Info and Intel
Info and Intel
Info and Intel
“Information and Intelligence” is the “Fire and Maneuver” of the 21st Century.
Major General Michael Flynn, March 2011
Content:
Forward
Part 1
Unit 1: What is intelligence?
Unit 2: Categories of classified information
Unit 3: Types of intelligence
Unit 4: Defense intelligence
Unit 5: What is intelligence assessment?
Unit 6: Language of persuasion
Part 2:Read on
Forward
This book addresses the master students studying Intelligence in organization and intends to
offer the necessary English terms and the common acronymsused in this field.
It uses authentic up -to -date texts with information about different issues of this field.The
development of an intelligence product involves collecting information from a number of
different sources and disseminating information. This type of raw intelligence is usually based
on fragmentary information about fast-breaking events and may contain substantial
inaccuracies or uncertainties that must be resolved through subsequent report and analysis.
Finished intelligence products contain information that is compared, analyzed, and weighted
to allow the development of conclusions. The intelligence process confirms a fact or set of
facts through a multiplicity of sources to reduce the chance of erroneous conclusions. In most
cases the information the analysts collect come from international sources and the knowledge
of terms in English is of utmost importance. That is why the book has a part with Read on to
improve the specialized vocabulary in English. The information from this book is only the
start of a more thorough study of the necessary English terminology used in this field.
The author
Part 1
Unit I
Intelligence= the ability to acquire and apply knowledge and skills; the collection of
information of military or political value
Exploitation= the action or fact of treating someone unfairly in order to benefit from
their work; the action of making use of and benefiting from resources
Collation= collecting and combining; bringing together
Dissemination= the opening of a subject to widespread discussion and debate;
diffusion for propagation and permanence; a scattering or spreading abroad, as of
ideas, beliefs, etc.
SlGINT
IMINT
MASINT
HUMINT
C.Learn more:
What is Intelligence?
Intelligence is information that agencies collect, analyze and distribute in response to
government leaders’ questions and requirements. Intelligence is a broad term that entails:
-Collection, analysis, and production of sensitive information to support national security
leaders, including policymakers, military commanders.
-Safeguarding these processes and this information through counterintelligence activities.
-Execution of covert operations approved by the President.
The IC strives to provide valuable insight on important issues by gathering raw intelligence,
analyzing that data in context, and producing timely and relevant products for customers at all
levels of national security—from the war-fighter on the ground to the President in Washington.
Levels of intelligence include:
Strategic: intelligence needed by policymakers to make policy and military decisions at
the national and international level.
Operational: intelligence used by military leaders to plan and accomplish strategic
objectives within the operational area.
Intelligence is defined by Mark Lowenthal in his book From Secrets to Policy in three ways:
Intelligence as a process.
A means by which certain types of information are required and requested, collected,
analyzed, and disseminated, and as the way in which certain types of covert action are
conceived and conducted.
Intelligence as a product.
A knowledge product resulting from analyses and intelligence operations themselves.
Intelligence as an organization.
Entities that carry out various functions for Intelligence.
The intelligence process is
-an organized process by which information is gathered, assessed, and distributed in order to
fulfill the goals of the intelligence function. It is a method of performing analytic activities
and placing the analysis in a useable form.[1]
- the process by which information is converted into intelligence and made available to users.
The process consists of six interrelated intelligence operations: planning and direction,
collection, processing and exploitation, analysis and production, dissemination and
integration, and evaluation and feedback. (in the military) [2]
The intelligence process (or cycle) is the means of developing raw information into finished
intelligence products for use in decision making and formulating policies/actions.
1. The first step, planning and direction, involves identifying the need for data. Investigators
must engage in a process of deciding what they want to know (or what they need to collect)
before they collect it, or they may end up with indiscriminate, unfocused information. When
we are tasked with a specific job, we begin planning what we’ll do and how. We move in a
specific direction to get the job done, listing what we know about the issue and what we need
to find out. We discuss ways to gather the necessary intelligence.
2. Collection is the gathering of the raw data needed to produce intelligence products. Data
may be collected from many sources, including but not limited to public records, the Internet,
confidential sources, incident reports, and periodicals. We collect information overtly (openly)
and covertly (secretly). Reading foreign newspapers and magazine articles, listening to foreign
radio, and watching overseas television broadcasts are examples of “overt” (or open) sources
for us. Other information sources can be “covert” (or secret), such as information collected
with listening devices and hidden cameras. We can even use space-age technology like satellite
photography. For instance, some analysts could actually view how many airplanes are present
at a foreign military base by looking at a picture taken from a satellite in space.
3. Processing and collation, involves evaluating the information‘s validity and reliability.
Collation entails sorting, combining, categorizing, and arranging the data collected so
relationships can be determined.
4. Analysis is the portion of the intelligence process that transforms the raw data into products
that are useful. This is also the function that separates information from intelligence.” It is this
vital function that makes the collection effort beneficial. Without this portion of the process,
we are left with disjointed pieces of information to which no meaning has been attached. The
goal is to develop a report where the information has been connected in a logical and valid
manner to produce an intelligence report that contains valid judgments based on information
analyzed. During this step, we take a closer look at all the information and determine how it
fits together, while concentrating on answering the original tasking. We assess what is
happening, why it is happening, what might occur next
5 Dissemination is also a vital step in the process. Without disseminating the intelligence
developed, it is pointless to collect it. The intelligence disseminated must be timely and
credible to be useful. Dissemination must also be evaluated based on a “right to know” and the
“ need to know.” In this final step, we give our final written analysis to a policymaker, the
same policymaker who started the cycle. After reading the final analysis and learning the
answer to the original question, the policymaker may come back with more questions. Then
the whole process starts over again.
6. Obtaining feedback on the process performed and the products produced by the intelligence
function. This step allows evaluation of the performance or effectiveness of an intelligence
function.
Each step of the process needs to be understood to produce accurate, timely intelligence
reports.
Collection
There are six basic intelligence sources, or collection disciplines:
Human-Source Intelligence (HUMINT)
Signals Intelligence (SIGINT)
Imagery Intelligence (IMINT)
Measurement and Signature Intelligence (MASINT)
Open-Source Intelligence (OSINT)
Geospatial Intelligence (GEOINT)
E. Read on and then make up sentences of your own with: decision making, spill the beans,
lethal situation, Ops HQ,to toss,to be overheard;
The decision in the Hampshire orchard led to a blizzard of decision making from the two
spymasters. To start with, sanction and approval had to be sought from both men’s political
masters.
This was easier said than done, because Mike Martin’s first condition was that no more than
a dozen people should ever know what Operation Crowbar was about. His concern was
completely understood.
If fifty people know anything that interesting, one will eventually spill the beans. Not
intentionally, not viciously, not even mischievously, but inevitably. Those who have ever been
in deep cover in a lethal situation know that it is nerve-racking enough to trust in one’s own
tradecraft never to make a mistake and be caught. To hope that one will never be given away
by some utterly unforeseeable flukeis constantly stressful. But the ultimate nightmare is to
know that the capture and the long, agonizing death to follow happened because some fool in
a bar boasted to his girlfriend and was overheard-that is the worst fear of all. So Martin’s
condition was acceded to at once.
When they had unpacked and convened in the drawing room, he tossed them both a thick file.
“Finding an Ops HQ starts tomorrow,” he said. “You have twenty-four hours to commit this
to memory. This is the man who is going to go in. You will work with him until that day, and
for him after that. This”-he tossed a thinner file on the coffee table “is the man he is going to
replace. Clearly, we know much less. But that is everything the U.S. interrogators have been
able to secure from him in hundreds of hours of interrogations at Gitmo.( adapted from The
Afghan by Frederick Forsyth)
References:
[1; 2]DOD Dictionary of Military and Associated Terms (Nov. 8, 2010, as amended through
May 15, 2011) http://www.dtic.mil/doctrine/dod_dictionary
Unit 2
B. Exchange what you know: Why is good communication necessary in every field of activity?
Man is always a part of a social interaction. It can never be removed from us to deal with
others, to be a part of others, and be able to relate with others. All these can only be achieved
through communication. Body language, basic oral communication and other forms won’t
matter as long as man can pass on to others what is in his mind or feelings. Without
communication, issues cannot be brought up or resolved. Relationships cannot be developed
or mended if communication is non existent. We are born to communicate with others and we
have the vocal system to back it up.
B. Learn more:
E. Read on and then make up sentences of your own with:Center for Strategic and
International Studies (CSIS),policymakers,hallmarks of terrorism,adherent,to forge, sluggish
economic growth, apprehension
In many respects, CSIS shares the mission of our intelligence community: to help
policymakers identify, understand and, hopefully, successfully address the myriad national
security issues that our nation faces in a dynamic and very dangerous world – a very
dangerous world indeed.
My opening remarks this morning are different from those I reviewed and finalized in the
early afternoon of last Friday. They are different because our sensibilities and our souls have
been jarred once again by the horrific and wanton violence perpetrated upon the innocent in
the streets, cafes, and concert halls of the beautiful city of Paris. Our hearts ache for the
scores killed and injured in those savage attacks, and our thoughts are with them and their
families…
And while we await confirmation of culpability for those tragedies, they each bear the
hallmarks of terrorism carried out by the so-called Islamic State of Iraq and Levant, or ISIL,
an organization of murderous sociopaths that carries out its criminal and morally depraved
actions under bogus religious pretense. With its roots in al-Qaida in Iraq, and empowered by
a large influx of foreign adherents, ISIL over the past several years has swallowed up large
swaths of territory in Iraq and Syria, brutally killing thousands upon thousands of men,
women and children along the way. Not content to limiting its killing fields to Iraqi and
Syrian lands, and to setting up local franchises in other countries of the Middle East, South
Asia and Africa, ISIL has developed an external operations agenda that is now implementing
– it is implementing with lethal effect.
I am sure we will talk more about ISIL in the question-and-answer session, but let me note
that the grave threat posed by the phenomenon of ISIL makes it absolutely imperative that the
international community urgently commit to achieve an even greater and unprecedented level
of cooperation, collaboration, information-sharing, and joint action in intelligence, in law
enforcement, in military operations, and in diplomatic channels. The ISIL threat demands it.
At CIA, we work closely with foreign intelligence security services around the globe to
advance our shared counterterrorism goals. Over the course of many years, we have forged
broad and deep partnerships with our closest allies in Europe, such as Great Britain, France,
and many, many others. These strategic relationships have been instrumental in helping to
knit together a transnational architecture that allows counterterrorism officials and experts to
work closely together across sovereign borders to disrupt terrorist plans and activities. And
while many terrorist operations have been thwarted as a result of strong transnational
teamwork, tragically, not all terrorist plans are uncovered in time.
… These strategic counterterrorism relationships need to stretch far beyond the traditional
transatlantic environment and alliances, which is why we are working closely with so many
services in different parts of the world…
These relationships are an essential adjunct to diplomacy and military operations. By
working with our foreign partners, we enhance global security by helping them tackle
challenges that threaten us all. And we benefit from a wider net of collection and from the
insights of local services, all of which enhance the intelligence we provide to policymakers.
The fact is, good intelligence – timely, accurate and insightful – is the cornerstone of almost
every aspect of national security policy today, from military action to diplomacy to
international law enforcement. With good intelligence, our policymakers can better
understand the risks, the challenges, as well as the opportunities attendant to key national
security issues, which is ever more important given the unprecedentedly complex and
overlapping array of major challenges to U.S. and global security that we face today.
The impression one might get from the daily headlines is that the world has become more
unstable. And, indeed, the historical record supports that judgment. First, the ideas,
institutions and states that have undergirded the post-Cold War system are under significant
stress. It is easy to think of this as a phenomenon confined solely to the developing world, and
that is certainly where we see states that have actually failed and borders that no longer carry
any practical effect, such as the border between Syria and Iraq. But there is considerable
stress on governments in even the world’s most stable regions.
In Europe, for instance, the migration crisis, sluggish economic growth and a host of other
factors have given rise to heightened nationalism, secession movements, and the increasing
popularity of political parties on both the far right and far left. Even ideas that were the
pillars of
the continent’s postwar prosperity, such as economic integration and democracy itself, are
being questioned in some quarters.
