The High Cost Of Politicising Intelligence

Intelligence analysis is more an imperfect art than  a science: Gaps in reporting, bad sources and increasing politicisation all complicate the analyst’s task.

The White House recently sought to enlist the Departments of Homeland Security and Justice to build a case for its controversial and unpopular immigration ban. Among intelligence professionals, the request to produce analysis that supports a favored policy, vice producing analysis, and allowing it to inform policy, is called politicisation, which intends to use all the different media and Internet connections to get the bias messages out there. 

It is anathema to the training most analysts receive and the values that lie at the heart of the vocation. There is a high cost to putting ideology over informed assessments of political, economic, and military realities.

At the Central Intelligence Agency, where Dennis Gleeson served as director of strategy in the Directorate of Analysis, the subject of politicisation is introduced to analysts almost as soon as they enter into service. 

There is good reason for this: Politicisation is not an academic issue.

During the Cold War, the Ford administration convened a Team B comprised of conservative foreign-policy thinkers to challenge the intelligence community’s estimates of Soviet nuclear capabilities. 

Then-CIA director and future President George H.W. Bush later concluded the group’s work lent “itself to manipulation for purposes other than estimative accuracy.”

In the early 1990s, after a rocky confirmation process during which he was accused of politicizing intelligence analysis, Director of the CIA Robert Gates implemented a series of reforms aimed at guarding against political or ideological thinking coloring intelligence analysis. Gates described politicisation as “deliberately distorting analysis or judgments to favor a preferred line of thinking irrespective of evidence.”

Recently, President George W. Bush’s administration exerted unusual pressure to have the CIA support its plans to invade Iraq because of that country’s alleged ties to al-Qaeda and its weapons of mass destruction program. 

Both assumptions proved flawed. Nada Bakos wrote about the problems with efforts to tie Iraq to al-Qaeda for Wired. An internal CIA post-mortem concluded that the CIA’s assessments of the Iraqi WMD program were a case of an effective denial-and-deception program that fed prevailing assumptions.

Intelligence analysis is more an imperfect art than it is a science: Gaps in reporting, bad sources, and circular reporting all complicate the analyst’s quest for knowledge and understanding. As a result, we have seen the rise of ideas like “words of estimative probability,” which, like any language, assume a degree of fluency that rarely exists.

Compelling the government’s cadre of professional analysts to partake in ideological fantasy will undermine America’s national security, not enhance it.

Politicisation, however, sits on top of all of these complicating factors because it is an act of willful commission: At its most overt, it amounts to using a political position to get people to say that a clear, bright blue sky is cloudy.

While the CIA prides itself on a tradition of “truth to power,” the reality of telling high-ranking officials that their beliefs are not supported by either the available reporting or the informed opinions of a cross-section of the analytic cadre is far more-weighty than those three words convey. Speaking “truth to power” requires courage, because political partisans are all too happy to causally decry dissent as disloyalty.

What is the cost of politicisation? As of 2013, it was estimated that the American invasion of Iraq in 2003 cost an estimated $1.7 trillion, and saw over 4,000 Americans killed in action and over 30,000 wounded in action. Those numbers don’t include the families of the fallen; the innocent Iraqis killed or wounded during the conflict; or the insurgency that evolved into the extremist threat that we now know as ISIS.

The irony is that President Trump is a vocal critic of his predecessors’ decisions to invade, occupy, and ultimately withdraw from Iraq. In the run-up to that war, the Department of Defense formed an Office of Special Plans, conceived by Deputy Secretary of Defense Paul Wolfowitz, which as Seymour Hersh argued in The New Yorker, “was created in order to find evidence of what Wolfowitz and his boss, Defense Secretary Donald Rumsfeld, believed to be true” about Iraq the threat it posed to the world. 

By trying to shape analysis to support his administration’s world view, Trump is creating the conditions for committing our country to courses of action that have the potential to be as costly or disastrous.

This administration may seek solace in reality-distorting “alternative facts,” but politicizing intelligence is a massive disservice to the American taxpayer. 

There are plenty of media outlets, web sites, and pundits that cater to the full spectrum of American political thought, to include those strains of belief that are more about subjective feelings than informed realities. 

image by Nick Youngson: http://nyphotographic.com

DefenseOne

Data Fusion For Military Intelligence & Business:       Is It Possible To Neutralise Fake News?:

 

« Keeping The Cloud Safe: Exclusive Report
A Common Language For Sharing Intelligence On Cybersecurity Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CamCERT

CamCERT

CamCERT is the national Computer Emergency Response Team for Cambodia.

PKWARE

PKWARE

PKWARE is a global leader in business data security, providing encryption and compression solutions to enterprise customers and government entities around the world.

Applied Security (APSEC)

Applied Security (APSEC)

APSEC provides products and services in the areas of encryption, digital signature, authentication and data loss prevention.

ECOS Technology

ECOS Technology

ECOS Technology specializes in the development and sale of IT solutions for high-security remote access as well as the management of certificates and smart cards.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

NITA Uganda (NITA-U)

NITA Uganda (NITA-U)

NITA-U has put in place the Information security framework to provide Uganda with the necessary process, policies, standards and guideline to help in Information Assurance.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

MISP Project

MISP Project

The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.

Netenrich

Netenrich

The Netenrich operations intelligence platform is built from the ground up to help enterprises resolve everyday and futuristic problems for stable, secure environments and infrastructures.

Institute for Pervasive Cybersecurity - Boise State University

Institute for Pervasive Cybersecurity - Boise State University

Boise State University’s Institute for Pervasive Cybersecurity is a leader of innovative cybersecurity research and advancement in Idaho and the region.

Cyber Insurance Academy

Cyber Insurance Academy

Cyber Insurance Academy was founded to provide insurance professionals with the knowledge needed to work in cyber-insurance and cyber-related insurance fields.

Cyber Security Services

Cyber Security Services

Cyber Security Services is a cyber security consulting firm and security operations center (SOC).

Raman Power Technologies

Raman Power Technologies

Raman Power Technologies focus on bringing value and solving business challenges through the delivery of modern IT services and solutions including cybersecurity.

ID North

ID North

ID North is a Nordic service provider offering identity security to its customers by providing world class expertise and best-in-class solutions and services.

Troye Computer Systems

Troye Computer Systems

Troye provide a complete range of digital workspace solutions that empower people to do their very best work in a safe and secure manner anywhere, anytime, using any device.

Pistachio

Pistachio

Pistachio is the new evolution of cybersecurity awareness training and attack simulations.