- Intelligence analysis management
::"This article deals with the roles of processing/analysis in the real-world intelligence cycle as a part of
intelligence cycle management . SeeIntelligence analysis for a discussion of the techniques of analysis. For a hierarchical list of intelligence cycle articles, see the intelligence cycle management hierarchy."Intelligence Analysis Management is the process of managing and organizing the analytical processing of raw intelligence information into finished intelligence. The terms "analysis", "production", and "processing" all are used in this phase that is informally called "connecting the dots". Creating an "Intelligence mosaic" is a vivid descriptor for the process. Analysis, processing, and production are all names for the organizing and evaluating of raw information, and putting it in a form in which it can be disseminated to varying consumers. The same body of information may result in multiple analytic products, with different security classifications, time scales, and level of detail.
While analysis goes back to the beginning of history,
Sherman Kent is often considered the father of modern intelligence analysis. He wrote extensively both in open and classified sources, including a seminal 1947 book, "Strategic Intelligence for American World Policy" [cite book
author = Kent, Sherman
authorlink = Sherman Kent
title = Strategic Intelligence for American World Policy
publisher = Princeton Univ Press
year = 2000
ISBN = 0691021600] .In a long career in theOSS and CIA, he defined many of the parameters of modern analysis and its use by policymakers. In particular, cite web
author = Davis, Jack
work = The Sherman Kent Center for Intelligence Analysis
title = Occasional Papers: Volume 1, Number 5: Sherman Kent and the Profession of Intelligence Analysis
url = https://www.cia.gov/library/kent-center-occasional-papers/pdf/OPNo5.pdf ] . Kent disagreed with the philosophy that analysts never recommend policy, but advise policymakers. "Intelligence analysts are needed because policy officials face challenges that analysts can help them manage, Kent would argue, through mastery of background knowledge, evaluation and structuring of all-source material, and tradecraft expertise. While attentive to problems not yet on the policymaker’s screen, the analyst’s first responsibility is to accommodate clients by producing assessments timed to their decision cycle and focused on their learning curve. This includes providing “actionable” intelligence that can help with curbing threats and seizing policy opportunities." He considered it a partnership, but one in which the analyst did not push a personal point of view: "He would have opposed providing analyses that were intended for use by one set of policy players to force its views on others. For estimative analysis, this requires paying serious attention to seemingly less likely outcomes. For action analysis, this means identifying and evaluating alternatives, leaving to policy clients the responsibility to recommend and choose....Kent saw no excuse for policy or political bias. He realized, however, that analytic or cognitive bias was so ingrained in mental processes for tackling complex and fluid issues that it required a continuous, deliberate struggle to minimize. ... he taught analysts to resist the tendency to see what they expect to see in the information. He urged special caution when a whole team of analysts immediately agrees on an interpretation of yesterday’s development or a prediction about tomorrow’s. ... One path he recommended for coping with cognitive bias wasto make working assumptions explicit and to challenge them vigorously."DavisV1I5]Preprocessing
Some intelligence disciplines, especially technical ones, will analyze the same raw data in different ways, for complementary purposes. For example, a signals intelligence collection platform will record all the electromagnetic signals it received from an antenna pointed to a particular target at a particular time.
Assuming the target was a radar, the
ELINT analysts would be focused on the purpose and coverage of the radar. TheMASINT analysts, however, would be looking for patterns not in the intentional signals of the radar, or side frequencies that were inadvertently generated.In like manner, if the target were a voice communication, the
COMINT specialists would be concentrating on the content of the message, but acoustic MASINT technicians might be "voiceprinting" the spoken words to validate that it was really from the supposed source. While Morse code telegraphy is largely obsolete, each operator has a distinct rhythm known as a "fist". Experienced telegraph intercept operators could recognize radio deception when the fist failed to match the purported operator identity.A very basic preprocessing step would be translating the collected material into the native language of the analysts, unless, as is desirable, the analysts are fluent in the language of the information.
