Rethinking the Intelligence Cycle for the Private Sector

Total Page:16

File Type:pdf, Size:1020Kb

Rethinking the Intelligence Cycle for the Private Sector RETHINKING THE INTELLIGENCE CYCLE FOR THE PRIVATE SECTOR By: Daniil Davydoff Author Bio: Daniil Davydoff is manager of global security in- public sector, the cycle must adapt to private sector realities, telligence at AT-RISK International and director of social media including new consumers, new requirements, limited resourc- for the World Affairs Council of Palm Beach, Florida. Davydoff’s es, and, at the core, a new mission. work has been published by Foreign Policy, Risk Manage- There are many ways to describe the intelligence cycle (or ment, The National Interest, The Carnegie Council for Ethics in “the cycle” as it is sometimes referred to). In short, it is both a International Affairs, and RealClearWorld, among other outlets. theoretical and practical model for conducting the intelligence His views do not necessarily reflect those of his company or of process. Although there are many variations, the cycle usually ASIS International. consists of six steps: planning and direction; collection; process- ing; analysis and production; dissemination; and evaluation and feedback. What is the intelligence cycle and why do we use it? In one imagined scenario, these steps would be implemented in Successful security risk management involves careful plan- the following manner: ning and preparedness rather than ad-hoc crisis response. Successful intelligence analysis requires something similar, The head of corporate security reports from a meeting of and for specialists in this field the intelligence cycle serves as executives that the company is planning to build a facility in a planning and preparedness blueprint. But just as any set another country. Senior leaders need intelligence on security of guidelines must be regularly updated to be effective, the risks around the planned site, and you agree to create a report intelligence cycle needs to be reevaluated for its new life in on crime, terrorism, and natural disaster risks in two weeks corporate security. As a tool that has been perfected in the (planning and direction). As head of the intelligence team, you Figure – Key Steps of the Intelligence Cycle find raw information from local media Much of the criticism has decried the reports, law enforcement records cycle’s oversimplification of the 1. Planning for the area, and credible di- intelligence analysis process & Direction 2. Collection saster risk databases (collec- and its inaccuracy. Are there tion). After considering the enough steps? Who actu- reliability of the sources ally drives the cycle? Is and converting the raw the cycle unidirectional data into easy-to-read or does it really flow graphs (processing), both ways? These and you decide which many other questions information to use. are routinely discussed Now it’s time to write 6. Evaluation 3. Processing regarding the cycle’s the actual report & Feedback usefulness or need for (analysis and produc- revisions. tion), and submit it via email and hardcopy to This begs the question the interested com- of whether a reevalu- pany’s decision makers ation is needed. Some (dissemination). Via the would make the case that rethinking the model is head of corporate security, 4. Analysis 5. Dissemination unnecessary. The intelligence you check in two weeks later & Production to find out how the report was cycle was always meant as a received (evaluation and feedback). rough model with the key being the fluidity of its application to any environ- This approach is useful across most types ment, whether public or private. It is true that of intelligence work, whether protective intel- many of the current challenges facing the traditional ligence or global security intelligence. In recent years, even intelligence cycle model can be resolved by adaptable analysts investigators have adapted the cycle to serve their needs. and good training. Having said that, considering the nature of Of course, the intelligence cycle’s usefulness is not the only these challenges is itself a needed exercise. reason that it is has become both the standard reference point for analysts and a framework for many private-sector analyst Although the cycle has faced myriad criticisms, the premise of training programs. When government employees move into this white paper is that private sector analysts have a special the private sector, they bring the cycle with them. set of obstacles and considerations at each step of the model. This is due to some of the elements that distinguish the pri- At the lower levels of the corporate intelligence ladder, vate sector from the public, including (but not limited to): intelligence analysts come from a diversity of backgrounds. One can find among them English and psychology graduates, • The wider variety of hierarchies and reporting line young regional specialists, data-savvy social media analysts, types and budding think-tankers. The middle and top sections of the • Different rates and priorities concerning technology ladder are starting to diversify, but it is well known that former implementation military and three-letter-agency employees still are hired dis- • Higher variation in workplaces proportionately within corporate security departments. Intelli- gence leaders, therefore, have been raised on the intelligence • Widely different organizational goals cycle, and whether or not they innovate in other areas, many • Potentially faster rates of change, growth, and consider the cycle a fundamental model to follow. organizational restructuring Challenges facing the intelligence cycle model • Limited resources for security in relation to other institutional focus areas There’s a degree of uncertainty regarding the origins of the intelligence cycle. Depending on whom you ask, it was There is an important caveat to these distinguishing charac- conceived around the time of the French Revolution or during teristics, namely that they are trends rather than certainties. World War I. In any case, it seems to have become an intelli- Regarding limited resources, for example, there are many gov- gence community staple in the Cold War period, and during ernment agencies that would dream of having the resources that time, there was no shortage of criticism of the model. commanded by protective intelligence teams for some major companies. 