Verified Document

Challenges Facing The Intelligence Community Essay

¶ … U.S. Intelligence Community The nature of the work that is conducted by the U.S. intelligence community conditions some of the challenges it faces. The processes of gathering, analyzing, and disseminating intelligence locate members of the intelligence community in situations and relationships that, if not unique to the community, are certainly lodestones to controversy. The discussion will primarily track challenges that are related to improvements of the "intelligence product" and the building or rebuilding of "relationships with important external constituencies."[footnoteRef:1] The purpose of the paper is to increase the saliency of challenges that are fundamental to the business of the intelligent community, and that endure because they are, indeed, endemic. A review of extant documents and scholarly articles will support this author's discussion and conclusions. [1: "Making Intelligence Smarter: The Future of U.S. Intelligence." 1996. [Report of an Independent Task Forces] http://fas.org/irp/cfr.html]

Section II: Three Challenges Confronting the U.S. Intelligence Community

(a) Challenge #1: Keeping the Gate Open for Late-Arriving Black Swans

A substantive challenge of the intelligence community is to establish ways to imagine black swans and to determine the likelihood -- the weight, if you will -- of these black swans with respect to feasibility, likelihood, and susceptibility to critical path change. This imagining must occur without being trivialized by taking on attributes of gaming. Rather, to address this challenge the intelligence community must steep the concepts in historical perspective.

The term black swan is an umbrella term used to signal recognition that some event has occurred that was unexpected, perhaps unimagined, had an enormous impact, and is rationalized in hindsight.[footnoteRef:2] Although Nassim Taleb's 2007 book, The Black Swan, is esoteric and abstract, the concept of a black swan is readily accessible to general audiences. That said, it is apparent that Black swans are the stuff of intelligence. Intelligence is constructed one bit and byte at a time from sources as disparate as SIGINT, IMINT, HUMINT, and MASINT.[footnoteRef:3] Yet, the generation of intelligence as a product occurs against...

Former Secretary of Defense Donald Rumsfeld used the phrase known-knowns as a tag for phenomena that are happening or appear to be inevitable in time. Known-knowns are the flip side of black swans, in that, they are perceptually different: the black swan phenomenon may exist but not yet be known, or it may not yet exist and has never before perceived or even imagined. From this, it can be argued that a primary objective of the U.S. intelligence community is to manage surprise[footnoteRef:4]. [2: George Galdorisi. Global Trends 2030. Defense Media Network: Faircount Media Group, last modified 2014. http://www.defensemedianetwork.com/series/global-trends-2030/] [3: Making Intelligence Smarter, op cit. The following interprets the acronyms used in the text: SIGINT) = the interception of communications and other signals, IMINT = satellite photography or imagery; HUMINT = reports from human sources. MASINT = measurement and signature intelligence, which enhances understanding of physical attributes of intelligence targets.] [4: ]
(b) Challenge #2: What's Man Got to Do With It?

The challenges presented by continually evolving technology are embedded in nearly every facet of the human experience in the developed world, and this can increasingly be said of the developing world as well. Disruptive technology has a way of taking man out of basic, tried-and-true formulas, and instead increasingly placing man in positions with different relations to technology -- as coders and developers, rather than operators. The word automation has an archaic feel to it, having often been displaced by words such as unmanned and autonomous. Covert intelligence gathering has been inexorably altered by technological advances used to establish less man -- centered activities.[footnoteRef:5] That is to say that technology information systems and technology information management have become so sophisticated that the role assumed by people tend to become marginalized into custodial and support functions, or shifted to research and development. The use of unmanned systems and autonomous capabilities pose unprecedented opportunities for seamless coordination with manned systems. But…

Sources used in this document:
Bibliography.

Johnson, Lock K. Handbook of Intelligence Studies. (2006, December 24).

"Making Intelligence Smarter: The Future of U.S. Intelligence." 1996. [Report of an Independent Task Forces] http://fas.org/irp/cfr.html

Galdorisi, George. Global Trends 2030. Defense Media Network: Faircount Media Group, last modified 2014. http://www.defensemedianetwork.com/series/global-trends-2030/

Gross, Michael Joseph. Enter the Cyber-dragon. National Security. Vanity Fair, September 2011).
Hienz, Justin. "Chinese Cyber Attacks Are Looting U.S. Private Sector." Defense Media Network, Faircount Media Group, June 26, 2012. http://www.defensemedianetwork.com/stories/chinese-cyber-attacks-are-looting-u-s-private-sector/
Smith, David Woodruff, "Phenomenology," The Stanford Encyclopedia of Philosophy (Winter 2013 Edition), Edward N. Zalta (ed.), last modified Winter 2013. http://plato.stanford.edu/archives/win2013/entries/phenomenology/
Cite this Document:
Copy Bibliography Citation

Related Documents

Intelligence Community Reform Since the
Words: 3351 Length: 9 Document Type: Research Paper

After September 11th, President Bush authorized the use of water boarding, as a way to gain knowledge of terrorist groups and their activities. The problem is that many of the civil rights-based groups believe that this is in violation of American law. When the people, who are interrogated (terrorists), are not American citizens and they want to do as much harm to the country as possible. Given the fact

Challenges Facing the Department of Homeland Security With New Technology...
Words: 1922 Length: 6 Document Type: Research Paper

Department of Homeland Security is clearly start-up: How quickly can DHS be up and running? The department formally began operating on January 24, 2003, and by March 1 had absorbed representatives from most of its component parts. The formal process of transferring agencies is expected to be completed by September 30, 2003, but analysts suggest full integration of agencies will take at least several years. Notwithstanding, as a practical matter,

Intelligence Policy Political Factors That
Words: 3186 Length: 10 Document Type: Term Paper

The necessity to safeguard intelligence information from parochialism and political pressures will be a strong argument in promoting a centralized and strong capability. This is contrary to leaving decisions that affect critical intelligence related concerns solely to the makers of policy. Centralization of policymaking process faces the politicization risk that stems from the department of DCI. It is only the Congress, the President, and Senior National Security Officials who can

Intelligence Pathologies the Church Committee
Words: 3119 Length: 10 Document Type: Term Paper

The Church Committee concluded that these activities made the intelligence community a secret government that was illegal, unethical, and improper and did not reflect the people or the nation of America. Secret intelligence actions were used to disrupt, harass, and destroy domestic law-abiding citizens and groups. At the time, people were spied on with excessive intrusion with the methods being illegal. In addition, the intelligence agencies carried out secret infiltration

Intelligence and Surveillance Policies and Procedures After September...
Words: 2139 Length: 8 Document Type: Thesis

Many scholars have signified that timely availability of both creative and financial resources leads to effective problem solving. Many scholars have given a great deal of emphasis to the creative aspect of counterterrorism policy making. They assert that policy makers have got to get inside the heads of the terrorists to figure out what they plan to do, what their ideology is and how they are going to execute

Challenges Facing Christian Missionaries in Post-Gulf War Iraq
Words: 4848 Length: 15 Document Type: Research Paper

Unreached People Group Project (Iraq) Language Culture Economy Religion Family A Survey of Mission Work History of Mission Work Current Status of the Church Number of Known Believers Challenges Present Strategies Unreached People Group Project (Iraq) The history of Iraq parallels the antiquity of mankind; therefore, a more recent examination of Iraq's history will be more suitable for evaluating the needs of unreached people in this country. The country used to be part of the Ottoman Empire but Britain occupied Iraq during World

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now