The High Cost Of Politicising Intelligence

Intelligence analysis is more an imperfect art than  a science: Gaps in reporting, bad sources and increasing politicisation all complicate the analyst’s task.

The White House recently sought to enlist the Departments of Homeland Security and Justice to build a case for its controversial and unpopular immigration ban. Among intelligence professionals, the request to produce analysis that supports a favored policy, vice producing analysis, and allowing it to inform policy, is called politicisation, which intends to use all the different media and Internet connections to get the bias messages out there. 

It is anathema to the training most analysts receive and the values that lie at the heart of the vocation. There is a high cost to putting ideology over informed assessments of political, economic, and military realities.

At the Central Intelligence Agency, where Dennis Gleeson served as director of strategy in the Directorate of Analysis, the subject of politicisation is introduced to analysts almost as soon as they enter into service. 

There is good reason for this: Politicisation is not an academic issue.

During the Cold War, the Ford administration convened a Team B comprised of conservative foreign-policy thinkers to challenge the intelligence community’s estimates of Soviet nuclear capabilities. 

Then-CIA director and future President George H.W. Bush later concluded the group’s work lent “itself to manipulation for purposes other than estimative accuracy.”

In the early 1990s, after a rocky confirmation process during which he was accused of politicizing intelligence analysis, Director of the CIA Robert Gates implemented a series of reforms aimed at guarding against political or ideological thinking coloring intelligence analysis. Gates described politicisation as “deliberately distorting analysis or judgments to favor a preferred line of thinking irrespective of evidence.”

Recently, President George W. Bush’s administration exerted unusual pressure to have the CIA support its plans to invade Iraq because of that country’s alleged ties to al-Qaeda and its weapons of mass destruction program. 

Both assumptions proved flawed. Nada Bakos wrote about the problems with efforts to tie Iraq to al-Qaeda for Wired. An internal CIA post-mortem concluded that the CIA’s assessments of the Iraqi WMD program were a case of an effective denial-and-deception program that fed prevailing assumptions.

Intelligence analysis is more an imperfect art than it is a science: Gaps in reporting, bad sources, and circular reporting all complicate the analyst’s quest for knowledge and understanding. As a result, we have seen the rise of ideas like “words of estimative probability,” which, like any language, assume a degree of fluency that rarely exists.

Compelling the government’s cadre of professional analysts to partake in ideological fantasy will undermine America’s national security, not enhance it.

Politicisation, however, sits on top of all of these complicating factors because it is an act of willful commission: At its most overt, it amounts to using a political position to get people to say that a clear, bright blue sky is cloudy.

While the CIA prides itself on a tradition of “truth to power,” the reality of telling high-ranking officials that their beliefs are not supported by either the available reporting or the informed opinions of a cross-section of the analytic cadre is far more-weighty than those three words convey. Speaking “truth to power” requires courage, because political partisans are all too happy to causally decry dissent as disloyalty.

What is the cost of politicisation? As of 2013, it was estimated that the American invasion of Iraq in 2003 cost an estimated $1.7 trillion, and saw over 4,000 Americans killed in action and over 30,000 wounded in action. Those numbers don’t include the families of the fallen; the innocent Iraqis killed or wounded during the conflict; or the insurgency that evolved into the extremist threat that we now know as ISIS.

The irony is that President Trump is a vocal critic of his predecessors’ decisions to invade, occupy, and ultimately withdraw from Iraq. In the run-up to that war, the Department of Defense formed an Office of Special Plans, conceived by Deputy Secretary of Defense Paul Wolfowitz, which as Seymour Hersh argued in The New Yorker, “was created in order to find evidence of what Wolfowitz and his boss, Defense Secretary Donald Rumsfeld, believed to be true” about Iraq the threat it posed to the world. 

By trying to shape analysis to support his administration’s world view, Trump is creating the conditions for committing our country to courses of action that have the potential to be as costly or disastrous.

This administration may seek solace in reality-distorting “alternative facts,” but politicizing intelligence is a massive disservice to the American taxpayer. 

There are plenty of media outlets, web sites, and pundits that cater to the full spectrum of American political thought, to include those strains of belief that are more about subjective feelings than informed realities. 

image by Nick Youngson: http://nyphotographic.com

DefenseOne

Data Fusion For Military Intelligence & Business:       Is It Possible To Neutralise Fake News?:

 

« Keeping The Cloud Safe: Exclusive Report
A Common Language For Sharing Intelligence On Cybersecurity Threats »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

iTrinegy

iTrinegy

iTrinegy is a world leader in Application Risk Management offering solutions to mitigate all networked application deployment risks

Promon

Promon

Promon is an application security vendor providing Self-Protection abilities to Mobile apps and Desktop applications.

Systancia

Systancia

Systancia offer solutions for the virtualization of applications and VDI, external access security, Privileged Access Management (PAM), Single Sign-On (SSO) and Identity and Access Management (IAM).

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

CyberOne

CyberOne

CyberOne (formerly Comtact) offer a full stack cybersecurity service to ensure our customers understand the cyber maturity of their organisation.

PerimeterX

PerimeterX

PerimeterX is the leading provider of solutions that secure digital businesses against automated fraud and client-side attacks.

Wireless Logic

Wireless Logic

Wireless Logic delivers a range of secure and resilient value-added M2M/IoT managed services that empower remote devices to communicate cost-effectively, two ways.

Dale Peterson

Dale Peterson

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS.

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

Proximity

Proximity

Proximity is a leading professional services organisation providing consulting, legal and commercial advisory solutions with a focus on government and regulated industries.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.

Airiam

Airiam

Airiam provides cybersecurity, managed IT, consulting, incident response, and digital transformation services so you can focus on what matters most.

FortiGuard Labs

FortiGuard Labs

FortiGuard Labs is the threat intelligence and research organization at Fortinet. Its mission is to provide Fortinet customers with the industry’s best threat intelligence.

Maintel

Maintel

Maintel provides cloud and managed communications services. We help our customers to deliver exceptional customer experiences, and to securely access their applications and their data.

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.

Leapfrog Services

Leapfrog Services

Leapfrog offers outsourced managed IT + cybersecurity services that are scalable, aligned, and fit easily into your business model.