Foreknowledge Número 3 PDF

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

foreknowledge Essential Resources for Intelligence Analysts

Issue Three www.foreknowledge.info


June 2012 ISSN 2225-5613

Should we kill the intelligence cycle?


Bob Heibel -
intelligence analysis
education pioneer

Toolbox:
Red Hat analysis
Make your
message
compelling!

Meet an FIU
analyst
Text mining
Let’s reduce
friction in
Intelligence
Analysis software
dissemination that also cooks?
Contents We’d love to serve u
better - click here to take
our anonymous survey!
Editor:
Dalene Duvenage

Publisher:
From the editor 3
4Knowledge Analysis Solutions
Should we kill the intelligence cycle? 4
PO Box 40467
The UK MoD Core functions of intelligence paradigm
Moreleta Park
El ciclo de intelligencia y la teoria del conocimiento
Pretoria
Pulling the plug on the intelligence cycle - where is
0044
counterintelligence?
South Africa
Bob Heibel: pioneer of intelligence analysis 10
education
Contributions and advertising enquiries:
Analysis software that also cooks? 11 editor@foreknowledge.info
Analyst toolbox 12
Red hat analysis Disclaimer
Applying red hat analysis to radicalised individuals Views expressed in articles are not necessarily those of
4Knowledge Analysis Solutions cc or of any executive mem-
Make your message compelling! ber or director of the endorsing professional organizations
Intelligence analytics: Text mining unless expressly so stated.
Editorial submissions
The effective analyst: attitudes 17
Authors contributing articles to Foreknowledge e-mag grant
Let’s reduce friction in intelligence 18 a licence to the publisher and its contractors from time to
time to edit and publish the article electronically or by print or
dissemination any other media.
By contributing to the e-mag authors grant the publisher and
Psychology of intelligence analysis # 3 20 its contractors from time to time an indemnity to the fullest
extent permitted by law from all liability arising from their
Meet a Financial Intelligence Unit analyst 22
work. All authors are responsible for securing permission to
Upcoming conferences 23 use any copyrighted material, including graphics, quotations,
and photographs, within their contributions. The publisher
and its contractors from time to time disclaim any and all re-
sponsibility for copyright violations and any other form of lia-
bility arising from the content of the e-magazine or from any

Endorsing organisations:
material linked to the e-magazine. Contributing authors will
be notified immediately of any discovered copyright viola-
tions so that such issues may be dealt with promptly.
No responsibility or liability will be accepted by the publisher
and its contractors from time to time or any associated per-
sons or entities to advertisers for the publication of adver-
tisements that may be inaccurate or found to be contrary to
law.
4Knowledge Analysis Solutions CC (the “Publisher”) is the
owner of all rights in terms of copyright related to any works
Association of Association of embodied in this E-Magazine or its content, save for the
Law Enforcement Crime and works embodied in the advertisements and the literary works
Intelligence Units Intelligence Analysts embodied in the contributions.
No person may copy, reproduce, make an adaptation of, let,
offer for sale or hire, import or export other than for private
use, or distribute for purposes of trade the E-Magazine or any
part thereof in any manner or form or cause or allow any
person to commit any of the aforementioned acts in relation
to the E-Magazine or any part thereof; without the express
authorisation of the Publisher.
International Australian Institute The Publisher, Authors and Advertisers reserve their respec-
Association of Law for Professional tive rights in and to all works embodied in this E-Magazine.
Enforcement Intelligence
Intelligence Analysts Officers
© 4Knowledge Analysis Solutions CC 2011
All rights reserved

2 June 2012 • Foreknowledge


Editor: Dalene Duvenage, Pretoria, South Africa From the editor
When you read this 3rd edition of Foreknowledge, you would be one of thousands of analysts and
managers across all the intelligence domains in 89 countries who have read our previous editions
thus far. Thank you for your enthusiasm and support - we’ve heard from agencies that distrib-
ute it to all units, universities that use the magazine in class exercise, while a Canadian inter
agency group of analysts discusses the articles during their knowledge sharing sessions. In our 3rd edition
we focus on the debate surrounding the intelligence cycle and discuss the different opinions and ask practi-
tioners to join in. We also look at Red Hat Analysis in the Analyst Toolbox and look at distribution and for-
matting of our intelligence reports. We meet Bob Heibel, the former FBI special agent who became a
change agent when he pioneered the first intelligence analysis qualification in the world at Mercyhurst Col-
lege 20 years ago. Is link software the sum total of your knowledge on software? We start with a series fo-
cusing on intelligence software issues in laymen's terms in this issue. Remember to do our survey so that
we can serve your needs better. Dalene
Our contributors in this edition include intelligence professionals writing under pseudonyms as well these experts:
Richards Heuer is a veteran Douglas Bernhardt is an
intelligence scholar and ana- author and visiting lecturer at Juan Pablo Somiedo is from
lyst. He has written numer- various South African Madrid, Spain where he is a
ous books and resides in universities and Mercyhurst strategic and competitive
Monterey, California, USA. University in the US in intelligence specialist .
He gave us permission to summarise his Competitive Intelligence.
book, Psychology of Intelligence Analysis.
Janet Evans is Associate Georgia Holmer is acting direc-
Tony Nolan is a risk, intelli- tor of the Washington DC based
Investigator, Centre of
gence and analysis officer in Forum Foundation for Analytic
Excellence in Policing and
the Australian government. Excellence.
Security, Australia

June 2012 • Foreknowledge 3


need2share

Should we kill the


intelligence cycle?
… and why should practitioners care?

Many academia and only a few The first group view the intelli-
Dalene Duvenage
practitioners have written and de- gence cycle as a heuristic concept
bated about the (in)famous cycle, that describes the interaction be- "When it came time to
most of them agreeing that it tween different activities and does start writing about in-
doesn’t really reflect 21st century not fret a lot on whether this is a
telligence, a practice I
reality, and as such can not be seen true reflection of reality, as it never
began in my later years
as a model of the intelligence proc- was meant to be one.
at the CIA, I realized
ess or functions in our complex On the other hand, the procedural-
world. Kris Wheaton of Mercyhurst ists absolutely hates the traditional that there were serious
University definitely raised the cycle that was created in the 1940’s problems with the intel-
stakes in the debate last year when and have designed variants on the ligence cycle. It is really
he blogged that we should kill the cycle or created new models based not a very good descrip-
intelligence cycle. In this edition we on systems and cybernetics theo- tion of the ways in
look at why such “murderous” ries: nested cycles, cycles-within-
which the intelligence
terms have crept into the debate. cycles, sensemaking loops, feed-
process works."
The debate back loops, crisscrossing diagrams,
Philip Davis and Kristian web diagrams, models for positive Arthur Hulnick, 2006
intelligence, models for counterin-
Gustafson1 divide the discussants in What's wrong with the Intelligence Cycle
telligence, models for law enforce-
the intelligence cycle debate in 2
ment intelligence, models based on
groups: the conceptualists (those The debate resonates with practi-
work study practices… the list goes
that see the intelligence cycle as a tioner’s day-to-day frustrations - it
on..
conceptual model of intelligence reflects the dissonance you experi-
activities), while the proceduralists But is this relevant to practition- ence with what “is supposed to be”
sees it as an attempt to map the ers? and “what is” - between the out-
processes in intelligence. I know very few of the practition- dated intelligence functions, struc-
ers reading this article really cares tures and processes and the fast
about the intelligence cycle and the moving transnational threats and
debate on whether it is relevant or challenges we have to face and ana-
not. Because for you it is irrelevant. lyse everyday.
You’re too busy catching criminals, Intelligence, like so many other dis-
preventing terrorist attacks or out- ciplines, is in a precarious position:
witting your competitors. very little of what we know and
Most probably, the last time you have institutionalised the last 60 -70
saw and maybe thought about the years is still relevant today, or will
intelligence cycle was during your be tomorrow. Quite a few classic
intelligence training. You might tradecraft principles and practices
dismiss the academic debate as eso- will stay relevant, no matter in
teric navel-gazing, far removed what age, government system or
from your reality. intelligence domain we operate.
But, you are dead wrong. But most of what we do and why

