Jurnal 5
Jurnal 5
To cite this article: Arthur S. Hulnick (2006) What's wrong with the
Intelligence Cycle, Intelligence and National Security, 21:6, 959-979, DOI:
10.1080/02684520601046291
Taylor & Francis makes every effort to ensure the accuracy of all
the information (the “Content”) contained in the publications on our
platform. However, Taylor & Francis, our agents, and our licensors
make no representations or warranties whatsoever as to the accuracy,
completeness, or suitability for any purpose of the Content. Any opinions
and views expressed in this publication are the opinions and views of
the authors, and are not the views of or endorsed by Taylor & Francis.
The accuracy of the Content should not be relied upon and should be
independently verified with primary sources of information. Taylor and
Francis shall not be liable for any losses, actions, claims, proceedings,
demands, costs, expenses, damages, and other liabilities whatsoever
or howsoever caused arising directly or indirectly in connection with, in
relation to or arising out of the use of the Content.
This article may be used for research, teaching, and private study
purposes. Any substantial or systematic reproduction, redistribution,
reselling, loan, sub-licensing, systematic supply, or distribution in any
form to anyone is expressly forbidden. Terms & Conditions of access
and use can be found at http://www.tandfonline.com/page/terms-and-
conditions
Downloaded by [Eindhoven Technical University] at 15:16 07 July 2014
What’s Wrong with the Intelligence Cycle
ARTHUR S. HULNICK
In the modern era, almost all intelligence professionals will study the
Downloaded by [Eindhoven Technical University] at 15:16 07 July 2014
Intelligence and National Security, Vol.21, No.6, December 2006, pp.959 – 979
ISSN 0268-4527 print 1743-9019 online
DOI: 10.1080/02684520601046291 ª 2006 Taylor & Francis
960 INTELLIGENCE AND NATIONAL SECURITY
the future. Consumers will sometimes tell intelligence managers what they are
worried about, or the direction in which they intend to take policy, but not
always.
Still, it is usually not too difficult for intelligence managers to learn what
policy makers are up to, though the managers often have to take the initiative
to obtain the information. If intelligence managers at various levels are in
touch with their policy counterparts, this sharing of information may work
quite well. Over the years, intelligence managers have tried to systematize
this process by asking policy officials to provide specifics on their concerns.
Downloaded by [Eindhoven Technical University] at 15:16 07 July 2014
The second step is equally incorrect. Collection managers cannot wait for
guidance in regard to gaps in the intelligence data base to begin the collection
process. The gaps will be filled once the collection process is underway. For
example, in running espionage operations, commonly called HUMINT (for
HUman INTelligence), it may take months or years to find a person who has
access to the information needed, and is willing to be recruited as a spy. The
same may be true for technical collection sensors. Satellites in space, which
make up many of the sensor platforms, are not nearly as flexible as managers
would wish. Thus, anticipating the intended targets cannot be overlooked. For
example, during the British confrontation with Argentina over the Falkland
Islands, the US could not help the British with space imagery because the
satellite, programmed to observe the Soviet Union at that time, only passed
over the Falklands at night.
WHAT’S WRONG WITH THE INTELLIGENCE CYCLE 961
For all these reasons, intelligence managers, and not policy officials, are the
real drivers of the intelligence collection process. Clearly, intelligence moves
from collection to analysis, as the Intelligence Cycle holds, but analysts do
not always need new intelligence material to understand world events. The
data base is already so large that a competent analyst could write about
most events without any more than open sources to spur the process. The
incremental addition of new intelligence from human sources or technical
sensors may modify the analytic process but rarely drives it.
The job of the analyst is, in part, to evaluate raw material and put it in
perspective. The analyst receives intelligence material from a variety of
sources, including media reports, official reports from other government
agencies, as well as reports from the intelligence collection process. In my
experience as a practicing analyst in the military and in CIA, raw reports
from human sources or technical sensors are sometimes fragmentary, biased,
contradictory, or just plain wrong. In order to analyze the data, the analyst
compares the new material with the existing data base and previous analysis.
