|
|
(Administrivia:
Forward Observer Magazine is looking for a new associate editor.
If you have any experience in editing or design, and you’re interested
in contributing to a pro-Liberty, Veteran-Patriot publication, please
get in touch with us at: editor (AT) fwd-observer.com.) I had a couple really good questions this past weekend about looking for indicators signaling a SHTF situation. How can we tell an emergency event is going to happen before it happens? What can we look for?
Those are very good questions but they’re not easily answered.
We’ll work on breaking it down here. I want each of you to have a
way forward to start developing your own Early Warning Indicators (EWI)
for whatever threats you may be expecting. To
best describe EWIs, I’ll start with an analogy. Intelligence
analysts identifying EWIs are a lot like insider trading. Inside
traders who buy or sell a company’s stock do so because they learn
sensitive information signaling a shift in the real or perceived value
of that company. Inside traders sell off a company’s stock before
news comes out that the company didn’t meet analysts’ earnings
expectations. Alternatively, they buy a company’s stocks because
they learn that a company will exceed earnings expectations, and then
they stand to profit once that news is published and the stock price
increases shortly after. Another
fitting analogy is a warning from a fire alarm or tornado siren.
The ‘intelligence analyst’ in this case smells or sees smoke and then
pulls the fire alarm (or the smoke sensor goes off
automatically). Meteorologists or eye-witnesses confirm that a
tornado or tornadic activity is in the area, and then the sirens go
off, alerting nearby residents of the need to get to cover. Governments
around the world encourage (pay) intelligence analysts to identify EWIs
in order to predict future ‘moves in the market’ of conflict and
geopolitics. But identification of EWIs is only one part of the
equation. Without the ability to ‘see’ the battlespace,
intelligence analysts aren’t effective. We need the brain (the
analyst) in order to identify EWIs, and we need the eyes and ears (the
collector) to inform the brain about the environment. Developing
eyes and ears is a critical step but we won’t talk about that now (go
to the Collection category of this blog to read all the intelligence
gathering articles). So once
intelligence analysts have all this information coming in, we start to
get a good picture of the full spectrum of threats in the
battlespace. Now there are four types of threats: Conventional,
Irregular, Catastrophic, and Disruptive. Conventional Threat. The
conventional threat is the standing, uniformed army; the police state;
the occupation, the tyrant, the powers that be. The conventional
threat has doctrine and authority. They don’t need to hide
because their strength is partly in their visibility and
presence. The US patrol in Muqdadiyah, the FOB in Musa Qaleh
District, the police outpost in Ghazni City. It’s the force that
carries out the application of law, and the force that defends the
interests of the political power. Irregular Threat. The
irregular threat is the near-opposite of the conventional. The
irregular threat is marked by blurred lines. Those blurred lines
form along soldier/civilian, political/military,
organized/disorganized, centralized/decentralized, among others.
The irregular threat are gangs, insurgents, guerrillas, and
terrorists. The irregular threat’s power is typicallyde facto; they’re here, therefore they wield power and influence. The irregular threat typically doesn’t hold de jurepolitical
authority, and if they do, it’s manifest in shadow governance.
The irregular threat is marked by civilian clothes and military
weaponry; and most typically favor opportunistic targeting and
remaining hidden over long-term, open maneuver operations and shows of
presence. Catastrophic Threat. The
catastrophic threat is existential: natural and man-made
disasters. Threats like tornadoes, hurricanes, and earthquakes;
nuclear meltdowns, weapons of mass destruction, and
national/financial/monetary collapses. Unlike conventional and
irregular threats, you can’t defeat catastrophic threats. Once
conflict beings, conventional and irregular threats can be
stopped. You can’t stop a tornado, you can’t stop a nuclear
explosion once it’s begun, and there’s nothing you can do to stop a
nation or society in collapse. Disruptive Threats. Disruptive
threats aren’t necessarily direct threats like the previous
three. If you are a target or in the way of a conventional,
irregular or catastrophic threat, then you are facing an existential
threat. A disruptive threat disrupts (spoiler alert); it can be
considered a ‘strategic shock’. Technology developed at the NSA
or Google that assaults privacy and the Fourth Amendment is an example
of a disruptive threat. Biometrics and collection of biometrics
is a disruptive threat. A computer virus is a disruptive
threat. Identity thieves are disruptive threats. Electric
cars manufactured by Tesla and others are disruptive to large
combustion engine vehicle manufacturers (if not today, then certainly
in the years to come). The Chinese ability to target US aircraft
carriers (the so-called “carrier killer” missile) is a disruptive
threat; it changes the balance of geopolitical or military power.
It may never be put to use but the mere ability is disruptive.
