ANTICIPATING STRATEGIC-LEVEL SURPRISE

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
06606667
Release Decision: 
RIPPUB
Original Classification: 
U
Document Page Count: 
75
Document Creation Date: 
March 16, 2022
Document Release Date: 
September 2, 2016
Sequence Number: 
Case Number: 
F-2016-02397
Publication Date: 
January 1, 2013
File: 
Body: 
Approved for Release: 2016/08/24 C06606667 UNCL-mooiricutiry uoc VINILT IF INTELLIGENCE IN FOCUS DIRECTORATE OF INTELLIGENCE Strategic-Levelting � Surprise JANUARY 2013 CIA-DI-12-01775 ANALYTIC FRAMEWORKS FOR PRACTICAL USE UNCLASSIFIED//FoRFELcjL USE ONLY Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIL 01-1-1LAHL UJt.UIMLY Anticipating Strategic-Level Surprise JANUARY 2013 ANALYTIC FRAMEWORKS FOR PRACTICAL USE This assessment was prepared by the Office of Russian and European Analysis. It may contain copyrighted material that is for official use only. Further reproduction or dissemination of that material is subject to copyright restrictions. Comments and queries are welcome and may be directed to the Eurasia and Regional Dynamics Issue Manager, OREA, UNCLASSIFIED//FOR S L USE ONLY Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED/ FICIAL USE ONLY fable Of Contents Key Findings Scope Note Anticipating Strategic-Level Surprise: 1 Analytic Frameworks for Practical Use Introduction: Anticipating 1 Discontinuities �Why It Is Hard 1 A Typology of Surprise�An Aid to Early Recognition Type I Surprise: Sudden Hostile Action 7 7 Subtypes and Examples of Sudden Hostile Action 14 Barriers to Early Perception of Type I Surprise 17 Aids To Anticipating Type I Surprise Stealthy Surprise? Sudden Hostile Actions Using Novel Methods 74 (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) Type II Surprise: System Shock 28 (b)(3) Subtypes and Examples of 28 (b)(3) System Shock Barriers to Early Perception of 30 (b)(3) Type II Surprise Aids To Anticipating 34 (b)(3) Type II Surprise Daisy Chains of System Shocks 38 (b)(3) UNCL "-^1 z fl RI I S/ Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED/ICITTZ-8-1--Z1C AL Type III Surprise: Tectonic Transformation 39 (b)(3) Subtypes and Examples 39 (b)(3) of Tectonic Transformation Barriers to Early Perception of 42 (b)(3) Type III Surprise 42 (b)(3) Aids To Anticipating Type III Surprise "Epiphanies" as Clarifiers of Type 44 (b)(3) III Change �The Case of the Atomic Bomb Techniques Helpful in Anticipating 46 (b)(3) All Types of Surprise for Analysts 48 (b)(3) Resources Appendix A: Alternative Ways of 49 (b)(3) Categorizing Surprise Appendix B: Academic Resources on Surprise 51 (b)(3) Appendix C: Unclassified IC Training Aids 56 (b)(3) Table Of Contents UNCLASSIFIEDUF0 USE ONLY Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIE FICIAL USE ONLY Key Findings Anticipating strategic-level surprises�the sudden outbreaks of wars, revolutions, genocides, or economic calamities that affect core US interests�remains the hardest task for Intelligence Community (IC) analysts. Such surprises can include sudden hostile actions targeted at the United States or its allies, as well as unexpected developments�such as the sudden fall of a government�that are not aimed at the United States but that directly or indirectly affect US interests, for good or ill. A review of the many strategic-level surprises that have befallen all the major powers since the onset of World War II indicates recurring patterns of surprise, including in the following areas: The three types of events that tend to surprise us. The barriers to early perception and warning of these various types of surprise. The approaches and tools that can assist early recognition and warning of looming surprises (see figure 1). Type I. Sudden Hostile Action. This type of surprise involves abrupt, deliberate action by a unified actor�an armed force, a state, a terrorist cell, or a radical group�intended to disorient, defeat, or destroy an unprepared opponent. Typically concentrated in space and time, subtypes of such actions include surprise attacks, coups, diplomatic surprises, strategic power plays, military-technological surprises, or the initiation or escalation of major human rights abuses. Type II. System Shock. This type of surprise involves the abrupt failure or transformation of a complex system or set of systems, such as a state, an empire, an economy, or an international organization or alliance. The action in system shock can occur in weeks, months, or years, but it still represents a dramatic acceleration in the rate of change from the previous status quo. Type II surprises are the result of human actions but not the result of a master plan executed by any one controlling actor. Subtypes of such shocks include the popular overthrow of a ruler, the failure of a state, the onset of a genuine revolution, a deep recession or hyperinflation, the breakdown of an alliance or international body, or the outbreak of widespread communal violence. Type III. Tectonic Transformation. This type of surprise often includes sweeping nonlinear changes to an entire domain or region, such as a continental economy or a regional military balance. Unlike the first two types of surprise, it does not involve sudden, obvious change but rather large-scale, cumulative evolutionary changes that transform with gathering momentum the entire domain over a period of years or decades�along with the strategic, political, and economic systems therein. Subtypes include industrial and technological revolutions, the rise of new powers; the birth of new ideological and social movements or the transformation of existing ones, or revolutions in military affairs. These transformations disrupt the status quo, force leaders and institutions to respond, punish maladaptive systems, and often lead to further discontinuities of all types. UNCL Acciricrl"r 1'1 A I Iler Approved for Release: 2016/08/24 C06606667 �Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED// IAL USE ONLY ome barriers to early recognition of looming dangers are internal to intelligence agencies. These barriers include: IC organizational barriers to information sharing and learning; pressures for group consensus and "clean story lines," which tend to limit discussion of nonlinear or unlikely outcomes; analysts' mind-sets, biases, and cognitive limits, which weaken their ability to anticipate discontinuous changes; and a reluctance to warn for fear of crying wolf, of being wrong, of upsetting the group consensus, or of riling superiors. The following approaches, tools, and concepts may help analysts to surmount the barriers to early recognition and warning of looming discontinuities, even in cases where actionable intelligence reporting is wanting. These methods are intended to supplement�not replace�substantive expertise and sound tradecraft. Indeed, they will work most effectively when employed by teams of analytic experts. Sudden Hostile Action. Analysts can better anticipate sudden hostile action by familiarizing themselves with the strategic patterns that tend to be more conducive to surprise and by rigorously examining the incentives and motivations for would-be hostile actors, including by: dentifying historical patterns of sudden hostile action drawn from case studies of precedents that may be analogous to current strategic circumstances in some significant aspects. Evaluating how closely current situations align with the preconditions for surprise identified in scholarly literature on intelligence and strategic surprise. Getting into the heads of would-be hostile actors to assess their calculus for considering surprise in analytically sophisticated ways that avoid mirror imaging, rational actor assumptions, or caricatures. Conducting simulations, war games, and exercises to identify possible situational incentives and,pressures on adversaries to strike suddenly. Monitoring the rhetoric and vocabulary of foreign actors for signs that they are losing patience with the status quo, heralding their readiness for drastic remedies, or mobilizing followers to prepare them for sacrifice and violence. ) Brainstorming the vulnerabilities of would-be victims of sudden hostile action, via such methods as intelligence prennortems and defensive casing�critically surveying one's own defenses to assess blue force weak points, critical targets, and readiness. System Shock. IC analysts can supplement intelligence reporting on the systems and networks that they are responsible for�states, alliances, insurgencies, or economies�with concepts and approaches that bolster anticipation of the possibilities for rapid, discontinuous change, including by: Assessing the strengths and vulnerabilities of an entire system to better anticipate system shifts and tipping points; applying some basic concepts from the study of complex adaptive systems�including feedback loops, emergence, herd behavior, nonlinearity, or butterfly effects�can help. Employing far-domain analogies from the realms of science, medicine, and engineering�phase transitions, critical mass, contagion, perfect storm, brittleness, or "normal accidents"�to help conceptualize sudden, dramatic departures from a seemingly stable equilibrium in the domains of national security and economic affairs. Widening the range of imaginable outcomes via well-crafted scenarios, alternative futures, or simulations can help analysts avoid single-point predictions� the bane of sound strategic foresight. (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) iv Key Findings UNCI AssiFiFM/FnP IISF (1NI v Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIEW/F FICIAL USE ONLY Tectonic Transformation. Tectonic transformation involves such long-term, large-scale changes that traditional intelligence sources are of even less use than they are in anticipating system shocks. Instead, the following techniques can help analysts dispel the "poverty of imagination": Adopting multiframe perspectives via outside opinions, nonmainstream thinking, or new sources of data and information can provide insights besides those circulating in the usual intelligence channels, challenge the conventional wisdom, and test mainstream hypotheses. Brainstorming the core drivers or signature technologies of national, regional, or global systems and their variegated effects on other domains with a diverse group of experts across disciplines can help analysts expand the range of imaginable scenarios and boost their anticipation of transformational changes on a large-scale. Aids To Anticipating All Types of Discontinuities. For all types of looming surprise, FC analysts should scrutinize anomalous events, outlier data, and incongruous information. The initial clues of impending discontinuities�analogous to the preshocks of an earthquake�are often isolated, irregular, and ragged, but they deserve extra attention. Hunches prompted by anomalous data can be valuable prods for reexamining baseline assessments. If done on a regular basis, stability audits�analytic surveys designed to spur respondents' thinking about evolving system dynamics, possible surprises, existing assumptions, and key information gaps�can expose the weaknesses of once-stable systems and the breakdown of old analytic paradigms over time. Intelligence premortems�which postulate that an existing analytic line is wrong�can also help the IC prevent premature closure, go beyond straight line extrapolations, and brainstorm hypotheses that could better explain new or discrepant data. Integrating analysis of possible discontinuities into mainline analysis can help IC products to address a wider range of possible outcomes. Key Findings 7re44.-Q_FFICIAL USE ONLY Approved for Release: 2016/08/24C06606667 ) Type I. Sudden Hostile Action ate action by an adversary (such as a state, armed force, or ist an unprepared target CT 7.3 [U/ i 01 Type II. System Shock Abrupt failure or transformation of a complex system or set of systems (such as a state, empire, or economy) uo] Type III. Ti Sweeping changes in regional o system, ideologies and religions, so in Pearl Harbor in 1941 m Israel in the 1973 .Arab-Israeli war 11 September 2001 -ate, hostile deed by a unified actor (such as a state, armed force, 734 utionary vanguard party) aimed at disorienting, defeating, or >?ared opponent 1:3 1:3 CD . r E such as the Soviet Unions blockade of Berlin fro:in-land- � 73[948 or,.its emplacement of offensive�weapons in Cubain 1962 0- (11 2 Ise, such as Egyptian President Anwar Sadat's ouster of Soviet .1�). l972 of his yiit to Israel-in 1977 cD �so) ation cob-- Lion of mass human rights abases -P- enial (secrecy, security, stealth) and deception by an � e foe co c) Inherent unpredictability of the tipping points that lead to nonlinear cs) 0) fallacious rational actor assumptions I changes�the butterfly effect c) cs) CT cs) of actor's commitment, risk-tolerance, or bias toward action ---- � a) -4 co niation ...,- � CT Observer's tendency to make straight line extrapolations Difficulty of timing the onset of a system shock � � 4:3) cD co The widely distributed nature -V- plain sight 0 The large scale of change�im Scope, dimensions of change- assess:Warningr:indicator0,:ori:regular�baig. � Apply., 0i4p1.0(�yate th's4rialY,0 ani/fnferfsic'as'sessinerits'of actor's inea,ns, motives, and" c4S�iblettiggefor'Catal' � ig,an,d;.prerrintstertis...of wealcnesses,.,'system sni � ys,temtliat mayiiivite.npporturiisticatt4ck ; level Of political commitment, assess an a ,out e ort. ; asess strategic red lines � AntiCipate-prediCtable-sufprie,crige's caused -Bygysteiniirirespptisivene .� � :- Ltegic stability audits to identifiable -problems, .growing aiieisdefiit�'bi." to deferiordtiti" environmental conditions ' - ' Employ far-domain analogies�such as ,Phase transitions; avalanches, or. earthquakes�to examine possible tipping points � Fall of the Shah of Irariiin.1978�79" -Collapse of tornmunigifiri-Eastern Europe and Soviet Uniiinin 1989-91 Ouster of Egyptian President HOsni Mubarak in 2011 � China's economic transformatic 'Growth', oftivil rights, human r Rise pf the World Wide Web, It Emergence of political Islam Rapid transformation of a complex system or systems�a state, economy, cr or international organization�or the rapid failure of a maladaptive system (ari,3 empire, an alliance, or a war effort) � � � � � Extensive long-term changes, ft economic systems, demographic pa often culminating in an epiphany > -cs significance of change -cs Industrial revolutions cp -Eddnomietranaformatien , Emergence anew powers, dec � � 'Rise or fundamental changes4ff belief systems, such: as Marxism-I .Ouster of a'lorigtirne-politicaLruler� Outbreak Of'ciVitWar.of kCessionist niovernen Outburst of communal violence Depression,.: Supply shock, such as the�OPEC.oil�einbargb .1.73 -74 Financial panics and hyperinflations � � --Growth of social movements System complexity, chaos, and randomness :Foster acute spns4i.v.i to anpmalous occurrnes , , incongruit.ics;: anticipate in cc points 11 ff nEkanaltiercOr.SY..ste.m. drivers, ie ectrwith-WidellietWOrkof ong eranalogn4histbfiC prf oi*Ot:of RItli#,INeusiadt and App1y'mdt relevant far-domair engineering;.tich a.,tectonic chatiE Gerierdte::stenafios to expand ti � . Apply concepts systems thin] Fukiiyarna;�Samuel Huntington), 0( Joseph Schnnipeter) and strategy (1 Howard, John Keegan, Paul Kenne( 'tectonic change�technological or military innovation, economic Source: Based on a review by a senior CIA analyst of more than two dozen cases of intelligence surprise Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED//FOR rFICIAL USE ONLY [mon Figure 1 A Typology of Surprise Approved for Release: 2016/08/24 CO6606667 Cr CA) Abrupt, deliberate action by an adversary (such as a state, armed force, or `-- Abrupt failure or transformation of a complex system or set of systems (A) terrorist cell) against an unprepared target (such as a state, empire, or economy) (U/ Um Type I. Sudden Hostile Action tuft oi Type II. System Shock : � � Diplomatic surprise, such as Egyptian President Anwar Sadat's ouster of SOW 0- 'tar.), adviser's in 1972 or hisvisit to Israel in 1977 � .0 Political assassination:. CA-) . � Initiation,f M ha b JaPan'S--,attacknMPearl Harbor in 1941 - Egyo'a attack�orriarael'iri the 1973 Arab Israeli war � The attacks Of 11 September 2901' CT C.a.) [UP 1101 Type III. Tectonic Transformation' Sweeping changes in regional or global domains (such as an interstate system, ideologies and religions, societal mores, technology, or economy) Abrupt, deliberate, hostile deed by a unified actor (such as a state, armed force, terrorist cell, revolutionary vanguard party) aimed at disorienting, defeating, or destroying an unprepared opponent Fail 6fthe Shah of if79 Collapse of conamunisin. MEas:t,ern Europe and Soviet Union in 1989.-9i "--' � � Oliste.1::Of Egyptian President HOSiir Mubarak in 2011 _ Rapid transformation of a complex system or systems�a state, economy, or international organization�or the rapid failure of a maladaptive system (an empire, an alliance, or a war effort) CT Cr � Abrupt power play such as the Soviet Unions blockade of Berlin from land. � corninunicat1onS in 1946nrits emplacement of offensive weapons in Cuba in 196 ; . . _ escalation o ass man rights a uses I ,---, 0 Effective use of denial (secrecy, security, stealth) and deception by an Cr � System complexity, chaos, and randomness improvising, adaptive foe ....--�� ----, � Inherent unpredictability of the tipping points that lead to nonlinear CT � ..._.... � Mirror-imaging; fallacious rational actor assumptions 0�-) changes�the butterfly effect ....