=Basic Intelligence and Reference Library Services = Librarians at CIA received large numbers of documents, not counting special source materials, cables, newspapers, press summaries, periodicals, books, and maps. Since these reports come from scores of different major sources, the daily volume fluctuates and shows lack of uniformity in format, in reproduction media, in length and quality of presentation, and in security classification. As they come in they must be read with an eye to identifying material of interest to some 150 different customer offices or individuals. The reference office manages several registers (in effect special libraries) for special source materials, biographic data on scientists and technicians, films and ground photographs, and data on industrial installations. Demands made on our document collection stem from three types of requests: :*Requests for a specific document to which the analyst has a reference or citation;:*Requests for a specific bit of information in answer to a specific question;:* Requests for all information relevant to a subject which may or may not be well defined.The last, which requires literature search, is the most difficult. Where central reference services have been organized independent of research offices, it soon becomes evident that the functional line of demarcation between them and the research units is not clear. This becomes important when it results in duplication of effort or, worse, in non-use of reference materials by the researcher laboring under the misimpression that he has all relevant documents in his possession. Increasing use of collaborative technologies can help this misimpression. Should a reference service be active or passive, dynamic or static? A passive approach to reference service would mean that reference personnel would merely keep the stacks of the library in order, leaving it to research analysts to exploit the collection. Under the active approach, on the other hand, reference analysts would discuss the researcher's problem with him and then proceed, as appropriate, to prepare a bibliography, gather apparently pertinent documents, screen them, check with colleagues in other departments for supplementary materials, make abstracts, have retention copies made of popular items in short supply, initiate a requirement for supplementary field service, or prepare reference aids.Once a separate facility has been set up to provide reference services it is not long before it publishes. This comes about for several reasons, the least controversial of which is that a customer has made a specific request. We call this type of publication a research or reference aid. Some are quite specific; others are more general, being prepared in response to a need generally expressed. A number of different customers may, for example, make known that it would be very helpful to have a periodic compilation of all finished intelligence reports and estimates for ready reference. Reference officers have the responsibility to make known the availability of services and information the existence of which may be unknown to the analyst; and, given a task, to make the preliminary selection of materials to meet the particular need of a particular user. To the anayst must be left the determination of its significance for the present; to the consumer its significance for the future; and to the policy-maker the indicated course of action.
Intelligence personnel, as well as end consumers, need their equivalent of reference books and encyclopedias. The US term for this is basic intelligence, while the WEU calls it documentary intelligence. Much of this information may itself be unclassified, but their indexing and cross-referencing, especially if that cross-referencing includes classified sources, the index itself, and bibliographies drawn from it, may be properly classified.
One means of organizing basic intelligence is with the acronym BEST MAPScite web
author = US Department of the Army
url = http://www.fas.org/irp/doddir/army/fm2-22-3.pdf
title = FM 2-22.3 (FM 34-52) Human Intelligence Collector Operations
date = September 2006
accessdate = 2007-10-31] ::* B--biographic intelligence:* E--economic intelligence.:* S--sociological intelligence:* T--transportation and telecommunications intelligence:* M--military geographical intelligence.:* A--armed forces intelligence.:* P--political intelligence.:* S--scientific and technical intelligence.
This is not a complete list, as the basic intelligence library also includes:
:*Maps, including "base maps" over which overlays can be placed:*Biographical data, extensively cross-referenced; the UK term is "registry":*Graphics data:*Targeting data, which may be considered basic data only by military units
As a practical matter, these may be collected into::*Country handbooks, at various levels of classification (e.g., the unclassified
World Factbook ):*Topical handbooks (e.g., international terrorist groups), again at varying level of classifications.With modern technology, these collections may be Web documents rather than hard copy.
Country Handbooks
Unclassified examples of a country reference, in much shorter form than the internal handbooks, is the
CIA World Factbook , the "Countries and Regions" data sheets from the UK Foreign and Commonwealth Office [cite web
author = UK Foreign & Commonwealth Office
title = Countries & Regions
url = http://www.fco.gov.uk/servlet/Front?pagename=OpenMarket/Xcelerate/ShowPage&c=Page&cid=1007029394356 ] , and the US Department of State "Background Notes" [cite web | author = US Department of State | title = Background Notes |url = http://www.state.gov/r/pa/ei/bgn/] .Closer to the internal reference books of the intelligence communities are the "Foreign Area Handbooks" [cite web | title = Federal Research Division, Library of Congress | title Foreign Area Handbook series | url = http://lcweb2.loc.gov/frd/cs/] , originally prepared under contract to the US Army by American University, and later by the
Federal Research Division of theLibrary of Congress . The Country Studies/Area Handbook Program was "sponsored by the U.S. Department of the Army. Because the original intent of the series' sponsor was to focus primarily on lesser-known areas of the world or regions in which U.S. forces might be deployed, the series is not all-inclusive." At the time of original publication, there was a main unclassified handbook and a SECRET supplement, the latter dealing principally with biographical information. Area Handbooks had less restrictive distribution than the CIA "National Intelligence Summaries".Biographical References
Comprehensive indexing is the real value of a biographical registry. The names themselves are a challenge, with phonetic variations and aliases.