2 Steps of the cycle and the private sector had to explain her role as advisor and inform the individual that To dig deeper into how the intelligence cycle may be affected his primary responsibility was to use the gathered intelligence by these factors, we can consider each phase of the cycle in to inform his decisions. turn. Step: 2 – Collection Step: 1 - Planning and Direction For most intelligence analysts, the collection step will be the Establishing the recipient’s intelligence requirements is one of most obviously different between the public and private sec- the most critical steps, because understanding customer needs tors. In short, the private sector analysts need to be more ver- aids the team in structuring a project and pursuing certain types satile to be effective. Whereas government analysts are often of intelligence. In the public sector, this step is fairly straightfor- hyper-specialized, with some focusing on human intelligence ward. A government institution or senior official has an “ask” on (HUMINT) and others focused on signals intelligence (SIGINT), a security issue, and intelligence personnel pursue the informa- private sector teams are, in some sense, “any source any time.” tion, whether the subject is government instability, terrorism, or This is partially due to raw team size. Even the wealthiest cor- another threat. In the private realm, intelligence consumers may porations do not usually devote enough resources to security have only elementary levels of knowledge on threats, requiring generally, and certainly not to maintaining large intelligence basic research from intelligence teams. Christopher Broomfield, departments. a global security and threat analyst for Carnival Corporation, The leanness confers both advantages and disadvantages and former intelligence officer with the U.S. government, notes onto private sector intelligence gathering. On one hand, small that: teams mean risks on the intelligence continuity front. Should . private sector analysts must uncover security issues and one analyst leave a three-letter agency in Washington, the events which are not necessarily apparent but could impact impact will likely be less severe than the departure of one of business operations, and be able to quickly find and provide four analysts for a large multinational. The latter probably has a relevant findings for decision makers. In addition, they often greater amount of wide-ranging knowledge on critical sources need to address stakeholders who are not familiar with the company needs to follow, as well as a better understanding specific transnational issues and explain how these could of operations at the company. present challenges to the business environment. On the plus side, having fewer resources encourages analysts In some cases, private sector consumers may not have a good to become experts in utilizing open-source intelligence (OSINT) notion of what is needed, so the process should be reversed, to a greater degree than those in the public sector. It is com- with the corporate analysts being more proactive to “push” their monly stated that 90 percent of critical intelligence is open- ideas in creating a research plan. This issue is not unique to the source, so this is a major strength. In fact, it is a strength
Recommended publications
  • Law Enforcement Intelligence (Chapter 5)
    The Intelligence Process 5 CHAPTER FIVE The Intelligence Process In defining intelligence, it was previously noted that the key factor that transforms information to intelligence is analysis. The British National Crime Squad, when referring to intelligence, observed the following: The processing of reliable intelligence is the cornerstone of successful law enforcement. Analysis organizes and interprets the intelligence in a way that significantly enhances its value and the possibility of its success in combating organized crime. Analysis identifies and predicts trends, patterns or problem areas requiring action.69 57 Many larger law enforcement agencies have an intelligence unit, but in too many cases the unit is limited in its utility because of failures in structure or direction.70 Perhaps the most common limitation is that the unit collects, but does not analyze information. Instead, the information is stored in a database simply awaiting access. For example, in some agencies field interview reports are managed by the intelligence function. While this descriptive report on an intelligence subject typically is forwarded to the intelligence unit, too often it is only entered into a database. When information sits passively in an information system, its use will be limited. If, however, the intelligence unit closely examines, analyzes, and compares the field interview forms with other information, the information can be used more effectively. Having a group of people whose primary job is simply responding to information requests about possible wanted subjects but not providing proactive analysis is not a contemporary intelligence unit. 69 See All too frequently when an intelligence unit performs some type of analysis, http://www.nationalcrimesqua d.police.uk no distinction is made within the unit about the different types of 70 In a survey conducted by the intelligence outputs and how they can contribute to the agency's goals.
