I am constantly being asked a bottom-line defense number. I don’t know of any logical way to arrive at such a figure without analyzing the threat; without determining what changes in our strategy should be made in light of the changes in the threat; and then determining what force structure and weapons programs we need to carry out this revised strategy.
Senator Sam Nunn, Chairman, Senate Armed Services Committee
This article will discuss the changing threat in terms of six challenges critical to our over-all national security posture in the 1990’s. To adapt intelligence to our new threat and fiscal environments, we must make radical and comprehensive changes in how we manage and conceptualize intelligence.
We find ourselves in a multi-polar and multi-dimensional environment in which a critication, first presented in the Commandant’s article in the Winter issue, is straight-forward: the conventional threat is generally associated with a government, conventional or nuclear in nature, represented by static orders of battle, linear in the development and deployment of its capabilities, employed in accordance with well-understood rules of engagement and doctrine, relatively easy to detect in its mobilization, and supported by generally recognizable intelligence assets.
The emerging threat, by contrast, is non-governmental, non-conventional, dynamic or random, non-linear, with no constraints or predictable doctrine, almost impossible to detect in advance, and supported by an unlimited 5th column of criminals and drug addicts.
The conventional threat lends itself very well to conventional intelligence collection capabilities which include a strong ability at stand-off technical collection, and a fairly methodical, repetitious, and largely bureaucratized way of doing “analysis”; the emerging threats, in sharp contrast, simply cannot be spotted, assessed, fixed, and neutralized by our existing capabilities.
The “war on drugs”, and our concern over arms control (not just verification of Soviet reductions but also control of nuclear and bio-chemical weapons proliferation in the Third World) are both representative of these new threats.
Narcotics, in both the intelligence and the operational worlds, must be seen as representative of a “type” threat, not as an odious and undesirable distraction from the “real” threat.
The multi-dimensional nature of change in our multi-polar world must also be considered as we evaluate how best to meet these threats.
Figure 1: Dimensions of Change
Intelligence must be much more than simply political reporting or military Order of Battle (OOB) “bean counting.” Intelligence must be able to identify emerging sources of power and emerging sources of instability in each dimension, and forecast their rate of change.
Our emphasis on the need to modify our “world view” and our definition of what merits attention from our intelligence community in no way reduces the importance of continued attention to the Soviet Union.
Three areas in particular must be acknowledged:
– First, we must continue to monitor the strategic nuclear threat.
– Second, intelligence must be capable of monitoring “plans and intentions” of the Soviets in the decades ahead. We must be prepared to identify regression and deception, e.g. perestroika and glasnost may have a mirror image as a STRATEGIC DECEPTION, as a means by which the Soviet Union can establish its technological depth and regain its competitive edge.
– Finally, the flowering of democratic and opposition movements in Eastern Europe and Soviet Republics call for much more intelligence on the ground inside the Soviet Union and Eastern European countries, and a much greater sensitivity to socio-economic, psychological, and cultural factors which were previously overshadowed by the military threat from the Warsaw Pact.
Having established in this way the environment within which intelligence must operate in the 1990’s we can now outline each of the six challenges and what it means for our intelligence structure and the allocation of resources in FY 92-97 and beyond.
Meeting Needs of Public Programs
I&W Methods for New Threats
Theory & Methods for CI/OPSEC
Figure 2: Six Areas of Challenge
Challenge Number One: Meeting the Intelligence Needs of Public Programs
Today there is insufficient emphasis on defining and meeting the intelligence needs of overt civilian agencies, law enforcement activities, and contingency military forces.
This point has major fiscal implication well beyond those of concern to defense force structure managers.
There are two major fiscal strategies that intelligence must support: first, the strategy of “spending smart,” and investing in cheaper peaceful civilian nation-building capabilities as early as possible, rather than waiting for situations to deteriorate to the point that military intervention is required; and second, the strategy of fighting a truly “total war” in which we recognized that a failure on our part to be competitive international trade & financial markets is tantamount to losing a “real” war.
Selected public programs not necessarily associated with “national security” in fact offer an exceptional “return on investment” in terms of enhancing our strategic depth and our position overseas.
General A. M. Gray, Commandant of the Marine Corps, recently emphasized the need for “more and better Third World intelligence … (so) corresponding resource allocations can be appropriately balanced.” He went on to say:
If threat is a factor in determining national investments in security assistance and foreign aid, then a more aggressive program of Third World intelligence analysis and forecasting is needed if we are to justify long overdue and underfunding peaceful preventive measures in this vital area of concern and potential. (Emphasis in original).
Warriors pray for peace. General MacArthur made this point with unusual eloquence, and it remains true today. The task of the warrior is made more difficulty and costs the nation more in the lost lives of its sons and daughters as well as simple economic cost if pre-revolutionary conditions are not identified and dealt with through “peaceful preventive measures.” Monitoring corruption associated with our military assistance programs, identifying popular misconceptions about our Nation that should be corrected, and understanding the true and often unarticulated needs of Third World countries are extremely important tasks that our intelligence can undertake in defense of our over-all national security.
Intelligence must help us make investment decisions and evaluate our programs, with special emphasis on overt & covert programs focused on “nation-building” and/or the furtherance of our national interests.
