INFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE



Similar documents
Federal Bureau of Investigation

THE STRATEGIC POLICING REQUIREMENT. July 2012

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS

CRS Report for Congress

TRUCK RENTING AND LEASING SECURITY AWARENESS AND SELF-ASSESSMENT GUIDE

Cyber Information-Sharing Models: An Overview

AT A HEARING ENTITLED THREATS TO THE HOMELAND

Good Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism

TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE

Two Recent LE Use Cases

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

The Price of Counterterrorism Information Gathering: Intelligence Informers in the Israeli Courts

Criminal Justice Sector and Rule of Law Working Group

Community Policing. Defined

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

Integrated Marketing Communications Plan Outline 2009, Hutchins, Et al.

The Ideal Future for Intelligence Education: Rebuilding and Balancing Practice and Theory

I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216

Analytic Teams, Social Networks, and Collaborative Behavior

IN THE WAR ON TERRORISM

SECURITY / INTELLIGENCE / CONSULTING

HOMELAND SECURITY INTELLIGENCE RPAD 556

TEAM PRODUCTIVITY DEVELOPMENT PROPOSAL

Management Update: The Eight Building Blocks of CRM

Manifesto for Education Empowering Educators and Schools

MARKETING STRATEGIES FOR ARTS ORGANISATIONS. Dr. Peter Steidl Robert Hughes

REPORT ON PROTECTING THE NONPROFIT SECTOR FROM TERRORIST ABUSE

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

How to Write a Successful PhD Dissertation Proposal

SPE Strategic Plan APPROVED BY THE SPE BOARD OF DIRECTORS

Integration of Financial Investigation into Counter Terrorism Strategy

Practical Threat Intelligence. with Bromium LAVA

STATE OF MARYLAND Strategy for Homeland Security

Executive Protection Facility Security Convoy Escort

ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DPC/D(67)23. DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

Request under the Freedom of Information Act 2000 (FOIA)

GAO COMBATING TERRORISM. Issues in Managing Counterterrorist Programs. Testimony

THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM

Beyond the Hype: Advanced Persistent Threats

FREEDOM OF INFORMATION REQUEST

Law Enforcement and Homeland Security Anti-Terrorism Training

THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE

DHS Department of Homeland Security

Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies

Advanced Threat Protection with Dell SecureWorks Security Services

Purpose of the Governor s strategy. Guiding Principles

Industry Security Notice

Cuban Intelligence Targeting of Academia a

KEYWORDS: Risk Assessment, Competitive Intelligence, National Security, Web Security, Defense, Information Security

News on the Internet: Information and Citizenship in the 21st Century

THE ORGANIZER S ROLE IN DRIVING EXHIBITOR ROI A Consultative Approach

National Security Agency

RESEARCH NOTE THE VALUE OF SUBSCRIPTION AND SUPPORT FOR IBM BUSINESS ANALYTICS THE BOTTOM LINE THE CHALLENGE. January 2013.

Intelligence Analysis for Homeland Security RPAD 557

Security Training Why It Benefits Your Organization and How to Make Your Case to Management

The Need to Share: The U.S. Intelligence Community and Law Enforcement

BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS

Re: Exposure draft: Proposed changes to the Code of Ethics for Professional Accountants related to provisions addressing a

BUSINESS PLANNING AND STRATEGIC PLANNING REVISITED. Article by Herb Rubenstein, President, Sustainable Business Group

DOES ONLINE LEARNING HAVE A ROLE IN LIBERAL ARTS COLLEGES? An Interview with Council of Independent Colleges President Richard Ekman

Reflection from the higher education institutions point of view: Accreditation and quality culture Dr. Andrée Sursock European University Association

How safe is the American homeland?

Relationship to National Response Plan Emergency Support Function (ESF)/Annex

Bush Lets U.S. Spy on Callers Without Courts

Examples of International terrorist attacks since 9/11

Supply Chain [QUARTERLY] A better way to engage with suppliers p. 24 Q4/2012. Standardized software: Eroding your competitive edge?

