SlideShare a Scribd company logo
1 of 26
® 
COLLECTION: 
Know Who Knows 
Robert David Steele 
Intelligence Coach 
bear@oss.net
® 
Elements of Collection 
Open Source 
Intelligence 
Clandestine 
Human 
Intelligence 
Signals 
Intelligence 
Imagery 
Intelligence 
Leadership 
• Mindset 
• Courage
® 
Open Source Intelligence I 
Lessons of History 
China, Islam, Ethnic, Etc. 
I 
Lessons of History 
Narrowly focused! 
• Neither the academics 
nor the government 
have done well here. 
• We need to fund both 
specialists in history, 
and a massive 
digitization project for 
Chinese, Islamic, other 
key histories.
® 
Open Source Intelligence II 
Global Burden Sharing 
II 
Global Coverage 
Cost-Sharing with Others-- 
Shared Early Warning 
Narrowly focused! 
• No one has the time, 
money, or ability to 
cover the world. 
• We must find new 
means of sharing the 
burden of collection, 
translation, digitization 
of global open sources in 
29+ languages. 
• The Internet is vital.
® 
Open Source Intelligence III 
Leveraging the Private Sector 
Narrowly focused! 
III 
National Intelligence 
Harness distributed 
intelligence of Nation 
• The national intelligence 
tribe must establish open 
protocols for linking and 
leveraging the other 
tribes: military, law 
enforcement, business, 
academic, NGO-media, 
and religious. 
• A national intelligence 
federation is needed.
® 
Clandestine Collection I 
Get Away from Official Cover 
• The best agents don’t 
go to cocktail parties 
or meet with official 
cover personalities. 
• It is not possible to 
manage truly secret 
operations from a 
fixed point known to 
local liaison.
® 
Clandestine Collection II 
Focus on Long-Term Secure Agents 
• The best case officers 
should be trained to 
spot, assess, recruit, 
and handle long-term 
secure agents that have 
access to truly unique 
information that 
cannot be gotten via 
open source channels.
® 
Clandestine Collection III 
Devise Multilateral Operations 
• Multi-lateral 
clandestine operations 
that leverage trained 
indigenous case offices 
(e.g. black South 
Africans, French Arabs, 
Russian mujahids) will 
have more success. 
• We must get serious.
® 
Satellite Collection I 
Leverage Commercial Capabilities 
• 80% of what we need 
can be bought at 
relatively low cost 
from the private 
sector--this is 
especially true for 
commercial imagery 
and global signals 
broadcast monitoring.
® 
Satellite Collection II 
Processing Matters More Than Collection 
• 80% of the value to be 
had from satellite 
collection--whether 
images or signals-- 
comes from post-processing. 
• Spending on collection 
that is not processed is 
a very wasteful habit.
® 
Satellite Collection III 
Go After US Shuttle Mission DTED 
• The value of 
commercial imagery 
can be doubled or 
tripled if we can get 
the USA to release the 
Digital Terrain 
Elevation Data 
(DTED) taken at 
levels 1-3 from the 
space shuttle in 2000.
® 
Close-In Technical Collection I 
When Encryption Really Hurts 
• Remember that 80% of 
the value of signals 
intelligence is in the 
pattern and the 
connection--not the text. 
• If you must have the 
text, then close-in 
collection is a good 
option--drug the dogs.
® 
Close-in Technical Collection II 
Processing Cost Almost Too Great 
• Every hour of close-in 
collection takes four 
hours to transcribe, and 
generally produces less 
than 5 minutes of good 
stuff. 
• Don’t do close-in 
collection unless that 
five minutes is worth it. 
VALUE 
TIME 
PAGES 
COST
® 
Close-in Technical Collection III 
Covert People Beacons the Next Big Thing 
• Terrorists and 
criminals are getting 
too difficult to track 