--.0 0,.) � Underestimation of actor's commitment, risk-tolerance, or bias toward action 1 � Observer's tendency to make straight line extrapolations �6, � Failure of imagination -----.... � nifirigt.;=, ' Monitor and reassess warning indicators on regular. basis eonceP4/...S_'...") � 'Conduct red ceanificirenaio assessments Of actor's means ; nionyes, ariel Approachei " opportunities to commit a sudden hostile ant. . " Ouster of a longtime political ruler Revolution � Outbreak of civil War or secessionist niciyernent Outburst of eorninunal violence- Depression Supply shock, such' as the OPEC odembargo of 1973-74 EFinancial panics and hyperinflations Difficulty of timing the onset of a system shock tfilna's economic transformation since late 1970a' GiOwthlOf civil rights human rights movements Rise of the World Wide Welo, Internet, surge of social e. � � Emergence of political Islam _Extensive long-term changes, fundamental alterations of core technologies, economic systems, demographic patterns, political allegiances, or ideologies� often culminating in an epiphany, an event that exposes the sweeping scale, significance of change � Industrial revolutions �-�;. Economic transform lions Emergence of new powers, decline of old ones' . . � _ Rise or fundamental changes of political ideologies, religions: decay of old � belief systenii, such is Marxism Leninism � Growth of social Movement's CT (a) � The widely distributed nature of bottom-up change that is hidden in plain sight CT (a) The large scale of change�impossible for an observer to monitor in entirety Scope, dimensions of change�too diverse, contingent to forecast accurately � .....��� � 'Appli, complex systems an-41y* focusing on identifYin feedback I ' CT cx.) .possible triggers, or catalysts for change. - . � . ;:'� I � ' "---"' .---... '1:� E Brainstorm possible black swans "wild cards Mat would impose � 0�-) , --, 's " ' � Defensive casing and piernortems of imaginable surprise: assess weaknesses," system shift � I . . -----.. 0vulnerabilities in systems that May invite opportunistic attacks � - .�...., � Foster acute sensitivity to anomalous occurrences, data outliers, CT :7-1----. F�Measure actor's level of political commitment, especially an all-out effort to "63 incongruities; anticipate inflection points ....--�� 0�-) bolster capabilities; assess strategic red lines .....�.... � EAhticipate predictable surprises�crises caused by System unresponsiveriei 0) : ...--...----� to identifiable problems, such as growing debts and deficits or to deteriorating'�', . Cr Cr environmental conditions I ....._........-..-� .. -----.... ,....�..,....--, Employ far-domain analogies�such as phase transitions, avalanches, or CT .....�(k). ....._.W earthquakes�to examine possible tipping points -----.... ....._, 0 Do regular strategic stability audits In most instances, the driver(s) of tectonic change�technological or military innovation, economic xpansion, and the rise of new powers or ideologies�will be widely known. However, the scale of the change nd its effects on states, organizations, and societies will not be comprehended because the consequences areas Widely distributed and their ramifications for strategy and politics are not understood or anticipated. Key Findings Cr (a) Source: Based on a review by a senior CIA analyst of more than two dozen eases of intelligence e experienced by US, British, French, Israeli, and Soviet services between 1939 and 2010. Lii ExeninecOre system drivers, identify, signature technologies; brainstorm their effects with Wide network of interdiiciplinarynxperts , - , , .. , DCpl.:Bider analogous historic precedents�employ "Thinking in Time" . concepts of Richard Neustadt and Ernest May � � 01 Apply most relevant far-domain analogies from science, medicine, or engineering, Such as tectonic change, evolution LGenerate scenarios to expand the range of imaginable future outcomes Apply conceptsnf systems thinkers in politics (for example, Francis .uyama, Samuel Huntington), economics (David Landes, Douglass North, Joseph Schumpeter) and strategy (Robert Jervis, Thomas Schelling, Michael Howard, John Keegan, Paul Kennedy) ....... �.--- ...... ..... Junta nova 12�554114DOMG020/ UNCLASSIFIED//F0 FICIAL USE ONLY vi Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED// FICIAL USE ONLY Scope Note The purpose of this training aid is to help IC analysts better anticipate major discontinuities, including surprise attacks, political upheavals, major economic dislocations, and mass human rights abuses. It assumes that clear, timely and actionable intelligence reporting before future discontinuities will�as in historical cases�remain the exception, rather than the rule, and that IC analytic teams will therefore need to supplement empirically based intelligence analysis with a variety of techniques to boost analytic anticipation of looming dangers. This training aid seeks to help analysts understand: The nature and properties of real-world discontinuities. The many cognitive and organizational barriers to strategic foresight and warning of looming discontinuities. Methods to enhance early recognition of looming discontinuities. The concepts offered in this training aid were drawn from a sabbatical on intelligence surprise undertaken in 2010 by a senior analyst in the Regional Dynamics Program, the tradecraft cell of the Office of Russia and Eurasian Analysis in CIA's Directorate of Intelligence. The analyst conducted an in-depth study of more than two dozen cases of intelligence surprise affecting all the great powers since the onset of World War II across all domains�strategic, diplomatic, political, economic and technological. The author also reviewed many of the keystone academic studies of intelligence surprise published since the appearance in 1962 of Roberta Wohlstetter's classic work, Pearl Harbor: Warning and Decision, which ushered in the modern field of intelligence studies. This training aid focuses on practical applications and tools that analysts, working alone or in small teams, can employ to better anticipate discontinuities, particularly in cases where accurate, timely reporting on warning indicators is scarce. It does not address quantitative models that Can help predict the likelihood of outlier outcomes. It is unclassified to broaden its availability. UNCL A CCICIE'lli/Cr�in I AI 11C.L. Rh Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 Introduction Gunmen of the Egyptian Islamic Jihad fire into the reviewing stand, killing Egyptian President Anwar Sadat and 11 other Egyptian and foreign officials and wounding 28 more during a military parade on 6 October 1981. Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED FFICIAL USE ONLY Anticipating Strategic-Level Surprise: Analytic Frameworks for Practical Use Anticipating major discontinuities�sudden outbreaks of wars, surprise attacks, revolutions, genocides, diplomatic reversals, or economic calamities�remains the hardest job for Intelligence Community (IC) analysts. Historically, the inability of collectors and analysts to persuasively warn of looming dangers has been the precondition for most cases of intelligence surprise. The purpose of this training aid is to help IC analysts in the trenches to anticipate discontinuities and thereby reduce the risks of future surprises and intelligence failures. The paper begins with a discussion of the numerous barriers to analytic perception and warning of major discontinuities. It then offers a typology of intelligence surprise, discusses three key classes of surprise in depth, and suggests ways for IC analysts and managers to anticipate surprise. Introduction: Anticipating Discontinuities�Why It Is Hard Major discontinuities in any one domain or geographic region are rare events. Even dynamic open systems�the global balance of power, a regional economy, or a political order�will usually exhibit considerable continuity, inertia, and only incremental changes over the short and medium terms. As a result, most analytic accounts on a day-to-day basis will exhibit a fair amount of orderliness, predictability, and only modest, incremental change. Analysts seeking a baseline understanding of their account will often treat these "typical" periods as ones of "normalcy." These periods of normalcy, which may have begun long before an analyst started following an account, will often habituate analysts to see what they expettla-�ee�continued normalcy, defined as gradual incremental changes in their areas of responsibility. This tendency to expect the status quo in the near and medium terms is compounded by cognitive habits. Experiments from cognitive psychologists suggest that most people have a deep-seated need to perceive the world as orderly, comprehensible, and predictable. � Moreover, evidence of impending discontinuities is usually sparse and in some, cases never appears at all. Even if such evidence is received, it usually appears noteworthy only in hindsight. Before the event, such clues�if they are observed at all�tend to be obscure, irregularly timed, and inconsistent with or even contradictory to most of the other incoming data. Such clues often come as "weak signals" and are hard to discern from the other "noise" that overwhelms most analytic systems. � As a result of these tendencies, analysts may not be in the appropriate analytic posture for recognizing or reacting when their account or issue is at increasing risk of a "phase transition"�a rapid shift from peace to war, stability to instability, order to disorder, popular apathy to public engagement�that is, from predictability to unpredictability. A Typology of Surprise�An Aid to Early Recognition The typology of intelligence surprise discussed in this paper is designed to help intelligence analysts identify looming discontinuities early on. Based on an extensive review of historical cases and academic UNC17777rITI111-F-fi-P-4.Z.E.L1IAI IISF CINI v Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFI OFFICIAL USE ONLY Discontinuity, Surprise, and Warning Definitions The discussion in this paper refers to a series of related terms. A discontinuity is a rapid increase in the rate, scale, or scope of change�or a sudden shift in its direction�in any country or region or in any field relevant to US national interests. It can include events targeted at US interests as well as events not aimed at the United States but that significantly affect it, such as the sudden onset of instability in the Arab world in 2011 or the collapse of the Soviet bloc beginning in 1989. Examples of discontinuities include the following: � A surprise attack on the US Homeland or on US forces or targets at home or abroad. � The sudden departure from power of a key national leader or collapse of a government for any reason. �r�rhe outbreak or sudden escalation of widespread human rights abuses or a genocide campaign. Surprise is the jolt that an analyst, an intelligence service, or an unprepared government experiences in the face of unexpected, often dangerous, new developments that confound one's assumptions, expectations, and strategy. Examples of the jarring disorientation that can ensue as a result of a discontinuity include the following: The surprise attacks on France, the Soviet Union, and the United States early in World War II and al-Qacida's attacks on US targets, starting in 1998. The fall of the Shah of Iran in 1978-79 and the swift ousters in 2011 of President Ben Ali from Tunisia and President Hosni Mubarak from Egypt. The onset of the global financial crisis�with all its attendant effects on politics, society, and strategic events worldwide�starting in 2008. Surprise can be positive if the discontinuity is beneficial to US interests, as was the collapse of communist rule in Eastern Europe and the Soviet Union. However, even if the event is favorable to US interests, lack of advanced notification from the IC is still a bad outcome because it leaves US policymakers less prepared to take advantage of opportunities than they would have been if they had been expecting it. Warning�a core IC mission�is the clear, convincing, accurate, and timely notification of policymakers of a threatening or potentially dangerous development. Persuasive strategic warning convinces policymakers of the existence and gravity of the looming event. Timely warning gives policymakers the opportunity to deliberate on the issue, decide on a course of action, and implement it in time to avert the danger or�should it occur anyway�to mitigate the damage to US interests. An intelligence failure is the label often given to episodes in which the IC did not provide policymakers with adequaie warning of events�often discontinuities�that gravely damaged US interests. Examples include the Pearl Harbor attack in 1941; the USSR's detonation of an atomic bomb in 1949, five years before CIA weapons analysts estimated that it was possible; North Korea's invasion of South Korea and communist China's intervention in the Korean war in 1950; the outbreaks of the Arab- Israeli wars; the fall of friendly governments in Iraq (1958) and Iran (1978-79); the Warsaw Pact invasion of Czechoslovakia in 1968; the Rwandan genocide in 1994; and the attacks of 11 September 2001. In some of these cases, policymakers had, in fact, not received warnings from the IC; in others, policymakers judged that they had not been adequately warned�as then Secretary of State Henry Kissinger publicly claimed after the 1973 Arab-Israeli war�because the warnings that they received were poorly sourced, ambiguous, or not emphasized repeatedly. 2 JAN 13 OREA 12-304INDD(462646) Introduction uNci Accirirniirno 1AI IICC Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIEDi7trQ..FFIClAL USE ONLY writings, it breaks intelligence surprise into three types, based on the essence and origins of that type of surprise: sudden hostile action, system shock, and the effects of tectonic transformation. The goal is to improve analysts' foresight of discontinuities by bolstering understanding of the types, patterns, and diversity of discontinuous change, based on previous historical examples. Each section's accompanying matrix examines five aspects to each of these surprise types (see appendix A for other ways of classifying surprise). Classic examples of that type of discontinuity. The essence of that type of discontinuity. Various subtype's of that discontinuity. � � Barriers to early perception, which can differ based on the nature of the surprise involved. Concrete measures that can help analysts better anticipate discontinuities. This typology does not imply that there is always a clear division between the various categories of surprise or that they only occur in isolation. In major upheavals, multiple types of surprise are typically in play, making the task of analysis even harder. Foresight Based on Early Pattern Recognition Educating analysts about past patterns of surprise can help them anticipate future discontinuities. The Recognition-Primed Model (RPM) of rapid decisionmaking�first described in the 1980s by behavioral scientist Gary Klein� suggests that humans by default react to new situations by trying to put them in a more familiar context. They do this by recognizing�based on prior experiences and expertise�the similarities between the current situation and past ones with which they are familiar. Critical to this effort is acquiring rapid situational awareness, which can only be based on an expert's sensitivity to relevant cues and expectations about how the situation might evolve, derived from extensive prior experiences with roughly similar but rarely identical problem types. The RPM model suggests that familiarizing analysts with past categories and patterns of surprise can increase the speed with which they recognize emerging crises that could lead to future discontinuities, thereby increasing the odds of early assessment and warning. EIMMIVIE,MEITILIT=.q.MCMCLUMIZZYZ�71MMIL Introduction UNCL C'C""E"-1 ilor Approved for Release: 2016/08/24 C06606667 �Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED// ICIAL USE ONLY The Overlapping Nature Of Surprise: The Case Of Cuba The events leading up to the Cuban Missile Crisis in the fall of 1962 demonstrate the multiple, overlapping dimensions of surprise that frequently precipitate major crises and geopolitical upheavals. The long-term changes that created the preconditions for the crisis are all examples of Type III surprises, Tectonic Transformations. They include the rise of the Marxist-Leninist ideology that inspired Nikita Khrushchev and Fidel Castro; the growth of Soviet power in the middle of the 20th century; the onset of the Cold War; the revolutions in physics, engineering, and weaponry that led to the development of ballistic missiles armed with nuclear warheads; and the spread of radical, anti-US nationalism in Cuba and Latin America in the 1950s and early 1960s. The rapid crumbling of Fulgencio Batista's dictatorship to a radical insurgent movement under Castro's control in late 1958 was a Type II surprise, System Shock, that reverberated throughout Latin America for decades. The Soviet effort to covertly emplace nuclear weapons in Cuba, which escalated into the most dangerous crisis of the Cold War, was a Type I surprise, Sudden Hostile Action�a strategic power play that Soviet leader Khrushchev intended as a fait accompli to spring on the United States and the world as soon as the missiles were operational. Agency T Hughes of the Defense Intelligence gency briefs Secretary of Defense Robert McNamara and reporters in February 1963 on US intelligence on the Soviet deployment of nuclear weapons to Cuba and their subsequent withdrawal in the fall of 1962. JAN 13 OREA 12-305IND13(462647) Introduction UNC' 1-.1A I /-*/111%, Approved for Release: 2016/08/24 C06606667 �. Approved for Release: 2016/08/24 C06606667 UNCLAssiHEwiF IAL USE ONLY "El.5 c.) =1 C.) a� CL) I CD I -a = =1 Checklist A Checklist on Anticipating Discontinuities in My AOR: A 10 +1 Point Inspection Plan Page 1 of 2 1 4 actoJp,trr,1 otivations azdf�tiiiibns for SuddenrHostile:AciroitiWho are the:ektiethe alpha area of orisileaders who,are'fiXate to the point' s24:Stp!.