Stovepiping

Last updated

In intelligence gathering, stovepiping is the presentation of information without proper context. It can be caused by the specialized nature or security requirements of a particular intelligence-collection technology. Alternatively, the lack of context may come from a particular group in the national policy structure that chooses to present only information that supports certain conclusions. An example would be how money funded for research is not evenly allocated but instead goes toward one specific ailment remedy. [1]

Contents

The definition of stovepiping can also refer to sharing information within a governmental body while hindering the sharing of information across different government bodies. [2] This type of information sharing can create large ineffectiveness as coordination can be weak, leading to a variety of inefficiencies and delays particularly with daily communication across governmental bodies. However, this issue can often be solved when groups or certain governmental entities can pressure or require different governmental bodies to work together.

Collection technologies

According to a staff study for the United States House Permanent Select Committee on Intelligence, in the 104th Congress, "The most common criticism of the current collection management process, and one in which we concur, is that it is dominated by 'stovepipes,' i.e., types of collection that are managed so as to be largely distinct from one another." [3]

The most common types of intelligence collection, and to some extent processing, which are commonly found in "stovepipes", include signal intelligence (SIGINT), imagery intelligence (IMINT), and human intelligence (HUMINT). While there are other forms of sensitive intelligence collection, these "big three", in a proper use, complement one another. A SIGINT communications intercept, for example, may suggest the presence of a particular military unit in a given location. For example, as part of the Operation Quicksilver deception plan during World War II, dummy communications were generated for the fictitious First United States Army Group (FUSAG), ostensibly commanded by George Patton, in order to convince the Germans that the main attack would come at the Pas-de-Calais, rather than the real target of Normandy. Dummy equipment was positioned in the places consistent with the communications, and a very few German high-altitude photographic aircraft brought back evidence apparently confirming IMINT. The British, however, had jailed or turned all German HUMINT spies, through the Double Cross System. Had a real spy been able to get to a FUSAG location, he would have seen the tanks were inflatable rubber decoys. The British, however, allowed only false confirmations of real tanks to be sent.

Stovepiping in global health

The use of the term "stovepiping" has also been used in relation to global health for many years now. It refers to the misallocation of funds from donors to organizations in response to a certain disease. This occurs when the interests of the donors are considered instead of the interests of the recipients and as a result money is funneled into specific areas of a given health care system instead of the being used to tackle a larger issue. This is particularly evident through the aid that has been provided to Africa in relation to HIV/AIDS, despite not being one of the top three causes of death on the continent. As a result, it is seen to meet the moral demands of the donors and not the recipients of the aid. [4]

Before and after 9/11

Another meaning of stovepiping is "piping" of raw intelligence data directly to decision makers, bypassing established procedures for review by professional intelligence analysts for validity (a process known as vetting), an important concern since the information may have been presented by a dishonest source with ulterior motives, or may be invalid for a myriad of other reasons. For example, numerous articles and books have subsequently appeared to detail how conflicts between the Bush administration and the intelligence community marred the reporting on Iraq’s weapons. [5]

Some believe that one reason that "warning signs" of the terrorists attacks on September 11, 2001 were not acted upon effectively was a longstanding compartmentalization and duplication of intelligence gathering and sharing at the federal, state, and local levels. The 9/11 Commission noted that "lines of operational authority run to the expanding executive departments, and they are guarded for understandable reasons: the DCI commands the CIA’s personnel overseas; the Secretary of Defense will not yield to others in conveying commands to military forces; the Justice Department will not give up the responsibility of deciding whether to seek arrest warrants. But the result is that each agency or department needs its own intelligence apparatus to support the performance of its duties." [6]