4 June 2012 • Foreknowledge


need2share
Few intelligence practitioners are aware or interested in the intensified debate among intelligence
scholars on the intelligence cycle. For them, the cycle and the discussion about its future is irrelevant.
But if practitioners are serious about the intelligence profession, they must be aware and become
involved in the debate and recognise that the debate can improve intelligence practice. In this edition,
we try to bridge this gap between academia and practitioners by highlighting some dimensions of this
important debate.

we do it, are, and will be challenged wrong in the interaction between “Can you contribute to the debate
by our new realities. planning, tasking, collection, analy- about the intelligence cycle , its use-
We have to relook, revisit, invent, sis, and distribution. fulness and relevancy?”
innovate - and that is the task of It helps us to seek for better strate- In this, and following editions, we
practitioners and academia alike. gies and processes to make intelli- will introduce key aspects of the
The theoretical “kill the Intelligence gence more effective. different viewpoints and models,
cycle” debate has a practical It helps us to find a common vocab- hopefully challenging you to inves-
grounding, and the outcome of the ulary and understanding of the tigate them and maybe come up
debate will in turn have implica- complexities of our cognitive proc- with your own model or opinion. ●
tions in the practitioner’s reality. esses and organizational dynamics.
What is the value of the debate? The debate also strengthens the 1 The Intelligence Cycle is Dead, Long Live the
The debate is important because it growth of the intelligence analysis Intelligence Cycle: Rethinking an Intelligence
Fundamental for a New Intelligence Doctrine. ISA
forces us to re-examine what we are discipline and its body of knowl-
Conference paper. April 2012.
doing and why we are doing it edge.
when we are doing it. Will we ever Should we kill the intelligence cy-
find one model that satisfies every- Will we ever find one model
cle?
one’s prescriptions and require- that satisfies everyone’s
This question is as loaded and mul-
ments? Definitely not! prescriptions and require-
ti-faceted as the question “Should
But the debate makes us mindful we have the death penalty?” Maybe ments? Definitely not!
and self-aware of what could go the question here should rather be:

June 2012 • Foreknowledge 5


need2share
The UK Ministry of Defence’s
“Core functions of intelligence paradigm”
From the conceptual school of thought by scholars
At the recent International Studies
Association conference in San Di-
ego, Prof Philip Davies of the
Brunel University’s Centre for In-
telligence and Security Studies de-
scribed the process of developing
a new Joint military doctrine for
the UK MOD in 2010 and 2011, in
which the debate surrounding the
intelligence cycle led the task team
to propose a new heuristic or con-
ceptual representation of the intel-
ligence functions and not
processes.
He stressed the point that no dia-
gram can effectively depict the in-
telligence processes, but that it is
possible to attempt to draw a func-
tional model.
Their task team agreed that the
core functions paradigm was more
than a cycle, and that the tradi- In practical terms, the core func- over the horizontal and vertical
tional intelligence cycle could be tions communicated back and cross-connections in the centre of
subsumed by it. forth and across the ‘cycle’ rather the diagram. It is a logical and
Therefore, the next question was than steps in a sequence, the rela- methodical process intended to
how to most usefully represent the tionships between the various get the best available intelligence
‘logical inter-relationships’ be- principal intelligence activities to the commander, but it should
tween direction, collection, were best visualised as a network not be seen as prescriptive.
processing and dissemination. It of dialogues and sometimes short- It will always be imperfect, but
was concluded that what was re- circuits across the whole intelli- decision-making has risks and the
quired was an alternative topology, gence framework. Any two, three imperfect nature of the intelli-
and that the most useful topologi- or even all four functions could be gence product must be factored in.
cal representation was as an all- ‘wired together’ in different, often Davies concluded that the new
channel network. spontaneous ways. model satisfied the ‘old guard’ in-
While the intelligence cycle out- The final visual representation of telligence cycle advocates while
wardly appears a simple process, the core functions paradigm pre- also meeting the concerns of ‘radi-
in reality it is a complex set of ac- sented in the final doctrine docu- cal’ critics by making the differ-
tivities. It is a continuous process ment was essentially that the ence between principle (concepts)
comprising many cycles operating enhanced core functions topology and practice (process) explicit, and
at different levels and speeds. Al- that is, with the ‘latent’, traditional providing for separate articulation
though the 4 individual tasks are intelligence cycle marked out sep- of procedural specifics at a differ-
discrete, as information flows and arately and the newer core func- ent (and more appropriate) doctri-
is processed and disseminated as tions topology inscribed within nal level. ●
intelligence, the tasks overlap and the cycle. The only notable altera- Become an ISA member to access
coincide so that they are often con- tion to the network topology was Davies and Gustafson’s paper.
ducted concurrently, rather than superimposition of the Jack Re-
sequentially. port’s continuous review process

6 June 2012 • Foreknowledge


need2share
El Ciclo de Inteligencia y la Teoría Del Conocimiento

Juan Pablo Somiedo

En la actualidad el ciclo
de inteligencia pensado
por “Sher”, como le
llamaban sus colegas
más cercanos, está siendo puesto en
duda. Algunos analistas dudan de
su utilidad en un mundo que ha ev-
olucionado hacia notas y caracterís-
ticas muy diferentes de las que
pudo ver aquél profesor. Cierta-
mente desde el punto de vista de
Kent, el ciclo de inteligencia es, a
priori, un enfoque convencional de
resolución de problemas, es decir, en la novela de H.G. Wells, el pro- al mundo de la inteligencia contra-
opera desde la pregunta (problema) tagonista descubre un método para terrorista es el movimiento de los
hacia la respuesta (solución). El flu- volverse invisible (que lo convierte terroristas de una célula a otra. Nor-
jo que establece es lineal y resoluble en asesino). Al final, la policía lo malmente se interpretan esos mov-
y esto no se corresponde con los descubre por las pisadas que deja imientos como “weak signals” o
procesos cognitivos que ocurren en sobre la nieve. Esta analogía puede señales débiles que pueden indicar
el razonamiento humano ni con una servirnos para intentar explicar la preparación de un próximo aten-
visión compleja de la realidad que, parte del trabajo de un analista. A tado terrorista.
desde luego, es no lineal y no resol- falta de contar con otra cosa, el El problema es que la experiencia
uble. En el intento de linealizar analista se ve obligado a buscar las nos demuestra que si queremos ser
problemas no lineales a través del “huellas en la nieve”. Así se dedica a efectivos no basta con adoptar una
ciclo de inteligencia están muchas buscar las llamadas “weak signals” actitud pasiva de seguimiento de las
de las carencias que plantea la disci- o señales débiles, que se definen co- mismas variables todo el tiempo.
plina. mo “a development about which on- Cada cierto tiempo debemos formu-
ly partial information is available at lar hipótesis de trabajo que nos con-
Muchas veces, es el analista quien
the moment when response must be duzcan a establecer nuevas variables
debe buscar el problema para, en un
launched, if it is to be completed be- de cuyo seguimiento podemos
momento posterior, encontrar la
fore the development impacts on the obtener nuevas señales débiles útiles
solución. Los decisores no siempre
firm”. Es decir, las señales débiles para la organización. Y esto obliga al
saben cuáles son los problemas re-
son elementos que pueden incitar, analista a un continuo trabajo de ac-
ales a los que se tienen que enfren-
en el analista atento y sensible a el- tualización.
tar. Como Donald Rumsfeld, afirmó
las, una sensación de que algo im-
en una entrevista: “We don´t know Conviene aclarar que lo que se pone
portante pudiera estar iniciándose o
what we don´t know”. De esta for- en duda no es la arquitectura del cic-
pudiera ocurrir en un futuro.
ma, frecuentemente son los analis- lo de inteligencia, que puede ser más
tas de inteligencia quienes tienen La idea es que la identificación de o menos viable como marco estruc-
que asesorar a los decisores sobre las señales débiles permiten a una tural, sino su rigidez a la hora de lid-
dónde deberían centrar su atención. organización la detección de una iar con determinados problemas. En
Henry Kissinger decía que amenaza u oportunidad incipiente y, esta línea estoy de acuerdo con Rob-
desconocía qué productos de la in- por tanto, reaccionar con mayor rap- ert M. Clark cuando afirma que “el
teligencia necesitaba, pero que los idez y eficacia. Posteriormente, algu- ciclo de inteligencia puede describir
reconocía cuando los veía en la me- nas de esas “weak signals” se la estructura y la función de in-
sa de su despacho. convierten en indicadores que pasan teligencia pero no describe el
a ser monotorizados para su posteri- proceso de inteligencia en sí mis-
En la película clásica “El hombre
or seguimiento. Un ejemplo aplicado mo.” ●
invisible” de James Whale, basada

