SlideShare a Scribd company logo
1 of 12
The intelligence community has not always learned the lessons
of its successes and failures.
Lowenthal (2012) suggests a couple of reasons for why this
might be:
· First, intelligence consumers keep the intelligence community
busy. Intelligence analysts and their managers rarely feel they
have time to withdraw from their day-to-day work to assess the
effectiveness of that work. We have already mentioned several
times how analysts working in fast-paced, tactical
environments are often hard-pressed managing their time to
produce intelligence products, as it is, leaving little to no
opportunity to learn from one’s mistakes or successes.
· Second, members of the intelligence community tend to treat
their products in a take-it-or-leave-it manner. If a decision-
maker chooses poorly based on a less than perfect intelligence
product, then the fault falls to him or her for failing to make
wise choices. Intelligence analysts take pride in their technical
competence and have a tendency to resist being audited or
having their work reviewed. As a consequence, self-reflection
seems to occur as a reaction to a failure rather than as part of a
standard operating procedure.
Intelligence Analysis: Process or Project?
We often seem to straddle the line between thinking
about intelligence analysis as a process and as a project. Seeing
it as a process allows us to take a more organic approach,
emphasizing what Clark (2007) would call its ‘social nature’.
Intelligence as a process gives primacy place to its character as
a fluid, continuous activity underlying ongoing operations. It
also allows us to fall into the trap of thinking that the way in
which we work has no end point, excusing our professed
inability to stop and assess the quality of our work. Many
aspects of intelligence analysis, however, might benefit better
from approaching it as a field of practice in which we manage
projects.
The Project Management Institute defines a project as “a
temporary endeavor undertaken to create a unique product,
service, or result” (2008, p. 5). Projects are understood in
contrast to processes, which are ongoing, repetitive efforts
following an organization’s standard procedures. Projects are
distinct from processes not only because projects result in
something new, but because they involve the uncertainties of
creating something new.
In criminal intelligence analysis, we already often deal with
cases in our everyday lives that have specific starting points and
specific ending points concluding with a specific product –
hopefully a conviction in our case. Despite their resemblances,
it would be fair to say that no two cases are exactly alike, which
means every case results in ‘a unique product, service, or
result’. When we think of cases as the result of finished
projects, then we might think of criminal intelligence analysis –
in so far as it contributes to cases – as projects themselves.
The Project Management Institute states that recording
experiences should be a priority for any organization that
manages the uncertainties inherent in creating a new product.
Lessons learned and historical information contribute to an
organization’s knowledge base. A lessons learned record should
include all the documents related to an intelligence analysis
operation. Records should outline each major step in the
operation and state the thought processes behind any major
decisions. Since all intelligence analysis involves risk and
uncertainty, the record should state areas were key assumptions
were made and what steps were taken to manage risk.
· A lessons learned body of knowledge is more than just a
dossier of documents describing what happened. It also includes
assessments of the product’s overall effectiveness, areas of
unforeseen successes, and recommendations for how challenges
might be overcome if faced in the future.
On the first point, it should include feedback from end users on
how well final products met their needs. On the second and
third points, all analysts experience variances in the quality of
their work. Performing quality control requires identifying the
reasons behind these variances, articulating corrective actions
taken, and measuring their performances. Ideally, this activity
will take place throughout the intelligence cycle, but at a
minimum they should be performed at the end of a substantial
project or case.
Lessons Learned Initiatives
The intelligence community as a whole has seen a shift in its
composition that has affected the level of technical expertise in
its ranks (Lowenthal, 2012). At the national level, the Cold War
spurred large investments in a robust intelligence collection and
analysis capacity. With its conclusion in the 1990s, many older,
experienced intelligence professionals retired from the
community and were not replaced thanks to budget cuts
correlating to a reduction in defense spending in general.
After the attacks of September 11, 2001, the intelligence
community received a rapid injection of funding that in some
respects surpassed its ability to absorb. Young analysts were
hired, sped through abbreviated training programs, and set to
work on intelligence problems for which they were often ill
prepared. They had access to only a limited numbers of mentors,
most of who had spent their careers addressing traditional
threats through traditional means that could not manage the
level of complexity new threats involved.
· Meanwhile, intelligence reforms focused on strengthening
intelligence collection capabilities and cross-agency
information sharing, leaping over the need to advance the field
of intelligence analysis. The DNI eventually identified this
omission and has since sought to build a lessons learned
knowledge base that can be re-invested into the intelligence
community, but levels of investment in terms of time, funds,
and personnel seem to remain a low priority.
A few examples in the intelligence community do exist for
proactively assessing the quality of one’s work and building a
body of knowledge based on an analysis of past experience.
For instance, the U.S. Army operates a Center for Army Lessons
Learned (CALL). CALL issues a wide array of succinct
handbooks for military commanders on dealing with challenges
that influence their mission success in the contemporary
operational environment. CALL relies on a rotating group of
professionals with operational experience in various areas
deemed critical for mission success. These professionals have
worked on the ground in environments where key challenges
have been identified.
In between these field experiences, they are called upon to meet
with others who work under similar conditions, to interview
them on what went well (and what went poorly), and to process
this information into suggestions for the future. A review of the
CALL website reveals papers on supporting Agribusiness in
Afghanistan, paying informants in a deployed environment,
responding to disasters, and even setting up a lessons learned
program at the unit level. The intention is to keep commanders
informed about new trends that affect their operations and to
increase the overall quality of their decision-making. The other
branches of the military have their own, similar versions.
In 2004, the Department of Justice established the Criminal
Intelligence Coordination Council (CICC)to implement 28
recommendations stated in the National Criminal Intelligence
Sharing Plan. The CICC’s stated mission is to support the
development of criminal intelligence standards for information
sharing, technologies, and training. The CICC operates the
National Criminal Intelligence Resource Center (NCIRC), but it
is only available on secure networks used within criminal
intelligence organizations. The emphasis of the CICC and the
NCIRC does not appear heavily focused on the development of
criminal intelligence analytical tradecraft, echoing the
persistent need Heuer and Pherson describe for supporting
increased professional competence of intelligence analysts at all
echelons.
The most dynamic area of analysis about intelligence analysis
may be the academic research sector. Independent universities,
government-funded think tanks, and non-governmental
organizations have made active contributions to the public’s
understanding of intelligence analysis and have increased the
intelligence community’s awareness of best practices by leaps
and bounds.
· An example of such work, made available for your review as
this week’s supplementary material, is a short book published
by the Joint Military Intelligence College to educate
competitive intelligence professionals about intelligence
analysis lessons learned from the national and military
intelligence sectors (Krizan, 1999).
Though it predates post-9/11 intelligence reforms and so it does
not address common intelligence practices exactly as we have
addressed them in this course, it does provide an example of
information sharing across intelligence disciplines at the macro-
level.
During Week 2 we looked Hansen’s article on the future of US
intelligence (2004), which was published in the International
Journal of Intelligence and Counterintelligence – a very useful
resource of tracking trends in research about the field of
intelligence and intelligence analysis.
The journal Intelligence and National Security covers historical
reviews of intelligence issues, while theJournal of Homeland
Security and Emergency Management focuses on reporting
innovations in field operations and cutting edge academic
research primarily focused on the state and national levels. As
students of intelligence analysis, we should develop an
awareness of other journals and the work of specific researchers
on areas of our interest that appear in journals not specific to
intelligence.
Victory!
Welcome to the final chapter in the story of our 8-week
exploration of criminal intelligence analysis. We have talked
about tools and techniques used to process and exploit
intelligence information in order to produce intelligence
products. And we have seen how many of these activities fit
within the broader scope of the intelligence analysis enterprise.
Finally, we have applied these discussions toward adapted real-
world scenario.
Now it is time to pause a moment, to organize our materials,
and to make a record of our successes and failures, our
challenges and our learning, so that those who come after us
will have the advantage of our insights and experience.
Scenario
Last week, Chief Heaton authorized a raid against El Movi
based on your recommendations. The action led to
the successful apprehension of its targets without anyone
getting hurt. While some of the members of the organization not
present where direct action occurred did escape, Chief Heaton is
confident that over time they will surface again. For now,
prosecutions are underway. But perhaps more importantly, El
Movi is no longer a functioning organization and its victims are
safe.
Chief Heaton has been impressed with the quality of your work
overall on this case. He started out somewhat skeptical about
