Intelligence Leadership and Governance: Building Effective Intelligence Communities in The 21St Century
Intelligence Leadership and Governance: Building Effective Intelligence Communities in The 21St Century
INTELLIGENCE LEADERSHIP
AND GOVERNANCE
BUILDING EFFECTIVE INTELLIGENCE COMMUNITIES
IN THE 21ST CENTURY
Patrick F. Walsh
‘This carefully-researched book is an important contribution to the scholarship on
intelligence. Its focus is leadership, and it provides a theoretical framework for
understanding the challenges intelligence leaders will face, broadening the defini-
tion of leadership to include ethics, self-awareness and, critically, transformation.
Intelligence agencies have not been badly led—I say as someone having led one—
but I hope Walsh’s book will contribute to a more open debate about how future
leaders should be prepared when information multiplies by the second, technology
offers dramatic possibilities, both good and bad, and private intelligence providers
are both competitors and potential collaborators.’
Gregory F. Treverton, former Chair, U.S.
National Intelligence Council, now Professor
of the Practice of International Relations
and Spatial Sciences, University of Southern
California, USA
Patrick F. Walsh
First published 2021
by Routledge
2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN
and by Routledge
52 Vanderbilt Avenue, New York, NY 10017
Routledge is an imprint of the Taylor & Francis Group, an informa business
© 2021 Patrick F. Walsh
The right of Patrick F. Walsh to be identified as author of this work has been
asserted by him in accordance with sections 77 and 78 of the Copyright,
Designs and Patents Act 1988.
All rights reserved. No part of this book may be reprinted or reproduced or
utilised in any form or by any electronic, mechanical, or other means, now
known or hereafter invented, including photocopying and recording, or in
any information storage or retrieval system, without permission in writing
from the publishers.
Trademark notice: Product or corporate names may be trademarks or
registered trademarks, and are used only for identification and explanation
without intent to infringe.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Cataloging-in-Publication Data
A catalog record has been requested for this book
ISBN: 978-1-138-29085-3 (hbk)
ISBN: 978-1-315-26593-3 (ebk)
Typeset in Times New Roman
by Deanta Global Publishing Services, Chennai, India
For all the past, present and future leaders of our intelligence
communities
Contents
1 Introduction 1
4 Collection 76
5 Analysis 97
10 Conclusion 191
Index 197
1 Introduction
Methodological approach
In particular, the book includes four key methodological aspects, which are unique
hitherto to any other studies that have examined aspects of IC leadership (Zegart
2007; Walsh 2017; Gentry 2008: 247–270, 2015: 637–661, 2016: 154–177). First,
the study is cross-comparative both in intelligence contexts (national security and
law enforcement) and countries (‘Five Eyes’ and other selected liberal democratic
countries). The book’s exploration of both national security and law enforcement
sources across these countries provides a wider understanding of IC leadership;
and whether similar or different leadership challenges exist in different contexts
and countries.
The second unique aspect to the book’s methodological framework is that
it explores both the individual and organisational aspect of intelligence lead-
ership using a theoretical model—the effective intelligence framework that I
developed in 2011 (Walsh 2011: 91–151, 2015: 123–142, 2017b: 441–459). The
framework provides researchers and ICs with a tool to ‘diagnose’ how effec-
tive structural and functional aspects of an intelligence agency or entire com-
munity are performing. A key argument in my previous work on the model is
that ‘intelligence governance’ is a critical component in the design and imple-
mentation of intelligence structures and functions within and across intelligence
Introduction 5
agencies (Walsh 2011: Ibid, 2015: 123–142, 2017b: 441–459). The framework
will be explained in more detail in Chapter 2 (Intelligence and Leadership). In
Chapter 10 (Conclusion), we will reflect back on the study’s methodological
approach and whether ‘intelligence governance’ is a useful construct in which to
understand IC leadership.
A third point of distinction about the book’s approach is that it seeks to take a
multi-disciplinary perspective when addressing the research questions. The intel-
ligence studies field has grown significantly since 9/11 yet various topics, ques-
tions, and issues still remain under-theorised (Walsh 2011: 283–299; Gill, Marrin
and Phythian 2008). As noted earlier, there is only a small body of research that
may be considered work on ‘intelligence leadership;’ so bringing in theoretical
perspectives from leadership/management, organisational reform/culture, psy-
chology, sociology amongst others will help inform the development of theorising
and practice related to IC leadership.
A final (fourth) different aspect to the book’s methodological approach is that
it adopts a grounded theoretical perspective to addressing the research questions.
In other words, a range of qualitative primary and secondary data sources were
collected and analysed in order to make some analytical generalisations about
IC leadership—from individual attribute and organisational perspectives. Primary
data sources included five semi-structured interviews of former IC leaders and a
survey of 208 former and current IC leaders.
The survey consisted of 24 questions that asked current and former IC leaders
a series of questions about aspects of leadership. Questions included, for exam-
ple, what leadership attributes they thought were important and why. Others
related to what the role of leadership was in various critical IC functions (e.g.
collection and analysis), whether they thought intelligence governance was a
useful way to think about leadership, and what they saw as the biggest chal-
lenges for IC leaders to deal with in the next five years. A total of 210 people
responded to the survey with 208 providing complete answers. The survey com-
pletion rate was 49 per cent, which was encouraging given most of the ques-
tions required IC leaders to provide a text response. In terms of demographics,
74.23 per cent and 24.23 per cent were male and female respectively; with 58.67
per cent in the 40–59 years age range. Respondents came from almost all the
agencies across the ‘Five Eyes’ with the highest number of responses coming
from the US Department of Defense and the Australian Federal Police (both
n = 18). There was also a large number of respondents (n = 119) who were either
from state law enforcement or selected the ‘other’ option rather than ticking
one of the agency names listed in the survey. In some cases, it seems respond-
ents ticked ‘other’ because they performed related IC leadership roles, such as
consultancies or worked in areas that provided technical advice to the IC, but
were not currently members of the IC. Another cohort of respondents selected
‘other’ but under this category listed having worked in agencies that are clearly
part of the ‘Five Eyes’ ICs such as the Australian Secret Intelligence Service
(ASIS) in Australia, Office of the Director of National Intelligence (ODNI)
and National Geospatial Intelligence Agency (NGA), both in the US, and the
6 Introduction
Assessment Secretariat (Canada). The range of IC leadership seniority varied
widely (n = 196). For example, 2.55 per cent identified as either heads of ICs
or agencies, 22.45 per cent retired IC leaders, 10.71 per cent intelligence man-
agers—down to others that indicated they were team leaders (11.73 per cent)
or ‘other’ (14.80 per cent) (e.g. policy makers, consultants, training, and pri-
vate sector). Finally, in terms of years of experience as an IC leader, 24.16 per
cent (n = 36) had at least five years but only up to ten years’ experience—while
51.68 per cent (n = 77) had ten or more years IC leadership experience. The
survey responses informed all aspects of the study, but particularly provided
insights into the analysis of intelligence governance challenges (Chapter 8 The
Future IC Leader and Governance Challenges) and leadership development
(Chapter 9 Leadership Development). Secondary data sources included schol-
arly literature, policy documents, and officially released inquiries.
The audience
This book is primarily for current and future IC leaders—regardless of seniority
level within our ICs. If you are already an experienced senior leader, it is hoped
that the book provides you with an opportunity to reflect more deeply on the dif-
ficult operating environment you are working in, and how you can identify areas
for individual and organisational improvement. In particular, though, the book is
targeted at the future senior IC leaders, who right now may be in middle manage-
ment positions. Given the absence of formal leadership programs in many ICs, I
seek to provide some scaffolding that can help future leaders better identify the
personal attributes and governance challenges they will face should they seek an
executive career. I would like the book to also be useful to other areas of our ICs
such as human resources, training, and corporate affairs, who may be given the
task to develop IC leadership programs in the future. The other audience for the
book, I hope, will be scholars who do research in intelligence capability reform
issues as well as others outside of the intelligence studies discipline who are inter-
ested in leadership theorising and organisational change. Finally, I seek to engage
students contemplating higher degrees and encourage them to take up their own
research projects on IC leadership.
Book structure
In order to fully address the four research questions, the book is structured into ten
chapters. This chapter introduces the study, including the research questions and
overall methodological approach. Chapter 2 (Intelligence and Leadership), exam-
ines IC leadership in the national security and law enforcement context. It pro-
vides the important multi-disciplinary foundation required to understand aspects
of IC leadership in the remaining chapters. It explores how history, leadership, and
organisational theory; leadership psychology; and my own theoretical construct of
‘intelligence governance’ provide the necessary backdrop in which to understand
contemporary IC leadership. Chapter 3 (Tasking and Coordination) examines both
the external (political) and internal (IC level) dimensions of IC leadership. Using
8 Introduction
several themes (e.g. organisational structure, information sharing, and politicisa-
tion), it explores the tensions between both dimensions and how this impacts on
the ability of leaders to effectively task, coordinate, and integrate intelligence.
Chapter 4 (Collection) explores the significance of three major themes (tech-
nological; collection and governance; and collection, ethics, and efficacy). The
themes are used to assess what intelligence governance challenges will arise for IC
leaders related to intelligence collection. Chapter 5 (Analysis) examines a range of
analytical techniques—both common and emerging in ICs and the advantages and
disadvantages of these in producing more reliable analytical judgements. The dis-
cussion again highlights a number of governance challenges arising from the use
of various analytical techniques, including how IC leaders can sustain innovation
in this vital area of the intelligence enterprise. Chapter 6 (ICT) investigates how
artificial intelligence (AI) is being used in various IC applications and explores
the extent that IC leaders can reconcile the technological, counter-intelligence,
and ethical challenges in its use.
Chapter 7 (Human Resources) explores a series of intelligence governance chal-
lenges related to improving workforce planning outcomes. In particular, recruitment,
training, education, retention, and attrition challenges are discussed and the critical
role IC leaders must play in improving human capability outcomes in the future.
Chapter 8 (The Future IC Leader and Governance Challenges) is the first of two
chapters (Chapter 9 Leadership Development being the other) that brings together
the analysis of key governance challenges—and how IC leaders can begin to better
conceptualise solutions to them. After summarising the challenges and potential
solutions, Chapter 8 pivots away from the organisational and back to the individual.
It asks, given the challenges and opportunities to manage them, what kind of lead-
ership attributes may help in overcoming them. This chapter connects much of the
theorising on leadership in earlier parts of the book to several perspectives gathered
from the IC leadership survey. Chapter 9 (Leadership Development) draws on the
insights of the previous chapter and additional survey results to identify six broad
thematic and inter-related areas: individual behavioural attributes, technical train-
ing, strategic and business planning, mentoring, evaluation, and lastly training and
education strategies. The chapter argues that these thematic areas should be thought
of as five principles that can provide the basis for an IC leadership development
framework. The framework is offered as a starting point to discuss how ICs could
advance leadership development programs. Chapter 10 (Conclusion) provides a
summary of the major themes raised in all sections of the book. It will also evaluate
the extent to which the four research questions have been addressed and what the
next steps might be in expanding a research agenda on IC leadership.
References
Buckley, J. (2013). Managing intelligence: A guide for law enforcement professionals.
CRC Press.
Cullen, M., & Reddy, P. (2016). Intelligence and security in a free society. Report of the
first independent review of intelligence and security in New Zealand. Wellington: New
Zealand Government.
Introduction 9
Gentry, J. A. (2008). Intelligence failure reframed. Political Science Quarterly, 123(2),
247–270.
Gentry, J. A. (2015). Has the ODNI improved U.S. Intelligence analysis?
International Journal of Intelligence and CounterIntelligence, 28(4), 637–661. doi:
10.1080/08850607.2015.1050937
Gentry, J. A. (2016). Managers of analysts: The other half of intelligence analysis.
Intelligence and National Security, 31(2), 154–177.
George, R., & Bruce, J. (Eds.) (2014). Analyzing intelligence national security practitioner’s
perspectives. Washington, DC: Georgetown University Press.
Gill, P., Marrin, S., & Phythian, M. (Eds.) (2008). Intelligence theory: Key questions and
debates. Abingdon, UK: Routledge.
Lahneman, W., & Arcos, R. (Eds.) (2014). The art of intelligence: Simulations, exercises
and games. Lanham, MD: Rowman and Littlefield.
L’Estrange, M., & Merchant, S. (2017). Independent intelligence review. Canberra:
Commonwealth of Australia.
Marrin, S. (2011). Improving intelligence analysis: Bridging the gap between scholarship
and practice. Abingdon, UK: Routledge.
McQueen, M. (2018). How to prepare now for what’s next. Milton, QLD: John Wiley and
Sons.
Quarmby, N., & Young, L. J. (2010). Managing intelligence: the art of influence.
Federation Press.
Ratcliffe, J. H. (Ed.) (2009). Strategic thinking in criminal intelligence (2nd ed.). Sydney:
Federation Press.
SSCI (2004). Report on the US Intelligence Community’s Pre war intelligence assessments
on Iraq. Washington, DC: Select Committee on Intelligence. U.S. Senate.
Walsh, P. F. (2011). Intelligence and intelligence analysis. Abingdon: UK: Routledge.
Walsh, P. F. (2015). Building better intelligence frameworks through effective governance.
International Journal of Intelligence and CounterIntelligence, 28(1), 123–142. doi:
10.1080/08850607.2014.924816
Walsh, P. F. (2017a). Teaching intelligence in the twenty-first century: Towards an
evidence-based approach for curriculum design. Intelligence and National Security,
32(7), 1005–1021. doi: 10.1080/02684527.2017.1328852
Walsh, P. F. (2017b). Making future leaders in the US intelligence community:
Challenges and opportunities. Intelligence and National Security, 32(4), 441–459. doi:
10.1080/02684527.2016.1253920
Walsh, P. F. (2018). Intelligence, biosecurity and bioterrorism. Berlin: Springer.
Walsh, P. F. (2020). Improving ‘Five Eyes’ health security intelligence capabilities:
Leadership and governance challenges. Intelligence and National Security, 35(4), 586–
602. doi: 10.1080/02684527.2020.1750156
Zegart, A. (2007). 9/11 and the FBI: The organizational roots of failure. Intelligence and
National Security, 22(2), 165–184. doi: 10.1080/02684520701415123
2 Intelligence and leadership
Introduction
This chapter has four key objectives. First, it provides a thematic and histori-
cal (pre-9/11) introduction to the intelligence community (IC) leadership (from
individual and organisational perspectives). This is critical to understanding how
pre-9/11 leadership has influenced contemporary IC leadership. The first section
cannot provide an exhaustive detailed historical analysis of all intelligence leaders
nor their actions in each ‘Five Eyes’ country. This would be an impossible task
and is beyond the scope of the book. However, it provides a high-level histori-
cal and thematic analysis of leadership in the national security and law enforce-
ment intelligence contexts. Many of these themes will be explored in deeper detail
in subsequent chapters as they are relevant to understanding specific aspects of
contemporary leadership issues. But the main point made in the first section is
that one cannot understand IC leadership today without exploring the broader
historical forces that shaped the development of modern intelligence in the early
twentieth century.
The second objective (and another unique aspect to the book) is to introduce
a cross-disciplinary perspective to contemporary leadership in the intelligence
context. The section provides an overview of a range of disciplines (e.g. leader-
ship theory, organisational theory, leadership, and psychology), which provide
relevant knowledge and a deeper understanding of leadership in the intelligence
context. It argues that understanding leadership—regardless of its context (intel-
ligence/non-intelligence settings) has always been a cross-disciplinary endeavour.
The broad-brush stroke discussion of disciplinary perspectives in this chapter and
the historical survey of IC leadership will be built on in subsequent chapters. The
third objective is to explain the effective intelligence framework, which informs
the theoretical foundation and structure for this study. Lastly, the chapter con-
cludes with a working definition of IC leadership.
dogmatic, too open-minded, and distant or too close a relationship to their intel-
ligence services. Personality, experience and the ability for both military and
civilian leaders to ‘scent out the truth were also all influential attributes’ (Handel
1988: 5). Handel and others have argued that ‘unquestionably, Churchill could
put intelligence to better use than Hitler.’ He quips that ‘while Hitler was still
a runner in the trenches of Flanders, Churchill had already gained extensive
experience in intelligence work as the First Lord of the Admiralty’. (1988: 6)
Both President Franklin Roosevelt and UK Prime Minister Churchill were fasci-
nated and fond of intelligence, particularly HUMINT and covert action. Churchill
was also an avid reader of both Bletchley Park decrypted intercepts and Joint
Intelligence Committee (JIC) reports (Gentry 2018: 5–6; Goodman 2008; Aldrich
and Cormac 2016).1 In contrast, US President Woodrow Wilson had a moral aver-
sion and ignorance of intelligence, as did UK Prime Minister Neville Chamberlain.
Other more contemporary scholars have similarly argued the case (that leader-
ship performance, attitude, personality/psychology, and experience mattered to
the ability of intelligence capabilities to reform and adapt), albeit looking more
broadly at how intelligence was used in the post-World War II period. For exam-
ple, Gentry makes the case for how effective political leadership mattered in
counter-insurgency operations and leadership preferences and understanding; and
interest for certain intelligence sources over others influenced the development of
the US IC (Gentry 2010: 50–75; 2018: 1–17).
Warner also reminds us that one should not forget the impact of adversarial lead-
ers such as Josef Stalin and Mao Zedong on the development of ‘Five Eyes’ intel-
ligence communities and those of other western powers (Warner 2014: 216). In
summary, historical studies demonstrate that the leader’s personality/psychology,
experience, and trust with intelligence over time obviously matters (Steinhart and
Avramov 2013). Of course, how political leaders use or abuse intelligence contin-
ues to be studied avidly by historians and intelligence studies scholars as the mis-
use of intelligence can result in an overly politicised exploitation of intelligence.
In most recent history, the notion of the politicisation of intelligence has been
found around the political decision-making that led to the US-led coalition inva-
sion of Iraq in 2003. Though perhaps even more recently concerns remain about
how politicisation of the US IC (either from neglect or hostility) by the Trump
administration is impacting on that community’s ability to provide fully effec-
tive decision-making support to the executive. Such actual or potential examples
of the politicisation of intelligence are critical to understanding the evolution of
intelligence leadership from the twentieth century to the present. This concept
will be examined in deeper detail in Chapter 3 (Tasking and Coordination).
In addition to understanding how military and political leaders experience/use
intelligence and the impact this had on the development of modern intelligence,
various historical sources are also instructive in showing how changes in sci-
ence and technology were enablers of an increasingly sophisticated intelligence
capability. In particular, communications technology that allowed the establish-
ment of code breaking (in Britain, Germany, Italy, and the United States) after
World War I only became more integral and sophisticated in World War II and
beyond (Kahn 2001: 83). As Warner suggests, ‘World War I linked science to
intelligence.’ ‘World War II ensured that science would forever be an element
of all aspects of the intelligence field’ (Warner 2014: 103). ‘Mathematicians and
engineers were critical to breaking the axis powers codes and also making sure
those of the western allies were impregnable’ (Ibid).
This reliance on science and technology clearly increased during the Cold War
and by ‘the early 1970s the US had become the undisputed world intelligence
leader—something it had never been before.’ Though, as Warner suggests, ‘tech-
nology had made American intelligence better but not always smarter’ (Warner
2014: 165).
While intelligence historians have now provided a clearer picture of how the
two world wars helped develop our understanding of the fault lines that eventu-
ally led to the creation of the ‘Five Eyes’ communities today, other research has
Intelligence and leadership 13
explored several other historical case studies from the war years to the present.
These have generated knowledge about the role and impact of IC leaders in coun-
ter-insurgency, covert action (Scott and Hughes 2006: 653–674), intelligence fail-
ure, intelligence and decision-making, efficacy, ethics, and accountability (Wark
1993; Best 2014; Kahn 2001; Warner 2014; Gentry 2016: 154–177). All of these
studies provide important knowledge about leadership and how intelligence was
used in a variety of different crises between the end of World War II, the Cold
War, 9/11, and beyond.
Another key lesson from intelligence historical studies is that ideology—
political, economic, and social—have always driven changes in the ‘Five Eyes’
ICs. Warner refers to how ideologically driven zealotry and violence in the late
nineteenth century in various European countries influenced the development of
internal policing and security capabilities. This could be seen, for example, in
the formation of London’s Metropolitan Police and its formation of a Special
Irish Branch in 1888 to combat a Fenian bombing campaign (Warner 2014: 26).
Additionally, the end of the Cold War in 1991 and the peace dividend that fol-
lowed was to have significant impacts (many negative) on the capabilities of
major intelligence agencies across the ‘Five Eyes’ alliance.
While there are a vast number of lessons to be learnt from the early nineteenth
century and the various major milestones of intelligence history (World Wars,
Cold War, Post-Cold War, 9/11, post-9/11) that are important for understanding
leadership in the intelligence context, space does not allow a full extrapolation
of them all. Instead, in the remaining space I will focus on six broad themes that
arose from surveying key historical sources. With each theme, I will explain its
relevance to understanding IC leadership. As noted above, this is not the end of
the discussion on how history has shaped the ‘Five Eyes’ intelligence communi-
ties and its leaders. As leadership topics are introduced in subsequent chapters,
a reflection on historical trends where relevant is included. Additionally, the six
themes identified here should not be construed as the only major themes arising
from historical sources. There are likely many others, but these ones seem to be
commonly found in multiple sources.
The first common theme arising out of multiple historical literature sources
is intelligence failure. Several historians and intelligence studies scholars have
provided cases of intelligence failure and their impact on intelligence capability
(Betts 1978; Zegart 2007; Dover and Goodman 2011; Hatlebrekke and Smith
2010). Such works do increase our understanding of how intelligence as an
enterprise, process, and product can fail. However, I argue that the phrase is
becoming too much of a ‘catch all’ or shortcut for any event or issue that results
in either a minor or catastrophic breakdown such as the failure of warning of the
Japanese attack at Pearl Harbor or 9/11. There is a lack of clarity too around the
term ‘intelligence failure’ and it seems in some instances it is used to describe
‘something going wrong in the intelligence machinery’ which might in fact be
more accurately called a policy failure. Is 9/11 and the faulty assessments (pro-
vided to governments in the US, UK, and Australia) leading up the coalition
invasion of Iraq (2003) more policy than intelligence failures or a bit of both?
14 Intelligence and leadership
On a smaller scale, but nonetheless impactful for the country concerned, did
New Zealand’s SIGINT agency Government Communications Security Bureau
(GCSB) (created in 1955) fail, as Hager suggests, to ‘predict’ the military coup
in Fiji in 1987 or the French sabotage of the Rainbow Warrior ship in Auckland
harbour in 1985 (Hager 1996)? Or in both cases were there policy mis-steps
taken?
A lack of precision and agreement amongst scholars about intelligence fail-
ure can promote sloppy analysis of the real causes why intelligence did not pro-
vide warning, reduce uncertainty, or allow sufficient decision-maker support.
Nonetheless, examining historical cases of ‘intelligence failure’ does provide
some clarity about the role leadership plays (both political and at IC levels) when
things have gone wrong and we will be coming back to examples of intelligence
failure in subsequent chapters.
A second theme arising out of historical sources are efforts towards the inte-
gration of people, policy, processes, functions within intelligence agencies and
broader communities. Discussions have included how specific functions might be
integrated, such as strategic intelligence and forecasting (Schmidt 2015: 489–511;
Michael 2015: 489–511), or how to fuse collection and/or analytical functions
across ICs (Walsh 2011a, 2015). Integration was also an important theme arising
out of the 9/11 Report and the use of the word has become a bit of a mantra for IC
leaders since (2004: 402). The integration theme is linked to another—organisa-
tional design—discussed later.
The third theme is liaison. Any analysis of historical sources will reveal how
critical strong liaison was in building cooperation and capability within and across
intelligence agencies in each ‘Five Eyes’ country. Several historical accounts
underscore the important role liaison played between the intelligence and politi-
cal leadership across the ‘Five Eyes’ ICs in building trust and common capabili-
ties. For example, a profound legacy of World War II was the creation of the vast
global SIGINT alliance known as UKUSA—a treaty signed between Britain, US,
Canada, Australia, and New Zealand—in 1948, which has deepened significantly
since (Aldrich 2010: 89–104; Herman 1996; Andrew 2018: 670–671).
While the UKUSA treaty was a significant stake in the ground in building trust
and sharing of intelligence between partner countries, it also had the effect of
pushing greater domestic capability building amongst treaty countries—particu-
larly in Australia and New Zealand. For example, in the 1950s both the US Truman
and UK Atlee governments were concerned about KGB penetration in Australian
politics, bureaucracy, and society. There were leaks of highly sensitive material
from the Department of External Affairs in Canberra to the KGB. London sent
senior MI5 staff to Australia to pressure the Chifley Government to deal with the
security crisis and create their own MI5, later known as the Australian Security
Intelligence Organisation (ASIO). Some senior MI5 staff stayed on afterwards
in the new ASIO. Similarly, from the NZ Security Intelligence Service (NZSIS)
perspective, historical surveys show how the UK was particularly influential in
persuading New Zealand to establish the SIS. Sir Percy Sillitoe (Head of MI5)
was sent to New Zealand to establish a sister agency there. He was successful
Intelligence and leadership 15
in his venture and many original NZSIS staff were British imports from MI5
(Greener-Barcham 2002: 510).
However, any discussion of the role of strong liaison and growing partnership
between ‘Five Eyes’ countries over several decades also needs to balance the
periods of success against other historical episodes marked by strain and in a few
instances even fraying of bonds. History shows there were occasions where there
were real tensions in the alliance, particularly at times when national interests
were not aligned. For example, although the Anglo-American partnership became
extremely close in the Cold War in monitoring the Soviet Union, it was not close
in all places where British and American interests diverged, such as during the
1956 Suez crisis (Warner 2014: 165 and 124). In later decades, as well, there were
other examples where the intelligence alliance diverged or was even disrupted
temporarily due to differing national interests. For example, New Zealand later
became partially blocked from its intelligence sharing arrangements with the US
as a result of the NZ Labour Government’s (Prime Minister David Lange) nuclear
policy that precluded US nuclear powered and/or armed naval ship visits to New
Zealand (Hager 1996).
However, despite episodic national interest differences, effective liaison and
building partnerships, not just at the most senior political or head of agency level
of course, but at working levels between officials, helped paper over more nar-
row political national interests. Lower working-level contacts helped promote and
sustain relations across ‘Five Eyes’ countries based on ‘shared ideals and long-
standing transnational connections’ (Jeffrey-Jones 2012: 707–721).
A fourth discernible theme is knowledge management and information shar-
ing. The historical literature covering the development of intelligence agencies
within each ‘Five Eyes’ ICs periodically refer to both the problems and successes
in producing good knowledge management and information sharing practices.
How do vast and diverse agencies within the US IC for example bring together
knowledge that can benefit the entire community, where historically there remains
within all ‘Five Eyes’ ICs a need to compartmentalise knowledge practice and its
management (Desouza 2009: 1219–1267; Lahneman 2004)? A culture of secrecy
is critical to the effective and secure operations in all ICs, yet increasingly after
9/11 the mantra of ‘need to know’ and policies such as the intelligence sharing
environment (ISE) have also driven intelligence reform efforts by political and
intelligence leaders in each ‘Five Eyes’ country (Walsh 2011a).
Linked to issues of information sharing and secrecy is the fifth theme—privacy,
transparency, and accountability in both policing and national security intelli-
gence contexts. Since 2013, intelligence studies scholars have become increasingly
focused on the impact the Snowden leaks had on bringing these issues to the pub-
lic and political consciousness (Walsh 2011a; Walsh and Miller 2016; Miller and
Walsh 2016; Walsh 2017a; Omand 2008: 593–607; Omand and Phythian 2018;
Patman and Southgate 2016: 871–887; Johnson 2018). However, as significant as
the Snowden (and to a lesser extent Wikileaks) episodes were, historical sources pro-
vide useful reminders that privacy, transparency, and accountability issues have long
been features of the historical landscape, including notably during the Cold War.
16 Intelligence and leadership
It was clear to varying levels of intensity in each ‘Five Eyes’ country that by
the 1960s the tension between secrecy, privacy/liberty, and transparency/account-
ability was already fraying between citizens, governments, and the intelligence
communities that served them. Following the 1973 Watergate scandal, the New
York Times ran with a story that the CIA were involved in domestic spying—
a violation of the National Security Act of 1947. These revelations led to the
Church Committee which ‘discovered that the misuse of power by the nation’s
secret agencies had been far more extensive than suggested by the already eye-
popping accounts in the Times’ (Johnson 2018: 1). The Church Committee also
discovered various abuses of power by the FBI in the surveillance and counter-
intelligence operations against African-American civil rights activists, anti-war
students amongst others (Johnson 2018: 120). The Church Committee heralded in
the US the establishment of two congressional intelligence oversight committees
(the Senate Select Committee on Intelligence and the House Permanent Select
Committee for Intelligence) in the 1970s, which continue to this day to play an
important if not always an effective role in promoting oversight and accountability.
In Canada, a series of inquiries, the Mackenzie Commission (1966), the Keable
(1977), and the McDonald Commission (1981), also investigated oversight,
accountability, and organisational performance issues of the Royal Canadian
Mounted Police (RCMP), which up until 1984 had carriage of domestic security
intelligence in Canada (Gill 1989; Whitaker 1991, 1992; Sayle 2010: 862–867;
Hewitt 2002, 2018). In Hewitt’s work (2002, 2018: 67–83), we see how the RCMP
Security Service’s inability over decades to ‘understand the new forces and threats
associated with the 1960s—including terrorism or even to qualitatively assess its
traditional targets’ along with its involvement in illegal and unethical activity in
Quebec and elsewhere in Canada resulted (following the McDonald Commission
inquiry into the RCMP) in the government creating in July 1984 the Canadian
Security Intelligence Service (CSIS) (Hewitt 2002: 166). CSIS then took primary
responsibility for domestic security intelligence away from RCMP, including its
work on counter-subversion and counter-terrorism to the new agency.
This historical notion of locating the balance between effective security
(including secrecy), privacy, and liberty remains an important debate because it
impacts on how to preserve the effectiveness of ICs against complex and emerg-
ing threats yet also maintains privacy, civil liberties, and trust of citizens in liberal
democratic countries. How issues of privacy, transparency, and accountability
have been dealt with both by political decision-makers and their intelligence lead-
ership cadre are clearly relevant to understanding effective leadership in the cur-
rent post-9/11 era (Walsh 2011a, 2016, 2017a, 2017b).
While concerns about privacy, secrecy, transparency, and accountability have
often coalesced in historical accounts of unethical, illegal, or over-reach by ICs,
there are other dimensions of transparency and accountability that in some respects
show a gradual and more positive desire by political and intelligence leaders to be
more open about aspects of their operation to the tax payer citizenry. As discussed
earlier, it seems clear that one of the impacts of the 2013 Snowden leaks has been
efforts made (to varying degrees) by either political or intelligence leaders across
Intelligence and leadership 17
‘the Five Eyes’ intelligence communities to appear publicly in order to defend
and explain in unclassified ways the positive role their agencies play in promot-
ing national security and public safety. For example, in 2014 the then Director
General of ASIO, David Irvine, appeared in front of the media to explain the role
and need for the new meta data retention laws going through Australia’s parlia-
ment at the time (Walsh 2017a). Similarly, Loch Johnson’s interview with the
then Director of National Intelligence Jim Clapper, which was later published in
the Intelligence and National Security journal, is another example (Johnson 2015:
1–25).
The combined effect from the ‘intelligence failures’ of 9/11, Iraq, and the
Snowden leaks have resulted in the need for intelligence leaders to play a greater
public role (sometimes willingly sometimes less so) via media appearances and
responding to inquiries. In particular, after Snowden there is now greater public
distrust and political and IC leaders have had to come out more publicly and
explain the actions of the IC (to the extent they can) in order to sustain or regain
trust, legitimacy, and even funding (Walsh and Miller 2016; Johnson et al. 2014;
Walsh 2017b). The fallout of Snowden also pressured to varying degrees across
each ‘Five Eyes’ country’s government to be more responsive to public concerns
about unchecked surveillance by ICs. This included efforts to examine intelli-
gence-related legislation that put more ‘trip wires’ in governing access to warrants
and interception, and further efforts by all to review accountability mechanisms
(Walsh and Miller 2016).
Importantly though, historical studies focusing on events prior to 9/11 or
Snowden also show efforts in some ‘Five Eyes’ ICs to be less secretive and more
transparent. For example, in the UK and Australian intelligence communities a
greater openness in the 1990s emerged about the existence of what have been
exclusively secret agencies such as MI5/MI6 (in the UK) or Australian Secret
Intelligence Service (ASIS), in Australia, and public acknowledgement of their
heads. Such a change in the political and policy atmosphere provided further
encouragement for the development of intelligence studies. In particular, a move
towards greater accountability and transparency across many ‘Five Eyes’ coun-
tries included some historians being granted access to archival records of key
intelligence agencies.
Increasingly since the 1990s to the present, much can be learnt about contem-
porary intelligence leadership from official, semi-official and extensive histories
of particular intelligence agencies across the ‘Five Eyes’ ICs. Official histories
are generally authorised by the agency. They may be completed by in-house his-
torians (e.g. Michael Warner’s extensive work (e.g. 2001; 2004) on the history
of the CIA as part of its history staff) or commissioned by the agency allowing
external historians access to restricted archives and staff to interview. Examples
of the latter have included Christopher Andrew’s Defence of the Realm (History
of MI5) and Keith Jefferey’s 2010 volume The British Secret Intelligence Service
1909–1949. In the case of Andrew, it was required that he become an MI5 officer
to gain access to material. Others include Michael Goodman’s Official History
of Joint Intelligence Committee (2014). Similarly in Australia, three volumes
18 Intelligence and leadership
chronicling the history of the ASIO—Australia’s domestic intelligence agency—
are the result of historians having unrestricted access to ASIO’s archival records
for the periods 1949 up until 1989 (see Horner 2014; Blaxland 2015; Blaxland
and Crawley 2017).
Blaxland (2015), like Jeffery’s (2010) work on MI6, is also instructive in pro-
viding insights into the earlier leadership profiles of ASIO Director Generals and
how they influenced organisational change at the time. Blaxland refers to Charles
Spry as staying too long in the DG position, and his successor Peter Barbour being
too ineffective in managing problems with recruitment of officers and other work-
force issues as being partly due to a lack of organisational reform and professional
training in ASIO (2015: Chapter 1).
In contrast to official and authorised histories, much is to be learnt about IC
leadership issues by reading non-official histories, which can provide a compre-
hensive analysis of material accessed via archives. Examples include Christopher
Andrew’s works The Secret World A History of Intelligence (2018) and Her
Majesty’s Secret Service (1987), Richard Aldrich’s GCHQ The Uncensored
Story of Britain’s Most Secret Intelligence Agency (2010), and Frank Cain’s
(1994) The ASIO: An Unofficial History. Similarly, Jensen’s (2008) Cautious
Beginnings Canadian Foreign Intelligence 1939–51 is a Canadian example of
recently non-official historical studies examining archival material that has not
been reviewed extensively to this point. Additionally, two excellent edited his-
torical volumes have been published focusing on ‘spy chiefs’ in the US and UK
(Moran et al. 2018) and in the Middle East and Asia (Maddrell et al. 2018),
respectively.
We will come back to other themes official and non-official histories reveal
about leadership in remaining parts of this chapter, but Section F (after the Cold
War and after 9/11) of Christopher Andrew’s Defence of the Realm provides a
good example of how political events and leadership interact in ways that from
the 1990s changed MI5 to primary a counter-terrorism rather than counter-espi-
onage agency (Andrew 2009: 771). It also shows how Stella Remington, who
became the first female head of any of the world’s leading intelligence or secu-
rity services in 1992, developed an openness program. The program included
the publication of the first ever booklet on MI5’s work with the first official
photo of the DG, increased media engagement, and public lectures—all of which
helped shape a more informed attitude and demystification of the service (Ibid:
776–777).
Both official and non-official histories show not only the bureaucratic develop-
ment of intelligence agencies and the security environment operating at the time,
but also glimpses of the leader’s personalities and how they shaped the future of
their agencies. The ability of intelligence leaders to wield power through their
personalities, and to influence both internally their agency and externally their
political masters, is critical, the latter point being particularly important. No one
can argue the profound impact personalities like J Edgar Hoover had on the devel-
opment of the FBI or William J Donovan, Allen W Dulles, and William Casey on
the evolution of the CIA.
Intelligence and leadership 19
Similarly in the UK, Jeffery’s The History of the Secret Intelligence Service
1909–1949 explains the role of the first three chiefs: Mansfield Cumming,
Hugh Sinclair, and Stewart Menzies in the first 40 years of MI6 were critical
to the survival of the new scarcely resourced agency. In the case of Cumming,
Jeffery describes him as ‘not much more than a one man band who (for the
survival and independence of the agency) during World War I had to fend off
the predatory attentions of the Admiralty and War Office’ (Jeffery 2010: 725).
Jeffery also talks about the particular qualities of Sinclair—‘his strengths as
a leader—charisma, decision and dynamism.’ Such qualities according to
Jeffery, engendered a fierce loyalty on the part of subordinates, together with
his inclination to press ahead with ventures without perhaps fully anticipating
all the possible consequences at times led him and SIS into crossing existing
Whitehall boundaries and trespassing into the territory of other departments.
(Ibid: 735)
Michael Goodman’s work on the history of the Joint Intelligence Committee (JIC)
is another good historical analyses on the political, military, and bureaucratic fac-
tors that influenced the development of the JIC and the role of leadership in its
development (Goodman 2008: 40–56).
Moving beyond the world war years (1945 to the present), and in addition
to historical analysis of heads of intelligence agencies completed from archives,
there is also much to be learnt from memoirs written by former heads them-
selves. In the last few decades a steady growth in memoirs show heads are talk-
ing more publicly about their own leadership experience, such as former DCI
James Woolsey, who believed he had little influence given he had no relationship
with President Clinton. In 2005, Admiral Stansfield Turner wrote Burn Before
Reading, Presidents, CIA Directors and Secret Intelligence, where he provides
some useful insights on a range of leadership issues including management of the
IC and CIA centralisation, the role of political leadership, and cleaning up after
the Church Committee in the late 1970s.
More recently, George Tenet’s (2007) memoir At the Center of the Storm:
My Years at the CIA, Michael Hayden’s (2016) Playing to the Edge: American
Intelligence in the Age of Terror, and Jim Clapper’s (2018) Facts and Fears. Hard
Truths from a Life in Intelligence are also instructive on how leaders present their
own leadership skills and the role they play in organisational change. Former CIA
Deputy Director Michael Morell’s (2015) The Great War of Our Time. The CIA’s
Fight Against Terrorism From Al Qa’ida to ISIS is also a fascinating insight on
IC leadership from a senior insider. Tenet’s memoir has received mixed reviews,
though Sir David Omand, a former UK intelligence leader, suggested the book
despite lacking detail was ‘essential in understanding how and why the leader-
ship structure of the US IC has taken the form it now has’ (Omand, Prados and
Jeffreys-Jones 2009: 292).
The sixth historical theme relevant to understanding contemporary leadership
is organisational design. There are several issues relevant to this theme, includ-
ing but not limited to organisational structural change, technology, collection and
20 Intelligence and leadership
analytical methodologies, and organisational culture. There is insufficient space
to assess each of these in detail, however, and like other themes discussed earlier,
we will come back to more detailed discussion of these in subsequent chapters.
But to provide some contextual understanding of organisational design-related
issues, I will briefly mention some key ones here. First, it’s clear that intelligence
historians and other scholars working in the field show how a combination of fac-
tors such as changes in the security environment, political influence, and the lead-
ership within each ‘Five Eyes’ IC work together to forge changes over time in the
organisational design of ICs. In the US, historical studies chart the gradual evolu-
tion of centralised and civilian-based intelligence agencies from what in the early
20th century was mainly a function of army and naval intelligence. During World
War II, greater efforts were made by the Roosevelt administration for a more cen-
tralised intelligence structure with the appointment of William J Donovan, who
in 1942 created the Office of Strategic Services (OSS)—the precursor to the CIA
(Leary 1984: 3–5).
The creation of the CIA in 1947 and its historical development is in part a
story of organisation design and redesign—with perhaps the first major re-
organisation of the agency implemented in 1952 in part influenced by an ear-
lier report (the Dulles, Jackson, and Correa Report to the National Security
Council on the CIA and National Organisation for Intelligence released in
1949).
(Ibid)
Later in the post-Cold War period, further changes to the security environment
impacted on the organisational structure of ‘Five Eyes’ ICs, particularly resulting
in more centralised and coordinated approaches to all source assessments. Hager
paints a picture in New Zealand of a gradual coordination of some intelligence
functions away from individual agencies starting in 1975 (mainly assessments)
and into the centre of government (1996: 132), but such shifts in approaches to
organisational design were also underway in Australia during the 1970s (Walsh
2011a). At the end of the Cold War there is also evidence in MI5 that changes in
the security environment resulted in increased strategic planning for the service
post-Cold War to be better equipped to handle new and emerging threats such
as countering WMD, supporting police against organised crime, protecting the
UK’s economic wellbeing, and investigating animal rights extremists. The so-
called Cold War peace dividend also resulted in budget cuts in MI5, SIS, and
Government Communications Headquarters (GCHQ) which undoubtedly had
an impact on organisational design and leadership (Andrews 2009: 780; Walsh
2011a).
