SlideShare a Scribd company logo
1 of 8
Download to read offline
Running head: INFORMATION BEHAVIORS IN THE INTELLIGENCE COMMUNITY 1
Information Behaviors in the Intelligence Community
Laura Levy
Kent State University
INFORMATION BEHAVIORS IN THE INTELLIGENCE COMMUNITY 2
Information behaviors are unique to an individual and the information that the user is seeking.
One of the issues impacting information behaviors in today’s digital environment is that there is too much
information from too many sources. This overabundance of information causes information overload,
which can result in lower quality of work produced or a lack of focus by the information user. Too much
information can be overwhelming to anyone, but in certain situations information overload can have more
serious repercussions.
The Intelligence Community (IC) is one such group of information users that routinely
experiences information overload. Too much information can compromise the efficiency of the
information user in identifying threats and producing reports in a timely and accurate manner.
Intelligence analysts need a solution to process the vast amounts of information that they are exposed to
each workday. Through a study of the literature related to the IC and the user information behaviors
found in the LIS field, a solution to handling information overload may be found in incorporating LIS
information behavior strategies into the Intelligence Cycle.
User Group Definition
The user group that this paper will focus on is the all-source intelligence analysts that work within
the United States intelligence community. According to the RAND Corporation (a nonprofit, nonpartisan
research organization), “the intelligence community comprises the many agencies and organizations
responsible for intelligence gathering, analysis, and other activities that affect foreign policy and national
security” (“Intelligence Community”, n.d.). Further, in the United States the IC can be subdivided on the
federal, state, and local level, all ideally sharing information amongst agencies.
The federal IC is comprised of 17 different agencies, divided into three separate groups that fall
under the supervision of the Office of the Director of National Intelligence (ODNI) and works in
cooperation with the Central Intelligence Agency. The armed forces IC is comprised of the Defense
Intelligence Agency, the National Geo-Spatial Intelligence Agency, the National Reconnaissance Office,
and the National Security Agency under the Services group. The various departments of the federal
government also have agencies concerned with Intelligence Analysis. These departments are the Drug
Enforcement Agency, the Department of Treasury, the Department of State, the Department of Energy,
the Department of Homeland Security, and the Federal Bureau of Investigation (Intelligence Community,
2015). These agencies all employ intelligence analysts in some capacity.
The federal IC works with the state and local governments through fusion centers located
throughout the United States. According to Gerardi (2013), “Congress has defined fusion centers as
collaborative effort of 2 or more Federal, State, local, or tribal government agencies that combines
resources, expertise, or information with the goal of maximizing the ability of such agencies to detect,
prevent, investigate, apprehend, and respond to criminal or terrorist activity” (Gerardi, p. 4). Fusions
centers emerged because of the attacks of 9/11 to prevent future acts of terrorism. The fusion centers are
intended to increase the federal intelligence capabilities related to domestic terrorism using local, state,
and tribal law enforcement (Gerardi, p. 1). Fusion centers are intended to compliment the Federal
agencies by providing additional intelligence information, but unfortunately the intent doesn’t match the
results.
INFORMATION BEHAVIORS IN THE INTELLIGENCE COMMUNITY 3
Real-Life Context of Users
While fusion centers and the Federal IC have the best intentions of creating a cohesive
intelligence network, they are failing due to information overload and lack of cohesion between the levels
of government and agencies. Inconsistent training also slows the process of analyzing important
intelligence information in the time that it is usually needed. While fusion centers are relatively new to
the intelligence field, the other agencies have existed for decades, which also leads to a disconnect
between governmental levels.
Information overload is one of the reasons why intelligence analysis is difficult to complete
effectively, and it occurs at all levels of the government. On the local and state level too much data
overloads the analysts, and coupled with other issues such as inadequate training, the ability to analyze
and act on information is significantly affected (Brueggemann, p. V). Information comes from a variety
of sources today, including social media, websites and traditional clandestine operations. The issue of
information overload negatively impacting the IC is not just located at the state and local level, it can be
found at the federal level as well. For example, the FBI frequently collects too much information and
can’t effectively decide what information is important in a timely manner (Brueggemann, p.6).
A 2012 Congressional investigation revealed findings that fusions centers provided subpar
intelligence, which wasn’t produced in a timely manner, and it was suggested that the work the fusion
centers performed was redundant. Most of the fusion centers lacked the proper training to provide
adequate intelligence, and those that did were unable to clearly communicate and share that information
to the federal agencies (Devine, p.6).
Theories, Models, and Approaches
All the problems mentioned in this report can be traced back to the way that the IC analysts
interact with information and their resulting behaviors. The information overload that is experienced can
be very stressful and lead to errors. The lack of accessibility to other IC agencies intelligence reports can
lead to analyst frustration and incomplete analysis. Information behavior theories found in the LIS field
of study could help improve the current situation that analysts find themselves in daily.
Intelligence analysts are often faced with overwhelming amounts of information and that causes
several negative outcomes in relation to the analyst and the analysis of a threat. Young (2013) explains
that the Intelligence Community is getting overrun with information and causes the analyst to lose sight
of what is important, which may result in important information being ignored (Young, p. 24).
“Psychologist Lucy Jo Palladino writes that information overload leads to added stress, indecisiveness,
and less effective analysis of decisions” (Young, p. 24). Case’s Principle of Least Effort (PLE) Theory
explains how the information overload that is present during analysis causes a reduction in accuracy of
analysis. PLE says that an information seeker, like an analyst, will minimize the effort required to obtain
information, even if the result is of lower quality or quantity (Case, p. 291). During Wolfberg’s research
study, he found that analysts that experienced information overload and confusion about the information
being studied would be engaging in survival learning. The analysts would then reduce their analysis of
material and rely on their prior knowledge, this being the analysts least effort available to use in
producing an intelligence product (Wolfberg, p. 12). In research of intelligence processes, it seems that
analysts tend to engage in descriptive analysis of information that is collected, more of the here and now
instead of the future predictions. Davitch attributes this to Daniel Kahneman’s “substitution heuristic” in
which a person will simplify a difficult task by evaluating an easier, related one (Davitch, p. 19). This is
very similar to how Case related the pleasure principle to PLE in information seeking, an analyst will
INFORMATION BEHAVIORS IN THE INTELLIGENCE COMMUNITY 4