your use of statistics, complicated computer programs, and
structured analytic techniques, but now he sees the value of
them. He wants you to close out your work by producing your
own assessment of your efforts so the TPD can retain a record
of your experience.
He wants you and your office to keep such records from now
on so that he can use them to justify more investment in the
criminal intelligence analysis section and you can use them to
train new criminal intelligence analysts coming on board to the
organization for the first time.
While this final report will describe each of the major steps
taken in the El Movi case, the emphasis is on assessing your
experience working through the case. Begin the report with a
timeline of all the major events in the case, ensuring you
indicate where in the timeline your products fall. For each of
your products, briefly respond to the following questions:
· What was the most helpful about the technique I used to create
this product, and why?
· What was the biggest hindrance of the technique I used to
create this product, and why?
· What other technique or aspect of another technique would
have helped me overcome this hindrance to create a better
product, and why?
Close out your report by finishing the following sentences about
your work on the case as a whole:
· The moment when I was the most engaged, excited, and
involved in the case was when…
· The moment when I was the most distanced, disengaged, and
uninvolved in the case was when…
· I would like to say about my experience as a criminal
intelligence analysis on this case that…
· The one piece of advice I would give the next person who
works on a similar case using similar techniques is…
Chapter 13
Treason
Treason is the only crime defined in the U.S. Constitution. The
revolutionaries who wrote the U.S. Constitution knew very well
the new government they were about to create couldn’t survive
without the active support (or at least the passive submission)
of most of the people.
They also realized it was going to be some time before this new
republican form of government took hold among the people. The
people’s allegiance would be especially important to the
newborn nation’s survival in the early years following the
Revolution, a time of gigantic threats from enemies inside and
outside the new country.
Everything they did to further the interests of the colonies was
done under threat of prosecution for treason. English
prosecutions for treason weren’t pretty.
The authors of the Constitution worried that treason law would
be abused because of two concerns:
1. that peaceful opposition to the government, not just rebellion,
would be repressed
2. that innocent people might be convicted of treason because of
perjury, passion, and/or insufficient evidence.
They were determined that disloyal feelings or opinions and the
passions of the time wouldn’t be a part of the law of treason.
As much as they recognized the need for allegiance to the new
government, their fear of abusive prosecutions for treason led
them to adopt limitation.
By the time the Constitution was adopted, the new government
and current thinking among the governing class came to limit
treason to two disloyal behaviors:
· levying war against your own country
· giving aid and comfort to the enemy
The authors of the Constitution adopted these two acts and then,
for more protection, added three more limits to the reach of
treason:
· they banned legislatures and courts from creating new
treasons;
· they required two witnesses to at least one overt (unconcealed)
act of treason or a confession in open court;
· they wrote these limits into the body of the U.S. Constitution.
Treason consists of three elements.
· First, treason actus reus consists of either levying war against
the United States or giving aid and comfort to the enemies of
the United States.
· Second, treason mens rea consists of intentionally giving aid
and comfort for the very purpose of betraying the United States.
· Third, proof of treason requires either two witnesses to the
actus reus or confession in open court.
Distrust of treason prosecutions didn’t end with the adoption of
the Constitution. Throughout U.S. history, the government has
prosecuted only a handful of people for treason, and presidents
have pardoned or at least mitigated death sentences of most of
those few who’ve been found guilty.
Sedition, Sabotage, and Espionage
Treason isn’t the only crime aimed at combating disloyalty and
keeping the allegiance of our citizens. Advocating the violent
overthrow of the government is called sedition.
The “stirring up” could be done by speeches (seditious speech),
writings (seditious libel), or agreement (seditious conspiracy).
In the Smith Act of 1940, Congress made it a crime to conspire
to teach or advocate overthrowing the government by force or to
be a member of a group that advocated the violent overthrow of
the government.
Sabotage is the crime of damaging or destroying property for
the purpose of interfering with and hindering preparations for
war and defense during national emergencies. The sabotage
levels of culpability vary. Most often, it’s “willfully,”
sometimes “with intent to,” and at least once “with reason to
believe.” Whatever the exact words, it’s probably closest to the
highest levels of culpability—purposely and/or knowingly.
The U.S. Code (2006, Title 18, Chapter 37, § 794)
separates espionage into two crimes:
· (1) espionage during peace
· (2) espionage during war. Espionage is spying for the enemy.
The crime of espionage during war consists of collecting,
recording, publishing, or communicating (or attempting to do
any of these) “any information” about troop movements, ships,
aircraft, or war materials and any other information “which
might be useful to the enemy.”
· The penalty is death or any term of imprisonment up to life
(§794[b]).
By the middle of the 1920’s, large scale sedition prosecutions
under the Espionage Act largely disappeared. But it didn’t die.
This is especially true during times like World War II, the Cold
War, the Vietnam War, and now in Iraq and Afghanistan, when
U.S. troops are engaged in combat and dangerous peacekeeping
operations abroad.
The U.S. Government has occasionally prosecuted these
employees. Now, the Espionage Act is back. Since 2009, the
U.S. Government has charged six U.S. Government employees
under the Act: Bradley Manning; Thomas Drake; Shamai
Leibowitz; Stephen Jin-Woo Kim; Jeffrey Sterling; and John
Kirakou.
Terrorism and Anti-Terrorism
Terrorism and Anti-Terrorism Crimes
Terrorism is the use of violence or intimidation in the pursuit of
political aims. A number of sections of the U.S. Code are
available for prosecuting crimes related to terrorists and
terrorist organizations.
There are some specific antiterrorism crimes—mainly, U.S.
Code Chapter 113B, “Terrorism” (Title 18, Part I), the Anti-
Terrorism and Effective Death Penalty Act (AEDPA) (1996),
and the USA Patriot Act (2001). The code divides terrorism into
two kinds: international terrorism and domestic terrorism.
According to the U.S. Code (2006), it’s a felony punishable by
up to life imprisonment, or execution if someone dies, to use, to
threaten to use, or attempt or conspire to use, a weapon of mass
destruction against a U.S. citizen outside the United States
(Title 18, Part I, Chapter 113B, § 2332a); any person or
property inside the United States (§ 2332a); any property
owned, leased, or used by the U.S. government inside or outside
the United States (§ 2332a[3]); or any property owned, leased,
or used by a foreign government inside the United States (§
2332a[4]).
The actus reus of harboring or concealing consists
of harboring or concealing persons who have committed or are
about to commit a list of terrorist-related crimes.
The mens rea of harboring or concealing requires knowing (or
that a reasonable person should have known) the actus reus of
harboring or concealing was about to be committed. The penalty
is a fine or up to 10 years of imprisonment.
The felony of providing material support was first created in the
1996 Anti-Terrorism and Effective Death Penalty Act (AEDPA)
(§ 323), which was aimed at domestic terrorist acts. The crimes
of providing material support to individuals or organizations are
proximity crimes.
The term “training” means instruction or teaching designed to
impart a specific skill, as opposed to general knowledge. The
term “expert advice or assistance” means advice or assistance
from scientific, technical, or other specialized knowledge.
No person may be prosecuted under this section in connection
with the term “personnel” unless that person has knowingly
provided, attempted to provide, or conspired to provide a
foreign terrorist organization with 1 or more individuals (who
may include himself) to work under that terrorist organization’s
direction or control, or otherwise direct the operation of that
organization.
As of September 2010, the U.S. Government had prosecuted
about 1,000 terrorist cases since September 11, 2001 (TTRC
2010, 6). The top plots include only defendants inspired by
jihadist ideas, namely “defendants who were formally or
informally associated with an Islamist terror group—whether
one with a global jihadist ideology (Al Qaeda) or a local
Islamist movement (Hamas).
It also includes defendants unaffiliated with a terror group who
aspired to such affiliation or who subscribed to a global
jihadist ideology (TTRC 2011, 7). But it excludes terror cases
not inspired by jihadist ideas, like far right (militias) or far left
(environmentalist extremists).
Is the U.S. creating its own terrorists? Yes, according to the
Law and Security Center. Eighty one percent(127) of the
defendants in the top 50 plot cases were legal residents of the
U.S.
Seventy-three (57%) were born in the U.S.; the rest had lived in
the U.S. for at least 10 years and several as long as 20 years,
long enough to become familiar with U.S. culture and habits
(TTRC 2010, 3).
Homegrown terrorist defendants have been among high profile
cases ever since 2001, but the number seemed to spike in 2010,
partly because of lengthy investigations. Furthermore, some
defendants spent years trying to become terrorists before they
were arrested.
The statutes charged in the top 50 terrorist cases include:
providing material support to terrorists; providing material
support or resources to designated foreign terrorist
organizations; use of weapons of mass destruction; prohibitions
against the financing of terrorism; and receiving military-type
training from a foreign terrorist organization.
The predominant number of cases are “material support”
offenses to terrorists and terrorist organizations. A number of
lower courts have decided challenges to the constitutionality of
the “material support” sections.
They have reached conflicting results. Then in 2010, the U.S.
Supreme Court decided that as applied to the facts of the case in
Holder v. Humanitarian Law Project that the “material support”
for terrorist organization was neither constitutionally vague, nor
did it violate the First Amendment speech and assembly rights.