Disruptive threats won’t necessarily kill you, but they will ‘disrupt’
your life, organization, or mission. Identifying EWIs. So
in order to identify potential EWIs, we first need to look at the
specific threat. One of the threats pointed out previously was
martial law. One of the most helpful exercises we, as
intelligence analysts, can do is to start from the end state and
backwards plan out all the possibilities. (If you’re interested
in these and other advanced structured analytic techniques, sign up for
one my Intelligence Analysis courses. Email me and let’s set up a
course in your area. It’s one of the most practical weekends
you’ll spend as a prepper or patriot.) An
easy example: a burned grilled cheese sandwich is our SHTF event (First
World Problems). What could have gone wrong? Off the top of
my head, (A) the chef could have left the bread on the skillet for too
long, or (B) the skillet could have been too hot. Here we start a
tree. Why would the chef have left the bread on the skillet too
long? (A1) He was distracted. (A2) He’s poorly
trained. (A3) He died. Why was the skillet too hot?
(B1) The chef is poorly trained. (B2) The stove eye
malfunctioned. (B3) The knob is fitted incorrectly. We continue
so on and so forth until we exhaust all possible options, regardless of
likelihood. We’re brainstorming here; attempting to find the
widest range of options. Remember that without knowing the
circumstances or context of a situation, even outliers are possible
explanations. The low likelihood of an event doesn’t mean that
the event didn’t or won’t happen. In 1904, the Japanese launched
a preemptive, surprise attack against a Russian fleet during the Battle
of Port Arthur. Knowing the context of this battle should lead a
good intelligence analyst to make a similar assessment about the
possibility of a surprise attack against Pearl Harbor nearly forty
years later. Of course hindsight is 20/20, however, seemingly
unimportant information paid due diligence could have made all the
difference. Moving forward, we wake
up tomorrow with news reports of martial law in the metropolitan area
closest to us. That’s our starting point. We ask ourselves,
“What caused martial law?” We identify all the potential causes,
all highly dependent on many factors such as region, year, political
leaders, and others. We create as long a list of causes as
possible and then we start looking for our indicators. An
indicator is an observable or potentially observable piece of evidence
that leads to a logical conclusion. A stack of newspapers piling
up in a driveway and a lack of lights on inside the home at dusk when
every other home on the street has its lights on has a logical
conclusion: no one’s home, and no one’s been home for a few days.
The stack of newspapers and the lack of lights are our two
indicators. Tom and Laura loading up the minivan on Friday
morning with the kids, beach chairs, floats, and a couple suitcases is
an indicator that they’re going on vacation to the beach. If
I was to ask you – the intelligence analyst – when Tom and Laura were
going on vacation, then ‘packing up’ should definitely be an indicator
we look for in determining when they’re leaving. In this case,
you’d report back to me that Tom and Laura have been observed packing
and that their vacation is imminent. That’s not much of an early
warning, but when talking SHTF scenarios, three seconds, three minutes
or three hours could make all the difference. (If this was a real
life scenario, we’d be employing all the techniques I teach in the
Human Intelligence Collectors Course. If you’d like to collect
intelligence information from human sources, then sign up for a future
course.) Back to martial law, identify all the potential contributing causes. Ask yourself, “What would I expect to precipitate martial law in X city?”
My list would start with riots, civil unrest, terrorist attack, and
monetary collapse. If any of those things become observable, then
I’m going to be on alert for martial law. Taking it one step
further, I’m going to start looking for indicators of those
contributing causes. A white police officer shooting a black man
could start a riot. A humanitarian crisis or extreme political
event could cause civil unrest. “Increased chatter” or the
publication of a credible threat could indicate a terrorist threat is
expected. Large swings in the market, a failed Treasury bond
auction, or a public announcement of dumping the dollar from a large
country or a confederation of large countries could precipitate a
monetary collapse. In business we
use Y3 or Y5 analysis – Why?, Why?, Why? It’s our way of
investigating the underlying cause of symptoms in order to find the
root cause (also called Root Cause Analysis). Event A occurred
because of Cause B, Cause B happened Cause C failed, and Cause C failed
because Event D happened. A real world example: Millions of illegal immigrants are pouring over the border. Why? Because the Obama Administration’s border policy is not to stop illegal immigration. Why? Because the administration wants illegal immigrants so the illegal immigrants can be amnestied and granted citizenship. Why? Because the newly naturalized citizens are more likely to vote for the Democrat Party in places like Texas and Arizona. Why?
Because the Democrat Party wants to turn Texas and Arizona blue from
top to bottom so a Republican presidential candidate is unlikely to
ever win another election. Why?