Across the globe, in both authoritarian and democratic societies, governments are finding it
increasingly difficult to meet the demands, realistic or not, of their skeptical and restive
populaces. The so-called Arab Spring revolutions were not fought for democracy per se as
much as they were fought for relief from regimes that had failed to meet basic standards of
governance and civil society. And as we have seen, when people become disillusioned with
the powers that be, social media enable them to more quickly and easily form associations
that defy the status quo. And in part, that is why the global landscape has been changing at a
faster and much more disruptive pace.
How nations respond to these challenges, adapt to them, and evolve will be one of the great
plotlines of the 21st century. When I meet with my foreign counterparts – both from friendly
and from not-so-friendly governments – I sense a very real apprehension about instability and
its various manifestations: terrorism, humanitarian crises, proliferation and so on.
Interestingly, I hear these concerns even from officials representing governments whose
policies are quite arguably contributing to the problem.
In many developing societies, growing pessimism about the prospects for economic
advancement is fueling instability. Regions with burgeoning youth populations, such as the
Arab World, have been unable to achieve the growth needed to reduce high unemployment
rates. Perceptions of growing inequality have resulted in more assertive street politics and
populism. At the same time, slower growth has left these nations with fewer resources to
devote to economic, humanitarian and peacekeeping assistance to address these challenges.
Mankind’s relationship with the natural world is aggravating these problems and is a
potential source of crisis itself. Last year was the warmest on record, and this year is on track
to be even warmer. Extreme weather, along with public policies affecting food and water
supplies, can worsen or create humanitarian crises. Of the most immediate concern, sharply
reduced crop
yields in multiple places simultaneously could trigger a shock in food prices with devastating
effect, especially in already-fragile regions such as Africa, the Middle East and South Asia.
Compromised access to food and water greatly increases the prospect for famine and deadly
epidemics… Across the globe, in both authoritarian and democratic societies, governments
are finding it increasingly difficult to meet the demands, realistic or not, of their skeptical and
restive populaces. The so-called Arab Spring revolutions were not fought for democracy per
se as much as they were fought for relief from regimes that had failed to meet basic standards
of governance and civil society. And as we have seen, when people become disillusioned with
the powers that be, social media enable them to more quickly and easily form associations
that defy the status quo. And in part, that is why the global landscape has been changing at a
faster and much more disruptive pace.
How nations respond to these challenges, adapt to them, and evolve will be one of the great
plotlines of the 21st century. When I meet with my foreign counterparts – both from friendly
and from not-so-friendly governments – I sense a very real apprehension about instability and
its various manifestations: terrorism, humanitarian crises, proliferation and so on.
Interestingly, I hear these concerns even from officials representing governments whose
policies are quite arguably contributing to the problem. (www.
http://time.com/4114870/paris-attacks-cia-john-brennan -CIA Director John Brennan On
Paris Attacks)
Unit 3
A Words and Phrases
strength=force as measured in numbers : effective numbers of anybody or organization ‘an
army at full strength’
clearance= an official decision saying that someone has permission to do something
assessment= the act of making a judgment about something: the act of assessing
something: an idea or opinion about something
malicious= having or showing a desire to cause harm to another person: having or
showing malice
UAV =unmanned aerial vehicle
Military intelligence, abbreviated as “intel” or MI, refers to the collection, analysis, and
distribution of information relevant to military operations. Every nation on Earth utilizes
military intelligence to make itself more secure and prepared for battle. Like other types of
intelligence, military intelligence is gathered by skilled professionals who work in the field
and in offices to gather cohesive, useful information which will support the armed forces.
Most intelligence officers are recruited directly from the armed services, and each service has
its own intelligence branch, although intelligence officers from other branches may cooperate.
C Learn more:
Types of Intelligence
There are three essential divisions of intelligence. The first is strategic intelligence, general
information about the enemy and the world in general. Strategic intelligence is gathered from
a variety of sources, and includes information like the size of a standing army, available
weaponry, and foreign policy standards. Within a nation, several agencies will often share
strategic intelligence with each other.
Operational intelligence focuses on a specific operation. Data about the area in which
operations may be carried out is collected, along with specific information about troop
strength and movements, local sentiments, and other relevant material. Gathering accurate
operational intelligence is a crucial duty of military intelligence, and will make the difference
between a success and a failure. Tactical intelligence is an extension of operational
intelligence, focusing specifically on factors which may influence tactics on the battlefield.
Tactical intelligence is typically gathered by commanders in the field while operations are
carried out, as opposed to operational intelligence, which is collected before the action begins.
In both peacetime and wartime, military intelligence is an important part of the security
system for a nation. Intelligence officers receive special training to make them more effective,
and can choose to work in the field collecting raw data, or in centralized offices interpreting
and packaging the data. Office workers are an important part of intelligence, because they
filter through communications from other nations and analyze foreign newspapers, radio,
television, and other material in order to gather clues. Other officers collate the large amounts
of data collected and turn it into a briefing which can be read and understood.
Typically, intelligence officers have varying levels of clearance. Top clearance, allowing
access to all available information, is very rare. Most officers work on a small level, focusing
on a specific topic. If they are captured or they turn into double agents, they can only provide
information about a small part of the whole, rather than the entire system. This type of
isolation is typical in intelligence agencies and is especially important in military intelligence,
which deals with sensitive information about troop movements and plans.
Strategic intelligence
Strategic intelligence is concerned with broad issues such as economics, political assessments,
military capabilities and intentions of foreign nations (and, increasingly, non-state
actors).Such intelligence may be scientific, technical, tactical, diplomatic or sociological, but
these changes are analyzed in combination with known facts about the area in question, such
as geography, demographics and industrial capacities.
Operational intelligence
Operational intelligence is focused on support to an expeditionary force commander and will
be attached to the formation headquarters.
Tactical intelligence
Tactical intelligence is focused on support to operations at the tactical level and would be
attached to the battlegroup. At the tactical level, briefings are delivered to patrols on current
threats and collection priorities. These patrols are then debriefed to elicit information for
analysis and communication through the reporting chain. Any security system can come under
special assault from malicious forces.
Finished Intelligence
The information do not go directly to the policy maker or military commander. Developing
finished intelligence involves analytical techniques not different from those of the social
sciences.
Scientific Intelligence. Understanding new weapon systems that the enemy was
developing thus became an important objective. It was important to obtain fairly
detailed information about the way a system worked in order to develop methods of
countering it.
One of the primary methods any state uses to gather vital national security information is
through air- and space-based platforms, collectively known as “overhead surveillance.”
“Overhead surveillance” describes a means to gather information about people and places
from above the Earth’s surface. These collection systems gather imagery intelligence
(IMINT), signals intelligence (SIGINT) and measurement and signature intelligence
(MASINT). Today, overhead surveillance includes:
Space-based systems, such as satellites.
Aerial collection platforms that range from large manned aircraft to small
unmanned aerial vehicles (UAVs).
In the past three years, there have been more outbreaks of instability than at any time since the
collapse of the Soviet Union, matching the rate we saw during decolonization in the 1960s.
This has not been a period of protests and government – this has not just been a period of
protests and government change, but of violent insurgency, and in particular of breakdowns in
many states’ ability to govern.
Ongoing conflicts in Syria, Iraq, Ukraine, Yemen, and Libya, and parts of Africa are clear
examples. The human toll is reflected in the U.N.’s recent announcement that the number of
refugees and internally displaced persons in the world is the highest it has been since World
War II. And of course, all of this localized strife gives rise to the persistent threat of
international terrorism.
When CIA analysts look for deeper causes of this rising instability, they find nationalistic,
sectarian and technological factors that are eroding the structure of the international system.
They also see socioeconomic trends, the impact of climate change, and other elements that are
In Europe, for instance, the migration crisis, sluggish economic growth and a host of other
factors have given rise to heightened nationalism, secession movements, and the increasing
popularity of political parties on both the far right and far left. Even ideas that were the pillars
of
the continent’s postwar prosperity, such as economic integration and democracy itself, are
being questioned in some quarters.
Across the globe, in both authoritarian and democratic societies, governments are finding it
increasingly difficult to meet the demands, realistic or not, of their skeptical and restive
populaces. The so-called Arab Spring revolutions were not fought for democracy per se as
much as they were fought for relief from regimes that had failed to meet basic standards of
governance and civil society. And as we have seen, when people become disillusioned with
the powers that be, social media enable them to more quickly and easily form associations
that defy the status quo. And in part, that is why the global landscape has been changing at a
faster and much more disruptive pace.
How nations respond to these challenges, adapt to them, and evolve will be one of the great
plotlines of the 21st century. When I meet with my foreign counterparts – both from friendly
and from not-so-friendly governments – I sense a very real apprehension about instability and
its various manifestations: terrorism, humanitarian crises, proliferation and so on.
Interestingly, I hear these concerns even from officials representing governments whose
policies are quite arguably contributing to the problem. (CIA Director John Brennan)
Unit 4
Defense Intelligence
Largely due to its size, mission and capability, the Department of Defense (DoD) controls a
significant portion of the nation’s intelligence resources. As both a consumer and producer of
intelligence, defense intelligence assets play a crucial and unique role in the Intelligence
Community (IC).The primary role of Defense Intelligence is that of 'all-source' intelligence
analysis. This discipline draws information from a variety of overt and covert sources to
provide the intelligence needed to support military operations, contingency planning, and to
inform defense policy and procurement decisions. The maintenance of the ability to give
timely strategic warning of politico-military and scientific and technical developments with
the potential to affect a state’s interests is a vital part of the process.
C.Learn more:
The DoD’s intelligence assets are diverse and reflect a broad spectrum of military capabilities.
The Need for Military Intelligence
Military intelligence is a military discipline that exploits a number of information collection
and analysis approaches to provide guidance and direction to commanders in support of their
decision. This is achieved by providing an assessment of available data from a wide range of
sources, directed towards the commanders' mission requirements or responding to focused
questions as part of the operational or campaign planning activity. In order to provide an
informed analysis, the commander's information requirements are first identified. These
information requirements are then incorporated into a process of intelligence collection,
analysis and dissemination.Intelligence should respond to the needs of the commander, based
on the military objective and the outline plans for the operation. The military objective
provides a focus for the estimate process, from which a number of information requirements
are derived. Information requirements may be related to terrain and impact on vehicle or
personnel movement, disposition of hostile forces, sentiments of the local population and
capabilities of the hostile order of battle.
In response to the information requirements, the analysis staff trawls existing information,
identifying gaps in the available knowledge. Where gaps in knowledge exist, the staff may be
able to task collection assets to collect against the requirement.
Analysis reports draw on all available sources of information, whether drawn from existing
material or collected in response to the requirement. The analysis reports are used to inform
the remaining planning staff, influencing planning and seeking to predict adversary intent.
“Given the inherently secretive character of secret intelligence, there is immediately a tension
between the need to maintain the secret, on the one hand, and sharing the secret – or operating
in a more open and collaborative manner – on the other.” (Warren Tucker, Head of the New
Zealand Security Intelligence Service). A multilateral agreement is an accord among three or
more parties, agencies, or national governments.
International cooperation between national security and intelligence services represents one of
most significant challenges to security sector accountability today. The proliferation of
transnational threats has necessitated increased international cooperation among intelligence
and security agencies. Yet, information sharing and other forms of cooperation have
significant implications for human rights and therefore demand robust external oversight.
Advantages to Foreign Intelligence Relationships
The benefits from international or liaison partnerships consist of:
Access: Liaison may have access to or information about areas denied to direct
penetration.
Speed: Liaison may be able to gather and disseminate crucial data, giving any state the
ability to respond to time-sensitive threats.
Insight: Liaison may have greater cultural understanding into a particular issue that the
officials of a state may otherwise misinterpret.
Ability to Perform Direct Action: Liaison sometimes can provide direct military force to
solve a particular problem, usually within their home country.