Earlier discussion also included how catastrophic or significant intelligence
failure (Pearl Harbor, Bay of Pigs, 9/11, Iraq) often results in agency or IC-wide
organisational redesign. The 9/11 Commission Report in particular referred to the
need for IC-wide organisation redesign—including the need for more effective
leadership in order to see such change come into reality. The connection between
Intelligence and leadership 21
the urgent need for organisational change and leadership can be found in the fol-
lowing two sections:
The need for structural reform and leadership are also clear in comments made by
Senator Barbara A Mikulski:
Cross-disciplinary perspectives
Leadership theory
If we are to understand intelligence leadership in the contemporary sense, then
intelligence studies scholars, in addition to going back to historical sources also
need to investigate the broader context of leadership theory (Walsh 2017b: 441–
459). Given there is an almost endless array of management and leadership theo-
retical perspectives, I will restrict discussion here to areas where some empirical
work has been conducted. Although one could start this survey of the leadership
field by examining Greek and Roman philosophers such as Plato— who wrote
about leadership, or Niccolo Machiavelli in the renaissance, who advised his
prince on how to rule—our discussion commences in the late 1940s. It was at
this time that the early theoretical perspectives now discussed in modern leader-
ship theory began to emerge in the literature (Ibid: 442). Leadership theories are
influenced by social and political factors of their day and in the 1940s this was no
exception.
By the end of the war, theorists began to investigate leadership in the military to
assess whether the armed forces may help leadership in other contexts such as
industrial organisations (Ibid).
Given the diversity of leadership theoretical perspectives that developed since
World War II, I will use three thematic categories (neo-charismatic theories,
follower-centric theories, and team leadership theories) to clump together like-
minded theories. But in reality, leadership theories are underpinned by a vast
number of different theoretical perspectives—some of which have elements of
one or more of the categories that will be discussed. Readers looking for a more
comprehensive and global understanding of leadership theory in all its variants
can access detailed analyses of these in the following excellent edited volumes
and handbooks: Bass and Bass (2008) The Bass Handbook of Leadership Theory,
Research and Managerial Applications, Nohria and Khurana (eds) (2010) Hand
Book of Leadership Theory and Practice, Day (2014) The Oxford Handbook
of Leadership Organisations, and Bryman’s (2011) edited volume, The Sage
Handbook of Leadership. For intelligence studies, scholars, and IC leaders these
edited volumes are good places to start if you do not have any background in
leadership theory.
Neo-charismatic theories
The most common neo-charismatic theories are transformational leadership,
charismatic leadership, and transactional leadership. I will limit the discussion
to transformational leadership as it has produced the most empirical work out of
neo-charismatic theories. Charismatic and transaction leadership theoretical per-
spectives cross over significantly with those found in transformational leadership
(Walsh 2017b: 443).
Transformational leadership theory has developed over 30 years and as noted
above is one of the more empirically successful theories. In an earlier article I
wrote on IC leadership, a search of the Scopus data base search from 2000 to 2015
revealed over 2326 articles—which is a good indicator of research activity around
this theory (Ibid: 443; House and Antonakis 2013: 3–33). Within transformational
theorists there is a great diversity of perspectives that focus on leaders in different
contexts (e.g. CEOs of large private sector companies, military leaders, leaders in
health and education sectors) (Ibid).
Regardless of the different perspectives transformational theorists have about
leaders working in various contexts, most argue that transformational lead-
ers ‘share common perspectives that effective leaders transform or change the
basic values, beliefs and attitudes of followers so that they are willing to perform
beyond the minimum levels specified by the organisation’ (Podsakoff et al. 1990:
107–142). Many transformational leadership theorists, as noted earlier, adopt
Intelligence and leadership 27
an empirical design approach to their research by using quantitative empirical
instruments such as the multifactor leadership questionnaire (MLQ) developed
by Bernard Bass to measure leadership by assessing a series of behavioural char-
acteristics of leaders and the extent of influence they have on follower’s perfor-
mance (Bass and Avolio 1993; Bass and Riggio 2006).
There has been some empirical success amongst transformational leadership
scholars, who have used quantitative metrics like the MLQ, but traditionally there
remains a healthy divergence amongst its users on which behavioural charac-
teristics of leaders should be measured and what actual influence these have on
follower’s performance (Walsh 2017b: 443). In summary, while progress has
been made in the quality of empirical research on transformational leadership,
theory critiques have identified several deficiencies impacting on the validity of
results in transformational studies. First, critiques suggest that transformational
leaders give too much credit to the leader and their influence on individual fol-
lowers rather than other leader influences over groups or organisational processes.
Second, criticisms include that most empirical studies are heavily quantitative and
psychology driven—with fewer derived from other disciplines such as sociology
or qualitative studies. Finally, critiques agree that progress has been made with
transformational studies, but argue advancement has been slowed somewhat due
to a fragmented research agenda in the field (Ibid).
Follower-centric theories
While the bulk of leadership theories have focused on the leader, there has been
another cluster of theories running parallel with neo-charismatic theories like
transformational leadership. The work of follower-centric scholars challenge the
neo-charismatic adherent’s view that leaders are always critical to the leadership
processes (Bligh 2011; Hansen et al. 2007; Howell and Shamir 2005). Follower-
centric theorists argue that understanding leadership dynamics is insufficient if the
focus is merely on trying to understand what makes a ‘great leader’ or what they
do. And in the 1990s, follower-centric adherents such as James Meindl began to
challenge that leaders and followers are always different actors with distinctive
characteristics and behaviours, and that the leadership process was more an interac-
tive relationship between the two (Meindl cited in Bligh 2011: 427). Like transfor-
mational leadership theorising, follower-centric researchers also represent a broad
church of theoretical perspectives. Bligh argues that research streams tend to fall
into three broad categories: (1) follower attributes (identity, motivation, follower
perceptions, and values); (2) leader-follower relations (e.g. how active a role fol-
lowers play in the leadership process); (3) follower outcomes (e.g. how leadership
behaviour influences follower performance and creativity (Bligh 2011: 425–436).
There is insufficient space to provide a deep exploration of the follower-centric
field; instead the discussion will briefly list three research agendas (authentic, ethical,
and servant leadership) given these potentially will have more value to understand-
ing leadership in the IC context rather than others such as ‘romance of leadership’ or
‘aesthetic leadership’ (Walsh 2017b: 444). Each of these will be briefly defined and
28 Intelligence and leadership
like other theoretical perspectives outlined in this chapter, many aspects of these will
be discussed in greater detail in the subsequent substantive chapters.
As with most leadership theorising, defining clearly what authentic leader-
ship means is difficult (Ibid: 444–445; Cooper et al. 2005: 475–493). In 2003,
Luthans and Avolio defined authentic leadership as ‘a process that draws from
both positive psychological capacities and a highly developed organisational con-
text, which results in greater self-awareness and self-regulated positive behav-
iours on the part of leaders and associates, fostering self-development’ (Luthans
and Avolio 2003: 243). Authentic leadership scholars argue that a leader’s posi-
tive values, beliefs, ethics, and their ability to develop transparency amongst
other characteristics impact on whether followers are more likely to adopt such
qualities—resulting in a better organisation (Walsh 2017b: 444). Walumbwa et
al. (2008: 89–126) came up with the authentic leadership questionnaire (ALQ)
comprising leader characteristics such as self-awareness, relational transparency,
internalised moral perspective, and balanced processing. However, again ongoing
difficulties in defining authentic leadership and how authentic leadership behav-
iour actually and specifically engenders positive emotions in followers remains
unclear (Walsh 2017b: 445).
Briefly, the second follower-centric perspective—ethical leadership—is con-
cerned with how the leader’s actions result (or not) in ethical outcomes and how
these impact on the organisation they lead. This strand of follower-centric leader-
ship is clearly relevant to how IC leaders negotiate the many ethical dilemmas they
face in running intelligence agencies. Earlier in the historical sources discussion,
we mentioned issues of privacy, transparency, and accountability. In these and
many other issues explored in later chapters there is an ethical dimension to the
leaders’ decision-making and actions that need to be understood. The third exam-
ple of follower-centric leadership theory is servant leadership. Van Dierendunck
(2011: 1228–1261) provides a useful summary of its main theoretical strands. In
short it is concerned about how leaders serve others. While it was first introduced
in the 1970s, it didn’t gain much traction until the early 2000s.
Servant leadership has been applied in different leadership contexts, such as
the health and education sectors (Middlehurst 2008: 322–339). Some critiques
still question whether it is a distinct, viable, and valuable theory for organisa-
tional success (Parris and Peachey 2013: 377–393). Others claim that its empiri-
cal assessment instruments are improving—according to some scholars (Ehrhart
2004; Dennis et al. 2010: 169–179). For example, Ehrhart’s 2004 study developed
14 item scales that make up different categories and dimensions of servant leader-
ship. Ehrhart argued that certain attributes of servant leadership can be shown to
have a distinct influence on followers compared to those seen in transformational
leadership (Ehrhart 2004: 73).
Figure 2.1 Effective Intelligence Framework. Source: Walsh, Intelligence and Intelligence
Analysis, p.148.
Conclusion
This chapter provides the broad canvass upon which I argue any conceptualising
of IC leadership needs to occur. Understanding contemporary IC leadership, much
less any attempts to progress its theorising, will require a deeper understanding
of the five perspectives discussed and how they relate to leadership practice in
the IC context. These perspectives are historical, leadership theorising, organisa-
tional theorising, leadership, and psychology, which are informed by theoretical
perspectives like the effective intelligence framework. Combined they allow a
multi-disciplinary synthesis of all knowledge areas likely important in progress-
ing our understanding of contemporary IC leadership. Chapter 2 has painted a
large canvass. However, I do believe at this very fledgling point in the field of IC
leadership theory and practice such a wide terrain is warranted.
While the canvass has been wide in this chapter, in Chapters 3 (Tasking and
Coordination), 4 (Collection), and 5 (Analysis) we begin to break it down into
areas to better assess the specific challenges IC leaders will be confronted with.
You will recall tasking and coordination, collection, and analysis are all core
intelligence processes and in all three chapters the objective will be to assess
briefly relevant developments and the governance challenges IC leaders are now
confronted with.
Starting with Chapter 3 (Tasking and Coordination) and framing the discussion
in the post-9/11 contemporary environment, we explore what role IC leaders play
in promoting effective tasking and coordination. In particular, what factors (lead-
ership, political, and organisational) influence the ability for leaders to oversee
effective tasking and coordination across the ‘Five Eyes’ intelligence communi-
ties? Chapter 3 will demonstrate that the ability of the leader to implement and
oversee effective tasking and coordination processes are not just routine bureau-
cratic processes, but are crucial in providing coherent strategies for the collection,
analysis, production, and evaluation of intelligence.
Note
1 The ‘JIC’ or the UK Joint Intelligence Committee is an inter-agency body responsible
for intelligence assessment to assess events and situations relating to external affairs,
defence, terrorism, major international criminal activity, scientific, technical and inter-
national economic matters, and other transnational issues, drawing on secret intelli-
gence, diplomatic reporting, and open source material.
References
Aldrich, R. (2010). GCHQ the uncensored story of Britain’s most secret intelligence
agency. London: Harper Press.
36 Intelligence and leadership
Aldrich, R., & Cormac, R. (2016). The black door: Spies, secret intelligence and British
prime ministers. London: William Collins.
Anderson, S. (1994). The evolution of the Canadian intelligence establishment, 1945–1950.
Intelligence and National Security, 9(3), 448–471. doi: 10.1080/02684529408432261
Andrew, C. (1987). Her majesty's secret service. Middlesex, UK: Penguin.
Andrew, C. (2009). The defence of the realm. The authorized history of MI5. London: Penguin.
Andrew, C. (2018). The secret world. A history of intelligence. London: Allen Lane.
Bass, B., & Bass, R. (2008). The bass handbook of leadership. Theory, research and
managerial implications (4th ed.). New York: Free Press.
Bass, B., & Riggio, R. (2006). Transformational leadership (2nd ed.). Mahwan, NJ:
Lawrence Erlbaum Associates.
Bass, B.M., & Avolio, B.J. (1993). Transformational leadership: A response to critiques.
In M.M. Chemers & R. Ayman (Eds.), Leadership theory and Research: Perspectives
and directions (pp. 49–80). San Diego, CA: Academic Press.
Bean, H. (2009). Organizational culture and US intelligence affairs. Intelligence and
National Security, 24(4), 479–498. doi: 10.1080/02684520903069413
Best, R.A. (2014). Leadership of the U.S. Intelligence Community: From DCI to DNI.
International Journal of Intelligence and Counterintelligence, 27(2), 253–333. doi:
10.1080/08850607.2014.872533
Betts, R. (1978). Analysis, war and decision: Why intelligence failures are inevitable?
World Politics, 31(1), 61–89.
Billig, M. (2015). The myth of Kurt Lewin and the rhetoric of collective memory
in social psychology textbooks. Theory and Psychology, 25(6), 703–718. doi:
10.1177/0959354315594255
Blaxland, J. (2015). The protest years: The official history of ASIO: 1963–1975 (Vol. 2).
Sydney, NSW: Allen and Unwin.
Blaxland, J., & Crawley, R. (2017). The secret cold war, the official history of ASIO 1975–
1989 (Vol. 3). Sydney, NSW: Allen and Unwin.
Bligh, M. (2011). Followership and follower-centres approaches. In A. Bryman, D.
Collinson, K. Grint, B. Jackson and M. Uhl-Bien (Eds.), The Sage handbook of
leadership (pp. 425–436). London: Sage.
Brunatti, A.D. (2013). The architecture of community: Intelligence community
management in Australia, Canada and New Zealand. Public Policy and Administration,
28(2), 119–143. doi: 10.1177/0952076712458110
Bryman, A. (Ed.). (2011). The SAGE handbook of leadership. Sage Publications.
Cain, F. (1994). The Australian Security Intelligence Organization : an unofficial history.
Richmond, Vic: Spectrum Publications.
Canada, Royal Commission of Inquiry Concerning Certain Activities of the Royal
Canadian Mounted Police (McDonald Commission). (1981). Report. (3 vols.). Ottawa:
Supply and Services Canada.
Canada, Royal Commission on Security (Mackenzie Commission). (1969). Report.
Ottawa: Queen’s Printer.
Clapper, J. (2018). Facts and fears. Hard truths from a life in intelligence. New York:
Viking.
Commission of Inquiry into Police Operations in Quebec; Keable, J.-F.; Quebec (Province).
Ministry of Justice. (1981). Report of the Commission of Inquiry into Police Operations
in Territory Quebec. Quebec: Ministry of Justice, xv, 451 pp.
Cooper, C.D., Scandura, T.A., & Schriesheim, C.A. (2005). Looking forward but
learning from our past: Potential challenges to developing authentic leadership theory
Intelligence and leadership 37
and authentic leaders. The Leadership Quarterly, 16(3), 475–493. doi: 10.1016/j.
leaqua.2005.03.008
Darroch, S., & Mazerolle, L. (2013). Intelligence-led policing: A comparative analysis of
organizational factors influencing innovation uptake. Police Quarterly, 16(1), 3–37.
doi: 10.1177/1098611112467411
Day, D. (2014). The Oxford handbook of leadership and organizations. New York: Oxford
University Press.
Dennis, R.S., Kinzler-Norheim, L., & Bocarnea, M. (2010). Servant leadership theory. In
D. van Dierendonck & K. Patterson (Eds.), Servant leadership: Developments in theory
and research (pp. 169–179). London: Palgrave Macmillan UK.
Desouza, K.C. (2009). Information and knowledge management in public sector
networks: The case of the US Intelligence Community. International Journal of Public
Administration, 32(14), 1219–1267. doi: 10.1080/01900690903344718
Dover, R., & Goodman, M. (Eds.). (2011). Learning from the secret past: Cases in British
intelligence history. Washington, DC: Georgetown University Press.
Ehrhart, M.G. (2004). Leadership and procedural justice climate as antecedents of unit-
level organizational citizenship behaviour. Personnel Psychology, 57(1), 61–94. doi:
10.1111/j.1744-6570.2004.tb02484.x
Farson, S., & Teeple, N. (2015). Increasing Canada’s foreign intelligence capability:
Is it a dead issue? Intelligence and National Security, 30(1), 47–76. doi:
10.1080/02684527.2014.961243
Flood, P. (2004). Report of the inquiry into Australian Intelligence Agencies. Canberra,
ACT: Australian Government Printing Office.
Gentry, J.A. (2010). Intelligence learning and adaptation: Lessons from
counterinsurgency wars. Intelligence and National Security, 25(1), 50–75. doi:
10.1080/02684521003588112
Gentry, J.A. (2015). Has the ODNI improved U.S. Intelligence analysis? International
Journal of Intelligence and Counterintelligence, 28(4), 637–661. doi:
10.1080/08850607.2015.1050937
Gentry, J.A. (2016). Managers of analysts: The other half of intelligence analysis. Intelligence
and National Security, 31(2), 154–177. doi: 10.1080/02684527.2014.961244
Gentry, J.A. (2018). Favourite INTs: How they develop, why they matter. Intelligence and
National Security, 33(6), 822–838. doi: 10.1080/02684527.2018.1449371
Gill, P. (1989). Symbolic or real? The impact of the Canadian security intelligence
review committee, 1984–88. Intelligence and National Security, 4(3), 550–575. doi:
10.1080/02684528908432016
Goodman, M.S. (2008). Learning to walk: The origins of the UK’s Joint Intelligence
Committee. International Journal of Intelligence and Counterintelligence, 21(1), 40–
56. doi: 10.1080/08850600701649163
Goodman, M.S. (2014). The official history of Joint Intelligence Committee. Volume 1.
From the approach of the second world war to the Suez Crisis. London: Routledge.
Greener-Barcham, B.K. (2002). Before September: A history of counter-terrorism
in New Zealand. Australian Journal of Political Science, 37(3), 509–524. doi:
10.1080/1036114021000026382
Hager, N. (1996). Secret power: New Zealand's role in the international spy network.
Nelson, New Zealand: Craig Potten.
Hammond, T.H. (2010). Intelligence organizations and the organization of intelligence.
International Journal of Intelligence and Counterintelligence, 23(4), 680–724. doi:
10.1080/08850601003780987
38 Intelligence and leadership
Handel, M.I. (1988). Leaders and intelligence. Intelligence and National Security, 3(3),
3–39. doi: 10.1080/02684528808431957
Hansen, H., Ropo, A., & Sauer, E. (2007). Aesthetic leadership. The Leadership Quarterly,
18(6), 544–560.
Harris, A. (2007). Distributed leadership: Conceptual confusion and empirical
reticence. International Journal of Leadership in Education, 10(3), 315–325. doi:
10.1080/13603120701257313
Haslam, S.A., Reicher, S.D., & Platow, M.J. (2010). The new psychology of leadership :
Identity, influence and power. Hove, UK: Taylor & Francis Group.
Hatch, M. (2006). Organization theory (2nd ed.). Oxford: Oxford University Press.
Hatlebrekke, K.A., & Smith, M.L.R. (2010). Towards a new theory of intelligence failure?
The impact of cognitive closure and discourse failure. Intelligence and National
Security, 25(2), 147–182. doi: 10.1080/02684527.2010.489274
Hayden, M. (2016). Playing to the edge. New York: Penguin Press.
Herman, M. (1996). Intelligence power in peace and war/Michael Herman. Cambridge,
UK: Cambridge University Press.
Hewitt, S. (2002). Reforming the Canadian security state: The Royal Canadian Mounted
Police security service and the ‘Key Sectors’ program. Intelligence and National
Security, 17(4), 165–184. doi: 10.1080/02684520412331306680
Hewitt, S. (2018). Cold war counter-terrorism: The evolution of international counter-
terrorism in the RCMP Security Service, 1972–1984. Intelligence and National
Security, 33(1), 67–83. doi: 10.1080/02684527.2017.1323833
Hitz, F. (2015). Human source intelligence. In L. Johnson & J. Wirtz (Eds.), Intelligence:
The secret world of spies (4th ed., pp. 107–119). New York: Oxford University
Press.
Horner, D. (2014). The spy catchers: The official history of ASIO 1949–1963 (Vol. 1).
Sydney, NSW: Allen and Unwin.
House, R.J., & Antonakis, J. (2013). The full-range leadership theory: The way forward
transformational and charismatic leadership: The road ahead 10th anniversary edition
(pp. 3–33). Bingley, UK: Emerald Publishing Group Ltd.
Howell, J., & Shamir, B. (2005). The role of followers in the charismatic leadership process:
Relationships and their consequences. Academy of Management Review, 30(1), 96–112.
Innes, M., Roberts, C., & Lowe, T. (2017). A disruptive influence? Preventing problems and
counter violent extremism policy in practice. Law and Society Review, 51(2), 252–281.
Innes, M., & Sheptycki, J. (2004). From detection to disruption: Intelligence and the
changing logic of police crime control in the UK. International Criminal Justice
Review, 14(1), 1–24.
James, A. (2014). Forward to the past: Reinventing intelligence-led policing in Britain.
Police Practice and Research, 15(1), 75–88. doi: 10.1080/15614263.2012.754126
Jeffery, K. (2010). MI6 the history of the Secret Intelligence Service, 1909–1949. London:
Bloomsbury.
Jeffery, K. (2010). The Secret History of MI6: 1909–1949. New York: Penguin Books.
Jeffreys-Jones, R. (2012). The end of an exclusive special intelligence relationship: British-
American intelligence co-operation before, during and after the 1960s. Intelligence and
National Security, 27(5), 707–721. doi: 10.1080/02684527.2012.708523
Jensen, K. (2008). Cautious beginnings: Canadian foreign intelligence 1939-51.
Vancouver, BC: University of British Columbia.
Jensen, K.F. (2004). Canada’s foreign intelligence interview program, 1953–90. Intelligence
and National Security, 19(1), 95–104. doi: 10.1080/0268452042000222948
Intelligence and leadership 39
Johnson, L. (2015). A conversation with James R Clapper Jr. the Director of National
Intelligence in the United States. Intelligence and National Security, 30(1), 1–25.
Johnson, L. (2018). Spy watching. Intelligence accountability in the United States. New
York: Oxford University Press.
Johnson, L., Aldrich, R.J., Moran, C., Barrett, D.M., Hastedt, G., Jervis, R., … Wark, W.K.
(2014). An INS special forum: Implications of the Snowden leaks. Intelligence and
National Security, 29(6), 793–810.
Kahn, D. (2001). An historical theory of intelligence. Intelligence and National Security,
16(3), 79–92. doi: 10.1080/02684520412331306220
Kealey, G.S. (1992). The surveillance state: The origins of domestic intelligence and
counter-subversion in Canada, 1914–21. Intelligence and National Security, 7(3), 179–
210. doi: 10.1080/02684529208432165
Lahneman, W.J. (2004). Knowledge-sharing in the intelligence community after 9/11.
International Journal of Intelligence and Counterintelligence, 17(4), 614–633. doi:
10.1080/08850600490496425
Leary, W. (Ed.). (1984). The Central Intelligence Agency history and documents.
Tuscaloosa, AL: University of Alabama Press.
Leonard, H.S., Lewis, R., Freedman, A.M., & Passmore, J. (2013). The Wiley-Blackwell
handbook of the psychology of leadership, change, and organizational development.
New York, UK: John Wiley & Sons, Incorporated.
Lewandowski, C., Carter, J.G., & Campbell, W.L. (2017). The role of people in information-
sharing: Perceptions from an analytic unit of a regional fusion center. Police Practice
and Research, 18(2), 174–193. doi: 10.1080/15614263.2016.1250631
Locander, W., & Luechauer, D. (2005). The psychology of leadership: New perspectives
and research. Academy of Management Review, 30(3), 641–643. doi: 10.5465/
AMR.2005.17293766
Luthans, F., & Avolio, B. (2003). Authentic leadership development. In K. Cameron,
J. Dutton & R. Quinn (Eds.), Positive organizational leadership (pp. 241–258). San
Francisco, CA: Berrett-Koehler.
Maddrell, P., Moran, C., Iordanou, I., & Stout, M. (Eds.). (2018). Spy chiefs intelligence
leaders in Europe, the Middle East, and Asia (Vol. 2). Washington, DC: Georgetown
University Press.
Margolis, G. (2013). The lack of HUMINT: A recurring intelligence problem. Global
Security Studies, 4(2), 43–60.
Michael, B. (2015). Kurt Lewin’s leadership studies and his legacy to social psychology: Is
there nothing as practical as a good theory? Journal for the Theory of Social Behaviour,
45(4), 440–460. doi: 10.1111/jtsb.12074
Michael, S.J. (2015). Policy, planning, intelligence and foresight in government
organizations. Foresight, 17(5), 489–511. doi: 10.1108/FS-12-2014-0081
Middlehurst, R. (2008). Not enough science or not enough learning? Exploring the gaps
between leadership theory and practice. Higher Education Quarterly, 62(4), 322–339.
doi: 10.1111/j.1468-2273.2008.00397.x
Miller, S., & Walsh, P.F. (2016). The NSA leaks, Edward Snowden and the ethics and
accountability of intelligence collection. In J. Gaillot (Ed.), Ethics and the future of
spying: Technology, intelligence collection and national security (pp. 193–204).
Abingdon: Routledge.
Moran, C., Stout, M., Iordanou, I., & Maddrell, P. (Eds.). (2018). Spy chiefs. Intelligence
leaders in the US and the United Kingdom (Vol. 1). Washington, DC: Georgetown
University Press.
40 Intelligence and leadership
Morell, M. (2015). The great war of our time: the CIA’s fight against terrorism--from al
qa'ida to isis. Twelve. New York: Hachette Book Group.
Murdoch, S. (2009). Report to the state services commissioner: Intelligence agencies
review. Wellington, New Zealand: New Zealand Government.
National Academies of Sciences, Engineering and Medicine. (2018). Changing
sociocultural dynamics and implications for national security: Proceedings of a
workshop. Washington, DC.
Nohria, N., & Khurana, R. (Eds.). (2010). Handbook of leadership theory and practice.
Boston, MA: Harvard Business Press.
Omand, D. (2008). Can we have the pleasure of the grin without seeing the cat? Must the
effectiveness of secret Agencies Inevitably Fade on Exposure to the light? Intelligence
and National Security, 23(5), 593–607. doi: 10.1080/02684520802449476
Omand, D. (2010). Creating intelligence communities. Public Policy and Administration,
25(1), 99–116.
Omand, D., & Phythian, M. (2018). Principled spying: The ethics of secret intelligence.
Oxford University Press.
Omand, S.D., Prados, J., & Jeffreys-Jones, R. (2009). The embattled helmsman: George
Tenet's years at the CIA. Intelligence and National Security, 24(2), 291–302. doi:
10.1080/02684520902826656
Parris, D., & Peachey, J. (2013). A systematic literature review of servant leadership theory
in organizational contexts. Journal of Business Ethics, 113(3), 377–393. doi: 10.1007/
s10551-012-1322-6
Parry, K. (2011). Leadership and organization theory. In A. Bryman,, D. Collinson, K.
Grint, B. Jackson, & M. Uhl-Bien (Eds.), The Sage handbook of leadership (pp. 54–70).
Thousand Oaks, CA: Sage Publications Limited.
Patman, R.G., & Southgate, L. (2016). National security and surveillance: The public
impact of the GCSB Amendment Bill and the Snowden revelations in New Zealand.
Intelligence and National Security, 31(6), 871–887. doi: 10.1080/02684527.2015.
1095968
Podsakoff, P., Mackenzie, S.B., & Moorman, R.H. (1990). Transformational leader
behaviours and the effects on follower's trust in leader, satisfaction, and organizational
citizenship behaviours. The Leadership Quarterly, 1–2, 107–142.
Ratcliffe, J. (2005). The effectiveness of police intelligence management: A New Zealand
case study. Police Practice and Research, 6(5), 435–451. doi: 10.1080/15614260500433
038
Ratcliffe, J. (2016). Intelligence led policing (2nd ed.). Abingdon, UK: Routledge.
Rudner, M. (2001). Canada's communications security establishment from Cold
War to globalization. Intelligence and National Security, 16(1), 97–128. doi:
10.1080/714002836
Sayle, T.A. (2010). The formative years of Canadian foreign intelligence. Intelligence and
National Security, 25(6), 862–867. doi: 10.1080/02684527.2010.537883
Schmidt, J.M. (2015). Policy, planning, intelligence and foresight in government
organizations. Foresight, 17(5), 489–511. doi: 10.1108/FS-12-2014-0081
Scott, L., & Hughes, R.G. (2006). Intelligence, crises and security: Lessons from history?
Intelligence and National Security, 21(5), 653–674. doi: 10.1080/0268452060095
7639
Steinhart, A., & Avramov, K. (2013). Is everything personal? Political leaders and
intelligence organizations: A typology. International Journal of Intelligence and
Counterintelligence, 26(3), 530–549. doi: 10.1080/08850607.2013.780556
Intelligence and leadership 41
Taylor, R.W., & Russell, A.L. (2012). The failure of police ‘fusion’ centers and the concept
of a national intelligence sharing plan. Police Practice and Research, 13(2), 184–200.
doi: 10.1080/15614263.2011.581448
Taylor, S., & Goldman, D. (2004). Intelligence reform: Will more agencies, money,
and personnel help? Intelligence and National Security, 19(3), 416–435. doi:
10.1080/0268452042000316223
Tenet, G. (2007). At the center of the storm: My years at the CIA. New York: Harper
Collins.
The 9/11 Commission Report. (2004). The 9/11 Commission report. Final report of the
National Commission on terrorist attacks upon the United States. Washington, DC:
9/11 Commission.
Turner, S. (2005). Burn before reading, presidents, CIA directors and secret intelligence.
New York: Hyperion.
van Dierendonck, D. (2011). Servant leadership: A review and synthesis (Vol. 37) (pp.
1228–1261). Los Angeles, CA: SAGE Publications.
Vugt, M., & Ronay, R. (2014). The evolutionary psychology of leadership: Theory,
review, and roadmap. Organizational Psychology Review, 4(1), 74–95. doi:
10.1177/2041386613493635
Walsh, P.F. (2007). Managing intelligence: Innovation and implications for management.
In M. Mitchell & J. Casey (Eds.), Police leadership and management (pp. 61–74).
Sydney, NSW: Federation Press.
Walsh, P.F. (2011a). Intelligence and intelligence analysis. Abingdon, UK: Routledge.
Walsh, P.F. (2011b). Intelligence and national security issues in policing. In P. Birch &
V. Herrington (Eds.), Policing in practice (pp. 109–127). Sydney, NSW: Palgrave
Macmillan.
Walsh, P.F. (2015). Building better intelligence frameworks through effective governance.
International Journal of Intelligence and Counterintelligence, 28(1), 123–142. doi:
10.1080/08850607.2014.924816
Walsh, P.F. (2016). Australian National Security Intelligence Collection Since 9/11: Policy
and Legislative Challenges. In K. Warby (Ed.), National Security, Surveillance and
Terror (pp. 51-74): Springer International Publishing.
Walsh, P.F. (2017a). Securing state secrets. In R. Dover, H. Dylan & M. Goodman (Eds.),
The Palgrave handbook of security, risk and intelligence (pp. 177–194). London:
Palgrave Macmillan.
Walsh, P.F. (2017b). Making future leaders in the US Intelligence Community:
Challenges and opportunities. Intelligence and National Security, 32(4), 441–459. doi:
10.1080/02684527.2016.1253920
Walsh, P.F. (2017c). Drone paramilitary operations against suspected global terrorists: US
and Australian perspectives. Intelligence and National Security, 32(4), 429–433.
Walsh, P.F. (2018). Intelligence, biosecurity and bioterrorism. Basingstoke, UK: Palgrave
Macmillan.
Walsh, P.F., & Miller, S. (2016). Rethinking ‘five eyes’ security intelligence collection
policies and practice post Snowden. Intelligence and National Security, 31(3),
345–368.
Walumbwa, F.O., Avolio, B.J., Gardner, W.L., Wernsing, T.S., & Peterson, S.J. (2008).
Authentic leadership: Development and validation of a theory-based measure. Journal
of Management, 34(1), 89–126. doi: 10.1177/0149206307308913
Wark, W.K. (1993). Introduction: The study of espionage: Past, present, future? Intelligence
and National Security, 8(3), 1–13. doi: 10.1080/02684529308432211
42 Intelligence and leadership
Warner, M. (Ed.). (2001). Central intelligence: Origin and evolution. Washington, DC:
CIA History Staff, Center for the Study of Intelligence.
Warner, M. (2004). Intelligence transformation and intelligence liaison. The SAIS Review
of International Affairs, 24(1), 77–89.
Warner, M. (2014). The rise and fall of intelligence. Washington, DC: Georgetown
University Press.
Whibley, J. (2014). One community, many agencies: Administrative developments in New
Zealand’s intelligence services. Intelligence and National Security, 29(1), 122–135.
doi: 10.1080/02684527.2012.746416
Whitaker, R. (1991). The politics of security intelligence policy-making in Canada: I 1970–
84. Intelligence and National Security, 6(4), 649–668. doi: 10.1080/02684529108432126
Whitaker, R. (1992). The politics of security intelligence policy-making in Canada: II 1984–
91. Intelligence and National Security, 7(2), 53–76. doi: 10.1080/02684529208432156
Zegart, A. (2007). Spying blind. Princeton, NJ: Princeton University Press.
3 Tasking and coordination
Introduction
In this chapter, I outline key tasking, coordination, and integration challenges
intelligence communities (IC) leaders will be confronted with as the security
environment becomes increasingly more complex. More specifically, Chapter 3 is
about how leaders, both those external to the IC (i.e. political decision-makers)
and internal (IC leaders), navigate through the complexities of tasking, coordina-
tion, and integration both at the agency and the entire community level. Tasking
and coordination are interrelated functions within intelligence. There can be no
intelligence processes or products without a decision-maker tasking our ICs to
provide them. Tasking, once initiated, requires the effective coordination of other
core intelligence processes (e.g. collection and analytical assets) to ensure the
intelligence enterprise has the best chance to support taskers/decision-makers
within requested timeframes. In this chapter, therefore, I will refer to tasking and
coordination together as both are inextricably linked and rely on each other. We
also talk about ‘integration’ as the chapter progresses as it is linked also to tasking
and coordination.
In Chapter 2 (Intelligence and Leadership) we saw how the creation of the
modern ‘Five Eyes’ ICs after World War II developed. The modern history of
these ICs, influenced how intelligence was tasked and coordinated, and this in
turn over several decades impacted on the strategies, structures, organisational
cultures, technology; and workforce development of these communities. Political
and IC leaders have both shaped tasking and coordination policies, activities,
and processes and this chapter will explore how leaders’ interventions have both
attempted to improve tasking and coordination as well as how these measures in
some cases have fallen short of their intentions. It is not feasible to provide a full
assessment on the merits or otherwise of all tasking and coordination activities
currently operating across each ‘Five Eyes’ community. Much of this is classified,
but it is possible based on primary (interviews, the IC leadership survey) and sec-
ondary sources assembled for this research to provide general insights into how
leaders have engaged with tasking and coordination activities and identify where
the challenges remain. Our analysis of tasking and coordination across the ‘Five
Eyes’ communities is organised around four broad themes that arose both from
44 Tasking and coordination
primary and secondary research sources. These are: Theme 1 Intelligence Policy
Reform Post-9/11, Theme 2 Risk and Threat Analysis, Theme 3 Role of Science
and Technology, and Theme 4 Strategic Intelligence, Tasking, and Coordination.
I will briefly discuss the role of leaders in each and their impact on tasking and
coordination activities after which some general implications will be made in the
conclusion. In Chapter 8 (The Future IC Leader and Governance) we will come
back to how IC leaders will deal with the most critical tasking and coordination
issues raised here.
External factors
Chapter 2 described how since the end of World War II (with varying levels of
intensity and success) ‘Five Eyes’ governments have orchestrated policy, organi-
sational, and legislative initiatives to bring greater integration, centralisation, and
coordination of intelligence. Indeed, as far back as the Truman administration
successive US governments have expressed the desire to see better intelligence
coordination (Best 2014: 254). In the United States alone, at least 14 IC studies
have been conducted over the years and despite each recommending reforms, few
resulted in significant changes. Only the Dulles Report (1949), Schlesinger Report
(1971), Church Committee Report (1976), and 9/11 Commission Report (2004)
achieved any substantial change (Warner and McDonald 2005). Additionally,
and more recently, just on the issue of terrorism and intelligence performance
alone ‘there was 12 major bipartisan commission, governmental studies and think
Tasking and coordination 45
tank task forces that examined the US IC and its counterterrorism efforts’ (Zegart
2007: 27).
The objective here is not to provide a detailed assessment of pre-9/11 policy reform
efforts in each ‘Five Eyes’ country. Some of these were highlighted in Chapter 2 and
although many pre-9/11 policy reform efforts were influential in the development
of ‘Five Eyes’ ICs, the focus here will be on how ‘Five Eyes’ countries responded
to 9/11 and post-9/11 failures. Turning to the United States first, a large volume of
sources document the concerns that drove the Bush administration, reluctantly at
first (Goodman 2003: 60), and Congress to implement an intelligence reform policy
agenda post-9/11. Detailed analysis of how the US political leadership understood
the causes of 9/11 as an intelligence failure and what the policy remedies might be
can be found in several sources (The 9/11 Commission Report 2004; Zegart 2007;
Goodman 2003: 60; Marrin 2011: 182–202; Posner 2005; Best 2014: 253–333).
Amongst these sources there are a range of perspectives on the main drivers of intel-
ligence failure leading up to the events of 9/11, including but not limited to the FBI
and CIA not sharing information sufficiently, coordination issues, policy failures,
intelligence collection failures, and analytical deficiencies. Furthermore, even a cur-
sory review of the Bush administration and Congressional statements demonstrate
what many politicians in Washington, DC thought were the main causes in the fail-
ure of intelligence around the events of 9/11. For example, members of the legisla-
tive branch referred frequently to a fragmented, uncoordinated response by the IC
pre-9/11, which required both a strategy and structure that would facilitate a more
integrated approach by the IC against Al Qaeda and other threats moving forward.
In the 2002 Report of the Joint Inquiry of the House Permanent Select Committee on
Intelligence and the Senate Select Committee into Intelligence Community Activities
Before and After the Terrorist Attacks of September 11, there were several refer-
ences underscoring views that radical changes to the IC was required. For example,
the inquiry reported the Director of Central Intelligence (DCI) had failed to integrate
resources from across the IC against al Qaida, which
I used the considerable budget and programmatic authority the DNI has to
induce the desired behavior among the IC components. Other tools included
Tasking and coordination 47
IC ITE and joint duty. I stayed in weekly contact—by email—with all
16 components, as well as the ODNI staff. Very time-consuming, but being
informed about what was going on all over the IC is almost mandatory if
you are going to lead it, and promote integration. Also, visits to each compo-
nent periodically (which often included a Town hall with the respective work
force also afforded me the opportunity to push integration directly to the rank
and file. As well, I focused on ICD’s (Intelligence Community Directives)
to push policies. I had a lot to do, of course, with picking component lead-
ers, another way to foster integration. In sum, no one silver bullet—rather, a
series of things both big and small.1
At the time of writing (during the Trump administration), it is less clear how
successive DNIs (Dan Coats) and the current DNI John Ratcliffe have built on
Clapper’s reforms to better integrate whole IC approaches, including improving
tasking and coordination processes. Indeed, increasingly since commencement of
the Trump administration in January 2017, the President has expressed varying
attitudes to the IC at best tolerance, though often neglect, suspicion, and even
hostility. Outgoing senior US IC leaders such as John Brennan (CIA) and DNI
Jim Clapper have periodically raised concerns that the President has not only
played down the role Russia took in interfering in the 2016 US elections, but that
the President fails to see the broader threat from cyber in Russia, Eastern Europe,
and Syria. Also concerning is reports that President Trump early in his presidency
rejected a regular written or orally delivered presidents daily brief (PDB). This
was delegated to others—reducing the IC’s direct access to the President and
their ability to provide assessments to him. This can have the effect of not in
return receiving back coherent and consistent executive-level intelligence tasking
(Strategic Comments 2017).
Although efforts have been made, particularly under Clapper’s time as DNI,
to produce a comprehensive IC strategy and articulated strategic priorities, these
initiatives have not yet achieved the desired unity of effort throughout the enter-
prise (Johnson 2015b; Harknett and Stever 2011). In the end, rather than provide
a single point of authority within the US IC, the IRTPA created another layer of
bureaucracy with the DNI given little more power than the former DCI had over
the US IC to affect alignment of resources and mission across the IC. The DNI
by political and bureaucratic design could not be entirely a single point of author-
ity to ensure a whole of IC tasking and coordination approach could be achieved
across the community.
In contrast to the United States, structural reform initiatives of other ‘Five Eyes’
intelligence countries, the IRTPA represented ‘major surgery’ compared to what
governments in Australia, the UK, Canada, and New Zealand implemented after
9/11. In Australia, the Flood Review may have been the earliest substantial review
of the IC since 9/11 commissioned by an Australian government. However, its
focus was not on how to restructure the Australian intelligence community after
9/11—rather its central remit was to examine intelligence assessments made in
the lead up to the coalition invasion of Iraq (Walsh 2011a: 16; Flood 2004b; Jones
48 Tasking and coordination
2018). In Australia, the UK, Canada, and New Zealand, the immediate post-9/11
policy reform response was more legislative—reviewing definitions of terrorism
offences and giving ICs greater and proactive surveillance and collection powers
than setting up new standalone bureaucratic structures within their ICs (Walsh
2011a: 218–227). In short, in the non-US ‘Five Eyes’ countries, the political and
policy response was not to affect large-scale structural reform of their intelli-
gence communities right away but to achieve improved integration via legislative
reforms. In Australia, the evolving complexity of transnational threats such as
Al Qaeda sparked the implementation of several pieces of legislation to improve
the collection of intelligence. From 11 September 2001 to 11 September 2011,
the Australian Parliament passed 54 pieces of anti-terrorism legislation—much
more than Canada, New Zealand, and the UK (Walsh 2016: 51–74; Williams
2011: 1144). Australia’s key anti-terrorism laws are enshrined in Division
100 of the Criminal Code Act 1995 (Cth), which has been amended several times.
