Appendix B
Relevant Readings

INTELLIGENCE AND INTELLIGENCE ANALYSIS-GENERAL

Bennett, M., and Waltz, E. (2007). Counterdeception: Principles and applications for national security. Boston: Artech House.

Bruce, J.B. (2008). Making analysis more reliable: Why epistemology matters to intelligence In R.Z. George and J.B. Bruce (Eds.), Analyzing intelligence: Origins, obstacles, and innovations (pp. 171-190). Washington, DC: Georgetown University Press.

Bruce, J.B., and Bennett, M. (2008). Foreign denial and deception: Analytical imperatives. In R.Z. George and J.B. Bruce (Eds.), Analyzing intelligence: Origins, obstacles, and innovations (pp. 122-137). Washington, DC: Georgetown University Press.

Clark, R.M. (2007). Intelligence analysis: A target-centric approach. Washington, DC: CQ Press.

Davis, J. (1999). Introduction: Improving intelligence analysis at CIA: Dick Heuer’s contribution to intelligence analysis. In R.J. Heuer, Jr. (Ed.), Psychology of intelligence analysis (pp. xiii-xxv). Washington, DC: Center for the Study of Intelligence, Central Intelligence Agency.

Folker, R. (2000). Intelligence analysis in theater joint intelligence centers: An experiment in applying structured methods. Occasional Paper 7. Washington, DC: Joint Military Intelligence College. Available: http://www.au.af.mil/au/awc/awcgate/dia/analysis_structured. pdf [accessed February 2010].

George, R.Z., and Bruce, J.B. (2008). Analyzing intelligence: Origins, obstacles, and innovations. Washington, DC: Georgetown University Press.

Goodson, R., and Wirtz, J. (2008). Strategic denial and deception: The twenty-first century challenge. In R. Goodson and J.J. Wirtz (Eds.), Strategic denial and deception: The twenty-first century challenge (pp. 1-14). London: Transaction.

Heuer, R.J., Jr. (Ed.). (1979). Quantitative approaches to political intelligence: The CIA experience. Boulder, CO: Westview Press.

Heuer, R.J., Jr. (1999). Psychology of intelligence analysis. Washington, DC: Center for the Study of Intelligence, Central Intelligence Agency.



The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement



Below are the first 10 and last 10 pages of uncorrected machine-read text (when available) of this chapter, followed by the top 30 algorithmically extracted key phrases from the chapter as a whole.
Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

Do not use for reproduction, copying, pasting, or reading; exclusively for search engines.

OCR for page 99
Appendix B Relevant Readings INTELLIGENCE AND INTELLIGENCE ANALYSIS-GENERAL Bennett, M., and Waltz, E. (2007). Counterdeception: Principles and applications for national security. Boston: Artech House. Bruce, J.B. (2008). Making analysis more reliable: Why epistemology matters to intelligence In R.Z. George and J.B. Bruce (Eds.), Analyzing intelligence: Origins, obstacles, and innova- tions (pp. 171-190). Washington, DC: Georgetown University Press. Bruce, J.B., and Bennett, M. (2008). Foreign denial and deception: Analytical imperatives. In R.Z. George and J.B. Bruce (Eds.), Analyzing intelligence: Origins, obstacles, and innova- tions (pp. 122-137). Washington, DC: Georgetown University Press. Clark, R.M. (2007). Intelligence analysis: A target-centric approach. Washington, DC: CQ Press. Davis, J. (1999). Introduction: Improving intelligence analysis at CIA: Dick Heuer’s contri - bution to intelligence analysis. In R.J. Heuer, Jr. (Ed.), Psychology of intelligence analysis (pp. xiii-xxv). Washington, DC: Center for the Study of Intelligence, Central Intelligence Agency. Folker, R. (2000). Intelligence analysis in theater joint intelligence centers: An experiment in apply - ing structured methods. Occasional Paper 7. Washington, DC: Joint Military Intelligence College. Available: http://www.au.af.mil/au/awc/awcgate/dia/analysis_structured. pdf [accessed February 2010]. George, R.Z., and Bruce, J.B. (2008). Analyzing intelligence: Origins, obstacles, and innovations. Washington, DC: Georgetown University Press. Goodson, R., and Wirtz, J. (2008). Strategic denial and deception: The twenty-first century challenge. In R. Goodson and J.J. Wirtz (Eds.), Strategic denial and deception: The twenty- first century challenge (pp. 1-14). London: Transaction. Heuer, R.J., Jr. (Ed.). (1979). Quantitative approaches to political intelligence: The CIA experience. Boulder, CO: Westview Press. Heuer, R.J., Jr. (1999). Psychology of intelligence analysis. Washington, DC: Center for the Study of Intelligence, Central Intelligence Agency. 

