WARNING COURSE - III

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP91B00776R000500050005-7
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
15
Document Creation Date: 
December 23, 2016
Document Release Date: 
October 23, 2013
Sequence Number: 
5
Case Number: 
Publication Date: 
August 11, 1983
Content Type: 
MISC
File: 
AttachmentSize
PDF icon CIA-RDP91B00776R000500050005-7.pdf619.35 KB
Body: 
Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 AUG 1983 Warning Course - III Scope Notes I. Warning Structures and Vehicles a. Informal Warning Structures Warning is often accomplished and usually assisted by the informal networks and associations that exist within and across the agencies of the intelligence community. These constitute the informal warning system which functions most importantly in crossing the institutional synapses of the warning system. The vehicles, manner of operation and strengths and weaknesses of this system will be treated. b. Institutional Warning Structures The more familiar components of the warning system are the horizontal and vertical control mechanisms within agencies, the analytical centers and the alert centers which perform within the system. This section will address the alerting systems that energize the agenciesp the vehicles that convey the warnings from institution-to, .institution; their issue handling modes; and provide examples of operations. The discussion of handling modes is an analysis of system operations from an external standpoint. Mainstream handling literally includes physical changes in work arrangments, locations and so on, all of which send a signal to the receiver of warning. Handling by exception sends its own signals, usually in the form of alternatives to the mainstream point of view or assessment. Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 L6-22. 4,e tal kameI I c. The National Warning System - 1983 This presents our latest understanding of the national warning system, its purposes, prime directives, players and concepts. As in the past, the national system is confederal rather than unitary or centralized. Unlike the past, no single analytical entity ( National Indications Center or Strategic Warning Staff) is responsible for warning, but every agency is4 The subject matter of warning is not just war, but any threat to the US, its persons and its interests. The targets for monitoring potential threats are no longer the communist countries 1. The Director of Central Intelligence is the PreSident's top warning officer. The National Intelligence Council provides the DCI with substantive analytical support and an ability to integrate analysis from within the various agencies. The NIO for Warning is the system's mechanic, working on the process of warning more than the substance. 2. 2. The component agencies are responsible for warning their own audiences or constituencies, whereas the DCI and the NIC , provide the whole community outlet for warning. DOD continues to have special responsibility for tactical warning. 3. Each alert center fits into its own agency's warning structure. Generally alert centers provide trip wire services and safeguard against surprise for their respective consumers. 4. The key objective of both institutional and informal 2 Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 CPT C warning systems is to achieve a high degree of reliability. How the systems look is less important than how well they work. 5. Current and estimative intelligence often prdVide warning, buth they serve many other purposes as well. Warning is exclusively devoted to coping withharm, one of many topics in current and estimative intelligence. When they deal with harm, they are actually providing warning. Warning also has distinct purposes, practices, processes and concepts, which mandate that analysts in other-fields of intelligence receive training for effective warning. II. Cognitive Process -- the psychology of warning a. Definitions and Terms These include the DCID statement about warning ( ...includes measures taken to avoid surprise), the classical terms strategic and tactical warning, and new terms warning of war, warning of attack and warning of developing crisis. The pivotal definition linking warning in all areas is, warning is a communication of a'judgment about harm conveyed clearly to a decision?maker in sufficient time to deteri, avoid contain or cushion the impact of the harm. b. Warning Phases Psychologists have identified and defined six phases in a warning episode. These are recognition that a harm exists; 3 CRT, Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 ? ,; 4432? gym RET validation that it is genuine i definition of its components (nature, gravity, probability, timing, direction, and duration of the harm); communication of these judgments to the persons capable or charged to cope with the harm; their independent evaluation of the situation by means at their disposal; finally action steps to deal with the harm. The phases are not sequential, but actually near simultaneous, repetitive, interactive and