart, 1992). Second, time pressure Foraging research has focused on two primary mod-
worsens the bias (Kelly & Karau, 1999), and third, the size els. Prey models explore foragers’ decisions to capture
of the team matters. Stasser, Taylor, and Hanna (1989) prey, whereas patch models investigate the searching for or
found that larger teams tended to focus on shared informa- handling of prey. Prey and patch models offer two primary
tion more than did smaller teams; three-person groups insights that are relevant to intelligence analysis: Foragers
outperformed six-person groups. Importantly, all three fac- are risk sensitive and time sensitive when it comes to prey
tors are ever-present in the IC. Forming judgments quickly consumption and patch time allocation.
in ambiguous situations is the modal state of affairs for Risk Insight 1: Foragers by default are risk
intelligence analysts, and IC teams range from 3 to 18 averse and seek low-hanging fruit. Because
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

members, with an average of approximately 10 members they cannot consume all available prey in the environment,
This document is copyrighted by the American Psychological Association or one of its allied publishers.

(Straus et al., 2011). foragers must be choosy. In the z-score model of risk
sensitivity (Stephens & Charnov, 1982), risky behaviors
Information Foraging
are a function of the forager’s energy budget. Foragers with
With the implicit assumption that decision makers must an energy surplus are risk averse, choosing low-variance
first choose relevant information with which to make sub- prey whose quality is relatively known (e.g., a vetted
sequent decisions, information foraging theory can serve as clandestine source). Foragers facing an energy deficit are
an overarching framework for decision research in the IC. more likely to be risk seeking, choosing high-variance prey
Indeed, if relevant information is not chosen, all other whose quality is relatively unknown but potentially very
judgment and decision efforts are frivolous at best, cata- profitable or very unprofitable (e.g., a new clandestine
strophic at worst. Information foraging theory directly ad- source). These tendencies are exacerbated as deadlines
dresses two major constraints faced by intelligence ana- draw near. The z-score model implies that the simplest way
lysts: information overload and severe time pressure. to maintain an energy surplus is to expend as little energy
Information foraging has its roots in behavioral ecology’s as possible by consuming easily captured prey. For in-
foraging theory (Stephens, Brown, & Ydenberg, 2007), a stance, Kerr (2008) attributed the IC’s failure to predict the
generalized framework for understanding the naturally se- 1979 fall of the Shah of Iran to an overreliance on “low-
lected decision rules by which predators capture prey and hanging” sources too close to the regime (e.g., diplomats,
survive in a risky world. Foraging research has been con- intelligence and military officers) rather than local unvetted
ducted across a wide variety of fields, investigating animals sources in the mosques and on the streets.
in behavioral ecology (e.g., Stephens et al., 2007) and Risk Insight 2: Foragers sample patches.
humans in anthropology (Winterhalder, 1992), cognitive Conventional wisdom suggests that foragers should spend
psychology (Rode, Cosmides, Hell, & Tooby, 1999), con- all their time in the richest patch. Yet Charnov’s (1976)
sumer psychology (Hantula, Brockman, & Smith, 2008), marginal value theorem predicts that when the instanta-
and information systems (Fu & Pirolli, 2007). neous rate of gain in a patch falls below the average rate of
The three phases of foraging are searching, handling, gain in all patches, foragers will leave the current patch to
and consuming. Foragers expend time and energy to search sample a new one in order to minimize the risk of a sole
for prey among various food patches. Handling includes patch drying up. Consistent with operant psychology’s
the time and energy devoted to preparing the captured prey matching law (Herrnstein, 1970), foragers will also distrib-
for consumption. Finally, consumption allows the predator ute their time between patches in equilibrium to their
to rebuild its stores of energy. Two important assumptions relative returns. Consider an intelligence analyst with ac-
underlie foraging theory: The currency assumption holds cess to six classified databases. If there is an average across
that energy and time are the forager’s primary currency. all databases of one useful piece of information for every
Thus, winning the survival game requires earning more of 10 minutes spent searching, she is likely to switch to
these biological pennies than one spends. Currency is another database after 10 minutes without success. Though
earned by consuming prey, whereas currency is spent by most of her time will be spent in rich databases, matching
seeking and handling prey. The constraint assumption law predicts she will still sample less productive ones.
holds that predators are constrained by their environment Time Insight 1: Foragers prefer prey that is
and phylogenic endowment. The forager’s goal is survival; easy to handle. Prey consumption is a function of
an optimal forager survives by maximizing energy effi- handling time. Handling is the amount of time between
ciency (i.e., unit energy per unit time). prey capture and consumption and does not guarantee
Pirolli and Card (1999) advanced information forag- consumption; for example, a squirrel may drop an acorn on
ing theory, a descriptive model suggesting that humans, the way to its feeding location. Thus, handling prey or
like other animals, forage to seek, collect, and consume information is an inherently risky enterprise. Kagel and
information in uncertain environments. Analogous to a Caraco (1986) offered time discounting as a foraging rule,