Sections 100–105 deal with: definition of terrorism; receiving and providing
training (Australian Government, Criminal Code Act 1995, p. 137). Other new
amendments to the Criminal Code included terrorist financing offences (Division
103), speech offences (i.e. urging violence) (Part 5.1), as well as new powers to
allow the Attorney General to prescribe a terrorist organisation (Division 102).
The other significant intelligence collection and counter-terrorism response dur-
ing the early post-9/11 years (during the Howard conservative government) were
control and preventative detention orders. Division 104 of the Criminal Code now
allowed control orders against individuals not suspected of any criminal offence
that may be subjected to restrictions (equivalent to house arrest). These meas-
ures were thought by government to be reasonably necessary to protect the public
from terrorism. Views on the need for control orders varied at the time these
reforms were introduced (see for example, McDonald 2007: 106; White 2012;
White 2007: 116–25). The preventative detention measures under Division 105 of
the Criminal Code allowed for an individual to be detained for up to 48 hours if
there was a reasonable expectation this would prevent imminent terrorist acts or
assist in preserving evidence relating to a recent terrorist act. The initial 48-hour
period could be further extended under state law by 14 days (Walsh 2016: 51–74).
A more detailed survey of Australian and Canadian counter-terrorism and intel-
ligence legislation can be found in Walsh (2016: 51–74).
Similar to the United Kingdom’s Terrorism Act 2000, Australia also separated
terrorism laws from other criminal offences, while the criminal law was expanded
to deal with association with terror groups and participation in a terrorist act (Misra
2018: 108). Immediately after 9/11 in the UK, the Anti-Terrorism, Crime and
Security Act was passed, described by one expert as ‘surely the most draconian
legislation Parliament has passed in peacetime in over a century’ (Phythian 2005:
668). Controversially, this legislation introduced a system of indefinite detention
without trial for immigrants and asylum-seekers, who could not be deported, but
were certified by the Home Secretary, on the basis of intelligence, to be a ‘sus-
pected international terrorist’ and so a threat to national security. Hence, a politi-
cian, not a judge, would rule on indefinite detentions.
Tasking and coordination 49
Similarly in Canada, the most immediate and widely recognisable response to
9/11 was the introduction of Bill C-36, the Anti-Terrorism Act. An omnibus piece
of legislation, Bill C-36 provided a three-pronged response to terrorist threats
facing Canada: it enacted a legal definition of terrorism and related activities as
criminal offences; it provided for the public designation and outlawing of terror-
ist groups; and it instituted measures to better facilitate the identification, pros-
ecution, conviction, and punishment of terrorist operatives and co-conspirators
(Shore 2006: 457).
Additionally, efforts were made in all countries (just as the US had done)
to establish counter-terrorism fusion centres: the National Threat Assessment
Centre (NTAC-Australia), the Joint Terrorism Analysis Centre (JTAC-UK), the
Integrated Terrorism Assessment Center (ITAC-Canada), and the Combined
Threat Assessment Group (CTAG-New Zealand). The function of each is to bet-
ter coordinate and integrate in one location counter-terrorism intelligence col-
lection and analytical priorities across their ICs (Walsh 2011a). Other initiatives
sought to strengthen existing intelligence coordination institutions at the centre
of governments in the Prime Minister and Cabinet offices of Australia, Canada,
New Zealand, and the UK. None of these measures were, at least initially after
9/11, wholesale attempts by the political leadership to refashion their ICs. For
example, in Australia several smaller-scale reviews in addition to the legislation
changes described above were carried out such as the 2004 Flood Report, the
2005 Taylor Review into ASIO’s technical and proficiency gaps, and in 2008 the
Smith Review (Misra 2018). The Smith Review was significant not for any major
surgical reinvention of the IC, but more for what it rejected than recommended.
The review recommended against a new homeland security super agency to coor-
dinate Australia’s IC. It suggested instead better coordination of existing arrange-
ments by the Department of Prime Minister and Cabinet and the creation of a new
national security advisor (Walsh 2011a, 2011b). However, in December 2017 the
Department of Home Affairs (Home Affairs) was finally created—though there
remains a lack of compelling independent evidence for the need of this kind of
super-coordinating agency.
It remains difficult to assess with accuracy whether the more ‘micro-surgical’
interventions by non-US ‘Five Eyes’ countries resulted in better tasking and coor-
dination of intelligence. Providing a full assessment will not be possible until
further details of reform outcomes become unclassified, which could be decades
away. However, subsequent inquiries in all ‘Five Eyes’ countries suggest that the
ability for political leaders to affect via post-9/11 legislation and policy measures
effective and consistent improvement in a range of intelligence capability areas
(including tasking and coordination) remain works in progress.
In Australia, since the 2004 Flood Report, which was an independent review of
Australia’s intelligence capabilities, there have been periodic reviews (every five
to seven years) of IC capability. These are the 2011 Independent Review of the
Intelligence Community by Rufus Black and Robert Cornall and the most recent—
the 2017 Independent Intelligence Review of the Intelligence Community by
Michael L’Estrange AO and Stephen Merchant PSM (L’Estrange and Merchant
50 Tasking and coordination
2017). In each review, suggestions have been made on how to strengthen the
coordination and integration of the IC, which also serves to improve the efficient
tasking of intelligence. The Flood Report referred to the need for the community
to bolster effectiveness, communications, and interoperability. It recommended a
strengthened coordination role for the Office of National Assessments (now called
ONI) and suggested the creation of a foreign intelligence coordination commit-
tee.2 The Committee would be chaired by DG ONA and have representations of
all IC heads to discuss coordination, capability, and intelligence policy (Flood
2004: 60). The 2017 L’Estrange and Merchant report did not specifically identify
any major improvements in tasking and coordination required by the AIC. The
report indicated that:
over recent years, the AIC has worked collaboratively in specific areas to
deliver more focused and timely intelligence, particularly for operational
decision makers. Through enhanced co-ordination initiatives and fusion cen-
tres, agencies have addressed particular areas of interaction that reflect the
changing nature of Australia’s national security environment. L’Estrange and
Merchant added that an important feature has been the growth in ‘mission
approaches’ to tackle complex issues through whole-of-government opera-
tional and policy responses.
(2017: 42)
we consider that it would be helpful through day-to-day processes and the use
of new information systems to create a ‘virtual’ network bringing together
the various sources of expertise in Government on proliferation and on activ-
ity to tackle it, who would be known to each other and could consult each
other easily.
(Butler 2004: 158)
Despite all that has been written about the intelligence assessments into
WMD of Iraq and whether they resulted in political directed amendments to
assessments per se, it seems clear enough that this highly politicised envi-
ronment gradually saw an evolution of political judgements that eventually
either matched or supported the policy makers perceptions of the threat.
(Walsh 2011a: 206)
Jervis suggests in situations such as the Iraq WMD assessments, the evolution
of analytical judgements to match political judgements creates a motivated bias
‘where the analyst seeks to avoid the painful value-trade-off between pleas-
ing policy makers and following professional standards’ (Jervis 2009: 212). In
essence, they are motivated in favour of producing assessments that support or at
least do not undermine policy (Ibid). The many public pronouncements by senior
members of the Bush administration, particularly Vice President Dick Chaney,
Tasking and coordination 53
about the links between Iraq and Al Qaeda and that Saddam Hussein had WMD
underscore the politicised environment in which intelligence was being produced
and used (Walsh 2011a: 206). The various public announcements about what the
intelligence was saying about WMD in Iraq as noted earlier produced a politicised
environment and the administration’s cherry picking of intelligence are examples
of Hastedt’s hard politicisation (Hastedt 2013: 10, 26–27).
While the political leadership can ignore intelligence assessments and make
decisions based on other information or their own world view, this can be a dan-
gerous situation in some circumstances, for example, if political leaders in doing
so still refer to aspects of the intelligence to justify their preferred course of action
out of context or spin the significance of a threat or risk that the intelligence
community has still not made a final assessment on. These actions can subvert
the proper tasking of collection and analytical assets based on spurious political
belief—thereby wasting resources and possibly lives and producing damage to
the IC reputation and further policy failure.
Another type of intelligence politicisation is bureaucratic politicisation, which
has an impact on the normal running of tasking and coordination processes par-
ticularly when political leaders actively seek to obtain intelligence from either
not the usual appropriate suppliers of that information in the IC—or receive raw
intelligence that has not yet been processed. In the US we saw how the Pentagon
shortly after 9/11 established an Office of Special Plans (OSP), which utilised raw
intelligence from the field. The intelligence was fed into the offices of Secretary
Rumsfeld, Paul Wolfowitz (Deputy-Secretary Defense), and the Vice President’s
Office. The information was not filtered or vetted by other member agencies of
the IC, who would normally assess its reliability against other sources. The OSP
underscored a battle within the IC between the CIA and DIA versus the Pentagon
for control over US foreign policy on the WMD in Iraq issue (Walsh 2011a:
207–208). The net effect of the OSP case was that some unreliable sources from
certain Iraqi opposition groups (e.g. the Iraqi National Congress) were being used
to make policy, whereas they had been discounted by the CIA earlier. The OSP
raw intelligence was stove piped to the highest ranking cabinet level, while other
processed intelligence was blocked or ignored by the Pentagon. Blocking the filter
of all source intelligence assessments on as many issues as possible might have
helped certain figures in the Bush administration continue their agenda over WMD
in Iraq—but it also meant other senior cabinet leaders including the President
were not getting good quality or reliable intelligence in which to task correctly
foreign, military, and intelligence assets (Walsh 2011a: 208). The OSP establish-
ment might well be a case of Hastedt’s soft politicisation as it was non-coercive,
but it did set out to ‘alter the assumptions and institutional settings within which
analytical deliberations occurred’ (Hastedt 2013: 10, 26–27).
I do not want to skew arguments about the impact of the politicisation of intel-
ligence on IC processes, including tasking and coordination. Clearly in liberal
democracies, IC activities should be at arms lengths from political decision-mak-
ers (or the hand that feeds them). But intelligence is by definition a politicised pro-
cess. While intelligence assessments should not from a good practice perspective
54 Tasking and coordination
be written around policy dilemmas or specific outcomes, they nonetheless need
to be aware of the policy issues decision-makers are grappling with to ensure
they assess priority issues in ways that can inform the policy making process.
Nonetheless, since 9/11 there is sufficient evidence to suggest that at times the
arm’s length gap between the political leadership and the IC is closing (e.g. Iraq
2003; Afghanistan, the Trump administration, and Russian collusion in elections
and over the nature of the Russian threat). In the United States, the intelligence/
policy gap is closing in perhaps ways yet to be fully understood—through the
interference with the way normal cabinet-level decisions about intelligence task-
ing of top priorities are made but also by pressuring senior intelligence officials
to paint a rosier picture of current operational activity—or worse still the Trump
administration’s downplaying (for personal political reasons) of the growing
malignant threat posed by Russia to American electoral systems and other critical
infrastructure. At the January 2016 briefing of President-elect Trump at Trump
Tower, DNI Jim Clapper, Director CIA John Brennan, and FBI Director James
Comey briefed the incoming President about the strong intelligence confirming
Russian influence operation in the recent presidential election. Clapper, in his
2018 memoir Facts and Fears. Hard Truths from a Life in Intelligence, records
that the President-elect accepted initially this intelligence, but was seeking confir-
mation that the interference did not have any effect on the outcome of the election.
Clapper replied that ‘we had neither the authority nor capabilities to assess what
impact—if any—the Russian operation had’ (Clapper 2018: 375). As Clapper
and his team began to leave Trump Tower, he overheard some of the President-
elect’s staff get to work on a press briefing saying aloud ‘the IC assessed that the
Russian interference did not change the outcome of the election—which he says
was very different from our acknowledgement that we hadn’t and couldn’t assess
its impact’ (Ibid: 376). The Trump administration was starting to cherry pick the
intelligence even before taking office.
In addition, we have seen in the Trump administration the public disrespect,
denigration, and even hostile comments about the ‘trustworthiness’ of the IC over
the extent of Russian involvement in US internal affairs and in contrast the will-
ingness to trust Vladimir Putin over the President’s own IC. The President also
accused the FBI of wire-tapping Trump Towers just before his victory as well as
the firing of James Comey, the FBI director, in May 2017, which again under-
scores a distrust and hostility to the IC. Former intelligence leaders such as John
Brennan, Jim Clapper, and Michael Hayden amongst others have since come out
in the media and in print to criticise President Trump’s ongoing politicisation of
intelligence. In summary, all of these developments are yet additional layers of
the politicisation of intelligence, which potentially can significantly damage the
relationship between the number one ‘intelligence tasker’—the US President and
the IC. They can also have an effect on the democratic institutions of the US if the
truth to power that the IC seeks is dismissed by the political leadership as ‘fake
news’ (Hayden 2018).
What can intelligence leaders do about different forms of politicisation is dif-
ficult to know. Different circumstances may require varied approaches, which
Tasking and coordination 55
suggests there is no magic off the shelf panacea to politicisation in all its forms.
There are all the usual things managers and IC leaders should do related to quality
control of products and assigning the most ‘accurate’ probability of certainties
around collection sources and analytical judgements. We will come back to these
issues in subsequent chapters. There is no doubt also that leaders of ICs and the
agencies therein need to continue to publish whole of IC assessments on issues
not just at the strategic level, but where possible at the operational level as well.
Of course you want to avoid political decision-makers receiving a bland lowest
common denominator product that every agency will agree on. There still needs to
be contestability in products, but with some major political decisions, particularly
around whether the country will go to war, robust whole of IC products that don’t
gloss over the uncertainties may still in some instances guard against politicisa-
tion. If the political leadership sees that the IC speaks with one voice on an impor-
tant issue this can be compelling for at least some politicians (though not all as the
Trump administration has shown) to deal with the assessment provided whether
politically advantageous or not. Agencies can still provide appendix notes if they
disagree on a judgement of other IC member agencies. Accountability mecha-
nisms are also important ways to diagnose and treat politicisation of intelligence
in ‘Five Eyes’ countries. We will briefly return to the subject of politicisation and
the ways IC leaders may deal with it in the future in Chapter 8 (The Future IC
Leader and Governance Challenges).
Internal factors
The types of politically sponsored major redesign of the US IC post-9/11 and
the initially less dramatic policy and legislative reform measures to achieve bet-
ter coordination across the other ‘Five Eyes’ countries has no doubt improved
tasking and coordination across ICs in some areas. The growing complexity of
many threats, both state and non-state variants, in a way is bringing IC agencies
within and across ‘Five Eyes’ countries to share resources, identify priorities, and
take more a mission approach to specific threats (Walsh 2011b). How political
and policy-driven reform measures discussed above are implemented within ICs
is of course largely in the hands of senior leadership. In this section, we briefly
explore how ‘Five Eyes’ IC leaders have sought to implement the broader policy
and legislative measures constructed by their political leadership post-9/11 and
how these have impacted on the tasking and coordination of intelligence. As with
the earlier discussion of external factors, this section provides only a short sum-
mary of three inter-related issues: organisational structure, information sharing,
and cultural matters as these continue to influence how effectively intelligence is
being tasked, coordinated, and integrated post-9/11.
If the clarion call (to varying degrees) from political leaders since 9/11 has
been for more centralised, coordinated, and integrated intelligence processes
within and across IC agencies, senior leaders have had a large leeway on how to
achieve such policy and legislative directives. One of the key leadership-driven
internal organisational reform responses since 9/11 has been the proliferation of
56 Tasking and coordination
fusion centres. This has been one way that IC leaders can demonstrate to the
political leadership their broader concerns about organisational structure, infor-
mation sharing, and effective intelligence support to decision-makers are being
addressed. Of course, as noted in Chapter 2, fusion centres are not new. In their
modern manifestation they appeared on a more regular basis during World War
II and continued their expansion on during the Cold War—both in the national
security and law enforcement contexts. But there is no doubt after 9/11 there has
been an even greater proliferation of fusion centres. As noted above, particularly
in the counter-terrorism area in the United States after 9/11, but also the other
‘Five Eyes’ countries’ political decision-makers funded large fusion centres like
the NCTC (US), NTAC (Australia), ITAC (Canada), CTAG (NZ), and JTAC
(UK) were established to better coordinate the tasking, analysis, coordination,
and integration of all intelligence across government relating to terrorism and
counter-terrorism.
Post-9/11, fusion centres became a kind of ‘insurance policy’ for both the
political and IC leadership that there was now, at least in theory, a much more
coordinated, integrated approach to collection, analysis, and operational activity.
Fusion centres again theoretically would fill in the silos identified by the 9/11
Commission as well as deconflict effort across entire ICs. With the potential ben-
efits in mind there has been a further proliferation of fusion centres in the US.
There are now over 72 across the United States in metro and regional areas that
seek to fill another important gap between federal government intelligence and
intelligence extracted at the state and local level largely by law enforcement agen-
cies (Masse and Rollins 2008). While there are less fusion centre operations in the
other ‘Five Eyes’ countries, fused arrangements have emerged across Australia,
UK, Canada, and New Zealand in national security and law enforcement priority
areas in counter-terrorism, anti-money laundering and terrorism financing, border
protection, and organised crime amongst others. However, how IC leaders have
established and managed a range of fusion centres since 9/11 shows that not all
function as intended for a range of reasons. Arguably chief among these has been
poor governance (i.e. the coordination of resourcing, business rules, the establish-
ment of a communal identity and issues related to making collective decisions).
Governance issues in turn impact on whether intelligence is tasked and coordi-
nated in ways that can maximise the results of many agencies being co-located
physically or virtually. Of course I am mindful not to over-generalise the gov-
ernance issues to the point of inaccuracy. Not all centres have poor governance
issues or are racked with other performance challenges (Carter and Carter 2009:
1323–1339).
For example, Van Puyvelde explored the El Paso Intelligence Center (EPIC)
in EL Paso, Texas—a 30-year-old fusion centre of federal and local authorities
focused on countering drug trafficking (Van Puyvelde 2016: 888–902). His article
demonstrates that fusion centres can be an effective force multiplier for more effec-
tive tasking and coordination of intelligence beyond what might be achieved if
these agencies were working exclusively out of their own headquarters. However,
my own research, which included visits to two very different fusion centres back
Tasking and coordination 57
in 2009 (the JRIC and the ROIC), show how diverse such centres can be. Both
these centres differed in several factors including how they were led as well as
how leaders navigated intelligence governance issues. These factors impacted on
the ability for the fusion centres to identify tasking priorities and support robust
coordination of intelligence collection, analytical and operational action once pri-
orities have been tasked (Walsh 2011a, 2015: 123–142). More recent evidence
showed that many fused arrangements in the US have not necessarily resulted in
identification of tasking, collection, analytical, or operational priorities because
of leadership and governance issues, limited resourcing, or poor training. In late
2012, the US Senate’s Homeland Security and Governmental Affairs Permanent
Subcommittee on Investigations released an uncomplimentary assessment of US
fusion centres that provided further evidence about the challenges they face—par-
ticularly on a range of governance issues. For example, the Senate report found
poor leadership efforts on improving information sharing, funding oversight (at
the fusion centres and in the DHS headquarters), and questions about the ‘value
added’ that fusion centres intelligence was providing from an analytical perspec-
tive (US Senate Committee on Homeland Security and Governmental Affairs
2012). These issues have also been identified by other researchers along with
concerns about privacy, security, and the implications of a greater number of
agencies—particularly local law enforcement having access to national security
intelligence (Carter and Carter 2009; Newkirk 2010: 43–60). Additionally, it is
less clear how fusion centres build effective partnerships between the centre and
local agencies. In particular, in the case of law enforcement fusion centres there
are questions about how they facilitate actionable intelligence products that can
result in intelligence-led and data-driven policing strategies (Lewandowski et al.
2018: 177–193).
In addition to how IC leaders have developed organisational structures such
as fusion centres for better tasking and coordination of intelligence, a big factor
in their proliferation since 9/11 has been to provide an integrated or fused intelli-
gence picture for decision-makers. This relies on having the right type and volume
of intelligence collected, and making sure in order to create that fused picture
all intelligence has been shared across the fusion centre or broader IC to all that
need to see it as quickly as possible. Optimal intelligence sharing is a function of
many factors including types and capabilities of various collection methodologies
(Chapter 4) and the supporting ICT architecture (Chapter 6). For the purposes of
our discussion here though, we will restrict our discussion to cultural barriers,
which can restrict adequate information sharing. The knock-on effect of cultural
barriers can be decision-makers making less informed tasking decisions or an
uncoordinated and insufficient response to intelligence collection and analysis.
There are several cultural factors that impact on information sharing across
‘Five Eyes’ ICs including in fused arrangements or joint task forces that were
set up to improve information sharing. Some, as noted earlier, relate to the
mandates of different agencies, bureaucratic history (e.g. national security vs
law enforcement organisational and cultural identities), funding, and leader-
ship dynamics (Cotter 2017: 173–187; Catano and Gauger 2017: 17–34; De
58 Tasking and coordination
Castro Garcia et al. 2017: 736; Herman 2003: 50–52). As seen with inclusion
of the ISE in the IRTPA, cultural issues cannot be legislated easily away in any
prescriptive sense in the short term given the longstanding bureaucratic priori-
ties and cultural differences between agencies across the US IC. The wording
within the IRTPA outline both the intent, attributes, and steps required for the
enactment of the ISE across the US IC. For example, in terms of the attributes
of the ISE:
the President shall, through the structures described in subparagraphs (B) and
(C) of paragraph (1), ensure that the ISE provides and facilitates the means
for sharing terrorism information among all appropriate Federal, State, local,
and tribal entities, and the private sector through the use of policy guide-
lines and technologies. The President shall, to the greatest extent practicable,
ensure that the ISE provides the functional equivalent of, or otherwise sup-
ports, a decentralized, distributed, and coordinated environment that…
(ODNI 2009: 152)
While extensive progress has been made on information sharing, it still remains
difficult to overcome the cultural organisational barriers across the US IC that
would allow the fullest expression of ISE sentiments expressed in the IRTPA.
Since 9/11 and across the ‘Five Eyes’ there are a number of other examples of how
organisational cultural issues impact on information sharing. Tromblay’s survey
of the FBI’s IT development process, for example, highlights the implementation
of several IT capabilities such as the case management system Sentinel in 2012,
and how these are indicators of larger cultural problems across the organisation.
In his words, ‘information systems have been historically cobbled together in an
uncoordinated fashion’ (Tromblay 2017: 828).
Information sharing problems that demonstrate cultural issues have been raised
in Australia and Canada as well. In Australia, a 2012 Parliamentary Inquiry, which
I provided testimony to and identified a number of IT architectural and cultural
impediments, prevented the sharing of criminal intelligence across Australia’s
law enforcement agencies (Walsh 2012). In Canada, a 2012 externally funded
government report suggested that ‘support requests that specific organizations
receive from consumers are also often not shared with other organizations and
potentially several agencies might be tasked to produce intelligence on the same
“hot” topic’ (Adams et al. 2012: 18). This suggests that information sharing may
not be as sufficient in some instances as it needs to be. On the point of information
sharing, the report pointed out that:
Another dimension on information sharing across ‘Five Eyes’ ICs is how cultural
issues play out in the broader homeland security and law enforcement communi-
ties. As noted earlier, since 9/11 in each ‘Five Eyes’ country, governments have
enacted policy and legislative reforms aimed at broadening the corporate identity
of IC communities beyond the traditional national security and defence agencies
involved in national intelligence to include a broader church of agencies such
as those responsible for border protection, immigration, financial intelligence,
organised crime, and to some extent state and even local law enforcement. The
ISE, fusion centres, ODNI, and DHS all represent efforts by successive US admin-
istrations to not only restructure the US IC architecture, but provide frameworks
that allow a larger number of agencies, particularly state, regional, and local law
enforcement, to potentially play a greater role in a broader reconceptualising of
the national intelligence community. Similar efforts have been made incremen-
tally by governments in Australia and Canada as well to create more whole of
government ministerial and policy responses to intelligence, national security,
and law enforcement issues (Walsh 2011b: 109–127; Shore 2006: 456–479).
It is hard to argue at least against the policy efforts of ‘Five Eyes’ governments
that try to engender a broader IC enterprise that includes increasingly at least at the
margins more law enforcement agencies, who are often best placed to collect and
operationalise intelligence about threats in local settings that may have national
or even international importance. Having therefore structures, systems, and cul-
tural customs in place that facilitate the sharing of intelligence in both directions
between the traditional IC agencies in each ‘Five Eyes’ country with their law
enforcement counterparts is critical. Yet, as discussed earlier, one policy solution
to facilitate intelligence and information sharing—the creation of fusion centres
have not always been an exemplary approach for the promotion of information
sharing, even when agency representatives may be co-located in the same physi-
cal space. Federal, state, and local agencies have their own legislative, resourc-
ing, and management issues, which influences how intelligence and information
sharing takes place. There are also, in many cases, a diverse array of historical
and organisational cultural issues which can constrain sharing. Lambert’s study
on the sharing of homeland security information outlines some of the obstacles to
information sharing at the state and local levels, including inter-agency and intra-
agency issues that arise for police agencies. Lambert explores the complexities of
information sharing across highly decentralised policing systems in the US. Many
police departments lack a formal intelligence function that limits their ability to
share information (Lambert 2019). There have been several other studies which
have examined the various constraints for optimal information sharing including
organisational cultural factors (Best 2011; Walsh 2011a; Maras 2017: 187–197;
Jones 2007: 384–401). While in all ‘Five Eyes’ ICs, efforts have been made from
a digital information and ICT network perspective to address information sharing
60 Tasking and coordination
issues, research shows that the role of improving trust in social networks amongst
intelligence agencies is as important as ICT technology solutions (Cotter 2017:
173–187).
Finally, as outlined in Chapter 2, we saw from the 1990s onward how intel-
ligence led policing models have influenced the broader organisational cultures of
‘Five Eyes’ law enforcement communities, particularly how intelligence is tasked
and coordinated through the broader non-intelligence parts of law enforcement.
As noted, efforts by intelligence leaders in various law enforcement agencies to
use intelligence-led policing strategies aimed at putting intelligence more front of
centre of the ‘policing business’ continues to be largely a work in progress. Right
from the early implementation of intelligence led policing strategies such as the
national intelligence model in the UK, efforts were being made by heads of intel-
ligence functions within law enforcement agencies to integrate intelligence into
all aspects of the policing business—particularly in how intelligence was tasked
and coordinated with and by other non-intelligence functions of policing such as
investigations (Sheyptycki 2004: 307–332). It was clear though that there were
challenges in getting new ILP inspired tasking and coordination processes off the
ground in UK policing (John and Maguire 2004; Flood 2004a: 37–52; Bullock
2012: 1–20). In the UK and in other ‘Five Eyes’ countries such as Australia,
Canada, and the United States, the implementation of intelligence-led policing
models that can inform better tasking and coordination of intelligence across law
enforcement agencies have also met with their challenges. These have included
senior and non-intelligence law enforcement staff not knowing how to—or not
wanting to maximise strategic, operational, or tactical tasking and coordination
meetings and processes to direct resources in more proactive ways to reduce crime
(Walsh 2011a; Crous 2012: 3–16; Ratcliffe 2008, 2016; James 2014; Burcher
and Whelan 2018: 1–22; Darroch and Mazzerole 2013: 3–37). Again, care needs
should be exercised in avoiding over-generalising to the point of inaccuracy the
many challenges ‘Five Eyes’ countries have experienced in the implementation
of ILP strategies. However, many studies examining the implementation of intel-
ligence-led policing in these countries show that one critical challenge remains
building in sustainable ways tasking and coordination processes. Sustainable
tasking and coordination mean placing intelligence capabilities at the centre of
law enforcement decision-making rather than exclusively relying on input solely
by investigators. The inability in many cases to develop viable intelligence-led
tasking and coordination processes is linked to law enforcement leadership cul-
tures. These are in turn linked to how intelligence has been viewed as a supportive
function compared to law enforcement’s main functions of investigations.
it is not clear if VERA can discriminate between all of the individuals identi-
fied through its set of defined risk factors with a risk score indicative of future
terrorism from those more likely to go to actively engage in terrorist actions.
(Ibid: 6)
Threat-and-risk terminology can also be poorly understood within the IC, which
can contribute to a lack of rigour around assessing risk and threat. Other research-
ers have pointed to threat assessment methodologies, where a diverse number
of threat actor categories have been blurred—potentially over or under measur-
ing the significance of actual or potential threats. For example, leading up to the
Vancouver Olympics in 2010, Canada’s terrorism fusion center ITAC (mentioned
earlier) created a classifier multi-issue extremism matrix (MIE), which in addition
to jihadi terrorism included other social dissenting movements (Monaghan and
Walby 2012: 147).
Since 9/11, threat-and-risk assessments have also fallen down due to the lack
of information flows within agencies, across the community, and even outside the
IC. As Cormac suggests, analysis of threats has often been incremental rather than
a broader picture being developed and disseminated to decision-makers (Cormac
2013: 488). Another potential issue with some threat-and-risk methodologies that
can be promoted, however unintentionally, is via a kind of racial profile or ran-
dom selection data collection process rather than an approach which is the result
of evidence-based choices (Kebbell and Porter 2011). It’s clear that leaders need
to sponsor the development of better risk and threat assessments, particularly in
areas of emerging threats and risks such as cyber and biosecurity. Finally, assess-
ment methodologies also need a greater focus on measuring the harms associated
Tasking and coordination 63
with threat actors and risks across the entire national security and crime con-
tinuum (Sherman et al. 2016: 171–183; Ratcliffe 2015: 164–182).
Forensic intelligence to varying degrees across each ‘Five Eyes’ country has
moved both the practice of intelligence and investigations beyond merely analys-
ing a substance forensically for the evidence it alone contains. Rather, the objec-
tive now is to go beyond the single specimen or forensic data to assess how it
can be examined holistically against a range of other forensic data and then to
use the evidence gained with other sources of intelligence (HUMINT, SIGINT,
open source) to build a stronger case for prosecution or disruption. Forensic intel-
ligence is also concerned with how various forensic data sources can be used to
‘reveal patterns of criminal activity and the production of intelligence products for
action’ (Milne 2012: 2–3). It is beyond the scope of this section to provide an ana-
lytical breakdown of the reliability and validity of various forensic techniques and
knowledge that may be applied across the full spectrum of crime—from simple
high volume crimes such as burglaries to more complex variants such as terrorism
and cyber hacking. What can be said in a general sense is that there are two issues
with the application of forensic science, knowledge and intelligence, that impact
on how it is used across ICs and law enforcement agencies. Both of these broad
issues impact on how intelligence is tasked (if forensic intelligence is used or not)
and how its capability is coordinated across the IC.
First there are a general set of issues and debates about forensic methods, their
characteristics, and how reliable and valid they are. Related to this is how to opti-
mise the use of forensics in an intelligence and investigative context, and what
barriers prevent the optimal exploitation of forensic data, particularly as another
Tasking and coordination 65
intelligence source. In terms of the first issue, the ‘CSI (crime scene investiga-
tion) factor’ now for several decades has become glamorised by several television
shows—sometimes over-selling the capabilities of various forensic techniques.
Even with now well-established forensic techniques such as DNA profiling, false
positives can occur in crime scenes or in cases where DNA may have been planted
at a scene to implicate an innocent person rather than the offender. Similarly, the
field of digital forensics, which has been in existence for 30 years, while produc-
ing great benefits in the investigations of complex digital crime, has increasingly
caused concern amongst political leaders, ICs, and law enforcement agencies as
the growing use of encrypted technologies have facilitated terrorist attacks and
other criminal offences. For example, in 2015 MI5 Head Andrew Parker said
individuals were engaging now in computer acts which were beyond the control
of authorities (Horsman 2017: 449). Other senior intelligence officials such as
former director CIA Michael Morrell have raised concerns that one of the impli-
cations of media sensationalism in response to Edward Snowden has been the
development of a security and privacy-conscious public and this allows terrorists
to communicate without detection (Ibid). Additionally, in the microbial forensics
field, which has increasingly developed after 9/11 to attribute the origin of vari-
ous dangerous pathogens in actual or potential bioterrorism events, there is still
a great deal of refinement required in various forensic techniques (Walsh 2018:
113–114).
The second issue outlined above is how forensics sciences and technology are
incorporated into the IC and law enforcement communities along with other capa-
bilities and how this can either facilitate or inhibit core intelligence processes such
as effective collection and analysis. There are many issues that could be discussed
here, but for the sake of brevity the main issue is one of organisational integration
of forensic capabilities into the broader collection and analytical structures and
functions of ICs and law enforcement agencies. There are examples in the litera-
ture that show how some agencies have done a good job of integrating forensic
intelligence along with other criminal or national security intelligence. Rossy and
colleagues refer to efforts by six states in the western part of Switzerland in shar-
ing a common data base for the analysis of forensic data (e.g. DNA, shoe marks,
images) and criminal intelligence in high volume crimes (Rossy et al. 2013: 137–
146). Similarly, in the national security context the FBI’s Terrorist Explosive
Device Analysis Center (TEDAC)—an international inter-agency collaboration
coordinating effort by law enforcement, intelligence, and the military to gather
and share intelligence about explosives and their role in regional insurgencies and
domestic intelligence—has made progress in aligning forensic intelligence with
criminal intelligence sources (Walsh 2018: 253).
But there remains for many ‘Five Eyes’ IC agencies limitations in how foren-
sic intelligence is integrated into the broader intelligence collection and analytical
enterprise. While there may be good reasons to integrate forensic intelligence
into broader intelligence databases in allowing a greater and more explicit col-
laborative approach between forensic specialists, intelligence analysts, and inves-
tigators, there remain in many agencies structural impediments to allow this to
66 Tasking and coordination
occur. Both forensic specialists and intelligence analysts can be siloed in their
practice. A forensic specialist in fingerprints is more likely to see themselves as
a fingerprint analyst rather than part of a broader identity specialist or a forensic
intelligence analyst (Walsh 2018: 249). A more siloed linear approach by forensic
scientists does not make collaboration with the broader intelligence enterprise
easy particularly if this is also imbued with other professional attributes of foren-
sic specialists, who traditionally see themselves as conservative and evidence ori-
entated (Ibid).
However, the complexity of the most serious threats and risk in the post-9/11
environment as noted earlier can no longer just rely on a pathway to prosecution.
All ‘Five Eyes’ ICs now need to look for opportunities for disruption and harm
reduction and forensic specialists are increasingly relied upon at early stages of
intelligence operations and investigations. This will require still a cultural shift for
both forensic specialists and intelligence analysts, who have tended to connect on
a more ad hoc basis—mainly at the end of an intelligence operation or investiga-
tion at the prosecution stage. The challenge for leaders is how to build organi-
sational structures within and across the IC that integrates forensic intelligence
more seamlessly into other national security and criminal intelligence collection
and analysis. This integration is not just an ICT architecture problem, but also a
training, legislative, and cultural issue.
Finally, how can intelligence leaders better anticipate strategically what
forensic and other science and technology capabilities will be required to manage
both the known and unknown threats and risks (Walsh 2018: 253)? Arguably,
it may well be this last point that will impact on how well forensics and other
science and technology capabilities can improve the effectiveness of tasking
and coordination of intelligence over the next several decades. If leaders are
able to better anticipate what kinds of threats and risks may emerge and what
science and technology capabilities will be needed to collect and analyse these
threats—political leaders and ICs themselves will have a better understanding of
how to task, coordinate, and integrate the intelligence enterprise to work these
threats/risks.
Strategic intelligence also became widely used in Australia, the UK, Canada,
and New Zealand, with each IC establishing agencies and/or committees to bring
together all source-strategic assessments on emerging threats and risks (Walsh
2011a; Walsh 2017). However, the role of strategic intelligence across the ‘Five
Eyes’ ICs has been a story of mixed success—with arguably even less success
across their law enforcement agencies. There are a range of policy maker, aca-
demic, and practitioner opinions on why strategic intelligence has not played an
optimal role in decision-maker support (Gentry and Gordon 2019). In the US con-
text and to some extent in the UK and Australia, strategic assessments have been
either fairly or unfairly associated with historical intelligence failures. Earlier in
the chapter, mention was made of the 9/11 and WMD Iraq intelligence failures
and it’s clear in both that policy makers believed some of the analytical deficien-
cies attributable to either absent or poor strategic analysis.
According to the 9/11 Commission report, the September 11 attacks exposed
the inability of analysts and agents to perform strategic analysis. Aligned with
this was the conclusion that ‘no agency in the IC could imagine a terrorist opera-
tion conducted inside the United States, using commercial airplanes as weapons,
although Al-Qaeda had planned such operations in the mid-1990s in Europe and
Asia’ (Goodman 2003: 62). A ‘failure of imagination’ became one of the catch
phrases from the 9/11 Commission report. Implicit in such a phrase is that per-
haps strategic intelligence analysis is about analysts improving their imagination,
which does seem a little absurd given the trajectory of many emerging threats are
beyond the confines of either analytical probability or plausibility. This does not
negate that improvements in analysis were not possible or desirable after 9/11, but
linking a failure of imagination to strategic intelligence practice does not lay out
a valuable direction or metric for improvement.
Others have suggested additional factors behind specific intelligence fail-
ure events like 9/11 and WMD in Iraq. In the case of 9/11, others have accused
Commission investigators of misrepresenting the IC’s strategic intelligence
capability, which had been strong at the time (Pillar 2006: 1022–1044), and that
policy failures were the main breakdown pre-9/11 rather than strategic intelli-
gence (Marrin 2011: 182–202). In between historical cases of intelligence fail-
ures, where perhaps a more forensic examination of the strengths and limitations
of strategic intelligence can be made, senior intelligence leaders, scholars, and
practitioners have raised several other issues, which may explain the varying uti-
lisation of strategic intelligence assessments, particularly in the national security
space across ‘Five Eyes’ countries. Marrin raises a number of issues which are
also documented by others. These range from the irrelevance many decision-
makers see in using strategic assessments to make ‘the big policy decisions’ such
as war and peace. He argues that intelligence analysis at that most senior policy
68 Tasking and coordination
level is seen as a duplicate step in the policy process—it ‘supplements but does
not supplant policy assessment’ (Marrin 2017: 727). Having strategic intelligence
as a ‘nice to have add on’ to the main policy assessment process is itself due
to a number of factors—some of which have already been raised earlier and in
Chapter 2. Political leaders have confidence in their world view. They have their
own biases, agendas, and political calculations, which are independent and often
more compelling (for them) than any intelligence assessment they may receive.
Decision-makers at the executive cabinet level have an entire policy and bureau-
cratic support structure around them in addition to the service provided by the IC.
This support structure often reads the raw intelligence itself and will bring in other
information sources that the IC may or may not possess, which can challenge
strategic intelligence assessments. All of these factors impact on how and when
strategic intelligence is tasked and coordinated across the IC.
Marrin suggests that perhaps the value of strategic intelligence may come at
the lower bureaucratic working level, where policy is fashioned ‘by giving gov-
ernment an aggregate picture enabling the government to learn about threats and
problems over time’ (Ibid: 732).
There are several other issues too that have contributed to the mixed success
of improving the tasking and uptake of strategic intelligence across ‘Five Eyes’
ICs over several decades. Probability, training, and organisational support have
also been identified as issues. Given strategic intelligence relies on making key
analytical judgements about evolving threat-and-risk factors, assessments are typi-
cally based on probabilities given the body of evidence tends to be less robust or
clear compared to operational and tactical assessments. In the intelligence stud-
ies literature there is an ongoing debate about how to more accurately ‘measure’
probability attached to levels of certainty for both analysts and decision-makers.
Across ICs up to recently, there has been a diverse set of probability criteria used
by various agencies to convey probability levels, which can confuse decision-mak-
ers (Rosenberg 2008: 139–152; Barnes 2016: 327–344; Dhami 2018: 257–272).
These debates are ongoing and unresolved, but it is clear that more refinement in
quantitative and qualitative descriptors of probability are required. Another issue
is the value of structured analytical techniques that have been the bedrock of a lot
of strategic analysis, and horizon scanning work completed in ICs over several
decades. More recently, a few studies in the United States and United Kingdom
have emerged questioning the value of these techniques in strategic analysis and
other non-strategic products (Coulthart 2016: 933–948; Whitesmith 2020: 1–20).
A further set of issues relate to the extent and quality of strategic analytical train-
ing offered across each ‘Five Eyes’ country. From my own experience of teaching
strategic intelligence in Australia and other ‘Five Eyes’ countries, some intelligence
agencies offer better training than others and this impacts on the quality of key
judgements. In particular, sound training and experience are critical to whether
analysts are able to go beyond the descriptive summary of information to answer
clearly ‘the so what question’ and whether the judgements can provide a firm bridge
between policy and operational action (Walsh 2011a; Walsh 2017: 548–562; Walsh
and Ratcliffe 2005). Establishing in the organisational structure of IC agencies a
Tasking and coordination 69
strategic intelligence capability also takes consistent focus by the leadership and
even in agencies where there has been a long tradition of a strategic analytical capa-
bility such as the CIA and INR (US), JIO (UK), ONI (Australia), IAS (Canada),
and NAB (New Zealand), these capabilities need to be constantly strengthened and
demonstrate their value against the greater demands and pull of current or ‘here and
now’ intelligence (Gentry and Gordon 2019; Gustafson 2010: 589–610).
Generally speaking, strategic intelligence has played a less central role in the
allocation of strategic or operational priorities in law enforcement (Walsh 2011a).
