Review of Psychology of Intelligence Analysis

Psychology of Intelligence Analysis by Richards J. Heuer, Jr.

Introduction

Improving Intelligence Analysis at CIA: Dick Heuer’s Contribution to Intelligence Analysis

By

Jack Davis served with the Directorate of Intelligence (DI), the National Intelligence Council, and the Office of Training during his CIA career.

Dick Heuer’s ideas on how to improve analysis focus on helping analysts compensate for the human mind’s limitations in dealing with complex problems that typically involve ambiguous information, multiple players, and fluid circumstances. Such multi-faceted estimative challenges have proliferated in the turbulent post-Cold War world.

Leading Contributors to Quality of Analysis

Intelligence analysts, in seeking to make sound judgments, are always under challenge from the complexities of the issues they address and from the demands made on them for timeliness and volume of production. Four Agency individuals over the decades stand out for having made major contributions on how to deal with these challenges to the quality of analysis.

My short list of the people who have had the greatest positive impact on CIA analysis consists of Sherman Kent, Robert Gates, Douglas MacEachin, and Richards Heuer.

Sherman Kent

Sherman Kent’s pathbreaking contributions to analysis cannot be done justice in a couple of paragraphs

Kent’s greatest contribution to the quality of analysis was to define an honorable place for the analyst–the thoughtful individual “applying the instruments of reason and the scientific method”–in an intelligence world then as now dominated by collectors and operators.

In a second (1965) edition of Strategic Intelligence, Kent took account of the coming computer age as well as human and technical collectors in proclaiming the centrality of the analyst:

Whatever the complexities of the puzzles we strive to solve and whatever the sophisticated techniques we may use to collect the pieces and store them, there can never be a time when the thoughtful man can be supplanted as the intelligence device supreme.

More specifically, Kent advocated application of the techniques of “scientific” study of the past to analysis of complex ongoing situations and estimates of likely future events. Just as rigorous “impartial” analysis could cut through the gaps and ambiguities of information on events long past and point to the most probable explanation, he contended, the powers of the critical mind could turn to events that had not yet transpired to determine the most probable developments

To this end, Kent developed the concept of the analytic pyramid, featuring a wide base of factual information and sides comprised of sound assumptions, which pointed to the most likely future scenario at the apex.

Robert Gates

Bob Gates served as Deputy Director of Central Intelligence (1986-1989) and as DCI (1991-1993). But his greatest impact on the quality of CIA analysis came during his 1982-1986 stint as Deputy Director for Intelligence (DDI).

Gates’s ideas for overcoming what he saw as insular, flabby, and incoherent argumentation featured the importance of distinguishing between what analysts know and what they believe–that is, to make clear what is “fact” (or reliably reported information) and what is the analyst’s opinion (which had to be persuasively supported with evidence). Among his other tenets were the need to seek the views of non-CIA experts, including academic specialists and policy officials, and to present alternate future scenarios.

Using his authority as DDI, he reviewed critically almost all in-depth assessments and current intelligence articles prior to publication. With help from his deputy and two rotating assistants from the ranks of rising junior managers, Gates raised the standards for DDI review dramatically–in essence, from “looks good to me” to “show me your evidence.”

As the many drafts Gates rejected were sent back to managers who had approved them–accompanied by the DDI’s comments about inconsistency, lack of clarity, substantive bias, and poorly supported judgments–the whole chain of review became much more rigorous. Analysts and their managers raised their standards to avoid the pain of DDI rejection. Both career advancement and ego were at stake.

The rapid and sharp increase in attention paid by analysts and managers to the underpinnings for their substantive judgments probably was without precedent in the Agency’s history. The longer term benefits of the intensified review process were more limited, however, because insufficient attention was given to clarifying tradecraft practices that would promote analytic soundness. More than one participant in the process observed that a lack of guidelines for meeting Gates’s standards led to a large amount of “wheel-spinning.”

Douglas MacEachin

Doug MacEachin, DDI from 1993 to 1996, sought to provide an essential ingredient for ensuring implementation of sound analytic standards: corporate tradecraft standards for analysts. This new tradecraft was aimed in particular at ensuring that sufficient attention would be paid to cognitive challenges in assessing complex issues.

MacEachin’s university major was economics, but he also showed great interest in philosophy. His Agency career–like Gates’–included an extended assignment to a policymaking office. He came away from this experience with new insights on what constitutes “value-added” intelligence usable by policymakers. Subsequently, as CIA’s senior manager on arms control issues, he dealt regularly with a cadre of tough- minded policy officials who let him know in blunt terms what worked as effective policy support and what did not.

MacEachin advocated an approach to structured argumentation called “linchpin analysis,” to which he contributed muscular terms designed to overcome many CIA professionals’ distaste for academic nomenclature. The standard academic term “key variables” became drivers. “Hypotheses” concerning drivers became linchpins— assumptions underlying the argument–and these had to be explicitly spelled out. MacEachin also urged that greater attention be paid to analytical processes for alerting policymakers to changes in circumstances that would increase the likelihood of alternative scenarios.

MacEachin thus worked to put in place systematic and transparent standards for determining whether analysts had met their responsibilities for critical thinking. To spread understanding and application of the standards, he mandated creation of workshops on linchpin analysis for managers and production of a series of notes on analytical tradecraft. He also directed that the DI’s performance on tradecraft standards be tracked and that recognition be given to exemplary assessments. Perhaps most ambitious, he saw to it that instruction on standards for analysis was incorporated into a new training course, “Tradecraft 2000.” Nearly all DI managers and analysts attended this course during 1996-97.

Richards Heuer

Dick Heuer was–and is–much less well known within the CIA than Kent, Gates, and MacEachin. He has not received the wide acclaim that Kent enjoyed as the father of professional analysis, and he has lacked the bureaucratic powers that Gates and MacEachin could wield as DDIs. But his impact on the quality of Agency analysis arguably has been at least as important as theirs.

Heuer’s Central Ideas

Dick Heuer’s writings make three fundamental points about the cognitive challenges intelligence analysts face:

  • The mind is poorly “wired” to deal effectively with both inherent uncertainty (the natural fog surrounding complex, indeterminate intelligence issues) and induced uncertainty (the man-made fog fabricated by denial and deception operations).
  • Even increased awareness of cognitive and other “unmotivated” biases, such as the tendency to see information confirming an already-held judgment more vividly than one sees “disconfirming” information, does little by itself to help analysts deal effectively with uncertainty.
  • Tools and techniques that gear the analyst’s mind to apply higher levels of critical thinking can substantially improve analysis on complex issues on which information is incomplete, ambiguous, and often deliberately distorted. Key examples of such intellectual devices include techniques for structuring information, challenging assumptions, and exploring alternative interpretations.

Given the difficulties inherent in the human processing of complex information, a prudent management system should:

  • Encourage products that (a) clearly delineate their assumptions and chains of inference and (b) specify the degree and source of the uncertainty involved in the conclusions.
  • Emphasize procedures that expose and elaborate alternative points of view–analytic debates, devil’s advocates, interdisciplinary brainstorming, competitive analysis, intra-office peer review of production, and elicitation of outside expertise.

Heuer emphasizes both the value and the dangers of mental models, or mind-sets. In the book’s opening chapter, entitled “Thinking About Thinking,” he notes that:

[Analysts] construct their own version of “reality” on the basis of information provided by the senses, but this sensory input is mediated by complex mental processes that determine which information is attended to, how it is organized, and the meaning attributed to it. What people perceive, how readily they perceive it, and how they process this information after receiving it are all strongly influenced by past experience, education, cultural values, role requirements, and organizational norms, as well as by the specifics of the information received.

This process may be visualized as perceiving the world through a lens or screen that channels and focuses and thereby may distort the images that are seen. To achieve the clearest possible image…analysts need more than information…They also need to understand the lenses through which this information passes. These lenses are known by many terms–mental models, mind-sets, biases, or analytic assumptions.

In essence, Heuer sees reliance on mental models to simplify and interpret reality as an unavoidable conceptual mechanism for intelligence analysts–often useful, but at times hazardous. What is required of analysts, in his view, is a commitment to challenge, refine, and challenge again their own working mental models, precisely because these steps are central to sound interpretation of complex and ambiguous issues.

Throughout the book, Heuer is critical of the orthodox prescription of “more and better information” to remedy unsatisfactory analytic performance. He urges that greater attention be paid instead to more intensive exploitation of information already on hand, and that in so doing, analysts continuously challenge and revise their mental models.

Heuer sees mirror-imaging as an example of an unavoidable cognitive trap. No matter how much expertise an analyst applies to interpreting the value systems of foreign entities, when the hard evidence runs out the tendency to project the analyst’s own mind-set takes over. In Chapter 4, Heuer observes:

To see the options faced by foreign leaders as these leaders see them, one must understand their values and assumptions and even their misperceptions and misunderstandings. Without such insight, interpreting foreign leaders’ decisions or forecasting future decisions is often nothing more than partially informed speculation. Too frequently, foreign behavior appears “irrational” or “not in their own best interest.” Such conclusions often indicate analysts have projected American values and conceptual frameworks onto the foreign leaders and societies, rather than understanding the logic of the situation as it appears to them.

Recommendations

Heuer’s advice to Agency leaders, managers, and analysts is pointed: To ensure sustained improvement in assessing complex issues, analysis must be treated as more than a substantive and organizational process. Attention also must be paid to techniques and tools for coping with the inherent limitations on analysts’ mental machinery. He urges that Agency leaders take steps to:

  • Establish an organizational environment that promotes and rewards the kind of critical thinking he advocates–or example, analysis on difficult issues that considers in depth a series of plausible hypotheses rather than allowing the first credible hypothesis to suffice.
  • Expand funding for research on the role such mental processes play in shaping analytical judgments. An Agency that relies on sharp cognitive performance by its analysts must stay abreast of studies on how the mind works–i.e., on how analysts reach judgments.
  • Foster development of tools to assist analysts in assessing information. On tough issues, they need help in improving their mental models and in deriving incisive findings from information they already have; they need such help at least as much as they need more information.

I offer some concluding observations and recommendations, rooted in Heuer’s findings and taking into account the tough tradeoffs facing intelligence professionals:

  •  Commit to a uniform set of tradecraft standards based on the insights in this book. Leaders need to know if analysts have done their cognitive homework before taking corporate responsibility for their judgments. Although every analytical issue can be seen as one of a kind, I suspect that nearly all such topics fit into about a dozen recurring patterns of challenge based largely on variations in substantive uncertainty and policy sensitivity. Corporate standards need to be established for each such category. And the burden should be put on managers to explain why a given analytical assignment requires deviation from the standards. I am convinced that if tradecraft standards are made uniform and transparent, the time saved by curtailing personalistic review of quick-turnaround analysis (e.g., “It reads better to me this way”) could be “re-invested” in doing battle more effectively against cognitive pitfalls. (“Regarding point 3, let’s talk about your assumptions.”)
  •  Pay more honor to “doubt.” Intelligence leaders and policymakers should, in recognition of the cognitive impediments to sound analysis, establish ground rules that enable analysts, after doing their best to clarify an issue, to express doubts more openly. They should be encouraged to list gaps in information and other obstacles to confident judgment. Such conclusions as “We do not know” or “There are several potentially valid ways to assess this issue” should be regarded as badges of sound analysis, not as dereliction of analytic duty.

Find a couple of successors to Dick Heuer. Fund their research. Heed their findings.

PART ONE–OUR MENTAL MACHINERY Chapter 1
Thinking About Thinking

Of the diverse problems that impede accurate intelligence analysis, those inherent in human mental processes are surely among the most important and most difficult to deal with. Intelligence analysis is fundamentally a mental process, but understanding this process is hindered by the lack of conscious awareness of the workings of our own minds.

A basic finding of cognitive psychology is that people have no conscious experience of most of what happens in the human mind. Many functions associated with perception, memory, and information processing are conducted prior to and independently of any conscious direction. What appears spontaneously in consciousness is the result of thinking, not the process of thinking.

Weaknesses and biases inherent in human thinking processes can be demonstrated through carefully designed experiments. They can be alleviated by conscious application of tools and techniques that should be in the analytical tradecraft toolkit of all intelligence analysts.

Thinking analytically is a skill like carpentry or driving a car. It can be taught, it can be learned, and it can improve with practice. But like many other skills, such as riding a bike, it is not learned by sitting in a classroom and being told how to do it. Analysts learn by doing. Most people achieve at least a minimally acceptable level of analytical performance with little conscious effort beyond completing their education. With much effort and hard work, however, analysts can achieve a level of excellence beyond what comes naturally.

expert guidance may be required to modify long-established analytical habits to achieve an optimal level of analytical excellence. An analytical coaching staff to help young analysts hone their analytical tradecraft would be a valuable supplement to classroom instruction.

One key to successful learning is motivation. Some of CIA’s best analysts developed their skills as a consequence of experiencing analytical failure early in their careers. Failure motivated them to be more self-conscious about how they do analysis and to sharpen their thinking process.

Part I identifies some limitations inherent in human mental processes. Part II discusses analytical tradecraft–simple tools and approaches for overcoming these limitations and thinking more systematically. Chapter 8, “Analysis of Competing Hypotheses,” is arguably the most important single chapter. Part III presents information about cognitive biases–the technical term for predictable mental errors caused by simplified information processing strategies. A final chapter presents a checklist for analysts and recommendations for how managers of intelligence analysis can help create an environment in which analytical excellence flourishes.

Herbert Simon first advanced the concept of “bounded” or limited rationality.

Because of limits in human mental capacity, he argued, the mind cannot cope directly with the complexity of the world. Rather, we construct a simplified mental model of reality and then work with this model. We behave rationally within the confines of our mental model, but this model is not always well adapted to the requirements of the real world. The concept of bounded rationality has come to be recognized widely, though not universally, both as an accurate portrayal of human judgment and choice and as a sensible adjustment to the limitations inherent in how the human mind functions.

Much psychological research on perception, memory, attention span, and reasoning capacity documents the limitations in our “mental machinery” identified by Simon.

Many scholars have applied these psychological insights to the study of international political behavior. A similar psychological perspective underlies some writings on intelligence failure and strategic surprise.

This book differs from those works in two respects. It analyzes problems from the perspective of intelligence analysts rather than policymakers. And it documents the impact of mental processes largely through experiments in cognitive psychology rather than through examples from diplomatic and military history.

A central focus of this book is to illuminate the role of the observer in determining what is observed and how it is interpreted. People construct their own version of “reality” on the basis of information provided by the senses, but this sensory input is mediated by complex mental processes that determine which information is attended to, how it is organized, and the meaning attributed to it. What people perceive, how readily they perceive it, and how they process this information after receiving it are all strongly influenced by past experience, education, cultural values, role requirements, and organizational norms, as well as by the specifics of the information received.

In this book, the terms mental model and mind-set are used more or less interchangeably, although a mental model is likely to be better developed and articulated than a mind-set. An analytical assumption is one part of a mental model or mind-set. The biases discussed in this book result from how the mind works and are independent of any substantive mental model or mind-set.

Intelligence analysts must understand themselves before they can understand others. Training is needed to (a) increase self-awareness concerning generic problems in how people perceive and make analytical judgments concerning foreign events, and (b) provide guidance and practice in overcoming these problems.

The disadvantage of a mind-set is that it can color and control our perception to the extent that an experienced specialist may be among the last to see what is really happening when events take a new and unexpected turn. When faced with a major paradigm shift, analysts who know the most about a subject have the most to unlearn.

The advantage of mind-sets is that they help analysts get the production out on time and keep things going effectively between those watershed events that become chapter headings in the history books.

What analysts need is more truly useful information–mostly reliable HUMINT from knowledgeable insiders–to help them make good decisions. Or they need a more accurate mental model and better analytical tools to help them sort through, make sense of, and get the most out of the available ambiguous and conflicting information.

Psychological research also offers to intelligence analysts additional insights that are beyond the scope of this book. Problems are not limited to how analysts perceive and process information. Intelligence analysts often work in small groups and always within the context of a large, bureaucratic organization. Problems are inherent in the processes that occur at all three levels–individual, small group, and organization. This book focuses on problems inherent in analysts’ mental processes, inasmuch as these are probably the most insidious. Analysts can observe and get a feel for these problems in small-group and organizational processes, but it is very difficult, at best, to be self-conscious about the workings of one’s own mind.

Chapter 2

Perception: Why Can’t We See What Is There To Be Seen?

The process of perception links people to their environment and is critical to accurate understanding of the world about us. Accurate intelligence analysis obviously requires accurate perception. Yet research into human perception demonstrates that the process is beset by many pitfalls. Moreover, the circumstances under which intelligence analysis is conducted are precisely the circumstances in which accurate perception tends to be most difficult. This chapter discusses perception in general, then applies this information to illuminate some of the difficulties of intelligence analysis.

We tend to perceive what we expect to perceive.

A corollary of this principle is that it takes more information, and more unambiguous information, to recognize an unexpected phenomenon than an expected one.

patterns of expectation become so deeply embedded that they continue to influence perceptions even when people are alerted to and try to take account of the existence of data that do not fit their preconceptions. Trying to be objective does not ensure accurate perception.

Patterns of expectations tell analysts, subconsciously, what to look for, what is important, and how to interpret what is seen. These patterns form a mind-set that predisposes analysts to think in certain ways. A mind-set is akin to a screen or lens through which one perceives the world.

There is a tendency to think of a mind-set as something bad, to be avoided. According to this line of argument, one should have an open mind and be influenced only by the facts rather than by preconceived notions! That is an unreachable ideal. There is no such thing as “the facts of the case.” There is only a very selective subset of the overall mass of data to which one has been subjected that one takes as facts and judges to be relevant to the question at issue.

Actually, mind-sets are neither good nor bad; they are unavoidable. People have no conceivable way of coping with the volume of stimuli that impinge upon their senses, or with the volume and complexity of the data they have to analyze, without some kind of simplifying preconceptions about what to expect, what is important, and what is related to what. “There is a grain of truth in the otherwise pernicious maxim that an open mind is an empty mind.” Analysts do no achieve objective analysis by avoiding preconceptions; that would be ignorance or self-delusion. Objectivity is achieved by making basic assumptions and reasoning as explicit as possible so that they can be challenged by others and analysts can, themselves, examine their validity.

One of the most important characteristics of mind-sets is: Mind-sets tend to be quick to form but resistant to change.

Once an observer has formed an image–that is, once he or she has developed a mind- set or expectation concerning the phenomenon being observed–this conditions future perceptions of that phenomenon.

This is the basis for another general principle of perception: New information is assimilated to existing images.

This principle explains why gradual, evolutionary change often goes unnoticed. It also explains the phenomenon that an intelligence analyst assigned to work on a topic or country for the first time may generate accurate insights that have been overlooked by experienced analysts who have worked on the same problem for 10 years. A fresh perspective is sometimes useful; past experience can handicap as well as aid analysis.

This tendency to assimilate new data into pre-existing images is greater “the more ambiguous the information, the more confident the actor is of the validity of his image, and the greater his commitment to the established view.”

One of the more difficult mental feats is to take a familiar body of data and reorganize it visually or mentally to perceive it from a different perspective. Yet this is what intelligence analysts are constantly required to do. In order to understand international interactions, analysts must understand the situation as it appears to each of the opposing forces, and constantly shift back and forth from one perspective to the other as they try to fathom how each side interprets an ongoing series of interactions. Trying to perceive an adversary’s interpretations of international events, as well as US interpretations of those same events, is comparable to seeing both the old and young woman in Figure 3.

A related point concerns the impact of substandard conditions of perception. The basic principle is:

Initial exposure to blurred or ambiguous stimuli interferes with accurate perception even after more and better information becomes available.

What happened in this experiment is what presumably happens in real life; despite ambiguous stimuli, people form some sort of tentative hypothesis about what they see. The longer they are exposed to this blurred image, the greater confidence they develop in this initial and perhaps erroneous impression, so the greater the impact this initial impression has on subsequent perceptions. For a time, as the picture becomes clearer, there is no obvious contradiction; the new data are assimilated into the previous image, and the initial interpretation is maintained until the contradiction becomes so obvious that it forces itself upon our consciousness.

The early but incorrect impression tends to persist because the amount of information necessary to invalidate a hypothesis is considerably greater than the amount of information required to make an initial interpretation. The problem is not that there is any inherent difficulty in grasping new perceptions or new ideas, but that established perceptions are so difficult to change. People form impressions on the basis of very little information, but once formed, they do not reject or change them unless they obtain rather solid evidence. Analysts might seek to limit the adverse impact of this tendency by suspending judgment for as long as possible as new information is being received.

Implications for Intelligence Analysis

Comprehending the nature of perception has significant implications for understanding the nature and limitations of intelligence analysis. The circumstances under which accurate perception is most difficult are exactly the circumstances under which intelligence analysis is generally conducted–dealing with highly ambiguous situations on the basis of information that is processed incrementally under pressure for early judgment. This is a recipe for inaccurate perception.

Intelligence seeks to illuminate the unknown. Almost by definition, intelligence analysis deals with highly ambiguous situations. As previously noted, the greater the ambiguity of the stimuli, the greater the impact of expectations and pre-existing images on the perception of that stimuli. Thus, despite maximum striving for objectivity, the intelligence analyst’s own preconceptions are likely to exert a greater impact on the analytical product than in other fields where an analyst is working with less ambiguous and less discordant information.

Moreover, the intelligence analyst is among the first to look at new problems at an early stage when the evidence is very fuzzy indeed. The analyst then follows a problem as additional increments of evidence are received and the picture gradually clarifies–as happened with test subjects in the experiment demonstrating that initial exposure to blurred stimuli interferes with accurate perception even after more and better information becomes available. If the results of this experiment can be generalized to apply to intelligence analysts, the experiment suggests that an analyst who starts observing a potential problem situation at an early and unclear stage is at a disadvantage as compared with others, such as policymakers, whose first exposure may come at a later stage when more and better information is available.

The receipt of information in small increments over time also facilitates assimilation of this information into the analyst’s existing views. No one item of information may be sufficient to prompt the analyst to change a previous view. The cumulative message inherent in many pieces of information may be significant but is attenuated when this information is not examined as a whole. The Intelligence Community’s review of its performance before the 1973 Arab-Israeli War noted:

The problem of incremental analysis–especially as it applies to the current intelligence process–was also at work in the period preceding hostilities. Analysts, according to their own accounts, were often proceeding on the basis of the day’s take, hastily comparing it with material received the previous day. They then produced in ‘assembly line fashion’ items which may have reflected perceptive intuition but which [did not] accrue from a systematic consideration of an accumulated body of integrated evidence.

And finally, the intelligence analyst operates in an environment that exerts strong pressures for what psychologists call premature closure. Customer demand for interpretive analysis is greatest within two or three days after an event occurs. The system requires the intelligence analyst to come up with an almost instant diagnosis before sufficient hard information, and the broader background information that may be needed to gain perspective, become available to make possible a well-grounded judgment. This diagnosis can only be based upon the analyst’s preconceptions concerning how and why events normally transpire in a given society.

The problems outlined here have implications for the management as well as the conduct of analysis. Given the difficulties inherent in the human processing of complex information, a prudent management system should:

  • Encourage products that clearly delineate their assumptions and chains of inference and that specify the degree and source of uncertainty involved in the conclusions.
  • Support analyses that periodically re-examine key problems from the ground up in order to avoid the pitfalls of the incremental approach.
  • Emphasize procedures that expose and elaborate alternative points of view.
  • Educate consumers about the limitations as well as the capabilities of intelligence analysis; define a set of realistic expectations as a standard against which to judge analytical performance.

Chapter 3
Memory: How Do We Remember What We Know?

Differences between stronger and weaker analytical performance are attributable in large measure to differences in the organization of data and experience in analysts’ long-term memory. The contents of memory form a continuous input into the analytical process, and anything that influences what information is remembered or retrieved from memory also influences the outcome of analysis.

This chapter discusses the capabilities and limitations of several components of the memory system. Sensory information storage and short-term memory are beset by severe limitations of capacity, while long-term memory, for all practical purposes, has a virtually infinite capacity. With long-term memory, the problems concern getting information into it and retrieving information once it is there, not physical limits on the amount of information that may be stored. Understanding how memory works provides insight into several analytical strengths and weaknesses.

Components of the Memory System

What is commonly called memory is not a single, simple function. It is an extraordinarily complex system of diverse components and processes. There are at least three, and very likely more, distinct memory processes. The most important from the standpoint of this discussion and best documented by scientific research are sensory information storage (SIS), short-term memory (STM), and long-term memory (LTM). Each differs with respect to function, the form of information held, the length of time information is retained, and the amount of information-handling capacity. Memory researchers also posit the existence of an interpretive mechanism and an overall memory monitor or control mechanism that guides interaction among various elements of the memory system.

Sensory Information Storage

Sensory information storage holds sensory images for several tenths of a second after they are received by the sensory organs. The functioning of SIS may be observed if you close your eyes, then open and close them again as rapidly as possible.

Short-Term Memory

Information passes from SIS into short-term memory, where again it is held for only a short period of time–a few seconds or minutes. Whereas SIS holds the complete image, STM stores only the interpretation of the image. If a sentence is spoken, SIS retains the sounds, while STM holds the words formed by these sounds.

Retrieval of information from STM is direct and immediate because the information has never left the conscious mind. Information can be maintained in STM indefinitely by a process of “rehearsal”–repeating it over and over again. But while rehearsing some items to retain them in STM, people cannot simultaneously add new items.

Long-Term Memory

Some information retained in STM is processed into long-term memory. This information on past experiences is filed away in the recesses of the mind and must be retrieved before it can be used. In contrast to the immediate recall of current experience from STM, retrieval of information from LTM is indirect and sometimes laborious.

Loss of detail as sensory stimuli are interpreted and passed from SIS into STM and then into LTM is the basis for the phenomenon of selective perception discussed in the previous chapter. It imposes limits on subsequent stages of analysis, inasmuch as the lost data can never be retrieved. People can never take their mind back to what was actually there in sensory information storage or short-term memory. They can only retrieve their interpretation of what they thought was there as stored in LTM.

There are no practical limits to the amount of information that may be stored in LTM. The limitations of LTM are the difficulty of processing information into it and retrieving information from it.

Despite much research on memory, little agreement exists on many critical points. What is presented here is probably the lowest common denominator on which most researchers would agree.

Organization of Information in Long-Term Memory.

analysts’ needs are best served by a very simple image of the structure of memory.

Imagine memory as a massive, multidimensional spider web. This image captures what is, for the purposes of this book, perhaps the most important property of information stored in memory–its interconnectedness. One thought leads to another. It is possible to start at any one point in memory and follow a perhaps labyrinthine path to reach any other point. Information is retrieved by tracing through the network of interconnections to the place where it is stored.

Retrievability is influenced by the number of locations in which information is stored and the number and strength of pathways from this information to other concepts that might be activated by incoming information. The more frequently a path is followed, the stronger that path becomes and the more readily available the information located along that path. If one has not thought of a subject for some time, it may be difficult to recall details. After thinking our way back into the appropriate context and finding the general location in our memory, the interconnections become more readily available. We begin to remember names, places, and events that had seemed to be forgotten.

Once people have started thinking about a problem one way, the same mental circuits or pathways get activated and strengthened each time they think about it. This facilitates the retrieval of information. These same pathways, however, also become the mental ruts that make it difficult to reorganize the information mentally so as to see it from a different perspective.

One useful concept of memory organization is what some cognitive psychologists call a “schema.” A schema is any pattern of relationships among data stored in memory. It is any set of nodes and links between them in the spider web of memory that hang together so strongly that they can be retrieved and used more or less as a single unit.

For example, a person may have a schema for a bar that when activated immediately makes available in memory knowledge of the properties of a bar and what distinguishes a bar, say, from a tavern. It brings back memories of specific bars that may in turn stimulate memories of thirst, guilt, or other feelings or circumstances. People also have schemata (plural for schema) for abstract concepts such as a socialist economic system and what distinguishes it from a capitalist or communist system. Schemata for phenomena such as success or failure in making an accurate intelligence estimate will include links to those elements of memory that explain typical causes and implications of success or failure. There must also be schemata for processes that link memories of the various steps involved in long division, regression analysis, or simply making inferences from evidence and writing an intelligence report.

Any given point in memory may be connected to many different overlapping schemata. This system is highly complex and not well understood.

It serves the purpose of emphasizing that memory does have structure. It also shows that how knowledge is connected in memory is critically important in determining what information is retrieved in response to any stimulus and how that information is used in reasoning.

Concepts and schemata stored in memory exercise a powerful influence on the formation of perceptions from sensory data.

If information does not fit into what people know, or think they know, they have great difficulty processing it.

The content of schemata in memory is a principal factor distinguishing stronger from weaker analytical ability. This is aptly illustrated by an experiment with chess players. When chess grandmasters and masters and ordinary chess players were given five to 10 seconds to note the position of 20 to 25 chess pieces placed randomly on a chess board, the masters and ordinary players were alike in being able to remember the places of only about six pieces. If the positions of the pieces were taken from an actual game (unknown to the test subjects), however, the grandmasters and masters were usually able to reproduce almost all the positions without error, while the ordinary players were still able to place correctly only a half-dozen pieces.

That the unique ability of the chess masters did not result from a pure feat of memory is indicated by the masters’ inability to perform better than ordinary players in remembering randomly placed positions. Their exceptional performance in remembering positions from actual games stems from their ability to immediately perceive patterns that enable them to process many bits of information together as a single chunk or schema. The chess master has available in long-term memory many schemata that connect individual positions together in coherent patterns. When the position of chess pieces on the board corresponds to a recognized schema, it is very easy for the master to remember not only the positions of the pieces, but the outcomes of previous games in which the pieces were in these positions. Similarly, the unique abilities of the master analyst are attributable to the schemata in long-term memory that enable the analyst to perceive patterns in data that pass undetected by the average observer.

Getting Information Into and Out of Long-Term Memory. It used to be that how well a person learned something was thought to depend upon how long it was kept in short-term memory or the number of times they repeated it to themselves. Research evidence now suggests that neither of these factors plays the critical role. Continuous repetition does not necessarily guarantee that something will be remembered. The key factor in transferring information from short-term to long-term memory is the development of associations between the new information and schemata already available in memory. This, in turn, depends upon two variables: the extent to which the information to be learned relates to an already existing schema, and the level of processing given to the new information.

Depth of processing is the second important variable in determining how well information is retained. Depth of processing refers to the amount of effort and cognitive capacity employed to process information, and the number and strength of associations that are thereby forged between the data to be learned and knowledge already in memory. In experiments to test how well people remember a list of words, test subjects might be asked to perform different tasks that reflect different levels of processing. The following illustrative tasks are listed in order of the depth of mental processing required: say how many letters there are in each word on the list, give a word that rhymes with each word, make a mental image of each word, make up a story that incorporates each word.

It turns out that the greater the depth of processing, the greater the ability to recall words on a list. This result holds true regardless of whether the test subjects are informed in advance that the purpose of the experiment is to test them on their memory. Advising test subjects to expect a test makes almost no difference in their performance, presumably because it only leads them to rehearse the information in short-term memory, which is ineffective as compared with other forms of processing.

There are three ways in which information may be learned or committed to memory: by rote, assimilation, or use of a mnemonic device.

By Rote. Material to be learned is repeated verbally with sufficient frequency that it can later be repeated from memory without use of any memory aids. When information is learned by rote, it forms a separate schema not closely interwoven with previously held knowledge. That is, the mental processing adds little by way of elaboration to the new information, and the new information adds little to the elaboration of existing schemata. Learning by rote is a brute force technique. It seems to be the least efficient way of remembering.

By Assimilation. Information is learned by assimilation when the structure or substance of the information fits into some memory schema already possessed by the learner. The new information is assimilated to or linked to the existing schema and can be retrieved readily by first accessing the existing schema and then reconstructing the new information. Assimilation involves learning by comprehension and is, therefore, a desirable method, but it can only be used to learn information that is somehow related to our previous experience.

By Using A Mnemonic Device. A mnemonic device is any means of organizing or encoding information for the purpose of making it easier to remember. A high school student cramming for a geography test might use the acronym “HOMES” as a device for remembering the first letter of each of the Great Lakes–Huron, Ontario, etc.

Memory and Intelligence Analysis

An analyst’s memory provides continuous input into the analytical process. This input is of two types–additional factual information on historical background and context, and schemata the analyst uses to determine the meaning of newly acquired information. Information from memory may force itself on the analyst’s awareness without any deliberate effort by the analyst to remember; or, recall of the information may require considerable time and strain. In either case, anything that influences what information is remembered or retrieved from memory also influences intelligence analysis.

Judgment is the joint product of the available information and what the analyst brings to the analysis of this information.

Substantive knowledge and analytical experience determine the store of memories and schemata the analyst draws upon to generate and evaluate hypotheses. The key is not a simple ability to recall facts, but the ability to recall patterns that relate facts to each other and to broader concepts–and to employ procedures that facilitate this process.

Stretching the Limits of Working Memory

Limited information is available on what is commonly thought of as “working memory”–the collection of information that an analyst holds in the forefront of the mind as he or she does analysis. The general concept of working memory seems clear from personal introspection.

In writing this chapter, I am very conscious of the constraints on my ability to keep many pieces of information in mind while experimenting with ways to organize this information and seeking words to express my thoughts. To help offset these limits on my working memory, I have accumulated a large number of written notes containing ideas and half-written paragraphs. Only by using such external memory aids am I able to cope with the volume and complexity of the information I want to use.

The recommended technique for coping with this limitation of working memory is called externalizing the problem–getting it out of one’s head and down on paper in some simplified form that shows the main elements of the problem and how they relate to each other.

breaking down a problem into its component parts and then preparing a simple “model” that shows how the parts relate to the whole. When working on a small part of the problem, the model keeps one from losing sight of the whole.

A simple model of an analytical problem facilitates the assimilation of new information into long-term memory; it provides a structure to which bits and pieces of information can be related. The model defines the categories for filing information in memory and retrieving it on demand. In other words, it serves as a mnemonic device that provides the hooks on which to hang information so that it can be found when needed.

“Hardening of the Categories”. Memory processes tend to work with generalized categories. If people do not have an appropriate category for something, they are unlikely to perceive it, store it in memory, or be able to retrieve it from memory later. If categories are drawn incorrectly, people are likely to perceive and remember things inaccurately. When information about phenomena that are different in important respects nonetheless gets stored in memory under a single concept, errors of analysis may result.

“Hardening of the categories” is a common analytical weakness. Fine distinctions among categories and tolerance for ambiguity contribute to more effective analysis.

Things That Influence What Is Remembered. Factors that influence how information is stored in memory and that affect future retrievability include: being the first-stored information on a given topic, the amount of attention focused on the information, the credibility of the information, and the importance attributed to the information at the moment of storage. By influencing the content of memory, all of these factors also influence the outcome of intelligence analysis.

Memory Rarely Changes Retroactively. Analysts often receive new information that should, logically, cause them to reevaluate the credibility or significance of previous information. Ideally, the earlier information should then become either more salient and readily available in memory, or less so. But it does not work that way. Unfortunately, memories are seldom reassessed or reorganized retroactively in response to new information. For example, information that is dismissed as unimportant or irrelevant because it did not fit an analyst’s expectations does not become more memorable even if the analyst changes his or her thinking to the point where the same information, received today, would be recognized as very significant.