204 April 2012 ● American Psychologist


arguing that items with shorter handling times are preferred to understand the conditions under which analytic intuition
to those with longer handling times. The behavioral ecol- is skilled and trustworthy versus overconfident and faulty.
ogy of consumption (Hantula, DiClemente, & Rajala, 2001) NDM’s emphasis on expert decision processes will unveil
views consumers as foragers and similarly advances delay themes for further quantitative research in intelligence
discounting (Green & Myerson, 2004) as the critical vari- analysis. Hutchins et al. (2007) revealed some themes;
able. Online shopping studies have found a strong fit to a analysts’ refrains of information overload under time pres-
hyperbolic decay function; shoppers were more likely to sure have pointed to the present article’s focus on infor-
spend time and purchase CDs online from stores with the mation foraging and group information use. Additional
shortest delays to information about CD availability (Han- naturalistic research will certainly drive the quantitative
tula et al., 2008). This modern foraging task shows that research agenda further.
human foragers are sensitive to delays to the consumption
of prey, which affects their consumption decisions. What Types of Information Do Intelligence
Time Insight 2: Foragers stay longer in de- Analysts Consume?
pleting patches with lengthy travel times than Foragers tend to be risk averse and consume low-hanging
in those with short travel times. Travel time in fruit unless they are particularly hungry. Thus, the IC
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

foraging research is explained by the marginal value theo- forager with sufficient insights may be likely to use more
This document is copyrighted by the American Psychological Association or one of its allied publishers.

rem. The average rate of return in the environment can be easily interpretable information (e.g., solid intelligence
simplified to a ratio of the sum of gains in the environment from credible sources) to develop reports rather than search
to the total time (both residence and travel times). As travel for difficult-to-interpret (but potentially more valuable) in-
time falls in the denominator of this ratio, increasing travel formation. Yet analysts who are “hungry” for insight may
time leads to a lesser overall average rate of return. Owing be more likely to be risk seeking and to use highly variable
to this lower threshold, it takes longer for the instantaneous information (e.g., less credible sources) to support a key
rate of return of a patch to fall below this average rate— judgment as deadlines draw near. It is important to note
thus leading to longer patch residence times. For example, that using highly variable information to support a key
if gaining entry into a database is time-consuming, the judgment looks similar to seeking only information that
intelligence analyst described above might spend signifi- confirms a preexisting hypothesis (i.e., confirmation bias).
cantly longer than 10 minutes in an unproductive database Indeed, this risk-sensitive model of IC foraging might
before moving on. Empirical evidence supports this pre- explain the equivocal results in confirmation bias research.
diction (Barrette, Boivin, Brodeur, & Giraldeau, 2010). It suggests that temporal dynamics are crucial when inves-
In sum, foraging theory highlights that decision pro- tigating confirmation bias. If what appears to be confirma-
cesses occur under time constraints, and these time con- tion bias increases with looming deadlines, perhaps ana-
straints affect how one exploits information under risky lysts are risk-sensitive foragers instead of biased thinkers.
conditions. Empirical evidence finds that foragers are time These insight surpluses and deficits may be concep-
sensitive and risk sensitive. That is, instead of conducting tualized as analytic experience; more experienced analysts
exhaustive information searches, foragers satisfice when presumably have many quality insights under their belts,
solving problems by consuming easily accessible informa- whereas novice analysts take more risks in developing
tion from a variety of sources and moving on to other easily theories and building their brands, so to speak. Further,
accessible sources quickly (Fu & Pirolli, 2007; Hantula et until recently, analysts were not required to divulge the
al., 2008). Intelligence analysts work in an information sources supporting their key judgments; thus, policymakers
world rife with too many, conflicting, and ambiguous were unable to adequately differentiate between judgments
sources and must provide key insights under severe time stemming from more reliable intelligence and those stem-
constraints. The empirical support underlying foraging the- ming from highly variable sources.
ory provides a strong foundation for a plausible IC foraging
theory, as summarized in Table 1, to describe optimal Do Analytic Teams Share
analytic behavior. Empirical research is necessary to test Information Effectively?
this IC foraging model. Although key judgments and analytic products can be
individually driven, they are increasingly more often the
Future Research Agenda result of group discussions. In these cases, the information
sharing bias suggests that key judgments may be based on
One goal of this article was to craft a preliminary research a subset of available information rather than the larger pool
agenda to expand the psychology of intelligence analysis. of information known to the group. Similarly, the bias may
Some questions informed by the reviewed literature are factor into key judgments produced in interagency reports
presented below. such as PDBs or NIEs.
Do Intelligence Analysts Conform to The information sharing bias tells us that individuals
Naturalistic Decision Models? overvalue information that is already known by other group
members; risk-sensitive foraging tells us what kind of
As Kahneman and Klein (2009) suggested, feedback on the information individuals will collect. As foragers’ default
quality of analytic products is necessary for intelligence mechanism is to reach for low-hanging fruit, then intelli-
analysts to develop intuitive expertise. Research is needed gence analysts are likely to individually collect bountiful