The Office of Special Plans (OSP), created by the George W. Bush administration, is credited with stovepiping raw intelligence related to Saddam Hussein's government in Iraq to high-level Bush administration officials. Media analysis and professional analysts from other US government departments subsequently determined that many of the reports originated with dishonest sources or were untrue for other reasons (see Curveball), and the process of vetting would have prevented their reaching decision makers through normal channels. As one report stated, "The 2003 Iraq prewar intelligence failure was not simply a case of the U.S. intelligence community providing flawed data to policy-makers. It also involved subversion of the competitive intelligence analysis process, where unofficial intelligence boutiques 'stovepiped' misleading intelligence assessments directly to policy-makers and undercut intelligence community input that ran counter to the White House's preconceived preventive war of choice against Iraq." [7] The stovepiping by the OSP had the effect of providing a substantial portion of the untrue allegations that formed the publicly declared justifications for the 2003 Invasion of Iraq, such as allegations of collaboration with Al Qaeda and an ongoing program of weapons of mass destruction. [5]

A government-published document which refers to "stove-piping" concerned the attacks in the American Consulate in Benghazi, Libya in 2012. The report, Accountability Review Board for Benghazi to Examine the Facts and Circumstances Surrounding the Attacks of September 11–12, 2012 [8] was promulgated in declassified status. One of the two references to stove-piping states that "in the months leading up to September 11, 2012, security in Benghazi was not recognized and implemented as a 'shared responsibility' in Washington, resulting in stove-piped discussions and decisions on policy and security."

The Case of China

China faces a large issue of different individual hierarchies that don’t collaborate with each other. Instead they stove-pipe the information up within their hierarchy, before the information is passed, if at all, on to a different agency. [2] Part of the cause of this stove-piping can be seen as arising from the competition between different governmental bodies, but also within the bodies. [2] With different governmental bodies fighting for greater power, often at the expense of another governmental body, there is a greater incentive not to share information with other governmental bodies. Additionally, there is competition to get acknowledgment from higher-ups within one's hierarchy, which encourages sharing information up the governmental-body hierarchy rather than across to a inter-related but distinctly separate governmental-body that one is less associated with. The Chinese Communist Party (CCP) has some means to alleviate this stove-piping being spurred by competition. For example, Leading Small Groups (LSGs) have coordinating power, but are limited in their scope of what they are willing to coordinate between governmental bodies. [2]

This stove-piping has implications beyond just inefficiencies for the CPP; dependence on LSGs for coordination can help centralize power within the party-elite, as the General Secretary and other high-level party officials can head these LSGs. [9] Despite centralizing power within the CCP, it’s unclear if the benefits of centralization of power from LSGs could possibly offset the costs and inefficiencies caused by stove-piping.

See also

Related Research Articles

<span class="mw-page-title-main">Human intelligence (intelligence gathering)</span> Intelligence gathered by means interpersonal contact

Human intelligence is intelligence-gathering by means of human sources and interpersonal communication. It is distinct from more technical intelligence-gathering disciplines, such as signals intelligence (SIGINT), imagery intelligence (IMINT), and measurement and signature intelligence (MASINT). HUMINT can be conducted in a variety of ways, including via espionage, reconnaissance, interrogation, witness interviews, or torture. Although associated with military and intelligence agencies, HUMINT can also apply in various civilian sectors such as law enforcement.

<span class="mw-page-title-main">Sensitive compartmented information</span> Information relative to U.S. National Security

Sensitive compartmented information (SCI) is a type of United States classified information concerning or derived from sensitive intelligence sources, methods, or analytical processes. All SCI must be handled within formal access control systems established by the Director of National Intelligence.

The intelligence cycle is an idealized model of how intelligence is processed in civilian and military intelligence agencies, and law enforcement organizations. It is a closed path consisting of repeating nodes, which will result in finished intelligence. The stages of the intelligence cycle include the issuance of requirements by decision makers, collection, processing, analysis, and publication of intelligence. The circuit is completed when decision makers provide feedback and revised requirements. The intelligence cycle is also called intelligence process by the U.S. Department of Defense (DoD) and the uniformed services.