using old means. 
• Covertly implanted 
beacons, both in their 
bodies and in their 
vehicles, could be the 
next big thing.
® 
Right People I 
Must Profile for Excellence 
• Each aspect of 
intelligence requires a 
special kind of 
personality profile. 
• We must carefully 
identify profiles of the 
best street officers, the 
best analysts, and then 
find more of the same.
® 
Right People II 
Professionalization through Training 
• The old days of “on the 
job training” are over. 
If intelligence is to be 
professionalized and 
standardized, then 
training must be intense 
at the beginning, and 
continuous throughout 
a career. 
• What we do is hard!
® 
Right People III 
Sustainment Through Proper Pay 
• You get what you pay 
for. If we are to avoid 
corruption, time theft, 
and having the wrong 
people doing critical 
jobs improperly, then 
we must plan for top 
salaries and health 
benefits and quality of 
life when off the job.
® 
Right Managers I 
Gold Collar Workers Are Thoroughbreds 
• Intelligence 
professionals are “gold 
collar workers”--vastly 
superior to “white 
collar” or “blue collar.” 
• Managers must learn to 
treat intelligence 
professionals as race 
horses, not plow horses.
® 
Right Managers II 
Nurturing, Coaching, Mentoring, Protecting 
• Management is no 
longer about costs, 
results, or objectives. 
• The core management 
skills today lie in 
nurturing, coaching, 
mentoring, and 
protecting people. 
• They know better--get 
that knowledge to work. 
• Nurture imagination 
• Coach talent at every level 
• Mentor juniors everywhere 
• Protect speakers of truth
® 
Right Managers III 
Your Worst Employee Defines You 
• If you are not cutting 
the worst 10% of your 
employees every few 
months, they will 
infect the others and 
undermine your work. 
• Your worst employee 
defines you as a 
manager.
® 
Collection Management I 
Find It or Get It for Free 
• Our first challenge is 
to know if we already 
know this or can get it. 
• Can we FIND or GET 
the information we 
need within our own 
databases or those of 
other organizations? 
• This is a skill track.
® 
Collection Management II 
Buy It From Private Sector, Cheaply 
• If we cannot FIND it 
or GET it free, can we 
BUY the information 
cheaply from a private 
sector provider? 
• We must know what 
the private sector can 
do, we must budget 
funds for buying 
information.
® 
Collection Management III 
Task It to Secret Capabilities 
• This is the last 
question we should be 
asking, but too often it 
is the only question we 
ask. 
• Only if we cannot 
FIND, GET, or BUY, 
should we be tasking 
classified assets and 
stealing information.
® 
Conclusion I 
Data standards and sharing matter 
OSINT 
HUMINT 
It’s the 
back and 
forth 
that 
allows 
DNA to 
define 
life. 
• From north to south, 
east to west, if the 
information is not 
entered digitally and 
according to some 
agreed upon standard, 
it will not be shared 
and will not contribute 
to national intelligence. 
IMINT 
SIGINT
® 
Conclusion II 
24/7 Geospatial “Plot” is Vital 
• There is no substitute 
for a 24/7 watch center 
that has a geospatial 
“plot” and can 
combine a knowledge 
of intelligence sources 
with a real-world 
depiction of locations, 
vehicles, targets, and 
individuals.
® 
Conclusion III 
Die in Isolation, Thrive in Combination 
• We are our own enemy. 
Compartmentation and 
security are the enemy 
of timely intelligence. 
• Sources achieve their 
greatest effect when 
combined, not when 
isolated. 
“Okay, so maybe I was wrong not to tell you about my secret 
source--but you should have told me first…...”