Soundex is one technique for indexing names such that phonetic equivalents, with variations in transliterations into the local language, can be retrieved.While there is no truly general solution, there has been considerable work in both in transliteration of nonroman character sets. Soundex and related systems help search biographical databases by phonetics, but transliterated character sets allow people not fully fluent in the written language to search for names.
Relationships among the people in the biographical index are essential and constantly updated. One term of art used for relationships indices are "wiring diagrams" [cite book
author = Tourison, Sedgwick Jr. | title = Conversations with Victor Charlie, an Interrogator's Story. | publisher = Ballantine Books| year = 1990 | ISBN-10= 0804107262 | id = Tourison 1990] .[cite journal
url= https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/docs/v03i1a03p_0001.htm
title = Processing Intelligence Information
journal = Studies in Intelligence
author = Borel, Paul
year = 1957
accessdate =2007-10-28
format = dead link|date=June 2008 – [http://scholar.google.co.uk/scholar?hl=en&lr=&q=author%3A+intitle%3AProcessing+Intelligence+Information&as_publication=Studies+in+Intelligence&as_ylo=1957&as_yhi=1957&btnG=Search Scholar search] ] The cycle of organizational activity for intelligence purposes extends from the collection of selected information to its direct use in reports prepared for policy makers. Between these beginning and end activities there lie a number of functions which can be grouped under the term information processing. These functions include the identification, recording, organization, retrieval, conversion into more useful forms, synthesis and dissemination of the intellectual content of the information collected. The ever-mounting volume of information produced and promptly wanted and the high cost of performing these manifold operations are forcing a critical review of current practices in the processing field.Geophysical Basic Intelligence
Maps are obvious products, but in infinite variety, including simple outlines onto which specific information can be overlaid, and divisions by political jurisdiction, ethnicities and languages, terrain, etc. The line between maps and actual imagery grows increasingly blurry.
Online resources such as
Google Earth are increasingly useful for other than the most detailed technical analysis. One challenge remains the indexing of maps inGeographical Information Systems , since multiple projections and coordinate systems are used both in maps and in imagery.Order of Battle Intelligence
Principally a military term, order of battle refers to the composition of an adversary's organization, including units, key personnel, equipment, and strength. In general, this is a form of basic intelligence, but is so important, and often so rapidly changing, that it may be assigned to a specific branch of an intelligence unit.
The term is also used for the organizational details of other aspects of opposition. For example, electronic order of battle is an inventory of the equipment, location, and operating signal characteristics of enemy transmitters, antennas, and other electronic equipment.
