/* */

10 August 2008

Taking stock of the blogged literature of intelligence

Since starting this little project in January 2006, we have seen a frankly explosive growth in the blogged literature of intelligence – that is, the online discussion of the profession, its theory and its practice through texts circulated using lightweight publishing tools.

It has been a tumultuous time within the intelligence community itself, and also within the wider profession outside the boundaries of the traditional wheel of the sixteen primary agencies. This has very much been reflected in the literature that has emerged during this time period.

We are most heartened by the continued emergence of the practitioners – both retired and those currently serving – that reflect upon their lived experiences through this new and most accessible medium (recognizing, of course, the inevitable limitations of discretion required in such an open forum).

In particular, we are fascinated by the rapid development in 2008 of a large number of increasingly active bloggers addressing the private aspects of competitive intelligence and business intelligence. This community has never suffered from the same restrictions placed upon those in the service of the national interest, and had the means and history of rapidly adopting technologies to new ends. Yet these practitioners remained for the most part strangely silent until this year. Much credit for surfacing this growing community’s online writings should be given to the Society of Competitive Intelligence Professionals (SCIP), who now makes the highlights of this literature a centerpiece of the organization’s own online presence. And while the theory of these aspects of the profession has a long way to go before it can equal the more robust corpus of other elements of the field, both in national intelligence and homeland security / law enforcement intelligence, we are pleased to see great strides being made. We have also found that the experiential epiphanies reported by these individuals as they struggle with problems common to the practice of the art and science have great value as accessible (and unclassified) examples when teaching any new practitioners.

We have also remained cautiously optimistic regarding the emergence of the classified blogsphere, written within the restricted realms of other networks. For those practitioners who cannot discuss the subjects of their passions in open literature, it is essential – and is the only way many have to capture insights into theory and application that might otherwise be lost. And while one might view this material as useless to the academics and those private sector professionals outside of the classified realm, one must remember that much of the foundation of our current day literature is built upon those materials which were properly declassified in the fullness of time. So too will this material one day surface through the normal mechanisms of release and review – providing a rich trove for future historians and educators.

As much as we are pleased to see the development of a robust community of interest within the intelligence blogsphere, we would also wish for a greater level of original research to appear in this medium. Unfortunately, the incentive structure does not appear to be present for many academics, and there are far too many other pursuits conferring greater legitimacy to practitioners that serve to divert energies elsewhere. This must change, both for the sake of the blogsphere but also we believe for the sake of the profession itself. We are the first to recognize that blogging is not a public utility – it is the outgrowth of a personal passion; and it frequently must give way to other operational demands when it is solely a labour of love. This is perhaps the intelligence profession’s version of the eternal debate within the media blogsphere over primary news reporting versus punditry. However, we hold out hope – particularly example set by original research among the legal bloggers, who tend also to publish in more traditional channels, thus also proving the symbiotic relationship of these activities. Good blogging encourages good literature.

We also realize that starting – and maintaining – a good blog requires a tremendous commitment of time and energies, despite the many barriers which the lightweight publishing technology itself has already overcome. It is for this reason we re-iterate our offer to circulate the thoughts of those professionals – both those in practice or in the academy - who would wish to occasionally offer items of interest to the wider audience (respecting, of course, the requirements of non-disclosure agreements and the other sacred oaths sworn by those who still serve. In this, we follow the well considered lead of the Association for Intelligence Officers, reminding any contributors that “authors are responsible for compliance with restrictions and regulations regarding the publication and clearance of materials dealing with present or past employment”.)

Labels: , , ,

08 February 2008

The use of leaked documents in intelligence studies education

This issue has been weighing upon us for some time, and has sparked perhaps the most violent debate of any subject within a field already crowded with passionate viewpoints. It takes on new prominence this week with the actions of another intelligence studies professor (names are omitted to protect the guilty) at one of the more prominent institutions out there.