7 June 2012 • Foreknowledge


need2share

Pulling the Plug on the Intelligence Cycle


- where Is Counterintelligence?
Author: B (practitioner & scholar)
In previewing this edition, the April This, the first of a three-part series,
issue of Foreknowledge posed the briefly examines a two-fold problem
question “Should we kill the intelli- statement. Firstly, what is the intelli- “ Do we have any
gence cycle?” From a counterintelli- gence cycle and what is expected choice but to pull the
gence perspective, we may just as from it? Secondly, how is the cycle plug, do the autopsy,
well switch off the life support. measuring up against this expecta- and intensify the quest
The cycle, you see, has actually tion?
for alternatives? ”
been terminally ill for some time. What is expected from the intelli-
Its priesthood must now account gence cycle?
for a cardinal sin committed in the The intelligence cycle is a theoretical point and summarises what is prob-
roughly sixty years of its existence. construct within the process model ably the predominant thinking in
They persisted in trying to convert- ‘family’. A model should be an ide- intelligence services and agencies
ing us in believing the cycle offers alised, simplified and preferably vi- internationally: "The process of
an explanation of intelligence proc- sual representation of the range of tasking, collecting, processing, ana-
ess. The truth is out – it never ex- activities that is, applied to this con- lysing, and disseminating intelli-
plained counterintelligence. text, collectively referred to as the gence is called the intelligence
If it does not explain counterintelli- intelligence process. cycle. The intelligence cycle drives
gence, it does not explain intelli- The importance of process models the day-to-day activities of the In-
gence generally. Attempts to add a can hardly be over emphasized. telligence Community".
few years of artificial life through These concepts are indispensable in Beautiful oversimplification
endless qualifications and cosmetic structuring our thinking on intelli- As is clear from the quote, in its
modifications will not save this pa- gence. They also condition the way ‘purist’ form the traditional intelli-
tient. Do we have any choice but to we execute the business of intelli- gence cycle has a beautiful simplici-
pull the plug, do the autopsy, and gence. The following quote from the ty. It comprises of a circular,
intensify the quest for alternatives? 2005 WMD report, illustrates this self-repeating process of the five
‘steps’ cited above.
However, from especially the 1990s
onwards, pioneering voices in the
U.S.A. raised the alarm - something
is not quite right. The cycle’s sim-
plicity is an oversimplification. It is
an oversimplification to the degree
that there are disconcerting fissures
between theory (the cycle) and
practice (the actual way in which
intelligence is done).
Cycle does not address counterin-
telligence
Most of these deficiencies have been
well documented and are discussed
in other contributions to this edition
of Foreknowledge. With some excep-
tions – notably Hulnick’s (2007)
must-read “What’s wrong with the
intelligence cycle?” – critiques of
the intelligence cycle underplay a
The Austrian Armed Forces’ Intelligence Cycle
8 June 2012 • Foreknowledge
need2share
Should we kill the intelligence cycle? The cycle, you see, has actually
been terminally ill for some time. From a counterintelligence
perspective, we may just as well switch off the life support. Attempts
to add a few years of artificial life through endless qualifications and
cosmetic modifications will not save this patient.

fundamental question, namely: demonstrate the working of the Take the trouble and study the ori-
Where is counterintelligence in the nebulous ‘throughout’/mirror con- gin and history of the traditional
intelligence cycle? cept. intelligence cycle. You will be re-
Intelligence is after all seen as com- Conceptual quagmires warded by seeing the intelligence
prising of four major ‘elements’ (al- cycle for what it is and was intend-
They are conceptual quagmires en-
so referred to as ‘functions’ and ed to be - a model explaining the
deavouring to artificially hammer a
‘disciplines’), namely collection, positive intelligence process. By the
square peg (counterintelligence) in-
analysis, covert action and counter- look of the deficiencies listed in lit-
to a round/cyclic hole (intelligence
intelligence. Of these collection and erature, it is no longer particularly
cycle). Omissions, tacit assump-
analysis feature in the traditional successful in this either. It does, in
tions, vague references and elabo-
cycle. Counterintelligence, with short, not meet that what is expect-
rate explanations of
covert action, are conspicuously ab- ed from such a model.
counterintelligence fitting in some-
sent. If the intelligence cycle does where in an (added) exploitation’ In the forthcoming edition of Fore-
not explain counterintelligence it phase, being performed throughout knowledge, some ideas will be raised
cannot hold as an intelligence proc- the intelligence cycle and/or mirror- on alternatives. ●
esses model. ing the intelligence cycle should be
CI throughout the cycle? seen for what they are. Article based on Duvenage, BPC & Hough,
M 2011, The conceptual structuring of the intel-
To officers starting out their careers They are all symptomatic fruits of ligence and counterintelligence processes : endur-
– be careful when raising such a an inability to conceptually inte- ing holy grails or crumbling axioms - quo vadis,
point during training. The standard, grate the fiddly counterintelligence Strategic Review for Southern Africa, vol. 33,
indignant arrogant response might discipline with the intelligence no. 1, pp. 29-77. Download here (10MB pdf)
well be that counterintelligence is process'.
performed throughout the cycle.
You might be told that counterintel-
ligence mirrors the flow of the intel-
ligence cycle.
Really? No example could be found
within consulted Intelligence Stud-
ies' literature of an endeavour that
feasibly demonstrates the conceptu-
al moulding of counterintelligence
The intelligence
dynamics with the traditional intel-
ligence cycle. cycle is a beautiful
Duvenage & Hough (2011) mention
attending numerous elaborate pres-
oversimplification
entations and lectures on how this that has no bearing
‘counterintelligence-throughout-the-
cycle’ concept works. Well, from a on reality
counterintelligence perspective, it
does not work.
Such presentations score high marks
for demonstrating Power Point so-
phistication and graphic illustra-
tions, but fail to convincingly