Memory Can Handicap as Well as Help

Understanding how memory works provides some insight into the nature of creativity, openness to new information, and breaking mind-sets. All involve spinning new links in the spider web of memory–links among facts, concepts, and schemata that previously were not connected or only weakly connected.

There is, however, a crucial difference between the chess master and the master intelligence analyst. Although the chess master faces a different opponent in each match, the environment in which each contest takes place remains stable and unchanging: the permissible moves of the diverse pieces are rigidly determined, and the rules cannot be changed without the master’s knowledge. Once the chess master develops an accurate schema, there is no need to change it. The intelligence analyst, however, must cope with a rapidly changing world. Many countries that previously were US adversaries are now our formal or de facto allies. The American and Russian governments and societies are not the same today as they were 20 or even 10 or five years ago. Schemata that were valid yesterday may no longer be functional tomorrow.

Learning new schemata often requires the unlearning of existing ones, and this is exceedingly difficult. It is always easier to learn a new habit than to unlearn an old one.

PART II–TOOLS FOR THINKING

Chapter 4

Strategies for Analytical Judgment: Transcending the Limits of Incomplete Information

When intelligence analysts make thoughtful analytical judgments, how do they do it? In seeking answers to this question, this chapter discusses the strengths and limitations of situational logic, theory, comparison, and simple immersion in the data as strategies for the generation and evaluation of hypotheses. The final section discusses alternative strategies for choosing among hypotheses. One strategy too often used by intelligence analysts is described as “satisficing”–choosing the first hypothesis that appears good enough rather than carefully identifying all possible hypotheses and determining which is most consistent with the evidence.

Intelligence analysts should be self-conscious about their reasoning process. They should think about how they make judgments and reach conclusions, not just about the judgments and conclusions themselves.

Judgment is what analysts use to fill gaps in their knowledge. It entails going beyond the available information and is the principal means of coping with uncertainty. It always involves an analytical leap, from the known into the uncertain.

Judgment is an integral part of all intelligence analysis. While the optimal goal of intelligence collection is complete knowledge, this goal is seldom reached in practice. Almost by definition of the intelligence mission, intelligence issues involve considerable uncertainty.

Analytical strategies are important because they influence the data one attends to. They determine where the analyst shines his or her searchlight, and this inevitably affects the outcome of the analytical process.

Strategies for Generating and Evaluating Hypotheses

the goal is to understand the several kinds of careful, conscientious analysis one would hope and expect to find among a cadre of intelligence analysts dealing with highly complex issues.

Situational Logic

This is the most common operating mode for intelligence analysts. Generation and analysis of hypotheses start with consideration of concrete elements of the current situation, rather than with broad generalizations that encompass many similar cases. The situation is regarded as one-of-a-kind, so that it must be understood in terms of its own unique logic, rather than as one example of a broad class of comparable events.

Starting with the known facts of the current situation and an understanding of the unique forces at work at that particular time and place, the analyst seeks to identify
the logical antecedents or consequences of this situation. A scenario is developed that hangs together as a plausible narrative. The analyst may work backwards to explain the origins or causes of the current situation or forward to estimate the future outcome.

Situational logic commonly focuses on tracing cause-effect relationships or, when dealing with purposive behavior, means-ends relationships. The analyst identifies the goals being pursued and explains why the foreign actor(s) believe certain means will achieve those goals.

Particular strengths of situational logic are its wide applicability and ability to integrate a large volume of relevant detail. Any situation, however unique, may be analyzed in this manner.

Situational logic as an analytical strategy also has two principal weaknesses. One is that it is so difficult to understand the mental and bureaucratic processes of foreign leaders and governments. To see the options faced by foreign leaders as these leaders see them, one must understand their values and assumptions and even their misperceptions and misunderstandings. Without such insight, interpreting foreign leaders’ decisions or forecasting future decisions is often little more than partially informed speculation. Too frequently, foreign behavior appears “irrational” or “not in their own best interest.” Such conclusions often indicate analysts have projected American values and conceptual frameworks onto the foreign leaders and societies, rather than understanding the logic of the situation as it appears to them.

The second weakness is that situational logic fails to exploit the theoretical knowledge derived from study of similar phenomena in other countries and other time periods. The subject of national separatist movements illustrates the point. Nationalism is a centuries-old problem, but most Western industrial democracies have been considered well-integrated national communities.

Analyzing many examples of a similar phenomenon, as discussed below, enables one to probe more fundamental causes than those normally considered in logic-of-the- situation analysis. The proximate causes identified by situational logic appear, from the broader perspective of theoretical analysis, to be but symptoms indicating the presence of more fundamental causal factors. A better understanding of these fundamental causes is critical to effective forecasting, especially over the longer range.

Applying Theory

Theory is an academic term not much in vogue in the Intelligence Community, but it is unavoidable in any discussion of analytical judgment. In one popular meaning of the term, “theoretical” is associated with the terms “impractical” and “unrealistic”. Needless to say, it is used here in a quite different sense.

A theory is a generalization based on the study of many examples of some phenomenon. It specifies that when a given set of conditions arises, certain other conditions will follow either with certainty or with some degree of probability. In other words, conclusions are judged to follow from a set of conditions and a finding that these conditions apply in the specific case being analyzed.

What academics refer to as theory is really only a more explicit version of what intelligence analysts think of as their basic understanding of how individuals, institutions, and political systems normally behave.

Theoretical propositions frequently fail to specify the time frame within which developments might be anticipated to occur.

Further elaboration of the theory relating economic development and foreign ideas to political instability in feudal societies would identify early warning indicators that analysts might look for. Such indicators would guide both intelligence collection and analysis of sociopolitical and socioeconomic data and lead to hypotheses concerning when or under what circumstances such an event might occur.

But if theory enables the analyst to transcend the limits of available data, it may also provide the basis for ignoring evidence that is truly indicative of future events.

Figure 4 below illustrates graphically the difference between theory and situational logic. Situational logic looks at the evidence within a single country on multiple interrelated issues, as shown by the column highlighted in gray. This is a typical area studies approach. Theoretical analysis looks at the evidence related to a single issue in multiple countries, as shown by the row highlighted in gray. This is a typical social science approach.

The distinction between theory and situational logic is not as clear as it may seem from this graphic, however. Logic-of-the-situation analysis also draws heavily on theoretical assumptions. How does the analyst select the most significant elements to describe the current situation, or identify the causes or consequences of these elements, without some implicit theory that relates the likelihood of certain outcomes to certain antecedent conditions?

Comparison with Historical Situations

A third approach for going beyond the available information is comparison. An analyst seeks understanding of current events by comparing them with historical precedents in the same country, or with similar events in other countries. Analogy is one form of comparison. When an historical situation is deemed comparable to current circumstances, analysts use their understanding of the historical precedent to fill gaps in their understanding of the current situation. Unknown elements of the present are assumed to be the same as known elements of the historical precedent. Thus, analysts reason that the same forces are at work, that the outcome of the present situation is likely to be similar to the outcome of the historical situation, or that a certain policy is required in order to avoid the same outcome as in the past.

Comparison differs from situational logic in that the present situation is interpreted in the light of a more or less explicit conceptual model that is created by looking at similar situations in other times or places. It differs from theoretical analysis in that this conceptual model is based on a single case or only a few cases, rather than on many similar cases. Comparison may also be used to generate theory, but this is a more narrow kind of theorizing that cannot be validated nearly as well as generalizations inferred from many comparable cases.

Reasoning by comparison is a convenient shortcut, one chosen when neither data nor theory are available for the other analytical strategies, or simply because it is easier and less time-consuming than a more detailed analysis. A careful comparative analysis starts by specifying key elements of the present situation. The analyst then seeks out one or more historical precedents that may shed light on the present. Frequently, however, a historical precedent may be so vivid and powerful that it imposes itself upon a person’s thinking from the outset, conditioning them to perceive the present primarily in terms of its similarity to the past. This is reasoning by analogy. As Robert Jervis noted, “historical analogies often precede, rather than follow, a careful analysis of a situation.”

The tendency to relate contemporary events to earlier events as a guide to understanding is a powerful one. Comparison helps achieve understanding by reducing the unfamiliar to the familiar. In the absence of data required for a full understanding of the current situation, reasoning by comparison may be the only alternative. Anyone taking this approach, however, should be aware of the significant potential for error. This course is an implicit admission of the lack of sufficient information to understand the present situation in its own right, and lack of relevant theory to relate the present situation to many other comparable situations.

In a short book that ought to be familiar to all intelligence analysts, Ernest May traced the impact of historical analogies on U.S. Foreign Policy. He found that because of reasoning by analogy, US policymakers tend to be one generation behind, determined to avoid the mistakes of the previous generation. They pursue the policies that would have been most appropriate in the historical situation but are not necessarily well adapted to the current one.

Communist aggression after World War II was seen as analogous to Nazi aggression, leading to a policy of containment that could have prevented World War II.

May argues that policymakers often perceive problems in terms of analogies with the past, but that they ordinarily use history badly:

When resorting to an analogy, they tend to seize upon the first that comes to mind. They do not research more widely. Nor do they pause to analyze the case, test its fitness, or even ask in what ways it might be misleading.

As compared with policymakers, intelligence analysts have more time available to “analyze rather than analogize.” Intelligence analysts tend to be good historians, with a large number of historical precedents available for recall. The greater the number of potential analogues an analyst has at his or her disposal, the greater the likelihood of selecting an appropriate one. The greater the depth of an analyst’s knowledge, the greater the chances the analyst will perceive the differences as well as the similarities between two situations. Even under the best of circumstances, however, inferences based on comparison with a single analogous situation probably are more prone to error than most other forms of inference.

The most productive uses of comparative analysis are to suggest hypotheses and to highlight differences, not to draw conclusions. Comparison can suggest the presence or the influence of variables that are not readily apparent in the current situation, or stimulate the imagination to conceive explanations or possible outcomes that might not otherwise occur to the analyst. In short, comparison can generate hypotheses that then guide the search for additional information to confirm or refute these hypotheses. It should not, however, form the basis for conclusions unless thorough analysis of both situations has confirmed they are indeed comparable.

Data Immersion

Analysts sometimes describe their work procedure as immersing themselves in the data without fitting the data into any preconceived pattern. At some point an apparent pattern (or answer or explanation) emerges spontaneously, and the analyst then goes back to the data to check how well the data support this judgment. According to this view, objectivity requires the analyst to suppress any personal opinions or preconceptions, so as to be guided only by the “facts” of the case.

To think of analysis in this way overlooks the fact that information cannot speak for itself. The significance of information is always a joint function of the nature of the information and the context in which it is interpreted. The context is provided by the analyst in the form of a set of assumptions and expectations concerning human and organizational behavior. These preconceptions are critical determinants of which information is considered relevant and how it is interpreted.

Analysis begins when the analyst consciously inserts himself or herself into the process to select, sort, and organize information. This selection and organization can only be accomplished according to conscious or subconscious assumptions and preconceptions.

In research to determine how physicians make medical diagnoses, the doctors who comprised the test subjects were asked to describe their analytical strategies. Those who stressed thorough collection of data as

their principal analytical method were significantly less accurate in their diagnoses than those who described themselves as following other analytical strategies such as identifying and testing hypotheses.

Relationships Among Strategies

No one strategy is necessarily better than the others. In order to generate all relevant hypotheses and make maximum use of all potentially relevant information, it would be desirable to employ all three strategies at the early hypothesis generation phase of a research project. Unfortunately, analysts commonly lack the inclination or time to do so.

Differences in analytical strategy may cause fundamental differences in perspective between intelligence analysts and some of the policymakers for whom they write. Higher level officials who are not experts on the subject at issue use far more theory and comparison and less situational logic than intelligence analysts. Any policymaker or other senior manager who lacks the knowledge base of the specialist and does not have time for detail must, of necessity, deal with broad generalizations. Many decisions must be made, with much less time to consider each of them than is available to the intelligence analyst. This requires the policymaker to take a more conceptual approach, to think in terms of theories, models, or analogies that summarize large amounts of detail. Whether this represents sophistication or oversimplification depends upon the individual case and, perhaps, whether one agrees lead to increased diagnostic accuracy.

or disagrees with the judgments made. In any event, intelligence analysts would do well to take this phenomenon into account when writing for their consumers.

Strategies for Choice Among Hypotheses

A systematic analytical process requires selection among alternative hypotheses, and it is here that analytical practice often diverges significantly from the ideal and from the canons of scientific method. The ideal is to generate a full set of hypotheses, systematically evaluate each hypothesis, and then identify the hypothesis that provides the best fit to the data.

In practice, other strategies are commonly employed. Alexander George has identified a number of less-than-optimal strategies for making decisions in the face of incomplete information and multiple, competing values and goals. While George conceived of these strategies as applicable to how decisionmakers choose among alternative policies, most also apply to how intelligence analysts might decide among alternative analytical hypotheses.

The relevant strategies George identified are:

  • “Satisficing”–selecting the first identified alternative that appears “good enough” rather than examining all alternatives to determine which is “best.”
  • Incrementalism–focusing on a narrow range of alternatives representing marginal change, without considering the need for dramatic change from an existing position.
  • Consensus–opting for the alternative that will elicit the greatest agreement and support. Simply telling the boss what he or she wants to hear is one version of this.
  • Reasoning by analogy–choosing the alternative that appears most likely to avoid some previous error or to duplicate a previous success.
  • Relying on a set of principles or maxims that distinguish a “good” from a “bad” alternative.

“Satisficing”

I would suggest, based on personal experience and discussions with analysts, that most analysis is conducted in a manner very similar to the satisficing mode (selecting the first identified alternative that appears “good enough”). The analyst identifies what appears to be the most likely hypothesis–that is, the tentative estimate, explanation, or description of the situation that appears most accurate.

This approach has three weaknesses: the selective perception that results from focus on a single hypothesis, failure to generate a complete set of competing hypotheses, and a focus on evidence that confirms rather than disconfirms hypotheses. Each of these is discussed below.

Selective Perception. Tentative hypotheses serve a useful function in helping analysts select, organize, and manage information. They narrow the scope of the problem so that the analyst can focus efficiently on data that are most relevant and important. The hypotheses serve as organizing frameworks in working memory and thus facilitate retrieval of information from memory. In short, they are essential elements of the analytical process. But their functional utility also entails some cost, because a hypothesis functions as a perceptual filter. Analysts, like people in general, tend to see what they are looking for and to overlook that which is not specifically included in their search strategy. They tend to limit the processed information to that which is relevant to the current hypothesis. If the hypothesis is incorrect, information may be lost that would suggest a new or modified hypothesis.

This difficulty can be overcome by the simultaneous consideration of multiple hypotheses.

It has the advantage of focusing attention on those few items of evidence that have the greatest diagnostic value in distinguishing among the validity of competing hypotheses. Most evidence is consistent with several different hypotheses, and this fact is easily overlooked when analysts focus on only one hypothesis at a time–especially if their focus is on seeking to confirm rather than disprove what appears to be the most likely answer.

Failure To Generate Appropriate Hypotheses. If tentative hypotheses determine the criteria for searching for information and judging its relevance, it follows that one may overlook the proper answer if it is not encompassed within the several hypotheses being considered. Research on hypothesis generation suggests that performance on this task is woefully inadequate.

Analysts need to take more time to develop a full set of competing hypotheses, using all three of the previously discussed strategies–theory, situational logic, and comparison.

Failure To Consider Diagnosticity of Evidence. In the absence of a complete set of alternative hypotheses, it is not possible to evaluate the “diagnosticity” of evidence. Unfortunately, many analysts are unfamiliar with the concept of diagnosticity of evidence. It refers to the extent to which any item of evidence helps the analyst determine the relative likelihood of alternative hypotheses.

Evidence is diagnostic when it influences an analyst’s judgment on the relative likelihood of the various hypotheses. If an item of evidence seems consistent with all the hypotheses, it may have no diagnostic value at all. It is a common experience to discover that most available evidence really is not very helpful, as it can be reconciled with all the hypotheses.

Failure To Reject Hypotheses

Scientific method is based on the principle of rejecting hypotheses, while tentatively accepting only those hypotheses that cannot be refuted. Intuitive analysis, by comparison, generally concentrates on confirming a hypothesis and commonly accords more weight to evidence supporting a hypothesis than to evidence that weakens it. Ideally, the reverse would be true. While analysts usually cannot apply the statistical procedures of scientific methodology to test their hypotheses, they can and should adopt the conceptual strategy of seeking to refute rather than confirm hypotheses.

Failure To Reject Hypotheses

Scientific method is based on the principle of rejecting hypotheses, while tentatively accepting only those hypotheses that cannot be refuted. Intuitive analysis, by comparison, generally concentrates on confirming a hypothesis and commonly accords more weight to evidence supporting a hypothesis than to evidence that weakens it. Ideally, the reverse would be true. While analysts usually cannot apply the statistical procedures of scientific methodology to test their hypotheses, they can and should adopt the conceptual strategy of seeking to refute rather than confirm hypotheses.

There are two aspects to this problem: people do not naturally seek disconfirming evidence, and when such evidence is received it tends to be discounted. If there is any question about the former, consider how often people test their political and religious beliefs by reading newspapers and books representing an opposing viewpoint.

Apart from the psychological pitfalls involved in seeking confirmatory evidence, an important logical point also needs to be considered. The logical reasoning underlying the scientific method of rejecting hypotheses is that “…no confirming instance of a law is a verifying instance, but that any disconfirming instance is a falsifying instance”.

In other words, a hypothesis can never be proved by the enumeration of even a large body of evidence consistent with that hypothesis, because the same body of evidence may also be consistent with other hypotheses. A hypothesis may be disproved, however, by citing a single item of evidence that is incompatible with it.

the validity of a hypothesis can only be tested by seeking to disprove it rather than confirm it.

Consider lists of early warning indicators, for example. They are designed to be indicative of an impending attack. Very many of them, however, are also consistent with the hypothesis that military movements are a bluff to exert diplomatic pressure and that no military action will be forthcoming. When analysts seize upon only one of these hypotheses and seek evidence to confirm it, they will often be led astray.

The evidence available to the intelligence analyst is in one important sense different from the evidence available to test subjects asked to infer the number sequence rule. The intelligence analyst commonly deals with problems in which the evidence has only a probabilistic relationship to the hypotheses being considered. Thus it is seldom possible to eliminate any hypothesis entirely, because the most one can say is that a given hypothesis is unlikely given the nature of the evidence, not that it is impossible.

This weakens the conclusions that can be drawn from a strategy aimed at eliminating hypotheses, but it does not in any way justify a strategy aimed at confirming them.

Conclusion

There are many detailed assessments of intelligence failures, but few comparable descriptions of intelligence successes. In reviewing the literature on intelligence successes, Frank Stech found many examples of success but only three accounts that provide sufficient methodological details to shed light on the intellectual processes and methods that contributed to the successes.

Chapter 5
Do You Really Need More Information?

The difficulties associated with intelligence analysis are often attributed to the inadequacy of available information. Thus the US Intelligence Community invests heavily in improved intelligence collection systems while managers of analysis lament the comparatively small sums devoted to enhancing analytical resources, improving analytical methods, or gaining better understanding of the cognitive processes involved in making analytical judgments. This chapter questions the often- implicit assumption that lack of information is the principal obstacle to accurate intelligence judgements.

Using experts in a variety of fields as test subjects, experimental psychologists have examined the relationship between the amount of information available to the experts, the accuracy of judgments they make based on this information, and the experts’

intelligence judgments.

confidence in the accuracy of these judgments. The word “information,” as used in this context, refers to the totality of material an analyst has available to work with in making a judgment.

Key findings from this research are:

  • Once an experienced analyst has the minimum information necessary to make an informed judgment, obtaining additional information generally does not improve the accuracy of his or her estimates. Additional information does, however, lead the analyst to become more confident in the judgment, to the point of overconfidence.
  • Experienced analysts have an imperfect understanding of what information they actually use in making judgments. They are unaware of the extent to which their judgments are determined by a few dominant factors, rather than by the systematic integration of all available information. Analysts actually use much less of the available information than they think they do.

To interpret the disturbing but not surprising findings from these experiments, it is necessary to consider four different types of information and discuss their relative value in contributing to the accuracy of analytical judgments. It is also helpful to distinguish analysis in which results are driven by the data from analysis that is driven by the conceptual framework employed to interpret the data.

Understanding the complex relationship between amount of information and accuracy of judgment has implications for both the management and conduct of intelligence analysis. Such an understanding suggests analytical procedures and management initiatives that may indeed contribute to more accurate analytical judgments. It also suggests that resources needed to attain a better understanding of the entire analytical process might profitably be diverted from some of the more costly intelligence collection programs.

Modeling Expert Judgment

Another significant question concerns the extent to which analysts possess an accurate understanding of their own mental processes. How good is their insight into how they actually weight evidence in making judgments? For each situation to be analyzed, they have an implicit “mental model” consisting of beliefs and assumptions as to which variables are most important and how they are related to each other. If analysts have good insight into their own mental model, they should be able to identify and describe the variables they have considered most important in making judgments.

There is strong experimental evidence, however, that such self-insight is usually faulty. The expert perceives his or her own judgmental process, including the number of different kinds of information taken into account, as being considerably more complex than is in fact the case. Experts overestimate the importance of factors that have only a minor impact on their judgment and underestimate the extent to which their decisions are based on a few major variables. In short, people’s mental models are simpler than they think, and the analyst is typically unaware not only of which variables should have the greatest influence, but also which variables actually are having the greatest influence.

When Does New Information Affect Our Judgment?

To evaluate the relevance and significance of these experimental findings in the context of intelligence analysts’ experiences, it is necessary to distinguish four types of additional information that an analyst might receive:

  • Additional detail about variables already included in the analysis: Much raw intelligence reporting falls into this category. One would not expect such supplementary information to affect the overall accuracy of the analyst’s judgment, and it is readily understandable that further detail that is consistent with previous information increases the analyst’s confidence. Analyses for which considerable depth of detail is available to support the conclusions tend to be more persuasive to their authors as well as to their readers.
  • Identification of additional variables: Information on additional variables permits the analyst to take into account other factors that may affect the situation. This is the kind of additional information used in the horserace handicapper experiment. Other experiments have employed some combination of additional variables and additional detail on the same variables. The finding that judgments are based on a few critical variables rather than on the entire spectrum of evidence helps to explain why information on additional variables does not normally improve predictive accuracy. Occasionally, in situations when there are known gaps in an analyst’s understanding, a single report concerning some new and previously unconsidered factor–for example, an authoritative report on a policy decision or planned coup d’etat–will have a major impact on the analyst’s judgment. Such a report would fall into one of the next two categories of new information.
  • Information concerning the value attributed to variables already included in the analysis: An example of such information would be the horserace handicapper learning that a horse he thought would carry 110 pounds will actually carry only 106. Current intelligence reporting tends to deal with this kind of information; for example, an analyst may learn that a dissident group is stronger than had been anticipated. New facts affect the accuracy of judgments when they deal with changes in variables that are critical to the estimates. Analysts’ confidence in judgments based on such information is influenced by their confidence in the accuracy of the information as well as by the amount of information.
  • Information concerning which variables are most important and how they relate to each other: Knowledge and assumptions as to which variables are most important and how they are interrelated comprise the mental model that tells the analyst how to analyze the data received. Explicit investigation of such relationships is one factor that distinguishes systematic research from current intelligence reporting and raw intelligence. In the context of the horserace handicapper experiment, for example, handicappers had to select which variables to include in their analysis. Is weight carried by a horse more, or less, important than several other variables that affect a horse’s performance? Any information that affects this judgment influences how the handicapper analyzes the available data; that is, it affects his mental model.

The accuracy of an analyst’s judgment depends upon both the accuracy of our mental model (the fourth type of information discussed above) and the accuracy of the values attributed to the key variables in the model (the third type of information discussed above). Additional detail on variables already in the analyst’s mental model and information on other variables that do not in fact have a significant influence on our judgment (the first and second types of information) have a negligible impact on accuracy, but form the bulk of the raw material analysts work with. These kinds of information increase confidence because the conclusions seem to be supported by such a large body of data.

This discussion of types of new information is the basis for distinguishing two types of analysis- data-driven analysis and conceptually-driven analysis.

Data-Driven Analysis

In this type of analysis, accuracy depends primarily upon the accuracy and completeness of the available data. If one makes the reasonable assumption that the analytical model is correct and the further assumption that the analyst properly applies this model to the data, then the accuracy of the analytical judgment depends entirely upon the accuracy and completeness of the data.

Analyzing the combat readiness of a military division is an example of data-driven analysis. In analyzing combat readiness, the rules and procedures to be followed are relatively well established.

Most elements of the mental model can be made explicit so that other analysts may be taught to understand and follow the same analytical procedures and arrive at the same or similar results. There is broad, though not necessarily universal, agreement on what the appropriate model is. There are relatively objective standards for judging the quality of analysis, inasmuch as the conclusions follow logically from the application of the agreed-upon model to the available data.

Conceptually Driven Analysis

Conceptually driven analysis is at the opposite end of the spectrum from data-driven analysis. The questions to be answered do not have neat boundaries, and there are many unknowns. The number of potentially relevant variables and the diverse and imperfectly understood relationships among these variables involve the analyst in enormous complexity and uncertainty.

In the absence of any agreed-upon analytical schema, analysts are left to their own devices. They interpret information with the aid of mental models that are largely implicit rather than explicit. Assumptions concerning political forces and processes in the subject country may not be apparent even to the analyst. Such models are not representative of an analytical consensus. Other analysts examining the same data may well reach different conclusions, or reach the same conclusions but for different reasons. This analysis is conceptually driven, because the outcome depends at least as much upon the conceptual framework employed to analyze the data as it does upon the data itself.

To illustrate further the distinction between data-driven and conceptually driven analysis, it is useful to consider the function of the analyst responsible for current intelligence, especially current political intelligence as distinct from longer term research. The daily routine is driven by the incoming wire service news, embassy cables, and clandestine-source reporting from overseas that must be interpreted for dissemination to consumers throughout the Intelligence Community. Although current intelligence reporting is driven by incoming information, this is not what is meant by data-driven analysis. On the contrary, the current intelligence analyst’s task is often extremely concept-driven. The analyst must provide immediate interpretation of the latest, often unexpected events. Apart from his or her store of background information, the analyst may have no data other than the initial, usually incomplete report. Under these circumstances, interpretation is based upon an implicit mental model of how and why events normally transpire in the country for which the analyst is responsible. Accuracy of judgment depends almost exclusively upon accuracy of the mental model, for there is little other basis for judgment.

Partly because of the nature of human perception and information-processing, beliefs of all types tend to resist change. This is especially true of the implicit assumptions and supposedly self-evident truths that play an important role in forming mental models. Analysts are often surprised to learn that what are to them self-evident truths are by no means self-evident to others, or that self-evident truth at one point in time may be commonly regarded as uninformed assumption 10 years later.

Information that is consistent with an existing mind-set is perceived and processed easily and reinforces existing beliefs. Because the mind strives instinctively for consistency, information that is inconsistent with an existing mental image tends to be overlooked, perceived in a distorted manner, or rationalized to fit existing assumptions and beliefs.

Mosaic Theory of Analysis

Understanding of the analytic process has been distorted by the mosaic metaphor commonly used to describe it. According to the mosaic theory of intelligence, small pieces of information are collected that, when put together like a mosaic or jigsaw puzzle, eventually enable analysts to perceive a clear picture of reality. The analogy suggests that accurate estimates depend primarily upon having all the pieces, that is, upon accurate and relatively complete information. It is important to collect and store the small pieces of information, as these are the raw material from which the picture is made; one never knows when it will be possible for an astute analyst to fit a piece into the puzzle. Part of the rationale for large technical intelligence collection systems is rooted in this mosaic theory.

Insights from cognitive psychology suggest that intelligence analysts do not work this way and that the most difficult analytical tasks cannot be approached in this manner. Analysts commonly find pieces that appear to fit many different pictures. Instead of a picture emerging from putting all the pieces together, analysts typically form a picture first and then select the pieces to fit. Accurate estimates depend at least as much upon the mental model used in forming the picture as upon the number of pieces of the puzzle that have been collected.

While analysis and collection are both important, the medical analogy attributes more value to analysis and less to collection than the mosaic metaphor.

Conclusions

To the leaders and managers of intelligence who seek an improved intelligence product, these findings offer a reminder that this goal can be achieved by improving analysis as well as collection. There appear to be inherent practical limits on how much can be gained by efforts to improve collection. By contrast, an open and fertile field exists for imaginative efforts to improve analysis.

These efforts should focus on improving the mental models employed by analysts to interpret information and the analytical processes used to evaluate it. While this will be difficult to achieve, it is so critical to effective intelligence analysis that even small improvements could have large benefits. Specific recommendations are included the next three chapters and in Chapter 14, “Improving Intelligence Analysis.”

Chapter 6

Keeping an Open Mind

Minds are like parachutes. They only function when they are open. After reviewing how and why thinking gets channeled into mental ruts, this chapter looks at mental tools to help analysts keep an open mind, question assumptions, see different perspectives, develop new ideas, and recognize when it is time to change their minds.

A new idea is the beginning, not the end, of the creative process. It must jump over many hurdles before being embraced as an organizational product or solution. The organizational climate plays a crucial role in determining whether new ideas bubble to the surface or are suppressed.

                         *******************

Major intelligence failures are usually caused by failures of analysis, not failures of collection. Relevant information is discounted, misinterpreted, ignored, rejected, or overlooked because it fails to fit a prevailing mental model or mind-set. The “signals” are lost in the “noise.”

A mind-set is neither good nor bad. It is unavoidable. It is, in essence, a distillation of all that analysts think they know about a subject. It forms a lens through which they perceive the world, and once formed, it resists change.

Understanding Mental Ruts

Chapter 3 on memory suggested thinking of information in memory as somehow interconnected like a massive, multidimensional spider web. It is possible to connect any point within this web to any other point. When analysts connect the same points frequently, they form a path that makes it easier to take that route in the future. Once they start thinking along certain channels, they tend to continue thinking the same way and the path may become a rut.

Talking about breaking mind-sets, or creativity, or even just openness to new information is really talking about spinning new links and new paths through the web of memory. These are links among facts and concepts, or between schemata for organizing facts or concepts, that were not directly connected or only weakly connected before.

Problem-Solving Exercise

intelligence analysis is too often limited by similar, unconscious, self-imposed constraints or “cages of the mind.”

You do not need to be constrained by conventional wisdom. It is often wrong. You do not necessarily need to be constrained by existing policies. They can sometimes be changed if you show a good reason for doing so. You do not necessarily need to be constrained by the specific analytical requirement you were given. The policymaker who originated the requirement may not have thought through his or her needs or the requirement may be somewhat garbled as it passes down through several echelons to you to do the work. You may have a better understanding than the policymaker of what he or she needs, or should have, or what is possible to do. You should not hesitate to go back up the chain of command with a suggestion for doing something a little different than what was asked for.

Mental Tools

People use various physical tools such as a hammer and saw to enhance their capacity to perform various physical tasks. People can also use simple mental tools to enhance their ability to perform mental tasks. These tools help overcome limitations in human mental machinery for perception, memory, and inference.

Questioning Assumptions

It is a truism that analysts need to question their assumptions. Experience tells us that when analytical judgments turn out to be wrong, it usually was not because the information was wrong. It was because an analyst made one or more faulty assumptions that went unchallenged.

Sensitivity Analysis. One approach is to do an informal sensitivity analysis. How sensitive is the ultimate judgment to changes in any of the major variables or driving forces in the analysis? Those linchpin assumptions that drive the analysis are the ones that need to be questioned. Analysts should ask themselves what could happen to make any of these assumptions out of date, and how they can know this has not already happened. They should try to disprove their assumptions rather than confirm them. If an analyst cannot think of anything that would cause a change of mind, his or her mind-set may be so deeply entrenched that the analyst cannot see the conflicting evidence. One advantage of the competing hypotheses approach discussed in Chapter 8 is that it helps identify the linchpin assumptions that swing a conclusion in one direction or another.

Identify Alternative Models. Analysts should try to identify alternative models, conceptual frameworks, or interpretations of the data by seeking out individuals who disagree with them rather than those who agree. Most people do not do that very often. It is much more comfortable to talk with people in one’s own office who share the same basic mind-set. There are a few things that can be done as a matter of policy, and that have been done in some offices in the past, to help overcome this tendency.

At least one Directorate of Intelligence component, for example, has had a peer review process in which none of the reviewers was from the branch that produced the report. The rationale for this was that an analyst’s immediate colleagues and supervisor(s) are likely to share a common mind-set. Hence these are the individuals least likely to raise fundamental issues challenging the validity of the analysis. To

avoid this mind-set problem, each research report was reviewed by a committee of three analysts from other branches handling other countries or issues. None of them had specialized knowledge of the subject. They were, however, highly accomplished analysts. Precisely because they had not been immersed in the issue in question, they were better able to identify hidden assumptions and other alternatives, and to judge whether the analysis adequately supported the conclusions.

Be Wary of Mirror Images. One kind of assumption an analyst should always recognize and question is mirror-imaging–filling gaps in the analyst’s own knowledge by assuming that the other side is likely to act in a certain way because that is how the US would act under similar circumstances. To say, “if I were a Russian intelligence officer …” or “if I were running the Indian Government …” is mirror-imaging. Analysts may have to do that when they do not know how the Russian intelligence officer or the Indian Government is really thinking. But mirror-imaging leads to dangerous assumptions, because people in other cultures do not think the way we do.

Failure to understand that others perceive their national interests differently from the way we perceive those interests is a constant source of problems in intelligence analysis.

Seeing Different Perspectives

Another problem area is looking at familiar data from a different perspective. If you play chess, you know you can see your own options pretty well. It is much more difficult to see all the pieces on the board as your opponent sees them, and to anticipate how your opponent will react to your move. That is the situation analysts are in when they try to see how the US Government’s actions look from another country’s perspective. Analysts constantly have to move back and forth, first seeing the situation from the US perspective and then from the other country’s perspective. This is difficult to do

Thinking Backwards. One technique for exploring new ground is thinking backwards. As an intellectual exercise, start with an assumption that some event you did not expect has actually occurred. Then, put yourself into the future, looking back to explain how this could have happened. Think what must have happened six months or a year earlier to set the stage for that outcome, what must have happened six months or a year before that to prepare the way, and so on back to the present.

Crystal Ball. The crystal ball approach works in much the same way as thinking 71

backwards. Imagine that a “perfect” intelligence source (such as a crystal ball) has told you a certain assumption is wrong. You must then develop a scenario to explain how this could be true. If you can develop a plausible scenario, this suggests your assumption is open to some question.

Role playing. Role playing is commonly used to overcome constraints and inhibitions that limit the range of one’s thinking. Playing a role changes “where you sit.” It also gives one license to think and act differently. Simply trying to imagine how another leader or country will think and react, which analysts do frequently, is not role playing. One must actually act out the role and become, in a sense, the person whose role is assumed. It is only “living” the role that breaks an analyst’s normal mental set and permits him or her to relate facts and ideas to each other in ways that differ from habitual patterns. An analyst cannot be expected to do this alone; some group interaction is required, with different analysts playing different roles, usually in the context of an organized simulation or game.