change the question to get to an answer more quickly, and therefore receiving pleasure at a completed
product (Case, p. 290).
PLE Theory also explains that humans will return to the same source that they have used in the
past, preferably over trying out new sources of information (Case, p. 289). Brueggemann confirms this in
the Illinois State Police Fusion center, explaining that, “Due to time constraints and the number of Daily
Reports, analysts often focus on just one or two from a source (such as Chicago JTTF, Virginia State
Police, Massachusetts State Police, etc.) that is familiar to them based on a prior experience or success
with it (Brueggemann, p.10). Returning to the same sources is something that happens in excess at the
federal level as well. The rise of social media has opened a new opportunity for intelligence professionals
to access large amounts of data, but the intelligence community resists this new information in favor of
the old, classified sources (Davitch, p.18). The unwillingness to look to OPINT sources is a detriment to
the current global threats that face our nation daily.
In looking at the ways that the analysts cycle through the Intelligence Cycle, certain behaviors
seem to remain consistent across the Intelligence Community. One such behavior is the information
literacy that the analysts possess. The LIS community, specifically reference librarians, spends a large
amount of time facilitating the user and information encounter. The IC doesn’t have this same benefit and
there are consequences due to that. Where the reference librarians excel at educating users of ways to
interact with information, the intelligence community is somewhat lacking. “There are few written
guidelines instructing fusion centers as to what is important information and should be forwarded to the
state fusion center; those decisions are left to individual analysts and supervising officers” (Taylor &
Russell, p. 188). Diving deeper, “in fact, the Congressional Research Service reported that the
intelligence cycle has not been fully adopted by state and local agencies. Instead, agencies struggle with
understanding, developing, and implementing a true representation of the fusion process” (Taylor &
Russell, p. 197). What this means is that the intelligence community lacks a clear method for
streamlining their processes of interacting with information, and users are left to figure out their way
amongst several options.
There is an obvious need for more studies and research into applying LIS information behavior
theories to the IC and how the analysts interpret and interact with information of many kinds. Some of
the methods of dealing with information and how to organize it within databases could help make
significant progress in combating the information overload problem that is prevalent in all IC agencies.
Research Methods and Techniques
The Intelligence Community is very difficult to thoroughly study because of the classified nature
of the information that it collects and analyzes. Most of the research used in this report consisted of
surveys and literature reviews. Those researchers that were able to use analysts often had very small
study groups. One research team designed a user study with 3 analysts with varied experience levels.
That research team had analysts’ complete tasks related to analysis and the team collected data through
the analysts written notes, behavior observations, questionnaires and interviews (Gotz, Zhou, & Wen,
2006). Another research team, met with the obstacle of finding analysts, used students attending
Mercyhurst College. “In order to investigate the intelligence analysis process in-depth, we conducted an
observational study of teams of analysts conducting an in-class intelligence project. During the project
period, we conducted two face-to-face meetings with each team – one in week 7 and the other in week 10.
In the meetings, we interviewed each team as a group and the class instructor… (Kang & Stasko, 2014).
INFORMATION BEHAVIORS IN THE INTELLIGENCE COMMUNITY 5
Brueggemann (2008) worked with the population and helped to create the very artifact that he wished to
survey and decided to use two research assistants to eliminate bias in the results (Brueggemann, p. 48).
The population of Brueggemann’s survey consisted of 34 criminal intelligence analysts employed by the
Illinois State Police, Illinois National Guard, Federal Bureau of Investigation, Drug Enforcement
Administration, and the Department of Homeland Security (Brueggemann, p. 48). The research assistants
asked the respondents to complete a written survey of 30 closed statements and then seal the results in an
envelope and place the envelope into a box, and the surveys would be collected once all 34 participants
had time to complete the survey (Brueggemann, p. 51).
The Department of Homeland Security also created their own survey of fusion center capabilities,
utilizing a standardized assessment with and scoring methodology. The test was an Online Self-
Assessment Tool that asked multiple choice questions to determine the effectiveness of the fusion centers
according to the employees themselves. Once the survey closed, the DHS employees scoured the results
and compared them with information previously reported and did follow-up phone interviews with fusion
center directors if there were issues with the result matching up (Lincoln & Seegmiller, p. 197).
While this is just a sample of the various ways that the IC was studied, it is obvious that there are
several barriers to completing a thorough survey or research project due to the differences between the
agencies, as well as the classified nature of the material.
Information Sources and Services
The IC uses a variety of sources to obtain information about a subject or target. This type of
intelligence is referred to as all-source intelligence.
One way that all-source intel is shared is through the SIPRNet, which is a classified network that
analysts with secret clearance have access too. The Whitelist is a program on the SIPRNet that contains
classified information, and reports and classified information can be sought about a variety of targets and
subjects (Lincoln & Seegmiller, p. 112). When dealing with international collaboration, the Department
of Defense uses The Department of Defense Intelligence Network (DODIN) in order to make all data
collected available to the intended recipients. This system is secure and allow for many authorized people
to access the classified information in order to perform analyses and make decisions (DOD, p. V-10).
The fusion centers use the Homeland Secure Data Network (HSDN) to connect with federal resources, as
well as the Federal Bureau of Investigation Network (FBINet). The availability of this information is
contained within networks that only certain analysts will have access to based on their clearance levels.
The lack of access for other analysts is one of the issues with reports being doubled, and therefore wasting
valuable analyzing time. High turnover of staff means more access requests and less available analysts to
complete the work needed (Lincoln & Seegmiller, p. 112).
The intelligence cycle is the method that analysts use to gather, analyze, and disseminate
information related to national security issues. According to the Joint Chiefs of Staff, the intelligence
cycle is comprised of planning and direction, collection (which is where the LIS theories overlap),
processing and exploitation, analysis and production, dissemination and integration, and evaluation and
feedback; and these parts will not always be needed in entirety (DOD, p. I-5). Pirolli and Card’s
Sensemaking model for intelligence analysis further accounts for the nature of a nonlinear process during
the intelligence collection process (Kang & Stasko, p. 135). Dervin’s Sense – Making model for user-
centered information gathering is somewhat similar, in that the “situation-gap-use” needs of the user