More Related Content

Similar to 2004 04 collection seminar

Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityantitree
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveTargetX
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?Thomas Malmberg
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest riskEvan Francen
 
NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017
NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017
NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017Archersan
 
Getting to know you: the psychology of information management
Getting to know you: the psychology of information managementGetting to know you: the psychology of information management
Getting to know you: the psychology of information managementHeather Jack
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Matt Hathaway
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Alexandre Sieira
 
Topic 5 understanding privacy
Topic 5 understanding privacyTopic 5 understanding privacy
Topic 5 understanding privacyHamid Zainudin
 
ESF15 Information Management -PIO Awareness
ESF15 Information Management -PIO AwarenessESF15 Information Management -PIO Awareness
ESF15 Information Management -PIO AwarenessTrost, Micki
 
W1-Unit-1-Intro-info-fluency-81313-326pm
W1-Unit-1-Intro-info-fluency-81313-326pmW1-Unit-1-Intro-info-fluency-81313-326pm
W1-Unit-1-Intro-info-fluency-81313-326pmJill McKeon
 
The trinity fuelling the future of project management
The trinity fuelling the future of project managementThe trinity fuelling the future of project management
The trinity fuelling the future of project managementUlohomuno, Eze Afieroho PMP
 
Great Learning & Information Security - English edition
Great Learning & Information Security - English editionGreat Learning & Information Security - English edition
Great Learning & Information Security - English editionChuan Lin
 
RIKM3 Leveraging the relationship between RM, IM and KM
RIKM3 Leveraging the relationship between RM, IM and KMRIKM3 Leveraging the relationship between RM, IM and KM
RIKM3 Leveraging the relationship between RM, IM and KMDavid Williams
 

Similar to 2004 04 collection seminar (20)

2004 06 intelligence analysis seminar
2004 06 intelligence analysis seminar2004 06 intelligence analysis seminar
2004 06 intelligence analysis seminar
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence community
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017
NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017
NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017
 
Getting to know you: the psychology of information management
Getting to know you: the psychology of information managementGetting to know you: the psychology of information management
Getting to know you: the psychology of information management
 
2004 07 intelligence new rules seminar
2004 07 intelligence new rules seminar2004 07 intelligence new rules seminar
2004 07 intelligence new rules seminar
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Topic 5 understanding privacy
Topic 5 understanding privacyTopic 5 understanding privacy
Topic 5 understanding privacy
 
ESF15 Information Management -PIO Awareness
ESF15 Information Management -PIO AwarenessESF15 Information Management -PIO Awareness
ESF15 Information Management -PIO Awareness
 
W1-Unit-1-Intro-info-fluency-81313-326pm
W1-Unit-1-Intro-info-fluency-81313-326pmW1-Unit-1-Intro-info-fluency-81313-326pm
W1-Unit-1-Intro-info-fluency-81313-326pm
 
The trinity fuelling the future of project management
The trinity fuelling the future of project managementThe trinity fuelling the future of project management
The trinity fuelling the future of project management
 
Great Learning & Information Security - English edition
Great Learning & Information Security - English editionGreat Learning & Information Security - English edition
Great Learning & Information Security - English edition
 
MKT231 Week 4
MKT231 Week 4MKT231 Week 4
MKT231 Week 4
 
(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn
 
Cognitive Process Profile (CPP) psychometric
Cognitive Process Profile (CPP) psychometricCognitive Process Profile (CPP) psychometric
Cognitive Process Profile (CPP) psychometric
 
RIKM3 Leveraging the relationship between RM, IM and KM
RIKM3 Leveraging the relationship between RM, IM and KMRIKM3 Leveraging the relationship between RM, IM and KM
RIKM3 Leveraging the relationship between RM, IM and KM
 

More from Robert David Steele Vivas

2013 five r-brief-school-world-brain-ose-2.3 r
2013 five r-brief-school-world-brain-ose-2.3 r2013 five r-brief-school-world-brain-ose-2.3 r
2013 five r-brief-school-world-brain-ose-2.3 rRobert David Steele Vivas
 
2012 steele 1.3-two-party-tyranny-battle-for-the-soul-of-the-republic
2012 steele 1.3-two-party-tyranny-battle-for-the-soul-of-the-republic2012 steele 1.3-two-party-tyranny-battle-for-the-soul-of-the-republic
2012 steele 1.3-two-party-tyranny-battle-for-the-soul-of-the-republicRobert David Steele Vivas
 
2012 gwu osa-36-slides-1.4-general-briefing-words-in-notes-format
2012 gwu osa-36-slides-1.4-general-briefing-words-in-notes-format2012 gwu osa-36-slides-1.4-general-briefing-words-in-notes-format
2012 gwu osa-36-slides-1.4-general-briefing-words-in-notes-formatRobert David Steele Vivas
 
2012 gwu osa-10-slides-1.6-leadership-briefing-words-in-notes-format1
2012 gwu osa-10-slides-1.6-leadership-briefing-words-in-notes-format12012 gwu osa-10-slides-1.6-leadership-briefing-words-in-notes-format1
2012 gwu osa-10-slides-1.6-leadership-briefing-words-in-notes-format1Robert David Steele Vivas
 
2010 state of global intelligence at hackers
2010 state of global intelligence at hackers2010 state of global intelligence at hackers
2010 state of global intelligence at hackersRobert David Steele Vivas
 
2009 ubc-the-ultimate-hack-slides-2.0-final-with-notes
2009 ubc-the-ultimate-hack-slides-2.0-final-with-notes2009 ubc-the-ultimate-hack-slides-2.0-final-with-notes
2009 ubc-the-ultimate-hack-slides-2.0-final-with-notesRobert David Steele Vivas
 
