(EST PUB DATE) THE DCI'S GALILEO AWARDS WINNING AND HONORABLE MENTION PAPERS FOR 2004
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
01241738
Release Decision:
RIPPUB
Original Classification:
U
Document Page Count:
157
Document Creation Date:
October 23, 2023
Document Release Date:
August 28, 2023
Sequence Number:
Case Number:
F-2020-00858
Publication Date:
January 1, 2004
File:
Attachment | Size |
---|---|
(EST PUB DATE) THE DCIS G[16184363].pdf | 8.93 MB |
Body:
pproved for Release: 2023/01/23 C01241738
tri- # r- tr�I All 1 inr- "-NIL it ��
I i I IJOG.LIlLT
5-6-6At A /A/ v4-ii
o(:A5 to sHAP6_
tx- ti7c)6 Of
Nr6LI-16:A,
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
ron OFFICIAL USE ONLY
From the Director of Central Intelligence
The Intelligence Community has always needed bold thinking Today, we need it as
much as ever to bring about transformative change. Thus, I am very pleased to present to
the Intelligence Community the results of the first Galileo Awards competition for
innovative ideas for the future of US intelligence.
The call for papers last summer prompted entries from all across the Community. The
authors who submitted their works ranged from junior officers to senior executives, and
their proposals covered the gamut of the intelligence business. The submissions offered
suggestions relevant to every agency and every discipline.
The overall quality of the papers and their proposals was high, a factor that made it very
challenging for the judging committee to award the final prizes. Indeed, the enthusiasm
and creativity, which the Galileo Awards process generated, shows that the Intelligence
Community employs no insignificant number of men and women who want to improve
our institutions and methods to meet the challenges our nation faces.
Now, our task is to engage the best of the ideas presented in this collection � to discuss
them, add to them, and find a way to integrate their creative value into the vital work of
our Community.
Porter J. Goss
Director of Central Intelligence
FOR OFFICIAL UOE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
From the Director Strategic Management Issues Office
(U) The creation of our office approximately one year ago reflected a recognition on the
part of the senior leadership of the Intelligence Community (IC) that we need to seek
bold, creative solutions to our nation's next national security challenges. Our charter is to
promote a broad, thoughtful exchange of revolutionary change options for the future of
US Intelligence: The Galileo Awards program has served as a powerful example of the
outstanding potential of tapping into the wealth of talent and ideas that reside at all levels
of seniority and responsibility in the IC.
(U) The DCI's Galileo Awards Program was conceived last spring as a call to IC officers
challenging them to submit unclassified papers written on their own time with creative
ideas for the future of our business. Instead of equating change with "reform" or
"reorganization," we were looking for innovative ways to' change how US Intelligence
operates in all its dimensions. Our belief was (and remains) that the IC must establish a
process for dynamic reinvention rather than implement one-time, overarching
reorganization. We must transform the Community into an organization that
continuously learns and adapts to accommodate change � and this kind of dynamic
evolution cannot occur without the full participation and creative energy of all IC staff
officers.
(U) By the September deadline, we received some 130 papers from officers all over the
IC, and indeed all over the world. The papers were stripped of identifying information
and were evaluated in two rounds of judging by experts from inside and outside of the IC
using four criteria: subject matter, scale and scope, innovation and originality and
literary quality. In November, I served as chair of a a five-member panel that selected
three papers for awards, and identified ten papers for honorable mention. Also
participating in the final panel were William Nolte (Deputy ADCI for Analysis and
Production), Ery Rokke (Intelligence Science Board member and President of Moravian
College), Joseph Keogh (CIA University) and Jeffery Cooper (SAIC).
(U) We are extremely pleased with the high quality of the papers included in the
collection. They cover a wide range of topics and many points of view. They provide us
a marvelous starting place for further discussions on many critical issues for our future.
At the heart of the Galileo program has been the goal to promote a continuous dialogue
throughout the IC about innovative ideas � not necessarily the championing of any
specific solution or proposal. Our hope is that broad discussion of the ideas contained in
these papers will inspire others in the IC to come forward with additional creative and
well-considered ideas for how we can continue to build a successful future for US
Intelligence.
Deborah G. Barger
Director, Strategic Management Issues Office
-2-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
av
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
-3-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Contents*
The 2004 Galileo Award Winners
The Wiki and the Blog
By
Redefining the First Customer:
Transforming Intelligence Analysis through Peer-Reviewed Publications
Dynamic Adaptation:
A Twenty-First Century Intelligence Paradigm
Honorable Mention
Constellation
a
a
a
(b)(3) a
page 7(b)(6)
(b)(3)
page 23 (b)(6) 111
a
page 35 (b)(3) �
(b)(6)
From Stovepipes to a Web:
Adapting Intelink's Gated Communities for the Networked World
Intelligence Information System Audit Log Analysis:
Transforming IC Mission Performance and Collection Evaluation Processes
Rethinking Analytic Tradecraft
By a CIA Officer, serving under cover overseas
a
page 51 (b)(3)
(b)(6)
page 61 (b)(3) if
(b)(6)
page 69 (b)(3) 1p
(b)(6)
page 83 (b)(3)
(b)(6) �
Science and Intelligence Analysis:
The Requirement for "Critical Thinking" Training in the Intelligence Community
page 97
* The order in which the winning and honorable mention papers are listed was
determined by a random process.
-4-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
(b)(3) 41A
(b)(6)
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Honorable Mention
(continued)
Starting Over
By Carmen Medina (CIA) .page 111
Avoiding Intelligence Failure:
An Approach to Recurring Self-Diagnosis by IC Senior Managers
By (CMS) page 121 (b)(3)
(b)(6)
It's Not Rocket Science:
The Limits of Analysis and the Requirement for a "Synthetic" Complement
is
so
The Intelligence Community of the Future
(NSA)
page 133 (b)(3)
(b)(6)
.page 143 (b)(3)
(b)(6)
Let's Proceed to Plan C
Because It Will Support Plan B (Basic Agency Reform)
By Michael Mears (CIA) page 153
-5-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
-6-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
8898099611011011101101110094111111110011410400011001111
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Wiki and Blog
The Wild and the Blog
Problem Statement
US policymakers, warfighters and law-enforcers now operate in a real-time, worldwide
decision and implementation environment. Information about a new development in
Baghdad is known in Washington within minutes. Decisions about a response are made
in Washington within minutes. These decisions are implemented in Baghdad within
minutes of the decision. The total "intelligence � decision � implementation" cycle time
can be as short as 15 minutes. While this is an extreme example, it highlights the
, tremendous compression of the response time required by' all involved compared to
previous generations. This severe compression not only affects the highest priority
issues, it also ripples back into the most routine intelligence, decision and implementation
processes.
It does so for good reason. The compressed response cycle gives the United States
significant strategic and tactical superiority over our adversaries. Our national security is
best protected when we operate more quickly than those who would do harm to our
people and our freedom. This compressed response time allows us to disrupt, interdict,
preempt and respond to injurious efforts before our adversaries can achieve their goals
against us.
This compression is not just a preferred work style within the US National Security
Community. It is a characteristic of the way the world works in the 21St Century. Thus,
not only do we respond more quickly, but also the circumstances to which we respond�
in and of themselves�develop more quickly. These rapidly changing circumstances take
on lives of their own, which are difficult or impossible to anticipate or predict. The US
National Security Community�and the Intelligence Community within it�is faced with
the issue of how to operate in a security environment that, by its nature, is changing
rapidly in ways we cannot predict. A simple answer is that the Intelligence Community,
by its nature, must change rapidly in ways we cannot predict.
What was that? How can we change ourselves in ways we cannot predict? More
directly, how do we modify our nature to enable such unpredictable changes? Before
giving the right answer, there is a wrong answer that can be dismissed up front�
reorganization. Any reorganization by its nature is both predictable and slow. By the
time any particular reorganization has taken effect, the causes that spawned it will have
been replaced by new and different causes. The reorganization is thus not suited to
address these new and different causes. All major restructurings are based on the
-7-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Wiki and Blog
assumption that we can take the recent past and predict the future. Such assumptions
may have been reasonable in previous centuries, but not in this one.
The only way to meet the continuously unpredictable challenges ahead of us is to match
them with continuously unpredictable changes of our own. We must transform the
Intelligence Community into a Community that dynamically reinvents itself by
continuously learning and adapting as the national security environment changes.
Unless we, in the Intelligence Community, allow ourselves this ability to change, we
cannot hope to fulfill our mission to ensure domestic tranquility, provide for the common
defense and secure the blessings of liberty (U.S. Constitution, preamble) for our fellow
citizens from those whose aim it is to deprive us of these values.
Theoretical Development
To describe a Community that "dynamically reinvents itself by continuously learning and
adapting" in response to environmental changes harks to theoretical developments in the
philosophy of science that matured in the 1990's, collectively known as Complexity
Theory (Lewin, 1992). Complexity theory arises out of a rich and diverse intellectual
heritage. Four significant theoretical building blocks undergird Complexity Theory. The
scope of this paper only allows for a brief mention of these building blocks (though
Complexity Theory itself will be treated in more detail over the next couple of pages).
Briefly, the four building blocks are:
� General System Theory (von Bertalanffy, 1968). This theory was formulated in the
1930's and 1940's as a reaction to the then-popular theory of reductionism that asserted
in order to understand a phenomenon, one only had to decompose it into its components.
System Theory elevated the system itself as the subject of inquiry, independent of its
parts.
� Information Theory (Shannon, 1948). This theory is built on the premise that no
communication channel is error free�that is, random errors are always introduced into
the message�in spite of error-correction routines. Shannon showed how to transmit
correct messages in noisy channels. Moreover, he showed that the noise in the channel
was information in and of itself and thus can be used to transmit messages. There is
meaning in the noise.
� Chaos Theory (Lorenz, 1993). This theory dates from Lorenz's 1963 article in the
Journal of the Atmospheric Sciences, where he showed that minor differences in the
beginning of a weather pattern produced unpredictably large differences in how the
weather pattern played out. He summarized this observation in the title of his 1972
address to the American Association for the Advancement of Science, "Predictability:
Does the Flap of a Butterfly's Wings in Brazil Set off a Tornado in Texas?" The
unpredictability of outcomes due to small changes in initial conditions has thus come to
be known as "The Butterfly Effect."
� Fractal Theory (Mandelbrot, 1977). This theory took shape with Mandelbrot's 1968
paper entitled, "How Long is the Coastline of Britain?" He demonstrated that, as the
-8-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Melle1113311SIVISSOBBI/111101111111111111141111.501111511
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Wiki and Blog
ruler got smaller, the length of the coastline increased. He also showed that, at ever-
increasing smaller scales of observation, the coastline
remained constantly jagged. He discovered this
pattern in many natural phenomena, such as
mountains. While a mountain rises from the surface
of the earth into the third dimension, as we get farther
out into space, it looks increasingly flat compared to
the total earth's surface. From space, the mountain
does not rise a full dimension from the surface of the
earth, but just a fraction of a dimension. Something that exhibits this partial
dimensionality is called a fractal. Fractals also exhibit consistent complexity regardless
of the scale at which they are observed.
Four Examples
As an introduction to Complexity Theory itself, four examples of common phenomenon
that express various concepts of Complexity Theory will be summarized below.
Following the examples, an explanation of Complexity Theory will be given.
Example One: In one of the foundational treatises of modern Western thought, Adam
Smith's (1776) Wealth of Nations describes how individuals, in pursuing their own
economic self-interest, create a market for goods and services. This market has an
"invisible hand" that decides which goods and services survive over time and which do
not. It is "invisible" in the sense that no individual or group of individuals decides what
the market should produce or consume. It just "happens" out of the aggregated actions of
large numbers of individuals. The individuals are only trying to make their own lives
better. Out of their collective and self-organized behavior, market behavior emerges.
This market behavior is distinctly different from individual behavior. The market
dynamically adapts prices in response to unpredictable supplies and demands. The
market is able to do this because of continuous learning on the part of and information
feedback to the individual purveyors and consumers of goods and services.
Markets are essentially bottom-up, self-regulated enterprises that become incredibly
complex. Indeed, global markets emerge even when individuals behave locally. For
example, German demand for bananas stimulates banana production in the South Pacific.
Neither the German buyers nor the South Pacific suppliers need to travel to participate in
the market (though some intermediary shippers do travel). The market price conveys
information about the behavior of both the German consumers and the South Pacific
providers. Moreover, billions of goods and services are supplied to people around the
world, and no central authority is needed to manage a list of what goods and services are
to be produced and delivered where at what price.
Two and a half centuries of experience with free markets teaches us, however, that
markets are subject to manipulation, distortion and out-of-control spirals. We impose
-9-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Wiki and Blog
rules on markets to ameliorate the worst of these effects. These take the forms of trade
agreements, taxes and regulations with criminal and civil penalties. In sum, markets are
complex adaptive systems with properties that emerge out of simple behaviors by a large
number of self-organized individuals. The sum is greater than the parts.
Example Two: The mathematician Alan Turing is considered to be one of the fathers of
the discipline of computer science for his work in formalizing algorithmic computation.
He was also an intelligence officer during WWII, leading the effort to decrypt the
German Enigma Machine. In the last paper written before his death (Turing, 1952), he
addressed himself to the subject of the Freshwater Hydra and the leaves of plants. Turing
worked out a mathematical model showing that relatively simple homogeneous sets of
chemical agents following relatively simple rules generate quite complex biological
structures, such as tentacles of the Hydra and the leaf patterns of plants. While guided by
strict rules, these biological structures dynamically adapt to their changing and somewhat
unpredictable environment of varying combinations of sun,' water, nutrients and
predators, etc. From the same chemical base, each hydra has a unique tentacle set.
Similarly, from the same chemical base, each plant of a particular species has a unique
placement of leaves�and each leaf has a slightly different structure.
The important point is that, in the face of external changes, complex
systems can change, albeit in unpredictable but adaptive ways.
Example three: Jane Jacobs (1961) shows that decisions by many
individuals about where to locate their homes and businesses create
neighborhoods with distinctive properties. These distinctive
neighborhoods persist even though individuals are constantly moving
in and moving out. Similar kinds of people are attracted to similar
neighborhoods. Some neighborhoods do change over time in
response to changes in the environment. Other neighborhoods (both exclusive and slum)
resiliently maintain their character in spite of city planners' best efforts. For example, the
silk merchants in Florence, Italy, have inhabited the same neighborhood for over 500
years. People, taking into account both the external environment and what the other
people or businesses in their neighborhood are doing, decide to move or stay. This
collective, self-organizing behavior determines how the neighborhood emerges and
adapts.
Example four: Deborah Gordon (1999) dispels the myth of the ant queen. For many
years, entomologists thought the ant queen exerted a controlling, organizing influence
over "her" colony. In fact, individual ants make individual decisions about what
activities to perform (from a limited set of behaviors) based on what their nearest
neighbors are doing. For example, if too many ants are cleaning a particular area of the
colony, an individual ant will decide to go hunt food. Adherence to simple rules at an
individual level allows ant colonies at the group level to respond to both strategic
(seasonal) and tactical (predatory) changes in their environment. From a limited set of
-10-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
ii,.,,.. 1�111I
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Wiki and Blog
individual self-organized behaviors, an ant colony emerges and survives for more than a
decade.
Complexity Theory
The Santa Fe Institute (www.santafe.edu), founded in 1984, and The Center for Complex
Systems Research, founded in 1986 at the University of Illinois (www.ccsr.uiuc.edu),
have inspired a body of work (e.g., Johnson, 2001) that articulates a coherent framework
of complex adaptive systems. The six critical components of a complex adaptive system
are:
1. Self-organization � individuals (people, ants, chemicals) decide to act in similar ways
in proximity to and in concert with each other, for their own reasons. For example, two
boys independently shooting hoops decide to go one-on-one to 20 points. In addition, a
critical mass of individuals is required for self-organization to happen.
2. Emergence � the whole is greater than the sum of the parts. For example, twelve
Canadian Geese flying in a "V" is more than just 12 individual geese flying. The group
behavior is distinct from the individual behavior.
3. Relationships � individuals look at their nearest neighbors to try and figure out what
is happening so they can make decisions. For example, House Speaker 'Tip' O'Neil
declared, "All politics is local." By this he meant that people vote for national leaders on
the basis of what is happening in and around one's home. It doesn't matter what the
national unemployment rate is, it only matters what the local unemployment rate is.
4. Feedback � information circulates in the system, is modified by others and then
comes back to influence the behavior of the originator either as a positive (amplified) or
negative (dampened) influence. For example, an ant crosses a pheromone trail it
previously laid down. The ant says to itself, "I've already been here, so I'd better wander
somewhere else." It is also important that the historical memory of the system be part of
the feedback (amplifying or dampening) loop.
5. Adaptability � the system is open so that information (and/or energy) flows in and out
of the system. This new information enters into the feedback loops and influences the
behavior of the individuals, and thus the overall behavior of the system adapts to the
external environment. For example, think of a group of kids engaged in unsupervised
play in the basement as a self-organized system. When the dad opens the basement door
and yells "everyone gets an ice cream cone when the toys are picked up" and closes the
door, he adds new external information into the system. The kids adapt to the external
influence by stopping play and putting the toys away. Systems that are 1) continuously
open to new information from the environment, and 2) circulate the information within
the system, will continuously change in response.
6. Non-Linearity � Small changes in the initial conditions or external environment have
large (unpredictable) consequences in the outcomes of the system � also known as the
"Butterfly Effect," cited earlier. For example, when the dad yells down the stairs for ice
cream, the kids adapt by fighting over who made which mess. In the ruckus, they knock
over a shelf that breaks one child's arm. The dad did not predict he would be going to the
emergency room by offering ice cream to the children.
-11-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Wiki and Blog
Simple Self-Organized
Local Relationships
This graphic depicts these six characteristics. From simple, self-organized personal
relationships emerges complex behavior. Information from the external environment
enters the system and impinges on these relationships as either positive or negative
feedback. The personal relationships are changed, and the complex behavior adapts.
Complex systems that under-adapt, such as snowflakes, present us with a model that is
too staid for our use. Complex systems that over-adapt, such as the 1994 Rwandan
massacres of more than one million people, are too chaotic for our use. The best complex
adaptive systems are those that are poised on the edge of chaos. These vibrant systems
thrive by continuously learning and adapting to the continuous changes in the
environment. They have achieved a healthy circulation of positive (amplifying) and
negative (dampening) feedback in the system.
Network Centric Warfare
There has been a recent attempt to apply the principles of complexity theory to
government�specifically to the military services. The Department of Defense (DoD) is
subject to the same response time compression as the Intelligence Community. The DoD
understands that the command and control regimes that worked in the 20th Century do not
serve as well in the 21st. In response, they are pursuing an effort called Network Centric
Warfare (NCW) which is being championed by the Office of Force Transformation
(OFT) and supported by the Command and Control Research Program (CCRP), both
under the Assistant Secretary of Defense for Command, Control, Communications and
Intelligence (ASD/C3I). While Network Centric Warfare has its detractors, it
nevertheless does offer an example for the Intelligence Community.
-12-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Wiki and Blog
Alberts, Garstka and Stein (1999, p2.) define NCW as:
. . . an information superiority-enabled concept of operations that generates increased
combat power by networking sensors, decisionmakers and shooters to achieve shared
awareness, increased speed of command, higher tempo of operations, greater lethality,
increased survivability and a degree of self-synchronization. In essence, NCW translates
information superiority into combat power by effectively linking knowledgeable entities
in the battlespace.
Wilson (2004, p.2.) identifies four main objectives of NCW:
1. Self-synchronization, or doing what needs to be done without traditional orders;
2. Improved understanding of higher command's intent;
3. Improved understanding of the operational situation at all levels of command; and
4. Increased ability to tap into the collective knowledge of all U.S. (and coalition) forces
to reduce the "fog and friction" commonly referred to in descriptions of fighting.
The impact of NCW was seen in Operation Iraqi Freedom. Only about 250,000 US
troops were deployed in Operation Iraqi Freedom compared to the nearly 500,000 US
troops that were deployed a decade earlier in Operation Desert Storm. Individual units
were smaller and moved faster. Because units knew the location of other nearby units
without line of sight, they spread out in a "swarm" fashion. If one unit got into trouble,
the other nearby units gave aid by converging on the enemy from all directions.
Knowing the location of nearby units greatly reduced friendly fire accidents. Because the
high-priority objectives were clear, there was no need to secure all of the rear. Units
could hit the heart of the enemy command and thus disable enemy units on the periphery
without having to engage them. When units encountered difficult obstacles, they could
engage experts off the battlefield in real-time�sometimes as far away as Washington�
to help solve problems. Moreover, units moved more quickly because damage and
opportunity assessments were made and conveyed during the battle, rather than waiting
for overnight analysis.
� What were the key ingredients that helped make NCW a winning component in
Operation Iraqi Freedom? The units were highly trained, professional warriors. Not only
� were they experts in the use of their advanced equipment and well practiced in the
tactical art of battle, they knew the rules of engagement and the strategic and tactical
objectives. Thus enabled, they were trusted to act on their own in the battlefield. From
� the thousands of deployed units�each pursuing their own tactical objectives�emerged
� an integrated land, air and sea force unparalleled in human history. No other military on
earth can match the effectiveness of the US Military.
S Application To Intelligence
The objective that was identified at the outset of this paper was that the Intelligence
Community must be able to dynamically reinvent itself by continuously learning and
adapting as the national security environment changes. Complexity Theory tells us that
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Wiki and Blog
we can only achieve this objective if several conditions exist. Enabling these conditions
will be a big change for the Intelligence Community, but if we are serious about
succeeding in improving ourselves, it is imperative that these changes be made.
1. Intelligence Officers must be enabled to act more on their own. Just as people in a
market are empowered to make their own purchases, and individual ants in a colony can
decide which task to perform, and military units are able to choose battlefield tactics in
real-time, so too, intelligence officers must be allowed to react�in independent self-
organized ways�to developments in the National Security environment.
2. Intelligence Offices must be more expert in Tradecraft. It is this expertise that
engenders the trust required for independent action. Military units know the rules of
engagement and are thus entrusted to engage in battle. Ants have a hardwired rule set,
which enables the colony. Cities are built on the rules that govern property deeds, titles
and liens. Expertise in tradecraft for each intelligence discipline must become a constant
quest for each officer.
3. Intelligence Officers must share much more information. Just as military units in the
field must know where other units are located in geographic space, intelligence analysts,
for example, must know where their colleagues across the Community are located in
intellectual space. This knowledge results from sharing information. From the
previously cited examples, we understand that information sharing among individuals
allows market niches to be filled, ants to fend off predator attacks and plants to distribute
themselves in the ecosystem. Increased information sharing among Intelligence officers
will allow these Intelligence officers to self-organize to respond in near real-time to
National Security concerns.
4. Intelligence Offices must receive more feedback from the National Security
environment. The only way to learn from and adapt to the changing National Security
environment is to be in constant receipt of feedback from that environment. Just as zoo-
raised animals cannot compete in the wild, intelligence officers cloistered in the
Intelligence Community are not adapted to or fitted for the National Security
environment.
5. Intelligence Managers must be more persuasive about strategic objectives.
Quadrennial strategic directions are good, but these directions must become part of the
everyday dialog at all levels in the Community. Many intelligence officers, with their
noses to the grindstones, know little about the overall strategic intelligence objectives.
One must know how one's own piece of work fits into the overall intelligence mosaic
because the intelligence mosaic is constantly changing, and thus one's own piece must
constantly change to remain well-fitted. Intelligence managers must be constantly
communicating their constantly changing objectives. Intelligence officers will, in turn,
adapt.
About 1843, the newest and largest western frontier city�larger than Chicago or St.
Louis�was also the most orderly and well kept. A visiting dignitary asked the mayor of
Nauvoo, Illinois how he managed so many people so well. He replied, "I teach them
correct principles and they govern themselves" (Taylor, 1851). This sound bite
encapsulates the spirit of what Complexity Theory suggests as a model for the
-14-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
est
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Wiki and Blog
Intelligence Community. From intelligence officers who
are allowed to share information and act upon it within a
simple tradecraft regime will emerge an Intelligence
Community that continuously and dynamically reinvents
itself in response to the needs of the national security
environment.
