PB2010105593fixed - Basic Counterintelligence Analysis in A Nutshell
PB2010105593fixed - Basic Counterintelligence Analysis in A Nutshell
Information
IIRs
- Imagery Websites
Internet
(ie. Lexis,
Dunn)
(i.e..
FinCEN)
Experts Witness
Surveillance
ogy (i.e.. Body Databases
wire, pen reg.)
5. Draw Conclusions and Make Recommendations
Collection
Methods x x x x x x After planning, collecting, and analyzing data, you must formulate conclusions and recommendations to report. It is at this point that
I will gather information to support or refute each of the hypotheses above and if other hypotheses are discovered, gather information you will evaluate the hypotheses developed in step 1 of the Analytical Process. A tool that will assist in selecting the most likely hypoth-
on this one also. esis is Analysis of the Competing Hypothesis (ACH).
Database
Map Link
Data Analysis Timeline Matrix Query/
Analysis Analysis
Method Reports
(Software
• Steps in Analysis of the Competing Hypothesis – With ACH you compare the supporting evidence for each hypothesis
x x
Tools, Other
Will use a timeline and link analysis to make sense of the collected data. Will also use map analysis to determine if route Jones took against the others. You then identify all reasonable alternatives and compete them against each other to determine which is best.
Tools)
was used by other Foreign intel agents. Many people rely on their intuition, picking what they suspect is the likely answer, then seeking evidence that supports this point
Written Informal PowerPoint of view. If they find enough evidence to support the favorite hypothesis, they pat themselves on the back and look no further. If
Reports Briefing Pres.
Reporting
Method x x the evidence points to another conclusion, they reject it as misleading or develop another hypothesis, which they attempt to prove
Present findings to JAY in a PowerPoint presentation. through the same procedure. This mindset prevents them from fully evaluating the data and what they end up with is the first solu-
2 tion that seems satisfactory. Don’t do that. Instead:
7
required data from the telephone company is obtained, you must develop hypotheses) to drive the collection plan. The plan should include all possible sources of information that are relevant to each
Figure 7. Telephone Toll Analysis
organize and analyze it to convert it to a useful form. requirement element, along with the planned analysis method and reporting procedures.
• Frequency Analysis depicts the frequency of numbers called 3. Collect and Collate Information
from the target phone. Figure 6 is a simple example. Collect and collate information according to the project plan.
Apartment Condo (1720 10th St., VA Beach, VA 23666) $68,000.00 $68,000.00 $68,000.00
description.
Apartment Condo (7782 11th St., Ocean City, NJ 21842) $0.00 $244,400.00 $244,400.00 • Search Engines (Google, http://search.yahoo.com) are very large databases with a search engine “robot” that explores the Internet
House (30052 Bangor Rd., Bala Cynwyd, PA 19004) $0.00 $0.00 $380,000.00 and copies web pages into their databases. These search engines support detailed keyword searches.
Lexus (1993) $14,000.00 $13,000.00 $12,000.00 • Metasearch Engines (Dogpile, Metacrawler) reach multiple databases and search engines simultaneously, returning results from
each at once. Thus, the user can conduct multiple searches by entering the search criteria once. Results vary, so try more than one.
Mercedes Benz (2001) $0.00 $0.00 $37,000.00
• Linear Search Engines ( www.kartoo.com and http://vivisimo.com) are metasearch engines that display query results in a link
Paintings $0.00 $4,000.00 $14,000.00 chart that relates the results to other sites or sub-topics.
Total Assets $374,800.00 $634,400.00 $1,064,400.00 • Clustering Search Engines (http://clusty.com or webclust.com) are metasearch engines that extract data into groups, such as top-
ics, sources, or urls, and display statistics showing what information relates to which part of the search criteria
entered by the user.
Mortgage (21005 Valenton Rd, Richmond, VA 15888) $180,000.00 $179,200.00 $178,200.00 • Virtual Libraries ( Joe’s guide to widgets) are built by subject experts and focus on a specific
Liabilities (-)
Mortgage (1720 10th St., VA Beach, VA 23666) $40,000.00 $39,300.00 $38,600.00 subject. Many can be found in Yahoo web directories, indices, FAQ’s, organizations
(www.vlib.com).