In many respects the reasons for this are similar to those discussed above for
national security intelligence agencies. In particular, the impediments are linked
to organisational cultural issues in many law enforcement agencies, which as seen
earlier are historically linked to attitudes about the role of intelligence. As dis-
cussed under Theme 1, efforts to reset the traditionally peripheral and supportive
role of intelligence in law enforcement to one where it is more central and proac-
tive has been constrained by a range of factors including the value placed by law
enforcement leaders on their intelligence functions compared to other law enforce-
ment disciplines such as investigations. What strategic intelligence capability that
has developed in ‘Five Eyes’ countries has failed to be consistently supported by
law enforcement leadership. This is because it hasn’t been invested in consistently
in terms of analytical training—or if training has been provided law enforcement
leaders have not understood how to engage with the product. Even in cases where
law enforcement leaders have engaged with strategic analysis, the products have
not been easily transferable into setting operational priorities. In cultures, where the
value of intelligence itself in some agencies is still being questioned it is difficult
for strategic intelligence to play a fully effective role in setting strategic tasking and
coordination within law enforcement agencies let alone operational priorities—the
latter of which tend to drive the business of law enforcement. The ‘here and now’
of most law enforcement work continues to create a tactical drag where there may
be periodically good intentions to invest in strategic intelligence capabilities yet
analytical staff find themselves re-tasked on tactical and operational investigations.
This creates a failure point for many law enforcement agencies if they are not able
to build up a sustainable strategic intelligence capability that can help law enforce-
ment and political leaders identify early and emerging threats and risks.
The above issues related to the implementation and nurturing of a strategic
analytical capability beg the question what role can strategic intelligence and hori-
zon scanning play in improving decision-maker tasking for strategic, operational,
and even tactical action. Can strategic intelligence improve coordination of intel-
ligence at these lower levels? Can political decision-makers and IC leaders see
more value in the future by investing in and improving strategic intelligence and
horizon scanning?
Conclusion
Since all ‘Five Eyes’ ICs operate in an external environment filled increasingly
with volatility, uncertainty, complexity, and ambiguity (VUCA), it is critical that
70 Tasking and coordination
they can align key organisational processes such as tasking and coordination with
other core intelligence processes (collection, analysis) and key enabling activi-
ties. As shown in the discussion of all four themes (policy reform, science and
technology, risk and threat, and strategic intelligence), the tasking and coordi-
nation process may have improved in some respects after 9/11. But the analysis
of issues here show that broader IC initiatives to improve tasking and coordi-
nation in many cases are works in progress. Further integration, collaboration,
and sharing is still required. Improving tasking and coordination structures and
processes within ICs will likely never reach a state of perfection. The volatile
and uncertain security environment will conspire against it. Perfection is not a
realistic objective, but IC leaders can and will need to do more to improve tasking
and coordination structures, processes, and initiatives in the future. In Chapter 8
(The Future IC Leader and Governance Challenges), we will come back to the
key intelligence governance challenges raised as they relate to tasking and coor-
dination and how IC leaders may begin to address them. The following chapter
(Chapter 4 Collection) explores some of the key challenges IC leaders face in
optimising the vital role intelligence collection plays in improving intelligence
outcomes for decision-makers.
Notes
1 The IC ITE, or the Intelligence Community, Information Technology Enterprise (IC
ITE), was created by the ONDI in 2012. It is a digital platform for the IC to store,
process, analyse, and share intelligence of all forms.
2 The ONI was established in 2018 and was the key recommendation of the
2017 Independent Intelligence Review.
3 CSE is Canada’s national cryptologic agency. It provides the Government of Canada
with information technology security (IT Security) and foreign signals intelligence
(SIGINT) services. CSE also provides technical and operational assistance to federal
law enforcement and security agencies. CSIS or the Canadian Security Intelligence
Service is Canada’s security and intelligence service. Its role is to investigate activities
suspected of constituting threats to the security of Canada and to report these to the
Government of Canada. CSIS collects and assesses threat-related information, which
is typically disseminated to government partners through intelligence reports and other
intelligence products. Key threats include terrorism, the proliferation of weapons of
mass destruction, espionage, foreign interference, and cyber-tampering affecting criti-
cal infrastructure. The RCMP, or the Royal Canadian Mounted Police, is Canada’s
federal policing agency.
4 GCSB, NZSIS, and NAB are New Zealand’s SIGINT, security intelligence and assess-
ments agencies, respectively.
References
9/11 Commission. (2004). The 9/11 commission report: Final report of the National
Commission on terrorist attacks upon the United States. Washington, DC: 9/11
Commission.
Adams, B., Thomson, M.H., Derbentseva, N., & Mandel, D.R. (2012). Capability challenges
in the human domain for intelligence analysis: Report on community wide discussions
with Canadian intelligence professionals. Guelph, ON: Humansytems Incorporated.
Tasking and coordination 71
Allen, M. (2013). Blinking red: Crisis and compromise in American intelligence after 9/11.
Washington, DC: Potomac Books.
Barnes, A. (2016). Making intelligence analysis more intelligent: Using numeric
probabilities. Intelligence and National Security, 31(3), 327–344. doi:
10.1080/02684527.2014.994955
Best, R.A. (2011). Intelligence Information: Need-to-Know vs. Need-to-Share. Darby, PA:
DIANE Publishing.
Best, R.A. (2014). Leadership of the U.S. Intelligence Community: From DCI to DNI.
International Journal of Intelligence and Counterintelligence, 27(2), 253–333. doi:
10.1080/08850607.2014.872533
Bullock, K. (2012). Community, intelligence-led policing and crime control. Policing and
Society, 23(2), 1–20. doi: 10.1080/10439463.2012.671822
Burcher, M., & Whelan, C. (2018). Intelligence-led policing in practice: Reflections from
intelligence analysts. Police Quarterly, 22, 139–160. doi: 10.1177/1098611118796890
Butler, R. (2004). Review on weapons of mass destruction. Report of a Committee of Privy
Counsellors. London: The Stationary Office.
Carter, D.L., & Carter, J.G. (2009). The intelligence fusion process for state, local, and
tribal law enforcement. Criminal Justice and Behaviour, 36(12), 1323–1339. doi:
10.1177/0093854809345674
Catano, V., & Gauger, J. (2017). Information fusion: Intelligence centers and intelligence
analysis. In I. Goldenberg, J. Soeters & W.H. Dean (Eds.), Information sharing in
military operations (pp. 17–34). Cham: Springer International Publishing.
Clapper, J. (2018). Facts and fears. Hard truths from a life in intelligence. New York:
Viking Press.
Cormac, R. (2013). Much ado about nothing: Terrorism, intelligence, and the mechanics
of threat exaggeration. Terrorism and Political Violence, 25(3), 476–493. doi:
10.1080/09546553.2012.667018
Cotter, R.S. (2017). Police intelligence: Connecting-the-dots in a network society. Policing
and Society, 27(2), 173–187. doi: 10.1080/10439463.2015.1040794
Coulthart, S. (2016). Why do analysts use structured analytic techniques? An in-depth
study of an American intelligence agency. Intelligence and National Security, 31(7),
933–948. doi: 10.1080/02684527.2016.1140327
Crous, C. (2011). Policing with intelligence: Leading a paradigm change. Journal of the
Australian Institute of Professional Intelligence Officers, 19(1), 13.
Cullen, M., & Reddy, P. (2016). Intelligence and security in a free society. Report of the
first independent review of intelligence and security in New Zealand. Wellington: New
Zealand Government .
Darroch, S., & Mazerolle, L. (2013). Intelligence-led policing: A comparative analysis of
organizational factors influencing innovation uptake. Police Quarterly, 16(1), 3–37.
doi: 10.1177/1098611112467411
De Castro Garcia, A., Matei, F.C., & Bruneau, T.C. (2017). Combatting terrorism
through fusion centers: Useful lessons from other experiences? International
Journal of Intelligence and Counterintelligence, 30(4), 723–742. doi:
10.1080/08850607.2017.1297119
Dean, G. (2014). Neurocognitive risk assessment for the early detection of violent
extremists. Cham: Springer.
Dhami, M.K. (2018). Towards an evidence-based approach to communicating uncertainty
in intelligence analysis. Intelligence and National Security, 33(2), 257–272. doi:
10.1080/02684527.2017.1394252
72 Tasking and coordination
Dulles, A. W., Jackson, W. H., & Correa, M. (1949). The Central Intelligence Agency and
the National Organization for Intelligence. Report to the National Security Council,
Washington DC.
Fingar, T. (2011). Reducing uncertainty. Stanford, CA: Stanford University Press.
Flood, B. (2004a). Strategic aspect of the UK national intelligence model. In Ratcliffe, J.H.
(Ed.), Strategic thinking in criminal intelligence (pp. 37–52). Sydney, NSW: Federation
Press.
Flood, P. (2004b). Report of the inquiry into Australian Intelligence Agencies. Canberra,
ACT: Australian Government Printing Office.
Gentry, J. (2015). Has the ODNI improved US intelligence analysis? International Journal
of Intelligence and Counterintelligence, 28(4), 637–661.
Gentry, J.A., & Gordon, J.S. (2019). Strategic warning intelligence: History, challenges,
and prospects. Washington, DC: Georgetown University Press.
Goodman, M. (2003). The failure of strategic intelligence. Intelligence and National
Security, 9/11(4), 59–71. doi: 10.1080/02684520310001688871
Gustafson, K. (2010). Strategic horizons: Futures forecasting and the British
Intelligence Community. Intelligence and National Security, 25(5), 589–610. doi:
10.1080/02684527.2010.537118
Harknett, R.J., & Stever, J.A. (2011). The struggle to reform intelligence after 9/11. Public
Administration Review, 71(5), 700–706. doi: 10.1111/j.1540-6210.2011.02409.x
Hastedt, G. (2013). The politics of intelligence and the politicization of intelligence:
The American experience. Intelligence and National Security, 28(1), 5–31. doi:
10.1080/02684527.2012.749062
Hayden, M. (2018). The assault on intelligence. American national security in an age of
lies. New York: Penguin Press.
Herman, M. (2003). Counter-terrorism, information technology and intelligence change.
Intelligence and National Security, 18(4), 40–58. doi: 10.1080/02684520310001693181
Horsman, G. (2017). Can we continue to effectively police digital crime? Science and
Justice, 57(6), 448–454. doi: 10.1016/j.scijus.2017.06.001
HPSCI. (2002). Report of the joint inquiry of the House Permanent Select Committee
on Intelligence and the Senate Select Committee into Intelligence Community
Activities before and after the terrorist attacks of September 11. Washington, DC:
US Congress.
James, A. (2014). Forward to the past: Reinventing intelligence-led policing in Britain.
Police Practice and Research, 15(1), 75–88. doi: 10.1080/15614263.2012.754126
Jervis, R. (2009). Reports, politics and intelligence failures. In C. Andrew, R. Aldrich &
W. Wark (Eds.), Secret intelligence (pp. 93–22). New York: Routledge.
John, T., & Maguire, M. (2004). The national intelligence model: Early implementation
experience in three police force areas. Cardiff: Cardiff University.
Johnson, L. (2015a). A conversation with James R Clapper Jr. the Director of National
Intelligence in the United States. Intelligence and National Security, 30(1), 1–25.
Johnson, L. (Ed.). (2015b). Essentials of strategic intelligence. Santa Barbara, CA:
Praeger.
Johnson, L. (2017). National security intelligence. Cambridge, MA: Polity Press.
Jones, C. (2007). Intelligence reform: The logic of information sharing. Intelligence and
National Security, 22(3), 384–401. doi: 10.1080/02684520701415214
Jones, D.M. (2018). Intelligence and the management of national security: The post 9/11
evolution of an Australian National Security Community. Intelligence and National
Security, 33(1), 1–20. doi: 10.1080/02684527.2016.1259796
Tasking and coordination 73
Kebbell, M., & Porter, L. (2011). An intelligence assessment framework for identifying
individuals at risk of committing acts of violent extremism against the West. Security
Journal, 25(3), 212.
Kent, S. (1949). Strategic intelligence for American world policy. Princeton, NJ: Princeton
University Press.
Lambert, D.E.(2019). Addressing challenges to homeland security information sharing
in American policing: Using Kotter’s leading change model. Criminal Justice Policy
Review, 30(8), 1250–1278. doi: 10.1177/0887403418786555
Lawrence et al 2016” Sherman, L., Neyroud, P. W., & Neyroud, E. (2016). The Cambridge
crime harm index: measuring total harm from crime based on sentencing guidelines.
Policing: A Journal of Policy and Practice, 10(3), 171–183. doi: 10.1093/police/
paw003
L'Estrange, M., & Merchant, S. (2017). Independent intelligence review. Canberra, ACT:
Commonwealth of Australia.
Lewandowski, C., Carter, J.G., & Campbell, W.L. (2018). The utility of fusion Centres to
enhance intelligence-led policing: An exploration of end-users. Policing: A Journal of
Policy and Practice, 12(2), 177–193. doi: 10.1093/police/pax005
Lowenthal, M. (2012). Intelligence from secrets to policy. Thousand Oaks, CA: Sage
Publications.
Lucas, S. (2011). Recognising politicization: The CIA and the path to the
2003 war in Iraq. Intelligence and National Security, 26(2–3), 203–227. doi:
10.1080/02684527.2011.559141
Maras, M.-H. (2017). Overcoming the intelligence-sharing paradox: Improving information
sharing through change in organizational culture. Comparative Strategy, 36(3), 187–
197. doi: 10.1080/01495933.2017.1338477
Marrin, S. (2011). The 9/11 terrorist attacks: A failure of policy not strategic
intelligence analysis. Intelligence and National Security, 26(2–3), 182–202. doi:
10.1080/02684527.2011.559140
Marrin, S. (2013). Rethinking analytic politicization. Intelligence and National Security,
28(1), 32–54. doi: 10.1080/02684527.2012.749064
Marrin, S. (2017). Why strategic intelligence analysis has limited influence on
American foreign policy. Intelligence and National Security, 32(6), 725–742. doi:
10.1080/02684527.2016.1275139
McDonald, G. (2007). Control orders and preventative detention-why alarm is misguided.
In A. Lynch, E. MacDonald, & G. Williams (Eds.), Law and liberty in the war on terror
(pp. 106–115). Annandale: The Federation Press.
Masse, T., & Rollins, J. (2008). Information and intelligence (including terrorism) fusion
centers. New York: Nova Science Publishers.
Milne, R. (2012). Forensic intelligence. Boca Raton, FL: CRC Press.
Misra, A. (2018). Australia’s counter-terrorism policies since September 11, 2001:
Harmonising national security, independent oversight and individual liberties. Strategic
Analysis, 42(2), 103–118. doi: 10.1080/09700161.2018.1439325
Monaghan, J., & Walby, K. (2012). Making up ‘terror identities’: Security intelligence,
Canada’s Integrated Threat Assessment Centre and social movement suppression.
Policing and Society, 22(2), 133. doi: 10.1080/10439463.2011.605131
Monahan, J. (2012). Violence risk assessment. Handbook of Psychology, second edition,
11. Hoboken, NJ: John Wiley and Sons, Inc
Newkirk, A. (2010). The rise of the fusion-intelligence complex: A critique of political
surveillance after 9/11. Surveillance and Society, 8(1), 43–60.
74 Tasking and coordination
ODNI. (2009). ODNI intelligence community legal reference book. Washington, DC: ODNI.
Otto, R., & Douglas, K. (Eds.). (2010). Handbook of violence risk analysis. New York:
Routledge.
Phythian, M. (2005). Still a matter of trust: Post–9/11 British intelligence and political
culture. International Journal of Intelligence and CounterIntelligence, 18(4), 653–681.
doi: 10.1080/08850600500177127
Pillar, P.R. (2006). Good literature and bad history: The 9/11 commission's tale of
strategic intelligence. Intelligence and National Security, 21(6), 1022–1044. doi:
10.1080/02684520601046366
Posner, R.A. (2005). Preventing surprise attacks: Intelligence reform in the wake of 9/11.
Lanham, MD: Rowman & Littlefield.
Ratcliffe, J.H. (2015). Towards an index for harm-focused policing. Policing: A Journal of
Policy and Practice, 9(2), 164–182. doi: 10.1093/police/pau032
Ratcliffe, J. H. (2016). Intelligence-led policing: Abingdon, UK: Routledge.
Ratcliffe J.H., & Ray, G. (2008). State police investigative structure and the adoption of
intelligence-led policing. Policing: An International Journal, 31(1), 109–128. doi:
10.1108/13639510810852602
Rosenberg, J. (2008). The interpretation of probability in intelligence estimation and
strategic assessment. Intelligence and National Security, 23(2), 139–152. doi:
10.1080/02684520801977238
Rossy, Q., Ioset, S., Dessimoz, D., & Ribaux, O. (2013). Integrating forensic information
in a crime intelligence database. Forensic Science International, 230(1–3), 137–146.
doi: 10.1016/j.forsciint.2012.10.010
Rovner, J. (2013). Is politicization ever a good thing? Intelligence and National Security,
28(1), 55–67. doi: 10.1080/02684527.2012.749065
Schlesinger, J. (1971). The Schlesinger Report. A Review of the Intelligence Community.
Washington, DC: White House Office of Management and Budget.
Sheptycki, J. (2004). Organizational pathologies in police intelligence systems: Some
contributions to the lexicon of intelligence-led policing. European Journal of
Criminology, 1(3), 307–332. doi: 10.1177/1477370804044005
Shore, J.J.M. (2006). Intelligence review and oversight in post-9/11 Canada.
International Journal of Intelligence and Counterintelligence, 19(3), 456–479. doi:
10.1080/08850600600656350
Sims, J., & Gerber, B. (Eds.). (2005). Transforming U.S. Intelligence. Washington, DC:
Georgetown University Press.
Skillicorn, D. (2009). Knowledge discovery for counterterrorism and law enforcement.
Boca Raton, FL: CRC Press.
Strang, S. (2005). Project SLEIPNIR: An analytic technique for operational priority
setting. Ottawa: Royal Canadian Mounted Police.
Strategic Comments. (2017). Trump and the US intelligence community. Strategic
Comments, 23(1), i–iii. doi: 10.1080/13567888.2017.1288898
Treverton, G. (2008). Intelligence analysis: Between politicisation and irrelevance. In
George, R.Z., & Bruce, J.B. (Eds.), Analyzing intelligence: Origins, obstacles, and
innovations (pp. 91–106). Washington, DC: Georgetown University Press.
Tromblay, D.E. (2016). The threat review and prioritisation trap: How the FBI’s new threat
and prioritisation process compounds the bureau’s oldest problems. Intelligence and
National Security, 31(5), 762–770.
Tromblay, D. E. (2017). Information Technology (IT) woes and intelligence agency
failures: the Federal Bureau of Investigation’s troubled IT evolution as a microcosm of
Tasking and coordination 75
a dysfunctional corporate culture. Intelligence and National Security, 32(6), 817–832.
doi: 10.1080/02684527.2017.1296947
U.S Senate Committee on Homeland Security and Governmental Affairs. (2012). U.S.
Senate Permanent Sub-Committee on investigations, federal support for the involvement
in state and local fusion centers (majority and minority staff report) Washington, DC:
Senate Committee on Homeland Security and Governmental Affairs.
Van Puyvelde, D. (2016). Fusing drug enforcement: A study of the El Paso
Intelligence Center. Intelligence and National Security, 31(6), 888–902. doi:
10.1080/02684527.2015.1100373
Walsh, P.F. (2011a). Intelligence and intelligence analysis. Abingdon, UK: Routledge.
Walsh, P.F. (2011b). Intelligence and national security issues in policing. In P. Birch &
V. Herrington (Eds.), Policing in practice (pp. 109–127). Sydney, NSW: Palgrave
Macmillan.
Walsh, P.F. (2012). Submission and testimony to inquiry into the use of criminal
intelligence, by Joint Parliamentary on Law Enforcement, Australian Parliament,
Canberra. Retrieved from www.aph.gov.au/parliamentary_business/Committees/S
enate_Committees?url=le_ctte/criminal_intelligence/submission.htm
Walsh, P.F. (2015). Building better intelligence frameworks through effective governance.
International Journal of Intelligence and Counterintelligence, 28(1), 123–142. doi:
10.1080/08850607.2014.924816
Walsh, P.F. (2016). Australian national security intelligence collection since 9/11: Policy
and legislative challenges. In Warby, K. (Ed.), National security, surveillance and
terror (pp. 51–74). Cham, Switzerland: Springer International Publishing.
Walsh, P.F. (2017). Improving strategic intelligence analytical practice through
qualitative social research. Intelligence and National Security, 32(5), 548–562. doi:
10.1080/02684527.2017.1310948
Walsh, P.F. (2018). Intelligence, biosecurity and bioterrorism. London: Palgrave
Macmillan.
Walsh, P.F., & Miller, S. (2016). Rethinking ‘five eyes’ security intelligence collection
policies and practice post Snowden. Intelligence and National Security, 31(3), 345–
368. doi: 10.1080/02684527.2014.998436
Walsh, P.F., & Ratcliffe, J.H. (2005). Strategic criminal intelligence education: A
collaborative approach. IALEIA Journal, 16(2), 152–166.
Walsh, S.J. (2018). Australasian forensic science summit 2016: The external future context
and the case for change. Australian Journal of Forensic Sciences, 50(3), 245–258. doi:
10.1080/00450618.2017.1383572
Warner, M. (2014). The rise and fall of intelligence. Washington, DC: Georgetown
University Press.
Warner, M., & McDonald, J. K. (2005). US Intelligence Community reform studies since
1947. Washington, DC: Center for the Study of Intelligence.
White, M. (2012). A judicial perspective–the making of preventative detention orders. In
A. Lynch, E. MacDonald & G. Williams (Eds.), Law and liberty in the war on terror
(pp. 116–127). Annandale: The Federation Press.
Whitesmith, M. (2020). Experimental research in reducing the risk of cognitive bias in
intelligence analysis. International Journal of Intelligence and Counterintelligence,
33(2), 380–405. doi: 10.1080/08850607.2019.1690329
Williams, G. (2011). A decade of Australian anti-terror laws. Melbourne University Law
Review, 35, 1137–1151.
Zegart, A. (2007). Spying blind. Princeton, NJ: Princeton University Press.
4 Collection
Introduction
Intelligence collection is the second critical node of intelligence production.
Effective leadership over collection processes, both within agencies and across
intelligence communities (ICs), has always been vital to good intelligence out-
comes—at tactical, operational, or strategic levels. However, since 9/11 the chal-
lenges for maintaining and improving collection platforms and processes are
increasing. These include how leaders navigate technological issues that can both
facilitate and inhibit collection efforts against increasingly technologically nimble
threat actors. Other challenges include the impact of IC history and culture and
how both influence efforts for effective coordination and integration of informa-
tion and collection platforms. Notably as well, perhaps the Snowden episode has
like no previous leaks exacerbated the dilemmas for IC leaders between enhanc-
ing proactive collection capabilities and attempting to reconcile this with the pub-
lic’s increasing questioning of what should be legitimate secrets and the impact
of collection on privacy.
In order to understand the myriad of collection challenges, I have organised this
chapter into three broad thematic areas: technological and methodological, intel-
ligence collection and governance, and intelligence collection ethics and efficacy
challenges. The analysis of both primary and secondary data sources in this study
underscores how these three themes remain critical for IC leaders to understand if
they wish to continue to deploy effective collection strategies against the evolving
security environment. In the conclusion, I summarise briefly the general implica-
tions of all three thematic areas. However, as mentioned earlier, a more detailed
discussion of how leaders may address collection challenges will be explored in
Chapter 8 (The Future IC Leader and Governance Challenges).
A final note before we begin discussing the three themes. This book is pitched
primarily at the IC leader, so a certain level of knowledge about collection plat-
forms and methodologies is assumed. However, if you are new to the world of
intelligence collection, there are several good sources which explain both the his-
torical development of collection, technologies, platforms and methodologies and
how they are used (e.g. Lowenthal 2012; Clark 2014; Gill and Phythian 2018;
Higgins 2009: 85–107; Johnson and Wirtz 2015; Shulsky and Schmitt 2002).
Collection 77
Technological and methodological challenges
As discussed in Chapter 2 (Intelligence and Leadership), the history of each mod-
ern ‘Five Eyes’ IC is entwined with the technological developments that marked
the decades following World War II (Warner 2012: 137–138). Advances and
investment in larger-scale technological collection platforms started in World
War II. The wartime ‘British codebreaking enterprise, which penetrated Enigma
resulted in more than 30,000 decrypts a month at the beginning of 1943 and
nearly 90,000 a month by the end of that same year’ (Brantly 2018: 564–565). As
Brantly points out:
the scale and complexity of communications globally at the end of the war
were significant, though the coming expansion of communications mediums
and the diversity of their use and applications were set to grow substantially
in the decades following the war.
(Ibid)
the key vector for the rise of Big Data is the digitization of information. In
2000, only a quarter of the world’s stored information was digital. In 2013,
this figure rose to over 98 per cent of the approximately 1200 Exabyte (1
Exabyte equalling 1 billion gigabytes) of information stored worldwide in
all forms.
(Lim 2016: 622)
the benefit of big data being—the search for that one black swan also being
naturally far more defined than for the thousandth white one—and this pos-
sibly in real-time, is an invaluable advantage in intelligence work.
(Ibid)
Of course, finding that black swan or outlier in many threat contexts remains very
difficult for reasons we will turn to shortly. It’s clear that big data has increasingly
facilitated the automatic and manual collection of volumes of data particularly
in sensing, communication, and information processing systems. It frees up the
time spent on analysis and sense-making in relation to collection—providing of
course analysts are able to make sense of the data—a point we come back to in
the following chapter (Chapter 5 Analysis). Bigger more capable computers to
rapidly ‘do the collection’ can potentially identify anomalies in anything from
energy usage, vehicle number plates, social media, and bank records, which may
indicate actual or potential criminal activities. However, a downside to big data,
which continues to be a problem for ICs and law enforcement agencies, is to effi-
ciently analyse these data sets (see Chapter 5). Pavlin encapsulates the challenge,
arguing ‘the problem remains how more rapidly and accurately ICs can “decode”
threat behaviour patterns consisting from ever increasing volumes of heterogene-
ous types of data generated at different locations and points in time’ (Pavlin 2013:
80 Collection
137–146). The impressive inroads in being able to collect ever large volumes
of big data has resulted in what Lim describes a kind of ‘data asphyxiation and
decision paralysis’ (Lim 2016: 628). He gives the examples of the US National
Security Agency (NSA), where SIGINT technology far outpaces the organisa-
tion’s human analytical capabilities. Even the US Navy, he suggests, in order to
track the movement of seagoing vessels worldwide, alone collects 200 terabytes
of data approximately every 48 hours (Ibid).
Despite this data deluge, all technical intelligence forms (SIGINT, MASINT,
and IMINT (now GEOINT) and other emerging fields of CYBINT and SOCMINT
(Social Media Intelligence) are expanding at near exponential rates, according to
Brantley. This means that ‘the signal to noise ratio within this data is very low, and
vast collections of data make analysis extremely difficult’ (Brantly 2018: 566).
This is not to suggest that big data analytics has not improved and found mean-
ingful correlations between data sets leading to preventing or disrupting threats.
Certainly in areas such as money laundering, fraud, and high volume crimes (e.g.
burglaries), gains have been made—but in more serious organised crime or terror-
ism—correlation much less causation can be more difficult to find. Equally too,
the notion of ‘predictive analytics,’ which has worked well in some commercial
settings such as marketing, are currently less able to show threat actor intent or the
planning of serious crimes such as terrorist attacks without of course other intel-
ligence (HUMINT) and investigative sources being thrown into the mix.
Nonetheless, given the diversity, volume, and speed of big data compared to
other intelligence feeds (e.g. HUMINT), one key strength is that it ‘often can pro-
vide more value in its exhaust (data captured as a residual) than in its deliberate
data collections.’ ‘This exhaust can (still) prove useful to future analysis efforts.
In particular, as Brantly suggests in addressing questions not yet formulated by a
given client’ (2018: 566).
Perhaps, as Lim argues, big data analytics might be particularly useful for
‘surveillance and warning against unlikely but nonetheless high-impact events or
“black swans,” as they are now referred to in the popular literature’ (Lim 2016:
629). We have seen how for decades big data analytics has helped provide surveil-
lance for a range of diseases in public health and biosecurity—but even in these
contexts the systems are not perfect or necessarily ‘predictive’ (Walsh 2018).
I expect/hope though that after the global COVID-19 pandemic even greater
improvements can be made in big data-driven health security surveillance sys-
tems to improve early warning on further novel catastrophic infections (Ibid).
While it might become possible in some complex threat contexts to more
quickly correlate patterns in a variety of data sources that could indicate potential
threat pathways such as planning of a terrorist event, I remain sceptical whether
big data analytics can reliably on its own lead IC agencies to sufficient predic-
tive or early warning in such complex threat contexts. In contrast, Lim is of the
view that big data analytics can take on this strategic/predictive role—arguing it
might be ‘best suited in discerning long-term developments, including generating
intelligence hypotheses, and adduce refuting facts’ (Ibid: 619). However, I think
Lim’s point remains contestable.
Collection 81
The ‘predictive power’ of big data analytics applied to complex threats is ham-
pered by data sets that are usually historic and/or incomplete. While patterns in
historical data may infer the existence of a pattern of threat behaviour, terrorism
and organised crime behaviour are complex and historical patterns are not nec-
essarily a judge of future ones in a correlational let alone causational sense. In
addition to not easily inferring or explaining the future potential of threat actor
groups, generating hypotheses from historical data may just reinforce ‘noise’ in
already overwhelmed data systems in our ICs. In addition, there is a problem in
data analytics algorithms resulting in false positives. Advancements in machine
learning have also resulted in biases within algorithms. These biases can be self-
reinforcing and result in even less accurate analysis. The role of a human analyst
therefore remains critical in correcting bias generated by automated learning algo-
rithms and making the necessary adjustments to reduce the significance of error.
So for the moment, algorithms alone cannot replace other collection methodol-
ogies. Human subject matter experts, SIGINT, GEOINT, and Open-source intel-
ligence (OSINT) all offer opportunities to triangulate the validity and reliability
of big data analytics. This is not to marginalise the importance big data analytics
has played in our IC and law enforcement agencies over the last two decades in
particular. However, IC leaders need to see big data as merely another tool in the
collection toolbox. An important tool perhaps in many contexts but nonetheless
just another tool. Each tool, technology, and technique have potential utility but
they also each have their own limitations. How they are applied depends on the
threat context.
Efforts continue in ICs to improve the anticipatory and predictive reliabil-
ity of big data analytics that assess events and information. While much of this
is classified, some of the Intelligence Advanced Research Projects Activity’s
(IARPA’s) work is illustrative of what is being done to improve ‘forecasting’
of big data analytics used in ICs. IARPA funds a variety of research initiatives.
Just two of many examples include the Aggregate Contingent Estimation (ACE)
and Forecasting Science and Technology (ForeST) (Brantly 2018: 567). ACE
was ‘designed to focus on probabilistic assessments for contingent events, the
aggregation of events by multiple human analysts and the representation of these
forecasts and their distributions’ (Ibid). ForeST was ‘designed to fund projects
that could accurately forecast significant advances or milestones in science and
technology’ (Ibid). There have been several other projects as well to improve the
collection and automated analysis of publicly available data to better anticipate
events, as we shall see below in the discussion on social media.
Regardless of these research improvement efforts, the sheer volume of big data
and enhanced technologies to improve the speed of which it can be collected and
analysed still makes a lot of big data analytics ‘reactive’ rather than properly get-
ting to the intention, causes, and prediction of threats. Our ICs will still struggle
to make sense of the relentless data feeds (Pannerselvam et al. 2015) in ways that
allow them to understand intention and causes better. As discussed in Chapter 6
(ICT), artificial intelligence (AI) advancements could be used to exploit the power
of machine learning to even higher levels, thereby automating or speeding up the
82 Collection
analytical capability of current machine learning capability. This point was ech-
oed by one IC leader surveyed, who said: ‘the use of big data, deep learning and
eventually artificial intelligence will help to speed up the processing of unstruc-
tured data (video/audio) for analysis’ (survey respondent reference 30).
And despite the volume of data, which will impact on the ability to efficiently
analyse it, machine learning technologies, techniques, and methods (leaving aside
some of their shortcomings) will be increasingly relied upon to assist intelligence
analysts to exploit more efficiently patterns in massive data sets. In addition to
efforts being made by government-funded research agencies such as IARPA,
the IC and private sector are also looking at other ways of meeting some of the
challenges the intelligence agencies have with extracting more sense-making and
forecasting capability out of big data. But what other approaches are being devel-
oped and will they help ICs analyse the volumes, velocity, and variety of data? A
US National Academies of Science workshop report on big data suggested three
approaches would be useful in improving IC analytical capability, including for
the remote detection of weapons of mass destruction and improved methods of
cyber command and control (NRC 2013: 39). Their report suggests that
first, streaming algorithms that can process data in one pass with limited
memory are clearly important. Second, for data at rest, transactional data-
bases are generally not needed, but highly usable systems for hosting and
querying massive data, including data distributed across multiple sites will be
essential. Third, the NRC report argued that better visualization tools are also
needed to conserve the scarce and valuable time of human analysts.
(Ibid)
Social media
Social media data sources are increasingly providing our ICs with a range of
information that can be integrated with other data sources on a person or group.
Lim provides a useful description of the variety and utility of social media for ICs:
In particular, over the last two decades, social media sources or social media
intelligence (SOCMINT) has seen an explosion in development as well as users
facilitated by breakthroughs in smart phone and tablet technology. Not counting
all the diverse social media platforms and applications that seem to emerge on an
almost daily basis, just two of the major social networking sites (Facebook and
Twitter) are estimated to have reached a worldwide user number of 2.5 billion
people (Hayes and Luther 2018: 9). Facebook alone has an active user number of
over 1.5 billion people (Ibid). Social media provides several platforms for people
to communicate for personal and commercial reasons.
84 Collection
There is insufficient space to provide examples of all the contexts in which
SOCMINT may be a useful collection source for ICs. Here we will summarise
some instances where SOCMINT has been used, but as with earlier discussion in
this chapter the focus is on what challenges SOCMINT presents to IC leaders in
the future. We will come back to the challenges shortly, but one obvious advan-
tage of SOCMINT’s various platforms (e.g. Facebook and Twitter) is that many
provide real-time crowd-sourcing information. In crisis situations such as natural
disasters or fast-moving security environments such as pandemics, riots, radicali-
sation, or a terrorist attack, citizens can take on the role of journalists—quickly
relaying information in real time or near real time that can provide emergency
responders, police, and the IC situational awareness (Stottlemyre 2015: 578–589;
Richey and Binz 2015: 347–364). For example, in late April 2020 the Australian
government launched its COVIDSafe app designed for the public to receive alerts
about whether people in their vicinity have been exposed to COVID-19. The app
speeds up the contacting and tracing process carried out by health authorities and
within the first two days of its release two million Australians downloaded the
non-mandatory app onto their smart phones. Such a real-time social media appli-
cation can (and leaving aside the privacy issues) allow for better operational and
tactical responses by ICs and emergency responders. As Omand et al. suggest,
the rise in use of social media, together with the rapid development of ana-
lytics approaches, now provides a new opportunity for law enforcement to
generate operational intelligence that could help identify criminal activity,
indicate early warning of outbreaks of disorder, provide information and
intelligence about groups and individuals, and help understand and respond
to public concerns.
(Omand et al. 2012: 805)
It is not just the variety of SOCMINT in real time that is potentially of interest
to the police and ICs, it is also that many social media platforms work with geo-
location capabilities that bring together a potential behaviour of concern and a
map of areas where such behaviours might be of greatest concern.
The IC’s ability to access SOCMINT varies. Open source information from
Twitter feeds for example are public and therefore easily accessed, while other
platforms require legal authorisation to remove privacy settings and encryption.
As we shall see in our later discussion of intelligence collection, ethics, and effi-
cacy, the ability of ICs to override privacy settings and encryption has increas-
ingly become a strident policy and community debate exacerbated further after
the Snowden leaks in 2013.
Despite the increasing exploitation of social media for intelligence purposes,
SOCMINT technology uptake and analysis continue to present ongoing chal-
lenges for IC leaders and the agencies or communities they manage. Examples
can be seen in the last decade when ICs were struggling to keep up with the mas-
sive Facebook and Twitter feeds emanating from North Africa and the Middle
East during the ‘Arab Spring’ in 2011–2012 (Rovner 2013: 260–271; Newham
Collection 85
and Bell 2012: 36–50). While harvesting an ever greater volume of SOCMINT
has increasingly become a mainstay of IC collection strategies, Omand and col-
league’s seminal SOCMINT article plainly outlines the two major challenges
with its application. The first is methodological. In other words, does the social
media source ‘rest on solid methodological bedrock of collection, evidence, veri-
fication, understanding and application’ (2012: 801). Second, ‘can the moral haz-
ard it entails be legitimately managed’? Again, we will come back to the second
point shortly.
On point one, it’s clear that a great deal of work is being done within ICs
and the broader research community to improve the reliability and validity of
various SOCMINT sources. In particular, research into understanding how ter-
rorists use social media for communication, intelligence, and operational plan-
ning is of central importance to ICs. Are there, for example, as Omand et al.
speculate, ‘thresholds, indicators and permissive conditions of violence; path-
ways into radicalization; an analysis of how ideas form and change’ that can
improve early warning and response to terrorist attacks (2012: 805–806). An
increasing volume of research is now looking at tracking pathways to violence
by radicalised individuals. In particular, there is a growing body of research into
understanding grievance analysis using machine learning to identify clusters or
anomalies in large data sets for behaviour that correlates statistically with emo-
tions suggesting radicalisation (Al-Saggaf 2016: 13–27; Al Saggaf et al. 2016:
45–56).
However, as Omand et al. correctly point out, a ‘crucial consequence of the
rise of machine learning approaches within social media analytics is that we are
currently much better at counting examples of online human behaviour than criti-
cally explaining why they are and what it might mean’ (Ibid: 811). Importantly
too, Omand reminds us that ‘language is textured: the intent, motivation, social
signification, denotation and connotation of any utterance is mutable and depend-
ent on the context of situation and culture.’
Dark web
The dark web is the last example of methodological challenges we will discuss
before turning our attention to the governance issues IC leaders will face in build-
ing sustainable and effective intelligence collection platforms and processes.
There remains an ongoing concern amongst ICs about threat actor’s communica-
tions ‘going dark’ either through exploited encrypted devices or using the dark
web, which is a smaller part of the internet that is hard to access without the
use of special browsers like Onion Router–Tor and passwords (Walsh 2018: 95).
ICs and law enforcement agencies in recent years have had increasing success in
penetrating, disrupting, and taking down several dark web Tor ‘onion’ domains,
which have been used for a variety of criminal activity including terrorist com-
munication and planning, drug trafficking, cyber-attacks, and child sexual exploi-
tation. The FBI’s 2014 takedown of Silk Road 2.0 used by multiple illicit drug
networks, the 2016 disruption of the Avalanche syndicate (a global trafficker in
botnet malware which infected over 180 countries), and the 2017 disruption of
Alphabay (a dark web criminal market place) are recent examples of greater IC
understanding and operational success against criminal dark web sites (Weiser
2014; European Union 2016; Broadhead 2018: 1180–1196).
It is difficult to gain outside the IC a full understanding of how ‘Five Eyes’
agencies are exploiting the dark web. However, there is now an increasing volume
of openly available research that provides insights into the types of techniques and
technologies ICs are using to collect information about dark web threats. Jardine
lists a number of techniques currently in use by IC and law enforcement aimed
at ‘developing attacks on dark web hosting service to compromise the anonym-
ity and privacy of the Tor network (including traffic correlation, protocol-level
attacks, and website fingerprinting)’ (Jardine 2018: 3). A number of machine
learning techniques and web crawlers can also be used to categorise content on
dark web forums (Dilip and Sharma 2018: 114–137; Chen 2012). Several other
approaches such as passive surveillance of chatroom conversations are useful in
providing details of criminal involvement and familiarity with cryptocurrencies
and dark web markets (Jardine 2018: 3). Passive observation of dark web mar-
kets can provide opportunities to develop detailed case studies on both the inten-
tions and capabilities of threat actors operating on illegal forums. Additionally,
Jardine notes ‘ethnographic investigations can reveal the catalytic effect of illegal
Collection 87
markets on drug users and survey methods can be used to pinpoint perceptions of
drug use among dark web market patrons’ (2018: 3).
While the methods and approaches discussed above provide greater understand-
ing of a diverse multitude of illicit markets, as Broadhead points out, the dynamic
nature of the dark web, or one defined by a ‘continuing transformation of the cyber-
crime eco-system remains the only constant’ (Broadhead 2018: 1180). The ability
to get a really granular collection and analysis of both illicit vendors and users
across various threat types is an ongoing challenge. The high churn rate for Tor hid-
den sites in real time conspires against research and IC efforts to improve analytical
generalisability about ‘market size,’ threat assessment, and operational disruption.
An enduring challenge for IC leaders therefore is to know how best to support
research and operational capabilities that will allow both a faster collection of
dark web information—despite ongoing efforts by threat actors to use this part
of the internet for increasing obfuscation and anonymity. Deep web information
extraction has relied on several web crawling techniques to varying levels of suc-
cess and research investment into other extraction protocols such as open frame-
work protocol for collection could be considered in their place (Dilip and Sharma
2018: 133). Efforts also need to be made to improve knowledge about both the
supply and demand side of illicit dark web markets and comparing these sources
with surface web information and other more traditional collection sources. As
noted in Chapter 8 (The Future IC Leader and Governance Challenges), IC lead-
ers will need to work with external experts and researchers to improve collection
capabilities against threat actors operating in the dark web.
Indeed, given the impact of the digital revolution globally, advances in cyber and
biotechnology and now arguably a revolution in AI, IC leaders will need to as sug-
gested in the above quote engage even more with the private sector and research
community to gain knowledge and ‘hard ware’ in an attempt to stay ahead of
emerging threat trajectories. In some cases, leaders will need to work closely with
‘IC outsiders’ in order to prolong ‘old traditional INT’ platforms, while in oth-
ers they will seek advice on how they can be supplemented or replaced with a
better fit for purpose-collection systems (Walsh 2018; Makridakis 2017: 46–60).