April 2012 ● American Psychologist 205


Table 1
Analogues of Foraging Theory
Foraging theory Information foraging theory IC foraging theory

Animal forager/predator Human forager/informavore Analyst forager/informavore

Energy (E) Information (I) Key judgments/insights (J)

Time (T) Time (T) Time (T)

Survival equation ⫽ E/T Survival equation ⫽ I/T Survival equation ⫽ J/T

Patch Source of information Intelligence source (e.g., OSINT, SIGINT)


Clandestine source
Physical location of information Database
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

Technological tool
This document is copyrighted by the American Psychological Association or one of its allied publishers.

Topic for report


IC agency
Expert source

Prey Information Intelligence data

Search Gather information Locate information source


Locate expert source
Locate background information
Assess intelligence credibility

Handle Process information Access data


Format data
Integrate data into hypotheses
Develop theories
Test hypotheses
Share information

Consume Use information in task-relevant ways Use intelligence for key judgments in reports
Note. Foraging theory is adapted from Stephens, Brown, and Ydenberg (2007), and information foraging theory is adapted from Pirolli and Card (1999). IC ⫽
intelligence community; OSINT ⫽ open source intelligence; SIGINT ⫽ signals intelligence.

“low-hanging” information. This implies that many ana- by using intelligence from a variety of sources rather than
lysts will hold the same information. The information shar- basing an entire judgment on one or a few sources. Yet our
ing bias might then drive them to overvalue this shared review suggests that when there are barriers between
information in group discussions. In other words, key judg- sources, analysts will diversify their information sources
ments for policymakers might disproportionately be based less. Essentially, barriers lead to too much time spent with
on a small subset of easily interpretable intelligence. This too few sources.
prediction is consistent with recent observations that IC Numerous incompatible technological systems exist
reports often provide overlapping information, significantly in the IC. Former National Counterterrorism Center Direc-
increasing the volume of reports without proportionally tor Michael Leiter admitted that he spent much of his time
increasing their utility to policymakers (R. Immerman, switching between four computer monitors and six hard
cited in Priest & Arkin, 2010). drives on his desk, most of which fed into incompatible
networks, and that it was a “big deal” that all of his e-mail
Do Intelligence Analysts Diversify Their was finally on one computer after over three years as the
Information Sources Effectively? director of the center (Priest & Arkin, 2010). We do not,
Patch sampling is a robust finding in foraging research. thus far, have empirical evidence that these between-patch
Within the IC, patches may be conceptualized as databases, barriers adversely affect patch residence time in the IC, but
types of intelligence (e.g., HUMINT, SIGINT), different admissions such as these from major IC leaders certainly
clandestine sources, or even different agencies. Foraging beg the question. Further, with information sharing being a
research predicts that intelligence analysts sample patches much-touted IC goal (ODNI, 2008), a closer look at how

206 April 2012 ● American Psychologist


these types of barriers affect interagency information flow Recommendation 1: Design Externally
is necessary. Valid Studies
General Discussion Questions about the transferability of findings from studies
of novice decision making to experts implore researchers of
The IC’s Analytic Transformation movement is primed for intelligence analysis to study intelligence analysts directly.
psychology to lend its voice to improving the quality of Though working with analysts in the IC may be logistically
intelligence analysis. Traditional JDM serves as a begin- challenging, other options exist. For example, recruiting
ning; NDM’s qualitative fieldwork offers insight into the retired intelligence analysts and current intelligence ana-
challenging information world of intelligence analysis. In- lysts enrolled in advanced degree programs would lead to
formation foraging theory advances the idea that intelli- results that are transferable to the IC. Still, research on
gence analysts may be viewed as informavores who use group decision making serves as a reminder that it may be
adaptive strategies to form key judgments efficiently, and unwise to assume that individual decision making general-
research on group decision making posits that group pro- izes to group decision making. Specifically investigating
cesses are often dependent on the distribution of informa- different units of analysis (e.g., individual, group, agency)
tion within the group. These empirical findings can better can illuminate the differential processes interacting with
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

inform intelligence processes at a time when the IC is one another in the IC. Indeed, Heuer and Pherson (2011)
This document is copyrighted by the American Psychological Association or one of its allied publishers.