$Xif, -only via extreme are tolerant of apabilities and Plans for Sudden Hostile Action. Are any actors�states or subnational groups�developing the capacity for sudden hostile action? Do they now possess such capabilities? Are any such actors making a maximal effort to acquire the means for a strategic strike against their enemies? Are there signs or clues that they are undertaking a major denial and deception effort to conceal these efforts? Escalation Potential. Are there opportunities foisudd�hostile action? Are there one or others.,s more enduring belligerent , the trategic red lines? Has a state been weakened by internal factors or foreign pressure in ways that make it vulnerable to surprise attack? How vulnerable are k yAOR? Do they possess single wivalries or frozen conflicts in my AOR? Is one side growing eaker more desperate? What is the trend line? Are one or more parties close breaching points of strategic failure? e actorsm,m Brittleness of Key "Systems': What are the critical actors�states, organizations, institutions, militaries�in my AOR? How adaptive are they? Are they coping with current problems? Can they cope with added strains, novel problems, or one or more crises? What might be driving my AOR toward System Shock or Tectonic Transformation, or constraining such discontinuities? What are the "normal accidents" waiting to happen�involving maladaptive states, organizations, businesses, militaries�in my AOR? I,asek transitpolitical or financial� ions � s 4-61-1 ikrei.transilafiOjia far ok like in myAOR? How interdependent are the key actors? How influences�media ideological commercial�in my AOR? What phase utterfly effects seismic shifts�from other (m - transitions anticipate_discontinuous change? Drivers of Tectonic Transformation. What are the core system drivers, signature technologies, principal ideologies, defining military systems in my AOR? Is my AOR undergoing profound economic, technological, or social changes? Are there multiple tectonic "plates" in my AOR? Are they shifting in divergent or conflicting directions? What previous epochs or eras might my AOR current resemble? How might current times compare or contrast to previous epochs? (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) JAN13 OREA12-551INDD(466029) (b)(3) Introduction 5 UNCLASSIFIEDLCIAL USE ONLY Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIEDUF FICIAL USE ONLY Checklist 1 Anticipating Discontinuities in vly AOR: A 10 +I Point Inspection Plan [Continued) , Page 2 of 2 70 80 90 100 Gila-engin& Status sstnn .. , ... ,, ,. ,,. . . -agsdinytionOn.'14,AOR? appro , oinorro*AiOptetty,:innt look likeitoday; ,.4vni'dibei*rininhed,tia::the curnnlativeiwei es can atchan e.wi 0owledge Gaps. What are the critical variables in my AOR? What are the biggest information gaps regarding them? What can I do now to close those gaps and/or compensate for them? Would I know it if the situation were close to a tipping point, a sudden phase transition from peace to war, stability to instability, state function to failure? Why or why not? sight?" What. ar,e,:thepossiwith seismic impacts�that.mihtun Warning. Are there looming crises or discontinuities that I should warn of now? Do my management chain and IC peers need to be alerted? Should Tissue an "intermediate" warning that shines a light on changing system dynamics and increased precrisis tensions in my AOR? Who is the right audience for such a warning? What is the best way to convey a warning? Are there opportunities for deterrent or remedial actions? What sorts of arresting graphics and visualization aids might I employ to persuade skeptical audiences? Should I brief this problem to my chain, IC peers, and key customers? And Finally... 11 cStrategk:E'64;:$2136. I have the proper fdcqs on key tegi( issues ih my AOR to eep from being blind-'sid� Is the urgent crowding out the important? Am Ltackling the ard problems with sufficient otus4an resources? Is the need for current intelligence drivin my focus? Am I publishing the right mix of near eT.11:1 'and tactical assessmenfs on the one hand and ,standback,:strategic es ,on the other? Am I stuck in the weeds?iAm I limitin � int *04:ti,riy{:00:kcilgItnirlaf,i oselssues', which I group in ways a e collaborating have reporting? me see big picture? JAN 13 OREA 12-551INDD(466029) (b)(3) (b)(3 (b)(3, E ,-4- c.fc% (b)(3) 1 -c-.1 CD I I (b)(3) CD I =1�� CD I Cit=1, CD I I 1= CD �1 ci'D I E. CD 1 CD CD I = (b)(3) (b)(3) 6 Introduction uNci neciric'nlirr) IA1 IISF ONLY Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 Type I Surprise: SUDDEN HOSTILE ACTION The US Navy's Battleship Row at Pearl Harbor minutes into the attack by Japan on 7 December 1941. Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED7t1F4C.LAL USE ONLY Type I Surprise: Sudden Hostile Action (b)(3) Sudden hostile action involves abrupt, deliberate action by an actor aimed at disorienting, defeating, or destroying an unprepared opponent. The actor can be a state, an armed force, a terrorist cell, or a revolutionary party (see figure 2). � The action in Type I surprise takes place by human design and agency, often in a concentrated geographic place (a capital city or a military base, for example) in a concentrated time span that can usually be measured in days, hours, or even minutes. Subtypes and Examples of Sudden Hostile Action Surprise Attack. Surprise attack includes any initiation or escalation of military violence using conventional or unconventional weapons against an unprepared target-adversary.a It includes surprise attacks by states and nonstate actors, such as terrorist organizations. Strategic surprise attacks may initiate war, as was e case in Japan's raid on Pearl Harbor and Nazi Germany's invasion of the Soviet Union in 1941. � Alternatively, surprise attacks can also occur in ongoing wars in which the element of surprise involves the attack's location, timing, or novel methods and capabilities (see figure 3). ri Examples of surprise attack include the following: a The North Korean invasion of South Korea in 1950. The Soviet invasions of Hungary (1956), Czechoslovakia (1968), and Afghanistan (1979). Iraq's invasions of Iran (1980) and Kuwait (1990). he start of all the major conventional wars of the Middle East (1956, 1967, and 1973). This training aid focuses mostly on strategic-level surprise attacks that initiate, escalate, or widen wars and conflicts. It does not focus on the use of surprise at the operational or tactical levels of conflict. Argentina's seizure of the British Falkland Islands in 1982. � he al-Qa'ida attacks of 11 September 2001. Military-Technological Surprise. This type of surprise involves the rapid development and deployment (b)(3) of new weapons systems or the novel adaption and employment of existing ones that an enemy or potential foe lacks the ability to counter. Examples of military-technological surprise include the following: Nazi Germany's wartime development and use of early-generation cruise and ballistic missiles (the V-1 and V-2, respectively). The Soviet Union's development and test of an atomic bomb in 1949�at least five years earlier than US intelligence analysts had estimated. �F�The Soviet launch of the Sputnik satellite in 1957, which stunned the US Congress and public. India's surprise nuclear tests in 1974 and, again, . in 1998. Abrupt Strategic Power Play. This subtype of sudden hostile action includes any move by an adversary to seize strategic advantages on the ground short of overt war. Examples of strategic power plays include the following: Nazi Germany's remilitarization of the Rhineland in 1936 and its annexation of Austria in 1938. � Jrhe Soviet blockade of Berlin from all land communications in 1948-49. � East Germany's construction of the Berlin Wall in 1961. oviet emplacement of strategic weapons in Cuba in 1962. (Continued on page 12) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) Approved for Release: 2016268/24. -666666.667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED//Fl - CIAL USE ONLY Figure 2 Anticipating Sudden Hostile Action Abrupt, deliberate action by an adversary (such as a state, armed force, or terrorist cell) against an unprepared target ZeRY'Ret: /..E4ssence "attaCks.o etSe eti2 Abrupt, deliberate, hostile deed by a unified actor (such as a state, armed force, terrorist cell, revolutionary vanguard party) aimed at disorienting, defeating, or destroying an unprepared opponent crsmswialm? 3�LlliprIsOaqc communicatinns:m- 4nitiationesca itiorvo ;mass humanfrights,abuses Effective use of denial (secrecy, security, stealth) and deception by an improvising, adaptive foe Mirror-imaging; fallacious rational actor assumptions Underestimation of actor's commitment, risk-tolerance, or bias toward action Failure of imagination onitor andsr, eas�,essiIxampj itdrs:Ontr� orensic assessmen simeAnsi.motive,s;.arld,opportunities efensive:casin 4.an -remor erns,,o ,imaginable 4,ssessi,weakneses 'StOn-isgthatqria. ,i0ifefopportunistic 1t0C Measure actors eye political commitment an all -05.foretii; 's-e-ss.$'strategic iT.e. lines stability co,re arstrategic Jo .60i:in-nit 'Olstercapabilitie: Source: Based on a review by a senior CIA analyst of more than two dozen cases of intelligence surprise experienced by US, British, French, Israeli, and Soviet services between 1939 and 2010. JAN 13 OREA 12-555INDD(466021) 8 I. Sudden Hostile Action uNcL ACCIPIFIMCCID�rpr-g_irial IICF CUM V Approved for Release: 2016/08/24 C06606667 --Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED ICIAL USE ONLY Varieties of Military-Technological Surprise Numerous situations can give rise to the kind of surprise involving an adversary's capacity to inflict military damage that the victim has failed to anticipate, including the following: .F�NIew weapons technologies, such as US development and use of the atomic bomb and Germany's development of cruise and ballistic missiles in World War II, and Britain's introduction of tanks to the Western front in 1917 in World War I. � Significant improvements to or adaptations of existing technologies, such as the Japanese development of shallow-running aerial torpedoes to attack Pearl Harbor in 1941; the USSR's mass production of the T-34 medium tank, with its sloped armor, reliable engine, and turreted gun early in World War II; and the Iraqi insurgents' effective use of and adaptations to improvised explosive devices. IIJThe effective integration of two or " more existing weapons or systems, such as the Germany's use of radios, tanks, close air support aircraft, and airborne troops in the blitzkrieg invasions of the 1939-41 era or the rapid development by the US Navy and Marines of amphibious landing ships and craft, naval gunfire support, and close air support before and during World War II. Tactical or doctrinal innovations that make one or more existing military systems more effective, such as the US development of amphibious warfare doctrine in the 1930s or the use of B-29s�originally designed as a high-level daylight "precision" bomber�in low-level incendiary bombing missions against Japanese urban areas. In most cases, military-technological surprise usually involves one or more new or adapted technologies coupled with tactical or doctrinal innovations and improved command and control to maximize their effectiveness. JA radar operator of the UK Women's Auxiliary Air Force watches her cathode ray tube monitor for signals of incoming enemy aircraft during World War II. The Royal Air Force's (RAF) development of an integrated air defense network, centered around early warning radar facilities, allowed the RAF to detect inbound German bomber formations early in their missions and to vector RAF Fighter Command planes to intercept them in a timely and efficient manner. Britain's superior early warning system and air battle management capability surprised German commanders and played vital roles in the United Kingdom's victory in the Battle of Britain in 1940-41. Rn. (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) I. Sudden Hostile Action JAN 13 OREA 12-306INDD(462648) (b)(3) 9 UNC' 1-elel I Ile, /11\11 ,/ Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED//F FICIAL USE ONLY Figure 3 The Dimensions of Strategic Military Surprise Page 1 of 2' SOVIET DECLAIM WAR ATTACKS MANCHURIA.? ATOM BOMB LOOSED a Effective use of military surprise maximizes the likelihood of operational success and reduces the costs of an operation�in time, resources, and blood�to the attacker. Surprise attacks that succeed typically exploit multiple dimensions of surprise: To achieve surprise, would-be attackers often conduct extensive denial and deception operations to keep their intentions, plans, and capabilities secret from the target-actor and the international community. .,,,,' perspeetw , would-be,34; � defender) - 4 ' T -; (to the woula be attacjcen) ,hr gSSI. 1 i Stategic siii=, fis attacks;onNorway(194O) :,ii` , (1941) Japan dns3attac .cir0 Pearl Harbor i.North KoreasiriviSion,O, South Korea 50 � Arabs - spe iy,War',(19,56;,,19,67,-:anii:y.. .. , r cntitiainVaidn'..tif UK Falkland Islands 198 a �tde 4it 'a ipitiateA*0.1,e ; :'. ,,,,=1,24,..--,, ,,,�..-'-: be, eVa'S' atm ecause,,t, they �..ca .exploitll them ,cndimensions i of :int 1 ar, sui Os' 7, . e et a,-,:p�ntial d versary will attak .. Scale: How The would-be attacker� invasion of Japanese-occupied Manchuria (1945); China's intervention in the Korean war (190); North Vietnam's Tet offensive (1968); the terrorist attacks of 11 September 2001 on US Homeland widespread and intense the attack will be particularly at the outset of a conflict�can try to calculate how much to risk and how many strategic resources to commit to an attack. i',-',1�!;i5.77: frrnn e r ,.-....q��=, 4 *'erien? ;Can Germany sfinVasiornn ,:Fraike,;� ow q-Oti,r,*s 40 ;' 2 641-1,94:bqr;Me�teen Allies, 4 . ., , 111�Vagitny,.0N;Cornian01(1.944.);',ChinaaSSanlVon, Indian for00962 . .the '"a ac NI hoccp . , .. . , , ' concentrate C p,,,,time , picking .,. ;�z.,Win ow,MOSta Vanta etins,to "e'prospects 'ot.i. success such ,, ___ a limn a' erjo4Otrjij#4,ym , 1749-, .1 Aptici4,4p, .,',-044A-10.'s-c or , �Cii.NPI.g a i'arijfi:ijkiia16:i-i _ oh a, or aa. : y.ofres Location: Where An enemy can German army attacks through the "impassable" Ardennes Forest (1940 and 1944); the D-Day invasion at Normandy (1944); the US invasion at Inchon, South Korea, (1950); Vietnamese communist assault on French base at Dien Bien Phu, Vietnam (1954) concentrate in space to achieve local superiority against the defending force; lack of intelligence on the location of the attacker's military forces obliges the defender to disperse its defensive systems. the attack will occur JAN 13 OREA 12-303INDD(462112) 10 I. Sudden Hostile Action 11,1AI 11C.1� elk11%, UNCL Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIE FFICIAL USE ONLY Figure 3 The Dimensions of Strategic Military Surprise [continued] (b)(3) Page 2 of 2 fend irogssza attack will , eattac erYea ;newtacties;',4-iew octtineS',..Of'ile*ziAieapOns.td thaximize the iectivene'sfe, Nfr:7% A�4:;;;Af.,..,,=5. `..-t anapit them agqinst a: .eneiny,s*ea nes'se� .� . eisnlanyi"sluse-o , luseco ^ aviation�includin u ial torp� does4n i r: piercing shells as DutchTibs�against US UK and nava forces 41 42) Pkistans tr _ t* n si-Ra 'corees ltry and irregular forces disguised �a- _gaipst 999 the hijacking in 11 2001 , SttVotritt,; passenger ,.., ,mitsa,,,--sA 4 je f;simultaheduslyand Novel Capabilities: Whether and how the enemy will employ new or untested military technologiesa A subset of novel means of attacking; use of new weapons can be devastating because the victim state's forces have no experience against them or training to counter or defeat them. nThe UK Royal Air Force's use of radar against the German air force in the Battle of Britain (1940-1941); Germany's use of jets, V-1 and V-2 missiles (1944-1945); US use of the atomic bomb to end the war in the Pacific (1945); US use of reliable precision-guided munitions against Iraq (1991) and Serbian forces (1990s); use by al-Qdida and affiliates of well-trained, well-equipped suicide bombers in multiple simultaneous attacks (late 1990s to present); Iraqi insurgents' widespread use of reliable improvised-explosive devices, delivered and detonated by multiple means (2004-08) a Use of novel weapons and military technologies is a subset of the dimension of means�how an attack will transpire. It is listed here separately because the operational and strategic effects of new military technologies, effectively employed, can be devastating. (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) Source: Based on a review by a senior CIA analyst of (b)(3) unclassified accounts of more than two dozen cases of strategic military surprise experienced by the United States, Great Britain, France, Israel, the USSR, and other powers between 1939 and 2010. JAN 13 OREA 12-303INDD(462112) (b)(3) I. Sudden Hostile Action 11 NC. ACCICICrli/CArl IICC f1R11%, Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED//F CIAL USE ONLY rECLUra:=ZEVin=,===...aat nhe Strategic Effects of a Successful Surprise Attack Gen. Charles de Gaulle in his postwar memoirs described how French leaders crumbled under the weight of the German panzer thrust across France in the campaign from May to June 1940 that precipitated his country's surrender. His account stresses the role of shock�intellectual, psychological, emotional, and moral�in a successful surprise attack. The devastating shock that de Gaulle describes, which leads to the cascading failure of the target's entire defensive system, remains the holy grail of planners of surprise attacks. The crumbling of [France's] whole system of doctrines and organizations, to which our leaders had attached themselves, deprived them of their motive force. A sort of moral inhibition made them suddenly doubtful of everything, and especially of themselves. From then on, the forces of disintegration were to show themselves rapidly.), Gen. Charles de Gaulle, in his postwar memoirs, The Call to Honor Coup d'Etats. This subtype of surprise, sometimes referred to as a putsch, is the sudden, illegal ouster of an incumbent state leadership by elements of the armed forces or security services�often by force or the threat of force�in order to replace it with another group, either civil or military.b Coups were especially prevalent in Africa, Latin America, the Middle East, and Turkey during and after the Cold War era. Examples of coups include the following: Jr he overthrow of the Hashemite monarchy in Iraq by a nationalist army general and his followers in the 14 July Revolution" in 1958. � he toppling of the Greek Government by a group of rig htwing army colonels in 1967. Massive Police Crackdown or Martial Law.c Authoritarian states pressed by demands for democracy or threatened by lawlessness or insurgencies will sometimes resort to a show of overwhelming force or to a massive crackdown on opposition to maintain their grip on power. Typically such events are preceded by secret planning for "emergency rule," the preparation of propaganda justifying the repression, and the quiet US battleships at Pearl Harbor under attack by Japan on 7 December 1941. The telltale wakes of Japan's new shallow- running aerial torpedoes can be seen. US planes caught on the ground at Hickam air base burn in the distance. ..