Challenge Number Two: Indications & Warnings of Revolutionary Change
Our intelligence and foreign affairs communities have demonstrated only a limited understanding of revolutionary change, no methodology for studying the preconditions, precipitants, and actualization of such change, no framework for ensuring collection and analysis priorities respect the importance of all the dimensions within which revolutions can occur, and no indications & warnings (I&W) capability suitable to this challenge. There are several contributing factors:
Firstly, we have never been comfortable with intangibles, and even less comfortable with abstract concepts and ideo-cultural meaning. It is far easier to count beans and compare things than it is to try to understand people, especially people whose entire psycho-social fabric is alien to our own.
Secondly, our planning, programming, & budgeting system (PPBS) perpetuates this tendency; only very large, obvious, “tangible” threats have in the past been acceptable justifications for major planned investments. All other investments, for instance in the Third World, have generally been ad hoc responses to crises, and therefore poorly conceived, coordinated, and effected.
Thirdly, our national skills lean to the technical and away from the human factor. We have become so enamored of our overhe4ad technical capabilities that we have failed to balance our tremendous signals and imagery intelligence (SIGINT/IMINT) collection abilities with a commensurate processing ability, and capped that with a comparative abdication in the arena of human intelligence (HUMINT). Heavy reliance on foreign intelligence & security services, and officers under official cover, does not constitute a serious clandestine HUMINT capability. Such a capability requires years to develop, and patience, a trait for which we are not noted. Our lack of commitment to strong language programs, longer tours, and non-official cover mechanisms facilitating access to every level and dimension of foreign societies and non-governmental groups will continue to frustrate policy-makers attempting to improve our national capabilities for “low-intensity conflict.”
Lastly, we have paid insufficient attention to open sources (OSINT), and the development of an infrastructure for capturing and exploiting the vast outpouring of print and voice information about the Third World as well as more developed and technologically competitive nations such as West Germany, Japan, Singapore, and Brazil.
The community has done well in developing a capability for strategic warning of attack by a major governmental nuclear and/or conventional force, largely because of the relatively static and linear manner in which these capabilities are developed, deployed, and prepared for employment.
These facilitating conditions do not hold for the emerging threat. The threat today and in the 1990’s is often not clearly associated with a government, “it may not come in conventional forms,” its bearers are not constrained in any way, and their actions may be dynamic or even random as the frenzy of the moment moves them to action. Their capabilities do not develop in a necessarily linear fashion because they draw their weapons from all sources, including commercial enterprises, and their motivations are not well enough understood to permit any kind of reliable forecasting.
A great deal of work needs to be done in this area, in terms of both substantive research, and designs & methods. Among the approaches that appear to offer some merit are those of cognitive mapping, social network theory, psycholinguistics, and good old-fashioned listening by experienced diplomats, official representatives, business and academic personnel, and agents in place.
Even more fundamental is the desperately needed commitment to realign existing and future intelligence resources toward basic analysis (not necessarily production) outside the standard political and military spheres, and in the Third World.
We must take initiatives, not simply defend ourselves. Our methods of I&W should lend themselves to identifying opportunities for advantage as well as opportunities for dealing legal active blows to our present and future opponents. Failure in either area will cost billions over time and will hamper our ability to understand and correct our own vulnerabilities at home.
Challenge Number Three: New Theory & Methods of Counterintelligence
Closely related to our severely deficient clandestine HUMINT capabilities and our lack of understanding of foreign entities is our virtually complete vulnerability to penetration by representatives of non-governmental groups posing a non-conventional threat to our national security.
We must, quickly and comprehensively, begin addressing the threat posed by individuals seeking our technical secrets for economic warfare; by individuals suborned by criminal organizations, terrorist groups, and religious cults; and by individuals whose motivations we may never fathom, but whose reliability cannot be determined with any assurance by our present system of background investigation.
We need an entirely new theory and structure of counterintelligence (CI) capable of dealing with both the expanded access of representatives of foreign governments, and the more pervasive and subtle threat from a virtually unlimited “5th column” of criminals and narco-terrorists.
This will require a totally new and comprehensive approach to the management of information about people, an approach which must integrate legal safeguards through the development of artificially intelligent “expert systems” and the partial automation of Inspector General functions.
We must also completely evaluate what we want to protect and what we mean by “confidential,” “secret,” “top secret,” and “sensitive compartmented information” (SCI). The system is so fragmented and inconsistent that even the most loyal individuals have difficulty taking it seriously.
Although efforts have been made to address these issues, we simply cannot resolve the contradictions of counterintelligence without an overarching strategy that includes personnel compensation and quality of life issues as well as a comprehensive approach to the manager and security administration of both electronic and hard-copy information across agency boundaries.
We must move quickly to develop an effective means of organizing and “tagging” our electronic records with essential information about their source, classification, and control parameters, and we must develop inter-agency methods of electronic sharing which maximize our exploitation of information while affording us greater automated auditing and alert capabilities essential to identify unauthorized or inappropriate diversions of knowledge.
We must carefully redefine both intellectual and physical properties that we wish to protect, with special reference to both technology and our own national infrastructure (water, power grids, lines of communication). We should pay particular attention to “critical” nodes in our technical systems which would if sabotaged or penetrated render irreparable harm to our gross national production and general security & public welfare capabilities.