More Related Content

Similar to The intelligence community has not always learned the lessons of i.docx

Law Enforcement Analytic Standards Department
Law Enforcement Analytic Standards DepartmentLaw Enforcement Analytic Standards Department
Law Enforcement Analytic Standards Departmentxstokes825
 
A guide to deal with uncertainties in software project management
A guide to deal with uncertainties in software project managementA guide to deal with uncertainties in software project management
A guide to deal with uncertainties in software project managementijcsit
 
ORX Analytics & Scenario Forum 2019 - summary
ORX Analytics & Scenario Forum 2019 - summaryORX Analytics & Scenario Forum 2019 - summary
ORX Analytics & Scenario Forum 2019 - summaryLuke Carrivick
 
09 4168-international-focus-group-regulation
09 4168-international-focus-group-regulation09 4168-international-focus-group-regulation
09 4168-international-focus-group-regulationwynter73
 
6864NCJRS.pdf
6864NCJRS.pdf6864NCJRS.pdf
6864NCJRS.pdfRicaLiban
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
 
Technology and Evaluation Hitachi Paper
Technology and Evaluation Hitachi PaperTechnology and Evaluation Hitachi Paper
Technology and Evaluation Hitachi PaperAmeya Ashok Naik
 
Measuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsMeasuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsCSCJournals
 
Case Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docxCase Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docxketurahhazelhurst
 
Chapter 3 - Foundations of Security and Loss PreventionSec.docx
Chapter 3 - Foundations of Security and Loss PreventionSec.docxChapter 3 - Foundations of Security and Loss PreventionSec.docx
Chapter 3 - Foundations of Security and Loss PreventionSec.docxchristinemaritza
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docxsyreetamacaulay
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docxaudeleypearl
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docxkellet1
 