Because the progressive, Marxist wing of the Democrat Party wants to
“fundamentally transform” the United States of America into the United
Socialist States of America. We
could go on for a few more steps until we finally arrive at a global
coalition of Marxist nations, one world government, depopulation,
whatever theory to which you subscribe. The point is that we’re
attributing an individual action to a strategic objective. (Kind
of getting off course here, but hopefully you see the value of Root
Cause Analysis.) In the same way,
we’re looking at individual components of an end state. Martial
law is a culmination of a series of events, and the better job we do at
identifying those events and their causes, the better EWIs we
form. As long as we’ve developed the ability to observe those
EWIs, the better we can do at anticipating future events. Text
book stuff. If you have any
questions or want to delve deeper into a specific issue and form some
practical EWIs, just email me or post a comment below. http://guerrillamerica.com/2014/07/identifying-shtf-indicators/
READ MORE:
Indications and Warning #1
Indications and Warning #2
Indications and Warning #3
Indications and Warning #4
Indications and Warning #5
Indications and Warning #6
Indications and Warning #7
This post is brought to you by CATI Armor (Come
And Take It). You can get their awesome Level III steel plate body
armor for 10% off right now. I use these plates and I
recommend them to my readers. Use coupon code “onezero” here –> CATI Armor
I finished re-reading Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnamover
the weekend. (It’s a MUST READ; non-negotiable for preppers and
Patriots.) After talking with a few friends, it dawned on me that
formulating a defense plan for post-SHTF preppers is a lot like
planning for the counterinsurgencies of Iraq and Afghanistan.
Preppers need not become experts on counterinsurgency, but I recommend
learning the tenets and learning from others’ experiences. There
are (at least) three reasons why preppers should learn about
counterinsurgency: re-establishing local governance, taming the
criminal/irregular threat, prioritizing missions with competing
resources. (Re-) Establishing Local Governance. Unlike
the other forms of warfare, counterinsurgency (COIN) is
population-centric. As the populace goes, so goes the
conflict. COIN is a battle for legitimacy: in a vacuum, who has
the rightful authority? That boils down to perception, which is
why its critically important (can’t stress that enough) to be able to
influence the populace and win them to your side. We do that, in
part, by providing for them. We provide security firstly. One
thing I’ve learned in dealing with Iraqis and Afghans, and I can
extrapolate from there to include the entire population of the world,
is that most human beings want security; they want to see their
children grow up and be successful. They don’t want to live in a
war zone; they don’t want to live in fear of being blown up by an
artillery round or an IED. They want peace and security because
peace and security mean prosperity. Therefore, the populace is
much more willing to support whichever side is able to provide that
peace and security, as a general rule of thumb. In other words,
they will support the faction that seeks justice, upholds the rule of
law, and prosecutes those who break the law. If you’re not
scoping out your local and county law enforcement and learning about
their abilities to provide peace and security for the populace (and where they
plan to provide it; it won’t be everywhere), then you have an
enormous intelligence gap to fill. Work on filling that soon;
start this week. (It’s as simple as a conversation and asking
some questions. It’s really no more complicated than that.) Infamous
Chinese communist guerrilla leader Mao Tse Tung referred to the
populace as the water in which the fish (guerrillas) swim. That
is, the guerrillas use the populace for mobility and support.
Fish get from Point A to Point B by swimming in the water, and that
water completely sustains them. They get everything they need
from the water. Depending on the situation, you may be battling
guerrillas in the form of criminals and gangs, or you may be a
guerrilla fighting off tyranny. Today we’re focusing on the
former scenario: grid-down, looting, survival. If
there is a lack of governance, perceived or physical, then tribalism
will be a likely result. The people in Area A are going to build
a community government, the people in Area B will live under the
‘government’ chosen for them by local gangs, and anyone not in one of
those two categories may just live far enough out that life goes on,
regardless of government. (Now before we start a philosophical
argument about the need for government, I’m defining government as the
mechanism that enforces the rule of Constitutional law and generally
protects the citizens from each other.) So when you look at your
area, consider under which category you’ll fall. Part
of the great battle in areas of Iraq and Afghanistan was supporting a
local government that was corrupt, incompetent, or both. (Often
times, it seemed that incompetence bred corruption, and corruption led
to further incompetence. Which came first, the chicken or the
egg?) Because of standing up good governance was so problematic,
the Army introduced Provincial Reconstruction Teams (PRT). The
PRTs were groups of military leaders, political scientists, social
scientists, engineers, agricultural specialists, and other professions
with the mission of advising provincial and local government to better
enable governance. One of things
I’ve brought up before is just what happens after survival.
Whether you think it’s an Electromagnetic Pulse (EMP), or fiscal
collapse, or government collapse, whatever; Event X happens and then
it’s time to rebuild. (Or maybe there is no specific Event X, and
we just continue a decline while we see dramatic increases in
lawlessness and an inability to provide security.) Are you going
to lead the charge in rebuilding or aiding a lawful government, or are
you going to have government, lawful or not, be built around you?
