Skip to main content

Currently Skimming:

5 Sensemaking: Emerging Ways to Answer Intelligence Questions
Pages 85-140

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 85...
... : the need to understand power and influence; threats, opportunities, and social and organizational dynamics; complexity; and deception and gaps in information. Our review of a wide range of ideas and trends in SBS research revealed four areas with the potential to be particularly fruitful in supporting analysts' sensemaking efforts -- the study of narrative, the study of social networks, the study of complex systems, and the affective sciences.
From page 86...
... We then describe the specific ways in which research in each area can be applied to core analytic problems, drawing on both emerging research from contexts not typically associated with intelligence analysis and work on phenomena well recognized as key to analytic work. We suggest potential direct applications for the analyst, with the caveat that some are much readier for practical application than others.
From page 87...
... At the same time, developments in the study of narratives have been fueled by the exponential growth in data created by social media such as Facebook and Twitter and by the fact that vast amounts of content are now stored digitally, which has made the study of narratives at a large scale much more practical. These capabilities offer new frontiers for applying the study of narratives to intelligence analysis.
From page 88...
... . The Study of Social Networks Understanding the complex and dynamic relationships among and within social and institutional networks is an essential facet of intelligence analysis.
From page 89...
... Social network analysis predates the development of current social media, and even the field of computer science. The effort to understand society in terms of social relationships goes back as far as descriptions of lines of descent in the bible or clan histories found in other historical contexts (Freeman, 2004)
From page 90...
... It has been demonstrated that social networks have profound influences on many human sentiments (an aspect of affective sciences, which are discussed below) , behaviors, and actions that are of interest to the IC.
From page 91...
... ; they operate on multiple levels, often involving dynamic social networks and processes; and they occupy "wicked" problem spaces.5 For all these reasons, it is difficult to understand complex systems and to predict events and developments that may occur within the system or their potential consequences. As a result, people attempting to study or monitor complex systems are often caught off guard by so-called "black swan" events -- consequential developments that were not expected -- or by the unintended consequences of an event.
From page 92...
... Understanding how emotion and affect function and influence people's thoughts, beliefs, and actions therefore has clear utility for intelligence analysis; drawing on foundational and emerging work in this area to provide direct applications for intelligence analysis is a key frontier for SBS researchers and the IC. The past few decades have witnessed a blossoming of research on a variety of topics under the rubric of "affective sciences," which address 7These methods include general algorithmic assessments (Flum and Crohe, 2006)
From page 93...
... Emotions serve intrapersonal, interpersonal, and sociocultural functions that all have implications for intelligence analysis (Hwang and Matsumoto, 2016; Keltner and Haidt, 1999; Levenson, 1999)
From page 94...
... These include the content and power of narratives, processes of judgment and decision making, and the spread of attitudes and beliefs associated with terrorism and other security threats. APPLYING SOCIAL AND BEHAVIORAL SCIENCE RESEARCH TO SENSEMAKING FOR CORE ANALYTIC PROBLEMS Research in these four areas can be applied to support the analyst in tackling core sensemaking challenges, though further research is needed to bring these ideas closer to practical application.
From page 95...
... , and tracking changes that could signal a developing shift in power. This section reviews opportunities for enhancing understanding of status and power, judgment and decision making, influences on individuals' attitudes and behaviors, the vulnerability and adaptability of social networks, and network influences on political and economic environments.
From page 96...
... , but less is known about how those concerns affect small states and middle powers. Nonstate actors play a growing role in counterinsurgencies and complex humanitarian emergencies, and it is not uncommon for nongovernmental organizations (NGOs)
From page 97...
... To pursue any of these strategies, a state must possess a minimum level of "hard power," or military capability; reliance on hard power can, of course, result in conflict. States may also use other means of exerting influence that fall into the category of "soft power" (described in Box 5-3, the first of a series of boxes in this chapter on potential applications of SBS research to the work of the intelligence analyst)
From page 98...
... For example, social network analysis has built on traditional understanding of international relations (Hafner-Burton et al., 2009)
From page 99...
... Judgment and Decision Making One problem set facing intelligence analysts involves understanding and trying to anticipate the judgments and decisions of political leaders and other actors who wield power. These human processes have been studied by researchers in many fields, including anthropology, psychology, economics, sociology, political science, communication, and organization science.
From page 100...
... Some researchers have used network analysis to explore the behavior of humans and groups. For example, study of the diffusion of innovations initially focused on the characteristics of individual potential adopters (such as their education levels)
From page 101...