Discussion- 11. How does efficient frontier analysis (EFA) dif.docx
Discussion- 11. How does efficient frontier analysis (EFA) dif.docxDiscussion- 11. How does efficient frontier analysis (EFA) dif.docx
Discussion- 11. How does efficient frontier analysis (EFA) dif.docxmadlynplamondon
 
BackgroundA significant criminal event may occur at any place an.docx
BackgroundA significant criminal event may occur at any place an.docxBackgroundA significant criminal event may occur at any place an.docx
BackgroundA significant criminal event may occur at any place an.docxaman341480
 
Therapist Case Report
Therapist Case ReportTherapist Case Report
Therapist Case ReportAimee Brown
 
C H A P T E R 1 4 Risk Management and Worker Protec ti.docx
C H A P T E R  1 4        Risk Management and Worker Protec ti.docxC H A P T E R  1 4        Risk Management and Worker Protec ti.docx
C H A P T E R 1 4 Risk Management and Worker Protec ti.docxRAHUL126667
 
A White Paper: Realising The Benefits of a Digital Investigative Interviewing...
A White Paper: Realising The Benefits of a Digital Investigative Interviewing...A White Paper: Realising The Benefits of a Digital Investigative Interviewing...
A White Paper: Realising The Benefits of a Digital Investigative Interviewing...Daren Jay
 
L. Marinos and I. Askoxylakis (Eds.) HASHCII 2013, LNCS 8030.docx
L. Marinos and I. Askoxylakis (Eds.) HASHCII 2013, LNCS 8030.docxL. Marinos and I. Askoxylakis (Eds.) HASHCII 2013, LNCS 8030.docx
L. Marinos and I. Askoxylakis (Eds.) HASHCII 2013, LNCS 8030.docxcroysierkathey
 

Similar to The intelligence community has not always learned the lessons of i.docx (20)

Law Enforcement Analytic Standards Department
Law Enforcement Analytic Standards DepartmentLaw Enforcement Analytic Standards Department
Law Enforcement Analytic Standards Department
 
A guide to deal with uncertainties in software project management
A guide to deal with uncertainties in software project managementA guide to deal with uncertainties in software project management
A guide to deal with uncertainties in software project management
 
ORX Analytics & Scenario Forum 2019 - summary
ORX Analytics & Scenario Forum 2019 - summaryORX Analytics & Scenario Forum 2019 - summary
ORX Analytics & Scenario Forum 2019 - summary
 
09 4168-international-focus-group-regulation
09 4168-international-focus-group-regulation09 4168-international-focus-group-regulation
09 4168-international-focus-group-regulation
 
6864NCJRS.pdf
6864NCJRS.pdf6864NCJRS.pdf
6864NCJRS.pdf
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
 
Technology and Evaluation Hitachi Paper
Technology and Evaluation Hitachi PaperTechnology and Evaluation Hitachi Paper
Technology and Evaluation Hitachi Paper
 
Measuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsMeasuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate Metrics
 
Case Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docxCase Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docx
 
Chapter 3 - Foundations of Security and Loss PreventionSec.docx
Chapter 3 - Foundations of Security and Loss PreventionSec.docxChapter 3 - Foundations of Security and Loss PreventionSec.docx
Chapter 3 - Foundations of Security and Loss PreventionSec.docx
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docx
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docx
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docx
 
Discussion- 11. How does efficient frontier analysis (EFA) dif.docx
Discussion- 11. How does efficient frontier analysis (EFA) dif.docxDiscussion- 11. How does efficient frontier analysis (EFA) dif.docx
Discussion- 11. How does efficient frontier analysis (EFA) dif.docx
 
Intelligence cycle
Intelligence cycleIntelligence cycle
Intelligence cycle
 
BackgroundA significant criminal event may occur at any place an.docx
BackgroundA significant criminal event may occur at any place an.docxBackgroundA significant criminal event may occur at any place an.docx
BackgroundA significant criminal event may occur at any place an.docx
 
Therapist Case Report
Therapist Case ReportTherapist Case Report
Therapist Case Report
 
C H A P T E R 1 4 Risk Management and Worker Protec ti.docx
C H A P T E R  1 4        Risk Management and Worker Protec ti.docxC H A P T E R  1 4        Risk Management and Worker Protec ti.docx
C H A P T E R 1 4 Risk Management and Worker Protec ti.docx
 
A White Paper: Realising The Benefits of a Digital Investigative Interviewing...
A White Paper: Realising The Benefits of a Digital Investigative Interviewing...A White Paper: Realising The Benefits of a Digital Investigative Interviewing...
A White Paper: Realising The Benefits of a Digital Investigative Interviewing...
 
L. Marinos and I. Askoxylakis (Eds.) HASHCII 2013, LNCS 8030.docx
L. Marinos and I. Askoxylakis (Eds.) HASHCII 2013, LNCS 8030.docxL. Marinos and I. Askoxylakis (Eds.) HASHCII 2013, LNCS 8030.docx
L. Marinos and I. Askoxylakis (Eds.) HASHCII 2013, LNCS 8030.docx
 

More from cherry686017

Please provide answer, write program in Prolog for the following.docx
Please provide answer, write program in Prolog for the following.docxPlease provide answer, write program in Prolog for the following.docx
Please provide answer, write program in Prolog for the following.docxcherry686017
 
Please provide references for your original postings in APA form.docx
Please provide references for your original postings in APA form.docxPlease provide references for your original postings in APA form.docx
Please provide references for your original postings in APA form.docxcherry686017
 
Please provide reference in APARequired FormatTitle Page AP.docx
Please provide reference in APARequired FormatTitle Page AP.docxPlease provide reference in APARequired FormatTitle Page AP.docx
Please provide reference in APARequired FormatTitle Page AP.docxcherry686017
 
Please post here your chosen topic and information about why y.docx
Please post here your chosen topic and information about why y.docxPlease post here your chosen topic and information about why y.docx
Please post here your chosen topic and information about why y.docxcherry686017
 
Please pick your favorite article from Ms Magazine  and do a one.docx
Please pick your favorite article from Ms Magazine  and do a one.docxPlease pick your favorite article from Ms Magazine  and do a one.docx
Please pick your favorite article from Ms Magazine  and do a one.docxcherry686017
 