Self-Organizing Tools
At first blush�and in the context of how the Intelligence
Community now operates�the five prescriptions seem
almost ridiculous, especially the two most important ones about information sharing and
independent, self-organized action. The good news is that in the last four years there
have been technology advances that make implementing such prescriptions easier than
one might initially think. There is a new generation of Internet tools that enable people to
self-organize around shared knowledge.
From intelligence officers who�
are allowed to share information
and act upon it within a simple
tradecraft regime will emerge an
Intelligence Community that
continuously and dynamically
reinvents itself in response to
the needs of the national
security environment.
The first of these self-organizing tools is known as "Wiki" (pronounced whicky) and is
named after the Hawiian term Wiki wiki, which means fast. Wild tools allow 1) any
person to add content to a web site, and 2) any other person to edit the content. The most
famous implementation of Wild is the Wikipedia (www.wikipedia.com). This is an
encyclopedia created and edited by Internet users. It has been in existence since 2001
and now has over 300,000 entries in over 100 different
languages. By comparison, the 2004 edition of the 32-volume
Encyclopedia Britannica contains just over 65,000 entries (see
store.britannica.com). Other Wikis include dictionaries
(www.wiktionary.com), books (www.wikibooks.com),
quotations (www.wikiquotes.com) and document collections
(www.wikisource.com).
WIKIPEDIA
The Free Emyelopedid
The Wikipedia has an interesting and innovative 'tradecraft' or a rule set to which
contributors and editors must abide. All content contributions are self-initiated. There is
no editor-in-chief. Because all contributors are also editors, when a person notices an
article that needs content revisions or does not abide by the rules, that person makes the
edit. All previous versions of the article are available and all changes are attributable.
Another wiki rule for the encyclopedia is that explicit or implicit points of view are out of
bounds. These are edited out quickly.
There are privileged contributors with administrative powers beyond the normal
contributor. They can adjudicate disputes among contributors. The existing
administrators confer administrative powers to a person on the basis of the quantity and
quality of that person's contributions. If a person disengages from performing
administrative duties, the privileges are revoked.
-15-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
In sum, from the little bits of work by many, many people, following simple rules of
content contribution and editing, the most comprehensive and authoritative, and bias-free
encyclopedia in the world has been produced in three years. This is an encyclopedia that
is dynamically and constantly changing in response to the world as the world itself is
changing. The lists of medals received in the 2004 Athens Olympics were updated as the
events concluded. No manager made the assignment. No editor-in-chief reviewed the
accuracy. It happened, as if by magic. A person took the initiative to update the entries,
and hundreds (or possibly thousands) of others reviewed the content for quality.
One of the Wikipedia's strengths is also a weakness�no points of view. Much of the
self-corrective knowledge that exists in the Intelligence Cdmmunity exists in personal
points of view. Currently, there exists almost no official outlet for points of view in the
Intelligence Community. A healthy market of debatable ideas emerges from the sharing
of points of view. From the ideas that prosper in a rharket will arise the adaptive
behaviors the Intelligence Community must adopt in order to respond to the changing
national security environment. Not all good ideas originate at the top.
A second self-organizing information-sharing tool has
matured in the last few years. It is called "blogging." The
term comes from "web log" shortened to 'biog.' A blog is a
journal or diary that is kept in the public space of the Internet.
Individuals maintain their own blogs on an hourly, daily,
weekly or periodic basis. They are their own editors. Current blogging technology
makes it easy to manage one's blog (see www.blogger.com, for example). Most blogs
take the form of citing a current event and offering a point of view about it. Often one
blog will cite a comment in another blog and comment on it. The `blogosphere' is truly a
marketplace of ideas.
Btogger
Enabling intelligence officers across the Community to express and share opinions may
be one of the largest paradigm shifts for the IC. It will be uncomfortable for some
because it will be in the blogosphere where the Community will ride along the edge of
chaos. The blogosphere probably will obey the 99-to-1 Edison rule ("Genius is one
percent inspiration and ninety-nine percent perspiration" � from wikiquotes.com). For
every ninety-nine mediocre ideas, there will likely be only one brilliant idea. The few
brilliant ideas, however, are worth the investment of many mediocre (and chaotic) ones.
It is these few brilliant ideas that will provide the direction for the Community to adapt to
the changing national security environment. The few brilliant ideas will survive in the
market place of ideas. As individual blogs comment on each other's ideas, the brilliant
ideas will spread as feedback throughout the Community. Individuals, recognizing the
-16-
FOR OFFICIAL USE ONLY
Wiki and Blog
The rules themselves are also subject to the Wiki process. Any person can introduce
changes at any time. Disputes over the rules can be escalated to a board of
administrators. 410
110
1110
410
(114
I
I
I
I
I
I
a
a
a
a
a
Approved for Release: 2023/01/23 C01241738
IMODOS10511511111111111111111111111151111�6118�8111185UI55�5O
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Wiki and Blog
brilliance, will respond. From this self-organized response will emerge the adaptive
behavior required of the Community.
Three Wrapper Technologies
The Wiki and the Blog are complimentary companion technologies that together form the
core workspace that will allow intelligence officers to share, innovate, adapt, respond and
be�on occasion�brilliant. Blogs will cite Wiki entries. The occasional brilliant blog
comment will shape the Wiki. The Blog will be vibrant and make many sea changes in
real-time. The Wiki, as it matures, will serve as corporate knowledge and will not be as
fickle as the Blog. The Wiki will be authoritative in nature, while the Blog will be highly
agile. The Blog is personal and opinionated. The Wiki is agreed-upon and corporate.
The Wiki and Blog, however, while standing together, cannot stand by themselves.
Intelligence officers need a wellspring of intelligence froni which to build the Wiki and
about which to comment in the Blog. Such a wellspring would be a Community-wide
intelligence repository patterned after DIA's SAFE or CIA's �RAS. These repositories
are largely disordered, out-of-context piles of cables. That is okay. The intelligence
repository is like unrefined ore. (The repository could actually be many federated
databases.) The Blog and the Wiki serve as successive refining processes for the
unrefined ore in the intelligence repository. The Blog would vet, comment and establish
context for the intelligence. This extracted intelligence knowledge from the intelligence
repository would be placed in the well-organized Wiki. Both the Wiki and the Blog
would link back to authoritative source documents in the repository.
While an intelligence repository is required "under" the Wiki and the Blog, two more
technologies are required "above" them. One is a search technology and the other is a
feedback technology. Part of the agility required in today's high-speed national security
environment is to be able to quickly find information. One needs the ability to search for
specific knowledge within or across the Wiki, or the Blog, or the Intelligence Repository
in a Google-like (www.google.com) fashion.
While most intelligence officers are quite familiar with search technology, we are less
acquainted with feedback technologies. These technologies are often in and of
themselves self-organizing. For example, we might want to know which cables in the
repository were most cited by the Blog over the last 24 hours. This feedback lets the
visitor quickly know what the Community thinks is important. It also lets the originator
of the cable understand its impact. Feedback technologies let visitors know what areas of
the Wild are changing most rapidly as an indicator of newly vetted knowledge. Feedback
technologies can utilize subscription techniques such as "send me an alert when more
than 10 people have read my blog." Wikipedia.com makes extensive use of these
feedback technologies on its homepage. Another feedback Internet site
(www.daypop.com) has dozens of real-time lists--from the top words to the top blog
-17-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Wiki and Blog
postings to and the top sources cited. Its Top 40 list not only gives the current ranking
but whether the ranking is going up or down.
Feedback technologies are an integral part of the solution suggested by Complexity
Theory. As important as information sharing is to the success of the solution, it is even
more important to know who is sharing what information. This allows intelligence
officers to accurately understand where they are in the intellectual space of the
Intelligence Community. It also allows intelligence officers to see what gaps exist and
where changes need to be made. The feedback technologies allow an agile reading of the
current state of play across the wide expanse of the Repository, the Wiki and the Blog.
The Technology Stack
Feedback
4
Search ,
'40444 '1110tatlinirgePPStiTit
A Sharing Space
Together, these five technologies (Repository,
Wiki, Blog, Search, Feedback) would allow the
Community to start down the path of
implementing the ae mission recommendations
(self-organization, tradecraft, information sharing,
feedback and strategic communication) suggested
by Complexity Theory.
We need a space for change that is not organization dependent (remember,
reorganizations are not part of the solution set). We need a space to begin implementing
the five mission changes that is independent of organization. We need a space that is
open not just to the Intelligence Community but also to other non-intelligence national
security elements�to allow sharing and feedback. We need a space with a sufficiently
large critical mass of intelligence officers. We need a space that is neither
organizationally nor geographically nor temporally bound. We need a secure space that
can host a corporate knowledge repository. We need a flexible space that supports tools
for self-organizing (Wiki), information sharing (Blog), searching and feedback as
previously mentioned. We need a place in which tradecraft procedures can be
implemented. In short, we need a space that is always on, ubiquitously distributed and
secure. We need an electronic network. We need SIPRNet.
SIPRNet (Secret Internet Protocol Router Network) is managed by the Defense
Information Systems Agency (www.disa.mil). It is widely accessible by intelligence
officers and other national security officers alike. It has been deployed to every Embassy
and every Military Command. It is a more attractive experimental sharing space than the
Top Secret Community Network (JWICS) because a critical mass accesses it, Policy
Community officers access it, the tradecraft (security) rules are simpler and it reaches all
organizations and geographic locations. Moreover, SIPRNet is designed to host the
-18-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Wiki and Blog
Internet-based tools outlined above. Once the Wiki and the Blog processes and content
mature on SIPRNet�that is, once the IC embraces the mission changes and becomes
proficient in the use of the technology�the Wild and Blog could be replicated on the
Top Secret network.
Concept Of Operations
a
Lipnak and Stamps (1997), in their seminal work on virtual communities, identify four
necessary conditions for success: a critical mass, trust, content and purpose.
� Critical Mass: Because the mission changes need to pervade the entire Community,
the technology needs to be available to every officer in the Community. Because the
Community must operate symbiotically with the Policy Community, Policy Community
officers must also have access to the technology. For the feedback mechanisms to work,
there must be sufficient numbers of participants from the various intelligence disciplines
across the Community. To ensure the widest participation, the barriers to entry must be
extremely low. This means the resources for deploying and operating these systems must
be borne at the Community level and provided as a common service for all. All SIPRNet
users must be allowed to search the intelligence repository, edit the Wild, author a Blog,
create links among these three and get feedback. This means not only must the software
be easy to use, but also self-registration and self-authorization services must be trivial.
� Trust: As mentioned before, trust arises from tradecraft. Technical tradecraft has
already secured the network. Technical tradecraft will also secure the tools and data.
Procedural tradecraft in terms of the rules of use must be explicit and easily accessible.
Security tradecraft has already cleared the users of SIPRNet. Applicable analytic and
operational tradecraft principles must be identified and promulgated. For Complexity
Theory to work, the procedural, analytic and operational tradecraft rules must be simple.
� Content: All intelligence organizations will need to identify content they can place
into a Community intelligence repository on SIPRNet. The repository will likely be a
number of federated databases. For hyperlinks to work, the objects in the repository must
persist, and the address to the objects must be permanent. There will need to be some
priming of the Wild and the Blog so the content is sufficiently broad and deep to have
value. In the beginning, some resources must be devoted on a full-time basis to bring the
tools into full operational capability.
� Purpose: This is where Community leadership, as well as feedback from the rest of
the National Security environment, plays a key role. There are strategic, intermediate and
tactical purposes that must be communicated. A few Community seniors may want to
author a blog. These would be sure to get high readership. Posting strategic directions
into the repository would also work.
Conclusions
This paper identified a pressing Intelligence Community issue, namely that the
Intelligence Community must transform itself into a Community that dynamically
-19-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Wiki and Blog
reinvents itself by continuously learning and adapting as the national security
environment changes. The paper elucidated the principles from an exceptionally rich and
exceedingly deep theory (Complexity Theory) about how the world works and has shown
how these principles apply to the Intelligence Community. These principles include self-
organization, information sharing, feedback, tradecraft and leadership. The paper argues
that from intelligence officers who are allowed to share information and act upon it
within a simple tradecraft regime will emerge an Intelligence Community that
continuously and dynamically reinvents itself in response to the needs of the national
security environment.
Lipnack and Stamps (1997) make a case that a successful virtual community is 90 percent
culture and 10 percent technology. The most profound culture change will be for
Intelligence managers to let go of their officers the same way the battlefield commanders
have let go of their battlefield troops. Managers must trust their officers to directly share
with each other and directly with the Policy Community. Intelligence managers' role will
become less command and control and more teacher of tradecraft and communicator of
purpose and objectives. The Intelligence Community will need to put into place powerful
incentives and rewards for managers to change. Indeed, Intelligence Officers must feel
encouraged by their managers to spend their workday engaged in sharing activities.
These changes will allow the dynamic learning community to emerge.
Recognizing that these changes in attitude and work processes will be challenging to
implement, the paper recommended some first steps. It was suggested that recent self-
organizing and information sharing tools from the Internet, the Wild and the Blog, be
deployed on the SlPRNet. Wrapping these tools in an intelligence repository, a search
tool and feedback reporting would complete the technology package. This paper also
suggested a few process principles (critical mass, trust, content and purpose) for success
to be deployed along with the technology.
The Intelligence Community is under extreme political pressure in the wake of the 9/11
Report (National Commission, 2004) and the Senate's report on pre-war intelligence
(U.S. Senate, 2004). If ever there was a time for the Community to re-examine its modus
operandi, it is now. Our political leaders are now demanding these changes from us
(Bush, 2004). The changes in mindset suggested in this paper are significant. Enabling
intelligence officers to independently express their point of view in a Community-wide
setting is groundbreaking. Equally avant-garde is letting intelligence officers create a
body of intelligence knowledge without an editor in chief. Moreover, inviting our Policy
Community counterparts at State, Homeland Security, etc. to be full participants in these
information-sharing activities is breathtaking. If anything, however, these changes are
timid compared to the changes required to bring the Community into the 21st Century.
We must act, or we will certainly be acted upon. May we have the will to overcome our
inertia and succeed in our efforts.
-20-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
Mb
FOR OFFICIAL USE ONLY
eferences
di
dl
dl
di Alberts, David S., John J. Garstka and Frederick P. Stein (1999). Network Centric
di Warfare: Developing and Leveraging Information Superiority, 2' Edition
01 (Revised). Washington, D.C.: C4ISR Cooperative Research Program.
011 Bush, George W. (2004). Executive Order Strengthening the Sharing of Terrorism
Information to Protect Americans. Washington, DC: The White House, 27
August 2004.
di Gordon, Deborah (1999). Ants at Work: How an Insect Society is Organized. New
� York: The Free Press.
Jacobs, Jane (1961). The Death and Life of Great American Cities, Vintage Books
Edition, 1992. New York: Vintage.
� Johnson, Steven (2001). Emergence: The Connected Lives of Ants, Brains, Cities and
� Software. . New York: Touchstone.
� Lewin, Roger (1992). Complexity: Life at the Edge of Chaos. New York: Macmillan.
Lipnack, Jessica and Jeffrey Stamps (1997). Virtual Teams: Reaching Across Space,
� Time and Organizations with Technology. New York: John Wily and Sons, Inc.
� Lorenz, Edward N. (1963). "Deterministic Nonperiodic Flow." Journal of the
� Atmospheric Sciences, Vol. 20, No. 2, pp. 130-148.
Lorenz, Edward N. (1972). "Predictability: Does the Flap of a Butterfly's Wings in
Brazil Set off a Tornado in Texas?" A talk given to the 139th meeting of the
di American Association for the Advancement of Science, as found in Lorenz (1993)
411 pp. 181-184.
411 Lorenz, Edward N. (1993). The Essence of Chaos. Seattle: The University of
Washington Press.
� Mandelbrot, B.B. (1967). "How Long is the Coast Line of Britain? Statistical Self-
'. Similarity and Fractional Dimension." Science, pp. 636-638. As cited in
011 Mandelbrot (1977).
Mandelbrot, Benoit B. (1977). The Fractal Geometry of Nature, updated and augmented
in 1983. New York: W.H. Freeman and Company.
� National Commission on Terrorist Attacks Upon the United States (2004). The 9/11
Commission Report. Washington, D.C.: Government Printing Office. PDF
version available from www.9-11commission.gov.
Shannon, C.E. (1948). "A Mathematical Theory of Communication." Reprinted with
� corrections from The Bell System Technical Journal, Vol. 27, pp. 379-423,623-
656, July, October.
Se Smith, Adam (1776). An Inquiry into the Nature and Causes of the Wealth of Nations,
four volumes. Edinburgh. Original full text is available from the Adam Smith
0111 Institute at www.adamsmith.org/ and from the Gutenberg Project at
411 www.gutenberg.net.
dl Taylor, John (1851). Millennial Star, Vol. 13, p. 339. As cited in the entry on Agency in
dl Dahl, Larry E. and Donald Q. Cannon, eds. (1997). The Teachings of Joseph
Smith, Salt Lake City: Bookcraft, as enhanced by Infobases, Inc.
_AK
ril
-21-
R
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Wiki and Blog
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Wiki and Blog
Turing, Alan (1952). "The Chemical Basis of Morphogenesis." Philosophical
Transactions of the Royal Society of London, Series B: Biological Sciences. Vol.
237, No. 641, pp. 37-72.
U.S. Senate (2004). Report on the U.S. Intelligence Community's Pre-war Intelligence
Assessments on Iraq. Washington, D.C.: Senate Select Committee on
Intelligence.
von Bertalanffy, Ludwig (1968). General System Theory. New York: George Braziller.
Wilson, Clay (2004). "Network Centric Warfare: Background and Oversight Issues for
Congress, June 2, 2004." CRS Report for Congress. Washington, D.C.:
Congressional Research Service.
-22-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
118688891111118119119118891111111111111911111111111111111111S11111
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Redefining the First Customer
Redefining the First Customer: Transforming Intelligence
Analysis through Peer-Reviewed Publications
I. Introduction
Recently, two Congressional investigatory panels have criticized the U.S. Intelligence
Community (IC) for a lack of quality and rigor in its analysis. It is possible that some
fundamental cultural and procedural practices may negatively impact the IC's ability to
analyze and produce foreign intelligence across the political, economic and military
spectrum, including highly technical disciplines such as those associated with weapons of
mass destruction (WMD). This proposal highlights the absence of a formal, internal,
Community venue for presentation and discussion of alternate analyses as a vulnerability
to the rigor of IC assessments. The proposal identifies an opportunity for the IC to
address this gap through creation of an internal peer-reviewed periodical targeted to
circulate alternate intelligence assessments throughout the Community
In the past two months, Congressional investigations into the terrorist attacks of 11
September 2001 and prewar intelligence on Iraq have noted a number of deficiencies
within the IC that collectively contributed to two significant intelligence failures.
Foremost among these deficiencies were the IC's propensity for group think, failure to
communicate across organizational barriers and tendency to streamline intelligence
assessments by removing necessary caveats and alternative perspectives from drafts as
the texts progress through the coordination process.
According to the Senate Select Committee on Intelligence's (SSCI) Report on the U.S.
Intelligence Community's Prewar Intelligence Assessments on Iraq, "a series of failures,
particularly in analytic tradecraft, led to the mischaracterization of intelligence."1
Specifically, "the IC suffered from a collective presumption.. .this 'group think' dynamic
led IC analysts...to both interpret ambiguous evidence as conclusively indicative of a
WMD program"2 and to discount information to the contrary. According to the
committee, the presumption was so strong that "other types of alternative or competitive
analysis were not utilized"; concurrently, analysts "did not give serious consideration to
Senate Select Committee on Intelligence of the 108" U.S. Congress. Report on the U.S. Intelligence
Community's Prewar Intelligence Assessments (July 2004): 14. Available at:
http://www.realcities.com/multimedia/nationalchannel/news/070904_senate_report.pdf.
Last accessed on 16 August 2004.
2 SSCI Report, 18.
-23-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Redefining the First Customer
other possible explanations."3 Clearly, the Senate report recognizes the absence of a
management-endorsed mechanism for analysts to "question and challenge their
assumptions [and] fully consider alternative arguments"4 as a limiting factor in the
quality of U.S. intelligence analysis.
In its July 2004 report, Congress' National Commission on Terrorist Attacks upon the
United States (9/11 Commission) echoes many of the general findings of the SSCI
investigation. The Commission further identifies a lack of transparency and
communication among analysts across agencies as a key barrier to providing the agile
joint intelligence required to combat threats such as terrorism and proliferation of WMD5.
According to the 9/11 Commission, "the importance of integrated, all-source analysis
cannot be overstated...without it, it is not possible to 'connect the dots'...no one
component can hold all the relevant information."6 The 9/11 report proposes significant
modifications to the IC structure to facilitate the transparency needed for joint
intelligence analysis. Although the SSCI report suggests no such restructuring, it does
strongly imply that the IC needs to do a better job of enabling its analysts to interact in a
forum that allows them to "fully consider opinions from other intelligence analysts"7 and
creates "a level playing field in which outside analysts fully participate."8 To this end, a
variety of academic communities that measure success based upon the discovery and
communication of knowledge, such as those associated with the physical and social
sciences, may provide some insight germane to current issues facing the IC.
On the surface, there appear to be strong parallels between intelligence analysis and
scientific investigation. According to Dr. Donald Kennedy, Editor-in-Chief of the journal
Science,
intelligence as it is best practiced by experienced agents and agencies
surely looks like a science... [a] problem is defined so that the right
measures for dealing with it can be selected; relevant information is
gathered and then analyzed, so that meaningful relationships can be
uncovered and understood; and tentative conclusions are reached and then
tested against possible alternatives. Finally, perhaps most important,
critical review is sought.9
Kennedy cites discrepancies between the "unclassified" Iraq WMD National Intelligence
Estimate released in October 2002 and the declassified version released in July 2003 as
3 SSCI Report, 21.
4 SSCI Report, 23.
5 National Commission on Terrorist Attacks upon the United States. The 9/11 Commission Report. (July
2004): 408.
69/11 report, 408.
7 SSCI Report, 28.
8 SSCI Report, 28.
9 Don Kennedy. "Intelligence Science: Reverse Peer Review?" Science, vol, 303, (March 26, 2004): 1945.
-24-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
EVI-1111111111551511151111111111LISSiLl114111111111111
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Redefining the First Customer
evidence that the IC employed a "reverse peer review" of the classified document as it
moved from the analysts and IC seniors to the policymakers. The result of this reverse
peer review was that alternate hypotheses failed to be identified and caveats appeared to
have been removed from the document. In the normal scientific peer review process,
alternate hypotheses and assessments of data are often added to the final document as the
result of a critical review from peers and senior experts in a field. Kennedy's editorial
suggests that the IC would benefit from a tighter peer review process that incorporates
alternate analysis and is modeled more closely upon that of the Scientific Community.
The fact that three independent reviewers (SSCI investigation, 9/11 Commission and Dr.
Kennedy) of IC practices, policies and products came to strikingly similar conclusions
regarding the failure of the IC to promote information sharing, critical review and
consideration of alternate analysis in its assessments strongly suggests significant
opportunity for improvement in these areas. Specifically, the IC needs .(1) a balanced,
objective, standardized, Community-wide peer review prOcess that occurs on a level
playing field, and (2) a "safe" forum within which IC analysts can develop, vet and
communicate alternate assessments.
This proposal outlines how the establishment of an independent internal journal for
alternative analysis could address existing shortfalls and enhance the Community's
overall ability to ensure rigor, depth and quality of analysis by fostering critical
discussion of analytic issues and promoting increased communication across the
community of analysts. Moreover, incorporation of such a journal into standard IC
practice and culture would reproduce the peer review process that currently benefits the
Scientific Community and could serve to enhance the critical thinking, communication
and collaboration skills of junior and midlevel analysts. The establishment of a journal
for alternate analysis would help the IC senior leadership take a major step towards
addressing the criticism of IC analytic methodology raised by the SSCI and 9/11 reports.