-zenamarn.. dispersion of police and security forces to key sectors in the capital and other cities. Government security forces will then move rapidly to seal the borders, arrest dissidents and opposition journalists, and occupy opposition strongholds, such as universities or public squares. Coups are often followed quickly by crackdowns or the imposition of emergency rule or martial law. Examples include the following: � LlJrhe bloody quashing of the Tiananmen Square prodemocracy movement by the Chinese army and police in 1989. � he Polish army's imposition of martial law in December 1981 in response to the rise of the Solidarity labor opposition movement and to intense Soviet pressure to quell unrest. Diplomatic Surprise. This includes any unexpected diplomatic move that has a major impact on the regional or global balance of power. b Political scientist Samuel P. Huntington in his 1968 book, Political Order in Changing Societies, identified three classes of coup d'etat: 1. A breakthrough coup, in which revolutionary elements of the armed forces�often led by junior officers�overthrow the traditional government and creates a new ruling elite, such as occurred in Egypt in 1952. 2. A guardian coup, in which the avowed goal of the coup plotters�typically more senior army commanders�is to "save" the state from disorder, party strife, violent opposition, or foreign foes. 3. A veto coup, in which the army blocks democratic participation in the affairs of state. Usually led by senior commanders, this last type of coup often result in violent confrontations and suppression of civil opposition, such as occurred in Chile in 1973 and in Argentina multiple times during the 20th century. a The temporary use of martial law can be a legitimate tool of civil government in bona fide cases of civil or natural disasters, when civil authorities alone are unable to maintain order, or provide basic services. (b)(3) (b)(3) (b)(3) (h)('31 (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) 12 I. Sudden Hostile Action UNCL ASSIFIFD/ IAL USE ONLY Approved for Release: 2016/08/24 C06606667 ----Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED FICIAL USE ONLY nExamples of diplomatic surprise include the following: �Lllilhe Nazi-Soviet "nonaggression" pact in August 1939, which led to Germany's surprise attack on Poland one week later and the USSR's forcible annexation of eastern Poland by late September of that year and the Baltic states in 1940. � F-1-he US rapprochement with Chairman Mao Zedong's China in the early 19705 after three years of secret diplomacy, which blindsided the Taiwan Government and rattled Soviet leaders. Egyptian President Anwar Sadat's "electric shock diplomacy," including his sudden expulsion of Soviet military advisers in 1972 and his peace offer to Israel in 1977. Political Assassination. This type of sudden hostile action involves the premeditated killing of any influential political actor in or out of power by a person or group motivated by a political grievance. It excludes assassins motivated by psychotic impulses. Assassins can be "lone wolves" or members of a conspiracy. Examples of political assassination include the slayings of the following: Egypt's President Sadat in 1981. Israeli Prime Minister Yitzhak Rabin in 1995. Pakistani presidential candidate Benazir Bhutto in 2007. Violent Escalations by Revolutionary or Terrorist Movements. Such movements tend to start as small, cell-like clandestine organizations and gradually build their strength through clandestine measures. However, once they reach a critical mass of personnel, resources, weapons, and training, such groups will typically initiate political, guerilla, and/or terrorist campaigns to destabilize the state. � xamples include the Bolshevik party in czarist Russia, the Viet Minh and Viet Cong in Vietnam, the FARC in Colombia, and al-Qa`ida in the Middle East and North Africa. Even after these groups launch their initial wave of attacks and declare war on the state, they will continue to exploit the tactical advantages of surprise in follow-on hostile actions, such as raids, robberies, kidnappings, assassinations, and bombings. Initiation or Escalation of Major Human Rights Abuses. Extremist actors and governments tend to shroud the full scope of their plans to persecute and kill political foes and ethnic and religious minorities. They will The Fait Accompli: g Tool for Radical Leaders ii Decisive unilateral acts that create new facts on the ground and catch foreign actors�including intelligence services�unprepared are a favorite tool of action-oriented actors seeking to upend the status quo. Intelligence scholar Michael Handel notes, for example, that Adolf Hitler made repeated use of faits accomplis to catch opponents off guard and hinder opposition actors from mobilizing against him. Handel notes that Hitler established early on the pattern behind his frequent use of surprise. The preparatory stage of deception was intended to divert attention from his actual goal and reassure potential opponents that he did not intend to do what they feared he might. The fait accompli was then followed by a flood of new assurances that since Germany desired peace, this was the last such act of its kind; in this manner, he allayed fears and set the stage for his next move.)) F7�Intelligence scholar Michael Handel, in The Diplomacy of Surprise, 1981 "TPX"' -C4167==="56=3:=2,-',11EZZEZIS (b)(3) (b)(3) (b)(3) (b)(3) 1(b)(3) �(b)(3) (b)(3) gb)(3) often covertly distribute orders, weapons, and rewards to the militants carrying out the violence in order to (b)(3) minimize the ability of the victimized group to resist and of outside actors to intervene. Examples include the following: Nazi Germany's escalations in its campaign to harass, persecute, and ultimately exterminate European Jews between 1933 and 1945. �JThe Khmer Rouge's "autogenocide" during its rule from 1975 to 1979, carried out through mass executions and the starvation of more than 1 million Cambodians deemed corrupted by Buddhism, foreign influence, money, property, or education. � Multiple rounds of "ethnic cleansing" in the Balkans during the 1990s, the worst of which occurred during the Bosnian war of 1992-95, when more than 2 million people were displaced and tens of thousands killed. � he Rwandan genocide, in which the Rwandan military and Hutu militia groups killed more than 500,000 Tutsis in 1994. (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) I. Sudden Hostile Action 13 UNCI IrtIA I I I C r r1RII%/ Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED//F0 ICIAL USE ONLY Barriers to Early Perception of Type I Surprise (U//FOU0) There are several barriers to early perception and timely warning of Type I surprise. Secrecy on the part of the aggressor-actor planning to surprise an unprepared foe is foremost. Denial and Deception by Smart, Adaptive Actors. e goal of would-be attackers is to conceal hostile plans and preparations from onlookers and prevent the intended victim or the third parties from taking effective counteraction. The ability of US enemies�from Imperial Japan and Mao's China to North Korea and al-Qa`ida� to conceal preattack plans and preparations has been amply demonstrated. F�Scholars of surprise observe that even rudimentary denial and deception efforts often work in thwarting timely warning and response by the target actor. These efforts can include the following: � Publicly denying aggressive intent. Lying about the purpose of prestrike activities. Announcing "routine" military training maneuvers to mask preattack staging. Publicly demobilizing token numbers of reservists. Feinting in another direction. Intimating that the prestrike activities are merely a bluff. Heralding bogus eleventh-hour peace initiatives or offering to enter into negotiations. Sound operational security and standard military cover, camouflage, and concealment of hostile forces can go a long way to countering even the most sophisticated intelligence collection systems, judging from unclassified assessments of surprise and intelligence failure. Bold, Resourceful Enemies. The sheer audacity of a surprise attack can catch an adversary unprepared. Roberta Wohlstetter�the doyenne of intelligence surprise studies�discussed in her 1962 book, Pearl Harbor: Warning and Decision, the inability of US officials to conceive of a radical Japanese response to its military quagmire in China and escalating tensions with the United States. Wohlstetter identified the US officials' "poverty of imagination" as the root cause of US vulnerability to a surprise attack at Pearl Harbor. Racist stereotypes also played a part: many US Navy commanders could not believe that the Imperial Japanese Navy could pull off such an ambitious and complex strike operation so far from Japan. 6thCIA1eadthIip in an essay on profihn This pattern�disbelief that an actor would embark on a course of action that was potentially catastrophic�was repeated before the Cuban Missile Crisis in 1962: US officials knew that the Kremlin was increasingly anxious about the strategic balance and about US pressure on Cuba, but few in the ICd believed that Soviet Premier Nikita Khrushchev would risk a nuclear war by secretly emplacing nuclear weapons 90 miles off Florida. The 9/11 Commission Report makes clear that the key organizations involved in US air safety�the Federal Aviation Administration, the North American Aerospace Defense Command, and the airlines�were utterly unprepared for foreign terrorists to take over US civilian passenger jets and use them as weapons. hen Director of CIA John McCone was an exception. He r.easoned that the Soviets were building surface-to-air missile sites in western Cuba�which US intelligence had confirmed�in order to protect covertly deployed Soviet nuclear forces rather than to defend Cuba from US invasion, an assessment that turned out to be accurate. Proceeding from rational unitary actor assumptions, Sherman Kent�then the head of the CIA's Office of National Estimates�and much of the rest of the IC judged such a course of action too risky and out of character for the Soviet leadership. 14 I. Sudden Hostile Action UNCL 1ce'rirr"1 rirtni Iler v Approved for Release: 2016/08/24 C06606667 --Approved for Release: 2016/08/24 C06606667 UNCLASSIFIE OFFICIAL USE ONLY Oenial And Deception In Cases Of Mass Atrocities Anticipating the initiation of mass human rights abuses and comprehending their scale and intensity as they occur are difficult analytic challenges. Past cases of mass atrocities demonstrate the ability of hostile actors to conceal their intentions and plans and deceive outside observers until it is too late to thwart or mitigate their violence against the victims. A policy planning handbook on responding to the dangers of mass atrocities recently published by the US Army notes, for example, that: II Perpetrators decide to conduct mass atrocities, mobilize their resources, draw up "death lists" or otherwise identify intended targets, and possibly segregate victims into ghettos or camps. A pretext for such actions may be arranged, or an unforeseen event may spark these measures. Additional preparations may include transportation of victims, identifying locations for mass killing, and determining means of disposing of bodies. Perpetrators will also take measures to disguise their actions or deceive both victims and outsiders as to what will occur (e.g., victims may be relocated and collected together in order to "protect" them). The many individuals involved in the actual conduct of the mass atrocities may need to be convinced of the legitimacy of the actions as well as the need for secrecy ... Perpetrators will attempt to obfuscate mass atrocity situations, blame the incidents on the victims or deny their occurrence. They will impede external efforts to determine the truth of events. Strong denial may presage future waves of mass atrocities. . . Fr RFrom Mass Atrocities Prevention and ;onse Options: A Policy Planning Handbook, published by the US Army Peacekeeping and Stability Operations Institute in 2012 The infamous Arbeit Macht Frei�work makes you free�gate to Auschwitz concentration camp. (b)(3) (b)(3) (b)(3) (b)(3) JAN 13 OREA 12-307INDD(462649) (b)(3) I. Sudden Hostile Action LINCr /C"IA1 IICC CARII X/ Approved for Release: 2016/08/24 C06606667 15 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED FFICIAL USE ONLY "He Had a Gambler's Heart": Adm. Yamamoto's Bias for Action nalysts can evaluate the risk tolerance and bias for action of key actors. A leading US scholar of the attack on Pearl Harbor in 1941 provides a glimpse into the mentality of one particularly bold actor. Gordon W. Prang� author of the 1991 book, At Dawn We Slept: The Untold Story of Pearl Harbor�wrote of Adm. Yamamoto Isoroku, Commander in Chief of the Imperial Japanese Navy's Combined Fleet at the time of the attack: nil Yamamoto's temperament also had much to do with the strategy he eventually conceived [for attacking Pearl Harbor]. Some of his maxims . . . reveal his turn of mind: 'An efficient hawk hides its claws'; 'A cornered rat will bite': 'If you want the tiger's cubs, you must go into the tiger's lair' . . . An inveterate gambler, he enjoyed nothing more than a competitive round of chess, poker, or bridge . . . 'In all games Yamamoto loved to take chances just as he did in naval strategy,' explained [one of his favorite staff officers] Capt. Yasuji Watanabe. 'He had a gambler's heart'', Adm. Yamamoto Isoroku. JAN 13 OREA 12-550INDD(465995) 16 I. Sudden Hostile Action L4 UNCLApproved for Release: 16/08/24C06606667 ----Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED/ FICIAL USE ONLY The Soviet Union successfully tested an atomic bomb in August 1949�five years before the IC judged it to be likely. Soviet leader Josef Stalin's implacable determination to acquire the bomb and the resourcefulness of Soviet research and development efforts�abetted by Soviet espionage penetration of the Manhattan Project during World War II� enabled the USSR to greatly accelerate its program to build, test, and deploy atomic weapons. Mirror-Imaging a "Rational" Actor. In the history of surprise, zealous alpha actors with outsized appetites for power, tolerance for risk, and biases for action�Adolf Hitler, Gamal Nasser, Khrushchev, Sadat, Saddam Husayn, Kim II-Sung, and Kim Jong-II�have sought to seize the initiative against their presumed foes. Often, such actors tend to pit their own audacity against the normal human tendency to assume that "tomorrow will look like today," that "the other guy" thinks the way "we" do, and that dramatic departures from the status quo are impossible. Assumptions about the permanence of the status quo and the presumed "rationality"�often narrowly defined or confused with reasonableness�of hostile actors increase the victim's vulnerability to denial and deception efforts by crafty, adaptive enemies. The difficulty of comprehending the full psychological, cultural, political, and organizational context in which would-be hostile actors operate compounds the problem. � The head of Israeli military intelligence in 1973 could not conceive that Sadat would initiate a war that Egypt could not win militarily. The intelligence chief assumed that the Egyptian armed forces would wage war the way that Israel would�by first seizing air superiority over the region�which the Egyptian air force clearly lacked the capability to achieve. ' �r�lks then chief of the CIA's Office of National Estimates, Sherman Kent wrote after the Cuban Missile Crisis to explain the IC's failure to anticipate Soviet deployment of nuclear weapons to Cuba, "no estimating process can be expected to divine when exactly the enemy is about to make a dramatically wrong decision. We [in the IC] were not brought up to underestimate our adversary [in this case, Soviet leader Khrushchev]." Aids To Anticipating Type I Surprise (b)(3) (b)(3) Timely, accurate intelligence reporting on the (b)(3) hostile intentions, strike capabilities, and secret plans of would-be hostile actors remains the surest aid to analysts trying to avert Type I surprises. However, if the history of intelligence failures experienced by all major powers since the onset of World War II is any guide, conclusive intelligence reporting on an adversary's plans and decision to attack will remain the exception, rather than the rule. Therefore, while developing and maintaining close ties to intelligence collectors remain essential, analysts should assume that critical intelligence collection gaps will persist and that analysts will need other means to bolster their ability to anticipate possible hostile action. These supplemental approaches and tools attempt to: (b)(3) Identify patterns of sudden hostile action based on historical case studies and help analysts to determine how similar current situations may be to historical analogues. Get into the heads of would-be hostile actors in realistic, sophisticated ways and anticipate their possible moves using methods that reduce the dangers of mirror-imaging. Assess the vulnerabilities of would-be victims of sudden hostile action in analysts' areas of responsibility. Assess an Actor's Commitment and Hostility, Not Just "Rationality." This approach requires a deeper focus on actors' motives and intentions in analytically sophisticated ways. It seeks to fix analysts' attention on would-be hostile actors who may be motivated by pride, fury, revenge, aggrandizement, and ideology. Such actors are subject to opaque psychological, political, and organizational pressures to act. They often receive flawed, politicized intelligence. These actors will often seek to change the