Tactical Intelligence Reading List
Key Starter References
Structured Analytic Techniques for Intelligence Analysis
Randolph H. Pherson; Richards J. Heuer JR. (Second edition, 2015) A reference text for techniques to aid assessments
Open Source Intelligence in a Networked World (Continuum Intelligence Studies)
Anthony Olcott, 2012
Critical Thinking and Intelligence Analysis
David T.Moore, 2nd Feb 2016
Psychology of Intelligence Analysis
Heuer again on the ways our thinking skews our conclusions
Quick Wins for Busy Analysts
The UK intelligence community’s summary guide to analytic techniques. Best used as a reference rather than a learning guide
Canadian "Aide Memoire"
Much greater depth than the UK quick guide.
Expanding the Library
The Craft of Intelligence
Allen W.Dulles, 2016: CIA director tells his story. Quite funny in places: such as putting up a sign at CIA headquarters to make it less of a secret and therefore less interesting…
Choices, Values, and Frames
Daniel Kahneman: This and his others here are all about how we judge things in general, and very interesting if somewhat large (and pricey!). Unfortunately I think Tversky was the driver for these but died a few years ago, so not much more coming. Not all of their conclusions are solid.
Thinking Fast and Slow
Daniel Kahneman
Understanding the Intelligence Cycle (Studies in Intelligence)
Mark Phythian (Editor, 2015): How to analyse rather than just follow processes
The Art & Science of Intelligence Analysis
Julian Richards: Quite Pricey.
Judgement under Uncertainty: Heuristics and Biases
Daniel Kahneman
Bad Science
Ben Goldacre: some basic points about scientific analysis. Doesn’t always work well for the more scrappy evidence available to intelligence analysts, but good for general real world approaches and being all scientific and everything. Quite a lively chap and more books since, possibly worth reading.
The Art of Intelligence: Simulations, Exercises, and Games (Security and Professional Intelligence Education Series)
Lahneman & Arcos 2014: Some outline games and exercises to practice with.
How We Know What Isn't So: Fallibility of Human Reason in Everyday Life
Thomas Gilovich: for some more general approaches to evaluating ‘truth’.
The Black Swan: The Impact of the Highly Improbable
Nassim Nicholas Taleb
Journals and Collections
Intelligence and National Security
Prepared by the US Government, 2009
Analytical Methods for Social Research
Cambridge Core
The International Journal of Intelligence, Security and Public Affairs
Taylor and Francis Online
CIA's books & Monographs
Prepared by the US Government, 2009
Investigative Reporters abd Editors Journal
Published four times a year and contains how-to stories, investigative ideas, FOIA tips and more.
International Journal of Intelligence and Counter Intelligence
Taylor and Francis Online
FDD Long War Journal
FDD’s Long War Journal is dedicated to providing original and accurate reporting and analysis of the Long War (also known as the Global War on Terror).
Related Topics
Non-military suggestions welcome!
Principles of War
Carl von Clausewitz
The Defense of Duffer's Drift
Small Wars Journal
The Prince
Niccolo Machiavelli
Dominating Duffer's Domain: Lessons for the U.S. Army Information Operations Practitioner
Christopher Paul, William Marcellino
The Art of War
Sun Tzu, 2009
Interesting Publications
“This article intends to contribute to our understanding of disinformation, by analyzing the numerous deceptive messages that were spread in the aftermath of Malaysia Airlines flight MH17, that crashed in the summer of 2014 in eastern Ukraine.”
S. Reitjens
“In a true experiment conforming to the criteria of a randomized controlled trial (RCT), we found that intelligence analysts assign significantly more credibility to secret intelligence than to identical open-source intelligence.”
T. Pedersen
“The right information must be balanced by the right ignorance to avoid overloading intelligence work”
M Hill, J Salt
“Effective communication of information is essential to intelligence work. This paper identifies the main obstacles to good communication: policy-related challenges; cognitive impediments; resource limitations; cultural and structural issues within intelligence communities; and technical information..”
D. Lonsdale
“This article attends to the practice of communicating intelligence to the public. It does so in order to show the diversity of communication practices in Western intelligence today.”