OCR for page 99
00 FIELD EVALUATION Johnston, R. (2005). Analytic culture in the U.S. intelligence community. Washington, DC: Cen- ter for the Study of Intelligence, Central Intelligence Agency. Available: https://www. cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and- monographs/analytic-culture-in-the-u-s-intelligence-community/analytic_culture_ report.pdf [accessed February 2010]. Kennedy, R. (2008). Of knowledge and power: The complexities of national intelligence. Wesport, CT: Praeger Security International. Kent, S. (1949). Strategic intelligence for American world policy. Princeton, NJ: Princeton Uni- versity Press. Kent, S. (1955). The need for an intelligence literature. Reprinted in D.P. Steury (Ed.), Sherman Kent and the Board of National Estimates. Washington, DC: Center for the Study of Intelligence, Central Intelligence Agency. Available: https://www.cia.gov/ library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/ sherman-kent-and-the-board-of-national-estimates-collected-essays/2need.html [ac- cessed February 2010]. Kent, S. (1964). Words of estimative probability. Reprinted in D.P. Steury (Ed.), Sherman Kent and the Board of National Estimates. Washington, DC: Center for the Study of Intel- ligence, Central Intelligence Agency. Available: https://www.cia.gov/library/center- for-the-study-of-intelligence/csi-publications/books-and-monographs/sherman-kent- and-the-board-of-national-estimates-collected-essays/6words.html [accessed February 2010]. Lehner, P. (2009). The objective analysis of analysis. Paper presented at the Community of In- terest for the Practice and Organization of Intelligence Ottawa Roundtable “What Can the Cognitive and Behavioral Sciences Contribute to Intelligence Analysis?: Towards a Collaborative Agenda for the Future,” February, Meech Lake, Quebec. Mandel, D.R. (2009). Setting the stage: The role of science in applied communities. Paper pre- sented at the Community of Interest for the Practice and Organization of Intelligence Ottawa Roundtable “What Can the Cognitive and Behavioral Sciences Contribute to Intelligence Analysis?: Towards a Collaborative Agenda for the Future,” February, Meech Lake, Quebec. Marrin, S. (2009). Training and educating U.S. intelligence analysts. International Journal of Intelligence and Counter-Intelligence, , 131-146. Milgram, S. (1974). Obedience to authority: An experimental view. New York: Harper & Row. Moore, D.T. (2006). Critical thinking and intelligence analysis. Occasional Paper Number 14. Joint Military Intelligence College, May. Rieber, S. (2004). Intelligence analysis and judgmental calibration. International Journal of Intelligence and Counter-Intelligence, , 97-112. Rieber, S., and Thomason, N. (2006). Toward improving intelligence analysis: Creation of a National Institute of Analytic Methods. Studies in Intelligence, (4), 71. Sims, J.E., and Gerber, B. (2005). Transforming U.S. intelligence. Washington, DC: Georgetown University Press. Swenson, R.G. (2002). Meeting the community’s continuing need for an intelligence litera - ture. Defense Intelligence Journal, (2), 87-98. Warner, M. (2009). Sources and methods for the study of intelligence. In L.K. Johnson (Ed.), Handbook of intelligence studies (pp. 17-27). New York: Routledge. Weinstein, N. (1980). Unrealistic optimism about future life events. Journal of Personality and Social Psychology, , 806-820. Westerfield, H.B. (Ed.). (1995). Inside CIA’s private world: Declassified articles from the agency’s internal journal, -. New Haven: Yale University Press. Wirtz, J.J. (2009). The American approach to intelligence studies. In L.K. Johnson (Ed.), Handbook of intelligence studies (pp. 28-38). New York: Routledge.

