UNCLASSIFIED Methodologies for Sorting Through the Chaff Presentation to: DHS/IAIP 27 January 2005 Pherson Associates, LLC

Slides:



Advertisements
Similar presentations
Chapter 2 The Process of Experimentation
Advertisements

1 of 21 Information Strategy Developing an Information Strategy © FAO 2005 IMARK Investing in Information for Development Information Strategy Developing.
Argumentation.
Set your Sales The Selling Process.
PROJECT RISK MANAGEMENT
Teaching Structured Analytic Techniques with Cases
Intelligence Give a definition of intelligence that you could defend, explaining why you believe you could defend it. Give examples of ways your definition.
The Scientific Method.
Project Management.
Statistical Techniques I EXST7005 Lets go Power and Types of Errors.
Patterns in Game Design Chapter 9: Game Design Patterns for Narrative Structures, Predictability, and Immersion Patterns CT60A7000 Critical Thinking and.
ACH: Analysis of Competing Hypotheses Presented by: Jingshan Huang.
Definitions – John Dewey
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Copyright ©2015 Pearson Education, Inc Strategy Review, Evaluation, and Control Chapter Nine 9-1.
Sales Force Management
Writing level 3 essays An initial guide. Key principles The key principles of essay writing still apply: Understanding the topic Plan your response Structure.
Analytical Thinking.
TEST CASE DESIGN Prepared by: Fatih Kızkun. OUTLINE Introduction –Importance of Test –Essential Test Case Development A Variety of Test Methods –Risk.
Discussion 1: Theory.
Internal Auditing and Outsourcing
Chapter 4 Principles of Quantitative Research. Answering Questions  Quantitative Research attempts to answer questions by ascribing importance (significance)
Business and Management Research
Chapter 2 Objectives Explain why differences in perception occur
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Strategy Review, Evaluation, and Control Chapter Nine.
Developing Business Practice –302LON Using data in your studies Unit: 5 Knowledgecast: 2.
INFORMATION ASSURANCE USING C OBI T MEYCOR C OBI T CSA & MEYCOR C OBI T AG TOOLS.
Big Idea 1: The Practice of Science Description A: Scientific inquiry is a multifaceted activity; the processes of science include the formulation of scientifically.
Protocols for Mathematics Performance Tasks PD Protocol: Preparing for the Performance Task Classroom Protocol: Scaffolding Performance Tasks PD Protocol:
Qualitative Papers. Literature Review: Sensitizing Concepts Contextual Information Baseline of what reader should know Establish in prior research: Flaws.
Problem Definition Chapter 7. Chapter Objectives Learn: –The 8 steps of experienced problem solvers –How to collect and analyze information and data.
Methods: Pointers for good practice Ensure that the method used is adequately described Use a multi-method approach and cross-check where possible - triangulation.
Chapter 16 Problem Solving and Decision Making. Objectives After reading the chapter and reviewing the materials presented the students will be able to:
Research Methods: Thinking Critically with Psychological Science.
LEVEL 3 I can identify differences and similarities or changes in different scientific ideas. I can suggest solutions to problems and build models to.
Science and Psychology Psych 231: Research Methods in Psychology.
Critical Analysis Key ideas to remember. What's the Point? Here are some questions you can ask yourself to help you analyze: So what? How is this significant?
Educational Objectives
McGraw-Hill/Irwin Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
For ABA Importance of Individual Subjects Enables applied behavior analysts to discover and refine effective interventions for socially significant behaviors.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Biological Science.
Experimental Design Showing Cause & Effect Relationships.
RECOGNIZING, ANALYZING, AND CONSTRUCTING ARGUMENTS
SCIENCE The aim of this tutorial is to help you learn to identify and evaluate scientific methods and assumptions.
Chapter 8 Hypothesis Testing I. Significant Differences  Hypothesis testing is designed to detect significant differences: differences that did not occur.
The Risk Management Process
Argumentation.
Criteria for selection of a data collection instrument. 1.Practicality of the instrument: -Concerns its cost and appropriateness for the study population.
‘Exam Quick Fixes’ It’s not too late!. u = 5 v = 15 t = 30 s = ? s= (u + v) x t 2 s= (5 + 15) x 30 2 s= 10 x 30 s= 300 Examination technique Identify.
MODULE 9 MANAGERS AS DECISION MAKERS “Decide first, then act” How do managers use information to make decisions and solve problems? What are the steps.
Chapter 1 What is Biology? 1.1 Science and the Natural World.
Literary Analysis Strategy Instructor: Yelena K. Bailey- Kirby.
Conflict Styles Avoiding Issue and relationship both are insignificant Accommodating Relationship is more important than the issue Forcing The issue is.
Research Methods in Psychology Introduction to Psychology.
Copyright © 2011 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 1 Research: An Overview.
Chapter 2: Thinking and Reading Critically ENG 113: Composition I.
Acknowledgement: Khem Gyawali
Chapter 9 Warranted Inferences. Chapter 9 Warranted Inferences.
Principles of Quantitative Research
Research Design: Terms to Know
Business and Management Research
IS Psychology A Science?
Critical Thinking Skills
The Nature of Science How can you differentiate between science and non-science using the scientific method?
Communication in Negotiation
Critical Thinking Skills
The Research Process & Surveys, Samples, and Populations
Presentation transcript:

UNCLASSIFIED Methodologies for Sorting Through the Chaff Presentation to: DHS/IAIP 27 January 2005 Pherson Associates, LLC

UNCLASSIFIED Five Approaches Recognizing the Good Stuff: Using What If? Analysis and Outside-In Thinking to generate generic Indicators or Signposts Empirically-derived Checklists Eliminating the Bad Stuff: Deception Detection Analysis of Competing Hypotheses

UNCLASSIFIED Recognizing the Good Stuff

UNCLASSIFIED What If? Analysis Definition: Taking as a given that an event has occurred and then explaining how it came about. Example: Three years ago, terrorists just tried to crash a plane into the Eiffel tower. What if we had asked ourselves then: “Would they do something similar in the United States? How would they pull this off?”