perceived to be in deep trouble. Though our preliminary conceded that this type of translational research offers a
research agenda offers a foundation for a meaningful dia- new way forward for assessing analytic processes in the IC.
logue between psychologists and the IC, three methodolog- Following the lead of NDM and foraging research,
ical obstacles are highlighted: analog studies using small samples, simulations, and mul-
1. Lack of time. Analysts’ severe time constraints tiple methods will be more pragmatic and relevant to the
cannot be overestimated. As time is a precious commodity, IC. In addition, research aimed at improving analytic meth-
conducting analysis, as opposed to participating in research odology must measure all relevant dependent variables.
or using lengthy techniques, is perceived to be the more Prey consumption and patch sampling in information for-
suitable time expenditure (Johnston, 2005). For example, aging, information sharing in group decision research, and
though argument mapping is an empirically supported naturalistic decision research all remind us that the deci-
method for improving critical thinking (van Gelder, Bissett, sion-making process is just as important to measure as the
& Cumming, 2004), analysts resist employing such a ultimate product. To this end, dependent variables should
lengthy, structured analytic technique. extend beyond accuracy of performance to include other
2. Resistance to empiricism. Relying exclusively on measures of quality, such as choosing relevant information
empirically supported strategies to inform IC analytic tra- or efficiency in decision processes.
decraft has mixed reviews. Some IC leaders call for such
scientific rigor (Rieber & Thomason, 2005), whereas others Recommendation 2: Disseminate Research in
are skeptical of its utility. the Scientific Community and Beyond
If you are trying to change analysts’ behavior, which has to be the Organizing conferences and publishing research specifi-
goal of such research, you are starting with at least one strike cally on intelligence analysis are essential to building the
against you, as much of your target audience already has a firm research program. Conferences dedicated to the psychol-
opinion, based on their personal experience that they believe is ogy of intelligence analysis offer a networking space to
more trustworthy than your research. (Heuer, 2009, p. 5) develop expertise in this area. Publishing in psychology
3. Politicization of intelligence. Experts are concerned journals as well as intelligence studies journals (e.g., Intel-
that if intelligence analysts are pressured to frame intelli- ligence and National Security, International Journal of
gence to support policymaker preferences, this will be a Intelligence and Counterintelligence) as well as general
barrier to intelligence reform (George & Bruce, 2008; interest publications further develops a theoretical founda-
Lowenthal, 2009), though the extent of the problem is tion and increases the profile of this important application
unclear. Tetlock and Mellers (2011) provided a detailed of psychology. Indeed, former IC leaders’ (e.g., Heuer,
agenda centered on psychological research to overcome 1999) pervasive focus on confirmation bias may be due
possible politicization in the IC. more to its recognition outside of psychology than to em-
These perceived barriers should not stop psychology pirical evidence of it in the IC.
from taking on the Analytic Transformation as its next
Recommendation 3: Collaborate With the
grand challenge. Though some IC leaders have been un-
Intelligence Community
successful in their push to include psychological findings in
analytic methodology, these cultural barriers can be coun- A recent collaboration between the National Research
tered if psychologists make a concerted effort to build a Council and the IC, Intelligence Analysis for Tomorrow:
rigorous science around the psychology of intelligence Advances From the Behavioral and Social Sciences (Na-
analysis and demonstrate how and why psychology im- tional Research Council, 2011), is promising. Psycholo-
proves analytic practices, as Loftus (2011) and Tetlock and gists comprised half of the National Research Council’s
Mellers (2011) have done. We offer several recommenda- Committee on Behavioral and Social Science Research to
tions. Improve Intelligence Analysis for National Security and

April 2012 ● American Psychologist 207


offered a framework for how psychology may be applied in search for information in real time, which may lead to
the IC. Psychologists can propose and seek IC funding for insights on how they make sense of their dynamic infor-
studies stemming from such recommendations. There is mation environment.
progress toward this goal of research in the IC. ODNI’s Although this article has focused on improving deci-
Intelligence Advanced Research Projects Activity is cur- sion making, the fact that analysts work in the context of
rently conducting a study on forecasting strategies (http:// complex organizations should not be ignored. Advances in
forecastwe.org/) based on psychological research (Arm- industrial– organizational (I–O) psychology will be very
strong, 2005; Tetlock, 2005). Moreover, ODNI’s Office of helpful in the Analytic Transformation. Two current IC
Analytic Integrity and Standards, as well as its Open challenges that I–O research can address well are perfor-
Source Center, have organized conferences with IC per- mance management/pay issues and virtual teaming. The IC
sonnel and academic experts in the past, and psychologists has struggled with performance management and pay for
can work through these avenues to engage in IC research nearly a decade (Losey, 2010), an issue that recent I–O
projects. scholarship casts in a new light (Pulakos & O’Leary, 2011).
In addition to engaging in research projects, psychol- Given the rapid rise of technological tools, virtual collab-
ogists might use their expertise to provide consultation oration will become more common in the IC. Virtual work
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

services. The National Intelligence Council has a history of differs from face-to-face collaboration in many important
This document is copyrighted by the American Psychological Association or one of its allied publishers.