Current Intelligence
A spectrum of activities falls under the term "current intelligence". At a minimum, a current intelligence facility receives raw or minimally processed reports, integrates them with information it has, and, depending on its mission, may support::*Tactical warning (especially military facilities that combine operations and intelligence), such as the
North American Air Defense Command (NORAD) command post:*Mobile military and policymaker command centers, such as navalCombat Information Center s orAirborne Warning and Control System s (AWACS):*Strategic warning and coordination (e.g., US Department of State Operations Center):*Situational awareness of continuing items of interest, for operational use (e.g., WWII UK Submarine Tracking Room):*Situational awareness of continuing items of interest, for policymaker information and more systematic presentations (e.g., USWhite House Situation Room ).One function of watch centers, at least those in agencies and commands with collection and surveillance capabilities, is to monitor the availability of sensors, scheduled patrols, etc. Part of the tactical surprise at the
Battle of Pearl Harbor was that patrol aircraft were supposed to be aloft and the early radar station operating, but no watch center verified this -- senior officers assumed it was being done [cite book
author = Wohlstetter, Roberta
title = Pearl Harbor: Warning and Decision
publisher = Stanford University Press
ISBN = 0804705984
year = 1962 ] .Intermediate in timeliness between tactical warning and situation awareness are 24/7/365 facilities that stay active on current matters. Perhaps the first modern watch center was the British submarine tracking center under
Rodger Winn . This was the predecessor of the modern "all-source" center, where tactical reports, cryptanalysis, direction finding, and other functions came together to locate German submarines threatening Allied convoys.Modern current intelligence facilities often use teleconferencing or videoconferencing to share information, such as the NOIWON (
National Operational Intelligence Watch Officer's Network ) that links the (US) National Military Command Center, National Military Joint Intelligence Center, State Department Operations Center, CIA Operations Center, State Department Bureau of Intelligence and Research, NSA Operations Center and White House Situation Room. Other units may join conferences when appropriate, such as theFBI Strategic Information and Operations Center (SIOC).Other countries have similar networks, or sometimes a physical installation to which all affected agencies send representatives, such as the UK
Cabinet Office Briefing Rooms "COBRA".When a crisis is not necessarily of international significance, a subset may be all that is needed, such as the SIOC for multiple simultaneous prison riots. In the case of an aircraft hijacking without terrorist implications, the
FAA operations center may work with the SIOC, or with specific service components such as Coast Guard headquarters. The Coast Guard, other Department of Homeland Security offices such asFEMA , and technical specialists such as theEPA orNational Weather Service may join ad hoc operations.While some of these contingencies may not immediately seem related to national security, the reality is different, in that a major natural disaster, such as
Hurricane Katrina , will need significant military support. In North America, theIncident Command System , with variants all the way from local to theNational Incident Management System , are common to emergency service organizations.Major military commands often have operations centers, into which subordinate headquarters feed information, and higher commands are kept aware of the situation but not its details. They, in turn, feed information to their national levels. The US and Russia have exchanged liaison teams in their aerospace warning centers, and there are "hotline" communications between countries that may need to resolve crises, such the HAMMER RICK system between the US and Israel.
Indications & Warning Checklists
Indications and warning are collated into indications check lists specific to particular countries and systems. For example, it might be routine for one country flying a given aircraft to launch formations on short notice, as part of its regular training. A different country might, due to shortages of fuel or maintenance personnel, rarely do formation takeoffs, and that would be indicative of an intended action. Some actions in one's own country or by one's own forces may trigger national-level alerts, such as an accident involving nuclear weapons, a major national disaster, etc.
ituation Intelligence
Situation intelligence lies between the immediate and the moderate term. It draws on reference material, current intelligence, and raw information that is not directly relevant to a tactical goal. There can be very good situation material from unclassified government reports and databases, as well as private services. It gives policymakers a useful overview and context.
The
Canadian Security Intelligence Service (CSIS) is especially good on publishing materials. An example of a situation study would be "Commentary No. 70, The Threat from Transnational Crime: An Intelligence Perspective" [cite web | author = Porteous, Gregory F. | title = The Threat from Transnational Crime: An Intelligence Perspective | date = Winter 1996 | url = http://www.csis-scrs.gc.ca/en/publications/commentary/com70.asp |accessdate = 2007-10-27] . The "Currently Listed [Terrorist] " entities data base is very useful [ cite web | author = Canadian Security Intelligence Service | title = Currently listed entities | url = http://www.ps-sp.gc.ca/prg/ns/le/cle-en.asp] .Another excellent source, technically not public but widely available, are the reports of the US
Congressional Research Service . TheFederation of American Scientists maintains one data base at http://www.fas.org/sgp/crs/index.html.Information Technology
During 2001-2002, a Scholar-in-Residence at the Sherman Kent Center for Intelligence Analysis, the “think tank” attached to the CIA’s training center for analysts,cite journal
title = The DI and “IT”: Failing to Keep Up With the Information Revolution
author = Berkowitz, Bruce
journal = Studies in Intelligence
url = https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol47no1/index.html
accessdate=2007-10-29] was tasked with something new: using an outside scholar to study the process of analysis itself, especially how Information Technology (IT) was, and could be, used.His "approach was to watch as many DI analysts as practical and ask them how they performed their work. We discussed what kinds of tasks were hard to do and what technologies or procedures seemed to work smoothly. We also talked about their own ideas about how they might use IT more effectively. For the sake of comparison, I also met with researchers at organizations that perform functions similar to those of the DI (e.g., other intelligence organizations; the Congressional Research Service; The Washington Post; and business risk assessment services). Finally, I drew on my own experience in business and non-government research institutions. I was able to watch the DI respond to the terrorist attacks of 11 September 2001 and ramp-up for the war on terrorism.