Additionally, private-public partnerships between technology and knowledge
providers, which can result in better collection capabilities, are already a major
part of the post-9/11 ‘Five Eyes’ IC landscape. In a global competitive market,
as governments divest their interest in sensitive areas of critical infrastructure
(telecommunications, energy, water, roads, airports, and ports), IC leaders will
need to also demonstrate a broader understanding of ‘security’ at the same time
as they look for opportunities to burden share-collection efforts with the private
sector. This will require adept leadership that can reconcile the interest of gov-
ernments and the private sector—yet still produce collection strategies that are
ethical and aligned with liberal democratic principles (Petersen and Tjalve 2018:
21–35). Above all, managing the complexity of collection into the future will
require, as noted by one IC leader surveyed for the project: ‘being future focused,
not thinking about current collection, but what will we need in 5 years’ time’
(survey respondent 60).
Conclusion
Chapter 4 introduced three themes (technological and methodological, govern-
ance, ethics, and efficacy) to frame our discussion on challenges IC leaders must
navigate through if collection platforms and processes are to remain ‘fit for pur-
pose’ against an increasingly complex security environment. The promise and
potential of emerging technological innovation opens up for ICs other sources
for collection as others may become more difficult to access due to encryption
and counter-intelligence campaigns by threat actors. Yet governance issues such
Collection 93
as organisational structure and culture will also impact on the kind of institu-
tional progress ICs will be able to make on integrating new collection strate-
gies and technologies. In Chapter 8 (The Future IC Leader and Governance
Challenges) we will return to the collection governance themes raised here
(technology, organisational structure, and ethics) to see how IC leaders will
need to reconcile them in ways that can continue to facilitate adaptive collection
platforms.
In the next chapter (Chapter 5 Analysis), we explore a sample of analytical
methodological issues and how their application by analysts and others impacts
on IC capabilities. The focus is not on how to improve the professional capabili-
ties of analysts (i.e. training and education) as this will be a subject discussed in
Chapter 7 (HR). Rather, Chapter 5 will investigate what methodologies, prac-
tices, and domain knowledge could improve analysis in the workplace and what
developments in these areas might be most beneficial for IC leaders to embrace
and why. It also explores what key governance challenges may arise as IC leaders
seek to improve both human and technological analytical capabilities.
Note
1 Bellingcat is an independent international collective of researchers, investigators,
and citizen journalists using open source media investigations to probe a variety of
subjects: crime conflicts, corruption, secret operations, mis and disinformation, and
extremist groups.
References
Al-Saggaf, Y. (2016). Understanding online radicalisation using data science. International
Journal of Cyber Warfare and Terrorism, 6(4), 13–27.
Al-Saggaf, Y., Utz, S., & Lin, R. (2016). Venting negative emotions on twitter and the
number of followers and followees. International Journal of Sociotechnology and
Knowledge Discovery, 8(1), 44–55.
Bellaby, R. (2012). The ethics of intelligence: A new framework. Abingdon: Routledge.
Brantly, A. F. (2018). When everything becomes intelligence: Machine learning and
the connected world. Intelligence and National Security, 33(4), 562–573. doi:
10.1080/02684527.2018.1452555
Broadhead, S. (2018). The contemporary cybercrime ecosystem: A multi-disciplinary
overview of the state of affairs and developments. Computer Law & Security Review:
The International Journal of Technology Law and Practice, 34(6), pp. 1180–1196. doi:
10.1016/j.clsr.2018.08.005
Chen, H. (2012). Dark web: Exploring and data mining the dark side of the web. New
York, NY: Springer.
Clark, R. (2014). Intelligence collection. Thousand Oaks, CA: CQ Press.
Cogan, C. (2004). Hunters not gatherers: Intelligence in the twenty-first Century. Intelligence
and National Security, 19(2), 304–321. doi: 10.1080/0268452042000302010
Dearstyne, B. W. (2005). Fighting terrorism, making war: Critical insights in the
management of information and intelligence. Government Information Quarterly,
22(2), 170–186.
94 Collection
Dilip Kumar, S., & Sharma, A. K. (2018). Deep web information retrieval process: A
technical survey. The dark web: Breakthroughs in research and practice (pp. 114–137).
Hershey, PA: IGI Global.
Ding, F., Ge, Q., Jiang, D., Fu, J., & Hao, M. (2017). Understanding the dynamics of
terrorism events with multiple-discipline datasets and machine learning approach.
PLoS One, 12(6), e0179057. doi: 10.1371/journal.pone.0179057
European Union (2016). Europol brings down global cybercrime syndicate. Bangkok:
Thai News Service Group.
Gill, P., & Phythian, M. (2018). Intelligence in an insecure world (3rd ed.). Cambridge:
Polity Press.
Hayes, R. M., & Luther, K. (2018). Crime: Social media, crime, and the criminal legal
system. Cham, Switzerland: Palgrave Macmillan US.
Higgins, O. (2009). The theory and practice of intelligence collection. In J. Ratcliffe (Ed.),
Strategic Thinking in Criminal Intelligence (pp. 85–107). Sydney: Federation Press.
Jani, K. P., & Soni, A. (2018). Promise and perils of big data science for intelligence
Community. In M. E. Kosal (Ed.), Technology and the intelligence community: Challenges
and advances for the 21st century (pp. 183–203). Cham: Springer International Publishing.
Jardine, E. (2018). The trouble with (supply-side) counts: the potential and limitations
of counting sites, vendors or products as a metric for threat trends on the Dark Web.
Intelligence and National Security, 1–17. doi:10.1080/02684527.2018.1528752
Johnson, L. K., Dorn, A. W., Webb, S., Kreps, S., Krieger, W., & Schwarz, E. (2017).
An INS Special Forum: Intelligence and drones/Eyes in the sky for peacekeeping: The
emergence of UAVs in un operations/the democratic deficit on drones/the German
Approach to Drone Warfare/Pursuing peace: The strategic limits of drone warfare/
Seeing but unseen: Intelligence drones in Israel/Drone paramilitary operations
against suspected global terrorists: US and Australian perspectives/the ‘Terminator
Conundrum’ and the future of drone warfare. Intelligence and National Security, 32(4),
411–440. doi: 10.1080/02684527.2017.1303127
Johnson, L., & Wirtz, J. (Eds.) (2015). Intelligence: The secret world of spies. New York:
Oxford University Press.
Kaul, K., Tucker, M., McNamara, G. S., Hicks, J., Bliss, C., Tosi, S., & Loethen, L. (2018).
Going darker 2.0. Policy recommendations for law enforcement and the intelligence
Community and private sector. Washington, DC.
Lamarre, L. (1998). The digital revolution. EPRI Journal, 23(1), 26.
Lim, K. (2016). Big data and strategic intelligence. Intelligence and National Security,
31(4), 619–635. doi: 10.1080/02684527.2015.1062321
Lowenthal, M. (2012). Intelligence from secrets to policy. Thousand Oaks, CA: Sage
Publications.
Makridakis, S. (2017). The [in press] Artificial Intelligence (AI) revolution: Its impact on
society and firms. Futures, 90(C), 46–60. doi: 10.1016/j.futures.2017.03.006
Masys, A. (Ed.) (2014). Networks and network analysis for defence and security. Cham:
Springer International Publishing.
Morrison, J. N. (2011). British intelligence failures in Iraq. Intelligence and National
Security, 26(4), 509–520.
National Research Council (2013). Frontiers in massive data analysis. Washington, DC:
The National Academies Press.
Newnham, J., & Bell, P. (2012). Social network media and political activism: A growing
challenge for law enforcement. Journal of Policing, Intelligence and Counter Terrorism,
7(1), 36–50. doi: 10.1080/18335330.2012.653194
Collection 95
Olson, D. L., & Delen, D. (2008). Advanced data mining techniques. Berlin-Heidelberg:
Springer Science & Business Media.
Omand, D., Bartlett, J., & Miller, C. (2012). Introducing social media (SOCMINT)
intelligence. Intelligence and National Security, 27(6), 801–823.
Omand, S. D., & Phythian, M. (2013). Ethics and intelligence: A debate.
International Journal of Intelligence and Counterintelligence, 26(1), 38–63. doi:
10.1080/08850607.2012.705186
Omand, D., & Phythian, M. (2018). Principled spying: The ethics of secret intelligence.
Oxford: Oxford University Press.
Pannerselvam, John, Liu, Lu, & Hill, Richard (2015). An introduction to big data. In B.
Akhgar, Saathoff, G. B., Arabnia, H. R., Hill, R., Staniforth, A., & Bayerl, P. S. (Eds.),
Application of big data for national security (pp. 1–13). Oxford: Butterworth-Heinemann.
Pavlin, G., Quillinan, T., Mignet, F., & de Oude, P. (2013). Exploiting intelligence for
national security. In B. Akhagar & S. Yates (Eds.). (pp. 181–198). Watham, MA;
Boston: Butterworth-Heinemann.
Petersen, K. L., & Tjalve, V. S. (2018). Intelligence expertise in the age of information sharing:
Public–private ‘collection’ and its challenges to democratic control and accountability.
Intelligence and National Security, 33(1), 21–35. doi: 10.1080/02684527.2017.1316956
Pramanik, M. I., Lau, R. Y. K., Yue, W. T., Ye, Y., & Li, C. (2017). Big data analytics for
security and criminal investigations. Wiley Interdisciplinary Reviews: Data Mining and
Knowledge Discovery, 7(4), e1208-n/a. doi: 10.1002/widm.1208
Purda, L., & Skillicorn, D. (2015). Accounting variables, deception, and a bag of words:
Assessing the tools of fraud detection. Contemporary Accounting Research, 32(3),
1193–1223.
Richey, M. K., & Binz, M. (2015). Open source collection methods for identifying
radical extremists using social media. International Journal of Intelligence and
Counterintelligence, 28(2), 347–364. doi: 10.1080/08850607.2014.962374
Rovner, J. (2013). Intelligence in the twitter age. International Journal of Intelligence and
Counterintelligence, 26(2), 260–271. doi: 10.1080/08850607.2013.757996
Seel, P. B. (2012). Digital universe the global telecommunication revolution. Hoboken:
John Wiley & Sons.
Shulsky, A., & Gary Schmitt, G. (2002). Silent warfare understanding the world of
intelligence. Virginia: Potomac Books.
Skillicorn, D. (2009). Knowledge discovery for counterterrorism and law enforcement.
Boca Raton, FL: CRC Press.
Skillicorn, D., & Reid, E. (2014). Language use in the jihadist magazines inspire and Azan.
Security Informatics, 3(1), 1–16. doi: 10.1186/s13388-014-0009-1
Stottlemyre, S. A. (2015). HUMINT, OSINT, or something new? Defining crowdsourced
intelligence. International Journal of Intelligence and Counterintelligence, 28(3), 578–
589. doi: 10.1080/08850607.2015.992760
Tromblay, D. E. (2017). Information Technology (IT) woes and intelligence agency
failures: The Federal Bureau of Investigation’s troubled IT evolution as a microcosm of
a dysfunctional corporate culture. Intelligence and National Security, 32(6), 817–832.
doi: 10.1080/02684527.2017.1296947
Van der Hurst, R. (2009). Introduction to social network analysis (SNA) as an investigative
tool. Trends Organ. Crime, 12(2), 101–121.
Walsh, P. F. (2011). Intelligence and intelligence analysis. Abingdon: UK: Routledge.
Walsh, P. F. (2017). Drone paramilitary operations against suspected global terrorists: US
and Australian perspectives. Intelligence and National Security, 32(4), 429–433.
96 Collection
Walsh, P. F. (2018). Intelligence, biosecurity and bioterrorism. London: Palgrave
Macmillan.
Walsh, P. F. (2020). Improving ‘Five Eyes’ health security intelligence capabilities:
Leadership and governance challenges. Intelligence and National Security, 35(4), 586–
602. doi: 10.1080/02684527.2020.1750156
Walsh, P. F., & Miller, S. (2016). Rethinking 'five eyes' security intelligence collection
policies adn practice post snowden. Intelligence and National Security, 31(3), 345–368.
Warner, M. (2012). Reflections on technology and intelligence systems. Intelligence and
National Security, 27(1), 133–153. doi: 10.1080/02684527.2012.621604
Weiser, B. (2014). Man is charged with operating a black market website. (Metropolitan
Desk) (Blake Benthall and the Silk Road 2.0 website) (pp. A26), New York: The New
York Times Company.
Zijuan, L., & Shuai, D. (2017, 25–27 December). Research on prediction method of
terrorist attack based on random subspace. Paper presented at the 2017 International
Conference on Computer Systems, Electronics and Control (ICCSEC), pp. 320–322.
IEEE.
5 Analysis
Introduction
Analysis—both its cognitive and its technical dimensions—are at the heart of
all core intelligence processes regardless of the context in which intelligence is
practiced (e.g. national security, military, law enforcement, or the private sector).
This chapter investigates common analytical techniques currently utilised in ‘Five
Eyes’ countries and what the IC leadership (rather than analysts) need to know
about them from a broader organisational perspective. Hence, the focus is not an
in-depth discussion from an analyst’s practice point of view of all analytical tools
currently being deployed in our ICs. There is now an ever growing number of
sources the reader can turn to for detailed background knowledge on both analyti-
cal techniques and general progress being made in the intelligence analysis area
since 9/11 (see for e.g. Dahl 2017; Frank 2017: 579–599; Chang and Tetlock
2017: 903–920; Marrin 2007: 821–846, 2017, 2020: 350–366; Phythian 2017:
600–612; Lahneman and Arcos 2017: 972–985; Shelton 2014: 262–281; Walsh
2011, 2017; Pherson and Heuer 2020). Instead of attempting to provide a detailed
evaluation of all available analytical techniques (which would be next to impos-
sible), Chapter 5 provides a thematic exploration of a few well-known analytical
techniques along with their strengths and weaknesses. Following this discussion,
the chapter concludes with an assessment on how both the validity and utility of
various analytical techniques impacts on broader leadership (governance) chal-
lenges within ICs.
For the sake of simplicity, I have decided to deliberately use the word ‘tech-
nique’ as a catch-all for what really is an increasingly diverse range of analyti-
cal methods, tools, approaches, and technologies in use or being developed for
deployment in ICs. Methods, tools, and technologies are not the same thing as
‘techniques,’ nonetheless the latter does share commonality with all the former in
that techniques are ways of doing something. ‘Tools,’ ‘methods,’ and ‘approaches’
also convey a similar meaning. Using the one word ‘technique’ to discuss a range
of analytical methods, tools, approaches, and techniques together allows for a
conceptually neater discussion—one less focused on the semantics between ana-
lytical techniques vs analytical methods and more on how in each case they ena-
ble or inhibit intelligence analysis of an increasingly complex threat environment.
98 Analysis
As highlighted above, an assessment of the validity and reliability of analyti-
cal techniques discussed in this chapter reveals several governance issues for IC
leaders. The most critical analytical governance issues will be highlighted here.
However, in Chapter 8 (The Future IC Leader and Governance Challenges), we
will revisit what governance challenges are likely to be the most pressing for
future leaders to solve and how they might do so.
Analytical techniques
Before starting a thematic exploration of analytical techniques, it is necessary first
to frame the discussion by defining how I will define ‘intelligence analysis’—
given that analytical techniques are primarily applied in support of it. Again, there
is a healthy growing volume of research—some historical and others contempo-
rary—that have sought to define what ‘intelligence analysis’ is and what analysts
do (Walsh 2011; Marrin 2011, 2017; George 2010; George and Bruce 2008).
A key strand in the intelligence studies literature over several decades has been
to demonstrate that understanding ‘intelligence analysis’ requires a fuller explo-
ration of its multi-disciplinary heritage. In other words, understanding fully the
role of intelligence analysis is dependent on practitioners and researchers map-
ping how it is informed by different disciplines, and which of these may assist in
improving analytical outcomes for decision-makers. Another strand in the ‘intel-
ligence analysis’ literature asks whether intelligence analysis is an art or science
(Richards 2010). While this second strand may be intellectually engaging, I argue
that its actual application to improving analysis within ICs is limited. It may be
still interesting to debate for some how much an art or science intelligence analy-
sis is. But I think it is largely self-evident with even a cursory understanding of
how intelligence analysis is practiced in different intelligence contexts that it is
informed by both social scientific and natural science perspectives. In short, intel-
ligence analysis is an amalgamation of the two broad branches of knowledge,
and the practice context determines how aspects of social or natural sciences are
deployed. Leaving this debate aside, it’s clear that ‘intelligence analysis’ can be
conceptualised from a variety of different perspectives depending on one’s own
disciplinary or practitioner background. For the sake of simplicity, I define ‘intel-
ligence analysis’ as ‘both a cognitive and methodological approach to processing
and evaluating information—some of which is privileged—in order to produce an
assessment for a decision-maker about the security environment’ (Walsh 2011:
236). This definition is sufficiently vague that it can be applied in different intel-
ligence contexts.
The analytical techniques we focus on in the following section are explored
using three themes: social network analysis, structured analytical techniques, and
data mining/machine learning and behavioural sciences. A brief discussion will
introduce how each theme has been used in different intelligence contexts. We
will not spend much time on data mining/machine learning techniques as these
were discussed in detail in Chapter 4 (Collection). Data mining/machine learning
will also be raised again in Chapter 6 (ICT). In the final section, the advantages
Analysis 99
and disadvantages of each analytical technique will be explored along with the
critical governance challenges IC leaders will have to navigate as they relate to
improving analytical practice.
In terms of SNA practice in law enforcement, Strang makes the distinction that
law enforcement since the 1970s has actually been deploying ‘network analysis’
and only more recently SNA (Strang 2014: 2). He defines link analysis as ‘explor-
ing the connections between individuals involved in criminal activity through
their links to each other and through their links to organisations, objects, places
and events related to the crimes’ (Ibid: 2). In contrast, Strang’s definition of SNA
as ‘the study of patterns of social connections, communications, exchange, friend-
ship, trust, cooperation, kinship also secrecy, competition, mistrust and enmity’
(Ibid: 5) suggests a tighter focus concentrating on the relationships between peo-
ple. The social interaction between criminal actors is clearly useful for targeting
recommendations, intelligence collection, and operational disruption.
The large volumes of criminal intelligence accumulating in law enforce-
ment agencies and the complexity of organised crime has seen the automation of
SNA in many agencies using analytical software such as I2, Palantir, and others.
100 Analysis
Researchers are also increasingly focused on computer-driven SNA that can more
rapidly detect, for example, gang networks and counter their associated violence.
For example, Paulo and colleagues (2013) documented their development of new
software called the Organizational, Relationship, and Contact Analyzer (ORCA)
‘that is designed from the ground-up to apply new techniques in social network
analysis and mining to support law enforcement.’ The software combines tech-
niques from logic programming, viral marketing, and community detection in
a usable application custom-tailored for law enforcement intelligence support.
The authors note their ‘work is inspired by recent work in law enforcement that
recognizes similarities between gang members and insurgents and identifies
adaptations that can be made from current counter-insurgency (COIN) strategy
to counter gang violence’ (Paulo et al. 2013: 1). The research team evaluated
ORCA on a police data set of 5418 arrests from a single police district over three
periods of time, finding 11,421 relationships among the arrests (Ibid: 3). From
this data, Paulo et al. 2013 used ORCA to assemble a social network consisting of
1468 individuals (who were members in one of 18 gangs) (Ibid: 3–4).
ORCA was able to complete this assembly in addition to all analysis (deter-
mining degree of membership, finding seed sets, and developing ecosystems)
taking 34.3 seconds to do so on a commodity laptop (Windows 8, B960 2.2
GHz processor with 4 GB RAM).
(Ibid: 4–5)
This kind of research shows the potential of automated SNA techniques, but fur-
ther work is required to improve their speed and accuracy.
SNA techniques have also been deployed for several decades in assessing the
interaction within and between terrorist groups (Arquilla and Ronfeldt 2002).
In the 1960s, the CIA deployed network analysis to understand the relation-
ships between families and communities in communist strong areas of Thailand
(Ressler 2006: 6). After the 9/11 attacks, there has been an increased interest
in SNA from some IC agencies such as the CIA and NSA along with a greater
number of scholars attempting to do SNA research on terrorist groups using open
source information (Ibid: 3). Shortly after 9/11, Valdis Krebs mapped Al Qaeda’s
network using publicly available data on the AQ hijackers and running basic net-
work principles through computer software (Ressler 2006: 3). Marc Sageman’s
2004 book Understanding Terrorism Networks also provided a detailed under-
standing of clusters of regional AQ groups using open sources (Sageman 2004).
Large databases now exist such as the Global Terrorism Database and the Profiles
of Incidents involving CBRN and Non-State Actors (POICN) database (Binder
and Ackerman 2019: 4–5), which provide scholars with additional opportunities
to conduct SNA research on various terrorists and criminal groups. Researchers
within and outside the IC continue to experiment with how best to use SNA tech-
niques to destabilise and disrupt terrorist groups, and for understanding recruit-
ment and resilience (Choudary and Singh 2015; Bright et al. 2020: 638-656).
Increasingly, this research involves attempts to improve algorithms that can both
Analysis 101
automate and assess the significance of social interactions between threat actors
closer to real time using YouTube, Twitter, Facebook, and other social media
(Klausen et al. 2012; Ball 2013: 147–168; Zeng et al. 2015: 13–16; Chen 2008).
Other research is looking at how computational networks can reflect changes
in terrorist activity based on the implementation of counter-terrorism policies
(Horne and Bestvater 2016: 87–110). In summary, it’s clear that attempts are
being made to improve the accuracy and automation (using big data and machine
learning) of various SNA techniques. Equally though, as we shall see in the sec-
ond section (intelligence governance issues), not only analysts but intelligence
leaders will increasingly be challenged in their understanding on which machine
learning-driven SNA techniques will be most useful and how they can be effec-
tively deployed in ways that optimise collection and analytical processes.
Conclusion
This chapter explored thematically key analytical techniques used by ICs to
support analytical processes and judgements. In each case, their strengths and
weaknesses were identified. Second, the chapter discussed how innovation in
analytical techniques and processes is the responsibility of both analysts and IC
leaders. The increasing complexity of the security environment, limited resources,
and a competitive information environment places more pressure on IC leaders
now to adopt whole of agency and enterprise wide initiatives. In the case of ana-
lytical innovations, this means ones that are cost effective and can demonstrate
empirically (to the extent that this is possible) how they increase the validity and
108 Analysis
reliability of assessments. This is not to suggest that all analytical techniques
and innovations can or should be amenable to ‘empirical testing.’ Intelligence
analysis will remain an art and science. However, the complexity of the secu-
rity environment will demand additional analytical innovations that can augment
traditional tradecraft. Innovations are likely to come from SBS and the scien-
tific community whose traditions of deploying empirical methods for testing the
validity and reliability of data sources will improve IC assessments. And indeed
a number of IC leaders surveyed echoed the greater need for them to engage
with SBS academics and the broader academic community (survey respondents
7 and 36). It will be up to IC leaders, however, to assess what constraints in
their organisational structures, processes, and cultural environments might be
limiting progress on analytical innovations—both endogenous and exogenous to
IC—including their evaluation and implementation. How will IC leaders address
the institutional obstacles to analytical innovation and create sustainable com-
munities of analytic practice that result in more reliable and valid assessments for
decision-makers? In the following chapters (Chapters 6 ICT; 7 HR; and 8 The
Future IC Leader and Governance Challenges), we will address aspects of these
questions further.
In the next chapter (Chapter 6 ICT), the focus shifts away from the leadership
aspects of core intelligence processes (e.g. tasking and coordination, collection,
and analysis) to two chapters which are centred on two key enabling activities
(ICT, HR).2 Chapter 6 will discuss the leadership challenges associated with
information communications and technology (ICT) which support core intelli-
gence processes. It will primarily focus on the role of artificial intelligence (AI)
given this topic remains an enduring priority for ICs to manage and because its
implementation is linked as noted earlier to our discussions on analytical innova-
tion, but also other topics in the rest of the book.
Notes
1 I peer reviewed the Social Science Research and Intelligence in Australia report.
2 You will recall from Chapter 2 we mentioned there were five key enabling activities:
ICT, HR, Legislation, Research, and Governance. While the book’s next two chapters
focus exclusively on ICT and HR, the other activities (research, legislation, and govern-
ance) cross over all chapters and are also explored more deeply in Chapter 8 (The Future
IC Leader and Governance Challenges) and Chapter 9 (Leadership Development).
References
Agarwal, S., & Sureka, A. (2015). Applying social media intelligence for predicting
and identifying online radicalisation and civil unrest oriented threats. Computers and
Society, 1–18.
Arquilla, J., & Ronfeldt, D. (Eds.). (2002). Networks and netwars: The future of terror,
crime and military. Washington, DC: RAND.
Ball, L. (2016). Automating social network analysis: A power tool for counter-terrorism.
Security Journal, 29(2), 147–168. doi: 10.1057/sj.2013.3
Analysis 109
Barnes, A. (2016). Making intelligence analysis more intelligent: Using numeric
probabilities. Intelligence and National Security, 31(3), 327–344. doi:10.1080/02684
527.2014.994955
Beebe, S.M., & Pherson, R.H. (2014). Cases in intelligence analysis: Structured analytic
techniques in action. Thousand Oaks, CA: CQ Press.
Bier, E.A., Card, S.K., & Bodnar, J.W. (2010). Principles and tools for collaborative
entity-based intelligence analysis. IEEE Transactions on Visualization and Computer
Graphics, 16(2), 178–191.
Binder, M.K., & Ackerman, G.A. (2019). Pick your POICN: Introducing the profiles of
incidents involving CBRN and non-state actors (POICN) database. Studies in Conflict
and Terrorism, 1–25. doi: 10.1080/1057610X.2019.1577541
Bright, D., Whelan, C., & Harris-Hogan, S. (2018). On the durability of terrorist networks:
Revealing the hidden connections between jihadist cells. Studies in Conflict and
Terrorism, 43(7), 638–656. doi: 10.1080/1057610X.2018.1494411
Bruinsma, G., & Bernasco, W. (2004). Criminal groups and transnational illegal markets.
Crime, Law and Social Change, 41(1), 79–94.
Carrington, P.J. (2011). Crime and social network analysis. In J. Scott and P. Carrington
(Eds.), SAGE handbook of social network analysis (pp. 236–255). London: Sage
Publications.
Chang, W., & Tetlock, P.E. (2016). Rethinking the training of intelligence analysts.
Intelligence and National Security, 31(6), 903–920.
Chattoe E., & Hamill H. (2005). It’s not who you know - it’s what you know about people
you don’t know that counts. British Journal of Criminol, 45, 860–876.
Chen, H. (2008). Sentiment and affect analysis of dark web forums: Measuring
radicalization on the internet. Paper presented at the 2008 IEEE international conference
on intelligence and security informatics. 17–20 June 2008, Taipei, Taiwan.
Choudhary, P., & Singh, U. (2015). A survey on social network analysis for counter-
terrorism. International Journal of Computer and Applications, 112(9), 24–29.
Coles, N. (2001). It’s not what you know - it’s who you know that counts: Analysing
serious crime groups as social networks. British Journal of Criminol, 41, 580–594.
Coulthart, S.J. (2017). An evidence-based evaluation of 12 core structured analytic
techniques. International Journal of Intelligence and CounterIntelligence, 30(2),
368–391.
Dahl, E.J. (2017). Getting beyond analysis by anecdote: Improving intelligence analysis
through the use of case studies. Intelligence and National Security, 32(5), 563–578. doi:
10.1080/02684527.2017.1310967
Dhami, M.K. (2018). Towards an evidence-based approach to communicating uncertainty
in intelligence analysis. Intelligence and National Security, 33(2), 257–272. doi:10.10
80/02684527.2017.1394252
Dhami, M.K., Mandel, D.R., Mellers, B.A., & Tetlock, P.E. (2015). Improving intelligence
analysis with decision science. Perspectives on Psychological Science, 10(6), 753–757.
doi:10.1177/1745691615598511
Fingar, T. (2011). Reducing uncertainty. Stanford, CA: Stanford University Press.
Fischoff, B. (2011). Intelligence analysis: Behavioural and social scientific foundations.
Retrieved from Washington, DC.
Frank, A. (2017). Computational social science and intelligence analysis. Intelligence and
National Security, 32(5), 579–599. doi: 10.1080/02684527.2017.1310968
George, R.Z. (2010). Beyond analytic tradecraft. International Journal of Intelligence and
Counterintelligence, 23(2), 296–306. doi: 10.1080/08850600903566124
110 Analysis
George, R.Z., & Bruce, J.B. (2008). Analyzing intelligence: Origins, obstacles, and
innovations. Washington, DC: Georgetown University Press.
Heuer, R. (1999). Psychology of intelligence analysis. Washington, DC: Center for the
Study of Intelligence.
Heuer Jr., R.J. (2009). The evolution of structured analytic techniques. Presentation to the
National Academy of Science, National Research Council Committee on Behavioural and
Social Science Research to Improve Intelligence Analysis for National Security, 529–545.
Heuer, R., & Pherson, R. (2010). Structured analytical techniques for intelligence analysis.
Washington, DC: CQ Press.
Horne, C., & Bestvater, S. (2016). Assessing the effects of changes in British
counterterrorism policy on radical Islamist networks in the UK, 1999–2008. Behavioral
Sciences of Terrorism and Political Aggression, 8(2), 87–110.
Klausen, J., Barbieri, E.T., Reichlin-Melnick, A., & Zelin, A.Y. (2012). The YouTube
jihadists: A social network analysis of Al-Muhajiroun’s propaganda campaign.
Perspectives on Terrorism, 6(1), 36–53.
Koschade, S. (2006). A social network analysis of Jemaah Islamiyah: The applications to
counterterrorism and intelligence. Studies in Conflict and Terrorism, 29(6), 559–575.
Lahneman, W.J., & Arcos, R. (2017). Experiencing the art of intelligence: Using
simulations/gaming for teaching intelligence and developing analysis and
production skills. Intelligence and National Security, 32(7), 972–985. doi:
10.1080/02684527.2017.1328851
Leuprecht, C., Walther, O., Skillicorn, D.B., & Ryde-Collins, H. (2017). Hezbollah’s
global tentacles: A relational approach to convergence with transnational organized
crime. Terrorism and Political Violence, 29(5), 902–921.
Mandel, D.R., & Barnes, A. (2018). Geopolitical forecasting skill in strategic intelligence.
Journal of Behavioral Decision Making, 31(1), 127–137.
Marrin, S. (2007). Intelligence analysis theory: Explaining and predicting analytic
responsibilities. Intelligence and National Security, 22(6), 821–846. doi:
10.1080/02684520701770634
Marrin, S. (2011). Improving intelligence analysis: Bridging the gap between scholarship
and practice. Abingdon, UK: Routledge.
Marrin, S. (2017). Understanding and improving intelligence analysis by learning
from other disciplines. Intelligence and National Security, 32(5), 539–547. doi:
10.1080/02684527.2017.1310913
Marrin, S. (2020). Analytic objectivity and science: Evaluating the US Intelligence
Community’s approach to applied epistemology. Intelligence and National Security,
35(3), 350–366. doi: 10.1080/02684527.2019.1710806
McIllwain, J.S. (1999) Organized crime: A social network approach. Crime Law & Soc
Chang 32, 301–323.
NAS. (2019). A decadal survey of the social and behavioural science: A research agenda
for advancing intelligence analysis. Retrieved from Washington, DC.
Paulo, D., Fischl, B., Markow, T., Martin, M., & Shakarian, P. (2013). Social network
intelligence analysis to combat street gang violence. Paper presented at the 2013 IEEE/
ACM international conference on advances in social networks analysis and mining
(ASONAM), 25–28 August, Niagara Falls, ON.
Pedrycz, W., & Chen, S.-M. (2014). Information granularity, big data, and computational
intelligence (Vol. 8). Berlin: Springer.
Pherson, K., & Pherson, R. (2017). Critical thinking for strategic intelligence. Washington,
DC: CQ Press.
Analysis 111
Pherson, R.H., & Heuer Jr., R.J. (2020). Structured analytic techniques for intelligence
analysis. Thousand Oaks, CA: CQ Press.
Phythian, M. (2017). Intelligence analysis and social science methods: Exploring the
potential for and possible limits of mutual learning. Intelligence and National Security,
32(5), 600–612. doi: 10.1080/02684527.2017.1310972
Pramanik, M.I., Lau, R.Y.K., Yue, W.T., Ye, Y., & Li, C. (2017). Big data analytics for
security and criminal investigations. Wiley Interdisciplinary Reviews: Data Mining and
Knowledge Discovery, 7(4), e1208. doi: 10.1002/widm.1208
Ressler, S. (2006). Social network analysis as an approach to combat terrorism: Past,
present, and future research. Homeland Security Affairs, 2(2).
Richards, J. (2010). The art and science of intelligence analysis. Oxford: Oxford University
Press.
Sageman, M. (2004). Understanding terror networks. Philadelphia, PA: University of
Pennsylvania Press.
Shelton, A.M. (2014). Teaching analysis: Simulation strategies in the intelligence
studies classroom. Intelligence and National Security, 29(2), 262–281. doi:
10.1080/02684527.2013.834219
Skillicorn, D. (2009). Knowledge discovery for counterterrorism and law enforcement.
Boca Raton, FL: CRC Press.
Sparrow, M. (1991). Network vulnerabilities and strategic intelligence in law enforcement.
International Journal of Intelligence and Counterintelligence, 5(3), 255–274.
Strang, S.J. (2014). Network analysis in criminal intelligence. In A. Masys (Ed.), Networks
and network analysis for defence and security (pp. 1–26). Berlin: Springer.
Svenson, P., Forsgren, R., Kylesten, B., Berggren, P., Fah, W.R., Choo, M.S., & Hann,
J.K.Y. (2010). Swedish-Singapore studies of Bayesian Modelling techniques for
tactical Intelligence analysis. Paper presented at the 2010 13th International conference
on information fusion (FUSION), 26–29 July, Edinburgh, UK.
Tetlock, P. E., & Mellers, B. A. (2011). Structuring accountability systems in
organizations: Key trade-offs and critical unknowns. In Committee on Behavioral
and Social Science Research to Improve Intelligence Analysis for National Security
(Eds.), Intelligence analysis: Behavioral and social scientific foundations (pp.
249–270).
Van der Hulst, R.C. (2009). Introduction to Social Network Analysis (SNA) as an
investigative tool. Trends in Organized Crime, 12(2), 101–121.
Walsh, P.F. (2011). Intelligence and intelligence analysis. Abingdon: UK: Routledge.
Walsh, P.F. (2017). Teaching intelligence in the twenty-first century: Towards an evidence-
based approach for curriculum design. Intelligence and National Security, 32(7), 1005–
1021. doi: 10.1080/02684527.2017.1328852
Waniek, M., Michalak, T.P., Wooldridge, M.J., & Rahwan, T. (2018). Hiding individuals
and communities in a social network. Nature Human Behaviour, 2(2), 139–147. doi:
10.1038/s41562-017-0290-3
Wasserman, S.W., & Faust, K. (1994). Social network analysis: Methods and applications.
Cambridge: Cambridge University Press.
Whitesmith, M. (2020). Experimental research in reducing the risk of cognitive bias in
intelligence analysis. International Journal of Intelligence and CounterIntelligence,
33(2), 380–405. doi:10.1080/08850607.2019.1690329
Withers, G., Buchanan, E., West, L., Clements, D., & Austin, G. (2019). Social science
research and intelligence in Australia. Canberra, ACT: Australian Academy of Social
Sciences.
112 Analysis
Wollocko, A.B., Farry, M.P., & Stark, R.F. (2013). Supporting tactical intelligence
using collaborative environments and social networking. Paper presented at the SPIE
defense, security, and sensing, 28 May, Baltimore, MD.
Zeng, D., Chen, H., Lusch, R., & Li, S.-H. (2010). Social media analytics and intelligence.
IEEE Intelligent Systems, 25(6), 13–16.
6 Information and communication
technologies (ICT)
Introduction
In Chapters 2–5, the discussion focused on the challenges leaders face in direct-
ing and optimising various core intelligence processes (tasking and coordination,
collection, and analysis). You will recall from Chapter 2 that the core intelligence
processes combined are like the machinery on the ‘factory floor.’ Without each
of the component parts there is no process or product which can ultimately pro-
duce the intelligence decision-makers rely on. Chapters 2 to 5 highlighted several
governance challenges and it should be clear by now that these do not have sim-
ple solutions particularly as the ever changing and increasingly complex security
environment conspires further against ‘hard and fast’ remedies. In the next two
chapters, I discuss several additional governance challenges, but these relate to
key enabling activities (ICT and Human Resources). Again, you may recall that
key enabling activities are those activities that provide the structure and support
upon which core intelligence processes take place—whether that is within just
one intelligence agency or across an entire community.
Having effective ICT systems, architecture, and processes has always been
vital to the intelligence mission. Data, information, and knowledge may represent
the lifeblood of the intelligence enterprise, but even the most valuable informa-
tion in the world becomes redundant if it cannot be stored, accessed, shared, and
integrated through reliable and adaptable ICT systems and processes.
Chapter 2 (Intelligence and Leadership) presented a number of themes that
spoke to the kinds of ICT issues intelligence leaders have had to manage histori-
cally. In many respects, the ICT challenges remain persistently similar to the ones
that emerged following the establishment of modern ICs from 1945 onwards. You
will recall in Chapter 2 several themes were discussed, and the critical roles each
played in the evolution of IC institutions from 1945 to the present. The fourth
theme mentioned was ‘knowledge management and information sharing.’ Under
this theme several issues were presented. As technological innovation facili-
tated a greater collection of open and covert information sources (particularly
SIGINT)—the challenge for intelligence leaders quickly turned to finding tech-
nical and institutional solutions for extracting meaning from abundant sources.
The other main difficulty became managing information overload and having
114 ICT
organisational cultural and knowledge systems available to promote information
sharing across ICs.
Similarly, Chapter 4 (Collection) presented a detailed discussion about techno-
logical and methodological approaches to information collection and processing.
In particular, a significant amount of time was spent on how rapid changes in ICT
facilitated the uptake of new collection platforms including using big data and
machine learning, social media, and the exploitation of the dark web. In summary,
discussion of ICT-related issues in Chapters 2 and 4 have provided much of the
historical context for understanding what challenges IC leaders have faced in col-
lecting, managing, and sharing information. This chapter builds on that founda-
tion by focusing exclusively on the role of artificial intelligence (AI) in our ICs. It
explores the likely challenges intelligence leaders will confront with the integra-
tion of AI into other ICT processes.
While the incorporation of AI technologies and processes into ICs are not new,
I argue that understanding the opportunities and downsides for the further integra-
tion of AI remain complex, uncertain in many cases—and will continue to occupy
current and future leaders into the next decade. Given the integration of AI into
existing IC systems, processes, and cultures is likely to be consequential, it is fit-
ting that we focus on it in this chapter, and the role intelligence leaders have in
integrating it into various core intelligence processes. Simply put, as far as being
the major ICT challenge IC leaders will face well into the next decade and longer,
AI is the stand out.
Intelligence and AI
For many, AI is not just another trajectory in global technological change that
all sectors of our societies need to both understand and harness. But is AI that
consequential a change? Klaus Schwab, the former executive chairman of the
World Economic Forum, argued that a series of technical, economic, and scien-
tific changes begun to usher in AI at the turn of this century. But these changes
were not just an ‘add-on’ to the digital revolution that brought rapid and sig-
nificant innovation in computers from the 1960s and the internet in the 1990s.
For Schwab, the rise of AI embodies what he refers to as the Fourth Industrial
Revolution. Why a fourth revolution beyond the first (Industrial Revolution
1760–1840), second (mass-production late nineteenth century to early twentieth),
and third (computer/digital 1960s to 1990s)?
Schwab argues that current and future developments in AI are ushering in a
distinct and fourth revolution because of the velocity, breadth, depth, and trans-
formative systems impact of change being facilitated by AI (Schwab 2017: 3).
He suggests that it is not just the critical role of AI in bringing about this fourth
revolution, but breakthroughs in closely related fields such as robotics IoT,
autonomous vehicles, 3D printing, nano-technology, biotechnology, materials
science, energy storage, and quantum computing are also contributing to ongo-
ing, major disruptions to economies and societies in ways never seen before
(Ibid).
ICT 115
Whether Schwab is correct and the cumulative impact of all AI innovations
from the turn of the century to the present and beyond represents a fourth revolu-
tion globally is not entirely clear. It is likely that the significance of change can
only be fully assessed in the rear vision of history. Regardless, as will be seen
shortly, there is no question AI has and continues to be transformative across most
economic and social sectors nationally and internationally. While the true extent
of any transformative impact of AI globally cannot be known at least in the short
to medium term, expectations are high across many economic and social sectors
that AI will bring a profound change in nation-states and globally. For example,
just in the commercial sector alone, business researchers Davenport and Ronanki
(2019: 1) surveyed 250 executives familiar with their companies’ use of cognitive
technology and it showed three-quarters of them believed that AI will substan-
tially transform their companies within three years.
Suggesting that AI is and will continue to bring substantial change to compa-
nies, industries, and society as a whole seems clear enough, but given the rapid
development in multiple AI technologies it is less clear what we mean by AI. Lu
suggest that AI is ‘any theory, method, and technique that helps machines (espe-
cially computers) analyse, simulate, exploit, and explore human thinking process
and behaviour’ (2019: 1–2). It involves ‘the computation and computing of data
in intelligent ways in order to construct intelligent systems that allow computers
to complete tasks that only humans were able to do in the past’ (Ibid). Lu also
describes AI as involving the application of ‘computer hardware and software to
simulate the underlying theories, approaches and techniques of human behaviour’
(Ibid).
Nilsson in his historical study of AI defines it as ‘that activity devoted to mak-
ing machines intelligent, and intelligence is that quality that enables an entity to
function appropriately and with foresight in its environment’ (2010: preface). His
account details the AI’s contributions to achievements in multiple fields, includ-
ing but not limited to biology, linguistics, psychology and cognitive sciences,
neuroscience, mathematics, philosophy and logic, engineering and computer sci-
ence. Lu’s definition above is not dissimilar to Nilsson’s, particularly on AI being
multidisciplinary and interdisciplinary of natural sciences and social sciences
consisting of many diversified disciplines (Lu 2019: 1–2).