Please provide discussion of the following1. Weyerhaeuser made .docx
Please provide discussion of the following1. Weyerhaeuser made .docxPlease provide discussion of the following1. Weyerhaeuser made .docx
Please provide discussion of the following1. Weyerhaeuser made .docxcherry686017
 
Please provide a summary of the key learning from the chapter.  The .docx
Please provide a summary of the key learning from the chapter.  The .docxPlease provide a summary of the key learning from the chapter.  The .docx
Please provide a summary of the key learning from the chapter.  The .docxcherry686017
 
Please pay close attention to the highlighted areas Please answe.docx
Please pay close attention to the highlighted areas Please answe.docxPlease pay close attention to the highlighted areas Please answe.docx
Please pay close attention to the highlighted areas Please answe.docxcherry686017
 
Please read ALL directions below before starting your final assignme.docx
Please read ALL directions below before starting your final assignme.docxPlease read ALL directions below before starting your final assignme.docx
Please read ALL directions below before starting your final assignme.docxcherry686017
 
Please pay attention to the topicZero Plagiarisfive referenc.docx
Please pay attention to the topicZero Plagiarisfive referenc.docxPlease pay attention to the topicZero Plagiarisfive referenc.docx
Please pay attention to the topicZero Plagiarisfive referenc.docxcherry686017
 
PLEASE OPEN THE ATTACH MENTWhen a dietary supplement is consid.docx
PLEASE OPEN THE ATTACH MENTWhen a dietary supplement is consid.docxPLEASE OPEN THE ATTACH MENTWhen a dietary supplement is consid.docx
PLEASE OPEN THE ATTACH MENTWhen a dietary supplement is consid.docxcherry686017
 
Please make sure that it is your own work and not copy and paste. Wa.docx
Please make sure that it is your own work and not copy and paste. Wa.docxPlease make sure that it is your own work and not copy and paste. Wa.docx
Please make sure that it is your own work and not copy and paste. Wa.docxcherry686017
 
please no plagiarism, 5 pages and fallow the rubic Quantitat.docx
please no plagiarism, 5 pages and fallow the rubic Quantitat.docxplease no plagiarism, 5 pages and fallow the rubic Quantitat.docx
please no plagiarism, 5 pages and fallow the rubic Quantitat.docxcherry686017
 
Please make sure to follow the below.Please note that this is .docx
Please make sure to follow the below.Please note that this is .docxPlease make sure to follow the below.Please note that this is .docx
Please make sure to follow the below.Please note that this is .docxcherry686017
 
Please make revision in the prospectus checklist assignment base.docx
Please make revision in the prospectus checklist assignment base.docxPlease make revision in the prospectus checklist assignment base.docx
Please make revision in the prospectus checklist assignment base.docxcherry686017
 
Please note research can NOT be on organization related to minors, i.docx
Please note research can NOT be on organization related to minors, i.docxPlease note research can NOT be on organization related to minors, i.docx
Please note research can NOT be on organization related to minors, i.docxcherry686017
 
please no plagiarism our class uses Turnitin  You are expected to pr.docx
please no plagiarism our class uses Turnitin  You are expected to pr.docxplease no plagiarism our class uses Turnitin  You are expected to pr.docx
please no plagiarism our class uses Turnitin  You are expected to pr.docxcherry686017
 
Please know that the score is just a ball-park and d.docx
Please know that the score is just a ball-park and d.docxPlease know that the score is just a ball-park and d.docx
Please know that the score is just a ball-park and d.docxcherry686017
 
Please note that the Reflections must have 1. MLA format-.docx
Please note that the Reflections must have 1. MLA format-.docxPlease note that the Reflections must have 1. MLA format-.docx
Please note that the Reflections must have 1. MLA format-.docxcherry686017
 
Please make sure you talk about the following  (IMO)internati.docx
Please make sure you talk about the following  (IMO)internati.docxPlease make sure you talk about the following  (IMO)internati.docx
Please make sure you talk about the following  (IMO)internati.docxcherry686017
 

More from cherry686017 (20)

Please provide answer, write program in Prolog for the following.docx
Please provide answer, write program in Prolog for the following.docxPlease provide answer, write program in Prolog for the following.docx
Please provide answer, write program in Prolog for the following.docx
 
Please provide references for your original postings in APA form.docx
Please provide references for your original postings in APA form.docxPlease provide references for your original postings in APA form.docx
Please provide references for your original postings in APA form.docx
 
Please provide reference in APARequired FormatTitle Page AP.docx
Please provide reference in APARequired FormatTitle Page AP.docxPlease provide reference in APARequired FormatTitle Page AP.docx
Please provide reference in APARequired FormatTitle Page AP.docx
 
Please post here your chosen topic and information about why y.docx
Please post here your chosen topic and information about why y.docxPlease post here your chosen topic and information about why y.docx
Please post here your chosen topic and information about why y.docx
 
Please pick your favorite article from Ms Magazine  and do a one.docx
Please pick your favorite article from Ms Magazine  and do a one.docxPlease pick your favorite article from Ms Magazine  and do a one.docx
Please pick your favorite article from Ms Magazine  and do a one.docx
 
Please provide discussion of the following1. Weyerhaeuser made .docx
Please provide discussion of the following1. Weyerhaeuser made .docxPlease provide discussion of the following1. Weyerhaeuser made .docx
Please provide discussion of the following1. Weyerhaeuser made .docx
 
Please provide a summary of the key learning from the chapter.  The .docx
Please provide a summary of the key learning from the chapter.  The .docxPlease provide a summary of the key learning from the chapter.  The .docx
Please provide a summary of the key learning from the chapter.  The .docx
 
Please pay close attention to the highlighted areas Please answe.docx
Please pay close attention to the highlighted areas Please answe.docxPlease pay close attention to the highlighted areas Please answe.docx
Please pay close attention to the highlighted areas Please answe.docx
 
Please read ALL directions below before starting your final assignme.docx
Please read ALL directions below before starting your final assignme.docxPlease read ALL directions below before starting your final assignme.docx
Please read ALL directions below before starting your final assignme.docx
 
Please pay attention to the topicZero Plagiarisfive referenc.docx
Please pay attention to the topicZero Plagiarisfive referenc.docxPlease pay attention to the topicZero Plagiarisfive referenc.docx
Please pay attention to the topicZero Plagiarisfive referenc.docx
 