"I came away from this experience impressed by the quality of DI analysts, but also concerned about their lack of awareness of and access to new information technology and services that could be of critical value to their work. The DI has used automated databases since the 1970s and has gradually improved its capabilities. With the existing system, analysts can perform most searches for source documents from CIA archives at their desks and retrieve the documents electronically."
It is sadly worth noting, however, that CIA analysts still do much better than their FBI counterparts, who have difficulty accessing any external secure networks, or sharing the most sensitive data within their agency. [cite web
url = http://www.usdoj.gov/oig/reports/FBI/a0410/exec.htm
title = The Federal Bureau of Investigation's Efforts to Improve the Sharing of Intelligence and Other Information
date = December 2003
accessdate = 2007-10-29] . NSA, however, seems to be much more comfortable with using IT as a daily tool.Agency internal data bases continue to improve over earlier generations, but, in many respects, are inferior to commercial search engines. It should be remembered, however, that ease of use is not an absolute requirement. Some search engine human interfaces are "expert friendly" rather than "user friendly", allowing analysts with solid backgrounds in complex search strategies to be at their most efficient. One indicator of some system shortcomings is simply the fact that an important part of a DI analyst’s tradecraft is building an informal source network. A good analyst either knows someone, or “knows someone who knows someone,” at another office or organization who can get the information they need. A good analyst will use these contacts to develop more leads in the process. In the commercial world, these contacts are managed with CRM, ERM, or social networking software.
Agency policies and practices create five kinds of constraints that prevent the DI from acquiring new IT and using it effectively. In 2008, the
US intelligence community A-Space may have broken through some of these constraints, or will break through in time.ecurity and IT
Security is probably the single most important factor that prevents the DI from applying information technology more effectively. Security is absolutely essential for intelligence, of course. The problem is that, when it comes to IT, approach is not “risk management,” but “risk exclusion.”
Until recently, personal digital assistants were forbidden in high-security facilities.Berkowitz2002] There are some very specialized electronic security threats that could apply, so it may be that a secure PDA needs to be developed and provided. Even in government agencies with sensitive but unclassifed information (e.g., personal health information covered by
HIPAA , there has been a serious concern over information bypassing safeguards on tiny solid state disk equivalents, which can fit into pens. Other agencies, however, are addressing this problem by requiring the devices to store information in encrypted form, and using biometric identification. [cite journal
author = Zyskowski, John
title = Thumb drives are too often the victims of convenience: USB flash drives can be a data security nightmare
journal = Government Computer News
url = http://www.gcn.com/online/vol1_no1/44136-1.html
accessdate = 2007-10-20]Such exclusionary rules also send an implicit message to DI analysts that information technology is dangerous and not essential for analysis. Analysts are, by the nature of their work, especially aware of security threats. So when they are told that a technology is potentially dangerous, their instinct is to avoid it unless absolutely necessary.
A laptop can be secured, but the security both has to be built-in, and maintained. Files need strong encryption. Multiple layers of security risk detection tools are needed. Biometric authentication will identify only legitimate users.
Security staffs must develop a better understanding of how analysts work. Rather than simply excluding technologies, their goal should be to develop methods of applying IT that are so user-friendly that DI analysts can operate securely with as few hindrances as possible.
Challenges of Compartmentation
Despite decades of trying to reduce the barriers between the Directorate of Intelligence and the Directorate of Operations (DO), sharp divides still exist. The DI and the DO, for example, have separate databases and separate IT architectures. Several DI analysts even told me that they had a better working relationship with their counterparts at NSA than with their own CIA colleagues in the DO.