Other definitions of AI emphasise the human and rational dimensions of what
this kind of technology is meant to achieve. Russel and Norvig lay out eight defi-
nitions of AI against two dimensions that typify its objectives. The first (human
dimension) is how machines might think humanly (i.e. problem solving, learning)
or act humanly (i.e. creating machines that perform functions that require intel-
ligence). The second dimension (rationality) refers to whether an AI system’s
performance can be ‘rational.’ This means it does the ‘right thing’ given what it
knows (2016: 1–2).
What AI is and does can also be understood by surveying its historical devel-
opment, which stretches back now for more than 60 years. It is not germane to
our discussion of AI in the intelligence context to provide an exhaustive historical
survey of AI. There are now an increasing number of good sources that do just
116 ICT
that (see for example: Lu 2019; Flasinki 2016: 3–13; Russel and Norvig 2016).
However, a quick historical overview is useful in providing a foundation and con-
text for how AI has developed so that discussion in the next section (AI: National
Security and Military Applications) is more meaningful for the reader.
Lu (2019) describes the evolution as being in three phases. The three develop-
mental steps are the initial phase (1956–1980), the industrialisation phase (1980–
2000), and the explosion phase (2000–) (2019: 7). In the initial phase (1956 to
1980), AI was only used to solve algebraic problems and prove geometric the-
orems. Nonetheless, progress was made during this earlier period. In 1956, at
Dartmouth University in the United States, scientists participated in a conference
to study and explore the use of machine simulation intelligence. The Dartmouth
conference became a watershed moment and is also known as the origin of AI
(Ibid: 7). In the second major development of AI (1980–2000), “knowledge pro-
cessing” became the focus of AI research (Ibid: 8). Several European countries,
Japan, and the United States started to allocate larger sums of money to support
AI. A key goal was to ‘create machines that support human-machine dialogue,
translation and image recognition’ (Ibid).
The third major developmental phase in AI (2000 to the present) was fuelled
on the back of an increasing volume of data since the development of the internet.
Sensors too were collecting a lot of different data, and in the first ten years of the
twenty-first century the AI field built the foundations of machine learning tools
to process the explosion in the volume and variety of data. Lu argues that at this
time algorithms that have gone through generations of trials and errors started to
produce impressive results. In the public arena at least, AI and machine learning
began to grab extensive attention with IBM’s “Deep Blue” defeating Kasparov
in chess games and Google’s AlphaGo defeating world champion Li Sedol. In
essence, this third phase of the AI evolution has encapsulated a growth in deep
learning and deep learning algorithms.
Deep learning can be thought of as a branch of machine learning which has
pushed the boundaries of AI to higher levels. Deep learning techniques simulate
large-scale structures of the cerebral cortex through large-scale data training and
design complex multi-layer artificial neural networks (Lu 2019: 9–11). Artificial
Neural Networks (ANNs) enable robots to learn and think like humans and to han-
dle more complex tasks. In essence, progress in deep learning techniques is now
allowing the development of even more complex machine learning models that
can work on (train) ever increasing volumes of data to improve the accuracy of
classification or prediction possible from such models. After now several decades
of development, deep learning has produced many algorithms and models. Lu
categorises deep learning into two types: supervised and unsupervised learning.
Supervised learning makes full use of AI prior knowledge to build robust data
analysis models. Supervising training and learning models can improve the
universality of model applications and improve the accuracy of data analysis.
Unsupervised learning does not require any prior knowledge. Data analysis
models can automate information mining and automatically build learning
ICT 117
models. Unsupervised learning has been widely used in speech recognition
and text retrieval.
(Lu 2019: 12–14)
The advancements in deep learning and big data now means AI applications are
expanding across several commercial sectors including in monitoring water,
energy, the stock market, logistics, health care, transport, retail, agriculture, and
education. And naturally several deep learning and big data models continue to
be developed across the national security and intelligence sectors. In the next sec-
tion, we focus on a brief survey of how AI technology and knowledge is being
applied across national security intelligence and the military sectors. In addition
to exploring what kinds of AI innovations are being used by the broader national
security intelligence and military enterprise, the section shows how these poten-
tially strengthen intelligence capabilities by creating enhanced opportunities for
more effective collection and analysis of information.
National security
For decades now, but particularly since the digital revolution of the 1990s, ‘Five
Eyes’ ICs have not been able to analyse the burgeoning volumes of information
available to them despite increased capabilities to collect it. The volume, veloc-
ity, and variety of information now available, particularly unstructured sources
(documents, social media, digital pictures, videos), and an increasing volume of
information from sensors (i.e. IoT) means more information is collected than can
be analysed by any IC (Brantly 2018: 566). This point was also made earlier in
Chapter 4 (Collection).
Most of this new data is unstructured sensor or text data and stored across
unintegrated databases. For intelligence agencies, this creates both an opportunity
and a challenge; there is more data to analyse and draw useful conclusions from,
118 ICT
but finding the needle in so much hay is getting tougher. All ‘Five Eyes’ ICs each
day collect more raw intelligence data than their entire workforce could effec-
tively analyse in their combined lifetimes. So analysts must prioritise and triage
which collected information to analyse, and increasingly this has meant relying
on computer searches and databases to more quickly access, manage, and assess
the information. The ability to quickly interrogate databases has clearly been
advantageous for the analysis of SIGINT, but the other trend has been the partial
automation in the analysis of some kinds of GEOINT such as satellite recon-
naissance using machine learning techniques. Machine learning techniques will
likely continue to be useful in processing SIGINT and ELINT, but also allow even
more sophisticated pattern recognition across data sets (Allen and Chan 2017: 27;
Horowitz et al. 2018). Further, as discussed in the next section, it’s increasingly
clear that AI will continue to play a significant role in cyber security and defence
issues (Payne 2018: 7–32).
Additionally, over the last decade several AI and machine learning projects
have been developed to improve predictive analytics and sense-making capa-
bilities of ICs. In the United States, the Intelligence Advanced Research Projects
Activity (IARPA) has sponsored several programs to improve the forecasting
of complex and emerging events. Many programs have used forecasting tourna-
ments involving people from around the world to generate forecasts about ‘thou-
sands of real-world events.’ ‘All of our programs on predictive analytics do use
this tournament style of funding and evaluating research,’ according to Jason
Matheny, IARPA’s former director (Seffers 2015: 19–22). Matheny cites sev-
eral programs that have demonstrated ‘predictive success’ including the Open
Source Indicators program, where he suggested they were able to predict disease
outbreak earlier than traditional reporting (Ibid). This program used a crowd-
sourcing technique in which people across the globe offered their predictions
on several events (e.g. political uprisings, disease outbreaks, and elections). The
data analysis relied on social media trends and web queries indicating potential
behaviour suggestive of a disease outbreak or political uprising. The collection
methods were automated and used machine learning to filter through several bil-
lions of data points looking for a signal that an event may be about to happen
(Ibid).
Other IARPA sponsored AI/machine learning analytical programs have been
developed to improve IC’s capability to detect earlier cyber-attacks. One program
looked not just at suspicious activity on a computer, but data outside of a network
that might indicate an impending cyber-attack. Such external indicators sources
could include patterns of web search queries and black market activity relating to
malware (Ibid). Still other programs such as the Scientific advances to Continuous
Insider Threat Evaluation (SCITE) program examines a broad array of insider
threats, including mass shootings, cyber-attacks, and industrial espionage. The
objective again is to use AI/machine learning methodologies to look for indicators
for insider threat detection that could include kinetic attacks in IC (including mili-
tary facilities) as well as cyber-attacks resulting in the loss of intellectual property
(Seffers 2015: 19–22).
ICT 119
The next section expands on how AI/machine learning applications have been
used to improve cyber capabilities of ICs. For the remaining space here, the dis-
cussion focuses on AI/machine learning and counter-terrorism. The increase in
the scale and reach of global terrorism since 9/11 has shown that ‘Five Eyes’
ICs needed to develop faster ways to collect and analyse vast amounts of data
and information in real time in order to prevent and disrupt as much as possible
attacks in their homelands or abroad. IC’s traditional reliance on SIGINT and
even HUMINT to some extent has made getting a close to real-time picture of ter-
rorist activities, plans, and movements increasingly difficult. Counter-intelligence
awareness by AL-Qaeda and the Islamic State of IC’s interception capabilities and
the growth in sophistication and their use of encrypted communications is making
traditional physical and technical surveillance challenging. Against this backdrop,
advancements in data mining, AI/machine learning have provided ICs new plat-
forms to collect and synthesise information useful in identifying terrorist activity
in real time. As Ganor suggests, ‘everyone has a digital footprint (e.g. cell phones,
email, biometrics, social network, smart phone applications) that can be tracked
and processed’ (2019: 3). In particular, certain kinds of social media such as
Twitter can be studied to better understand terrorist communications, particularly
operational planning—but also individuals that may be in the process of becoming
radicalised (Ibid). For ‘Five Eyes’ ICs, collecting or accessing bulk digital data as
will be discussed later is not without its ongoing concerns about what is appropri-
ate, proportionate, and what might become an excessive invasion in the privacy
of other law-abiding citizens. These privacy issues were flagged previously in
Chapter 4 (Collection). But the increasing advances in the collection and ana-
lytical synthesis of big data/AI/machine learning systems clearly will continue to
have benefits for ICs in identifying more quickly and accurately those suspected of
terrorist activities. It is not just tracing the digital footprint of individuals working
in larger terrorist groups such as the Islamic State that this type of technology will
continue to be useful, but also in harder counter-terrorism cases involving lone
actor attacks, which in some cases can be more spontaneous. AI/machine learning
applications may not have the capability to predict ‘the next lone actor’ attack,
but they can be used to develop a pattern of life on suspects, which can increase
the chances that ICs can detect and disrupt their plans. Another application of
AI/machine learning technology in the counter-terrorism context—autonomous
drones—has been in place now for several decades. The CIA and US Department
of Defense has used them in para-military missions in Afghanistan, Iraq, and West
Africa and more broadly globally for surveillance and targeted killing of high-
value terrorist targets from the Bush administration onwards (Johnson et al. 2017).
Other ‘Five Eyes’ countries such as Australia are now more actively deploying
drones too for counter-terrorism operations overseas (Walsh 2017: 429–433).
the exceptionally paranoid East German government had 102,000 Stasi surveil-
ling a population of 17 million: that’s one spy for every 166 citizens. By com-
parison, using digital surveillance, governments and corporations can surveil
the digital activities of billions of individuals with only a few thousand staff.
(cited in Allen and Chan 2017: 18)
Increased adoption of AI in the cyber domain will further augment the power of
those individuals operating and supervising these surveillance tools and systems,
which brings with it not only efficacy issues, but also ethical ones, particularly
related to reasonable expectations of privacy and free speech in liberal democratic
countries. The challenges and downsides to enhanced AI/machine learning appli-
cations to cyber and other threats are discussed in greater detail below. We also
come back to the broader ethical dilemmas IC leaders will confront in Chapter 8
(The Future IC Leader and Governance Challenges).
But what about other AI/machine learning applications to improve IC cyber
capabilities? For some time now, cyber security/defence has been relying on the
capabilities of AI and big data processing (Leenen and Meyer 2019: 42–63; Seker
2019; Alazab and Tang 2019). Big data provides the huge sets of data AI algo-
rithms require to train data and to learn, i.e. to determine what normal behaviour
is and thus to be able to detect abnormal events. These technologies are used for
intrusion detection, malware classification and attribution, attack prediction, and
other applications. There are several military applications of AI, but that discus-
sion will occur under the next section. One area, however, that is critical to the
ongoing effective functioning of all ICs is the protection of information security.
AI/machine learning innovations have improved security protection capabilities
for ICs by searching in real time through large volumes of data for cyber-attacks,
system vulnerabilities and failures, IoT security, and other network anomalies
(Lu 2019: 20). Along with advances in information security, however, adversar-
ies will also be able to use similar AI machine learning technology for offensive
cyber-attacks by deploying email phishing and botnet attacks (Johnson 2019:
151).
Military applications of AI
In a broader sense, several militaries are now employing at an increasing rate
aspects of AI into their capabilities and broader doctrines. In particular, three
ICT 121
countries—the United States, China, and Russia—are reported to be developing
serious military AI technologies, which likely in the future will provide signifi-
cant military advantage to these nation’s militaries. Strategic military plans and
increased investment for the development of and investment in AI/machine learn-
ing of course is not just about advantage, but larger powers seeking to grow mili-
tary superiority over other similar powers. Vladimir Putin has publicly announced
Russia’s intent to pursue AI technologies, stating, ‘whoever becomes the leader
in this field will rule the world’ (cited in Hoadley and Lucas 2018: 1). Russia has
targeted reportedly 30 per cent of its entire military force structure to be robotic
by 2025 (Johnson 2019: 148).
Further, in July 2017, China’s State Council issued the new generation Artificial
Intelligence Development Plan (AIDP), which is meant to enhance national (eco-
nomic) competitiveness and protect national security (Allen 2019: 5). The AIDP
also clearly articulates a role for AI technology becoming even more embedded in
the field of national defence innovation (Ibid). In February 2019, the United States
Department of Defense also launched a defence strategy, which included amongst
other things an increased focus on speed and agility, improving situational aware-
ness, and creating a leading AI workforce (DOD 2018: 7). This strategy has
built on earlier work done in the Pentagon such as the 2016 release of a National
Artificial Intelligence Research and Development Plan (Johnson 2019: 149).
Such military AI strategies attempt to provide a more coordinated approach to
research and development and application of AI/machine learning than hitherto
has been the case in the last two decades in the United States and other ‘Five
Eyes’ countries. In the last two decades, AI/machine learning has been applied
to a range of military objectives at the strategic level (e.g. managing cognitive
heuristics and group think) and operational tactical levels (e.g. reducing command
decision-making time, improving situational awareness, and autonomous weapon
systems).
Several sources provide detailed summaries and analysis of various applica-
tions (Wasilow and Thorpe 2019; Johnson 2019: 147–169; Lele 2019: 29–42;
Payne 2018: 7–32). In this section, however, I will summarise thematically some
of the ways AI/machine learning have been applied in military contexts as both
force enablers and multipliers (Johnson 2019: 148) rather than providing detailed
analysis of specific technology. Readers looking for more in-depth analysis of AI/
machine learning technology can explore the references listed in the preceding
paragraph. The first thematic area (surveillance) is not dissimilar to some of the
AI developments discussed above (see national security and cyber sections). AI/
machine learning applications have automated some of the surveillance functions
soldiers and military intelligence personnel may traditionally have carried out.
For instance, neural networks can scrutinise surveillance video and alert soldiers
to specific frames that contain objects of interest such as vehicles, weapons, or
persons (Wasilow and Thorpe 2019: 37). Additionally, as noted in the context of
counter-terrorism, facial recognition software is also useful in alerting military
forces when a person of interest emerges in video surveillance. Just as in the
national security and cyber contexts, the application of AI/machine learning also
122 ICT
holds the promise potentially of fusing more effectively large amounts of dispa-
rate structured, unstructured as well as data from sensors in the battlefield. The
key advantages are less manual processing and the possibility of more informed
and quicker decisions in the battle space.
A third discernible AI/machine learning theme in the defence context is the
development of AI enhanced autonomous weapons and robotic systems that ‘can
be given dull, dirty, and dangerous jobs, reducing physical risk to soldiers and
enabling them to concentrate their efforts elsewhere’ (Wasilow and Thorpe 2019:
37; Payne 2018: 7–32). For example, it is likely soon that leaving aside the ethi-
cal and legal issues, several larger states may deploy fully autonomous armed
aerial and marine vehicles. Israel is already operating a variant of this kind of
AI enabled technology, the Loitering Attack Munitions (LAM), which can loiter
over targets (enemy radar or ships) and is pre-programmed with targeting criteria
(Johnson 2019: 151).
Developments in swarm technology will also be able to deploy weaponised
drone swarms in the battle space—making it difficult even for larger militaries to
counter them. It is increasingly possible that development in lethal autonomous
weapons systems (operated by robots instead of humans) may result in the obso-
lescence in some military platforms over the next five to ten years. As Wasilow
and Thorpe note:
Given the growth in the robotics market, prices for autonomous vehicles with
military applications such as drones are expected to decrease further this decade.
Leaving aside the investments larger countries such as the United States, China,
and Russia can spend on this technology, advances in the precision of drones with
larger payload present military advantages to smaller states with weaker mili-
taries as well. Such AI/machine learning-enabled technology is likely to present
force posture and protection challenges for all militaries as they seek to train and
re-train personnel and develop counter-measures to lethal autonomous weapons.
IC leadership challenges
It should be clear from the summary above there are plenty of advantages in
the application and integration of AI/machine learning across ‘Five Eyes’ ICs.
Nonetheless, with advantages comes challenges that both the current and future
IC leadership cadre will need to address. Left unaddressed they will result in the
reduction of the capability dividend many AI/machine learning applications can
offer ICs. A failure by IC leaders to engage with the many AI/machine learn-
ing challenges will also increase the friction of non-technical factors associated
ICT 123
with AI in ICs, and potentially degrade the legitimacy of the work intelligence
agencies do in liberal democratic states. In this last section, I summarise key
challenges for leaders using three broad sub-headings: technology, counter-
intelligence, and social and ethical challenges. Limited space does not allow a
‘deep dive’ into all the issues associated with each sub-heading. The key objec-
tive instead is to contextualise and summarise the key leadership challenges
going forward, particularly those that create intelligence governance issues
into the foreseeable future. Chapter 8 (The Future IC Leader and Governance
Challenges) will pick up on what leaders will need to do to address the govern-
ance issues raised here.
Technology challenges
As noted, AI advancements in the form of deep learning and machine learning
have shown significant breakthroughs for supervised learning applications includ-
ing, for example, in computer vision, speech recognition, chatbots, and auton-
omous driving (Zhao and Flenner 2019: 35). While many supervised learning
applications are improving, there remain technological constraints on using them
when precision, rigor, and deeper clarity is required in many security applications
ICs are confronted with. As Payne (2018: 10) suggests, at least in the military
context:
there is considerable wariness that the hype and publicity surrounding deep
learning will not pan out as dramatic breakthroughs in cognition that might
approach human-level capacity—for example in satisficing between conflict-
ing goals, or in using imagination and memory flexibly to cope with novel
scenarios. The AI of today is rather narrow and brittle—adept in its area
of expertise, but not at shifting to new tasks. Nevertheless, the rapid pro-
gress in AI research, especially of hybrid approaches that utilise multiple
AI techniques, along with increasingly powerful hardware on which to run
algorithms, suggests the potential for AI to significantly affect existing mili-
tary activities in the short to medium term, even if it falls short of simulating
human-level cognition any time soon.
It may be that in more high-volume crimes such as break and enters or credit card
fraud, there is growing confidence in the ability of algorithms by end users that
their performance can demonstrate irregularities in large volumes of crime which
are indicative a crime is committed or about to be committed. However, in other
complex security threats (e.g. organised crime and terrorism) which require more
sophisticated use of deep learning algorithms, IC end users cannot yet trust in all
circumstances their performance or ability for them to classify relevant exam-
ples. For example, to ‘find a terrorist pattern’ or ‘predict’ the likelihood of such
an offence requires the algorithmic classification of a range of data, but in many
cases there is insufficient data for data scientists to build high confidence level
deep learning networks for such an offence.
124 ICT
As noted earlier, in the United States, IARPA has funded several AI/machine
learning analytical programs to improve IC’s capability to detect earlier more
complex threat and events such as cyber-attacks and political instability. While
progress is being made in improving the confidence levels of deep learning net-
works, there is still a lot more understanding required about how deep learning
algorithms perform and how to get them to perform better. As Zhao and Flenner
note:
it is easy to find examples that are easily classified by humans but misclassi-
fied by deep learning algorithms. Furthermore, it has been demonstrated that
a small but visually imperceptible change to a correctly classified image will
result in the misclassification of the image. Therefore, there exists a funda-
mental instability in the learned functions.
(2019: 36)
In summary, Zhao and Flenner highlight four of the main challenges in applying
the AI revolution to security applications: ‘the lack of adequate samples for clas-
sification tasks, short timescales for learning, fewer computational resources, and
adversarial behaviour’ (Ibid). At a high level, national and international security
needs AI in a wide range of forms but the results and the limitations of deep
learning continue to raise many questions with respect to applications in security
contexts (Ibid). Other key questions that IC leaders and military commanders will
need to address from future developments in machine learning techniques relate
to critical operational areas where lives may be at stake. For example, how well
are autonomous systems going to be at not only processing data but perceiving,
learning, deciding, and acting on their own? Will future AI/machine learning tech-
nology deployed in the IC and broader security context also be unable to ‘explain
their decisions and actions’ to human users? Both questions are important because
they go to the ‘intelligent reliability,’ safety, and explainability power of autono-
mous capabilities in critical life and death situations. DARPA defines explainable
AI as ‘AI systems that can explain their rationale to a human user, character-
ize their strengths and weaknesses, and convey an understanding of how they
will behave in the future’ (Gunning and Aha 2019: 44–58). DARPA launched
its explainable artificial intelligence (XAI) program in May 2017 to address such
issues.
Another challenge with AI/machine learning technology in general, but par-
ticularly applied to IC and security issues, is how to integrate a variety of big data
sets with other existing intelligence information systems. A related problem to
the integration of AI/machine learning is how to improve semantic technology so
that there exists common vocabularies for information and shared understanding
of domains in how information is described before it is automated for process-
ing and decision-making. Current improvements in some semantic technologies
will likely improve the management and integration of different data sets by
extracting commonly understood meaning and insights—thereby reducing large
numbers of false positives in areas such as cyber security and terrorism. But IC
ICT 125
leaders will need to keep abreast of these developments to ensure a coordinated
approach to technical solutions across their agencies and their broader intelli-
gence communities.
Counter-intelligence challenges
In addition to IC leaders being able to navigate the inevitable technological chal-
lenges arising from applying AI/machine learning systems in their agencies, they
will also need to address several counter-intelligence issues that will likely rise
with the use of such technology and by others—particularly adversaries. The
development of AI has relied on access to cloud computing, the internet, and big
data, but as Lu suggests on the other hand, internet-based hackers and viruses can
pose a huge threat to AI (2019: 22–23). Many applications of AI in the military,
national security, and intelligence context are also dual-use technology—mak-
ing them open to malignant exploitation by state and non-state actors of concern
for ‘Five Eyes’ countries. Machine learning advancements to protect from cyber-
attacks could make intelligence and national security information systems vulner-
able to newer kinds of attacks— given bad actors could have access to similar
knowledge and skills than ICs. The automation of systems, particularly in cyber
to detect threats, could be targeted for disruption or distributing fake information.
Allen and Chan list several examples of how developing AI/machine learning
applications could pose counter-intelligence issues for IC leaders, who will be
responsible for preventing, disrupting, and reducing them. For example, the train-
ing data used in machine learning systems for facial data, voice, videos, audios,
and documents could be manipulated, enhanced, or forged (2017: 25).
We have also seen in recent years an increasing volume in and sophistica-
tion of state actors such as Russia prepared to manipulate social media sources
with fake information in order to influence the 2016 US presidential election. It
is likely that Russia and other state actors (China, North Korea) will continue to
exploit new AI/machine learning developments in ‘Five Eyes’ countries, includ-
ing as Allen and Cohen suggest:
In summary, as the growth in AI/machine learning generated data and other infor-
mation available to ICs grows, so too does its vulnerability to non-state and adver-
sarial state actor exploitation. This complicates an already difficult environment
ICs face about how to assess the provenance of intelligence collected and the
impacts it has on analytical assessments. IC leaders along with their military coun-
terparts will need to design counter-intelligence strategies that can more effec-
tively detect, disrupt, and manage malevolent exploitation of AI/machine learning
126 ICT
automated collection and analytical systems. However, as seen in other dual use
technology areas that could be weaponised, such as biotechnology (Walsh 2018),
there remain critical uncertainties around how ‘Five Eyes’ adversaries will exploit
dual use AI technology in ways that weaken capabilities or present new threats
to their ICs.
Conclusion
Chapter 6 focused on both the advantages and challenges AI/machine learning
applications will pose for IC leaders. Integrating, managing, and coordinating
new AI capabilities will not of course be the only ICT challenge for leaders in
the foreseeable future, but I argue it will remain the primary challenge as it will
impact profoundly on existing and traditional ways ICs have managed, collected,
and assessed information. At this stage, it’s impossible to assess what the full
impact of AI will be on IC’s core intelligence processes, or indeed other key ena-
bling activities (e.g. human resources, research, and legislation). It’s wise I think,
to avoid much of the hyperbole that AI will be so revolutionary that it will do
away with the humans in ‘Five Eyes’ ICs. Regardless of whether ongoing AI
technological development is revolutionary or evolutionary, the key point is that
IC leaders will need to become even more adept in their understanding of AI/
machine learning technological development and be able to along with their ICT
staff identify what investments to make. However, the even bigger challenge for
most IC leaders will not be understanding necessarily or selecting the required AI
technology, but how to integrate this strategically operationally and tactically into
their organisations so AI research and technology has the intended and meaningful
difference on the ground. Achieving integration of AI operational capability will
require both doctrinal and organisational change. This will be the biggest leader-
ship challenge and history demonstrates that when it comes to ICT transformation
in ICs, these don’t always reach the intended potential due to various reasons but
including leadership coordination and change management failures, resourcing
issues, and institutional cultural factors. ICT transformation tends to be built on
existing legacy systems rather than a complete rethink of systems and processes.
The cultural barriers to ICT innovation and change in ICs is another key intelli-
gence governance issue that we come back to in Chapter 8 (The Future IC Leader
and Governance Challenges). In Chapter 7 (Human Resources), we explore the
second key enabling activity and the governance challenges associated with it.
References
Akerkar, R. (2019). Introduction to artificial intelligence. In R. Akerkar (Ed.), Artificial
Intelligence for Business (pp. 1–18). Cham: Springer International Publishing.
Alazab, M., & Tang, M. (2019). Deep learning applications for cyber security. Berlin:
Springer.
Allen, G., & Chan, T. (2017). Artificial intelligence and national security. Cambridge,
MA: Belfer Center for Science and International Affairs.
130 ICT
Allen, G.C. (2019). Understanding China's AI strategy: Clues to Chinese strategic
thinking on artificial intelligence and national security. Washington, DC: Center for a
New American Security.
Babuta, A., Oswald, M., & Janeva, A. (2020). AI and UK national security policy
considerations. London: Royal United Services Institute for Defence and Security
Studies.
Brantly, A. F. (2018). When everything becomes intelligence: Machine learning and the
connected world. Intelligence and National Security, 33(4), 562–573. doi:10.1080/026
84527.2018.1452555
Davenport, T., & Ronanki, R. (2019). Artificial intelligence for the real world. In HBR’s
10 Must Reads (Ed.), On AI, Analytics, and the new machine age (pp. 1–19). Boston,
MA: Harvard Business Review.
DOD. (2018). Summary of the 2018 Department of Defense AI strategy. Harnessing AI to
advance our security and prosperity. Washington, DC: DOD.
Feldstein, S. (2019). Artificial intelligence and digital repression: Global challenges to
governance. Available at SSRN: https://ssrn.com/abstract=3374575.
Flasiński, M. (2016). History of artificial intelligence. In M. Flasinski (Ed.), Introduction
to artificial intelligence (pp. 3–13). Cham: Springer International Publishing.
Ganor, B. (2019). Artificial or human: A new era of counterterrorism intelligence? Studies
in Conflict and Terrorism, 1–20. doi: 10.1080/1057610X.2019.1568815
Gunning, D., & Aha, D.W. (2019). DARPA’s explainable artificial intelligence program.
AI Magazine, 40(2), 44–58.
Hare, N., & Coghill, P. (2016). The future of the intelligence analysis task. Intelligence and
National Security, 31(6), 858–870. doi: 10.1080/02684527.2015.1115238
Hasse, C. (2019). Posthuman learning: AI from novice to expert? AI and SOCIETY, 34(2),
355–364. doi: 10.1007/s00146-018-0854-4
Hoadley, D.S., & Lucas, N.J. (2018). Artificial intelligence and national security.
Washington, DC: Congressional Research Service.
Horowitz, M. C., Scharre, P., Allen, G. C., Frederick, K., Cho, A., & Saravalle, E. (2018).
Artificial intelligence and international security. Washington, DC: Center for a New
American Security (CNAS).
Iphofen, R., & Kritikos, M. (2019). Regulating artificial intelligence and robotics: Ethics
by design in a digital society. Contemporary Social Science, 1–15.
Johnson, J. (2019). Artificial intelligence & future warfare: Implications for
international security. Defense and Security Analysis, 35(2), 147–169. doi:
10.1080/14751798.2019.1600800
Johnson, L.K., Dorn, A.W., Webb, S., Kreps, S., Krieger, W., Schwarz, E., & Wirtz,
J.J. (2017). An INS Special Forum: Intelligence and drones/Eyes in the sky for
peacekeeping: The emergence of UAVs in UN operations/the democratic deficit on
drones/The German Approach to Drone Warfare/Pursuing peace: The strategic limits
of drone warfare/Seeing but unseen: Intelligence drones in Israel/Drone paramilitary
operations against suspected global terrorists: US and Australian perspectives/the
‘Terminator Conundrum’ and the future of drone warfare. Intelligence and National
Security, 32(4), 411–440. doi: 10.1080/02684527.2017.1303127
Leenen, L., & Meyer, T. (2019). Artificial intelligence and big data analytics in support
of cyber defense. In Developments in information security and cybernetic wars (pp.
42–63). Hershey, PA: IGI Global.
Lele, A. (Ed.) (2019). Defence and disruptive technologies. In Disruptive technologies for
the militaries and security (pp. 29–42). Singapore: Springer Singapore.
ICT 131
Lu, Y. (2019). Artificial intelligence: A survey on evolution, models, applications
and future trends. Journal of Management Analytics, 6(1), 1–29. doi:
10.1080/23270012.2019.1570365
Nilsson, N. (2010). The quest for artificial intelligence: A history of ideas and achievements.
Cambridge: Cambridge University Press.
Payne, K. (2018). Artificial intelligence: A revolution in strategic affairs? Survival, 60(5),
7–32. doi: 10.1080/00396338.2018.1518374
Russell, S.J., & Norvig, P. (2016). Artificial intelligence: A modern approach. Malaysia:
Pearson Education Limited.
Schwab, K. (2017). The fourth industrial revolution. New York: Crown Business.
Seffers, G. (2015). Decoding the future for national security. SIGNAL. https://www.afcea
.org/content/Article-decoding-future-national-security
Şeker, E. (2019). Use of artificial intelligence. Techniques/Applications in Cyber Defense.
arXiv preprint arXiv:1905.12556.
Tuffley, D. (2019). Human intelligence+ artificial intelligence= human potential. Griffith
Journal of Law & Human Dignity, 6(3), 170–189.
Walsh, P.F. (2017). Drone paramilitary operations against suspected global terrorists: US
and Australian perspectives. Intelligence and National Security, 32(4), 429–433.
Walsh, P.F. (2018). Intelligence, biosecurity and bioterrorism. London: Palgrave
Macmillan
Walsh, P.F., & Miller, S. (2016). Rethinking ‘five eyes’ security intelligence collection
policies and practice post snowden. Intelligence and National Security, 31(3), 345–368.
doi: 10.1080/02684527.2014.998436
Wasilow, S., & Thorpe, J.B. (2019). Artificial intelligence, robotics, ethics, and the
military: A Canadian perspective. AI Magazine, 40(1), 37–48. Retrieved from https://se
arch-proquest-com.ezproxy.csu.edu.au/docview/2213786823?accountid=10344
Whittlestone, J., Nyrup, R., Alexandrova, A., Dihal, K., & Cave, S. (2019). Ethical and
societal implications of algorithms, data, and artificial intelligence: A roadmap for
research. London: Nuffield Foundation.
Yu, H., Shen, Z., Miao, C., Leung, C., Lesser, V.R., & Yang, Q. (2018). Building ethics
into artificial intelligence. Ithaca, NY: Cornell University.
Zhao, Y., & Flenner, A. (2019). Deep models, machine learning, and artificial intelligence
applications in national and international security. AI Magazine, 40(1), 35–36.
7 Human resources
Introduction
This chapter explores another key enabling activity (human resources), which
like information communications technology (ICT) (Chapter 6) is also critical
to supporting core intelligence processes (tasking and coordination, collection,
analysis, production, and evaluation). Any public or private sector organisation
will eventually fail if leaders cannot attract, develop, and keep human talent that
can progress its mission. ICs and the agencies that make them up are no different.
Chapter 6 (ICT) focused on the technological impact AI/machine learning will
likely have for ICs in the future. The chapter also discussed the impact of technol-
ogy on the workforce and underscored how both technological changes in ICs and
the workforce are linked. The introduction of any significant technological change
will always impact the workforce—sometimes positively and on other occasions
negatively. In this chapter, we explore the critical role IC leaders will need to play
in addressing evolving workforce planning issues against the backdrop of an ever
increasingly complex technological and security environment.
At this point you may be asking, but haven’t IC leaders always had to turn
their minds to workforce planning as their operating environment changed? Yes,
but I argue now and even more in the future the pace, variety, volatility, and
complexity of the security environment will require IC leaders to demonstrate an
even greater ability to respond and adapt quickly to workforce planning require-
ments. IC leaders will need to implement both strategic and operational work-
force planning responses that are flexible to the velocity and complexity now
seen in the security environment. Naturally, workforce planning strategies, plans,
and the necessary resourcing are required for all aspects of IC operations. This
includes but is not limited to those that support analysts, intelligence operations,
technical services, science and technology, and administration areas. Given space
limitations, however, and also because of the centrality of the analyst’s role to
the IC mission, this chapter focuses on workforce planning issues as they relate
to the recruitment, training, and retention/attrition of analysts. It’s clear also that
workforce planning issues are both influenced and impacted by other broader IC
leadership governance challenges discussed in earlier chapters as well as organi-
sational cultural factors. The chapter highlights some of the governance issues
Human resources 133
as they relate to human resource planning. However, Chapter 8 (The Future IC
Leader and Governance Challenges) discusses in greater detail the significance of
these governance issues and how IC leaders may begin to address them. In par-
ticular, it explores three inter-related workforce areas (recruitment, training and
education, and retention and attrition) and provides a thematic discussion of the
key governance challenges in each workforce area.
Recruitment
The first workforce planning issue—recruitment—is arguably the most critical to
get right. Training and retention strategies that keep good talent is important, but
if you do not have a clear picture of the role you expect people to do now or in the
134 Human resources
future then recruited staff will not be fit for purpose. At best this might be a waste
of resources for that recruitment round—at worst poor selection processes have a
cumulative effect that degrades IC agencies’ ability to adapt to the fast-changing
security environment. If we glance across all ‘Five Eyes’ countries, a lot of syner-
gies in practice and collaboration have been forged over several decades between
agencies across all five nations. But it is also true that the size, missions, and polit-
ical institutional structures upon which each ‘Five Eyes’ IC operate shows a great
deal of diversity. For example, just going by one metric—‘size’—at both ends of
the extremes there is the US IC with 17 and at the other the NZ IC with three agen-
cies. While it is difficult to get an accurate number on the total headcount of the
US IC, ODNI reporting on the number of secret and top secret security clearances
being actively used in the United States in the FY 2017 was 2.8 million (ODNI
2017a: 3). This was for the entire US federal government including intelligence
staff and contractors—though a large portion of them would be working for civil-
ian or military intelligence agencies. In comparison, the NZ IC with its three core
intelligence agencies has perhaps no more than 1,000 personnel—the later not
including NZ Police or the NZ Defence Force (Whibley 2014). Somewhere in the
middle is the ICs of Australia, Canada, and the United Kingdom. Given key dif-
ferences in size, number of personnel, missions, and funding of agencies within
and between ‘Five Eyes’ countries, there can be no ‘one size fits all’ approach
to recruitment. But are there broader normative attributes across ‘Five Eyes’ ICs
about the role analysts play, which can inform workforce planning issues such as
recruitment?
In a 2019 US National Academies of Science, Engineering and Medicine
report (commissioned by the ODNI), the authors provide an overview of a num-
ber of broad factors defining the role of analysts (NAS: 65–79). The authors argue
that the role of the analyst hasn’t changed significantly in the last two decades. I
am not sure I would agree with this observation entirely. It may have been true
to some extent, but as discussed in Chapter 6, over the last two decades, I argue
that AI/machine learning and data mining technology has impacted on the way
analysts have traditionally done their jobs in ways not completely understood.
Nonetheless, the NAS report authors provide a good list of the skills and activities
most ICs would expect from their analysts. Unsurprisingly, these include things
like the ability to ‘recognise patterns in behaviours, trends and relationships
among actors’ (Ibid: 67), critical thinking, sense-making, communication skills,
and the ability to coordinate and collaborate with peers and decision-makers (Ibid:
65–79).
Demonstrated research skills are of course also critical when recruiting per-
sonnel to analyst’s positions. But like the general skills and activities analysts
are expected to learn that are mentioned by the NAS report and others (Johnson
2017: 881; Walsh 2017b: 1005–1021; Caddell and Caddell 2017: 889–904; Dylan
et al. 2017: 944–960; Kreuzer 2016: 579–597; Shelton 2014: 262–281; Dahl
2017; Lowenthal 2017: 986–994), IC leaders will need even clearer articulation
of what we want an analyst to do in the future as the security environment rap-
idly changes. For example, no one would argue that IC recruitment strategies for
Human resources 135
analysts would no longer be looking for essential skills, knowledge, and behav-
iours such as ‘critical thinkers.’ But there needs to be a lot more granularity and
clarification amongst IC leaders and their recruiters on what is meant by such
terminology both organisationally and externally as job descriptors get rolled out
the door in position wanted advertisements (Clarke 2010).
Being able to pass a psychometric test might be one indicator of critical think-
ing, but on its own may not be sufficiently diagnostic to determine recruitment
decisions in the future. Does the IC, for example, want critical thinkers who can
flexibly move from one (analyst) account to another quickly? And/or do ICs need
other types of critical thinkers—the so called ‘slow thinking’ variety that decision-
making psychologists Kahneman (2011) and Tversky have raised that might be
better at assessing complex strategic analytical problems? Similarly, IC recruiters
and leaders need to develop greater clarity by what they mean behind statements
such as ‘must have advanced research skills.’ What research skills are required
for an analysts role are contextual. For example, if recruitment is for a tactical
analyst working in a national law enforcement agency that has an intelligence
function such as the FBI or Australian Federal Police (AFP), the research skill set
required may look very different from one where the role is for a strategic analyst
in a national security intelligence agency that has an assessment function like
Australia’s Office of National Intelligence (ONI) or the US State Department’s
Bureau of Intelligence and Research (INR). Leaving such contextual issues to one
side and on the question of research skills and activities, more broadly IC leaders
and recruiters will also need to reflect deeply on the complexity of the security
environment and whether the research skills current analysts have will continue
to be fit for purpose (Walsh 2017b: 548–562). While some research skills such
as collation activities that were once core duties of analysts might become auto-
mated—others may become more important, such as recruits having stronger
backgrounds in qualitative social research and quantitative analysis (Ibid).
In addition to assessing the kinds of attributes, skills, and knowledge ICs might
need from analysts in the future, there are other important recruitment criteria
that require further consideration by leaders and HR officials. Recruitment is not
just about what the ‘day job’ is. It is also about where ICs find the analytic staff
needed. Given the increasing complex range of current and emerging threats in the
security environment, ICs must develop the ability to adapt to it by hiring analysts
whose skills are applicable—but also have personal and cultural backgrounds that
assist in understanding a diverse spectrum of threats. Some ICs have struggled
historically to recruit a sufficiently broad spectrum of personnel not just for ana-
lyst’s roles—but others such as undercover roles and linguists. George (2011: 79)
and Lieberthal (2009) have both argued that the US context, particularly in the
CIA recruiting and vetting processes, have ‘ruled out hiring many ethnic-Ameri-
cans—who have exactly the kinds of cultural experiences that would make them
better analysts of foreign cultures and decision-making styles’ (George 2011: 79).
George’s quote raises two inter-related recruiting issues. IC leaders may have
in some instances legitimate concerns about proceeding with security vetting of
individuals from certain ethnic backgrounds. However, an overly prescriptive or
136 Human resources
cautious approach increases the possibility of not employing suitable candidates
whose rich ethnic and cultural backgrounds would only enhance the validity and
reliability of analytical outputs in a range of areas. All ‘Five Eyes’ ICs need to
continually assess how they risk manage relevant security vetting procedures to
ensure candidates, who have much needed ethnic and cultural backgrounds, are
not overly disadvantaged on applying and gaining positions. In 2014, the US DNI
under Jim Clapper launched a US IC Human Capital Vision 2020—a strategic
plan to restructure workforce planning and policies across the IC (ODNI 2014)1.
It was built around three central themes: shaping an effective workforce, embrac-
ing continuous learning, and embedding agility, innovation and inclusion (Ibid:
3). The 2014 strategic plan looked like the first significant attempt by the US IC
to draft and address a comprehensive set of standards for a range of workforce
planning issues, including in areas of ensuring compliance with EEO require-
ments and building cultural competencies in agencies (Ibid: 7–8). For example,
the plan referred to a workforce strategy that ‘would give careful consideration of
each individual’s unique situation using the ‘whole of person’ concept’ (Ibid: 5).