PLEASE OPEN THE ATTACH MENTWhen a dietary supplement is consid.docx
PLEASE OPEN THE ATTACH MENTWhen a dietary supplement is consid.docxPLEASE OPEN THE ATTACH MENTWhen a dietary supplement is consid.docx
PLEASE OPEN THE ATTACH MENTWhen a dietary supplement is consid.docx
 
Please make sure that it is your own work and not copy and paste. Wa.docx
Please make sure that it is your own work and not copy and paste. Wa.docxPlease make sure that it is your own work and not copy and paste. Wa.docx
Please make sure that it is your own work and not copy and paste. Wa.docx
 
please no plagiarism, 5 pages and fallow the rubic Quantitat.docx
please no plagiarism, 5 pages and fallow the rubic Quantitat.docxplease no plagiarism, 5 pages and fallow the rubic Quantitat.docx
please no plagiarism, 5 pages and fallow the rubic Quantitat.docx
 
Please make sure to follow the below.Please note that this is .docx
Please make sure to follow the below.Please note that this is .docxPlease make sure to follow the below.Please note that this is .docx
Please make sure to follow the below.Please note that this is .docx
 
Please make revision in the prospectus checklist assignment base.docx
Please make revision in the prospectus checklist assignment base.docxPlease make revision in the prospectus checklist assignment base.docx
Please make revision in the prospectus checklist assignment base.docx
 
Please note research can NOT be on organization related to minors, i.docx
Please note research can NOT be on organization related to minors, i.docxPlease note research can NOT be on organization related to minors, i.docx
Please note research can NOT be on organization related to minors, i.docx
 
please no plagiarism our class uses Turnitin  You are expected to pr.docx
please no plagiarism our class uses Turnitin  You are expected to pr.docxplease no plagiarism our class uses Turnitin  You are expected to pr.docx
please no plagiarism our class uses Turnitin  You are expected to pr.docx
 
Please know that the score is just a ball-park and d.docx
Please know that the score is just a ball-park and d.docxPlease know that the score is just a ball-park and d.docx
Please know that the score is just a ball-park and d.docx
 
Please note that the Reflections must have 1. MLA format-.docx
Please note that the Reflections must have 1. MLA format-.docxPlease note that the Reflections must have 1. MLA format-.docx
Please note that the Reflections must have 1. MLA format-.docx
 
Please make sure you talk about the following  (IMO)internati.docx
Please make sure you talk about the following  (IMO)internati.docxPlease make sure you talk about the following  (IMO)internati.docx
Please make sure you talk about the following  (IMO)internati.docx
 

Recently uploaded

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 

Recently uploaded (20)