II. Understanding The Cultural Impediments To Alternate Analysis
There are at least three fundamental practices at work in the IC that tend to promote
group think and restrict the formulation of alternate analysis. Yet, each of these practices
deliberately has been established and maintained to produce a product that provides the
busy policymaker with a clear and concise assessment of current threats and their
implications for US security. These practices are: (1) the drive to seek consensus from
within an organization and occasionally across the IC; (2) the focus on writing primarily
for a non-technical audience; and (3) the constraint of crafting high-impact assessments
for busy policymakers. Efforts to curb any of these tendencies are likely to meet with
significant resistance because they are at the core of the IC's perception of the
policymaker as the first and only customer for intelligence assessments.
-25-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Redefining the First Customer
1. Seeking consensus in analytic products. In an attempt to provide policymakers with a
clear and consistent message regarding threats to national interests, intelligence
organizations routinely seek to achieve analytic consensus and consistency during the
internal coordination of intelligence products. This means that analysts focus on
presenting a principal position, often at the expense of fully considering plausible
alternatives. Although mention of dissenting opinions is occasionally included in
finished intelligence products, these occurrences are deliberately kept to a minimum.
While this effort to achieve analytic consensus arguably serves US policymakers by
providing them with a concise and unambiguous assessment on which to act, it also can
inhibit the full formulation, communication and evaluation of alternative assessments on
complex issues. During the coordination process, assessments or statements, which are at
odds with earlier products or the more pervasive views of an analyst's colleagues, tend to
be minimized, reworded or cut altogether in order to present the Policy Community with
a unified position.
2. Writing primarily for a non-technical audience. Another consequence of the IC's
single-minded focus on writing for the policymaker is that the audience for these
assessments generally lacks the time, expertise or inclination to critically review or
challenge the underlying assumptions. As a result, many intelligence products fail to
provide the reader with fully articulated and sourced arguments. Even though the
underlying arguments and sources may have been thoroughly explored during the
coordination process, they often do not make it into the final product, which tends to be
concise and compact for the busy reader. Once in print, these assessments are less likely
to be challenged or countered with alternate opinions because they are generally pitched
at the Policy Community rather than one's analytic peers. Concise and devoid of
footnoted sources, most IC assessments are intended to inform rather than provoke
healthy discussion and debate among a community of experts. Because these printed
documents do not retain references to primary sources, analysts are at pains to reconstruct
and reevaluate the details of arguments presented by their predecessors or colleagues
from elsewhere in the IC.
3. Producing high-impact assessments. Since most intelligence products are directed at
high-level policymakers, emerging issues, which do not require the immediate attention
of our leaders, get little, if any, formal attention and risk remaining unexamined until they
are highlighted by current events. Because analysts are not given adequate venues to
openly explore back-burner issues, the IC is often in the position of responding to
unforeseen events.
III. Redefining The First Customer
Analysts take pride in crafting concise and clearly written intelligence assessments for
busy policymakers. Within the IC, the President and other high-level intelligence
consumers are occasionally referred to as the "First Customer" to emphasize their
-26-
0
0
0
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Mi
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Redefining the First Customer
primacy in the IC's mission. However, it is apparent from the procedures and practices
mentioned above that the unique disposition of the IC's traditional first customers place
certain constraints on the scope and content of intelligence products that ultimately
degrade the quality of the analytic assessments. Even though the IC exists solely to
inform the Policy Community, it is not evident that policymakers should be the first and
only customers for most of the Community's analytic products. If one adopts Dr.
Kennedy's view of intelligence analysis as a science�much like the other social
sciences�and examines the publication model that has led to success in each of these
disciplines, it becomes clear that the first customer for scientific scholarship is the
Scientific Community itself and not the general public, even though the public ultimately
benefits from scientific knowledge and expertise.
Intelligence analysis is clearly a compilation of many different sciences. These
disciplines are as diverse as the academic backgrounds from which analysts are drawn
and include political science, military science, economics, chemistry, biology and nuclear
physics, just to name a few. However, when viewed as a whole, the challenges of
intelligence analysis most closely resemble those of the historians who practice a form of
social science. The primary goal of intelligence analysts and historians alike is to
develop a refined understanding of remote events based on fragmentary and often biased
information. Analysts and historians often have very little control over the limited data
on which they depend. In many cases, the information is reported by individuals who
may have indirect access to or imperfect recollection of the event in question. The
sources themselves may be motivated to retell the story in a fashion that is beneficial to
their interests.
Regardless of the particular field, scientific knowledge and theories invariably are
expressed in two distinct genres, which are directed at separate audiences and serve very
different functions. While distinct, both genres play important roles in the scientific
tradition. These venues exist in the field of history as well as in the other social and
physical sciences.
Peer-reviewed publications form the core of all legitimate scientific endeavors and are
written by scientists to present their research and findings to other experts in their field.
A strong tradition of peer-reviewed publications exists in each of the respected sciences,
making the full and systematic exploration of alternate hypothesis possible. Peer-
reviewed scientific publications are distinct from other forms of literature in a number of
important ways. The primary audience for peer-reviewed papers is the body of one's
technically competent colleagues. As such, these papers provide all the details necessary
for knowledgeable readers to retrace the author's research and draw their own
conclusions. Furthermore, peer-reviewed papers are valued for their unique contribution
to scientific debate on a controversial issue. These papers generally are not intended to
represent a consensus view, only the well-argued position of a small group of
collaborators.
-27-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Redefining the First Customer
Popularized science is more journalistic in style and directed outside the Scientific
Community to the general public. Popularized science papers are generally written to
inform rather than debate. This form of writing has several important features, which set
it apart from peer-reviewed work. Popularized science generally seeks to recognize
trends in scientific research and consolidate a body of knowledge for non-experts--
focusing primarily on the most relevant and predominant findings at work within the
Scientific Community. Perhaps more importantly, this journalistic style casts scientific
discoveries in a context the general public can understand and value. In this respect,
those developments that have a direct bearing on the lifestyles and interests of the general
public are more likely to find expression in this venue while more subtle findings tend to
be ignored.
Although peer-reviewed and popularized publications each play important roles in
scientific endeavors, legitimate sciences would not exist at all without the free exchange
of ideas promoted by peer-reviewed papers. It is true that most sciences ultimately exist
to serve the public good and must therefore interface with the public on multiple levels,
including through the writing of popularized science articles. However, within the
scientific tradition, the first customer for scientific writing remains the scientist.
In their commitment to presenting policymakers with concise, timely and high-impact
intelligence products, analysts appear to have lost track of their preeminent obligation to
develop a thorough understanding of complex issues through an open and formal written
debate. Analysts have sacrificed the important peer-to-peer dialog for a relatively one-
sided monolog with the busy, non-technical policymaker.
� The bulk of the IC's analytic publications are directed not at colleagues but at the
policymakers who lie outside the community of intelligence experts.
� Publications to the policymakers resemble a popularized version of intelligence
analysis in which positions must by pitched to a non-technical audience.
� Most intelligence assessments are not published be critiqued by the Policy Community
or other members of the Intelligence Community.
The IC must not abandon the current array of policymaker products, which serve the
critical mission of informing US decisionmakers in a concise and unambiguous manner.
These products have been carefully developed over the years to meet the needs of the
busy, non-technical Policy Community, which relies on the IC's consistent and well-
reasoned assessments of critical events. However, efforts must be taken to promote the
formal development and debate of alternate analytic assessments through the creation of a
parallel peer review process similar to that which is at the core of all other scientific
disciplines. Peer-reviewed papers are an essential component of every well-developed
-28-
FOR OFFICIAL USE ONLY
ail
Approved for Release: 2023/01/23 C01241738
a
a
a
so
S
S
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Redefining the First Customer
science and would compliment and support existing policymaker products by overcoming
limitations associated with the existing "popularized" intelligence product:
� Peer-reviewed intelligence products will permit the critical exploration of multiple
assessments in a venue that does not require offices and organizations to present a
consensus position on a particular issue.
� While peer-reviewed articles will be expected to inform debate on an issue, they need
not bear the burden of presenting high-impact intelligence to a policymaker. In this way,
emerging issues can be explored and understood long before they demand the attention of
the Policy Community.
� Publication in IC-wide, peer-reviewed journals will ensure that alternate hypotheses
and the supporting evidence become a part of the Community record. These publications
will be easier to reference and retrieve than more informal mechanisms such as e-mails,
memos and verbal exchanges, which are typically employed in the coordination process,
are limited in their distribution and have a precarious existence.
The following sections describe the design and implementation of an IC-wide peer
review Journal of Alternative Intelligence Analysis (JAIA), which is intended to promote
the critical development of alternative assessments and thereby fuel the formation of
well-considered popularized products for the non-technical policymaker. The JAIA
achieves this by reducing the cultural barriers to publishing alternative assessments and
making experienced and highly critical intelligence analysts across the IC the first
customers for analytic products.
IV. The Journal Of Alternative Intelligence Analysis
Clearly, the need exists for an IC-wide publication to facilitate open and fair debate
through a peer review process similar to that which has long been at the core of academic
and scientific communities. Analysts must be encouraged to take ownership of
alternative assessments and be given the opportunity to lay out an argument and present
evidence in a forum free of bias. All too often, dominant opinions take precedence at
coordination meetings and interagency working groups while alternative assessments are
not given their due. The proposed JAIA will enable analysts with alternative
interpretations of available intelligence to present their positions in well-articulated
papers to their peers that are not encumbered by the constraints imposed by publications
directed at the Policy Community.
The JAIA will be modeled after existing academic journals in fields such as public
policy, history and archaeology. Contributors to the JAIA will be permitted to present
independent interpretations of intelligence data, provided they use sound analytical
reasoning and well-crafted arguments to arrive at their assessments.
-29-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Redefining the First Customer
The JAIA could be organized by geographic region as well as by topical issues. This
format would sort articles in such a way that all stakeholders in the regions and topics of
interest can consider the contributor's argument. For example, alternative assessments on
proliferation issues in China that had been debated primarily by WMD analysts may now
receive broader readership by regional economic, leadership and military analysts who
can add substance to the debate as well as become more informed of contentious areas of
analysis within their region of study. Additionally, the JAIA could sort the same article
by the topic of proliferation, allowing WMD analysts who focus on other regions to
weigh in on the debate and possibly apply novel analytical perspectives to their own
accounts.
The main utility of the JAIA is in fostering healthy consideration for alternative analysis.
This, necessarily, will involve more debate, and readers will be encouraged to respond to
contentious articles either by submitting a letter to the editor or publishing an article of
their own. Formal written discourse in this manner has an advantage over e-mails and
verbal debates because it serves to document and publicize alternate perspectives,
allowing analysts who otherwise might have been excluded from the coordination
process to consider novel perspectives.
Authors' names should appear on JAIA articles in order to give analysts credit for their
work and reinforce the point that their opinions, and not necessarily those of their
colleagues, are being expressed. If necessary, pen names could be used to protect the true
identities of analysts from inadvertent public exposure. Organizational affiliations should
be noted as well to highlight the participation of analysts from different offices in
collaborative assessments.
JAIA articles would be distinct from intelligence products intended for the Policy
Community. Because the papers will be geared toward knowledgeable colleagues rather
than busy policymakers, authors should be encouraged to strive for depth rather than
brevity. Analysts would have less stringent space requirements in order to fully argue
their points. Also, analysts will be encouraged to write more technically oriented papers
that apply knowledge from one or more of the physical and social sciences to key
intelligence issues. Typically, finished intelligence directed at members of the Policy
Community avoids drawn-out explanations of technical data that could otherwise be used
to support an analyst's argument. Since an author's goal in writing for the JAIA is to
convince his fellow analysts of his position on a contentious issue, that analyst should be
able to incorporate all appropriate technical arguments.
Properly formatted contractor studies should also be incorporated into JAIA articles to
multiply the impact of government-funded research on IC-wide analysis and reduce
replication of effort by different agencies. Often contractor contributions are overlooked
because the results of their work are not circulated beyond the office that commissioned
the study. While contractors are prohibited from writing finished intelligence for
-30-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Redefining the First Customer
policymakers, there is no reason contract-generated analysis could not be distributed via
JAIA to IC analysts who may benefit from their research. Contractor studies, particularly
in more scientific fields, may also lend credence to an analyst's argument, but may be
overlooked by others because of unfamiliarity with the study. Similar benefits could be
obtained by accepting qualified articles from experts in academia who are also prohibited
from having a more direct role in crafting assessments for the Policy Community.
Some may be concerned that policymakers will mistake JAIA articles as coordinated
intelligence products. Therefore, a clear disclaimer should appear on each article to
prevent readers from mistaking the article for an agency- or IC-coordinated product.
Review of all JAIA articles will be carried out by a panel of peers selected from among
the readership. A senior editor, who would be responsible for assigning reviewers, doing
a final read-through of all articles and ensuring publication of accepted articles, should
oversee the panel for each paper. Reviewers could be selected from all ranks throughout
the Community, and attempts will be made to pull analysts with varying backgrounds
from a range of participating intelligence agencies. Volunteers could be asked to review
articles on a rotating schedule (perhaps only twice annually). This way, the review
process will not require full-time service to the JAIA. Although substantive experts
would be selected to review papers dealing with relevant accounts, non-subject experts
who are also evaluating the paper could counter personal or career biases. If the
argument is poorly articulated or the analytical reasoning flawed, the panel can opt to
reject the paper or recommend changes that will make it acceptable for publication. All
rejected papers should be returned with an explanation to the authors who can then appeal
the panel's decision to the senior editor.
To aid in the peer review process and adequately inform journal readers, all articles must
be fully sourced prior to submission, and sourcing will be retained in the published
version. This would allow editors, reviewers and readers a chance to read the raw
intelligence reports, if they are available, and check the validity of the author's argument.
V. Options For Establishing A Journal Of Alternate Intelligence Analysis
In addition to dedication of financial and material resources and personnel, creation of a
journal for alternate analysis would require a fundamental shift in the IC analytic culture.
Acceptance and use of the journal by IC analysts and managers as a forum for presenting,
discussing and vetting hypotheses would likely be facilitated if its creation and
employment are tailored to minimize the required culture shift. To this end, this proposal
will outline a variety of options for leveraging existing resources, utilizing external
entities and designing a responsive system for reviewing, publishing and disseminating
assessments throughout the Community. The proposed peer review journal would be
implemented within the existing intelligence culture and complement traditional
policymaker publications.
-31-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Redefining the First Customer
To be most effective and useful to the IC, the journal will need to be highly responsive
and permit rapid review and production of analyses; thus it will need to employ dynamic
production methodologies that have significant flexibility. In this regard, a wholly digital
production environment could meet the needs of the analytic community; such a format
would naturally lend itself to rapid�perhaps even automated�nomination, review,
publication and dissemination of analyses across the spectrum of community players. In
this notional construct, the journal would serve as a daily product for IC analysts to read.
Individual assessments could be crafted in a standard format, reviewed for general
content and format by several individuals drawn from a pool of qualified analysts in a
related discipline (biological warfare analysts for example) and published online in a
classified environment as soon as the article has been approved for release. Secure
Communities of Interest could be established to facilitate analyses containing information
that requires additional dissemination controls. Ultimately, the journal would serve as a
virtual "sounding board" for IC analysts where alternate assessments can be articulated,
vetted and developed by the Community on a level playing field prior to being
incorporated into more traditional products for the Policy Community.
Ideally, the implementation and daily execution of journal activities could largely be
achieved by leveraging existing resources within the IC. For example, the Center for the
Study of Intelligence (CSI) has a longstanding history of providing resources that
promote study and debate of IC activities and assessments. CSI also has unique
capabilities to support a journal of alternate assessments as it currently produces the peer-
reviewed IC journal Studies in Intelligence. Thus, CSI likely already possesses much of
the infrastructure and expertise needed to create a new IC-specific journal. Moreover,
housing the journal at CSI would prevent it from being formally associated with any
specific intelligence agency, promoting Community use of the periodical as a forum for
engaging in discussion of pertinent issues. In addition, since much of CSI's publications
are targeted towards the IC, its management of JAIA could serve as a buffer between the
Intelligence and Policy Communities�a critical factor in protecting policymakers from
assessments in the nascent stages of development.
In addition to the resources and benefits available via CSI, the IC could augment the
Center's staff with support from a contract publishing agency. This may be a feasible fix
for the potential problem of leveraging government resources that may be overburdened
or insufficiently staffed to independently take on the mission of another IC periodical. In
addition, experienced contract editors could help the IC define rules for submission,
outline and implement an appropriate peer review mechanism and detail processes for
editing and publication that will be acceptable to the Community and maintain
appropriate security. Incorporation of contract support would likely not impact CSI' s
ability to preserve the membrane between this periodical and the Policy Community; if
anything, the use of contractor staff in the journal's production would further dissuade
policymakers from trying to access its publications, particularly since contractor staff
-32-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
BiBMIMM111111111111111111111111M1111111111
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Redefining the First Customer
would not be affiliated with any specific intelligence agency. However, IC managers
would need to be aware that contract support presents challenges regarding the clearance
levels of the publisher staff; management would also need to help develop the
infrastructure for coordination of review, editing, formatting and production via the
contractor.
Ultimately, successful implementation of a journal of alternate analysis would depend in
part upon IC management's ability to create an environment that both supports and
promotes analyst use of the system. Restructuring of production and coordination
processes to encourage preliminary publication and testing of hypotheses via the peer-
reviewed alternate assessments vehicle could drive the analytic culture towards increased
collaboration, critical review and broader discussion of substantive issues. In addition,
realignment of analyst performance metrics to include their use of the alternate
assessments vehicle could directly impact analyst attitudes and commitment regarding the
process. Such actions, although requiring a concerted and longstanding effort on the part
of IC management, could successfully impact analytic culture throughout the IC to
address the criticisms that were raised in the SSCI and 9/11 reports.
VI. Conclusion
Congressional panels commissioned to investigate intelligence failures associated with
the September 11 attacks and the Second Gulf War have recommended that the IC place
a greater emphasis on alternative analysis. Building upon Dr. Kennedy's notion of
intelligence analysis as a science, we believe that one way to systematically address
Congress' recommendation is to promote a peer review process similar to that found at
the heart of most academic and scientific enterprises. Such a peer-to-peer publication
would provide a formal venue for analysts to articulate well-argued alternative points of
view to be reviewed by their intelligence colleagues throughout the IC. We encourage IC
management to endorse the creation of a journal of alternative analysis that will be
broadly distributed to IC analysts in electronic format.
The peer review system has existed at the core of academic and scientific research for
centuries. Peer-reviewed publications have assisted psychologists in their understanding
of the human psyche, anthropologists in their search for our ancestors, engineers in
building sturdier structures and pharmaceutical researchers in their quest to cure human
diseases. Few can deny the importance of the peer review process in promoting a solid
understanding of complex social and scientific issues by encouraging Community experts
to work together.
The JAIA will help analysts who have well-argued and possibly dissenting points of view
to share them with their peers and establish a Community-wide record of their debate.
Because JAIA articles will be directed at peers working on related issues, there is a
greater chance that alternative interpretations presented in this fashion will be understood
-33-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Redefining the First Customer
and either expanded upon or critiqued by their IC colleagues. Those who stand in
disagreement will be encouraged to respond with independent articles that lay out
evidence for their own points of view. Furthermore, by encouraging analysts from
different analytic organizations and disciplines to coauthor JAIA articles, the journal will
help lower boundaries that exist between organizations, subject matter specialists and
regional analysts.
Given escalating terrorist threats to US populations and interests, deceitful use of dual-
use technologies by state actors to evade international weapons conventions and
innovative efforts of narcotics traffickers evade interdiction, the IC clearly has a need, as
identified by independent investigators, to build a better system for promoting alternative
analysis. The proposed peer-reviewed Journal of Alternative Intelligence Analysis
provides a straightforward and cost-effective mechanism for promoting a more vigorous
scientific culture of documented peer-to-peer debate within the Intelligence Community.
-34-
FOR OFFICIAL USE ONLY
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
Approved for Release: 2023/01/23 C01241738
am
a
a
�
�
a
�
�
�
a
a
a
a
I
a
a
I
I
�
I.
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Dynamic Adaptation
Dynamic Adaptation:
A Twenty-First Century Intelligence Paradigm
Introduction
The principal legacy of Galileo Galilei (1564-1642)�the introduction of a new paradigm
in modern astronomy, and the scientific methods that brought it about�provided an
empirically compelling case that the universe did not work as most people had imagined.
Galileo demonstrated, through a series of systematic observations made through
telescopes he had fashioned himself, that the sun rather than the Earth was the center of
the (known) universe and anchored an entire system of planets, including the Earth, that
revolved around it in roughly circular orbits.1 This scientific breakthrough substantiated
the controversial theory of Nicholas Copernicus that had lacked an empirical basis before
Galileo, namely, that the heliocentric paradigm should supersede its geocentric
predecessor. This "paradigm shift" created enormous controversy and intellectual
disruption among key thinkers, and Church authorities, of his time.
A less-well-known legacy of Galileo's offers a keen lesson in adaptation: In spite of
relentless Church pressure to repudiate his "heretical" positions, Galileo demonstrated
uncanny flexibility in making temporary accommodations with the dominant authorities,
while persisting with scientific integrity. In the end, he prevailed. Galileo's subtle lesson
in adaptation is better understood through the work of another scientific giant who
followed some two and-a-half centuries later. Charles Darwin (1809-1882) explained
how species that survive the longest are not necessarily the fiercest or the strongest�
rather, they are the ones that have demonstrated the best capacity to adapt to changing
environments. Species that fail to adapt risk extinction.2 Like Galileo's methods,
Darwin's insights on adaptation have not been sufficiently appreciated by intelligence
leaders.
Both Galileo and Darwin illustrate powerful lessons for US intelligence: Paradigm shifts
are not easy, even if long overdue, and must be based on sound observation and evidence
to justify serious advocacy. Further, attention to processes of adaptation is critical to
survival. Such attention may reveal why US Intelligence is sometimes successful, and
sometimes not. Systematic efforts to better integrate a capacity for adaptation into key
institutions and processes may better posture US Intelligence to warn or understand
emerging, if unidentified, threats to US security in the early decades of the 21g century.
'Dialogue on the Two Chief World Systems: Ptolemaic and Copernican (1632).
2 Origin of Species (1859).
-35-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Dynamic Adaptation
Thus, the key challenges facing US Intelligence are:
� to successfully transition to a new and more effective intelligence paradigm; and,
� to ensure that an intelligence paradigm shift fully integrates needed processes of
adaptation. 3
This essay explores both issues. It urges a new intelligence paradigm by focusing on
three major kinds of needed adaptations for US Intelligence: functional adaptation,
cultural adaptation, and integrating adaptive mechanisms within intelligence institutions.
If successful, adaptive mechanisms would help ensure that important changes in the
intelligence environment�as September 11th and Iraq's Weapons of mass destruction
illustrate�do not outpace needed change within intelligence itself. Taken together, these
three types of adaptations will shape a new intelligence paradigm!
Functional Adaptation
For US intelligence to succeed in the 21st century threat environment, significant
adaptation is required within and across the principal missions of US Intelligence:
Foreign Intelligence (Fl, chiefly collection and analysis), counterintelligence (CI), and
covert action (CA). Old and new paradigms are discussed. The key themes addressed
here are those that illustrate US intelligence performance against the two significant
issues at the center of public discussions about intelligence reform: the warning failure of
September 11th, 2001, and the apparent errors in estimating weapons of mass destruction
(WMD) in Saddam Husayn's Iraq.6 Neither issue is dissected in depth here, but both
help illustrate key FT malfunctions, and thus frame the discussion much as they have
shaped the current debates on intelligence reform.
Foreign Intelligence Collection: Old Paradigm. Significant failings are evident in both
9/11 and Iraqi WMD intelligence. In both cases, collection was insufficient, and analysis
was inadequate. Both failed. Had collection been better, analysts arguably might have
been more accurate, since successfully "connecting the dots" would have been more
3 "Probably the single most prevalent claim advanced by the proponents of a new paradigm is that they can
solve the problems that have led the old one to a crisis. When it can legitimately be made, this claim is
often the most effective one possible." Thomas S. Kuhn, The Structure of Scientific Revolutions (Chicago:
University of Chicago Press, 3rd ed., 1996), p. 153.
