The High Cost Of Politicising Intelligence

Intelligence analysis is more an imperfect art than  a science: Gaps in reporting, bad sources and increasing politicisation all complicate the analyst’s task.

The White House recently sought to enlist the Departments of Homeland Security and Justice to build a case for its controversial and unpopular immigration ban. Among intelligence professionals, the request to produce analysis that supports a favored policy, vice producing analysis, and allowing it to inform policy, is called politicisation, which intends to use all the different media and Internet connections to get the bias messages out there. 

It is anathema to the training most analysts receive and the values that lie at the heart of the vocation. There is a high cost to putting ideology over informed assessments of political, economic, and military realities.

At the Central Intelligence Agency, where Dennis Gleeson served as director of strategy in the Directorate of Analysis, the subject of politicisation is introduced to analysts almost as soon as they enter into service. 

There is good reason for this: Politicisation is not an academic issue.

During the Cold War, the Ford administration convened a Team B comprised of conservative foreign-policy thinkers to challenge the intelligence community’s estimates of Soviet nuclear capabilities. 

Then-CIA director and future President George H.W. Bush later concluded the group’s work lent “itself to manipulation for purposes other than estimative accuracy.”

In the early 1990s, after a rocky confirmation process during which he was accused of politicizing intelligence analysis, Director of the CIA Robert Gates implemented a series of reforms aimed at guarding against political or ideological thinking coloring intelligence analysis. Gates described politicisation as “deliberately distorting analysis or judgments to favor a preferred line of thinking irrespective of evidence.”

Recently, President George W. Bush’s administration exerted unusual pressure to have the CIA support its plans to invade Iraq because of that country’s alleged ties to al-Qaeda and its weapons of mass destruction program. 

Both assumptions proved flawed. Nada Bakos wrote about the problems with efforts to tie Iraq to al-Qaeda for Wired. An internal CIA post-mortem concluded that the CIA’s assessments of the Iraqi WMD program were a case of an effective denial-and-deception program that fed prevailing assumptions.

Intelligence analysis is more an imperfect art than it is a science: Gaps in reporting, bad sources, and circular reporting all complicate the analyst’s quest for knowledge and understanding. As a result, we have seen the rise of ideas like “words of estimative probability,” which, like any language, assume a degree of fluency that rarely exists.

Compelling the government’s cadre of professional analysts to partake in ideological fantasy will undermine America’s national security, not enhance it.

Politicisation, however, sits on top of all of these complicating factors because it is an act of willful commission: At its most overt, it amounts to using a political position to get people to say that a clear, bright blue sky is cloudy.

While the CIA prides itself on a tradition of “truth to power,” the reality of telling high-ranking officials that their beliefs are not supported by either the available reporting or the informed opinions of a cross-section of the analytic cadre is far more-weighty than those three words convey. Speaking “truth to power” requires courage, because political partisans are all too happy to causally decry dissent as disloyalty.

What is the cost of politicisation? As of 2013, it was estimated that the American invasion of Iraq in 2003 cost an estimated $1.7 trillion, and saw over 4,000 Americans killed in action and over 30,000 wounded in action. Those numbers don’t include the families of the fallen; the innocent Iraqis killed or wounded during the conflict; or the insurgency that evolved into the extremist threat that we now know as ISIS.

The irony is that President Trump is a vocal critic of his predecessors’ decisions to invade, occupy, and ultimately withdraw from Iraq. In the run-up to that war, the Department of Defense formed an Office of Special Plans, conceived by Deputy Secretary of Defense Paul Wolfowitz, which as Seymour Hersh argued in The New Yorker, “was created in order to find evidence of what Wolfowitz and his boss, Defense Secretary Donald Rumsfeld, believed to be true” about Iraq the threat it posed to the world. 

By trying to shape analysis to support his administration’s world view, Trump is creating the conditions for committing our country to courses of action that have the potential to be as costly or disastrous.

This administration may seek solace in reality-distorting “alternative facts,” but politicizing intelligence is a massive disservice to the American taxpayer. 

There are plenty of media outlets, web sites, and pundits that cater to the full spectrum of American political thought, to include those strains of belief that are more about subjective feelings than informed realities. 

image by Nick Youngson: http://nyphotographic.com

DefenseOne

Data Fusion For Military Intelligence & Business:       Is It Possible To Neutralise Fake News?:

 

« Keeping The Cloud Safe: Exclusive Report
A Common Language For Sharing Intelligence On Cybersecurity Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Bryan Cave LLP

Bryan Cave LLP

Bryan Cave LLP is a global business and litigation law firm. Practice areas include Data Privacy and Security.

RoboForm

RoboForm

RoboForm's industry-leading encryption technology securely stores your passwords, with one Master Password serving as your encryption key.

Hack in the Box Security Conference (HitBSecConf)

Hack in the Box Security Conference (HitBSecConf)

HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events feature two days of training and a two-day multi-track conference

Second Nature Security (2NS)

Second Nature Security (2NS)

2NS provide vulnerability assessment, penetration testing, security audit, application and network security and secure software development processes.

Positive Technologies

Positive Technologies

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection.

Sumo Logic

Sumo Logic

Sumo Logic simplifies how you collect and analyze machine data so that you can gain deep visibility across your full application and infrastructure stack.

SMiD Cloud

SMiD Cloud

SMiD encryption technology has been developed following the highest security practices to allow the data availability, integrity and confidentiality.

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

Elron Ventures

Elron Ventures

Elron partner with early stage ventures to build companies that transform lives and industries. Our main areas of focus are enterprise software, cybersecurity, and healthcare.

Avertium

Avertium

Avertium is the managed security and consulting provider that companies turn to when they want more than check-the-box cybersecurity.

CyberPeace Foundation

CyberPeace Foundation

CPF is a think tank of cybersecurity and policy experts with the vision of pioneering Cyber Peace Initiatives to build collective resiliency against CyberCrimes and global threats of cyber warfare.

Guidepost Solutions

Guidepost Solutions

Guidepost Solutions are a diverse, global team of investigators, experienced security and technology consultants, and compliance and monitoring experts.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

European Cybersecurity Competence Centre (ECCC)

European Cybersecurity Competence Centre (ECCC)

The ECCC aims to increase Europe’s cybersecurity capacities and competitiveness, working together with a Network of National Coordination Centres to build a strong cybersecurity Community.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.