OCR for page 99
0 APPENDIX B Yarger, H.R. (2008). Strategy and the national security professional: Strategic thinking and strategic formulation in the st century. Westport, CT: Praeger. ALTERNATIVE COMPETING HYPOTHESES Billman, D., Convertino, G., Shrager, J., Massar, J.P., and Pirolli, P. (2006). Collaborative in- telligence analysis with CACHE and its effects on information gathering and cognitive bias . Technical Report. Palo Alto, CA: Palo Alto Research Center. Cheikes, B.A., Brown, M.J., Lehner, P.E., and Adelman, L. (2004). Confirmation bias in complex analyses. Technical Report. Bedford, MA: MITRE Center for Integrated Intelligence Systems. Cluxton, D., and Eick, S.G. (2005). DECIDETM: Hypothesis visualization tool. Presented at the International Conference on Intelligence Analysis Methods and Tools, May 2-6, McLean, VA. Convertino, G., Billman, D., Pirolli, P., Massar, J.P., and Shrager, J. (2006). Collaborative intel- ligence analysis with CACHE: Bias reduction and information coverage . Technical Report. Palo Alto, CA: Palo Alto Research Center. Convertino, G., Billman, D.O., Pirolli, P.L., Massar, J.P., and Shrager, J. (2008). The CACHE study: Group effects in computer-supported collaborative analysis. Computer Supported Cooperative Work, , 353-393. Good, L., Shrager, J., Stefik, M., Pirolli, P., and Card, S. (2004). ACH0: A tool for analyzing competing hypotheses. Technical description for Version 1.0. Palo Alto, CA: Palo Alto Research Center. Heuer, R.J., Jr. (2008). Computer-aided analysis of competing hypotheses. In R.Z. George and J.B. Bruce (Eds.), Analyzing intelligence: Origins, obstacles, and innovations (pp. 251-265). Washington, DC: Georgetown University Press. Heuer, R.J., Jr. (2008). Improving intelligence analysis with ACH. Available: http://www. pherson.org/PDFFiles/Heuer-ImprovingIntelligenceAnalysiswithACH.pdf [accessed February 2010]. Lehner, P.E., Adelman, L., Cheikes, B.A., and Brown, M.J. (2008). Confirmation bias in com- com- plex analyses. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 8(3), 584-592. Pherson, R. (2008). Collaborative analysis of competing hypotheses (C-ACH). Available: http:// www.pherson.org/pdffiles/Collaborative-ACH.pdf [accessed February 2010]. Pirolli, P. (2006). Assisting people to become independent learners in the analysis of intelligence . Technical Report. Palo Alto, CA: Palo Alto Research Center. Pope, S., and Jøsang, A. (2005). Analysis of competing hypotheses using subjective logic. Tenth International Command and Control Research and Technology Symposium, June, McLean, VA. Stech, F.J., and Elsaesser, C. (2005). Deception detection by analysis of competing hypotheses. Technical Report. McLean, VA: MITRE Corporation. Valtorta, M., Dang, J., Goradia, H., Huang, J., and Huhns, M. (2005). Extending Heuer’s analysis of competing hypotheses method to support complex decision analysis .Presented at the International Conference on Intelligence Analysis Methods and Tools, May 2-6, McLean, VA. Wheaton, K.J., and Chido, D.E. (2006). Structured analysis of competing hypotheses: Improv- ing a tested intelligence methodology. Competitive Intelligence Magazine, (6), 12-15.