    [Show full text]
  • Inside Russia's Intelligence Agencies
    EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat.
    [Show full text]
  • National Criminal Intelligence Sharing Plan T S R T Global Justice a I P C
    NT O E F M JU T S R T A I P C E E D United States Department of Justice Solutions and approaches for a cohesive plan to improve our nation’s ability to develop and share criminal intelligence October 2003 T O VersionEN 1.0F M JU National Criminal Intelligence Sharing Plan T S R T Global Justice A I P C E E D Information Sharing Initiative United States Department of Justice The National Criminal Intelligence Sharing Plan Solutions and approaches for a cohesive plan to improve our nation’s ability to develop and share criminal intelligence October 2003 National Criminal Intelligence Sharing Plan Version 1.0 This document was prepared under the leadership, guidance, and funding of the Bureau of Justice Assistance (BJA), Office of Justice Programs, U.S. Department of Justice, in collaboration with the U.S. Department of Justice’s Global Justice Information Sharing Initiative. The opinions, findings, and conclusions or recommendations expressed in this document are those of the authors and do not necessarily represent the official position or policies of the U.S. Department of Justice. This project was supported by Award No. 2000-LD-BX-0003, awarded by the Office of Justice Programs. Version 1.0 National Criminal Intelligence Sharing Plan Table of Contents Executive Summary .....................................................................iii Acknowledgements ................................................................... ix The Rationale for the National Criminal Intelligence Sharing Plan ...............................................................................1
    [Show full text]
  • Intel Management Model for Europe
    INTELLIGENCE MANAGEMENT MODEL FOR EUROPE PHASE ONE Guidelines for standards and best practice within the analysis function Contents Foreword 5 Acknowledgements 6 1. Executive Summary 7 Recruitment 8 Trainee Analyst - The Benefits 9 Training Programme for Police Analysts 10 Intelligence Training for Law Enforcement Personnel 10 Career Structure for Analyst Personnel 11 2. Recruitment 12 Person Specification 12 Pre-Selection 15 The Interview 15 3. Trainee Analyst - The Benefits 17 The Police Service of Northern Ireland 17 Belgian Federal Police 19 4. Training Programme for Police Analysts 20 Approach 1: The Police Service of Northern Ireland 20 Approach 2: The Belgian Federal Police 21 Approach 3: National Criminal Intelligence Service (NCIS) UK 22 5. Intelligence Training for Law Enforcement Personnel 23 Probationary Officers 23 Intelligence Officers 24 Analyst Managers 26 6. Career Structure for Analyst Personnel 28 7. Recommended References 30 3 List of Figures Figure 1: The Intelligence Cycle 7 Figure 2: Person Specification for Intelligence Analyst 14 Figure 3: PSNI Analyst Development Programme 18 Figure 4: Organisational Structure for Analysts - Strathclyde Police 28 Figure 5: Organisational Structure for Analysts - PSNI 29 4 Foreword The first tentative steps towards the development of an Intelligence Management Model for Europe were taken during early 2001. It was then that consideration was given to a proposed agenda for the forthcoming European Heads of Training Conference to be held in Scotland in June that same year. Many such conferences, in all disciplines, provide useful guidance and information to those in attendance. Often however there is little or no resultant legacy in terms of actual and tangible continuous development.