parallel the needs of the analyst in IC positions (Morris, p. 22). The information needs of different users
may differ regarding context, but the processes and need to fill information gaps remains the same for
both communities.
INFORMATION BEHAVIORS IN THE INTELLIGENCE COMMUNITY 6
Related Issues and Considerations
While the focus of this report is the intelligence community tasked with the protection of our
nation’s national security, there are other intelligence fields that could benefit from some LIS strategies.
The business community also uses competitive intelligence to create economic advantages in their niche.
The amount of information there must certainly be as abundant as the amounts found in the IC in this
report. The business intelligence field is a lonely one as well, as most companies don’t want to
collaborate to share intelligence, and the IC is one that needs to work together to succeed to its full
potential.
Some things to consider about the correlation between LIS and the IC is that the government is
very secretive about its information, while the goal of the LIS field is to connect the information to the
user and the user can be anyone who seeks it.
Applications and Implications within the Information Ecology
The reference librarian is someone that possesses many skills related to information seeking. The
IC should look to the LIS community to learn from their experiences with information management and
incorporating user-centered methods into practice. The problem in the IC isn’t a secret. There is too
much information being provided to analysts, without a cohesive and uniform method of organization and
retrieval of intelligence gathered from multiple sources. The disconnect and disorganization creates an
overload of information that prevents analysts from spending more time on the analysis portion of the
intelligence cycle. Several skills of LIS professionals applied to the IC practice would enable more
efficient management and interaction with information in the information ecology. The two disciplines
would benefit from shared knowledge and skills. Showers (2012), describes the process of making data
available for reuse, open and reusable vocabularies and join data together to increase context (Showers, p.
152). The IC has shown struggles with a data-driven infrastructure in the lack of cohesion across the
various local, state, and federal levels. The systems that the FBI use don’t work with the CIA, and the
Treasury Department can’t access any of those materials in some instances. “The lack of an effective
central authority makes those in other agencies reluctant to work with one another” (Taylor & Russell, p.
195). This lack of cohesion is something that deeply affects the timeliness of analysis.
There is also a need for the IC to look at their structure and cooperation between agencies. If all
the agencies have the goal of protecting the United States from enemies that wish us harm, then there
should be more cooperation between them. There have been improvements within the fusion center and
federal entities, but they could be performing much better than they are currently.
Recommendations
The fusion centers and federal agencies need to work together to ensure that the maximum
amount of analysis is being done, which will positively impact the safety of the citizens of the United
States. One way to do this is to ensure a standard training protocol for training and analysis methods, as
well as a way of storing and tagging the analyses. Lincoln and Seegmiller (2013) recommend that
“federal partners should expand support to fusion centers through guidebooks, technical assistance,
mentoring, and subject matter expertise to help fusion centers define and manage SINs (Standing
Information Needs), and to more effectively and efficiently tag their products (Lincoln & Seegmiller, p.
99). By tagging their products, the fusion centers will help to reduce redundant reports that may not have
INFORMATION BEHAVIORS IN THE INTELLIGENCE COMMUNITY 7
been found during a search because it was mis-tagged. Federal agencies should also allow access to their
training materials, workshops, and increase their interagency reviews (Lincoln & Seegmiller, p.99).
Another method of improving the information behaviors of the IC is to reframe the education that
is occurring in relation to analysis. Instead of analysts continuing to attend trainings and briefings to learn
to use systems or discuss previously known information, the analysts should be taught how to seek
information, to grow information literacy as a skill for the analyst to rely on to scour through information.
Information literacy at its most basic definition is a person’s ability to acquire and process information to
understand (Frerichs & DiRienzo, p. 71).
Since there are multiple problems with the IC regarding information behaviors, there will most
likely be more than one solution that ends up bringing the IC together to combat the actors that intend to
act against the United States. At the very least, the IC needs to decide on a uniform method and system to
store information that can be accessed across the agency lines. It is a sense of cooperation that is needed,
not the divisive one that persists today.
References
Aguilar, P., Keating, K., Schadl, S., & Reenen, J. V. (2011). Reference as Outreach: Meeting Users
Where They Are. Journal of Library Administration, 51(4), 343-358.
doi:10.1080/01930826.2011.556958.
Brueggemann, C. E. (2008). Mitigating Information Overload: the impact of "context-based" approach to
the design of tools for intelligence analysis (Master's thesis, Naval Postgraduate School, 2008)
(pp. 1-113). Monterey: Calhoun.
Case, D. O. (2005). Principle of Least Effort. In Theories of Information Behavior (pp. 289-292).
American Society for Information Science and Technology.
Davitch, J. M. (2017). Open Sources for the Information Age. Joint Forces Quarterly, 87, 18-25.
Department of Defense. (2013, October 22). Joint Intelligence (JP 2-0). Washington DC: Gen. Martin
Dempsey. Retrieved from: http://www.dtic.mil/doctrine/new_pubs/jp2_0.pdf.
Devine, T. (2014). An Examination of the effectiveness of state and local fusion centers toward federal
counterterrorism efforts. (Capstone Project). Retrieved from
https://academics.utep.edu/Default.aspx?tabid=75250.
Gerardi, A. (2013) Fusion centers: Counterterrorism information sharing concerns and deficiencies.
Retrieved from https://ebookcentral.proquest.com/lib/kentstate/reader.action?docID=3025354
Gotz, D, Zhou, M.X., Wen, Z. (2006). A study of information gathering and result processing in
intelligence analysis.
Intelligence Community. (2015, August 1). Member Agencies. Retrieved October 26, 2017, from
https://www.intelligencecareers.gov/icmembers.html
Jin, T., & Bouthillier, F. (2014) The integration of intelligence analysis into LIS education. Journal of
Education for Library and Information Science. 53(2). 130 – 148). Retrieved from:
http://www.jstor.org/stable/23249104.Intelligence Community. (n.d.) Retrieved from
https://www.rand.org/topics/intelligence-community.html
INFORMATION BEHAVIORS IN THE INTELLIGENCE COMMUNITY 8
Kang, Y., & Stasko, J. (2014). Characterizing the intelligence analysis process through a longitudinal
field study: implications for visual analytics. Information Visualization, 13(2), 134- 157. doi:
10.1177/1473871612468877.
Lincoln, N.C. & Seegmiller, J.B. (2013) National network of fusion centers: Effectiveness, capabilities,
and performance. Retrieved from:
https://ebookcentral.proquest.com/lib/kentstate/reader.action?docID=2194004
Morris, R. (1994). Toward a user centered information service. Journal of the American Society for
Information Science (45), 20-30.
Showers, B. (2012) Data-driven library infrastructure: Towards a new information ecology. Insights: the
UKSG Journal.
Wolfberg, A. (2017). Dark Side of Clarity. Salus Journal, 5(1), 1-26. Retrieved November 10, 2017.
Young, A. (2013, August 20). Too Much Information: Ineffective Intelligence Collection. Harvard
International Review, 24-27.