... These nonverbal signals may include contextual cues in the background as well as nonverbal behaviors of the influencer -- facial expressions, tone of voice, and gesture. Indeed, these nonverbal cues are often critical to the power
From page 102...
... It is, moreover, not practical to solicit network data from covert adversarial actors. Network analysis of digital data.
From page 103...
... The integration of social network analysis with narrative research offers additional possibilities for the intelligence analyst. Most social network researchers examine social influence on individuals in terms of the network structures in which they are embedded.
From page 104...
... ; • how online influence operations might be identified based on high-­ imensional d network behaviors; • the aspects of social networks that facilitate or impede the viral spread of ideas; • the specific emotions and sentiments underlying narratives that emerge from social network analysis that make those narratives powerful in different ways and drive changes in attitudes, values, and beliefs; and • the way networks and individuals' network positions are reshaped by emotional messaging and online influence operations. The Vulnerability and Adaptability of Social Networks Since the attacks of September 11, 2001, the IC has had an intensified interest in research on social networks, particularly terrorist networks (Ressler, 2006)
From page 105...
... , simulation (Carley et al., 2001) , mixed network analysis and simulation (Tsvetovat and Carley, 2005)
From page 106...
... . Specific areas such research could help illuminate include • the functioning, viability, and vulnerability of groups and organizations, such as terrorist groups, social movements, and leadership networks involving state actors; • the emergent properties of social networks, particularly dark networks, that make them resilient or susceptible to disturbances and direct interventions; • the role of redundancy in the functioning, adaptation, evolution, and resiliency of multidimensional networks (e.g., when multiple actors have access to the same resources, tasks, or other actors)
From page 107...
... Current theory and methods in social network analysis have yielded important insights into organizational, urban, and global dynamics. Research on organizational networks, for example, has revealed the importance of investigating cross-level network phenomena to making sense of complex network dynamics (Brass et al., 2004)
From page 108...
... Specific benefits to the IC might include improved understanding of • the influence of inter- and intrastate economic and political networks on the behaviors of strategic state and nonstate actors; • indicators and warnings based on changes in positive and negative network relations among nation-states that can help predict shifts in state actors' posi tions with respect to weapons of mass destruction; • the economic and political factors that affect how connected one state is to others (centrality) , as well as changes in those connections; • factors that contribute to the declining network dominance and influence of a nation-state; • the development and adaptation of global criminal and terrorist networks and the associated regional constraints on these networks; and • how shifts in such factors as international trade alliances, pacts, crypto-cur rency payments from one country to another, and trade routes (because of climate change)
From page 109...
... This work has shed light on the motivations of lead bad actors for committing acts of violence (Gill, 2016; Gill et al., 2017; Gurski, 2015; Horgan, 2014; McCauley and Moskalenko, 2008; Meloy and Gill, 2016; Meloy and Yakeley, 2014; Meloy et al., 2015; Moskalenko and McCauley, 2009; Speckhard, 2012)
From page 110...
... • How do such emotions as hatred and their verbal and nonverbal signals combine with other verbal and linguistic markers of threat, such as integrative complexity (the degree to which the reasoning of a writer or speaker integrates multiple perspectives and/or solutions to problems)
From page 111...
... A related possibility is to integrate research on integrative complexity and other social and behavioral sciences approaches (e.g., identifying affective signals of hatred) with technologies for automated flagging.
From page 112...
... . Red Hen Lab, a consortium that conducts commu nication research, has compiled a vast collection of data consisting of approxi mately 4 billion words and 360,000 hours of audiovisual broadcasts that can be searched using natural language processing and optical character recognition software.12 Researchers in such fields as linguistics, social networks, and machine learning are collaborating to develop ways to search such databases -- for exam ple, using linguistic forms and grammar patterns, semantic patterns, and topic i ­dentification -- to detect significant events or changes in discourse.
From page 113...
... Corporations are also affected by insider threat or industrial espionage (Crane, 2005)
From page 114...
... . Insider threat is also usefully viewed as a complex sociotechnical problem for which simulation models have been developed.
From page 115...
... Their findings suggest characteristics of settings that are relatively protected from insider threat: organizational responses and policies with respect to trusting employees and checking their activities are difficult to predict, and employees are continually learning in response to changing circumstances. Such simulations could be used to assess the potential effects of complex interacting influences -- in Manning's case, for example, tensions between her religious upbringing and her change in gender identification, or between the disciplined culture of the army and the rebellious appeal of her Internet contacts.