"A fourth type, structural adaptation, is already underway, and beyond the scope of this paper. Structural
adaptation encompasses how the Intelligence Community is organized, and the range of DCI (or NID)
authorities. Successful structural adaptation will empower the most senior intelligence official with
unprecedented budgetary and personnel authorities, as well as significantly enhance needed authorities to
protect intelligence sources and methods. It should also establish a fixed term for the DCI or NID of seven
years, renewable for one additional six-year term.
5 See The 9/11 Commission Report (New York: W.W. Norton & Co., 2004).
6 US Senate Select Committee on Intelligence, Report on the US Intelligence Community's Prewar
Intelligence Assessment on Iraq (Washington, DC: Government Printing Office, 2004).
-36-
FOR OFFICIAL USE ONLY
to
to
Approved for Release: 2023/01/23 C01241738
aill
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Dynamic Adaptation
likely had there been more or better dots to connect. The old paradigm of spotty
collection and weak analysis will not well serve the Nation in the 21st century.
Both Galileo and Darwin exemplified innovative and relentless collectors. Galileo
pioneered his own revolutionary sensor program (the telescope), while Darwin's "broad
area search" aboard the Beagle enabled his study of flora and fauna heretofore
unimagined by other naturalists. But both enjoyed one huge advantage that US collectors
today do not have: Neither Galileo nor Darwin faced a target environment that adapted to
their collection efforts in order to circumvent them.
In contrast, US intelligence collection failed in 9/11 largely because the terrorist target, in
this case, al-Qa'eda, successfully evaded our current collection techniques, chiefly,
traditional human (HUMINT) and signals (SIGINT) intelligence collection. Further, US
imagery offered no appreciable warning help against the al-Qa'eda threat. Terrorist
operatives conspired and conducted their operations, including those that preceded
September 11th, in ways to avert timely detection by US intelligence. Similarly, Saddam
Husayn's Iraq also successfully evaded US collection for largely the same reasons: US
HUMINT generally failed to penetrate Iraq's WMD programs, as did SIGINT, and while
imagery performed better against Iraqi WMD than it did against terrorists, it still
provided too little of real value. We should ascertain why.
The best explanation for these major collection shortfalls is found in the depth and
breadth of understanding that US adversaries bring to US collection techniques�and, by
extension, the knowledge they use to defeat them. Many significant US collection
failures are rooted in our failure to adapt to the fact that key adversaries�such as
terrorists bent on mass killing of US citizens, and dictators who build, conceal, and
proliferate WMD capabilities�have our playbook. Because they have a keen grasp of
how we collect intelligence, they successfully implement denial and deception (D&D)
countermeasures against known US collection techniques. This effectively blunts or
neutralizes even the best of our major collection efforts.
Using D&D is how adversaries level the playing field�in some cases, tilting it in their
favor. As a result, analysts (and policymakers) are left with insufficient�or worse,
misleading�information about the major threats that face us. In short, in defeating US
collection capabilities�often complex and costly ones�our key adversaries have
demonstrated far better adaptation to our techniques than we have to theirs. Here, lessons
from Darwin have worked to their advantage, while our failure to learn the same lessons
has worked to our disadvantage. These collection failures are failures of adaptation.
New Paradigm: Adaptive Collection. US collection often fails because it does not
defeat the countermeasures that sophisticated adversaries deploy to beat it. It does not
adapt to foreign D&D. This must change. US collection efforts must defeat proven and
emerging countermeasures by employing techniques that are not now known by
-37-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Dynamic Adaptation
adversaries, and therefore, not yet countered. New collection�in HUMINT, SIGINT,
11VIINT, and MASINT�in short, must be developed precisely in ways that adversaries do
not understand and cannot therefore counter. New collection techniques must be more
agile, capable of defeating foreign countermeasures, and better protected from exposure.
These adaptation attributes�agility, counter-D&D, and better protected sources and
methods�must be integrated into all collection R&D and into all programs, including
sensors, platforms, systems, and architectures. Otherwise, future US collection will not
succeed against determined adversaries who learn to adapt to�i.e., outsmart�the old,
much compromised, too transparent, and failing US collection paradigm.
Fl Analysis: Old Paradigm. Notwithstanding the analytical burden of significant
collection shortfalls, the essence of intelligence analysis is the ability to work
successfully in an environment of ambiguous, missing, and even contradictory
information. Better collection will improve analysis, but that is far from sufficient.
Better analysis will mainly result from stronger analytical techniques, applied in ways to
generate a wider range of hypotheses, and structured to test (evaluate, then accept or
reject) the veracity of different (hence, competing) hypotheses.
Galileo's science prevailed in the same way that Darwin's did�through careful analysis
of systematically collected data, making full use of new analytical techniques geared to
evaluate multiple hypotheses. Neither Galileo nor Darwin was prepared to make claims
that would revolutionize astronomy or biology until they were satisfied that their
techniques were producing reliable knowledge. What techniques produced such
knowledge? Science. But the scientific techniques that work so well in the physical
world are often viewed as inapplicable to intelligence. Such views may be true to a point,
but they are misleading, and paralyzing if fully believed. The issue is whether the
analytical techniques (tradecraft) that we routinely use are adequate to produce reliable
intelligence. The short answer is no, they are not.
A retrospective look at the production of intelligence on Iraqi WMD since about the mid-
1990s, including the rushed National Intelligence Estimate on the subject, would reveal
not only the impact of poor collection. It would also reveal a distinct lack of analytical
rigor. This analytical failure is seen in the insufficiently critical acceptance of (now)
questionable assumptions, and sources. It is seen in the lack of appreciation for missing
information�that is, a failure to comprehend the impact on analysis of relevant data that
we never collected�and in the woefully inadequate information base for the principal
WMD inferences made. And it is seen in the unwarranted confidence in some key
judgments that we now know cannot stand up to close scrutiny. Analytical techniques
that cannot discriminate between valid hypotheses and those that are not (i.e., between
true sentences and false sentences) are not worthy of retention in the analysts' toolkit,
nor in the intelligence production process. Given their access to better information�and
their professional responsibilities�intelligence analysts should be expected to
outperform university scholars, think tank experts, and journalists.
-38-
FOR OFFICIAL USE ONLY
�
es
es
a
es
a
a
S
S
S
S
a
a
S
a
a
a
a
a
a
a
a
a
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
0
0
�
0
0
0
0
0
0
a
a
a
a
a
a
a
a
S
a
a
S
O
Dynamic Adaptation
New Paradigm: Reliable Analysis. What would a successful analytical paradigm use? �
The unique attribute of scientific investigation, when compared with other ways of
producing knowledge, is that its techniques are self-corrective. (Epistemologists would
cite authority, habit of thought, and rationalism as three alternatives to science, i.e., as
different ways of knowing. Iraqi WMD analysis depended too heavily on these three).
All four methods can produce truth and error. But science is self-corrigible. Of course, it
may produce errors, but it also has intrinsic to its own methods the needed procedures to
discover its errors. No other way of knowing can claim this significant feature. That is
why the scientific method is the only way of knowing that' consistently produces reliable
knowledge. We need to adopt similar self-corrective techniques in analysis if we want to
produce reliable intelligence.
Intelligence analysis, even if it cannot easily mimic analytical procedures used in the
physical sciences, must seek comparably reliable knowledge-producing methods. Just as
in Galileo's time, a new analytical paradigm in intelligence must focus on developing
self-corrective techniques. Presently, the closest we get to them is the intra- or inter-
agency coordination process. The best hope for developing analytical tradecraft with the
intrinsic power of self-corrective techniques is, first, to ensure that it makes much greater
use of such quasi-scientific techniques as the Analysis of Competing Hypotheses (ACH).7
Second, we must conduct the coordination process so that it will highlight potential error
in the assumptions, facts, judgments, and conclusions of the analytical product.
Fortunately, ACH is presently taught in CIA analyst training. But it is rarely used in
practice, nor valued by managers of analysts who typically regard such techniques as
time-consuming and cumbersome production delays. Moreover, the coordination process
is often perceived as still another obstacle to production, and one to be accomplished as
quickly and as painlessly as possible. (To meet its impossibly tight deadlines, the
substantial October 2002 NW on Iraqi WMD was coordinated in a single day!) While
many appreciate the coordination process for its hypothesis-generating possibilities, too
few appreciate it for its hypothesis-testing potential. As one of the critical steps in the
analytical production process, coordination can�with ACH�provide the self-corrective
function in intelligence analysis much as empirical techniques have served science so
well since Galileo. We should do no less in intelligence.
A new analytical paradigm should also adopt a far more robust effort to improve and
integrate reliable forecasting methodologies into routine intelligence work. Better
forecasting of foreign political, military, technological, and economic trends is essential
7 See Richards J. Heuer, Jr., The Psychology of Intelligence Analysis, (CIA: Center for the Study of
Intelligence, 1999), chapter 8; and Heuer's "Limits of Intelligence Analysis," forthcoming in Orbis,
Winter, 2005. With Heuer, in emphasizing the importance of better "structuring" in analysis'
-39-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Dynamic Adaptation
to a more effective warning function; to a better understanding of new and emerging
threats and opportunities; to the development of required new approaches to collection;
and to the adaptation of US intelligence capabilities. .This is essential so that 218t century
threats do not overpower our intelligence and surprise an unprepared nation.
Counterintelligence: Old paradigm. Arguably, counterintelligence (CI) has been the
worst performing discipline in modem US intelligence. Its failures have had a far greater
impact on Foreign Intelligence than is commonly appreciated. Careful study of the worst
US spy cases (e.g., Ames, Hanssen, Hall, Pelton, Chin, Kampiles, Pollard, and Montes),
and other major penetrations of US human and technical operations, would reveal that the
quality of FT has been significantly degraded by the poor performance of CI. Many of
these failures were preventable�or their damage could have been reduced�through
better CI. It is not well understood that our CI failures have caused incalculable damage
to Fl capabilities in all collection disciplines, and even to the analytical process.
US counterintelligence has been crippled by numerous systemic failures over the years.
These include the failure to overcome such negative legacies as the excesses of CIA's
Angleton and FBI's COINTELPRO; the failure to function as a Community due to long-
standing FBI, CIA, and DOD bureaucratic parochialisms; and the failure to successfully
transition from a HUMINT-centric activity to an all-source discipline. CI has also failed
to incorporate analysis as a key function of the profession. It has failed to command the
needed resources to accomplish its vital mission, and to integrate itself into the dominant
(Fl) culture of the intelligence professional. It has also failed to develop effective leaders
owing to the lack of career services and other debilitating CI career disincentives in all
agencies. And CI has failed to comprehend its extraordinary importance to the
effectiveness of the Fl mission.
Effective CI: New Paradigm. While durably fixing CI ranks among the toughest
challenges of intelligence reform, few are discussing it today. Major structural CI
changes are required. The present CI Community organization, the National
Counterintelligence Executive (NCIX), must be significantly strengthened to exert real
authority over the CI activities of the FBI, CIA, the DOD intelligence agencies, and
others such as DOE and the national labs. The senior CI Community official (today,
NC IX) requires dramatic new budgetary, personnel, investigative, and operational
authorities. It should be brought directly under the new ND (or whatever new senior Fl
official emerges in the present reforms) with the rank and organizational wherewithal
comparable to the major intelligence agencies. Significant new authorities for CI�
spanning domestic intelligence as well�must be crafted in legislation and executive
orders. The future role of CI must be re-conceptualized not only to address its critical
relationship with Fl, but also its imperative to overcome the key systemic failures and
adverse legacies discussed above. Perhaps most importantly, the new CI must take
responsibility for significantly enhanced protection of intelligence sources and methods.
-40-
FOR OFFICIAL USE ONLY
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
C
I
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
Approved for Release: 2023/01/23 C01241738
1080009118.116������������������������������6��
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Dynamic Adaptation
In counterespionage, urgent new attention must be given to the insider threat, guided by
substantial new psychological work.8 Significant improvements in operational CI will
result from a much-enhanced priority for asset validation, including information
validation�which both require greater analyst engagement, and clearer authority over Fl
operations�and from a much-elevated role for offensive counterintelligence.
Covert Action: Old Paradigm. Covert action (CA) suffers the negative legacies of the
Bay of Pigs, Iran, Guatemala, and other instances popularly understood as CA failures. A
strong disinclination to use CA, especially if lethal, within both the policy community
and relevant agencies, has hobbled US ability to forcefully address the threats that face us
in the 21s1century. 9 Overcoming this legacy requires a new appreciation for the power
and potential of successful CA, especially given the nature of the terrorist and WMD
proliferation threats to US security and the range and depth of the growing anti-US
attitudes increasingly prevalent among the populations of the Muslim countries.10 CA
does not require a whole new paradigm, only the renewal of an earlier tradition. Less
broken than CI and Fl, it can learn as much or more from past successes as from failures.
Effective CA: Renewed Paradigm. No intelligence capability generates more
controversy than covert action. But to succeed in the 21st century, US intelligence will
require a much more effective CA capability than it has had before. It is impossible to
evaluate the long-term effects of major CA programs to turn public opinion, shape
popular attitudes towards a governing regime, galvanize opposition groups, or even
topple governments. But arguably, some CA-capable nations have enjoyed some success
at this.
Soviet "active measures" against the United States during the Cold War, for example,
enjoyed a high priority from its top political leadership and commanded considerable
resources within the KGB. According to KGB archivist Vasili Mitrokhin, the Soviets
conducted vigorous CA programs worldwide to destabilize the CIA through operations�
largely successful�to expose roughly 2000 Agency officers, and also used forgeries to
"expose" hostile CIA operations that never existed against Third World governments.
Other major Soviet CA operations focused on penetrating European peace movements to
forestall US INF deployments in the early 1980s; stirring up racial tensions within the
United States during the 1984 Olympics; spawning a worldwide disinformation campaign
that the AIDS virus was a creation of US biological warfare efforts; and the incredible
8 The preliminary efforts begun in Project SLAMMER some years ago should be revisited and much
improved.
9 See Richard Shultz, "Showstoppers: Nine Reasons Why We Never Sent Our Special Operations Forces
after Al Qaida Before 9/11," The Weekly Standard, 26 January, 2004; and Roy Godson, Dirty Tricks or
Trump Cards: US Covert Action and Counterintelligence (New Brunswick: Transaction Publishers, 2001),
pp. 64-65.
10 See the Pew Global Attitudes Project, What the World Thinks in 2002 (Washington, DC: Pew Research
Center, 2002), and Pew's Views of a Changing World (2003).
-41-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Dynamic Adaptation
"baby parts" fabrication. This story alleged that rich Americans were butchering Third
World children in order to harvest their organs for transplants. These outrageous
allegations even resulted in a successful motion in the European Parliament, introduced
by a French delegate in September 1988, condemning this trafficking in baby parts."
According to a Western scholar of intelligence, Roy Godson, covert action is an essential
policy tool. While its effects can never be measured precisely, Godson argues that CA, at
a minimum, has fared no worse than other instruments of statecraft such as public
diplomacy, economic assistance, or military force. Further, "US covert action programs
in Western Europe after World War II seriously challenged the notion that covert action
is of little value." More recently, the Soviet military withdrawal from Afghanistan and
the demise of communism in Eastern Europe were almost certainly hastened by US
efforts, secret at the time, but now largely acknowledged by key players. Specifically,
the "slow-drip" effect of Radio Free Europe and Radio Lib,erty in weakening communist
ideology has been cited in testimonials in 1990 by such East European leaders as Czech
President Vaclav Havel and other senior counterparts from Poland, Hungary, Romania,
and the former Soviet republic Estonia.12
To succeed, covert action should be conceived as a very long-term proposition and part
of a well coordinated policy. CA, moreover, cannot substitute for bad policy nor provide
an excuse for foreign adventures. It requires opportunity, of course, but also timing,
creative leadership, coordination, and plenty of self-evaluation.13 In sum, the ingredients
of CA successes necessitate a long-term, highly-classified, sustained program with clear
strategic objectives, sound infrastructure, adequate resources, and the political will to
carry it out. These features should provide the foundation for a well conceived and
substantial effort fashioned to address the present and emerging terrorist and WMD
threats to the United States. Nothing less will do. We need to apply the lessons of past
CA successes as well as failures. In light of 21st century threats, US policy and
intelligence officials must learn to re-appreciate the considerable potential that well-
conceived and properly executed CA programs represent.
11 Christopher Andrew and Vasili Mitrokin, The Sword and the Shield: The Mitrokhin Archive and the
Secret History of the KGB (New York: Basic Books, 1999), pp. 230-245. See former DCI Robert M.
Gates, From the Shadows (New York: Simon and Schuster, 1996), pp. 260-261 for discussion of the
Soviet's anti-INF campaign throughout Western Europe.
12 Roy Godson, Dirty Tricks or Trump Cards, p. 26 and 267-268 (note 70). For elaboration, see Gates,
From the Shadows, pp. 358, 450-451 on Poland, and pp. 319-321 and 348-350 on Afghanistan. Ferment in
Eastern Europe, especially Poland, was also feared as contagious by Soviet leaders at that time. As early as
1983, the Soviet leaders privately expressed great concern�justifiably, we now know�about possible
spillover effects of the Solidarity movement within the USSR. Dimensions of Civil Unrest in the Soviet
Union, National Intelligence Council Memorandum, 83-10006, April 1983, p. 20; declassified 25 Feb.
1994.
13 Godson, Dirty Tricks or Trump Cards, p. 121-127.
-42-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
1.84.000000611011000118491406116911MMOIPIPOSSAII
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Cultural Adaptation
Dynamic Adaptation
There is no discernible professional culture�an aggregate of supportive attitudes, values,
and beliefs about the intelligence profession�in the Intelligence Community. There
should be. Presently, there is only a collection of the different cultures of different
agencies, and subcultures within them, that may episodically help�but more often
impede�the common goals of the Intelligence Community. A common culture of
professionalism across the Intelligence Community will much enhance individual and
component performance within and across the Fl, CI and CA professions. All three of
these mission areas require extensive interagency engagement. Performance levels in all
three can be enhanced, or degraded, depending on how specific agency cultures and
subcultures may support or impair cross-cultural (meaning, cross-agency) cooperation.
Old Paradigm: Agency-centrism. If there is a dominant theme in the diagnosis of the
9/11 warning failure, it is the crippling deficiencies in information-sharing among
agencies. If some of the key, however fragmentary, pieces held by several agencies had
been assembled earlier, 'possibly analysts might have imagined a preview of that
terrifying September lit puzzle.14 This kind of breakdown was also at the heart of the
1941 warning failure at Pearl Harbor.15 The subsequent creation of the Central
Intelligence Agency was intended precisely to improve information sharing that had been
impaired earlier by the deeply rooted institutional reluctance within the US Army and
Navy. At bottom, that was a cultural problem in 1941 that was largely solved for a
generation with the creation of the new CIA. The fix wasn't permanent.
Cultural barriers between FBI and CIA, for example�traceable to the J. Edgar Hoover
era and remarkably persistent over the years in both agencies�impeded vital FT
information sharing in 9/11. They are also often cited as a major factor in the notably
poor CI investigations of the Ames and Hanssen cases and in others as well. Such
agency-centric parochialisms have been notoriously resistant to change, in spite of top
leadership exhortations for many years to mend them at both agencies. These are only
the most egregious examples. All intelligence agencies are afflicted with deep cultural
parochialism, in varying degrees, and efforts to build a community of intelligence
organizations can never succeed without a corresponding national effort to build a
community culture. Such a cross-agency culture can never be built unless specific
agencies are willing�or are forced, as the Goldwater-Nichols solution clearly established
for the US military�to cede key authorities and prerogatives to some central governing
or overarching supra-organization (the Joint Staff, in the case of the military).
New Paradigm: Community Professionalism. US intelligence sorely needs a culture of
the intelligence professional. Intelligence is a bona fide profession, but it lacks the
14 See 9/11 Commission Report, (note 5), chapter 8.
15 Roberta Wohlstetter, Pearl Harbor: Warning and Decision (Stanford: Stanford University Press, 1962).
-43-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Dynamic Adaptation
culture necessary to develop and sustain the required professionalism. All agencies hire
experts�language, country, and regional specialists; technical and technology
specialists; lawyers, and contract and budget specialists; and countless others. None is
hired as an intelligence professional, but each is expected to become one in due course.
Some succeed. Many do not. The expectation seems to be that, over the years and with a
little training, people hired into the intelligence profession as experts in something else
will also become experts in intelligence, and their requisite intelligence skills and values
will follow later. This expectation is naive and remains unfulfilled.
In order to establish a culture of the intelligence professional, the Community requires a
program fashioned to build the necessary attitudes, values and beliefs. Such a culture
should supersede the narrower cultures of the individual agencies. It should emphasize
the uniqueness and importance of the intelligence mission as the acquisition and analysis
of secret (i.e., denied) information by secret means, and the unwavering ethic of
protecting intelligence sources and methods. It should stress the necessity of combined
interagency efforts, including information sharing, to succeed in all missions, and the
achievement of excellence (as DCI Casey tried to foster in his time) and the intolerance
of mediocrity. And it should seek to learn from previous intelligence failures�and
successes�experienced throughout the Intelligence Community. The overwhelming
majority of intelligence officers suffer from a poor understanding of the history of their
own profession. This must change. A smart culture learns from its past.16
Establishment of a real community culture of the intelligence professional will require a
massive, long-term, education and training effort of unprecedented proportions. This can
be accomplished through the establishment of an Intelligence Community University.
Such a university will not have separate agencies as its constituent elements, but rather a
functional organization defined by mission. Addressing expert and cultural training for
the three basic missions, its three colleges would be Foreign Intelligence (large),
Counterintelligence (medium-sized), and Covert Action (small) 17 The Fl and CI
Colleges should also "cross-train" each other's students. This would help ameliorate the
unacceptable levels of CI illiteracy now found throughout the Fl population, as well as
prepare CI specialists for a much expanded role in support of Fl operations and activities.
16 "The study of paradigms," notes Thomas Kuhn "is what mainly prepares the student for membership in
the particular scientific community with which he will later practice." Kuhn (note 3), p. 11.
17 Each college would have separate schools to address its principal mission areas. For example, schools in
the H College would include Collection, Analysis, and Support (such as TPED: tasking, processing,
exploitation, and dissemination). It should also have several target-area schools such as Counter-terrorism,
and Counter-proliferation. The CI College schools would include Counter-espionage, CI for H operations,
and Offensive CI Operations. The CA College would include schools for Political-psychological
Operations, and Paramilitary Operations. The next level down would be departments. For example, the Fl
Collection School would staff departments in each of the four collection disciplines; departments in the
Analysis School would include Political Analysis, Military, S&T, and so forth.
-44-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
F
a
a
a
a
a
a
a
a
a
a
a
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Dynamic Adaptation
A key idea in the IC University concept is the organizational absence of agencies per se,
and the combined interagency training of intelligence professionals by mission area, not
by agency. The University should train for unequalled expertise in all the intelligence
professions. It should teach and train from a rich history of intelligence successes and
failures. Perhaps most importantly, it should nourish and transmit the values and ethics
of a culture of the true intelligence professional, much as the scientist descendants of
Galileo and Darwin learn the values of their own professions.
The University should also conduct a kind of "boot camp" for new entrants at all
agencies before the new entrants report aboard their agencies.. This training should help
imbue the next generation of intelligence professionals with the appropriate values and
ethics for the new Community culture requisite for the highest professionalism. Through
training and over time, The IC University's alumni will assimilate the values of the
intelligence professional, broadly defined, not the parochial identity of separate agency
employees. Its graduates will be intelligence professionals first, then regional or
technical specialists secondarily. Their intelligence professionalism will be Community-
focused, not agency-centric. To succeed, a drastic reform in career services must follow.
Institutionalizing Intelligence Adaptation
In order to achieve needed intelligence adaptation for the 21st century, the Intelligence
Community must establish a process of dynamic reinvention as the sine qua non for
future effectiveness. Broadly, such a process requires three essential elements:
� Effective forecasting of emerging threats, opportunities, and major developments�
the most likely and least likely security environments for the 21st century.