Hanging a finished product, whether it is current reporting or a longer range
estimate, on one source usually does not work well. This is apparently what
happened in the case of the estimate on weapons of mass destruction (WMD)
in Iraq that helped trigger the invasion of that country. The estimate was
based, in part, on the reporting of one rather poor and unreliable source. The
estimate turned out to be quite wrong, as we now know.4
OPERATING IN PARALLEL
officials may not see a great deal of the raw reporting, there are usually watch
centers at the various policy agencies that screen the raw reporting and send
forward the most interesting ones.
Unfortunately, as I have already noted, some of this raw intelligence may
be incomplete, contradictory, or just wrong. Policy officials sometimes take
the reporting as having been judged and evaluated. Thus, I have heard
officials say that CIA has reported an event when in fact what the officials
have seen is an unevaluated agent report passed along to them by their watch
centers. It is not possible to stop this flow of raw reporting. As Bob Gates, the
Downloaded by [Eindhoven Technical University] at 15:16 07 July 2014
former Director of CIA once noted to me, once the spigot is opened it is not
possible to close it, even though allowing consumers to have raw reporting at
about the same time as the analysts receive them creates some serious
problems for the analysts. Collection managers often take a different view.
They believe they are doing a great service to the policy community by
providing this raw reporting. If the Intelligence Cycle really worked, the
circulation of raw reports to policy officials would not happen.
A MAJOR PROBLEM
BARRIERS TO COMMUNICATION
locating them have not always been successful. Agency managers have
pushed analysts to take tours overseas with field stations, but it is more
difficult for an operations officer to serve a tour as an analyst. Similar issues
may not arise in other intelligence agencies unless they have co-equal
collection and analysis components.
The Defense Intelligence Agency (DIA), for example, was immune to this
sort of ‘stovepipe’ problem because it was mostly an analytic rather than a
collection agency. As defense HUMINT grows, perhaps the same problem
will arise. The National Security Agency (NSA) and the National Geo-Spatial
Intelligence Agencies (NGIA) are devoted mostly to collection, but they
tend to be tightly compartmented, creating a different kind of ‘stovepipe’
problem. In theory, all the intelligence agencies should share raw data and
coordinate analysis, but for a variety of reasons they do not always do so. This
was one of the main critiques of both the 9/11 Commission and the
Commission investigating the intelligence failure surrounding the failed
estimate on WMD.
A MIXED BAG
more easily sharing their best and most sensitive data? It would be nice to
think so, but experience shows that this does not always happen, even at the
highest level.
IN-DEPTH STUDIES
The same might be said for the myriad in-depth intelligence studies churned
out by the analytic components. These studies have proliferated in recent
years, although they were rarely attempted at the beginning of the Cold War.
These studies are designed to provide in-depth analysis on specific subjects
and are meant more for policy officials at working levels rather than senior
decision makers, who rarely have the time to read them. These studies are
helpful in forcing analysts to come to grips with a specific subject, provide
Downloaded by [Eindhoven Technical University] at 15:16 07 July 2014
The estimate is a creature of the Cold War, but has its roots in World War II.
It is supposed to be a forecast of the future which decision makers can use to
build policy, just as the Intelligence Cycle proposes. The estimate is supposed
to be drawn by analysts from all the producing agencies, coordinated by the
analysts among themselves to reach an agreed forecast, with dissenting views
included. Then it is blessed by the agency leaders, signed off at the top and
sent to the president, the National Security Council and staffs, and serves
as the basis for policy discussions. There are actually cases where this has
WHAT’S WRONG WITH THE INTELLIGENCE CYCLE 967
know when they were heading in the wrong direction, this is not usually the
case. Policy consumers do not welcome intelligence that is non-confirming,
perhaps because the large egos that brought them into positions of power do
not permit admissions of ignorance.