Mortgage (7782 11th St., Ocean City, NJ 21842) $0.00 $150,000.00 $149,200.00
3. Search Mailing lists, Reflectors, Listservs email information to people who are part of
Mortgage (30052 Bangor Rd., Bala Cynwyd, PA 19004) $0.00 $0.00 $270,000.00 the group or interest association. You can find these groups searching for your group and adding the phrase
Bank Loan $35,000.00 $32,800.00 $20,000.00 “mailing list.”
Total Liabilities $255,000.00 $401,300.00 $656,000.00 4. Search Usenet Newsgroups allow individuals to post comments on particular topics. They also allow
others to post responses. You can locate these newsgroups using Google “groups” (http://www.google.com).
5. Specific Search Engines provide a deeper search for specific topics.
Net Worth $119,800.00 $233,100.00 $408,400.00
• Search Systems links to over 30,000 public record databases (http://www.searchsystems.
Less: Networth of Previous Year $119,800.00 $233,100.00 net/).
Increase in Networth $113,300.00 $175,300.00 • Publicly Held Business Records can be found at (http://www.sec.gov/), Hoover’s Online
(http://www.hoovers.com/free/).
Add: Personal Living Expenses (+) $64,400.00 $81,700.00
• Search Engines Worldwide include (http://www.searchenginecolossus.com/)
Total Income $297,500.00 $490,100.00
• Phone Directories, People finders, Yellow and White Page directories include (http://www.melissadata.com/lookups/),
Less: Income from Known Sources Microsoft Salary (-) $85,000.00 $105,000.00 (http://peoplesearch.net/), (http://refdesk.whitepages.com/).
Income from Unidentified Sources $212,500.00 $385,100.00 • Imagery can be found at http://local.live and http://earth.google.com.
6 3
• Research Portal containing references and links is Refdesk at http://www.refdesk.com. • Flow Charts show the progression of activities over time. The purpose of a flowchart is to graphically depict relationships be-
• Live Airline Tracker is at www.aeroseek.com/links/tracking2.html. tween activities, events, and commodities.
• Real Estate information can be obtained from www.netroline.com/public_records.htm; http://realestate.yahoo.com/re/ 1. Activities Flow Charts pinpoint sequential patterns of activity. It is useful in illustrating a process or sequence where one activ-
homevalues/; www.zillow.com. ity depends upon completion of another.
6. Data Removed from the Internet can be obtained from The Wayback Machine site (http://www.archive.org/).
2. Event Flow Charts is a timeline of an organization and/or individual’s activities.
Federal Agency Sources can provide a multitude of unclassified and classified data sources that track people, organizations,
finances, and countries. This information is collected on topics of interest to military and civilian agencies. They include aviation, postal 3. Commodity Flow Charting assists in determining the distribution pattern of weapons, money, goods, or services within an
service, border control, law enforcement, and homeland security. intelligence or criminal network. It is also useful in helping to identify key players in an organization’s hierarchy.
Major Computer Data Sources include Federal agency databases, such as defense personnel (Defense Manpower Data Center • Link Charts show the relationship between people and entities. They provide an overview of the interrelationships among the
[DMDC]), fi nancial crimes and money laundering (Financial Crimes Enforcement Network [FinCEN]), and many others. subjects of complex conspiracy investigations. They are used when there is a large amount of data, a need to show relationships be-
tween a number of people and organizations. To create a link chart you must first list all chart entities in an association matrix. From
State and Local Sources, such as state police departments, provide criminal and forensic services.
the matrix, you decide who is at the center of the organization and create the link chart from the matrix.
Confidential Informants, also known as assets, confidential sources, or cooperating witnesses, can be a most valuable source of
information in any investigation. Many times such sources provide specific information that cannot be obtained by any other means;
often because they have been involved in criminal, espionage, or terrorist activities themselves and have trusted access to others involved Figure 5. Link Chart
in the same activities. Their reliability, and therefore, their information, must always be verified, as their motives for talking to you can Step 1. Create an Association Matrix Step 2. From the Association Matrix,
range from money, revenge, fear, ego, guilt about past wrong-doing, to simple good citizenship. Create a Link Chart
“Mohammad’s Right Hand” Association Matrix “Mohammad’s Right Hand” Attack Cell
Private Business Databases maintain vast records on customer purchases, fi nancing, background, and other useful information.