� A process for identifying needed intelligence capabilities and resources that will
provide the best match for the range of security environments forecasted.
� An institutionalized mechanism to formulate and implement sound intelligence
policies to achieve the most effective Community capabilities, optimally postured for a
changing security environment.
The first requirement�effective forecasting�can best be achieved through a substantial,
dedicated, futures-forecasting effort. Yearly analytical products should seek near-term
(1-5 years), mid-term (6-15 years), and long-term (more than 15 years) forecasts. They
should combine methodological rigor with genuine imagination and make extensive use
of non-intelligence experts and resources. Save for the fledging Futures effort at the
Sherman Kent School, and the NIC 2015 and 2020 products, this kind of forecasting is�
astonishingly�almost non-existent in the Intelligence Community It should rank among
the Community's most important processes and products. The principal customer for
these forecasts should be intelligence policymakers first, and national security
policymakers secondarily.
-45-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Dynamic Adaptation
The second requirement�linking needed IC capabilities with forecasted security
environments�is currently addressed among disparate components, including the
Community Management Staff, here and there in the Community. But this essential
function must be much more focused and explicitly integrated into capabilities planning.
Presently, future capabilities planning, to the extent that it actually occurs, seems mostly
ad hoc, is too decentralized, and does not benefit from systematic forecasting.
The third requirement�an IC policymaking process that actually formulates and
implements IC-wide policies�would be an entirely new function. The current policy
bodies (e.g., the IC Principals Committee, IC Deputies Committee, and the more
narrowly focused National Intelligence Collection Board and National Intelligence
Analysis and Production Board) are chiefly advisory and have little teeth. The new ND
(or whatever the new top intelligence chief is titled) will need a real policymaking
mechanism to govern the Community. Whatever IC policy mechanism emerges will
attend to day-to-day management issues, but the adaptation function�dynamic
reinvention�will require a dedicated policy body, with clout.
In order to achieve these goals, the Community should create a new Intelligence
Adaptation Council to monitor its posture and preparedness for threat warning, and for
understanding future security environments. Its mission should drive the adaptation
cycle, that is, ensure that the adaptation piece of intelligence policymaking is fully
functioning as an integral feature of the Intelligence Community policy and planning
process. Unlike Darwin's evolution, intelligence adaptation does not happen naturally.
The Intelligence Adaptation Council should have senior representatives from the
principal agencies and centers within the Community, from the Intelligence Community
University, and from academe and industry. It should meet yearly to review and assess
the year's forecasting products (near-, mid-, and long-term) and to evaluate the match-up
between forecasted environments and planned or needed capabilities. It will recommend
to the top intelligence official any new needed capabilities or program course corrections
(redirections, plus-ups, or terminations) that are out of synch with sound intelligence
adaptation for the emerging security environment. All major Community budgetary,
strategic, planning and policy guidance decisions will conform to the Intelligence
Adaptation Council's recommendations, or have to justify the departures.
Conclusions
Bureaucracies are better at resisting change than leading it. Not everything in US
Intelligence needs to be changed. But much of it does. Without significant structural,
functional, and cultural adaptation to 2lst century requirements, the Intelligence
Community will be hopelessly ill-equipped to identify, warn, and characterize the
complex and elusive threats we will face. Failures are assured. To ensure needed
adaptation�and to maximize the potential for greater success�adaptive mechanisms
-46-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
qpi
ea
�
�
a
a
a
a
a
a
a
a
a
a
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Dynamic Adaptation
such as the Intelligence Adaptation Council must be integrally built into intelligence
institutions and processes. To be fully effective, the Intelligence Community needs
nothing less than a full-blown paradigm shift, analogous to what Galileo and Darwin
accomplished. Neither astronomy nor biology has been the same since.
Lacking comparable intellectual giants in intelligence, our paradigm shift will be less
dependent on visionary scientists than on sound decisions and processes. To succeed, we
must:
� Prioritize adaptive collection techniques that will defeat, adversary denial and
deception and will provide analysts and policymakers with the unique value-added that
only intelligence can�the successful collection of denied information on such security
threats as terrorism and VVMD that cannot otherwise be acquired.
� Fully integrate self-corrective mechanisms into analytical processes so that
intelligence products are maximally reliable, and that intelligence can be fully trusted
as a basis for the Nation's most important policy decisions.
� Re-conceptualize counterintelligence for much-enhanced support of FT�especially
the vital, and tragically neglected, protection of sources and methods�with significantly
greater capabilities in counterespionage and intelligence validation enabled by greater CI
centralization and much expanded authorities.
� Establish a key role for covert action in the global war on terrorism and in counter-
proliferation, especially targeting regions where anti-American sentiment is strong and
growing, but can hopefully be reshaped through soundly conceived CA programs.
� Engineer a comprehensive cultural adaptation throughout the Community through a
new professional culture, facilitated by a new IC University structured to nourish the
values, ethics, and expertise worthy of the 21st century intelligence professional.
� Institutionalize dynamic reinvention through a new Intelligence Adaptation Council
that will ensure an IC adaptation cycle geared to learn and to acquire the intelligence
capabilities that the United States requires for its security in the 21st century.
Individually, accomplishment of any of these proposals would be significant. Taken
together, they could provide the basis for a paradigm shift in US intelligence. Even as
they fall short of an intelligence counterpart to Galileo's and Darwin's respective impacts
on science, they will still better posture US intelligence for the responsibilities it must
shoulder as new threats and uncertainties unfold. The dynamic adaptation paradigm as
outlined here could minimize surprise, better support national security policymakers, and
even help shape the environments to come. This paradigm should also help fashion a
new community of intelligence professionals who would elevate US intelligence
effectiveness to unprecedented levels.
-47-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
-48-
FOR OFFICIAL USE ONLY
I
a
a
I
I
I
I
a
a
a
a
a
a
a
a
I
a
a
a
a
a
a
a
a
a
a
a
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
The 2004 Galileo Awards
Honorable Mention
-49-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
-50-
FOR OFFICIAL USE ONLY
�
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
Approved for Release: 2023/01/23 C01241738
S
S
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
a
S
S
Constellation
Constellation
(kon'sta-la'shan) n. ... A brilliant gathering or assemblage.
[American Heritage Dictionary]
I. Concept
As the national leadership wrestles with how to reinvent the country's intelligence
apparatus and whether or not to rewrite the provisions of the National Security Act of
1947, one alternative reform offers continued innovation of the Intelligence Community
(IC), by the Intelligence Community, and with little disruption to the daily functioning of
the IC during a time of war. The Constellation concept envisions establishing a second
tier to the IC comprised of approximately a dozen small, interagency teams mandated by
the Director of Central Intelligence (DCI) and National Intelligence Director (NID) to
marshal the country's resources against the most difficult intelligence missions while
drawing support and expertise from the existing IC agencies. Some of the most talented
IC officers would assemble for a brief period � no more than 18 months � to devise an
operational and collection strategy to address a specific challenge and to task the IC to
carry it out. Deliberate IC use of transitory, task-oriented teams would overcome the
Community's biggest hurdle to dynamic reinvention: the wiring diagram.
Temporarily removing select IC officers from their bureaucratic components and placing
them into Constellation teams to tackle specific intelligence challenges is analogous to
the "skunk works" project undertaken by International Business Machines (IBM) in the
late 1970s that resulted in the invention of the Personal Computer. "Skunk works"
consisted of a handful of IBM's brightest and most creative employees cloistered on
Long Island, New York to create a revolution in technology. The Constellation concept
seeks to produce similar innovations in the intelligence business by removing the barriers
that divide the Community's brightest and most creative officers and placing them in an
environment to reinvent the US approach to specific threats.
The Constellation concept also resembles the DCI Task Force of the mid-1990s that
addressed the Balkans crisis and North Korean nuclear revelations, as well as Hard
Target Board Tiger Teams that continue to pursue approximately 10 hard targets
worldwide today. The critical difference between the DCI Task Force or the Hard Target
Board model and Constellation, however, lies in when and why the interagency teams
coalesce. The Constellation concept seeks to spur the IC at the first sign of an emerging
threat so that the Community can establish a creative and coherent plan to maximize IC
resources before the threat rises to the level of a crisis. The Constellation model further
� -51-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Constellation
differs from the Hard Target Board concept in another important way � in its authority to
task the IC agencies with specific actions based on its newly devised strategy.
The Constellation concept views an emerging threat as an opportunity to readdress the
IC's approach to intelligence challenges. The Constellation team would harmonize the
capabilities of CIA, DIA, NSA and the military intelligence centers like NGIC, with the
FBI, the Department of Homeland Security, DOE and other agencies, much like a
conductor would conduct an orchestra � ensuring a seamless and synergistic approach to
the challenge. In this sense, the Constellation team would be the agent for dynamic
change within the Community.
Constellation teams would best serve specific, non-traditional missions that cut across
many disciplines and agencies in the IC, and especially against hard targets � where
traditional IC efforts may have fallen short. They would not, however, serve well against
broad, strategic threats like global terrorism or the spread bf nuclear technology. Instead,
Constellation would be more tactical in focus. Examples of threats that met threshold
would include a specific al-Qa'ida plot against the United States, terrorist insurgent
activity in one of the oil-producing nations, or efforts by a single rogue nation or non-
state actor to acquire weapons of mass destruction (WMD). By focusing on this level, a
newly created Constellation team would devise a plan to task, direct and orchestrate the
intelligence agencies � and all of their assets � to penetrate the hardest targets, expose the
most elusive plans and attack the most dangerous enemies.
The Constellation model does not advocate reorganizing the intelligence agencies. Such
reforms would risk replacing current bureaucratic inefficiencies with new ones. Rather, it
seeks to harness the strength of the IC in mission-specific teams to address intelligence
challenges as they emerge. By creating these mergers on an ad hoc, mission-specific
basis � and disbanding the teams when the challenge has been met or the team's strategy
successfully has been adopted and implemented by the IC � Constellation will instill
within intelligence officers a higher standard of performance and a strong sense of
purpose.
II. Justification
A Community Divided
A close look at the wiring diagram of any agency within the IC illustrates how it is
divided against itself in its efforts to protect US interests. Officers that share similar
areas of responsibility are separated from each other by teams, branches, offices and
directorates. But the Community is further divided into a multitude of agencies, all
ostensibly sharing the same areas of focus. To respond to our nation's most pressing
security challenges, the IC needs to rethink its current organization � which will mean
-52-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Constellation
Ultimately, the lead team's efforts were validated, and it provided highly accurate
intelligence to the President and the NSC. But those accomplishments could have come
to the White House more quickly in a Constellation team. A Constellation team
addressing the same issue would have been comprised of officers from all five agencies
(CIA, NSA, NGA, DIA, ONI) and, as the mission leader within the IC, the Constellation
efforts would have been streamlined because coordination over the nation's response
would have occurred within the one team.
The Need For A New "Intelligence Officer"
By creating within the IC a small group of interagency, task-oriented teams, Constellation
would help to develop a new breed of intelligence officer. Officers that have reached the
full-performance level and have distinguished themselves among their agency peers
would be given the chance to serve as more than operations officers, reports officers,
analysts or branch chiefs. When called to serve on a Constellation team, they would step
beyond their narrowly defined role to work with their community peers on all aspects of
an intelligence issue to achieve specific national security objectives.
In a sense, Constellation would allow IC officers to enjoy the latitude and involvement in
the national security mission that some intelligence officers have in smaller services. For
example, an intelligence officer in a smaller country may be involved in clandestine
operations to counter threats to national security, but he/she may also be involved in
drafting reports and analyses of his/her work for the Policy Community. The officer may
even help to position other intelligence assets to complement the operational, reporting,
analytic or law enforcement aspects of the mission.
Within the IC, the opportunity for such a well-rounded intelligence experience is
uncommon. Instead, the relevant components of each agency tend to divide the national
effort into its component parts. Officers provide their contribution to the mission based
on their job description � much like workers on an assembly line. The level of
engagement for the individual officer, therefore, may be no greater for a critical task than
for a routine intelligence issue.
The benefits and disadvantages of each model are clear: in the United States, we have
been able to afford a complex, highly specialized officer corps, but each officer has a
very small role to play in safeguarding national security. In a smaller country, an officer
may be more of a generalist but play a much larger role in protecting his/her homeland.
In a Constellation arrangement, the IC officer can enjoy the benefits of both models � a
highly specialized corps of officers focused on a specific threat to US interests, with a
broad mandate to ensure national security.
The mission-oriented officer is the kind of officer America needs but cannot develop
through top-down agency reorganizations. Instead, by creating a fluid and dynamic array
-54-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
a
a
a
a
a
1161.116118�01.811.11.8.9111611.11.111119.1111611411111%
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Constellation
of task-oriented teams that spans the current IC structure, Constellation will encourage
officers to hone their skills within their home agencies to eventually serve a higher
calling. An intelligence officer that is encouraged to think in terms of his/her mission in
the broadest possible sense rather than in terms of a specific, routine set of duties, is more
likely to be engaged, highly motivated and creative in his/her approach to meeting the
intelligence challenges facing America today.
A Two-Tiered System Is Customer-Focused...
In addition to creating a highly focused, highly motivated and more mission-oriented
cadre of intelligence officers, Constellation makes good business sense from a customer-
focus perspective. When the NSC Director for Nonproliferation requires information on
the national response to Country X's suspected nuclear weapons program, he or she
needs a coherent and up-to-date picture of the tactical situation. Most importantly, he/she
needs to be able to make one phone call to get a complete answer. The current IC
structure requires the director to make multiple calls or levy multiple taskings, often
requiring days of waiting for a response to all of his/her questions.
In the new model, the Constellation team that is charged with attacking that specific
threat could provide answers to all of the director's questions virtually immediately.
Namely, the Constellation team would provide the policymaker:
� its operational and collection plan,
� any operational or collection achievements,
� an evaluation of its available assets,
� and its current analysis of the issue.
It is important to note that the existing agencies would still have a vital role to play in the
Constellation model as the country's institutional knowledge base and repository for
expertise. Although the NSC would direct mission-specific inquiries to the Constellation
team, it would look to the agencies to address some of the broader, related issues. The IC
agencies would provide assessments of:
� the competency of Country X's scientist cadre,
� the level of popular support for the regime,
� its current military readiness and alert status,
� and plans and intentions regarding the use of nuclear weapons.
Most important, the existing agencies would have highlighted indications of the emerging
nuclear weapons program, triggering the creation of a Constellation team to counter it.
The two-tiered system, then, would encourage much of the strategic effort to reside in the
existing intelligence agencies while the tactical response to a specific threat or emerging
issue would come from a Constellation team.
-55-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Constellation
...And Maximizes Our Greatest Resource: Our Officers
Constellation would reclaim the value of the IC's most important, yet currently
inefficiently utilized, resource. The highly motivated, imaginative and patriotic officers
that comprise the IC currently cannot serve their country as much as they would like to
because of bureaucratic impediments. A Constellation of interagency teams tackling
specific national security missions would allow intelligence officers to prove that they are
truly capable of full performance.
III. Implementation
How Constellation Would Work
Upon IC identification of an emerging threat to national security, the DCI and/or the ND
would order the creation of a Constellation team to address the threat. The DCI would
choose a Constellation team leader from one of the agencies based on the nature of the
Constellation team's mission and the agency best suited � in terms of specific focus,
resources and assets � to lead the mission. The Constellation team would enjoy a
mandate from the ND to task the agencies with any operational or collection
requirements, involving clandestine or national-level assets, to support the mission. The
team would consult regularly with the DCI and ND to ensure that its approach met the
needs of policymakers.
The length of a Constellation team assignment would vary according to the nature of the
mission and the accomplishments required of it by the DCI and the ND. Some missions
may be highly tactical in nature and require only a few months to complete. Others may
be more complex and last for a year or more. A longer mission � one that approaches 18
months � eventually might devolve into a matter for the IC to accomplish provided the
Constellation team had successfully realigned the focus of the agencies and orchestrated
their efforts to handle the task.
Dissolution of the Constellation team would occur when the team leader notified the DCI
that:
� the threat had dissipated or had been defeated,
� the intelligence warning of the threat no longer remained valid,
� the team's action plan successfully had realigned the IC to address the threat,
� or the threat had reached crisis level, meriting creation of a DCI Task Force.
In the event that the mission devolved to the IC, the leader of the disbanded Constellation
team would serve an ombudsman role, floating between the agencies to ensure the
-56-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Constellation
mission continued to proceed according to the Constellation plan and the wishes of the
DCI and ND.
How It Would Look: Small Logistics Tail
The size of a newly created Constellation team would depend upon its mission and the
assets required to fulfill the mission. Because each team can task the IC with specific
collection, operations or analysis to supplement its work, and because each mission
would be specific in focus, most teams probably would require no more than two officers
from each of the relevant agencies. A team of 20-25 officers, therefore, should be more
than enough to handle any mission and allow for staffing issues that arise during longer
assignments � like when an officer takes leave, travels or enrolls in training.
Housing the new team may prove a challenge because of the scarcity of office space in
the IC. However, because most teams probably would be 25 officers or less, finding
space to house the team may be mitigated somewhat. Another mitigating factor could be
the ability for some members of the team to participate virtually, especially if their
contribution to the Constellation team requires intensive involvement of their home
agencies. The DCI would have the discretion to place the team based on availability of
space and the needs of the DCI and ND to maintain close contact with the team.
Training The Mission-Oriented Officer...
With a team of 25 officers or less, the division of labor would be unconventional. A
Constellation team would emphasize removing the "stovepipes" that currently define
most officers' careers. Instead, a Constellation team would encourage an open-minded
approach to the problem by having reports officers help with the team's analysis, by
having collection specialists help plan the team's operations strategy and by having
analysts help review and validate available assets. This crossbreeding of officers would
include, time permitting, a smattering of one-day to one-week-long training courses,
which already are available to IC officers according to their discipline.
As officers found the time during longer Constellation assignments, they would enroll in
brief training courses to polish the new skills they developed while on the team.
Although each officer still would bring his/her own specialized skills to bear on the
team's mission, a technical collection specialist might be encouraged to take a course in
HUMINT targeting, a reports officer might enroll in a course on spotting denial and
deception in imagery analysis and an all-source analyst might enroll in an asset validation
course. One exception to the team's training opportunities would be the clandestine
service trainee curriculum, which is too involved and specialized for the putposes of
cross training. Instead, a brief tutorial in the principles of field operations would suffice
in exposing the non-case officer to the clandestine service. Through this exposure to
-57-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Constellation
other disciplines, officers that serve in Constellation teams ultimately would develop the
skills to become truly full-performance intelligence officers.
...And Creating A Tighter-Knit Community
The professional experiences and values shared by Constellation team members would
help to foster enduring personal relationships that would bring the IC closer together.
After a team had disbanded, officers would follow related issues from their home
agencies but would be more likely to contact their former Constellation teammates and
team leader to confer on further developments. The Constellation experience, therefore,
would further encourage officers to shed the narrowly defined "stovepipe" approach to
intelligence and would integrate them into a more holistic security network over the
course of their careers.
Smashing Rice Bowls
Just as Constellation would help to remove the phenomenon of the "stovepipe" by
encouraging team members to handle all aspects of the intelligence mission, it also would
remove the notion of "turf" by holding primacy within the IC on mission-specific issues.
Because of the charter from the ND, all tasking originating from a Constellation team
would carry the same weight as a direct tasking from the White House. Field officers,
managers of collection platforms and headquarters officers alike would be subject to
ND-level scrutiny in their support of the mission. This arrangement would streamline
the archaic processes involved in tasking national-level collection platforms, it would
focus agency priorities and resources, and it would ensure movement in the field.
Constellation In Action
Small, interagency teams would be able to focus IC resources on the most intractable and
immediately challenging intelligence problems far more effectively than the individual
agencies would through normal coordination. Constellation teams, therefore, would best
serve non-traditional missions that cut across many disciplines and agencies in the IC.
Indications of a sale of North Korean long-range ballistic missiles to Syria might be one
example of where a new Constellation team would take the lead. Counterproliferation
officers and other experts from CIA and DIA would contribute their experience on the
North Korean and Syrian accounts to identify targets for collection, while NGA and NSA
representatives to the team would use their intimate knowledge of national collection
platforms to propose innovative collection strategies for both countries. Military
representatives would help to coordinate airborne and shipborne collection efforts off the
coast of each country and, if necessary, support interdiction operations. ONI and
SOCOM officers may also be seconded to the team if a shipment appeared imminent and
interdiction remained an option. Meanwhile, clandestine service officers would
-58-
FOR OFFICIAL USE ONLY
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Constellation
orchestrate efforts to recruit sources with access to both countries' missile programs to
collect HUMINT to further guide the Constellation operation.
All of the IC agencies' contributions to the action plan would occur in unison under the
Constellation team's direction.
a
B
a
a
a
I
B
Another mission might involve pursuit of an al-Qa'ida affiliated terrorist cell purportedly
extracting uranium from mines in Africa. Counterterrorism officers and African
specialists would help the Constellation team identify the parties involved as well as their
vulnerabilities. Clandestine service officers and all-source 'analysts could help decide
how best to attack the problem and provide "ground truth" once the site of the activity
had been located. Depending on the Constellation team's approach, SOCOM officers
may be part of the team to coordinate a joint military-intelligence operation to disrupt the
activity. NSA and NGA officers could assist in the operation by providing continuous,
real time � or near-real time � operational intelligence on the intended target. FBI
officers and Department of Homeland Security officials would contribute to the mission
by ensuring the cell did not have a presence in the United States.
Several other potential missions undoubtedly exist for Constellation teams to pursue �
some of them perhaps more dramatic or immediately threatening to US interests. For
those missions, a "business as usual" approach could fall woefully short of ensuring
national security. In the post-9/11 world, the synergistic power of a Constellation-style
approach to security threats is a force our country should not hesitate to employ.
Courage Of Conviction
A critical element to the successful implementation of a Constellation mission will be the
courage of all intelligence officers � including the DCI and ND � to pursue aggressively
the national security mission based on imperfect information. None of the most
important national security challenges facing America today involve clear-cut
intelligence or ready-made solutions. Our adversaries are increasingly more
sophisticated in their attempts to hide their activities. As such, our leadership will need
to act on indicators vice explicit intelligence. The DCI and MD will need to be forward-
leaning in establishing Constellation teams before Country X develops a nuclear program
or Arms Dealer Y sells fissile material to al-Qa'ida if the United States is to counter such
threats sufficiently. About a dozen such teams � analogous to the Hard Target Boards �
should be sufficient to address the IC's most urgent missions without taxing the IC
infrastructure. But the transitory nature of the Constellation team should encourage the
DCI and ND to lean forward in pursuing the missions that merit focused IC attention.
The advantage to the Constellation model of IC reform is that once a threat to national
security has diminished � either because the IC has realigned its assets in accordance with
the Constellation team's strategy, or because the indicators that triggered the formation of
-59-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Constellation
a team no longer remain valid � the team can dissolve with no disruption to the IC. But
the country's leadership must be willing to allow pursuit of specific missions to counter
perceived emerging threats at their inception in order for it to maximize the value of the
Constellation model. Ultimately, effective leadership of the IC will depend upon the will
to pursue the mission before all the intelligence has been gathered and to see the mission
through until its officers are satisfied that the challenge is being, or has been, met.
IV. Conclusion
Constellation Is Nothing New.. .But Long Overdue
The concept of fusing the strengths of different components into a hybrid unit is nothing
new. We see the technique applied in agriculture through genetic enhancement of crops,
in epidemiology through the use of live viruses to create vaccines and in businesses that
create project teams under managing partners. Most importantly, however, we see it in
the organization of our most treacherous enemies and the most insidious threats to our
security.
The establishment of a fluid, flexible array of interagency teams that spans the
Intelligence Community would allow the most talented and creative officers the space to
depart from their bureaucratic stovepipes and reinvent the IC's approach to the most
important intelligence missions. In so doing, America would arm itself with a powerful
tool to immediately address threats to national security and would instill within the
intelligence officer corps a newfound sense of purpose.