2009 real time information national press club
2009 real time information national press club2009 real time information national press club
2009 real time information national press clubRobert David Steele Vivas
 
2008 information sharing orientation dia international fellows
2008 information sharing orientation dia international fellows2008 information sharing orientation dia international fellows
2008 information sharing orientation dia international fellowsRobert David Steele Vivas
 

More from Robert David Steele Vivas (20)

2014 steele @-yale1
2014 steele @-yale12014 steele @-yale1
2014 steele @-yale1
 
2014 steele @-tarleton-modern-conflict-1.6
2014 steele @-tarleton-modern-conflict-1.62014 steele @-tarleton-modern-conflict-1.6
2014 steele @-tarleton-modern-conflict-1.6
 
2013 workshop-on-intelligence
2013 workshop-on-intelligence2013 workshop-on-intelligence
2013 workshop-on-intelligence
 
2013 overview-on-intelligence
2013 overview-on-intelligence2013 overview-on-intelligence
2013 overview-on-intelligence
 
2013 five r-brief-school-world-brain-ose-2.3 r
2013 five r-brief-school-world-brain-ose-2.3 r2013 five r-brief-school-world-brain-ose-2.3 r
2013 five r-brief-school-world-brain-ose-2.3 r
 
2012 steele at-was-on-reflexivity-1-mb
2012 steele at-was-on-reflexivity-1-mb2012 steele at-was-on-reflexivity-1-mb
2012 steele at-was-on-reflexivity-1-mb
 
2012 steele 1.3-two-party-tyranny-battle-for-the-soul-of-the-republic
2012 steele 1.3-two-party-tyranny-battle-for-the-soul-of-the-republic2012 steele 1.3-two-party-tyranny-battle-for-the-soul-of-the-republic
2012 steele 1.3-two-party-tyranny-battle-for-the-soul-of-the-republic
 
2012 gwu osa-36-slides-1.4-general-briefing-words-in-notes-format
2012 gwu osa-36-slides-1.4-general-briefing-words-in-notes-format2012 gwu osa-36-slides-1.4-general-briefing-words-in-notes-format
2012 gwu osa-36-slides-1.4-general-briefing-words-in-notes-format
 
2012 gwu osa-10-slides-1.6-leadership-briefing-words-in-notes-format1
2012 gwu osa-10-slides-1.6-leadership-briefing-words-in-notes-format12012 gwu osa-10-slides-1.6-leadership-briefing-words-in-notes-format1
2012 gwu osa-10-slides-1.6-leadership-briefing-words-in-notes-format1
 
2011 gmu global strategies simple briefing
2011 gmu global strategies simple briefing2011 gmu global strategies simple briefing
2011 gmu global strategies simple briefing
 
2010 state of global intelligence at hackers
2010 state of global intelligence at hackers2010 state of global intelligence at hackers
2010 state of global intelligence at hackers
 
2009 ubc-the-ultimate-hack-slides-2.0-final-with-notes
2009 ubc-the-ultimate-hack-slides-2.0-final-with-notes2009 ubc-the-ultimate-hack-slides-2.0-final-with-notes
2009 ubc-the-ultimate-hack-slides-2.0-final-with-notes
 
2009 unicef open everything nyc
2009 unicef open everything nyc2009 unicef open everything nyc
2009 unicef open everything nyc
 
2009 steele peace from above 3.3 pptx
2009 steele peace from above 3.3 pptx2009 steele peace from above 3.3 pptx
2009 steele peace from above 3.3 pptx
 
2009 real time information national press club
2009 real time information national press club2009 real time information national press club
2009 real time information national press club
 
2009 do d osint staff briefing
2009 do d osint staff briefing2009 do d osint staff briefing
2009 do d osint staff briefing
 
2009 do d osint leadership briefing
2009 do d osint leadership briefing2009 do d osint leadership briefing
2009 do d osint leadership briefing
 
2008 information sharing orientation dia international fellows
2008 information sharing orientation dia international fellows2008 information sharing orientation dia international fellows
2008 information sharing orientation dia international fellows
 
2008 earth intelligence network at hope
2008 earth intelligence network at hope2008 earth intelligence network at hope
2008 earth intelligence network at hope
 