Financial Crimes Enforcement Network

Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)

How To Write A National Cybersecurity Act

The Case for EMBA Sponsorship

Effectively Leading Public Agencies in a Global Environment

How To Get A Masters Degree In Intelligence Analysis

Tactical Range Facility. Criminal Justice. Sgt. Major James Massey Range

HOMELAND SECURITY INTERNET SOURCES

MI5. Careers Guide 2012/13. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff.

THE SUSTAINABLE WAY TO GROW

Collecting & Analyzing Interview Data

New Leadership forstudent Learning andaccountability

January 10, Ms. Elizabeth M. Murphy Secretary U.S. Securities and Exchange Commission 100 F Street, N.E. Washington, D.C.

INTELLIGENCE AND ANALYSIS

Public Opinion on Selected National Security Issues:

V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI

Psychological Warfare and Terrorism

JUSTICE and HOME AFFAIRS COUNCIL Thursday 29 and Friday 30 January in Riga

EXECUTIVE SUMMARY. List all of the program s learning outcomes: (regardless of whether or not they are being assessed this year) Learning Outcome 1

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

Statutory Disclosure Guidance. Second edition August 2015

Using Relationship Management to Optimize Attendee Marketing and Grow Event Revenue

MISSION BRIEF. Syllabus

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

CEOP Relationship Management Strategy

JD mc James Drogan Management Consulting 2 Drumlin Road Westport CT

Contract Management Part One Making the Business Case for Investment

LAWRENCE COUNTY, KENTUCKY EMERGENCY OPERATIONS PLAN ESF-13

Enabling Mission Success

Associate Prof. Dr. Victor Onomza Waziri

Transcription:

INFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE Prepared for an international conference on Countering Modern Terrorism History, Current Issues, and Future Threats 16-17 December 2004 Berlin Under the sponsorship of the Heinrich Heine University, Dusseldorf Peter Sharfman The MITRE Corporation McLean, Virginia, USA 2004 The MITRE Corporation. ALL RIGHTS RESERVED

INFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE Peter Sharfman The MITRE Corporation McLean, Virginia USA December 16, 2004 As we plan and work to improve the quality and the quantity of intelligence to support actions to counter terrorism, we must distinguish between tactical intelligence and strategic intelligence. Tactical intelligence is sufficiently specific, sufficiently detailed, and sufficiently reliable to form the basis for immediate action; in fact, it is sometimes referred to as actionable intelligence. Strategic intelligence, in contrast, lacks the specificity necessary to direct operations, but because its content is believed to be valid for a period of years, it can be used to support the allocation of resources including decisions to invest in order to create future capabilities or political measures which by their nature could be effective only over a period of time. Some examples of tactical intelligence are: (1) Information that a known terrorist intends to take a particular flight, so that he can be arrested; (2) Information that a terrorist organization is storing weapons in a particular location, so that a police raid upon this location can be authorized and carried out; (3) Information that terrorists are planning to attack a particular building on a particular day, so that vehicles and people approaching this building can be searched for weapons or explosives; (4) Identification of an individual as the link among various cells of a terrorist organization, so that surveillance of this individual and identification of his contacts will lead to a short list of people to investigate; (5) Identification of a particular bank account as a vehicle for terrorist financing, which could support a variety of useful counterterrorist actions. Some characteristics of tactical intelligence are: (a) it must be used quickly, or it loses its value; (b) its sources are fragile, meaning that if the terrorists learn enough about a tactical intelligence source they can eliminate it; (c) it becomes valueless if the terrorists learn that we know it before we use it; (d) in many cases, there can be serious disagreements about how best to use the intelligence, or even whether preservation of a critical source dictates that a particular item of tactical intelligence should not be used at all. Because of these characteristics, tactical intelligence is generally shared only when sharing is absolutely essential for effective action. Some examples of strategic intelligence are: (1) Information about the internal effectiveness (e.g. leadership cohesion, recruiting success, financial resources) of various terrorist groups, so that estimates can be made about which terrorist organizations or networks pose the greatest future threat and should therefore be priority counterterrorism targets; (2) information about collaborative arrangements among specific terrorist groups, so that tactical intelligence about one of them can be leveraged to obtain tactical Dr. Peter James Sharfman is Director of Policy Analysis at The MITRE Corporation, and Adjunct Professor in the Science, Technology, and International Affairs program of Georgetown University, Washington, DC. The views expressed in this paper are entirely his own, and do not reflect the positions of The MITRE Corporation, its Sponsors, or Georgetown University. 2