consulting with eminent psychologists, and psychologists respects and presents challenges that I–O research is poised
consult with the IC in areas ranging from dynamic organi- to handle (DeRosa & Lepsinger, 2010).
zational processes (Baughman & Dorsey, 2009) to analytic Armed with theories and empirical techniques, psy-
methodology. Psychologists with varied backgrounds and chology has a voice worthy of consideration in the national
research expertise would have a significant impact as con- discourse on intelligence analytic methods and policy. The
sultants to analytic agencies, entrenching analytic method- veritable explosion of decision research in the past decade
ology more deeply in decision research. requires a renewed focus on psychology’s contribution to
analytic tradecraft and reinforces the critical need for psy-
Recommendation 4: Centralize Intelligence
chologists to have a seat at the table. By highlighting
Community Research
challenges faced by humans in a risky and uncertain infor-
It is worth considering a longer range goal of establishing mation world, research programs on decision making and
a centralized IC research institution. An in-house institu- information use undergird intelligence analysis and offer
tion may include participants who are expected to imple- empirically supported strategies for keeping our nation
ment the findings (Heuer, 2009); however such an arrange- safe, rather than pointing a finger at analysts who fail to
ment may discourage external collaboration. An alternative “connect the dots.” Indeed, in the present article we argue
may be an independent scientific research institution akin that analytic reform may best be accomplished by viewing
to the National Institutes of Health (Rieber & Thomason, intelligence analysts as adaptive thinkers rather than irra-
2005). However, such an institution would have to be tional information processors.
created from the ground up. Perhaps a more successful
approach that psychologists can influence more directly REFERENCES
may be to rely on the National Science Foundation’s (NSF)
Alison, L., Barrett, E., & Crego, J. (2007). Criminal investigative decision
proven expertise and establish an Intelligence Research making: Context and process. In R. R. Hoffman (Ed.), Expertise out of
branch of NSF’s Directorate for Social, Behavioral and context: Proceedings of the Sixth International Conference on Natu-
Economic Sciences. This branch could become a clearing- ralistic Decision Making (pp. 79 –95). Mahwah, NJ: Erlbaum.
house for all research relevant to intelligence analysis. Allison, G. T., & Zelikow, P. (1999). Essence of decision: Explaining the
Information foraging theory suggests that this type of clear- Cuban missile crisis (2nd ed.). New York, NY: Addison-Wesley.
Armstrong, J. S. (Ed.). (2005). Principles of forecasting. Norwell, MA:
inghouse could reduce between-patch time and therefore Kluwer.
facilitate the application of empirical research in the long Ayton, P. (1992). On the competence and incompetence of experts. In G.
run. Wright & F. Bolger (Eds.), Expertise and decision support (pp. 77–
105). New York, NY: Plenum Press. doi:10.1007/978-0-585-34290-
Recommendation 5: Employ Research From 0_5
Other Areas of Psychology Barrette, M., Boivin, G., Brodeur, J., & Giraldeau, L. A. (2010). Travel
time affects optimal diets in depleting patches. Behavioral Ecology and
Our present focus on decision-making research is a start to Sociobiology, 64(4), 593–598. doi:10.1007/s00265-009-0876-5
understanding intelligence analysis. Recent work in polit- Baughman, W. A., & Dorsey, D. W. (2009). Consulting psychology and
ical psychology offers additional insights into analytic pro- the intelligence community: Toward a new support paradigm. Consult-
ing Psychology Journal: Practice and Research, 61, 56 – 67. doi:
cesses. For example, Lodge and Taber’s (2005) research on 10.1037/a0015100
hot cognition argued that affect is activated automatically Betts, R. K. (2002). Fixing intelligence. Foreign Affairs, 81, 43–59.
when one views political information, leading to biased doi:10.2307/20033002
information processing—though Valentino, Hutchings, Betts, R. K. (2007). Two faces of intelligence failure: September 11 and
Banks, and Davis (2008) have suggested that anxiety may Iraq’s missing WMD. Political Science Quarterly, 122, 585– 606.
Bragger, J. D., Hantula, D. A., Bragger, D., Kirnan, J., & Kutcher, E.
actually promote information seeking in some cases. Fur- (2003). When success breeds failure: History, hysteresis, and delayed
ther, Lau and Redlawsk’s (2001) process tracing method- exit decisions. Journal of Applied Psychology, 88, 6 –14. doi:10.1037/
ology offers a technique to examine how participants 0021-9010.88.1.6