    [Show full text]
  • Open Source Intelligence (OSINT)
    ATP 2-22.9 Open-Source Intelligence July 2012 DISTRIBUTION RESTRICTION: Unlimited Distribution Headquarters, Department of the Army *ATP 2-22.9 Army Techniques Publication Headquarters No. 2-22.9 (FMI 2-22.9) Department of the Army Washington, DC, 10 July 2012 Open-Source Intelligence Contents Page PREFACE.............................................................................................................. iv INTRODUCTION .................................................................................................... v Chapter 1 OPEN-SOURCE INTELLIGENCE (OSINT) FUNDAMENTALS ........................ 1-1 Definition and Terms .......................................................................................... 1-1 Characteristics .................................................................................................... 1-1 The Intelligence Warfighting Function ................................................................ 1-2 The Intelligence Process .................................................................................... 1-3 The Planning Requirements and Assessing Collection Process ........................ 1-4 The Military Decisionmaking Process ................................................................ 1-4 Intelligence Preparation of the Battlefield ........................................................... 1-5 Chapter 2 PLANNING AND PREPARATION OF THE OSINT MISSION ............................. 2-1 Section I – Planning OSINT Activities ...........................................................
    [Show full text]
  • Law Enforcement Intelligence: a Guide for State, Local, and Tribal Law Enforcement Agencies Second Edition
    U. S. Department of Justice Office of Community Oriented Policing Services Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies Second Edition David L. Carter, Ph.D. School of Criminal Justice, Michigan State University Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies Second Edition David L. Carter, Ph.D. School of Criminal Justice, Michigan State University This project was supported by Cooperative Agreement #2007-CK-WX-K015 by the U.S. Department of Justice Office of Community Oriented Policing Services. Points of view or opinions contained in this publication are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice or Michigan State University. References to specific agencies, companies, products, or services should not be considered an endorsement by the author or the U.S. Department of Justice. Rather, the references are illustrations to supplement discussion of the issues. Letter from the COPS Office January 2009 Dear Colleague: This second edition of Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement captures the vast changes that have occurred in the 4 years since the first edition of the guide was published in 2004 after the watershed events of September 11, 2001. At that time, there was no Department of Homeland Security, Office of the Director of National Intelligence, Information-Sharing Environment, or Fusion Centers. Since the advent of these new agencies to help fight the war on terror, emphasis has been placed on cooperation and on sharing information among local, state, tribal, and federal agencies.
    [Show full text]
  • Office of Intelligence and Analysis Strategic Plan, FY 2020-2024
    UNCLASSIFIED//FOR OFFICIAL USE ONLY DELIBERATIVE DOCUMENT NOT FOR DISSEMINATION UNCLASSIFIED//FOR OFFICIAL USE ONLY DELIBERATIVE DOCUMENT NOT FOR DISSEMINATION UNCLASSIFIED//FOR OFFICIAL USE ONLY DELIBERATIVE DOCUMENT NOT FOR DISSEMINATION UNCLASSIFIED//FOR OFFICIAL USE ONLY DELIBERATIVE DOCUMENT NOT FOR DISSEMINATION UNCLASSIFIED//FOR OFFICIAL USE ONLY DELIBERATIVE DOCUMENT NOT FOR DISSEMINATION I am pleased to publish the Office of Intelligence & Analysis Strategic Plan for Fiscal Years 2020-2024. This document provides a holistic approach that will guide the continued evolution of the Office over the next five years and serves as a foundational document for how DHS Intelligence executes its broad mission and vision. Following the September 11th, 2001 terrorist attacks, the Homeland Security Act of 2002 created the Department of Homeland Security and the Implementing Recommendations of the 9/11 Commission Act of 2007 established the Office of Intelligence & Analysis as the first federal agency statutorily mandated to share intelligence with state, local, tribal, and territorial law enforcement, as well as the private sector—creating the necessity for a comprehensive approach and strategy to Homeland security. I&A provides timely, actionable intelligence to a far-reaching base of customers and partners—from the DHS Secretary and Components, policymakers, and the Intelligence Community to an expansive network of state, local, tribal, territorial, and private-sector partners with both national and global influence. Therefore, this strategy outlines a forward-leaning approach to provide dominant capabilities and anticipatory intelligence to meet the diverse needs of DHS partners, customers, and stakeholders. The threat environment is never static, thus I&A will remain dynamic in its actions to combat the challenges of today, as well as the future, through partnerships, information sharing, and a concrete understanding of the evolving landscape at home and beyond our Nation’s borders.