More Related Content

What's hot

disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...Sara-Jayne Terp
 
Helping Crisis Responders Find the Informative Needle in the Tweet Haystack
Helping Crisis Responders Find the Informative Needle in the Tweet HaystackHelping Crisis Responders Find the Informative Needle in the Tweet Haystack
Helping Crisis Responders Find the Informative Needle in the Tweet HaystackCOMRADES project
 
Big data analytics: from threatening privacy to challenging democracy
Big data analytics: from threatening privacy to challenging democracyBig data analytics: from threatening privacy to challenging democracy
Big data analytics: from threatening privacy to challenging democracySamos2019Summit
 
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors ThesisData-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors ThesisAlfredo Hickman
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Turner Sparks
 
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...ALexandruDaia1
 
IRJET - Political Orientation Prediction using Social Media Activity
IRJET -  	  Political Orientation Prediction using Social Media ActivityIRJET -  	  Political Orientation Prediction using Social Media Activity
IRJET - Political Orientation Prediction using Social Media ActivityIRJET Journal
 
Using Financial Transaction Data To Measure Economic Resilience To Natural Di...
Using Financial Transaction Data To Measure Economic Resilience To Natural Di...Using Financial Transaction Data To Measure Economic Resilience To Natural Di...
Using Financial Transaction Data To Measure Economic Resilience To Natural Di...UN Global Pulse
 
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai1crore projects
 
PommierCatherine_HM598Unit6_Capstonefinal
PommierCatherine_HM598Unit6_CapstonefinalPommierCatherine_HM598Unit6_Capstonefinal
PommierCatherine_HM598Unit6_CapstonefinalCatherine Pommier
 
An Overview on the Use of Data Mining and Linguistics Techniques for Building...
An Overview on the Use of Data Mining and Linguistics Techniques for Building...An Overview on the Use of Data Mining and Linguistics Techniques for Building...
An Overview on the Use of Data Mining and Linguistics Techniques for Building...ijcsit
 
Public Health Crisis Analytics for Gender Violence
Public Health Crisis Analytics for Gender ViolencePublic Health Crisis Analytics for Gender Violence
Public Health Crisis Analytics for Gender ViolenceHemant Purohit
 
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Mark Raduenzel
 

What's hot (17)

disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...
 
Helping Crisis Responders Find the Informative Needle in the Tweet Haystack
Helping Crisis Responders Find the Informative Needle in the Tweet HaystackHelping Crisis Responders Find the Informative Needle in the Tweet Haystack
Helping Crisis Responders Find the Informative Needle in the Tweet Haystack
 
Big data analytics: from threatening privacy to challenging democracy
Big data analytics: from threatening privacy to challenging democracyBig data analytics: from threatening privacy to challenging democracy
Big data analytics: from threatening privacy to challenging democracy
 
[IJCT-V3I2P30] Authors: Sunny Sharma
[IJCT-V3I2P30] Authors: Sunny Sharma[IJCT-V3I2P30] Authors: Sunny Sharma
[IJCT-V3I2P30] Authors: Sunny Sharma
 
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors ThesisData-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
 
Framework to Analyze Coordination in Crisis Response Using Social Media
 Framework to Analyze Coordination in Crisis Response Using Social Media Framework to Analyze Coordination in Crisis Response Using Social Media
Framework to Analyze Coordination in Crisis Response Using Social Media
 
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...
 
Order 325914012
Order 325914012Order 325914012
Order 325914012
 
IRJET - Political Orientation Prediction using Social Media Activity
IRJET -  	  Political Orientation Prediction using Social Media ActivityIRJET -  	  Political Orientation Prediction using Social Media Activity
IRJET - Political Orientation Prediction using Social Media Activity
 
Using Financial Transaction Data To Measure Economic Resilience To Natural Di...
Using Financial Transaction Data To Measure Economic Resilience To Natural Di...Using Financial Transaction Data To Measure Economic Resilience To Natural Di...
Using Financial Transaction Data To Measure Economic Resilience To Natural Di...
 
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai
1 Crore Projects | ieee 2016 Projects | 2016 ieee Projects in chennai
 
PommierCatherine_HM598Unit6_Capstonefinal
PommierCatherine_HM598Unit6_CapstonefinalPommierCatherine_HM598Unit6_Capstonefinal
PommierCatherine_HM598Unit6_Capstonefinal
 
An Overview on the Use of Data Mining and Linguistics Techniques for Building...
An Overview on the Use of Data Mining and Linguistics Techniques for Building...An Overview on the Use of Data Mining and Linguistics Techniques for Building...
An Overview on the Use of Data Mining and Linguistics Techniques for Building...
 
Public Health Crisis Analytics for Gender Violence
Public Health Crisis Analytics for Gender ViolencePublic Health Crisis Analytics for Gender Violence
Public Health Crisis Analytics for Gender Violence
 
Just Google it! [slides]
Just Google it! [slides]Just Google it! [slides]
Just Google it! [slides]
 
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
 

Similar to LIS 60030 Final Project

Example Of Predictive Policing
Example Of Predictive PolicingExample Of Predictive Policing
Example Of Predictive PolicingSherry Bailey
 
The Intelligence Community
The Intelligence CommunityThe Intelligence Community
The Intelligence CommunityNicolae Sfetcu
 
Gabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docxGabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docxhanneloremccaffery
 
Script for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationScript for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationBruce Forrester
 
What does “BIG DATA” mean for official statistics?
What does “BIG DATA” mean for official statistics?What does “BIG DATA” mean for official statistics?
What does “BIG DATA” mean for official statistics?Vincenzo Patruno
 