June 2012 • Foreknowledge 9


people

Bob Heibel
Pioneer of intelligence analysis education
As veteran intelligence professional, Bob Heibel realised the need for an education program that could
deliver well-trained analysts to the intelligence community. In 1992, he started the
Research/Intelligence Analyst Program (RI/AP) at the Mercyhurst College in Erie, Pennsylvania which
has grown into a fully fledged Institute for Intelligence Studies. Twenty years later, the MCIIS’s will
celebrate its 20th anniversary this July with a solid reputation and hundreds of graduates employed in
law enforcement, national security as well as business/competitive intelligence.
Share with us your journey to es- of intelligence studies and the de- This model differs from the historic
tablish intelligence analyst educa- mand for its graduates - were the intelligence community approach.
tion in the US. events of 9/11. Traditionally the IC has sought sub-
After retirement from the FBI in A U.S. Department of Education ject matter experts with advanced
1987, an experienced college profes- FIPSE grant of $250,000 in 2004 ena- degrees and after hiring trained
sor friend and I designed a four- bled the creation of the Institute for them to be intelligence analysts.
year undergraduate program built Intelligence Studies at Mercyhurst. The Mercyhurst model challenges
on a Liberal Arts foundation that The department consisted of an un- that by providing a “generalist” as
could be initiated using existing dergraduate BA in Intelligence early as 21 years of age who enters
courses and thereafter built on with Studies, a Master of Science in Ap- the job market with proven applied
the intelligence topics. After being plied Intelligence (approved in skills that allow them to immediate-
rejected by three different institu- 2004), and a series of graduate cer- ly contribute to their employer’s
tions, including my alma mater, I tificate programs tailored for corpo- mission. They can then become sub-
approached Mercyhurst College rate and government clients. Over ject-matter experts as appropriate.
(now Mercyhurst University) a the past 20 years the Mercyhurst There should be room for both ap-
four-year Liberal Arts Catholic program has grown to approximate- proaches. In my opinion, graduat-
school in Erie, in late 1991. ly 350 students at the university and ing students with proven applied
My concept was to create an intelli- another 100-plus online and in intelligence-related skills are the
gence concentration in Mercyhurst’s Washington, D.C. These resultant key to the success of future academ-
history program that would pro- skills are recognized by potential ic programs.
duce graduates who were entry-lev- employers and allow us to place 90
el qualified as intelligence analysts percent of graduates in a short peri- What advice would you give to in-
for government and the private sec- od of time. telligence analysts regarding pro-
tor. The stars were in alignment. fessional development
The president of the college, Dr. opportunities?
William P. Garvey, was a true entre- They must find some way to main-
preneur willing to take a chance if tain and enhance their skills. Ideally
the cost was reasonable. After a
this should be enabled by their em-
short study on market potential, he
ployer through a combination of in-
gave the go ahead. We partnered
with the history department and by house and external training, profes-
fall term 1992 had recruited 14 stu- Does intelligence analysis educa- sional organizations and academic
dents. tion have a future?
programs. Academia’s role in this
Our intelligence studies effort re- I have no doubt that the Mercyhurst will eventually include an ultimate
mained in the history department intelligence studies model has clear-
intelligence studies degree and the
until 2004, during which time it ly proven that academia has the po-
tential to provide qualified development of true intelligence re-
grew steadily. Of course, what
entry-level intelligence analysts to search institutes, which currently do
changed the perception - acceptance
government and the private sector. not exist. ●

10 June 2012 • Foreknowledge


tech
… intel software that
also cooks?
Ever walked out of a software sales presentation with the distinct
impression that the offering can barbeque your steak too?
RJG
Get used to it as this phenomenon The concept of Visual Analytics
This column provides you with news and
is likely to flare up in the months places you as the analyst in a piv- information of the software and technol-
ahead with software vendors vying otal role in the process of making ogy available to help you with your ana-
for new business opportunities - sense of large data sets. lytical tasks. This includes topic areas such
as geo-spatial analysis, link-analysis, social
also in intelligence. Of course you This is not to say that software ven- network analysis, intelligence manage-
know software cannot cook, neither dors necessarily understand the ment systems, tools available to support
various structured analytical techniques,
can it analyse. It requires a mindful concept of Visual Analytics, which crowd sourcing tools, tips and snippets
human that understands the con- is the science of analytical reason- for the preparation of datasets, and infor-
mation to help you dealing with IT staff in
text of the information and the abil- ing facilitated by highly interactive your organizations and make better deci-
ities of the software to visualise graphical interfaces. This implies a sions when buying software. If there are
analytical hypotheses. specific topics you want us to cover, you
) the capability of supporting hy- are welcome to forward requests to
A new vendor landscape pothesis driven and exploratory tech@foreknowledge.info

Now that a consolidation has taken analysis, b) granular drill down ca-
place in the content management pability and, c) does not take days
/document management and Busi- to change or code what you want to to have a good understanding of
ness Intelligence space, vendors see. data structures and working with
will start looking for new growth With Visual Analytics you have to .CSV and other files types and ap-
areas -including intelligence. Big wield the analytical Excalibur – not plications like Excel.
Data is currently a hot topic in the the software coder or vendor’s pro- I have met too many analysts who
IT world and data warehousing / fessional service team slaving in the are weak in this area and shy away
business intelligence suppliers have back office. from it as far possible. But most
realized that this includes not only OSINT software analyst centric software tools re-
quantitative or structured but also quire the analyst to import and ma-
OSINT has also sprouted a myriad
unstructured and text based data. nipulate the data prior to utilizing
of software vendors vying for a
Some vendors have been quick on analytical functionality. Poor ap-
space at the barbeque. A broad
the proverbial draw and taken steps preciation of specifics and intrica-
comparison between Visual Analyt-
to shore up on this front. It may be cies relating to importing data into
ical and OSINT software systems
old news, but IBM has purchased an application will have a profound
reveals that they share various
Analysts Notebook (I2), SAP is effect on the presentation thereof
processes such as 1) collection, har-
partnering with Palantir and SAS which can lead to skewed analysis.
vesting and retrieval, 2) data aug-
has settled on Memex. This pro- mentation, entity extraction, fusion Analysts generally want instantane-
vides them with opportunities in 3) marshalling and modelling, and ous results when working with soft-
non-traditional areas. IBM has in- 4) visualization in some form of ware applications. In some cases,
teresting plans for integrating I2 in- portal, dashboard or graphical rep- this is possible, however, there’s no
to its wider architectural resentation. such thing as a free barbeque.
framework. Similarly, Visual Ana- If analysts want to exploit the full
The onus on analysts
lytics has opened up a new vista for capabilities of the new generation
When using software applications
traditional Business Intelligence of analytical software tools, they
of this nature it is important to real-
and Enterprise Resource Planning will need to be trained in data man-
ize that the efficacy of any tool is
(ERP) software vendors. agement, in addition to their usual
negated unless data is pre-analysed
Visual analytics and reasoning analytical skill sets.
in some way - more so if it is un-
In a sense, this is good news for in- structured data. This in a sense Ok…I’m off to that barbeque. Until
telligence analysts. Why you ask? places the onus on modern analysts the next Foreknowledge! ●

June 2012 • Foreknowledge 11


toolbox

Analyst toolbox
Red Hat
Analysis
From Structured Analytic Techniques for Intelligence Analy-
sis by Richards J. Heuer Jr. and Randolph H. Pherson. 2010.

When to Use It experts to put themselves in


Red Hat Analysis works best the adversary’s shoes and sim-
when trying to predict the behav- ulate how the adversary or
Red Hat Analysis falls under the re-
iour of a specific person who has group would respond. framing category of structured ana-
the authority to make decisions. 3. Emphasize the need to avoid lytical techniques. An individual or
Authoritarian leaders as well as group can change their mindset or
mirror imaging. The question
mental model of how things normally
small, cohesive groups, such as is not “What would you do if work and challenge their own think-
terrorist cells, are obvious candi- you were in their shoes?” but ing about the problem, simply by
dates. It is much less effective changing the questions it asks or
“How would this person or
changing the perspective from which
when dealing with a leader who group most likely it asks them.
is constrained by a legislature or think/behave/respond to the
influenced by conflicting interest stimulus?” Red Hat Analysis was designed to
help intelligence analysts anticipate
groups 4. Individual experts can be as- the behaviour of an adversary by
Value Added signed to role-play a specific putting oneself “in their shoes” or
putting on “their hat.” To do this ef-
Red Hat Analysis is a technique counterpart in that group, or fectively, without mirror imaging,
that can 1) help anticipate the de- experts can be tasked with en- requires substantial area and cultural
suring that all the relevant in- expertise. A person who brings this
cision-making of an individual
type of cultural expertise to a group
that is difficult to understand or formation relating to each of or project is known as a red hatter.
observe; 2) help avoid ethnocen- their areas of responsibility is
trism and provide needed cultur- put on the table. Related to this technique are Red
Cell and Red Team analysis in which
al context; and 3) encourage 5. Capture the most likely outcome a group “plays the enemy” in an ef-
insights into personal motivations by: a) making a list of actions the fort to gain strategic insight. A Red
underlying decision-making of an person or group is most likely to Cell is a unit that plays the adversary
role in testing the effectiveness of
individual. take b) describing a conversation their own government or company’s
where the target or individual tactics or personnel in a military ex-
Method
talks in the first person or c) ercise or war game. A Red Team is
1. Gather a group of experts with drafting a document (set of in- an organizational element comprised
in-depth knowledge of the tar- structions, military orders, poli-
of trained and educated members
that provide an independent capabili-
get country, company or cy paper, or directives) that the ty to fully explore alternatives in
group, operating environment, adversary would likely gener- plans and operations from the per-
and the senior decisionmaker’s ate. spective of adversaries and others.
A good example of the latter is
personality, motives, and style 6. The best outcomes are those Helene Lavoix’s Red Team Analysis
of thinking. that most accurately replicate blog
2. Present the experts with a situ- the actual decision-making
ation or a stimulus and ask the process. ●