Just one notional intelligence report is sufficient to start the action in the game. In my experience, it is possible to have a useful political game in just one day with almost no investment in preparatory work.

Devil’s Advocate. A devil’s advocate is someone who defends a minority point of view. He or she may not necessarily agree with that view, but may choose or be assigned to represent it as strenuously as possible. The goal is to expose conflicting interpretations and show how alternative assumptions and images make the world look different. It often requires time, energy, and commitment to see how the world looks from a different perspective.

Imagine that you are the boss at a US facility overseas and are worried about the possibility of a terrorist attack. A standard staff response would be to review existing measures and judge their adequacy. There might well be pressure–subtle or otherwise–from those responsible for such arrangements to find them satisfactory. An alternative or supplementary approach would be to name an individual or small group as a devil’s advocate assigned to develop actual plans for launching such an attack. The assignment to think like a terrorist liberates the designated person(s) to think unconventionally and be less inhibited about finding weaknesses in the system that might embarrass colleagues, because uncovering any such weaknesses is the assigned task.

Recognizing When To Change Your Mind

As a general rule, people are too slow to change an established view, as opposed to being too willing to change. The human mind is conservative. It resists change. Assumptions that worked well in the past continue to be applied to new situations long after they have become outmoded.

Learning from Surprise. A study of senior managers in industry identified how some successful managers counteract this conservative bent. They do it, according to the study, looks from a different perspective.

By paying attention to their feelings of surprise when a particular fact does not fit their prior understanding, and then by highlighting rather than denying the novelty. Although surprise made them feel uncomfortable, it made them take the cause [of the surprise] seriously and inquire into it….Rather than deny, downplay, or ignore disconfirmation [of their prior view], successful senior managers often treat it as friendly and in a way cherish the discomfort surprise creates. As a result, these managers often perceive novel situations early on and in a frame of mind relatively undistorted by hidebound notions.

Analysts should keep a record of unexpected events and think hard about what they might mean, not disregard them or explain them away. It is important to consider whether these surprises, however small, are consistent with some alternative hypothesis. One unexpected event may be easy to disregard, but a pattern of surprises may be the first clue that your understanding of what is happening requires some adjustment, is at best incomplete, and may be quite wrong.

Strategic Assumptions vs. Tactical Indicators. Abraham Ben-Zvi analyzed five cases of intelligence failure to foresee a surprise attack. He made a useful distinction between estimates based on strategic assumptions and estimates based on tactical indications.

Tactical indicators are specific reports of preparations or intent to initiate hostile action or, in the recent Indian case, reports of preparations for a nuclear test.

tactical indicators should be given increased weight in the decisionmaking process.

At a minimum, the emergence of tactical indicators that contradict our strategic assumption should trigger a higher level of intelligence alert. It may indicate that a bigger surprise is on the way.

Stimulating Creative Thinking

Imagination and creativity play important roles in intelligence analysis as in most other human endeavors. Intelligence judgments require the ability to imagine possible causes and outcomes of a current situation. All possible outcomes are not given. The analyst must think of them by imagining scenarios that explicate how they might come about. Similarly, imagination as well as knowledge is required to reconstruct how a problem appears from the viewpoint of a foreign government. Creativity is required to question things that have long been taken for granted. The fact that apples fall from trees was well known to everyone. Newton’s creative genius was to ask “why?” Intelligence analysts, too, are expected to raise new questions that lead to the identification of previously unrecognized relationships or to possible outcomes that had not previously been foreseen.

A creative analytical product shows a flair for devising imaginative or innovative– but also accurate and effective–ways to fulfill any of the major requirements of analysis: gathering information, analyzing information, documenting evidence, and/or presenting conclusions. Tapping unusual sources of data, asking new questions, applying unusual analytic methods, and developing new types of products or new ways of fitting analysis to the needs of consumers are all examples of creative activity.

The old view that creativity is something one is born with, and that it cannot be taught or developed, is largely untrue. While native talent, per se, is important and may be immutable, it is possible to learn to employ one’s innate talents more productively. With understanding, practice, and conscious effort, analysts can learn to produce more imaginative, innovative, creative work.

There is a large body of literature on creativity and how to stimulate it. At least a half- dozen different methods have been developed for teaching, facilitating, or liberating creative thinking. All the methods for teaching or facilitating creativity are based on the assumption that the process of thinking can be separated from the content of thought. One learns mental strategies that can be applied to any subject.

It is not our purpose here to review commercially available programs for enhancing creativity. Such programmatic approaches can be applied more meaningfully to problems of new product development, advertising, or management than to intelligence analysis. It is relevant, however, to discuss several key principles and techniques that these programs have in common, and that individual intelligence analysts or groups of analysts can apply in their work.

Intelligence analysts must generate ideas concerning potential causes or explanations of events, policies that might be pursued or actions taken by a foreign government, possible outcomes of an existing situation, and variables that will influence which outcome actually comes to pass. Analysts also need help to jog them out of mental ruts, to stimulate their memories and imaginations, and to perceive familiar events from a new perspective.

Deferred Judgment. The principle of deferred judgment is undoubtedly the most important. The idea-generation phase of analysis should be separated from the idea- evaluation phase, with evaluation deferred until all possible ideas have been brought out. This approach runs contrary to the normal procedure of thinking of ideas and evaluating them concurrently. Stimulating the imagination and critical thinking are both important, but they do not mix well. A judgmental attitude dampens the imagination, whether it manifests itself as self-censorship of one’s own ideas or fear of critical evaluation by colleagues or supervisors. Idea generation should be a freewheeling, unconstrained, uncritical process.

New ideas are, by definition, unconventional, and therefore likely to be suppressed, either consciously or unconsciously, unless they are born in a secure and protected environment. Critical judgment should be suspended until after the idea-generation stage of analysis has been completed. A series of ideas should be written down and then evaluated later. This applies to idea searching by individuals as well as brainstorming in a group. Get all the ideas out on the table before evaluating any of them.

Quantity Leads to Quality. A second principle is that quantity of ideas eventually leads to quality. This is based on the assumption that the first ideas that come to mind will be those that are most common or usual. It is necessary to run through these conventional ideas before arriving at original or different ones. People have habitual ways of thinking, ways that they continue to use because they have seemed successful in the past. It may well be that these habitual responses, the ones that come first to mind, are the best responses and that further search is unnecessary. In looking for usable new ideas, however, one should seek to generate as many ideas as possible before evaluating any of them.

No Self-Imposed Constraints. A third principle is that thinking should be allowed– indeed encouraged–to range as freely as possible. It is necessary to free oneself from self-imposed constraints, whether they stem from analytical habit, limited perspective, social norms, emotional blocks, or whatever.

Cross-Fertilization of Ideas. A fourth principle of creative problem-solving is that cross-fertilization of ideas is important and necessary. Ideas should be combined with each other to form more and even better ideas. If creative thinking involves forging new links between previously unrelated or weakly related concepts, then creativity will be stimulated by any activity that brings more concepts into juxtaposition with each other in fresh ways. Interaction with other analysts is one basic mechanism for this. As a general rule, people generate more creative ideas when teamed up with others; they help to build and develop each other’s ideas. Personal interaction stimulates new associations between ideas. It also induces greater effort and helps maintain concentration on the task.

These favorable comments on group processes are not meant to encompass standard committee meetings or coordination processes that force consensus based on the lowest common denominator of agreement. My positive words about group interaction apply primarily to brainstorming sessions aimed at generating new ideas and in which, according to the first principle discussed above, all criticism and evaluation are deferred until after the idea generation stage is completed.

Thinking things out alone also has its advantages: individual thought tends to be more structured and systematic than interaction within a group. Optimal results come from alternating between individual thinking and team effort, using group interaction to generate ideas that supplement individual thought. A diverse group is clearly preferable to a homogeneous one. Some group participants should be analysts who are not close to the problem, inasmuch as their ideas are more likely to reflect different insights.

Idea Evaluation. All creativity techniques are concerned with stimulating the flow of ideas. There are no comparable techniques for determining which ideas are best. The procedures are, therefore, aimed at idea generation rather than idea evaluation. The same procedures do aid in evaluation, however, in the sense that ability to generate more alternatives helps one see more potential consequences, repercussions, and effects that any single idea or action might entail.

Organizational Environment

A new idea is not the end product of the creative process. Rather, it is the beginning of what is sometimes a long and tortuous process of translating an idea into an innovative product. The idea must be developed, evaluated, and communicated to others, and this process is influenced by the organizational setting in which it transpires. The potentially useful new idea must pass over a number of hurdles before it is embraced as an organizational product.

Organizational Environment

A new idea is not the end product of the creative process. Rather, it is the beginning of what is sometimes a long and tortuous process of translating an idea into an innovative product. The idea must be developed, evaluated, and communicated to others, and this process is influenced by the organizational setting in which it transpires. The potentially useful new idea must pass over a number of hurdles before it is embraced as an organizational product.

A panel of judges composed of the leading scientists in the field of medical sociology was asked to evaluate the principal published results from each of the 115 research projects. Judges evaluated the research results on the basis of productivity and innovation.

Productivity was defined as the “extent to which the research represents an addition to knowledge along established lines of research or as extensions of previous theory.”

Innovativeness was defined as “additions to knowledge through new lines of research or the development of new theoretical statements of findings that were not explicit in previous theory. Innovation, in other words, involved raising new questions and developing new approaches to the acquisition of knowledge, as distinct from working productively within an already established framework. This same definition applies to innovation in intelligence analysis.

Andrews found virtually no relationship between the scientists’ creative ability and the innovativeness of their research. (There was also no relationship between level of intelligence and innovativeness.) Those who scored high on tests of creative ability did not necessarily receive high ratings from the judges evaluating the innovativeness of their work. A possible explanation is that either creative ability or innovation, or both, were not measured accurately, but Andrews argues persuasively for another view. Various social and psychological factors have so great an effect on the steps needed to translate creative ability into an innovative research product that there is no measurable effect traceable to creative ability alone. In order to document this conclusion, Andrews analyzed data from the questionnaires in which the scientists described their work environment.

Andrews found that scientists possessing more creative ability produced more innovative work only under the following favorable conditions:

  • When the scientist perceived himself or herself as responsible for initiating new activities. The opportunity for innovation, and the encouragement of it, are–not surprisingly–important variables.
  • When the scientist had considerable control over decisionmaking concerning his or her research program–in other words, the freedom to set goals, hire research assistants, and expend funds. Under these circumstances, a new idea is less likely to be snuffed out before it can be developed into a creative and useful product.
  • When the scientist felt secure and comfortable in his or her professional role. New ideas are often disruptive, and pursuing them carries the risk of failure. People are more likely to advance new ideas if they feel secure in their positions.
  • When the scientist’s administrative superior “stayed out of the way.” Research is likely to be more innovative when the superior limits himself or herself to support and facilitation rather than direct involvement.
  • When the project was relatively small with respect to the number of people involved, budget, and duration. Small size promotes flexibility, and this in turn is more conducive to creativity.
  • When the scientist engaged in other activities, such as teaching or administration, in addition to the research project. Other work may provide useful stimulation or help one identify opportunities for developing or implementing new ideas. Some time away from the task, or an incubation period, is generally recognized as part of the creative process.”

The importance of any one of these factors was not very great, but their impact was cumulative. The presence of all or most of these conditions exerted a strongly favorable influence on the creative process. Conversely, the absence of these conditions made it quite unlikely that even highly creative scientists could develop their new ideas into innovative research results. Under unfavorable conditions, the most creatively inclined scientists produced even less innovative work than their less imaginative colleagues, presumably because they experienced greater frustration with their work environment.

There are, of course, exceptions to the rule. Some creativity occurs even in the face of intense opposition. A hostile environment can be stimulating, enlivening, and challenging. Some people gain satisfaction from viewing themselves as lonely fighters in the wilderness, but when it comes to conflict between a large organization and a creative individual within it, the organization generally wins.

Recognizing the role of organizational environment in stimulating or suppressing creativity points the way to one obvious set of measures to enhance creative organizational performance. Managers of analysis, from first-echelon supervisors to the Director of Central Intelligence, should take steps to strengthen and broaden the perception among analysts that new ideas are welcome. This is not easy; creativity implies criticism of that which already exists. It is, therefore, inherently disruptive of established ideas and organizational practices.

Particularly within his or her own office, an analyst needs to enjoy a sense of security, so that partially developed ideas may be expressed and bounced off others as sounding boards with minimal fear of criticism or ridicule for deviating from established orthodoxy. At its inception, a new idea is frail and vulnerable. It needs to be nurtured, developed, and tested in a protected environment before being exposed to the harsh reality of public criticism. It is the responsibility of an analyst’s immediate supervisor and office colleagues to provide this sheltered environment.

Conclusions

Creativity, in the sense of new and useful ideas, is at least as important in intelligence analysis as in any other human endeavor. Procedures to enhance innovative thinking are not new. Creative thinkers have employed them successfully for centuries. The only new elements–and even they may not be new anymore–are the grounding of these procedures in psychological theory to explain how and why they work, and their formalization in systematic creativity programs.

Another prerequisite to creativity is sufficient strength of character to suggest new ideas to others, possibly at the expense of being rejected or even ridiculed on occasion. “The ideas of creative people often lead them into direct conflict with the trends of their time, and they need the courage to be able to stand alone.”

Chapter 7

Structuring Analytical Problems

This chapter discusses various structures for decomposing and externalizing complex analytical problems when we cannot keep all the relevant factors in the forefront of our consciousness at the same time.

Decomposition means breaking a problem down into its component parts. Externalization means getting the problem out of our heads and into some visible form that we can work with.

There are two basic tools for dealing with complexity in analysis–decomposition and externalization.

Decomposition means breaking a problem down into its component parts. That is, indeed, the essence of analysis. Webster’s Dictionary defines analysis as division of a complex whole into its parts or elements.

The spirit of decision analysis is to divide and conquer: Decompose a complex problem into simpler problems, get one’s thinking straight in these simpler problems, paste these analyses together with a logical glue …

Externalization means getting the decomposed problem out of one’s head and down on paper or on a computer screen in some simplified form that shows the main variables, parameters, or elements of the problem and how they relate to each other.

Putting ideas into visible form ensures that they will last. They will lie around for days goading you into having further thoughts. Lists are effective because they exploit people’s tendency to be a bit compulsive–we want to keep adding to them. They let us get the obvious and habitual answers out of the way, so that we can add to the list by thinking of other ideas beyond those that came first to mind. One specialist in creativity has observed that “for the purpose of moving our minds, pencils can serve as crowbars” –just by writing things down and making lists that stimulate new associations.

Problem Structure

Anything that has parts also has a structure that relates these parts to each other. One of the first steps in doing analysis is to determine an appropriate structure for the analytical problem, so that one can then identify the various parts and begin assembling information on them. Because there are many different kinds of analytical problems, there are also many different ways to structure analysis.

Lists such as Franklin made are one of the simplest structures. An intelligence analyst might make lists of relevant variables, early warning indicators, alternative explanations, possible outcomes, factors a foreign leader will need to take into account when making a decision, or arguments for and against a given explanation or outcome.

Other tools for structuring a problem include outlines, tables, diagrams, trees, and matrices, with many sub-species of each. For example, trees include decision trees and fault trees. Diagrams includes causal diagrams, influence diagrams, flow charts, and cognitive maps.

Chapter 8
Analysis of Competing Hypotheses

Analysis of competing hypotheses, sometimes abbreviated ACH, is a tool to aid judgment on important issues requiring careful weighing of alternative explanations or conclusions. It helps an analyst overcome, or at least minimize, some of the cognitive limitations that make prescient intelligence analysis so difficult to achieve.

ACH is an eight-step procedure grounded in basic insights from cognitive

psychology, decision analysis, and the scientific method. It is a surprisingly effective, proven process that helps analysts avoid common analytic pitfalls. Because of its thoroughness, it is particularly appropriate for controversial issues when analysts want to leave an audit trail to show what they considered and how they arrived at their judgement.

When working on difficult intelligence issues, analysts are, in effect, choosing among several alternative hypotheses. Which of several possible explanations is the correct one? Which of several possible outcomes is the most likely one? As previously noted, this book uses the term “hypothesis” in its broadest sense as a potential explanation or conclusion that is to be tested by collecting and presenting evidence.

Analysis of competing hypotheses (ACH) requires an analyst to explicitly identify all the reasonable alternatives and have them compete against each other for the analyst’s favor, rather than evaluating their plausibility one at a time.

The way most analysts go about their business is to pick out what they suspect intuitively is the most likely answer, then look at the available information from the point of view of whether or not it supports this answer. If the evidence seems to support the favorite hypothesis, analysts pat themselves on the back (“See, I knew it all along!”) and look no further. If it does not, they either reject the evidence as misleading or develop another hypothesis and go through the same procedure again.

Simultaneous evaluation of multiple, competing hypotheses is very difficult to do. To retain three to five or even seven hypotheses in working memory and note how each item of information fits into each hypothesis is beyond the mental capabilities of most people. It takes far greater mental agility than listing evidence supporting a single hypothesis that was pre-judged as the most likely answer. It can be accomplished, though, with the help of the simple procedures discussed here. The box below contains a step-by-step outline of the ACH process.

Step 1

Identify the possible hypotheses to be considered. Use a group of analysts with different perspectives to brainstorm the possibilities.

Step-by-Step Outline of Analysis of Competing Hypotheses

  1. Identify the possible hypotheses to be considered. Use a group of analysts with different perspectives to brainstorm the possibilities.
  2. Make a list of significant evidence and arguments for and against each hypothesis.
  3. Prepare a matrix with hypotheses across the top and evidence down the side. Analyze the “diagnosticity” of the evidence and arguments–that is, identify which items are most helpful in judging the relative likelihood of the hypotheses.
  4. Refine the matrix. Reconsider the hypotheses and delete evidence and arguments that have no diagnostic value.
  5. Draw tentative conclusions about the relative likelihood of each hypothesis. Proceed by trying to disprove the hypotheses rather than prove them.
  6. Analyze how sensitive your conclusion is to a few critical items of evidence. Consider the consequences for your analysis if that evidence were wrong, misleading, or subject to a different interpretation.
  7. Report conclusions. Discuss the relative likelihood of all the hypotheses, not just the most likely one.
  8. Identify milestones for future observation that may indicate events are taking a different course than expected.

It is useful to make a clear distinction between the hypothesis generation and hypothesis evaluation stages of analysis. Step 1 of the recommended analytical process is to identify all hypotheses that merit detailed examination. At this early hypothesis generation stage, it is very useful to bring together a group of analysts with different backgrounds and perspectives. Brainstorming in a group stimulates the imagination and may bring out possibilities that individual members of the group had not thought of. Initial discussion in the group should elicit every possibility, no matter how remote, before judging likelihood or feasibility. Only when all the possibilities are on the table should you then focus on judging them and selecting the hypotheses to be examined in greater detail in subsequent analysis.

Early rejection of unproven, but not disproved, hypotheses biases the subsequent analysis, because one does not then look for the evidence that might support them. Unproven hypotheses should be kept alive until they can be disproved.

Step 2

Make a list of significant evidence and arguments for and against each hypothesis.

In assembling the list of relevant evidence and arguments, these terms should be interpreted very broadly. They refer to all the factors that have an impact on your judgments about the hypotheses. Do not limit yourself to concrete evidence in the current intelligence reporting. Also include your own assumptions or logical deductions about another person’s or group’s or country’s intentions, goals, or standard procedures. These assumptions may generate strong preconceptions as to which hypothesis is most likely. Such assumptions often drive your final judgment, so it is important to include them in the list of “evidence.”

First, list the general evidence that applies to all the hypotheses. Then consider each hypothesis individually, listing factors that tend to support or contradict each one. You will commonly find that each hypothesis leads you to ask different questions and, therefore, to seek out somewhat different evidence.

Step 3

Prepare a matrix with hypotheses across the top and evidence down the side. Analyze the “diagnosticity” of the evidence and arguments- that is, identify which items are most helpful in judging the relative likelihood of alternative hypotheses.

Step 3 is perhaps the most important element of this analytical procedure. It is also the step that differs most from the natural, intuitive approach to analysis, and, therefore, the step you are most likely to overlook or misunderstand.

The procedure for Step 3 is to take the hypotheses from Step 1 and the evidence and arguments from Step 2 and put this information into a matrix format, with the hypotheses across the top and evidence and arguments down the side. This gives an overview of all the significant components of your analytical problem.

Then analyze how each piece of evidence relates to each hypothesis. This differs from the normal procedure, which is to look at one hypothesis at a time in order to consider how well the evidence supports that hypothesis. That will be done later, in Step 5. At this point, in Step 3, take one item of evidence at a time, then consider how consistent that evidence is with each of the hypotheses. Here is how to remember this distinction. In Step 3, you work acrossthe rows of the matrix, examining one item of evidence at a time to see how consistent that item of evidence is with each of the hypotheses. In Step 5, you work down the columns of the matrix, examining one hypothesis at a time, to see how consistent that hypothesis is with all the evidence.

To fill in the matrix, take the first item of evidence and ask whether it is consistent with, inconsistent with, or irrelevant to each hypothesis. Then make a notation accordingly in the appropriate cell under each hypothesis in the matrix. The form of these notations in the matrix is a matter of personal preference. It may be pluses, minuses, and question marks. It may be C, I, and N/A standing for consistent, inconsistent, or not applicable. Or it may be some textual notation. In any event, it will be a simplification, a shorthand representation of the complex reasoning that went on as you thought about how the evidence relates to each hypothesis.

After doing this for the first item of evidence, then go on to the next item of evidence and repeat the process until all cells in the matrix are filled

The matrix format helps you weigh the diagnosticity of each item of evidence, which is a key difference between analysis of competing hypotheses and traditional analysis.

Evidence is diagnostic when it influences your judgment on the relative likelihood of the various hypotheses identified in Step 1. If an item of evidence seems consistent with all the hypotheses, it may have no diagnostic value. A common experience is to discover that most of the evidence supporting what you believe is the most likely hypothesis really is not very helpful, because that same evidence is also consistent with other hypotheses. When you do identify items that are highly diagnostic, these should drive your judgment.

Step 4

Refine the matrix. Reconsider the hypotheses and delete evidence and arguments that have no diagnostic value.

The exact wording of the hypotheses is obviously critical to the conclusions one can draw from the analysis. By this point, you will have seen how the evidence breaks out under each hypothesis, and it will often be appropriate to reconsider and reword the hypotheses. Are there hypotheses that need to be added, or finer distinctions that need to be made in order to consider all the significant alternatives? If there is little or no evidence that helps distinguish between two hypotheses, should they be combined into one?

Also reconsider the evidence. Is your thinking about which hypotheses are most likely and least likely influenced by factors that are not included in the listing of evidence? If so, put them in. Delete from the matrix items of evidence or assumptions

that now seem unimportant or have no diagnostic value. Save these items in a separate list as a record of information that was considered.

Step 5

Draw tentative conclusions about the relative likelihood of each hypothesis. Proceed by trying to disprove hypotheses rather than prove them.

In Step 3, you worked across the matrix, focusing on a single item of evidence or argument and examining how it relates to each hypothesis. Now, work down the matrix, looking at each hypothesis as a whole. The matrix format gives an overview of all the evidence for and against all the hypotheses, so that you can examine all the hypotheses together and have them compete against each other for your favor.

In evaluating the relative likelihood of alternative hypotheses, start by looking for evidence or logical deductions that enable you to reject hypotheses, or at least to determine that they are unlikely. A fundamental precept of the scientific method is to proceed by rejecting or eliminating hypotheses, while tentatively accepting only those hypotheses that cannot be refuted. The scientific method obviously cannot be applied in toto to intuitive judgment, but the principle of seeking to disprove hypotheses, rather than confirm them, is useful.

No matter how much information is consistent with a given hypothesis, one cannot prove that hypothesis is true, because the same information may also be consistent with one or more other hypotheses. On the other hand, a single item of evidence that is inconsistent with a hypothesis may be sufficient grounds for rejecting that hypothesis.

People have a natural tendency to concentrate on confirming hypotheses they already believe to be true, and they commonly give more weight to information that supports a hypothesis than to information that weakens it. This is wrong; we should do just the opposite. Step 5 again requires doing the opposite of what comes naturally.

In examining the matrix, look at the minuses, or whatever other notation you used to indicate evidence that may be inconsistent with a hypothesis. The hypotheses with the fewest minuses is probably the most likely one. The hypothesis with the most minuses is probably the least likely one. The fact that a hypothesis is inconsistent with the evidence is certainly a sound basis for rejecting it. The pluses, indicating evidence that is consistent with a hypothesis, are far less significant. It does not follow that the hypothesis with the most pluses is the most likely one, because a long list of evidence that is consistent with almost any reasonable hypothesis can be easily made. What is difficult to find, and is most significant when found, is hard evidence that is clearly inconsistent with a reasonable hypothesis.

The matrix should not dictate the conclusion to you. Rather, it should accurately reflect your judgment of what is important and how these important factors relate to the probability of each hypothesis. You, not the matrix, must make the decision. The matrix serves only as an aid to thinking and analysis, to ensure consideration of all the possible interrelationships between evidence and hypotheses and identification of those few items that really swing your judgment on the issue.

If following this procedure has caused you to consider things you might otherwise have overlooked, or has caused you to revise your earlier estimate of the relative probabilities of the hypotheses, then the procedure has served a useful purpose. When you are done, the matrix serves as a shorthand record of your thinking and as an audit trail showing how you arrived at your conclusion.

This procedure forces you to spend more analytical time than you otherwise would on what you had thought were the less likely hypotheses. This is desirable. The seemingly less likely hypotheses usually involve plowing new ground and, therefore, require more work. What you started out thinking was the most likely hypothesis tends to be based on a continuation of your own past thinking. A principal advantage of the analysis of competing hypotheses is that it forces you to give a fairer shake to all the alternatives.

Step 6

Analyze how sensitive your conclusion is to a few critical items of evidence.

Consider the consequences for your analysis if that evidence were wrong, misleading, or subject to a different interpretation.

If there is any concern at all about denial and deception, this is an appropriate place to consider that possibility. Look at the sources of your key evidence. Are any of the sources known to the authorities in the foreign country? Could the information have been manipulated? Put yourself in the shoes of a foreign deception planner to evaluate motive, opportunity, means, costs, and benefits of deception as they might appear to the foreign country.

When analysis turns out to be wrong, it is often because of key assumptions that went unchallenged and proved invalid. It is a truism that analysts should identify and question assumptions, but this is much easier said than done. The problem is to determine which assumptions merit questioning. One advantage of the ACH procedure is that it tells you what needs to be rechecked.

In Step 6 you may decide that additional research is needed to check key judgments. For example, it may be appropriate to go back to check original source materials rather than relying on someone else’s interpretation. In writing your report, it is desirable to identify critical assumptions that went into your interpretation and to note that your conclusion is dependent upon the validity of these assumptions.

Step 7

Report conclusions. Discuss the relative likelihood of all the hypotheses, not just the most likely one.

If your report is to be used as the basis for decisionmaking, it will be helpful for the decisionmaker to know the relative likelihood of all the alternative possibilities. Analytical judgments are never certain. There is always a good possibility of their being wrong. Decisionmakers need to make decisions on the basis of a full set of alternative possibilities, not just the single most likely alternative. Contingency or fallback plans may be needed in case one of the less likely alternatives turns out to be true.

When one recognizes the importance of proceeding by eliminating rather than confirming hypotheses, it becomes apparent that any written argument for a certain judgment is incomplete unless it also discusses alternative judgments that were considered and why they were rejected. In the past, at least, this was seldom done.

Step 8

Identify milestones for future observation that may indicate events are taking a different course than expected.

Analytical conclusions should always be regarded as tentative. The situation may change, or it may remain unchanged while you receive new information that alters your appraisal. It is always helpful to specify in advance things one should look for or be alert to that, if observed, would suggest a significant change in the probabilities. This is useful for intelligence consumers who are following the situation on a continuing basis. Specifying in advance what would cause you to change your mind will also make it more difficult for you to rationalize such developments, if they occur, as not really requiring any modification of your judgment.

Summary and Conclusion

Three key elements distinguish analysis of competing hypotheses from conventional intuitive analysis.

  • Analysis starts with a full set of alternative possibilities, rather than with a most likely alternative for which the analyst seeks confirmation. This ensures that alternative hypotheses receive equal treatment and a fair shake.
  • Analysis identifies and emphasizes the few items of evidence or assumptions that have the greatest diagnostic value in judging the relative likelihood of the alternative hypotheses. In conventional intuitive analysis, the fact that key evidence may also be consistent with alternative hypotheses is rarely considered explicitly and often ignored.
  • Analysis of competing hypotheses involves seeking evidence to refute hypotheses. The most probable hypothesis is usually the one with the least evidence against it, not the one with the most evidence for it. Conventional analysis generally entails looking for evidence to confirm a favored hypothesis.

A principal lesson is this. Whenever an intelligence analyst is tempted to write the phrase “there is no evidence that …,” the analyst should ask this question: If this hypothesis is true, can I realistically expect to see evidence of it? In other words, if India were planning nuclear tests while deliberately concealing its intentions, could the analyst realistically expect to see evidence of test planning? The ACH procedure leads the analyst to identify and face these kinds of questions.

There is no guarantee that ACH or any other procedure will produce a correct answer. The result, after all, still depends on fallible intuitive judgment applied to incomplete and ambiguous information. Analysis of competing hypotheses does, however, guarantee an appropriate process of analysis. This procedure leads you through a rational, systematic process that avoids some common analytical pitfalls. It increases the odds of getting the right answer, and it leaves an audit trail showing the evidence used in your analysis and how this evidence was interpreted. If others disagree with your judgment, the matrix can be used to highlight the precise area of disagreement. Subsequent discussion can then focus productively on the ultimate source of the differences.

The ACH procedure has the offsetting advantage of focusing attention on the few items of critical evidence that cause the uncertainty or which, if they were available, would alleviate it. This can guide future collection, research, and analysis to resolve the uncertainty and produce a more accurate judgment.

PART THREE–COGNITIVE BIASES

Chapter 9
What Are Cognitive Biases?

This mini-chapter discusses the nature of cognitive biases in general. The four chapters that follow it describe specific cognitive biases in the evaluation of evidence, perception of cause and effect, estimation of probabilities, and evaluation of intelligence reporting.

Cognitive biases are mental errors caused by our simplified information processing strategies. It is important to distinguish cognitive biases from other forms of bias, such as cultural bias, organizational bias, or bias that results from one’s own self- interest. In other words, a cognitive bias does not result from any emotional or intellectual predisposition toward a certain judgment, but rather from subconscious mental procedures for processing information. A cognitive bias is a mental error that is consistent and predictable.

Cognitive biases are similar to optical illusions in that the error remains compelling even when one is fully aware of its nature. Awareness of the bias, by itself, does not produce a more accurate perception. Cognitive biases, therefore, are, exceedingly difficult to overcome.

Chapter 10
Biases in Evaluation of Evidence

Evaluation of evidence is a crucial step in analysis, but what evidence people rely on and how they interpret it are influenced by a variety of extraneous factors. Information presented in vivid and concrete detail often has unwarranted impact, and people tend to disregard abstract or statistical information that may have greater evidential value. We seldom take the absence of evidence into account. The human mind is also oversensitive to the consistency of the evidence, and insufficiently sensitive to the reliability of the evidence. Finally, impressions often remain even after the evidence on which they are based has been totally discredited.

The intelligence analyst works in a somewhat unique informational environment. Evidence comes from an unusually diverse set of sources: newspapers and wire services, observations by American Embassy officers, reports from controlled agents and casual informants, information exchanges with foreign governments, photo reconnaissance, and communications intelligence. Each source has its own unique strengths, weaknesses, potential or actual biases, and vulnerability to manipulation and deception. The most salient characteristic of the information environment is its diversity–multiple sources, each with varying degrees of reliability, and each commonly reporting information which by itself is incomplete and sometimes inconsistent or even incompatible with reporting from other sources. Conflicting information of uncertain reliability is endemic to intelligence analysis, as is the need to make rapid judgments on current events even before all the evidence is in.

The Vividness Criterion

The impact of information on the human mind is only imperfectly related to its true value as evidence. Specifically, information that is vivid, concrete, and personal has a greater impact on our thinking than pallid, abstract information that may actually have substantially greater value as evidence. For example:

  • Information that people perceive directly, that they hear with their own ears or see with their own eyes, is likely to have greater impact than information received secondhand that may have greater evidential value.
  • Case histories and anecdotes will have greater impact than more informative but abstract aggregate or statistical data.

Events that people experience personally are more memorable than those they only read about. Concrete words are easier to remember than abstract words, and words of all types are easier to recall than numbers. In short, information having the qualities cited in the preceding paragraph is more likely to attract and hold our attention. It is more likely to be stored and remembered than abstract reasoning or statistical summaries, and therefore can be expected to have a greater immediate effect as well as a continuing impact on our thinking in the future.

Personal observations by intelligence analysts and agents can be as deceptive as secondhand accounts. Most individuals visiting foreign countries become familiar with only a small sample of people representing a narrow segment of the total society. Incomplete and distorted perceptions are a common result.

a “man-who” example seldom merits the evidential weight intended by the person citing the example, or the weight often accorded to it by the recipient.

The most serious implication of vividness as a criterion that determines the impact of evidence is that certain kinds of very valuable evidence will have little influence simply because they are abstract. Statistical data, in particular, lack the rich and concrete detail to evoke vivid images, and they are often overlooked, ignored, or minimized.

For example, the Surgeon General’s report linking cigarette smoking to cancer should have, logically, caused a decline in per-capita cigarette consumption. No such decline occurred for more than 20 years. The reaction of physicians was particularly informative. All doctors were aware of the statistical evidence and were more exposed than the general population to the health problems caused by smoking. How they reacted to this evidence depended upon their medical specialty. Twenty years after the Surgeon General’s report, radiologists who examine lung x-rays every day had the lowest rate of smoking. Physicians who diagnosed and treated lung cancer victims were also quite unlikely to smoke. Many other types of physicians continued to smoke. The probability that a physician continued to smoke was directly related to the distance of the physician’s specialty from the lungs. In other words, even physicians, who were well qualified to understand and appreciate the statistical data, were more influenced by their vivid personal experiences than by valid statistical data.

Absence of Evidence

A principal characteristic of intelligence analysis is that key information is often lacking. Analytical problems are selected on the basis of their importance and the perceived needs of the consumers, without much regard for availability of information. Analysts have to do the best they can with what they have, somehow taking into account the fact that much relevant information is known to be missing.

Ideally, intelligence analysts should be able to recognize what relevant evidence is lacking and factor this into their calculations. They should also be able to estimate the potential impact of the missing data and to adjust confidence in their judgment accordingly. Unfortunately, this ideal does not appear to be the norm. Experiments suggest that “out of sight, out of mind” is a better description of the impact of gaps in the evidence.

This problem has been demonstrated using fault trees, which are schematic drawings showing all the things that might go wrong with any endeavor. Fault trees are often used to study the fallibility of complex systems such as a nuclear reactor or space capsule.