Assuming the latter quote referred to the recruitment of individuals from ethni-
cally and culturally diverse backgrounds, such rhetoric is important to see from
IC leaders. But with all strategic plans, of course the real test is how strategic
objectives are actioned in the workforce planning activities of individual ICs
over time. Roughly at the same time that the 2014 US IC Human Capital Vision
2020 was released, the ODNI implemented in 2016 the IC Equal Employment
Opportunity Enterprise Strategy (2015–2020). The Strategy provided in contrast
to the broader 2014 (Human Capital Vision) plan more specifics on how ICs
could operationalise plans to increase the employment of minorities and diversity
groups—including but not limited to African-Americans, Hispanics, women, per-
sons with targeted disabilities, lesbians, gays, bisexuals, and transgenders (ODNI
2016). Again there is less detail in the 2016 ODNI publication on how strategic
measures are being implemented when it comes to recruiting minority groups. A
further 2017 ODNI report (Annual Demographic Report—Hiring and Retention
of Minorities, Women and Persons of Disabilities in the US IC) suggests improve-
ments are being made. The report cites for FY 2017 there was a 2 per cent increase
up from FY 2016 in the recruitment of minority groups by the IC, though the
overall percentage of minorities working in the US IC is 22.5 per cent compared
to 35.4 per cent for other federal agencies and the broader population of 38.7 per
cent (2017b: 1–3). So clearly there is more progress to be made and at the time
of writing it remains unclear how all 17 US IC agencies are performing against
ONDI strategies and their own workforce planning objectives.
In the United States, ODNI has also established other programs aimed at
broadening the ethnic and cultural diversity of recruits coming into the IC. One
example is the IC Centers for Academic Excellence program (IC CAE) that com-
menced in 2005. IC CAE’s objective was to create an increased pool of culturally
and ethnically diverse job applicants for intelligence community agencies. It also
sought through grants to help universities establish intelligence training programs
aligned to the mission skill sets and competencies of the IC. It was originally
Human resources 137
operated by the DNI, moved to the DIA in 2011, and recently the DNI has taken
back its management. Recent research, which received survey returns from 19 out
of 40 college grant recipients of the IC CAE program, suggests the IC CAE pro-
gram has had impact. Of all college program managers surveyed, 36 per cent said
their graduates were able to get intelligence jobs (federal and state) and 58 per
cent of their program managers believed that they were supporting the ODNI’s
mission of diversifying the workforce (Landon-Murray and Coulthart 2020: 270–
275). However, the US Congress independent auditing agency—the Government
Accountability Office (GAO)—also reviewed this program in 2019 and deter-
mined it was still unclear to what extent all US ICs engaged in its objectives and
whether it really has created the increased pool of culturally and ethnically diverse
job applicants its architects hoped for (GAO 2019). Deficiencies in ethnic inclu-
sion and diversity recruitment issues are also seen across other ‘Five Eyes’ ICs
though public discussion of them has lagged somewhat compared to those that
have taken place in the US IC. Space does not allow a comprehensive coverage of
these issues as they are playing out in the other four countries (e.g. UK, Canada,
Australia, and New Zealand). But in brief, the UK’s intelligence oversight com-
mittee—the Intelligence and Security Committee (ISC)—released a detailed
report on diversity and inclusion issues in that country’s IC (Grieve 2018). It
stated that though ‘significant progress has been made in recent years with IC
agencies adopting more innovative recruitment campaigns that seek to attract a
more diverse range of applicants from under-represented groups and other meas-
ures, much more needs to be done’ (Ibid: 1, 5). Just looking at one group, the
report stated that 35 per cent of MI5’s senior positions were women, but for other
IC agencies it dropped down to only 25 per cent (Ibid: 1). The UK Government
responded later in the same year with how the IC was going to enact further
improvements in addressing these issues (UK Government 2018). In Australia’s
IC, it’s clear that individual agencies have been focusing on improving ethnic,
cultural, and inclusion recruitment barriers—but a community-wide approach is
needed. With the creation in 2018 of the Office of National Intelligence (ONI),
which has a legislative mandate to provide enterprise management oversight for
all agencies in the IC—hopefully such a community-wide strategy to all recruit-
ment and broader workforce planning issues can be implemented.
In addition to IC leaders working on recruitment strategies that increase both
the ethnic and cultural diversity across ‘Five Eyes,’ ICs also need to give further
consideration to inter-generational factors (Constanza et al. 2012). As at the time
of writing, the last cohort of the baby boomers (born 1964) will likely retire by
2030. Their earlier-born generational compatriots would have mostly worked in ICs
where the Cold War dominated analyst’s attention and upon retiring will take with
them valuable corporate memory. I recall my own experience working as an analyst
just prior to 9/11 in the late 1990s ‘peace dividend period.’ During this time, older
Afghanistan and Soviet analysts seemed to have disappeared overnight along with
their much-needed experience that was required only a few years later. In contrast,
Generation X (1965–1976), depending when they were born, have now accrued
between 20 to 30 years professional experience working as analysts—or have
138 Human resources
moved onto other senior analytical or non-analyst roles. Those Generation X cadre
born earlier would have gained extensive analytical experience just prior to 9/11.
Many Generation X analysts have probably lived and breathed post-9/11 counter-
terrorism for most of their careers. Again, many are close to retirement, while others
in their forties are now in middle-ranking manager positions as analysts or moved
onto non-analyst jobs. Like their predecessors, Generation X on retirement will take
a lot of corporate knowledge with them. Their seniority and experience once gone
also reduces the number of highly skilled senior analysts who can mentor and man-
age younger junior staff—most of whom are now millennials/Gen Y.
In contrast, Generation Y (or millennials) analysts have no direct working
knowledge of the Cold War and some will not have lived through 9/11. Depending
on when they were born some careers would overlap those of Generation X and
have been shaped by the post-9/11 ‘war on terror.’ However, those born after
1982 may likely need to pivot their careers to respond to new demands in the ever
increasingly complex security environment—beyond counter-terrorism wars in
the Middle East. The growing uncertainty of a multipolar rather than the Cold
War bi-polar security world order will require re-skilling by late Generation X
and Ys as other threats equal to terrorism demand analytical attention (e.g. resur-
gence of bad state actors and foreign interference).
Again, Generation Y analysts, depending on when they were born, would now
be in the 10–20 year range of professional experience in ICs. There is a grow-
ing body of human resource research on the differences between generations and
how this impacts on recruitment strategies in the private sector, though there is
next to no research on why millennials/Gen Y might be interested in applying
for a job in the IC (Weinbaum 2016). Many studies on Gen Y attributes in other
non-IC industries emphasise them as being technologically savvy than earlier
generations, which is advantageous to ICs as they confront a range of challenges
including rapid changes in AI/machine learning in the workplace. However, the
research is not settled on all the attributes Gen Y embody (both good and bad). It’s
clear that knowing the general personality attributes of a generation demographic
may be helpful to a point. But there are variations between individuals which IC
leaders need to take into further consideration when trying to attract and recruit
young people to the changing workforce (Sharma 2020; Hobart and Sandek 2014;
Walker et al. 2010).
Finally, there is Generation Z (born 1996 to 2012)—the oldest of which are
now just leaving university—some of whom may be contemplating working in the
IC as an analyst. They are likely to be better educated and skilled in AI/machine
learning than even their Gen Y predecessors, but by the time the youngest in this
cohort enter the IC workforce in around 2050 the challenges they will face and
the skills required will be different again. While IC leaders need to develop an end
to end (recruitment to retirement) continuing professional development program
for analysts born in earlier generations, recruitment strategies now need to plan
for Generation Z and beyond to ensure personalities, beliefs, values, skills, and
experience can be best matched up to how the job of an analyst is likely to change
in the next one to two decades.
Human resources 139
Several researchers suggest that Generation Z are even more focused on ‘cor-
porate responsibility’ and want to believe the organisation has an ethical mission.
Like Generation Y they want to quickly obtain autonomy and expect inclusion
based on race, ethnicity, sexual orientation, and religion to be fully normalised
and integrated into the fabric of society and their potential employer. Generation
Z are also carrying large college debt and expect a potential employee to be
generous with remuneration. This expectation might be more difficult to meet
in the foreseeable future, particularly after the global impact of the COVID-19
pandemic. But nonetheless, expectations need to be managed in proactive and
transparent ways.
Interesting too, they are less likely to be influenced by recruitment advertise-
ment and will look to friends to provide advice on whether an employee is likely
to deliver on their key personal and professional goals (Robinson 2018; Adamy
2018; Williams et al 2010: 21–36). Many Generation Y/millennials, accord-
ing to Weinbaum et al.’s study (2016: X), ‘have a lack of trust in government,
yet believe it has a responsibility to respond to war, terrorism, social unrest
and political instability.’ So for both Generations Y/millennials and Z to come,
how do IC leaders attract suitably qualified personnel, who may have an interest
in national security issues, yet have concerns about notions of secrecy, intel-
ligence collection, operations, or even the legitimacy of IC activities in liberal
democracies?
No one has a crystal ball about how exactly the security environment will evolve
in the next two decades. But as seen with the development of machine learning/AI
over the last two decades, a number of macro trends will begin to emerge in the
security environment. In response, the focus of IC leaders should be on the imple-
mentation of reliable risk and foresight analytical frameworks in order to inform
recruitment planning and strategies for analysts. Inter-generational attributes and
skills variations between workforce generations are also important considerations
for recruiting other positions, including IC leaders and managers. But we will
come back to what skills and attributes IC leaders will need in Chapters 8 (The
Future IC Leader and Governance Challenges) and 9 (Leadership Development).
There is one final important question on recruitment which IC leaders need to
consider in the future. This is how the mechanics of workforce selection is done
across ‘Five Eyes’ ICs, and if these processes are the most optimal approaches to
matching the right person to analyst’s position (Nemfakos et al. 2013). IC work-
force selection, like other non-IC recruitment, has been informed for several dec-
ades by extensive psychological and cognitive testing tools to try to predict how
an individual may perform in an analyst’s role. In addition to assessing cogni-
tive functioning, psychological testing also provides recruiters with insights into
personality, values, and interest—all of which are critical things to know about
when determining if a candidate is a good fit for working in the closed IC working
environment. Psychological testing is also relevant to security vetting require-
ments, such as determining good character, probity, and life history. In addition to
psychological testing, other selection tools rely on interviews, assessment centres,
and working candidates through scenarios with problem solving.
140 Human resources
IC selection testing is underscored by over a century of research in broader
industrial organisational psychology and human resource management. Though
the recruitment selection practice has grown organically in a lot of agencies across
‘Five Eyes’ ICs, there is less evidence-based knowledge available about what
practices are most effective and why this is so. As Ployhart et al. suggest, the
efficacy of recruiting practices have been well researched by applied psycholo-
gists. But even in a field that has improved empirically the recruitment practice
in a range of industries, methodological challenges still preclude consensus by
researchers on how best to assemble evidence of validity in studies and put-
ting theory into practice (2017: 299; Farr et al. 2017; Ryan and Derrous 2016).
Ployhart et al. also correctly point out that improving evidence-based research on
recruitment strategies needs a two-pronged approach. The first is further refine-
ment of traditional recruitment research, which seeks to assess which people have
the best skills against the position. The second and likely increasingly important
approach is given personality traits of Gen Y, Z, and beyond—research is needed
that can help IC leaders understand how candidates respond to different recruiting
and selection strategies (Ibid).
Again, IC leaders can look to the research in applied psychology disciplines
that over several decades have been assessing behavioural changes and their rela-
tionship to job performance in different industries. Although research progress
has been made in non-IC industries, evaluating how someone is likely to perform
pre-recruitment and after is difficult given the complex inter-play of a range of
organisational and individual variables (Ones et al. 2018; Sackett et al. 2017).
Leaving aside differences in knowledge, skills, and abilities, there are also indi-
vidual behavioural differences impacting on job performance including ability,
personality, interests, emotional intelligence, and motivational traits (Sackett
et al. 2017). Researchers also point out a number of other behavioural traits that
may impact on an individual’s performance. One key distinction being made is
between what some psychologists refer to as the difference between a typical per-
formance (the choices about what people will do in the workplace) compared to
maximum performance (or what people can do when they are highly motivated to
do so) (Ones et al. 2018: 156). In the recruitment of analysts and indeed any other
position across the IC, as argued earlier, context will greatly inform recruitment
strategies; understanding such variations in an individual’s performance is about
recruiting the ‘right candidate’ with the right mixture of behavioural traits.
Accordingly, it’s clear that IC leaders can do more to engage in research that
assesses behavioural characteristics of both potential and actual job performance.
It’s also clear that IC leaders and their HR departments need to articulate both
a normative approach to what knowledge/skills and personality attributes they
are looking for. Additionally, in the future consideration must be given to how
both inter-generational change and individual behavioural traits impact recruit-
ment. Given the changing security environment, assessing likely performance and
matching to organisational culture will need to look more deeply at key differ-
ences in a person’s typical and maximum performance pre and post recruitment.
It will also be important to match assessing individual typical job performance
Human resources 141
against how they may potentially perform in a range of crisis situations. Again,
IC leaders need to either fund or access relevant/translatable evaluation research
that can assess how to improve selection systems and psychological evaluation of
personal attributes in other work contexts to see how they can be better integrated
into IC recruitment strategies.
Conclusion
This chapter outlined the broad challenges IC leaders will confront as they relate to
the recruitment, training, and retention of analysts. There is now growing evidence
that IC leaders in most ‘Five Eyes’ countries are giving much more of their capa-
bility thinking time to workforce planning issues. While at this point a lot of this
thinking is going on behind the closed doors of our ICs, this chapter has provided
examples in broad terms of the kinds of issues, challenges, and remedies leaders are
developing to address workforce planning. There are no quick fix or ‘one size fits
all’ solutions to addressing the many workforce challenges to come as the security
becomes even more uncertain and volatile. Indeed, resolving any HR challenge
leaders face will be a function of how equipped they are personally to manage them
and these are dealt with in the context of intelligence governance issues raised in
the next chapter (Chapter 8 The Future IC Leader and Governance Challenges)
where we shift the focus away from specific areas of leadership responsibility (e.g.
tasking and coordination, collection, analysis, ICT, and Human Resources) towards
a broader analysis of what key governance issues IC leaders will need to deal with.
Chapter 8 also includes a discussion on how IC leaders may address the many gov-
ernance challenges identified before concluding with an exploration of what kind of
leadership attributes are likely to be more effective in tackling governance issues.
Notes
1 The 2014 Strategic Human Capital Plan was built on an earlier and first attempt at
laying the groundwork for workforce planning and innovation—the Strategic Human
Capital Plan (2006).
Human resources 147
2 Intelligence Community Directive 203– Analytic Standards sets out broad stand-
ards (such as objectivity, independence from policy makers, and timeliness) meant
to embody the production and evaluation of analytic products, as well as provide
foundations for analytic training and education. ICD 610 provided a list of com-
petencies for the entire IC workforce, not just analysts. ODNI Intel Community
Directive Number 610 Competency Directories for the Intelligence Community
Workforce.
3 While the full text of the Jeremiah Report remains classified, a summary of its recom-
mendations has been declassified by the CIA. See Director of Central Intelligence,
‘Recommendations of the Jeremiah Report,’ June 1998, <https://nsarchive2. gwu.edu/
/NSAEBB/NSAEBB187/IN38.pdf>, accessed 19 November 2018.
4 IAFIE, or the International Association For Intelligence Education, was formed in
2004 with a mission to expand research, knowledge, and professional development in
intelligence education. It seeks to exchange ideas and advance the intelligence profes-
sion by focusing on intelligence studies. IALEIA, or the International Association for
Law Enforcement Intelligence Analysts, has a similar mission but focuses more on law
enforcement.
References
AASS. (2019). Social science research and intelligence in Australia. Canberra: AASS.
Adamy, J. (2018, September 07). Ready, set, strive -- Gen Z is coming --- Battle-scarred,
they are sober, driven by money and socially awkward; a 1930s throwback. Wall Street
Journal. Retrieved from https://search-proquest-com.ezproxy.csu.edu.au/docview/
2100179262?accountid=10344
Caddell Jr, J., & Caddell, Sr, J. (2017). Historical case studies in intelligence education:
Best practices, avoidable pitfalls. Intelligence and National Security, 32(7), 889–904.
doi: 10.1080/02684527.2017.1328854
Chang, W., & Tetlock, P.E. (2016). Rethinking the training of intelligence analysts.
Intelligence and National Security, 31(6), 903–920.
Chudzikowski, K. (2012). Career transitions and career success in the ‘new’ career era.
Journal of Vocational Behavior, 81(2), 298–306. doi: 10.1016/j.jvb.2011.10.005
Clarke, C.M. (2010). Gen next: Are we adequately training our next generation of China
intelligence analysts? Asia Policy, 9(1), 12–20. doi: 10.1353/asp.2010.0008
Costanza, D.P., Badger, J.M., Fraser, R.L., Severt, J.B., & Gade, P.A. (2012). Generational
differences in work-related attitudes: A meta-analysis. Journal of Business and
Psychology, 27(4), 375–394. doi: 10.1007/s10869-012-9259-4
Culpin, V., Millar, C., Peters, K., Lyons, S.T., Schweitzer, L., & Ng, E.S. (2015). How have
careers changed? An investigation of changing career patterns across four generations.
Journal of Managerial Psychology.
Dahl, E.J. (2017). Getting beyond analysis by anecdote: Improving intelligence analysis
through the use of case studies. Intelligence and National Security, 32(5), 563–578. doi:
10.1080/02684527.2017.1310967
Devanny, J., Dover, R., Goodman, M.S., & Omand, D. (2018). Why the British Government
must invest in the next generation of intelligence analysts. The RUSI Journal, 163(6),
78–89. doi: 10.1080/03071847.2018.1562027
Dylan, H., Goodman, M.S., Jackson, P., Jansen, P.T., Maiolo, J., & Pedersen, T. (2017).
The way of the Norse Ravens: Merging profession and academe in Norwegian national
intelligence higher education. Intelligence and National Security, 32(7), 944–960. doi:
10.1080/02684527.2017.1328833
148 Human resources
Farr, J.L., Tippins, N.T., Borman, W.C., Chan, D., Coovert, M.D., Jacobs, R., & Schneider,
B. (2017). Handbook of employee selection (2nd ed.). Abingdon, UK: Taylor and Francis.
Flood, P. (2004). Report of the inquiry into Australian Intelligence Agencies. Canberra,
Australia: Department of Prime Minister and Cabinet.
GAO. (2019). Intelligence community: Actions needed to improve oversight and oversight
of the centers for academic excellence program. Washington, DC: GAO.
George, R.Z. (2011). Reflections on CIA analysis: Is it finished? Intelligence and National
Security, 26(1), 72–81. doi: 10.1080/02684527.2011.556360
Grieve, D. (2018). Diversity and inclusion in the UK intelligence community. London:
ISC/HMSO.
Harrison, M., Walsh, P.F., Lysons-Smith, S., Truong, D., Horan, C., & Jabbour, R. (2018).
Tradecraft to standards—Moving criminal intelligence practice to a profession through
the development of a criminal intelligence training and development continuum.
Policing: A Journal of Policy and Practice, 14(2), 312–324.
Hobart, J., & Sandek, H. (2014). Gen Y now: Millenials and the evolution of leadership.
Hoboken, NJ: John Wiley & Sons.
Johnson, L.K. (2017). Special Issue on the teaching of intelligence. Intelligence and
National Security, 32(7), 881–881. doi: 10.1080/02684527.2017.1328826
Kahneman, D. (2011). Thinking, fast and slow. London: Macmillan.
Kreuzer, M.P. (2016). Professionalizing intelligence analysis: An expertise and
responsibility centered approach. Intelligence and National Security, 31(4), 579–597.
doi: 10.1080/02684527.2015.1039228
Landon-Murray, M., & Coulthart, S. (2020). Intelligence studies programs as US public
policy: A survey of IC CAE grant recipients. Intelligence and National Security, 35(2),
269–282. doi: 10.1080/02684527.2019.1703487
Lieberthal, K. (2009). The US Intelligence Community and foreign policy: Getting analysis
right, John L. Thornton China Center Monograph series, 2(September). Washington,
DC: Brookings.
Lowenthal, M.M. (2017). My take on teaching intelligence: Why, what, and how. Intelligence
and National Security, 32(7), 986–994. doi: 10.1080/02684527.2017.1328856
Lyons, S.T., Schweitzer, L., Eddy, S., Ng, & Kuron, Lisa K.J. (2012). Comparing apples to
apples. Career Development International, 17(4), 333–357.
NAS. (2019). A decadal survey of the social and behavioural science: A research agenda
for advancing intelligence analysis. Washington, DC: NAS.
Nemfakos, C., Rostker, B.D., Conley, R.E., Young, S., Williams, W.A., Engstrom, J., &
Temple, D. (2013). Workforce planning in the intelligence community. Santa Monica,
CA: RAND Corporation.
ODNI. (2014). US Intelligence Community's human Capital vision, 2020. Washington,
DC: ODNI.
ODNI. (2016). The intelligence community's equal opportunity employment diversity
enterprise strategy (2015–2020). Washington, DC: ODNI.
ODNI. (2017a). National Counter Intelligence and Security Center. Fiscal year 2017
annual report on security clearance determinations. Washington, DC: ODNI.
ODNI. (2017b). Annual demographic report. Hiring and retention of minorities, women,
and persons with disabilities in the United States Intelligence Community. FY 2017.
Washington, DC: ODNI.
Ones, D.S., Anderson, N., Viswesvaran, C., & Sinangil, H.K. (2015). The SAGE handbook
of industrial, work & organizational psychology: V1: Personnel psychology and
employee performance. London, UK: SAGE Publications.
Human resources 149
Ployhart, R.E., Schmitt, N., & Tippins, N.T. (2017). Solving the supreme problem:
100 years of selection and recruitment at the journal of applied psychology. Journal of
Applied Psychology, 102(3), 291–304. doi: 10.1037/apl0000081
Robinson, R. (2018). Gen Z enters the Workforce…Now what?: Top 3 things gen Z expect
from companies they work for. Recognition and Engagement Excellence Essentials.
Retrieved from https://search-proquest-com.ezproxy.csu.edu.au/docview/2043555406
?accountid=10344
Ryan, A., & Derous, E. (2016). Highlighting tensions in recruitment and selection research
and practice. International Journal of Selection and Assessment, 24(1), 54–62. doi:
10.1111/ijsa.12129
Sackett, P.R., Lievens, F., Van Iddekinge, C.H., & Kuncel, N.R. (2017). Individual
differences and their measurement: A review of 100 years of research. Journal of
Applied Psychology, 102(3), 254.
Salles, A., Lin, D., Liebert, C., Esquivel, M., Lau, J.N., Greco, R.S., & Mueller, C. (2017).
Grit as a predictor of risk of attrition in surgical residency. The American Journal of
Surgery, 213(2), 288–291. doi: 10.1016/j.amjsurg.2016.10.012
Seibert, S.E., Kraimer, M.L., Holtom, B.C., & Pierotti, A.J. (2013). Even the best laid
plans sometimes go askew: Career self-management processes, career shocks, and the
decision to pursue graduate education. Journal of Applied Psychology, 98(1), 169–182.
doi: 10.1037/a0030882
Sharma, D. (2020). How to recruit, incentivize and retain Millennials. New Delhi: SAGE
Publications.
Shelton, A.M. (2014). Teaching analysis: Simulation strategies in the intelligence
studies classroom. Intelligence and National Security, 29(2), 262–281. doi:
10.1080/02684527.2013.834219
Spracher, W.C. (2017). National Intelligence University: A half century educating the
next generation of U.S. Intelligence Community Leaders. Intelligence and National
Security, 32(2), 231–243. doi: 10.1080/02684527.2016.1248316
Srivastava, D.K., & Nair, P. (2018). Employee attrition analysis using predictive
techniques. Cham: Springer.
Tlaiss Hayfaa, A., Martin, P., & Hofaidhllaoui, M. (2017). Talent retention: Evidence from
a multinational firm in France. Employee Relations, 39(4), 426–445. doi: 10.1108/
ER-07-2016-0130
Treverton, G.F., & Gabbard, C.B. (2008). Assessing the tradecraft of intelligence analysis.
Santa Monica, CA: Rand Corporation.
U.K. Government. (2018). Government response to the intelligence and Security Committee
of Parliament Report on Diversity and Inclusion in the intelligence community. London,
UK, Cabinet Office: HMSO.
Walker, James W., & Lewis, Linda H. (2010). Dealing with X, Y, Zs how to manage the
new generations in the workplace. London, UK: FTPress Delivers.
Walsh, P.F. (2017a). Teaching intelligence in the twenty-first century: Towards an
evidence-based approach for curriculum design. Intelligence and National Security,
32(7), 1005–1021. doi: 10.1080/02684527.2017.1328852
Walsh, P.F. (2017b). Improving strategic intelligence analytical practice through
qualitative social research. Intelligence and National Security, 32(5), 548–562. doi:
10.1080/02684527.2017.1310948
Weinbaum, C., Girven, R.S., & Oberholtzer, J. (2016). The millennial generation:
Implications for the intelligence and policy communities. Santa Monica, CA: Rand
Corporation.
150 Human resources
Whibley, J. (2014). One community, many agencies: Administrative developments in New
Zealand's intelligence services. Intelligence and National Security, 29(1), 122–135. do
i:10.1080/02684527.2012.746416
Williams, K.C., Page, R.A., Petrosky, A.R., & Hernandez, E.H. (2010). Multi-generational
marketing: Descriptions, characteristics, lifestyles, and attitudes. The Journal of Applied
Business and Economics, 11(2), 21–36. Retrieved from https://search-proquest-com.ez
proxy.csu.edu.au/docview/815978214?accountid=10344
8 The future IC leader and
governance challenges
Introduction
As noted earlier, intelligence community (IC) leadership, particularly at the oper-
ational level, may play out differently in a range of diverse organisational contexts
such as the national security, law enforcement/homeland security, military, and
private sectors. Given the diverse roles of IC leaders across these sectors, it should
come as no surprise that there is no single source of truth or ‘leadership map’
pointing to how to lead within and across the ‘Five Eyes’ ICs. Hence, all leaders
regardless of the level of responsibility (team, branch, agency, or entire IC) will
be shaped by the unique organisational contexts in which they work. However,
while an IC leader working within a specific context might be called upon at times
to demonstrate particular behavioural and technical competencies, leadership in
any IC environment is nonetheless informed by common normative personal and
technical attributes. As we will discuss shortly, what these personal leadership
attributes are remains an open debate.
Based on a synthesis of key governance challenges identified from primary
(survey results, semi-structured interviews) and secondary data sources (scholarly
literature, government reports, documents), this chapter and the following one
(Chapter 9 Leadership Development) circle back on the book’s four objectives
listed in Chapter 1 (Introduction). First, given the many governance challenges
raised in earlier chapters, what will be the most critical for IC leaders to manage
in the future? Second, in what ways can IC leaders seek to address key govern-
ance challenges?
Third, what personal attributes are more likely to result in leadership behav-
iours that impact positively on the key intelligence governance issues identified?
And based on a synthesis of the data collected, what attributes, skills, knowledge,
and practice can we develop in the next IC leadership cadre that can address gov-
ernance challenges in ways that result in resilient and adaptive ICs? The answers
to this fourth question are addressed in Chapter 9 (Leadership Development).
The chapter is organised into three main headings: key governance challenges,
addressing governance challenges, and leadership attributes. While the chapter
is a synthesis of both primary and secondary sources, the analysis here will draw
heavily on insights gathered from the 208 former and current IC leaders who
152 Future IC leader and governance challenges
participated in the study’s survey. Finally, just to remind the reader, I define intel-
ligence governance as ‘a set of attributes and rules pertaining to strong leadership,
doctrine design, evaluation and effective coordination, cooperation and integra-
tion of intelligence processes’ (Walsh 2011: 135). Attributes and rules of course
need not only be prescriptive or directives set by the leader. In many or even most
cases, strong leadership will be about making collective decisions on doctrine,
integration, and coordination of intelligence processes.
Collection
Chapter 4 (Collection) highlighted three themes—technological and methodo-
logical, collection strategies, and intelligence collection and ethics and efficacy
challenges. All of these raise governance challenges that will continue to occupy
the attention of IC leaders into the future. For example, the intersection of issues
within both the technological and collection strategy themes raises critical gov-
ernance challenges. In particular, there will be ongoing challenges around how
ICs can improve their knowledge and use of Open Source Intelligence (OSINT)
and social media capabilities. In future this will be critical for not just enhancing
collection, but for ICs being able to check rapidly and accurately the provenance
of these sources for assessment verification and counter-intelligence reasons.
Another key collection governance issue that will consume IC leaders’ energy
will be responding to what Lim refers to as ‘data asphyxiation and the decision
paralysis that can come from the collection of large volumes of data’ (2016: 628).
From a collection perspective too, it’s clear that many ICs are taking big bets on
big data, machine learning, and AI to more effectively manage collection and
assessment processes and capabilities. We will come back to the key kinds of gov-
ernance challenges posed by investing in AI shortly under the sub-heading ICT.
Finally, it’s also clear from discussions in Chapter 4 (Collection) that IC leaders
will continually be challenged by hardened threat actor/targets who are increasing
their use of encrypted platforms and the dark web for communications and illicit
markets. It is likely that ongoing advances in AI and other science and techno-
logical solutions will provide new collection platforms for ICs to help ameliorate
some encryption barriers. However, IC leaders will continually need to balance
investments in these capabilities against more informed ethical risk assessments
that can evaluate effective surveillance/interception collection strategies against
privacy, trust, and legitimacy in liberal democratic states.
Analysis
In Chapter 5 (Analysis), two broad governance challenges were identified. One
related to promoting collaboration and the other can broadly be described as
154 Future IC leader and governance challenges
advancing innovation. On collaboration, the analysis of primary and secondary
sources (including comments from surveyed IC leaders) suggests that improve-
ments have been made since 9/11 in ICs to promote better collaboration between
analysts. However, several survey comments highlighted further progress was
required to promote more effective collaboration that would result in stronger
cross agency virtual and physical communities of analytical practice. A key gov-
ernance challenge for IC leaders, therefore, is how to build on what analytical col-
laborative tools currently exists that promotes efficiencies and are most likely to
be utilised by multi-agency analysts. In the context of the need for further devel-
opment of collaboration strategies to promote analytical collaboration, several IC
leaders surveyed also commented that collaboration required the regular inclusion
of outside experts (survey respondents 7, 20, 85). The inclusion of outside experts
has been a recurring theme throughout this book concerning a range of capability
issues, not just analytical innovation.
The second key governance challenge for analysis is innovation. Innovation
includes improving knowledge, skills, and the acquisition of technology that can
increase the validity and reliability of analysis. It also includes IC leaders being
able to validate through evidence-based research or other means that innovations
are making a demonstrable effective difference to analysis. Chapter 5 (Analysis)
discussed examples of recent evidence-based studies such as Dhami’s work on
improving analytical probability and forecasting (2018: 205). But there are now
several other issues impacting on the reliability and validity of analysis, such as
‘fake news’ and foreign interference, where it will be important to evaluate their
impact on analysis as a result of analytical bias, poor evidence, and deception.
Finally, resolving analytical collaboration or innovation challenges naturally will
not just be dependent on technological solutions. Often improving existing analyt-
ical processes and innovation will rely on IC leaders reaching out to analysts and
other staff at the ‘coal-face,’ who may have simple, elegant solutions to managing
challenges. In the words of one IC leader surveyed:
Intelligence and security agencies are notoriously slow to change and adapt
to an ever changing tactical environment. A reliance on traditional practices
have shown to be ineffective. Leaders must maintain relationships with front-
line practitioners and be fully cognizant of emerging challenges and the ad
hoc ‘workarounds’ that personnel in the field have self-developed. Often
leaders surround themselves with other leaders and insulate themselves from
the work of front-line practitioners, thereby creating a disconnect from per-
ception and reality. (survey respondent 31)
On this issue of ICT capability being well behind industry standards, other survey
respondents suggested this was compounded by a lack of flexibility in funding
arrangements, particularly in the law enforcement context. As survey respondent
10 remarked:
no criminal group ever had to write a business case to acquire new technol-
ogy so if law enforcement in particular is to avoid losing pace, a more flex-
ible approach has to be allowed to the flow of funding. This might require
governments to cede more authority to intelligence leaders to have discretion
over funding use, but new policy proposals simply delay the process and flag
to the target what it is that the community might be capable of in 3–4 years
hence.
Other survey respondents also commented on the level of skills, knowledge, and
competence of IC leaders to implement and oversee existing ICT systems let alone
a broader suite of deep learning AI systems now in the research and development
pipeline. In the context of analytical technology, one IC leader suggested how:
On the same point of whether IC leaders are effectively managing ICT implemen-
tation, one former IC leader (in the Australian context) said:
Intelligence agencies will still grapple with ICT as they fundamentally have
old school thinking and it would be wise to have new blood from outside to
Future IC leader and governance challenges 157
refresh their thinking. I would go back in as a senior executive, as would oth-
ers, happy to take a pay cut, but really show them how to do Joint Technology
Capability Development across the intelligence community properly exploit-
ing domestic and international partners. (survey respondent 73)
risk aversion and poor investment in developing secure inter (IC) agency
communications. The fact that the average person now has secure commu-
nications (WhatsApp, Signal etc) and instant ability to search across open
source domains limits the competitive advantage intelligence agencies have
in addressing threats. (survey respondent 34)
Other survey respondents also noted the demands on IC leaders to manage adeptly
the need to ‘disseminate secure information on phone tablets and other smart
devices; while simultaneously overseeing capabilities to obtain information from
similar encrypted devices’ (survey respondent 46). Still others mentioned the
impact of fake news and foreign interference on ICT systems used by ICs (survey
respondent 37).
In addition to the technical and counter-intelligence issues raised, other survey
respondents suggested that the main ICT governance issues IC leaders will face
are not technical, but legislative. As mentioned in the explanation of the effec-
tive intelligence framework outlined in Chapter 2 (Intelligence and Leadership),
‘legislation’ is one of the five key enabling activities in the framework. This is
because legislation enables the activities of all ICs, including what information
agencies can share. One IC leader suggested that while there is a technical ability
often to share information:
Another critical intelligence governance issue related to ICT, which came out of
the survey results—but was not discussed in Chapter 6—is that some IC leaders
still felt intelligence sharing remains a core challenge for ICs. Survey comments
suggested that this was again a technical issue, i.e. ICs needing to find better plat-
forms to facilitate sharing internally and across the ‘Five Eyes’ countries (survey
respondent 67). However, others suggested that it was also an organisational cul-
tural issue. One respondent argued, for example, that there was still continued
siloing and dissociation of agencies between those traditional/original agencies
within Australia’s intelligence community and those that have more recently
joined. They argued this dissociation was ‘beyond what is actually required for
security purposes and is self-defeating’ (survey respondent 5). Survey respondent
5 went on to add: ‘the need for effective synergistic integration and inter-operation
is paramount. This does not require combination of two or more agencies into one,
but an appreciation of where such opportunities exist and a willingness to act on
them. This needs to happen before we can integrate sophisticated AI platforms.’
A final noteworthy observation made by one survey respondent that I think
will remain a critical ICT governance challenge is how IC leaders can invest in
organisational IT capabilities in ways that can also help attract and retain Gen Y/
millennials, Gen Z, and beyond who have higher expectations about technology
in the workplace than older leaders (survey respondent 64).
HR governance issues
In Chapter 7 (Human Resources), we had a normative discussion about what IC
leaders needed to consider in promoting effective workforce planning of ana-
lysts (and others) in the future. This discussion was informed by an assessment
of the workforce literature and identifying broad attributes and better practice
evidence-based processes that need to be considered in order to improve IC HR
outcomes. Several themes were identified from the literature, such as diversity,
inter-generational factors, training, and education. It seems from a number of
survey respondent’s comments that the relevance of these themes to managing
human resource issues well are also shared by current and former IC leaders. For
example, one said:
If I learned one thing in my time as director, it was that human resource issues
were amongst the most important issues for which I was responsible. Because
Future IC leader and governance challenges 159
of the immediacy of the consequences of an operation gone bad it is easy to
be swept into worrying about operational issues, but it is human resource
issues broadly writ that, if not well managed, can make an operational failure
inevitable or, in and of themselves, damage an agency. (survey respondent
104)
Given space is limited, it is not possible to provide a detailed analysis of all com-
ments provided by survey respondents as they related to the governance challenges
in HR. Instead I will just mention briefly some key themes identified from the sur-
vey—many of which are aligned to themes raised in Chapter 7 (HR). However,
before getting to a brief outline of those themes, it is worth prefacing that discus-
sion with one interesting cluster of survey comments, which referred to the vari-
ation in the levels of authority some IC leaders had across the national security,
military, and law enforcement sectors. In this context, survey respondents made
the point that ‘authority’ is relative and can impact on the extent that some lead-
ers can initiate meaningful HR reforms in the workforce. Two respondents—one
from a military and the other from a law enforcement background—made the
point that seniority of IC leaders in some of their working environments stops
at a certain point and other more senior leaders not necessarily with any intel-
ligence expertise make the decisions about overcoming HR governance issues
(survey respondent 65). These insights remind us that in some cases, critical HR
workforce decisions in some IC contexts could be made with little or no input or
expertise from senior intelligence staff members.
Arguably, one overarching HR governance theme arising from the analysis of
survey results was an even greater focus on strategic workforce planning capabili-
ties (survey respondent 108). However, on other more specific themes, there were
a number of comments raised expressing concern that the pool of intelligence
professionals was still relatively small on an agency basis and that HR governance
challenges such as recruitment and training and education needed a greater com-
munity-wide rather than agency response (survey respondent 6). Additionally,
there were several insights about skill sets, training competencies, and specialisa-
tions analysts needed and the challenges of employing sufficient generalists vs
subject matter experts (survey respondent 51). Much of this discussion is aligned
to points made previously in Chapter 7 (HR). Some IC leaders surveyed pro-
vided examples of areas of specialisations, which they argued were critical work-
force shortages including CBRN, region, country specialists, and cyber (survey
respondents 7, 20, 21). Unsurprisingly, diversity and recruitment practices and the
challenges associated there were also identified by a number of respondents. One
said ‘diversity. Simple as that. Standing in front of intelligence forums, looking
out at all those white arts graduates scares me sometimes’ (survey respondent 41).
Another suggested we still seem ‘to be recruiting to obtain a clearance and not for
diversity’ (survey respondent 42).
A final cluster of HR governance challenges identified related to recruitment and
retention practices. Again, many of the survey comments were aligned to issues
raised in Chapter 7 (HR). A number of survey respondents made observations
160 Future IC leader and governance challenges
about the validity and reliability of existing IC recruitment practices to attract and
retain the next generation of analysts and other workers needed to meet the chal-
lenges of the volatile security environment. These comments expressed concern
about not only whether current practices were reliable or ‘fit for purpose,’ but
some also argued that the continuing outsourcing of IC HR (including recruit-
ment) was likely not to improve recruitment outcomes. One said ‘a one size fits
all cookie cutter approach to the types of people we need will not serve the com-
munity well into the future’ (survey respondent 48). On the recruitment process
of analysts and diversity, one IC leader said:
there is already a strong body of knowledge and decades of Five Eyes collab-
oration that can be leveraged. Integrating these into a common, continuously
improving ‘canon of intelligence analysis’ would allow them to be enriched
and adapted over time—similar to practices among the scientific communi-
ties (survey respondent 69).
ICT
Several ICT governance challenges were identified above and IC leaders will play
a central role in addressing all of them. Given that space is limited, however, I
focus on the implementation of AI capabilities in ICs. Chapter 6 (ICT) outlined
in detail the many dimensions to integrating AI capabilities within ICs. These
include several factors such as addressing technical issues, managing counter-
intelligence, social-ethical issues, legislative, workforce, and organisational cul-
tural issues. Also, as we saw earlier, one additional governance challenge in the
AI area is the opinion of some survey respondents that there may not be sufficient
competence amongst IC leadership ranks to steer the development of further AI
capabilities across ‘Five Eyes’ ICs. It’s important to avoid hyperbole around the
promise of AI in the IC context. But nonetheless for many IC agencies its incorpo-
ration is likely (eventually) to result in significant changes to the way intelligence
is collected and assessed. And so there remains a concern about whether IC lead-
ers are prepared for the coming change. As one IC leader said:
AI and quantum computing will change the reality of security and intelligence
at a global level. Leaders must begin investing in the research and develop-
ment of practices that assume that reality will take hold within the next five
years. Most agencies are ill prepared for the future in this regard and there
is an element of ignorance and misunderstanding on how this will reshape
the security and intelligence landscape. While much discussion and effort
is placed on better improving current practices, very little attention is being
paid to how the intelligence community will be forever altered with the intro-
duction of game changing and society changing technology. Unfortunately,
countries like the PRC and Russia are taking progressive and leading-edge
approaches to this new paradigm, while the West continues to reinforce cur-
rent practices and make superficial changes with limited outcomes. (survey
respondent 34)
Future IC leader and governance challenges 167
Again, there are no simple, glib prescriptions for remedying a lack of prepared-
ness by some IC leaders to manage change brought by the adoption of AI tech-
nologies. However, as noted in Chapter 6 (ICT), it’s clear from the many survey
comments that some progress is being made by IC leaders in considering the
multi-dimensional impacts AI will have on ICs. For example, there has been some
consideration of technical and counter-intelligence issues. But what so far seems
to be missing at the time of writing is a complete IC AI strategy that considers all
the organisational variables that will be influenced by the incorporation of AI and
how to maximise the benefits while minimising the risks.