The Importance Of Intelligence-Led Policing
The Importance Of Intelligence-Led PolicingThe Importance Of Intelligence-Led Policing
The Importance Of Intelligence-Led PolicingMelissa Dudas
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPMicah Altman
 
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
150 words agree or disagreeFuture Criminal Intelligence Enviro.docxdrennanmicah
 
Running head surveillance state research1 page 2running
Running head surveillance state research1 page  2runningRunning head surveillance state research1 page  2running
Running head surveillance state research1 page 2runningSHIVA101531
 
Big Data Analysis and Terrorism
Big Data Analysis and TerrorismBig Data Analysis and Terrorism
Big Data Analysis and TerrorismAmanda Tapp
 
Healthy relationships | Combating cyber bullying (Doc)
Healthy relationships | Combating cyber bullying (Doc)Healthy relationships | Combating cyber bullying (Doc)
Healthy relationships | Combating cyber bullying (Doc)Adele Ramos
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docxsyreetamacaulay
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docxaudeleypearl
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docxkellet1
 
Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...
Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...
Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...inventionjournals
 
Case Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docxCase Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docxketurahhazelhurst
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesNora A. Rahim
 
Information Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxInformation Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxannettsparrow
 

Similar to LIS 60030 Final Project (20)

Intelligence Analysis
Intelligence AnalysisIntelligence Analysis
Intelligence Analysis
 
Example Of Predictive Policing
Example Of Predictive PolicingExample Of Predictive Policing
Example Of Predictive Policing
 
The Intelligence Community
The Intelligence CommunityThe Intelligence Community
The Intelligence Community
 
Gabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docxGabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docx
 
Script for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationScript for ICCRTS 2011 Presentation
Script for ICCRTS 2011 Presentation
 
What does “BIG DATA” mean for official statistics?
What does “BIG DATA” mean for official statistics?What does “BIG DATA” mean for official statistics?
What does “BIG DATA” mean for official statistics?
 
The Importance Of Intelligence-Led Policing
The Importance Of Intelligence-Led PolicingThe Importance Of Intelligence-Led Policing
The Importance Of Intelligence-Led Policing
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
 
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
150 words agree or disagreeFuture Criminal Intelligence Enviro.docx
 
Running head surveillance state research1 page 2running
Running head surveillance state research1 page  2runningRunning head surveillance state research1 page  2running
Running head surveillance state research1 page 2running
 
Big Data Analysis and Terrorism
Big Data Analysis and TerrorismBig Data Analysis and Terrorism
Big Data Analysis and Terrorism
 
Sais.34.1
Sais.34.1Sais.34.1
Sais.34.1
 
Healthy relationships | Combating cyber bullying (Doc)
Healthy relationships | Combating cyber bullying (Doc)Healthy relationships | Combating cyber bullying (Doc)
Healthy relationships | Combating cyber bullying (Doc)
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docx
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docx
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docx
 
Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...
Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...
Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...
 
Case Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docxCase Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docx
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
Information Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxInformation Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docx
 

More from Laura Levy

Preservation Assessment
Preservation AssessmentPreservation Assessment
Preservation AssessmentLaura Levy
 
Proposal for New Information Center
Proposal for New Information CenterProposal for New Information Center
Proposal for New Information CenterLaura Levy
 
Evaluating articles student page
Evaluating articles student pageEvaluating articles student page
Evaluating articles student pageLaura Levy
 
Fake News Lesson Plan
Fake News Lesson PlanFake News Lesson Plan
Fake News Lesson PlanLaura Levy
 
Fake News Teacher Resource
Fake News Teacher ResourceFake News Teacher Resource
Fake News Teacher ResourceLaura Levy
 
Internship Narrative
Internship NarrativeInternship Narrative
Internship NarrativeLaura Levy
 
Information-Seeking Behaviors of Parents of Children with ADHD: Experiences, ...
Information-Seeking Behaviors of Parents of Children with ADHD: Experiences, ...Information-Seeking Behaviors of Parents of Children with ADHD: Experiences, ...
Information-Seeking Behaviors of Parents of Children with ADHD: Experiences, ...Laura Levy
 
LIS 60020 Metadata Schema
LIS 60020 Metadata SchemaLIS 60020 Metadata Schema
LIS 60020 Metadata SchemaLaura Levy
 
Avoiding Plagiarism Tutorial
Avoiding Plagiarism TutorialAvoiding Plagiarism Tutorial
Avoiding Plagiarism TutorialLaura Levy
 
Medical Database Search Tips Flyer
Medical Database Search Tips FlyerMedical Database Search Tips Flyer
Medical Database Search Tips FlyerLaura Levy
 
PubMed Search Tutorial
PubMed Search TutorialPubMed Search Tutorial
PubMed Search TutorialLaura Levy
 

More from Laura Levy (12)

Preservation Assessment
Preservation AssessmentPreservation Assessment
Preservation Assessment
 
Proposal for New Information Center
Proposal for New Information CenterProposal for New Information Center
Proposal for New Information Center
 
Evaluating articles student page
Evaluating articles student pageEvaluating articles student page
Evaluating articles student page
 
Fake News Lesson Plan
Fake News Lesson PlanFake News Lesson Plan
Fake News Lesson Plan
 
Fake News Teacher Resource
Fake News Teacher ResourceFake News Teacher Resource
Fake News Teacher Resource
 
Internship Narrative
Internship NarrativeInternship Narrative
Internship Narrative
 
Information-Seeking Behaviors of Parents of Children with ADHD: Experiences, ...
Information-Seeking Behaviors of Parents of Children with ADHD: Experiences, ...Information-Seeking Behaviors of Parents of Children with ADHD: Experiences, ...
Information-Seeking Behaviors of Parents of Children with ADHD: Experiences, ...
 