Missing data is normal in intelligence problems, but it is probably more difficult to recognize that important information is absent and to incorporate this fact into judgments on intelligence questions than in the more concrete “car won’t start” experiment.

Oversensitivity to Consistency

The internal consistency in a pattern of evidence helps determine our confidence in judgments based on that evidence. In one sense, consistency is clearly an appropriate guideline for evaluating evidence. People formulate alternative explanations or estimates and select the one that encompasses the greatest amount of evidence within a logically consistent scenario. Under some circumstances, however, consistency can be deceptive. Information may be consistent only because it is highly correlated or redundant, in which case many related reports may be no more informative than a single report. Or it may be consistent only because information is drawn from a very small sample or a biased sample.

If the available evidence is consistent, analysts will often overlook the fact that it represents a very small and hence unreliable sample taken from a large and heterogeneous group. This is not simply a matter of necessity– of having to work with the information on hand, however imperfect it may be. Rather, there is an illusion of validity caused by the consistency of the information.

The tendency to place too much reliance on small samples has been dubbed the “law of small numbers.” This is a parody on the law of large numbers, the basic statistical principle that says very large samples will be highly representative of the population from which they are drawn. This is the principle that underlies opinion polling, but most people are not good intuitive statisticians. People do not have much intuitive feel for how large a sample has to be before they can draw valid conclusions from it. The so-called law of small numbers means that, intuitively, we make the mistake of treating small samples as though they were large ones.

Coping with Evidence of Uncertain Accuracy

There are many reasons why information often is less than perfectly accurate: misunderstanding, misperception, or having only part of the story; bias on the part of the ultimate source; distortion in the reporting chain from subsource through source, case officer, reports officer, to analyst; or misunderstanding and misperception by the analyst. Further, much of the evidence analysts bring to bear in conducting analysis is retrieved from memory, but analysts often cannot remember even the source of information they have in memory let alone the degree of certainty they attributed to the accuracy of that information when it was first received.

The human mind has difficulty coping with complicated probabilistic relationships,

so people tend to employ simple rules of thumb that reduce the burden of processing such information. In processing information of uncertain accuracy or reliability, analysts tend to make a simple yes or no decision. If they reject the evidence, they tend to reject it fully, so it plays no further role in their mental calculations. If they accept the evidence, they tend to accept it wholly, ignoring the probabilistic nature of the accuracy or reliability judgment. This is called a “best guess” strategy.

A more sophisticated strategy is to make a judgment based on an assumption that the available evidence is perfectly accurate and reliable, then reduce the confidence in this judgment by a factor determined by the assessed validity of the information. For example, available evidence may indicate that an event probably (75 percent) will occur, but the analyst cannot be certain that the evidence on which this judgment is based is wholly accurate or reliable.

The same processes may also affect our reaction to information that is plausible but known from the beginning to be of questionable authenticity. Ostensibly private statements by foreign officials are often reported though intelligence channels. In many instances it is not clear whether such a private statement by a foreign ambassador, cabinet member, or other official is an actual statement of private views, an indiscretion, part of a deliberate attempt to deceive the US Government, or part of an approved plan to convey a truthful message that the foreign government believes is best transmitted through informal channels.

Knowing that the information comes from an uncontrolled source who may be trying to manipulate us does not necessarily reduce the impact of the information.

Persistence of Impressions Based on Discredited

Evidence

Impressions tend to persist even after the evidence that created those impressions has been fully discredited. Psychologists have become interested in this phenomenon because many of their experiments require that the test subjects be deceived. For example, test subjects may be made to believe they were successful or unsuccessful in performing some task, or that they possess certain abilities or personality traits, when this is not in fact the case. Professional ethics require that test subjects be disabused of these false impressions at the end of the experiment, but this has proved surprisingly difficult to achieve.

Test subjects’ erroneous impressions concerning their logical problem-solving abilities persevered even after they were informed that manipulation of good or poor teaching performance had virtually guaranteed their success or failure.

An interesting but speculative explanation is based on the strong tendency to seek causal explanations, as discussed in the next chapter. When evidence is first received, people postulate a set of causal connections that explains this evidence.

The stronger the perceived causal linkage, the stronger the impression created by the evidence.

Colloquially, one might say that once information rings a bell, the bell cannot be unrung.

The ambiguity of most real-world situations contributes to the operation of this perseverance phenomenon. Rarely in the real world is evidence so thoroughly discredited as is possible in the experimental laboratory. Imagine, for example, that you are told that a clandestine source who has been providing information for some time is actually under hostile control.

Chapter 11
Biases in Perception of Cause and Effect

Judgments about cause and effect are necessary to explain the past, understand the present, and estimate the future. These judgments are often biased by factors over which people exercise little conscious control, and this can influence many types of judgments made by intelligence analysts. Because of a need to impose order on our environment, we seek and often believe we find causes for what are actually accidental or random phenomena. People overestimate the extent to which other countries are pursuing a coherent, coordinated, rational plan, and thus also overestimate their own ability to predict future events in those nations. People also tend to assume that causes are similar to their effects, in the sense that important or large effects must have large causes.

When inferring the causes of behavior, too much weight is accorded to personal qualities and dispositions of the actor and not enough to situational determinants of the actor’s behavior. People also overestimate their own importance as both a cause and a target of the behavior of others. Finally, people often perceive relationships that do not in fact exist, because they do not have an intuitive understanding of the kinds and amount of information needed to prove a relationship.

There are several modes of analysis by which one might infer cause and effect. In more formal analysis, inferences are made through procedures that collectively comprise the scientific method. The scientist advances a hypothesis, then tests this hypothesis by the collection and statistical analysis of data on many instances of the phenomenon in question. Even then, causality cannot be proved beyond all possible doubt. The scientist seeks to disprove a hypothesis, not to confirm it. A hypothesis is accepted only when it cannot be rejected.

Collection of data on many comparable cases to test hypotheses about cause and effect is not feasible for most questions of interest to the Intelligence Community, especially questions of broad political or strategic import relating to another country’s intentions. To be sure, it is feasible more often than it is done, and increased use of scientific procedures in political, economic, and strategic research is much to be encouraged. But the fact remains that the dominant approach to intelligence analysis is necessarily quite different. It is the approach of the historian rather than the scientist, and this approach presents obstacles to accurate inferences about causality.

The key ideas here are coherence and narrative. These are the principles that guide the organization of observations into meaningful structures and patterns. The historian commonly observes only a single case, not a pattern of covariation (when two things are related so that change in one is associated with change in the other) in many comparable cases. Moreover, the historian observes simultaneous changes in so many variables that the principle of covariation generally is not helpful in sorting out the complex relationships among them. The narrative story, on the other hand, offers a means of organizing the rich complexity of the historian’s observations. The historian uses imagination to construct a coherent story out of fragments of data.

The intelligence analyst employing the historical mode of analysis is essentially a storyteller.

He or she constructs a plot from the previous events, and this plot then dictates the possible endings of the incomplete story. The plot is formed of the “dominant concepts or leading ideas” that the analyst uses to postulate patterns of relationships among the available data. The analyst is not, of course, preparing a work of fiction. There are constraints on the analyst’s imagination, but imagination is nonetheless involved because there is an almost unlimited variety of ways in which the available data might be organized to tell a meaningful story. The constraints are the available evidence and the principle of coherence. The story must form a logical and coherent whole and be internally consistent as well as consistent with the available evidence.

Recognizing that the historical or narrative mode of analysis involves telling a coherent story helps explain the many disagreements among analysts, inasmuch as coherence is a subjective concept. It assumes some prior beliefs or mental model about what goes with what. More relevant to this discussion, the use of coherence rather than scientific observation as the criterion for judging truth leads to biases that presumably influence all analysts to some degree. Judgments of coherence may be influenced by many extraneous factors, and if analysts tend to favor certain types of explanations as more coherent than others, they will be biased in favor of those explanations.

Bias in Favor of Causal Explanations

One bias attributable to the search for coherence is a tendency to favor causal explanations. Coherence implies order, so people naturally arrange observations into regular patterns and relationships. If no pattern is apparent, our first thought is that we lack understanding, not that we are dealing with random phenomena that have no purpose or reason.

These examples suggest that in military and foreign affairs, where the patterns are at best difficult to fathom, there may be many events for which there are no valid causal explanations. This certainly affects the predictability of events and suggests limitations on what might logically be expected of intelligence analysts.

Bias Favoring Perception of Centralized Direction

Very similar to the bias toward causal explanations is a tendency to see the actions of other governments (or groups of any type) as the intentional result of centralized direction and planning. “…most people are slow to perceive accidents, unintended consequences, coincidences, and small causes leading to large effects. Instead, coordinated actions, plans and conspiracies are seen.” Analysts overestimate the extent to which other countries are pursuing coherent, rational, goal-maximizing policies, because this makes for more coherent, logical, rational explanations. This bias also leads analysts and policymakers alike to overestimate the predictability of future events in other countries.

But a focus on such causes implies a disorderly world in which outcomes are determined more by chance than purpose. It is especially difficult to incorporate these random and usually unpredictable elements into a coherent narrative, because evidence is seldom available to document them on a timely basis. It is only in historical perspective, after memoirs are written and government documents released, that the full story becomes available.

This bias has important consequences. Assuming that a foreign government’s actions result from a logical and centrally directed plan leads an analyst to:

  • Have expectations regarding that government’s actions that may not be fulfilled if the behavior is actually the product of shifting or inconsistent values, bureaucratic bargaining, or sheer confusion and blunder.
  • Draw far-reaching but possibly unwarranted inferences from isolated statements or actions by government officials who may be acting on their own rather than on central direction.
  • Overestimate the United States’ ability to influence the other government’s actions.
  • Perceive inconsistent policies as the result of duplicity and Machiavellian maneuvers, rather than as the product of weak leadership, vacillation, or bargaining among diverse bureaucratic or political interests.

Similarity of Cause and Effect

When systematic analysis of covariation is not feasible and several alternative causal explanations seem possible, one rule of thumb people use to make judgments of cause and effect is to consider the similarity between attributes of the cause and attributes of the effect. Properties of the cause are “…inferred on the basis of being correspondent with or similar to properties of the effect.” Heavy things make heavy noises; dainty things move daintily; large animals leave large tracks. When dealing with physical properties, such inferences are generally correct.

The tendency to reason according to similarity of cause and effect is frequently found in conjunction with the previously noted bias toward inferring centralized direction. Together, they explain the persuasiveness of conspiracy theories. Such theories are invoked to explain large effects for which there do not otherwise appear to be correspondingly large causes.

Intelligence analysts are more exposed than most people to hard evidence of real plots, coups, and conspiracies in the international arena. Despite this–or perhaps because of it–most intelligence analysts are not especially prone to what are generally regarded as conspiracy theories. Although analysts may not exhibit this bias in such extreme form, the bias presumably does influence analytical judgments in myriad little ways. In examining causal relationships, analysts generally construct causal explanations that are somehow commensurate with the magnitude of their effects and that attribute events to human purposes or predictable forces rather than to human weakness, confusion, or unintended consequences.

Internal vs. External Causes of Behavior

Much research into how people assess the causes of behavior employs a basic dichotomy between internal determinants and external determinants of human actions. Internal causes of behavior include a person’s attitudes, beliefs, and personality. External causes include incentives and constraints, role requirements, social pressures, or other forces over which the individual has little control. The research examines the circumstances under which people attribute behavior either to stable dispositions of the actor or to characteristics of the situation to which the actor responds.

Differences in judgments about what causes another person’s or government’s behavior affect how people respond to that behavior. How people respond to friendly or unfriendly actions by others may be quite different if they attribute the behavior to the nature of the person or government than if they see the behavior as resulting from situational constraints over which the person or government has little control.

Not enough weight is assigned to external circumstances that may have influenced the other person’s choice of behavior. This pervasive tendency has been demonstrated in many experiments under quite diverse circumstances and has often been observed in diplomatic and military interactions.

Susceptibility to this biased attribution of causality depends upon whether people are examining their own behavior or observing that of others. It is the behavior of others that people tend to attribute to the nature of the actor, whereas they see their own behavior as conditioned almost entirely by the situation in which they find themselves. This difference is explained largely by differences in information available to actors and observers. People know a lot more about themselves.

The actor has a detailed awareness of the history of his or her own actions under similar circumstances. In assessing the causes of our own behavior, we are likely to consider our previous behavior and focus on how it has been influenced by different situations. Thus situational variables become the basis for explaining our own behavior. This contrasts with the observer, who typically lacks this detailed knowledge of the other person’s past behavior. The observer is inclined to focus on how the other person’s behavior compares with the behavior of others under similar circumstances.

This difference in the type and amount of information available to actors and observers applies to governments as well as people. An actor’s personal involvement with the actions being observed enhances the likelihood of bias. “Where the observer is also an actor, he is likely to exaggerate the uniqueness and emphasize the dispositional origins of the responses of others to his own actions.”

The persistent tendency to attribute cause and effect in this manner is not simply the consequence of self-interest or propaganda by the opposing sides. Rather, it is the readily understandable and predictable result of how people normally attribute causality under many different circumstances.

As a general rule, biased attribution of causality helps sow the seeds of mistrust and misunderstanding between people and between governments. We tend to have quite different perceptions of the causes of each other’s behavior.

Overestimating Our Own Importance

Individuals and governments tend to overestimate the extent to which they successfully influence the behavior of others. This is an exception to the previously noted generalization that observers attribute the behavior of others to the nature of the actor. It occurs largely because a person is so familiar with his or her own efforts to influence another, but much less well informed about other factors that may have influenced the other’s decision.

In estimating the influence of US policy on the actions of another government, analysts more often than not will be knowledgeable of US actions and what they are intended to achieve, but in many instances they will be less well informed concerning the internal processes, political pressures, policy conflicts, and other influences on the decision of the target government.

Illusory Correlation

At the start of this chapter, covariation was cited as one basis for inferring causality. It was noted that covariation may either be observed intuitively or measured statistically. This section examines the extent to which the intuitive perception of covariation deviates from the statistical measurement of covariation.

Statistical measurement of covariation is known as correlation. Two events are correlated when the existence of one event implies the existence of the other. Variables are correlated when a change in one variable implies a similar degree of change in another. Correlation alone does not necessarily imply causation. For example, two events might co-occur because they have a common cause, rather than because one causes the other. But when two events or changes do co-occur, and the time sequence is such that one always follows the other, people often infer that the first caused the second. Thus, inaccurate perception of correlation leads to inaccurate perception of cause and effect.

Judgments about correlation are fundamental to all intelligence analysis. For example, assumptions that worsening economic conditions lead to increased political support for an opposition party, that domestic problems may lead to foreign adventurism, that military government leads to unraveling of democratic institutions, or that negotiations are more successful when conducted from a position of strength are all based on intuitive judgments of correlation between these variables. In many cases these assumptions are correct, but they are seldom tested by systematic observation and statistical analysis.

Much intelligence analysis is based on common-sense assumptions about how people and governments normally behave. The problem is that people possess a great facility for invoking contradictory “laws” of behavior to explain, predict, or justify different actions occurring under similar circumstances. “Haste makes waste” and “He who hesitates is lost” are examples of inconsistent explanations and admonitions. They make great sense when used alone and leave us looking foolish when presented together. “Appeasement invites aggression” and “agreement is based upon compromise” are similarly contradictory expressions.

When confronted with such apparent contradictions, the natural defense is that “it all depends on. …” Recognizing the need for such qualifying statements is one of the differences between subconscious information processing and systematic, self- conscious analysis. Knowledgeable analysis might be identified by the ability to fill in the qualification; careful analysis by the frequency with which one remembers to do so.

Of the 86 test subjects involved in several runnings of this experiment, not a single one showed any intuitive understanding of the concept of correlation. That is, no one understood that to make a proper judgment about the existence of a relationship, one must have information on all four cells of the table.

Let us now consider a similar question of correlation on a topic of interest to intelligence analysts. What are the characteristics of strategic deception and how can analysts detect it? In studying deception, one of the important questions is: what are the correlates of deception? Historically, when analysts study instances of deception, what else do they see that goes along with it, that is somehow related to deception, and that might be interpret as an indicator of deception? Are there certain practices relating to deception, or circumstances under which deception is most likely to occur, that permit one to say, that, because we have seen x or y or z, this most likely means a deception plan is under way? This would be comparable to a doctor observing certain symptoms and concluding that a given disease may be present. This is essentially a problem of correlation. If one could identify several correlates of deception, this would significantly aid efforts to detect it.

The lesson to be learned is not that analysts should do a statistical analysis of every relationship. They usually will not have the data, time, or interest for that. But analysts should have a general understanding of what it takes to know whether a relationship exists. This understanding is definitely not a part of people’s intuitive knowledge. It does not come naturally. It has to be learned. When dealing with such issues, analysts have to force themselves to think about all four cells of the table and the data that would be required to fill each cell.

Even if analysts follow these admonitions, there are several factors that distort judgment when one does not follow rigorous scientific procedures in making and recording observations. These are factors that influence a person’s ability to recall examples that fit into the four cells. For example, people remember occurrences more readily than non-occurrences. “History is, by and large, a record of what people did, not what they failed to do.”

Many erroneous theories are perpetuated because they seem plausible and because people record their experience in a way that supports rather than refutes them.

Chapter 12
Biases in Estimating Probabilities

In making rough probability judgments, people commonly depend upon one of several simplified rules of thumb that greatly ease the burden of decision. Using the “availability” rule, people judge the probability of an event by the ease with which they can imagine relevant instances of similar events or the number of such events that they can easily remember. With the “anchoring” strategy, people pick some natural starting point for a first approximation and then adjust this figure based on the results of additional information or analysis. Typically, they do not adjust the initial judgment enough.

Expressions of probability, such as possible and probable, are a common source of ambiguity that make it easier for a reader to interpret a report as consistent with the reader’s own preconceptions. The probability of a scenario is often miscalculated. Data on “prior probabilities” are commonly ignored unless they illuminate causal relationships.

Availability Rule

One simplified rule of thumb commonly used in making probability estimates is known as the availability rule. In this context, “availability” refers to imaginability or retrievability from memory. Psychologists have shown that two cues people use unconsciously in judging the probability of an event are the ease with which they can imagine relevant instances of the event and the number or frequency of such events that they can easily remember. People are using the availability rule of thumb whenever they estimate frequency or probability on the basis of how easily they can recall or imagine instances of whatever it is they are trying to estimate.

people are frequently led astray when the ease with which things come to mind is influenced by factors unrelated to their probability. The ability to recall instances of an event is influenced by how recently the event occurred, whether we were personally involved, whether there were vivid and memorable details associated with the event, and how important it seemed at the time. These and other factors that influence judgment are unrelated to the true probability of an event.

Intelligence analysts may be less influenced than others by the availability bias. Analysts are evaluating all available information, not making quick and easy inferences. On the other hand, policymakers and journalists who lack the time or access to evidence to go into details must necessarily take shortcuts. The obvious shortcut is to use the availability rule of thumb for making inferences about probability.

Many events of concern to intelligence analysts

…are perceived as so unique that past history does not seem relevant to the evaluation of their likelihood. In thinking of such events we often construct scenarios, i.e., stories that lead from the present situation to the target event. The plausibility of the scenarios that come to mind, or the difficulty of producing them, serve as clues to the likelihood of the event. If no reasonable scenario comes to mind, the event is deemed impossible or highly unlikely. If several scenarios come easily to mind, or if one scenario is particularly compelling, the event in question appears probable.

Many extraneous factors influence the imaginability of scenarios for future events, just as they influence the retrievability of events from memory. Curiously, one of these is the act of analysis itself. The act of constructing a detailed scenario for a possible future event makes that event more readily imaginable and, therefore, increases its perceived probability. This is the experience of CIA analysts who have used various tradecraft tools that require, or are especially suited to, the analysis of unlikely but nonetheless possible and important hypotheses.

In sum, the availability rule of thumb is often used to make judgments about likelihood or frequency. People would be hard put to do otherwise, inasmuch as it is such a timesaver in the many instances when more detailed analysis is not warranted or not feasible. Intelligence analysts, however, need to be aware when they are taking shortcuts. They must know the strengths and weaknesses of these procedures…

For intelligence analysts, recognition that they are employing the availability rule should raise a caution flag. Serious analysis of probability requires identification and assessment of the strength and interaction of the many variables that will determine the outcome of a situation.

Anchoring

Another strategy people seem to use intuitively and unconsciously to simplify the task of making judgments is called anchoring. Some natural starting point, perhaps from a previous analysis of the same subject or from some partial calculation, is used as a first approximation to the desired judgment. This starting point is then adjusted, based on the results of additional information or analysis. Typically, however, the starting point serves as an anchor or drag that reduces the amount of adjustment, so the final estimate remains closer to the starting point than it ought to be.

Whenever analysts move into a new analytical area and take over responsibility for updating a series of judgments or estimates made by their predecessors, the previous judgments may have such an anchoring effect. Even when analysts make their own initial judgment, and then attempt to revise this judgment on the basis of new information or further analysis, there is much evidence to suggest that they usually do not change the judgment enough.

Anchoring provides a partial explanation of experiments showing that analysts tend to be overly sure of themselves in setting confidence ranges. A military analyst who estimates future missile or tank production is often unable to give a specific figure as a point estimate.

Reasons for the anchoring phenomenon are not well understood. The initial estimate serves as a hook on which people hang their first impressions or the results of earlier calculations. In recalculating, they take this as a starting point rather than starting over from scratch, but why this should limit the range of subsequent reasoning is not clear.

There is some evidence that awareness of the anchoring problem is not an adequate antidote. This is a common finding in experiments dealing with cognitive biases. The biases persist even after test subjects are informed of them and instructed to try to avoid them or compensate for them.

One technique for avoiding the anchoring bias, to weigh anchor so to speak, may be to ignore one’s own or others’ earlier judgments and rethink a problem from scratch.

In other words, consciously avoid any prior judgment as a starting point. There is no experimental evidence to show that this is possible or that it will work, but it seems worth trying. Alternatively, it is sometimes possible to avoid human error by employing formal statistical procedures.

Expression of Uncertainty

Probabilities may be expressed in two ways. Statistical probabilities are based on empirical evidence concerning relative frequencies. Most intelligence judgments deal with one-of-a-kind situations for which it is impossible to assign a statistical probability. Another approach commonly used in intelligence analysis is to make a “subjective probability” or “personal probability” judgment. Such a judgment is an expression of the analyst’s personal belief that a certain explanation or estimate is correct. It is comparable to a judgment that a horse has a three-to-one chance of winning a race.

When intelligence conclusions are couched in ambiguous terms, a reader’s interpretation of the conclusions will be biased in favor of consistency with what the reader already believes.

The main point is that an intelligence report may have no impact on the reader if it is couched in such ambiguous language that the reader can easily interpret it as consistent with his or her own preconceptions. This ambiguity can be especially troubling when dealing with low-probability, high-impact dangers against which policymakers may wish to make contingency plans.

How can analysts express uncertainty without being unclear about how certain they are? Putting a numerical qualifier in parentheses after the phrase expressing degree of uncertainty is an appropriate means of avoiding misinterpretation. This may be an odds ratio (less than a one-in-four chance) or a percentage range (5 to 20 percent) or (less than 20 percent). Odds ratios are often preferable, as most people have a better intuitive understanding of odds than of percentages.

Assessing Probability of a Scenario

Intelligence analysts sometimes present judgments in the form of a scenario–a series of events leading to an anticipated outcome. There is evidence that judgments concerning the probability of a scenario are influenced by amount and nature of detail in the scenario in a way that is unrelated to actual likelihood of the scenario.

A scenario consists of several events linked together in a narrative description. To calculate mathematically the probability of a scenario, the proper procedure is to multiply the probabilities of each individual event. Thus, for a scenario with three events, each of which will probably (70 percent certainty) occur, the probability of the scenario is .70 x .70 x .70 or slightly over 34 percent. Adding a fourth probable (70 percent) event to the scenario would reduce its probability to 24 percent.

Most people do not have a good intuitive grasp of probabilistic reasoning. One approach to simplifying such problems is to assume (or think as though) one or more probable events have already occurred. This eliminates some of the uncertainty from the judgment.

When the averaging strategy is employed, highly probable events in the scenario tend to offset less probable events. This violates the principle that a chain cannot be stronger than its weakest link. Mathematically, the least probable event in a scenario sets the upper limit on the probability of the scenario as a whole. If the averaging strategy is employed, additional details may be added to the scenario that are so plausible they increase the perceived probability of the scenario, while, mathematically, additional events must necessarily reduce its probability.

Base-Rate Fallacy

In assessing a situation, an analyst sometimes has two kinds of evidence available– specific evidence about the individual case at hand, and numerical data that summarize information about many similar cases. This type of numerical information is called a base rate or prior probability. The base-rate fallacy is that the numerical data are commonly ignored unless they illuminate a causal relationship.

Most people do not incorporate the prior probability into their reasoning because it does not seem relevant. It does not seem relevant because there is no causal relationship between the background information on the percentages of jet fighters in the area and the pilot’s observation.

The so-called planning fallacy, to which I personally plead guilty, is an example of a problem in which base rates are not given in numerical terms but must be abstracted from experience. In planning a research project, I may estimate being able to complete it in four weeks. This estimate is based on relevant case-specific evidence: desired length of report, availability of source materials, difficulty of the subject matter, allowance for both predictable and unforeseeable interruptions, and so on. I also possess a body of experience with similar estimates I have made in the past. Like many others, I almost never complete a research project within the initially estimated time frame! But I am seduced by the immediacy and persuasiveness of the case- specific evidence. All the causally relevant evidence about the project indicates I should be able to complete the work in the time allotted for it. Even though I know from experience that this never happens, I do not learn from this experience. I continue to ignore the non-causal, probabilistic evidence based on many similar projects in the past, and to estimate completion dates that I hardly ever meet. (Preparation of this book took twice as long as I had anticipated. These biases are, indeed, difficult to avoid!)

Chapter 13

Hindsight Biases in Evaluation of Intelligence Reporting

Evaluations of intelligence analysis–analysts’ own evaluations of their judgments as well as others’ evaluations of intelligence products–are distorted by systematic biases. As a result, analysts overestimate the quality of their analytical performance, and others underestimate the value and quality of their efforts. These biases are not simply the product of self-interest and lack of objectivity. They stem from the nature of human mental processes and are difficult and perhaps impossible to overcome.

Hindsight biases influence the evaluation of intelligence reporting in three ways:

  • Analysts normally overestimate the accuracy of their past judgments.
  • Intelligence consumers normally underestimate how much they learned from intelligence reports.
  • Overseers of intelligence production who conduct postmortem analyses of an intelligence failure normally judge that events were more readily foreseeable than was in fact the case.

The analyst, consumer, and overseer evaluating analytical performance all have one thing in common. They are exercising hindsight. They take their current state of knowledge and compare it with what they or others did or could or should have known before the current knowledge was received. This is in sharp contrast with intelligence estimation, which is an exercise in foresight, and it is the difference between these two modes of thought–hindsight and foresight–that seems to be a source of bias.

an analyst’s intelligence judgments are not as good as analysts think they are, or as bad as others seem to believe. Because the biases generally cannot be overcome, they would appear to be facts of life that analysts need to take into account in evaluating their own performance and in determining what evaluations to expect from others. This suggests the need for a more systematic effort to:

  • Define what should be expected from intelligence analysts.
  • Develop an institutionalized procedure for comparing intelligence judgments and estimates with actual outcomes.
  • Measure how well analysts live up to the defined expectations.

The discussion now turns to the experimental evidence demonstrating these biases from the perspective of the analyst, consumer, and overseer of intelligence.

The Analyst’s Perspective

Analysts interested in improving their own performance need to evaluate their past estimates in the light of subsequent developments. To do this, analysts must either remember (or be able to refer to) their past estimates or must reconstruct their past estimates on the basis of what they remember having known about the situation at the time the estimates were made.

Experimental evidence suggests a systematic tendency toward faulty memory of past estimates. That is, when events occur, people tend to overestimate the extent to which they had previously expected them to occur. And conversely, when events do not occur, people tend to underestimate the probability they had previously assigned to their occurrence. In short, events generally seem less surprising than they should on the basis of past estimates. This experimental evidence accords with analysts’ intuitive experience. Analysts rarely appear–or allow themselves to appear–very surprised by the course of events they are following.

The Consumer’s Perspective

When consumers of intelligence reports evaluate the quality of the intelligence product, they ask themselves the question: “How much did I learn from these reports that I did not already know?” In answering this question, there is a consistent tendency for most people to underestimate the contribution made by new information.

people tend to underestimate both how much they learn from new information and the extent to which new information permits them to make correct judgments with greater confidence. To the extent that intelligence consumers manifest these same biases, they will tend to underrate the value to them of intelligence reporting.

The Overseer’s Perspective

An overseer, as the term is used here, is one who investigates intelligence performance by conducting a postmortem examination of a high-profile intelligence failure.

Such investigations are carried out by Congress, the Intelligence Community staff, and CIA or DI management. For those outside the executive branch who do not regularly read the intelligence product, this sort of retrospective evaluation of known intelligence failures is a principal basis for judgments about the quality of intelligence analysis.

A fundamental question posed in any postmortem investigation of intelligence failure is this: Given the information that was available at the time, should analysts have been able to foresee what was going to happen? Unbiased evaluation of intelligence performance depends upon the ability to provide an unbiased answer to this question.

The experiments reported in the following paragraphs tested the hypotheses that knowledge of an outcome increases the perceived inevitability of that outcome, and that people who are informed of the outcome are largely unaware that this information has changed their perceptions in this manner.

An average of all estimated outcomes in six sub-experiments (a total of 2,188 estimates by 547 subjects) indicates that the knowledge or belief that one of four possible outcomes has occurred approximately doubles the perceived probability of that outcome as judged with hindsight as compared with foresight.

The fact that outcome knowledge automatically restructures a person’s judgments about the relevance of available data is probably one reason it is so difficult to reconstruct how our thought processes were or would have been without this outcome knowledge.

These results indicate that overseers conducting postmortem evaluations of what analysts should have been able to foresee, given the available information, will tend to perceive the outcome of that situation as having been more predictable than was, in fact, the case. Because they are unable to reconstruct a state of mind that views the situation only with foresight, not hindsight, overseers will tend to be more critical of intelligence performance than is warranted.

Discussion of Experiments

Experiments that demonstrated these biases and their resistance to corrective action were conducted as part of a research program in decision analysis funded by the Defense Advanced Research Projects Agency. Unfortunately, the experimental subjects were students, not members of the Intelligence Community. There is, nonetheless, reason to believe the results can be generalized to apply to the Intelligence Community. The experiments deal with basic human mental processes, and the results do seem consistent with personal experience in the Intelligence Community. In similar kinds of psychological tests, in which experts, including intelligence analysts, were used as test subjects, the experts showed the same pattern of responses as students.

One would expect the biases to be even greater in foreign affairs professionals whose careers and self-esteem depend upon the presumed accuracy of their judgments.

Can We Overcome These Biases?

Analysts tend to blame biased evaluations of intelligence performance at best on ignorance and at worst on self-interest and lack of objectivity. Both these factors may also be at work, but the experiments suggest the nature of human mental processes is also a principal culprit. This is a more intractable cause than either ignorance or lack of objectivity.

in these experimental situations the biases were highly resistant to efforts to overcome them. Subjects were instructed to make estimates as if they did not already know the answer, but they were unable to do so. One set of test subjects was briefed specifically on the bias, citing the results of previous experiments. This group was instructed to try to compensate for the bias, but it was unable to do so. Despite maximum information and the best of intentions, the bias persisted.

This intractability suggests the bias does indeed have its roots in the nature of our mental processes. Analysts who try to recall a previous estimate after learning the actual outcome of events, consumers who think about how much a report has added to their knowledge, and overseers who judge whether analysts should have been able to avoid an intelligence failure, all have one thing in common. They are engaged in a mental process involving hindsight. They are trying to erase the impact of knowledge, so as to remember, reconstruct, or imagine the uncertainties they had or would have had about a subject prior to receipt of more or less definitive information.

There is one procedure that may help to overcome these biases. It is to pose such questions as the following: Analysts should ask themselves, “If the opposite outcome had occurred, would I have been surprised?” Consumers should ask, “If this report had told me the opposite, would I have believed it?” And overseers should ask, “If the opposite outcome had occurred, would it have been predictable given the information that was available?” These questions may help one recall or reconstruct the uncertainty that existed prior to learning the content of a report or the outcome of a situation.

PART IV—CONCLUSIONS

Chapter 14

Improving Intelligence Analysis

This chapter offers a checklist for analysts–a summary of tips on how to navigate the minefield of problems identified in previous chapters. It also identifies steps that managers of intelligence analysis can take to help create an environment in which analytical excellence can flourish.

Checklist for Analysts

This checklist for analysts summarizes guidelines for maneuvering through the minefields encountered while proceeding through the analytical process. Following the guidelines will help analysts protect themselves from avoidable error and improve their chances of making the right calls. The discussion is organized around six key steps in the analytical process: defining the problem, generating hypotheses, collecting information, evaluating hypotheses, selecting the most likely hypothesis, and the ongoing monitoring of new information.

Defining the Problem

Start out by making certain you are asking–or being asked–the right questions. Do not hesitate to go back up the chain of command with a suggestion for doing something a little different from what was asked for. The policymaker who originated the requirement may not have thought through his or her needs, or the requirement may be somewhat garbled as it passes down through several echelons of management.

Generating Hypotheses

Identify all the plausible hypotheses that need to be considered. Make a list of as many ideas as possible by consulting colleagues and outside experts. Do this in a brainstorming mode, suspending judgment for as long as possible until all the ideas are out on the table.

At this stage, do not screen out reasonable hypotheses only because there is no evidence to support them. This applies in particular to the deception hypothesis. If another country is concealing its intent through denial and deception, you should probably not expect to see evidence of it without completing a very careful analysis

of this possibility. The deception hypothesis and other plausible hypotheses for which there may be no immediate evidence should be carried forward to the next stage of analysis until they can be carefully considered and, if appropriate, rejected with good cause.

Collecting Information

Relying only on information that is automatically delivered to you will probably not solve all your analytical problems. To do the job right, it will probably be necessary to look elsewhere and dig for more information. Contact with the collectors, other Directorate of Operations personnel, or first-cut analysts often yields additional information. Also check academic specialists, foreign newspapers, and specialized journals.

Collect information to evaluate all the reasonable hypotheses, not just the one that seems most likely. Exploring alternative hypotheses that have not been seriously considered before often leads an analyst into unexpected and unfamiliar territory. For example, evaluating the possibility of deception requires evaluating another country’s or group’s motives, opportunities, and means for denial and deception. This, in turn, may require understanding the strengths and weaknesses of US human and technical collection capabilities.

It is important to suspend judgment while information is being assembled on each of the hypotheses. It is easy to form impressions about a hypothesis on the basis of very little information, but hard to change an impression once it has taken root. If you find yourself thinking you already know the answer, ask yourself what would cause you to change your mind; then look for that information.