They also maintain information on every aspect of their business operations.
Commercial Databases contain very detailed information about people, businesses, and organizations not only in the U.S. but
in many other countries. Examples include names, addresses, relatives, neighbors, home purchase price, news media from around the
world, and legal research.
Investigative Technology consists of covert devices that record, transmit, and listen such that they collect valuable information
undetected.
3 b. Collate Information
After you have collected all information that would support or not support each of your hypotheses, organize your information such that
information relating to each hypothesis is grouped with that hypothesis.
4. Analyze and
Evaluate Information Figure 3. Timeline of M’Aziq-Heri Activities
Compare, contrast, and review data,
looking not only at what is there, but
what is missing. Formulate leads to Link Chart Rules
feed back into the analytical cycle as Use solid lines for confirmed/ Box entities that Associating people No crossed lines. No curved lines.
necessary. Specific analytical tools are strong links and dashed lines are associated with with multiple
invaluable in analyzing data. for unconfirmed/weak links. each other. associations.
Analyze
There are a number of techniques to Figure 4. Flow of Funds to Support M’Aziq-Heri
aid in analysis, including: pen and paper
analysis and computer programs (spread-
sheet analysis). For example:
• Timelines graphically display facts
in chronological order, making it • Telephone Toll Analysis has many uses in an investigation.
easier to understand what took place It is one of the most important methods of collecting data. It Figure 6. Frequency Analysis
when. They are useful in preparing for provides evidence of associations, contact between two phones, for Peter Grey Telephone Tolls
interviews, conducting interrogations, identifies previously unknown associates, corroborates informant 5/9/2002
informing key players, and provid- information, assists in establishing probable cause for wiretaps, Target Number Number Called # of Calls
ing clear courtroom demonstrations. and provides evidence in court proceedings. Forms of com- (834) 777-8695 (993) 898-2385 6
Timelines can also be used to show munication include phones, pagers, cell phones, computers, fax
patterns that might lead to prediction (834) 777-8695 (993) 283-9491 2
machines, PDAs. Raw data acquired from telephone companies
of future events. (834) 777-8695 (993) 348-3422 3
has little value because of the volume of information. Once the
4 5
• Research Portal containing references and links is Refdesk at http://www.refdesk.com. • Flow Charts show the progression of activities over time. The purpose of a flowchart is to graphically depict relationships be-
• Live Airline Tracker is at www.aeroseek.com/links/tracking2.html. tween activities, events, and commodities.
• Real Estate information can be obtained from www.netroline.com/public_records.htm; http://realestate.yahoo.com/re/ 1. Activities Flow Charts pinpoint sequential patterns of activity. It is useful in illustrating a process or sequence where one activ-
homevalues/; www.zillow.com. ity depends upon completion of another.
6. Data Removed from the Internet can be obtained from The Wayback Machine site (http://www.archive.org/).
2. Event Flow Charts is a timeline of an organization and/or individual’s activities.
Federal Agency Sources can provide a multitude of unclassified and classified data sources that track people, organizations,
finances, and countries. This information is collected on topics of interest to military and civilian agencies. They include aviation, postal 3. Commodity Flow Charting assists in determining the distribution pattern of weapons, money, goods, or services within an
service, border control, law enforcement, and homeland security. intelligence or criminal network. It is also useful in helping to identify key players in an organization’s hierarchy.
Major Computer Data Sources include Federal agency databases, such as defense personnel (Defense Manpower Data Center • Link Charts show the relationship between people and entities. They provide an overview of the interrelationships among the
[DMDC]), fi nancial crimes and money laundering (Financial Crimes Enforcement Network [FinCEN]), and many others. subjects of complex conspiracy investigations. They are used when there is a large amount of data, a need to show relationships be-
tween a number of people and organizations. To create a link chart you must first list all chart entities in an association matrix. From
State and Local Sources, such as state police departments, provide criminal and forensic services.
the matrix, you decide who is at the center of the organization and create the link chart from the matrix.