    [Show full text]
  • Outsourcing Intelligence Analysis: Legal and Policy Risks
    STUDENT NOTE Outsourcing Intelligence Analysis: Legal and Policy Risks Joshua R. Storm* INTRODUCTION Intelligence reduces uncertainty in con¯ict, whether in trade negotiations between allies with similar, but individual interests, or in combat operations against a foreign state or terrorist group.1 Providing this intelligence involves col- lecting, processing, analyzing, and disseminating information to decision mak- ers.2 Key among these is analysis, de®ned by the R AND Corp. as ªthe process by which the information collected about an enemy is used to answer tactical ques- tions about current operations or to predict future behavior.º3 Beyond the tactical level, analysis is also necessary to provide the strategic and operational intelli- gence required to establish overarching policies and to develop operational plans to execute those policies. 4 In this manner, analysis is one of the most critical func- tions provided by the civilian and military entities that make up the intelligence community (IC). At the same time, analysis often is not performed by govern- ment personnel. For example, of core contract personnel within the intelligence community, 19 percent directly supported analysis and production as of 2007.5 This note explores the rise of outsourcing in the intelligence community and examines the legal and policy implications of outsourcing intelligence analysis in particular. First, it discusses the organizational and operational pressures that led to the increased use of contractors in the intelligence community after the September 11, 2001 attacks. Next, it identi®es the origins of the inherently gov- ernmental function test, used to determine when a government activity be out- sourced.
    [Show full text]
  • The Intelligence Cycle*
    Open Journal of Political Science, 2018, 8, 35-46 http://www.scirp.org/journal/ojps ISSN Online: 2164-0513 ISSN Print: 2164-0505 The Intelligence Cycle* Antonella Colonna Vilasi Centro studi Uni, Rome, Italy How to cite this paper: Colonna Vilasi, A. Abstract (2018). The Intelligence Cycle. Open Jour- nal of Political Science, 8, 35-46. Focusing on the Information Cycle, reference is made to the distribution ar- https://doi.org/10.4236/ojps.2018.81003 chitectures and the pathways that the various Intelligence products (journals, reports, alerts, forecasts) produce to the Administration (Intelligence Cycle). Received: November 9, 2017 Accepted: December 26, 2017 An introduction to any study on the Information loop needs a brief digression Published: December 29, 2017 to clarify concepts such as data, news, and information. Events mean any event or action that has been established to be true and/or has occurred and Copyright © 2018 by author and Scientific Research Publishing Inc. whose knowledge is assigned an information value; the information is the un- This work is licensed under the Creative clear cognition of a fact and/or a significant event related to topics of interest; Commons Attribution-NonCommercial information, in turn, is the product resulting from data following a frame of International License (CC BY-NC 4.0). processing, analysis, interpretation, comparison, reasoned integration and http://creativecommons.org/licenses/by-nc/4.0/ Open Access evaluation. Keywords Intelligence, Security, Intelligence Cycle, Politics, Society 1. Introduction According to the U.S. Marine Corps handbook: Counterintelligence (U.S. MARINE CORPS, 2007), “The Intelligence Cycle is a procedure frame work for the development of mission-focused Intelligence support.