K.L. Petersen
“Despite significant advancements in academia and public policy on identifying, deterring, and mitigating cyber incidents, there is a general discontent among NATO agencies, member states’ governments, and intelligence agencies that their strategy against cyber incidents is primarily reactive and implemented post factum, rather than proactive and executed before such attacks occur.”
B.Lilly, L.Ablon, Q.E.Hodgson, A.Moore
“In a foreseeable future, battles may unfold using weapons and tactics that the United States is ill-pre-pared to detect or counter. Today’s ballistic missiles take tens of minutes to cross an ocean, but tomorrow’s hypersonic weapons may take merely minutes.”
C.Weinbaum, J.N.T Shanahan
“As the Internet has become a nearly ubiquitous resource for acquiring knowledge about the world, questions have arisen about its potential effects on cognition. Here we show that searching the Internet for explanatory knowledge creates an illusion whereby people mistake access to information for their own personal understanding of the information. “
M.Fisher, M.K Goddu, F.C Keil
“This article outlines important considerations in the search strategy and recommends practical advice for students to ensure best use of their valuable time. It is suggested that a systematic, organised search of the literature, that uses available resources effectively, is more likely to produce quality work.”
F. Timmins, C. McCabe
“In this article, expression of the quest for knowledge and understanding while living with the threat of fatal cancer is explored. By means of a case study, recurrent narrative interviews and participant observations were performed with one 71-year-old man and the oncology nurse taking care of him.”
F.Friberg, J.Ohlen
“We critically examine information evaluation methods, arguing that they mask rather than effectively guide subjectivity in intelligence assessment. Drawing on the guidance metaphor, we propose that rigid ‘all-purpose’ information evaluation methods be replaced by flexible ‘context-sensitive’ guidelines aimed at improving the soundness, precision, accuracy and clarity of irreducibly subjective judgments.”
D. Irwin, D. Mandel
“Addressing deficiencies in the dissemination and transfer of research-based knowledge into routine clinical practice is high on the policy agenda both in the UK and internationally. However, there is lack of clarity between funding agencies as to what represents dissemination.”
P.M. Wilson, M.Petticrew, M.W. Calnan, I. Nazareth
Taylor and Francis Online
What Can be Learnt from Efforts on Terrorist Financing?
Royal United Services Institute
book, training and intelligence
Taylor and Francis Online
Webpages and Podcasts
“Linear and Logistic regressions are usually the first algorithms people learn in data science. Due to their popularity, a lot of analysts even end up thinking that they are the only form of regressions. The ones who are slightly more involved think that they are the most important among all forms of regression analysis.”
Analytics Vidha
“Discriminant analysis is a vital statistical tool that is used by researchers worldwide. Machine learning, pattern recognition, and statistics are some of the spheres where this practice is widely employed. So, what is discriminant analysis and what makes it so useful? “
Digital Vidya
“Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment. Multiple service providers recommend 8-character minimum passwords based on outdated data. “
Black Hills Information Security
“The title of this article was supposed to be “Top 10 Free Phishing Simulators”. However, after much searching, trying, visiting of broken links, filling out forms and signing up for mailing lists, it became clear that the combination of “free” and “top” really narrows down the selection to very few actual choices for phishing training. The final list does not include any of the fishy (pardon the pun) apps that let you create a fake website for collecting data.”
InfoSec
“When the internet began to take centre stage to businesses, and our lives – each new generation experiences increasingly sophisticated cyber attacks, and this brings about greater damage. The cybersecurity market and industry have had to evolve to effectively counter these attacks”
Get Smarter
“Business transformation is always a security risk. New technology and working practices need new security measures; but normally this risk is managed carefully, and over time. Covid-19 has not afforded us that luxury. For some businesses the scale and speed of this change will be unprecedented. It is also very public; attackers are aware of the situation and already exploiting it.”
Dark Trace
“There is a growing consensus that attacks against U.S. facilities and personnel in Iraq by Iran-backed Shiite Militia Groups (SMGs) are increasingly becoming a “new normal.” These attacks ebb and flow pursuant to several political conditions, some of which remain outside the control of the U.S. “
FDD Long War Journal
In this blog post we share four creative methods of research dissemination. These are inspired by the knowledge café organised by the Social Research Association North.
Research Retold