-60-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
From Stovepipes to a Web
From Stovepipes to a Web: Adapting Intelink's Gated
Communities for the Networked World
The World Wide Web has given us astonishing communication abilities. We can meet
people from across the world that share our interests. We can get news information from
thousands of sources, all of it current to the minute. In under a second, a modern search
engine like Google can scan billions of documents to find exactly what we're looking for
and then make suggestions for related material. Intelink was built to do for the
Intelligence Community what the Web has done for the world: electronically connect its
members to information and to each other. But ten years after Intelink's inception, finding
analysts at other agencies is still a chore. Many of the official assessments on Intelink are
outdated soon after publication. Its search engines give users seemingly arbitrary results
that have little to do with their search terms. The information management tools used by
the Intelligence Community are years behind free technology available to the whole
world.
Intelink is managed by layers of technical directors, systems administrators, Web
designers and editors. The placement and contents of each document are approved by
several people. The network is as neatly organized and regimented as a modern military.
You would think that this devotion to order and centralization would make it a more user-
friendly version of the Web, which is a tangled mess of pages with no managed method
of publication or cooperation. Users can publish anything they want in almost any format
they choose, without going through middlemen. They can remove content as quickly as
they can publish it. It is anarchy.
But this anything-goes culture is what makes the Web so much more powerful than
Intelink. Many analysts agree that the open Web gives them more research power, a more
intuitive organization scheme and more communication capabilities than does Intelink.
This is unacceptable. If Intelink is to have the advantages of the Web--dynamic, easily
located information and a lively, interconnected community--its managers must instill in
it the culture that has given the Web these qualities. We must give analysts the same
thing that Internet users have: their own personal space on the network, where they are
free to write and publish their knowledge, ideas, thoughts and questions to personal home
pages. Only then will Intelink begin to benefit from the technical and sociological
benefits of the Web.
-61-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
From Stovepipes to a Web
Intelink's Hierarchical Culture
Intelink's technical standards are appropriately managed to stay up-to-date with the
World Wide Web's (which are set by its own standards body, the World Wide Web
Consortium). New technologies and programming languages are making information
much more manageable, and the Intelink Management Office sees that these are
implemented properly by site managers. But adopting the Web's technical standards is
not enough. Intelink must embrace the Web's fundamental democracy idea before it can
take full advantage of the technologies it implements.
Both Intelink and the open Web are organized into virtual communities of information.
Links are the critical pieces that determine which "neighborhood" a page belongs to. On
the open Web, contributors freely place links to any page they like. These pages likely
have related content, thereby creating a set of links and nodes--a web--connected by
common interests. Its chaos is a result of its democratic, decentralized governance: each
person with Internet access has a right to publish and link to anything they like. They can
belong to as many neighborhoods as they want. They can contribute expert knowledge,
learn from others or just watch in silence. The result is the most dynamic community of
people and information in the world: an American florist and a Russian gardener can
become business partners after meeting through their chess newsgroup. A Canadian
photographer learning about snorkeling can give a Jamaican scuba diver advice on
underwater cameras.
Figure 1: A figurative view of the World Wide Web. Users are allowed to link to any page
they want but will naturally build communities of information with similar pages. The better
sites receive votes of approval (in the form of links) from many pages.
FOR OFFICIAL USE ONLY
op
op
0
0
0
0
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
From Stovepipes to a Web
Intelink, however, is a "branched network." (1) Instead of a web of pages, the network
looks similar to the organization charts of the agencies involved. Finished intelligence
products are designed, coded and uploaded by nonanalysts unfamiliar with their content
and their place within the grander scheme of the Community. The result is a branched
network with very few "deep links" that cross agency domains--for instance, a DIA
analysis that links to an NSA source document. There might be more physical bridges
between DC-area intelligence agencies than there are deep links between their ic.gov
domains. So instead of being organized into communities of like content--a terrorism
neighborhood, a biological weapons borough, et cetera--Intelink is rigidly divided into
sectors of pages seen mainly for the agencies and offices that own them (Figure 2). And
the lack of deep links makes them more like several gated communities instead of an
urban cultural capital. This practice perpetuates the image of U.S. intelligence as a group
of competing agencies instead of a true community of analysts and collectors. But Figure
2 is more than just a symbol of the communication gap. It also has a serious impact on
how our computers make sense of data.
e 0 0 6 6
0 4910 ;0.'0 0 o 9
oee.',.1 ','
0 ...I 0 0 0 i� 0 ,0
' 90 0
e
01 00
e-- -
a , '6.'
op ..41
0 a
0
8'6,0
e
e.
O le
60 lei:, --a
o
o e .
4^ .140.4,606
wir.ieee 0
Figure 2: A figurative view of Intelink-SCI. Roman numerals, letters and numbers
represent directorates, offices, etc. Red Lines show how distant like pages are on
lntelink, making it harder for analysts trying to find a page buried deep within a site. It also
keeps search engines from building logical communities.
-63-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Disconnected Data...
From Stovepipes to a Web
Deep-linking is what gives modern search engines like Google their ability to make sense
of the Web and find what you're looking for. Links mean relationships. Modern search
engines judge a page's value and relevance to search queries based largely on links. When
one page links to another, a search engine's crawler assumes that the two pages have
something in common. The number of links to a certain page, the text of the link itself,
the words surrounding those links and even the number of times those links are clicked
all factor into Google's formula. Try searching for "NRO" on Intelink. You will get the
home page of the National Reconnaissance Office as the first hit--not because that's what
the page claims to be, but because many other pages on Intelink have "voted" for it by
linking the letters "NRO" to http://nro.ic.gov.
When the web of pages becomes as complex as the one shown in Figure 1, Google sees
each page as a composite of not only its words, but of the Words on all of its linked and
linking pages as well. On the Web, two communities that might seem completely
unrelated can easily find something in common. Inspired by the "six degrees of
separation" theory, which hypothesizes that every human on earth is separated by just a
few acquaintances, researchers at Notre Dame University found that the "diameter" of the
web--the maximum number of clicks to get from any Web page to another--was about 20.
(2) Just like people, the closer two pages are to each other, the more they have in
common.
The lesson is that once the virtual dots are connected, it becomes much easier to connect
logical ones. When an analyst is a few logical steps from solving a terror plot, it helps if
his web page knows the web page that knows the web page... But because of Intelink's
"gated communities" structure and lack of deep links, its search engines cannot draw
relationships between similar reports from different agencies. The link path between them
is too long for a search engine to see what they have in common (Figure 2). Computers
cannot see the connection between an FBI report on an Arizona flight school and CIA
report on student pilots in Florida--a connection that humans can only recognize in
hindsight. For the same reason, a DIA document on North Korean nuclear proliferation
will have more relevance to DIA's profile of Kim Jong-II than to NSA's own WMD
assessment.
...And Disconnected Analysts
Intelink's structure has social implications as well. Before Google and the World Wide
Web, the Internet was used solely as a way for people to directly communicate with each
other and among large groups. It cultivated communities that became as close-knit as a
suburban neighborhood. This camaraderie is nonexistent on Intelink. Its social culture is
decades behind the one available through your home computer. While sociology and
-64-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
eillaiagellittielletit01114444141.14.111111111111
� Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
� From Stovepipes to a Web
economics professors have projected the Web will mean the end of the nationstate, the
borders between Intelligence Community agencies are still strong.
� The problems of analyst-to-analyst communication are more tangible than the abstract
111 information theory discussed above. They start with a difficult interface. Finding your
way to a page is reminiscent of a maze. It usually involves guesswork as to which links to
111 follow, as there is often only one correct route through many pages. An incorrect guess
means retracing your steps.
Sometimes it seems like you're intentionally being sequestered from outside analysts.
Unlike World Wide Web pages, which usually offer an easy way to e-mail their authors,
most finished intelligence products provide nothing more than an obscure office
acronym; sometimes there's a phone number, which may or may not have a name. E-mail
addresses are rare. Even then, the address given may be for the agency's internal system,
leaving outside analysts frustrated when their e-mails are returned as undeliverable:
another dead end in their research. As for online directories, some agencies let you search
� for analysts by name only, which doesn't help when you're trying to meet new people.
Others let you search for obscure office acronyms that have an indecipherable connection
to their analytical focus, but rarely does a site let you drill down by regional and
functional specialty and pinpoint an expert. After two years at my agency, I still run into
� new people from across the community that share my focus. When I first realized that
1111 there were probably dozens of unknown analysts writing reports on my subject without
� ever asking for my opinion, they felt like competitors instead of teammates.
� What are we achieving by electronically segregating our agencies? Although
� exaggerated, Figure 2 makes it easy to understand why the entire Intelligence Community
has a communication problem. Intelink's pitfalls are most obvious during crises.
111 Scenarios change quickly, meaning that by the time an assessment has gone through the
edit and posting process, the information is already outdated. One of the problems with a
� finished product's Intelink presence is that it is "finished." The situation could change
� drastically in the days, months and years following its posting, but intelligence law
ID requires that the document's content remains the same. Analysts deserve an opportunity
to amend their past assessments, and customers should not be relegated to outdated
information. A personal home page where an analyst can write thoughts and comments
on past assessments and current crises would solve both problems. A bit of self-rule is
ID vital if Intelink is to be as dynamic and agile as the World Wide Web. Our analysts must
have a network that opens doors instead of locking them, and one that values an
intelligence product for its words, not the agency that owns it.
1111 Your Counterparts, One (Virtual) Cube Over
As an analyst, some of your teammates are in neighboring cubes. You can roll your
IP chairs into circles and discuss breaking news and coming challenges. But most of your
-65-
FOR� OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
From Stovepipes to a Web
teammates are on opposite sides of the beltway at different agencies. The only way to
share your thoughts with the whole group is to meet every several months for a
midmorning conference. This does not cultivate teamwork. Daily communication is
essential for a cooperative spirit between agencies. The best (but impossible) solution
would be to stick your counterparts into the next cube. On the other hand, analysts could
build their own online communities if given the chance. All they would need is
permission and a few megabytes of server space. Linking their products to source
documents, similar analyses and the home pages of their counterparts would let this
subcommunity of Intelink evolve into a true web of information, connecting both related
data and like-minded analysts.
Figure 3: Intelink-SCI with the beginnings of a hypothetical online community. North Korean
counterproliferation analysts have developed their own home pages and are now interlinking with
counterparts' pages and analyses, making information on the subject easier to find for both humans
and search engines. Even with just one link established, analysts at DoE are much closer to
dozens of other analysts throughout the community. Agency home pages are also linking to each
other.
-66-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
S
a
a
a
a
a
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
From Stovepipes to a Web
A fundamental rule of any information management plan is that it will work only if the
primary users support it. This is achieved by giving them tools that they're comfortable
with and use on a daily basis, and by giving them a bit of control over their information.
But past Intelligence Community programs have involved new software, training sessions
and thick instruction manuals along with costly layers of codewriters, image editors and
web designers. (3) Implementing this proposal would be so cheap and simple, it seems
closer to a policy than a project. The infrastructure and staff for an online community
already exists. All that is lacking is permission. The average analyst will require only a
few megabytes of space, allowing every analyst in the country to store their information
on a single Web server (which would ideally be under the control of a neutral body such
as the Intelink Management Office). Some agencies already provide HTML editing
software to all analysts; for the rest, word processors can easily convert documents into
HTML. When the current generation of bloggers and Instant Messagers grow up to
become the core of the Analytical Community, a self-publishing capability will not only
be expected. It will be their most comfortable form of communication. If given
permission to use it, the only thing dividing the Intelligence Community of their day will
be the Potomac River.
Endnotes
1. Watts, Duncan. Six Degrees: The Science of a Connected Age. New York: W.W.
Norton, 2003:39.
2. Albert, Reka, Hawoong Jeong and Albert-Laszlo Barabasi. "Diameter of the World
Wide Web."Nature. September 9, 1999, Volume 401: 130-131.
3. Martin, Fredrick. Top Secret Intranet: How U.S. Intelligence Built Intelink--The
World's Largest, Most Secure Network. Upper Saddle River, NJ: Prentice-Hall, 1999.
-67-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
-68-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
ISLOOSSO11118,811111111111�1�1111081Mme�emmeme
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Intelligence Information System Audit Log Analysis
Intelligence Information System Audit Log Analysis:
Transforming IC Mission Performance and Collection
Evaluation Processes
Executive Summary
Exploiting auditing software in intelligence information systems (IISs) can multiply the
productivity of Intelligence Community (IC) decisionmakers and dramatically change the
way the IC does business. Audit log software captures detailed information about analyst-
document transactions in the ITS�in effect converting the US into an automated
transaction processing system (ATPS). When combined with analyst demographic data
and document metadata in the IIS, audit log data can generate a host of new performance
metrics of value to operations, planning, programming and budget personnel throughout
the IC. Because audit log data is objective, behavioral data generated by analysts in their
daily work process about the value of documents in the HS, it can be used directly in
resource allocation processes�unlike subjective opinion survey and value scale rating
data. Widespread availability of audit log metrics opens the door to greater use of modern
quantitative management techniques, including benefit/cost analysis, operations research
and mathematical optimization approaches developed since World War II for addressing
resource allocation and investment decision problems. Use of audit log metrics in the IC
should expand dramatically because of their high value and low cost. CIA's ongoing
audit log pilot project has already established the feasibility and practicality of such
applications to intelligence problems. Similar opportunities abound within the IC and the
Community Management Staff. This paper outlines the benefits to be derived from IISs
through the use of audit log software. These benefits are real and substantial as
demonstrated in CIA's pilot audit log program. Together, the audit log technology and
its applications constitute a paradigm shift, a major change in collection evaluation,
resource allocation and future investment activities in the IC.
The Transformative Power Of Audit Log Data
Security auditing software can transform an IIS into an automated transaction
processing system (ATPS). (See box below.) A product of the information technology
revolution of the 1990s, ATPSs have been rapidly proliferating in the private sector and
provide a model for the application of audit log analysis to IISs. Figure 1 shows a typical
ITS, with the collection systems that provide the data, and the intelligence analysts who
use it. The green line from the analysts to the collection systems indicates direct
feedback from analysts to collectors about information needs and collection
-69-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Intelligence Information System Audit Log Analysis
requirements. This figure illustrates the intelligence cycle in which analysts review ITS
information, refine their information needs and provide feedback to the collectors who
adjust their activities accordingly. The information flow focuses on substantive
intelligence problems, including plans, intentions, actions and activities of key world
political figures and their countries.
Automated Transaction Processing Systems (ATPS)
Icons of the Information Technology Revolution
ATPSs have become ubiquitous in American commercial society. Supermarket ATPSs
capture essential data about a customer's interaction at the checkout counter: number of
items, amounts, prices, supplier names, customer and sales person identities, payment
methods, discounts, etc. This information is stored and forwarded to corporate data
warehouses where it is analyzed for a multitude of purposes�inventory control,
product mix and profitability studies, assessing advertising program effectiveness, new
product features evaluation and design, pricing policy, market segmentation, etc.
Similarly, ATPSs in hospitals, libraries and salesrooms capture essential information
about products and services provided at the level of individual transactions. ATPSs
have not seen widespread application in the Intelligence Community, but their
application has the potential to substantially change the way the IC does business.
Figure 1: IIS Showing Collectors and Primary Database Users
Intelligence Information
System Database
ATPSs Create High Value Data For Entirely New Customers
Figure 2 shows the operation of same IIS but with audit log data analysis fully
integrated as part of the overall system. The audit log software creates data that can
generate objective metrics on intelligence issue support and collection performance. The
audit log software automatically monitors and records individual analyst transactions
-70-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
OSSIBOSS811181111111111161141161111184811118111110111111411664414.11411
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Intelligence Information System Audit Log Analysis
Figure 2: HS Showing New Class of Customers Exploiting Audit Log Data
Analysts
Primary Database
Users
Program/Budget
Analysts
Manager
Intelligence Information
System Database
Operators/
developers
Secondary Database Users
Quality
Control
Developers
Data providers
Collection
S stems
with the documents in the HS. Transaction records are date/time stamped and include
information about the analyst, the document and the document actions taken by the
analyst.1 Figure 2 also shows audit log data--combined with analyst demographics2 and
document metadata3--going to an entirely different set of "secondary" database customers
including operators, managers, planning, programming and budget personnel of both
database subscribers and data providers. The information flow depicts analysts' use of the
data in the HS. This information flow constitutes an additional feedback loop from
analysts to collectors.
Audit log records contain the user name, document identifier, type of user-document transaction and the
date/time of the analyst transaction on the document.
2 Including user office/team, intelligence issue, analytic specialization, grade and years of experience.
3 Including collection agency, collector type, document originator, publication date, date of receipt by the
IIS; classification and document length.
-71-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Intelligence Information System Audit Log Analysis
Intelligence Value Metrics Available From ATPS Data
Because an intelligence analyst's time is at a premium, the time expended, the number and
type of transactions he/she makes with an ITS document reflects the value of that document.
The number of transactions an analyst makes on a document correlates strongly with the
likelihood he/she will cite it in finished intelligence. Audit log metrics are available for
every analyst and every intelligence report in the IIS and can be used to derive a measure of
the intelligence value for each report. Unlike most collection metrics that measure only the
quantity of reports generated by a collector, the audit log metric identifies and counts those
reports that are highly valued and identifies the analysts who benefited from those reports.
Other metrics of interest include (a) two measures of document display time, (b) number of
documents saved, (c) total number of analyst transactions�including send, export, print or
annotate transactions, and (d) the number of revisits to a document. Averages per document,
analyst, analytic group or time period may also be of interest.
Why Audit Log Data Is So Valuable
Audit log data is highly valuable because of its distinctive characteristics and attributes:
� Audit log data extraction is non-intrusive, it does not interfere with analysts' daily
work processes, and it is inexpensive to generate compared to other evaluation methods.
� Audit log data is objective, behavioral and
customer-generated. Customer based, "value-
of-output" measures like those derived from
audit log data are the "holy grail" of
program/budget analysis and resource
allocation processes. Audit log data provides
a solid basis for estimating document use,
value, quantity and timeliness from individual
data providers.
� Audit log data has numerical qualities that
permit mathematical operations essential to
program/budget and resource allocation
decisions. Unlike ordinal subjective,
categorical assessments, audit log data can be
used directly in benefit/cost and resource
allocation calculations, in contrast to opinion
survey data that merely "informs" resource
allocation decisions.
� Audit log data is voluminous4 and readily
available for every issue, analyst and
-72-
Intelligence Collection Evaluation Has
Traditionally Relied on Subjective
Opinion Data of Limited Value to
Decisionmakers
Intelligence collection evaluation efforts
have traditionally centered on labor-
intensive, intrusive surveys,
questionnaires, focus groups and
interviews which tend to provide
subjective, anecdotal evidence or
categorical ratings of system use, value,
timeliness and responsiveness to
requirements. These methods rely
primarily on analyst memory or on
impressions of what was relevant. The
rating scales employed are highly non-
linear which severely limits their use in
cost-benefit, resource allocation or
investment decision processes.
FOR OFFICIAL USE ONLY
a
I
I
a
a
a
a
a
a
a
a
a
a
a
(b)(3)
(b)(6)
a
a
S
a
�
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Intelligence Information System Audit Log Analysis
document associated with the US. Timely document-by-document value metrics present
new opportunities for collectors to improve their responsiveness to customer information
needs and a new opportunity to reduce the intelligence requirements-to-reporting cycle
time.
Audit log systems can now provide metrics and market research data to the IC that have
traditionally been available only to industry and commercial enterprises, including:
� Which groups of customers are using the HS and data from specific providers?
� When and for how long are they are using the US and each of its intelligence reports?
� What they are using the intelligence reports for?
� Which intelligence reports are most valuable?
� Which intelligence reports have very low usage or are not being accessed at all?
Audit log records represent a key untapped resource for increasing collector and decision-
maker productivity without presenting an additional workload for intelligence analysts.
IT program managers, intelligence collection managers and senior intelligence officials
who gain experience in the use of this data will find it increasingly useful to support
decisionmaking on mission and collection performance, collection system utilization and
general resource allocation. For many purposes, audit log data can supplant labor-
intensive, questionnaire-based evaluation methods. Substituting audit log analysis for
these evaluation methods, where possible, can improve the productivity of the analytic
workforce.
Uses Of Audit Log Metrics And Data
As shown in Figure 3, audit log data has a number of applications important to the
Intelligence Community at multiple levels.
-73-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Intelligence Information System Audit Log Analysis
Figure 3: Uses of Audit Log Metrics and Data in the IC
Baseline Performance trend and tracking iii1rma
against NIPF topics
NIodeling information sharing
At the DCl/IC level these applications include:
� Performance baseline, trend and tracking information on Intelligence Issue and
National Intelligence Prioritie-s Framework (NIPF) mission accomplishment. (See Figure
4 for one of many audit log metrics that can be used as baseline information.)
� Modeling the effectiveness of information sharing programs/policies among
agencies. A comprehensive audit log database could provide an objective basis for
assessing the effectiveness of information sharing and policy/legal compliance.
-74-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Intelligence Information System Audit Log Analysis
Collector 1
Collector 2
Collector 3
Collector 4
Collector 5
Collector 6
Collector 7
Collector 8
Collector 9
Collector 10
Total Number of Documents Saved, by
Source For XYZ Issue, May 2004
0 2000 4000 6000 8000 1000012000140001600018000
Figure 4: Baseline Example
Crisis Trwking Using Audi Log Figh-value Analyst D3curnent Accesses
For Typical Crisis involving Combat Forces
Oisis Period
Figure 5: Trend/Tracking
Pol-Crisis
�.�AgzocY 1
Apicy 2
A9MCY 3
--K--Agmcy4
- AWN, 5
�e� Poency 6
- AgencY
--/VaticY 8
At the Agency/Collector Level, audit log analysis has a large number of applications,
including:
� Baseline, trend and tracking information on the quality, quantity and timeliness of
collection agency support to NlPF mission areas and intelligence analysts working those
issues. (See Figure 5 above for an example of tracking the number of high value
analyst/document accesses over time for a typical crisis.) Audit records can be analyzed
for long or short time periods to discern trends, look for anomalies in usage patterns or
focus on a unique series of reports or documents. Audit log analysis can also provide
collectors with insight into source productivity, product use and value and changes over
time�especially during surge efforts and periods of crisis. Audit log analysis of RS audit
records during international conflicts, for example, can be used to assess peaks or
declines in usage as well as peaks or declines in reporting.
� Generation of timely feedback to data providers about analyst utilization and value
of their products on a report-by-report basis. If provided daily, audit log data could
significantly reduce the intelligence cycle time and improve collector responsiveness to
requirements. Audit log record analysis can likewise be targeted to specific intelligence
producers, categories of documents and groups of users. Specialized reporting for clearly
defined time periods can also be subjected to audit log analyses. Such analyses would
allow producers to focus on potential problem reporting areas and initiate corrective
actions in a timely manner. For high volume intelligence collectors, such as open source,
with a wide array of sources, audit log data may, for the first time, provide objective
measures of the value of their products to their users. This information could greatly
enhance the ability of high volume collectors to focus on customer needs, reduce
marginal and unread reporting and enhance their responsiveness to customer
requirements.
-75-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Intelligence Information System Audit Log Analysis
� Market research data characterizing the customer base to database providers in
terms of numbers of analysts, their intelligence specialization, issue affiliation and degree
of interest in their reporting.
� Determining which HS reports are
not used by any analyst. Audit log data
permits documents not accessed by any
IIS user to be easily identified and called
to the attention of the data provider. The
percent not used is an important measure
of collector performance. (See Figure 6.)
� Estimating analyst workload devoted
to information search, retrieval and review
functions on data in the IIS.
� Hypothesis Testing: Audit records
can be seen as a vast new source of
objective data with which to test
hypotheses, myths, conventional wisdom
and commonly asked questions about
many aspects of the intelligence
enterprise. Using appropriate aggregate
statistical techniques5, audit log records
can be used for: assessing the relative value of different product lines, the relative
importance of different sources, the productivity of different production processes and
detecting changes and trends over time. Audit log analysis can provide valuable data to
intelligence collectors seeking to assess the impact of their products. For example, are
analysts reading their products and, if so, which ones? Does the reporting appear to be of
value to the users? This information can be critical to intelligence-production
organizations facing serious resource constraints in meeting their responsibilities.