Preppers may find themselves in situations where they essentially have
to act as part of a PRT in aiding local law enforcement or local
government (or county law enforcement/government). We absolutely
cannot forgo planning for rebuilding, or supporting established, lawful
government in the wake of an emergency. It’s for this reason that
we ought to learn as much as we can about maintaining good governance
during a conflict/counterinsurgency. Defense Against Irregular Threats. A
large part of the reason why I compare likely post-SHTF environments
with a counterinsurgency is because of the tribalism and likely
insurgencies that will occur in those vacuums. There are what we
call “irregular threats”. Those are the criminals, gangs, tribes,
whatever, who have an agenda. It may be survival in the case of
the common criminal looting out of a need to survive, or it may be
establishing a fiefdom in order to implement a gang or tribe’s ideal
government (which may be very un-idealistic for you). Going
back to COIN operations, we’re talking about a population-centric
approach. Did killing everyone really work in Iraq and
Afghanistan? Nope. Yet that seems to be the post-SHTF
strategy for so many. And that’s a really intellectually lazy
(not to mention immoral) way to conduct post-SHTF business.
Instead of being in prolonged conflict, our goal should be instead to
influence the populace capable of being influenced. Violent
criminals and gangs will always exist but I don’t accept a foregone
conclusion that they have to exist where I live. Earlier this year, I wrote about the Four D’s: Defend, Diminish, Deny, and Defeat.
That should be the basis for all our mission and security
planning. We absolutely must stop thinking about defense in
linear terms; that is, we can’t keep thinking that the only way to deal
with threats is to kill them. Instead, we ought to be asking
ourselves why they are threats in the first place. What makes
them my enemy; for what reasons are they seeking to do me harm?
If it’s something as simple as because they want to survive, and for no
other reason, then that’s great news! If I help them become more
self-sufficient and survive, then I may have just removed an adversary
from my area of operations (AO). (I get that it may be a little
idealistic, however, we can’t assume that everyone who has nothing is a
mortal enemy.) A lot of prepper groups aren’t that concerned with
Leroy Jenkins, but are very concerned about their unprepared neighbors
who might be, by one-sies and two-sies, driven to violence in order to
help their families survive. If you can find alternative means –
maybe food for intelligence information (the M in MICE)
or improving their survivability – then not only are we reducing the
threat but we’re also increasing our intelligence networks. Now,
for all the threats who can’t be persuaded – the ideological socialists
or communists, the progressives, the racists, the adversaries who want
to abolish the Bill of Rights, the warlords, the gangs, etc. – then we
have to start invoking the Four D’s so we can achieve our rightful and
lawful will. Use that Four D’s article as a refresher about how
to defeat this set of threats. Remember: our fight against them
is population-centric. If we can turn the populace – our
neighbors – against these threats, then our security will
improve. If the threats are able to turn the populace against us,
then we face an existential threat. As the populace goes, so goes the conflict. Competition for Finite Resources. Finally,
resources are finite. We have limits on manpower, limits on time,
and limits on supplies. We must prioritize our missions to
reflect that reality and conserve our resources. From the
introduction to the Chicago Press version of the Counterinsurgency Field Manual: Thinly
stretched occupying forces were particularly brutal. Atrocity was
their economy of force… Moreover, they were less concerned with with
attaining legitimacy than obedience.
‘Economy
of force’ is a military concept describing accomplishing the mission
with the least amount of resources necessary. We don’t put a
battalion at an observation post because that’s far too many resources
dedicated to a mission that can be accomplished by a squad. We
didn’t send an entire corps of soldiers into Grenada because it would
only take roughly a division. When faced with finite resources,
we absolutely must incorporate ‘economy of force’ into our planning. Back
to the quote: atrocities win battles but lose wars, especially in this
day and age. We earn the populace by “attaining legitimacy” and
not by behavior modification through fear, intimidation and
coercion. Fearful populations are resentful populations.
Resentful populations might not openly oppose you, but they’re willing
to cooperate with a viable alternative. Therefore, we must seek
to be a viable alternative when faced with oppression. In my
mind, that’s the largest component the Liberty movement is missing — a
viable alternative. We have plenty of alternatives but most
realize that those alternatives are just the lesser of two evils.
Don’t become the lesser of two evils; don’t kill the Constitution in
the process of saving it. As a friend of mine said to me last
weekend, “You don’t get morality from immorality. You don’t get
good government from bad government.” (His name is John
Ainsworth, hands down one of the smartest men I’ve ever met. His
website is America’s Remedy and
his introductory video will challenge your beliefs that your
participation in politics is worthwhile, if not convince you otherwise
altogether.) Back to mission
planning, we start with our objectives. Our objectives should be
immediate security first, then (re-) establishment of good governance
at the local level. Then we ask ourselves, “What are the paths
that lead to our objectives?” The annihilation of imminent
threats comes to mind; then security patrolling. Then comes
community outreach, building or repairing critical infrastructure, and
tracking down the remaining threats in order maintain peace and
security. I can’t prioritize these things for you, however, these
few items should be on the lists of most Patriots and preppers.