12 June 2012 • Foreknowledge


Applying Red Hat Analysis
to understand the
radicalisation of individuals
Georgia Holmer is acting director of the Forum Foundation for Analytic Excellence, whose
mission is to promote the effective use of critical thinking skills and structured analytic
techniques by teaching, certifying, and applying these skills and techniques to a broad
range of enduring and emerging issues. This is a redacted version of a paper she presented
at the 2012 ISA conference on how she applied Red Hat Analysis to understand the
radicalisation of individuals.

There exists some dissonance be- filiated networks of self-radical- to direct involvement in vio-
tween the accepted purpose and ized individuals. These new lent acts.
method of this analytic technique. models of terrorism lack the tradi- 4. Require a thorough engagement
Although the method tries to pre- tional organizational structure in role play. Construct a role
vent mirror imaging, during role that involves a centralized leader- play exercise that involves a
play, one has tap into individual ship or more formal group affilia- specific trigger or catalyst
experiential knowledge and em- tion. Georgia tweaked the could lead to a change in the
pathy. Its value is therefor rooted methodology to apply it here as status quo. Have each partici-
in gazing directly into a mirror - well. pant engage in the role play,
an effective combination of cogni- 1. Re-define the target. Expand the taking turns as the target, and
tion and empathy. target application of Red Hat expanding the list of scenarios
Red Hat Analysis could be Analysis to reflect modern ter- or possible trajectories. Con-
viewed as a unique employment rorist activity, and specifically sider using the first rule of im-
of both critical and creative facul- include those individuals who provisational theater in which
ties; a technique that provides in- are self-radicalized and carry all possibilities are allowed
sight into both those motivational out attacks independent of and affirmed during this crea-
factors that are contextually or formal group affiliation or di- tive and exploratory stage. In-
culturally determined and the rection. sist that analysts use the first
more universal psychological 2. Require a specific set of experts. person in their expression.
drivers that can be discovered Gather analysts to participate 5. Examine all outcomes. Collect
through the process of identifying in the exercise that include ex- all identified scenarios, collec-
or relating to another’s experi- perts on terrorism, individuals tively consider the likelihood
ence. with significant cultural and of each, and select those that
Red Hat Analysis is to help un- regional experience, specialists are most deserving of atten-
derstand individual trajectories of in specific radical ideologies, tion. The goal is to expand an
radicalization and involvement in and those with knowledge of understanding of the possibili-
terrorist activity. Red Hat Analy- the psychological processes of ties using a structured tech-
sis has been used with some fre- radicalization. nique. The hope is that a
quency in the Intelligence 3. Identify a spectrum of scenarios. sufficiently robust number of
Community to help predict the Ask analysts to generate a outcomes have been generated
decisions and choices of a terrorist range or spectrum of possible to gain a deeper and more
group or cell leader. However, the trajectories an individual comprehensive understanding
nature of terrorism has changed might follow, from disengage- of the phenomenon and avoid
substantially over the past decade ment and/or de-radicalization future surprise. ●
with the emergence of loosely af-

June 2012 • Foreknowledge 13


toolbox

Make your message


compelling!
When was the last time your intelligence report caused the
decision-makers to modify their plans and strategies?
Douglas Bernhardt
One of the toughest facts coordination led by the CI depart-
that any Intelligence prac- ment is seldom on offer. Although Douglas wrote this article from a
titioner must accept is that competitive intelligence perspective , the
The result is that an analysis of
a first-class intelligence problems and principles he addresses are
“what happened”–standard fare in
deliverable, regardless of relevant to all intelligence domains
CI reporting–simply does not reso-
the depth of findings and analysis nate with, and is therefore not use-
that may underpin it, will often ful to, corporate decision-makers. for example, that there are impor-
fail to achieve its principle objec- tant lessons that can be learned
What decision-makers want
tive; that is, to provide decision- from advertising and from story-
makers with product that they What they need are judgments fo-
telling.
find both compelling and relevant cusing on what could, or is likely,
to happen, with explanations of Lessons from advertising
to their individual and collective
concerns. There are a number of why analysts think so. Managers Consider some of the key princi-
explanations for this, one of which also appreciate a strong HUMINT ples of advertising:
is often overlooked; the ‘packag- component in an intelligence deliv- ● the ability to capture the
ing’ of intelligence. erable; knowing the thinking and “buyer’s” attention.
intentions of target sources is as, if
Typically, when finished intelli- ● the ability to sustain their at-
not more, important than knowing
gence products are distributed to tention.
their organisations’ capabilities.
management consumers they of- ● the ability to transmit the
ten amount to dry, colourless epis- Otherwise, senior executives in
message clearly within a very
tles of mainly regurgitated facts particular may just as well search
limited time span.
and news. They are, in effect, little for the insight and ‘enlightenment’
● the ability to convince the
more than stirred (not shaken!) they want from the raft of mind-
consumer to accept the mes-
cocktails of open source based in- numbing analysts’ reports pub-
sage of the ad, and the ad
formation. It is also apparent that lished by major investment banks,
brand (say, for example, the
in many instances the very person- from their trusted personal advi-
competitive intelligence func-
alities of analysts charged with de- sors and friends (who usually have
tion itself).
livering, or presenting product their own agendas), or, for a quick
‘news fix’, from CNN, Bloomberg, Are these the principles which un-
will fall short of anything that
or BBC News. derpin the delivery of your ‘prod-
might be deemed inspiring;
ucts’?
they’re simply not skilled in ‘sell- Think: when was the last time
ing’, or persuading. that the intelligence you delivered Lessons from storytelling

More emphasis on past than fu- caused your company’s manage- Storytelling, too, is a powerful art
ture ment to modify their behaviour, form that is often overlooked.
their strategy, or their plans? Robert McKee, a highly regarded
Perhaps more importantly, future-
There is considerable scope for im- screenwriting lecturer, argues that
oriented analysis (e.g. alternative
provement in the ‘packaging’ of although “Persuasion is the centre-
futures analysis or analysis of
intelligence products in private piece of business activity … de-
competing hypotheses) that
sector organisations. We believe, spite the critical importance of
should spring from company-wide

14 June 2012 • Foreknowledge


toolbox

Finished intelligence products distributed to management consumers often amount


to dry, colourless epistles of mainly regurgitated facts and news. They are, in effect,
little more than stirred (not shaken!) cocktails of open source based information.