We should be less concerned about the “illegal” export of technology – advanced information technology applications and capabilities, for instance, are developing so far they have usually left the country years before they can be added to the “dual use” list of controlled items. More to the point, information technology (to take one example) evolves so fast that whatever is stolen is out-dated within 6-18 months, and off the market within 36 months. We are better off concentrating on staying ahead than on keeping the other folks behind.
We must recast our domestic as well as our international security resources to better blend the efforts of those responsible for law enforcement, physical security, background investigations, offensive counter-intelligence, and operations. Counter-intelligence cannot be treated as a separate discipline in isolation; it must permeate all aspects of national operations in the same way that “administration” crosses all boundaries.
“Operational security” (OPSEC) requires much greater emphasis, especially in the counternarcotics arena and particularly in the execution of interdiction operations. We have given the narcotics community years in which to build up billion-dollar war chests and capabilities that in some cases exceed our own. We must be much smarter about how we plan and conduct operations in this environment.
As with I&W, CI must protect the nation against the massive costs associated with treason and compromise, or with terrorism unleashed on our population and infrastructure. Financial & economic counterintelligence should become a recognized sub-discipline. For the latter to be successful, there must be a closer working relationship between government and the private sector, a willingness on the part of the private sector to identify and correct its areas of vulnerability, and a national recognition that international finance & trade competition is the “second front” of the 1990’s (drugs & terrorism comprising the first front).
Challenge Number Four: Developing an Information Technology Strategy
We need a national information technology architecture and management infrastructure that integrates telecommunications, computing, and analysis, and enables the full exploitation and integration of data from human, signals, imagery, and open sources.
This situation is largely of our own making; Service and professional fragmentation has been allowed to continue within a resource-rich environment where inter-operability and inter-changeability of information technologies (and related multi-discipline databases) were not required. The infrastructure within the Department of Defense (DoD) has at least a modicum of cohesion; the same is not true for the array of law enforcement, civilian government agencies, and private enterprises, including universities, which have had little occasion in the past to require direct electronic connectivity. Now we are discovering that knowledge is indeed power, and that the shorter the loop in exploiting knowledge, the more competitive our Nation.
We must get serious about cybernetics, and exploiting knowledge in relation rather than in isolation. This requires the development of a national electronic information & records management architecture that goes far beyond the existing plethora of database management applications and isolated proprietary or domain/agency specific databases. Every traditional function of “hardcopy” records management must be automated and integrated into every organization’s knowledge management architecture.
Reliable and tested multi-level security operating systems are critical to our national knowledge management strategy and must be fielded before a serious program of cross-Agency and federal to data private data sharing and exploitation can be considered. Much greater emphasis at the policy level is required on this topic, for without this capability four of the six challenges cannot be fully addressed. It bears comment that multi-level security may finally enable us to link operators directly to analysts, and break down the “green door” that has isolated intelligence for so long from its consumers.
In addition, it is critical that the Services, agencies, and private industry work closely together to avoid at all costs incompatible interfaces and applications that have in the past restricted the transfer of data between applications and between users. A total commitment by all information technology vendors to “open systems” is vital to national productivity and competitiveness in the 1990’s.
An important element of this information technology or knowledge management strategy must be a commitment to fund a global program to capture and make available to both government and private industry those essential open source print and voice records necessary to compete in all dimensions on international life. This will satisfy the President’s desire to help U.S. business while avoiding the dangers inherent in attempting to pass classified information to selected enterprises.
As outlived by General Gray in his article, this would include digitization of newspapers and journals from Third World countries (and should include technical journals from countries such as West Germany and Japan); the establishment of a central repository of government-owned open source databases such as those developed by the Foreign Broadcast Information Service (FBIS); a national program to digitize hard-copy records pertinent to our national interests in the Third World; and expansion of the Defense Gateway Information System (DGIS) to include management of the latter initiatives.
U.S. business overseas can make a significant contribution by assuming responsibility for digitizing open sources in specific countries or technical areas. The data entry problem is so large, only private assumption of this responsibility will permit the national strategy to succeed.
The downward trend of our demography makes an investment in knowledge management tools imperative; the primary way we will be able to improve our national productivity in the 1990’s is with a major national investment strategy focusing on advanced information technologies and automated knowledge exploitation.
Challenge Number Five: Establishing a Responsive Requirements System
We need a national intelligence requirements system that is useful in the management of resources; is cross-disciplinary, automated, and “zero-sum,” and is responsive to individual customers, allowing them to track the satisfaction of their requirements by discipline, topic, country, or timeframe.
There are a number of contributing factors, some of which are being addressed, some of which will take years to work out.
The greatest problem lies in the complete fragmentation of intelligence management over-all; between disciplines, between major management areas, and between levels and types of organizations, each committed to doing business “its way.”
Design & Methods
|Levels of Effort
Figure 6: Fragmentation of Intelligence Management
We have absolutely no way of evaluating our “return on investment” by intelligence discipline or by element of the intelligence cycle.