In the early days of the Cold War, the founders of the CIA debated the extent
to which intelligence should be close to policy. Sherman Kent, a Yale
professor who went on to establish the national estimates system in CIA, and
Downloaded by [Eindhoven Technical University] at 15:16 07 July 2014
one of the early thinkers about the intelligence process, believed, as did ‘Wild
Bill’ Donovan and others, that if intelligence became enmeshed in the policy
process it would lose its value. Kent argued that the best way to avoid
politicization of intelligence was to remain distant and aloof. Later, Roger
Hilsman, one of the intelligence chiefs at the State Department, took a
different view. Hilsman thought that intelligence had to be close to policy to
remain relevant.11 The experiences of the Bush era suggest that Kent may
have been right all along.
Nonetheless, other studies have shown that there must be good communi-
cation between policy consumers and intelligence managers if intelligence is
to be on target and meet the needs of decision makers. At the same time,
intelligence managers have to stand up to efforts by policy officials to skew
intelligence judgments when the conclusions are at variance with the political
proclivities of partisan officials. No one said this would be easy. It is a con-
stant challenge to provide ‘truth to power’. Intelligence must deliver the
unvarnished bottom line. Policy officials can go elsewhere for politicized
information if they wish, but at their own peril.
LOOKING AT COUNTER-INTELLIGENCE
MORE DIVERSE
USING INFORMANTS
After 9/11, a good deal of controversy arose over the use of intelligence
gained from the interrogation of detainees, either overseas or here at home.
Some men of Middle Eastern Muslim extraction who were not US citizens
were required to register with the federal government. Some of these people
had irregularities in their visas, had overstayed in the US, or were in the US
illegally. They were detained in somewhat harsh conditions and, in some
cases, badly mistreated. It did not appear, however, that much effort was
made to find out if any of them had ties to terrorism.
At the same time, as the US geared up to take down the Taliban
government in Afghanistan, some Taliban fighters or people associated with
WHAT’S WRONG WITH THE INTELLIGENCE CYCLE 971
at this location that the worst abuses took place. Apparently, unschooled,
unscreened, untrained guards were turned loose to abuse the prisoners in the
mistaken belief that this would ‘soften them up’ for interrogation. All of these
situations involving detainees were handled badly.
Long experience has taught that there are effective ways to interrogate
prisoners, using methods that do no harm to the subjects while produ-
cing useful intelligence. Unfortunately, those lessons were not applied
effectively in the post-9/11 situations. The literature on interrogation
methods, on training interrogators, on handling subjects should have been
readily available to anyone involved in trying to extract intelligence from
detainees. Anyone who has been involved in intelligence-style interrogations
knows that torture is ineffective and counter-productive, as well as abhorrent
and illegal. Since those experiences, the rules have been changed to exclude
such behavior by US officials.
A good interrogation may yield only bits and pieces of information, but if
intelligence collectors are careful, they may be able to piece together a
broader picture from a series of subjects. The main aim, of course, is to try to
learn something about the cells, or units that the subjects have come from,
especially about their plans for future operations.
After the ‘bad guys’ have been identified, a decision has to be made about the
kinds of operations that will be mounted to stop whatever kind of plan or
activity might be underway against US interests. This creates a dilemma.
Usually, intelligence officers will press to extend or broaden the collection
effort to make sure that all the ‘bad guys’ have been identified and located. At
the same time, law enforcement officials are eager to bring the ‘bad guys’ to
justice. This creates a serious problem, often described as the ‘cops and spies’
dilemma.16
The divisions between law enforcement and intelligence in the US have
deep roots. Unlike many other industrialized countries, the US does not have
a domestic intelligence service, such as the MI-5 in Great Britain, or the
972 INTELLIGENCE AND NATIONAL SECURITY
DST in France. Instead, the US has relied for many years on the FBI, which is
really a law enforcement organization, to gather counter-intelligence and
then act to bring lawbreakers to justice. In other countries, the domestic
intelligence services collect and analyze counter-intelligence in parallel with
counterpart foreign intelligence organizations, which work beyond the
country’s borders. When suspected criminal behavior is uncovered, the
domestic intelligence services may turn to national police organizations to
carry out law enforcement operations against the suspects.