persuasion, most executives [and,


we would add, analysts] struggle
to communicate, let alone inspire.”
He believes that listeners can be
engaged “on a whole new level if
[we] toss [our] PowerPoint slides
and learn to tell good stories in-
stead.”
What can a story do? Again ac-
cording to McKee, “Essentially, a
story expresses how and why life
changes.” A good story will incite
interest, excitement and emotions
on the part of the listener in a way
President Barack Obama receives the Presidential Daily Briefing from Robert Cardillo, Deputy
that static graphs, spreadsheets,
Director of National Intelligence for Intelligence Integration, in the Oval Office, Jan. 31, 2012.
tables, and lists of data simply
Part of the briefing was done using an iPad. (Official White House Photo by Pete Souza)
can’t. When was the last time you
promised yourself a good ‘bedtime
about it. How often have your do suggest that for a brief over-
read’ of a Credit Suisse, JP Morgan
firm’s decision-makers discounted view you may wish to start with
Chase, or Goldman Sachs research
or ignored intelligence because Robert McKee’s article “Storytell-
report?
they did not regard it as compel- ing That Moves People” in Harvard
Appeal to the soul and not intel- ling, or possibly because it did not Business Review (2003, Vol. 81, No
lect conform to their personal agendas 6).
When trying to persuade, logic or organisational policies?
If a central aim of intelligence is to
and reason are not enough; they Using film or video to get your support the making of smarter
appeal to the intellect, not the soul. message across strategic choices, doesn’t it make
Consider: why did Mr Bush and
A good story can also leverage sense to do what is necessary to
Dr Rice not respond to the PDB of
film or video to considerable ad- ensure that in each and every case
6th August 2001–less than six vantage. We show our MBA stu- its presentation matches the quali-
weeks prior to the attacks of 11th dents clips from documentaries ty, and reinforces the urgency, of
September 2001 on the Pentagon and Hollywood productions to the analysis?
and New York’s World Trade Cen- support specific lessons. Because it Analysts must therefore be compe-
tre–with the urgency that one does so within the context of cine- tent in presenting analysis, both
might reasonably expect from sen- ma, it becomes an almost irresisti- orally and in writing. Ultimately,
ior political leaders? The docu- ble story and students are left in sculpting the product is only the
ment’s headline alone should have no doubt about the intelligence first step; ensuring that it is ‘well
been sufficient to elicit a strong re- principles we wanted to bring received’ by the consumer is the
action– followed by effective home. second. ●
action!–on their part. Remember, Although exploring the many ele-
the PDB did judge that Bin Ladin ments of a good story are well be- Douglas can be reached at
was “determined to strike”, not yond the scope of this article, we douglas.bernhardt@gmail.com
that he might have been thinking

June 2012 • Foreknowledge 15


toolbox

e nce
F or this edition’s column, I
would like to talk about how Intelli g

Risk, Intelligence and Analytics Officer, Australian Government


the intelligence process can be analy
used for both research and also tics
sending out a message. Analytics
is not just about numbers alone.
t
Text mining is the analytical proc- Tex minin
ess of understanding words, lan- g
guage, information and
lan
knowledge. While the majority of Tony No
Intelligence work is about the
words and language, very little
analysis is conducted on text, as
the equivalent of numbers, where
you can look for patterns. The rest
of this article is written on the as-
sumption that you have legal au-
thority and permission to conduct
the following activities.
Text mining applies linguistic
rules and statistical methods to
automatically analyse electronic
text and helps you discover in- interested in text mining, and they to the general population, but
sights that are often buried in go off and use the search engines more specifically the local popu-
large amounts of unstructured to locate those relevant webpages, lation of each Local Area Com-
text data – such as email, social and then save them in a corpus mand.
media content, blogs and other ready for text mining. There is also This type of project lends itself to
online media sources. Text min- free text mining software such as text mining. Once the text is cap-
ing, when combined with meta- R available. tured from both the Facebook
data (extra information about the Basically any one can use open posts and virtual neighbourhood
dataset provided from outside of source software for free, to locate a watch meetings, then many dif-
the dataset), gives a powerful piece of text, or convert a pdf file ferent pieces of analysis are avail-
view of the person’s language, to text, or download a webpage, able. For instance once the data is
their intent, knowledge about the and then process them into a dic- loaded, you can compare sets of
topic, and their intended message. tionary, examine frequency posts from different times, loca-
I bet you thought there is no room counts, and look at the correlation tions, sexes, communities, etc and
for human understanding in text between words, and have concept examine if there are any highest
mining, but there is. The Intelli- maps, link charts and word frequency words, as well as outli-
gence Officer is still needed to clouds. All you need is an internet er words, specific to each commu-
make sense of the high frequency connection, a Linux emulator, and nity.
words and concepts derived by the R console software. I will re- You can also examine the lan-
nearest neighbour groupings to visit R software in future articles. guage and the syntax between the
track the information behaviour of Now for a real world example. datasets. Finally it also becomes
the targets. The NSW Police Force in Australia possible to geocode the locations
You can text mine emails, text has developed a project called mentioned, and integrate it into
files, word documents, pdf’s, and Eyewatch. Basically, project Eye- your crime or marketing analysis.
even webpages. There are com- watch is about communicating Of course you can also produce
puter programs like web spiders, with the people of NSW using Fa- word clouds and link charts
web scrapers, etc, where you can cebook to gather Intelligence, and based on word frequency and
put in the desired words your’e also to provide information back nearest neighbour. ●

16 June 2012 • Foreknowledge


career

The effective analyst


Part 3: Attitude
Janet Evans
Associate Investigator, Centre of Excellence in Policing and Security, Australia

In this 3rd article in a series of four articles, Janet takes us through the findings of research by her and
Mark Kebbell on what makes intelligence analysts effective.

In this issue I will son who has a passion for collection/collation or direct in-
continue to talk intelligence and has chosen to be volvement in the direction phase of
about the findings there. Many who participated in the intelligence cycle necessary for
of the effective an- our study reported that having staff the analyst’s effectiveness.
alyst study focus- that are in intelligence positions for Rather, it seems as though analysts
ing on attitudinal the ‘wrong’ reasons has a negative view the amount of time spent on
factors that indi- impact on their peers and analysts collecting and collating data as
cate an effective analyst and since described being demoralised by “dead time” which does not con-
this issue is focused on the intelli- those that showed no interest in in- tribute to their effectiveness. Many
gence cycle I will also describe how telligence work. of the analysts interviewed sees col-
the findings from our study tie into lection as the responsibility for oth-
the intelligence cycle. Attitude is a little ers in the unit, rather than
First and foremost: A do-er themselves.
thing that makes a big
While attitudinal factors have been The absence of the analyst from the
considered in previous research the
difference.
direction phase of the intelligence
importance of attitude has been un- cycle may be negligible in opera-
derestimated. The want or desire to Winston Churchill tional and tactical analysis because
be in intelligence has not been rec- the analyst works within the intelli-
ognised previously and factors like gence unit or the operational team
Decision-makers felt that analysts
being a do-er, being intelligent, mo- and has regular contact with man-
in intelligence for the ‘wrong’ rea-
tivated, independent and being a agement.
sons tainted the whole of intelli-
decision maker in their own right is However, the absence of the analyst
gence analysis with a poor work
largely ignored. In our study attitu- from the direction phase of the in-
ethic. The examples included peo-
dinal factors incorporated com- telligence cycle when considering
ple placed in Analysis because they
ments that describe the analysts strategic intelligence would be very
could not cope in other areas.
disposition to intelligence work and problematic. In strategic analysis
analysis. The most frequently the analyst also manages strategic
The intelligence cycle and the ef-
sighted attitudinal factor is what we product and would need to negoti-
fective analyst study
called the do-er. A do-er is some- ate the terms of reference for the
one who is energetic, willing, The ‘intelligence cycle’ has four dis-
analysis directly with the client
proactive, achievement oriented tinct areas and in our study, only
who in most cases would not be
and accomplishes a lot. two of those (analysis and dissemi-
their line manager. The role of the
nation) were raised by the partici-
Second: passion for intelligence analyst in the direction phase of the
pants as relating to analyst
Another important factor that de- intelligence cycle needs further con-
effectiveness. Interestingly, they do
scribes an effective analyst is a per- sideration. ●  ​
not deem skills in data