� Enabling benefit/cost methods: Perhaps the most important application of audit log
data is enabling greater use of benefit-cost methods in IC decision making and
investment analysis regarding future collection and processing systems. For example, the
value metrics available in audit log data can be combined with incremental cost data to
generate a set of "willingness to pay" guidelines for use in evaluating alternative
investments in future collection systems, collection architectures and system
expansion/improvement alternatives. Audit log metrics can play an important role in
anchoring subjective intelligence value judgments elicited in decision conferences for
building integrated, cost effective intelligence, surveillance and reconnaissance programs.
The abundance of objective intelligence value metrics from audit log data should also
facilitate increased use of decision-analysis and operations research methods in the IC.
Analysis
New Docurnents Accessed and Not Accessed
in April 2004 By Source
10000
20000 30000 40000 50000
Figure 6 Documents Not Used
60030
5 Chi-squared analysis, regression analysis, analysis of variance and covariance, dynamic modeling and
other data analysis techniques.
-76-
FOR OFFICIAL USE ONLY
70
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Intelligence Information System Audit Log Analysis
11
1
S
�
a
S
S
a
a
a
a
a
a
a
Audit Log Data Security
The utility of audit log data ultimately relies on the data security procedures employed by
the audit log project managers. A well-designed and executed security plan that addresses
audit log data usage, data storage and the types of manipulative strategies that will be
employed is critical to the success of any audit log data analysis program. One key
element of any security plan is identity protection. IIS audit log data normally contain
sensitive user identification data, that should be sanitized by substituting numbers or
codes for true analyst names. Audit log data on individual users should never be released
to managers or supervisors for individual user evaluation or for performance assessment
purposes. Such actions would carry the inherent risk of creating a marked change in
analyst behavior that could severely compromise audit data integrity.
CIA's Pilot Project --Pioneering ATPS Application In The Intelligence Community
-77-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Intelligence Information System Audit Log Analysis
Future Applications Of CIA's Audit Log Project
� Analyst Training
-78-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Intelligence Information System Audit Log Analysis
substantial delays. Audit log data can be used to assess the relative value of sources cited
in finished intelligence, important because cited intelligence documents differ
significantly in value and are often used for the partial or incomplete information they
contain.
ATPS Potential Applications In The Intelligence Community
And Homeland Security
� The Community Management Staff Should Establish Audit Log Standards for the
IC. Because ATPS applications are in their infancy in the IC, the Community
Management Staff should take the lead in establishing minimum audit log application
software standards. This would encompass the use of robust and flexible auditing
software in existing as well as new IISs within the IC. Without IC-wide standards, many
of the benefits of audit applications outlined below will not be fully realized because of
data incompatibilities. Auditing software, carefully designed, integrated and tested to IC
standards, will provide maximum value to senior IC leaders.
� The Community Management Staff should propose an IC-wide audit initiative to
facilitate the rapid exploitation of security auditing software as a way to improve IC
decisionmaking and the productivity of IC IISs. Not all IISs will merit the investment,
but for those larger systems that do, it would be reasonable to expect significant
improvements in the responsiveness of collectors to all-source analysts' needs as well as
the effectiveness and efficiency of collection systems. Audit log initiatives at NSA and
NGA, for example, would provide objective measures of the utilization, value and
timeliness of products generated by their systems. Audit log initiatives for IMAGERY,
SIGINT and HUMINT should be seriously considered.
� The Community Management Staff should establish an IC-wide database
consisting of the audit log data from every all-source analyst in the IC. Such a database
would enable collection evaluation and feedback data to collectors from the totality of
all-source analysts in the IC and would be extremely valuable to collection managers,
program developers and resource allocation/investment decision personnel. The
widespread use of such a database to support program initiatives and budget requests
would be expected to increase the objectivity of intelligence decisionmaking and resource
allocation processes while de-emphasizing the role of organizational politics.
� The Community Management Staff should establish a government-wide database
of audit log data on policymakers' use of finished intelligence reporting from all-
-79-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Intelligence Information System Audit Log Analysis
source analysts. Audit log records from finished intelligence reporting delivered
electronically to policymakers and intelligence consumers would be of continuing interest
to issue managers and all-source analysts.
The Community Management Staff should establish a pilot initiative to use IC
audit log data in the production of long-term Strategic IC Studies. Often criticized for
its lack of long-term historical, and strategic, future-oriented analyses, the IC could
benefit from the integration of audit log record databases from key agencies for the
production of large-scale cooperative studies. Such studies could provide the basis for a
"big picture" look at information flow, information usage and the value of the reporting
to various analytical units within the IC. It is conceivable these studies could also provide
an objective basis for future changes to improve IC information handling, sharing,
analysis and the IC organizational structure.
Audit Log Applications For Homeland Security
Audit log analysis has significant applications for information systems deployed to
enhance homeland security and improve the effectiveness of US defenses against the
threat of terrorism. With the current emphasis on increased information sharing for
Department of Homeland Security (DHS) based networks�including the Federal Bureau
of Investigation (FBI) and other key Federal agencies--a robust audit log data analysis
program could provide valuable insights into overall system usage patterns. Given the
wide variety of data available to DHS--including databases, media reporting, analysis,
mapping/imagery and the large number of data recipients (state, regional, local and
selected private-sector organizations)--a proactive audit log program would facilitate
selective targeting of key user populations to ascertain the value of online offerings.
Audit Log analysis for a variety of homeland security systems would be particularly
beneficial in view of difficulties inherent in (a) conducting valid survey or questionnaire
studies (which may often have marginal response rates), and (b) accurately polling the
diverse and geographically dispersed customer population for homeland security
information. Audit log analysis would generate data on the value of publications and
reporting, as well as provide a validated methodology for testing the usefulness and value
of new or modified offerings with selected user groups. Newly proposed homeland
security systems or those undergoing substantial hardware/software upgrades should be
designed and deployed with enhanced auditing capabilities. To be effective, homeland
security information must be accurately and effectively disseminated to those at the state,
regional, local and private sector organizations who are best equipped to act upon it.
Audit log data analysis for homeland security information systems could provide system
administrators and senior-level agency managers and policymakers with the same types
of usage and customer transaction data available through
-80-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Intelligence Information System Audit Log Analysis
Conclusion
Use of audit log record analysis, as outlined in this paper, represents a new opportunity
for IC agencies to take full advantage of rapidly accelerating advances in computer
technology. The benefits of this methodology are real and substantial as demonstrated in
the CIA pilot project. Audit log analysis and its associated applications will result in a
clear paradigm shift sparked by what we believe to be a technologically innovative
approach to collection evaluation, resource allocation and future investment activities in
the IC. The wide variety of information systems in the IC will provide a unique test bed
to further validate this methodology and to expand the technology on which it is based.
While we recognize that changes of this magnitude in large organizations often occur
slowly over time, we look forward to future Community-wide initiatives that will provide
the resources and the high level visibility to begin to foster,the development of IC
prototype efforts that can be transitioned into production level mainstream programs.
I J11101
-81-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
-82-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Rethinking Analytic Tradecraft
(b)(3)
(b)(6)
Rethinking Analytic Tradecraft
By a CIA Officer, serving undercover overseas
I. Proactive National Security
Current foreign policy exigencies and national security threats mandate a review of US
intelligence analysis, procedures, and objectives. Today's concerns are markedly
different than those that faced many senior policymakers when they were working at the
functional levels within the Intelligence Community (IC) or the broader United States
Government (USG). Developing, deploying, and exploiting technical means to monitor
known or suspected activities by specific adversaries � often with predictable modus
operandi � are very different than global threat and warning coverage against
asymmetric threats and heretofore unknown entities. For example, tracking a specific
Soviet "boomer" submarine is very different than trying to determine if a violent, anti-
American cell is forming in a basement somewhere in the world, communicating via the
Internet or transferring economic value through intangible and untraceable means.
In short, the international security playing field has changed; so must our team and its
game plan. The 1980 United States (US) gold-medal ice hockey squad probably would
not win this year's Wimbledon tournament. Those decisionmakers who trained with
slide rulers or studied communism may not be the best suited to assess tactical operations
in a world of microprocessors or events in the Horn of Africa; rather, their intellect and
foreign relations experience should be leveraged in concert with the relevant,
contemporary knowledge of their highly-qualified subordinates. Regardless of the
epithet used (e.g., "group think", received wisdom, tradecraft, tradition, standard
operating procedures, etc.), just because the USG did it that way yesterday does not
imply that it is the best plan for today.
While no USG component can be appropriately blamed for wholesale nonfeasance or
malfeasance in connection with the tragedy of 11 September 2001 (9/11), some lessons
can be learned from that harrowing experience. The Federal Bureau of Investigation
(FBI) was not trained or mandated to conduct ex ante intelligence collection on foreign
nationals or US persons. The FBI's expertise lay in post hoc, investigative skills that
were second to none, but the law forbade them from being employed without court orders
or probable cause � or possibly the lesser legal requirement of reasonable suspicion �
that a crime had been committed or was imminent. Central Intelligence Agency (CIA)
and National Security Agency (NSA) officers, on the other hand, had strict prohibitions
against collecting information about or studying US persons and purely domestic
activities. In essence, the al-Qa'ida operatives training in the US could not legally be
monitored by any USG intelligence or law enforcement entity prior to 9/11.
-83-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Rethinking Analytic Tradecraft
Some of those shortcomings have been rectified by the Patriot Act, and others are sure to
be remedied as a result of the 9/11 Commission's report and Congress's intelligence
reform bill. But those findings and their subsequent impacts will not be realized for years
to come. Reorganizing, funding, staffing, training, and mobilizing a new national or
homeland security apparatus will take years. Perhaps by 2007 or 2008, the
recommendations of the 9/11 Commission will be fully implemented and functioning. Is
one to believe that the international security playing field will not have changed again
before that time? With what certainty can Congress say that the terrorist threat will be
the primary security concern in 2010? By the time the US retroactively prepares to meet
the exigencies of 2001, the game will likely have changed again ... and the USG will be
"ready" to react once again (i.e., our revamped Wimbledon players will march onto the
pitch for a World Cup soccer game).
The last three years' experiences have shown one thing clearly: the USG is reactive in its
national security posture and thinking. The current IC structure is the result of the
National Security Act of 1947 and the Central Intelligence Act of 1949 that were passed
in the aftermath of World War II as a reaction to the Japanese attack on Pearl Harbor.
The future IC structure will be the result of new policies or statutes adopted in the
aftermath of 9/11 as a reaction to al-Qa'ida. Why does it take a new catastrophe for the
IC to contemplate and guard against such new threats? Is it a lack of intellectual
creativity or stifling bureaucratic hierarchies that prevent proactive national defense? (By
proactive national defense, let it be understood that this author does not refer to
preemptive military strikes, but to intelligence and security measures that safeguard
against the next rather than the last threat.) Why not start preparing for the unforeseen
exigencies of 2010 today?
Clearly the IC and the defense establishment have a long way to go in reinventing
themselves to be one step ahead of the next adversary. If the patriotic sacrifices and
selfless determination of our public servants in and out of uniform are a testament to this
nation's resourcefulness and capabilities, however, then there is no doubt that the
necessary objectives could be accomplished � provided that the IC's sights are pointed
in the right direction.
Such a transformation of the US security posture will require a new approach to
intelligence analysis as well as an attenuation of the American time horizon for foreign
policy and intelligence planning. Too much emphasis is placed on yesterday's failure,
the next Gallup poll, tomorrow's press briefing, and daily fluctuations of the Dow Jones.
Most Americans only think in terms of 90-day fiscal quarters, and US politicians rarely
look beyond the next presidential election. Such cultural (i.e., social, economic, and
political) limitations poorly suit a nation that is embroiled in strategic competition with
-84-
FOR OFFICIAL USE ONLY
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
a
Approved for Release: 2023/01/23 C01241738
S
S
S
S
a
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Rethinking Analytic Tradecraft
adversaries whose time horizons transcend future, or even past, generations and
centuries.1
II. Getting It Right
In order to maintain US hegemony in the global arena, the IC must systematically
embrace change, maintain a proactive posture, and reward foresight. First and foremost
amongst the necessary changes is developing a professional culture that values rectitude
above procedure. As open public discussions have illustrated, recent assessments about
(a) the existence of weapons of mass destruction (WMD) in Iraq, (b) the imminence of
nuclear conflict between India and Pakistan in late 2002, and (c) the gravity or nature of
al-Qa'ida plots against US interests in 2001 all proved wanting. The first two issues are
Boolean in nature and logically exposed to verification or falsification. The third
proposition is more complicated, but one can presume that few would argue the IC got
9/11 "right."
Received wisdom in the CIA's Directorate of Intelligence (DI) is that it is acceptable to
get the wrong answer for the right reasons. In other words, analysts are not at fault if
established tradecraft procedures and available intelligence reporting lead to inaccurate
assessments. The predominant focus in the DI is placed on official chains of review,
inter-office coordination, templates for analytic products, institutional writing style, etc.
In this author's humble opinion, nothing could be more wrong. The American public
does not pay its intelligence analysts to follow any pre-ordained playbook. Nor does it
care how many supervisors review an assessment or what rank those reviewers hold. In
many cases, additional reviewers are only farther removed from both the analytic details
and the kind of atmospherics that cannot be articulated, but which lead to useful analytic
judgments.2
What the taxpayers care about is whether or not the IC gets it right. That begs two
questions: (1) "How often is it possible to get intelligence questions right?" and (2)
1 For two examples of this cognitive incongruity, consider (i) the lack of inflective tenses in the Chinese
language and that nation's historically irredentist foreign policies, and (ii) the way in which many Arabic
males define themselves in terms of their progeny � using the moniker "Abu" � as compared to the
Western patronymics that are so prevalent in America and Europe.
2 For example, in order for IC managers to substantively review an intelligence assessment, they need to
know everything that the primary analysts read and did not read over the last few years. What they chose
not to include in the paper could be as important as what they did include. In fact, omitted reports that may
never be read by any manager could run counter to the thesis of any assessment. Second guessing the
people with the deepest knowledge on a topic can be dangerous. It leads to "group think" and static
judgments. Of course, mentoring and teamwork play a role in developing good intelligence analysts, but
the DI needs to trust its talented employees � or else hire different employees whom it is willing to trust.
Further discussion under Section III entitled "Analytic Accountability" will assuage concerns about very
inexperienced analysts being given too much authority.
-85-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Rethinking Analytic Tradecraft
"What methods lead to the most accurate results?" On the first point, the public must
understand that intelligence analysis is an art and not a perfect science. It deals with (a)
refining past or present truth from limited, conflicting, and often deceptive data, usually
without the opportunity to perform controlled experiments or measurements, and (b)
making predictions about the future.3 More realistic expectations � coupled with
vigilant efforts to produce ever-improving assessment capabilities � would go a long
way towards helping policymakers use intelligence wisely.
Switching to the second question regarding analytic methodologies, it does not matter
how you get the right answer, but it does matter if you do not get the right answer.
Indeed, the exact inverse of the DI's approach holds true. Neither the White House nor
the American public would complain if the CIA consistently and accurately predicted
future world events with a crystal ball, yet they do complain when all of the DI's formal
tradecraft procedures produce critical, wrong answers.
Clearly, a preoccupation with process turns the question upside down. Why not focus on
results? Does one deposit one's retirement savings with an investment manager who
promises to follow certain research methods, or with the one who has consistently
achieved the highest return for his investors? Does one even ask what analytic methods
the several brokerage houses' analysts use? No, most people look for a track record of
success. By eliminating attribution, and hence accountability, on most products, the DI
has lost its ability to monitor the most important metric of all, namely who is getting it
right?
What the DI really needs is a way to determine what methods or individuals produce the
most accurate assessments or predictions over time. Some commentators would counter
that that is exactly what established DI methodologies are: tried and true ways of getting
the most accurate intelligence assessments possible. Unfortunately, not only is the
current track record for those methods unsatisfactory, but the "paths not taken" are rarely,
if ever, recorded for comparison in a post hoc review. Nearly always, resource and time
limitations lead to a single course of action being selected, with all competing operations
proposals or analytic approaches being sidelined and eventually forgotten. Comparative
statistics do not work, or even exist, in the DI's monopoly environment.4
3 Perhaps .300 is a good batting average in the intelligence game, just like in baseball. Boolean questions
would obviously demand a better than .500 average that could be achieved through random guessing;
however, issues such as "Approximate the date for a possible coup in country X within one month" may
not lend themselves to very high success rates but may nonetheless be critically important to US
policymakers.
4 Several interesting CIA programs exist � such as red-cell analysis and the Strategic Assessments Group
in the DI's Office of Transnational Issues � which try to provide avenues for counter-culture viewpoints
or subject matters that are "over the horizon." This author lauds those initiatives and proposes that such
strategic and "outside-the-box" thinking be incorporated into mainstream DI intelligence assessments.
-86-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
11.
11/ FOR OFFICIAL USE ONLY
Rethinking Analytic Tradecraft
� Disagreements over substantive assessments should be resolved in favor of those with the
best record for accuracy, not based on seniority, political will or other procedural
� machinations. In certain instances (e.g., computer hacker events), a 23 year-old analyst
� just may have more apposite knowledge than the DCI himself. Reviewers can help ask
� the right questions and improve analysis, but they should not trump analytic judgments
regarding fields in which they are not pertinent intelligence experts at that time. Analytic
expertise stems from proximity to the first-order data and a proven ability to grasp and
� accurately predict substantive developments in that field.5
The rampant conflation of substance and process is the DI's greatest woe. Most of a new
DI officer's analytic training covers computer databases, templates and formats, writing
� styles, chains of review, organizational diagrams, interagency communications, and the
President's Daily Brief (PDB) process; in lieu of logic, decision and game theory,
rational choice modeling, probability, statistics, Bayesian reasoning, human psychology,
Band other heuristic methods for turning incomplete information into probabilistic
inferences. Today's world does not produce many bright line rules and red flag
intelligence reports. IC analysts should be trained to leverage the most rigorous
110 epistemological tools for augmenting human inference (i.e., deduction, induction, and
abduction) in order to analyze today's intelligence problems.6
III. Analytic Accountability
Placing an increased focus on getting it right will entail more of an onus on junior
officers to respectfully engage reviewers on issues of substantive concern. For example,
many IC assessments sink to the least common denominator of agreement amongst all
� coordinating parties and are caveated into uselessness by the ambiguous words "could,"
� "may," "might" or "possible." As the intelligence analysts responsible for a portfolio,
and most intimately familiar with the current all-source reporting, those individuals have
an obligation to resist substantive claims that they disagree with � even if there is not
"smoking gun" evidence to prove their belief. Too often junior analysts themselves
� equate lack of experience or rank with lack of relevant knowledge. Too often they
� quietly defer to senior administrators or operational colleagues who claim a monopoly on
5 Some commentators might contend that intelligence analysis does not or should not involve predictive
inference. This author would refer those critics to the overwhelming prevalence of terms such as "likely,"
"possibly," and "probably" in most DI products. The questions "What happened yesterday?", "What is
happening today?", and "What [in your expert opinion] will happen tomorrow?" are inextricably linked in
the intelligence profession. Pericles queried the oracle at Delphi; the President of the US turns to the IC.
6 To give just one recent example, the logical distinction between implications and biconditionals was
apparently lost on policymakers when certain "evidence" of nuclear weapons development in Iraq surfaced.
The identification of dual-use technologies that were necessary but not sufficient for WMD production was
somehow misconstrued (i.e., a logical proposition does not always imply its converse).
-87-
FOR OFFICIAL USE ONLY
0
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Rethinking Analytic Tradecraft
wisdom through either past experience or compartmented information. In the end,
though, all-source intelligence analysis is a unique profession with its own purpose,
duties, and required skill sets that are not fungible. Ignoring that link, or trying to replace
that specialist with a reports officer or manager, only weakens the entire intelligence
chain.
The other side of that matter, however, is that the junior analysts had better do their
homework because a track record should be kept of their assessments. Analysts should
perform analysis, not mere compilation and presentation of myriad intelligence reports
produced and vetted by others. That means making a substantive determination and
taking personal responsibility for it � just like any other skilled professional. Producing
an intelligence assessment should be taken every bit as seriously as prescribing a
medication, issuing a legal opinion, certifying an engineering survey, etc. IC analysts
must be relied upon to reach determinations about the state of affairs of the world and be
respected in their professional judgment. If the IC's management or USG's foreign
policy decisionmakers are not willing to rely on them, then that proves the irrelevance of
the analysts and argues for either (a) not employing them any more or (b) replacing
existing analysts with expert analysts who can be relied upon for their good judgment and
who are willing to stake their professional reputations � and their jobs � on those
judgments.
Looking back to the discussion in Section II above, one must question how one could
hold analysts accountable for assessments that are so inherently difficult. If one agrees
that intelligence is an imperfect art, then how can one expect even the best analysts to get
it right most of the time? The answer comes to us from decision theory and probabilistic
mathematics.
In cases of uncertainty, probabilistic judgments are themselves valuable decisionmaking
inputs. Accurately assessed, the simultaneous pursuit of two independent courses of
action that each carry a 50 percent chance of accomplishing the same objective should
yield a certain result. hi terms of intelligence analysis, the IC should expect its expert
analysts to be able to assess uncertain states of affairs with a probability coefficient.
Analysts should be judged based not on whether something happens or does not happen
but on their track record of applying correct probabilities to possible events � past,
present or future. Any event adjudged to be 100 percent likely should be expected to
happen; one-half of the events adjudged to be 50 percent likely should come to fruition.7
7 Assessments could be divided into tiers, perhaps in increments of ten percentage points, and the
respective percentage of the total number of propositions assessed to be in that tier should come to pass if
the analyst is correct. Alternatively, if not enough propositions are adjudged to make tier-wise evaluation
statistically sound, then every assessment made by each analyst could be multiplied by its associated
probability and summed in one algebraic equation. In that case, the final outputs most closely
approximating the number of all events under consideration that actually occurred could help identify the
superior analysts; although, this method of evaluation would also be imperfect due to the possibility of
-88-
FOR OFFICIAL USE ONLY
0
0
0
0
0
0
0
0
0
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Rethinking Analytic Tradecraft
Analysts over- or under-assessing the likelihood of events should be equally criticized
because accuracy is what is most important to a decisionmaker. Risk and uncertainty can
be mitigated or hedged, but inaccuracy cannot.8
Unlike intelligence collectors or analysts, the policymakers' purview is to weigh options,
consider the utility of different outcomes, and select courses of action. Rational choice
theory has incontestably shown that incomplete information (i.e., multiple, uncertain
outcomes that carry individual probabilities) is not an obstacle to effective
decisionmaking, provided that the probabilities are assessed as accurately as possible.
Despite our psychological preferences, we live in an uncertain world where few things
are known absolutely without qualification. Even the best natural scientists will admit
that their method of hypothesis, experimentation, and abduction infers models of reality
that are subject to future changes as additional information becomes available.9 if
intelligence has the objective of divining truth about world' events, why does the IC not
embrace the methods that have proven most useful and won dominance in all other fields
of human study?
Let it be the role of the intelligence analysts to assign probabilities to selected
propositions and let policymakers add the utility values to the various outcomes in the
decision function. In that way, experts in the field can speak definitively about what is or
what can be without being politicized, while elected leaders can decide what should be
and take the necessary courses of action. And in every instance, the intelligence analysts
should be professionally judged, and compensated, based on how often their assigned
probabilities match reality in retrospect. Any analyst who could consistently and
accurately state the percentage chance of events occurring would be worth her weight in
gold in Las Vegas, on Wall Street or in Washington, D.C. Good decisions do not
mandate certainty, but a good foreign policy decision calculus does mandate accurate
probability assessments.
Many intelligence officers equate their warning role with imminent danger and "FLASH"
cables; but surely, proper installation of smoke detectors is every bit as important as, if
offsetting errors. Nonetheless, the two simplified schema discussed here illustrate the type of mechanisms
that could be used to evaluate analysts' probability assessments.