Downloaded by [Eindhoven Technical University] at 15:16 07 July 2014
In the US, however, where no domestic intelligence service has existed, there
have been both legal and procedural barriers between the national intelli-
gence services, whose focus has been almost exclusively abroad, and the FBI,
which has always had a role in domestic counter-intelligence. Traditionally,
counter-intelligence collected abroad was passed to the FBI, which then
determined, usually in consultation with the Justice Department, whether or
not there was probable cause to open a criminal investigation. This would be
used to gather evidence that could be brought if a court case arose. This was
different from the gathering and analysis of intelligence data, which
traditionally was not treated or handled as evidence.
Because of cover considerations and the need to protect the identity of
intelligence officers, intelligence managers did not want their people to have
to appear in court, and wanted as well to protect the sources and methods
used to collect intelligence. The FBI was under no such strictures, but the
evidence gathered had to be backed by appropriate warrants and protected
according to legal standards. The Aldrich Ames case is a perfect example of
how this system used to work.
A joint CIA and FBI team was able to track down Ames and identify him
as a Soviet mole in the CIA. Then the FBI obtained a warrant under the
Foreign Intelligence Surveillance Act (FISA) to be certain that they had the
right target. Once that was done, a second FBI team, with a criminal warrant,
took over the investigation and gathered evidence that might be used to
prosecute Ames. In the end, Ames agreed to a plea bargain and the case never
came to court, but it illustrates how a firewall was in place to separate the
counter-intelligence investigation from the criminal one.17
Since 9/11, some the barriers between intelligence and law enforcement have
been weakened, but the cops and spies dilemma still exists. Under the new
rules, the FBI may levy requirements on the US intelligence services to
WHAT’S WRONG WITH THE INTELLIGENCE CYCLE 973
collect information specific to their domestic needs. It is not yet clear if such
intelligence would be used as evidence in court cases. More likely, the
FBI would ask that intelligence be gathered to support its newly created
National Security Service, which combines the FBI’s older counter-terrorism
and counter-intelligence units with its newer intelligence bureau, created after
9/11.
At the same time, the CIA and the FBI have drawn more closely together
with a strong push from Congress. FBI agents have been assigned to CIA for
counter-intelligence purposes for many years, and more recently to fight
Downloaded by [Eindhoven Technical University] at 15:16 07 July 2014
terrorism. CIA officers are reportedly working closely with FBI field offices
where antiterrorism task forces have been created. While this may break
down traditional barriers between the two agencies, there is still some
resentment among CIA officers about the growing role of FBI attaches
serving abroad, and FBI concerns about the reluctance of CIA officers to
share information.
IDENTIFICATION
PENETRATION
EXPLOITATION
INTERDICTION
CLAIM SUCCESS
al-Zawahiri, Osama bin Laden’s deputy, early in 2006. The missile killed
17 people, according to press reports, but not the intended target, who later
broadcast an attack on Mr Bush, equating him with Adolf Hitler. Despite the
failure to kill Zawahiri, the Bush administration later said that the attack had
indeed killed an important terrorist leader and was worth the cost.19
CLAIMING SUCCESS
More forthcoming CIA directors, such as George Tenet, have had the
Public Affairs Office respond generously to media questions. Under the
successor regime of Porter Goss as CIA director, however, the CIA seemed to
return to a more conservative approach. In such cases, it would not be
uncommon for the media to receive the standard answer to questions about
intelligence. This says that the CIA ‘can neither confirm nor deny allegations
of intelligence activity’ which is little more forthcoming than ‘no comment’.
Nonetheless, enterprising reporters, such as Bill Gertz of the Washington
Times and James Risen of the New York Times seem to be quite successful in
learning about inside stories at CIA and other intelligence agencies.
DEFENSIVE COUNTER-INTELLIGENCE
editors and publishers. This is not censorship, but rather a system to ensure
that no secret information is inadvertently released. Some CIA authors
have taken advantage of this system to include blacked-out passages in their
books, demonstrating that they really were prepared to release sensitive
information, but were stopped by the review process. This tends to sell more
books and can be a clever marketing ploy.
