The High Cost Of Politicising Intelligence

Intelligence analysis is more an imperfect art than  a science: Gaps in reporting, bad sources and increasing politicisation all complicate the analyst’s task.

The White House recently sought to enlist the Departments of Homeland Security and Justice to build a case for its controversial and unpopular immigration ban. Among intelligence professionals, the request to produce analysis that supports a favored policy, vice producing analysis, and allowing it to inform policy, is called politicisation, which intends to use all the different media and Internet connections to get the bias messages out there. 

It is anathema to the training most analysts receive and the values that lie at the heart of the vocation. There is a high cost to putting ideology over informed assessments of political, economic, and military realities.

At the Central Intelligence Agency, where Dennis Gleeson served as director of strategy in the Directorate of Analysis, the subject of politicisation is introduced to analysts almost as soon as they enter into service. 

There is good reason for this: Politicisation is not an academic issue.

During the Cold War, the Ford administration convened a Team B comprised of conservative foreign-policy thinkers to challenge the intelligence community’s estimates of Soviet nuclear capabilities. 

Then-CIA director and future President George H.W. Bush later concluded the group’s work lent “itself to manipulation for purposes other than estimative accuracy.”

In the early 1990s, after a rocky confirmation process during which he was accused of politicizing intelligence analysis, Director of the CIA Robert Gates implemented a series of reforms aimed at guarding against political or ideological thinking coloring intelligence analysis. Gates described politicisation as “deliberately distorting analysis or judgments to favor a preferred line of thinking irrespective of evidence.”

Recently, President George W. Bush’s administration exerted unusual pressure to have the CIA support its plans to invade Iraq because of that country’s alleged ties to al-Qaeda and its weapons of mass destruction program. 

Both assumptions proved flawed. Nada Bakos wrote about the problems with efforts to tie Iraq to al-Qaeda for Wired. An internal CIA post-mortem concluded that the CIA’s assessments of the Iraqi WMD program were a case of an effective denial-and-deception program that fed prevailing assumptions.

Intelligence analysis is more an imperfect art than it is a science: Gaps in reporting, bad sources, and circular reporting all complicate the analyst’s quest for knowledge and understanding. As a result, we have seen the rise of ideas like “words of estimative probability,” which, like any language, assume a degree of fluency that rarely exists.

Compelling the government’s cadre of professional analysts to partake in ideological fantasy will undermine America’s national security, not enhance it.

Politicisation, however, sits on top of all of these complicating factors because it is an act of willful commission: At its most overt, it amounts to using a political position to get people to say that a clear, bright blue sky is cloudy.

While the CIA prides itself on a tradition of “truth to power,” the reality of telling high-ranking officials that their beliefs are not supported by either the available reporting or the informed opinions of a cross-section of the analytic cadre is far more-weighty than those three words convey. Speaking “truth to power” requires courage, because political partisans are all too happy to causally decry dissent as disloyalty.

What is the cost of politicisation? As of 2013, it was estimated that the American invasion of Iraq in 2003 cost an estimated $1.7 trillion, and saw over 4,000 Americans killed in action and over 30,000 wounded in action. Those numbers don’t include the families of the fallen; the innocent Iraqis killed or wounded during the conflict; or the insurgency that evolved into the extremist threat that we now know as ISIS.

The irony is that President Trump is a vocal critic of his predecessors’ decisions to invade, occupy, and ultimately withdraw from Iraq. In the run-up to that war, the Department of Defense formed an Office of Special Plans, conceived by Deputy Secretary of Defense Paul Wolfowitz, which as Seymour Hersh argued in The New Yorker, “was created in order to find evidence of what Wolfowitz and his boss, Defense Secretary Donald Rumsfeld, believed to be true” about Iraq the threat it posed to the world. 

By trying to shape analysis to support his administration’s world view, Trump is creating the conditions for committing our country to courses of action that have the potential to be as costly or disastrous.

This administration may seek solace in reality-distorting “alternative facts,” but politicizing intelligence is a massive disservice to the American taxpayer. 

There are plenty of media outlets, web sites, and pundits that cater to the full spectrum of American political thought, to include those strains of belief that are more about subjective feelings than informed realities. 

image by Nick Youngson: http://nyphotographic.com

DefenseOne

Data Fusion For Military Intelligence & Business:       Is It Possible To Neutralise Fake News?:

 

« Keeping The Cloud Safe: Exclusive Report
A Common Language For Sharing Intelligence On Cybersecurity Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Eden Legal

Eden Legal

Eden Legal provides legal services on commercial and regulatory issues affecting digital businesses.

Security Innovation

Security Innovation

Security Innovation is a leader in software security assessments and application security training to top organizations worldwide.

SiteGuarding

SiteGuarding

SiteGuarding provide website security tools and services to protect your website against malware and hacker exploits.

Mi-Token

Mi-Token

Mi-Token is an advanced two-factor authentication solution that offers unparalleled security, flexibility, cost-effectiveness and ease of use.

Verint Systems

Verint Systems

Verint is a leader in Actionable Intelligence with a focus on customer engagement optimisation, security intelligence, fraud, risk and compliance.

Intelligent Waves

Intelligent Waves

Intelligent Waves holds and manages contracts to provide an array of intelligence, operational, communications and IT support to the USG in austere, forward-deployed, hazardous duty environments.

Think Cyber Security (ThinkCyber)

Think Cyber Security (ThinkCyber)

ThinkCyber is a Tel Aviv-based Israeli company with a team of cybersecurity professionals who are experts in both information and operations technology.

Ergon Informatik

Ergon Informatik

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite.

VerSprite

VerSprite

VerSprite is a specialist information security consulting firm. We provide organizations with detection across all their attack surfaces and deliver critical insight into all possible attack methods.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center is dedicated to combating adversaries who desire to harm our citizens, our government, and our industry through cyber-attacks.

ANSEC IA

ANSEC IA

ANSEC is a consultancy practice providing independent Information Assurance and IT Security focussed services to customers throughout the UK, Ireland and internationally.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

Nuts Technologies

Nuts Technologies

Nuts Technologies are simplifying data privacy and encryption with our innovative and novel data containers we call nuts based on our Zero Trust Data framework.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

Akto

Akto

Akto, the plug & play API security platform. Discover your APIs, run tests and find business logic vulnerabilities at ludicrous speed.