The continued fragmentation of the intelligence community into disciplines with their own “pipelines” for tasking of subordinate units and reporting of information back to their headquarters will make serious all-source fusion a virtual impossibility unless, as General Al Gray points out in his article:
“Capabilities must be integrated both vertically and horizontally – inter-agency policies and practices must be developed which permit the fusion of information at every hierarchical level, beginning with the Country Team. At the same time, we should avoid the redundant processing of the same information by every agency and service.”
It is vital that the existing requirements system, which includes means of specifying topics of immediately interest to policy-makers as well as priorities for topics of mid-range and longer-term interest, be automated and structured so that all capabilities at all levels are working in consonance with one another. While some disciplines are undeniably more effective than others at obtaining particular types of information, they should be managed in unison and at the lowest possible level.
The second greatest difficulty is the absence of a clear consensus within the community over the purposes of our various requirements documents and processes. Although a document exists to forecast future intelligence requirements and is intended to guide investments in new designs and methods, in fact it is both moribund and nothing more – at this point – that a rehash of the imagery requirements document from which it was born.
There is no over-all management of funding trade-offs between disciplines or between elements in the collection cycle. We still spend too much on technical collection and not enough on clandestine HUMINT or the processing of imagery, signals, and human intelligence. We spend virtually nothing on the single most valuable (and cheapest) source of intelligence, foreign print and voice media.
Collection and production management continue to be dominated by the owners of the respective disciplinary collection resources, or the owners of the analysts. This is a major reason why we have redundant or unprocessable collection, and redundant production. The community has made great strides in eliminating redundant production, but it will not meet with full success until there is a cross-agency, cross-service mechanism for balancing collection versus production, and for balancing the needs of the Theater Commander-in-Chief with the needs of national policy-makers and other consumers.
There is another subtle miscue built into the system: there is no provision for weighting first-time collection and production requirements over those requirements that may have a higher over-all priority, but against which voluminous efforts have been made in the past. As we seek to address our intelligence structure more responsive to our needs for new data, this feature must be established.
Lastly, we come to the problem of distinguishing between timeframes for the management of intelligence resources (i.e. one-year, five-year, twenty-year). This is important in each of the decision areas: design & methods, funding, collection management, and production management. Although the national policy-makers can certainly impose “emphasis” on the individual disciplines, and get what they want if it is collectable with existing resources, they cannot expect to receive the kind of information, including “plans & intentions” and tactical readiness information, for which years are required to develop agents in place, or sophisticated artificial intelligence applications and related knowledge bases.
We simply cannot have topics of current interest driving what should be the five-year priorities plan, and no serious twenty-year plan. What should be happening is that current requirements should drive collection and production by existing resources; the five-year plan should drive the reassignment of existing resources and the development of mid-term new capabilities; and the twenty-year plan should be driving the development of completely new designs and methods unconstrained by existing collection preconceptions, and without regard to existing “standard operating procedures.”
Challenge Number Six: Realigning Resources in an Era of Radical Change
There is limited experience in managing resources in a declining fiscal environment while simultaneously identifying emerging threats and rapidly reallocating resources to meet those threats. Perhaps of greater concern, we appear reluctant to establish a flexible process for fulfilling this fundamental requirement. The bitter resistance of both the mainstream military and the intelligence community to such concepts as “low-intensity conflict,” “special operations,” the exploitation of “open sources,” and support to law enforcement agencies, all portend an era of bureaucratic helplessness and inertia precisely at a time when innovative, flexible, cooperative efforts are going to be critical to our success and our Nation’s security.
On a positive note, Congress has shown a strong inclination to direct innovative solutions where it must and where it has not been able to get constructive proposals from the beneficiaries themselves. The negative side of this is that appropriated funds are meaningless if not properly and rapidly obligated, and the budget executed. With the best of intentions, and no resort to such historical gambits as impoundments, the lead agencies can fail to expend funds for lack of strategic & programming talent, and for lack of responsive and flexible procurement & accounting capabilities. The 1990’s will be characterized by extremely short resource management cycle in which some initiatives will move from conception to obligation to expenditure in under a year. The “war on drugs” in an ideal opportunity to develop, test, and refine a new process for allocating resources and restructuring capabilities under revolutionary conditions.
In order for the shortened PPBS cycle to be effective, top-level managers must be willing to delegate authority down to the project and program management levels. The execution requirements for the realignment of manning, training, procurement, facilities, and operations & maintenance are simply too complex and time consuming to permit top-down micro-management.
We must introduce the same “mission type order” style to our PPBS process as we expect on the battlefield. We must eliminate as much of the paperwork and documentation as possible, and drastically reduce requirements for top-level approval of lower-level adjustments in organization, equipment, tasks, and production where those are consistent with strategic guidance.
In the computer field, the “rapid prototyping” approach has much to offer all of us as an example, in sharp contrast to the system acquisition and life cycle planning approach which is so detailed and lengthy that the system is obsolete before it gets to the production line.
We urgently need a streamlined budget execution process in which the individual responsible for the mission has full obligational authority over funds earmarked for that mission; e.g. the Director of a new Intelligence Center or Joint Task Force should be able to establish a grade & skill mix, hire people, buy equipment, contract for external assistance, and make structural changes to assigned facilities without being bound by inappropriate regulations and entrenched preferences of the parent organization’s civilian personnel, automated data processing, and other established staff elements whose processes have grown too complex and time-consuming while contributing little of substance. One must stress that this in no way exempts the obligating official from oversight and accountability.