continuous. Additionally, they proceed simultaneously within the intelligence and policy/decision-making arms of the-government, which influence each other. c. Evidence Most treatments of evidence deal with the collection sources. This is often misleading as to the probity and diagnostic value of the information conveyed by the collection source. This treatment establishes the standard of evidence as that required in Tort Law: evidence sufficient to induce a reasonable person to take prudent-precautions under the circumstances. The circumstances. include ambiguity of the information, risks, costs, time and opportunities for action, action choices available and situational considerations. The Law of Evidence contains rich examples of the kinds of inferences that may be drawn safely from particular kinds of evidence. For the purposes of analysis, as opposed to system management, these examples are instructive, if not enlightening. An important rule is that the more filtered or handled the 4 Ar'-76E7M LS:441 Fl Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 ?, Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 Ltizi ,Ibarr.. Atm; ? information is, the less reliable are the inferences that may be drawn from it. d. Probabilities This portion of the course must TEACH (not familiarize) the difference between impact and likelihood. Types of events--independent, dependent or mutually. exclusive--must be defined and illustrated so a person can identify the appropriate probabilistic rule (formula) to apply in calculations. Marginal probability of a single event must also be mastered, followed by joint probability of MP. more than a single event. This is in two forms: the and form as well as the or form. After these forms have been mastered, conditional probability is undertaken. The relationship between logic, math and probability diagrams (tress) must be used throughout. Finally, the implications of new information and how the news changes a priori probabilities must be mastered. (Bayesian probability) e. Uncertainty and False Alarms e The following probability matrixmust be developed in terms of the sixv factors listed under "Phases".: gravity, probability, nature, duration,timing,direction of ham. It is important to distinguish which factors failed in a warning assessment because the warning is no longer a false alarm but a near or remote miss. The important message Of a warning is vigilance not reassurance. 5 rs'n F7). ?10 LMIST Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 Mixing the signal leads to a breakdown in credibility which is reinforced by failure to distinguish between false alarms and misses. REAL WORLD EVENT ; .HAPPENS : DOESN'T HAPPEN: ........ ? :Analyst says it: HERO CRYs FOX :will happen :Analyst says it: :will NOT happen: ... . DUMMY OK BUT NO CIGAR When warnings are early, usually information is ambiguous. This does not mean that no action is possible or desirable. Quite the contrary. At this point thearray of harm-handling measures is broad, the costs of action low, margin for error is large and so on. Once information becomes unambig- uous, the costs rise, opportunities diminish and many are already lost, and the margin for error is very, small. Harm is not avoided even though surprise may be. Early harm-handling actions are reasonable when they reflect the circumstances of ambiguity, are intended to clarify that and also deal with the harm as it is known at the time. The tradeoffs must be 6 C:Zt RET Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 fr 17F4Y"'K-4) 4,4,0 understood. III. Analytical Techniques a. Traditional analysis approaches The analysis of intelligence problems is approached from the perspective of the amount of information available to reach the correct conclusion. The methodology to be used by the analyst must match the degree of uncertainty, in the avail- able information. Case 1 -- Complete information is extant. The proper technique to be used involves logical processes. This is essentially a series of structured facts. Case 2 -- Incomplete information exists, but what is extant is sufficient to be treated with probabil- istic techniques. This involves understanding the probabilities for both discrete and for continuous events, and the application of some form of parametric or nonparametric hypothesis testing. Case 3 -- Sparse information exists, but it treat with probabilistic techniques. This is insufficient to requires the analyst to rely on,individual or group expertise and the way probability diagrams can help focus on outcomes. b. Role of assumptions and biases This section draws on the work done,by:Heuer, Jervis and others pointing out that analysis may be faulty owing to problems in cognition -- how mental processes work; 7 C ET Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 conception what they work on abstractly; perception -- what they work on as reflected from reality; and expectations -- what a person thinks will occur before it occurs. Eaph of these factors are in turn influenced by group and organizational dynamics, cultural factors and so on. In so