We are unabashed supporters of the use of declassified intelligence documents – including finished intelligence papers, raw cables and other message traffic, and any imagery that might be available. These are almost without exception historical in nature, and thus we also advocate the use of unclassified notional intelligence documents produced in the model of current approaches (differing only in those areas that classification requirements dictate). We admit that the latter requires a lot of hard work – both in finding the unclassified or declassified examples from which to build templates, as well as creating the notional products that the students will rely upon in class or in an exercise. Many academic programs simply forgo this altogether for this reason – understandably so, but frankly in our opinion to the detriment of students that need exposure to “real world” intelligence in a form that may be properly used in a classroom.

However, the use of leaked classified documents in education is another matter entirely. Too many prominent names in intelligence studies publishing pad out their books with leaked documents, many of which can be said to be exceptionally damaging to United States interests in the subject under discussion. We have over the years grudgingly assigned these texts, as the better authors still offer some value to students despite the damnable offense of perpetuating leaks. What is most unfortunate in these cases is that those authors – by virtue of unique analysis or concise presentation of complex topics – would be entirely compelling without the leaks, yet apparently do not have the confidence to stand on their own, or the intellectual integrity to present their own work unaided by stolen secrets.

Such matters have long troubled the field – and frankly, have done much damage to the establishment of a respected intelligence studies academia that interacts with its professional counterparts in a mutually beneficial fashion, instead of through parasitic and self-serving profiteering.

There is however a more disturbing recent trend, one abetted by the evolving issues that come hand in hand with widespread electronic dissemination of intelligence products, and the inevitable friction that occurs when attempting to cope with the proliferation of classified networks and channels under wartime conditions. This new issue is the unprecedented availability of still classified documents (and other media) in their original form; leaked from improper handling - or worse yet, deliberate disclosure - onto the public Internet. These are becoming distressingly common enough that there are even now sites dedicated to the propagation of such leaks.

Without commenting on any specific incident, it is understandable that some civilian academics might see these are rare opportunities to provide a window into current intelligence practices for their students. It is also entirely likely that the “cool” factor may have overwhelmed good judgment when dealing with these cases. But we are exceptionally concerned that these classified materials not be routinely incorporated into unclassified academic instruction. Nothing will do more damage to the discipline as quickly as such an outcome.

First, among those students in many unclassified classrooms there are those that hold current clearances or other professional affiliations that impose a proactive and affirmative burden on the individual to report the improper handling of classified materials. It is unconscionable for an instructor to impose through their own deliberate actions this burden of time, paperwork, and ethical dilemma on a professional student.

Secondly, for those students that do not hold current clearances, many will one day face the polygraph process – and the discussion of a half remembered document from a long ago professor is not the most productive way to encounter the less than tender mercies of that process. As it is, too small a percentage of those students will successfully pass vetting; the intelligence studies academia does not need to be encouraging additional obstacles that will further negatively impact those numbers.

Lastly, we fear the creation of perverse incentives for future leaks should this practice become more widespread. We could easily see such pressures being placed entirely inappropriately on serving professionals who are alumni of major intelligence studies programs by their former instructors, or anonymous leaks occurring at the end of a professional’s tour in anticipation of a future academic posting. We cannot condone any activities that would potentially create any similar incentives – especially when such pressures might well result in the end of meaningful professional and academic collaboration partnerships in the intelligence studies field.

We know the difficulties in crafting an intelligence curriculum to be taught a the unclassified level, but have long felt strongly that to do so forces a focus on the fundamentals of tradecraft unhindered by the restraints of specific organizational niches. While there are many things that simply cannot be taught at the lowest levels, most are frankly more appropriate to a professional in service training and education program as opposed to the outside academic environment in the first place.

It is in part due to these actions that many community professionals entirely discount the role of outside academics – and we fear that with each passing incident, this perception becomes harder to fight. Given the behavior of some academics, it is a perception that may not even be wrong. We recall one particular foreign born instructor who, prior to his dismissal with prejudice from a particularly prominent program, had set out to deliberately acquire as many leaked materials as he could lay hands upon. This created serious difficulties for other academics and students in the program – many of whom were employed in consulting capacities for various official institutions. This is an example that should never have been allowed to be repeated – and current incidents are a slippery slope on that road.