Put another way: if Congress authorizes an appropriates ceiling spaces and funds for a particular activity, the activity director should not then have to fight on a “second front” with his or her own bureaucracy, slugging out each personnel and procurement action throughout the budget execution – nor should the activity director have to fight on yet a “third front” against Departmental and Service financial administrators bent on “taxing,” redirecting, and restricting earmarked funds.
The six challenges facing national intelligence in the 1990’s are all linked together – success in one will serve as a catalyst for success in another, failure in any will stymie success in all. All have a direct bearing on the fiscal health of the nation as well as the soundness of its national security structure in the 1990’s and the 21st Century.
We must recognize that “warfare” has once again through a major redefinition – we must now compete with other nations in the context of a “total peace” in which the tools for peaceful competition are every bit as important to national security as the tools of war. If intelligence does not meet the needs of our “front line,” the civilian agencies implementing peaceful preventive measures and enforcing the law, then our defenses will continue to erode, and no amount of investment in “strategic deterrence” and conventional military forces will suffice.
We must place a great deal more emphasis on understanding all of the dimensions of power and change, and especially conditions in the increasingly lethal and volatile Third World. Without an entirely new methodology which affords us indications & warnings of revolutionary change in every dimension, we will be vulnerable, in the “worst case,” to bio-chemical and technical terrorism as well as less threatening but ultimately more costly losses of initiative in various non-military arenas of competition.
“Intelligence” cannot limit itself to stereotypical perceptions of what is and is not a threat. Intelligence must inform decision-makers about every aspect of human endeavor upon which good order and the prospects for a prosperous future depend. Intelligence must identity emerging sources of power and opportunities for advantage as well as threats.
The other side of this coin is counterintelligence and operational security. An entirely new theory and entirely new methods of counterintelligence are required. We must reassess what it is we want to protect, and we must reassess the threat at all levels, to include special emphasis on both domestic and foreign non-governmental actors. We must institute comprehensive new means of coordinating and controlling our law enforcement, intelligence, and counterintelligence resources, to include oversight mechanisms and the firm protection of the rights of our citizens. If we do not design and implement this new and comprehensive program, then we will leave at risk our most precious strategic assets: our population, our infrastructure, and our scientific & technical leads.
None of the above three challenges can be met without developing an information technology strategy which is national in scope, comprehensive (integrating telecommunications, computing, and production across government and private industry as well as academic lines), and visionary. We simply cannot afford to perpetuate the continued fragmentation of systems development and continued investments in labor-intensive computing systems which do not optimize the integration of available applications and capabilities. We must aggressively pursue means of exploiting all available sources of data, both classified and unclassified.
The establishment of a responsive requirements system within our government, one which acknowledges the importance of open sources and also focuses resources on gaps rather than repetitive collection against the same static interests, is critical to the development of informed national acquisition strategy and the articulation of national interests. If we cannot “shorten our loop” in the acquisition and exploitation of knowledge, we simply will not be able to identify multiple challenges and opportunities within our multi-polar and multi-dimensional world in time to be effective.
Lastly, if we are to meet the first five of these challenges, we must develop a process for realigning resources in this era of radical change. We cannot be content with simply “cutting back” across the board. Recognizing new needs, developing new initiatives, and funding research & development in all dimensions, will be critical to our strategic longevity.
Realignments must occur, and occur quickly. We in the national intelligence community should plan on giving up any increase over base, and taking from base a full forty percent – twenty percent to new initiatives tailored to the emerging threat, and twenty percent to BASIC research & development in critical areas such as artificial intelligence, cognitive mapping, and the general theory of cybernetics. We must also protect the mission/program manager responding to strategic direction from Congress and the President, and buffer them from intermediate authorities seeking to undermine if not destroy new initiatives.
The complexity and lethality of the emerging threat, and the severely constrained fiscal environment within which we must plan for national security, require vision, energy, a commitment to cross-agency and service cooperation, and an understanding of Third World perspectives, such as we have never been willing to muster.
Top-down strategic guidance will probably not be forthcoming before FY92, if then; in the interim, “bottom up” common sense, and individual efforts to move in these directions when we can, may be our best means of continuing to earn the “trust and confidence” of our President and our public.
We in the intelligence community, like it or not, must play a leadership role if the national security community is to responsibly decide how to train, equip, and organize its forces and capabilities for the 1990’s.
As subsequently published:
Action Officer/Author: Robert Steele, then Special Assistant, Marine Corps Intelligence Center.
General Al Gray, USMC, then Commandant of the Marine Corps (CMC) created the Marine Corps Intelligence Center (MCIC) at the same time that he created the Marine Corps University (MCU). He was guided by the reality that the larger serices–the Army, Navy, and Air Force–devoted all of their attention to trainng, equipping, and organizing for “Big War” against the Soviet Union and China. He also recognized that there were many strategic assumptions in the Planning, Programming, and Budgeting System (PPBS), including the assumption, by the large services, that they would have lead times for deploying and employing forces abroad.