rules of the game or to destroy the old game completely and replace it with one of their making via sudden hostile action (see figure 4). For examples, Adolf Hitler sought to overturn the post�World War I Versailles Treaty order in Europe as a prelude to his campaign of genocidal expansion; Josef Stalin to project Soviet power into and communize the states of Central Europe and to subvert liberal democracies in Western Europe; Fidel Castro to check US "neocolonialism" and promote radicalism in the Western Hemisphere; and Usama Bin Ladin to oust the United States from the Arab-Islamic world and depose "apostate" regimes in the region. (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) I. Sudden Hostile Action 17 UNC' Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIE FICIAL USE ONLY A US expert on strategic warning during the Cold War era, Cynthia Grabo, noted that would-be hostile actors miscalculate for various reasons: misjudgments of an adversary's strength, ideological fixation, hubris, domestic pressures, nationalist hysteria, pique, or just plain desperation. Under the spell of such pressures, an actor may embark on an imprudent or even disastrous course of action. Scrutinizing assumptionse about the full range of factors that can influence an actor's behavior�including personal, professional, organizational, and social Pressures�and tracking them over time can help analysts account for zeal, folly, honor, revenge, and malice in forecasting leaders' actions and determine the trend in an actor's extremist rhetoric and actions. Using well-crafted red teams to consider alterative explanations for adversaries' behavior and to simulate would-be hostile actors' calculus for employing surprise can help analysts draw on deep expert insights in ways that avoid mirror-imaging, rational actor assumptions, or caricatures. APPLICATION �PatwArdmievaal Analysts�working individually or in analytic teams�can identify who the possible alpha actors are in their, areas of responsibility, study the political pressures acting on them, assess their timeline for action, track their rhetoric and behavior over time, and anticipate their possible recourse to various options for sudden hostile action. Recognize Historic Patterns of Surprise. Sudden hostile actions sometimes resemble historical precedents for surprise action or follow discernible patterns. Such actions are rarely what leading intelligence scholar Richard K. Betts in his 1982 book, Surprise Attack, calls "bolts from the blue." The author noted that "... there are no significant cases of bolts from the blue [that is, a major surprise attack not preceded by an earlier political crisis] in the 20 century. All major sudden attacks occurred in situations of prolonged tension, during which the victim state's leaders recognized that war might be on the horizon." Instead, sudden attacks tend to occur during or after an escalation in tensions that is often observable to intelligence organizations. Analysts should be aware of the relevant historical precedents for surprise action under various circumstances in their areas of responsibility. Studying such precedents can help analysts expand their intellectual inventory of relevant historical analogies and aid in early pattern detection and recognition. A senior Japanese naval aviator who helped plan the attack on Pearl Harbor told US interrogators after the war that he was dumbfounded that the United States had not studied Japan's use of strategic surprise to initiate its 1904-05 war against Russia. Political and military analysts would benefit from being proactive in assessing the risks of surprise attacks as tensions escalate, even if reporting on force postures and deployments is scarce or recourse to a military "solution" seems unfeasible or reckless. Another critical development for analysts to watch for is mobilization in all its forms. Large-scale national mobilization of military power that imposes a high opportunity cost on the civilian economy remains the best'predictor that a state is preparing to undertake major military operations, according to a leading scholar of surprise. Political analysts will usually have the lead responsibility for recognizing the rise of radical factions and leaders, analyzing escalating tensions, identifying the breaching of possible strategic "red lines," and warning of the rising urgency and extremism of the political or diplomatic dialogue. Military analysts, by contrast, will have the lead in closely monitoring shifts�real or perceived�in the interstate balance of power and balance of threats as well as indicators of preparations for sudden action by the military and/or security forces. In similar fashion, terrorism analysts can gain insight by closely tracking the substance and tone of extremist groups' public communications. Increasingly aggressive rhetoric that employs violent imagery, blunt threats, and apocalyptic visions to spur psychological mobilization, demonize enemies, and legitimize mass killings are often indicators of a looming escalation of violence. APPLICATION ) Analytic teams can study the academic and intelligence literature on a potential adversary's past uses of strategic surprise and assess its current doctrine arious models and premises have been used to describe and justify models that attribute rationality to actors. The basic idea is that actors try to maximize benefits, minimize costs and risks, and weigh options for action via some form of cost-benefit-risk analysis�however crude, intuitive, or informal. In shorthand usage, rationality has often been confused with "common sense" or reasonableness. (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) 18 I. Sudden Hostile Action UNCI. /11 11,, ,�.11 't/ Approved for Release: 2016/08/24 CO6606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED//FS L USE ONLY Figure 4 A Spectrum For Measuring an Actor's Extremism . ` . ' 11 - ' " .� 'Rational" Status_ .. Actor' � ,,,441:-.. . , - � L',- ' 0.Tommitted HostileAdor ' OLIAIL IF, ' - ' V . _ . .... Strategic Goal Content Feasible Attarnablevl in I Radicala Safel:incompatible oqi i .,-1.f '-'�,',:v744...,,idi=4:1s , prevailinginclude'.stirateOlariaseaTeP',Examples total offrcon4uestrano erl,Stale;,wnoCide.of group otal(tarianzule:ovena.country ,,J,:,,$- -.4-,..'9 .,,,.= ' � - '---=' ',,,,elv--� ,,,,,,-.:- � -,incrementalgoals.minority -,cx.).�.0.4g,,systgposuc as maintaining --.,,,� ,:-:-,-...,,..-,-,?;:,------, statiis,q004a 1:6(..in, irmoderate or Strategic Goal Measured. Actor willing to settle for Intense. Actor is "fanatical"; adheres Commitment less than maximal goals. stubbornly to maximal goals. Tolerance of Risk i ow -Ctorc-isi prudent;-,pcnse on .1. ,... i Actor,, rope- Q a, ven urism. high -ris Pursuing Goals ,.. , .,;:i,,..mx,.._i'�.:::,,:--;', , risk avoidance or minimization tions,acce acceptable Means-Goal Instrumental. Actor desires to be Delinked. There is a disconnect between Relationship rational, minimizes costs, links means to goals, adheres to at least some norms. goals and means. Actor fixates on goals, ignores costs, exalts "sacrifice," distrusts calculus that subverts ideology. ,. Degree of Slf..,Ciiiitrol,:, � e atively high Personalgrievances Low Pride;,fury resentmentrevenge;t exert Emotional Stability endettas do not drivetstrategic : behavior: sizableinfluence onv ' `:nierii.;4Ctinns aHThis matrix is derived from the model of "crazy actors" developed by Professor Yehezkel Dror, an Israeli scholar of political science at the Hebrew University of Jerusalem in the 1970s. It modifies some of Dror's definitions and nomenclature. (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) JAN 13 OREA 12-308INDD(462650) (b)(3) I. Sudden Hostile Action 19 UNC' ..--..., Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED//FOR S USE ONLY on surprise. Teams can also monitor, evaluate, and track over time a would-be hostile actor's strategic "red lines"�actions by rival players that an adversary would deem hostile to vital interests and, therefore, as a cause for war. Similarly, "tacit understandings" between the opposing parties in enduring strategic rivalries�for example, China and Taiwan, India and Pakistan, Georgia and Russia, Armenia and Azerbaijan�should be examined and evaluated over time because breaches of them can lead to crises that typically increase the risk of war and surprise. An-o,eteetwee.m.egunsmakum,,,g,,w1z.o.rmas...,sce,warar......r,,,,nroemmentrussesessano.cugm. Apply Theories of Surprise Action. Awareness of the academic theories of surprise, which are principally based on historical case studies, can also help IC analysts assess increasing risks of Type I surprise. These theories tend to focus on two key conditions as particularly salient risk factors for surprise attack! The first is an actor's acute sense of strategic vulnerability, particularly if communicated by warnings of encirclement or fears of extinction. � Jhe second condition is an actor's heightened sense of its own offensive capacities via the possession of elite strike arm�such as Imperial Japan's carrier battle group, Nazi Germany's armored forces, Israel's air force, or al-Qa`ida's suicide bombers. ''-k--ziaredavasas, nAPPLICATION Analysts can assess whether these preconditions for sudden hostile action�the presumed advantages of near-term offensive action or the perception of adverse long-term strategic trends�apply, as seen from the optic of an increasingly desperate or zealous actor or actors. If so, these conditions would suggest higher risks of sudden hostile action than would otherwise be the case. Military journals and doctrine, formal strategy pronouncements, warnings via diplomatic channels, and political rhetoric can all shed light on aspects of foreign thinking on these strategic matters. Conduct "Forensic" Analysis of Possible Hostile Actors. Analysts can examine which actors possess the motives, means, constraints, and opportunities to engage in various options for hostile action against foreign or domestic actors. Motive refers to the intentions, ideology, and animating beliefs of a potentially hostile actor, particularly as they define his threat perceptions and enemy images. It also covers incentives to act suddenly, such as the desire to seize a neighbor's resource-rich territory or "redress" specific grievances, such as the loss of territory to a neighboring state in a previous-war or concern about a rival's threats or military capabilities, as he perceives them. Means refers to the totality of capabilities for a major hostile action, including preventive war, surprise attack, a coup, or genocide. These means can be at hand or in development. Development of costly means of attack remains a key guide to an actor's possibly hostile intentions. The trend line�whether these capabilities for surprise action are increasing or decreasing�are as important as their level at any given point in time. (b)(3) (b)(3) Opportunity refers to the feasibility and (b)(3) practicality of sudden hostile action in obtaining the goals sought by the actor, such as the ouster of a hated or inept leader, the elimination of a despised minority group, or the neutralization of a rival state's deterrent forces. The focus is on the opportunities that the would-be actor perceives as he surveys the relevant operating environment. Opportunities cover environmental factors that may create a more permissive environment for sudden hostile action. Factors leading to a more permissive environment might include the following: LIIiA rival actor's focus on domestic upheavals, events in another theater of war, or an ongoing military campaign. For example, Fascist dictator Benito Mussolini of Italy and Imperial Japan both took advantage of Germany's crushing defeat of France in 1940 to seize French territories; Husayn's Iraq sought to exploit Iran's postrevolution instability to seize contested territory in 1980. � he international community's preoccupation with grave economic conditions or with another crisis. Examples include the Suez Crisis in 1956, which distracted Western powers from the Soviet Union's preparations to suppress the Hungarian uprising against communist rule; and Iraq's seizure of Kuwait in August 1990, when Western states were trying f Offense-defense theory and offensive realism are hypotheses from international relations and strategic theory that seek to explain the outbreaks of war. Offense-defense theory posits that war becomes more likely when great powers judge that: 1. Conquest is relatively more feasible than in other periods. 2. Their own strategic offensive capacities are greater�or are deemed greater�than those of a rival power or powers. 3. They are vulnerable�or fear that they are�to strategic attack from one or more foreign powers. It also holds that false evaluations of points 1, 2, and 3 are relatively common on the part of great powers because of ideological distortions, poor intelligence, faulty net assessments, and the influence of expansionist interest groups. Offensive realism posits that great powers will seek to maximize their absolute and relative power vis-a-vis other states and will seek to do so by expanding their military capacities and by seeking to expand and achieve dominance when the opportunity avails itself. (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) 20 I. Sudden Hostile Action UNCL IICC Approved for Release: 2016/08/24 C06606667 --Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED//F CIAL USE ONLY Academic Theories of Surprise Attack One scholar of intelligence affairs, Professor James J. Wirtz, summarizes the theory of surprise in three propositions. � � � Surprise temporarily suspends the reciprocally antagonistic nature of the battlefield by catching the enemy when he is unprepared to resist effectively. A military organization in a state of unreadiness is more akin to a large peacetime bureaucracy in custody of scarce commodities (weapons and ammunition) than it is to a combat force that is ready to fight. Strategic surprise will be an especially enticing option to the militarily or economically weaker party in a strategic rivalry. The advantages of surprise offer the weaker side the prospect of achieving decisive results against a stronger opponent that would probably be unobtainable in a war of attrition. The party that is clearly stronger, by contrast, often hopes displays of might can deter a foe or intimidate him into making concessions without having to resort to war. Strategies based on strategic surprise appear to all concerned parties as extremely risky before the attack and often turn out to be reckless and ill advised. The very "unthinkable" nature of an audacious plan of attack makes it more likely both to achieve success� surprise�in the short run and to infuriate and unify the victim of surprise in the long run, if he can absorb the initial blow. Other scholars note that the risks of surprise attack are particularly high in two cases. When one side judges that long-term trends in t e strategic balance are unfavorable because of inferior geographic position (often perceived as "enemy encirclement"), economic decline, or slower population growth; in such cases, an actor�such as a Adolf Hitler or the leadership of prewar Japan�is strongly tempted to seize the initiative via decisive action to head off what he fears will otherwise be a protracted deterioration in his strategic position. LIIIWhen military planners judge that the attacking side holds a decisive advantage because offensive action would allow the attacker to seize the initiative, maximize the presumed superior elan on the part of the attacking force, and exploit the advantages that current weapons, doctrine, and tactics may hold for the attacker. nThe charred west facade of the Pentagon; days after the terrorist strike on 11 September 2001. The attack killed all 64 people on board American Airlines Flight 77�including the five al-Qdida hijackers� � as well as 125 people who were at work in that portion of the building. he remnants of two Egyptian jets destroyed on the grbithd'during-the Israeli Air Force's surpriSe'attaek at the-Oid.set Ofthe Si.k-Day �: War. The Israeli air dttaek, Operation FocuS, achieved total surprise, eliminated Egypt's air force from the war, and assured Israel of air supremacy for the duration of the 1967 conflict. (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) JAN 13 OREA 12-310INDD(462652) (b)(3) I. Sudden Hostile Action 21 UNC Approved for for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIE I S OFFICIAL USE ONLY to manage German unification and the collapse of communism in the Soviet Union and Eastern Europe. In the case of a potential coup, a leader already weakened by ill health or declining popularity. MOOR- ,S1V.aTe APPLICATION Examining these forensic factors enables analysts to do a quality of information check regarding the reporting available on each of these criteria (motives, means, and opportunities) and to develop signposts to help warn of new developments�such as a hostile actor's decision to heavily invest in strike weapons, evidence of a more permissive strategic environment, or increased incentives to act against a historical foe. To conduct this type of forensic analysis, terrorism analysts should stay particularly close to collectors�including domestic law enforcement�and do various types of link and network analysis to gain a fuller appreciation of the structures, plans, and operations of extremist organizations. AloseliewrlYttlal,... � Cr ..-1611.2atr� Vulnerability Assessments. Vulnerability assessments, sometimes called defensive casing, can improve analysts' understanding of hostile actors' priorities among various potential targets for surprise attack. This technique focuses on the would-be target's vulnerabilities. It involves a structured effort by a diverse team of experts.to brainstorm various categories of potential targets�a state, military force, security force, specific leader, or critical infrastructure�and assessing the relative merits, drawbacks, and risks of each potential target from the perspective of a would-be attacker. APPLICATION Prospective targets of possible hostile action� particularly in cases of strategic military surprise and terrorism�can be assessed, categorized, and ranked from multiple perspectives. One perspective is that of the potential victim: how might he "objectively" rank his own strategic centers of gravity, essential infrastructure, economic core, and renowned religious or historic sites in terms of importance, vulnerability, and symbolic value. This exercise could be repeated from the perspective of prospective attackers: how might they assess a would-be victim's possible targets in accord with these criteria. How might they rate a would-be victim's readiness and resilience in the event that surprise action is successful? 