Let us be clear: we at Kent’s Imperative condemn leaks in all forms, and those that would find benefit from them, in the strongest possible terms. Each academic institution which hosts an intelligence studies program should address this issue through internal policy – preferably tied to its academic code, which should consider the improper use of classified information as damnable as the kindred crime of plagiarism. If there is any role for the International Association For Intelligence Education in the promulgation of best practices throughout the field, it is in such matters.

Labels: , , ,

18 October 2007

Pondering anonymous wiki usage

We note with great interest the research findings of the Dartmouth team that examined the role of anonymous contributions to Wikipedia. This work confirms what many have long suspected – the role of many individual experts contributing in a small area can be as vital as the long term “gardening” and other high commitment roles of high frequency wiki users.

This tracks interestingly with an alternative analysis first provided by Aaron Schwartz on the true distribution of authorship in Wikipedia. His work challenges conventional wisdom that only a few hundred individuals have been responsible for the majority of the production, showing that the contributions of these otherwise limited participants that actually provide the bulk of new content. The high participation individuals provided most of the structure, formatting, and debate.

None of this is terribly surprising when one considers the dynamics of expertise and contribution in other endeavors. But it has profound implications for those seeking to use the dynamics of participatory production models to create things of enduring value within the intelligence community. There is an inherent distrust of anonymity in the IC, and in a professional environment one’s reputation is not just at stake for a hobby but for the weight of one’s “real” work. How much has the intelligence community denied itself potential contributions of value (and reliability) through some of the choices made regarding anonymity in its wikis (or blogs)?

We come down strongly on the side of appropriate veils for the online environment, of course. Not that we wish to be the man behind the curtain (although professionally, some of us not in the more active side of the house are always more comfortable on the dark side of the one way glass), but rather so that ideas stand alone and can be discussed independently of the agencies and cultures which produce them. We have been accused of ill will on more than one occasion for our anonymity and group voice, but it is simply a desire to extend the debate on professionalization free of the conflicts of personality and organization. (It is also a function of the unique terms under which we are able to continue this venture, but in this it is a happy convergence with our intended outcomes for the blog.)

The parallels of Wikipedia assume however that the IC intends to create an encyclopedic work of its own. It is far from clear that this is what Intellipedia will be, let alone any of the other smaller and more focused wiki production environments. There are several other distinct roles evolving for wikis as the technology is bent to new situated uses within small groups – from watchstanding to warning, from dynamic production processes to shelfware reference replacement. The experimentation is really only just beginning – and for this reason, further real research is needed from the intelligence studies academia on both the open and dark side versions of these tools.

Labels: , , , ,

02 July 2007

DHS Border Security Centers of Excellence program

It is good to see the IC CAE concept catching on elsewhere, and in increasing areas of specialization. The latest is the Department of Homeland Security / Science and Technology Directorate’s grant for a new university Center of Excellence for Border Security and Immigration (under DHS-07-ST-061-002). We hope the new program will contribute as much to the intelligence and operations community as it does to the technology space.

This award reminds us very much of the original Department of Justice efforts to create an academic partnership with Mercyhurst College in order to address border security, which was a key part of the old Borderline daily intelligence product (an innovative mix of open source and operational reporting produced by the old Immigration and Naturalization Service intelligence shop). A similar effort was created in conjunction with the old Cross Border Control International publication, in partnership with the Ridgway Center at University of Pittsburg. These efforts produced good results for a number of years, and we look forward (hopefully) to a successor emerging.

We should note that Patrick Henry College’s intelligence studies program has for some time been producing a weekly border security open source intelligence product, which to some degree picked up where the older Mercyhurst effort left off.

There are no doubt other efforts of which we are not aware, and we wish them all luck should they be in competition for the new grant.