The U.S. Marine Corps, as the Nation’s force in readiness, did not and does not have that luxury. It is unique in three respects:
1) It is a Congressionally-mandated combined arms force;
2) It is intended to excel at littoral and expeditionary operations including opposed amphibious landings and Non-Combatant Evacuation Operations (NEO); and third
3) It must have, to be successful, the lightest possible logistics and mobility foot-print.
Below are two slides thaf illustrate the power of the Expeditionary Analytic Model that was devised for MCIC. The firt shows the importance of holistic analytic of military, civil, and natural factors at each of the four levels of war and peace. The second shows that the threat depends on the level of analysis (including the duration and purpose of the mission).
Below are the first pages leading to the entire documents of the Strategic Generalizations that were derived from a properly-constructed holistic model, generalization that should but do not guide how we train, equip, and organized our military; and the model itself, which uniquely also established degrees of difficulty for each mission area factor, degrees of difficulty defined by the respective operational managers in their terms.
Below is the briefing on the Model and its Findings as prepared for Marine Corps leaders at all levels. The strategic generalization are very important–for example, the expeditionary environment is characterized by a hot humid day, not the “standard aviation day” that the Navy and Air Force build airplanes to, which is not hot and not humid. THIS MEANS that for the Marine Corps, any aircraft built to Navy and Marine Corps specification is automatically degrated at full operational capability (FOC) to half the lift, half the range, and half the loiter time over Marines on the ground being supported.
This is the seminal work in what the author has long named “information mapping.” Posted as a public service with permission of the author, under Creative Commons license. No commercial exploitation is permitted without documented consent of the author.
Book intended to be read two pages at a time. The author suggests printing by the chapter, and then reading with even pages to the left and odd pages to the right, two pages at a time.
Visit the author’s HOME PAGE.
Shortly after this message that began connecting the dots for a “break-out” to create the inter-agency generic all-source fusion workstation. the MCIC IT budget was hijacked by DIA to test “small DODIIS”, and an Admiral over-turned the JNIDS VI award to MCIC, but kept the malfeasance secret for a year so we could not get CMC to restore the win. On such “administrative” decisions does a Nation turn. It’s time (2010) to restore integrity to all that we do, at every level, every day.
*3 years after the fact, too late to fix, USMC was told that it had won, but the Admiral in charge of JNIDS said “We are a Navy shop, we will do a Navy problem.” This is emblematic of the pervasive corruption across DoD at every level across every mission area.
Analyst 2000 was a special working group that included Dr. Mike Leavitt and Andy Shepard, who wrote 1992 Shepard (US) Intelligence Analysis in the Year 2002 and is today (2010 ADDNI/[ ]. We don’t have this today because from the White House to the Director of Central Intelligence (DCI) to today’s Director of National Intelligence (DNI) there has been zero strategic r5equirements manager or budget management.
General Gray was known as a warrior, but he was also an intelligence professional and uniquely among all the flag officers I have ever known, an inspiring educator. He created not just the Marine Corps Intelligence Center, but the Marine Corps University, new forms of informal research to empower younger officers and explore the “edges” beyond the conventional comfort zone. He was, in brief, a warrior-scholar who epitomizes all lthat should be good in our leaders.
by General Alfred M. Gray, Commandant of the Marine Corps
Ghost-written by Robert David Steele, edited by John Guenther (RIP)
“The Corps must be ‘fighting smart’ if it is to meet the combined challenge of an austere fiscal environment and an increasingly lethal expeditionary environment.”
A. M. Gray, CMC
As the Joint Chiefs of Staff observe the dramatic changes taking place in Eastern Europe and the Soviet Union on the one hand, and the increasingly volatile and lethal Third World on the other, it is immediately apparent that the 1990’s will be a period of global and sweeping challenge to both intelligence professionals and the policy-makers and tactical commanders they support. When we add to this equation the severely constrained fiscal environment, forcing all of us to do more and more with less and less, these challenges verge on being overwhelming.
Our ability to gauge events and their implications in Eastern Europe; our ability to estimate and forecast Third World change in all dimensions (socio-economic and ideo-cultural as well as the more traditional political-military); our ability to develop indications and warnings of emerging threats in the Third World; our ability to provide intelligence for counter-narcotics and counter-terrorist programs; and our ability to protect national security secrets through both offensive and defensive counterintelligence; these will define and guide the national strategy, national defense posture, and national military force structure and systems acquisition in the 1990’s.
The Chairman of the Joint Chiefs of Staff and the Service Chiefs will require the absolute best intelligence available if they are to make prudent decisions about fiscal, system, and operational matters. To the extent that intelligence fails or proves inadequate, our national defense programs suffer, both through the expenditure of millions of dollars on inappropriate capabilities, and through a lack of readiness to deal with unanticipated or underestimated threats. We need to strike a better balance between our capabilities and actual requirements. We simply cannot afford to equip and train for the wrong war.
The U.S. Marine Corps, as the nation’s “force of choice” for expeditionary operations, must be extremely concerned and vocal about global intelligence challenges in the 1990’s. The Marine Corps is also a microcosm of the Department of Defense as a whole. A Marine Air Ground Task Force (MAGTF) is self-contained and supported, must be able to work with all other Services and civilian agencies overseas, in all operational plans worldwide, and must have constant near-real-time access to national, theater, and in-country intelligence. Our Corps is particularly well-suited to respond to these challenges, but to be most effective, we must obtain more balanced intelligence coverage of the Third World.