June 2012 • Foreknowledge 17


opinion

T.W. Shiloh
Let’s
T.W. Shiloh is a pseudonym for a an
intelligence analyst with 20 years
experience in military and law enforce-
reduce
ment intelligence analysis.
To fit with our theme for this issue he
addresses the less popular aspects of
friction in
the intelligence cycle: collation and
dissemination. A version of this article
appeared in his personal blog,
Travels with Shiloh
intelligence
dissemination!
The April 2012 issue of Scientific
American contains an article by
David Pogue titled Technology's
Friction Problem. In it, he argues
that 'friction' (extra steps or gener-
al hassle between a potential cus-
tomer and something they want)
is an unnecessary drag on all sorts
of transactions from commerce to
voting.
There are at least three problems tion. Pretty soon you come ple who actually need it. Per-
when it comes to disseminating across information that has haps this is due to an
intelligence products: 1) Getting nothing to do with WMD but institutional desire to appear
the right product to the right someone thinks it'd be a good relevant and “plant the organi-
person(s), 2) getting it to them at idea to disseminate. So, they zational flag” in as many in-
the right time and 3) getting that hijack the list and send it out. boxes as possible or originates
right person to actually read (and Soon, the list becomes a catch- from a misplaced belief that
apply) the product. all vehicle for sending out eve- more is always better. In any
The problem with distribution ry piece of informational flot- case, it's rarely helpful.
lists sam and jetsam that floats This is a throwback to when the
Generally, I've been less than im- through the drain. limited amount of information
pressed with common delivery 2. As brilliant as you think your available could be handled by rel-
methods for intelligence products list or portal is, everyone else atively small staffs. Instead of col-
which seem to revolve around has the same idea. What you lating information and managing
email distribution lists or through end up with is multiple lists its flow, we rely on a “more is bet-
access to otherwise restricted 'por- that recycle the same informa- ter” philosophy that passes it all
tals'. These produce two signifi- tion. That, in turn, interferes through in bulk.
cant problems: with processing that informa- Today, with the overwhelming
1. The law of good intentions: tion (collation in some ver- quantity of information available,
You set up a distribution list sions of the intelligence cycle) we still have not devoted suffi-
for (let's say) WMD informa- and making sure it gets to peo- cient time or resources to the less

18 June 2012 • Foreknowledge


opinion
sexy components of intelligence ians) who can point consumers in
analysis. Friction their direction of interest. Contra-
Friction The hassle of having to ry to conventional wisdom, the
There are, however, better ways identify the source of the information age may require more
to sort through that mountain of information, make whatever people to conduct the collation
information and get what you function rather than less. Current
contacts needed to get access,
want. But, the problem is friction. efforts to automate that function
the cost in time and resources have not proven to be adequate.
Here's the equation from Pogue's to wade through the
article which I think can also ap- One final way to reduce friction is
irrelevant stuff etc thinking about how products are
ply to intelligence products.
delivered. Current thinking con-
PB+D>C information has turned into a del- tinues to maintain that the aver-
● P is the probability that the uge of it and old information silos age intelligence consumer can't be
intelligence product will be have simply been replaced by new expected to handle anything more
relevant to the customer. ones. All of this raises the C quo- than a few pages of
● B is the benefit to the custom- tient to new heights. information...preferably in Power-
er from the product if they How can we reduce friction? Point slide bullets. Yet, whether
receive it and apply it. It's certainly not an easy task and talking about terrorism, organized
relies on improvements with both criminal organizations or emerg-
● C is friction - the hassle of
the intelligence consumer and ing threats, very rarely can context
having to identify the source
generator. On the side of those and critical nuance be conveyed in
of the information, make
generating intelligence products, such small spaces.
whatever contacts needed to
get access to the document, we can begin by reducing the While “audience analysis” is still
the cost in time and resourc- number of outlets one has to go considered an exotic concept for
es to wade through the irrele- to for similar information. This many intelligence shops, its con-
vant stuff that comes your would involve changing the re- sideration during the production
way during your search, etc. ward structure of agencies so they and dissemination portions of the
act less like news organizations, intelligence cycle can help over-
● D, in the original equation, is
always trying to scoop their com- come these challenges. Different
the benefit or the gratifica-
petitors in order to get more fund- types of information will lend
tion the user gets from mak-
ing or resources, and emphasize themselves to different formats.
ing the transaction. In the
complementary efforts. If PowerPoint is insufficient and
intelligence field, this may
Additionally, we should also lengthy documents make brains
manifest in the satisfaction of
move away from a 'push' system hurt, aren't there other alterna-
receiving the information in
where producers determine what tives available for consideration?
a timely manner or the in-
customers should get or just re- There's no reason why analysis
creased sense of credibility
lease products without any effort can't be delivered graphically, in
gained in knowing that
to match them with customers an audio format or using any of a
you've searched all available
who may need them. In ex- number of social media tools that
sources.
change, we need a system which are emerging as the primary
We raise the C quotient to new means of communications for mil-
heights! allows customers to 'pull' infor-
mation that's relevant to their lions of people.
What have we done about reduc- While collation and dissemination
needs. With the ability to embed
ing friction? Well, just about eve- are often regarded at the least ex-
metadata into information it be-
ry agency has its own 'portal' now citing aspects of analytical work
comes easier for people to identi-
and the (maligned) opportunities they can mean the difference be-
fy, search, retrieve or subscribe to
to sign up for email distribution tween a product being useful and
information that they want.
but that moves from boon to bane getting lost in the maelstrom of
when everyone has it. What was This may require establishing net-
works of information collators or information that bombards us
intended to reduce friction is now everyday. ●
a main contributor to it. Lack of 'sifters' (similar to reference librar-

June 2012 • Foreknowledge 19


thinking

Psychology
of
intelligence
analysis
Richards Heuer
There are still thousands of intelligence analysts and their managers who have not yet read the seminal Psychology of Intelligence
Analysis by Richards Heuer. We will carry excerpts from the book’s chapters in each edition of Foreknowledge. This is an excerpt of
chapter 3 on Memory. You can also download the entire book here.

An analyst's memory provides con- a simple ability to recall facts, but written paragraphs. Only by using
tinuous input into the analytical the ability to recall patterns that re- such external memory aids am I
process. This input is of two types-- late facts to each other and to able to cope with the volume and
1) additional factual information on broader concepts--and to employ complexity of the information I
historical background and context, procedures that facilitate this proc- want to use.
and 2) schemata the analyst uses to ess. A well-known article written over
determine the meaning of newly Stretching the Limits of Working 40 years ago, titled "The Magic
acquired information. Information Memory Number Seven--Plus or Minus
from memory may force itself on Limited information is available on Two," contends that seven--plus or
the analyst's awareness without any what is commonly thought of as minus two--is the number of things
deliberate effort by the analyst to "working memory"--the collection people can keep in their head all at
remember; or, recall of the informa- of information that an analyst once. That limitation on working
tion may require considerable time holds in the forefront of the mind memory is the source of many
and strain. In either case, anything as he or she does analysis. The gen- problems. People have difficulty
that influences what information is eral concept of working memory grasping a problem in all its com-
remembered or retrieved from seems clear from personal intro- plexity. This is why we sometimes
memory also influences intelligence spection. In writing this chapter, I have trouble making up our minds.
analysis. am very conscious of the con- For example, we think first about
Judgment is the joint product of the straints on my ability to keep many the arguments in favor, and then
available information and what the pieces of information in mind while about the arguments against, and
analyst brings to the analysis of this experimenting with ways to organ- we can't keep all those pros and
information. ize this information and seeking cons in our head at the same time
Substantive knowledge and analyti- words to express my thoughts. To to get an overview of how they bal-
cal experience determine the store help offset these limits on my ance off against each other.
of memories and schemata the ana- working memory, I have accumu- The recommended technique for
lyst draws upon to generate and lated a large number of written coping with this limitation of work-
evaluate hypotheses. The key is not notes containing ideas and half- ing memory is called externalizing