Labels: ,

05 June 2007

Exploring the vast reaches of the disconnected professionals

We often take for granted that intelligence professionals are part of a larger intelligence community, and often part of multiple overlapping communities of professional interest. It is thus with occasional surprise we are reminded of the vast legion of those who toil in the obscurity of offices entirely disconnected from their counterparts elsewhere in the field.

These may be the backwaters of the state and local law enforcement community, the culturally and organizationally distinct operational environments of watch offices (where intelligence officers are only one among many types of watch-standers), or the small and boutique level private sector consulting functions (who lack the staff-like access of their larger counterparts.) Then of course there is the entire business / competitive intelligence field, where one is as likely to encounter individuals whose cultural affinity and mindset ties them to the librarians as to the intelligence world.

In these quieter eddies of the currents in our profession we are sure there lurks unique value, perspectives, and insights into some of the most pressing problems of the day. We are convinced that the range of customers these less well known functions serve, and the variety of situated products and processes that these (often very innovative and quite successful) professionals have created among themselves can offer new options for the larger body of analytic tradecraft.

We are however often perplexed at how to reach these disconnected professionals. Most do not participate in the major intelligence professional associations, nor are they interested in many cases in the conferences that they (often all too rightly) perceive as marketing forums for other vendors, and small worlds political networks from which they are too often excluded based on their position or firm.

In the hierarchies of intelligence accomplishments, it is those that are on the front lines that interest us most – especially as it is those individuals that are best positioned to evaluate and critique existing theory and literature, and to contribute new works to the growing corpus from a perspective that may never have been considered.

It takes effort to build and sustain a community. It takes outreach to extend that community’s ideas to the boundaries of its members. But the contributions those at the edge of the profession have to offer will most certainly make such efforts worthwhile. The only question is how best can such a task be accomplished?

Labels: , ,

11 May 2007

Welcome, Coming Anarchy readers

It is quite nice to have such an international presence come to visit, and based on the kind words from such an esteemed group of gentlemen.

While we do not often delve into the substance of specific regional accounts (and never to the depth and insight offered through the fine authors of Coming Anarchy), there may be a few things here or there which might catch your interest. And while we are not all by any means paper-pushers, we find that the professionalization of analysis is one of the few areas of common ground suitable for discussion in forums such as this.

Feel free to visit again as you like, and we hope you enjoy our humble musings.

Labels:

27 November 2006

Calling for the enclosure of virtual walls

We admit to a fascination in the abstract with the developments taking place in virtual immersive environments within the Parallel World, as corporate entities and knowledge workers come to terms with the capabilities of these new tools for collaboration and communication. Given that more than half of our working lives are mediated by networks, interacting with those we never see (and may never even be able to name due to cloaks of professional anonymity of group voice and official paranoia); anything that assists in managing distributed collaborative analysis and production (particularly given the importance of virtual simulations for training applications in other fields), is something we are eager to explore.

Regrettably, it is also impossible for a variety of reasons to replicate these experiments within the walls, even if a team of practitioners could be found which would be interested. The protocols and boundaries of the community’s strange intellectual spaces conspire against it.

It need not always be so, however. There are developments on the horizon, beyond the ever ready suggestion of a massive multi-agency or DNI funded GOTS effort doomed like most other attempts to replicate commercial innovations within the damned reaches of the bureaucracies. We shall see where such open source development tools lead.

We are not really asking for much, we think. Just a small, virtual environment for immersive collaboration with a limited number of peers, with appropriate security and certifications. Make it portable, and remote hosted with little to no IT intervention in any given location (the burden carried by the network service provider and host / sponsoring agency.) See where it takes us…

Call this a lazyweb post, for some bright young contractor team to come to the table with something already in proof of concept. Maybe hosted at the university level, to let the academics write their papers and push the idea at some conferences. Dig up some engineers to team with, to import CAD models and imagery of some cool and useful things. Spawn copies and competition and grow the space.

Call us once you have something to play with - we'd love to join you in the sandbox. Until then, we have our wine and our dreams, as the poet once said.

Labels: , ,