You very well may not have the resources to accomplish all these
goals. Accomplish what you can, or find a place now where you’ll be able to accomplish these objectives. If
you’re interested in implementing COIN into the rebuilding process, an
action highly beneficial, then Chapters Four and Five of Counterinsurgency Field Manual discuss planning and implementation in great detail. If
there’s enough interest, then I’ll start going through some of the COIN
books and manuals and writing out the “Cliff’s Notes” versions.
Otherwise, I will probably get to work describing intelligence support
to COIN operations. Please post your questions and comments below! Like this:
|
Definition: (DOD)
Those intelligence activities intended to detect and report
time-sensitive intelligence information on foreign developments that
could involve a threat to the United States or allied/coalition
military, political, or economic interests or to US citizens abroad. It
includes forewarning of enemy actions or intentions; the imminence of
hostilities; insurgency; nuclear/non-nuclear attack on the United
States, its overseas forces, or allied/coalition nations; hostile
reactions to US reconnaissance activities; terrorists' attacks; and
other similar events.
|
Intelligence
Analysis Management is the process of managing and organizing the
analytical processing of raw intelligence information into finished
intelligence. The terms "analysis", "production", and "processing" all
are used in this phase that is informally called "connecting the dots".
Creating an "Intelligence mosaic" is a vivid descriptor for the
process. Analysis, processing, and production are all names for the
organizing and evaluating of raw information, and putting it in a form
in which it can be disseminated to varying consumers. The same body of
information may result in multiple analytic pro ducts, with different security classifications, time scales, and levels of detail. While
analysis goes back to the beginning of history, Sherman Kent is often
considered the father of modern intelligence analysis. He wrote
extensively both in open and classified sources, including a seminal
1947 book, Strategic Intelligence for American World Policy .[1] In a
long career in the Office of Strategic Services and the Central
Intelligence Agency (CIA), he defined many of the parameters of modern
analysis and its use by policymakers. In particular, [2] Kent disagreed
with the philosophy that analysts never recommend policy, but advise
policymakers. "Intelligence analysts are needed because policy
officials face challenges that analysts can help them manage, Kent
would argue, through mastery of background knowledge, evaluation and
structuring of all-source material, and trade craft expertise. While
attentive to problems not yet on the policymaker’s screen, the
analyst’s first responsibility is to accommodate clients by producing
assessments timed to their decision cycle and focused on their learning
curve. This includes providing “actionable” intelligence that can help
with curbing threats and seizing policy opportunities." He considered
it a partnership, but one in which the analyst did not push a personal
point of view: "He would have opposed providing analyses that were
intended for use by one set of policy players to force its views on
others. For estimation analysis, this requires paying serious attention
to seemingly less likely outcomes. For action analysis, this means
identifying and evaluating alternatives, leaving to policy clients the
responsibility to recommend and choose.... Kent saw no excuse for
policy or political bias. He realized, however, that analytic or
cognitive bias was so ingrained in mental processes for tackling
complex and fluid issues that it required a continuous, deliberate
struggle to minimize... he taught analysts to resist the tendency to
see what they expect to see in the information. He urged special
caution when a whole team of analysts immediately agrees on an
interpretation of yesterday’s development or a prediction about
tomorrow’s.... One path he recommended for coping with cognitive bias
was to make working assumptions explicit and to challenge them
vigorously."[2] Contents [hide] • 1 Preprocessing o 1.1 Basic intelligence and reference library services o 1.2 Country handbooks o 1.3 Biographical references o 1.4 Geophysical basic intelligence o 1.5 Order of battle intelligence • 2 Current intelligence o 2.1 Indications & warning checklists o 2.2 Situation intelligence • 3 Information technology o 3.1 Security and IT • 4 References Preprocessing[edit] The Intelligence Process or Cycle. Analysis is one of the processes in the cycle. Some
intelligence disciplines, especially technical ones, will analyze the
same raw data in different ways, for complementary purposes. For
example, a signals intelligence collection platform will record all the
electromagnetic signals it received from an antenna pointed to a
particular target at a particular time. Assuming the target was a
radar, the ELINT analysts would be focused on the purpose and coverage
of the radar. TheMASINT analysts, however, would be looking for
patterns not in the intentional signals of the radar, or side
frequencies that were inadvertently generated. In like manner, if
the target were a voice communication, theCOMINT specialists would be
concentrating on the content of the message, but acoustic MASINT
technicians might be "voice printing" the spoken words to validate that
it was really from the supposed source. While Morse code telegraphy is
largely obsolete, each operator has a distinct rhythm known as a
"fist". Experienced telegraph intercept operators could recognize radio
deception when the fist failed to match the purported operator identity. A
very basic preprocessing step would be translating the collected
material into the native language of the analysts, unless, as is
desirable, the analysts are fluent in the language of the information. Basic intelligence and reference library services[edit] Librarians
at CIA received large numbers of documents, not counting special source
materials, cables, newspapers, press summaries, periodicals, books, and
maps. Since these reports come from scores of different major sources,
the daily volume fluctuates and shows lack of uniformity in format, in
reproduction media, in length and quality of presentation, and in
security classification. As they come in they must be read with an eye
to identifying material of interest to some 150 different customer
offices or individuals. The reference office manages several
registers (in effect special libraries) for special source materials,
biographic data on scientists and technicians, films and ground
photographs, and data on industrial installations. Demands made on the
document collection stem from three types of requests: • Requests for a specific document to which the analyst has a reference or citation; • Requests for a specific bit of information in answer to a specific question; • Requests for all information relevant to a subject which may or may not be well defined. The
last, which requires literature search, is the most difficult. Where
central reference services have been organized independent of research
offices, it soon becomes evident that the functional line of
demarcation between them and the research units is not clear. This
becomes important when it results in duplication of effort or, worse,
in non-use of reference materials by the researcher laboring under the
misimpression that he has all relevant documents in his possession.