Try to develop alternative hypotheses in order to determine if some alternative–when given a fair chance–might not be as compelling as your own preconceived view. Systematic development of an alternative hypothesis usually increases the perceived likelihood of that hypothesis. “A willingness to play with material from different angles and in the context of unpopular as well as popular hypotheses is an essential ingredient of a good detective, whether the end is the solution of a crime or an intelligence estimate”.

Evaluating Hypotheses

Do not be misled by the fact that so much evidence supports your preconceived idea of which is the most likely hypothesis. That same evidence may be consistent with several different hypotheses. Focus on developing arguments against each hypothesis rather than trying to confirm hypotheses. In other words, pay particular attention to evidence or assumptions that suggest one or more hypotheses are less likely than the others.

Assumptions are fine as long as they are made explicit in your analysis and you analyze the sensitivity of your conclusions to those assumptions. Ask yourself, would different assumptions lead to a different interpretation of the evidence and different conclusions?

Do not assume that every foreign government action is based on a rational decision in pursuit of identified goals. Recognize that government actions are sometimes best explained as a product of bargaining among semi-independent bureaucratic entities, following standard operating procedures under inappropriate circumstances, unintended consequences, failure to follow orders, confusion, accident, or coincidence.

Selecting the Most Likely Hypothesis

Proceed by trying to reject hypotheses rather than confirm them. The most likely hypothesis is usually the one with the least evidence against it, not the one with the most evidence for it.

In presenting your conclusions, note all the reasonable hypotheses that were considered.

Ongoing Monitoring

In a rapidly changing, probabilistic world, analytical conclusions are always tentative. The situation may change, or it may remain unchanged while you receive new information that alters your understanding of it. Specify things to look for that, if observed, would suggest a significant change in the probabilities.

Pay particular attention to any feeling of surprise when new information does not fit your prior understanding. Consider whether this surprising information is consistent with an alternative hypothesis. A surprise or two, however small, may be the first clue that your understanding of what is happening requires some adjustment, is at best incomplete, or may be quite wrong.

Management of Analysis

The cognitive problems described in this book have implications for the management as well as the conduct of intelligence analysis. This concluding section looks at what managers of intelligence analysis can do to help create an organizational environment in which analytical excellence flourishes. These measures fall into four general categories: research, training, exposure to alternative mind-sets, and guiding analytical products.

Support for Research

Management should support research to gain a better understanding of the cognitive processes involved in making intelligence judgments. There is a need for better understanding of the thinking skills involved in intelligence analysis, how to test job applicants for these skills, and how to train analysts to improve these skills. Analysts also need a fuller understanding of how cognitive limitations affect intelligence analysis and how to minimize their impact. They need simple tools and techniques to help protect themselves from avoidable error. There is so much research to be done that it is difficult to know where to start.

Training

Most training of intelligence analysts is focused on organizational procedures, writing style, and methodological techniques. Analysts who write clearly are assumed to be thinking clearly. Yet it is quite possible to follow a faulty analytical process and write a clear and persuasive argument in support of an erroneous judgment.

More training time should be devoted to the thinking and reasoning processes involved in making intelligence judgments, and to the tools of the trade that are available to alleviate or compensate for the known cognitive problems encountered in analysis. This book is intended to support such training.

It would be worthwhile to consider how an analytical coaching staff might be formed to mentor new analysts or consult with analysts working particularly difficult issues. One possible model is the SCORE organization that exists in many communities. SCORE stands for Senior Corps of Retired Executives. It is a national organization of retired executives who volunteer their time to counsel young entrepreneurs starting their own businesses.

New analysts could be required to read a specified set of books or articles relating to analysis, and to attend a half-day meeting once a month to discuss the reading and other experiences related to their development as analysts. A comparable voluntary program could be conducted for experienced analysts. This would help make analysts more conscious of the procedures they use in doing analysis. In addition to their educational value, the required readings and discussion would give analysts a common experience and vocabulary for communicating with each other, and with management, about the problems of doing analysis.

My suggestions for writings that would qualify for a mandatory reading program include: Robert Jervis’ Perception and Misperception in International Politics (Princeton University Press, 1977); Graham Allison’s Essence of Decision: Explaining the Cuban Missile Crisis (Little, Brown, 1971); Ernest May’s “Lessons” of the Past: The Use and Misuse of History in American Foreign Policy (Oxford University Press, 1973); Ephraim Kam’s, Surprise Attack (Harvard University Press, 1988); Richard Betts’ “Analysis, War and Decision: Why Intelligence Failures Are Inevitable,” World Politics, Vol. 31, No. 1 (October 1978); Thomas Kuhn’s The Structure of Scientific Revolutions (University of Chicago Press, 1970); and Robin Hogarth’s Judgement and Choice (John Wiley, 1980). Although these were all written many years ago, they are classics of permanent value. Current analysts will doubtless have other works to recommend. CIA and Intelligence Community postmortem analyses of intelligence failure should also be part of the reading program.

To encourage learning from experience, even in the absence of a high-profile failure, management should require more frequent and systematic retrospective evaluation of analytical performance. One ought not generalize from any single instance of a correct or incorrect judgment, but a series of related judgments that are, or are not, borne out by subsequent events can reveal the accuracy or inaccuracy of the analyst’s mental model. Obtaining systematic feedback on the accuracy of past judgments is frequently difficult or impossible, especially in the political intelligence field. Political judgments are normally couched in imprecise terms and are generally conditional upon other developments. Even in retrospect, there are no objective criteria for evaluating the accuracy of most political intelligence judgments as they are presently written.

In the economic and military fields, however, where estimates are frequently concerned with numerical quantities, systematic feedback on analytical performance is feasible. Retrospective evaluation should be standard procedure in those fields in which estimates are routinely updated at periodic intervals. The goal of learning from retrospective evaluation is achieved, however, only if it is accomplished as part of an objective search for improved understanding, not to identify scapegoats or assess blame. This requirement suggests that retrospective evaluation should be done routinely within the organizational unit that prepared the report, even at the cost of some loss of objectivity.

Exposure to Alternative Mind-Sets

The realities of bureaucratic life produce strong pressures for conformity. Management needs to make conscious efforts to ensure that well-reasoned competing views have the opportunity to surface within the Intelligence Community. Analysts need to enjoy a sense of security, so that partially developed new ideas may be expressed and bounced off others as sounding boards with minimal fear of criticism for deviating from established orthodoxy.

Intelligence analysts have often spent less time living in and absorbing the culture of the countries they are working on than outside experts on those countries. If analysts fail to understand the foreign culture, they will not see issues as the foreign government sees them. Instead, they may be inclined to mirror-image–that is, to assume that the other country’s leaders think like we do. The analyst assumes that the other country will do what we would do if we were in their shoes.

Mirror-imaging is a common source of analytical error,

Pre-publication review of analytical reports offers another opportunity to bring alternative perspectives to bear on an issue. Review procedures should explicitly question the mental model employed by the analyst in searching for and examining evidence. What assumptions has the analyst made that are not discussed in the draft itself, but that underlie the principal judgments? What alternative hypotheses have been considered but rejected, and for what reason? What could cause the analyst to change his or her mind?

Ideally, the review process should include analysts from other areas who are not specialists in the subject matter of the report. Analysts within the same branch or division often share a similar mind-set. Past experience with review by analysts from other divisions or offices indicates that critical thinkers whose expertise is in other areas make a significant contribution. They often see things or ask questions that the author has not seen or asked. Because they are not so absorbed in the substance, they are better able to identify the assumptions and assess the argumentation, internal consistency, logic, and relationship of the evidence to the conclusion. The reviewers also profit from the experience by learning standards for good analysis that are independent of the subject matter of the analysis.

Guiding Analytical Products

On key issues, management should reject most single-outcome analysis–that is, the single-minded focus on what the analyst believes is probably happening or most likely will happen.

One guideline for identifying unlikely events that merit the specific allocation of resources is to ask the following question: Are the chances of this happening, however small, sufficient that if policymakers fully understood the risks, they might want to make contingency plans or take some form of preventive or preemptive action? If the answer is yes, resources should be committed to analyze even what appears to be an unlikely outcome.

Finally, management should educate consumers concerning the limitations as well as the capabilities of intelligence analysis and should define a set of realistic expectations as a standard against which to judge analytical performance.

The Bottom Line

Analysis can be improved! None of the measures discussed in this book will guarantee that accurate conclusions will be drawn from the incomplete and ambiguous information that intelligence analysts typically work with. Occasional intelligence failures must be expected. Collectively, however, the measures discussed here can certainly improve the odds in the analysts’ favor.

Notes from Networking Futures: The Movements against Corporate Globalization

Networking Futures: The Movements against Corporate Globalization by Jeffrey S. Juris

 

Barcelona has emerged as a critical node, as Catalans have played key roles within the anarchist ­inspired Peoples’ Global Action (PGA) and the World Social Forum (WSF) process, both of which unite diverse movements in opposition to corporate globaliza­tion. Anti–corporate globalization movements involve an increasing conflu­ence among network technologies, organizational forms, and political norms, mediated by concrete networking practices and micropolitical struggles. Activists are thus not only responding to growing poverty, inequality, and environmental devastation; they are also generating social laboratories for the production of alternative democratic values, discourses, and practices.

Computer ­supported networks, including activist media projects, Listservs, and websites, were mobilizing hundreds of thousands of protesters, constituting “transnational counterpublics” (Olesen 2005) for the diffusion of alternative information. Indeed, media activism and digital networking more generally had become critical features of a transna­tional network of movements against corporate globalization, involving what Peter Waterman (1998) calls a “communications internationalism.” Moreover, emerging networking logics were changing how grassroots movements orga­nize, and were inspiring new utopian imaginaries involving directly demo­cratic models of social, economic, and political organization coordinated at local, regional, and global scales.

 

Jeff : How is PGA going?
Laurent: It’s the most interesting political process I’ve ever been a part of, but it’s kind of ambiguous.

Jeff : What do you mean?
Laurent: Well, you never really know who is involved.
Jeff : How can that be?
Laurent: It’s hard to pin down because no one can speak for PGA, and the ones who are most involved sometimes don’t even think they are part of it!

 

 

I really wanted to study the networks behind these demonstrations during their visible and “submerged” phases (Melucci 1989). It seemed that if activists wanted to create sustainable movements, it was important to learn how newly emerging digitally powered networks operate and how periodic mass actions might lead to long­ term social transformation. After several days, I finally realized what should have been apparent all along: my focus was not really a specific network, but rather the concrete practices through which such networks are constituted. Indeed, contemporary activist networks are fluid processes, not rigid structures. I would thus conduct an ethnographic study of transnational networking prac tices and the broader cultural logics, shaped by ongoing interactions with new digital technologies, that generate them.

To answer these questions, I turned to the traditional craft of the anthropologist: long­ term participant observation within and among activist networks themselves.

“Anti-globalization” is not a particularly apt label for a movement that is in­ternationalist in perspective, organizes through global communication net­ works, and whose participants travel widely to attend protests and gatherings. Moreover, most activists do not oppose globalization per se, but rather corpo­rate globalization, understood as the extension of corporate power around the world, undermining local communities, democracy, and the environment.

they [anti-globalization activists] are specifically challenging a concrete political and eco­ nomic project and a discourse that denies the possibility of an alternative (Weiss 1998). In examining anti–corporate globalization movements, it is thus impor­tant to consider how globalization operates along several distinct registers.

At the broadest level, globalization refers to a radical reconfiguration of time and space. It is thus a multidimensional process encompassing economic, so­cial, cultural, and political domains.8 With respect to the economic sphere, the current phase of globalization features several defining characteristics.9 First, there has been an unprecedented rise in the scope and magnitude of global fi­nance capital facilitated by digital technologies and market deregulation. Second, economic production and distribution are increasingly organized around decentralized global networks, leading to high ­volume, flexible, and custom commercialization. Finally, the global economy now has the capability to op­erate as a single unit in real time. More generally, contemporary globalization generates complex spatial patterns as flows of capital, goods, and people have come unbound, even as they are reinscribed within concrete locales.

globalization also provides a concrete enemy and symbolic framework, generating metonymic links among diverse struggles. In this sense, anti–corporate globalization networks such as PGA or the WSF help forge a global frame of reference. As the PGA slogan de­clares: “May the struggle be as transnational as capital!”

Neo­ liberal projects have facilitated the penetration of corporate capitalism across space, bringing new areas into global production, consumption, and labor circuits while commodifying healthcare, education, the environment, and even life itself.

 

At least since the Zapatista uprising against the Mexican government on January 1, 1994, the day the North American Free Trade Agreement (NAFTA) went into effect, activists have forged an alter­ native project of “grassroots globalization” (Appadurai 2000), combining placed ­based resistance and transnational networking (cf. Escobar 2001). Anti–corporate globalization movements have mounted a highly effective symbolic challenge to the legitimacy of neoliberalism. As the former World Bank chief economist Joseph Stiglitz (2002) suggests: “Until protesters came along there was little hope for change and no outlets for complaint. . . . It is the trade unionists, students, and environmentalists—ordinary citizens— marching in the streets of Prague, Seattle, Washington, and Genoa who have put the need for reform on the agenda of the developed world” (9).

Stiglitz is not alone among global elites in supporting activist demands. The international financier George Soros has consistently denounced “market fundamentalism” while the Harvard economist Jeffrey Sachs has been a vocal critic of the Bretton Woods institutions. Moreover, leftist political parties in France, Spain, Italy, Brazil, and elsewhere have embraced the popular slogan of the World Social Forum: “Another World Is Possible.”

this book is not about the politics of globalization. Rather, it ex­plores emerging forms of organization among anti–corporate globalization movements, particularly in light of recent social, economic, and technological transformations. Although the activists explored in this book seek to influence contemporary political debates, they are also experimenting with new organi­zational and technological practices.

The rise of new digital technologies has profoundly altered the social movement landscape. Activists can now link up directly with one another, communicating through global communications networks without the need for a central bureaucracy. In what follows, I examine how activists are building local, regional, and global networks that are both instru­mental and prefigurative, facilitating concrete political interventions while reflecting activists’ emerging utopian ideals.1

the world and regional social forums and other grassroots networking processes have increasingly come to the fore. Although not as spectacular as direct actions, these projects have provided relatively sustainable platforms for generating alternative ideas, discourses, and practices, allowing activists to pursue their strategic and prefigurative goals in more lasting ways.

Technology, Norm, and form

Shortly after the Bolshevik revolution, the Russian anarchist Voline outlined a bold vision for an alternative, directly democratic society: “Of course . . . society must be organized. . . . the new organization . . . must be established freely, socially, and, above all, from below. The principle of organization must not issue from a center created in advance to capture the whole and impose it­ self upon it but on the contrary, it must come from all sides to create nodes of coordination, natural centers to serve all these points.” What strikes today’s reader about this passage is its resonance with the contemporary discourse of activist networking. Although the top­ down Leninist model of organization won out in the Soviet Union, consolidating a revolutionary paradigm that would be exported around the world, the past few decades have witnessed a resurgence of decentralized, networked organization and utopian visions of autonomy and grassroots counterpower. As we will see, these emerging network forms and imaginaries have been greatly facilitated by the rise of new digital technologies. Shaped by the networking logic of the Internet and broader dynamics associated with late capitalism, social movements are in­creasingly organized around flexible, distributed network forms (Castells 1997; cf. Bennett 2003; Hardt and Negri 2004). Observers have pointed to the rise of “social netwars” (Arquilla and Ronfeldt 2001) or an “electronic fabric of struggle” (Cleaver 1995), but such abstract depictions tell us little about con­crete networking practices.

This book outlines a practice­ based approach to the study of networks, linking structure and practice to larger social, economic, and technological forces.20 I employ the term “cultural logic of networking” as a way to conceive the broad guiding principles, shaped by the logic of informational capitalism, that are internalized by activists and generate concrete networking practices.21 Networking logics specifically entail an embedded and embodied set of social and cultural dispositions that orient actors toward (1) the building of hori­zontal ties and connections among diverse autonomous elements, (2) the free and open circulation of information, (3) collaboration through decentralized coordination and consensus­ based decision making, and (4) self-directed networking. At the same time, networking logics represent an ideal type. As we shall see, they are unevenly distributed in practice and always exist in dy­namic tension with other competing logics, generating a complex “cultural politics of networking” within particular spheres.

In what follows, I argue that anti–corporate globalization movements involve a growing confluence among networks as computer­ supported infrastructure (technology), networks as organizational structure (form), and networks as political model (norm), mediated by concrete activist practice. Computer networks provide the technological infrastructure for the emer­gence of transnational social movements, constituting arenas for the produc­tion and dissemination of activist discourses and practices. These networks are in turn produced and transformed by the discourses and practices circu­lating through them.24 Such communication flows follow distinct trajectories, reproducing existing networks or generating new formations. Contemporary social movement networks are thus “self­-reflexive” (Giddens 1991), constructed through communicative practice and struggle. Beyond social morphology, the network has also become a powerful cultural ideal, particularly among more radical activists, a guiding logic that provides a model of, and model for, emerging forms of directly democratic politics.

contemporary norms and forms are shaped by technological change and, further, how they reflect emerging utopian imaginaries.

Computer-Supported Social Movements

Although the wide­ spread proliferation of individualized, loosely bounded, and fragmentary social networks predates cyberspace, computer­ mediated communication has reinforced such trends, allowing communities to sustain interactions across vast distances. The Internet is also being incorporated into more routine aspects of daily social life as virtual and physical activities are increas­ingly integrated. The Internet thus facilitates global connectedness even as it strengthens local ties.

Build­ing on the pioneering use of digital technologies by the Zapatistas, as well as early free trade campaigns, anti–corporate globalization activists have used computer networks to organize actions and mobilizations, share information and resources, and coordinate campaigns by communicating at a distance.

Computer ­mediated communication is thus most effective when it is moderated, clearly focused, and used together with traditional modes of communication. Accordingly, activists generally use e­mail to stay informed about activities and perform concrete logistical tasks, while complex planning, political discussions, and relationship building occur within physical settings.

Network-Based organizational Forms

Beyond providing a technological medium, the Internet’s reticulate struc­ture reinforces network-­based organizational forms.

Networking logics have given rise to what many activists in Spain and Catalonia refer to as a “new way of doing politics.” By this they mean a mode of organizing involving horizontal coordination among autonomous groups, grassroots participation, consensus decision making, and the free and open exchange of information, although, as we shall see, this ideal is not always conformed to in practice. While the command-oriented logic of traditional parties and unions involves recruiting new members, developing unified strat­egies, pursuing political hegemony, and organizing through representative structures, network politics revolve around the creation of broad umbrella spaces, where diverse collectives, organizations, and networks converge around a few common principles while preserving their autonomy and identity­ based specificity. The objective becomes enhanced “connectivity” and horizon­tal expansion by articulating diverse movements within flexible, decentralized information structures that facilitate transnational coordination and com­munication. Key “activist­ hackers” (Nelson 1999) operate as relayers and exchangers, receiving, interpreting, and routing information to diverse net­ work nodes. Like computer hackers, activist ­hackers combine and recombine cultural codes—in this case political signifiers, sharing information about projects, mobilizations, strategies, and tactics within global communication networks.33

At the same time, discourses of open networking often conceal other forms of exclusion based on unequal access to information or technology. As a grassroots activist from India suggested to me at the 2002 WSF in Porto Alegre, “It’s not enough to talk about networks; we also have to talk about democracy and the distribution of power within them.”

what many observers view as a single, unified anti– corporate globalization movement is actually a congeries of competing yet sometimes overlapping social movement networks that differ according to is­ sue addressed, political subjectivity, ideological framework, political culture, and organizational logic.

Social movements are complex fields shot through with internal differen­tiation (Burdick 1995). Struggles within and among specific movement net­ works shape how they are produced, how they develop, and how they relate to one another within broader movement fields. Cultural struggles involv­ing ideology (anti-globalization versus anticapitalism), strategies (summit hopping versus sustained organizing), tactics (violence versus nonviolence), organizational form (structure versus non-structure), and decision making (consensus versus voting), or what I refer to as the cultural politics of network­ing, are enduring features of anti–corporate globalization landscapes. In the following chapters, I thus emphasize culture, power, and internal conflict.34 As we shall see, discrepant organizational logics often lead to heated struggles within broad “convergence spaces” (Routledge 2003), including the “unitary” campaigns against the World Bank and EU in Barcelona or the World Social Forum process more generally.

Networks as Emerging Ideal

Expanding and diversifying networks is more than a concrete organizational objective; it is also a highly valued political goal. The self­-produced, self-developed, and self­-managed network becomes a widespread cultural ideal, providing not only an effective model of political organizing but also a model for reorganizing society as a whole.

The dominant spirit behind this emerging political praxis can broadly be defined as anarchist, or what ac­tivists in Barcelona refer to as libertarian.35 Classic anarchist principles such as autonomy, self­ management, federation, direct action, and direct democracy are among the most important values for today’s radicals, who increasingly identify as anticapitalist, anti­authoritarian, or left ­libertarian.

 

These emerging political subjectivities are not necessarily identical to anar­chism in the strict ideological sense. Rather, they share specific cultural affini­ties revolving around the values associated with the network as an emerging political and cultural ideal: open access, the free circulation of information, self­-management, and coordination based on diversity and autonomy.

In a similar vein, Arturo Escobar (2004) has drawn on complexity theory to argue that anti–corporate globalization movements are emergent in that “the actions of multiple agents interacting dynamically and following local rules rather than top­ down commands result in visible macro­behavior or structures” (222).36 This is a compelling depiction of how anti–corporate globalization networks operate from a distance, but a slightly different perspective emerges when we engage in activist networking firsthand. Transnational networking requires a great deal of communicative work and struggle. Complexity theory provides a useful metaphor, but given its emphasis on abstract self -organizing systems, it tends to obscure micropolitical practices.

activists increasingly express their emerging utopian imaginaries di­rectly through concrete organizational and technological practice. As Geert Lovink (2002) suggests, “Ideas that matter are hardwired into software and network architectures” (34). This helps to explain why ideological debates are often coded as conflicts over organizational process and form.

Networks are not inherently demo­cratic or egalitarian, and they may be used for divergent ends. The network technologies and forms explored in this book were initially developed as a strategy for enhancing coordination, scale, and efficiency in the context of post-­Fordist capital accumulation. As we are reminded nearly every day, ter­ror and crime outfits increasingly operate through global networks as well.

while networks more generally are not necessarily democratic or egalitarian, their distributed structure does suggest a potential affinity with egalitarian values—including flat hierarchies, horizontal relations, and decen­ tralized coordination—which activists project back onto network technolo­ gies and forms.

What many activists now call “horizontalism” is best understood as a guiding vision, not an empirical depiction

Multiscalar ethnography

I specifically employ two tracking strategies: fol­ lowing activists to mobilizations and gatherings, and monitoring discourses and debates through electronic networks.

During my time in the field, I employed diverse ethnographic methods. First, I conducted participant observation among activists at mass mobili­zations, actions, and gatherings; meetings and organizing sessions; and in­ formal social settings. Second, I made extensive use of the Internet, which allowed me to participate in and follow planning, coordinating, and political discussions within Catalan, Spanish, and English­ language Listservs based in Europe, Latin America, and North America. Third, I conducted seventy qual­ itative interviews with Barcelona ­based activists from diverse backgrounds. Fourth, I collected and examined movement ­related documents produced for education, publicity, and outreach, including flyers, brochures, reports, and posters. Finally, I also collected articles and texts within mainstream and alternative media.

Practicing Militant ethnography

The ethnographic methodology developed here, which I call “militant eth­nography,” is meant to address what Wacquant (1992) calls the “intellectual bias”: how our position as outside observer “entices us to construe the world as a spectacle, as a set of significations to be interpreted rather than as concrete problems to be solved practically” (39). The tendency to position oneself at a distance and treat social life as an object to decode rather than entering the flow and rhythm of ongoing social interaction hinders our ability to understand social practice.45 To grasp the concrete logic generating specific practices, one has to become an active participant. With respect to social movements, this means organizing actions and workshops, facilitating meetings, weighing in during strategic and tactical debates, staking out political positions, and put­ ting one’s body on the line during direct actions. Simply taking on the role of “circumstantial activist” (Marcus 1995) is not sufficient; one has to build long­ term relationships of commitment and trust, become entangled with complex relations of power, and live the emotions associated with direct­action orga­nizing and transnational networking. Militant ethnography thus refers to ethnographic research that is not only politically engaged but also collaborative, thus breaking down the divide between researcher and object.46

Furthermore, militant ethnography also generates embodied and affec­tive understanding. As anyone who has participated in mass direct actions or demonstrations can attest, such events produce powerful emotions, involving alternating sensations of anticipation, tension, anxiety, fear, terror, solidar­ity, celebration, and joy. These affective dynamics are not incidental; they are central to sustained processes of movement building and activist networking. In this sense, I use my body as a research tool, particularly during moments of intense passion and excitement, to generate what Deidre Sklar (1994) calls “kinesthetic empathy.”47

militant ethnography can provide tools for activist (self­) reflection and decision making while remaining pertinent for broader aca­ demic audiences. I thus hope to contribute to strategic debates, but always from the partial and situated position of the militant ethnographer.

Practicing militant ethnography can thus help activists carry out their own ethnographic research.

For Burdick, this involves supporting movements in their efforts to reach out to a wider audience. But it might also mean helping activists analyze di­ verse movement sectors, understand how they operate, and learn how to most effectively work together.

Militant ethnography thus includes three interrelated modes: (1) collective reflection and visioning about movement practices, logics, and emerging cul­tural and political models; (2) collective analysis of broader social processes and power relations that affect strategic and tactical decision making; and (3) collective ethnographic reflection about diverse movement networks, how they interact, and how they might better relate to broader constituencies. Each of these levels involves engaged, practice­ based, and politically committed re­ search carried out in horizontal collaboration with social movements.

those of us within the academy can use writing and publishing as a form of resistance, working within the system to generate alternative politically en­gaged accounts.

The Book ahead

the genealogy of diverse processes that converged there, including grassroots struggles in the Global South, student­based anticorporate activism, campaigns against struc­tural adjustment and free trade, anarchist ­inspired direct action, and global Zapatista solidarity networks. I then go on to trace the growth and expansion of anti–corporate globalization movements after Seattle, before concluding with an analysis of their major defining characteristics.

The conflict between networking and traditional command logics forms part of a broader series of struggles involving competing visions, ideologies, and practices, leading to a complex pattern of shifting alliances driven by networking politics at local, regional, and global scales.

Quotes from Alicia Garza’s The Purpose of Power: How We Come Together When We Fall Apart

The Purpose of Power: How We Come Together When We Fall Apart by Alicia Garza provides an autobiographical accounting of one the founders of Black Lives Matter. The following are Excerpts from Alicia Garza’s book The Purpose of Power, with a thematic description of the text above it.

On Black Lives Matter and Movement Building

“Even though I’d been an organizer for more than ten years when Black Lives Matter began, it was the first time I’d been part of something that garnered so much attention. Being catapulted from a local organizer who worked in national coalitions to the international spotlight was unexpected.”

“I’ve been asked many times over the years what an ordinary person can do to build a movement from a hashtag. Though I know the question generally comes from an earnest place, I still cringe every time I am asked it. You cannot start a movement from a hashtag. Hashtags do not start movements—people do. Movements do not have official moments when they start and end, and there is never just one person who initiates them. Movements are much more like waves than they are like light switches. Waves ebb and flow, but they are perpetual, their starting point unknown, their ending point undetermined, their direction dependent upon the conditions that surround them and the barriers that obstruct them. We inherit movements. We recommit to them over and over again even when they break our hearts, because they are essential to our survival.”

“You cannot start a movement from a hashtag. Only organizing sustains movements, and anyone who cannot tell you a story of the organizing that led to a movement is not an organizer and likely didn’t have much to do with the project in the first place.

Movements are the story of how we come together when we’ve come apart.”

On Activists and Influencers 

“The emergence of the activist-as-celebrity trend matters. It matters for how we understand how change happens (protest and add water), it matters for how we understand what we’re fighting for (do people become activists to create personal “influencer” platforms or because they are committed to change?), and it matters for how we build the world we want. If movements can be started from hashtags, we need to understand what’s underneath those hashtags and the platforms they appear on: corporate power that is quickly coming together to reshape government and civil society, democracy and the economy.”

On Revolutionary Theory

“FRANTZ FANON SAID THAT “EACH generation must, out of relative obscurity, discover its mission, fulfill it, or betray it.” This is the story of movements: Each generation has a mission that has been handed to it by those who came before. It is up to us to determine whether we will accept that mission and work to accomplish it, or turn away and fail to achieve it.

There are few better ways to describe our current reality. Generations of conflict at home and abroad have shaped the environment we live in now. It is up to us to decide what we will do about how our environment has been shaped and how we have been shaped along with it. How do we know what our mission is, what our role is, and what achieving the mission looks like, feels like? Where do we find the courage to take up that which has been handed to us by those who themselves determined that the status quo is not sufficient? How do we transform ourselves and one another into the fighters we need to be to win and keep winning?”

“Before we can know where we’re going—which is the first question for anything that calls itself a movement—we need to know where we are, who we are, where we came from, and what we care most about in the here and now. That’s where the potential for every movement begins.

We are all shaped by the political, social, and economic contexts of our time. ”

On Revolutionary Practice

“Our wildly varying perspectives are not just a matter of aesthetic or philosophical or technological concern. They also influence our understanding of how change happens, for whom change is needed, acceptable methods of making change, and what kind of change is possible. My time, place, and conditions powerfully shaped how I see the world and how I’ve come to think about change.”

The Interpretation of History that Shaped her Worldview

“By the time I came into the world, the revolution that many had believed was right around the corner had disintegrated. Communism was essentially defeated in the Soviet Union. The United States, and Black people within it, began a period of economic decline and stagnation—briefly interrupted by catastrophic bubbles—that Black communities have never recovered from. ”

“The gulf between the wealthy and poor and working-class communities began to widen. And a massive backlash against the accomplishments won during the 1960s and 1970s saw newly gained rights undermined and unenforced.

But just like in any period of lull, even in the quiet, the seeds of the next revolution were being sown.

Many believe that movements come out of thin air. We’re told so many stories about movements that obscure how they come to be, what they’re fighting for, and how they achieve success. As a result, some of us may think that movements fall from the sky..”

“Those stories are not only untrue, they’re also dangerous. Movements don’t come out of thin air.”

Political Ideology and Strategic Frameworks

“In the United States, “right wing” usually refers to people who are economically, socially, or politically conservative. What does it mean to be “conservative”? I’m using “conservative” to describe people who believe that hierarchy or inequality is a result of a natural social order in which competition is not only inevitable but desirable, and the resulting inequality is just and reflects the natural order. Typically, but not always, the natural order is held to have been determined and defined by God or some form of social Darwinism. ”

“One component of the successful religious-right strategy included building out an infrastructure of activist organizations that could reach even more people and influence the full range of American politics. ”

“The religious right developed the wide, more geographically distributed base of voters that the neoconservatives and the new right needed to complete their takeover of the Republican Party. These factions had many differences in approach, long-term objectives, overall vision, values, and ideology. The corporate Republicans wanted deregulation, union busting, and a robust military-industrial complex. The neoconservatives wanted to fight communism and establish global American military hegemony and American control over the world’s resources. The social conservatives wanted to roll back the gains of civil rights movements and establish a religious basis and logic for American government. And yet, even amid their differences, where they are powerful is where their interests align; they are able to work through those differences in order to achieve a common goal.”

[…] 

“Under Reaganism, personal responsibility became the watchword. If you didn’t succeed, it was because you didn’t want to succeed. If you were poor, it was because of your own choices. And if you were Black, you were exaggerating just how bad things had become.

Reagan declared a War on Drugs in America the year after I was born. His landmark legislation, the Anti-Drug Abuse Act of 1986, enacted mandatory minimum sentences for drugs. This single piece of legislation was responsible for quadrupling the prison population after 1980 and changing the demographics in prisons and jails, where my mother worked as a guard, from proportionally white to disproportionately Black and Latino. ”

On Regan 

“Reagan stoked public fears about “crack babies” and “crack whores.” The Reagan administration was so successful at this manipulation that, in 1986, crack was named the Issue of the Year by Time magazine.”

“Reagan led the popular resistance to the movements fighting against racism and poverty in the Global South that characterized the 1960s and 1970s. Significantly, he alluded to protest movements in the United States being used as tools of violence by the USSR, playing on widespread fears about a communist takeover of the United States and abroad. He also used fears of communism to authorize an invasion of Grenada, a then-socialist Caribbean country, to increase United States morale after a devastating defeat in Vietnam a few years prior, and to increase support for pro-U.S. interventions in El Salvador, Nicaragua, and Guatemala. Reagan also supported the apartheid regime in South Africa.”

“The War on Drugs had begun to morph into the War on Gangs. Economic policy shifts meant that white families moved out of the cities and into the suburbs. Television news programs and newspapers were swelling with stories of crime and poverty in the inner cities. Since there was little discussion of the policies that had created such conditions, the popular narrative of the conservative movement within both parties blamed Black communities for the conditions we were trying to survive. More and more pieces of legislation, written under the blueprint of the conservative movement but extending across political party lines, targeted Black communities with increased surveillance and enforcement, along with harsher penalties. None of these legislative accomplishments included actually fighting the problems, because this movement had created those problems in the first place.”

On San Francisco Activism

“I volunteered at an organization to end sexual violence called San Francisco Women Against Rape (SFWAR)”

“My volunteer duties at SFWAR felt more aligned with my emerging sense of politics, but they also helped shape my understanding of my own identity: Most of the staff was queer and of color. Being in that environment helped me explore my own sexuality, as I found myself attracted to and attractive to dykes and butches and trans people. During our training as volunteers, we learned about various systems of oppression—much as I had in college—but this learning was not academic; it wasn’t detached from our own experiences. We were seeing how those systems functioned on the ground, in people’s real lives—in our lives.

SFWAR was going through a transition: It was trying to move from a one-way organization that simply provided services in response to a pressing need to one that had a two-way relationship with the people who received them—both providing services and learning from, adapting to, and integrating the recipients into the process. This shift brought with it some upheaval, internally and externally. There wasn’t a clear agreement internally about which direction to head in. Having taken on a more explicitly political stance, SFWAR was being attacked from the outside—and the work itself was hard enough without the added stress of death threats coming through our switchboard or funders threatening to withdraw.”

[…]

“My time at SFWAR was coming to a close, and one day I received a notice on a listserv I belonged to advertising a training program for developing organizers. They were looking for young people, ages eighteen to thirty, to apply to participate in an eight-week program that promised “political education trainings” and “organizing intensives.” Each person selected would be placed in a community-based organization for training, and many organizations were inclined to hire the interns if their time during the sum”

On Community Organizing

“Community organizing is often romanticized, but the actual work is about tenacity, perseverance, and commitment. It’s not the same as being a pundit, declaring your opinions and commentary about the world’s events on your social media platforms. Community organizing is the messy work of bringing people together, from different backgrounds and experiences, to change the conditions they are living in. It is the work of building relationships among people who may believe they have nothing in common so that together they can achieve a common goal. That means that as an organizer, you help different parts of the community learn about one another’s histories and embrace one another’s humanity as an incentive to fight together. An organizer challenges their own faults and deficiencies while encouraging others to challenge theirs. An organizer works well in groups and alone. Organizers are engaged in solving the ongoing puzzle of how to build enough power to change the conditions that keep people in misery.”