<span class="mw-page-title-main">Geospatial intelligence</span> Information on military opponents location

In the United States, geospatial intelligence (GEOINT) is intelligence about the human activity on Earth derived from the exploitation and analysis of imagery, signals, or signatures with geospatial information. GEOINT describes, assesses, and visually depicts physical features and geographically referenced activities on the Earth. GEOINT, as defined in US Code, consists of imagery, imagery intelligence (IMINT) and geospatial information.

A stovepipe organization has a structure which largely or entirely restricts the flow of information within the organization to up-down through lines of control, inhibiting or preventing cross-organisational communication. Many traditional, large organizations have a stovepipe pattern. Intelligence organizations may deliberately adopt a stovepipe pattern so that a breach or compromise in one area cannot easily spread to others. A famous example of this is Bletchley Park where people working in one hut would not know what the people in any other hut did.

<span class="mw-page-title-main">Finnish Defence Intelligence Agency</span> Combined intelligence agency of the Finnish military

The Finnish Defence Intelligence Agency is the combined signals (SIGINT), geospatial (GEOINT) and imagery intelligence (IMINT) agency of the Finnish Defence Forces. Operational since 2014, its responsibility is to support the defence of Finland through information gathering and analysis as an intelligence agency, organic to the Intelligence Division of Defence Command.

Signals intelligence by alliances, nations and industries comprises signals intelligence (SIGINT) gathering activities by national and non-national entities; these entities are commonly responsible for communications security (COMSEC) as well.

Radiofrequency MASINT is one of the six major disciplines generally accepted to make up the field of Measurement and Signature Intelligence (MASINT), with due regard that the MASINT subdisciplines may overlap, and MASINT, in turn, is complementary to more traditional intelligence collection and analysis disciplines such as SIGINT and IMINT. MASINT encompasses intelligence gathering activities that bring together disparate elements that do not fit within the definitions of Signals Intelligence (SIGINT), Imagery Intelligence (IMINT), or Human Intelligence (HUMINT).

Materials MASINT is one of the six major disciplines generally accepted to make up the field of Measurement and Signature Intelligence (MASINT), with due regard that the MASINT subdisciplines may overlap, and MASINT, in turn, is complementary to more traditional intelligence collection and analysis disciplines such as SIGINT and IMINT. MASINT encompasses intelligence gathering activities that bring together disparate elements that do not fit within the definitions of Signals Intelligence (SIGINT), Imagery Intelligence (IMINT), or Human Intelligence (HUMINT).

Electro-optical MASINT is a subdiscipline of Measurement and Signature Intelligence, (MASINT) and refers to intelligence gathering activities which bring together disparate elements that do not fit within the definitions of Signals Intelligence (SIGINT), Imagery Intelligence (IMINT), or Human Intelligence (HUMINT).

<span class="mw-page-title-main">Signals intelligence operational platforms by nation</span>

Signals intelligence operational platforms are employed by nations to collect signals intelligence, which is intelligence-gathering by interception of signals, whether between people or between machines, or mixtures of the two. As sensitive information is often encrypted, signals intelligence often involves the use of cryptanalysis. However, traffic analysis—the study of who is signalling whom and in what quantity—can often produce valuable information, even when the messages themselves cannot be decrypted.

Intelligence collection management is the process of managing and organizing the collection of intelligence from various sources. The collection department of an intelligence organization may attempt basic validation of what it collects, but is not supposed to analyze its significance. There is debate in U.S. intelligence community on the difference between validation and analysis, where the National Security Agency may try to interpret information when such interpretation is the job of another agency.

Intelligence cycle management refers to the overall activity of guiding the intelligence cycle, which is a set of processes used to provide decision-useful information (intelligence) to leaders. The cycle consists of several processes, including planning and direction, collection, processing and exploitation, analysis and production, and dissemination and integration. The related field of counterintelligence is tasked with impeding the intelligence efforts of others. Intelligence organizations are not infallible but, when properly managed and tasked, can be among the most valuable tools of management and government.