Increasing use of collaborative technologies can help this
misimpression. Should a reference service be active or passive,
dynamic or static? A passive approach to reference service would mean
that reference personnel would merely keep the stacks of the library in
order, leaving it to research analysts to exploit the collection. Under
the active approach, on the other hand, reference analysts would
discuss the researcher's problem with him and then proceed, as
appropriate, to prepare a bibliography, gather apparently pertinent
documents, screen them, check with colleagues in other departments for
supplementary materials, make abstracts, have retention copies made of
popular items in short supply, initiate a requirement for supplementary
field service, or prepare reference aids. Once a separate facility
has been set up to provide reference services it is not long before it
publishes. This comes about for several reasons, the least
controversial of which is that a customer has made a specific request.
This type of publication is called a research or reference aid. Some
are quite specific; others are more general, being prepared in response
to a need generally expressed. A number of different customers may, for
example, make known that it would be very helpful to have a periodic
compilation of all finished intelligence reports and estimates for
ready reference. Reference officers have the responsibility to make
known the availability of services and information the existence of
which may be unknown to the analyst; and, given a task, to make the
preliminary selection of materials to meet the particular need of a
particular user. To the analyst must be left the determination of its
significance for the present; to the consumer its significance for the
future; and to the policy-maker the indicated course of action. Intelligence
personnel, as well as end consumers, need their equivalent of reference
books and encyclopedias. The US term for this is "basic intelligence",
while the WEU calls it "documentary intelligence". Much of this
information may itself be unclassified, but their indexing and
cross-referencing, especially if that cross-referencing includes
classified sources, the index itself, and bibliographies drawn from it,
may be properly classified. One means of organizing basic intelligence is with the acronym BEST MAPS [3] • B--biographic intelligence • E--economic intelligence • S--sociological intelligence • T--transportation and telecommunications intelligence • M--military geographical intelligence • A--armed forces intelligence • P--political intelligence • S--scientific and technical intelligence This is not a complete list, as the basic intelligence library also includes: • Maps, including "base maps" over which overlays can be placed • Biographical data, extensively cross-referenced; the UK term is "registry" • Graphics data • Targeting data, which may be considered basic data only by military units As a practical matter, these may be collected into: • Country handbooks, at various levels of classification (e.g., the unclassified World Factbook) • Topical handbooks (e.g., international terrorist groups), again at varying level of classifications. With modern technology, these collections may be Web documents rather than hard copies. Country handbooks[edit] Unclassified
examples of a country reference, in much shorter form than the internal
handbooks, is the CIA World Factbook, the "Countries and Regions" data
sheets from the UK Foreign and Commonwealth Office ,[4] and the US
Department of State Background Notes.[5] Closer to the internal
reference books of the intelligence communities are the Foreign Area
Handbooks,[6] originally prepared under contract to the US Army by
American University, and later by the Federal Research Division of the
Library of Congress. The Country Studies/Area Handbook Program was
"sponsored by the U.S. Department of the Army. Because the original
intent of the series' sponsor was to focus primarily on lesser-known
areas of the world or regions in which U.S. forces might be deployed,
the series is not all-inclusive." At the time of original publication,
there was a main unclassified handbook and a SECRET supplement, the
latter dealing principally with biographical information. Area
Handbooks had less restrictive distribution than the CIA National
Intelligence Summaries. Biographical references[edit] Comprehensive
indexing is the real value of a biographical registry. The names
themselves are a challenge, with phonetic variations and aliases.