Some ‘Five Eyes’ militaries and governments have adopted national AI strate-
gies, but these do not seem to address IC enterprise issues in any detail. IC leaders
should develop national IC AI strategies that can coherently identify how such
emerging technologies, practices, and processes will be integrated into core intel-
ligence processes and key enabling activities. Within any national IC AI strategy,
leaders will need to pay close attention to developing strategic and operational
KPIs around many areas of AI technical development, particularly in areas of
surveillance, robotics, space assets, and quantum computing. But the clear articu-
lation of KPIs will also be required to track performance of these technologies
against hostile AI that could promote ‘deception, disruption, fake news or algo-
rithmic training data being manipulated’ (survey respondent 13). An IC AI strat-
egy will also need to, as mentioned earlier (Chapter 6 ICT), set objectives on how
social and ethical challenges will be addressed to ensure the efficacy of new tech-
nologies and practices within ICs—whilst at the same time promote transparency
and legitimacy in liberal democratic states. Finally, as noted in Chapter 6 (ICT)
and 7 (HR), IC leaders will also need to include KPIs on resolving workforce
implications of AI integration into existing processes.
HR
In the earlier section on HR governance challenges, a number of issues were iden-
tified relating to promoting diversity, inter-generational change, and workforce
planning. All of these and others discussed in more detail in Chapter 7 (HR) are
subsets in a larger mission of IC strategic workforce planning. Again, as noted
earlier, since 9/11 progress has been made on a number of workforce issues, but
the increasingly complex security environment will demand IC leaders develop
further holistic and integrated strategic workforce planning. Each IC will have
their own approach, but again, as hard as it might be there needs to also be a
‘whole of IC framework’ adopted for workforce planning as well that can pro-
mote better HR standards and identify vulnerabilities. Much of the issues that
need to be addressed by IC leaders in strategic workforce planning has already
been mentioned in Chapter 7 (HR) and again summarised above in this chapter.
Accordingly there is no need to repeat that detail here.
But it is worth making a few observations about what should inform an IC stra-
tegic workforce plan. First, it’s important to simply note that trying to plan both
for the current and the workforce of the future will always be difficult. Leaving
168 Future IC leader and governance challenges
aside the very real resource constraints many ICs operate under, how the security
environment will evolve—and therefore what kind of workforce is required—
cannot be estimated accurately. It is possible, however, for ICs to develop better
research and foresight analysis capabilities to frame more holistic, evidence-
based and integrated approaches to workforce planning. Such knowledge could
be used to inform KPIs for diversity, inter-generational change, recruitment, train-
ing, retention, and other HR objectives to better pivot human capabilities to the
changing mission.
A second observation is that designing workforce planning, if it is not just
to be a cosmetic process, will require IC leaders accumulate better evidence in
which to make investment decisions in HR. Where should this evidence come
from? Again, IC leaders will need to adopt a best practice approach to gather evi-
dence, which will increasingly mean in the future looking outside their agency to
benchmark better HR practices. Doing this hard work does not necessarily mean
IC leaders turn to the ‘usual suspects’ (e.g. large accounting or defence contract-
ing or consulting firms) to provide advice on HR workforce issues. Arguably,
ICs paying substantial sums of money for cookie-cutter approaches to workforce
strategies may be a bad investment in the future. The research gathered for this
study suggests other external sources such as more targeted engagement with
academia and researchers would be useful and possibly cheaper in exploring
how to evaluate what works better in improving diversity, recruitment, training,
and retention. Again in Chapter 7 (HR) there were a number of examples given
on how a multi-disciplinary research approach to a number of workforce chal-
lenges could generate solutions. Of course IC leaders in designing better strategic
workforce planning frameworks will as in the past confront technical, resourcing,
cultural, and human constraints to actioning such plans. Perhaps the greatest chal-
lenges may lay in attracting and retaining Generation Y, Z, and beyond to ICs in
ways that reliably address capability gaps into the future. How can IC leaders, for
example, better align the values and missions of their agencies with the values,
ethics, and professional aspirations of an increasingly young and diverse recruit-
ment pool who may not see themselves devoting their entire work life to the IC?
As succinctly put by one IC leader:
people want flexible careers and we should accommodate that. People may
not want a 30 year career in one organization. People also want to lead mod-
ern lives and do not want to have to isolate themselves in a vault just to do
their work. (survey respondent 102)
Given this reality, what are the common value denominators that ICs can use
that will have real resonance for the next generations as they consider employ-
ment in ICs? This remains a difficult question to answer. IC leaders can look to
other industries such as finance, medicine, law, and IT to see how HR depart-
ments are tapping into next-generation values and expectations. But after reflect-
ing on trends in other industries, they will have to implement initiatives, which
still make sense in the relatively closed IC workplace. What could such initiatives
Future IC leader and governance challenges 169
be? Perhaps greater flexibility will be key rather than a dogmatic full time (9–5)
approach to filling roles. Could IC leaders adopt strategic workforce initiatives
that offer more flexibility to work arrangements yet still benefit the IC? For exam-
ple, a part-time role either in the private or academic sector as well as the IC
could be of mutual benefit. For recruiting next-generation employees, could IC
leaders set up HR arrangements that provide intern positions at lower levels as
part of a recruitment strategy—a kind of ‘try before you buy’ approach for young
workers? Internships could be temporary and offered at lower levels of security
classification in some work environments. Interns who have the right skill sets
and see their values aligned to IC missions could be offered ongoing employment.
A strategic workforce planning framework would also need to promote greater
workforce flexibility and professional development opportunities for mid and sen-
ior career staff. This could be ‘more opportunities and career time dedicated to
‘sabbatical training,’ when experts can update and expand their knowledge and
learn new approaches to analysis (and other areas) without the pressure to produce
operational materials on a constant basis. Time out to refresh and to think’ (survey
respondent 65).
Leadership attributes
This last section shifts the focus away from IC governance challenges at the
organisational level back to the personal attributes of leaders themselves. Now
that we know a bit more about what kind of governance challenges leaders will
face; this section explores whether it is possible to know what kind of individual
leadership attributes are more likely to have a positive impact on the challenges
identified. Following this discussion, Chapter 9 (Leadership Development) will
then reflect on all aspects of IC leadership explored in the study and provide some
tentative conclusions about how to conceptualise future IC leadership develop-
ment programs that foster both the individual leadership attributes and knowledge
required to negotiate the many governance challenges identified.
In simple terms, what kind of personal attributes do IC leaders need to steer
and adapt their teams, branches, agencies, or entire communities to the increas-
ingly complex security environment? In this section we reflect back on key points
made in Chapter 2 about IC leadership from historical, organisational, psycho-
logical, and individual perspectives; and connect it with what former and current
IC leaders surveyed believe are critical leadership attributes. The objective is to
progress knowledge about leadership in the IC context by bringing together theo-
retical perspectives from the more established leadership field with insights from
both former and current experienced IC leaders. Can a broader synthesis of tra-
ditional leadership theorising discussed in Chapter 2 and insights gathered in the
IC leadership survey advance both theoretical and practitioner knowledge about
how one can best produce the next cadre of effective IC leaders? It’s important
to build on the theory, but better theorising can also help inform strategies for the
developing future generation of IC leaders—the topic of Chapter 9 (Leadership
Development).
170 Future IC leader and governance challenges
You will recall in Chapter 2 several leadership theories and their associ-
ated research agendas were discussed (e.g. neo-charismatic/transformational
and follower-centric). With all types of leadership theories, several characteris-
tics have been identified by researchers and attempts made to test empirically
how they inform leadership behaviour in a range of industries. For example, in
Chapter 2 transformational leadership was described as someone who can trans-
form or change basic values, beliefs, and attitudes so followers are willing to
perform beyond the minimum levels. Transformational leadership characteristics
such as the ability to change basic values and beliefs could, for example, be useful
for an increased understanding of the motivations, drivers, and behaviours of the
changing inter-generational workforce discussed in Chapter 7 (HR). But just how
applicable are transformational leadership theoretical approaches to understand-
ing leadership in the IC context? Having charisma and influence are considered
important attributes in transformational leadership theories. But do leaders need
to be charismatic to have effective influence within ICs?
Question 8 (of the IC leadership survey) asked respondents to select from a
range of options what attributes they thought are most important for current and
future leaders of our ICs. On the matter of charismatic attributes, 87.6 per cent
of respondents (n = 128) indicated that charismatic qualities are either somewhat
important, important, or a very important attribute for an IC leader to have. Yet
interestingly, only 2.74 per cent (n = 4) thought that it was essential for IC lead-
ers to be charismatic to shift followers values. Why did most IC leaders surveyed
believe it was important to very important, but not essential for leaders to be
charismatic? Some survey respondents provided insights into why they believe
being charismatic is important. One respondent said being charismatic ‘excites
followers, shows you are interested in the field enough to energize others, and are
visibly interested in leadership’ (survey respondent 2). Others respondents also
commented that it was somewhat important to be charismatic though not neces-
sarily essential ‘so that you can engage and relate to the team and the executive
as well as those outside your immediate sphere of influence’ (survey respondent
3). Yet other comments suggested the extent that being ‘charismatic’ is impor-
tant was likely contextual to different IC agencies or even within agencies. Such
comments seem to challenge the critical importance of the single, all, and mighty
omnipotent charismatic leader. The following comment from survey respondent
1 encapsulates well some of these views:
It’s not possible to expand on all insights collected in the survey relating to char-
ismatic leadership attributes. But a closely connected attribute is transformational
Future IC leader and governance challenges 171
leadership, which as discussed in Chapter 2 has been the most empirically tested
theoretical approach in leadership studies. Similar to charisma being seen as
important/very important, 70.95 per cent of respondents (n = 105) also thought
it was important for leaders to exhibit transformational leadership behaviours in
the IC context. Of interest and in contrast to the low number (2.74 per cent) that
thought it essential for leaders to be charismatic, however, 24.32 per cent (n = 36)
of participants believed that IC leaders should be able to demonstrate transforma-
tional attributes. What accounts for the slight increase in the essential ranking for
transformational leadership attributes? At this point there is no clear answer to
explain the rating differences between charismatic and transformational leader-
ship. The low ranking (2.74 per cent) of respondents indicating the importance of
being charismatic as ‘essential’—yet the higher level (24.32 per cent) of others
suggesting being transforming as ‘essential’ at least in the survey context suggest
IC leaders see being able to transform people’s values and behaviours as most
important. So if this is true and an IC leader need not necessarily display charis-
matic qualities, what other behavioural characteristics will allow transformative
change?
A number of comments from respondents suggested that IC leaders must
have basic values that underpin any transformational behaviours in ICs. One
respondent encapsulated this point well, adding ‘one cannot lead if one does not
understand what is guiding and motivating those working beneath them.’ ‘More
important, one must have a strong set of personal values and standards that guide
how best such a transformation process can be implemented without sacrificing
integrity’ (survey respondent 78). Others also raised the importance of leaders
having values and beliefs that are in themselves ‘transformative’ that can chal-
lenge the conservatism of IC cultures, which are often resistant to change (survey
respondent 85).
These comments indicate some participants link the importance of leaders
having a strong set of personal values to being transformational leaders in the IC
context, yet do not specify what the values should be. However, other insights
provide clues of what specific values might promote transformational leader-
ship including trust, ethical behaviour, transparency, and authenticity (survey
respondents 15, 208). Other behaviours were also listed as being important, such
as mentoring.
What the survey results show is that it remains unclear how useful charis-
matic/transformational leadership theorising is to developing current and future
IC leaders. The survey sample size (n = 208) is obviously not representative of all
possible leadership perspectives from either former or current IC leaders across
the ‘Five Eyes’ countries. A more extensive collection of IC leader’s views on
various leadership attributes is required before accurate assessments can be made
about the relative weightings given to various attributes and why. It should also
be pointed out that survey question 8 was not designed to elucidate respondent’s
understanding of a particular leadership theory. It is possible that if the ques-
tion provided specific definitions of leadership theories respondents may have
weighted levels of attribute importance differently.
172 Future IC leader and governance challenges
Two factors influenced the more exploratory rather than empirical approach
adopted in the survey to garner insights about leadership attributes from IC
leaders. First, given the contestability and overlap in many leadership theories
about what attributes are most important, it made sense to allow IC leaders to
demonstrate their own understanding of leadership characteristics rather than
require them to respond through a particular theoretical prism. Second, due
to the absence of any substantial theorising currently on leadership in IC con-
texts, I took the view that designing survey questions should be influenced by
a grounded theory approach that would allow them to express their own val-
ues, beliefs, and practitioner perspectives on leadership. This would allow a
comparing and contrasting of insights with other non-IC leadership research (in
Chapter 2) yet at the same time help develop much needed leadership theorising
in the IC context.
The final two leadership attributes we are going to focus on here are ethical
behaviour and self-awareness by IC leaders. Out of all the nine leadership attrib-
utes survey respondents were asked to rate the relative importance of (from not
at all important to essential), 72.67 per cent (n = 109) believe IC leaders having
ethical attributes is essential. Or in total by adding those that stated it ‘essential’
to those that rated it either ‘somewhat important,’ ‘important,’ and ‘very impor-
tant,’ 99 per cent (n = 140) stated that it was important for IC leaders to be ethical.
As mentioned in Chapter 2, ethical leadership attributes are seen as important
to a range of follower-centric leadership theorists, particularly the research
perspectives of authentic, ethical, and servant leadership. Ethical attributes are
linked to both ethical and authentic leadership perspectives. Ethical leadership
is concerned with how IC leaders may negotiate the many ethical dilemmas they
face in running intelligence agencies. In several chapters we explored how ethi-
cal issues have historically intersected with intelligence leadership practice and
the impact this has on privacy, transparency, and accountability in liberal democ-
racies such as the ‘Five Eyes’ countries. Several comments from IC leaders sur-
veyed underscore the core role ethics plays in IC leadership. Simply put, one
said ethics is ‘fundamental to the profession and practice of intelligence’ (survey
respondent 21).
Briefly, the second follower-centric perspective—ethical leadership—is con-
cerned with how the leader’s actions result (or not) in ethical outcomes and how
these impact on the organisation they lead. This strand of follower-centric lead-
ership is clearly relevant to many other issues explored in this study given most
have an ethical dimension to the decisions leaders need to take. Additionally,
another respondent referred to the importance of being an ethical leader particu-
larly as the environment for collection and analysis becomes more difficult:
Several survey comments indicated the importance of ethical leadership in the con-
text of negotiating the integration of new technology into ICs (see Chapter 6 ICT).
Of interest, one respondent highlighted the problems associated with the intersec-
tion of new technology and technology and ethics as well as what other lead-
ership behaviours might strengthen ethical leadership. One said: ‘as technology
advances, intelligence practices may be ‘extra-legal.’ Ethical intelligence prac-
tices compliment other attributes like being ‘transparent and authentic’ (survey
respondent 27). This quote raises a critical point as IC leaders will continually
be called upon to understand not only the legal powers they can operate in, but
also how to ethically risk manage an increasingly complex and technologically
enabled operating environment.
It is likely that IC leaders will increasingly be faced both with a legislative per-
missive operating environment and/or one which does not keep up with techno-
logically enabled threats or collection methodologies. So referring back to survey
respondent 27’s comment, being able to assess the ‘extra-legal’ risks in operating
in such an environment will be a crucial leadership attribute and skill. Finally, in
the context of ethical attributes several IC leaders link this attribute to transpar-
ency in directing the mission and the leading and mentoring of others (survey
respondents 23, 60, 69).
Transparency as mentioned in Chapter 2 is also a key attribute of authentic
leadership. It remains difficult, however, to define this kind of leadership. In 2003,
Luthans and Avolio defined authentic leadership as ‘a process that draws from
both positive psychological capacities and a highly developed organisational con-
text, which results in greater self-awareness and self-regulated positive behav-
iours on the part of leaders and associates, fostering self-development’ (Luthans
and Avolio 2003: 243). Authentic leadership scholars argue that a leader’s posi-
tive values, beliefs, ethics, and their ability to develop transparency amongst other
characteristics impact on whether followers are more likely to adopt such quali-
ties—resulting in a better organisation (Walsh 2017: 444).
Another attribute of authentic leadership theory which scored highly in
the IC leadership survey was the need for the leader to be self-aware. Out of
150 respondents who answered question 8 (about leadership attributes), 54.67 per
cent (n = 82) thought that it was essential for IC leaders to have self-awareness.
Overall, 100 per cent (n = 150) stated that it was somewhat important, important,
very important, or essential for IC leaders to have self-awareness. But what does
it mean to ‘have self-awareness’ in the IC leadership context?
Four themes were discernible from the survey comments that provided some
clues about what self-aware leadership could mean in ICs. The first theme was
about being able to make evidence based and ethical decisions that allowed the
leader to know (to the extent that this is possible) they have made the right call.
Secondly, self-awareness was linked to the ability by leaders to promote a team
(less hierarchical) environment in order to navigate the increasingly complex
174 Future IC leader and governance challenges
security environment. Third, being self-aware was associated with effective inter-
personal skills and being positive and optimistic. Finally, several survey respond-
ents associated being self-aware to the leader knowing their own strengths and
weaknesses in order to better mentor others. Space does not allow a full detailing
of the various comments made by IC leaders surveyed about the importance of
self-awareness. However, the following two comments encapsulate the types of
sentiments expressed by several survey participants. On the theme of being able
to make evidence-based decisions, a point made now several times in this study,
one participant said a leader needs:
On the theme of knowing one’s own strengths and weaknesses, another respond-
ent said:
A leader who is not self-aware will usually fail to perform as a strong leader.
To be self-aware one must actively seek out constructive critique and respond
faithfully to what is received. Very good leaders actually develop a network
of sensors within their organization who can provide honest feedback on how
well they are performing and how they are being perceived. (survey respond-
ent 88)
Conclusion
This chapter assessed the significance of three significant and inter-related issues as
they relate to leadership in the IC context. First, it summarised the key governance
challenges that will continue to occupy the minds of likely generations of IC lead-
ers. Secondly, the chapter—while avoiding offering glib ‘silver bullet’ solutions
to the many governance challenges—provides strategic road maps so they could
start to be addressed in more systematic ways. Finally, Chapter 8 moved away
from the organisational governance issues and back to the individual IC leader. It
brought together the traditional leadership theorising discussed in Chapter 2 with
the insights gathered from IC leaders surveyed. The hope here is to generate deeper
conversations both in the IC workplace and with researchers about what leadership
attributes are important to improving outcomes across the ‘Five Eyes’ IC. Using
the insights gained about governance challenges and the significance of various
leadership attributes, Chapter 9 (Leadership Development) briefly explores what
principles could inform a leadership development framework for ‘Five Eyes’ ICs.
Note
1 Thomas Fingar was the first Deputy Director of National Intelligence for Analysis and
a Chairman of the National Intelligence Council.
References
Chang, W., & Tetlock, P. E. (2016). Rethinking the training of intelligence analysts.
Intelligence and National Security, 31(6), 903–920.
176 Future IC leader and governance challenges
Dhami, M. K. (2018). Towards an evidence-based approach to communicating uncertainty
in intelligence analysis. Intelligence and National Security, 33(2), 257–272. doi:
10.1080/02684527.2017.1394252
Lim, K. (2016). Big data and strategic intelligence. Intelligence and National Security,
31(4), 619–635. doi: 10.1080/02684527.2015.1062321
Luthans, F., & Avolio, B. (2003). Authentic leadership development. In K. Cameron,
J. Dutton & R. Quinn (Eds.), Positive organizational leadership (pp. 241–258). San
Francisco, CA: Berrett-Koehler.
Walsh, P. F. (2011). Intelligence and intelligence analysis. Abingdon: UK: Routledge.
Walsh, P. F. (2015). Building better intelligence frameworks through effective governance.
International Journal of Intelligence and Counterintelligence, 28(1), 123–142. doi:
10.1080/08850607.2014.924816
Walsh, P. F. (2017). Making future leaders in the US intelligence community: challenges
and opportunities. Intelligence and National Security, 32(4), 441–459. doi:
10.1080/02684527.2016.1253920
9 Leadership development
Introduction
In this final chapter, based on the synthesis of all the data including insights gath-
ered from the 208 former and current IC leaders who participated in the study’s
survey, I explore what leadership principles are potentially most germane to the
implementation of IC leadership development programs. A second objective is to
use these principles in order to provide the reader with a broad leadership devel-
opment framework. The hope is that the framework offered here will help inform
leadership development programs for ‘Five Eyes’ ICs and others across similar
liberal democracies.
Neither the discussion below on leadership development principles nor the
framework, however, should be construed as either exhaustive or immutable.
Indeed, I would welcome hearing from scholars and IC leaders on how this frame-
work can be built upon further to better inform leadership development programs
in ICs. In short, the framework should be seen as a catalyst for further research
and discussion, not an endpoint in itself.
Leadership development
As mentioned in the introduction (Chapter 1), I deliberately choose a very broad
definition of IC leaders (from team level up to executive heads of agencies or
communities). Given such diversity, one should expect to see a cross spectrum
of opinions about the attributes, skills, and competencies IC leaders need to
develop—depending on one’s own professional journey and levels of seniority.
I did wonder when analysing the data whether it would have been better to have
pitched the relevant survey questions on leadership development to a particular
career stage (early, mid, or senior). This could have provided a more focused set
of suggestions—perhaps on what a certain level of IC leader requires developmen-
tally. It would be useful in a subsequent study to focus on one particular level of IC
management—for example head of agency or middle-management—to identify
more granularity in leadership development frameworks relevant to these levels.
Nonetheless, as a starting point, and given there still is an absence at least
publicly on what kinds of attributes, skills, and competencies should inform IC
178 Leadership development
leadership development, I argue having a broader, diverse set of views from dif-
ferent levels of seniority captures important information about both what senior
leaders expect of themselves as much as what lower level leaders expect of them-
selves and vice versa. Putting a leadership development framework forward, how-
ever tentative, will hopefully generate discussion on how development should be
sequenced through the advancement of current and future IC leaders’ careers. The
hope is that a working framework can also provide a taxonomy of principles to
guide more in-depth empirical reflection on what works best in developing our
leaders and why.
Before getting into detail about what the development framework might
include, it’s worth briefly mentioning two additional survey questions included
in the study—the results of which though requiring further analysis could influ-
ence how ICs conceptualise leadership development programs. The first question
(question 20) posed a series of five sub-questions about leadership background,
experience, and training. The first sub-question posed a negatively worded ques-
tion: that IC leaders did not need a background in intelligence to be an effective
leader. A total of 71 per cent (n = 71 out of a total of 91 respondents) either strongly
disagreed or disagreed with this statement. This implies that most respondents
believed IC leaders did need an IC background to be effective leaders in this
context. Question 20 also asked IC respondents to rate the importance of length
of experience (five years or more), as well as if a leader from a relevant national
security/law enforcement policy area would be just as effective being an IC leader
than those who climbed through the ranks. On length of experience, 66.6 per
cent (n = 66) stated they thought at least five years (and more) was a reasonable
time frame for IC leaders to develop leadership expertise. Regarding the question
whether a senior leader from a policy background (e.g. national security or law
enforcement) will more than likely be an effective IC leader—44 per cent (n = 44)
strongly disagreed/disagreed with this statement. The results were more mixed. A
large proportion of respondents (32.32 per cent n = 32) were neutral on the ques-
tion, and only 22.22 per cent agreed that a leader from a policy area could be an
IC leader. I would have thought that there would have been a closer association
between the 71 per cent who argued that leaders should have a background in the
IC versus the 44 per cent who disagreed that someone with a policy background
would be an effective IC leader. I would have expected the latter to be higher in
line with those who overall rated the necessity for IC leaders to have an intel-
ligence background.
The relatively high number of respondents (32.32 per cent) or around one-third
of the total 99 responses who clicked ‘neutral’ for whether leaders from policy
backgrounds would be effective IC leaders could be interpreted as a belief overall
that effective IC leaders should come from the community, but there remains a
lack of clarity based on the survey results of whether those from policy back-
grounds could make effective IC leaders with only 22.22 per cent (n = 22) agree-
ing that they would be good leaders. At this point, it’s unclear what is behind the
discrepancies in some of question 20 responses. A larger sample response may
help explain further IC beliefs in regards to IC vs policy background for future
Leadership development 179
IC leaders. Additional targeted interviews of all IC leaders who completed the
survey might have also helped resolve these different views. However, in reality,
we know that across the ‘Five Eyes’ IC leaders often come from policy roles and
vice versa, so the more instructive question might be the length of experience a
leader can accrue within the IC in addition to any other professional experience
they bring to the role. The fifth and final sub-question (for question 20) asked
whether respondents agreed with the statement that there was insufficient training
for aspiring leaders in ICs. A total of 81.81 per cent of 99 respondents (n = 81)
either strongly agreed or agreed with this statement with only 3 per cent agreeing
that there was sufficient training for our future IC leaders.
Again to emphasise, this is a very small sample size of all potential IC leaders
who may have an opinion one way or the other on this matter. Further sampling
and targeted interviewing would be the next step to fully assess how reliable this
view was for the greater population—particularly lower level IC leaders. It is
clear there are a number of diverse and even conflicting views about whether IC
leaders had sufficient training—or indeed even needed any training. For example,
two respondents believed that IC leaders didn’t need any type of training—yet
then suggested they receive training in management, research, and government
experience beyond the IC (survey respondents 10 and 113). It is likely that ‘train-
ing’ and ‘experience’ mean different things to people and how IC leaders under-
stand and use terminology in the context of leadership development also requires
further investigation. Nonetheless, the results discussed above underscore at least
some belief amongst the IC leadership cadre that currently training initiatives are
lacking across the broader IC.
Technical training
Not surprisingly, several IC leaders surveyed for the study suggested a range of
technical issues current and aspiring leaders needed ‘training’ in. There were
diverging views on what this training should consist of and how it should be deliv-
ered. Some comments were also vague and offered little details such as ‘IC lead-
ers needed to stay current and take time out for training’ (survey respondent 70),
though at times there were comments that were a lot more granular and provided
specific areas where IC leaders thought knowledge, skill, and capabilities were
lacking. Again, there was no surprise given earlier comments made about the
importance of AI that several respondents highlighted the need for greater under-
standing about AI, but also in the context of IC leaders being more competent
in STEM subjects. Greater investment in specialised in-house training combined
with higher education was mentioned frequently by respondents as ways to help
182 Leadership development
improve STEM capability gaps. In addition to AI, several STEM areas were also
listed that IC leadership training programs could consider incorporating, includ-
ing but not limited to big data, biometrics, encryption, and the dark net (survey
respondent 70). In the social-behavioural sciences (political sciences/international
relations, sociology, psychology, and criminology), some respondents suggested
that in addition to ‘on the job experience’ IC leaders should be given opportunities
to complete an MA or even a PhD in a relevant area study (survey respondent 23).
However, there was less detail provided in what areas of study are more critical
over others.
Mentoring
Mentoring is linked to the first theme above (individual behavioural attributes).
First, in order for leaders to be able to reflect deeply on their behaviours, self-
mission, and be able to clarify values, there needs to be as part of this process
opportunities to receive mentoring from more senior leaders. Learning from
others’ experience has to varying degrees of intensity been done within ICs.
However, in addition to receiving mentoring from other more senior IC leaders,
I would suggest further opportunities be considered outside the agency—poten-
tially in another agency/industry or someone in academia to expand their thinking
on how to promote more helpful leadership styles and how these impact their
staff. There may be the need for some background vetting of external mentors,
but I think ICs could risk manage such exercises in ways that allow an aspir-
ing leader opportunities to reflect generally and non-operationally on leadership
identity and challenges yet at the same time not breaking any secrecy laws. The
importance of mentoring in any IC leadership development framework was well
underscored by two IC leaders: ‘mentor the most promising people and provide
opportunities for cross organisational assignments to broaden a future senior man-
ager’s perspective. For senior analysts put them in close contact with their clients
and customers so that they learn their needs and constraints’ (survey respondent
79). ‘Every intelligence organisation I have served with is a team. Mentorship
is how we build the next generation’ (survey respondent 122). This later quote
from survey respondent 122 sums up well the importance of IC leaders learning
to mentor staff not as a perfunctory bureaucratic exercise, but in ways that can
actually impact positively on the personal professional growth of individuals and
their organisations.
Evaluation
Somewhat expectantly there were a number of comments from IC leaders sur-
veyed about the need for leaders to improve their own skills, knowledge, and the
Leadership development 185
capabilities of their agencies in measuring what is working and what isn’t. This
was encouraging as a critical point that has emerged throughout this study is that
IC leaders can only solve the many governance challenges identified by evaluat-
ing evidence for what works in ameliorating them. In terms of evaluating one core
part of the IC business, for example, the ‘effectiveness’ of analytical products,
several respondents described the need for products to be timely, objective, use-
able, ready, complete, and accurate (survey respondent 43). Such measures as
listed here are of course largely subjective—meaning different things to the vari-
ous ICs and decision-makers who use the various products. While the crude ‘tick
and flick’ product evaluation forms that used to be attached to most intelligence
products have gone the way of the dodo bird, IC leaders will still need to over-
see the implementation of less course qualitative metrics to evaluate intelligence
products in the future and adjust format and style—but not of course analytical
rigour. More recently we have seen how the distillation of text products into info-
graphics or shorter dot points delivered on iPads is partly due to decision-maker
feedback, but it is also the result of decisions taken by IC leaders to improve prod-
ucts based on internal evaluation. Another IC leader raised a further qualitative
metric ‘value’ for evaluating product—though again it remains difficult to define
uniformly, their answer did suggest ways IC leaders could further define ‘value’
for decision-makers.
A leader must seek out value promoting data and information to always be
consolidating their team efforts and products. Where possible tasking prod-
ucts with the additional benefits of risk reduction, cost effectiveness, loss
prevention, for example. Utilising various industries methodology to value
tangible and intangible benefits. For example, identifying that failures may
cost lives, property, ongoing health issues, lost revenue, disruption to com-
merce, political support loss, and reputational loss. As much as being an
“incident” without included costs (survey respondent 38).
Being able to provide products, however, that allow for enhanced empirical and
qualitative analytical judgements that better estimate harms or identify opportuni-
ties for intervention will require IC leaders to, as noted in Chapters 5 (Analysis)
and 7 (Human Resources), invest in analysts who can do this as well. In addi-
tion, IC leaders as noted earlier should expand academic outreach programs that
can help bolster evidence-based analytical approaches. Of course, as some survey
respondents remarked, not everything can be quantified (survey respondent 70),
nonetheless the evolving security environment will demand that IC leaders in
the broader institutional sense (not just in products) can demonstrate value add
and value for money invested. Hence, IC leader development programs should
include modules on various multi-disciplinary approaches to evaluating perfor-
mance of core intelligence processes and key enabling activities. Mid-career lead-
ers, for example, would likely benefit from having some literacy in evaluation
research principles and how they have been applied in other fields (e.g. polic-
ing, health, and corporate settings). IC leaders should learn both internally from
186 Leadership development
their strategic, policy, and governance units and from academic researchers how
to construct meaningful KPIs for different aspects of strategic, operational, and
tactical activities, particularly as they relate to the various governance challenges
identified. Evaluation planning learning modules should also include foresight
analysis that helps IC leaders map likely capability investments that are five years
away and how well they are progressing toward these requirements bi-annually.
Finally, no evaluation skills, knowledge, and competencies module would be
complete without inclusion of material, which can get IC leaders to reflect on
current communications/stakeholder influencing strategies and how they can
improve value to decision-makers in more agile ways.
Conclusion
This chapter provided a synthesis of all the analyses presented in previous chap-
ters in order to identify leadership principles that should inform an IC leadership
development framework. It is hoped that the IC leadership development frame-
work presented in Table 9.1 will be used to generate further theorising about
190 Leadership development
leadership development in the IC context. However, even more importantly, it is
hoped that the framework can help inform discussions within ICs about designing
much needed leadership development programs. In Chapter 10 (Conclusion), I
summarise the key findings of the study and suggest some next steps for schol-
ars and practitioners who are interested in advancing the next generation of IC
leaders.
Note
1 The MSCEIT (the Mayer-Salovey-Caruso EI Test) measures reasoning ability of an
individual given emotional information and series of problems and assesses their solv-
ing competencies based on emotions or problems that require the use of emotions to
be solved. Genos is an emotional intelligence testing instrument that examines a set of
emotionally intelligence competencies that according to its creator are measurable and
observable. The six core emotional intelligence competencies to be assessed are: self-
awareness, awareness of others, authenticity, emotional reasoning, self-management,
and positive influence.
References
Bar-On, R. (1997). BarOn emotional quotient inventory. Multi-Health Systems.
Chhotray, V., & Stoker, G. (2008). Governance theory and practice: A cross-disciplinary
approach. London, United Kingdom: Palgrave Macmillan UK.
Cooper, R. K., & Sawaf, A. (1998). Executive EQ: Emotional intelligence in leadership
and organizations. London: Penguin.
Goleman, D. (1998). The emotional intelligence of leaders. Leader to Leader, 10(10), 20–
26. doi: 10.1002/ltl.40619981008
Hyden, G., Court, J., & Meae, K. Eds. (2004). Making sense of governance: Empirical
evaluation from 16 countries. Boulder and London: Lynne Rienner Publishers.
Kaufmann, D., & Kraay, A. (2007). Governance indicators. Where are We, where We
should We be going. Policy Research Wing. Washington DC: World Bank, Paper 4730.
Mayer, J. D., Salovey, P., Salovey, P., & Sluyter, D. (Eds.) (1997). Emotional development
and emotional intelligence: Implications for educators. In What Is Emotional Intelligence
(pp. 3–31). New York: Basic Book.
Petrides, K. V., & Furnham, A. (2000). On the dimensional structure of emotional
intelligence. Personality and Individual Differences, 29(2), 313–320. doi: 10.1016/
S0191-8869(99)00195-6
Petrides, K., Furnham, A., & Mavroveli, S. (2007). Trait emotional intelligence: Moving
forward in the field of EI. Emotional Intelligence: Knowns and Unknowns, 4, 151–166.
Pierre, J., & Peters, B. (2000). Governance, politics and the state. Basingstoke: Palgrave
Macmillan.
Sinek, S., Mead, D., & Docker, P. (2017). Find your why. In Penguin. New York, NY:
Portfolio.
Walsh, P. F. (2017b). Teaching intelligence in the twenty-first century: Towards an
evidence-based approach for curriculum design. Intelligence and National Security,
32(7), 1005–1021. doi: 10.1080/02684527.2017.1328852
10 Conclusion
Introduction
As noted in Chapter 1 (Introduction), this book had four research questions:
The preceding chapters went some way to addressing the four questions. However,
as noted several times in different chapters, it is difficult to answer them fully. The
knowledge gained from both the primary and secondary sources has moved the
needle slightly in the direction of understanding different aspects of IC leadership.
But the questions are complex and largely open ended. To be fully answered, it
will take a concerted effort by researchers and the ICs themselves to address the
still significant knowledge gaps related to all four questions. In this final chapter,
I provide a summary of key outputs and show how they have addressed aspects of
the four research questions. The final section (future IC leadership practice) then
provides a short summary of how scholars and ICs can continue to build on the
research laid out in this book.
With regards to the first research question, (what is leadership in the con-
temporary IC context)—several chapters provided insights into this. Chapter 2
(Intelligence and Leadership) went a long way to addressing the question by adopt-
ing a multi-disciplinary approach to understanding IC leadership. By using five
multi-disciplinary knowledge areas (historical analysis, leadership theory, organi-
sational theory, leadership psychology, and the effective intelligence framework),
the chapter argued for a broader approach to understanding leadership in the IC con-
text rather than through the lens of just one discipline. This approach is important
192 Conclusion
because at this stage contemporary IC leadership is significantly under-theorised
and a multi-disciplinary approach to studying it will bring richer perspectives—
beyond a narrow intelligence studies perspective. Additionally, Chapters 8 (The
Future IC Leader and Governance Challenges) and 9 (Leadership Development)
provided further insights into both individual and organisational aspects of IC
leadership. In particular, significant insights about ‘what is leadership in the IC’?
was gathered from the 208 IC leaders who responded to the survey. The thematic
analysis (facilitated through the qualitative software NVIVO) did show a num-
ber of leadership attributes leaders thought were important. Many of these were
aligned with attributes traditional leadership theorists also view as critical to vari-
ous leadership styles and research agendas (e.g. transformational and authentic
leadership), though the relevant survey questions did not ask respondents whether
they thought a particular leadership theoretical perspective was important. This
question was avoided in the survey because even in mainstream leadership theory
there remains significant contestability about what attributes constitute different
theories and how they impact on followers. The objective, therefore, was not to
provide respondents with a pre-ordained theory upon which they had to weigh
in on its significance or not. Had I asked respondents which leadership theory is
most important and why, I suspect I would have gotten fewer richer insights from
IC leaders about what attributes they thought most important—particularly from
those who may not have formally studied leadership theory.
The second research question asked whether ‘intelligence governance’ is a
useful construction to understanding IC leadership, and what are the key gov-
ernance challenges IC leaders will need to navigate through. As noted earlier,
‘intelligence governance’ was a term I began using in 2011 in the context of the
effective intelligence framework (see Chapter 2 Intelligence and Leadership). The
framework was first published in my book Intelligence and Intelligence Analysis,
and a key conclusion I came to at that time was ‘intelligence governance’ was a
useful construct to think about how leaders coordinate core intelligence processes
and key enabling activities to ensure IC effectiveness and adaptability over time.
This means that to be a good leader you also have to understand intelligence gov-
ernance. Without a good grasp of ‘intelligence governance’ it seems less likely
that IC leaders are able to make effective collective decisions, which consider
the inter-connectedness of both core intelligence processes and key enabling
activities.
In this study, I have been able to build further on this concept of ‘intelligence
governance’ by asking surveyed IC leaders about whether they thought this con-
cept was relevant to understanding IC leadership and its organisational impact.
Question 15 asked four sub-questions. The first was stated negatively—that
developing good intelligence governance of an intelligence organisation or func-
tion was not related to having a good leader in charge. Combined, 75.35 per cent
(n = 79) indicated they either strongly disagreed or disagreed with this statement—
suggesting that most respondents believe good governance was linked to having
an effective leader in place. The second sub-question asked respondents whether
they believed that ‘intelligence governance’ was the most critical element in
Conclusion 193
bringing effective coordination, cooperation, and integration of intelligence pro-
cesses. Of the 106 who provided an answer, 70.1 per cent said they either strongly
agreed or agreed that intelligence governance was the most critical element in
bringing many of the key core intelligence processes together, particularly those
mentioned in Chapter 3 (Tasking and Coordination), Chapter 4 (Collection), and
Chapter 5 (Analysis). The third sub-question sought to discover whether IC lead-
ers surveyed also thought if leaders who gained skills and attributes would result
in effective intelligence governance. Out of 106 responses, 67 per cent either
strongly agreed or agreed that if IC leaders had relevant skills, experience, and
attributes this would result in effective intelligence governance in their workplace.
This is an important validation of the link between improving leadership skills
and effective intelligence governance—one which was developed further in both
Chapters 8 (The Future IC Leader and Governance Challenges) and 9 (Leadership
Development). The final sub-question on intelligence governance asked whether
IC leaders thought political leaders rather than themselves had more impact on
intelligence governance outcomes. Out of 106 respondents, 43 per cent disagreed
with the statement, but a similar amount agreed with it. It’s clear this last sub-
question does not provide any meaningful result. In Chapter 2 (Intelligence and
Leadership) and 3 (Tasking and Coordination), we did note the powerful influ-
ences of external governance actors (political leaders) on IC operations and
reform. But it was also pointed out that IC leaders still have significant leeway
in directing internal governance in their ICs. In summary, the survey results on
the importance of intelligence governance to IC leadership suggest most IC lead-
ers (who participated in the survey) believed it was critical to improving various
organisational outcomes—and that having good governance meant having good
leaders in place.
Turning now to the second part of research question 2 (what are the key gov-
ernance challenges IC leaders will need to navigate), Chapters 2–9 explored sev-
eral that will consume the attention of leaders well into the future. In each chapter,
specific governance challenges were clustered around several themes including,
but not limited to, organisational structure and culture, collaboration, information
sharing, technological innovation, ethics and efficacy, and workforce planning.
Chapter 8 (The Future IC Leader and Governance Challenges) provided a sum-
mary of governance challenges detailed in earlier chapters and assessed how they
are related. More importantly, Chapter 8 suggests several strategic initiatives IC
leaders could consider to begin tackling the governance challenges identified. I
will not repeat the complete list of strategic initiatives listed in Chapter 8—but
they ranged across the full set of key governance challenges in tasking and coor-
dination, collection, analysis, ICT, and human resources. In brief, they included
initiatives from implementing performance teams that can evaluate the interde-
pendence of requirements, priorities, and agency/IC response (for tasking and
coordination)—to analytical innovation strategies (analysis)—and also to IC AI
and workplace strategic planning (ICT and human resources).
The fourth and final research question asked what individual attributes, skills,
and capabilities are critical for the next generation of IC leaders to develop, and
194 Conclusion
what principles could underpin leadership development programs. This ques-
tion was partly addressed in the last section of Chapter 8 (The Future IC Leader
and Governance Challenges), but more significantly dealt with in Chapter 9
(Leadership Development). As noted in Chapter 8, respondents were asked what
leadership attributes they think are most important and why. The two standout
attributes IC leaders rated most highly were ethics and self-awareness, though
several other attributes were also identified and rated by respondents as also being
important, such as the ability to embody key values that allow a leader to trans-
form an organisation.
The analysed survey data on leadership attributes in some ways aligned to vari-
ous leadership theoretical and research agendas discussed in Chapter 2 (Intelligence
and Leadership). But as noted earlier, the results do not indicate whether IC lead-
ers were rating attributes based on prior knowledge of any traditional leadership
theories outside of the IC context. Regardless, what the survey results do provide
is a foundation upon which to build larger studies about what ICs think are the
most important leadership attributes to develop in the next generation of leaders.
The Future IC Leader and Governance Challenges, Chapter 8’s discussion of lead-
ership attributes, then informed analysis in Chapter 9 (Leadership Development)
about what principles could be included in a leadership development framework
for future leaders. As noted, the principles are individual behavioural attributes,
technical training, strategic and business planning, mentoring, evaluation, and
lastly training and education strategies.
Page numbers in italics represent figures, while page numbers in bold represent tables.