In their Second Edition of Cases in Intelligence Analysis: Structured Analytic Techniques in Action, accomplished instructors and intelligence practitioners Sarah Miller Beebe and Randolph H. Pherson offer robust, class-tested cases studies of events in foreign intelligence, counterintelligence, terrorism, homeland security, law enforcement, and decision-making support. Designed to give analysts-in-training an opportunity to apply structured analytic techniques and tackle real-life problems, each turnkey case delivers a captivating narrative, discussion questions, recommended readings, and a series of engaging analytic exercises.
In this Second Edition of Structured Analytic Techniques for Intelligence Analysis, authors Richards J. Heuer Jr. and Randolph H. Pherson showcase fifty-five structured analytic techniques—five new to this edition—that represent the most current best practices in intelligence, law enforcement, homeland security, and business analysis.
Machine generated contents note: -- Contents -- Introduction -- Part One: The Theoretical Framework -- Chapter I. Surprise Attack: A Framework for Discussion -- Chapter II. Examining the Learning Process -- Part Two: The Empirical Evidence -- The First Dyad: Barbarossa and the Battle for Moscow -- Case Study I: The Failure -- Case Study II: Success: The Battle for Moscow -- The Second Dyad: The USA in the Korean War -- Case study I: Failing to Forecast the War -- Case Study II: Failure II: The Chinese Intervention of Fall 1950 -- The Third Dyad: Intelligence Failure and Success in the War of Yom Kippur -- Case Study I: The Failure -- Case Study II: The Success -- Chapter VI. Conclusions
With Critical Thinking for Strategic Intelligence, Katherine Hibbs Pherson and Randolph H. Pherson have updated their highly regarded, easy-to-use handbook for developing core critical thinking skills and analytic techniques. This indispensable text is framed around 20 key questions that all analysts must ask themselves as they prepare to conduct research, generate hypotheses, evaluate sources of information, draft papers, and ultimately present analysis, including: How do I get started? Where is the information I need? What is my argument? How do I convey my message effectively? The Third Edition includes suggested best practices for dealing with digital disinformation, politicization, and AI. Drawing upon their years of teaching and analytic experience, Pherson and Pherson provide a useful introduction to skills that are essential within the intelligence community.
This book on intelligence analysis written by intelligence expert Dr. Stephen Marrin argues that scholarship can play a valuable role in improving intelligence analysis. Improving intelligence analysis requires bridging the gap between scholarship and practice. Compared to the more established academic disciplines of political science and international relations, intelligence studies scholarship is generally quite relevant to practice. Yet a substantial gap exists nonetheless. Even though there are many intelligence analysts, very few of them are aware of the various writings on intelligence analysis which could help them improve their own processes and products. If the gap between scholarship and practice were to be bridged, practitioners would be able to access and exploit the literature in order to acquire new ways to think about, frame, conceptualize, and improve the analytic process and the resulting product. This volume contributes to the broader discussion regarding mechanisms and methods for improving intelligence analysis processes and products. It synthesizes these articles into a coherent whole, linking them together through common themes, and emphasizes the broader vision of intelligence analysis in the introduction and conclusion chapters. The book will be of great interest to students of intelligence studies, strategic studies, US national security, US foreign policy, security studies and political science in general,as well as professional intelligence analysts and managers.
In this seminal work, published by the C.I.A. itself, produced by Intelligence veteran Richards Heuer discusses three pivotal points. First, human minds are ill-equipped ("poorly wired") to cope effectively with both inherent and induced uncertainty. Second, increased knowledge of our inherent biases tends to be of little assistance to the analyst. And lastly, tools and techniques that apply higher levels of critical thinking can substantially improve analysis on complex problems.
In Target-Centric Network Modeling: Case Studies in Analyzing Complex Intelligence Issues, authors Robert Clark and William Mitchell take an entirely new approach to teaching intelligence analysis. Unlike any other book on the market, it offers case study scenarios using actual intelligence reporting format, along with a tested process that facilitates the production of a wide range of analytical products for civilian, military, and hybrid intelligence environments. Readers will learn how to perform the specific actions of problem definition modeling, target network modeling, and collaborative sharing in the process of creating a high-quality, actionable intelligence product. The case studies reflect the complexity of twenty-first century intelligence issues. Working through these cases, students will learn to manage and evaluate realistic intelligence accounts.
How can the United States avoid a future surprise attack on the scale of 9/11 or Pearl Harbor, in an era when such devastating attacks can come not only from nation states, but also from terrorist groups or cyber enemies? Intelligence and Surprise Attack examines why surprise attacks often succeed even though, in most cases, warnings had been available beforehand. Erik J. Dahl challenges the conventional wisdom about intelligence failure, which holds that attacks succeed because important warnings get lost amid noise or because intelligence officials lack the imagination and collaboration to “connect the dots” of available information. Comparing cases of intelligence failure with intelligence success, Dahl finds that the key to success is not more imagination or better analysis, but better acquisition of precise, tactical-level intelligence combined with the presence of decision makers who are willing to listen to and act on the warnings they receive from their intelligence staff. The book offers a new understanding of classic cases of conventional and terrorist attacks such as Pearl Harbor, the Battle of Midway, and the bombings of US embassies in Kenya and Tanzania. The book also presents a comprehensive analysis of the intelligence picture before the 9/11 attacks, making use of new information available since the publication of the 9/11 Commission Report and challenging some of that report’s findings.