Soundex is one technique for indexing names such that phonetic
equivalents, with variations in transliterations into the local
language, can be retrieved. While there is no truly general
solution, there has been considerable work in both in transliteration
nonroman character sets. Soundex and related systems help search
biographical databases by phonetics, but transliterated character sets
allow people not fully fluent in the written language to search for
names. Relationships among the people in the biographical index are
essential and constantly updated. One term of art used for
relationships indices are "wiring diagrams".[7] [8] The cycle of
organizational activity for intelligence purposes extends from the
collection of selected information to its direct use in reports
prepared for policy makers. Between these beginning and end activities
there lie a number of functions which can be grouped under the term
information processing. These functions include the identification,
recording, organization, retrieval, conversion into more useful forms,
synthesis and dissemination of the intellectual content of the
information collected. The ever-mounting volume of information produced
and promptly wanted and the high cost of performing these manifold
operations are forcing a critical review of current practices in the
processing field. Geophysical basic intelligence[edit] Maps are
obvious products, but in infinite variety, including simple outlines
onto which specific information can be overlaid, and divisions by
political jurisdiction, ethnicities and languages, terrain, etc. The
line between maps and actual imagery grows increasingly blurry. Online
resources such as Google Earth are increasingly useful for other than
the most detailed technical analysis. One challenge remains the
indexing of maps in Geographical Information Systems, since multiple
projections and coordinate systems are used both in maps and in imagery. Order of battle intelligence[edit] Principally
a military term, order of battle refers to the composition of an
adversary's organization, including units, key personnel, equipment,
and strength. In general, this is a form of basic intelligence, but is
so important, and often so rapidly changing, that it may be assigned to
a specific branch of an intelligence unit. The term is also used for
the organizational details of other aspects of opposition. For example,
electronic order of battle is an inventory of the equipment, location,
and operating signal characteristics of enemy transmitters, antennas,
and other electronic equipment. Current intelligence[edit] A
spectrum of activities falls under the term "current intelligence". At
a minimum, a current intelligence facility receives raw or minimally
processed reports, integrates them with information it has, and,
depending on its mission, may support: • Tactical
warning (especially military facilities that combine operations and
intelligence), such as the North American Air Defense Command (NORAD)
command post • Mobile military and policymaker
command centers, such as naval Combat Information Centers or Airborne
Warning and Control Systems (AWACS) • Strategic warning and coordination (e.g., US Department of State Operations Center) •
Situational awareness of continuing items of interest, for operational
use (e.g., World War II UK Submarine Tracking Room) •
Situational awareness of continuing items of interest, for policymaker
information and more systematic presentations (e.g., US White House
Situation Room). One function of watch centers, at least those in
agencies and commands with collection and surveillance capabilities, is
to monitor the availability of sensors, scheduled patrols, etc. Part of
the tactical surprise at the Battle of Pearl Harbor was that patrol
aircraft were supposed to be aloft and the early radar station
operating, but no watch center verified this—senior officers assumed it
was being done.[9] Intermediate in timeliness between tactical
warning and situation awareness are 24/7/365 facilities that stay
active on current matters. Perhaps the first modern watch center was
the British submarine tracking center under Rodger Winn. This was the
predecessor of the modern "all-source" center, where tactical reports,
cryptanalysis, direction finding, and other functions came together to
locate German submarines threatening Allied convoys. Modern current
intelligence facilities often use teleconferencing or videoconferencing
to share information, such as the NOIWON (National Operational
Intelligence Watch Officer's Network) that links the (US) National
Military Command Center, National Military Joint Intelligence Center,
State Department Operations Center, CIA Operations Center, State
Department Bureau of Intelligence and Research, NSA Operations Center
and White House Situation Room. Other units may join conferences when
appropriate, such as the Federal Bureau of Investigation (FBI)
Strategic Information and Operations Center (SIOC). Other countries
have similar networks, or sometimes a physical installation to which
all affected agencies send representatives, such as the UK Cabinet
Office Briefing Rooms "COBRA". When a crisis is not necessarily of
international significance, a subset may be all that is needed, such as
the SIOC for multiple simultaneous prison riots. In the case of an
aircraft hijacking without terrorist implications, the Federal Aviation
Authority operations center may work with the SIOC, or with specific
service components such as Coast Guard headquarters. The Coast Guard,
other Department of Homeland Security offices such as Federal Emergency
Management Agency, and technical specialists such as the United States
Environmental Protection Agency or National Weather Servicemay join ad
hoc operations. While some of these contingencies may not
immediately seem related to national security, the reality is
different, in that a major natural disaster, such as Hurricane Katrina,
will need significant military support. In North America, the Incident
Command System, with variants all the way from local to the National
Incident Management System, are common to emergency service
organizations. Major military commands often have operations
centers, into which subordinate headquarters feed information, and
higher commands are kept aware of the situation but not its details.