intelligence about others; (3) information about state sponsorship of terrorism, so that pressure can be brought to bear against the offending state; (4) information about how the leadership of a particular terrorist organization defines its goals and thinks about the connections between terrorist acts and these goals, so that inferences can be drawn about the targets and techniques that this leadership would find most attractive; (5) information about the incentives a terrorist organization uses to obtain resources (recruits, money, and logistic support), so that its access to these resources can be disrupted or attenuated. Some characteristics of strategic intelligence are: (a) in many cases, accurate strategic intelligence remains useful for months or even years; (b) if the content of strategic intelligence is revealed to its terrorist subjects, they cannot easily act either to invalidate the intelligence or to shut off the sources and methods through which it was obtained; (c) it is obtained by the analysis of many pieces of fragmentary data, rather than from a single excellent source; (d) even when strategic intelligence analysis makes use of secret data about terrorists, it is valuable to consider it in the light of publicly-available information and academic analysis. It should be evident that to counter terrorism over a period of years, we require strategic intelligence as well as tactical intelligence. This fairly obvious point needs to be emphasized because the understandable public demand that terrorists be arrested and that terrorist operations be prevented has made it more difficult to see the value of building strategic intelligence by methods that would be quite unlikely to generate tactical actionable intelligence. How, then, can better strategic intelligence be generated? We should begin by acknowledging that terrorists do not generally think the way most intelligence analysts think. It is not just that terrorists have different objectives, and different concepts of how human society ought to function. They also seem to have a different view of the relationships between ends and means, or the relationships between causes and effects. Furthermore, terrorists mobilize support from a population of sympathizers (that is, individuals who would not themselves commit a terrorist act, but are willing to facilitate or tolerate terrorist acts by others) by means that are different from the ways in which democratic political organizations (or, for that matter, autocratic states) mobilize support. Consequently, some of the standard approaches to strategic intelligence analysis, which work reasonably well when the subject of the analysis is a state, do not work well when the subject is terrorism. Analysts cannot reason from the objectives of the terrorist organization and the objective situation that faces the organization to a manageable list of options for action. Partly this is because the terrorists appreciation of the objective situation they face may be quite different from that analyst s view. But even more, it is because the terrorists concept of what actions will advance their objectives may be one that the analyst does not share and does not understand. To some extent this difference may arise because the terrorist has an idiosyncratic view of the vulnerabilities of the power structure he wishes to attack. To some extent it may arise because the analyst does not understand as well as the terrorists do what behavior by the terrorists will strengthen 3

their support from sympathizers and add to their resources. But also, it seems that some terrorists have a concept of the nature of human society and human motivation quite different from what one would learn in a Western or for that matter Japanese or Chinese educational system. Analysts must be very cautious about building a template of a hypothetical terrorist action, and then looking for data that would fit into this template. This analytical method which can be used very effectively to sort through large quantities of data in working many kinds of intelligence problem fails when the analyst does not understand the adversary well enough to judge which possible strategies the adversary would consider effective and appropriate. Similarly, the technique of seizing upon some data and inferring what additional data to look for the technique of inferring that anybody who purchases an automobile must sooner or later purchase either gasoline or diesel fuel fails to yield clues or warnings regarding a terrorist threat that we do not expect. Instead, strategic analysis must be based upon consideration of a very wide range of information, including information from a very wide range of sources. The metaphor of connecting the dots must be modified to recognize that strategic intelligence means reviewing several thousand dots in order to connect a few hundred of them. In the light of these difficulties, there is a strong case to be made for departing from the traditional approaches to strategic intelligence. Ways must be found to consider simultaneously the information derived from secret sources and the information derived from open sources. Ways must be found to bring to bear simultaneously expertise regarding terrorists and terrorism and expertise regarding the societies and cultures from which terrorists and sympathizers are recruited. Ways must be found to expose tentative ideas or hypotheses to those with different backgrounds, skill sets, or pre-occupations in order to elicit the creative impulse o see the same facts from a different perspective. And, given the great difficulty we have in comprehending how terrorists view the world, analysis should involve collaboration of people from different cultures and educational systems who can effectively probe each other s assumptions and mental habits. This would be a very substantial departure from the normal practices of generating intelligence. We would, to be sure, retain the existing staffs of intelligence analysts with security clearances, operating in a closed and secure environment and working to make sense of secret information gathered through a variety of sources and methods. (It is possible, however, that assigning a substantial number of them to work on strategic analysis, with no pressure whatever to produce tactical intelligence, would be a departure from existing practice.) But instead of having this tightly closed group produce its reports in secret and disseminate them directly to Government officials with security clearances and a need-to-know, we would ask this group of traditional intelligence analysts to work collaboratively with analysts drawing upon very different information sources and using very different analytical methods. Specifically, we would ask them to collaborate with academic experts treating the academics not as sources to be queried and cited, but as colleagues with whom to engage in a two-way give-and-take of ideas, perceptions, and interpretations. In addition, we would seek out experts in drawing information from the Internet and from the mass media. We would ask them to try to 4