Confidential Informants, also known as assets, confidential sources, or cooperating witnesses, can be a most valuable source of
information in any investigation. Many times such sources provide specific information that cannot be obtained by any other means;
often because they have been involved in criminal, espionage, or terrorist activities themselves and have trusted access to others involved Figure 5. Link Chart
in the same activities. Their reliability, and therefore, their information, must always be verified, as their motives for talking to you can Step 1. Create an Association Matrix Step 2. From the Association Matrix,
range from money, revenge, fear, ego, guilt about past wrong-doing, to simple good citizenship. Create a Link Chart
“Mohammad’s Right Hand” Association Matrix “Mohammad’s Right Hand” Attack Cell
Private Business Databases maintain vast records on customer purchases, fi nancing, background, and other useful information.
They also maintain information on every aspect of their business operations.
Commercial Databases contain very detailed information about people, businesses, and organizations not only in the U.S. but
in many other countries. Examples include names, addresses, relatives, neighbors, home purchase price, news media from around the
world, and legal research.
Investigative Technology consists of covert devices that record, transmit, and listen such that they collect valuable information
undetected.
3 b. Collate Information
After you have collected all information that would support or not support each of your hypotheses, organize your information such that
information relating to each hypothesis is grouped with that hypothesis.
4. Analyze and
Evaluate Information Figure 3. Timeline of M’Aziq-Heri Activities
Compare, contrast, and review data,
looking not only at what is there, but
what is missing. Formulate leads to Link Chart Rules
feed back into the analytical cycle as Use solid lines for confirmed/ Box entities that Associating people No crossed lines. No curved lines.
necessary. Specific analytical tools are strong links and dashed lines are associated with with multiple
invaluable in analyzing data. for unconfirmed/weak links. each other. associations.
Analyze
There are a number of techniques to Figure 4. Flow of Funds to Support M’Aziq-Heri
aid in analysis, including: pen and paper
analysis and computer programs (spread-
sheet analysis). For example:
• Timelines graphically display facts
in chronological order, making it • Telephone Toll Analysis has many uses in an investigation.
easier to understand what took place It is one of the most important methods of collecting data. It Figure 6. Frequency Analysis
when. They are useful in preparing for provides evidence of associations, contact between two phones, for Peter Grey Telephone Tolls
interviews, conducting interrogations, identifies previously unknown associates, corroborates informant 5/9/2002
informing key players, and provid- information, assists in establishing probable cause for wiretaps, Target Number Number Called # of Calls
ing clear courtroom demonstrations. and provides evidence in court proceedings. Forms of com- (834) 777-8695 (993) 898-2385 6
Timelines can also be used to show munication include phones, pagers, cell phones, computers, fax
patterns that might lead to prediction (834) 777-8695 (993) 283-9491 2
machines, PDAs. Raw data acquired from telephone companies
of future events. (834) 777-8695 (993) 348-3422 3
has little value because of the volume of information. Once the
4 5
required data from the telephone company is obtained, you must develop hypotheses) to drive the collection plan. The plan should include all possible sources of information that are relevant to each
Figure 7. Telephone Toll Analysis
organize and analyze it to convert it to a useful form. requirement element, along with the planned analysis method and reporting procedures.
• Frequency Analysis depicts the frequency of numbers called 3. Collect and Collate Information
from the target phone. Figure 6 is a simple example. Collect and collate information according to the project plan.
Apartment Condo (1720 10th St., VA Beach, VA 23666) $68,000.00 $68,000.00 $68,000.00
description.
Apartment Condo (7782 11th St., Ocean City, NJ 21842) $0.00 $244,400.00 $244,400.00 • Search Engines (Google, http://search.yahoo.com) are very large databases with a search engine “robot” that explores the Internet
House (30052 Bangor Rd., Bala Cynwyd, PA 19004) $0.00 $0.00 $380,000.00 and copies web pages into their databases. These search engines support detailed keyword searches.