UNCLASSIFIED What If? Analysis Value Added: Focuses attention on all the things that must fall into place for a low probability--but high impact-- event to actually occur. Alerts you to potentially useful reporting that you might have ignored or would have regarded as noise.

UNCLASSIFIED What If? Analysis The Method : Assume that what might be the case, is the case. Develop a chain of argumentation based on both evidence and logic explaining how this outcome actually could have come about. This is called “thinking backwards.” Generate a list of signposts or “observables” that would indicate that this outcome is coming about. Monitor the traffic for any evidence that relates to the signposts or indicators.

UNCLASSIFIED Outside-In Thinking Definition: A technique for identifying the full range of forces, factors, and trends that would indirectly shape an issue. Examples: In brainstorming how al-Qaeda elements are communicating with each other, are there any technological trends or new technologies that we need to consider (eg., use of “unsent” messages, MP3, or IPods)?

UNCLASSIFIED Inside-Out versus Outside-In Thinking

UNCLASSIFIED Competing Approaches Question: How do we assess a terrorist threat? Inside-Out Approach: Monitor reporting for tipoffs/lead information. Extrapolate patterns from reporting trends. Outside-In Approach: Identify relevant global trends. Assess how they might affect when, where, and how a terrorist might launch an attack.

UNCLASSIFIED Outside-In Thinking The Method: Generate a generic description of the problem at hand. List all the factors (social, technological, economic) that could have an impact (the subject usually has little influence over these factors but can exploit them). Next list the factors over which the subject can exert some influence (choice of partners, methods of communication, capability to acquire feedback, etc.). Assess how each of these factors could have an impact. Look for data that suggests they actually have an impact.

UNCLASSIFIED Empirically-derived Checklists The Method : Establish categories of data (walk-ins, detainee reports, émigré reporting, human sources, etc.) Review the reporting within each category and establish criteria for what turned out to be useful or not. Develop a rough scale. For example, reporting that turned out to be useful usually met these criteria; bad reporting often fell into these boxes, etc. Use these lists to rate the utility of incoming reporting. Rate the new reporting based on these lists and revise/refine the lists over time.

UNCLASSIFIED Eliminating the Bad Stuff

UNCLASSIFIED Detecting Deception Look for deception when: Accepting new information would require you to change your mind, alter a key assumption, or divert significant resources (protect all apartment buildings or shopping centers). Your analysis hinges on a single or key piece of data. The terrorists have a great deal to gain, or lose, if you take a specific action ( discount a key source). You know they have an effective feedback channel. (they are likely to learn of your reaction in the press).

UNCLASSIFIED Tactical Indicators of Deception Is the source reliable? Does the source have access? Is the source vulnerable to control or manipulation by the terrorists? Have the terrorists tried to deceive us in this way in the past?

UNCLASSIFIED Tactical Indicators of Deception How accurate is the source’s reporting? – Examine the whole chain of evidence, including translations! Does the critical evidence check out? – The subsource can be more critical than the source. Does evidence from one source (HUMINT) conflict with another source (OSINT)? Do other sources of information provide corroborating evidence?

UNCLASSIFIED How to Avoid Deception Be suspicious if forced to rely on sources who have not been seen or directly interviewed. Try not to rely exclusively on non-material evidence (verbal intelligence). Check all instances in which a source’s reports that initially appeared correct later turned out to be wrong-- and yet the source always seemed to offer a good explanation for the discrepancy. Heed the opinions of those closest to the reporting. Know the enemy’s limitations as well as his capabilities.

UNCLASSIFIED Analysis of Competing Hypotheses Definition: The identification of a complete set of alternative hypotheses, the systematic evaluation of data that is consistent and inconsistent with each hypothesis, and the rejection of hypotheses that contain too much inconsistent data.

UNCLASSIFIED The Value of ACH ACH helps you overcome three fundamental analytic traps: Selective perception (or coming to closure too quickly) that usually results from focusing on a single hypothesis. A failure to generate—at the outset— a complete set of alternative hypotheses. Focusing on the evidence that tends to confirm rather than to disconfirm the hypothesis.

UNCLASSIFIED Analysis of Competing Hypotheses Advantages: Ensures that all the information and argumentation is evaluated. Helps avoid premature closure. Highlights the evidence that is most “discriminating” in making the case. Removes the relatively unimportant data from the equation.

UNCLASSIFIED ACH: The Eight Step Process 1) Identify the possible hypotheses to be considered. (use brainstorming techniques) 2) List significant evidence and arguments for and against each hypothesis. (include the absence of evidence) 3) Prepare a matrix to analyze the “diagnosticity” of the evidence.

UNCLASSIFIED ACH: The Eight Step Process 4) Delete evidence and arguments that have no diagnostic value. (that support all hypotheses) 5) Assess the relative likelihood of each hypothesis. (try to refute each hypothesis rather than confirm it) 6) Determine how sensitive the conclusion is to just a few critical pieces of evidence. (would the judgment still stand if the evidence were wrong?)

UNCLASSIFIED ACH: The Eight Step Process 7) Report conclusions; establish the relative likelihood of all hypotheses. 8) Identify milestones for further observation. (to validate that the most likely hypothesis is correct or to show that events are taking a different direction than anticipated)