Since WWII there have been over 200 situations requiring the use of U.S. forces; roughly 85% required employment of the Marines, and virtually all were in the Third World. Prior to WWII and the establishment of a bipolar world, there is an even richer history of Marine Corps employment in expeditionary and constabulary operations throughout the Third World.
As nuclear/conventional threats stabilize, a multipolar world is forming, characterized by shared global concerns as well as competing interest in regions containing powerful Third World nations. This environment offers both opportunity and challenge for policy-makers concerned with the protection of U.S. interests.
The east-west factor will not be the central focus of our contingency planning in the 1990’s. This represents a fundamental challenge to the intelligence community, because the emerging threats in the Third World require a distinctly different approach to intelligence than does the relatively static threat posed by the nuclear and conventional forces of the Soviet Union and its allies.
In recognition of this challenge, we are doing what we can to improve tailored intelligence for Marine Corps’ need at both the strategic and tactical levels.
— At Headquarter Marine Corps, we have combined our Intelligence Division and C4 Divisions to form the Command, Control, Communications, Computer, Intelligence and Interoperability (C412) Department under a Major General, Assistant Chief of Staff. This department will ensure execution of my C412 plans and policies which are best exemplified by recent guidance to Marine Corps general officers: “If you can’t manage information and data, you can’t command.”
— At Quantico, we are creating and bringing up to speed a service-level intelligence center within the Marine Corps Combat Development Command. I have tasked that activity with becoming, as quickly as possible, a model all-source fusion center. With assistance from the General Defense Intelligence Program, we expect this modest initiative to become a lead site for “state of the shelf” intelligence analysis tools,[iii] and serve as a catalyst for combat development activities involving force structuring, doctrine, equipment requirements, and the training and education of our warriors. The Intelligence Center will also serve as a gateway to the various reservoirs of both classified and open source knowledge about the world wherein our MAGTF’s are most likely to be employed.
— In the Fleet Marine forces we have formed the Surveillance, Reconnaissance, and Intelligence Groups (SRIG). This internal initiative brings together under one commander the resources necessary to meet the operational and tactical commander’s needs, and significantly facilitates the integration of command & control, communication, computing, and intelligence resources at the tactical level.
Our understanding of the difference between the conventional and the emerging threat is illustrated below:
Figure 1: Conventional versus Emerging Threat
This radical difference between conventional threats and emerging threats poses a strategic challenge that must be met with a strategic response. A fundamental element of our success in developing a strategic response will be our ability to agree on a broader continuum of civilian and military programs requiring in-depth sustained intelligence support. In dealing with “low intensity conflict” it is imperative that the importance of intelligence to all activities, including overt civilian and military programs, be validated, and resources applied accordingly.
Our information programs cannot succeed if intelligence does not help us understand the important cultural perspectives and the reactions of foreign groups to our themes and actions.
In brief, we believe that the very powerful repetitive technical collection capabilities we have developed against the more conventional military and industrial targets in ‘denied areas” will no longer suffice as the centerpiece of our national intelligence structure.
We must develop reliable capabilities which afford us both warning and – perhaps more importantly – understanding of emerging threats such as are predominant in the increasingly lethal and volatile Third World. I am greatly encouraged by the increasing emphasis within the U.S. intelligence community on establishing a long-term foundation for analysis of all important aspects of the Third World as well as indications and warnings of low-intensity conflict.
Implicit in this changing threat is the requirement to train and educate all of our Marines, especially our intelligence specialists, to respond to these non-traditional challenges. Intelligence professionals must also take the lead in developing useful intelligence products that help orient the intelligence consumer to the need for more and better Third world intelligence so that intelligence priorities and corresponding resource allocations are appropriately balanced.
In this era of fiscal austerity, we must apply the business concept of ‘return on investment” to our decision-making regarding intelligence in support of national security. This will help us develop a better balance between collection and processing, between emphasis on nuclear/conventional versus emerging threats, and between satisfaction of national and tactical (Country Team) requirements.
What does this mean from the Marine Corps’ point of view?
First, as noted above, it means we must recognize the needs of civilian agencies and military theater commanders coping with “low-intensity conflict” (or, my preferred term, revolutionary warfare). If threat is a factor in determining national investments in security assistance and foreign aid, then a more aggressive program of Third World intelligence analysis and forecasting is needed if we are to justify long overdue and underfunded peaceful preventive measures in this vital area of concern and potential.
It means we must do much more in funding clandestine HUMINT able to meet our needs for in-depth understanding of Third World intentions and non-conventional threats (e.g. bio-chemical terrorism).
It means we must apply technology in ways responsive to our most immediate and frequent threats, and must balance our use of technology with the intelligence cycle:
- Capabilities must be integrated both vertically and horizontally – Inter-agency policies and practices must be developed which permit the fusion of Information at every hierarchical level, beginning with the Country Team. At the same time, we should develop means of avoiding redundant processing of the same information by every agency and service;
- Information technology must be managed and exploited as an intelligence multiplier, dramatically improving the processing of collected intelligence as well as the exploitation of untapped open sources.