far as these create for a person a system that predicts reality well and provides meaning to it, they are in stable balance. A system that fails to incorporate reality-checks is flawed for intelligence work. c. Indications analysis The US intelligence community has developed an inferential, indirect technique which it dignifies withe the name, "indications intelligence." This technique attempts to ascertain the nature and timing of hostile intentions and capabilities from the observed actions whibh.have as their common purpose the readying of a hostile country for hostilities. Its basic assumptions are that national behavior ultimately must disclose both intentions and capabilities, manifest in observable forms. A key tool in indications analysis is the indicators list. - , This represents a synthesis of learning about the behavior of a nation, usually its armed forces, as well as a check list of the types of behavior to expect in a 'crisis or prior to a war. It is an essential tool of inductive analysis based on indications. Indicators tend to be abstractions from the real; indications are their real counterpart. A good analogous type of analysis is performed'by doctors assessing symptoms. 8 rcpETj Declassified in Part - Sanitized Copy Approved for Release 2013/10/23 : CIA-RDP91B00776R000500050005-7 Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 .17 DIA,CIA and NSA1 have each developed their own variations of this analysis technique. d. Looking for Decision points This is essentially a combination of influence diagramming and decision theory. The analyst must be taught to construct a series of cause-event inluential relationships and to display them graphically. An analysis of the known events and of inferred events will permit some form of reasoning, either Bayesian or Treeing, and the sensitivity testing for guessing (used to fill gaps in the diagram). This will disclose certain decision points that must be reached for some activity to transpire. The decision nodes are then treated inferrentially. e. New Frontiers Among the new frontiers in warning research, either in predicting outcomes or intentions and capabilities before outcomes, are Expected Utility Theory from the University of Rochester; Catastrophy Theory; and Tree Analysis, usually Bayesian. Some attempt to employ.these techniques will be , offered. Additionally some exposure to Expert Systems in the field of artificial intelligence will be presented. An initial effort at Fault Tree Analysis, akin to automotive or medical diagnostic procedures, will be available for review. The theme of this section of course work is to open an analyst or mid-level decision-maker to the variety of 9 ram gpV, 4641 1.111.M ET Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 (-5 r-7-1777,171 .1 -I LI= I - techniques and the richness of research now available for application to real world problems. Facility in moving among these techniques as well as in incorporating them into routine analytical habits will improve the credibility of the intelligence product. IV. Warning Lore -- the lessons of US experience in warning a. Deception and Security Deception is a distortion of reality as perceived. It may be divided into dissimulation -- hiding what is real; and simulation -- presenting what is not real. In each rsubdivision are physical and conceptual branches. The most sophisticated deceptions are those that are simple enough to be believed; mounted when the deceiver holds the initiative; are well- prepared over a long period of time; and aim to achieve a large measure of surprise. The aim of all deceptions is to induce the wrong decisions by the top leadership of the target. Lesser but acceptable-aims are to mislead or confuse that leadership. All successful deceptions require a feedback channel, either human,or technical. The most reliable safeguard against deception is a reality check for consistency and congruence between words' and actions. Such tests are more easily spoken of than applied. b. Other Lessons Learned This is a compendium of the US warning experience as 10 ttai, LLIM! ET Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 SECRET influenced by crises. For example, -- nations plan early and prepare carefully for ??? 41. hostilities; wars hardly ever happen by chance, accident or drift; -- military actions are usually the latest of the actions a nation takes to prepare for war. They come well along in the decision-making process; -- measurements of capabilities are not especially valuable either as measurements of true capabllities, or as reflectors of intentions. Capabilities are not as self-evident and "concrete" as most analysts presume; -- failures in warning have almost never occurred because of technical failures or the absence of information owing to poor collection. Invariably they have been failures of judgment. - -- Others b. Decision-making Decision-making has been analyzed from many vantage points. Among analysts there is a tendency to assume conscious value optimizing choices. This is a Greek model reinforced by Euclidian logic and mathematics. An alternative, equally 'predictive approach is that optimizing choices flow after action has begun and initial consequences weighed. The fotmer is intentional or premeditative. The latter includes negligent behavior and contingent intentions. 