Disadvantages of Foreign Intelligence Relationships
Liaison relationships with foreign services have disadvantages as well. A state must remain
vigilant for signs of:
Conflicting Interests: Liaison may provide adversaries with critical sensitive
information about interests, strategies and plans.
Hostile Collection: Liaison may attempt to gain insight into the intentions, sources and
methods through overt or covert means.
Poor Information Gathering: Liaison may use less rigorous collection methods. The
Intelligence Community analysts must independently verify specific information.
Moral Hazards: Members of foreign intelligence services may be involved in
unethical or illegal activities, or utilize illegal methods to obtain intelligence.
Information Sharing
After the terrorist attacks of September 11th, information sharing became one of the United
States government's goals in developing their resources to try to avert such atrocities. It was
mandated among government agencies and departments that personnel create a methodology
for regularly sharing relevant information. The US needed information sharing improvements
to respond to various threats more effectively. The lesson was learned that when information
is hoarded instead of shared, those needing it may not be able to react in a timely manner
Using information sharing intelligently has been shown to be a more effective way to manage
any organization; a government or a business. Overall, when used intelligently, information
sharing is a useful way of lowering costs, improving overall accuracy of public data and
allowing organizations and individuals alike to have access to information that they might
need and entertainment that they want to experience. Information sharing includes providing
information, confirming the information has been received, and confirming that the
information is jointly understood. Information sharing is an important component of
information behavior. It is an essential activity in all collaborative work, and helps to bind
groups and communities together.(Davenport, E., & Hall, H. (2002).Organizational knowledge and
communities of practice.Annual Review of Information Science and Technology, 36 171-222.)
One of the most problematic elements of cybersecurity is the quickly and constantly evolving
nature of security risks. The traditional approach has been to focus most resources on the most
crucial system components and protect against the biggest known threats, which necessitated
leaving some less important system components undefended and some less dangerous risks
not protected against.
To deal with the current environment, advisory organizations are promoting a more proactive
and adaptive approach.
National cyber warfare programs are unique in posing a threat along the entire spectrum of
objectives that might harm a state’s interests. These threats range from propaganda and low-
level nuisance web page defacements to espionage and serious disruption with loss of life and
extensive infrastructure disruption.
Recent National Initiatives
In recent years, policymakers have recognized the importance of securing the information
infrastructure and responded by increasing resources and focus on cyber security the efforts
aimed at preventing cyber attacks against infrastructures, reducing national vulnerability, and
minimizing the damage and recovery time from cyber attacks that do occur and secure the
governments’ cyber networks.
A cyber terror attack on vital national infrastructure such as power facilities, transport
networks and the financial sector could be imminent—and international governments are ill-
prepared, cyber security experts have warned. The next big attack will be against national
critical infrastructure and could cripple a country's ability to function. "There is no such thing
as 'the short-term national interest' anymore, the only thing that matters is a confidence and
credible security strategy," said Dutch Defense Minister
While mitigating all possible vectors for preventing all attacks is of course unachievable,
there are numerous efforts an organization can make to reduce the probability of being
targeted by raising the threshold for network penetration to a level that it becomes a more
daunting task for the assailants.
Understanding which are the critical assets and systems that need to be protected, identifying
the potential risks those assets may be confronted with, and fine-tuning the security solutions
in place to protect those critical assets will make the organization better able to detect threats,
respond in real-time to prevent further compromise, and produce a robust state of resiliency
that works to protect the organization’s interests.
E. Read on and then make up sentences of your own with:cyber realm, hacking, intrusion,
prevention, to hamper
… the rapid advance of information technology has given rise to an entirely new and wide-
open domain for human interaction and progress: the cyber realm. As an intelligence officer,
much of my job involves dealing with the unintended consequences of the cyber revolution.
For as much as it brings the world together, it also serves the purpose of those who wish us
harm. Of greatest concern, the cyber realm gives small groups and even individuals the
potential to inflict damage on a scale previously restricted to nation-states. And while states
are largely rational actors subject to deterrence, the same does not apply to terrorists and
criminals.
Both government and private networks are under constant attack. The Department of
Homeland Security reports that more than 640,000 cyber-related incidents affected federal
agencies in fiscal year 2014. The massive and prolonged hacking of employee records held by
the Office of Personnel Management underscores the intensity of assaults on government IT
systems. And I am personally all too familiar with the ease with which miscreant hackers can
use social engineering techniques to perpetrate criminal intrusions into personal email
accounts, and information technology and communication systems.
Unfortunately, there is every reason to expect cyber intrusions to increase in quantity,
cunning and impact. For one thing, the economics of cyberattacks are skewed to favor the
attacker. Exploits, or malicious software tools, are easily acquired. In fact, their prices are
falling dramatically in some criminal markets – not because of declining demand, but because
of an increasingly competitive marketplace. These exploits can be reused on multiple targets,
and the likelihood of detection and punishment remains low in most instances.
And while the vast majority of cyberattacks target money, proprietary information and
privacy itself, we need to realize that the range of potential targets is much, much greater. We
simply cannot discount the very real possibility of attacks against vital infrastructure –
utilities, transportation, and other essential underpinnings of modern civilization.
The world has changed dramatically… our lives – as well as our fingers – are inextricably
linked to the cyber realm, the new digital frontier where most human interactions,
transactions and communications take place. And while that digital environment holds
tremendous potential and opportunity for the further advancement of humanity, our
increasing dependence on it brings obvious risks and challenges.
To deal with those risks and challenges, reactive strategies are insufficient. There has to be
systemic learning informed by constant information sharing, so that one organization’s
detection becomes another’s prevention. In other words, countering cyber threats is very
much a team effort.
And a crucial point to bear in mind is that about 85 percent of the World Wide Web’s critical
infrastructure is held by the private sector. This is a privately owned and operated
environment in which the rules remain uncertain at best.
A number of federal efforts in recent years have promoted the sharing of cyber threat
information between the private sector and government. We should be sharing a lot more
information than we do as a nation, but programmatic, technical and legal challenges – as
well as concerns about privacy and the role of government – have hampered
progress.(adapted from CIA Director John Brennan- Thoughts on Paris attacks, 2015)
Unit 5
imagery=theformationofmentalimages,figures,orlikenessesofthings,orofsuchimagescol
lectively;pictorialimages
forge=toformormake,especiallybyconcentratedeffort:e.g.toforgeafriendshipthroughmu
tualtrust;toimitate(handwriting,asignature,etc.)fraudulently
inclusion=theactofincluding;thestateofbeingincluded;somethingthatisincluded.
redundant=characterized by verbosity or unnecessary repetition in expressing ideas;
prolix: a redundant style; being in excess; exceeding what is usual or natural: a
redundant part; having some unusual or extra part or feature. ; characterized by
superabundance or superfluity; lush, redundant vegetation.
congruous=exhibiting harmony of parts.; appropriate or fitting.
prosecution=the institution and carrying on of legal proceedings against a person; the
body of officials by whom such proceedings are instituted and carried on ;the
following up of something undertaken or begun, usually to its completion.
holistic= incorporating the concept of holism (the theory that whole entities, as
fundamental components of reality, have an existence other than as the mere sum of
their parts), or the idea that the whole is more than merely the sum of its parts, in
theory or practice
clutter=cover or fill (something) with an untidy collection of things;a collection of
things lying about in an untidy state
yield=to produce or furnish (payment, profit, or interest): to give up, as to superior
power or authority: to give up or surrender (oneself);to give way to influence,
entreaty, argument, or the like.
C.Learn more:
The process of taking known information about situations and entities of importance to the
RFI, characterizing what is known and attempting to forecast future events is termed "all
source" assessment, analysis or processing. The analyst uses multiple sources to mutually
corroborate, or exclude, the information collected, reaching a conclusion along with a
measure of confidence around that conclusion. Where sufficient current information already
exists, the analysis may be tasked directly without reference to further collection. The analysis
is then communicated back to the requester in the format directed, although subject to the
constraints on both the RFI and the methods used in the analysis, the format may be made
available for other uses as well and disseminated accordingly. The analysis will be written to
a defined classification level with alternative versions potentially available at a number of
classification levels for further dissemination.
There are some other important distinctions between the ways SOF and conventional forces
implementF3EAD:
1) the degree to which the process is understood and implemented within the SOF
community;
2) the emphasis placed on the process by SOF commanders, and
3)the degree success the process achieves for the SOF units who utilize it.
In SOF units effectively utilizing F3EAD, operational leaders at all levels took responsibility
for the intelligence effort, developing lines of communication and direct contact with the
intelligence personnel supporting them at all levels throughout the intelligence community.
This interaction allowed intelligence enablers to better understand and anticipate operational
needs, and facilitated the development of useful, long-term professional relationships between
intelligence and operations personnel. Additionally, units which successfully utilize F3EAD
often possess organizational adaptability that facilitates the conscious incorporation of
personnel, assets and capabilities that are not always considered as part of the warfighting
enterprise. Specifically, the inclusion of law enforcement personnel and their investigative,
forensic, and information-sharing capabilities were critical in the process of turning
intelligence into evidence, which became more and more important in the nonlethal
capabilities of F3EAD as the situations in Iraq and Afghanistan evolved. Unlike other
traditional targeting models and processes that focus on the operational or “finish” aspect, the
main effort of F3EAD is the intelligence effort, specifically the “exploit-analyze-disseminate”
portion. This allows F3EAD to be equally effective in lethal and non-lethal targeting, and is
key to understanding the F3EAD process. It is useful to visualize the F3EAD process as a
web, with the different elements of the process on the periphery, connected both directly to
each other and to the fusion of the operations and intelligence systems, in the manner shown
below. The cycle is continuous, but not necessarily congruous; steps can be and often are
skipped or shortened in order for the process to keep up with the “speed of war.”
Find
The “find” function of the process takes place at all levels of both the intelligence and
operations systems, with both operations and intelligence personnel intimately involved in the
effort. In simplest terms, the find component of F3EAD is the process of establishing a start
point for intelligence collection. These start points often take the form of target nominations,
which can be generated internally by individual units or can be directed from external
headquarters. After receiving planning guidance from the commander and operations
planners, F3EAD practitioners employ the full range of intelligence capabilities from organic,
to national, and sometimes even to international assets to get a starting point for the rest of the
process. The targeting start point can be deliberate or opportunity-based, and can focus on a
known personality, a facility, an organization, or some other type of signature.
Fix
Once a target is identified, the full gamut of intelligence collection capability is applied
against the target in order to develop operational triggers to “fix” the target in space and time.
Fixing a target simply means that the intelligence effort has progressed enough that the
operations function has sufficient information to execute the mission, whether that mission be
kinetic or non-kinetic. When possible, Special operations Force (SOF)utilizes a practice of
“federating” or spreading the intelligence effort out amongst multiple agencies in order to
maximize effects while minimizing costs, effort, and time. This is often done as far forward as
possible in order to increase the speed of the process, but much of the effort can be
accomplished via reach back. Federated intelligence processes enable the organization
practicing F3EAD to spread the collection effort across the IC, calling on specific
organizations and in some cases specific personnel to provide the expertise and capability to
bring the process into the “finish” phase. Redundant, persistent, and centralized intelligence,
surveillance and reconnaissance (ISR) capability allows commanders to mass ISR against a
specific target for the period of time necessary to support F3EAD. The goal of an ISR is to
provide an “unblinking eye” squarely focused on the target, to bring the targeting process into
the decisive next phase.
Finish
The first two steps of F3EAD lead to decisive operations against the enemy. Lethal combat
operations in which SOF or their surrogates close with and destroy or seize enemy facilities,
equipment, or personnel are one type of operation associated with the finish phase. However,
the finish phase can just as easily be non-kinetic in nature. Neutralization of an enemy
communications node, disrupting a courier network, legal prosecution of key terrorist
personalities, or achieving a desired psychological, political, or social effect are just as much a
part of “finish” as missile strikes or combat assaults. Therefore, in F3EAD, finish refers more
to finishing a particular mission, than finishing enemy forces. Under legacy targeting
methodologies, the finish phase was considered the main effort. This made sense in prior wars
which were focused more on physical destruction of enemy forces and infrastructure as a
means to end his will to resist. However, in an information-age era of protracted conflicts, risk
aversion, non-state actors and networked warfare, the main effort cannot be on “finishing”
enemy forces in a traditional sense, in large part because the nature of warfare has changed.