    [Show full text]
  • Perspectives and Opportunities in Intelligence for U.S. Leaders
    Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE September 2018 CORTNEY WEINBAUM, JOHN V. PARACHINI, RICHARD S. GIRVEN, MICHAEL H. DECKER, RICHARD C. BAFFA Perspectives and Opportunities in Intelligence for U.S. Leaders C O R P O R A T I O N Contents 1. Introduction ................................................................................................. 1 2. Reconstituting Strategic Warning for the Digital Age .................................5 3. Unifying Tasking, Collection, Processing, Exploitation, and Dissemination (TCPED) Across the U.S. Intelligence Community ...............16 4. Managing Security as an Enterprise .........................................................25 5. Better Utilizing Publicly Available Information ..........................................31 6. Surging Intelligence in an Unpredictable World .......................................44 7. Conclusion .................................................................................................56 Abbreviations ................................................................................................57 References ....................................................................................................58 Acknowledgments ........................................................................................64 About the Authors .........................................................................................64 The RAND Corporation is a research organization that develops solutions to public policy challenges to help make
    [Show full text]
  • Critical Analysis of German Operational Intelligence Part II
    UNCLASSIFIED Critical Analysis of German Operational Intelligence Part II Sources of Intelligence work, and many German field orders stress the impor­ tance of the capture, preservation, and quick evalua­ The study of sources and types of intelligence tion of enemy documents; but they paid scant atten­ available to the Germans shows clearly how the inher­ tion to adequate training of personnel, and no ent weaknesses· of their intelligence system extended outstanding work seems to have been done. During the to their detailed work. The insufficient importance second half of the war, the amount of captured they attributed to intelligence meant that all its documents in German hands decreased, owing to the branches suffered from shortage of personnel and nature of their defensive warfare, and the opportunity equipment; and, although in some fields there was an for good document work became fewer. approach to German thoroughness, in the main the That the Germans were capable of good detailed lack of attention to detail was surprising. work is shown by their practice in the Internment The interrogation of prisoners of war, which they Center for Captured Air Force Personnel at Oberursel, regarded as one of their most fruitful sources of where all Allied air crews were first interrogated. The information, is a good example. In the beginning of German specialists here realized the value of combined the war, their need for detailed and comprehensive document and interrogation work, and devised an interrogation was small; but even later, a standard excellent system of analysis. In order to identify the OKH questionnaire was still being used and at no time units of their prisoners - a matter of the highest was much initiative shown on the part of interrogators.
    [Show full text]
  • ATP 2-33.4 Intelligence Analysis
    ATP 2-33.4 Intelligence Analysis JANUARY 2020 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes ATP 2-33.4, dated 18 August 2014. Headquarters, Department of the Army This publication is available at Army Knowledge Online (https://armypubs.army.mil), and the Central Army Registry site (https://atiam.train.army.mil/catalog/dashboard). *ATP 2-33.4 Army Techniques Publication Headquarters No. 2-33.4 Department of the Army Washington, DC, 10 January 2020 Intelligence Analysis Contents Page PREFACE............................................................................................................. vii INTRODUCTION ................................................................................................... xi PART ONE FUNDAMENTALS Chapter 1 UNDERSTANDING INTELLIGENCE ANALYSIS ............................................. 1-1 Intelligence Analysis Overview ........................................................................... 1-1 Conducting Intelligence Analysis ........................................................................ 1-5 Intelligence Analysis and Collection Management ............................................. 1-8 The All-Source Intelligence Architecture and Analysis Across the Echelons ..... 1-9 Intelligence Analysis During Large-Scale Ground Combat Operations ........... 1-11 Intelligence Analysis During the Army’s Other Strategic Roles ........................ 1-13 Chapter 2 THE INTELLIGENCE ANALYSIS PROCESS ..................................................
    [Show full text]