11 Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 There are many analysts who also assume the primacy of individual rational actors. This minimizes the role of large bureaucracies in mitigating decision-making and mediating decision-making's contact with reality. Finally decision-makers are often spoken of and written about as if unitary role players. In fact, the roles and information needs of decision-makers are as complicated and manifold as people working in intelligence. Warnings may stray when they ignore the role diversity of the decision-maker. ? AP V. Sources of Information a. What to expect from each collection discipline Reliable and accurate human source reporting remains the most vulnerable to deception yet the most valuable source of information as to intentions,plans, and resolve to act, etc. Signals Intelligence has the advantages of its technical medium as a safeguard against error, but'is still subject to human manipulation of the information conveyed . The more technical branches of SIGINT provide more reliable information about their specialties but become far removed from motivation , intentions and other peculiarly human characteristics of action. Imagery is invaluable but subject to four inferences: what is observed has been observed surreptitiously and is accurate; that which is imaged was deliberately permitted to be imaged; 12 1 (r.i v'' ? #' ' ''' -'7,-:.... s'-'1 .s. Aqi la, isil Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 r.'"616's dxA !"4 zoom I the item was too large or extensive to be hidden; the item was such that the target didn't care whether it was imaged ? or not. Analysts need to learn the advantages and disadvantages of each collection source andhow to read the product of each. b. Quo vadis technology? Technology is rapidly leading towards an era of instant and disposable analysis. Machines don't make better warning; they make better analysts, who make better warning. This section would also treat the tremendous, mind-expanding increases in analytical capability that new machines make possible. This expanded capability imposes its own demands and burdens on analysts and on the intelligence community. On the Other hand, decision-makers can become ensnared by the information potential machines provide. The balance is delicate, evolving and often far from clear. VI. History of US Warning This portion of the course would build upon materials already compiled around the training institutions of the community. NSA has some films on the history of cryptanalysis. NWS has some films on the history of the warning community itself, featuring of the NIC. DIC has 25X1 other materials. One portion of this topic would inalude dicussion of community performance in recent crises -- 13 ?;?1'.;:1"..; Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7 AP - crr'n r":773 r.-73 fr"4' . t; U VII. Discussion of General Warning Subjects a. Past Viewpoints This topic deals with what has been tried by the US Government to achieve reliable and responsive warning. False starts include organizations, substantive areas of concentration and gimmicks. b. Current Theories These rapge from Betts' "intelligence failures are inevitable" to DCI's "no surprise." The better theories stress that understanding how we know that we know provides a hopeful vision of warning analysis. Each agency in the community has its own characterization of warning, including who does it within that agency and what the warning element will do. These variances constitute the poles of operational theory in intelligence. Specific issues include the need for and role of community warning products; the need for coordination; the role of alert centers, the roles and' actions of mid-level managers and the effects of products. The community, for example, does not control its behavioral signals which tend to contradict its substantive messages. The volume and repetition of production destroys the vigilance message which is the substance of warning. Community treatment and discussion of false alarm erodes confidence in the customers of intelligence warning. (- 14 e , Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91600776R000500050005-7 25X1 25X6 Declassified in Part - Sanitized Copy Approved for Release,2013/10/23 : CIA-RDP91B00776R000500050005-7 '?7t:1; V,,,m21 Ls!: eitaza g There remains a need for a community warning vehicle. One aspect of such a vehicle is to avoid making every problem so familiar as to frustrate warning, because of conditioning. Finally, our systems need to be conscious of the need for consistency and congruence, even on a day-to-day basis. c. The DCI's views This is a forum for the DCI or the NIO/W to present the viewpoint of the DCI. 15 fr.77-fr"r-.:1 Declassified in Part - Sanitized Copy Approved for Release 2013/10/23: CIA-RDP91B00776R000500050005-7