Therefore, F3EAD does not end in the finish phase; indeed, with “finish,” the main effort of
F3EAD is just beginning.
Exploit
The “exploit” phase, as the main effort of F3EAD, is the most critical single step in the
process as it leads to the finding, fixing, and finishing of the next target and the perpetuation
of the cycle. Exploitation also best fulfills the main purpose of intelligence, which is to enable
“decision advantage” for decision-makers at all levels. In the F3EAD model, exploitation is
the process of examining, analyzing, interrogating, and processing captured enemy personnel,
equipment, and materiel for intelligence purposes. The overall aim of the exploitation effort is
to produce enough actionable intelligence and/or prosecutorial evidence to perpetuate the
F3EAD process as rapidly as possible. In support of this aim, exploitation has four broad
goals: force protection, targeting, component and material sourcing, and prosecution. (adapted
from McIntyre, Russell, Criteria for a Successful Theater Exploitation Effort, 19 September
2009)
Exploiting captured enemy personnel and materiel for force protection purposes allows
operations and intelligence to function together in order to prevent enemy attacks on friendly
forces, installations, and capabilities. Targeting allows friendly forces to engage enemy
forces, installations, and capabilities in order to achieve lethal or non-lethal effects.
Component and materiel sourcing allows intelligence personnel to backtrack sources of
enemy personnel and materiel, thereby enabling friendly forces to engage the enemy across
his network. Finally, exploitation enables prosecution of enemy forces after they and their
materiel have been fully exploited for intelligence purposes. This represents another
fundamental evolution in warfare, since prior to the current Overseas Contingency
Operations, prosecution was most often associated with events that occurred after a conflict
was resolved, not during hostilities. By including prosecution as a part of the overall
exploitation process, practitioners of the F3EAD process allow friendly forces to then turn
intelligence into evidence, enabling successful legal prosecution of enemy forces, and
ensuring that both the population and friendly forces are protected. This is particularly useful
in the kind of “adaptive, security-conscious networks” frequently encountered in irregular
warfare.
Some organizations utilize the acronym “F3EA” instead of “F3EAD.” While the processes are
essentially the same except for the last letter of the acronym, the difference between the two
involves more than mere semantics. The argument for F3EA is that the “D,” dissemination, is
an “understood” part of the process and does not need to be specifically designated as an
individual component. This thinking is in error. “Exploit” and “analyze” were added to the
legacy find-fix-finish (F3) process because those functions required specific emphasis in order
for the process to realize its maximum potential. The same holds true with dissemination;
without emphasizing it as a specific and essential part of the of the targeting process, SOF
runs the risk of creating “stovepipes of excellence” that deliberately or inadvertently
compartmentalize information, thereby inhibiting the effective fusion of operation and
intelligence functions and bogging down the targeting process. Emphasizing “dissemination”
as a formal part of the process ensures that practitioners keep the dissemination element in
mind as a continuous part of the process. (adapted from: F3EAD: Ops/Intel Fusion ?Feeds?
The SOF Targeting Process by Charles Faint and Michael Harris )
E. Read on and then make up sentences of your own with: clutter , insurgent, tracking,
detainee, yield.
Use F3EA
An aggressive targeting model known as find, fix, finish, exploit, and analyze (F3EA) features
massed, persistent ISR cued to a powerful and decentralized all-source intelligence apparatus
in order to find a target amidst civilian clutter and fix his exact location. This precision
geolocation enables a start point into the enemy network that can be exploited through
persistent and patient observation. With this type of start point, one can mass ISR with
confidence that assets are not being wasted.
Mass ISR
F3EA differs from other targeting models because of its emphasis on exploit-analyze as the
main effort. This recognizes the importance of intelligence in fighting the low-contrast foe
and aggressively supplying multisource start points for new ISR collection. More than the
other phases, this feeds the intelligence operations cycle in which intelligence leads to
operations that yield more intelligence leading to more operations. The Joint Special
Operations Task Force(JSOTF) emphasis on raids is essential to gather intelligence on the
enemy network; simply killing the enemy will not lead to greater effectiveness against their
networks. In fact, capturing the enemy for purposes of interrogating is normally the preferred
option. The bottom line of exploit-analyze is to gather information and rapidly turn it into
operational action by applying it to defeat the enemy’s network. Target exploitation and
document exploitation are important law enforcement–type activities critical to F3EA.
Documents and pocket litter, as well as information found on computers and cell phones, can
provide clues that analysts need to evaluate enemy organizations, capabilities, and intentions.
The enemy’s low-contrast network comes to light a little more clearly by reading his email,
financial records, media, and servers. Target and document exploitation help build the picture
of the enemy as a system of systems and as such enables counternetwork forces to attack it
holistically.
Detainee intelligence is another law enforcement–like function crucial to revealing the
enemy’s network. The ability to talk to insurgent leaders, facilitators, and financiers on how
the organization functions offers significant insight on how to take that organization apart. In
terms of analysis and developing targeting lines of operation, detainee intelligence is the key
to the “slow, deliberate exploitation of leads and opportunities, person-to-person” that drive
operations.
Intelligence from detainees drives operations, yielding more detainees for additional
exploitation and intelligence. A tight connection between interrogators and detainee analysts
on one hand and all-source intelligence, collections, and operators on the other is critical to
take advantage of raw information. (adapted from Employing ISRSOF Best Practices by MT
Flynn)
Unit6
Communication
Man is always a part of a social interaction. It can never be removed from us to deal with
others, to be a part of others, and be able to relate with others. All these can only be achieved
through communication. Body language, basic oral communication and other forms won’t
matter as long as man can pass on to others what is in his mind or feelings. Without
communication, issues cannot be brought up or resolved. Relationships cannot be developed
or mended if communication is nonexistent. We are born to communicate with others and we
have the vocal system to back it up.
When we interact with others, we continuously give and receive wordless signals. All of our
nonverbal behaviors—the gestures we make, the way we sit, how fast or how loud we talk,
how close we stand, how much eye contact we make—send strong messages. These messages
don't stop when you stop speaking either. Even when you're silent, you're still communicating
nonverbally.
Oftentimes, what comes out of our mouths and what we communicate through our body
language are two totally different things. When faced with these mixed signals, the listener
has to choose whether to believe your verbal or nonverbal message, and, in most cases, they're
going to choose the nonverbal because it's a natural, unconscious language that broadcasts our
true feelings and intentions in any given moment.
C.Learn more:
The way you listen, look, move, and react tells the other person whether or not you care, if
you’re being truthful, and how well you’re listening. When your nonverbal signals match up
with the words you’re saying, they increase trust, clarity, and rapport. When they don’t, they
generate tension, mistrust, and confusion.
If you want to become a better communicator, it’s important to become more sensitive not
only to the body language and nonverbal cues of others, but also to your own.
Repetition: they can repeat the message the person is making verbally.
Contradiction: they can contradict a message the individual is trying to convey.
Substitution: they can substitute for a verbal message. For example, a person's eyes
can often convey a far more vivid message than words do.
Complementing: they may add to or complement a verbal message. A boss who pats
a person on the back in addition to giving praise can increase the impact of the
message.
Accenting: they may accent or underline a verbal message. Pounding the table, for
example, can underline a message.
It is often said that in face-to-face and even body-to-body communication the words we speak
actually account for less than 10% of the message that we convey, while body language
accounts for more than half of our message. Effective communication is a crucial factor in
any close relationship. What to do to improve communication is:
Identify your body language patterns. Make a conscious effort to think about what your
body is doing in different interactions with different people paying attention to what your
body does when you're angry, nervous or happy.
Determine whether your body language is in sync with your message. Your body
language is effective if it communicates the message you want it to communicate. If your
non-verbal signals match your words, you'll not only communicate more clearly, you'll also
be perceived as being more charismatic.
Emphasize a point. Have more than one gesture. If you want to make sure you're not
misunderstood, repeat both gestures when you speak the idea aloud. If the listener doesn't pick
up on one gesture, he or she will likely be familiar with the other.
Direct the most positive gestures toward the listener. This lets you more clearly indicate
that you are offering a favorable outcome to the listener. Direct the most negative gestures
away from yourself and the listener. This way you clearly indicate that you wish that no
obstacle stands in the way of your intended message.
Use hand gestures carefully. Be conscious of what your hands are saying as you speak.
Some hand gestures can be very effective in highlighting your points (open gestures), while
others can be distracting or even offensive to some listeners, and can lead to the conversation
or listening being closed down (closed gestures). It also helps to watch other people's hand
gestures to see how they come across to you.
Keep a check on other body language signals. Watch for wandering eyes, hands picking at
fluff on your clothing and constant sniffling. These small gestures add up and are all
guaranteed to dampen the effectiveness of your message. Don't worry about if you
accidentally perform a few of these in any given setting. The point here is to be certain that
your body language is not distracting for your listener and for you to pay attention to what
your body is doing.
Use facial expressions consciously. Aim to reflect passion and generate empathy with the
listener by using soft, gentle, and aware facial expressions. As much as possible, except when
culture dictates, avoid negative facial expressions, such as frowns or raised eyebrows. What is
or isn't negative is dependent on the context, including cultural context, so be guided by your
situation. Be alert for unexpected behavior that suggests you're cross-culturally colliding, such
as a clenched fist, a slouched posture, or even silence. If you don't know the culture, ask
questions about communication challenges before you start to speak with people in their
cultural context.
Communicate eye to eye. Eye contact establishes rapport, helps to convince that you're
trustworthy, and displays interest. During a conversation or presentation, it is important to
look into the other person's eyes if possible and maintain contact for a reasonable amount of
time (but don't overdo it; just as much as feels natural, about 2-4 seconds at a time).
Remember to take in all of your audience. If you're addressing a boardroom, look every
member of the board in the eye. Neglecting any single person can easily be taken as a sign of
offense and could lose your business, admission, success, or whatever it is you are
endeavoring to achieve. If you're addressing an audience, pause and make eye contact with a
member of audience for up to 2 seconds before breaking away and resuming your talk. This
helps to make individual members of the audience feel personally valued.Be aware that eye
contact is culturally ordained. In some cultures it is considered to be unsettling or
inappropriate. Ask or research in advance.
Touching one's face signals anxiety. Improve your posture. If you're constantly hunched
over or touching your face, you'll never look confident, approachable or at ease. Improving
your posture and working to eliminate nervous tics can be difficult and will take time, but
you'll quickly improve your overall non-verbal communication
Identify cultural norms. If you have recently entered a new culture, you may need to adjust
your body language. Cultural norms regarding body language (i.e. how far away you should
stand from someone, how much eye contact you should make, and what gestures are
considered taboo), vary considerably and if you don't speak the same body language as the
locals, you're liable to be misunderstood a great deal. This can even sometimes be met with
very serious implications.
Concentrate on difficult situations. It's most important to make sure your body language is
clear in interactions with people you don't know very well
Say what you mean. For most people, body language that effectively reinforces the speaker's
intent comes naturally when they mean what they say. The problem, of course, is that we
don't always say what we mean. If you're trying to lie convincingly for example, you'll
probably have to alter your body language to prevent it from arousing suspicion. It's often
easier to just say what you feel. (adapted fromThe Importance of Effective
Communication by Edward G. Wertheim).
Reading body language is "almost" a science. If at all possible it is best if you know the person
well enough to be able to see how their body reacts to situations. Just because someone wears
sunglasses when its cloudy doesn't mean they are trying to hide "something" or look cool. But
if that same person is wearing them indoors on the elevator, chances are, they believe they are
cool and want you to know it. But it "could" also mean they are recovering from a bad
hangover, or just got back from the eye doctor and actually need to wear shades to protect their
eyes. The atypical signs are what you should be looking at.