2007 un dss class before one briefing
2007 un dss class before one briefing2007 un dss class before one briefing
2007 un dss class before one briefing
 

2004 04 collection seminar

  • 1. ® COLLECTION: Know Who Knows Robert David Steele Intelligence Coach bear@oss.net
  • 2. ® Elements of Collection Open Source Intelligence Clandestine Human Intelligence Signals Intelligence Imagery Intelligence Leadership • Mindset • Courage
  • 3. ® Open Source Intelligence I Lessons of History China, Islam, Ethnic, Etc. I Lessons of History Narrowly focused! • Neither the academics nor the government have done well here. • We need to fund both specialists in history, and a massive digitization project for Chinese, Islamic, other key histories.
  • 4. ® Open Source Intelligence II Global Burden Sharing II Global Coverage Cost-Sharing with Others-- Shared Early Warning Narrowly focused! • No one has the time, money, or ability to cover the world. • We must find new means of sharing the burden of collection, translation, digitization of global open sources in 29+ languages. • The Internet is vital.
  • 5. ® Open Source Intelligence III Leveraging the Private Sector Narrowly focused! III National Intelligence Harness distributed intelligence of Nation • The national intelligence tribe must establish open protocols for linking and leveraging the other tribes: military, law enforcement, business, academic, NGO-media, and religious. • A national intelligence federation is needed.
  • 6. ® Clandestine Collection I Get Away from Official Cover • The best agents don’t go to cocktail parties or meet with official cover personalities. • It is not possible to manage truly secret operations from a fixed point known to local liaison.
  • 7. ® Clandestine Collection II Focus on Long-Term Secure Agents • The best case officers should be trained to spot, assess, recruit, and handle long-term secure agents that have access to truly unique information that cannot be gotten via open source channels.
  • 8. ® Clandestine Collection III Devise Multilateral Operations • Multi-lateral clandestine operations that leverage trained indigenous case offices (e.g. black South Africans, French Arabs, Russian mujahids) will have more success. • We must get serious.
  • 9. ® Satellite Collection I Leverage Commercial Capabilities • 80% of what we need can be bought at relatively low cost from the private sector--this is especially true for commercial imagery and global signals broadcast monitoring.
  • 10. ® Satellite Collection II Processing Matters More Than Collection • 80% of the value to be had from satellite collection--whether images or signals-- comes from post-processing. • Spending on collection that is not processed is a very wasteful habit.
  • 11. ® Satellite Collection III Go After US Shuttle Mission DTED • The value of commercial imagery can be doubled or tripled if we can get the USA to release the Digital Terrain Elevation Data (DTED) taken at levels 1-3 from the space shuttle in 2000.
  • 12. ® Close-In Technical Collection I When Encryption Really Hurts • Remember that 80% of the value of signals intelligence is in the pattern and the connection--not the text. • If you must have the text, then close-in collection is a good option--drug the dogs.
  • 13. ® Close-in Technical Collection II Processing Cost Almost Too Great • Every hour of close-in collection takes four hours to transcribe, and generally produces less than 5 minutes of good stuff. • Don’t do close-in collection unless that five minutes is worth it. VALUE TIME PAGES COST
  • 14. ® Close-in Technical Collection III Covert People Beacons the Next Big Thing • Terrorists and criminals are getting too difficult to track using old means. • Covertly implanted beacons, both in their bodies and in their vehicles, could be the next big thing.
  • 15. ® Right People I Must Profile for Excellence • Each aspect of intelligence requires a special kind of personality profile. • We must carefully identify profiles of the best street officers, the best analysts, and then find more of the same.
  • 16. ® Right People II Professionalization through Training • The old days of “on the job training” are over. If intelligence is to be professionalized and standardized, then training must be intense at the beginning, and continuous throughout a career. • What we do is hard!
  • 17. ® Right People III Sustainment Through Proper Pay • You get what you pay for. If we are to avoid corruption, time theft, and having the wrong people doing critical jobs improperly, then we must plan for top salaries and health benefits and quality of life when off the job.
  • 18. ® Right Managers I Gold Collar Workers Are Thoroughbreds • Intelligence professionals are “gold collar workers”--vastly superior to “white collar” or “blue collar.” • Managers must learn to treat intelligence professionals as race horses, not plow horses.
  • 19. ® Right Managers II Nurturing, Coaching, Mentoring, Protecting • Management is no longer about costs, results, or objectives. • The core management skills today lie in nurturing, coaching, mentoring, and protecting people. • They know better--get that knowledge to work. • Nurture imagination • Coach talent at every level • Mentor juniors everywhere • Protect speakers of truth
  • 20. ® Right Managers III Your Worst Employee Defines You • If you are not cutting the worst 10% of your employees every few months, they will infect the others and undermine your work. • Your worst employee defines you as a manager.
  • 21. ® Collection Management I Find It or Get It for Free • Our first challenge is to know if we already know this or can get it. • Can we FIND or GET the information we need within our own databases or those of other organizations? • This is a skill track.
  • 22. ® Collection Management II Buy It From Private Sector, Cheaply • If we cannot FIND it or GET it free, can we BUY the information cheaply from a private sector provider? • We must know what the private sector can do, we must budget funds for buying information.
  • 23. ® Collection Management III Task It to Secret Capabilities • This is the last question we should be asking, but too often it is the only question we ask. • Only if we cannot FIND, GET, or BUY, should we be tasking classified assets and stealing information.
  • 24. ® Conclusion I Data standards and sharing matter OSINT HUMINT It’s the back and forth that allows DNA to define life. • From north to south, east to west, if the information is not entered digitally and according to some agreed upon standard, it will not be shared and will not contribute to national intelligence. IMINT SIGINT
  • 25. ® Conclusion II 24/7 Geospatial “Plot” is Vital • There is no substitute for a 24/7 watch center that has a geospatial “plot” and can combine a knowledge of intelligence sources with a real-world depiction of locations, vehicles, targets, and individuals.
  • 26. ® Conclusion III Die in Isolation, Thrive in Combination • We are our own enemy. Compartmentation and security are the enemy of timely intelligence. • Sources achieve their greatest effect when combined, not when isolated. “Okay, so maybe I was wrong not to tell you about my secret source--but you should have told me first…...”