They, in turn, feed information to their national levels. The US and
Russia have exchanged liaison teams in their aerospace warning centers,
and there are "hotline" communications between countries that may need
to resolve crises, such the HAMMER RICK system between the US and
Israel. Indications & warning checklists[edit] Indications
and warnings are collated into "indications check lists" specific to
particular countries and systems. For example, it might be routine for
one country flying a given aircraft to launch formations on short
notice, as part of its regular training. A different country might, due
to shortages of fuel or maintenance personnel, rarely do formation
takeoffs, and that would be indicative of an intended action. Some
actions in one's own country or by one's own forces may trigger
national-level alerts, such as an accident involving nuclear weapons, a
major national disaster, etc. Situation intelligence[edit] Situation
intelligence lies between the immediate and the moderate term. It draws
on reference material, current intelligence, and raw information that
is not directly relevant to a tactical goal. It gives policymakers an
overview and context. The Canadian Security Intelligence Service
(CSIS) is especially[citation needed] good on publishing materials. An
example of a situation study would be Commentary No. 70, The Threat
from Transnational Crime: An Intelligence Perspective.[10] TheCurrently
Listed [Terrorist] entities data base is another publication.[11] Technnically
not public but widely available, are the reports of the US
Congressional Research Service. The Federation of American Scientists
maintains one data base at http://www.fas.org/sgp/crs/index.html. Information technology[edit] During
2001-2002, a Scholar-in-Residence at the Sherman Kent Center for
Intelligence Analysis, the “think tank” attached to the CIA’s training
center for analysts, [12] was tasked with something new: using an
outside scholar to study the process of analysis itself, especially how
Information Technology (IT) was, and could be, used. His "approach
was to watch as many DI analysts as practical and ask them how they
performed their work. We discussed what kinds of tasks were hard to do
and what technologies or procedures seemed to work smoothly. We also
talked about their own ideas about how they might use IT more
effectively. For the sake of comparison, I also met with researchers at
organizations that perform functions similar to those of the DI (e.g.,
other intelligence organizations; the Congressional Research Service;
The Washington Post; and business risk assessment services). Finally, I
drew on my own experience in business and non-government research
institutions. I was able to watch the DI respond to the terrorist
attacks of 11 September 2001 and ramp-up for the war on terrorism. "I
came away from this experience impressed by the quality of DI analysts,
but also concerned about their lack of awareness of and access to new
information technology and services that could be of critical value to
their work. The DI has used automated databases since the 1970s and has
gradually improved its capabilities. With the existing system, analysts
can perform most searches for source documents from CIA archives at
their desks and retrieve the documents electronically." It is sadly
worth noting, however, that CIA analysts still do much better than
their FBI counterparts, who have difficulty accessing any external
secure networks, or sharing the most sensitive data within their
agency.[13] NSA, however, seems to be much more comfortable with using
IT as a daily tool. Agency internal databases continue to improve
over earlier generations, but, in many respects, are inferior to
commercial search engines. It should be remembered, however, that ease
of use is not an absolute requirement. Some search engine human
interfaces are "expert friendly" rather than "user friendly", allowing
analysts with solid backgrounds in complex search strategies to be at
their most efficient. One indicator of some system shortcomings is
simply the fact that an important part of a DI analyst’s tradecraft is
building an informal source network. A good analyst either knows
someone, or “knows someone who knows someone,” at another office or
organization who can get the information they need. A good analyst will
use these contacts to develop more leads in the process. In the
commercial world, these contacts are managed with CRM, ERM, or social
networking software. Agency policies and practices create five kinds
of constraints that prevent the DI from acquiring new IT and using it
effectively. In 2008, the US intelligence community A-Space may have
broken through some of these constraints, or will break through in time. Security and IT[edit] Security
is probably the single most important factor that prevents the DI from
applying information technology more effectively. Security is essential
for intelligence, of course. The problem is that, when it comes to IT,
approach is not “risk management,” but “risk exclusion.” Until
recently, personal digital assistants were forbidden in high-security
facilities.[12] There are some very specialized electronic security
threats that could apply, so it may be that a secure PDA needs to be
developed and provided. Even in government agencies with sensitive but
unclassified information (e.g., personal health information covered by
HIPAA), there has been a serious concern over information bypassing
safeguards on tiny solid state disk equivalents, which can fit into
pens. Other agencies, however, are addressing this problem by requiring
the devices to store information in encrypted form, and using biometric
identification. [14] Such exclusionary rules also send an implicit
message to DI analysts that information technology is dangerous and not
essential for analysis. Analysts are, by the nature of their work,
especially aware of security threats. So when they are told that a
technology is potentially dangerous, their instinct is to avoid it
unless absolutely necessary. A laptop can be secured, but the
security both has to be built-in, and maintained. Files need strong
encryption. Multiple layers of security risk detection tools are
needed. Biometric authentication will identify only legitimate users. Security
staffs must develop a better understanding of how analysts work. Rather
than simply excluding technologies, their goal should be to develop
methods of applying IT that are so user-friendly that DI analysts can
operate securely with as few hindrances as possible.
|
|