Communication with people of different cultures.Effective communication with people of
different cultures is especially challenging. Cultures provide people with ways of thinking-
ways of seeing, hearing, and interpreting the world. Thus the same words can mean different
things to people from different cultures, even when they talk the "same" language. When the
languages are different, and translation has to be used to communicate, the potential for
misunderstandings increases. Experts in communication describe three ways in which culture
interferes with effective cross-cultural understanding. First is what she calls "cognitive
constraints." These are the frames of reference or world views that provide a backdrop that all
new information is compared to or inserted into. Second are "behavior constraints." Each
culture has its own rules about proper behavior which affect verbal and nonverbal
communication. Whether one looks the other person in the eye-or not; whether one says what
one means overtly or talks around the issue; how close the people stand to each other when
they are talking--all of these and many more are rules of politeness which differ from culture
to culture. The third factor is "emotional constraints." Different cultures regulate the display
of emotion differently. Some cultures get very emotional when they are debating an issue.
They yell, they cry, they exhibit their anger, fear, frustration, and other feelings openly. Other
cultures try to keep their emotions hidden, exhibiting or sharing only the "rational" or factual
aspects of the situation. All of these differences tend to lead to communication problems. If
the people involved are not aware of the potential for such problems, they are even more
likely to fall victim to them, although it takes more than awareness to overcome these
problems and communicate effectively across cultures. Language of Persuasion
Public relations (PR) "sells" us a positive image of a corporation, government or organization.
Politicians and advocacy groups (groups that support a particular belief, point of view, policy,
or action) try to persuade us to vote for or support them, using ads, speeches, newsletters,
websites, and other means.
These "persuaders" use a variety of techniques to grab our attention, to establish credibility
and trust, to stimulate desire for the product or policy, and to motivate us to act (buy, vote,
give money, etc.)
We call these techniques the "language of persuasion.”
Basic persuasion techniques
Association. This persuasion technique tries to link a product, service, or idea with
something already liked or desired by the target audience, such as fun, pleasure, beauty,
security, intimacy, success, wealth, etc. The media message doesn’t make explicit claims that
you’ll get these things; the association is implied. Association can be a very powerful
technique. A good ad can create a strong emotional response and then associate that feeling
with a brand (family = Coke, victory = Nike). This process is known as emotional transfer.
Bandwagon. Many ads show lots of people using the product, implying that "everyone is
doing it" (or at least, "all the cool people are doing it"). No one likes to be left out or left
behind, and these ads urge us to "jump on the bandwagon.” Politicians use the same technique
when they say, "The people want..." How do they know?
Beautiful people. Beautiful people uses good-looking models (who may also be celebrities)
to attract our attention. This technique is extremely common in ads, which may also imply
(but never promise!) that we’ll look like the models if we use the product.
Bribery. This technique tries to persuade us to buy a product by promising to give us
something else, like a discount, a rebate, a coupon, or a "free gift.” Sales, special offers,
contests, and sweepstakes are all forms of bribery. Unfortunately, we don’t really get
something for free -part of the sales price covers the cost of the bribe.
Celebrities. We tend to pay attention to famous people. That’s why they’re famous! Ads
often use celebrities to grab our attention. By appearing in an ad, celebrities implicitly endorse
a product; sometimes the endorsement is explicit. Many people know that companies pay
celebrities a lot of money to appear in their ads but this type of testimonial still seems to be
effective.
Experts. We rely on experts to advise us about things that we don’t know ourselves.
Scientists, doctors, professors and other professionals often appear in ads and advocacy
messages, lending their credibility to the product, service, or idea being sold. Sometimes,
plain folks can also be experts, as when a mother endorses a brand of baby powder or a
construction worker endorses a treatment for sore muscles.
Explicit claims. Something is "explicit" if it is directly, fully, and/or clearly expressed or
demonstrated. For example, some ads state the price of a product, the main ingredients,
where it was made, or the number of items in the package – these are explicit claims. So are
specific, measurable promises about quality, effectiveness, or reliability, like “Works in only
five minutes!” Explicit claims can be proven true or false through close examination or
testing. It can be surprising to learn how few ads make explicit claims. Most of them try to
persuade us in ways that cannot be proved or disproved.
Fear. It uses something disliked or feared by the intended audience (like bad breath, failure,
high taxes or terrorism) to promote a "solution.” Ads use fear to sell us products that claim to
prevent or fix the problem.
Humor. Many ads use humor because it grabs our attention and it’s a powerful persuasion
technique. When we laugh, we feel good. Advertisers make us laugh and then show us their
product or logo because they’re trying to connect that good feeling to their product. They
hope that when we see their product in a store, we’ll subtly re-experience that good feeling
and select their product.
Intensity. The language of ads is full of intensifiers, including superlatives (greatest, best,
most, fastest, lowest prices), comparatives (more, better than, improved, increased, fewer
calories), hyperbole (amazing, incredible, forever), exaggeration, and many other ways to
hype the product.
Maybe. Unproven, exaggerated or outrageous claims are commonly preceded by "weasel
words" such as may, might, can, could, some, many, often, virtually, as many as, or up to.
Watch for these words if an offer seems too good to be true.
Plain folks. (– the opposite of Celebrities.) This technique works because we may believe a
"regular person" more than an intellectual or a highly-paid celebrity. It’s often used to sell
everyday products like laundry detergent because we can more easily see ourselves using the
product, too.Most of the "plain folks" in ads are actually paid actors carefully selected
because they look like "regular people.”
Repetition. Advertisers use repetition in two ways: Within an ad or advocacy message,
words, sounds or images may be repeated to reinforce the main point. And the message itself
(a TV commercial, a billboard, a website banner ad) may be displayed many times. Even
unpleasant ads and political slogans work if they are repeated enough to pound their message
into our minds.
Testimonials. Media messages often show people testifying about the value or quality of a
product, or endorsing an idea. They can be experts, celebrities, or plain folks. We tend to
believe them because they appear to be a neutral third party. This technique works best when
it seems like the person “testifying” is doing so because they genuinely like the product or
agree with the idea. Some testimonials may be less effective when we recognize that the
person is getting paid to endorse the product.
Warm and fuzzy. This technique uses sentimental images (especially of families, kids and
animals) to stimulate feelings of pleasure, comfort, and delight. It may also include the use of
soothing music, pleasant voices, and evocative words like "cozy" or "cuddly.”
Intermediate persuasion techniques
The Big Lie. According to Adolf Hitler, one of the 20th century’s most dangerous
propagandists, people are more suspicious of a small lie than a big one. The Big Lie is more
than exaggeration or hype; it’s telling a complete falsehood with such confidence and
charisma that people believe it. Recognizing The Big Lie requires "thinking outside the box"
of conventional wisdom and asking the questions other people don’t ask.
Charisma. Sometimes, persuaders can be effective simply by appearing firm, bold, strong,
and confident. This is particularly true in political and advocacy messages. People often
follow charismatic leaders even when they disagree with their positions on issues that affect
them.
Euphemism. Euphemism tries to pacify audiences in order to make an unpleasant reality
more palatable. Bland or abstract terms are used instead of clearer, more graphic words. Thus,
we hear about corporate "downsizing" instead of "layoffs," or "intensive interrogation
techniques" instead of "torture.”
Extrapolation. Persuaders sometimes draw huge conclusions on the basis of a few small
facts. Extrapolation works by ignoring complexity. It’s most persuasive when it predicts
something we hope can or will be true.
Flattery. Persuaders love to flatter us. Politicians and advertisers sometimes speak directly to
us: "You know a good deal when you see one." "You expect quality." "You work hard for a
living." "You deserve it." Flattery works because we like to be praised and we tend to believe
people we like.
Glittering generalities. This is the use of so-called "virtue words" such as civilization,
democracy, freedom, patriotism, motherhood, fatherhood, science, health, beauty, and love.
Persuaders use these words in the hope that we will approve and accept their statements
without examining the evidence. They hope that few people will ask whether it’s appropriate
to invoke these concepts, while even fewer will ask what these concepts really mean.
New. We love new things and new ideas, because we tend to believe they’re better than old
things and old ideas. That’s because the dominant culture in the world places great faith in
technology and progress. But sometimes, new products and new ideas lead to new and more
difficult problems.
Nostalgia. This is the opposite of the New technique. Many advertisers invoke a time when
life was simpler and quality was supposedly better ("like Mom used to make"). Politicians
promise to bring back the "good old days" and restore "tradition." But whose traditions are
being restored? This technique works because people tend to forget the bad parts of the past,
and remember the good.
Rhetorical questions. These are questions designed to get us to agree with the speaker.
They are set up so that the “correct” answer is obvious. ("Do you want to get out of debt?"
"Do you want quick relief from headache pain?" and "Should we leave our nation vulnerable
to terrorist attacks?" are all rhetorical questions.) Rhetorical questions are used to build trust
and alignment before the sales pitch.
Scientific evidence. It uses the paraphernalia of science (charts, graphs, statistics, lab coats,
etc.) to "prove" something. It often works because many people trust science and scientists.
It’s important to look closely at the "evidence," however, because it can be misleading.
Simple solution. Life is complicated. People are complex. Problems often have many causes,
and they’re not easy to solve. These realities create anxiety for many of us. Persuaders offer
relief by ignoring complexity and proposing a simple solution. Politicians claim one policy
change (lower taxes, a new law, a government program) will solve big social problems.
Advertisers take this strategy even further, suggesting that a deodorant, a car, or a brand of
beer will make you beautiful, popular and successful.
Slippery slope. This technique combines Extrapolation and Fear. Instead of predicting a
positive future, it warns against a negative outcome. It argues against an idea by claiming it’s
just the first step down a “slippery slope” toward something the target audience opposes. ("If
we let them ban smoking in restaurants because it’s unhealthy, eventually they’ll ban fast
food, too." This argument ignores the merits of banning smoking in restaurants.) The
slippery slope technique is commonly used in political debate, because it’s easy to claim that
a small step will lead to a result most people won’t like, even though small steps can lead in
many directions.
Symbols. Symbols are words or images that bring to mind some larger concept, usually one
with strong emotional content, such as home, family, nation, religion, gender, or lifestyle.
Persuaders use the power and intensity of symbols to make their case. But symbols can have
different meanings for different people. Hummer SUVs are status symbols for some people,
while to others they are symbols of environmental irresponsibility.
Advanced persuasion techniques
Ad hominem. Latin for "against the man," the ad hominem technique responds to an
argument by attacking the opponent instead of addressing the argument itself. It’s also called
"attacking the messenger.” It works on the belief that if there’s something wrong or
objectionable about the messenger, the message must also be wrong.
Analogy. An analogy compares one situation with another. A good analogy, where the
situations are reasonably similar, can aid decision-making. A weak analogy may not be
persuasive, unless it uses emotionally-charged images that obscure the illogical or unfair
comparison.
Card stacking. No one can tell the whole story; we all tell part of the story. Card stacking,
however, deliberately provides a false context to give a misleading impression. It "stacks the
deck," selecting only favorable evidence to lead the audience to the desired conclusion.
Cause vs. Correlation. While understanding true causes and true effects is important,
persuaders can fool us by intentionally confusing correlation with cause. For example: Babies
drink milk. Babies cry. Therefore, drinking milk makes babies cry.
Denial. This technique is used to escape responsibility for something that is unpopular or
controversial. It can be either direct or indirect. A politician who says, "I won’t bring up my
opponent’s marital problems," has just brought up the issue without sounding mean.
Diversion. This technique diverts our attention from a problem or issue by raising a separate
issue, usually one where the persuader has a better chance of convincing us. Diversion is often
used to hide the part of the story not being told. It is also known as a “red herring.”
Group dynamics. We are greatly influenced by what other people think and do. We can get
carried away by the potent atmosphere of live audiences, rallies, or other gatherings. Group
dynamics is a more intense version of the Majority belief and Bandwagon techniques.
Majority belief. This technique is similar to the Bandwagon technique. It works on the
assumption that if most people believe something, it must be true. That’s why polls and
survey results are so often used to back up an argument, even though pollsters will admit that
responses vary widely depending on how one asks the question.