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

The intelligence community has not always learned the lessons of i.docx

  • 1. The intelligence community has not always learned the lessons of its successes and failures. Lowenthal (2012) suggests a couple of reasons for why this might be: · First, intelligence consumers keep the intelligence community busy. Intelligence analysts and their managers rarely feel they have time to withdraw from their day-to-day work to assess the effectiveness of that work. We have already mentioned several times how analysts working in fast-paced, tactical environments are often hard-pressed managing their time to produce intelligence products, as it is, leaving little to no opportunity to learn from one’s mistakes or successes. · Second, members of the intelligence community tend to treat their products in a take-it-or-leave-it manner. If a decision- maker chooses poorly based on a less than perfect intelligence product, then the fault falls to him or her for failing to make wise choices. Intelligence analysts take pride in their technical competence and have a tendency to resist being audited or having their work reviewed. As a consequence, self-reflection seems to occur as a reaction to a failure rather than as part of a standard operating procedure. Intelligence Analysis: Process or Project? We often seem to straddle the line between thinking about intelligence analysis as a process and as a project. Seeing it as a process allows us to take a more organic approach, emphasizing what Clark (2007) would call its ‘social nature’. Intelligence as a process gives primacy place to its character as a fluid, continuous activity underlying ongoing operations. It also allows us to fall into the trap of thinking that the way in which we work has no end point, excusing our professed inability to stop and assess the quality of our work. Many aspects of intelligence analysis, however, might benefit better from approaching it as a field of practice in which we manage projects.
  • 2. The Project Management Institute defines a project as “a temporary endeavor undertaken to create a unique product, service, or result” (2008, p. 5). Projects are understood in contrast to processes, which are ongoing, repetitive efforts following an organization’s standard procedures. Projects are distinct from processes not only because projects result in something new, but because they involve the uncertainties of creating something new. In criminal intelligence analysis, we already often deal with cases in our everyday lives that have specific starting points and specific ending points concluding with a specific product – hopefully a conviction in our case. Despite their resemblances, it would be fair to say that no two cases are exactly alike, which means every case results in ‘a unique product, service, or result’. When we think of cases as the result of finished projects, then we might think of criminal intelligence analysis – in so far as it contributes to cases – as projects themselves. The Project Management Institute states that recording experiences should be a priority for any organization that manages the uncertainties inherent in creating a new product. Lessons learned and historical information contribute to an organization’s knowledge base. A lessons learned record should include all the documents related to an intelligence analysis operation. Records should outline each major step in the operation and state the thought processes behind any major decisions. Since all intelligence analysis involves risk and uncertainty, the record should state areas were key assumptions were made and what steps were taken to manage risk. · A lessons learned body of knowledge is more than just a dossier of documents describing what happened. It also includes assessments of the product’s overall effectiveness, areas of unforeseen successes, and recommendations for how challenges might be overcome if faced in the future. On the first point, it should include feedback from end users on how well final products met their needs. On the second and third points, all analysts experience variances in the quality of
  • 3. their work. Performing quality control requires identifying the reasons behind these variances, articulating corrective actions taken, and measuring their performances. Ideally, this activity will take place throughout the intelligence cycle, but at a minimum they should be performed at the end of a substantial project or case. Lessons Learned Initiatives The intelligence community as a whole has seen a shift in its composition that has affected the level of technical expertise in its ranks (Lowenthal, 2012). At the national level, the Cold War spurred large investments in a robust intelligence collection and analysis capacity. With its conclusion in the 1990s, many older, experienced intelligence professionals retired from the community and were not replaced thanks to budget cuts correlating to a reduction in defense spending in general. After the attacks of September 11, 2001, the intelligence community received a rapid injection of funding that in some respects surpassed its ability to absorb. Young analysts were hired, sped through abbreviated training programs, and set to work on intelligence problems for which they were often ill prepared. They had access to only a limited numbers of mentors, most of who had spent their careers addressing traditional threats through traditional means that could not manage the level of complexity new threats involved. · Meanwhile, intelligence reforms focused on strengthening intelligence collection capabilities and cross-agency information sharing, leaping over the need to advance the field of intelligence analysis. The DNI eventually identified this omission and has since sought to build a lessons learned knowledge base that can be re-invested into the intelligence community, but levels of investment in terms of time, funds, and personnel seem to remain a low priority. A few examples in the intelligence community do exist for proactively assessing the quality of one’s work and building a body of knowledge based on an analysis of past experience. For instance, the U.S. Army operates a Center for Army Lessons
  • 4. Learned (CALL). CALL issues a wide array of succinct handbooks for military commanders on dealing with challenges that influence their mission success in the contemporary operational environment. CALL relies on a rotating group of professionals with operational experience in various areas deemed critical for mission success. These professionals have worked on the ground in environments where key challenges have been identified. In between these field experiences, they are called upon to meet with others who work under similar conditions, to interview them on what went well (and what went poorly), and to process this information into suggestions for the future. A review of the CALL website reveals papers on supporting Agribusiness in Afghanistan, paying informants in a deployed environment, responding to disasters, and even setting up a lessons learned program at the unit level. The intention is to keep commanders informed about new trends that affect their operations and to increase the overall quality of their decision-making. The other branches of the military have their own, similar versions. In 2004, the Department of Justice established the Criminal Intelligence Coordination Council (CICC)to implement 28 recommendations stated in the National Criminal Intelligence Sharing Plan. The CICC’s stated mission is to support the development of criminal intelligence standards for information sharing, technologies, and training. The CICC operates the National Criminal Intelligence Resource Center (NCIRC), but it is only available on secure networks used within criminal intelligence organizations. The emphasis of the CICC and the NCIRC does not appear heavily focused on the development of criminal intelligence analytical tradecraft, echoing the persistent need Heuer and Pherson describe for supporting increased professional competence of intelligence analysts at all echelons. The most dynamic area of analysis about intelligence analysis may be the academic research sector. Independent universities, government-funded think tanks, and non-governmental
  • 5. organizations have made active contributions to the public’s understanding of intelligence analysis and have increased the intelligence community’s awareness of best practices by leaps and bounds. · An example of such work, made available for your review as this week’s supplementary material, is a short book published by the Joint Military Intelligence College to educate competitive intelligence professionals about intelligence analysis lessons learned from the national and military intelligence sectors (Krizan, 1999). Though it predates post-9/11 intelligence reforms and so it does not address common intelligence practices exactly as we have addressed them in this course, it does provide an example of information sharing across intelligence disciplines at the macro- level. During Week 2 we looked Hansen’s article on the future of US intelligence (2004), which was published in the International Journal of Intelligence and Counterintelligence – a very useful resource of tracking trends in research about the field of intelligence and intelligence analysis. The journal Intelligence and National Security covers historical reviews of intelligence issues, while theJournal of Homeland Security and Emergency Management focuses on reporting innovations in field operations and cutting edge academic research primarily focused on the state and national levels. As students of intelligence analysis, we should develop an awareness of other journals and the work of specific researchers on areas of our interest that appear in journals not specific to intelligence. Victory! Welcome to the final chapter in the story of our 8-week exploration of criminal intelligence analysis. We have talked about tools and techniques used to process and exploit intelligence information in order to produce intelligence products. And we have seen how many of these activities fit