OCR for page 99
0 FIELD EVALUATION APPLIED BAYESIAN ANALYSIS Dawes, R.M., and Corrigan. B. (1974). Linear models in decision making. Psychological Bul- letin, 8, 95-106. Dawes, R., Faust, R., and Meehl, P. (1989). Clinical versus actuarial judgment. Science, (4899), 1668-1674. Digman, J.M. (1990). Personality structure: An emergence of the five-factor model. Annual Review of Psychology, , 417-440. Fisk, C. (1972). The Sino-Soviet border dispute: A comparison of the conventional and Bayes- ian methods for intelligence warning. Studies in Intelligence, (2), 53-62. Grove, W.M., Zald, D.H., Lebow, B.S., Snitz, B.E., and Nelson, C. (2000). Clinical versus me - chanical prediction: A meta-analysis. Psychological Assessment, (1), 19-30. Available: http://www.psych.umn.edu/faculty/grove/096clinicalversusmechanicalprediction. pdf [accessed February 2010]. Kahneman, D., Slovic, P., and Tversky, A. (Eds.). (1982). Judgment under uncertainty: Heuristics and biases. Cambridge, UK: Cambridge University Press. Kent, S. (1964). Words of estimative probability. Reprinted in D.P. Steury (Ed.), Sherman Kent and the Board of National Estimates. Washington, DC: Center for the Study of Intel- ligence, Central Intelligence Agency. Available: https://www.cia.gov/library/center- for-the-study-of-intelligence/csi-publications/books-and-monographs/sherman-kent- and-the-board-of-national-estimates-collected-essays/6words.html [accessed February 2010]. Neapolitan, R.E. (1990). Probabilistic reasoning in expert systems. New York: Wiley. Nisbett, R.E., and Ross, L. (1980). Human inference: Strategies and shortcomings of social judg- ment. Englewood Cliffs, NJ: Prentice-Hall. Pearl, J. (1988). Probabilistic reasoning in intelligent systems. San Mateo, CA: Morgan Kaufmann. Schum, D.A. (1994). Evidential foundations of probabilistic reasoning. New York: Wiley. Sticha, P., Buede, D., and Rees, R.L. (2005). APOLLO: An analytical tool for predicting a subject’s decision making. Presented at the International Conference on Intelligence Analysis Methods and Tools, May 2-6, McLean, VA. Wallsten, T.S., Budescu, D.V., and Zwick, R. (1993). Comparing the calibration and coherence calibration of numerical and verbal probability judgments. Management Science, , 176-190. PRELIMINARY CREDIBILITY ASSESSMENT SCREENING SYSTEM (PCASS) Battelle Memorial Institute. (2007). Efficacy of prototype credibility assessment technology: PCASS final report. Technical Report. Columbus, OH: Battelle Memorial Institute (Defense Academy for Credibility Assessment). Ben-Shakhar, G., and Eitan, E. (2003). The validity of psychophysiological detection of information with the guilty knowledge test: A meta-analytic review. Journal of Applied Psychology, 88(1), 131-151. Bhatt, S., and Brandon, S.E. (2008). Review of the preliminary credibility assessment screening system (PCASS). Unpublished manuscript, Washington, DC. Clapper, J.R., Jr. (2007). Operational approval of the Preliminary Credibility Assessment Screening System (PCASS). Washington, DC: U.S. Department of Defense. Dedman, B. (2008a). New U.S. weapon: Hand-held lie detector. Available: http://www.msnbc. msn.com/id/23926278/ [accessed February 2010]. Dedman, B. (2008b). What is the PCASS and how does it work? Available: http://www.msnbc. msn.com/id/24015982/ [accessed February 2010].

OCR for page 99
0 APPENDIX B Harris, J.C., and McQuarrie, A.D. (2006). The Preliminary Credibility Assessment System embed- ded algorithm description and validation results. Technical Report. Laurel, MD: Applied Physics Laboratory, Johns Hopkins University (Counterintelligence Field Activity). National Research Council. (2003). The polygraph and lie detection. Committee to Review the Scientific Evidence on the Polygraph. Board on Behavioral, Cognitive, and Sensory Sci- ences and Committee on National Statistics, Division of Behavioral and Social Sciences and Education. Washington, DC: The National Academies Press. Senter, S., Waller, J., and Krapohl, D. (2006). Validation studies for the Preliminary Credibility Assessment Screening System (PCASS). Technical Report. Fort Jackson, SC: U.S. Depart- ment of Defense Polygraph Institute. Thompson, D. (2007). Evaluation of the Preliminary Credibility Assessment Screening System (PCASS). Camp Cropper, Iraq, Department of the Army. Available: http://antipoly- graph.org/documents/PCASS_Camp_Cropper_memo.pdf [accessed February 2010]. VOICE STRESS ANALYSIS Baker Group. (2007). What is DVSA. Available: http://bakerdvsa.com/whatisdvsa.htm [ac- [ac- cessed February 2010]. Bhatt, S., and Brandon, S.E. (2009). Review of voice stress–based technologies for the detection of deception. Unpublished manuscript, Washington, DC. Unpublished Brown, T.E., Senter, S.M., and Ryan, A.H., Jr. (2003). Ability of the VericatorTM to detect smug- glers at a mock security checkpoint. Report No. DoDPI00-P-0024. Fort Jackson, SC: U.S. Department of Defense Polygraph Institute. Cestaro, V.L. (1995). A comparison between decision accuracy rates obtained using the polygraph instrument and the computer voice stress analyzer (CVSA) in the absence of jeopardy . Report No. DoDPI95-R-0002. Fort McClellan, AL: U.S. Department of Defense Polygraph Institute. Cestaro, V.L. (1996). A comparison of accuracy rates between detection of deception examinations us- ing the polygraph and the computer voice stress analyzer in a mock crime scenario . Report No. DoDPI-R-0004. Fort McClellan, AL: U.S. Department of Defense Polygraph Institute. Diogenes Company. (2008). Diogenes Digital Voice Stress AnalysisTM DDVSATM features. Kis- simmee, FL: Author. Haddad, D., Walter, S., Ratley, R., and Smith, M. (2001). Investigation and evaluation of voice stress analysis technology. In-house technical memorandum AFRL-IF-RS-TM-2001-7. Rome, NY: Air Force Research Laboratory Information Directorate. Harnsberger, J. D., Hollien, H., Martin, C.A., and Hollien, K.A. (2009). Stress and deception in speech: Evaluating layered voice analysis. Journal of Forensic Science, (3), 642-650. Hollien, H., and Harnsberger, J.D. (2006). Voice stress analyzer instrumentation evaluation. Final Report CIFA Contract FA 4814-04-0011. Gainesville, FL: Institute for Advanced Study of the Communication Processes, University of Florida. Hollien, H., Harnsberger, J.D., Martin, C.A., and Hollien, K.A. (2008). Evaluation of the NITV CVSA. Journal of Forensic Science, (1), 183-193. Holman, D. (2005). Nothing but the truth. The American Spectator. Available: http://spectator. org/archives/2005/12/15/nothing-but-the-truth [accessed February 2010]. Hopkins, C.S., Ratley, R.J., Benincasa, D.S., and Greico, J.J. (2005). Evaluation of voice stress analysis technology. 38th Hawaii International Conference on System Sciences, IEEE. Janniro, M.J., and Cestaro, V.L. (1996). Effectiveness of detection of deception examinations using the computer voice stress analyzer. Report No. DoDPI-R-0005. Fort McClellan, AL: U.S. Department of Defense Polygraph Institute.