The CIA already has experience that proves the gulf between the directorates is not inevitable. DI and DO personnel, for example, work well together in the Counterterrorist Center (CTC), which falls organizationally under the Director of Central Intelligence (DCI). In CTC, DI and DO personnel work side by side. As a result, DO officers treat DI counterparts like full members of “the team.” DI analysts in CTC have access to DO databases and tools that few analysts elsewhere in the DI can tap into.
Procurement Protocols
Even if CIA managers agreed today to put a new computer, integrated software suite, and data links on the desk of every DI analyst, one would not see many changes for two to three years. This is partly because CIA acquisition is paced by the annual federal budget cycle, and partly because of the CIA’s own procedures.
Coordination and Review Bottlenecks
One of the DI’s core beliefs is that coordination improves the analytic product. This idea goes back to Sherman Kent, William Langer, and other founding fathers of the analytic side of the CIA. Most were college professors who viewed coordination as the counterpart of the peer review process in academia . The problem is that coordination can defeat the direct interaction that modern IT makes possible.Berkowitz2002] There are ways to address both concerns in a nontraditional ways, such as wikis. .
One underlying issue is quality control. The traditional DI process ensures quality by employing multiple layers of managerial review of each product. But this is only one approach to quality control. Other organizations ensure quality by focusing on the people in the organization, rather than on each product. In other words, instead of doing quality control in the production process, they do their quality control in the promotion process.
Inefficient Resource Management
A number of intelligence agencies, notably the FBI and CIA, historically has not used technology for managing people effectively and forming "virtual teams". In the business world, managers routinely use software tools to move people quickly from one task to another. These tools tell them how their staffs are allocated, and thus they can assign and reassign people more efficiently and effectively. Some government organizations also use such tools. For example, the Congressional Research Service (CRS) logs requests into a central accounting system, and assigns analysts to tasks in a manner analogous to how businesses assign analysts to charge numbers. CRS managers can always download an up-to-date record that analyzes its workflow, allocation of personnel, and the status of requests . There is a class of software called "customer resource management", which can track projects, act as a tickler file, and do other things that non-networked PDAs cannot. Excellent commercial systems are available off-the-shelf, and with at least partially compartmented security.Berkowitz2002]
The Work Area
Analyst work stations do not appear, at first, much different from what one finds in the offices and cubicles at most research organizations. But there are some significant differences, and even the small ones can have a huge effect on how an analyst works. The largest difference is security.
Analyst workstations commonly consist of two computers with a common keyboard and mouse, one for classified and the other unclassified work, with an "air gap" switch between them. There is a telephone for unclassified converations and one that connects to the secure network, where most work is done. The unclassified computer is used mainly to browse the Internet and send unclassified e-mail.
Until a recent one-way transfer capability was introduced, DI analysts lacked any direct connectivity to the classified networks used throughout the military as the standard means of electronic communication. That is, data can “move up” to the higher classified Agency network but not “down” to a lower-level miitary network. To send classified but lower-level e-mails, analysts must go to separate terminals. Security processes and regulations also dictate how the DI disseminates its products. While Intelink—similar to a classified World Wide Web—receives much attention in the press, many CIA products are not posted there because, once a document is posted, the Agency cannot control further dissemination.
There is no middle ground. All of this has the effect of making it hard for DI analysts to interact even with the classified outside world. The CIA view is that there are risks to connecting CIA systems even to classified systems elsewhere. Mitigating those risks sends implicit messages to analysts: that technology is a threat, not a benefit; that the CIA does not put a high priority on analysts using IT easily or creatively; and, worst of all, that data outside the CIA’s own network are secondary to the intelligence mission.
Technologies That Could Help
The most critical upgrade for the DI is deploying a fully integrated workstation that allows DI analysts to move easily among programs, databases, and security levels, including, with appropriate safeguards, connectivity to secure networks of a lower maximum classification level
In addition, DI management should propose that the CIA make greater use of the “intelligence center” model—specifically, by assigning more DI analysts into DO offices and locating more DO case officers and reports officers in DI offices. Past experience by DI and DO offices in setting up cross-directorate centers suggests that this would push all managers to address security issues that impede collaboration and the use of information technology.
Analyst Websites
Wikimedia Foundation. 2010.