004(foi P.8 the thotivation,-- means ,-:ma� 11,:,..:4,y�eiti,;., 9 ,s, i r,a, : 4.21p, , ic power l i cal ' ., ec000T,. , 40-�k include' political eels .-required , �ILf'''''' urnty The Pr, ... eneraIIy ..9,qq4 Red Teaming. This technique relies on a rigorous, systematic effort to zero in on the strategic and tactical calculus of would-be hostile actors. Ideally, red teams include participants who can accurately represent the ethos, intentions, structures, and capabilities of a hostile actor or organization. For example, red teams could help estimate terrorist group's relative priorities for target selection. Red teams cannot be expected to divine plans for a specific attack, which still requires timely and accurate intelligence. Empathy as an Analytic Tool. One intelligence commentator, psychology professor Ralph White, recommends that analysts cultivate empathy to hone their understanding of foreign actors "from the inside looking out, not merely from the outside looking in." To foster empathy, White advises analysts to continually pose such questions as the following:g � How would I feel if I were facing the situation they pre facing now? � How would I feel if I had been through the experience I know they have been through? � How should I correct my first answers to those questions on the basis of what I know about the differences between their political culture and mine? g Psychology professor Ralph White draws a sharp contrast between empathy as a tool for understanding an opponent and sympathy, which he characterizes as "sharing (or agreeing with) the thoughts and feelings of others." 22 I. Sudden Hostile Action UNCL 1,1 A I her Approved for Release: 2016/08/24 C06606667 �....Approved for Release: 2016/08/24 C06606667 UNCL IFTt OFFICIAL USE ONLY Analysts can hone White's technique to counter biases and stereotypes and to zero in on how foreign actors might rate the attractiveness of various options for sudden hostile action. APPLICATION Well-composed red teams could also assist in generating, expanding, updating, and monitoring the list of specific, observable indicators�signposts�for prestrike activities by insurgent or terrorist groups, including in such areas as target casing, bonnbnnaking, personnel deployment, and movement to the target. An unclassified JASON report for The MITRE Corporation that discusses the use of red teaming to anticipate catastrophic terrorist attacks notes the importance of recruiting team members immersed in both the foreign culture and the "professional culture" of the terrorist group�its mission, history, beliefs, and tactics� that the red team wants to mirror. This immersion into the terrorist group that is being assessed should include deep insight into the group's experiences, education, skills, training, contacts, and past targets. 23.-1,1261,17-.JG36.4lIA.VERS=.-VS, ) Exercises, War Games, and Simulations. These tools are intended to simulate the dynamics of actual strategic interactions, including combat operations. Such efforts to game out the possible outcomes of force-on-force encounters often come with high startup costs in resources, planning hours, and personnel� but they can also help simulate the conditions and pressures conducive to sudden hostile action. Military exercises have multiple purposes, including measuring the temptation for the "red" team�the postulated hostile actor�to undertake a surprise attack and revealing weaknesses in the "blue" team's defenses and force posture. In 1932, nearly 10 years before the Japanese strike on Pearl Harbor, for example, approximately 150 US Navy carrier-launched planes successfully "attacked" the Pacific Fleet at anchor in Pearl Harbor on a Sunday shortly before dawn in a war game exercise. Navy umpires initially declared the attack a total success, news of which was reported in The New York Times days later. However, according to one academic assessment, Navy commanders failed to absorb and disseminate the lessons of the widely publicized 1932 exercise, whereas Japanese intelligence personnel and military planners appear to(b)(3) have closely studied the exercise. (b)(3) APPLICATION (b)(3) Military Indications and Warning. The collection (b)(3) and assessment of data about the intentions and capabilities of foreign military forces has been the basis for warning of war in the modern era and can also enhance the effectiveness of war games. Since World War II, the major powers have spent enormous sums� the majority of their intelligence budgets�to augment their ability to collect data on the military strength, weaknesses, operations, training, and weapons of hostile (b)(3) and potentially hostile states. The collection of military indicators will remain one of the linchpins of strategic warning for three reasons: (b)(3) Military preparations are a necessity for war. (b)(3) Many of these military preparations are discernable (b)(3) or at least potentially discernable to outside states seeking the information. (b)(3) any,of these preparations are costly and (b)(3) disruptive to the civilian economy, so states do not undertake them lightly, purely for purposes of political theater, or bluff. For that reason, they tend to be reliable indicators of seriousness of intent and (b)(3) readiness to act. Checking for Vulnerability to Coups. Anticipating (b)(3) military coups based on intelligence reporting alone is rare because the coup plotters�unless they are seeking the approval of outside powers�have a powerful incentive to maintain secrecy to achieve their aims. However, examining five preconditions that correlate closely with increased odds of military coups may help analysts to anticipate their risks, if not their actual timing. Class privilege. To what degree does the military� (b)(3) particularly its officer corps�draw from a privileged element of society? Is the officer corps perceived as a societal elite�such as the Prussian Junkers, who controlled the German army before World War I�at odds with other elements of society, such as the middle class or workers? Historical role. Does the military have a special or historical role in upholding the constitution or preserving the domestic order, such as the Turkish army has had since at least 1960? Does it view itself as the custodian of the state or as a state within a state, as the Japanese army did in pre�World War II Japan? (b)(3) (b)(3) (b)(3) I. Sudden Hostile Action 23 U NC t A 4t-� 1,1,1 a I 11,, 1/11,11 Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED//F IAL USE ONLY ecurity crisis. Does the country face a difficult national security challenge, such as a serious domestic insurgency, revolutionary activism, or a menacing strategic rival? Are the commanders of armed forces preoccupied with domestic "enemies," such as Chile's were before the 1973 coup led by General Aug usto Pinochet against President Salvador Allende? �nCivil-military strife. Is the military at odds with the civilian leadership, such as the Chilean army was during Allende's presidency in the early 1970s? Does the military tend to distrust democratic or civilian elements of the government? Is there a sizable civilian element�landowners or privileged classes�that support the military's vision against that of the government? ^ olitically ambitious officers. Is the military led by "alpha actors" contemptuous of civil authority or threatened by militant junior officers who are antagonistic to existing political conditions, such as those in Japan in the mid-1930s? Is there a cohort of junior officers who equally disdain their senior commanders or political leaders? nAPPLICATION Evaluating civil-military relations by these criteria�and comparing them with the available reporting�can help analysts identify situations that are relatively more likely to lead to ruptures in civil-military relations, including Coups. Such evaluations should also cover the national police and domestic security and intelligence forces�particularly if they are uniformed or politically influential. Assessments should be tracked over time to monitor the trends in civil-military ties and determine if the factors conducive to coups are worsening or abating. (1211 Stealthy Surprise? Sudden Hostile Actions Using Novel Methods (UHFOU0) Surprise attacks have traditionally had one positive consequence for the decisionmakers of the targeted actor: they afford the benefit of strategic clarity. Once the attack occurs, the victim state in most cases has a general idea of what has happened, who the enemy is, what his intentions are, and how the enemy is going to pursue them. Future cyber and biological attacks might not afford such clarity. � The vast majority of such attacks will almost certainly employ surprise to maximize effectiveness. However their nature and goals will probably not be immediately obvious, even after the attack has been launched and it is harming the victim state's population, economy, or IT infrastructure. � Biological warfare attacks, for example, may be masked, at least initially, as the onset of natural epidemics. Targeted cyber attacks may be impossible to distinguish from the work of hackers or of individual lone wolves or spontaneous networks. 24 I. Sudden Hostile Action uNcL cciricniir rlf"1/11 licr v Approved for Release: 2016/08/24 C06606667 �"Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED//Fl IAL USE ONLY [jsthe onc released virusveiopers;g�rllyiOe l throf seek 6utandatt��h n�sdf innceht e ountriesthatpossss', temptedoffensive cyber capability will be nchief nuclear[strategic] assets were missiles with ' wa common knowledge awasthe nino e the oneit.wou I. Sudden Hostile Action UNC. nectrirnI rIrst AI lier rtRIIN/ Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFlED//r017-17f-i-+ "A Fatal Lethargy of Mind": A Wartime Commander's Take on Preparedness and Surprise n the first major naval engagement of the Guadalcanal campaign�just eight months after the Pearl Harbor attack�the Imperial Japanese Navy surprised and routed US and Allied surface combatants guarding the Marine beachhead on Guadalcanal. The Battle of Savo Island, which took place on 8-9 August 1942, resulted in the sinking of one Australian and three US Navy cruisers, with the Japanese sustaining only light damage in return. In his after-action report, Adm. Richmond Kelly Turner, commander of US Naval amphibious forces in the Pacific, observed the following: . . . The [US] Navy was still obsessed with a strong feeling of technical and mental superiority over the enemy. In spite of ample evidence of enemy capabilities, most of our officers and men despised the Japanese and felt themselves sure victors in all encounters under any circumstances. The net result of all this was a fatal lethargy of mind, which induced a confidence without readiness and a routine acceptance of outworn peacetime standards of conduct. I believe that this psychological factor, as a cause of our defeat, was even more important than the element of surprise.rf .--,:agf,maimummugg JAN 13 OREA 12-558IND0(468160) 26 UNCL-13.-.CIFFICIA1 11Cr ()NH v Approved for Release: 2016/08/24 C06606667 I. Sudden Hostile Action Tear out along perforated edge for personal reference! Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED ICIAL USE ONLY Rfi Checklist 2 A Checklist of Key Warning Indicators F�Pynthia Grabo, a leading DOD warning officer during the Cold War, boiled down her extensive research on strategic warning into the following five risk factors for surprise attacks: Intentions: Feasibility: Capabilities: Options: Perceived risk: actorthe mmit e 0 so,MP' that,goa ideological obession? Is that objective obtainable via military or coercive means, at least under certain optimal circumstances that the potential actor thinks achievable? Do other options exist short of military or coercive means to achieve the objectives? (U) These five risk factors can be condensed into two sets of questions that analysts and IC teams can pose regarding potentially hostile actors in their areas of responsibility. (1) Goal fixation: (2) Mobilization: (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) s the presumed objective prompting the possible use of hostile action a national (b)(3) o session? Examples of national goal fixation include France's desire to regain the lost provinces of Alsace and Lorraine from Germany before World War I or Josef Stalin and Nikita Khrushchev's desire to weaken the West's ties to Berlin in 1948-61, before the construction of the Berlin Wall. Note: From Anticipating Surprise: Analysis for Strategic Warning (pp. 100-103), by Cynthia M. Grabo, 2004. (b)(3) JAN 13 OREA 12-309INDD(462651) (b)(3) I. Sudden Hostile Action 27 LINCI A A I IICC !NMI X/ Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 Type II Surprise: SYSTEM SHOCK Demonstrators demand the ouster of Egyptian President Hosni Mubarak. Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED/ L USE ONLY Type II Surprise: System Shock (b)(3) System shock involves the abrupt failure or rapid transformation of one or more complex systems. It includes sudden transitions from stability to instability, from order to disorder, from boom to bust. In Type II surprise, the focus is not on any unified actor but on a system or set of systems (see figure 5). �nA system can be a nation, a political arrangement, a country or regional economy, or a multi-ethnic community. sn It can also be a multilateral organization, alliance, or empire, such as communist Yugoslavia or the Soviet bloc during the Cold War. he action in Type II surprise is the result of manifold human actions and reactions, but the outcomes are not the result of design by any one actor. In contrast to the action in Type I surprise, system shocks usually take place in a more geographically diffused place (a country or a region) in a somewhat longer period of time�weeks, months, or even years�but the rate of change is much faster than in "normal times." In Type II surprise, once-stable regimes and systems can quickly unravel after a long period of apparent solidity. Subtypes and Examples of System Shock Theilverthrow of a Government. Such shocks result in to the ouster of a political leader, rather than the he term "butterfly effect" is one of the terms used to describe sensitive dependence on initial conditions in chaos theory. The term gained popularity after its use in the early 1960s by mathematician and meteorologist Edward Lorenz, who used it to explain the drastic, nonlinear changes in weather forecasts generated by his computer model of weather patterns. Lorenz attributed these large differences in forecasts to slight variations in his initial model settings, which he surmised could be caused in the real world by the flapping of a butterfly's wings. .(b)(3) Defining a Complex System (b)(3) A complex system can be defined as any whole (b)(3) or entity consisting of diverse, interdependent, interacting components that exhibit properties not evident in the behavior of the individual (b)(3) members�a trait known as emergence. Relationships among the parts contain both negative (dampening) and positive (amplifying) feedback loops. They are nonlinear, which means a small disturbance of the system may result in big changes (the so-called butterfly effect),h a proportional change, or no change at all, depending on particular conditions, which makes prediction even more difficult. Examples of complex systems include ecological communities, economies and social structures, global climate, � (b)(3) living organisms, regional and global strategic ' relationships, and modern infrastructures, such as telecommunications or energy. (b)(3) (b)(3) transformation of the social, political, or economic order. (b)(3) Examples include the ouster of President Ferdinand Marcos in the Philippines in 1986, the fall of President Mobutu Sese Seko in then Zaire in 1997, and the toppling of President Kurmanbek Bakiyev of Kyrgyzstan (b)(3) in April 2010. (b)(3) The Failure of a State. Such failures are caused by the (b)(3) state's weakness and inability to adapt after one or more shocks, such as acute sectarian or ethnic strife. Such state failures are often associated with widespread social(b)(3) dislocation and hardship as well as with other types of system shock, including revolutions and civil wars. Examples include Afghanistan during 1992-96 and(b)(3) 2001-02, Somalia during 1991-2004, the Democratic Republic of the Congo in 1997-2002, Bosnia in 1992-95, and Lebanon in 1975-90. f11\11 Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFI FFICIAL USE ONLY Figure 5 Anticipating System Shock Abrupt failure or transformation of a complex system or set of systems (such as a state, empire, or economy) � Rapid transformation of a complex system or systems�a state, economy, or international organization�or the rapid failure of a maladaptive system (an empire, an alliance, or a war effort) Bawler 0 System complexity, chaos, and randomness -Perception � Inherent unpredictability of the tipping points that lead to nonlinear changes�the effect butterfly � Observer's tendency to make straight line extrapolations � Difficulty of timing the onset of a system shock .os,tery.acji�,e,csensitnu '`..' eardir81in ous�Uecurrerices Source: Based on a review by a senior CIA analyst of more than two dozen cases of intelligence surprise experienced by US, British, French, Israeli, and Soviet services between 1939 and 2010. JAN 13 OREA 12-556INDD(466022) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) 29 II. System Shock uN ..r�pir a IICP (11�11 v Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED AL USE ONLY US Embassy personnel in Tehran--taken hostage by Iranian militants shortly after the fall of the Shah of Iran� are paraded in front of photographers. The collapse of the Shah's regime in 1979 demonstrates the rapidity with which system shocks can occur, as well as the lasting effects that such shocks can inflict on a wider region for years and decades to come. The Onset of a Revolution. Revolutions that sweep away an entire sociopolitical order and replace it with something different are rare. They include the revolutions in Russia, China, and Cuba; the uprising against the Shah of Iran and the emergence of an Islamic state in 1978-79; the breakup of the Soviet empire in 1989-91; and the dismantlement of the apartheid system in South Africa in the early 1990s. A Severe Recession or Grave Economic Calamity. In the economy, a system shock can originate in a specific market�the stock market, real estate, the financial sector, a fast-growing industry�and spread to an entire national or regional economy. The initial shock can be induced by an asset bubble that bursts or by a physical disruption of critical supplies because of war, embargoes, or labor trouble. Examples include the Great Depression and, on a lesser scale, the global financial crisis. The twin oil shocks of the 1970s�caused by pricing policy of the OPEC oil cartel after the Arab-Israeli war of 1973 and the Iranian revolution of 1978-79, respectively�are examples of supply-origin shocks. Environmental catastrophes�such as the accident at the nuclear plant in Chernobyl, Ukraine, in the USSR Famines caused by state actions that are motivated by ideological ambition, such as the large-scale Ukrainian famine of 1932-33 (early in Josef Stalin's rule) or Mao Zedong's Great Leap Forward in 1958-61, are more akin to Type I surprise� sudden hostile action�in their origins and in their effects on the victim population. Communal violence includes ethnic, tribal, linguistic, or religious disturbances that involve violence or the threat of violence and damage to property. in 1986�or famines' because of natural disasters, poor land use, or inept state policies can also trigger system shocks. Poor central bank management of the money (b)(3) supply can lead to hyperinflations, such as the one that plagued Weimar, Germany, during the early 1920s or Zimbabwe in the 2003-08 period. The Outbreak of Communal Violence. The outbreak (b)(3) of communal violence may illustrate system shock if it is primarily because of an unplanned flareup of longstanding social or ethnic tensions sparked by a random clash or incident, rather than to premeditated action by states or armed groups, which may choose to exploit the outbreak of communal violence as a pretext to further their goals. Examples of communal violencei include intermittent Hindu-Muslim violence in India, the Uighur-Han Chinese violence in mid-2009, the anti-Uzbek riots in Kyrgyzstan in 1990, and the anti-Chinese riots in Malaysia in 1969. Such riots are usually localized and rarely lead to state-backed genocide. (b)(3) (b)(3) (b)(3) The Collapse of an International Organization or (b)(3) Alliance. The breakdown of an international organization or alliance under mounting duress�unless it is the direct result of hostile military action�is also an example of system shock. Some military alliances�the World War ll "Grand Alliance" that defeated Nazi Germany, for example� break up because they achieve their immediate objective and then the member-states fall out over postwar security arrangements. Others, such as the Soviet-dominated Warsaw Pact, crumble to the result of dramatic changes in regime type or collapse of the dominant member. Still others fall victim to irrelevance and poor leadership, such as the Southeast Asia Treaty Organization in the 1970s. Barriers to Early Perception of Type II Surprise (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) There are two key barriers to early perception (b)(3) of Type II surprises, which tend to be obscured mostly by the unpredictability and uncertainty inherent in complex (b)(3) affairs, rather than by the secrecy of hostile actors. Real-World Complexity, Chaos, and Chance. Tumultuous events that engulf participants and onlookers alike�such as revolutions, state failures, the breakup of empires, and financial crises�result from the unceasing interplay of countless diverse variables, most of which are interdependent. The longer the list of II. System Shock 30 UNC' A C C I I I r rrr..r 1..1,1111 11,, J1,1\11 %I Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIE FFICIAL USE ONLY Patterns of Financial Bubbles: One Economist's View The features of. . . manias and financial crises are never identical, and yet there is a similar pattern. The increase in prices in commodities or real estate or stocks is associated with euphoria; household wealth increases and so does spending. There is a sense of 'We never had it so good'. . . . . Rational exuberance begins to morph into irrational exuberance, economic euphoria develops and investment and consumption spending increase. There is a pervasive sense that it is 'time to get on the train' . . . Asset prices increase further. The seers in the economy forecast perpetual economic growth and some venturesome ones proclaim no more recessions�the traditional business cycle .. . is obsolete. . . . An increasingly large share of the purchases of these assets is undertaken in anticipation of short-term capital gains and an exceptionally large share of these purchases is financed with credit . . . Then the asset prices peak, and then begin to decline . . . . . The decline in the prices of some assets leads to the concern that asset prices will decline further and that the financial system will experience 'distress.' The rush to sell these assets before prices decline further become self-fulfilling and so precipitous that it resembles a panic .. . The implosion of a bubble has been associated with declines in the prices of commodities, stocks, and real estate, and often these declines have been associated with a rash or a financial crisis. Some financial crises were preceded by a rapid increase in the indebtedness of one or several groups of borrowers rather than by a rapid increase in the price of an asset or security. Yr F7--Charles P. Kindleberger in Manias, Panics, and Crashes: A History of Financial Crises, 2005�three years before the 2008 financial crisis. Economic analysts can assess the resiliency of an economic system's financial sector, monitor early indicators of rapid inflation in assets prices, and brainstorm the broad economic, political, and social consequences if an asset bubble were to burst. JAN 13 OREA 12-312INDD(463892) 31 II. System Shock uNcLAccicirtiicno IICP Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED//FOR 0 E ONLY Anticipating Irrationality? An economic expert on financial crises, Charles P. Kindleberger, once listed some phraseology historically applied to speculative bubbles: Ct.. . Manias.. . insane speculation. blind passion . .. financial orgies. . . frenzies ... feverish speculation . . wishful thinking . .. intoxicated investors. .. turning a blind eye.. . a fool's paradise ... overconfidence. . . overspeculation . overtrading . . . a raging appetite .. . a craze. .. a mad rush to expand.il Economic analysts have to be alert to occasions when the strongly positive feedback loops associated with the early stages of a bubble develop, resulting in "herd behavior" that belies assumptions about rational economic actors. -.1205=VMarGarWrIfUg2M,11g.4.7i. ,2:1,12=7,20,,ONIWAX'St&reZVMMLIMM112d1=74a-LittelLa. actors and factors at play, the harder it is for observers to disentangle causal relationships or distinguish between clues that are relevant ("signals") and those that are not ("noise"). � Frequently, the causes and effects of accelerating instability blur when one variable�such as economic performance�is so tightly linked to other variables, including labor peace, tax revenues, welfare state outlays, and political stability. .n Natural disasters, accidents, blunders, weather, and chance further complicate strategic foresight by adding a bewildering element of randomness. Straight Line Extrapolations. Historical studies of intelligence failures and recent research into cognitive science both suggest that expectations that "tomorrow will look like today" are deeply rooted. Most human beings�including the foreign leaders and institutions that analysts monitor�have an ingrained need for order and predictability. On a day-to-day basis, analysts' expectations that any change in the short term will be modest and incremental will usually be borne out. � Most organizations�state bureaucracies, militaries, political parties�generally try to maintain an orderly state of affairs and adhere to standard operating procedures. The customs and protocols of diplomatic relations and international organizations channel and contain quarrels via orderly procedures and established patterns of interaction. � The Search for Universal Indicators of Political Instability Intelligence organizations and political scientists have long sought reliable indicators of looming political instability that are valid across systems and regions�so far with only modest success (see figure 6). Many experts deny such universal indicators even exist because of the importance of national and local idiosyncrasies and the sheer indecipherability of foreign actors. However, a contributor to the CIA journal Studies in Intelligence in the 1980s noted that, although the existence of reliable, truly universal indicators is doubtful, the presence of a youth bulge is often a common denominator of political instability. � The author observes that young people are generally more volatile than older people, have less in the way of vested interests to lose, and are more willing to protest. Thus, "if in the relevant population [nation, city, or ethnic group], the youth bulge hits a certain [undetermined] high percentage, a major change becomes more likely." A youth bulge skewed toward young males, especially in poor countries, may be a particularly acute early indicator of sociopolitical instability. The same author notes the importance of monitoring possible breaches of "implicit promises and bargains"�expectations shared by the leaders and the led regarding minimally acceptable standards for national security and honor, domestic order, economic well-being, and state accountability. Breaches of such understandings can, under the right conditions, lead to a powerful backlash among hitherto acquiescent populations. (b)(3) _azatrrazarwirgl (b)(3) (P) (3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) �._ Status quo�oriented leaders bent on keepinc(b)(3) power have a vested interest in projecting an image of strength, steadiness, and invulnerability�an image (b)(3) that may influence both the local populations and the IC analysts observing them. Taken together, these factors often buttress (b)(3) analysts' status quo assumptions, even as system volatility is increasing. II. System Shock 32 uNc ACCICIrr--7/../...C...;.........."7-11,) STM.L.Cini r-snre Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIE FFICIAL USE ONLY figure 6 Triggers of Instability: The Importance of Precipitating Events A trigger of political instability can be any catalyzing event that prompts significant numbers of once apathetic or intimidated citizens to take action against a government. Such triggers can take a wide variety of forms, depending on regime type, culture, popular grievances, and the state of civil society. Such triggers are usually unpredictable, driven by tactical conditions, and not always unobservable to outsiders�especially foreigners. Most governments can usually ride out one or two such triggers, unless they happen in rapid succession or the regime botches its follow-up response, resulting in a radicalization of once apathetic citizens. : k e of 'Rugger % � - . � ,, ,.: � taA4.W.P 141 I dan Destabilize a PilliikalW iDegree a&stem - � of Vteclictabihty 9 14 Cllii a ss'in into people,si,sensei'afin'figtie .. Iirlg 11-,6 b eritiat o dsitiornStSi 1::,take ,.actio Very crs,c-, esponse',1 i e en e nt �go_ d symbolic act .0 rbte'S ,i.. � ituatiop Snowballing Destabilizes regime; stretches or Very low. Response is local protest strains local security forces; may provoke bloody government crackdown. situation dependent. :,.. Eli td 'defections,t,Undercutsriartait'VeK) - 4,, P{J.,s,i,4"ifq,,q,1-;',..1;:ii. - ,3s- . O:Veintne , E'. Coup plotters Very ow .:aid power,grabs 'r4- ,siiiciyding cou , unityi'llf.Vit pera i t itraets.sleb. leaders hi .., .: e en ,orrsecree for success ' Natural or Botched or ineffective response exposes Low. Some weather-related earthquakes are More in terms of general location, civil disaster weak state capacity, ineptitude, or indifference of leaders, disasters or predictable vulnerability. 4. , f .:; ec huff q ,,,:' ,4,,;x,,, , Impedes1 (Weil:triter' -.ss.a...bilit. to act Moderate-' Leadersten health but enefal;effect�0 ' diseases are predictable ' ,,Ars,i.,zais- 5:, . ect;4'raise0;, 0.1, 6 ',,about' ea er01 6ssttece*Orrs rules"Jandcountry sfuture :4m rom ,ambitious rivl elites o-take ',=action rice ill age and some,. health" sudden e of ea er "i n , Rigged or � orsentit ,rVA; to,pdhpriS Alffi,�?`-ei,rSYt'j4'4W4g', - erceirye , Orl'e Moderate. Presence of NGOs in some countries to hide. Exposes government's lack of stolen election ..,, legitimacy; galvanizes people to take to streets; may provoke external criticism or sanctions, experienced makes it harder uts,,we ars,ian iye 1 od _v.o c104'enr, 0 erate,4y.ht c.onorrucr,-, - , ,p1,,,,,,N,- ,,t, .econorriic' T heealise o .,V.TA'Zitt% gpernr,hpri, q0r0fta 'at risk; m increaS'eseiiSef:O es efationv,reduces'. i';',WW''1141',07,Wr:-.'� ' 'citizens toleranceelite':fofs t' corruption t.aitbr�Tr:prtyateysctb.tact.9,rsTi4y. signal?�approaching7.,tippingipdirir Mismanaged national Exposes government's failure to fulfill Moderate to high. war effort; security fiasco its fundamental duty to protect the nation; strains civil-military relations; may reveal shortcomings of intelligence services. ar ressure e'.'Se Cif� an; emora tze:elites`-ran ,!embolden ,Moderate,,to'f;higb,:iFbreign*: ,inerea'se'iiii. frontOilesi outsiders,, oSSIO foreignpatron ot.the;iMpositionro ... ontsi 'e,sanctions;:q , OW o lows'iri�l weakening i'e' une:' nhients!i,stateMents:and,aCtidns-:, , n , _yerJ mill:ofteptie,o1),seryOle: JAN 13 OREA 12-552INDD(466025) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) 33 II. System Shock uNri. A C.C.11.1liC Clr`1111 IICC (11%11 V � Approved for Release: 2016/08/24 C06606667 --Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED/ � IAL USE ONLY Aids To Anticipating Type II Surprise Traditional intelligence sources are often of limited use in anticipating Type ll surprise, because system shocks often result from cascades or "tipping points"�when a system transitions rapidly from apparent stability to instability�that not even the actors within the system can accurately forecast. Herd effects and reinforcing feedback loops can rapidly destabilize or shatter a once-stable system more quickly than the typical reaction times of traditional intelligence reporting and analysis cycles. Intelligence reporting that comes into the analyst's work station is "old" news. Whether it was , collected only minutes, hours, months, or years ago, it provides a picture of what once was�not necessarily what will be. Analysts' long-established mental models and paradigms will no longer reflect the fast-changing situation on the ground, as a tipping point looms. IC analysts could therefore benefit from supplementing scrutiny of intelligence reporting with other means to enhance strategic warning of system shocks. These approaches and concepts focus on improving analytic anticipation of system shocks by: Assessing the potential brittleness and fragility of apparently stable systems. Enhancing awareness of the signs of rapid change in complex systems. Applying far-domain analogies from other fields, particularly the sciences, to anticipate phase transitions in intelligence targets. � Widening the range of imaginable outcomes. nticipate System Shifts and Tipping Points. ere is a growing body of scholarly and popular literature on the dynamics of nonlinear change in various domains. In journalism, academia, and intelligence, the use of such terms as "tipping points," "phase transitions," and "black swans" have become widespread. Awareness of even the basics of complex adaptive systems�reinforcing feedback loops, snowball effects, herd behavior, nonlinearity�can help analysts get ahead of the curve, without waiting for hard intelligence to come in after the system shock has already occurred. Although sophisticated mathematical modeling is required to fully exploit the potential of complex systems analysis, even a qualitative, graphics-based approach to the actors and the feedback channels can help analysts map a system's interactions and assess its vulnerability to system shock. : P On Black Swans Black swan" events�a term popularized by author and philosopher Nassim Nicholas Taleb in 2007�are extreme events outside the realm of popular expectations. They are difficult to model and carry heavy impacts, such as the rise of the Internet or the global financial crisis. Complex systems that have artificially suppressed volatility tend to become extremely fragile, while at the same time exhibiting no visible risks. In fact, they tend to be too calm and exhibit minimal variability as silent risks accumulate beneath the surface . .. These artificially constrained systems become prone to black swans�that is, they become vulnerable to large-scale events that lie far from statistical norms and were largely unpredictable to a given set of observers.. . catching everyone off guard/3 Essayist and philosopher Nassim Nicholas Taleb and scholar Mark Blyth in an essay from 2011 in Foreign Affairs magazine on the LArab Spring. (p)(3) (b)(3) b)(3) (b) (3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) Analysts can pursue a complex systems scoping analysis to identify the most important (b)(3) actors in a system, the basic rules for modeling actor behavior�such as maximizing profits for a company (b)(3) or bolstering security for a small country�and the system's most important and volatile networks. (b)(3) This assessi-nent makes linkages explicit and highlights those situations when herd behaviors can intensify the effects of an initial perturbation in a once-stable system. (b)(3) (b)(3) (b)(3) Employ Far-Domain Analogies. Analogies from the realms of engineering, medicine, and the sciences (b)(3) can help IC analysts conceptualize sudden dramatic departures from a seemingly stable equilibrium in the regions or issues they follow. Such analogies should not be transferred automatically across domains, but they can spur creative thinking about possible discontinuities in many analytic disciplines (see figure 7). � For example, concepts such as the "butterfly effect"�originally derived from meteorological modeling�can illustrate the idea that small initial changes may produce nonlinear results (or sensitive dependence on initial conditions), such as was the case in Tunisia when a minor altercation between a fruit vendor and a low-level civil servant triggered the unrest that deposed strongman Ben Ali in 2011 after 28 years in power. Continued on page 38 (b)(3) (b)(3) II. System Shock :.'"""""'