The last function of intelligence, and again one not included in the
Intelligence Cycle, is that of covert action, or special operations. This activity
is not really intelligence in its traditional role of gathering and analyzing
information, but rather the use of intelligence resources to carry out the
national security policy of the state using surreptitious methods. Intelligence
agencies around the globe carry out such operations because they have the
necessary secret facilities and personnel. All through the Cold War, it was
covert action that drew most of the attention and most of the criticism of
American intelligence.
General Jimmy Doolittle, one of the notable heroes of World War II, after
taking a hard look at intelligence in the immediate post-war period,
concluded that the US would have to be more clever, more tricky, and more
devious that the Communist adversaries in order to overcome their bid for
world domination. He stated that Americans would just have to accept this
‘repugnant’ policy.23 When the CIA became involved in trying to overthrow
governments in Guatemala, Iran, Indonesia, and Cuba, and was severely
criticized in some quarters for having done so, it became clear that there were
limits to what the American people were prepared to accept. Much has been
written about the nature and limits of covert action and there seems no need
to repeat that here.24 While covert action does not fit into the Intelligence
Cycle, there is a pattern to this function worth outlining. This pattern is
similar to other aspects of policy development and implementation, except
that covert action is supposed to be secret and to disguise the role of the US.
POLICY FORMULATION
The pattern of policy formulation looks a bit like the Intelligence Cycle, but
is in reality quite different. In the first step of the policy process, policy
officials within the national security bureaucracy recognize and identify a
problem with which they must deal. Theoretically, the identification of the
problem comes from intelligence, but in reality policy officials often see this
at about the same time as intelligence officials because both receive the
incoming data at about the same time, as I have earlier explained.
WHAT’S WRONG WITH THE INTELLIGENCE CYCLE 977
In the next step, policy officials begin to seek options for dealing with the
problem, assuming some role for the US is necessary. At this point, one of the
options might well be a covert action. We know from long experience with
covert action that it only makes sense as an adjunct to policy and should
not be the policy itself.25 Thus, the choice of using covert action remains
with decision makers and is not chosen by intelligence. The conventional
wisdom in some circles during the Cold War was that intelligence managers
decided to mount covert actions independent of policy officials. This notion
that the CIA was a ‘rogue elephant’ running amok was debunked during the
Downloaded by [Eindhoven Technical University] at 15:16 07 July 2014
PROBLEM RECOGNITION
OPTION CREATION
OPTION SELECTION
IMPLEMENTATION
Intelligence analysis should feed into the process at all stages, but we know
that the options that policy officials choose are driven by many things, and
intelligence is not always at the top of the list.
Covert action has both short- and long-term consequences. This is true of all
kinds of policy choices, but because covert action is kept secret, the normal
debate about policy choices takes place among a relatively small group of
people. The result is that short-term solutions, which may seem attractive at
the time they are chosen, may prove to have unintended consequences in the
long run. There are too many examples to cover here, and the literature on
covert action is voluminous. Suffice to say that US governments rarely think
about the long-term consequences of policy choices and in that regard covert
action is no different than more open kinds of policies.
978 INTELLIGENCE AND NATIONAL SECURITY
A FLAWED VISION
NOTES
The author would like to thank the Praeger publishing house in the United States for allowing this
article to be published here as well as, simultaneously, in the work edited by Loch K. Johnson,
Strategic Intelligence, 5 vols. (Westport, CT: Praeger 2007).
1 Sherman Kent Strategic Intelligence for American World Policy (Princeton, NJ: Princeton
University Press 1966). I studied an earlier version published in 1948.
2 See, for example, Arthur S. Hulnick, ‘The Intelligence Producer-Policy Consumer Linkage:
A Theoretical Approach’, Intelligence and National Security 1/2 (May 1986) pp.212–33.
3 Johnson, Strategic Intelligence.
4 James Risen, State of War: The Secret History of the CIA and the Bush Administration (New
Downloaded by [Eindhoven Technical University] at 15:16 07 July 2014