208 April 2012 ● American Psychologist


Brown, T., & Miller, C. (2000). Communication networks in task-per- International Conference on Naturalistic Decision Making (pp. 281–
forming groups: Effects of task complexity, time pressure, and inter- 316). Mahwah, NJ: Erlbaum.
personal dominance. Small Group Research, 31, 131–157. doi:10.1177/ Immerman, R. H. (2011). Transforming analysis: The intelligence com-
104649640003100201 munity’s best kept secret. Intelligence and National Security, 26(2–3),
Charnov, E. L. (1976). Optimal foraging, the marginal value theorem. 159 –181. doi:10.1080/02684527.2011.559138
Theoretical Population Biology, 9, 129 –136. doi:10.1016/0040- Intelligence Reform and Terrorism Prevention Act of 2004. Pub. L. No.
5809(76)90040-X 108 – 458, 118 Stat. 3638 (2004). Retrieved from http://travel.state.gov/
Crupi, V., Tentori, K., & Lombardi, L. (2009). Pseudodiagnosticity re- pdf/irtpa2004.pdf
visited. Psychological Review, 116, 971–985. doi:10.1037/a0017050 Janis, I. L. (1972). Victims of groupthink: A psychological study of
DeRosa, D. M., & Lepsinger, R. (2010). Virtual team success: A practical foreign-policy decisions and fiascoes. Oxford, England: Houghton Mif-
guide for working and leading from a distance. San Francisco, CA: flin.
Jossey-Bass. Jervis, R. (2006). Reports, politics, and intelligence failures: The case of
Evans, J. S. B. T., Venn, S., & Feeney, A. (2002). Implicit and explicit Iraq. Journal of Strategic Studies, 29(1), 3–52. doi:10.1080/
processes in a hypothesis testing task. British Journal of Psychology, 01402390600566282
93, 31– 46. doi:10.1348/000712602162436 Jervis, R. (2010). Why intelligence fails: Lessons from the Iranian Revo-
Exec. Order No. 12,333, 3 C.F.R. 200 (1981). Retrieved from http:// lution and the Iraq War. Ithaca, NY: Cornell University Press.
www.archives.gov/federal-register/codification/executive-order/12333 Johnson, L. K. (2007). Strategic intelligence: Vol. 1. Understanding the
.html hidden side of government. Westport, CT: Greenwood.
Fingar, T. (2011). Analysis in the U.S. intelligence community: Missions,
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

Johnston, R. (2005). Analytic culture in the U.S. intelligence community:


masters, and methods. In B. Fischhoff & C. Chauvin (Eds.), Intelli-
This document is copyrighted by the American Psychological Association or one of its allied publishers.