OCR for page 99
0 FIELD EVALUATION Krapohl, D., Ryan, A.H., and Shull, K.W. (2002). Voice stress devices and the detection of (2002). lies. Policy Review. Available: http://hnspolygraph.com/media/voice_stress_devices_ and_the_detection_of_lies.pdf [accessed February 2010]. Meyerhoff, J.L., Saviolakis, G.A., Koenig, M.L., and Yourick, D.L. (2000). Physiological and biological measures of stress compared to voice stress analysis using the computer voice stress analyzer (CVSA). Report No. DoDPI98-R-0004. Fort Jackson, SC: U.S. Department of Defense Polygraph Institute. Nemesysco. (2005). Old versions—VericatorTM. Available: http://www.nemesysco.com/ Prod_VERICATOR.html [accessed February 2010]. Nemesysco. (2008). LV A—Layered voice analysis—Nemesysco’s technologies. Available: http:// www.nemesysco.com/technology-lvavoiceanalysis.html [accessed February 2010]. NITV. (2007). Structured interview assessment of the field use of the voice stress analyzer technology. Available: http://www.cvsa1.com/VSAAssessment.pdf [accessed February 2010]. NITV. (2008a). Agencies utilizing the CVSA. Available: http://www.cvsa1.com/Agencies using.htm [accessed February 2010]. NITV. (2008b). U.S. special operations command independent evaluation validates the CVSA. Avail- able: http://www.cvsa1.com/USSpecialOper.htm [accessed February 2010]. Palmatier, J.J. (1999). The computerized voice stress analyzer: Modern technological innova - tion or “the emperor’s new clothes”? ABA General Practice, Solo & Small Firm Division Magazine. Available: http://www.abanet.org/genpractice/magazine/1999/jun/pal- http://www.abanet.org/genpractice/magazine/1999/jun/pal- matr.html [accessed February 2010]. Palmatier, J.J. (2005). Assessing credibility: ADVA technology, voice and voice stress analysis. In R.J. Montgomery and W.J. Majeski (Eds.), Corporate Investigations (pp. 37-60). Tuscon, AZ: Lawyers & Judges. Sommers, M.S. (2006). Evaluating voice-based measures for detecting deception. Journal of Credibility Assessment and Witness Psychology, (2), 99-107. STIG. (2008). VSA-000 lie detection lab. Available: http://www.secintel.com/p-509-vsa-2000- lie-detection-lab.aspx [accessed February 2010].