LIS 60020 Metadata Schema
LIS 60020 Metadata SchemaLIS 60020 Metadata Schema
LIS 60020 Metadata Schema
 
Avoiding Plagiarism Tutorial
Avoiding Plagiarism TutorialAvoiding Plagiarism Tutorial
Avoiding Plagiarism Tutorial
 
Medical Database Search Tips Flyer
Medical Database Search Tips FlyerMedical Database Search Tips Flyer
Medical Database Search Tips Flyer
 
2019 Resume
2019 Resume2019 Resume
2019 Resume
 
PubMed Search Tutorial
PubMed Search TutorialPubMed Search Tutorial
PubMed Search Tutorial
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

LIS 60030 Final Project

  • 1. Running head: INFORMATION BEHAVIORS IN THE INTELLIGENCE COMMUNITY 1 Information Behaviors in the Intelligence Community Laura Levy Kent State University
  • 2. INFORMATION BEHAVIORS IN THE INTELLIGENCE COMMUNITY 2 Information behaviors are unique to an individual and the information that the user is seeking. One of the issues impacting information behaviors in today’s digital environment is that there is too much information from too many sources. This overabundance of information causes information overload, which can result in lower quality of work produced or a lack of focus by the information user. Too much information can be overwhelming to anyone, but in certain situations information overload can have more serious repercussions. The Intelligence Community (IC) is one such group of information users that routinely experiences information overload. Too much information can compromise the efficiency of the information user in identifying threats and producing reports in a timely and accurate manner. Intelligence analysts need a solution to process the vast amounts of information that they are exposed to each workday. Through a study of the literature related to the IC and the user information behaviors found in the LIS field, a solution to handling information overload may be found in incorporating LIS information behavior strategies into the Intelligence Cycle. User Group Definition The user group that this paper will focus on is the all-source intelligence analysts that work within the United States intelligence community. According to the RAND Corporation (a nonprofit, nonpartisan research organization), “the intelligence community comprises the many agencies and organizations responsible for intelligence gathering, analysis, and other activities that affect foreign policy and national security” (“Intelligence Community”, n.d.). Further, in the United States the IC can be subdivided on the federal, state, and local level, all ideally sharing information amongst agencies. The federal IC is comprised of 17 different agencies, divided into three separate groups that fall under the supervision of the Office of the Director of National Intelligence (ODNI) and works in cooperation with the Central Intelligence Agency. The armed forces IC is comprised of the Defense Intelligence Agency, the National Geo-Spatial Intelligence Agency, the National Reconnaissance Office, and the National Security Agency under the Services group. The various departments of the federal government also have agencies concerned with Intelligence Analysis. These departments are the Drug Enforcement Agency, the Department of Treasury, the Department of State, the Department of Energy, the Department of Homeland Security, and the Federal Bureau of Investigation (Intelligence Community, 2015). These agencies all employ intelligence analysts in some capacity. The federal IC works with the state and local governments through fusion centers located throughout the United States. According to Gerardi (2013), “Congress has defined fusion centers as collaborative effort of 2 or more Federal, State, local, or tribal government agencies that combines resources, expertise, or information with the goal of maximizing the ability of such agencies to detect, prevent, investigate, apprehend, and respond to criminal or terrorist activity” (Gerardi, p. 4). Fusions centers emerged because of the attacks of 9/11 to prevent future acts of terrorism. The fusion centers are intended to increase the federal intelligence capabilities related to domestic terrorism using local, state, and tribal law enforcement (Gerardi, p. 1). Fusion centers are intended to compliment the Federal agencies by providing additional intelligence information, but unfortunately the intent doesn’t match the results.
  • 3. INFORMATION BEHAVIORS IN THE INTELLIGENCE COMMUNITY 3 Real-Life Context of Users While fusion centers and the Federal IC have the best intentions of creating a cohesive intelligence network, they are failing due to information overload and lack of cohesion between the levels of government and agencies. Inconsistent training also slows the process of analyzing important intelligence information in the time that it is usually needed. While fusion centers are relatively new to the intelligence field, the other agencies have existed for decades, which also leads to a disconnect between governmental levels. Information overload is one of the reasons why intelligence analysis is difficult to complete effectively, and it occurs at all levels of the government. On the local and state level too much data overloads the analysts, and coupled with other issues such as inadequate training, the ability to analyze and act on information is significantly affected (Brueggemann, p. V). Information comes from a variety of sources today, including social media, websites and traditional clandestine operations. The issue of information overload negatively impacting the IC is not just located at the state and local level, it can be found at the federal level as well. For example, the FBI frequently collects too much information and can’t effectively decide what information is important in a timely manner (Brueggemann, p.6). A 2012 Congressional investigation revealed findings that fusions centers provided subpar intelligence, which wasn’t produced in a timely manner, and it was suggested that the work the fusion centers performed was redundant. Most of the fusion centers lacked the proper training to provide adequate intelligence, and those that did were unable to clearly communicate and share that information to the federal agencies (Devine, p.6). Theories, Models, and Approaches All the problems mentioned in this report can be traced back to the way that the IC analysts interact with information and their resulting behaviors. The information overload that is experienced can be very stressful and lead to errors. The lack of accessibility to other IC agencies intelligence reports can lead to analyst frustration and incomplete analysis. Information behavior theories found in the LIS field of study could help improve the current situation that analysts find themselves in daily. Intelligence analysts are often faced with overwhelming amounts of information and that causes several negative outcomes in relation to the analyst and the analysis of a threat. Young (2013) explains that the Intelligence Community is getting overrun with information and causes the analyst to lose sight of what is important, which may result in important information being ignored (Young, p. 24). “Psychologist Lucy Jo Palladino writes that information overload leads to added stress, indecisiveness, and less effective analysis of decisions” (Young, p. 24). Case’s Principle of Least Effort (PLE) Theory explains how the information overload that is present during analysis causes a reduction in accuracy of analysis. PLE says that an information seeker, like an analyst, will minimize the effort required to obtain information, even if the result is of lower quality or quantity (Case, p. 291). During Wolfberg’s research study, he found that analysts that experienced information overload and confusion about the information being studied would be engaging in survival learning. The analysts would then reduce their analysis of material and rely on their prior knowledge, this being the analysts least effort available to use in producing an intelligence product (Wolfberg, p. 12). In research of intelligence processes, it seems that analysts tend to engage in descriptive analysis of information that is collected, more of the here and now instead of the future predictions. Davitch attributes this to Daniel Kahneman’s “substitution heuristic” in which a person will simplify a difficult task by evaluating an easier, related one (Davitch, p. 19). This is very similar to how Case related the pleasure principle to PLE in information seeking, an analyst will