8 Using this method of accountability will discourage conservatism by analysts who might otherwise
underestimate all probabilities to avoid being penalized for claiming something that later does not come to
fruition or is not verified ex post.
9 The best historical example of the evolution of imperfect models was the pre-Copernican effort amongst
geo-centrists to explain anomalous planetary locations through increasingly complex series of epicycles.
Finally, a much simpler heliocentric model was adopted in accordance with the principle of Ockham's
razor.
-89-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Rethinking Analytic Tradecraft
not more so than, a last-minute call to the fire station. The IC comprises highly educated
experts, but their judgments on future threats are rarely acted upon in tangible ways.
True, finite resources and ongoing crises mandate attention, but this author is not
convinced that several hundred thousand well-placed dollars today could not avert the
need for several million tomorrow. The ultimate questions become: (1) "Whose opinion
about the future do you listen to?" and (2) "How much credence do you put in � or
resources do you direct towards � their distant warnings?"
This Section has preoccupied itself with exploring a new method for determining an
answer to the first of those two questions. The second is a matter of public policy based
on the policymakers' aversion to the probable impact (i.e., the product of the trusted
analysts' probability coefficient multiplied by its potential negative value). An
intelligence analyst should be judged and rewarded based on her ability to accurately
assess extant or future scenarios! Elected politicians, on the other hand, should take
action to avert the outcomes that their constituencies find the most undesirable, if such is
indeed possible.
Analytic methods that worked in the 1980s may not be what works best today, so why
not use empirical evidence to prove what does work best? One can be certain that even
good strategies have finite terms of applicability (i.e., "dominance" in game theory
parlance). By holding analysts individually accountable, evaluating their assessment
records, and placing preferential value on the future assessments of those analysts with
the best performance, the IC could ensure an adaptive mechanism for producing the best
inputs for each critical decision calculus at the policy level.
Analytic accountability would also provide significant and indisputable opportunities for
performance-based compensation. One can even imagine a situation where an analyst
who had a "batting average" of .750 in the IC and saved millions of US lives could be
publicized and lauded � even under a pseudonym if necessary for security reasons � as
much as someone who can hit, throw or catch a spheroid with distinction. Until analysts
are ready to be accountable, they do not deserve that level of respect, compensation or
acclaim. Until analysts are made accountable, the IC will not get it right as often as the
American citizens deserve.
10 The actual timing of the event is immaterial for the cognitive processes involved, since, in the absence
of adequate information, something happening today about which one will only later learn is intellectually
equivalent to something that will happen tomorrow. At any point in time, an intelligence analyst is trying
to infer a truth within the present state of information, regardless of whether the subject matter is an event
in the past, present or future. Only with complete information (e.g., eyewitness accounts in the absence of
denial or deception techniques) does the tense of the proposition under study have operative value to the
analyst.
-90-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
B/11111111111111111111111111111111144444.444GIGGIGG
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Rethinking Analytic Tradecraft
IV. Meta-Level Analysis
Once the procedural focus has given way to accuracy and accountability, the question
arises as to what propositions the analysts should study and assess. Clearly, top-down
assignments from policymakers and IC managers should be included. Additionally,
analysts should review the bottom-up intelligence that is derived from HUMINT,
SIGlNT or other collection channels. Finally, analysts themselves should generate some
of their own taskings for, as the foremost experts in the field under scrutiny, they may
have the best understanding of imminent concerns. What Makes the New York Times'
front page or a CNN sound bite is not always the most critical issue for national security.
Diverting analytic resources to respond to media claims or the political issue du jour may,
in fact, be dangerous in some cases.
Intelligence failures are the result of one of four possibilities: (1) errors in inductive or
deductive reasoning in the presence of sufficient, valid information; (2) errors in vetting
inaccurate information, potentially from denial and deception efforts or genuine
ignorance by the reporting source; (3) insufficient access to accurate information; or (4)
inabilities to apply the necessary resources to matters. Items (1) and (2) obviously
represent analytic failures that are addressed by Sections II and HI above, and (3) might
be mitigated if analysts placed better requirements with collectors. Depending on the
circumstances and the nature of the target, overcoming (3) may be very difficult;
however, analysts could still try to assist in devising new human and technical collection
methods. Item (4) seemingly rests beyond the realm of analytic failure, but it actually
forms the crux of the IC's current challenge.
In a world of global information that is propagated, reproduced, and transmitted far faster
than intelligence resources � either human or financial � can be applied to process it,
failures to optimally allocate analytic resources are essentially analytic failures. The IC
needs to find ways to cut corners, otherwise it will never keep pace with tomorrow's
national security threats. There are simply not enough intelligence operatives or analysts
to assign even one minder to every potential threat. Failures to ask the right questions
due to a preoccupation with existing or past concerns can prove a fatal error.
Indeed, the very first analytic intelligence question must be "What intelligence questions
should the IC be asking?" Rather than persisting in an exclusive study of historical
targets or recent catastrophes, the DI needs to revamp its analytic tradecraft to detect the
next question that needs to be examined more closely or investigated through additional
collection efforts. The US's previous intelligence posture for warning can be likened to a
distant observer with a looking glass and a copy of Jane's Fighting Ships. He knew what
he was seeking and had a point of reference; his job was to identify the first glimmer of
the adversary's mast on the horizon. Today's world mandates a new approach more
analogous to a cadre of seismologists, chemists, biologists, physicists, economists,
-91-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Rethinking Analytic Tradecraft
statisticians, etc. � all with very sensitive instruments � standing motionless in an open
field and observing in every direction. Their objective would be to detect each and every
anomalous event and then endeavor to explain its occurrence.
America's adversaries have leveraged technology to conceal their basic actions, but they
still leave higher order � or meta-level � "footprints" of their nefarious activities.
Communications, financial transactions, and operational logistics all necessarily leave
some trail in a modern economy, and the more esoteric the activity, the more likely it is
to stand out against the background patterns (i.e., baseline data). Mathematical functions
can be analyzed to determine rates of change and other patterns, and so too can human
activities in the aggregate. Just as derivatives in calculus permit the Newtonian mind to
greatly expand its knowledge of how the natural world functions, meta-level analysis
permits the intelligence analyst to rigorously study global phenomena without even
requiring specific, first-order data (i.e., the substantive content of any particular
intelligence datum). It is time for more IC analysts to move beyond the conceptual
equivalent of arithmetic and algebra and embrace advanced methodologies in order to
detect statistical anomalies that may highlight criminal, terrorist, military, or espionage
activities. The second- and third-order derivatives of intelligence data are very difficult
to obscure in an increasingly networked world.
Interestingly, much of the desired data is already collected and processed � just not by
the IC. Investors, service providers, industry analysts, management consultants, public
relations firms, and government regulators all study the critical sectors in a modern
economy. While we live in a world that is uncertain in its specific events, we live in a
world that is highly predictable in its patterns of events. The insurance industry
produces actuarial tables on systemic events, and research scientists rely on probabilities
in the form of standard deviations." The time has come for intelligence analysis to make
better use of similar methods, and what is most required to permit such exploitation of
meta-level data is an understanding of the baseline values and states of human activity on
a global scale. As stated above, much of that information is already generated and
recorded in the private sector.12
If an anomaly were detected but not easily explained, then meta-level analysis would
suggest that the IC explore the issue further. Perhaps then, the analysts would find a
11 If anyone doubts the efficacy of these inductive methods of inference, he need merely consider the
profitability of most insurance companies and casinos.
12 Ironically, the USG trails far behind the average credit agency, insurance company, brokerage house or
online merchant in performing the role of "Big Brother." Through a combination of monetary incentives
and service-oriented tracking methods, the private sector already has far better monitoring capabilities. Just
consider the security feature offered by some credit card issuers that proactively declines charges to a card
that a would-be thief is trying to utilize in a country or region where the real customer has never traveled
before � all in real time.
-92-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Rethinking Analytic Tradecraft
sufficient explication for the anomaly, but if not, the investigation would need to continue
and more resources would need to be applied to it. This analytic posture, however,
presumes a commitment to be proactive (as discussed in Section I above) rather than
merely reactive. It means studying items of interest before they become the foci of
problems; otherwise, there will be no baseline measures and, hence, no way of detecting
anomalies when they do occur.
Meta-level analysis offers a wealth of opportunity for determining where best to apply IC
resources in an era where full-time, global coverage is simply not possible. Information
is produced, replicated, and transmitted so quickly that analysts will never again be able
to keep pace with all first-order developments. The human mind has finally become the
slowest link in the information chain. The IC must abandon its old models that proved
satisfactory in a finite information environment and adopt scientifically proven means of
analyzing inordinate amounts of data about the world.
V. Personnel Structure
The observations in this Section may not resonate with senior IC managers who do not,
or no longer, directly participate in meetings and labor on specific projects at the
functional levels within their organizations. That is because the very presence of senior
management itself necessarily dictates the nature of the meeting and restricts the likely
participants to other senior or mid-level managers. Very rarely, if ever, are senior
managers direct witnesses to the quotidian activities and basic assessments that ultimately
determine both (a) what information the senior managers themselves receive and (b) the
course of their organizations' actions and impact � or lack thereof � on US foreign
policy and world events.
The single greatest denial and deception success within the IC is the "handling" of senior
managers by division, office, and group chiefs. Many scholars of information sciences
will identify the greatest epistemological challenge as, "We do not know what we do not
know."13 Upward information management and non-existent checks and balances permit
managers to filter the very evidence that senior management uses to assess lower-level
decisions. Hence, the opportunity costs of pursuing one avenue over another � or not
pursuing any avenue at all � will never be reviewed as a matter of ordinary business.
This shortcoming is most harmful in areas where competing components have incentives
to quash each other's programs or recommendations in order to obtain increased funding
and recognition for themselves.
In the business of intelligence, making the correct assessment or choosing the right operation to
run is critical. The CIA, however, is so preoccupied with its antiquated procedures that it
13 See, for example, the work of Professor Anthony Oettinger at Harvard's Program on Information
Resources Policy. Dr. Oettinger is also the Chairman of the DCI's Intelligence Science Board.
-93-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Rethinking Analytic Tradecraft
regularly overlooks the important substance at hand. For example, only a fraction of any DI
analyst's time is actually spent making intellectual assessments. She is primarily held
accountable for properly following bureaucratic procedures and stylistic preferences, while very
little attention is paid to checking or recording the rectitude of her actual judgments.
The institutionalized inefficiency in the DI is nothing short of astounding. The extensive
rhetoric about Information Age technologies and real-time intelligence simply cannot be
reconciled with month-long coordination processes for products, habitual photocopying
by Ph.D. engineers or operational timeframes that conspicuously diverge from any
normal business activity. Although it once shared technological parity with the private
sector, the CIA is now only competitive with equally obsolescent foreign intelligence
services. As our national security threats increasingly come from non-state actors who
capitalize on real-time technologies and require operational responses from the USG that
are active on a similar timetable, the CIA's dilatory procedures will prove fatal.
The unnecessary multiplication of professionals actually further inhibits productivity by
requiring additional procedures to keep them all informed of relevant activities. This
syndrome is best exemplified by the superfluous referent and liaison positions that
separate professional working groups and impose even further delays. By comparison,
few doctors, consultants or accountants feel the need to hire go-betweens to manage their
communications with their own colleagues or clients.
The DI's inefficiency runs far deeper than bureaucratic red tape or understandably
burdensome security requirements. A brief examination of the DI's structure reveals an
organization that is almost the perfect inverse of any other professional services provider.
Most investment banks, consulting companies, engineering companies, accounting firms,
law firms, medical offices, and think tanks all strive to maximize the productivity of their
professionals by offering them every assistance and maintaining a support staff which
significantly outnumbers them. If the DI's value-added functions are researching,
writing, and briefing, then the individuals responsible for those activities should be
encouraged to spend as much time as possible doing them � not filing, photocopying,
and filling in on-line forms.
Spending more resources on skilled support staff would both increase the productivity of
case officers, analysts, and engineers and also reduce the number of expensive
professionals that are required to perform the CIA's mission. Many private sector entities
realized this economic truism and streamlined their organizations in the 1980s. The CIA
should not persist in paying computer scientists or Chinese linguists to perform clerical
tasks that a well-trained secretary can do better and more cost-effectively. Hiring highly
trained secretaries and research assistants � even at high salary levels � would
significantly increase the productivity of the expert analysts in any group. It takes both
good management and good support to render the most honey from the worker bees (i.e.,
-94-
FOR OFFICIAL USE ONLY
0
0
0
0
0
Approved for Release: 2023/01/23 C01241738
100141010101MMIOSMO9018111111111191111111111.011111111
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Rethinking Analytic Tradecraft
the analysts in this case), yet the DI under-hires and under-compensates those essential
support roles.
VI. Conclusion
Analytic tradecraft should consist of identifying future strategic threats, and added
emphasis should be placed on substantive accuracy, not process. In order to do the
preceding, those analysts with the best track records should be acknowledged, rewarded,
and more highly regarded in their future assessments, particularly on issues where
differing views are present. Moreover, many cognitive tools and methods exist that could
serve as "force multipliers" for intelligence analysts, but they require a command of
logic, mathematics, and statistics. The powerful advantages of those means should not be
underestimated or eschewed simply because they may be arcane to the bulk of
intelligence analysts who have liberal arts backgrounds. Few individuals fully
understand the intricacies of atomic fusion or fission, but most can recognize their
efficacy and impact.
By rethinking the very premises, purposes, and procedures of intelligence analysis, the DI
could regain the strategic initiative and guide the CIA and IC to a new position where it
presages new threats and prepares the USG to defend against them � all before the next
tragedy occurs. The DI must constantly evolve in order to remain a relevant and valuable
national asset.
Ironically, the DI fails to avail itself of many of the advantages of the very same liberal
democratic ideals (e.g., a free market for ideas, competition, etc.) that it espouses to
safeguard and foster around the world. The CIA's historical culture and organizational
precepts deny it the full benefits of American ingenuity and determination, even where
the inherent secrecy of the intelligence business does not mandate such limitations.
Not every question can be answered or every outcome predicted, but US intelligence
analysts should aspire to be more than a cadre of clandestine journalists. An analyst's
true value and purpose lies in her ability to correctly solve puzzles with incomplete
information and to foresee implications. While much effort is being spent to analyze
intelligence failures at present, little mention is made of the ongoing failure to ardently
pursue new intelligence successes. Inevitably, today's failure to achieve strategic
intelligence successes will manifest itself in tomorrow's acute intelligence failures.
-95-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
-96-
FOR OFFICIAL USE ONLY
111111111111111111111111111111111111%111101�
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Science and Intelligence Analysis
Science and Intelligence Analysis: The Requirement for
"Critical Thinking" Training in the Intelligence Community
Slowly, the satellite slews to the next target and begins a sequence of exposures.
Information is sent swiftly to the ground station and transferred to an analysis facility
where the data are converted into a format humans can understand and then archived to
be analyzed when convenient. The information contained in the data files is significant
to our understanding of the target of the observation.
Another day observing targets of intelligence value in a denied country? Not quite. In
this case, the telescope is observing a distant galaxy, and the analyst is an astrophysicist.
But the initial guess was a good one.
Pure scientific research�and in particular astronomical research�is, interestingly, very
similar to what the intelligence professional does on a daily basis. I first discovered this
after a very short time working on my account in the Directorate of Intelligence. I began
my professional career as a Ph.D. astrophysicist (an activity I continue today). Having
had an interest in science from an early age, the scientific method has been ingrained
deeply in my psyche.
I guess I shouldn't have been, but I was startled at how similar the analysis I was doing
for the CIA was to scientific research, and even more so to astronomical research. Even
the DI writing style is close to what we do for our scientific journals, in the "outside
world" of academia.
The Scientific Method And Critical Thinking
The scientific method is a process for understanding the universe around us that has been
developed over more than two thousand years of trial and error. The scientific method as
we know it today first started making an appearance about 350 years ago.
A thumbnail sketch of the scientific method is the following. An observation is made,
and then a hypothesis or theory is proposed to explain the observation. The theory leads
to predictions, and experiments are designed with the intent of disproving the hypothesis
and exploring the predictions. It is a common misconception that science and scientists
try to prove their hypotheses. Indeed many scientists do this�I certainly have. It is the
easier route to follow. Nonetheless, the pure scientific method is all about disproving a
theory. The experiments are planned�sometimes over many years�and are often
-97-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Science and Intelligence Analysis
accompanied by rancorous debate. But observations are eventually made and data
obtained.
If the theory is disproved, a new and better one is put forward, one that must explain all
the observations. In practice, an entire theory is rarely thrown out completely, just
modified to explain the new observations.
Ideally, many independent scientists or groups of scientists are working the same issue,
attempting to obtain data and advance knowledge. This competition is good, as it keeps
everyone moving forward and honest. Also, an observation that proves or disproves a
hypothesis needs to be validated by independent researchers to ensure that no
coincidences or errors have occurred. Only after repeatedly performing the same
experiment multiple times, in multiple independent ways, can we be certain that the
experiment is correct.
In addition, competition also means that there are multiple hypotheses advanced to
explain the same phenomenon. This is good too, as it means that the best theory wins out
over other, less successful ones. While an issue is being worked, a scientist will always
prefer multiple theories over a single one as a way to detemiine truth, even though it may
mean that the originally preferred theory does not work in the end and must be thrown
out. A researcher may be disappointed when a favored hypothesis is disproved, but in the
end, this is okay because the goal isn't to be right�it is to determine truth. A correct
theory trumps an incorrect one and is usually more interesting as well.
In the end, after numerous cycles of theory, observation/experiment, correcting the theory
and repeating this process, a number of theories may appear that explain things quite well
and have survived the brutal process of attempting to disprove them. How do we choose
which one will become the accepted theory? Well, scientific-method pioneers thought of
that too. Actually, William of Ockham, a 14th-century British Philosopher and
Franciscan monk, thought of that: Pluralitas non est ponenda sine necessitate, or,
"Plurality should not be posited without necessity." This principle is now known as
`Occam's Razor.'
What this means is that, if there are two (or more) competing theories to explain a given
phenomenon, and both (or all) of them explain the phenomenon�and everything
associated with it�equally well, the simplest theory is preferred. Or, as stated by Isaac
Newton: "We are to admit no more causes of natural things than such as are both true
and sufficient to explain their appearances."2 This is a very useful concept in science�
From, e.g., http://skepdic.com/occam.html
2 Newton, Isaac, Rule 1 of The Rules of Reasoning in Philosophy, from The Mathematical Principles of
Natural Philosophy, trans. A. Motte (London, 1729), cf. http://www.fordham.edu/halssall/mod/newton-
princ.html
-98-
4
4
4
4
4
4
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Science and Intelligence Analysis
and intelligence analysis�because without it, you can formulate Byzantinely complex
theories that explain every aspect of an observation but are so convoluted they have no
basis in reality. An example is given in Text Box 1.
So that's the scientific method in a nutshell. To be complete, however, I should add that
what I have described�observation, theory, experiment, correction of theory, new
experiment and repeat the cycle�while being what almost all scientists perform daily, is
not the ideal of the scientific method. The purest way of employing the scientific method
is theory, observation, experiment, correction of theory, new experiment, repeat cycle�
that is, the theory comes first. In practice, this is extremely difficult, however, and this
pure form of the scientific method is really only left to the geniuses among us. Einstein,
for example, postulated the Theory of General Relativity three years before his predicted
observations were made, vindicating the theory. (Another interesting thing about
geniuses is that their theories rarely need to be corrected!)
Art Exam*
An example of Occam's razor is the debate betweeri the helioceritri (
_ _ _ _
centered) and geocentric (eartli-ceritered) models the solar system. From the
_ _ . .
Greek astronomer Ptolemy, in the S ..o ii U
entury 0/ the eurrerit Era, to Nicolas
. .
Copernicus around 1500, the accepted v iew of the solar system was that the sun
. .
and all the other planets revolved around the earth. This model explained the
observations quite well, �
Welt, 1-)Itt to get Ittowork required an encirrrious amount of
coniplexity.
Copernicus proposed a different model, one where the sun was the center of the
solar system around which everything else revolved. This heliocentric model was
much simpler than the geocentric one and thus became the accepted model
Problems due to the fact that Copernicus assumed circular orbits (instead of the
true, elliptical ones) were corrected in the following centuries by Johanries Kepler
and Isaac Newton, among others.
An example of the scientific method�using General Relativity�is given in Text Box 2.
(What is provided is a very general summary of an enormous subject.) An example of
the scientific method employed for intelligence analysis is in Text Box 3.
Making a habit of employing the scientific method in analysis also encourages the use of
critical thinking�that is, not to accept observations at face value but to think actively
about them and how they fit in with the bigger picture. (It was the key to solving the
mystery of the TWA Flight 800 "missile sightings," as discussed later.) Critical thinking
-99-
FOR OFFICIAL USE ONLY
Approved for Release: 2023/01/23 C01241738
Approved for Release: 2023/01/23 C01241738
FOR OFFICIAL USE ONLY
Science and Intelligence Analysis
should be employed constantly, particularly in our everyday lives. It affords the user an
open mind, able to change and spot opportunities that wouldn't normally be apparent.
Text Box 2: Einstein's General Theory of Relativity (1915):
An Example of the Scientific Method.
thoughtFoundalion/lackground: Non-liuclidean geometry. studied 1w Riemann. was
propriate to the real world: Newton s theory not wholl applicable
in lefereneeu.,�Michelson-Money'�:,
sonic..00114t1911�..
century showed that the speed: �ol light was uniloi ui in every direction: experimental
�����:�::� � ������,�
observations showed that inertial (acceleration) and gravitational masses are
....� .� .� . . .�
. .� � ....�
�� � �. .............
�� 2 " .�
rllw lOi-aVity..:atid�aeeelerati6mare:����diff6rentitidrstiediVes:::iif
hing
� �..�� �.� ������ : � � �..������� "
��:.(EqUivalencePri6iple.)-spaceitime�CUrVtL(by�17.MattrAnt1:::::-..;nergy);�,s0rrie:�.referenc,.,��;-:.
�:�-�:fraineitiu-St�ObeynOtiBUdideangOcimetry.::::�����-�-�'
�'�� ��� ������������-������-��
����
................
���� �
�..�... .
PrediCtions.:'..7:::Sp-a0:66'.1:61.41*I.b..Y.::::inatter,afidfenprgyz:.changes.;,in* o the orbit --,:-.:,:::;..,:.i,,,,,..::.::::,,,: _.�.,
v.,.....................:,... ..............
.:MerCU"ry���arouridi:irt:(NeWto�WorilY,extilaii*�sbme:,,��of4iatigesribt:a1);�:��movmg�elbeks�.�::::::::���
... :...�.......�������... ...�.....--.....�...�......-�� ................................ :...,..........:....:_ .............,.�.,..�.�:�.7.:.�.....�...:�.........�.�...�............�..............:..,_.....,,,.�..,....:...�..�..,..�.::�,..,:�.�,.,....�.::: ..�..,..y.,.....�..:�.......�:�
�'���:haVefo�:bdtbrre4t� � �', or grawtationateffectspatkollight bowns,t1mnged,'.1T. ::-:: ������:�-,77:::�,:�:�z::�:.:�:��::.
gravitational fields: light Coming from strong �gravitational fieldshoUitthaveitS�������.:..,
.
wavelength ' ...:shifted.(gray.itatiorial?red��'hif �gand t..::.).�r...a....:vry..4...t..:Y.:::.*.4.v.P.,�������::.:�p.ao..,:;.J.::.:.,�::.:.:.:.:....:..:.:..:..,..,..,,,,...,:.�,:::.:.,�..:.....i.:,.,,......E.E.,:..:....
.... ...' 77 ::: . . '. '. .:-..:-...- - Y .: ' ''''.'::::::'::::::::. ':-:;'�'''''''''Y'1:::7:: -:;:'.--'7�4:::::::':::.:'�:.::H'I.n.::El:::.:.::.:.:::::: .:.::''.:,:r'HE:::::i:,:::,..,..f...,.,...::::. ��:.�....:::.....Ly....::::::: ,.:, .. ,:. . ,
..,',Confitining',QhSerVatinS;:f#4,lc