From page 116...
... Research Directions Conduct transdisciplinary research that brings together the disparate threads involved in the study of insider threat. No single approach has proven sufficient to explain insider threat, so a multidis ciplinary research approach is most likely to yield breakthroughs in the ability to identify potential insider threats and deal with this risk.
From page 117...
... Here we briefly review the traditional framework for the study of deception and the foundation it provides for intelligence analysis applications. For example, evidence supports the idea that understanding of emotion and nonverbal communication and behavior can be used in detecting deception and assessing credibility (Matsumoto and Hwang, 2018b; Matsumoto et al., 2014c; Novotny et al., 2018; Vrij et al., 2008; Warren et al., 2009)
From page 118...
... Here we look more closely at developments in modeling and simulation and in human–systems integration that offer possibilities for intelligence analysis. Modeling and Simulation Work in the fields of complexity theory and network systems has clear applications to the analytic challenge of understanding complexity, offering the possibility of measuring, modeling, and interpreting complex phenomena and developments, as well as forecasting change.18 Scalable high-level network algorithms, for example, have made possible advances in modeling of the relationships between processes and networks.
From page 119...
... Analyzing such networks is essential to understanding nonstate actors involved in global affairs, such as terrorist organizations, which often lack fixed organizational structures and constantly adapt to their environment; the emergence of new leaders and changes in power structure; vulnerability in nation-state alliances; and trade and hostility structures (see Box 5-12)
From page 120...
... These dangers can contribute to conflict when the relationships form criminalized power structures (Dziedzic, 2015)
From page 121...
... The reverse is also true: models that are informative about populations are inaccurate at the cognitive level. Dynamic network modeling helps bridge this gap, as does modeling of social cognition (Morgan et al., 2017)
From page 122...
... CONCLUSIONS The work explored in this chapter demonstrates the potential of SBS research to deepen, strengthen, and enhance the accuracy of intelligence analysis. We have examined a large and growing body of work that is
From page 123...
... Examples include the use of digital trace data to assess the importance of network nodes that pose potential security threats or to track the trajectory of political ideas, the use of understanding of how nonverbal cues can enhance the power and influence of political messages to assess such messages, and the application of traditional techniques of narrative analysis to machine computational analysis of discourse among social media groups. Sophisticated methods such as computational analysis of large datasets would make little sense without theoretical frameworks to guide the development of algorithms, such as those for classification of narrative structures or analysis of the functioning of social networks.
From page 124...
... Advances in the use of large-scale data are likely to be at the heart of significant developments for the IC in the coming decade, but new technologies will be only as strong as the understanding of the human behaviors they are used to model or explain. The committee anticipates progress in the development and validation of computational models, the reuse of simulation modes, and the integration of social networks with computational models, advances with the potential to enable near-real-time assessment of competing actors, messages, or groups and the interventions that influence them.
From page 125...
... In 2009 International Conference on Advances in Social Network Analysis and Mining. Institute of Electrical and Electronics Engineers.
From page 126...
... . Dynamic network analysis.
From page 127...
... . Integrating social networks and human social motives to achieve social influence at scale.
From page 128...
... Presentation sub mitted to the Committee on a Decadal Survey of Social and Behavioral Sciences and Applications to National Security, National Academies of Sciences, Engineering, and Medicine. Available: https://vimeo.com/258003972 [February 2019]
From page 129...
... . Dynamic network analysis in information operations: A process for near real-time assessment of atmospherics, socio-political landscape and leverage points.
From page 130...
... . Network analysis for interna tional relations.
From page 131...
... Galaskiewicz (Eds.) , Advances in Social Network Analysis (pp.
From page 132...
... . Social media, network heterogeneity, and opinion polarization.
From page 133...
... Presentation submitted to the Committee on a Decadal Survey of Social and Behavioral Sciences and Applications to National Security, National Academies of Sciences, Engineering, and Medicine. Available: https://vimeo.com/258004014 [February 2019]
From page 134...
... . A longitudinal social network analysis of peer influence, peer selection, and smoking behavior among adoles cents in British schools.
From page 135...
... . Social networks and organizations.
From page 136...
... . Social network analysis in the study of terrorism and political violence.
From page 137...
... . Network analysis of narrative content in large corporations.
From page 138...
... . Behavioral and policy issues in information systems security: The insider threat.
From page 139...
... . Internationalization and the performance of born global SMEs: The mediating role of social networks.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.