  • 6. within the broader scope of the intelligence analysis enterprise. Finally, we have applied these discussions toward adapted real- world scenario. Now it is time to pause a moment, to organize our materials, and to make a record of our successes and failures, our challenges and our learning, so that those who come after us will have the advantage of our insights and experience. Scenario Last week, Chief Heaton authorized a raid against El Movi based on your recommendations. The action led to the successful apprehension of its targets without anyone getting hurt. While some of the members of the organization not present where direct action occurred did escape, Chief Heaton is confident that over time they will surface again. For now, prosecutions are underway. But perhaps more importantly, El Movi is no longer a functioning organization and its victims are safe. Chief Heaton has been impressed with the quality of your work overall on this case. He started out somewhat skeptical about your use of statistics, complicated computer programs, and structured analytic techniques, but now he sees the value of them. He wants you to close out your work by producing your own assessment of your efforts so the TPD can retain a record of your experience. He wants you and your office to keep such records from now on so that he can use them to justify more investment in the criminal intelligence analysis section and you can use them to train new criminal intelligence analysts coming on board to the organization for the first time. While this final report will describe each of the major steps taken in the El Movi case, the emphasis is on assessing your experience working through the case. Begin the report with a timeline of all the major events in the case, ensuring you indicate where in the timeline your products fall. For each of your products, briefly respond to the following questions: · What was the most helpful about the technique I used to create
  • 7. this product, and why? · What was the biggest hindrance of the technique I used to create this product, and why? · What other technique or aspect of another technique would have helped me overcome this hindrance to create a better product, and why? Close out your report by finishing the following sentences about your work on the case as a whole: · The moment when I was the most engaged, excited, and involved in the case was when… · The moment when I was the most distanced, disengaged, and uninvolved in the case was when… · I would like to say about my experience as a criminal intelligence analysis on this case that… · The one piece of advice I would give the next person who works on a similar case using similar techniques is… Chapter 13 Treason Treason is the only crime defined in the U.S. Constitution. The revolutionaries who wrote the U.S. Constitution knew very well the new government they were about to create couldn’t survive without the active support (or at least the passive submission) of most of the people. They also realized it was going to be some time before this new republican form of government took hold among the people. The people’s allegiance would be especially important to the newborn nation’s survival in the early years following the Revolution, a time of gigantic threats from enemies inside and outside the new country. Everything they did to further the interests of the colonies was done under threat of prosecution for treason. English prosecutions for treason weren’t pretty. The authors of the Constitution worried that treason law would be abused because of two concerns:
  • 8. 1. that peaceful opposition to the government, not just rebellion, would be repressed 2. that innocent people might be convicted of treason because of perjury, passion, and/or insufficient evidence. They were determined that disloyal feelings or opinions and the passions of the time wouldn’t be a part of the law of treason. As much as they recognized the need for allegiance to the new government, their fear of abusive prosecutions for treason led them to adopt limitation. By the time the Constitution was adopted, the new government and current thinking among the governing class came to limit treason to two disloyal behaviors: · levying war against your own country · giving aid and comfort to the enemy The authors of the Constitution adopted these two acts and then, for more protection, added three more limits to the reach of treason: · they banned legislatures and courts from creating new treasons; · they required two witnesses to at least one overt (unconcealed) act of treason or a confession in open court; · they wrote these limits into the body of the U.S. Constitution. Treason consists of three elements. · First, treason actus reus consists of either levying war against the United States or giving aid and comfort to the enemies of the United States. · Second, treason mens rea consists of intentionally giving aid and comfort for the very purpose of betraying the United States. · Third, proof of treason requires either two witnesses to the actus reus or confession in open court. Distrust of treason prosecutions didn’t end with the adoption of the Constitution. Throughout U.S. history, the government has prosecuted only a handful of people for treason, and presidents have pardoned or at least mitigated death sentences of most of those few who’ve been found guilty. Sedition, Sabotage, and Espionage
  • 9. Treason isn’t the only crime aimed at combating disloyalty and keeping the allegiance of our citizens. Advocating the violent overthrow of the government is called sedition. The “stirring up” could be done by speeches (seditious speech), writings (seditious libel), or agreement (seditious conspiracy). In the Smith Act of 1940, Congress made it a crime to conspire to teach or advocate overthrowing the government by force or to be a member of a group that advocated the violent overthrow of the government. Sabotage is the crime of damaging or destroying property for the purpose of interfering with and hindering preparations for war and defense during national emergencies. The sabotage levels of culpability vary. Most often, it’s “willfully,” sometimes “with intent to,” and at least once “with reason to believe.” Whatever the exact words, it’s probably closest to the highest levels of culpability—purposely and/or knowingly. The U.S. Code (2006, Title 18, Chapter 37, § 794) separates espionage into two crimes: · (1) espionage during peace · (2) espionage during war. Espionage is spying for the enemy. The crime of espionage during war consists of collecting, recording, publishing, or communicating (or attempting to do any of these) “any information” about troop movements, ships, aircraft, or war materials and any other information “which might be useful to the enemy.” · The penalty is death or any term of imprisonment up to life (§794[b]). By the middle of the 1920’s, large scale sedition prosecutions under the Espionage Act largely disappeared. But it didn’t die. This is especially true during times like World War II, the Cold War, the Vietnam War, and now in Iraq and Afghanistan, when U.S. troops are engaged in combat and dangerous peacekeeping operations abroad. The U.S. Government has occasionally prosecuted these employees. Now, the Espionage Act is back. Since 2009, the U.S. Government has charged six U.S. Government employees
  • 10. under the Act: Bradley Manning; Thomas Drake; Shamai Leibowitz; Stephen Jin-Woo Kim; Jeffrey Sterling; and John Kirakou. Terrorism and Anti-Terrorism Terrorism and Anti-Terrorism Crimes Terrorism is the use of violence or intimidation in the pursuit of political aims. A number of sections of the U.S. Code are available for prosecuting crimes related to terrorists and terrorist organizations. There are some specific antiterrorism crimes—mainly, U.S. Code Chapter 113B, “Terrorism” (Title 18, Part I), the Anti- Terrorism and Effective Death Penalty Act (AEDPA) (1996), and the USA Patriot Act (2001). The code divides terrorism into two kinds: international terrorism and domestic terrorism. According to the U.S. Code (2006), it’s a felony punishable by up to life imprisonment, or execution if someone dies, to use, to threaten to use, or attempt or conspire to use, a weapon of mass destruction against a U.S. citizen outside the United States (Title 18, Part I, Chapter 113B, § 2332a); any person or property inside the United States (§ 2332a); any property owned, leased, or used by the U.S. government inside or outside the United States (§ 2332a[3]); or any property owned, leased, or used by a foreign government inside the United States (§ 2332a[4]). The actus reus of harboring or concealing consists of harboring or concealing persons who have committed or are about to commit a list of terrorist-related crimes. The mens rea of harboring or concealing requires knowing (or that a reasonable person should have known) the actus reus of harboring or concealing was about to be committed. The penalty is a fine or up to 10 years of imprisonment. The felony of providing material support was first created in the 1996 Anti-Terrorism and Effective Death Penalty Act (AEDPA) (§ 323), which was aimed at domestic terrorist acts. The crimes of providing material support to individuals or organizations are proximity crimes.
  • 11. The term “training” means instruction or teaching designed to impart a specific skill, as opposed to general knowledge. The term “expert advice or assistance” means advice or assistance from scientific, technical, or other specialized knowledge. No person may be prosecuted under this section in connection with the term “personnel” unless that person has knowingly provided, attempted to provide, or conspired to provide a foreign terrorist organization with 1 or more individuals (who may include himself) to work under that terrorist organization’s direction or control, or otherwise direct the operation of that organization. As of September 2010, the U.S. Government had prosecuted about 1,000 terrorist cases since September 11, 2001 (TTRC 2010, 6). The top plots include only defendants inspired by jihadist ideas, namely “defendants who were formally or informally associated with an Islamist terror group—whether one with a global jihadist ideology (Al Qaeda) or a local Islamist movement (Hamas). It also includes defendants unaffiliated with a terror group who aspired to such affiliation or who subscribed to a global jihadist ideology (TTRC 2011, 7). But it excludes terror cases not inspired by jihadist ideas, like far right (militias) or far left (environmentalist extremists). Is the U.S. creating its own terrorists? Yes, according to the Law and Security Center. Eighty one percent(127) of the defendants in the top 50 plot cases were legal residents of the U.S. Seventy-three (57%) were born in the U.S.; the rest had lived in the U.S. for at least 10 years and several as long as 20 years, long enough to become familiar with U.S. culture and habits (TTRC 2010, 3). Homegrown terrorist defendants have been among high profile cases ever since 2001, but the number seemed to spike in 2010, partly because of lengthy investigations. Furthermore, some defendants spent years trying to become terrorists before they were arrested.
  • 12. The statutes charged in the top 50 terrorist cases include: providing material support to terrorists; providing material support or resources to designated foreign terrorist organizations; use of weapons of mass destruction; prohibitions against the financing of terrorism; and receiving military-type training from a foreign terrorist organization. The predominant number of cases are “material support” offenses to terrorists and terrorist organizations. A number of lower courts have decided challenges to the constitutionality of the “material support” sections. They have reached conflicting results. Then in 2010, the U.S. Supreme Court decided that as applied to the facts of the case in Holder v. Humanitarian Law Project that the “material support” for terrorist organization was neither constitutionally vague, nor did it violate the First Amendment speech and assembly rights.