.'""""""""""""""""""""'"""""rrrrer'�44X--Crkir'l ACC IIC fftIIw Approved for Release: 2016/08/24 C06606667 34 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED FICIAL USE ONLY Figure 7 Far-Domain Analogies: Aids To Anticipating Discontinuities Page 1 of 2 Concepts for rapid change from other disciplines or domains can help spur analysts thinking about the ways that discontinuities might crop up in the systems that they monitor. Simply brainstorming the types of "seismic forces" that may build up under an autocratic government, for example, can help analysts think creatively about the forms that a "phase transition"�a rapid transition from one state to another, from predictability to unpredictability�may take in their areas of analytic responsibility. Similarly, employing the analogy of "brittleness" from materials science to diagnose a maladaptive system�an alliance, an international organization, or an armed force under severe strain�may help analysts to think about system vulnerabilities in a new way. , ..., . ,. �,,, ,.. ) , Analo . .,,: , � .., � Cirigiiik i IA *.t,, Domain , . . � Hel ,.... - , ps . ysts' Better , 4 t".,,_,,,,n erstand. xthfples , ' � -FI . --....., ., . . Structural failure Engineering Failure of subsystem or system to adapt to new stresses placed on it se,,q ..!ar;regin*.!inrayelip ire; such as the Soviet bloc oslayia Breakup of an alliance or international organization; such as the collapse of the League of Nations, SEATO i'dtercb'd�dc kaYnmzF):?_ s em,:;, Failure ma _ at:tsar:11w qspiContagion/ lover effects Epidemiology Rapidly accelerating spread of behavior rpread of financial panics, stock bubbles, pandemics, computer viruses, fads arthquake/ avalanche Geology Sudden unleashing of formerly pent-up system strains or tensions, resulting in system shock and destabilization e evolution of the global balance ower; such �the system transition in' ostcornmunist states Onset of a revolution that ousts the old regime; such as the revolutions in Russia or China ystem,such as communist in. astern Europe and the of seCulr,.,diC't:torsh'i.PS:hi:'Egypt. and Tunisia efOre:201-1'� JAN 13 OREA 12-553IND0(466024) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3);b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) 35 II. System Shock UNC1 IICC V Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED CIAL USE ONLY igure Far-Domain Analogies: Aids To Anticipatin (b)(3) Discontinuities [Continued] A irialogy Chigul#1 11117 ' 't. Helpg , ystsltb Better .. , , nderstand Exfitriples. A Dolliam Butterfly Small initial changes echnological innovation and I effect/Snowball effect Meteorology that lead to large variations in long-term conditions 1 usion; crisis escalation Perfect storm :efeoiolti areo' ..�. :.,, f'cm inatiohs 'Tv.21.e.4.g., . ? nse o 614 a ,Tc, no o Ica . ., ..- est,4b,ilfiiii ,s:i,tuat.ion'or4cris'Is 4:,Intic,,sry �eyerits;A that taya e fsastersuc del i.V.Ai.r4, as e erno Ifnuele en Critical mass/ Physics i Threshold number Spread of the Internet, computer use, chain reaction of people or self-sustaining agents to trigger a phenomenon social races; networking media; regional arms (b)( mass unrest FITV -- 'Popular Tipping . - 1 I :N;,,,-.,:,--. b a i ,adce er�6ns inThe a &Ise 'of:a e iesSion,4riajor, 1 ,,- , ,*.J'.'','f,4 eof:,t ap e>cirlii e's re'a, 7 ;',o.1 efinancial on practices s ' crisis`-.�regime ::cO a S' ppints, - - s6C1616 . swans"/wild cards "Black sociology Popular "Random or extreme, Assassinations; extreme terrorism; I hard-to-predict shocks onset of World War I; diffusion of disruptive technologies Herd -. ljZoology/R4 id imitation or coied Sread'o mangial behaviors beliefs;.'coordinated to Without planned directionrrimiitta.48719 p�cs-�-,:s c u e-s; ideological.-cUrr,eri s spread,,of elle behavior! -demonstration � effects 'soc.1610 sy-dh6 6behavior b)(3) b1(31 (b)(3) (b)(3) (b)(3) )(i) (b)(31 (b)(3) (b)(3) (b)(3) (h)(3) (3) )0) (h1C31 (b)(3) b)(3) )(3) (b)(31 (b)(3) (b)(3) (b)(3) b)(3) (b)(3) JAN 13 OREA 12-553IN0D(466024) (b)(3) II. System Shock 36 uNci AccIFIFF1/ IAI ii nmi v Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED CIAL USE ONLY The term "contagion," originally from epidemiology, is often used to describe the spread of financial or political instability from one country or region to areas previous thought stable (immune) from such volatility. "Brittleness"�a concept borrowed from materials science�can be applied to political systems that have endured over time but that may yet be vulnerable to unforeseen shocks. This far-domain analogy is particularly applicable to personalist authoritarian states that have not adapted to social or technological changes and that may be vulnerable to swift overthrow if a political challenge arises suddenly or from an unseen direction. Analytic teams can brainstorm the pillars of traditional authority in the countries or institutions that they follow and examine the relative degree of brittleness of each pillar, over time. nAPPLICATION Analysts can list or brainstorm in small groups the possible discontinuities that may loom in their areas of analytic responsibility. Using a handful of far-domain analogies for massive discontinuous change�earthquakes, perfect storms, "black swans," phase transitions�can spur creativity. Such metaphors for big change can help analysts get past status quo assumptions and dispel entrenched mind-sets regarding the permanence of only linear or evolutionary change. For example, analysts might regularly ask the following questions: What sorts of fault lines exist in my area of analytic responsibility�such as the aspirations of a rising social class versus the power and privileges of an entrenched autocratic ruler, the enduring enmity between two ethnic or religious groups, or the irreconcilable goals of two parties locked in an enduring strategic rivalry? With these fault lines in mind, what keeps the lid on? How strong are those forces for restraint? Might these inhibitors be weakening? What factors might bring those latent antagonisms into open conflict? What might make an "earthquake" more likely? What might trigger a catastrophic event? What might happen after such a catastrophe occurs? The discussion should include the nonobvious, indirect, and long-term effects, as well as the more immediate, likely, or obvious ones. (b)(3) Conduct War Games or Crisis Simulations. Apart (b)(3) from their utility in assessing the risks of sudden hostile action, these exercises can also help analysts game out a complex sequence of events. A war game or simulation is a technique designed to model�either rigorously or creatively�the operations and responses of a real-world process, organization, or system over time. No other tool is as helpful in scoping the dynamics and in bounding the imaginable outcomes of multiple interactions among many interdependent actors, such as those precipitated by the launch of a separatist movement or the escalating tensions caused by a radical state on the brink of acquiring nuclear weapons. Academic studies�amply supported by centuries of military experience with simulations�demonstrate that no other method consistently provides players with a more realistic sense of the volatility, time pressures, perceptions, and risks of unexpected moves by actors in a strategic game environment. Simulations can also provide players with a laboratory to challenge assumptions, test the readiness of actors for escalation and discontinuities, and explore the effects of randomness, friction, and wild cards on crisis scenarios. APPLICATION As a historian of technological failures, Charles Perrow in the 1980s examined "normal accidents"� his term for the "inevitable" failures of tightly coupled technological systems, such as nuclear power plants, space vehicles, and oil rigs. Other analysts of technological systems speak of "cascading failure." Perrow's concepts can be applied to complex political and economic systems, such as the EU, the Chinese Communist Party, or the global financial system. Analysts planning a simulation can ask, "What are the 'normal accidents' waiting to happen?" in their areas of analytic responsibility�such as the inability of a stagnant authoritarian system to manage a serious economic downturn. They can then examine what other systems�economic, security, or military� may be at risk of spillover effects should the political system fail. (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) 37 U;CL lA I II CC v Approved for Release: 2016/08/24 C06606667 II. System Shock --Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED/ IAL USE ONLY Identify and Monitor Breached Social Contracts. Just as deep understanding of a potential foe's strategic red lines is critical to assessing the risks of a surprise attack, so is awareness of informal social contracts�the unwritten expectations of accountability and obedience between the rulers and the ruled�critical to the assessment of political stability. Implicit promises and bargains are key elements of political stability. Such understandings limit uncertainty and set ground rules, according to one intelligence officer involved in instability analysis. When a social contract is breached, it creates preconditions for political instability. Examples of such breaches might include blatant electoral fraud, a policy blunder, flagrant corruption, scandalous conduct by an unpopular member of an autocrat's inner circle or family, or unprovoked violence against unarmed protestors, especially if such breaches are captured in visual media that can be disseminated widely. APPLICATION Periodic reviews of the terms of various country-specific social contracts and of possible signs of a violation may tip off political analysts to an erosion of legitimacy that often precedes a political system shock. Analysts can ask, "Is country X now breaking an implicit social contract, or is it likely to do so in the near-term future?" Seasoned substantive experts are the best sources for identifying the terms of implicit promises between the leaders and the led and for assessing the indicators of a possible breach. t ,=r.vmm.xuaaea, Conduct "What If" and High-Impact Scenario Analyses. Well-crafted scenarios and alternative futures can also help analysts move beyond near-term tactical assessment and straight line extrapolation. Academic postmortems of various intelligence failures often point to the penchant for single-point predictions�often (b)(3) anchored around the yesteryear's status quo�as the bane of sound strategic foresight. Well-depicted scenarios that are based on valid key drivers and fleshed out by multidisciplinary experts can widen readers' range of imaginable outcomes. APPLICATION IMO (b)(3) (10)(j) "What If" analysis involves postulating that (b)(3) a possible discontinuity has already occurred. This allows analysts to sidestep irresolvable debates over the likelihood of the event and focus on the possible drivers, proximate causes, and signposts of the postulated (b)(3) event. Analysts can work backwards to, envision one or more plausible paths to the event and reason forward to assess its direct and indirect implications. High-impact scenario analysis is similar. It (b)(3) allows analysts to move beyond status quo assumptions and expectations of small-scale change and focus on the more worrisome discontinuities that could be looming., the probabilities of which are generally thought to be low but are actually uncertain or variable. (b)(3) �(b)(3) Unlike in the physical world, a shock in the realm of human affairs does not typically result in a swift return to a stable, if drastically altered, new status quo. Instead, system shocks often lead to relatively long stretches of grinding instability and unpredictability, as various actors try to comprehend and cope with new conditions, exploit or resist opportunities for further change, and pick their way amongst the ruins of the old order. Major wars, widespread regional unrest, and the falls of empires are notorious for ushering in years and decades of heightened instability in their turbulent wake. (b)(3) Analysts working such intractable circumstances should have little expectations of a rapid return to preshock normalcy or stability. Daisy Chains of System Shocks (b)(3) (b)(3) (b)(3) (b)(3) II. System Shock 38 UNCI ir-ini liar N/ Approved for Release: 2016/08/24 C06606667 Approved for Release: 2016/08/24 C06606667 Type III Surprise: TECTONIC TRANSFORMATION nA Chinese high-speed train makes its way toward the main line. Approved for Release: 2016/08/24 C06606667 --Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED/ FICIAL USE ONLY Type III Surprise: Tectonic Transformation (b)(3) Tectonic transformation involves the alteration of an entire domain or region, such as a continental economy, a regional military balance, a belief system, or technological network. Unlike sudden hostile actions or system shocks, tectonic transformations are not discrete events but extended historical processes, often lasting years or decades (see figure 8). They do not involve sudden or immediately obvious change, but rather large-scale, cumulative evolutionary changes that transform with gathering momentum entire domains, along with the strategic, political, and economic systems therein. In Type III surprise, the main actor is a national, regional, or global system�such as the industrialized Western economies or the global security system�made up of a huge number of interdependent actors that include people, societies, states, and institutions, none of whom control the domain. The engine of change�for example, the emergence of a revolutionary new technology, a compelling new ideology, or a new global power�drives the gradual but deep-rooted transformation of politics, society, economic life, and military affairs. � In Type III surprise, the surprise is usually not the main driver of change itselfbut rather the social, political, economic, and military consequences of that driver. The widely distributed, cumulative nature of tectonic change often eludes observers, including intelligence organizations. The changes associated with Type III surprise are usually imperceptible at first and then deceptively inconspicuous�"hidden in plain sight"�compared with the day-to-day "crises" featured in much of the global media. Subtypes and Examples of Tectonic Transformation Economic Transformations. Sustained, tt-.4t0' IsiandtiMathematically iflen e!;,Eate4o s theeind deMvatie']. positive, tis -with vinfle2,9;4r etu ii�14 ie ur;q Is5,6 ve 1.4. 01 ill CI,'.1-1jelci:1.14''Cl'EPI; techniques vastly increase long-term labor productivity and overall productive capacity. These gains, in turn, permit large jumps in living standards, food production, public health, state capacity, and military potential. These transformations are invariably linked to dramatic changes in business organization, working conditions, and producer-consumer relations. Over time they also transform politics, societies, and education. � �Lilirhe Industrial Revolution that began in Great Britain in the middle of the 18th century and that made the United Kingdom the world's most powerful state by the middle of the next century remains the leading example. Other examples include a unified Germany's explosive industrial growth between 1870 and 1914, the expansion of the aerospace industry in the United States between 1930s and early 1970s, the global revolution in information technologies since World War II, and China's meteoric economic ascent since 1979. (b)(3) b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) accelerated improvements in tools, technologies, and C7-7-71-er--izur�ci rs I A I I Ic RII Approved for Release: 2016/08/24 006606667 Approved for Release: 2016/08/24 C06606667 UNCLASSIFIED// CIAL USE ONLY Figure 8 Anticipating Tectonic Transformationa (U) Sweeping changes in regional or global domains (such as an interstate system, ideologies and religions, societal mores, technology, or economy) ves1/4 Bapriers ma s/onornic ormatiomsincei', mer encel.o 22. Extensive long-term changes, fundamental alterations of core technologies, economic systems, demographic patterns, political allegiances, or ideologies�often culminating in an epiphany, an event that exposes the sweeping scale, significance of change , ustrial1f.045�I, c o i&;:tr an�s Ogg' edc�ew, griidtita 'elfef.s steha' rarkjrnL�jnism ro*th of social';.movemen (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) (b)(3) The widely distributed nature of bottom-up change that is hidden in plain sight (b)(3) The large scale of change�impossible for an observer to monitor in entirety Scope, dimensions of change�too diverse, contingent to forecast accurately Xdritmei,cbrer system, rlyersoden i technologies brainstorma,theiteffeets wit ,, . , , ; ,,, . �Aii--vf..4755,;5/5,4545,.