Lexus (1993) $14,000.00 $13,000.00 $12,000.00 • Metasearch Engines (Dogpile, Metacrawler) reach multiple databases and search engines simultaneously, returning results from
each at once. Thus, the user can conduct multiple searches by entering the search criteria once. Results vary, so try more than one.
Mercedes Benz (2001) $0.00 $0.00 $37,000.00
• Linear Search Engines ( www.kartoo.com and http://vivisimo.com) are metasearch engines that display query results in a link
Paintings $0.00 $4,000.00 $14,000.00 chart that relates the results to other sites or sub-topics.
Total Assets $374,800.00 $634,400.00 $1,064,400.00 • Clustering Search Engines (http://clusty.com or webclust.com) are metasearch engines that extract data into groups, such as top-
ics, sources, or urls, and display statistics showing what information relates to which part of the search criteria
entered by the user.
Mortgage (21005 Valenton Rd, Richmond, VA 15888) $180,000.00 $179,200.00 $178,200.00 • Virtual Libraries ( Joe’s guide to widgets) are built by subject experts and focus on a specific
Liabilities (-)
Mortgage (1720 10th St., VA Beach, VA 23666) $40,000.00 $39,300.00 $38,600.00 subject. Many can be found in Yahoo web directories, indices, FAQ’s, organizations
(www.vlib.com).
Mortgage (7782 11th St., Ocean City, NJ 21842) $0.00 $150,000.00 $149,200.00
3. Search Mailing lists, Reflectors, Listservs email information to people who are part of
Mortgage (30052 Bangor Rd., Bala Cynwyd, PA 19004) $0.00 $0.00 $270,000.00 the group or interest association. You can find these groups searching for your group and adding the phrase
Bank Loan $35,000.00 $32,800.00 $20,000.00 “mailing list.”
Total Liabilities $255,000.00 $401,300.00 $656,000.00 4. Search Usenet Newsgroups allow individuals to post comments on particular topics. They also allow
others to post responses. You can locate these newsgroups using Google “groups” (http://www.google.com).
5. Specific Search Engines provide a deeper search for specific topics.
Net Worth $119,800.00 $233,100.00 $408,400.00
• Search Systems links to over 30,000 public record databases (http://www.searchsystems.
Less: Networth of Previous Year $119,800.00 $233,100.00 net/).
Increase in Networth $113,300.00 $175,300.00 • Publicly Held Business Records can be found at (http://www.sec.gov/), Hoover’s Online
(http://www.hoovers.com/free/).
Add: Personal Living Expenses (+) $64,400.00 $81,700.00
• Search Engines Worldwide include (http://www.searchenginecolossus.com/)
Total Income $297,500.00 $490,100.00
• Phone Directories, People finders, Yellow and White Page directories include (http://www.melissadata.com/lookups/),
Less: Income from Known Sources Microsoft Salary (-) $85,000.00 $105,000.00 (http://peoplesearch.net/), (http://refdesk.whitepages.com/).
Income from Unidentified Sources $212,500.00 $385,100.00 • Imagery can be found at http://local.live and http://earth.google.com.
6 3
Tools For Overcoming Mindsets: analysis, you use accounting and auditing techniques to
Figure 9. Known vs. Unknown Income
link financial events. You can find financial data in records
Technique Description When to Use
from many sources: people, public records, real estate,
Devil’s Advocacy Challenging a single, strongly held view or consen- Best performed just before sending a paper out for coordina- corporate/business, UCC fi lings, court records, DMV, tax,
sus by building the best possible case for an alterna- tion or presenting key conclusions to senior officials. Also and financial institutions. Spreadsheet software is very use-
tive explanation. helpful when there is widespread consensus on a critical issue. ful in financial investigations for gathering and organizing
Team A/Team B Using independent analytic teams to contrast two Most useful when there are competing views within the ana- data, and for calculating the subject’s financial status. Net
Analysis (or more) strongly held views or competing hypoth- lytic or policy communities or a single, strongly held view that worth is calculated as follows: Assets – Liabilities = Net
eses. needs to be challenged. Worth. Figure 8 is an example of the use of this software
Analysis of Identifying a complete set of alternative hypotheses, When an overarching framework is needed to capture all in tracking net worth.