  • 4. INFORMATION BEHAVIORS IN THE INTELLIGENCE COMMUNITY 4 change the question to get to an answer more quickly, and therefore receiving pleasure at a completed product (Case, p. 290). PLE Theory also explains that humans will return to the same source that they have used in the past, preferably over trying out new sources of information (Case, p. 289). Brueggemann confirms this in the Illinois State Police Fusion center, explaining that, “Due to time constraints and the number of Daily Reports, analysts often focus on just one or two from a source (such as Chicago JTTF, Virginia State Police, Massachusetts State Police, etc.) that is familiar to them based on a prior experience or success with it (Brueggemann, p.10). Returning to the same sources is something that happens in excess at the federal level as well. The rise of social media has opened a new opportunity for intelligence professionals to access large amounts of data, but the intelligence community resists this new information in favor of the old, classified sources (Davitch, p.18). The unwillingness to look to OPINT sources is a detriment to the current global threats that face our nation daily. In looking at the ways that the analysts cycle through the Intelligence Cycle, certain behaviors seem to remain consistent across the Intelligence Community. One such behavior is the information literacy that the analysts possess. The LIS community, specifically reference librarians, spends a large amount of time facilitating the user and information encounter. The IC doesn’t have this same benefit and there are consequences due to that. Where the reference librarians excel at educating users of ways to interact with information, the intelligence community is somewhat lacking. “There are few written guidelines instructing fusion centers as to what is important information and should be forwarded to the state fusion center; those decisions are left to individual analysts and supervising officers” (Taylor & Russell, p. 188). Diving deeper, “in fact, the Congressional Research Service reported that the intelligence cycle has not been fully adopted by state and local agencies. Instead, agencies struggle with understanding, developing, and implementing a true representation of the fusion process” (Taylor & Russell, p. 197). What this means is that the intelligence community lacks a clear method for streamlining their processes of interacting with information, and users are left to figure out their way amongst several options. There is an obvious need for more studies and research into applying LIS information behavior theories to the IC and how the analysts interpret and interact with information of many kinds. Some of the methods of dealing with information and how to organize it within databases could help make significant progress in combating the information overload problem that is prevalent in all IC agencies. Research Methods and Techniques The Intelligence Community is very difficult to thoroughly study because of the classified nature of the information that it collects and analyzes. Most of the research used in this report consisted of surveys and literature reviews. Those researchers that were able to use analysts often had very small study groups. One research team designed a user study with 3 analysts with varied experience levels. That research team had analysts’ complete tasks related to analysis and the team collected data through the analysts written notes, behavior observations, questionnaires and interviews (Gotz, Zhou, & Wen, 2006). Another research team, met with the obstacle of finding analysts, used students attending Mercyhurst College. “In order to investigate the intelligence analysis process in-depth, we conducted an observational study of teams of analysts conducting an in-class intelligence project. During the project period, we conducted two face-to-face meetings with each team – one in week 7 and the other in week 10. In the meetings, we interviewed each team as a group and the class instructor… (Kang & Stasko, 2014).
  • 5. INFORMATION BEHAVIORS IN THE INTELLIGENCE COMMUNITY 5 Brueggemann (2008) worked with the population and helped to create the very artifact that he wished to survey and decided to use two research assistants to eliminate bias in the results (Brueggemann, p. 48). The population of Brueggemann’s survey consisted of 34 criminal intelligence analysts employed by the Illinois State Police, Illinois National Guard, Federal Bureau of Investigation, Drug Enforcement Administration, and the Department of Homeland Security (Brueggemann, p. 48). The research assistants asked the respondents to complete a written survey of 30 closed statements and then seal the results in an envelope and place the envelope into a box, and the surveys would be collected once all 34 participants had time to complete the survey (Brueggemann, p. 51). The Department of Homeland Security also created their own survey of fusion center capabilities, utilizing a standardized assessment with and scoring methodology. The test was an Online Self- Assessment Tool that asked multiple choice questions to determine the effectiveness of the fusion centers according to the employees themselves. Once the survey closed, the DHS employees scoured the results and compared them with information previously reported and did follow-up phone interviews with fusion center directors if there were issues with the result matching up (Lincoln & Seegmiller, p. 197). While this is just a sample of the various ways that the IC was studied, it is obvious that there are several barriers to completing a thorough survey or research project due to the differences between the agencies, as well as the classified nature of the material. Information Sources and Services The IC uses a variety of sources to obtain information about a subject or target. This type of intelligence is referred to as all-source intelligence. One way that all-source intel is shared is through the SIPRNet, which is a classified network that analysts with secret clearance have access too. The Whitelist is a program on the SIPRNet that contains classified information, and reports and classified information can be sought about a variety of targets and subjects (Lincoln & Seegmiller, p. 112). When dealing with international collaboration, the Department of Defense uses The Department of Defense Intelligence Network (DODIN) in order to make all data collected available to the intended recipients. This system is secure and allow for many authorized people to access the classified information in order to perform analyses and make decisions (DOD, p. V-10). The fusion centers use the Homeland Secure Data Network (HSDN) to connect with federal resources, as well as the Federal Bureau of Investigation Network (FBINet). The availability of this information is contained within networks that only certain analysts will have access to based on their clearance levels. The lack of access for other analysts is one of the issues with reports being doubled, and therefore wasting valuable analyzing time. High turnover of staff means more access requests and less available analysts to complete the work needed (Lincoln & Seegmiller, p. 112). The intelligence cycle is the method that analysts use to gather, analyze, and disseminate information related to national security issues. According to the Joint Chiefs of Staff, the intelligence cycle is comprised of planning and direction, collection (which is where the LIS theories overlap), processing and exploitation, analysis and production, dissemination and integration, and evaluation and feedback; and these parts will not always be needed in entirety (DOD, p. I-5). Pirolli and Card’s Sensemaking model for intelligence analysis further accounts for the nature of a nonlinear process during the intelligence collection process (Kang & Stasko, p. 135). Dervin’s Sense – Making model for user- centered information gathering is somewhat similar, in that the “situation-gap-use” needs of the user parallel the needs of the analyst in IC positions (Morris, p. 22). The information needs of different users may differ regarding context, but the processes and need to fill information gaps remains the same for both communities.