Editor's Notes

  1. To set the stage for considering how intelligence has failed at the national level, it is helpful to first emphasize that intelligence is about much more than simply secret collection or general analysis. Especially important in this illustration is the co-equal importance of counterintelligence--including operational security which most commanders and policymakers refuse to respect--and covert action, the “third way” between diplomacy and warfare. Finally, leadership is essential. The mindset and moral courage of intelligence leaders is the sine qua non for successful intelligence. Bureaucrats will fail.
  2. My second book, THE NEW CRAFT OF INTELLIGENCE: Personal, Public, & Political, lays out the future of intelligence as I believe the citizen-taxpayer must insist it be. Specifically, we can no longer afford to ignore either history or the historical statements of other players in their own languages; we must devise a means of sharing the burden of monitoring all open sources in all languages all the time; we must harness the considerable knowledge we have in our private sector; and we must focus our spies on the hard stuff.
  3. My second book, THE NEW CRAFT OF INTELLIGENCE: Personal, Public, & Political, lays out the future of intelligence as I believe the citizen-taxpayer must insist it be. Specifically, we can no longer afford to ignore either history or the historical statements of other players in their own languages; we must devise a means of sharing the burden of monitoring all open sources in all languages all the time; we must harness the considerable knowledge we have in our private sector; and we must focus our spies on the hard stuff.
  4. My second book, THE NEW CRAFT OF INTELLIGENCE: Personal, Public, & Political, lays out the future of intelligence as I believe the citizen-taxpayer must insist it be. Specifically, we can no longer afford to ignore either history or the historical statements of other players in their own languages; we must devise a means of sharing the burden of monitoring all open sources in all languages all the time; we must harness the considerable knowledge we have in our private sector; and we must focus our spies on the hard stuff.
  5. STS-99 Crew Works in Shifts to Complete Mapping MissionEndeavour's international crew of seven spent 11 days in orbit during February 2000 mapping the Earth's surface with radar instruments. Commander Kevin Kregel, Pilot Dom Gorie and Mission Specialists Janice Voss, Janet Kavandi, Gerhardt Thiele and Mamoru Mohri split their schedule into two shifts to support round-the-clock operations. Thiele -- a native of Germany -- represented the European Space Agency, and Mohri represented Japan's space agency, NASDA. http://www.shuttlepresskit.com/STS-99/OBJ107.htm http://www.shuttlepresskit.com/STS-99/OBJ107.htm