Working with POWER

“In 2005, I joined a small grassroots organization called People Organized to Win Employment Rights (POWER) to help start a new organizing project focused on improving the lives of Black residents in the largest remaining Black community in San Francisco.

I’d been following POWER for a long time. It was founded in 1997 with the mission to “end poverty and oppression once and for all.” POWER was best known for its work to raise the minimum wage in San Francisco to what was, at the time, the highest in the country, and for its resistance to so-called welfare reform, which it dubbed “welfare deform.” POWER was unique among grassroots organizations in San Francisco because of its explicit focus on Black communities. That was one of the aspects that attracted me to the organization’s work. POWER was everything I was looking for in an organization at that point in my life—a place where I could learn, a place where I would be trained in the craft of organizing and in the science of politics, and a place where I didn’t have to leave my beliefs, my values, and my politics at the door each day when I went I went to work.

Joining POWER would change how I thought about organizing forever.”

“We had a robust network of volunteers who would be willing to help gather the signatures needed. We’d begun working closely with the Nation of Islam, environmental justice organizations like Greenaction for Health and Environmental Justice and the Sierra Club, and other faith-based organizers who would lend their support. After talking with our coalition partners, as well as the membership that POWER had built in the neighborhood, and debating the best approach, we decided to give it a shot.”

“Shortly after we qualified for the ballot measure, our coalition started hearing “may be safe to say that Black communities want to see a better world for themselves and their families, it isn’t accurate to assume that Black people believe that all Black people will make it there or deserve to. While some of us deeply understand the ways in which systems operate to determine our life chances, others believe deeply in a narrative that says we are responsible for our own suffering—because of the choices we make or the opportunities we fail to seize. Some Black people think we are our own worst enemy.

 

On Working as an Organizer 

“As organizers, our goal was to get those in the 99 percent to put the blame where it actually belonged—with the people and institutions that profited from our misery. And so, “unite to fight” is a call to bring those of us stratified and segregated by race, class, gender, sexuality, ability and body, country of origin, and the like together to fight back against truly oppressive power and to resist attempts to drive wedges between us. More than a slogan, “the 99 percent” asserts that we are more similar than we are different and that unity among people affected by a predatory economy and a faulty democracy will help us to build an unstoppable social movement.

Many of the organizations that I helped to build between 2003 and today upheld the principle of “unite to fight” before “the 99 percent” was a popular phrase. This orientation is not just important for the potential of a new America; it is important for the potential of a globally interdependent world.”

On Political Strategy

“When I began working at POWER in 2005, our organization had an explicit strategy that involved building a base of African Americans and immigrant Latinos. In fact, our model of multiracial organizing was one that other organizations looked to for inspiration on how to build multiracial organizations. The National Domestic Workers Alliance, where I currently work, is a multiracial organization comprising Pacific Islanders, Black immigrants, U.S.-born Black people, South Asians and others from the Asian diaspora, immigrant Latinos, Chicanas, and working-class white people. My organizing practice and my life have been enriched by having built strong relationships with people of all races and ethnicities. I’ve had the opportunity to interrupt stereotypes and prejudices that I didn’t even know I held about other people of color, and interrupting those prejudices helps me see us all as a part of the same effort.

Capitalism and racism have mostly forced people to live in segregated spaces. If I stayed in my neighborhood for a full day, I could go the entire time without seeing a white person. Similarly, in other neighborhoods, I could go a whole day without seeing a Black person or another person of color. ”

The United States Social Forum

“In 2007, I was still working with POWER. That June, we helped organize a delegation of thirty people for a trip to the United States Social Forum in Atlanta, Georgia. Half of our delegation was Black—some of whom were members of our Bayview Hunters Point Organizing Project—and the other half were immigrant Latina domestic workers.”

“I’d been a part of many national and international efforts by this time, including the last United States Social Forum, a major gathering of social justice activists that had taken place in Detroit a few years before. While those experiences had taught me a lot about how to build relationships with people with different backgrounds and agendas, that kind of work is also difficult. When you’re an outsider, it’s hard to build trust.”

“In 2007, I attended the United States Social Forum, where more than 10,000 activists and organizers converged to share strategies to interrupt the systems of power that impacted our everyday lives. It was one of my first trips with POWER, and I was eager to prove myself by playing a role in helping to coordinate our delegation of about thirty members, along with the staff. One day, the director of the organization invited me to attend a meeting with him.”

“The meeting was of a new group of Black organizers from coalitions across the country, joining to work together in service of Black people in a new and more systematic way. I was excited about the potential of what could happen if this meeting was successful. I was becoming politicized in this organization, learning more about the history of Black people’s efforts to live a dignified life, and I yearned to be part of a movement that had a specific focus on improving Black lives.

When we arrived, I looked around the room, and out of about a hundred people who were crowded together, there were only a handful of women. Literally: There were five Black women and approximately ninety-five Black men.

An older Black man called the meeting to order. I sat next to my co-worker, mesmerized and nervous. Why were there so few Black women here? I wondered. In our local organizing, most of the people who attended our meetings were Black women. The older Black man talked for about forty minutes. When he finally stopped talking, man after man spoke, long diatribes about what Black people needed to be doing, addressing our deficits  

“as a result of a sleeping people who had lost our way from who we really were. That feeling I used to get as a kid when my dad would yell to my mother or me to make him coffee began to bubble up inside me. Nervous but resolute, I raised my hand.

“So,” I began, “I appreciate what you all have had to say.” I introduced myself and the organization I was a part of, and then I continued: “I believe in the liberation you believe in, and I work every day for that. I heard you say a lot, but I didn’t hear you say anything about where women fit into this picture. Where do queer people fit in this vision you have for Black liberation?” I had just delivered my very own Sojourner Truth “Ain’t I a Woman?” speech, and the room fell silent.

It was hot in there. The air hung heavy in the packed room. People shifted uncomfortably in their seats. Some of the men in the room refused to make eye contact with me. Had I said something wrong? In the forty minutes the older man had spent talking, and the additional forty minutes the other men took up agreeing profusely over the liberation of Black men, not one mention was made of how Black people as a whole find freedom.

 It was as if when they talked about Black men, one should automatically assume that meant all Black people. I looked at him, at first with shyness and then, increasingly, with defiance. He started to talk about how important “the sisters” were to the project of Black liberation, but by then, for me, it was too late. The point had already been made. And there my impostor syndrome kicked in again. Who did this Black girl think she was, questioning the vision and the leadership of this Black man?”

On Revolutionary Theory and Practice

“Political education is a tool for understanding the political contexts we live in. It helps individuals and groups analyze the social and economic trends, the policies and the ideologies influencing our lives—and use this information to develop strategies to change the rules and transform power.

It comes in different forms. Popular education, developed by Brazilian educator Paulo Freire, is a form of political education where the “educator” and the “participants” engage in learning together to reflect on critical issues facing their communities and then take action to address those issues. I once participated in a workshop that used popular-education methods to explain exploitation in capitalism, and—despite two bachelor’s degrees, in anthropology and sociology—my world completely opened up. I’d taken classes that explored Marxist theory but had never learned how it came to life through Third World liberation struggles, how poor people in Brazil and South Africa and Vietnam used those theories to change their governments, change the rules, and change their conditions. Had I learned about those theories in ways that actually applied to my life, my context, my experience, I probably would have analyzed and applied them differently. Because the information had little context that interested me, I could easily dismiss it (mostly because I didn’t totally understand it) and miss an opportunity to see my world a little more clearly.”

On Education

“In this country, education has often been denied to parts of the population—for instance, Black students in the post–Reconstruction and Jim Crow eras, or students today in underfinanced and abandoned public schools. Given our complicated history with education, some people involved in movements for change don’t like the idea of education or political education as a way to build a base. 

This form of anti-intellectualism—the tendency to avoid theory and study when building movements—is a response to the fact that not everyone has had an equal chance to learn. But education is still necessary.

For those of us who want to build a movement that can change our lives and the lives of the people we care about, we must ask ourselves: How can we use political education to help build the critical thinking skills and analysis of those with whom we are building a base? We cannot build a base or a movement without education.

On Gramsci, Hegemony and Cultural Marxism

Antonio Gramsci was an Italian Marxist philosopher and politician whose work offers some important ideas about the essential role of political education. Gramsci was born in 1891 in Sardinia, Italy. He co-founded the Italian Communist Party and was imprisoned by Benito Mussolini’s fascist regime. While he was in prison, Gramsci wrote Prison Notebooks, a collection of more than thirty notebooks and 3,000 pages of theory, analysis, and history.

Gramsci is best known for his theories of cultural hegemony, a fancy term for how the state and ruling class instill values that are gradually accepted as “common sense”—in other words, what we consider to be normal or the status quo. Gramsci studied how people come to consent to the status quo. According to Gramsci, there are two ways that the state can persuade its subjects to do what it wants: through force and violence, or through consent. While the state does not hesitate to use force in pursuit of its agenda, it also knows that force is not a sustainable option for getting its subjects to do its will. Instead, the state relies on consent to move its agenda, and the state manufactures consent through hegemony, or through making its values, rules, and logic the “common sense” of the masses. In that way, individuals willingly go along with the state’s program rather than having to be coerced through violence and force.

This doesn’t mean that individuals are not also coerced through violence and force, particularly when daring to transgress the hegemony of the state. American hegemony is white, male, Christian, and heterosexual. That which does not support that common sense is aggressively surveilled and policed, sometimes through the direct violence of the state but most often through cultural hegemony.”

“Hegemony, in Gramsci’s sense, is mostly developed and reinforced in the cultural realm, in ways that are largely invisible but carry great power and influence. For example, the notion that pink is for girls and blue is for boys is a pervasive idea reinforced throughout society. If you ever look for a toy or clothing for a newborn assigned either a male sex or male gender, you find a preponderance of blue items. If boys wear pink, they are sometimes ostracized. This binary of pink for girls and blue for boys helps maintain rigid gender roles, which in turn reinforce the power relationships between the sexes. Transgressions are not looked upon favorably, because to disrupt these rules would be to disrupt the distribution of power between the sexes. To dress a girl-identified child in blue or to dress a boy in pink causes consternation or even violence. These are powerful examples of hegemony at work—implicit rules that individuals in a society follow because they become common sense, “just the way things are” or “the way they’re supposed to be.”

Hegemony is important to understand because it informs how ideas are adopted, carried, and maintained. We can apply an understanding of hegemony to almost any social dynamic—racism, homophobia, heterosexism, sexism, ableism. We have to interrupt these toxic dynamics or they will eat away at our ability to build the kinds of movements that we need. But to interrupt these toxic dynamics requires that we figure out where the ideas come from in the first place.”

“We have to dig into the underlying ideas and make the hegemonic common sense visible to understand how we can create real unity and allyship in the women’s movement.”

“There are examples unique to this political moment. Since the rise of the Black Lives Matter movement, hegemonic ideas have slowed our progress. One piece of hegemonic common sense is the idea that Black men are the central focus of Black Lives Matter and should be elevated at all times. The media rushed to anoint a young gay Black man as the founder of the movement, even though that was not the case. This same sort of prioritizing of Black men happened all over the country: young Black men elevated to the role of Black Lives Matter leaders, regardless of the work they’d actually put in. Why were they assigned these roles without justification? I believe it’s because hegemony in the United States assigns leadership roles to men. In Black communities in particular, leadership is assigned to Black men even when Black women are carrying the work, designing the work, developing the strategy, and executing the strategy. Symbolism can often present as substance, yet they are not the same. This is a case where an unexamined hegemonic idea caused damage and distortion.”

“They felt left out not just because of the undue influence of the corporate class and the elite but also because they perceived that the wealth, access, and power promised to them were being distributed to women, people of color, and queer people. Trump’s campaign relied on the hegemonic idea of who constituted the “real” America, who were the protagonists of this country’s story and who were the protagonists of this country’s story and who were the villains. The protagonists were disaffected white people, both men and women, and the villains were people of color, with certain communities afforded their own unique piece of the story.”

“Stripping away political correctness can also be seen in the campaign’s promised return to the way things were—a time when things were more simple and certain groups of people knew their place. These ideas are called hegemonic because they are embedded and reproduced in our culture. ”

“Culture and policy affect and influence each other, so successful social movements must engage with both. This isn’t a new idea—the right has been clear about the relationship between culture and policy for a very long time. It is one of the reasons they have invested so heavily in the realm of ideas and behavior. Right-wing campaigns have studied how to culturally frame their ideas and values as common sense.

Culture has long been lauded as an arena for social change—and yet organizers often dismiss culture as the soft work, while policy is the real work. But policy change can’t happen without changing the complex web of ideas, values, and beliefs that undergird the status quo. When I was being trained as an organizer, culture work was believed to be for people who could not handle real organizing. Nobody would say it out loud, but there was a hierarchy—with community organizing on top and cultural organizing an afterthought.”

“To be fair, some cultural work did fall into this category. After all, posters and propaganda distributed among the coalition of the already willing weren’t going to produce change as much as reinforce true believers.

When culture change happens, it is because movements have infiltrated the cultural arena and penetrated the veil beyond which every person encounters explicit and implicit messages about what is right and what is wrong, what is normal and what is abnormal, who belongs and who does not. When social movements engage in this arena, they subvert common ideas and compete with or replace them with new ideas that challenge so-called common sense.

Culture also offers an opportunity for the values and hegemony of the opposition to be exposed and interrogated. The veteran organizer and communications strategist Karlos Gauna Schmieder wrote that “we must lay claim to civil society, and fight for space in all the places where knowledge is produced and cultured.” By laying claim to civil society, we assert that there is an alternative to the white, male, Christian, heterosexual “common sense” that is the status quo—and we work to produce new knowledge that not only reflects our vision for a new society but also includes a new vision for our relationships to one another and to the planet.

It is this challenge, to lay claim to civil society and to fight for space in all of the places where knowledge is produced and cultured, that movements must take on with vigor, just as right-wing movements have tried to lay claim to those places to build their movement. Culture, in this sense, is what makes right-wing movements strong and compelling. It is what lays the groundwork for effective, sustained policy change.”

On Political Education

“Political education helps us make visible that which had been made invisible. We cannot expect to unravel common sense about how the world functions if we don’t do that work. Political education helps us unearth our commonly held assumptions about the world that keep the same power dynamics functioning the way they always have. It supports our ability to dream of other worlds and to build them. And it gives us a clearer picture of all that we are up against.”

On Political Strategy

“Building a movement means building alliances. Who we align with at any given time says a lot about what we are trying to build together and who we think is necessary to build it.

The question of alliances can be confusing. We might confuse short-term alliances with long-term ones. Or confuse whether the people we ally with on a single campaign need to be aligned with us on everything. But here’s the truth of the matter: The people we need to build alliances with are not necessarily people we will agree with on everything or even most things. And yet having a strategy, a plan to win, asks us to do things differently than we’ve done them before.”

[…]

“Popular fronts are alliances that come together across a range of political beliefs for the purpose of achieving a short-to-intermediate-term goal, while united fronts are long-term alliances based on the highest level of political alignment. The phrases are often used interchangeably but shouldn’t be.”

“A lot of activist coalitions these days take the form of popular fronts and come together around achieving a short-to-intermediate-term objective. ”

San Francisco Rising Alliance 

“We spent time together doing organizing exchanges, studying political theory and social movements, learning from one another’s organizing models, and taking action together. After about five years, this alliance grew into an even stronger one, known as San Francisco Rising—an electoral organizing vehicle designed to build and win real power for working-class San Francisco.”

On Political Strategy

“United fronts are helpful in a lot of ways, including being really clear about who is on the team. In some ways, united fronts are what we are working toward, why we organize: to build bigger and bigger teams of people aligned in strategy, vision, and values. But if I had to guess, I’d say that the next period will be characterized by a greater number of popular fronts, and I think this is a good thing.

Popular fronts help you engage with the world as it is, while united fronts offer the possibility of what could be. United fronts allow us to build new alternatives, to test new ideas together, because there is already a high level of trust, political clarity, and political unity. Popular fronts, however, teach us to be nimble, to build relationships across difference for the sake of our survival.

Popular fronts are important tools for organizers today. They match today’s reality: that those of us who want to see a country and a world predicated on justice and equality and the ability to live well and with dignity are not well represented ”

“among those who are making decisions over our lives. We are a small proportion of people who currently serve in the U.S. Congress, a small percentage of people who are mayors and governors, and a small percentage of people moving resources on your city council or board of education.

We are not the majority of the decision makers, even though we likely represent the majority in terms of what we all want for our futures. It is tempting in these times to double down on those closest to you, who already share your vision, share your values, share your politics. But to get things done, we are tasked to find places of common ground, because that is how we can attain the political power we lack.

Many people are uncomfortable with popular fronts because they are afraid that working with their opponents will dilute their own politics. I agree that popular fronts without united fronts are dangerous for this exact reason—without an anchor, without clarity about what you stand for and who you are accountable to, it can be difficult to maintain integrity and clarity when working with people who do not share your values and vision.”

On Creating Black Lives Matter 

“When Patrisse, Opal, and I created Black Lives Matter, which would later become the Black Lives Matter Global Network, each of us also brought our own understanding of platforms, pedestals, and profiles. At that point, we’d all spent ten years as organizers and advocates for social justice. Our platforms and profiles, and perhaps even pedestals, come from the relationships we have in our communities, the networks we are a part of, and the work we’ve done for migrant rights, transit justice, racial justice, economic justice, and gender justice. For nearly a year, we operated silently, using our networks and our experiences as organizers to move people to action, to connect them to resources and analysis, and to engage those who were looking for a political home. Our work was to tell a new story of who Black people are and what we care about, in order to encourage and empower our communities to fight back against state-sanctioned violence—and that meant our primary role, initially, was to create the right spaces for that work and connect people who wanted to do the work of organizing for change.

But when a well-known mainstream civil rights organization began to claim our work as their own, while distorting the politics and the values behind it, we decided to take control of our own narrative and place ourselves more prominently in our own story.”

On Political Strategy

“When I was being trained as an organizer, social media forums were not yet as popular and as widely used as they are today. Debates over strategy, outcomes, or even grievances took place in the form of “open letters,” often circulated through email. At the time, that world seemed vast and important, but in retrospect—compared to the global reach of social media—it was very, very small.

Yet even in my small corner of the world, there were those who went from being relatively unknown grassroots organizers to people with more power and influence. And I saw how the movement could be ambivalent toward its most visible members when those individuals were seen as having gone too far beyond the movement’s own small imprint.”

About the National Domestic Workers Alliance

“When Ai-jen Poo, currently the director of the National Domestic Workers Alliance and co-director of Caring Across Generations, built a profile and a platform based on her success leading domestic workers to win the first ever Domestic Workers Bill of Rights in New York State, it caused quiet rumblings within the movement that grew her. People were unsure if it was a good thing that her fame had outgrown our small corner of the world. When Van Jones remade himself from an ultra-left revolutionary into a bipartisan reformer who landed in the Obama administration as the “green jobs czar,” the movement that grew him quickly disavowed him. Even when Patrisse Cullors began to grow a platform and a profile beyond the work I’d known her for at the Bus Riders Union, a project of the Labor/Community Strategy Center in Los Angeles, I received a call from one of her mentors questioning her ability to “lead the Black liberation movement.” In one breath, movements in development and movements in full swing can become antagonistic to those who break through barriers to enter the mainstream, where they can expose the movement’s ideas to new audiences.

Throwing Shade at DeRay Mckesson

“DeRay Mckesson is often credited with launching the Black Lives Matter movement along with the work that Patrisse, Opal, and I initiated. However, Mckesson offers a sharp lesson on pedestals, platforms, and profiles—and why we need to be careful about assigning roles that are inaccurate and untrue.

Mckesson is someone I first met in Ferguson, Missouri, a full year after Patrisse, Opal, and I launched Black Lives Matter. How we met matters. Patrisse and Darnell Moore had organized a freedom ride whereby Black organizers, healers, lawyers, teachers, “and journalists gathered from all over the country to make their way to Ferguson. I flew to St. Louis to help support another organization on the ground there. The freedom ride coincided with the time I spent in St. Louis, and as I was being given the rundown on the landscape during my first few days there, I was told about a young man named DeRay Mckesson.

Mckesson played the role of a community journalist on the ground in Ferguson. He and Johnetta Elzie had started a newsletter called This Is the Movement, and I remember Mckesson approaching me at a meeting convened by what has since become the Movement for Black Lives and asking if they could interview the three of us about Black Lives Matter. ”

“He was criticizing Black Lives Matter, which was, at that time, fending off attacks from right-wing operatives who were trying to pin on us the actions of activists who had begun to call themselves Black Lives Matter but had not been a part of the organizing efforts we were building through a network structure that had chapters. These activists had led a march where people in the crowd were chanting “Pigs in a blanket, fry ’em like bacon.” The news media had been stirred up like a beehive over the comments, and our team was working furiously to clarify that not everyone who identifies as Black Lives Matter is a part of the formal organization. ”

“I cannot tell you how many times I have been at events where someone will approach me to say that they know the other co-founder of Black Lives Matter, DeRay Mckesson. ”

“One could argue that it’s difficult to distinguish, particularly when there are so many people who identify with the principles and values of Black Lives Matter. But those of us who are involved in the movement know the difference—we know the difference because we work with one another. We share the same ecosystem. We know the difference between the Movement for Black Lives, and the wide range of organizations that comprise that alliance, and the larger movement for Black liberation.”

“I explained to her that while Mckesson was an activist, he was not a co-founder of Black Lives Matter.

I wish that these were innocent mistakes, but they’re not. Characterizing these misstatements as misunderstandings is gaslighting of the highest degree. Mckesson was a speaker at a Forbes magazine event, “Forbes 30 under 30,” and was listed in the program as the co-founder of Black Lives Matter, yet he wasn’t in a rush to correct the mistake—and certainly didn’t address the mistake in any comments he made that day. There was an outcry on social media, which forced Mckesson to contact the planners and have them change the description. But had there not been an outcry by people sick of watching the misleading dynamic, there wouldn’t have been any change.”

“Tarana Burke wrote an article about this misrepresentation in 2016 in The Root, a year before the #MeToo movement swept the country, criticizing Mckesson for allowing his role to be overstated. She cites a Vanity Fair “new establishment” leaders list on which Mckesson is No. 86 and accompanied by the following text:

Crowning achievement: Transforming a Twitter hashtag, #BlackLivesMatter, into a sustained, multi-year, national movement calling for the end of police killings of African-Americans. He may have lost a bid to become Baltimore’s next mayor, but he is the leader of a movement.”

“Some will be tempted to dismiss this recounting as petty, or selfish, or perhaps more a function of ego than the unity that is needed to accomplish the goals of a movement. The problem with that view is that conflicts and contradictions are also a part of movements, and ignoring them or just pleading for everyone to get along doesn’t deal with the issues—it buries them for the sake of comfort, at the expense of the clarity that is needed to really understand our ecosystem and the wide range of practices, politics, values, and degrees of accountability inside it.

Movements must grapple with the narration of our stories—particularly when we are not the ones telling them. Movements must grapple with their own boundaries, clarifying who falls within them and who falls outside them. Movements must be able to hold conflict with clarity. 

“When in his book Mckesson credits a relatively unknown UCLA professor with the creation of the #BlackLivesMatter hashtag, he doesn’t do so for the purpose of clarity—he does it to unseat and deliberately discredit the roles that Patrisse, Opal, and I, along with many, many others, have played in bringing people together to take action and engaging our communities around a new theory of who Black life encompasses and why that matters for our liberation. And in many ways he does it for the purpose of attempting to justify the ways in which he inflates his own role in Black Lives Matter.”

On the Movement for Black Lives

“I met Charlene Carruthers, the first national director of the Black Youth Project 100, when I was still the executive director at POWER in San Francisco. I had no idea that the Black Youth Project would establish itself as a leading organization in the Movement for Black Lives until nearly two years after they were founded. As we were launching Black Lives Matter as a series of online platforms, the Dream Defenders, with which I was unfamiliar, and Power U, with which I was very familiar, were taking over the Florida State Capitol, demanding an end to the Stand Your Ground law. I met the director of the Dream Defenders, at that time Phillip Agnew, at a Black Alliance for Just Immigration gathering in Miami in 2014, just a few months before Ferguson erupted. I remember being in Ferguson when a young activist asked me with distrust if I’d ever heard of the Organization for Black Struggle. I had, of course, not only heard of them but sat at the feet of a well-known leader of that organization, “Mama” Jamala Rogers. Our reality is shaped by where and when we enter at any given moment.

“We have allowed Mckesson to overstate his role, influence, and impact on the Black Lives Matter movement because he is, in many ways, more palatable than the many people who helped to kick-start this iteration of the movement. He is well branded, with his trademark blue Patagonia vest that helps you identify him in a sea of people all claiming to represent Black Lives Matter. He is not controversial in the least, rarely pushing the public to move beyond deeply and widely held beliefs about power, leadership, and impact. He is edgy enough in his willingness to document protests and through that documentation claim that he played a larger role in them than he did, and yet complaisant enough to go along to get along. He does not make power uncomfortable.”

“We have to start crediting the work of Black women and stop handing that credit to Black men. We can wax poetic about how the movement belongs to no one and still interrogate why we credit Black men like DeRay Mckesson as its founder, or the founder of the organization that Patrisse, Opal, and I created.”

“It’s ahistorical and it serves to only perpetuate the erasure of Black women’s labor, strategy, and existence.”

“I used to be a cynic. As I was developing my worldview, developing my ideas, working in communities, I used to believe that there was no saving America, and I had no desire to lead America.

Over the last decade, that cynicism has transformed into a profound hope. It’s not the kind of hope that merely believes that there is something better out there somewhere, like the great land of Oz. It is a hope that is clear-eyed, a hope that propels me. It is the hope that organizers carry, a hope that understands that what we are up against is mighty and what we are up against will not go away quietly into the night just because we will it so.

No, it is a hope that knows that we have no other choice but to fight, to try to unlock the potential of real change.”

Black Futures Lab

“These days, I spend my time building new political projects, like the Black Futures Lab, an innovation and experimentation lab that tests new ways to build, drive, and transform Black power in the United States. At the BFL, we believe that Black people can be powerful in every aspect of our lives, and politics is no exception.

I was called to launch this organization after the 2016 presidential election. After three years of building the Black Lives Matter Global Network and fifteen years of grassroots organizing in Black communities, I felt strongly that our movement to ensure popular participation, justice, and equity needed relevant institutions that could respond to a legacy of racism and disenfranchisement while also proactively engaging politics as it is in order to create the conditions to win politics as we want it to be. ”

“For the majority of 2018, the Black Futures Lab worked to mobilize the largest data project to date focused on the lives of Black people. We called it the Black Census Project and set out to talk to as many Black people as possible about what we experience in the economy, in society, and in democracy. We also asked a fundamental question that is rarely asked of Black communities: What do you want in your future?

We talked to more than 30,000 Black people across the United States: Black people from different geographies, political ideologies, sexualities, and countries of origin, and Black people who were currently incarcerated and who were once incarcerated. A comprehensive survey such as this had not been conducted in more than 154 years. We partnered with more than forty Black-led organizations across the nation and trained more than one hundred Black organizers in the art and science of community organizing. We collected responses online and offline.”

On Morning Rituals

“Every morning when I wake up, I pray. I place my head against the floor and I thank my God for allowing me to see another day. I give thanks for the blessings that I have received in life, I ask for forgiveness for all of the ways in which I am not yet the person I want to be, and I ask for the continued blessings of life so that I can work to get closer to where I want to be. And in my prayers, I ask my God to remind me that the goal is not to get ahead of anyone else but instead to live my life in such a way that I remember we must make it to the other side together.”

 

Notes from the Zapatista Social Netwar in Mexico

I’m very greatful to making this book publicly available for download.

The Zapatista Social Netwar in Mexico was prepared for the U.S. Army and written by David Ronfeldt, John Arquilla, Graham E. Fuller and Melissa Fuller.

The book covers the EZLN organization and netwar, a concept developed for the purpose of understanding the nature of conflict in the information age.

Made possible by developments in media technology, ICT and the growth of transnational NGOs – it is a force-multiplier and an irregular form of warfare.

I’ve pasted some of the notes that I’ve copied from the text below, along with the organizational structure of the Zapatistas.

 

“segmented, polycentric, ideologically integrated network” (SPIN): 

During the 1980s, Chiapas became a crossroads for NGO activists, Roman Catholic liberation-theology priests, Protestant evangelists, Guatemalan refugees, guerrillas from Central America, and criminals trafficking in narcotics and weapons. 

How, then, did network designs come to define the Zapatista move- ment? They evolved out of the movement’s three layers, each of which is discussed below: 

  • At the social base of the EZLN are the indigenas—indigenous peoples—from several Mayan language and ethnic groups. This layer, the most “tribal,” engages ideals and objectives that are very egalitarian, communitarian, and consultative.
  • The next layer is found in the EZLN’s leadership—those top leaders, mostly from educated middle-class Ladino backgrounds, who have little or no Indian ancestry and who infiltrated into Chiapas in order to create a guerrilla army. This was the most hierarchical layer—at least initially—in that the leadership as- pired to organize hierarchical command structures for waging guerrilla warfare in and beyond Chiapas.
  • The top layer—top from a netwar perspective—consists of the myriad local (Mexican) and transnational (mostly American and Canadian) NGOs who rallied to the Zapatista cause. This is the most networked layer from an information-age perspective.
  • The social netwar qualities of the Zapatista movement depend mainly on the top layer, that of the NGOs. Without it, the EZLN would probably have settled into a mode of organization and behavior more like a classic insurgency or ethnic conflict. 

the key economic factor—land—is not really about economics from an indigenous viewpoint. 

land matters intensely to Indians because it is the physical basis for community—for having a sense of community and for being able to endure as a community. Without land, an indigenous people cannot dwell together; their community is culturally dead. Outsiders (including Marxists) often view the Indian struggle for land in economic class terms, evoking images of “landless peasants.” But for Indians, the truly important dimensions of the land issue are about community and culture. 

Mexico’s economic liberalization policies of the 1980s and early 1990s created an agricultural crisis for the peasants, for it brought the termination of subsidies and credits and eliminated agencies regulating agricultural policies. 

Although the state’s population is only 4 percent of the national total, 25 percent of all land disputes in Mexico are in Chiapas; and 30 percent of all petitions for land presented to the federal government come from Chiapas 

As their economic and thus their cultural and social woes mounted from the 1970s onward, the restless indigenas formed new peasant organizations that were independent of the federal and state governments and of the ruling political party, the Institutional Revolu- tionary Party (PRI). A vibrant set of indigenous organizations emerged, the most important being the Unión de Ejidos-Quiptic Ta Lecubtesel, the Unión de Uniones 

The Diocese of San Cristóbal de las Casas in the central highlands, headed by Samuel Ruíz (known in some circles as the “Red Bishop”), became a key player in the mobilization and politi- cization of the indigenas, notably with the organization of the land- mark Indigenous Encounter in 1974 that stirred many Mayans to en- gage in the kinds of organizing noted above. 

Ruíz would describe Salinas-style neo- liberalism and the poverty it spawned as being “totally contrary to the will of God.” While his diocese denies having ever funded the EZLN, it acknowledges the justice of its cause. 

Its 1983 statutes called for creat- ing the EZLN by name; that year, key FLN leaders moved into the Chiapas jungle to accomplish this, at a time when liberation theology was vibrant, some tiny cadres associated with other guerrilla groups already existed, hopes were rising that revolution would triumph in Central America and spread into Mexico via Chiapas, and peasant organizations like ARIC existed that might be infiltrated. The FLN leadership aimed to establish a powerful center of operations in Chiapas, while also creating a nationwide infrastructure of armed cells. 

The indigenas disapproved of hierarchical command structures. They wanted flat, decentralized designs that emphasized consultation at the community level. Indeed, their key social concepts are about community and harmony—the community is supposed to be the center of all social activity, and its institutions are supposed to maintain harmony among family members, residents of the village, and the spiritual and material worlds. Decisionmaking is essentially communal, and the key positions of power in a village belong to a larger council, under the notion that many people make better deci- sions than just one 

In this design, the purpose of power and authority is to serve the community, not to command it—so one who does not know how to serve cannot know how to govern. Marcos would learn this and later point out that he could not give an order—his order would simply not exist—if it had not been authorized by an assembly or a commit- tee representing the indigenas. While elements of hierarchy are found in these indigenous structures, the Mexican federal and state structures in the region are terribly hierarchical by comparison and are thus viewed as alien impositions. 

As recruitment and organization advanced—and to assure they kept advancing—the EZLN’s founders adapted their principles to those of the indigenas.14 The EZLN did not copy their organizational forms, but it did begin to resemble them. 

Marcos soon clarified that 

Armed struggle has to take place where the people are, and we faced the choice of continuing with a traditional guerrilla structure, or masificando and putting the strategic leadership in the hands of the people. Our army became scandalously Indian, and there was a certain amount of clashing while we made the adjustment from our orthodox way of seeing the world in terms of “bourgeois and prole- tarians” to the community’s collective democratic conceptions, and their world view. 

Some of the activist NGOs were more radical and militant than others, and some were more affected by old ideologies than others. But, altogether, most were in basic agreement that they were not interested in seeking political power or in helping other actors seek power. Rather, they wanted to foster a form of democracy in which civil-society actors would be strong enough to counterbalance state and market actors and could play central roles in making public- policy decisions that affect civil society (see Frederick, 1993a). This relatively new ideological stance, a by-product of the information revolution, was barely emerging on the eve of the EZLN insurrection, but we surmise that it had enough momentum among activists to help give coherence to the swarm that would rush into Mexico, seeking to help pacify as well as protect the EZLN. 

a surge in transnational networking gained momentum following the First Continental Encounter of Indigenous Peoples in 1990 in Ecuador, and after the formation of the Continental Coordinating Commission of Indigenous Nations and Organizations (CONIC) at a meeting in 1991 in Panama. 

Alison Brysk: “We see ourselves as a human rights organization in the broadest sense, and that was certainly our first track of contact with indige- nous rights. But we’ve moved more into ecology . . . clearly it works better.”23 

the UN- sponsored Conference on the Environment and Development—the “Earth Summit”—in Rio de Janeiro in 1992 put NGOs on the map as global activists.  Though the conference mainly assembled govern- ment officials and representatives of international governmental organizations (IGOs), one to two thousand NGO representatives were invited, and more showed up. The key event for them was less the official conference than the NGO Global Forum that was orga- nized parallel to the conference to enable NGOs to debate issues and adopt policy positions independently of governments 

During these conferences, one infrastructure-building NGO proved particularly crucial: the Association for Progressive Communications (APC). It, along with its affiliates (e.g., Peacenet in the United States, Alternex in Brazil) operates the set of Internet-linked computer net- works most used by activists, and thus it played growing roles in facilitating communications by e-mail and fax among the NGOs, and in enabling them to send reports and press releases to officials, journalists, other interested parties, and publics around the world 

The key umbrella networking organization was the innovative, multilayered Committee in Solidarity with the People of El Salvador (CISPES), which spanned a range of peace, human-rights, and church organizations. 