  • 6. INFORMATION BEHAVIORS IN THE INTELLIGENCE COMMUNITY 6 Related Issues and Considerations While the focus of this report is the intelligence community tasked with the protection of our nation’s national security, there are other intelligence fields that could benefit from some LIS strategies. The business community also uses competitive intelligence to create economic advantages in their niche. The amount of information there must certainly be as abundant as the amounts found in the IC in this report. The business intelligence field is a lonely one as well, as most companies don’t want to collaborate to share intelligence, and the IC is one that needs to work together to succeed to its full potential. Some things to consider about the correlation between LIS and the IC is that the government is very secretive about its information, while the goal of the LIS field is to connect the information to the user and the user can be anyone who seeks it. Applications and Implications within the Information Ecology The reference librarian is someone that possesses many skills related to information seeking. The IC should look to the LIS community to learn from their experiences with information management and incorporating user-centered methods into practice. The problem in the IC isn’t a secret. There is too much information being provided to analysts, without a cohesive and uniform method of organization and retrieval of intelligence gathered from multiple sources. The disconnect and disorganization creates an overload of information that prevents analysts from spending more time on the analysis portion of the intelligence cycle. Several skills of LIS professionals applied to the IC practice would enable more efficient management and interaction with information in the information ecology. The two disciplines would benefit from shared knowledge and skills. Showers (2012), describes the process of making data available for reuse, open and reusable vocabularies and join data together to increase context (Showers, p. 152). The IC has shown struggles with a data-driven infrastructure in the lack of cohesion across the various local, state, and federal levels. The systems that the FBI use don’t work with the CIA, and the Treasury Department can’t access any of those materials in some instances. “The lack of an effective central authority makes those in other agencies reluctant to work with one another” (Taylor & Russell, p. 195). This lack of cohesion is something that deeply affects the timeliness of analysis. There is also a need for the IC to look at their structure and cooperation between agencies. If all the agencies have the goal of protecting the United States from enemies that wish us harm, then there should be more cooperation between them. There have been improvements within the fusion center and federal entities, but they could be performing much better than they are currently. Recommendations The fusion centers and federal agencies need to work together to ensure that the maximum amount of analysis is being done, which will positively impact the safety of the citizens of the United States. One way to do this is to ensure a standard training protocol for training and analysis methods, as well as a way of storing and tagging the analyses. Lincoln and Seegmiller (2013) recommend that “federal partners should expand support to fusion centers through guidebooks, technical assistance, mentoring, and subject matter expertise to help fusion centers define and manage SINs (Standing Information Needs), and to more effectively and efficiently tag their products (Lincoln & Seegmiller, p. 99). By tagging their products, the fusion centers will help to reduce redundant reports that may not have
  • 7. INFORMATION BEHAVIORS IN THE INTELLIGENCE COMMUNITY 7 been found during a search because it was mis-tagged. Federal agencies should also allow access to their training materials, workshops, and increase their interagency reviews (Lincoln & Seegmiller, p.99). Another method of improving the information behaviors of the IC is to reframe the education that is occurring in relation to analysis. Instead of analysts continuing to attend trainings and briefings to learn to use systems or discuss previously known information, the analysts should be taught how to seek information, to grow information literacy as a skill for the analyst to rely on to scour through information. Information literacy at its most basic definition is a person’s ability to acquire and process information to understand (Frerichs & DiRienzo, p. 71). Since there are multiple problems with the IC regarding information behaviors, there will most likely be more than one solution that ends up bringing the IC together to combat the actors that intend to act against the United States. At the very least, the IC needs to decide on a uniform method and system to store information that can be accessed across the agency lines. It is a sense of cooperation that is needed, not the divisive one that persists today. References Aguilar, P., Keating, K., Schadl, S., & Reenen, J. V. (2011). Reference as Outreach: Meeting Users Where They Are. Journal of Library Administration, 51(4), 343-358. doi:10.1080/01930826.2011.556958. Brueggemann, C. E. (2008). Mitigating Information Overload: the impact of "context-based" approach to the design of tools for intelligence analysis (Master's thesis, Naval Postgraduate School, 2008) (pp. 1-113). Monterey: Calhoun. Case, D. O. (2005). Principle of Least Effort. In Theories of Information Behavior (pp. 289-292). American Society for Information Science and Technology. Davitch, J. M. (2017). Open Sources for the Information Age. Joint Forces Quarterly, 87, 18-25. Department of Defense. (2013, October 22). Joint Intelligence (JP 2-0). Washington DC: Gen. Martin Dempsey. Retrieved from: http://www.dtic.mil/doctrine/new_pubs/jp2_0.pdf. Devine, T. (2014). An Examination of the effectiveness of state and local fusion centers toward federal counterterrorism efforts. (Capstone Project). Retrieved from https://academics.utep.edu/Default.aspx?tabid=75250. Gerardi, A. (2013) Fusion centers: Counterterrorism information sharing concerns and deficiencies. Retrieved from https://ebookcentral.proquest.com/lib/kentstate/reader.action?docID=3025354 Gotz, D, Zhou, M.X., Wen, Z. (2006). A study of information gathering and result processing in intelligence analysis. Intelligence Community. (2015, August 1). Member Agencies. Retrieved October 26, 2017, from https://www.intelligencecareers.gov/icmembers.html Jin, T., & Bouthillier, F. (2014) The integration of intelligence analysis into LIS education. Journal of Education for Library and Information Science. 53(2). 130 – 148). Retrieved from: http://www.jstor.org/stable/23249104.Intelligence Community. (n.d.) Retrieved from https://www.rand.org/topics/intelligence-community.html
  • 8. INFORMATION BEHAVIORS IN THE INTELLIGENCE COMMUNITY 8 Kang, Y., & Stasko, J. (2014). Characterizing the intelligence analysis process through a longitudinal field study: implications for visual analytics. Information Visualization, 13(2), 134- 157. doi: 10.1177/1473871612468877. Lincoln, N.C. & Seegmiller, J.B. (2013) National network of fusion centers: Effectiveness, capabilities, and performance. Retrieved from: https://ebookcentral.proquest.com/lib/kentstate/reader.action?docID=2194004 Morris, R. (1994). Toward a user centered information service. Journal of the American Society for Information Science (45), 20-30. Showers, B. (2012) Data-driven library infrastructure: Towards a new information ecology. Insights: the UKSG Journal. Wolfberg, A. (2017). Dark Side of Clarity. Salus Journal, 5(1), 1-26. Retrieved November 10, 2017. Young, A. (2013, August 20). Too Much Information: Ineffective Intelligence Collection. Harvard International Review, 24-27.