An ethnographic study. Washington, DC: Center for the Study of


gence analysis: Behavioral and social scientific foundations (pp. 3–27). Intelligence.
Washington, DC: National Academies Press. Kagel, J., & Caraco, G. (1986). When foragers discount the future:
Fiske, S. T., & Taylor, S. E. (1991). Social cognition (2nd ed.). New York, Constraint of adaptation? Animal Behaviour, 34, 271–283. doi:10.1016/
NY: McGraw-Hill. 0003-3472(86)90032-1
Fu, W., & Pirolli, P. (2007). SNIF-ACT: A cognitive model of user Kahneman, D., & Klein, G. (2009). Conditions for intuitive expertise: A
navigation on the World Wide Web. Human–Computer Interaction, 22, failure to disagree. American Psychologist, 64, 515–526. doi:10.1037/
355– 412. a0016755
George, R. Z., & Bruce, J. B. (Eds.). (2008). Analyzing intelligence: Kazdin, A. E. (2009). Psychological science’s contributions to a sustain-
Origins, obstacles, and innovations. Washington, DC: Georgetown able environment: Extending our reach to a grand challenge of society.
University Press. American Psychologist, 64, 339 –356. doi:10.1037/a0015685
Gigone, D., & Hastie, R. (1993). The common knowledge effect: Infor-
Kelly, J. R., & Karau, S. J. (1999). Group decision making: The effects of
mation sharing and group judgment. Journal of Personality and Social
initial preferences and time pressure. Personality and Social Psychol-
Psychology, 65, 959 –974. doi:10.1037/0022-3514.65.5.959
ogy Bulletin, 25, 1342–1354. doi:10.1177/0146167299259002
Green, L., & Myerson, J. (2004). A discounting framework for choice
Kerr, R. (2008). The track record: CIA analysis from 1950 to 2000. In R.
with delayed and probabilistic rewards. Psychological Bulletin, 130,
George & J. Bruce (Eds.), Analyzing intelligence (pp. 35–54). Wash-
769 –792. doi:10.1037/0033-2909.130.5.769
ington, DC: Georgetown University Press.
Hantula, D. A., Brockman, D. D., & Smith, C. L. (2008). Online shopping
Klein, G. A. (2001). Sources of power: How people make decisions.
as foraging: The effects of increasing delays on purchasing and patch
Cambridge, MA: MIT Press.
residence. IEEE Transactions on Professional Communication, 51,
147–154. doi:10.1109/TPC.2008.2000340 Klein, G. A., Calderwood, R., & MacGregor, D. (1989). Critical decision
Hantula, D. A., DiClemente, D. F., & Rajala, A. K. (2001). Outside the method for eliciting knowledge. IEEE Transactions on Systems, Man,
box: The analysis of consumer behavior. In L. Hayes, J. Austin, R. & Cybernetics: Perspectives in Knowledge Engineering, 19, 462– 472.
Houmanfar, & M. Clayton (Eds.), Organizational change (pp. 203– doi:10.1109/21.31053
223). Reno, NV: Context Press. Lau, R., & Redlawsk, D. (2001). Advantages and disadvantages of cog-
Herrnstein, R. J. (1970). On the law of effect. Journal of the Experimental nitive heuristics in political decision making. American Journal of
Analysis of Behavior, 13, 243–266. doi:10.1901/jeab.1970.13-243 Political Science, 45, 951–971. doi:10.2307/2669334
Heuer, R. J. (1999). Psychology of intelligence analysis. New York, NY: Lehner, P., Adelman, L., Cheikes, B., & Brown, M. (2008). Confirmation
Novinka/Nova Science. bias in complex analyses. IEEE Transactions on Systems, Man, &
Heuer, R. J. (2009, December 8). The evolution of structured analytic Cybernetics: Part A: Systems and Humans, 38, 584 –592. doi:10.1109/
techniques. Presentation to the National Academy of Sciences, National TSMCA.2008.918634
Research Council, Committee on Behavioral and Social Science Re- Lightle, J. P., Kagel, J. H., & Arkes, H. R. (2009). Information exchange
search to Improve Intelligence Analysis for National Security, Wash- in group decision making: The hidden profile problem reconsidered.
ington, DC. Retrieved from http://www7.nationalacademies.org/bbcss/ Management Science, 55, 568 –581. doi:10.1287/mnsc.1080.0975
DNI_Heuer.html Lipshitz, R., Klein, G., Orasanu, J., & Salas, E. (2001). Taking stock of
Heuer, R. J., & Pherson, R. H. (2011). Structured analytic techniques for naturalistic decision making. Journal of Behavioral Decision Making,
intelligence analysis. Washington, DC: CQ Press. 14, 331–352. doi:10.1002/bdm.381
Hill, G. W. (1982). Group versus individual performance: Are N ⫹ 1 Lodge, M., & Taber, C. (2005). The automaticity of affect for political
heads better than one? Psychological Bulletin, 91, 517–539. doi: leaders, groups, and issues: An experimental test of the hot cognition
10.1037/0033-2909.91.3.517 hypothesis. Political Psychology, 26, 455– 482. doi:10.1111/j.1467-
Hinsz, V. B., Tindale, R. S., & Vollrath, D. A. (1997). The emerging 9221.2005.00426.x
conceptualization of groups as information processors. Psychological Loftus, E. F. (2011). Intelligence gathering post 9/11. American Psychol-
Bulletin, 121, 43– 64. doi:10.1037/0033-2909.121.1.43 ogist, 66, 532–541. doi:10.1037/a0024614
Hoffman, R. R. (Ed.). (2007). Expertise out of context: Proceedings of the Losey, S. (2010, May 23). Intel workers’ pay system unfair, study says.
Sixth International Conference on Naturalistic Decision Making. Mah- Federal Times. Retrieved from http://www.federaltimes.com/article/
wah, NJ: Erlbaum. 20100523/BENEFITS01/5230306/1041/BENEFITS
Hoffman, R. R., Crandall, B., & Shadbolt, N. (1998). Use of the critical Lowenthal, M. (2009). Intelligence: From secrets to policy. Washington,
decision method to elicit expert knowledge: A case study in the meth- DC: CQ Press.
odology of cognitive task analysis. Human Factors, 40, 254 –276. Moreland, R. L., & Argote, L. (2003). Transactive memory in dynamic
doi:10.1518/001872098779480442 organizations. In E. A. Mannix (Ed.), Leading and managing people in
Hutchins, S. G., Pirolli, P. L., & Card, S. K. (2007). What makes the dynamic organization (pp. 135–162). Mahwah, NJ: Erlbaum.
intelligence analysis difficult? A cognitive task analysis. In R. R. National Research Council, Committee on Behavioral and Social Science
Hoffman (Ed.), Expertise out of context: Proceedings of the Sixth Research to Improve Intelligence Analysis for National Security.