Scapegoating. Extremely powerful and very common in political speech, Scapegoating
blames a problem on one person, group, race, religion, etc. Some people, for example, claim
that undocumented (“illegal”) immigrants are the main cause of unemployment in the United
States, even though unemployment is a complex problem with many causes. Scapegoating is
a particularly dangerous form of the Simple solution technique.
Straw man. This technique builds up an illogical or deliberately damaged idea and presents
it as something that one’s opponent supports or represents. Knocking down the "straw man" is
easier than confronting the opponent directly.
Timing. Sometimes a media message is persuasive not because of what it says, but because
of when it’s delivered. This can be as simple as placing ads for flowers and candy just before
Valentine’s Day, or delivering a political speech right after a major news event. Sophisticated
ad campaigns commonly roll out carefully-timed phases to grab our attention, stimulate
desire, and generate a response. (adapted from Stella Ting-Toomey:Theories in intercultural
communication.)
Reading body language and nonverbal communication
Once the abilities to manage stress and recognize emotionsare developed, one will naturally
become better at reading the nonverbal signals sent by others.
Pay attention to inconsistencies. Nonverbal communication should reinforce what is being
said. Is the person is saying one thing, and their body language something else? For example,
are they telling you “yes” while shaking their head no?
Look at nonverbal communication signals as a group. Don’t read too much into a single
gesture or nonverbal cue. Consider all of the nonverbal signals you are receiving, from eye
contact to tone of voice and body language. Taken together, are their nonverbal cues
consistent—or inconsistent—with what their words are saying?
Trust your instincts. Don’t dismiss your gut feelings. If you get the sense that someone isn’t
being honest or that something isn’t adding up, you may be picking up on a mismatch
between verbal and nonverbal cues.
The big unreported story of the Iraqi crisis is the failure of American intelligence
agencies to foresee the ISIS campaign. Indeed, the ISIS phenomenon from its emergence two
years ago until now has largely passed under the radar of the CIA, NSA et al. Officials are
quoted as admitting that we were "caught by surprise," "of being stunned." That should not
surprise us in the light of a depressing record of serial failure to identify in advance
developments in Egypt, Mali, Libya, Kenya, Ukraine, Afghanistan and Iran. By any
objective measure, the intelligence establishment's performance in its main task of gathering
and interpreting information has been mediocre. It is hard to believe that there were not
people in the CIA or DIA or wherever who had some sense of the ISIS - its emergence and
implications -- however inadequate. As often is the case, the communications gap between
analysts' reports and policy-making levels is the Achilles heel of the American intelligence
establishment. Essential information and analysis can easily be misplaced, warped, diluted or
distorted to serve ulterior purposes. The risk of this happening is magnified several fold
when certain conditions exist. Agency leaders who have pronounced views as what policy
should be are one liability. Agency leaders who are careerists mainly concerned with what
reporting will win favor with the White House and/or Congress is another. Infatuation with
technology at the expense of human assets at every phase of the intelligence gathering and
assessment process is a third. The negative consequences are aggravated when senior makers
… are not paying focused attention to the workings of those agencies or the quality of their
product. It derives from a number of sources: inexperience, undue attention paid the
domestic political aspect of foreign policy, unjustified confidence in and loyalty to certain
individuals, or viewing a high position less as public trust than as a vehicle to advance
personal ambitions…This is the environment in which belief substitutes for strategy, policy
results are automatically spun, failure is a world unspoken - and, therefore, no one is held
accountable for it, especially the intelligence agencies.
The distressing truth is that our leaders have inhabited a policy world so twisted out of
shape by deceit and self-delusion that that their grip on reality has been dangerously
loosened…Freedom of conscience about the truth of the "terrorism years" is not prized or
sought. It is the comfort and convenience promised by "corrected" truth that better serves
what our leaders' crave and need most. (adapted from Intelligence Failure in Iraq by Michael
Brenner)
Part 2
Text 1:
The modern world is a virtual panopticon, a surveillance state which records huge quantities
of data about our every action and provides an easily retrievable metadata record of our
movements, our contacts, our purchases, and our activities. This panopticon has two potential
functions: prospective and retrospective. The prospective function is to stop the bad guys
before they do the bad thing. The retrospective function allows intelligence and law
enforcement authorities to comb through data following an event and piece together what
happened. The emotional resonance of the prospective function is highest following an event
like the Paris terrorist attacks – it allows proponents of increased surveillance authorities to
say “If only…”
Details are still emerging but we are now starting to get a picture of how the Paris attackers
operated, and how, despite being known to authorities, they evaded detection. These attacks
demonstrate that, whatever the investigative benefits of the retrospective panopticon, the
prospective panopticon is inherently limited. Put simply, the prospective panopticon failed in
Paris (as it fails in every successful terrorist attack), and the reasons why probably can’t be
fixed.
To begin, consider the retrospective panopticon. This panopticon is so powerful that even the
CIA can’t reliably evade it, with at least two operations attributed through cellphone metadata
records. Once a suspect is identified, it is relatively straightforward to reconstruct movements,
associates, patterns of activity, and many communications. This explains the incredible
success of French and Belgian authorities in the aftermath of the attacks at quickly identifying
suspects and known associates and mapping their movements.
But the success of this retrospective panopticon only highlights the failure of the prospective
panopticon. If the individuals in Paris were known to authorities, why weren’t they stopped?
First, the sheer volume of “known radicals” –at least 5000—makes prospective monitoring
impossible. How does one effectively monitor 5000 individuals and identify who among them
will pose an actual threat? After all, most never will. It didn’t matter that Salah Abdeslamused
his own name and credit card when booking his hotel room.He was simply one of thousands
identified as maybe or maybe not posing a threat.
Even reducing the volume of targets may be insufficient. Assuming the authorities were able
to focus on 500 or 50 individuals instead of 5000, the communication patterns of a terrorist
cell are remarkably similar to those of any family or group. Unless authorities are aware that
an individual is actively (rather than potentially) dangerous, electronic monitoring may
provide little prospective benefit, unless they can intercept the contents of a communication
that makes a threat clear.
But the communication content of an even minimally proficient terrorist provides little value.
Human codes are often employed. We now know that final coordination took place using
unencrypted SMS, but unless one already has already identified the terrorist cell and at least
some basic details of a plot, tracking an SMS that says " On estparti on commence" (which
roughly translates to “Let’s go, we’re starting”) provides little actionable intelligence.
Which bring us to cryptography, or rather the lack thereof. The Paris attackers consisted of
individuals who knew one another and lived in the same neighborhoods. Meeting in person
was not only feasible but unsuspicious. Afterall, low-tech methods –face-to-face meetings and
using couriers—provide the best protection against electronic surveillance. And even if
physically followed, it is not unusual for someone to meet a brother, friend, or cousin in a
loud public space.
This is all to say, providing more electronic surveillance powers to the security services won’t
fix the actual problem. Sure, it ups the power of the panopticon’s retrospective analysis but
that wasn’t what failed here. To the contrary, the retrospective panopticon appears to be
working quite well under current authorities…
It would be a mistake to allow proponents of increased surveillance authority to use a failure
of the prospective panopticon to argue for more power relevant to the retrospective
panopticon. The limits of the prospective panopticon cannot be wished away by cryptographic
backdoors and the like. These are inherent limitations of the system. Therefore, rather than
using Paris as an argument for increasing surveillance authority, security services should look
to where they can overcome the panopticon’s failings. For example, authorities should
redouble their focus on human intelligence. Here, the relatively large cell size (perhaps 20 or
more based on the number of arrests) made the conspiracy more vulnerable to infiltration, and
the security services have all the necessary legal authorities to carry out this mission.
The electronic panopticon is attractive because it is often effective and inexpensive by
design. But Paris presents an opportunity to acknowledge its limitations and recognize that
making it “stronger” will not actually make it more effective.
Text 2:The U.S. intelligence community is scouring its own data to see if any warning signs
were missed in the lead-up to Friday’s deadly terror attacks in Paris, though top U.S. and
French officials argued Monday that intelligence lapses were not to blame.
President Obama said Monday that “threat streams” received before the attack included no
“specific mentions” of the deadly strikes.
“There were no specific mentions of this particular attack that would give us a sense of
something that we could provide French authorities,” said the president, three days after 129
people were killed in the attacks, for which the Islamic State terror group has claimed
responsibility.
His remarks, at an international summit in Turkey, follow French officials giving a similar
response to questions about an Iraqi intelligence warning to the U.S.-led coalition fighting the
Islamic State.The apparent warning from the Iraqi government pertained to an imminent
assault by the terror group and came one day before the Friday evening attacks. It warned that
Abu Bakral-Baghdadi, the group’s leader, had ordered supporters to use guns and bombs and
take hostages in coalition countries, as well as Iran and Russia.
A France security official said in response that French intelligence teams get such non-
specific communication “all the time” and “every day.”
Fox News has learned that the U.S. intelligence community, though, is doing a review of their
“holdings,” going back through their data to see if anything was missed. Fox News also
learned over the weekend about so-called “chatter” roughly 72 hours before the Paris attacks
involving ISIS-linked accounts that showed such images as weapons and the Eiffel tower.
French officials apparently failed to capitalize on at least some information concerning the
attacks. Abdeslam was one of three men in a getaway car, headed for France’s border with
Belgium, when police pulled them over after daybreak Saturday. The French president had
already announced new border controls to prevent the perpetrators from escaping. Hours had
passed since investigators identified the possible terrorist as the renter of a Volkswagen Polo
that carried hostage-takers to the Paris theater where almost three-quarters of the 129 victims
were killed.
It’s not clear why the local French police didn’t take this guy into custody. They checked his
identification, but it’s not known whether they had been informed of his apparent connection
to the attacks.
“It was a simple check. There was no lookout notice at the time of the traffic stop,” a French
police official said.
It may not have been the only missed opportunity before and after France’s deadliest
extremist attack since World War II.
In addition to giving the dispatch to French authorities, Iraqi intelligence officers said they
also shared specific details before the attack about the possible masterminds and them being
trained in Syria.
Also, another suicide bomber in the Paris attacks, reportedly had a long record of petty-crime
arrests and was identified in 2010 as a target for “radicalization.” However, he was never in
prison or implicated in a terror plot.
German officials on Thursday appeared to have stopped another attacker on the way to
France. They reportedly stopped a 51-year-old Montenegrin man carrying several handguns,
ammunition, grenades, eight assault rifles and 200 grams of TNT. However, they evidently
did not alert other authorities.
In addition, an FBI team is going to Paris to review how the attackers communicated.
The agents will focus on the terror suspects’ smart phones and computers and whether they
used encrypted communications, met in person or used alternate methods including gaming
consoles, which terrorists and others use to communicate without being detected by law
enforcement.
(Fox News’ Catherine Herridge and The Associated Press contributed to this report.
(http://www.topnewslive.com/missed-signals-intel-officers-scan-data-for-paris-attack-
warnings/)
Text 3:
The horrendous November 13th attacks on Paris are exactly what intelligence agencies have
told us all along: Something bad will happen because they can’t conduct massive surveillance
operations in light of the Snowden revelations, and because more products and online services
offer end-to-end encryption that can’t be tapped into.
The NSA and all its international partners might be right about encryption, but at the same
time, they’re doing a poor job of selling it to the public. It’s all a huge PR mess.
In light of the various terrorists attacks that hit multiple targets this year, including Paris
(twice now, counting Charlie Hebdo), Beirut (a day before Paris), and the Russian passenger
jet that exploded a few weeks ago, many government officials will tell us how we need
special laws that would make it easier for spy agencies to get intel on targets, and how we
need to spend more money on spying to prevent ISIS-like attacks.
“In the past several years because of a number of unauthorized disclosures and a lot of hand-
wringing over the government’s role in the effort to try to uncover these terrorists there have
been some policy and legal and other actions taken that make our ability collectively,
internationally, to find these terrorists much more challenging,” CIA Director John Brennan
said at a Center for Strategic and International Studies talk a few days ago, according to The
Verge.