understand how the world appears to the sympathizers of the terrorists and the communities from which these sympathizers are drawn in the hope that this would offer insights and clues to how the terrorists themselves understand the world. Here too, we would ask the traditional intelligence analysts to treat these experts not as sources but as collaborators. Finally, in order to obtain the creativity that arises from the interaction of people with similar factual expertise and similar skills, but with different educational backgrounds and different assumptions, we would try to make this collaborative effort to produce strategic intelligence a multi-national one. This program would probably not look very attractive to an intelligence agency focused on generating actionable hence tactical intelligence. To attempt to review very large amounts of diverse data would lengthen the intelligence cycle. To work collaboratively with experts outside the tight community of secret intelligence would jeopardize security. Security or at least the traditional approaches to security would also be jeopardized by multinational collaboration. But perhaps the strongest challenge to normal intelligence methods would be the abandonment of the principle of need-to-know, based on the idea that so long as we don t really understand how our adversaries think, we cannot say who has a need to know any given fragment of intelligence. Accordingly, the Governments of countries concerned with terrorism should give consideration to organizing strategic intelligence analysis separately from the processes that aim to produce actionable intelligence. Both the strategic and the tactical would pursue the same aims of counterterrorism, and both would draw upon the same streams of raw data, but they would function very differently. If both produce useful results, we should expect these results to complement each other and enhance each other s usefulness. There are a number of Governments that might benefit from setting up separate strategic counterterrorism intelligence processes, and the most appropriate form of organization would no doubt vary from country to country. I would argue, however, that three characteristics are essential: 1. The strategic counterterrorism intelligence effort should have a certain degree of autonomy, so that the people leading the effort on a day-to-day basis would understand that their mission is strategic intelligence and not tactical, actionable intelligence. Otherwise the continuity of effort that is necessary for high quality strategic intelligence would be jeopardized by the temptation to seek immediately useful results. 2. To make this autonomy secure, the strategic intelligence effort should have an identifiable stream of resources (people and money) that is separate from the resources devoted to tactical intelligence. Moreover, such a separate resource stream would allow the Government to consciously balance the strategic and the tactical. Readers of an early 5

draft of this paper noted an implication that strategic intelligence deserves more resources than it is currently receiving. I must disclaim any such proposition because I have no idea what resources are devoted to strategic intelligence. 3. The strategic intelligence effort needs a set of security rules that are more flexible than those appropriate for tactical intelligence. If strategic intelligence is to have any chance of getting inside the heads of the terrorist leadership, or of understanding the world views of the communities from which the terrorists recruit, its practitioners must work collaboratively with their counterparts in many other countries. They must also be able to experiment with collaborative efforts with private citizens who share their abhorrence of terrorism, but whose backgrounds and motivations would disqualify them from receiving or wanting security clearances. Following these suggestions would certainly not be free of cost, disruption, and even risk. I cannot demonstrate conclusively that the results would justify the effort. Nevertheless, given the importance and difficulty of the problem, and the disappointing quality to date of strategic counterterrorism intelligence, there is a strong case that efforts along these lines would at the least be a worthwhile experiment. 6