20 June 2012 • Foreknowledge


thinking
the problem--getting it out of one's "Hardening of the categories" is a
head and down on paper in some common analytical weakness. Fine
simplified form that shows the main distinctions among categories and Understanding how memory works
elements of the problem and how tolerance for ambiguity contribute provides some insight into the na-
they relate to each other. Ways of to more effective analysis. ture of creativity, openness to new
doing this involve breaking down a Things That Influence What Is Re- information, and breaking mind-
problem into its component parts membered sets. All involve spinning new links
and then preparing a simple "mod- in the spider web of memory--links
Factors that influence how informa-
el" that shows how the parts relate among facts, concepts, and schemata
tion is stored in memory and that
to the whole. When working on a that previously were not connected
affect future retrievability include:
small part of the problem, the model or only weakly connected.
1) being the first-stored information
keeps one from losing sight of the Training courses for intelligence an-
on a given topic, 2) the amount of
whole. alysts sometimes focus on trying to
attention focused on the informa-
A simple model of an analytical tion, 3) the credibility of the infor- open up an analyst's established
problem facilitates the assimilation mation, and 4) the importance mind-set, to get him or her to see
of new information into long-term attributed to the information at the problems from different perspec-
memory; it provides a structure to moment of storage. By influencing tives in order to give a fairer shake
which bits and pieces of information the content of memory, all of these to alternative explanations. More
can be related. The model defines factors also influence the outcome often than not, the reaction of expe-
the categories for filing information of intelligence analysis. rienced analysts is that they have
in memory and retrieving it on de- devoted 20 years to developing their
Memory Rarely Changes Retroac-
mand. In other words, it serves as a present mind-set, that it has served
tively
mnemonic device that provides the them well, and that they see no need
hooks on which to hang information Analysts often receive new informa- to change it. Such analysts view
so that it can be found when need- tion that should, logically, cause themselves, often accurately, as
ed. them to reevaluate the credibility or comparable to the chess masters.
significance of previous informa-
The model is initially an artificial There is, however, a crucial differ-
tion. Ideally, the earlier information
construct. With usage, however, it ence between the chess master and
should then become either more sa-
rapidly becomes an integral part of the master intelligence analyst. Al-
lient and readily available in memo-
one's conceptual structure--the set of though the chess master faces a dif-
ry, or less so. But it does not work
schemata used in processing infor- ferent opponent in each match, the
that way.
mation. At this point, remembering environment in which each contest
new information occurs by assimila- Unfortunately, memories are sel- takes place remains stable and un-
tion rather than by mnemonics. This dom reassessed or reorganized ret- changing: the permissible moves of
enhances the ability to recall and roactively in response to new the diverse pieces are rigidly deter-
make inferences from a larger vol- information. For example, informa- mined, and the rules cannot be
ume of information in a greater vari- tion that is dismissed as unimpor- changed without the master's
ety of ways than would otherwise tant or irrelevant because it did not knowledge. Once the chess master
be possible. fit an analyst's expectations does not develops an accurate schema, there
become more memorable even if the is no need to change it.
Hardening of the Categories
analyst changes his or her thinking
Memory processes tend to work The intelligence analyst, however,
to the point where the same infor-
with generalized categories. If peo- must cope with a rapidly changing
mation, received today, would be
ple do not have an appropriate cate- world. Schemata that were valid
recognized as very significant.
gory for something, they are yesterday may no longer be func-
Memory Can Handicap as Well as tional tomorrow.
unlikely to perceive it, store it in
Help
memory, or be able to retrieve it Learning new schemata often re-
from memory later. If categories are quires the unlearning of existing
drawn incorrectly, people are likely ones, and this is exceedingly diffi-
to perceive and remember things cult. It is always easier to learn a
inaccurately. new habit than to unlearn an old
When information about phenome- one. Schemata in long-term memory
na that are different in important that are so essential to effective anal-
respects nonetheless gets stored in ysis are also the principal source of
memory under a single concept, er- inertia in recognizing and adapting
rors of analysis may result. to a changing environment. ●

June 2012 • Foreknowledge 21


people

Meet a Financial
Intelligence Unit Analyst
AR - analyst with an African FIU Intelligence research and
analysis services on
Africa’s political, economic
Over the past years, specialized governmental agencies, “financial intelligence units” or “FIUs have been
created as jurisdictions develop systems to deal with the problem of money laundering and other financial and criminal threats
crimes. Many FIUs have analysis units that determine money laundering trends and patterns for use by law
***
enforcement, provide feedback to the reporting institutions and do proactive targeting. Analysts have bank-
ing, intelligence and law enforcement experience. Due diligence and

W W
background reports on
hat is the role and function hat are your greatest chal-
of intelligence analysts in lenges you face as an intel- Persons and Companies of
your agency? ligence analyst and how do you Interest throughout Africa
The provision of financial overcome them?
***
intelligence for the purpose of ● Inaccessibility to other law en-
initiating investigations or forcement agencies databases
Setting up of intelligence
supporting investigations to law units
● Lack of cooperation on the
enforcement agencies and for part of some law enforcement ***
regulatory bodies and other agencies in information shar-
government agencies for the Intelligence information
ing
purpose of policy fomulation. management and systems
● Untimely response to request

W hat is your specialist area


and what do you do to stay
informed and abreast of new de-
made to reporting entities
● Poor quality of data from re-
***
Intelligence training
porting entities. curriculum development
velopments?
Overcoming these issues is done
My area of specialty is in the area ***
through the constant engagement
of Anti Money Laundering /Com-
of these agencies by providing Customised OSINT reports
batting the Financing of Terrorism
them with spontaneous Intelli-
(AML/CFT)
gence products that borders on www.4knowledge.co.za
I stay informed about my field their operations. This helps is
through conferences, seminars, building trust and confidence and
workshops relevant to my field in turn creates room for joint oper-
and subscribing to professional ations. For the reporting entities,
bodies such: ACAMS, CFE, IACA education on the ills of money
and the IALEIA, etc. laundering, fraud and terror fi-

W ho are your clients and


what types of intelligence
products do you provide to them?
nancing has gone a long way in
improving relations, so does the
provision of immunity to report-
Our clients are the relevant stake- ing persons within institutions.
holders in the AML/CFT regime,
which comprise of the Law en-
forcement agencies, the regulatory
W hat can intelligence ana-
lysts do to promote our
profession?
agencies, the policy makers in gov- By networking and forming a for-
ernment etc. The product dissemi- midable group or association
nated to the above relevant where ideas, experiences, chal-
agencies is financial intelligence lenges and other issues could be
which could be operational, tactical shared. ●
or strategic in nature.

June 2012 • Foreknowledge 22


events
discuss collaborate
share
2
June 201 International BISA-ISA
conference
Brunel University seminar
8 June 2012: London, UK 20-22 June 2012 : Edinburgh, Scotland
Intelligence analysis learning from journalism British International Studies Association and the
For conference information click here International Studies Association Joint
For conference information click here

The Australian Institute of July 2012


Professional Intelligence Officers
(AIPIO) Annual conference Brunel University
Intelligence 2012: Anticipating Risk & seminar
Influencing Action 13 July 2012: London, UK
Intelligence analysis learning from
24th - 26th July 2012 other disciplines
Sydney, Australia
For conference information click
For more information: Click here here

August 2012
International OSINT & security
OSINT &
terrorism and rder web min informatics
organised crime Innovation in bo symposiu ing
symposium
m
conference control workshop 21 - 22 Au
gust 2012 27 & 28 August 2012
6-10 August 2012 21 - 22 August 2012 Odense, De
nmark Istanbul, Turkey
Anaheim, CA Odense, Denmark Informatio
n here Information here
Information here
Information here

September 2012 2
October 201
Intelligence in
Geospatial Defence ACFEA
Globa to kno
w
knowledge soci
the
& intelligence Asia
intellig Need ety
ence f l ence
21 - 22 orum confer 219 October 2012
11-14 September 2012 012
Se ptembe ctober 2
Brussel r 2012 16-17 O k Bucharest, Roman
Thailand s, Belgium d e ns e , Denmar ia
Inform O e Information here
Information here ation h tion her
ere Informa

23 June 2012 • Foreknowledge

You might also like