Competing systematically evaluating data that is consistent and possible hypotheses and there is a robust flow of data to ab-
Hypotheses inconsistent with each hypothesis, and rejecting sorb and evaluate. Useful for dealing with controversial issues, • Map Analysis helps the analyst see patterns and as-
hypotheses that contain too much inconsistent data. especially when denial and deception may be present. sociations that are not easily detected from texts. Layering
Alternative Fu- A systematic method for identifying alternative tra- Useful for reducing uncertainty, anticipating surprise, and data on the map (contacts, places, events, times) makes
tures Analysis jectories by developing plausible but mind-stretch- uncovering “unknown unknowns” when dealing with little it easy to note the subject’s proximity to associates and
ing “stories” based on critical uncertainties in order concrete information. activities, and may reveal tradecraft and “hot” areas. The
to illuminate decisions made today. map might show stops at or near locations associated with
Quadrant A structured brainstorming technique for chal- Most useful for dealing with highly ambiguous issues, such as intelligence activities; or overlay surveillance results for
Crunching lenging assumptions and discovering “unknown terrorist threats, when little data is available. multiple subjects/
unknowns.” organizations to Figure 10. Map Analysis
compare foreign
Deception The systematic use of checklists to determine when When the analysis hinges on a critical piece of evidence and
intelligence enti- Surveillance
Detection to look for deception, if it actually may be present, accepting the data would require changing key assumptions or
ties’ routes, stops, Route
and how to avoid being deceived expending/diverting major resources.
or associations.
Information
IIRs
- Imagery Websites
Internet
(ie. Lexis,
Dunn)
(i.e..
FinCEN)
Experts Witness
Surveillance
ogy (i.e.. Body Databases
wire, pen reg.)
5. Draw Conclusions and Make Recommendations
Collection
Methods x x x x x x After planning, collecting, and analyzing data, you must formulate conclusions and recommendations to report. It is at this point that
I will gather information to support or refute each of the hypotheses above and if other hypotheses are discovered, gather information you will evaluate the hypotheses developed in step 1 of the Analytical Process. A tool that will assist in selecting the most likely hypoth-
on this one also. esis is Analysis of the Competing Hypothesis (ACH).
Database
Map Link
Data Analysis Timeline Matrix Query/
Analysis Analysis
Method Reports
(Software
• Steps in Analysis of the Competing Hypothesis – With ACH you compare the supporting evidence for each hypothesis
x x
Tools, Other
Will use a timeline and link analysis to make sense of the collected data. Will also use map analysis to determine if route Jones took against the others. You then identify all reasonable alternatives and compete them against each other to determine which is best.
Tools)
was used by other Foreign intel agents. Many people rely on their intuition, picking what they suspect is the likely answer, then seeking evidence that supports this point
Written Informal PowerPoint of view. If they find enough evidence to support the favorite hypothesis, they pat themselves on the back and look no further. If
Reports Briefing Pres.
Reporting
Method x x the evidence points to another conclusion, they reject it as misleading or develop another hypothesis, which they attempt to prove
Present findings to JAY in a PowerPoint presentation. through the same procedure. This mindset prevents them from fully evaluating the data and what they end up with is the first solu-
2 tion that seems satisfactory. Don’t do that. Instead:
7
1. Identify the possible hypotheses
to be considered. Use a group
Figure 11. Analysis of Competing Hypotheses Basic Counterintelligence Analysis in a Nutshell
of analysts with different perspec-
tives to brainstorm the possibili-
ties. Avoid discounting anyone’s
Quick Reference Guide
views simply because they are By Irvin D. Sugg, Jr., B.S., J.D., Course Chairman, CI Analysis Course
unpopular with you or your Joint Counterintelligence Training Academy
organization.
2. Make a list of significant Introduction to CI Analysis
evidence and arguments for and This guide describes a step-by-step methodology for employing analytical skills and processes. It introduces analytical tools and suggests
against each hypothesis. some sources of information that can be useful in CI situations, and can help you organize and process facts efficiently and effectively.