He continued, “I do hope that this is going to be a wake-up call, particularly in areas of
Europe where I think there has been a misrepresentation of what the intelligence and security
service is doing…”
There’s simply no proof this proposed spying works. Do the air raids in Syria, based on
intelligence received by the many nations involved in bombings, actually have the desired
effect? Have any arrests made following the Paris attacks offer any clues as to what else is
about to happen?
Have these intelligence agencies managed actually to thwart any other terrorist attacks in the
recent past? What about in the years preceding Snowden’s revelations? We’ve all seen spy
movies. We have a pretty good idea what happens to suspects caught before a terrorist attack
takes place and it makes sense. Rather than revealing details about these failed attacks, the
NSA and Co. would be better off milking the apprehended suspects for intelligence that
might prevent future threats.
But that’s not very reassuring to the general public who’s told that it should agree with new
laws that demand increased budgets for massive surveillance operations that may or may not
be an invasion of privacy for regular Internet users. The problem is that we don’t get to see
any results that would make the privacy tradeoff worthwhile. Sure, the NSA can record all my
conversations because it caught 10 bad guys looking to blow up hundreds of innocent people
in the past five months. That’s something you’re not going to hear anyone say.
And no, David Cameron’s revelations that U.K.’s secret services stopped seven attacks in the
last six months aren’t enough. After all, these statements came after the Paris attacks — and
they’re not even accurate.
“Our security services have stopped seven attacks in the last six months, albeit on a smaller
scale,” Cameron said earlier this week. According to Daily Mail. Downing Street later
clarified that it stopped seven attacks in the last year. The publication also revealed that on
October 28th, MI5 chief Andrew Parker said “with our partners, we have thwarted six
attempts at terrorist attacks in the UK in the last year, and several plots overseas.” These
statements suggest that one attack should have taken place on U.K. soil at some point in the
last three weeks, and also proves that intelligence agencies aren’t willing to explain what
attacks they prevented or how.
More annoying is the fact that while there’s no real transparency concerning successful
operations that have stopped terrorist hits around the world, there’s total transparency when it
comes to some degree of incompetence. France was told numerous times that hits
were coming. The U.S. warned its ally a few months ago, and France bombed Syria hoping to
kill some of the people planning the attacks. Then Germany told France weeks ago that there
was an imminent pre-planned terrorist attack for Paris, according to a SOFREP report.
A Turkey official told The Guardian that French authorities were informed twice about one of
the suicide bombers, in December 2014 and June 2015, but French spies requested more
information about him only after Friday’s attack. Finally, senior Iraqi intelligence officials
warned coalition countries of imminent assaults by ISIS a day before the attacks last week,
according to the Associated Press. Other reports have said that some of the radicals who died
after killing at least 129 and injuring hundreds of civilians in Paris were known to law
enforcement in Europe.
France, for reasons unknown, failed to prevent last week’s tragedy. And yes, it’s likely that
intelligence conducted in the recent past through sophisticated operations helped French set
up swift raids in the aftermath of November 13th, arresting many suspects, and culminating in
the assault on an apartment building in Paris that was sheltering other ISIS members and
possibly the mastermind behind the attacks. This operation may have even prevented a second
attack on Paris in the process.
It’s also clear that a country as resourceful as France can’t handle this issue by itself. France,
for the first time in EU history, invoked a mutual defense article that forces other countries to
help out in any way they can. But government officials and intelligence agencies have yet to
prove to regular citizens that massive spying operations actually work in this complex war on
terror. All we see are failures like last week’s attacks that leave hundreds of people dead and
injured, and that leave millions wondering anyone is really making sure they’re safe.
Oh, and asking tech companies to include backdoors in encryption and to store personal data
for more time isn’t the way to do it either. Let’s all pretend for a second that many of these
extremists are at least as sophisticated and well-funded as the NSA & Co. and, therefore, have
ways of communicating without anyone listening in. Breaking encryption would only
jeopardize the online security of regular users when they’re hit by hackers who would
inevitably find the same security holes, as we’ve seen in the
past.(http://news.yahoo.com/selling-us-safety-huge-pr-problem-spy-agencies)
Text 4:
The intelligence and law enforcement
Since September 11, 2001, the intelligence and law enforcement communities have struggled
to adapt to new challenges and to refocus and reorderpriorities. The media at times has been
critical; Congress has demanded change; and the public has expected more. These
communities have endured adjustments and upheaval while simultaneously confronting the
war on terrorism—what many call The Long WarBoth law enforcement and intelligence
organizationsrecognize the need to collaborate, share, and exchange information; however,
the events leading up to 9/11 document how the legal and artificial boundaries between them
created a serious impediment to protecting the country.
Traditionally, participants in the intelligence arena use information to gauge
foreigncapabilities and intentions while members of law enforcement organizations collect
information to support domesticprosecution,
Calls for Sharing Information
In the aftermath of the terrorist attacks of September 11, 2001, most observers concluded that
the U.S. Intelligence Community and the law enforcementagencies need to share more
information. Most also concluded that operational strategies andtactics—especially those
focused on transnational issues such as terrorism, drugs, counterintelligence, and weapons of
mass destruction—needed to be better integrated. Understanding the need for change,
Congress quickly passed the USA Patriot Act of 2001. It also enacted the Homeland Security
Act of 2002 and the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA).
Congress wanted to strengthen the nation’s ability to protect itself from future attacks and to
provide more effective tools to fight the war on terrorism. These acts removed many of the
barriers to cooperation between intelligence and law enforcement and mandated exchanging
information related to international terrorist threats. The goal of sharing information has a
long, murky, and complex history. Part of the problem has been an inconsistent
implementation of policies stemming from different interpretations of what is legally allowed.
The groups recommended that the channels of communication among agencies be
significantly improved to allow better and faster exchange of information; thereby fostering
greater cooperation, particularly when focused on investigating terrorists’ activities. In
addition, the reviews almost universally concluded that many of the obstacles were
bureaucratic or cultural (or both).
Widespread Internet access and other modern communications technology provided enemies
with tools to exploit the seam.
The lack of information sharing between the law enforcement and intelligence communities
was highlighted as a failure that might have made the 9/11 attacks possible. Objections
against closer cooperation largely disappeared.
The Intelligence Community
The intelligence community has its own deeply embedded culture and value systems. In
contrast to law enforcement, the intelligence community focuses beyond the borders of the
United States and on the future—assessing foreign trends and actions. Intelligence community
analysts evaluate what they learn, interpret the importance of the information, and determine
who should be informed. “Need to know” historically has been paramount.
Protecting “sources and methods” is regarded as crucial to keeping sources intact.Intelligence
professionals are constantly reminded that they are responsible for foreign intelligence and
must unerringly adhere to the laws and policies designed to protect the rights of U.S. persons.
Intelligence community policies have in the past erred by being too cautious. The intelligence
community agencies created policies and guidelines to ensure personnel complied with legal
boundaries for the gathering and use of national intelligence information. While these
practices were designed to ensure full protection of the rights of U.S. persons, the policies
were sometimes so restrictive that they effectively prohibited legal exchanges of information
outside the community and at times even within. In many circumstances, no information was
exchanged, and “connecting the dots” was nearly impossible. Communicate and Reinforce the
Need for Sharing:
People have a natural tendency to resist change. For this reason, leaders throughout the
intelligence and law enforcement communities must consistently and repeatedly deliver the
message of change and ensure that everyone understands the importance of sharing
information. Analysts who have been told for years that releasing certain types of information
violates the law must now be strongly encouraged to exchange the information with others.
The new Director of National Intelligence, Mike McConnell, has made a strong statement to
all intelligence professionals with his direction that it is not enough to share intelligence:
There is a responsibility to provide it. (http://www.afcea.org/mission/intel/documents)
Text 5:
Last week, The Intercept released a trove of classified documents (provided by an unnamed
source) relating to America’s use of unmanned aerial vehicles as weapons of
assassination.The US government has been conducting drone strikes outside of declared war
zones since 2002. The CIA has traditionally carried out these covert operations."Our entire
Middle East policy seems to be based on firing drones," Lt. Gen. Michael Flynn, former head
of the Defense Intelligence Agency, told The Intercept. "They're enamored by the ability of
special operations and the CIA to find a guy in the middle of the desert in some shitty little
village and drop a bomb on his head and kill him."Regardless of which agency is planning the
strike, the overall process of identifying, tracking and killing a target is the same. Targets are
usually discovered through Signals Intelligence (SIGINT) and Communications Intelligence
(COMINT) - specifically eavesdropping on mobile communications by tracing cellphone calls
and skimming SIM card data. For flights over Iraq, most UAVs only have to travel about 100
km. For operations in Yemen, that average jumps to 500 km and in Somalia drones must
travel more than 1,500 km per leg on average. They can sometimes spend more than half their
flight time in transit, rather than loitering over their target, leaving precious little time to
perform much meaningful surveillance. What's more, these distances lead to "blinks" wherein
intelligence agencies temporarily lose sight of a target during the handover when a new UAV
or manned aircraft relieves the current one.
"I think that having [more drones capable of sharing intel] could improve the situation in
some ways. There's a lot of talk in the papers about blinks, which is a nice euphemism for
gaps in the surveillance coverage
Text 6
The vital need for intelligence and the often-secret nature of intelligence-gathering make the
effectiveness and control of national intelligence services two of the most important
challenges faced by all democracies. Lacking effective intelligence services, a state cannot
anticipate, prevent, or protect itself against major threats to its national security.Where control
is lacking, intelligence cannot be directed to serve legitimate national interests, civil liberties
are placed at risk, and democracy itself may be undermined…The 9/11 attacks accelerated
efforts to transform the orientation of intelligence services from rivalry, both domestic and
international, to cooperation against the new threats. This was an unprecedented situation for
intelligence services where considerations of secrecy, trust, and national security made them
the strongest bastion of the nation-state and its sovereignty against all other states and their
institutions
The Cold War "model" of intelligence reform in the West was aimed above all at
implementing democratic control through greater oversight and restricting the potential for
abuse by separating intelligence agencies according to specific missions, constructing
bureaucratic barriers to cooperation (and feared collusion), and encouraging interagency
rivalry as part of the system of checks and balances. The same precepts held true for post-
communist intelligence reform in an even more fundamental manner: "Monolithic" services
were broken up into smaller services with each assigned a more narrowly defined mission,
barriers were erected, and rivalries were encouraged.
However, this model stood in tension with, if not outright contradiction to, the requirements
of the post-Cold War security environment, where effectiveness against new threats
necessitated new forms of inter-service cooperation and reorganization. While traditional
principles of separating military and civilian intelligence services may remain valid, the
separation of foreign- and domestic- intelligence services and their tasks, as well as the
separation of intelligence from law-enforcement bodies and their tasks, may be on less certain
ground. Clearly, the new levels of cooperation and convergence complicate the exercise of
oversight and control and conflict with traditional models of reform. It is likely that new
oversight and control mechanisms, or the modification of older arrangements, will be
necessary.
The dynamism inherent in countries adapting to two contradictory reform paradigms adds
immensely to the challenges facing the intelligence analyst, challenges already complicated
by the substantial differences among the services of central and eastern Europe that prevent
straightforward comparisons. How does one evaluate the salience of personnel vetting for
intelligence sharing when the group of services includes one that was independent before
1989 along with six that were directly subordinated to Moscow until 1989-91? How can
analysis factor in the effect of western expertise and material assistance that some have
received since 1990, but others only since the middle or end of the decade? How does one
judge the political neutrality of services in different parliamentary, presidential, and semi-
presidential systems?
A new template must be developed to gauge intelligence reform in the post-communist
countries. NATO's role in defining the security sector reform agenda through its Partnership
for Peace and Membership Action Plans (MAP) has proven a major boon to intelligence
reform in the region, but there is no NATO model to emulate. Nor does the European Union
provide a useful template. Both NATO and the EU fall short of supplying needed guidance
because many of their long-time members exercise poor or no democratic control over their
intelligence services and/or have recurring problems with operational effectiveness. The
reforms that have proven of greatest utility are those previously undertaken largely in North
America and northern Europe.