It is difficult to say how influential the NGOs were; they affected some public debates and congressional views, especially on environmental issues, but did not prevent fast-track approval of NAFTA in late 1993. Still, the activists’ trinational pan-issue networks got better organized than ever before. 

Thus, by the time of the EZLN’s insurrection, the transnational NGOs that had been building global and regional networks, notably those concerned with human rights, indigenous rights, and ecumenical and pro-democracy issues, had counterparts to link with in Mexico City, San Cristóbal de las Casas, and other locales. Then, as NGO representatives swarmed into Chiapas in early 1994, new Mexican NGOs were created to assist with communication and coordination among the NGOs—most importantly, the Coalition of Non- Governmental Organizations for Peace (CONPAZ), based at the diocese in San Cristóbal.30 (An NGO named the National Commission for Democracy in Mexico was established in the United States, but it was basically a public-relations arm for the EZLN.) 

The insurrection did not begin as a social netwar. It began as a rather traditional, Maoist insurgency. But that changed within a matter of a few days as, first, the EZLN’s military strategy for waging a “war of the flea” ran into trouble, and second, an alarmed mass of Mexican and transnational NGO activists mobilized and descended on Chia- pas and Mexico City in “swarm networks” (term from Kelly, 1994). Meanwhile, no matter how small a territory the EZLN held in Chia- pas, it quickly occupied more space in the media than had any other insurgent group in Mexico’s if not the world’s history.1 

Acts of sabotage against Mexico’s economic infrastructure were to be features of the FLN/EZLN’s campaign plan. Victory in such a war would hinge on the ability of dispersed operational units (like the focos of Ernesto “Che” Guevara’s theory of guerrilla war- fare—see Guevara [1960], 1985) to pursue a common strategic goal, strike at multiple targets in a coordinated manner, and share scarce resources with each other through strategic and logistical alliances. 

Strategically, the guerrilla campaign follows a sequence of events, moving from rural to urban settings, with campaigning be- gun in far-off areas but culminating near the opponent’s principal locus of power. Tactically, pitched battles are to be fought whenever possible, as the opponent advances upon the guerrillas.

netwar is a different form of conflict. Inasmuch as the key combatants are organized along networked lines, military operations can be conducted by even quite small units, almost al- ways well below the battalion size recommended by theorists of guerrilla war. In terms of political aims, netwar may be waged with a state’s overthrow and revolution in mind, but it may easily accommodate a reform agenda as well. It is thus a more discriminate and versatile tool of conflict than guerrilla warfare; and it may proceed even in the absence of mass armies, allies, or widespread popular support among indigenous peoples, all of which are normally necessary conditions for the success of guerrilla warfare. 

For armed netwarriors, it is possible, and generally desirable, to strike anywhere, at any time—or not to strike at all, even for long periods; to avoid massing, but to attack in swarms; and to find allies in and draw support from other networked actors. 

Some activists also had other agendas, notably to achieve the erosion if not the downfall of Mexico’s ruling party, the PRI, since it was viewed as the linchpin of all that was authoritarian and wrong in Mexico’s political system.8 

Issue-Oriented and Infrastructure-Building NGOs—Both Important 

As the netwar got under way, two types of NGOs mobilized in regard to Chiapas, and both were important: (a) issue-oriented NGOs, and (b) infrastructure-building and network-facilitating NGOs. 

in 1994 Chiapas engaged the attention of myriad NGOs concerned with the rights of indigenous peoples: transnational NGOs with no national identity, like the Continental Coordinating Commission of Indigenous Nations (CONIC), the Independent Front of Indian Peoples (FIPI), and the International Indigenous Treaty Council (IITC); U.S.-based NGOs, like the South and Mesoamerican Indian Information Center (SAIIC); Canadian NGOs, like Okanaga Nation; and Mexican NGOs (or quasi-NGOs), such as the State Coalition of Indigenous and Campesino Organizations (CEOIC), the Coordinadora de Organizaciones en Lucha del Pueblo Maya para Su Liberación (COLPUMALI), and the Organización Indigena de los Altos de Chiapas (ORIACH). Many of these have links to each other; for example, COLPULMALI and ORIACH are sister organizations in FIPI-Mexico, and FIPI is a member of CONIC. 

FIPI-Mexico put out a plea for transnational indigenous organizations to come to Chiapas and act as human-rights observers while the military conducted its January 1994 campaign. 

The above is only a partial listing, for one issue area. A full listing of all NGOs for all issue areas would run for pages. 

As Sergio Aguayo remarked (as a leader of Civic Alliance, a multi-NGO pro- democracy network that was created to monitor the August 1994 presidential election and later chosen in August 1995 by the EZLN to conduct a national poll, known as the National Consultation, about opinions of the EZLN):17 “We’re seeing a profound effect on their [the NGOs’] self-esteem. 

“If civic organizations have had so much impact, it is because they created networks and because they have received the support and solidarity of groups in the United States, Canada, and Europe.”19 

Chapter Five 

TRANSFORMATION OF THE CONFLICT 

Within weeks, if not days, the conflict became less about “the EZLN” than about “the Zapatista movement” writ large, which, as elucidated in Chapters Three and Four, included a swarm of NGOs. This movement, as befits the analytic background in Chapter Two, had no precise definition, no clear boundaries. To some extent, it had centers of activity for everything from the discussion of issues to the organization of protest demonstrations, notably San Cristóbal de las Casas and Mexico City. It had organizational centers where issues got raised before being broadcast, such as the diocese in San Cristóbal and CONPAZ. And it drew on a core set of NGOs, e.g., the ones in Tables 1–5 at the end of Chapter Four. Yet it had no formal organization, or headquarters, or leadership, or decision-making body. The movement’s membership (assuming it can be called that) was generally ad hoc and in flux; it could shift from issue to issue and from situation to situation, partly depending on which NGOs had representatives physically visiting the scene at the time, which NGOs were mobilizable from afar and how (including electronically), and what issues were involved. 

What led President Salinas, and later Zedillo, to halt military operations and agree to dialogue and negotiations? Varied propositions have been raised for explaining their decisions: e.g., confidence that the army had gained the upper hand, or worries about a backlash among foreign creditors and investors, damage to Mexico’s image in the media, infighting among Mexico’s leaders, or a widespread aver- sion to violence among the Mexican public. Our analysis, however, is that in both instances, the transnational activist netwar—particularly the information operations stemming from it—was a key contributing factor. It lay behind many of the other explanations, including arousing media attention and alarming foreign investors. This activism was made possible by networking capabilities that had emerged only recently as a result of the information revolution. 

Mexican officials admit that they were over- whelmed by the “information war” in the early days of the conflict.

the EZLN convened a Continental Encounter For Humanity and Against Neo- liberalism in April 1996, and an Intercontinental Encounter for Humanity and Against Neoliberalism in August 1996. 

During 1994 and 1995, the government behaved gingerly toward the foreign presence in Chiapas, partly because it attracted media coverage; but since 1996, measures have been taken to control and curtail it (as we shall discuss). 

These conferences gave Marcos renown for having a “capacidad convocatoria” (convocational capacity) that attracted civil-society allies, legitimized the EZLN, and thus enabled it to break out its confinement, at least in ideational and informational senses. All this represented a radical departure from the classic guerrilla style, lead- ing one keen observer to posit that real fighting had been superseded by a “shadow war”: 

While all parties to the conflict knew that radio, television, and the press were part of the battlespace, months passed before government officials realized the significance of the Internet—and “cyberspace” generally—for the EZLN and the NGOs. 

Mexico’s Foreign Minister Jose Angel Gurría observed that: “Chiapas . . . is a place where there has not been a shot fired in the last fifteen months. . . . The shots lasted ten days, and ever since the war has been a war of ink, of written word, a war on the Internet.”

During 1994, few Mexican officials had any awareness that the EZLN and sympathetic NGOs were developing a strong presence on the Internet by means of e-mail lists, computer conferencing systems, and Web pages that were often accessed by hundreds, per- haps thousands, of activists in North America and around the world. Eventually, these officials began to learn what the NGOs already knew—that a new model of conflict was emerging, one in which the use of the new information technologies reflected the rise of radically new approaches to organization, doctrine, and strategy. 

A faction of pro-Zapatista radicals based in New York, drawing on ideas coming out of radical theater circles and inspired by the shock tactics of Earth First! and ACT-UP, has begun to advocate “electronic civil disobedience.”10 The intent is to go beyond the electronic protest tactics (e.g., e-mail and fax campaigns) that Zapatista activists have emphasized so far, and focus on creating “virtual sit-ins” that may shut down sensitive Web sites and Internet servers in Mexico and/or the United States, in order to “disrupt the flow of normal business and governance.” The protagonists of this view are trying to create software for use on anonymous offshore servers—“ping engines, spiders, and offshore spam engines”—that will enable them, and any other individual anywhere who wants to join, to conduct what amount to massive, remote-control, standoff, swarming attacks in cyberspace (see Wray, 1998a, 1998b). 

The Mexican army took the opposite tack, creating much smaller operational units, of roughly platoon size (36–45 troops, with an officer in command), and deploy- ing them in a dispersed fashion across Chiapas, blanketing the state with the aim of deterring new outbreaks of fighting. In a traditional guerrilla war, this move might have had disastrous consequences,13 inviting the defeat in detail of one isolated detachment at a time. For counternetwar, however, this scheme for decentralizing authority and deployment proved optimal, and fighting soon died out almost completely. 

Since a social netwar is not a traditional insurgency, part of the challenge is to recognize that military roles rarely figure large in a counternetwar against social actors. Indeed, it might be said that army had more problems dealing with the NGOs than with the EZLN. 

the netwar has had a positive side for the military. It has prompted tactical decentralization, institutional redesign in favor of smaller, more specialized and mobile forces, new efforts at joint op- erations, and improvements in interservice intelligence sharing. These shifts engendered some intra- and interservice tensions; but the benefits of reorganization should outweigh the difficulties and costs, in terms of an increase in military efficiency. If fully imple- mented, this program would amount to a “revolution within the army.” 

The netwar has obliged the army to devote much increased attention to public affairs, psychological operations, relations with NGOs, and human-rights issues. The army’s concerns about generating sufficient information to do its job is but a part of a general movement to give more attention to the development of an “information strategy.” This new focus has entailed efforts to cultivate better relations with the media and has extended to mounting a number of psychological operations, including “sky shouting” from helicopters with bullhorns, as well as leafleting. More importantly, the pursuit of an integrated information strategy spurred the Mexican government to form a joint intelligence apparatus that is supposed to put an end to the proprietary, baronial practices that have characterized its competing intelligence organizations throughout the 20th century. 

The prospects for netwar—and counternetwar—revolve around a small string of propositions about networks-versus-hierarchies, as discussed earlier: Accordingly, it can be said that hierarchies have difficulty fighting networks. It takes networks to fight networks—in- deed, a government hierarchy may have to organize its own networks in order to prevail against networked adversaries. 

Whoever masters the network form should gain major advantages in the information age. 

the interagency arena is where networking may best occur in the government world. Improving civil-military, inter- service, and intramilitary coordination and cooperation become essential tasks 

the government adapted by organizing interagency and other inter- governmental networks to try to prevail against the pro-Zapatista networks. Although the government and the army initially re- sponded in a traditional, heavy-handed manner to the EZLN’s insurrection, they have not responded idly or unthinkingly since then to this seminal case of social netwar. 

Once negotiations got under way and Chiapas was defined as more a political than a military problem, the Ministry of Government (Gobernación) took charge of overall strategy, leaving the Ministry of Defense (SEDENA) to focus on avoiding further damage to its image. An innovative interagency group was established in January 1994 at the Center for National Se- curity and Investigation (CISEN), which fits under Gobernación and is the key agency for national security and intelligence matters.20 This interagency group…worked to define overall government strategy toward the EZLN and related problems in Chiapas. It soon assessed that the EZLN was not a powerful force in military terms, and that the threat of other armed groups arising around the country was overstated. The strategy it developed during 1994 aimed to localize and limit the conflict, and had essentially three prongs: a military prong to keep the EZLN confined in the conflict zone, while avoiding combat and improving the army’s human-rights behavior; a political prong to keep the dialogue and its agenda from becoming national in scope, and to regain control of information; and an economic prong to offer resources and mount programs that would appeal to some of the local population’s needs. The strategy was also designed to let the Zapatistas talk (and let them know that there was no alternative to talking), while working gradually to diminish international attention to the EZLN and whittle down its demands. 

Mexico needed a “national intelligence community.” 

In sum, beginning in 1994 the federal government, its national security apparatus, and the military had to try to transform them- selves to respond to this social netwar. Yet this transformation has never been complete, and there has been a constant tension and interplay between, on the one hand, learning to treat the Zapatista movement as an information-age social netwar and, on the other hand, wanting to treat it as a traditional insurgency. The key touch- stone as to which hand of strategy was prevailing was not the mili- tary—its presence and strength grew throughout, leaving the conflict zone thoroughly blanketed and penetrated by small detachments. Rather, the touchstones were, apparently, two forces over which the government had marginal control but which it knew were key players in the overall game and dearly wanted to control: the foreign NGOs and the local paramilitary forces. Which hand of Mexican strategy was stronger seems to have varied mainly according to the degree of foreign NGO and media attention. 

few other governments would have been so tolerant of such an unusual, heavy, albeit episodic influx of foreigners showing great interest in an inter- nal security matter. During 1996, however, and especially during the international encounters that attracted thousands to Chiapas, gov- ernment agents began stepped-up efforts to videotape, warn, and question foreign activists, especially those who were traveling on tourist visas but seemed engaged in activism, not tourism, and lacked affiliation with recognized NGOs. Some were deported. 

Over 200 activists have been obliged to leave Mexico since January 1997. In one incident in April 1998, about a dozen foreigners, who were present at a site that was in the process of declaring itself an “autonomous municipality” aligned with the EZLN, were detained, interrogated, and forced to leave Mexico. 

In the name of nationalism, and citing constitutional proscriptions against foreigners meddling in internal politics, the government is taking a much harder line than before toward foreign activists, even though officials also point out that hundreds of special visas granting observer status have been provided to NGO representatives who have been visiting and monitoring conditions in the conflict zone. 

Chapter Six

THE NETWAR SIMMERS—AND DIFFUSES

Since 1996, much of the Mexican public has tired of the Zapatista story and begun to doubt that it benefits Mexico, even though it has raised important reform issues. 

their campaign to get indigena communities all over Mexico to declare their autonomy represents, in its own way, a strategy to seize power around the periphery of the state and the ruling PRI party—and that is viewed in Mexico City as potentially quite threatening. 

the Zapatistas tried to diffuse their netwar onto the global stage by means of the “Intercontinental Encounters” in 1996 and 1997, where they called for the creation of global “networks of struggle and resistance.

The sudden appearance of the Popular Revolutionary Army (EPR) in Guerrero, Oaxaca, and elsewhere in June 1996, and its spate of armed assaults in July, caused all sides in the Chiapas conflict to wonder anew whose side time was on. This armed group of unclear origins and dimensions quickly proved more violent than the EZLN and more able to operate in diverse parts of Mexico, leading a Mexican scholar to compare the two organizations as follows: “The Zapatistas are a local abscess. The E.P.R. is a general infection.”4 

The EPR, whose leadership appears to be mainly mestizo, has a scattered social base in the impoverished mountain villages of Guerrero and Oaxaca. It may also have a social base in an organization that appeared in January 1996: the Broad Front for the Construction of a National Liberation Movement (FAC-MLN), which is a nationwide, network-like coalition of numerous (perhaps as many as 300) leftist groups, including radical peasant and teachers unions.5 In contrast to the EZLN, the EPR is largely shunned by the Mexican and transnational NGOs who rallied to the EZLN’s cause—and the EPR has not done much to seek the NGOs’ support. In addition, the EZLN and the EPR both deny having links to each other. Overall, then, the EPR is freer than the EZLN to pursue military actions on its own initiative. 

EPR as a network-like alliance among numerous (reportedly 14) armed organizations from all over Mexico (PROCUP included).7 Some reports also hold that the EPR is the armed front for a broader movement of which the FAC-MLN is the main political front.8 If the latter story is correct, then the EPR fits better into the netwar framework. 

The EZLN has no known ties to drug traffickers, but the EPR has been suspected of some indirect links. 

There is no evidence of direct links between the EZLN and the EPR, and the differences noted above argue against such links. Yet there appear to be indirect links and influences. According to Tello (1995), some guerrillas from PROCUP, one of the constituent elements of the EPR, may have joined the EZLN in its formative days. 

The other, more documented story is that the EPR may reflect a bitter disappointment in some leftist circles that the EZLN failed to spark nationwide unrest and later relented on the armed struggle. In this story, the FAC-MLN and the EPR are offspring of groups that were critical of, and later expelled by, the EZLN and its leaders at the EZLN-sponsored National Democratic Convention in Chiapas in August 1994. 

EPR’s pronouncements and actions do not reveal much. It has a general command. But if it has a hierarchical central command presiding over decentralized units, it does not qualify structurally as having a network design, although it may emu- late netwar strategies and tactics. If it consists of a set of armed groups and support elements operating as a clandestine all-channel network, with a central clearinghouse for consultation and coordination, then it may be deemed a netwar actor. If so, the EPR represents a different kind of netwar actor from the EZLN. Most likely, the EPR is at least partially networked and aims to wage an armed guerrilla netwar that will emphasize tactically dispersed, nonlinear, swarming operations. 

The EPR has displayed some cleverness at information operations. An example lies in the invitations and bus tickets for journalists to arrive at a particular time and place where, unbeknownst to each other, they expected to conduct interviews with EPR leaders but instead found themselves witnessing an EPR attack on a government building. 

THE ZAPATISTA NETWAR GOES GLOBAL 

Some activists have endeavored to extend the Zapatista movement by generating a global dimension. In July–August 1996 in Chiapas, a working group with participants from around the world lauded the importance of communications for the Zapatista movement and its ability to project its ideas. The group suggested creating an “International Network of Hope,” whose design would be “horizontal,” “self- organizing,” and “without centralized coordination” (all terms that could have been taken from a theory of networks and netwars). 

In the critical documents, “network” was deemed a very unclear concept. At worst, it was a new “buzzword of the internationalized Left” and might not even be a progressive form of organization (since networks were already a mainstay of corporate and conservative actors). It seemed more a “metaphor” than a “structure” that could be truly developed. 

The aim should be, as an American noted, “to weave a variety of struggles into one struggle that never loses its multiplicity” (Cleaver, 1998). But, perhaps partly because the Zapatista movement was so much the cause celebre of the gathering, the skeptics and critics evidently needed reminding that a worldwide trend in favor of networked social movements was already well under way in Europe and North America 

Marcos, the EZLN, and the Zapatista movement sought to achieve a global reach. They wanted the conflict in Chiapas to represent an opening salvo in what they believed should be not only a national but also a global struggle against the defects of neoliberal- ism, capitalism, and the market system. 

The analyst should thus be wary of easy notions that social movements are the key factor affecting a government’s decisions to adopt re- forms. They may be an important factor, but as Diane Davis (1994, p. 38) notes in a study of Mexico City during 1982–1988, “the willing- ness and capacity of governing officials to cede to popular mobilizations, and to introduce certain institutional reforms, may influence the overall extent of democratization as much as the presence of social movements themselves.” 

at times it may be the government’s intention to have the Zapatistas take some credit, to help keep them on a peaceful track and thereby try to institutionalize their behavior. 

The EZLN is the most significant armed movement in Mexico since the 1970s, and the Zapatista movement writ large is the most significant social movement since the student-led social movement of 1968. What has made the EZLN/Zapatista movement so significant is, in particular, its capacity for nonviolent information operations, spread through all manner of media. 

The netwar contributed to acute perceptions of crisis and instability, especially in 1994. But this did not have all the effects the Zapatista movement may have intended. The adverse perceptions alarmed foreign investors and creditors, and they contributed to the peso de- valuation late that year—thereby weakening the state. Yet earlier in 1994, when many activists shifted their focus from the conflict in Chiapas to aspire to bring about the downfall of the PRI in the national elections, the perceptions of potential crisis and instability stemming from Chiapas led many citizens to vote overwhelmingly for the PRI’s candidates—thereby strengthening the state. 

Overall, the netwar has helped impel the Mexican government to continue down the road of reform. It added to the pressures on Mexico’s leaders to enact political and electoral reforms; to make the political party system more transparent, accountable, and democratic; to take human rights more seriously; to accept the rise of civil society; and to heed anew the needs of indigenous peoples. Some analysts claim that political and electoral reform has proceeded faster since the Zapatista movement than in years past. 

Mexico’s prospects for stability and for success in dealing with multiple netwars—the social netwar identified with the EZLN, the armed netwar pursued by the EPR, and the criminal netwar represented by the internetted drug cartels—will depend on the government’s ability to form its own inter- organizational and multiagency networks to confront and counter those netwars. 

the serious potential future risk for Mexico is not an old- fashioned civil war or another social revolution—those kinds of scenarios are unlikely. The greater risk is a plethora of social, guerrilla, and criminal netwars. Mexico’s security (or insecurity) in the information age may be increasingly a function of netwars of all varieties. Mexico is already the scene of more types of divisive, stressful netwars than other societies at a similar level of development, in part because it is a neighbor of the United States. 

At present, neither social (EZLN/Zapatista), guerrilla (EPR), or criminal (drug trafficking) netwar actors seem likely to make Mexico un- governable or to create a situation that leads to a newly authoritarian regime. This might occur, if these netwars all got interlaced and rein- forced each other, directly or indirectly, in conditions where an economic recession deepens, the federal government and the PRI (presumably still in power) lose legitimacy to an alarming degree, and infighting puts the elite “revolutionary family” and its political clans into chaos. 

Mexicans take their nationalism very, very seriously. The EZLN was quick to deny that it was foreign in origin and repeatedly averred it was a Mexican movement. More to the point, it has resisted allying with movements that are not nationalist. Some NGO activists, notably in the area of indigenous rights, wanted the EZLN to express its solidarity with their transnational agenda, but Marcos and other leaders declined to do so. The EZLN has also not posed as a cross-border Mayan irredentist movement. Had the EZLN cast aside its Mexican nationalist credentials, the government and the army might have had a solid pretext, and public support, for quashing it. 

when a society has become disorderly and out of equilibrium as a result of a systemic transition, actors that might normally be marginal may have decisive effects. 

Ironically, U.S. military assurances of the availability of material support for counterinsurgency may discourage the Mexican army from pursuing innovative operations against the EPR. 

the Mexican military and the NGOs are the bracket- ing forces in this conflict. Moreover, they are among the most counterpoised actors on the Mexican scene; many among them even regard each other as enemies. The military is part of Mexico’s statist hierarchies; it is steeped in the traditions of closed nationalism and is responsible for preserving constitutional order. In contrast, the NGOs are part of the emerging antihierarchical, multiorganizational networks of the information age; many are amenable to trans- national ties and eager to pressure for reform. The backgrounds, cultures, interests, and ideological orientations found among military officers and NGO activists are generally at odds. 

Without a diverse transnational presence, presumably of responsible NGOs (and corporations), Mexico would probably not make a strong effort to evolve into an open, democratic system that can benefit all sectors of society.21 

Yet there is a conundrum. Neither the military, which is statist in orientation, nor the NGOs, which contain many leftists and center- leftists, seem to favor Mexico’s full transition to an open market economy. It is not clear that either actor has much belief that the construction of an economically advanced, politically democratic system requires a market system. If statist preferences continue to prevail within both actors, their increased activism may unwittingly help keep much of Mexico locked in its traditional preferences for corporatist approaches to its development. 

“guarded openness,” a deliberately ambivalent concept from the new field of information strategy that means being forthcoming about providing and sharing information in areas of mutual benefit where trust and confidence are high, yet being self-protective in areas where trust and confidence are not ad- equate (see Arquilla and Ronfeldt, 1997).24 

The Mexican case is so seminal that Harry Cleaver (1997) speaks of a “Zapatista effect” that may spread contagiously to other societies: 

Beyond plunging the political system into crisis in Mexico, the Zapatista struggle has inspired and stimulated a wide variety of grassroots political efforts in many other countries. . . . it is perhaps not exaggerated to speak of a “Zapatista Effect” reverberating through social movements around the world—homologous to, but ultimately much more threatening to the New World Order of neo- liberalism than the “Tequila Effect” that rippled through emerging financial markets in the wake of the Peso Crisis of 1994. 

to quote from Adrienne Goss (1995), it appears that a global “third sector” is being created—“a massive array of self- governing private organizations, not dedicated to distributing profits to shareholders or directors, pursuing public purposes outside the formal apparatus of the state.”3 This amounts to an “associational revolution” among nonstate actors that may prove as significant as the rise of the nation state.4 

EVOLUTION OF ORGANIZATION, DOCTRINE, AND STRATEGY 

The Mexican case instructs that militant NGO-based activism is the cutting edge of social netwar, especially where it assumes trans- national dimensions. A transnational network structure is taking shape, in which both issue-oriented and infrastructure-building NGOs are important for the development of social netwar. This infrastructure is growing, so that the activism it enables can extend from the locale where issues are generated (e.g., Chiapas) to the distant hallways of policymakers and decisionmakers (including in Washington, D.C.). 

The case instructs that netwar depends on the emergence of “swarm networks,”7 and that swarming best occurs where dispersed NGOs are internetted and collaborate in ways that exhibit “collective diversity” and “coordinated anarchy.” The paradoxical tenor of these phrases is intentional. The swarm engages NGOs that have diverse, specialized interests; thus, any issue can be rapidly singled out and attacked by at least elements of the swarm. At the same time, many NGOs can act, and can see themselves acting, as part of a collectivity in which they share convergent ideological and political ideals and similar concepts about nonviolent strategy and tactics. While some NGOs may be more active and influential than others, the collectivity has no central leadership or command structure; it is multiheaded, impossible to decapitate.8 A swarm’s behavior may look uncontrolled, even anarchic at times, but it is shaped by extensive consultation and coordination, made feasible by rapid communications among the parties to the swarm.9 

The Zapatista case hints at the kind of doctrine and strategy that can make social netwar effective for transnational NGOs. Three key principles appear to be: (1) Make civil society the forefront—work to build a “global civil society,” and link it to local NGOs. (2) Make “information” and “information operations” a key weapon—demand freedom of access and information,10 capture media attention, and use all manner of information and communications technologies. Indeed, in a social netwar where a set of NGO activists challenge a government or another set of activists over a hot public issue, the battle tends to be largely about information—about who knows what, when, where, how, and why. (3) Make “swarming” a distinct objective, and capability, for trying to overwhelm a government or other target actor. Although, as noted above, swarming is a natural outcome of information-age, network-centric conflict, it should be a deliberately developed dimension of doctrine and strategy, not just a happenstance. 

Where all this is feasible, netwarriors may be able to put strong pressure on state and market actors, without aspiring to seize power through violence and force of arms. 

To date, mainstream netwar activism has gone in the directions described above and elsewhere in this chapter: It has emphasized the creation of complex, multi- organizational networks, which use the new technologies mainly to improve communication and coordination within the network and to exert pressure on government and other actors through electronic protest measures (e.g., via e-mail and fax-writing campaigns). In contrast, a new “electronic civil disobedience” faction is emerging that appears to care less about the organizational network-creating dimensions of doctrine and strategy, favoring aggressive computer- hacking tactics that, though termed “virtual sit-ins,” verge on anarchistic or even nihilistic “cybotage” against sensitive government or corporate Web sites and Internet servers. 

A target government should care about its international image, and be sensitive to its disruption.12 The more a government cares about presenting to the world an image that it is, or is becoming, a modern democracy and wants to attract foreign investors, the more vulnerable it may be to a netwar that jeopardizes its image. Perhaps a susceptibility to social netwar is a sign of modernity. 

a major part of social netwar is about activists’ efforts to get their story into the global media, so that it reaches and arouses foreign publics and governments. 

the presence of journalists may contribute importantly to a netwar by providing, very quickly, a broader audience than usual for NGO activities. A symbiotic dynamic may thus develop between the activists and the media (in which the journalists may claim that they are the ones who deserve credit for calling a conflict to the world’s attention, but the larger dynamic is about the activists using the media to accomplish this). Furthermore, the media’s presence may alter the local power equations vis-à-vis information—a local government may lose the luxury of controlling who knows what about a conflict, and its options may decrease accordingly. As inter- national attention grows, a hard-line approach, for example, may be less feasible for a government. 

In general, information-processing regimes such as human rights and ecology are more accessible to NGOs than state-centric arrangements for trade or arms control. 

In other words, the situation in a target society should be such that a diversity of NGOs exist and can mount different attacks on different issues, adapting flexibly to the circumstances. In the process, the message—the story and its symbolism—may get modified and broadened beyond its original meaning in the conflict zone, in order to appeal better to audiences abroad. 

he fight over “information” has made the Zapatista conflict less violent than it might otherwise have been. But it has also made the conflict more public, disruptive, protracted, and difficult to isolate; it has had more generalized effects than if it had been contained as a localized insurgency. Thus, although the Mexican military has performed reason- ably well militarily against the EZLN, has decentralized its organization, created new small units, improved its communications and mobility, and acquired new material and budgetary resources in the process, it has been bedeviled by many aspects of this new approach to conflict. The army in particular has seen its combat operations deterred and its image impugned to an unusual degree. 

The Mexican case suggests that the U.S. Army may be increasingly called upon to provide “knowledge assistance” to allies for public and press rela- tions, psychological operations, and the restructuring of command, control, communications, and intelligence (C3I) functions in response to netwars. Respect for human rights, and possibly for the looming matter of “information and communications rights,” may play no small part in this. 

It may turn out that a new language and a new set of metrics must be devised. New centers and schools are already being established for the U.S. military to help address such challenges. T 

the ease of entry and the deniability afforded by network designs imply an increasing “amateurization” of militant activism, terrorism, and crime. It is increasingly easy for protagonists to construct sprawling networks that have a high capacity for stealthy operations by individuals or groups, as well as for rapid swarming en masse.

Information—as a function of the technological and organizational innovations stemming from the information revolution—is now said to be a “force multiplier”

“information strategy” is emerging as a new tool of statecraft. U.S. officials are accustomed to emphasizing economic, political, and military strategies and instruments for urging foreign governments and societies to develop in liberal democratic direc- tions. Yet, global civil-society NGOs whose focus is informational more than economic, political, or military may prove more potent as information-age instruments of policy and strategy, especially to pursue goals like “democratic enlargement.” Chris Kedzie’s (1995) work on the positive correlation between political democracy and communications connectivity provides a basis for proposing that information be treated and developed as a distinct new dimension of policy and strategy

Notes from A Theory of Information Warfare: Preparing For 2020

A Theory of Information Warfare: Preparing For 2020
Airpower Journal, Spring 1995

By Col Richard Szafranski (BA, Florida State University; MA, Central Michigan University) is the first holder of the Chair of National Military Strategy at the Air War College, Maxwell AFB, Alabama. Colonel Szafranski’s duties have included staff positons in the headquarters of Strategic Air Command, United States Space Command, North American Aerospace Defense Command, and Air Force Space Command. He has commanded B-52 units at the squadron and wing level, most recently as commander of the 7th Bomb Wing, Carswell AFB, Texas, from 1991 to 1993. He was also the base commander of Peterson AFB, Colorado. His writings on military strategy and operational art have appeared previously in Airpower Journal as well as in Parametersand Strategic Review. Colonel Szafranski is a graduate of Air Command and Staff College and Air War College.

Notes

Information as used here means the “content or meaning of a message.”An aim of warfare always has been to affect the enemy’s information systems. In the broadest sense, information systems encompass every means by which an adversary arrives at knowledge or beliefs.

If the moral high ground is lost, a domino effect occurs: public support is lost, the technological high ground is lost, and the armed forces are lost.

Warfare can be undertaken by or against state-controlled, state-sponsored, or nonstate groups. Warfare is hostile activity directed against an adversary or enemy. The aim of warfare is not necessarily to kill the enemy. The aim of warfare is to merely subdue the enemy. In fact, the “acme of skill” is to subdue an adversary without killing him.

In both state and nonstate warfare forms, the decisions made by group leaders define the aims, the methods, and the desired postconflict conditions of the warfare. Even so, it is a fiction, albeit a common and convenient one, to assert that “states” or “groups” wage warfare. The decision to engage in warfare, including the decision to terminate warfare, is made by leaders in the state or group.

Knowledge systems are those systems organized and operated to sense or observe verifiable phenomenological indicators or designators, translate these indicators into perceived realities, and use these perceptions to make decisions and direct actions

Belief systems are those implicit or explicit orientations both to empirical data in the form of verifiable perceptions and to other data or awareness (nightmares, phobias, psychoses, neuroses, and all the other creatures living in the fertile swamp of the subconscious, the collective unconscious, or Jung’s “unconscious psyche”) that are not verifiable or, at least, are less easily verifiable.According to John Boyd, the process or act of orientation (what Boyd calls “the Big O” in the OODA [observation-orientation-decision-action] loop) also is influenced by genetic heritage and cultural traditions… Unlike knowledge systems, belief systems are highly individualized.

it is glib reductionism to think of the enemy as being of “one mind.” The enemy is really many individual enemies, many minds… For example, if the enemy is dispersed, separate minds can be attacked separately, using the fact of isolation to the attacker’s advantage. If the enemy is concentrated (and over half the people on the planet will live in metropolitan complexes by the year 2020 and will be accessible in large numbers by way of information technology), the attack can be prosecuted against large groups. Even so, the aim of warfare is to subdue the hostile will of leaders and decision makers.

What is known, including the methods by which it came to be known, can be tested by its relation to something else and determined to be valid or invalid, true or false, real or unreal. What is believed is not subject to all the same tests.

If an adversary is organized as a coalition of multiple and cooperative centers of gravity, many culturally conditioned belief systems may exist within the coalition. These may be engaged and defeated in detail.

At the strategic level, the aim of a “perfect” information warfare campaign is to influence adversary choices, and hence adversary behavior, without the adversary’s awareness that choices and behavior are being influenced. Even though this aim is difficult to attain, it remains the goal of a perfect information warfare campaign at the strategic level. A successful, although not necessarily perfect, information warfare campaign waged at the strategic level will result in adversary decisions (and hence actions) that consistently mismatch or fail to support the intentions or aims of the adversary leader.

At the operational level, the leaders responsible for prosecuting the “grand tactics” also need the answers to some questions. Will there be any withheld targets or prohibited weapons in the information warfare attacks? Is the epistemological endstate to be reached all at once, everywhere, or are there interim states that need to be reached in specific geographical areas, in a specific sequence, or in specific sectors of information activity?

information weapons, depending on the weapons used, may cause collateral damage to the attacker’s knowledge and belief systems.In the worst case, the adversary’s response could include counterattacks against

“friendly” information systems that are somehow indistinguishable from collateral damage caused by the information analog of “friendly fire.”

information attacks have stochastic effects and that unless these are considered and evaluated in advance, an information attack may not have the effect ultimately desired.

In the case of advanced societies or groups, attacks against telecommunications systems can wreak havoc with an adversary’s ability to make effective decisions in warfare. Yet… Totems and taboos might function equally as well as the targets or the tools of information warfare against a primitive group. Thus, vulnerability to information warfare is nearly universal, the differences being only a matter of degree.

The Sepoy Mutiny of 1857-58 provides an example of the complexity. The mutiny reportedly was triggered by a rumor that the British were coating rifle cartridges in animal fat. It was the sepoy leaders who started the rumor, and in so doing attacked the belief systems of both Hindu and Muslim sepoys to spur them to rebel against their British masters.

The higher its technomic capability and the greater the number of its interactions with other groups (including internal groups) or states, the greater the state or group’s potential vulnerability to information warfare. The vulnerability may increase as network size increases, dependence on the information transacted increases, or the number or volume of transactions increases. Consequently, a state or group “engaged” worldwide may be exposed or vulnerable worldwide.

A cautionary note: because an information warfare campaign at the strategic level aims to subdue hostile will by affecting the knowledge and beliefs of the adversary, it cannot discriminate between combatants and noncombatants.

As outsourcing and contractingout initiatives increase, the Congress also can be expected to act to prevent some commercial enterprise from developing such weapons. (Have not news stories and “exposés” produced by commercial news enterprises proven to be contrived, aimed at influencing our knowledge and beliefs? Have not subliminal messages been used in the past in attempts to influence our purchasing behavior? Have not hackers entered and affected–or infected–databases already? We need to consider that there may be only a slim difference between a hacker and a terrorist in the information age.

When they come, the attacks will be prosecuted against both knowledge systems and belief systems, aimed at influencing leadership choices. The knowledge and beliefs of leaders will be attacked both directly and indirectly. Noncombatants, those upon whom leaders depend for support and action, will be targets. This is what we have to look forward to in 2020 or sooner.

Notes

1. Information warfare sometimes is erroneously referred to as command and control warfare, or C2W. The aim of C2W is to use physical and radioelectronic combat attacks against enemy information systems to separate enemy forces from enemy leadership. In theory, information warfare actually is a much larger set of activities aimed at the mind and will of the enemy.

2. Chris Mader, Information Systems: Technology, Economics, Applications (Chicago: Science Research Associates, Inc., 1974), 3.

3. The “waves” of societies are described by Alvin Toffler in The Third Wave (New York: William Morrow and Company, Inc., 1980). See also Alvin and Heidi Toffler, War and AntiWar: Survival at the Dawn of the 21st Century (Boston: Little, Brown and Company, 1993). A seminal work on institutional forms is forthcoming from David Ronfeldt.

4. John Arquilla and David Ronfeldt, “Cyberwar is Coming!” Comparative Strategy 2 (April-June 1993): 141-65.

5.Martin van Creveld, The Transformation of War (New York: Free Press, 1991), 196-205. Words like warand the lately contrived warfighter confuse the warriors in a democracy by misuse. In the United States, War (with a big W ) is declared by the Congress: the people representing all the people. Executive War Powers are really warfare powers. The days of Clausewitzian, trinitarian W ars may very well be over, as van Creveld suggests. The days of warfare, however, are not over.

6. Sun Tzu, The Art of War, trans. Samuel B. Griffith (New York: Oxford University Press, 1971), 77.

7. Richard Szafranski, “Toward a Theory of Neocortical Warfare: Pursuing the Acme of Skill,” Military Review, November 1994; and idem, “When Waves Collide: Conflict in the Next Century,” JFQ: Joint Force Quarterly, Winter 1994-95.

8. Joseph A. Engelbrecht, “War Termination: Why Does a State Decide to Stop Fighting?” (PhD diss., Columbia University, 1992). Colonel Engelbrecht is a colleague at the Air University’s Air War College.

9. Arquilla and Ronfeldt, note 9, 162. According to this definition, a message with no discernible “meaning” is still “information.” This definition is useful when contemplating the tactics of information warfare.

10.Ibid.

11. Phenomenology can be defined as “the theory of the appearances fundamental to all empirical knowledge.” Dorion Cairns, in Dagobert D. Runes, ed., Dictionary of Philosophy (Totowa, N.J.: Littlefield, Adams & Co., Ltd., 1962), 231-34.

12. C. G. Jung, The Undiscovered Self (New York: The New American Library, Mentor Book, 1958), 102.

13. Information warfare requires that philosophers, cultural anthropologists, area specialists, linguists, and semanticists join the “operations” staff. The days have passed when war colleges or staff colleges could neglect these other disciplines.

14. John R. Boyd, briefing slides, subject: A Discourse On Winning and Losing, August 1987. Maxwell AFB, Alabama.

15. Ibid.

16. Carl von Clausewitz, On War, ed. and trans. Michael Howard and Peter Paret (Princeton: Princeton University Press, 1976), book 6, chapter 6, 372-76.

17. Ledger Wood, in Runes, 94-96.

18. The effects to which I refer are more complicated than the inability to prevent your own jamming from interfering with your own communications systems. These unconfinable, spillover effects of stray electrons can be modeled and some compensation can be made for their effects. The weapons and effects of information warfare are not so easily confinable or controllable. In warfare it is common to both demonize and ridicule the enemy. Ridicule often takes the form of jokes. If these jokes ridicule an enemy from a different ethnic group, these jokes become officially sanctioned racist jokes. If the ethnic group is part of our own citizenry, such attacks can cause collateral damage. The collateral damage to the armed forces may have effects as farreaching as the appearance of officially condoned racism. If one accepts that weapons and attacks have stochastic effects, then some consequences are unpredictable.

19. Van Creveld, 35.

20. Grant T. Hammond, “Paradoxes of War,” JFQ: Joint Forces Quarterly, Spring 1994. Dr Hammond is a colleague on Air University’s Air War College faculty.

21. George C. Kohn, Dictionary of Wars (New York: Facts On File Publications, 1986), 214. 22.Technomic is a word coined by Col Joseph A. Engelbrecht. He defines it to mean “of or relating to progress in the development of the application of scientific principle (technology), and in the development of wealth (economics), and in the interrelationship between advances in science and the spread and increase of economic wealth. Technomic vitality. Technomic proliferation.”

23. Gerald R. Hurst, “Taking down Telecommunications” (Thesis, School of Advanced Airpower Studies, Air University, Maxwell Air Force Base, Ala., 28 May 1993).

24.Ibid.

25. Iran provides a good example. The Majles investigation into the Iranian department of “Voice and Vision” illuminates Iran’s sensitivity to the content and meaning of pictorial messages. Consider these comments from the investigation:

A basic criticism of the pictorial programs of the Voice and Vision is lack of attention to full veiling of women, lack of attention to the chador, and spreading of the culture of the “manteau” and scarves of the immoral kind.

The grand leader on occasions has given opinions and directives to the Voice and Vision organization or its director. Unfortunately, the instructions and directives of his honor were not implemented. For example: . . . . From 1368 [21 March 198920 March 1990] to 1370 [21 March 199020 March 1991], he made reminders to the Voice and Vision on 14 occasions, the most important of which concern: A) Misinformation. B) The low level of quality of the beyondtheborder programs and failure to propagate and spread Islamic views in them. C) The broadcast of blasphemous sentences concerning the Sire of the Pious. . . . E) Showing actual persons in the role of the infallible imams.

See “Majles Investigates Activities of Voice and Vision,” 3, 4, 15 November 1993, 5-6, in Foreign Broadcast Information Service Report: Near East and South Asia (FBISNES94016S), 25 January 1994, 6-8. I am grateful to Dr George Stein of the Air University’s Air War College faculty for pointing out this example of what simultaneously might be internal information warfare and potential vulnerability to external information warfare. Saudi Arabia recently joined China as the most recent nation to outlaw satellite television receivers. One can easily appreciate the effects that Music Television (MTV) might have on such cultures.

26. A telecommunications executive speaking in an Air University forum under the promise of nonattribution disclosed these estimated figures.

Review of Leading Change

Leading Change by John P. Kotter was published by Harvard Business School Press and is an action plan for achieving innovative changes in the workplace. Published in 1996, at the time when the 4thIndustrial Revolution was just starting to whet the imaginations of investors and all things internet related were hot, the book presents a series of steps for business leaders to help their companies successfully adapt to the changing market conditions. With the increased pressure for efficiency and adaptability to the new market conditions which have increased the speed of business and shaken much of the business environment stability that previously existed.

It is based on John P. Kotter’s extensive research experience and conversations with major business executives that provides him with the crux on which innovation initiatives either fail or flourish: Ideating, enacting and sustaining cultural change in the workplace. It is not enough, he warns, to be aware of new pressures and possibilities for constructing value – to truly adapt requires a long-term view that many managers have been taught vie years of on-the-job experience to not consider. Because of the creation of what he calls a generalized “overmanaged, under led corporate culture” he states that a different type of business figure is needed to help instigate, inspire, and incite meaningful change within companies: a leader.

There is a significant difference between management and leadership, and those that have trained and worked for years in the former typically are unaccustomed to being able to accomplish the latter. They think in terms of weeks and months rather than months and years. They are accustomed to “following the book” rather than reviewing all of the available data that ought to influence future planning, engaging stakeholders on their perspectives and then writing a book. They are typically not very charismatic, but eminently practical. What follows is the book is a detailed overview of a successful change model; explanations as to why it is so important for the steps to be followed in order; examples of effective and ineffective solutions to problems that present themselves in the process considerations to be made to ensure that the change process is fully supported by the middle and upper-level executives; and approaches to ensuring that the cultural changes promoted are sticky.

  1. Establishing a Sense of Urgency
  2. Creatindg the Guiding Coalition
  3. Developing a Vision and Strategy
  4. Communicating the Change Vision
  5. Empowering Broad-Based Action
  6. Generating Short-Term Wins
  7. Consolidating Gains and Producing More Change
  8. Anchoring New Approaches in the Culture

Common errors to organizational efforts include the following: allowing too much complacency, failing to create a sufficiently powerful guiding coalition; underestimating the power of vision; under-communicating the vision; permitting obstacles to block the new vision; failing to create short-term wins; declaring victory too soon; neglecting to anchor changes firmly in the corporate culture. The appearance of these errors within the change effort has serious consequences. New strategies aren’t implemented well; acquisitions don’t achieve expected synergies; re-engineering takes too long and costs too much; downsizing doesn’t get costs under control; quality programs don’t deliver hoped-for results. Kotter also explains how it is that such process deformations can occur and accrues and how to watch out for them.

For instance, if there are no short-term wins built into the process it is likely that it will be abandoned. New forms of business intelligence guiding strategy may be ignored if there are secular reasons for non-performance that are not addressed by management. Interdependent processes that have been marked for change may seem excessive and leads to such an escalation that employees push back. Because of this, it is of the utmost importance that an effective innovation vision not just be presented, but also to be explained, talked about when appropriate in meetings by management, referred to when discussing the rationale behind a change in process that is not always adhered too, etc. These and more examples provide the basis for the specific order of the process described within the book and how to avoid getting off course. Following these steps allows a leader to truly anchor in the novel and innovative approach into the company culture.

Kotter’s depiction of an effective vision is it’s containing the following characteristics:

Imaginable: Conveys a picture of what the future will look like

Desirable: Appeals to the long-term interests of employees, customer, stockholders, and others who have a stake in the enterprise

Feasible: Comprises realistic, attainable goals

Focused: Is clear enough to provide guidance in decision making

Flexible: Is general enough to allow individual initiative and alternative responses in light of changing conditions

Communicable: Is easy to communicate; can be successfully explained within five minutes.

This model is somewhat similar to Chip and Dan Heath’s Made to Stick model of marketing – Simple, Unexpected, Concrete, Credible, Emotional, Stories – and similarly emphasizes the importance of interpersonal qualities to gaining buy-in by those involved in the innovation-change process. Some people that don’t follow the new direction will have to be let go, especially those with positions of power whose hypocrisy (saying that they’re following the new direction but actually not) causes friction. The inverse can be said of those that are lone leaders working to assisting in a company’s innovation change project. Kotter tells a story about a General Motors division that had been a highly effective leader of a transformation program, but how after step 7 –  Consolidating Gains and Producing More Change – he was immediately fired so that step 8 –  Anchoring New Approaches in the Culture – didn’t have a sufficient amount of time to express itself. The result, within 6 months everything went back to the way it was and the gains that were starting to be seen were lost – along with the momentum in the right direction. Only after three stumbling quarters went on did the managers start to admit that they had slipped in their adherence to the structure that was to lead them to success!

Kotter’s cogent and informed book ends with a section that reflections on the modern business world with words that I resonated with given that I’m reading this as part of my doctorate program in Innovation and Technology Management at UPB. The last chapter of the book is titled “Leadership and Lifelong Learning” and in it, he describes how the prototype of the 20th to mid 21st century executive is no longer applicable to the modern business world. He shares several anecdotes of entrepreneurs and middle managers that he’s met who, with the combination of inborn ambition and helpful connections and executives who were able to radically scale their leadership skills and thus radically increase the competitive capacity of the businesses that they were involved with. Their willingness to seek new challenges and reflect honestly on their successes and failures leads not only to the expected knowledge and leadership skill increased but an uncanny ability to deal with an increasingly competitive and fast-moving economic environment. Given that this path and those goals were what motivated me to enroll in the program I’m now in, it was nice to read that someone like Kotter in a way confirmed that I was talking the best path to master the skills needed for the age of the 4th industrial revolution.

 

 

Review of “The Ten Principal Upanishads”

“Neither neglect your spiritual nor your worldly welfare. Always learn and teach. Forget neither God nor Ancestor.”

*

The Ten Principal Upanishads, this edition translated and edited by Shree Purohit Swami and W. B. Yeats, are the most sacred texts of the Hindu religion. These are not God’s words to man, but an incarnation of revelation captured by Rishis that contain the ultimate Truth and the knowledge that leads to spiritual emancipation that are considered the distillation of the best of Vedic metaphysical and speculative thought. From the Upanishads the central doctrines of Hinduism are derived, the philosophy of yoga is developed, and through dialogue with Buddhism that a number of sects on both sides emerge. This is what Paramahansa Yogananda and many other yogis have studied throughout their lives. Worth nothing, a number of the benefits of such practices as those written about within are increasingly being verified by modern Western science – both as it relates to mental health, healing and general social welfare.

This particular collection contains only ten of the traditional one-hundred and nine Upanishads and are intended as an introduction to the uninitiated. The specific texts of this collected are titled thusly: Isha, Kena and Katha, Prashan, Mundaka, Mandukya, Tattiriya, Aitareya, Chhandogya and Brihadaranyaka. The text is different from the one I studied at the International Meditation Institute in that it has removed a number of the repeating phrases that are of a ritualistic nature that are normally interspersed throughout. Thus while it is not the best edition for a religious scholar, the essence of it – the delineation of the path of Spirit and its importance for life – remains. This conceptual translation is not, however, without its own merits. Yeats, a poet, maintains some of those mantra-like refrains (i.e. “May peace and peace and peace be everywhere.”) and has musical qualities and well-worded conceits.

 

Each lesson within the collection of Upanishads meditates upon and interrogates themes ranging from the correct means of thinking so as to avoid disturbing thoughts but also how to properly fixate on the eternal Spirit that animates all human beings and material things. As progress is made in the pursuit of the Spirit, one comes closer to finding enlightenment and ending the cycle of re-birth. The essence of their teachings is that Truth cannot be known intellectually, but embodied through continued action inflected with faith. There are various stages in a person’s development towards moksha, or liberation, as well as reasons for why they may not achieve is.

Various forms of Vedic practices

Speaking on the myriad components of spirits, the Upanishads state the following:

“Worship spirit as the support, be supported; worship Spirit as the Great, become great; worship spirit as the mind, become mind. Bow down to Spirit as the sole object of desire, be the goal of all desire; worship Spirit as the master of all, become the master of all”

It is because of such passages, and many others like it, that a large number of corporate cultural leaders are embracing and encouraging others to use Mindfulness practices – which is a de-sacralized form of Hinduism/Buddhism – in the workplace.

I’ve certainly seen how such practices help increase creativity, presentness and productivity while decreasing tension in the workplace. I am, however, suspicious of such initiatives unless it’s practiced from the top down as otherwise it seems to me to encourage the type of workplace apathy that leads to larger social issues (i.e. you shouldn’t ask for a raise when you’re worth it, but instead just be happy with what you have as you are Spirit). All in all, however, meditation, yoga, chanting, reflective silence, and other Vedic practices, are beneficial as it helps to realize the Spirit. I’ve been reading this book prior to and after my yoga practice at Flying Tree Yoga school, found myself feeling lighter as a result of it and will likely reread it again soon.

*

In closing, here’s a great video by Alan Watts on what the Spirit is:

Reflections on a Former Lover’s Suicide in the Context of #MeToo

Recently I learned that a former significant other of mine committed suicide. While fifteen years had passed since we were an item and in that time we’d drifted apart, I still found myself profoundly affected by this news. Especially so as something that to a large extent defined and lead to the destruction of our relationship suddenly became something that wasn’t taboo to discuss.

Given the aims of #metoo and it’s importance for helping to initiate conversations that lead to policy solutions which stop the culture of rape in America, I decided to write a memoriam that would add to the conversation. Lest it seem I’m taking liberties with someone else story, I’ll point out I’m only speaking with the same openness that Krystal modeled in the descriptions of her struggles with mental and physical health and substance usage for years on her blog (NSFW) and on her social media accounts. What follows is thus a long format rendition of her #metoo story, from my perspective, that I hope will not only give evidence for the need for more action to be taken to prevent rape and give appropriate support to those that have been assaulted.

Shade Going Through the Field of Time

*

The first time I heard Krystal say the phase Beauty is pain was to explain something to me was when we were getting ready to go out to a goth club.

We were together in her bedroom at her parent’s house. The door was open. I was 18, she 16. I helped her tie up a black, lacy imitation-whalebone corset. She said that in the context of explaining how my concern over drawing the strings tight that she have difficulty breathing was unnecessary. “Beauty is pain,” she half gasped half said due to the pressure, “and I want my bust to look it’s best for you tonight. Tighten it more. So I can barely breathe, that’s fine. My boobs will look banging.”

We’d then only been dating a few weeks, so at the time I thought that Beauty is Pain was merely a witty comment of hers. Krystal was quick, perceptive and had a way with words. But during our brief relationship I came to realize that there was something more to this phrase. She’d repeat it in a number of different contexts, like it was a mantra, like it was a logic ever present in making itself felt in human existence. That night, however, I didn’t pick up the fullness of what all she meant by it.

I was reminded of this all a few days after I’d learned of the news of her suicide. I tried logging into an old email account I hadn’t used in ages and, sure enough, was granted access. I re-read the pages and pages of emails – something that now seems strange to say in this texting age – and a flood of memories came back from when we were teenagers. Most of our epistles concerns the  stereotypical topics you’d expect of adolescents, but there was another current beyond the banal and the flowery phrases of adoration exchanged in the first stages of infatuation.

Silk, from personal notebook #3 2001

In those sections where we outlined the way we understood Spirit; the shapes of our fears and how to deal with them; the outlines of the larger things we longed for; all these showed the divide between our world-views. Krystal reflections about life seemed raw and dark. Bitter. For me, while always open to admit that that murk that exists, I always tried to aim for light. I’m not saying I knew then she would take her own life, merely that there was a difficult to negotiate divide and her penchant for darkness extended beyond fashion style.

Because of her appearance – my freshman-year college roommates told me with more than a hint of envy in their voice how she looked like a goth Victoria’s Secret model. That night that I tied her up and we went out? She wasn’t even carded by the same bouncer that closely scrutinized the one legal ID, mine.

We danced together and socialized. I wanted her to get to know my friends so didn’t dominate her presence. Whenever she wasn’t directly next to me in our small group, however, male strangers would try to talk to her. She was respectful, but when conversation turned to flirtation she would quickly quit them and come over to stand close to me to show who she was with. Feeling juvenile pride at their rejection and her selection of me, I fawned over her. One person in particular – a long blond haired older man (which for me at the time meant late 20s)  – caused her to draw me in especially close. Uncomfortably so. The pressure around my ribs didn’t make me worried they break, but the crush of bone against bone was no pleasant sensation.

At first I thought this might be an ex that I was unaware of. A little tipsy, I mentally prepared for a fight, but he just smiled and continued to walk on. I looked down at her face and saw an expression that I did not then and do not now know fully what it was, other than that it haunted me. I whispered in her ear “Who was that?” and she responded “No one, I’ll explain later.” When we got home, she shared her story with me.

Portrait 2012

Several weeks before her and I started dating, she’d been raped by that man. At a party that he’d drove her too, he’d drugged her drink, cornered her and then forced himself upon her. The way she described it, she was in a murky haze due to whatever he’d dosed her with. She could see what was happening, but couldn’t get her body to move in the way her brain wanted. She willed it, yet couldn’t fend him off. This was why she was so affected when we were out together – she’d just seen that man that literally stole her virginity.

I’d later learn that this same person had tried the same thing with two of my female friends. In my novel Unraveling the very graphic, violent scene towards such a person with similar physical features as her rapist is a variant of the recurring fantasy that I had towards this person at this time.

Already prone to depression before, she explained, the traumatic experience had significant effects. She had recurring nightmares, felt anxious when around other people, took to cutting and became averse to most of her male friends. Beauty is pain, she explained, as it causes such strong desires in others that many people are willing to do unethical or immoral things to obtain or experience the object of their desires. She didn’t wholly despise her attractive visage, but felt it was like something that she didn’t entirely want either. It was a burden. A flood of what she was struggling with continued out and she ended it all with, ” …and you’re the first person that I shared this all with”.

I felt pride that she trusted me so much. I knew that our relationship and the disclosures she’d made implied a clear duty on my part. But how exactly to help her? Well, that I didn’t know. And it bothered me. A lot. So much that I thought about ending the relationship. It wasn’t because she’d been raped. No, I didn’t think that she was somehow tainted to her core as a result of her assault. No, it was learning the extent which she had suppressed so much of her emotional life that made me question whether or not a healthy relationship was possible going forward.

Portrait of Ariel Sheen

If this sounds shitty, it is, but full disclosure I’d already started to lose the initial enthusiasm I had for our partnership. Even before she told me this I’d picked up that something wasn’t “right”. I told myself, however, that it was the height of inhumanity to leave her side after she’d opened up to me like that as it’d likely lead either to her further close off from others or take her own life, something I learned that night we talked that she’d already tried before. I decided that I’d stay in order to try and do the best that I could to help break her out of the consciousness that kept pulling her back to the trauma’s she’d experienced.

At first, it worked. The bad dreams lost their frequency and intensity. She stopped cutting as often, but communicated to me that she’d only stopped as I’d asked her to.  Beauty is pain and sometimes in order to keep it alive you must make sacrifices. However the lessening or disappearance of each particular symptom didn’t mean that she’d overcome the effects the event had had on her. New ones started popped up or came back. Like the panic attacks. Hearing her describe the horror she felt being around people made my heart go out to her. But on the practical side it meant that each time I’d want us to go out, I had to mind a dangerous mine field that was our communication. I didn’t want to be selfish, but I wasn’t enjoying being wholly selfless either.

As our relationship continued I felt that our time was increasingly being occupied with issues related to her handling her rape trauma. It affected nearly every area of her thinking  and I started to resent our relationship. I told myself at the time that I stayed as I was optimistic. She was, after all, making steps to move past it so that she was less reactive to the many things which triggered her. Enough time has passed, however, that I don’t now think that that’s true. For one how she helped herself seemed to me to be a form of slow self-annihilation. As for why I stayed, it was more  aversion to shame for leaving someone for being raped in a bad place. It was a good intention, but the execution of which meant for an unstable relationship foundation.

“I’d Love To Break Your Heart”

To help “heal herself” Krystal illicitly obtained anti-anxiety meds like Xanax. While she was pleased with the way they made her feel vacant, to me that was exactly why she shouldn’t take it. The drugs shut up some the darker angels of her nature, but didn’t provide genuine relief from the underlying issues. She needed to come into her own, not numb herself.  Beauty is pain, she said with a face that was both vacant and bitter, you got what you wanted and now you don’t want it anymore but something else. 

My not knowing how to properly address the impact of the trauma was a major reason I ended our romance. At the time I hated myself for such a rationale. Now, however, I accept it as my having acted the best way I knew how. In fact, I should have ended it way sooner rather than let it drag on like a slowly removed band-aid as there was no way for her to have had a foundation for an romantic interpersonal relationship until she had a foundation for a healthy interpersonal relationship.

“Discarded Broken Dreams”

Krystal later tried therapy to help with the myriad issues she struggled with. During one of our intermittent talks she expressed aversion to talk therapy. In her blog you can read of her talking about her struggles with depression and antipathy towards the psychiatrists that labeled her bipolar. The dynamic she protested then matched the dynamic that has so previously scarred her: a male older someone handing out drugs that impact the mind to deaden the senses.

Whether or not this affected treatment, it seems to me that repetition compulsion in part explains the intermittent changes in medication and categorical disdain for the people she had to talk to in order for her to be provided with meds. After I completed my training at FICAM in 2013, she sent me an email expressing interest in doing bioenergetic therapy with me. I was happy at the thought of it as I was confident I could help her make some major inroads in releasing the energies she’d internalized, later proven true, but as she lived across the country this never happened.

Self-Portrait 2008

I know she knew this too at the time because things between us afterwards were amicable. For years after our split we socialized amongst mutual friends on a not-so irregular basis and wrote each other intermittently. After I got engaged, she even sent a nice note saying she felt happy for me as she’d not ever seen me appear so consistently joyful in pictures.

“Faithful Only She”

Lest it seem like I’m turning a whole life into the effect of a single traumatic experience let me be clear: These memories aren’t the only things that I remember about Krystal. In fact it is far from the thing that defines her in my and other’s mind. Krystal was kind and smart and creative and an amazingly talented photographer with hustle. Hearing her talk with the passion that she had about the arts that she practiced always impressed and inspired me.

Her self-made zine was an impressively put together outlet she curated from the creatives that were drawn to her. Her dark humor made some laugh and others squirm. She was an all around awesome girl and young woman. I’m detailing the long-lasting effects of the trauma as while I can’t honestly draw a straight line from that trauma to her choosing to kill herself, I also feel that had she not been drugged and sexually assaulted at 15 then she would likely still be alive.

“Creatures”

And it’s because of the fact that is far from an isolated incident, that with social effort could become less prevalent, that I focus on Krystal’s rape when memorializing her art and life following her death. I’m writing this not just to exposit on depression, trauma and their impact on romantic relationships – but as a base for action.

Those of you that read this that own her prints of Krystal/Cannibalized’s work, I’d ask that you please send me high-rendition scans of them along with typical archival info (name/date/etc/). I’d like to curate a collection of her photos and sell the prints in a hardbound book with the profits going to RAINN. If I can help fund one of their programs for someone that needs help like Krystal did, then I’d feel the work that I’ll put into it would be worth it.

Self-Portrait 2011

 

Review of The Crisis of the Negro Intellectual

I’ve been meaning to review The Crisis of the Negro Intellectual by Harold Cruse for quite some time. With it’s depth and breath of evidence and a forceful analysis it’s no surprise that following it’s publication it was a cultural touchstone amongst the cultural and political elites of the early 1970s. Truth is, whenever I’ve sat in front of an open Word document with the intent to respond to it’s arguments and evidence, I start to feel a bit overwhelmed. This despite the fact that I’ve had some pretty extended conversations on this book.

Thankfully, one of the Facebook groups whose posts I follow, the Society for United States Intellectual History, recently curated a Roundtable on the Crisis of the Negro Intellectual. Rather than provide you with my thoughts on the matter, I decided I’d share these instead:

 

Along with two other insightful PDFs:

and some random other links:

Beyond the Color Line: Jews, Black and the American Racial Imagination

Don’t Call me a Millennial!: A Critique of “The Fourth Turning” by Neil Howe and William Strauss

For almost a week several outlets in my news feed had headlines highlighting “Steve Bannon’s book” for understanding the current American moment. Described as a seminal text in Bannon’s political philosophy and the foundation for his 2010 documentary, I was curious. I dug a little further and found out that one of the authors, Neil Howe, had been the person who coined the term Millennial. I’ve long heard and used the term Millennial and viewed it as a description of the generation of people born in the early eighties to the mid- nineties. Reading The Fourth Turning: An American Prophecy – What the Cycles of History Tell Us About America’s Next Rendezvous with Destiny made me realize how wrong I was about this and has brought me to the view that the widespread adoption of the term is highly problematic. So problematic, in fact, that I’m going to make a conscious effort not to use the word and attempt to raise awareness as to why it should not be be used.

When Glenn Beck Takes Something Seriously, That’s A Good Indication You Shouldn’t

Perhaps the quickest way to show how intellectually bankrupt the term is is to look at the level of excitement  Glenn Beck has when talking about The Fourth Turning. After viewing this clip, to me it seems that Beck does not just view their work as history, but as Revealed Truth!

Beck has multiple episodes devoted to detailing Howe and Strauss’ work that details as to the significance of the saecula – the average span of a human life – the archetypal cycles within them and the psycho-social impact of their interactions. I’ve not seen these videos, but I imagine it is a further delineation of the philosophy of history which opens the book.

The Historians Wear No Clothes

H&S begin with an intellectual history that highlights numerous people that have declaimed history to be generational and circular. Citing and updating Classical Greek ideas and terms, we soon learn that the four archetypes of American History – which all have their another iteration in other national borders – are Prophet, Nomad, Hero, and Artist.

These archetypes emerge from periods of crisis, such as war or revolution, that changes the spirit of the people due to their experience. While the collective action problem inherent in the upheavals of massive social transformation is certain to impact people’s consciousness, the historic component of the dynamic which H&S describe is piecemeal, Metaphysical and Idealistic.

History Matters 

H&S, like many others, locate the origin of “linear history” in The Enlightenment, and associate it with modernity and the State. They continue to say that despite the works of a number of eminent thinkers having created the most “cogent body of generations writing ever,” (tellingly all non-Jacobins) that this mode of thought fell out of favor while the more directional form of historical consciousness became hegemonic (63).

They import this into their account of American history, which is quite unusual, but more so due to the the method that the bring to bear on their account.

Quite simply, in Howe and Strauss’ account of America, there are very few actual people accounted for. Though masses are named and given qualities, for the most part there is little attempt to connect the qualities of the Prophet, Nomad, Hero, and Artist into the historic conditions of the saeculum they are describing. For the most part all that we’re treated to is analysis based on movies or well-known personages that “somehow define the ages”. What’s missing is any sort of genuine political economy.

No Race, No Class, No Immigration in Howe and Strauss’ America

In H&S’s account of American history, slavery’s inheritance on the personality of the body politic writ large is marginal. Other racial and ethnic tensions have also not played a significant role in the development of the American Identity. Instead, from Slavery through Reconstruction through Jim Crow and the Civil Rights Era, the same four archetypes are in conflict over the direction of the political order – and yet racial conflict is largely glossed over.

Based on this “prophetic account of history” you would also never suspect  that over 59 million people have immigrated to the United States since 1965 alone from places very different from those that first settled. Since Howe and Strauss’ opening intellectual salvo is to connect the First Turning to the end of the Glorious Revolution, it’s worth noting that many millions of other immigrants have arrived from non-Anglo countries, an unmentioned fact in H&S account.

Social struggles for women’s rights, unions and the various repressions at home and oppressions abroad justified by the “Cold War” are other dynamics that apparently play a negligible role in the development of American Identity.

Why this is so is never clearly stated, instead we are presented with conflicts stemming solely from generational conflict. That they would not entertain other theories about the cycles of conflict is surprising given that a number of other historians and political economists support the basic notion of cycles in history…

Only Weak Thinkers Avoid Attacking Their Convictions

The idea of cyclical waves existing in human history is not solely the domain of those historians such as Ortega Y Gasset. Given that much of the first writings of man are economic in nature, receipts and double entry book-keeping, it should perhaps come as no surprise that it’s in this domain – political economy – that a similar trend has been noticed.

Commodity prices like the ones above, for instance, have been shown via the work of Nikolai Kondratiev and others to follow a secular, recurring cycle of peaks, recessions and crashes. Given that American’s live within a capitalist mode of social relations to produce their means of subsistence, these “economic” indicators have huge anthropological and political effects, hence why it is so surprising that labor and economic exchange is barely mentioned in this account of America’s past. The structural constraints imposed on the working class have actual corporeality, eight hours daily in economic relations limited by varying degrees of political agency – unlike Howe and Strauss’s idealist account. New technologies and new relations of political power cause massive social disorder and economic dislocation, however these don’t play a factor in the creation of “generational identities” such as Millennials, Baby Boomers, etc.

Contending Schools of Thought: Materialism vs. Idealism 

That the authors of The Fourth Turning don’t quote any of these “cyclical” schools that have recognized cycles of life within societies that have political economies informed by capitalist property relations is perhaps unsurprisingly, for reasons that should already becoming clear.

This is because for Howe and Strauss, the current generations of Baby Boomers, The Silent Generation, Generation X, Millennial are trans-historic substantive categories that subsumes all America’s class, racial, sexual, sexual preference, and many other differences. According to their use of the term, those born within certain date border inherently, all have the same experience.

When Are You Getting To The Part about Millennials?

With all of this in mind it becomes easier to understand how problematic Howe and Strauss’s term Millennials and why their “prophecy” should be seen as bullshit and those that cite them as inspiration should be resisted.

For one, it literally emerges from the entire web of bullshit that I described above.

Secondly that prognostication isn’t so good. And by this I don’t mean Howe’s Book Millennial’s Rising: The Next Great Generation, about which one Amazon reviewer wrote the following: “The book was written BEFORE any of the predictions advanced could have happened and MISSED many of the things. I thought it was a real up-date and it was not.”

According to The Fourth Turning, Millennials are on track from which there is no escape to be a generation that sacrifices under the auspices for austerity. The way that we prepare is not as a class of people recognizing and acting upon their material interests, but to revert to tribalism. Return to classic virtues, expect for the collapse of public support mechanisms. Look to your family for support. Etc.

More than just focusing on increasing one’s self-reliance and forgetting about the “others”, “millennials” as a class ought to approach the crisis period by just  “going with it” and “prepare ourselves for it” – a message with some really weird echoes across history. Considering that most of the issues that “millennials” face all stem from historical capitalist relations, this is a big point to miss.

Wait, So Millennials Is A Crypto-Facist Term?! 

Indeed it is.

“The Fourth Turning” is a prophecy that a mythic, inner- conflictless country during a time of some outside conflict, generalized economic depression, massive natural catastrophe, or some other “panic” inducing behavior that prods changes in the normal acceptance of the status quo.

That said – I appreciated their prose. And found their brief remarks against Fukuyama to be insightful. Despite being risible epistemological sophistry, it was compelling! Furthermore, as someone that has training in the theory behind and therapeutic practice of Hellinger Constellations I found their writings on the inter-general interaction to be genuinely insightful and aligned with my own training in that field. Yet in the end the book is a rallying call for American Facism Lite™. The parts of American that it silences in its Prophecy is indeed the very foundation of Americanness. And it’s only through realizing this, that such cycles become less something that individuals must personally buttress themselves against or and instead something that we account for and address as a species-level.