April 2012 ● American Psychologist 209


(2011). Intelligence analysis for tomorrow: Advances from the behav- decision making: Biased information sampling during discussion. Jour-
ioral and social sciences. Washington, DC: National Academies Press. nal of Personality and Social Psychology, 48, 1467–1478. doi:10.1037/
National Security Act of 1947, 50 U.S.C. 401 et seq. (as amended, 2006). 0022-3514.48.6.1467
Office of the Director of National Intelligence. (2007). Intelligence Com- Steiner, I. D. (1972). Group process and productivity. New York, NY:
munity Directive Number 203: Analytic standards. Retrieved from Academic Press.
http://www.fas.org/irp/dni/icd/icd-203.pdf Stephens, D. W., Brown, J. S., & Ydenberg, R. C. (2007). Foraging:
Office of the Director of National Intelligence. (2008). Vision 2015: A Behavior and ecology. Chicago, IL: University of Chicago Press.
globally networked and integrated intelligence enterprise. Retrieved Stephens, D. W., & Charnov, E. L. (1982). Optimal foraging: Some
from http://www.dni.gov/Vision_2015.pdf simple stochastic models. Behavioral Ecology and Sociobiology, 10,
Pirolli, P., & Card, S. (1999). Information foraging. Psychological Re- 251–263. doi:10.1007/BF00302814
view, 106, 643– 675. doi:10.1037/0033-295X.106.4.643 Straus, S., Parker, A., & Bruce, J. (2011). The group matters: A review of
Priest, D., & Arkin, W. (2010, July 19). Top secret America. The Wash- processes and outcomes in intelligence analysis. Group Dynamics:
ington Post. Retrieved from http://projects.washingtonpost.com/top- Theory, Research, and Practice, 15, 128 –146. doi:10.1037/a0022734
secret-america/ Tetlock, P. E. (2005). Expert political judgment: How good is it? How can
Pulakos, E. D., & O’Leary, R. S. (2011). Why is performance manage- we know? Princeton, NJ: Princeton University Press.
ment broken? Industrial and Organizational Psychology: Perspectives Tetlock, P. E., & Mellers, B. A. (2011). Intelligence management of
on Science and Practice, 4, 146 –164. doi:10.1111/j.1754-9434 intelligence agencies: Beyond accountability ping-pong. American Psy-
.2011.01315.x chologist, 66, 542–554. doi:10.1037/a0024285
Rieber, S., & Thomason, N. (2005). Creation of a National Institute for
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

Tolcott, M. A., Marvin, F. F., & Lehner, P. E. (1989). Expert decision-


Analytic Methods: Toward improving intelligence analysis. Studies in
This document is copyrighted by the American Psychological Association or one of its allied publishers.

making in evolving situations. IEEE Transactions on Systems, Man,


Intelligence, 49(4). Retrieved from https://www.cia.gov/library/center-
and Cybernetics, 19, 606 – 615. doi:10.1109/21.31066
for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49
no4/Analytic_Methods_7.htm Tversky, A., & Kahneman, D. (1974, September 27). Judgment under
Rode, C., Cosmides, L., Hell, W., & Tooby, J. (1999). When and why do uncertainty: Heuristics and biases. Science, 185, 1124 –1131. doi:
people avoid unknown probabilities in decisions under uncertainty? 10.1126/science.185.4157.1124
Testing some predictions from optimal foraging theory. Cognition, 72, Valentino, N., Hutchings, V., Banks, A., & Davis, A. (2008). Is a worried
269 –304. doi:10.1016/S0010-0277(99)00041-4 citizen a good citizen? Emotions, political information seeking, and
Rozin, P. (2009). What kind of empirical research should we publish, learning via the Internet. Political Psychology, 29, 247–273. doi:
fund, and reward? A different perspective. Perspectives on Psycholog- 10.1111/j.1467-9221.2008.00625.x
ical Science, 4, 435– 439. doi:10.1111/j.1745-6924.2009.01151.x van Gelder, T., Bissett, M., & Cumming, G. (2004). Cultivating expertise
Schulz-Hardt, S., Frey, D., Lüthgens, C., & Moscovici, S. (2000). Biased in informal reasoning. Canadian Journal of Experimental Psychology,
information search in group decision making. Journal of Personality 58, 142–152. doi:10.1037/h0085794
and Social Psychology, 78, 655– 669. doi:10.1037/0022-3514.78.4.655 Wason, P. C. (1960). On the failure to eliminate hypotheses in a concep-
Scowcroft, B. (2000, January 12). Intelligence is not a crystal ball. The tual task. Quarterly Journal of Experimental Psychology, 12, 129 –140.
Washington Post. Retrieved from http://www.washingtonpost.com doi:10.1080/17470216008416717
Stasser, G., & Stewart, D. (1992). Discovery of hidden profiles by deci- Winterhalder, B. (Ed.). (1992). Evolutionary ecology and human behav-
sion-making groups: Solving a problem versus making a judgment. ior. Hawthorne, NY: Aldine de Gruyter.
Journal of Personality and Social Psychology, 63, 426 – 434. doi: Wittenbaum, G. M., Hubbell, A. P., & Zuckerman, C. (1999). Mutual
10.1037/0022-3514.63.3.426 enhancement: Toward an understanding of the collective preference for
Stasser, G., Taylor, L. A., & Hanna, C. (1989). Information sampling in shared information. Journal of Personality and Social Psychology, 77,
structured and unstructured discussions of three- and six-person groups. 967–978. doi:10.1037/0022-3514.77.5.967
Journal of Personality and Social Psychology, 57, 67–78. doi:10.1037/ Yates, J. F. (2001). “Outsider”: Impressions of naturalistic decision mak-
0022-3514.57.1.67 ing. In G. Klein (Ed.), Linking expertise and naturalistic decision
Stasser, G., & Titus, W. (1985). Pooling of unshared information in group making (pp. 9 –33). Mahwah, NJ: Erlsbaum.

210 April 2012 ● American Psychologist

You might also like