If the NATO MAP experience has proven anything, it is that outside assistance, when sought,
is critical to the nature of intelligence reform. What is taught is important. It is imperative,
therefore, that the West identify and agree on what constitutes "best practices"--even if
Western countries do not yet meet all of the standards themselves. Once agreed upon, these
best practices could be made part of the official reform agenda for central and Eastern Europe
and incorporated into MAP requirements and EU conditions for membership. Useful
evaluation against a system of almost universally valid "best practice" criteria might then be
possible--as applicable in Brussels and Berlin as in Bratislava and Budapest.
(Adapted from Intelligence Reform in Europe's Emerging DemocraciesConflicting
Paradigms, Dissimilar Contexts by Larry L. Watts)
Text 7:
Belgium is a failed state. That the Paris terrorist attacks had strong links to a suburb of
Brussels didn’t shock many of us who live in the Belgian capital. Radio stations here in both
French and Dutch are full of discussions that elicit indignation, sorrow, anger, guilt, despair,
defiance. But not surprise.
The absence of surprise also makes sense because long before the emergence of jihadism,
Molenbeek had acquired a reputation for lawlessness. Most people in Brussels have very little
understanding of what such jihadism is and how it comes to link Brussels with Paris, Iraq and
Syria, but they were already aware that Molenbeek had high levels of petty crime: muggings,
drug dealing and burglaries.
But the more painful question that should be asked is: What do Molenbeek’s failures
reveal about the deep dysfunction in the Belgian state? That Molenbeek has been allowed to
become a breeding-ground for jihadism says some damning things about formal and informal
structures in Belgium, and in particular Brussels.
Decades of failed reforms
What is remarkable about Molenbeek is the proximity of the poverty and lawlessness to the
center of a European capital city, including the political and cultural institutions of the
Brussels, Flemish and national governments. The sociologists tell us that the distribution of
wealth in Brussels follows a pattern that is more commonly found in American cities —
wealthy suburbs surrounding a hollowed-out center of poverty and blight. The European
norm, exemplified by London and Paris, would have the most expensive and chic areas in the
center...
All of which raises the question of why Molenbeek’s problems have been allowed to persist
for so long. This is not a task on the same scale as reviving the South Bronx or redressing the
industrial blight of Glasgow. The nearest parallel I can think of is Brixton, a London suburb,
three miles south of Westminster. Blighted by wartime bomb damage, then home to large
contingents of West Indian immigrants in the 1950s and 1960s, it suffered race riots in the
1980s. But much of Brixton has been turned round, so why not Molenbeek?
The answers are an indictment of the Belgian political establishment and of successive
reforms over the past 40 years.
Those failures are perhaps one part politics and government; one part police and justice; one
part fiscal and economic. In combination they created the vacuum that is being exploited by
jihadi terrorists...
Belgium came late, by western European standards, to statehood. As in Italy, another
latecomer, there were already existing allegiances to the locality, and although Belgium’s
liberal elite threw off Dutch rule in 1830, it could neither uproot nor supplant these
attachments to the local community, often intertwined with the Roman Catholic Church. So
the formal structure of a Belgian state was erected but framing within it the cultural, social
and welfare structures of the Church’s state within a state. That was followed in due course by
the development of a socialist/labor movement with its rival structures for mutual assurance,
cultural associations, newspapers. Ranged against the Christian Democrats and the socialists
were the anti-clerical and middle-class liberals, who constituted the third corner in Belgium’s
political triangle. They did not have the same popular support, nor the equivalent social
structures. Administrations were divided by their political allegiances. Politicians were
masters of patronage. In due course, the formal state developed its own services in, for
example, education, health care and other expressions of a welfare state, but it was obliged to
do so respecting (and indeed using) the structures of the political parties... Administrations
were divided by their political allegiances. Politicians were masters of patronage, with jobs
and money at their disposal, and, as a consequence, public service suffered. Although
attempts at reforms were made, in many cases those reforms were not deep-rooted, but
involved formalizing the division of spoils, for instance, to allocate control of certain jobs
between different political parties. Belgium’s linguistic differences — between Flanders, the
Dutch-speaking north, and Wallonia, the French-speaking south, with a small German-
speaking enclave in the southeast — added extra layers of complexity to public service,
particularly in and around Brussels, which was eventually designated as a bilingual region.
Parallel structures were created to cater for the different language groups.
...
Those linguistic tensions were exacerbated by an inversion in the distribution of Belgium’s
economic strength. Belgium was the second European country (after Britain) to undergo a
classic 19th century industrial revolution, founded on its coal, steel and railway industries and
helped by the mineral riches of the Congo. But a post-war economic downturn for the coal
and steel industries hit Wallonia hard.
It was those heavy industries that spurred the first waves of economic migration to Belgium.
Belgium companies went to the Mediterranean basin — North Africa as well as Italy — to
entice migrants to the coal mines and steelworks. The large Muslim population, including that
in Molenbeek, has its origins in migration from Algeria, Morocco and Tunisia.
However, the de-industrialization left areas of poverty and urban blight in what had been the
country’s economic engine — the coal belt from Mons to Liège via Charleroi...
...In a country where all politics is local, politicians are reluctant to give up their patronage by
merging resources. For instance, Brussels has 19 communes, or boroughs, which range in
population from 20,000 to 150,000. Each commune had its own police force. Although they
have been now consolidated into six, that is still a logistical nonsense in a city of only 1.4
million. It still means that the commune police are perceived as a local provider of jobs for the
low-skilled. Occasional brushes with such police do not inspire confidence. ... What is also
apparently missing is a commitment to enforce.
Newcomers to Brussels are often struck by how widely the traffic rules are flouted. This
culture of disregard for the law is much more pronounced than in neighboring France, the
Netherlands and Germany. In a society where some people consider themselves to have
political protection (formal or informal) from the law, disrespect for that law spreads.
This is not to deny that there have been some improvements. Belgian passports have long
been prized by criminals because they give easy access not just to the Schengen zone, but to
the many countries with which Belgium had visa-waiver agreements. In 1998, Belgium
belatedly decided to centralize the production of passports, which had previously been a
responsibility for each of the then 520 town halls. Before that, those wishing to forge
passports needed only to break into some local town hall to steal blank passports.
There have been attempts too at judicial reform. Although these have probably made the
judiciary more independent, it is hard to see a significant improvement in the pace of legal
process. ... There have also been improvements in the collection and administration of taxes,
with the finance ministry making a massive investment for tax returns to be filed online. But
that masks deeper structural problems with Belgium’s taxation. The taxes (including social
security) on labor have been so high that they encouraged evasion and the development of a
sizeable black economy. This black economy is in some ways attractive to those excluded
from the formal economy — newly arrived illegal immigrants, for example — but they
remain on the margins and are not integrated.
By contrast, the Belgian fiscal set-up taxes lightly those who already have wealth (hence the
enclaves in wealthy parts of Brussels of fiscal migrants from Paris), so that the gap between
rich and poor is accentuated. Belgium is, per capita, a wealthy country, but has contrived to
achieve a situation in which the employed population feels heavily taxed and doubts the
quality of public services that it receives in return. Having too narrow a tax base, the Belgian
state is poorly equipped to address the few pockets of desperate poverty, such as Molenbeek.
...
Even if it had the means, the federal state would struggle to find the instruments to distribute
and spend the money effectively. Transfers of money across the regions and linguistic
boundaries are hard to achieve. The contrast between the dirty and pot-holed streets of
Brussels on the one hand and the cleanliness and order of most small Flemish towns is stark.
While Brussels provides the services and infrastructure for thousands of people who work in
Brussels but commute from Flanders, it must do so with taxes levied in Brussels. And while
the city has become the de facto capital of Europe, home of the EU institutions, NATO, and
various other international organizations, Brussels airport is across the regional border in
Flanders. So while Interior Minister Jan Jambon has vowed to clean up Molenbeek, the state
structures are aligned against him. He needs the cooperation of the Brussels region and of the
French-speaking community to address, for instance, employment agencies and schools. But
Jambon is from the Flemish nationalist party N-VA, which has hardly any political capital in
Brussels. Brussels is the capital of Flanders, but its population is by and large majority
French-speaking. So Jambon’s declaration is viewed with suspicion and in some cases
hostility by the Francophone establishment in Brussels....
In virtually every other European country, the fight against terrorism involves greater
centralization of power, people and money. Combating terrorism, particularly in the Internet
age, involves specialist teams of individuals, whether military, police, secret service, or
civilian. It involves specialist equipment, particularly for surveillance and intelligence-
gathering, and it involves sharing information across national borders. Actually, that trend to
greater centralization and specialization is not peculiar to the fight against terrorism. It is also
frequently found, for instance, in healthcare, education and research.
But Belgium, in thrall to its linguistic politics, is moving in the opposite direction. Almost
every general election and subsequent negotiation of a coalition federal government brings
another round of devolving powers to its regions, ranging now to the most banal of subjects
— such as, to cite a recent example, the recognition of foreigners’ professional qualifications.
...This failure to connect is a feature of the Belgian state. The machinery that elsewhere would
link local, regional and national is not joined up. To a large extent, the political class has
come to terms with these dysfunctionalities, accepting them as a price that has to be paid for
various linguistic and factional divisions.
For outsiders, it should be admitted, this is part of what makes Belgium an easy place in
which to live. The state, by and large, is unassertive. People can get by, perhaps relying on
informal support structures. For the most part, they do not need the law.
But as events last Friday night in Paris showed, the rest of Europe must pay a price for
Belgium’s failures.
Bibliography
Absher, Kenneth; Desch, ; and Popadiuk, Roman: (2012) Privileged and Confidential: The
Secret History of the President’s Intelligence Advisory Board, Lexington: University of
Kentucky Press
Baleanu, V. G. The Enemy Within: The Romanian Intelligence Service in Transition, Camberley,
UK: Royal Military College Sandhurst, Conflict Studies Research Centre, January 1995;
Baleanu, V. G., A Clear and Present Danger to Democracy: The New Romanian Security
Services Are Still Watching, Camberely, UK: Royal Military College Sandhurst, Conflict Studies
Research Centre, 1996;
Brenner, Michael (2014) Intelligence Failure in Iraq accessible at
http://www.huffingtonpost.com/michael-brenner/intelligence-failure-in-i_b_5544340.html
Brennan ,John (2015 ) On Paris Attacks accessible at www.http;//time.com/4114870/paris-
attacks-cia-john-brennan
Davenport, E., & Hall, H. (2002).Organizational knowledge and communities of
practice,.Annual Review of Information Science and Technology, 36 (171-222.)
Faint, Charles and Harris, Michael F3EAD: Ops/Intel Fusion “Feeds” The SOF Targeting
Process in Small Wars Journal, 2012, Small Wars Foundation at
http://smallwarsjournal.com
Flynn, Michael T.; Juergens, Rich; Cantrell, Thomas L. Employing ISR: SOF Best Practices, Joint
Force Quarterly;Summer2008, Issue 50
Forsyth, Frederick, (2007) The Afghan, Corgi Books, London
King, Tim (2015) Belgium is a Failed State in Brussels Sketch accessible at www. politico.eu/
Lowenthal, M.,Mark (2012), Intelligence: From Secrets to Policy, 5th edition, Sage Publications
Inc. London
McIntyre, Russell, Criteria for a Successful Theater Exploitation Effort, 19 September
2009
Peritz, Aki J., Rosenbach, Eric , (2009) Confrontation or Collaboration? Congress and the
Intelligence Community, a publication of The Intelligence and Policy Project of Harvard
Kennedy School's Belfer Center for Science and International Affairs.
Rolington , Alfred, (2013), Strategic Intelligence for the 21st Century, Oxford: Oxford
University Press
Schaefer, David (2014) The Information Revolution and Foreign Intelligence Assessment
accessible at http://apo.org.au/research/information-revolution-and-foreign-intelligence-
assessment
Spencer, Thomas R. and Rustmann, Jr. ,F.W. The History of the State Secrets
Privilege in Journal of U.S. Intelligence Studies, 2011
Watts, Larry, L (2007) Intelligence Reform in Europe's Emerging Democracies
Conflicting Paradigms, Dissimilar Contexts accessible at
https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications