Skip to main content

Security Analysis Text: Preface and Introductory Materials

Security Analysis Text
Preface and Introductory Materials
  • Show the following:

    Annotations
    Resources
  • Adjust appearance:

    Font
    Font style
    Color Scheme
    Light
    Dark
    Annotation contrast
    Low
    High
    Margins
  • Search within:
    • Notifications
    • Privacy
  • Project HomeSecurity Analysis
  • Projects
  • Learn more about Manifold

Notes

table of contents
  1. Preface and Introductory Materials
  2. Accessibility Statement
  3. Chapter 1 Introducing Security Analysis
  4. Chapter 2 Why a Critical-Thinking Framework?
  5. Chapter 3 Foundations of Security Analysis
  6. Chapter 4 Purpose and Questions
  7. Chapter 5 Information and Context
  8. Chapter 6 Points of View and Assumptions
  9. Chapter 7 Conceptualizing the Problem
  10. Chapter 8 Alternatives
  11. Chapter 9 Interpretation and Inferences
  12. Chapter 10 Implications and Consequences
  13. Chapter 11 Written Reports and Verbal Briefings
  14. Appendix I Informal Logic Fallacies
  15. Appendix II Heuristics and Cognitive Biases
  16. Appendix III Analyzing Political Culture

Security Analysis: A Critical-Thinking Approach

by Michael W. Collier

Eastern Kentucky University Libraries
Richmond, Kentucky
encompass.eku.edu
2023 ©

This work is licensed under a Creative Commons Attribution-NonCommercial- ShareAlike 4.0 International License (see https://creativecommons.org/licenses/by-nc-sa/4.0/).

You are free to:

Share – Copy and redistribute the material in any medium or format, and

Adapt – Remix, transform, and build upon the material

Under the following terms:

Attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner but not in any way that suggests the licensor endorses you or your use.

NonCommercial – You may not use the material for commercial purposes.

ShareAlike – If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.

No additional restrictions – You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.

NOTICES:

You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.

No warranties are given. The license may not give all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy or moral rights may limit how you use the material.

ISBN: 978-1-7343289-3-6

Published by Eastern Kentucky University Libraries Richmond, KY 40475

List of Figures and Boxes

Figure or Box Page

Figure 1.1 Conceptualizing Security (prior 1980s)

Figure 1.2 Conceptualizing Security (post 9/11)

Figure 2.1 Characteristics of a Good Critical Thinker

Figure 2.2 Poor-Thinking Tendencies

Figure 2.3 Common Cognitive Biases in Security Analysis

Figure 2.4 Critical-Thinking Frameworks Useful in Security Analysis

Figure 2.5 A Security Analysis Critical-Thinking Framework

Box 2.1 Critical-Thinking Analysis of the 1962 Cuban Missile Crisis

Figure 3.1 Creating Science

Figure 3.2 Conceptualizing Theory: A Ball of String

Figure 3.3 Examples of Operational Definitions

Figure 3.4 Relationships Among Variables

Figure 3.5 Wheel of Science

Figure 3.6 Induction and Deduction Defined

Figure 3.7 Common Levels of Analysis and Academic Disciplines

Figure 3.8 Analytic Goals, Aims, and Objectives

Figure 3.9 Summary of Variable Measurements

Figure 3.10 Sampling Basics

Figure 3.11 Analyst’s Pre-Sampling Questions

Figure 3.12 Sample Size for 95% Confidence Level & 5% Confidence Interval

Figure 3.13 Stratified Sampling Example

Figure 4.1 U.S. National Security Council Structure

Figure 4.2 Selected U.S. National Strategy and Guidance Documents

Figure 4.3 The Security Analysis Spectrum

Figure 4.4 Getting-Started Checklist

Figure 5.1 The Electromagnetic Spectrum

Box 5.1 Curveball: HUMINT Con Man

Box 5.2 Computer Network Attack: 2014 Sony Pictures

Figure 5.2 Sample Background Information for a Terrorist Group Study

Figure 5.3 Classifying Scholarly/Professional Literature & Popular Media

Figure 5.4 Selected Think-Tank Political Orientations

Figure 5.5 Selected Popular Media: Analysis Quality & Political Orientation

Box 5.3 Circular Reporting: The Case of al Qaeda and MS-13

Figure 5.6 Template for Analyzing Sources

Figure 5.7 Checklist for Deception Detection

Figure 5.8 Template for Quality of Information Checks

Figure 6.1 Decision-Maker Mental Model

Box 6.1 Saddam Hussein: Narcissistic Pathology

Figure 6.2 Malignant Narcissistic Traits

Box 6.2 Emotion-Based Decisions: General Douglas MacArthur

Figure 6.3 Leader Power Bases

Figure 6.4 Points-of-View Analysis: A Psychobiography Checklist

Figure 6.5 Four Ways of Seeing + Analyst

Figure 6.6 The Periodic Table of the Beliefs

Box 6.3 Critical Belief Analysis Example: Saddam Hussein (c. 1980)

Figure 6.7 Assumption and Critical Belief Analysis Worksheet

Figure 7.1 Conceptualizing Marxist Socialism

Figure 7.2 The Model Hierarchy

Figure 7.3 Scatter Plot: Economic Freedom & Corruption

Figure 7.4 Pablo Escobar Cocaine Organizational Plot (c. 1980s)

Figure 7.5 Medellin Cocaine Cartel Key Relationships (1980s)

Figure 7.6 Counter-Narcotics Troop Deployment Process Flowchart

Figure 7.7 Geospatial Map of Colombia

Figure 7.8 Gantt Chart of Russian Aircraft Carrier Completion

Figure 7.9 Time Series Chart: Cocaine Trends 1990-2008

Figure 7.10 Cocaine Production System

Figure 7.11 Cocaine Production System Targeting

Figure 7.12 Cocaine Cartel Target Network

Figure 7.13 Cocaine Cartel Disruption Network

Figure 7.14 Cocaine Cartel Disruption U.S. Strategic Network

Figure 7.15 Cocaine Cartel Disruption Network International Cooperation

Figure 7.16 Geller & Singer War-Prone Dyad Model

Box 7.1 Structural Analysis of Possible Iran-Iraq War (1980)

Box 7.2 Utility Analysis Example: Kennedy’s Cuban Missile Crisis Decisions

Figure 7.17 Decision Tree: German War Decisions 1914-1917

Box 7.3 Probability-Tree Example: Hypothetical Hostage Rescue

Box 7.4 Bayesian Analysis Example: Hypothetical Hostage Rescue

Figure 7.18 Prisoner’s Dilemma: Single Play Game

Figure 7.19 Prisoner’s Dilemma: Multiple Play Game

Figure 7.20 Game of Chicken: Cuban Missile Crisis

Figure 8.1 5Ws + 1H: Al Qaeda Attack on U.S. Interests

Box 8.1 Hypothetical Storyboarding the 9/11 Attacks Initial Planning

Figure 8.2 Fusion Level 1 (Fusion with Outer Objects)

Figure 8.3 Fusion Level 2 (Fusion with Inner Parameters)

Box 8.2 Example CARVER Technique: Al Qaeda Target Selection

Figure 9.1 System 1 (Fast) Thinking Process

Figure 9.2 Summary of Interpretation and Inference Techniques

Figure 9.3 Logical Argumentation (Argument Mapping)

Figure 9.4 Example: Argument Mapping

Box 9.1 Pros-Cons-Fixes—An Analysis of al Qaeda Decision Making

Figure 9.5 Pair-Wise Ranking of Criteria

Box 9.2 Weighted Ranking—al Qaeda Decision Making

Box 9.3 Outcomes-Matrix Analysis: Obama’s War in Afghanistan

Box 10.1 Cascading Threat Model: Al Qaeda 9/11 Attacks

Box 10.2 Threat Analysis: Al Qaeda Attack on the U.S. Homeland

Figure 10.1 Infrastructure Attack Potential Observables

Box 10.3 Indicators Analysis: Al Qaeda Attack on the U.S. Homeland

Box 10.4 Intelligence-Collection Plan: Al Qaeda Attack on the U.S. Homeland

Box 10.5 How-How Analysis: Obama’s War in Afghanistan

Figure 10.2 SWOT Analysis Template

Box 10.6 SWOT Analysis: Obama’s War in Afghanistan

Box 10.7 Acceptance Analysis: Obama’s War in Afghanistan

Box 11.1 BLUF Example

Figure 11.1 Outline for Security-Analysis Presentation

Figure 11.2 Expressing Likelihood and Probability

Figure 11.3 Department of Homeland Security Confidence Levels

Figure 11.4 Structured Self-Critique Key Questions

Figure 11.5 Checklist for Intellectual Standards for Assessing Critical Thinking

Figure 11.6 Checklist for ICD 203 Analytic Standards

Figure II.1 Summary of System 1 (Fast) and System 2 (Slow) Thinking

Figure III.1 Theory of Political Culture

About the Author

Dr. Michael W. Collier is a retired Associate Professor of Homeland Security at Eastern Kentucky University (EKU), Richmond, Kentucky. In his decade at EKU, he taught undergraduate and graduate courses in critical thinking, intelligence studies, terrorism, policy and legal analysis, ethics, strategic planning, leadership, and management. He was also the EKU Homeland Security Program Coordinator and the Co-Director and Principal Investigator for the Bluegrass State Intelligence Community Center of Academic Excellence, where EKU was the lead university of a federally funded, multi-school consortium with a goal of preparing the next generation of national security and intelligence professionals. At EKU, he won multiple University Critical-Thinking Teacher-of-the-Year Awards, in addition to the 2017 Distinguished Faculty Award in the EKU College of Justice & Safety.

Before arriving at EKU, Dr. Collier spent a decade at Florida International University (FIU), Miami, Florida, first as a graduate student and later as the Director of Research and Academic Programs at FIU’s renowned Latin American and Caribbean Center, a Title VI federally funded language and area studies center. At FIU, he taught undergraduate and graduate courses in research methods and Latin American and Caribbean security and politics.

In a two-decade first career as a U.S. Coast Guard officer, Dr. Collier was a specialist in deep-water cutter operations and training and a sub-specialist in law enforcement and military intelligence. He served senior officer tours as Coast Guard and Police Attaché at the U.S. Embassy in Bogotá, Colombia; Commanding Officer, USCGC Thetis (WMEC 910) in Key West, Florida; and Deputy Director of Intelligence, Joint Interagency Task Force East in Key West, Florida. Earlier in his career, he was a program analyst and action officer in the Defense Operations Division, U.S. Coast Guard Headquarters in Washington D.C. He retired from the U.S. Coast Guard as a Commander in 1996.

Dr. Collier holds a Ph.D. in International Relations from FIU (2000), with a major in Foreign Policy and Security Studies and a minor in Research Methodology; an M.S. of Strategic Intelligence from the U.S. Defense Intelligence College (1986) (now National Intelligence University), Washington D.C., with concentrations in Soviet Studies and Latin American Studies; and a B.S. from the U.S. Coast Guard Academy (1974), New London, Connecticut, with concentrations in Management and Economics. His previous books include: Political Corruption in the Caribbean Basin, Constructing a Theory to Combat Corruption (Routledge, 2005) and Terrorism Preparedness in Florida, Improved Since 9/11, But Far From Ready (FIU, 2005). He also published numerous professional and scholarly articles and made scores of professional and scholarly presentations. Originally from Higginsville, Missouri, he now lives in Williamsburg, Virginia.

Preface

This book has been decades in the making. After over two decades as a U.S Coast Guard security practitioner, in the mid-1990s I began a second career in academic teaching and research in the security field. In my academic career, I strove to learn the methods of advanced security analysis, as what I had seen while on active military duty was little more than very basic intuitive analysis. In 2008, I became the Homeland Security Program Coordinator at Eastern Kentucky University (EKU). Here, I was introduced to the use of systematic critical thinking through the EKU Teaching and Learning Center. I immediately introduced critical thinking into my undergraduate and graduate courses. I wish I had known systematic critical thinking when I was a security practitioner as it would have made me more effective in my career as a U.S. Coast Guard officer.

Audience

In the larger sense, this book is for anyone who wants to learn foundational techniques for generating the best answers to complex questions and best solutions to complex problems. The security community often refers to this complexity as wicked problems. Examples used in this book come from the broader security field, which includes national security, homeland security, law enforcement, and corporate security. However, the critical-thinking framework and techniques presented in this book are also applicable to any discipline in the social sciences. The book attempts to synthesize material from academic research methods with professional practitioner analytic techniques. Recognizing most students will never become academics, the bias of this book is toward the practitioner approach to analysis, but it also includes significant material on academic research methods such that a robust academic social science research course may be designed around the material.

This book is designed as an initial textbook for teaching research and analysis in upper-level undergraduate programs in national security, homeland security, intelligence studies, law enforcement, and corporate security. The book also can be retained as a reference on security analysis throughout a student’s academic and professional careers. At the graduate student level, this book also may be used as a supplementary text and reference in analysis courses, especially for students who have not been instructed previously in critical thinking. The book also is useful as a textbook and reference in professional training courses for instructing intelligence analysts and security-related policy analysts. Another audience for this book is experienced security analysts who want to learn the foundations of critical thinking. This is not a book about how security-related research and analysis is necessarily conducted by either practitioners or academics. Instead, it provides an alternative approach for systematic research and analysis using a critical-thinking framework.

Security analysis exists to support decision making. One definition of such analysis states its purpose is to “…provide an edge to the decision maker.”1 The decision makers may be in the U.S. National Security Council, U.S. Defense or Homeland Security departments, military services or field commanders, government agencies, or others working in the security community. This book focuses more on strategic analysis, although the techniques covered are equally applicable to operational and tactical analyses. Qualitative analysis techniques are emphasized, but the material also is useable in comparative or quantitative studies. While the book focuses more on security analysis support for decision makers, it also provides techniques leading to rigorous analysis useful in developing academic papers or journal articles.

A major challenge of this book was synthesizing the practitioner and academic approaches to research and analysis, communities that do not often “mesh.” I find practitioners and academics do not always understand each other and often “talk past each other”—even when discussing the same subject. This is because they have differing vocabularies, assumptions, goals, techniques, and customers for their analyses. For example, the term validity related to an analytic report in practitioner terms usually means trying to reduce analytic bias and attempting to find the truth (a very slippery concept in itself). Academics on the other hand have a more precise and nuanced use for the term validity in their published research, but still with a goal of reducing bias. Academic validity checks employ specific techniques for assessing biases in existing literature, data collection methods, conceptual modeling, hypotheses testing, and in determining overall analytic rigor. This is because academic research is meant to add to the larger knowledge base on a subject and therefore should be as unbiased as possible. Practitioners, on the other hand, are focused on timely support to their customers’ decision making, which can make it susceptible to significant bias if the analyst is not careful. Hopefully, this book will reveal how practitioner and academic security analysis techniques may converge and actually complement each other.

Plan of the Book

Chapters 1 through 3 provide background and context on the field of security analysis. Chapter 1 summarizes the progression of security analysis through history and presents a model to help conceptualize current U.S. security fields and their relationships. Chapter 2 argues why critical thinking is vital to security analysis and presents a Security Analysis Critical-Thinking Framework, which is the basis for this book. Chapter 3 surveys foundational concepts in social science research and analysis and relates them to security analysis.

Chapters 4 through 10 provide detailed analytic guidance on addressing specific elements in the Security Analysis Critical-Thinking Framework (purpose, questions, information, context, points of view, assumptions, conceptualization, alternatives, interpretation/inference, and implications/consequences). These elements apply to both intelligence analysis and security policy analysis. In each chapter, analytic techniques supporting the elements are introduced and examples of their use provided. Chapter 11 provides guidance for both preparing written and verbal reports and how to quality check the overall results of the analytic effort.

Three appendixes provide detailed information that is either applicable to multiple chapters or too lengthy for inclusion within chapters. Appendix I compiles a list of the most common informal logic fallacies that degrade good thinking. Appendix II summarizes the many heuristics and cognitive biases that also can degrade good thinking. Appendix III provides a process for analyzing political cultures, which is important for understanding and assessing points of views and key assumptions in any analysis.

Chapters begin with a statement of the Bottom Line Up Front (BLUF), which is a summary of the highlights of the chapter. BLUF is also used in preparing security analysis written and verbal reports as detailed in Chapter 11. Chapters conclude with a list of the bolded Key Concepts presented in chapter texts, which allow readers to check their comprehension of this important material. Chapters also end with Discussion Points to facilitate individual and group thinking and energize class discussions. Finally, chapters and appendixes end with a Notes (endnotes) section. Figures and Boxes support the text throughout the book. Figures include tables, lists, and graphics. Boxes contain textual narratives.

Acknowledgements

I owe an intellectual debt to hundreds of professors, colleagues, and students over the 40-plus years of my two careers—too many to mention here. I specifically wish to thank Nicholas Onuf, my Florida International University (FIU) doctoral program academic advisor and dissertation committee chair. A renowned social theorist, Nick helped me overcome my practitioner blinders and introduced me to the exciting world of social theory. I also want to thank Alex Stepick, an anthropologist and renowned research methodologist, who taught me the need for good researchers to master the entire range of qualitative, comparative, and quantitative methods. I was Alex’s FIU research assistant the first two years of my doctoral program, where we worked on a project to explain levels of violence inside Miami-Dade County, Florida, public high schools. I particularly want to thank Eduardo Gamarra, Ivelaw Griffith, and Anthony Maingot, members of my dissertation committee and trusted mentors, who helped me better understand the security complexities of the Latin American and Caribbean region. As Executive Director of the FIU Latin American and Caribbean Center, Eduardo was also my boss in the early-2000s when I worked as his Director of Research and Academic Programs and where we offered rigorous teaching, research, and outreach programs in regional security. I also owe a debt of gratitude to all the FIU professors in the International Relations, Political Science, and Comparative Sociology departments who helped guide my doctoral studies.

My interests in teaching critical thinking was cultivated by several colleagues at EKU. I want to thank Hal Blythe and Charlie Sweet, Co-Directors of the EKU Teaching and Learning Center, for first introducing me to The Foundation for Critical Thinking framework2 and preparing me to teach it to both other faculty and students. I also wish to thank Rusty Carpenter, Director of the EKU Noel Studio for Academic Creativity, who further advanced my critical-thinking engagement with both faculty and students through the many outreach programs he coordinated for the entire campus. I want to acknowledge the superb cooperation of Fred May and Ryan Baggett, faculty colleagues in the EKU Homeland Security Program, where we initially instituted a comprehensive critical-thinking structure across the entire Homeland Security curriculum. Pilot research on the impact of our critical-thinking instruction revealed a significant improvement in the critical-thinking skills of students graduating with our undergraduate degree in Homeland Security. Finally, I am deeply indebted to my many FIU and EKU students, who acted as my laboratory subjects as I tested and refined the many analytic techniques presented in this book. These students often challenged me, helping consolidate my ideas on security analysis.

I also wish to thank the authors of the hundreds of books, articles, and presentations, which over the years taught me the diverse world of research methods and analytic techniques. I owe a large debt to Randy Pherson and Bob Clark as friends, mentors, and colleagues. Randy and his wife Katherine, both former Central Intelligence Agency (CIA) analysts, authored Critical Thinking for Strategic Intelligence,3 which for the first time synthesized the use of critical- thinking and structured analytic techniques. Randy and Katherine were two of the pioneers in the development of structured analytic techniques—many included in this book. Randy and renowned CIA analyst Richards Heuer compiled over 50 useful structured analytic techniques in their book Structured Analytic Techniques for Intelligence Analysis.4 Randy became a trusted colleague as we worked together in the International Association for Intelligence Education (IAFE). Bob, who I also met through IAFE, is a former U.S. Air Force and CIA analyst, and took my analytic thinking to a higher level with his book Intelligence Analysis, A Target Centric Approach.5 I used editions of this book for years in graduate intelligence courses. In it, he introduces the importance of modeling, including systems and network modeling, which are integral to conceptualizing security studies. Bob also authored Intelligence Collection,6 which I used in a number of undergraduate and graduate courses. I also want to acknowledge Eugene Bardach’s book A Practical Guide for Policy Analysis, The Eightfold Path to More Effective Problem Solving.7 I have never met Eugene but have used his text, the latest edition co-authored with Eric Patashnick, plus Bardach’s book Getting Agencies to Work Together, The Practice and Theory of Managerial Craftsmanship,8 in both my undergraduate and graduate courses in security policy analysis. While I refer to Pherson & Pherson, Heuer & Pherson, Clark, and Bardach & Patashnick’s works throughout this book, I try not to just repeat their ideas but instead, hopefully, add to them as I create a new Security Analysis Critical-Thinking Framework for both beginning and experienced security analysts.

Many others also contributed to this book. I wish to thank my EKU faculty colleague Brian Simpkins who tested several of this book’s early draft chapters in his EKU courses. I also thank Joe Rogers, Barnet “Barney” Feingold, and Len Kelly for their assistance. Joe was one of the doctoral students in my FIU cohort and later worked as an analyst in the U.S. Intelligence Community. Over the years, Joe and I discussed intelligence analysis methods at length, and he reviewed some of this book’s early chapters. Barney, a retired Veteran’s Administration clinical psychologist, authored the material on Critical Belief Analysis in Chapter 6. He worked closely with me to present Critical Belief Analysis to the security community. Len, one of my U.S. Coast Guard Academy classmates, was the academy’s Associate Dean of Academics and long-time head of the Department of Mathematics that offered a B.S. in Operations Research and Computer Analysis. Len provided insightful comments on the Chapter 7 modeling material. I also want to thank my wife, Gloria, who helped proofread several of the early chapters. Finally, I want to thank Karen T. Pratzner-McDuffie who conducted a professional edit of the entire book.

Disclaimer

Attempting to synthesize decades of learning about security analysis is a daunting task. It is often hard to remember where I learned a certain concept or analytic technique. I have done my best to provide attribution to the ideas and works of others used in this book. In the end, all mistakes in facts, analytic techniques, examples, and sourcing are mine alone. Nothing in this book should be used to assert or imply U.S. government authentication or endorsement of any of the material presented. None of the contents of this book intentionally touch on classified material.

Michael W. Collier, Ph.D Williamsburg, Virginia

Notes

1 Carl J. Jensen III, David H. McElreath, and Melissa Graves, Introduction to Intelligence Studies

(Boca Raton, FL: CRC Press, 2013), 2.

2The Foundation for Critical Thinking, https://www.criticalthinking.org/ (accessed June 29, 2018).

3 Katherine Hibbs Pherson and Randolph H. Pherson, Critical Thinking for Strategic Intelligence, 2nd ed. (Thousand Oaks, CA: Sage/CQ Press, 2017).

4 Richards J. Heuer Jr. and Randolph H. Pherson, Structured Analytic Techniques for Intelligence Analysis, 2nd ed. (Thousand Oaks, CA: Sage/CQ Press, 2015).

5 Robert M. Clark, Intelligence Analysis, A Target Centric Approach, 5th ed. (Thousand Oaks, CA: SAGE/CQ Press, 2017).

6 Robert M. Clark, Intelligence Collection (Los Angeles, CA: SAGE/CQ Press, 2014).

7 Eugene Bardach and Eric M. Patashnick, A Practical Guide for Policy Analysis, The Eightfold Path to More Effective Problem Solving, 5th ed. (Thousand Oaks, CA: SAGE/CQ Press, 2016).

8 Eugene Bardach, Getting Agencies to Work Together, The Practice and Theory of Managerial Craftsmanship (Washington, DC: Brookings Institution Press, 1998).

Annotate

Next Chapter
Accessibility Statement
Next
Powered by Manifold Scholarship. Learn more at
Opens in new tab or windowmanifoldapp.org