Externally, much more could be done to leverage information technology, especially against existing open sources of information such as Third World print and voice media. Our Intelligence Center at Quantico has worked closely with others in the intelligence community to understand where we can do better in this area. Several initiatives the Marine Corps would support but cannot unilaterally fund include:
- Establishment of a separate Open Source Committee co-equal to other national-level disciplinary committees; this is essential if community programs to apply information technology to open source exploitation are to be cost-effective and mutually reinforcing;
- Global program of selected digitization of newspapers and journals with initial emphasis on third World countries with narcotics and terrorist targets;
- Establishment of a central repository of government owned open source data bases such as developed by the Foreign Broadcast Information Service (FBIS) and the Joint Publications Research Service (JPRS);
- National program to digitize selected biographic and other hard-copy records pertaining to the Third World;
- Expansion of the Defense Gateway Information System (DGIS) to include management of the latter three initiatives; and
- Coordinated community-wide development of generic functional requirements and a common software/system solution for an intelligence analysts’ workstation with a single user interface and access to multiple remote databases at all security levels.
We must begin the difficult task of developing a comprehensive database and advanced language and area specialist cadres for all Third World countries. The Marine Corps is prepared to take the lead in this area. We see the Defense Advanced Language and Area Studies Program as a primary means to develop Third World expertise.
We must devote the same energy, and much more creativity, to the challenge of understanding indications and warning for revolutionary warfare. I include in such warfare terrorism as it might manifest itself through domestic economic sabotage and information technology “viruses”, as well as the narcotics threat.
In keeping with our commitment to the fight against illegal drugs, and the ease with which threat targets move back and forth over “the water’s edge”, we must provide strong support to law enforcement agencies as they seek to develop their “strategic” intelligence capabilities and related secure communications and methods of operations. This is a two-way street. National agencies must develop legal, automated means of receiving and exploiting raw information collected by law enforcement officials overseas.
The complexity of the operational environment in the Third World is illustrated by the specific Marine Air Ground Task Force (MAGTF) missions listed below, all part of “low intensity conflict”:
Stability Operations (Civil-Military Operations)
– Deliberate Ops
– Disaster Relief
– Civic Action
Mobile Training Teams
Internal Security Support
Limited Objective Operations (Short of General War)
– Non-combatant Evacuation
– Amphibious Raid
– Seizure of Advanced Bases
Figure 2: Low-Intensity Conflict Missions
The increasing sophistication of Third World opponents such as are represented by narco-revolutionaries and terrorists, presents us with particularly difficult challenges.
Let me illustrate one specific challenge – the SIGINT threat. Using “state of the art” commercially available equipment, they frequently outpace or avoid entirely the capabilities developed by the government through its lengthy procurement process. Below are several of the military and commercial technologies which would confront the Marine Corps in various contingency scenarios:
– Low Probability of Intercept/Low Probability of Detection (LPI/LPD) signals
– Frequency agile radios
– Direct sequence spread spectrum radios
– Burst communication
– Citizen-band and Marine-band radios
– Use of higher frequencies (communications & radars)
– Use of telephones (especially cellular telephone), land lines, and packet radio systems for voice & data
– Secure voice systems and other encryption devices
– Extremely wide variety and complexity of potential targets, creating a “needle in the haystack” problem
Figure 3: SIGINT Characteristics of Selected Third World Threats
Be assured, our SIGINT/EW planners are addressing this problem in close coordination with national and law enforcement agencies. Still, the complexity of the problem is obvious.
In closing, I would make three key points:
Revolutionary warfare is just that – revolutionary. It does not respond to negotiation or reason as we understand the terms. When revolutionaries “negotiate” they do so to buy time and improve their position. Intelligence in the 1990’s must be able to document revolutionary deception in terms stark enough to support the employment of force where appropriate;
“Low intensity conflict” Is neither “low,” “limited” nor necessarily “conflict.” It covers everything from nation-building to a Marine Corps specialty, “creating the maximum amount of violence in the smallest possible space.” Intelligence in the 1990’s must support the full spectrum of responses including overt civilian and military programs overseas, as well as law enforcement agencies at home. Intelligence must be able to tell us, down to individual personalities and neighborhoods, “who,” “where,” and “how much” of “what” is needed, and whether what has been applied has been effective. If it doesn’t know, it must have assets able to obtain and report the information within six hours of demand.
Crises and expeditionary operations in the Third World are by their nature “come as you are” affairs. We will not have the time to “surge” our intelligence (including mapping, charting, and geodesy). Nor will we have the time to train, equip, and organize our forces for radically new threats which have not been forecast. We must do our homework today in order to be truly prepared – mentally, physically, and emotionally.
Only an investment in people – advanced language and area specialists able to help us understand the Third World – will lead to the appropriate and cost-effective development of expeditionary forces trained, equipped, and organized for dealing with the emerging threats and opportunities in the Third World.
Your Marine Corps will be the first to fight; I give you my assurance we are also going to be fighting smart.”
As subsequently published:
Al Gray (Ghost-Written by Robert Steele), “Global Intelligence Challenges in the 1990’s,” American Intelligence Journal, Winter 1989-1990, pp. 37-41.
PDF (6 Pages): 1989 Global Intelligence Challenges in the 1990’s