National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there are a wide range of potential threats, so threat assessment, if complete, is a complex task. Governments try to protect three things:

<span class="mw-page-title-main">Special reconnaissance</span> Intelligence gathering discipline

Special reconnaissance (SR) is conducted by small units, such as a recon team, made up of highly trained military personnel, usually from special forces units and/or military intelligence organizations. Special reconnaissance teams operate behind enemy lines, avoiding direct combat and detection by the enemy. As a role, SR is distinct from commando operations, but both are often carried out by the same units. The SR role frequently includes covert direction of airstrikes and indirect fire, in areas deep behind enemy lines, placement of remotely monitored sensors, and preparations for other special forces. Like other special forces, SR units may also carry out direct action and unconventional warfare, including guerrilla operations.

Failure in the intelligence cycle or intelligence failure, is the outcome of the inadequacies within the intelligence cycle. The intelligence cycle itself consists of six steps that are constantly in motion: requirements, collection, processing and exploitation, analysis and production, dissemination and consumption, and feedback.

The target-centric approach to intelligence is a method of intelligence analysis that Robert M. Clark introduced in his book "Intelligence Analysis: A Target-Centric Approach" in 2003 to offer an alternative methodology to the traditional intelligence cycle. Its goal is to redefine the intelligence process in such a way that all of the parts of the intelligence cycle come together as a network. It is a collaborative process where collectors, analysts and customers are integral, and information does not always flow linearly.

<span class="mw-page-title-main">Target analysis</span>

Target analysis is an examination of potential targets to determine military importance, priority of attack, and weapons required to obtain a desired level of damage or casualties. The Central Intelligence Agency defines it as, "network analysis techniques and specialized analytical tools to identify and detail key figures and organizations who may pose a threat to US interests."

<span class="mw-page-title-main">Counter-IED efforts</span>

Counter-IED efforts are done primarily by military and law enforcement with the assistance of the diplomatic and financial communities. It involves a comprehensive approach of countering the threat networks that employ improvised explosive devices (IEDs), defeating the devices themselves, and training others. Counter-IED, or C-IED, is usually part of a broader counter-terrorism, counter-insurgency, or law enforcement effort. Because IEDs are a subset of a number of forms of asymmetric warfare used by insurgents and terrorists, C-IED activities are principally against adversaries and not only against IEDs. C-IED treats the IED as a systemic problem and aims to defeat the IED threat networks themselves.

References

  1. Garrett, Laurie. 2007. The Challenge of Global Health. Foreign Affairs 86 (1): 14–38
  2. 1 2 3 4 Susan, Lawrence. "Understanding China's Political System - Federation of American Scientists" (PDF). Understanding China’s Political System. Congressional Research Service. Retrieved 8 September 2023.
  3. "I. Overview and Summary". Ftp.fas.org. 2008-05-30. Retrieved 2013-10-22.
  4. Garrett, Laurie 2007, 'The Challenge of Global Health', Foreign Affairs, vol. 86, no. 1, p. 22
  5. 1 2 Hersh, Seymour M. "Annals of National Security: The Stovepipe". The New Yorker. Retrieved 2013-10-22.
  6. U.S. Government, The 9/11 Commission Report, pp. 400–428
  7. Mitchell, Gordon R. "Team B Intelligence Coups," Quarterly Journal of Speech, Vol. 92, No. 2, May 2006, pp. 144–173
  8. "Accountability Review Board for Benghazi to Examine the Facts and Circumstances Surrounding the Attacks of September 11–12, 2012" (PDF). U.S. Department of State . Retrieved 2013-10-22.
  9. Johnson, Christopher (17 October 2017). "Xi's Signature Governance Innovation: The Rise of Leading Small Groups". Center for Strategic and International Studies. CSIS. Retrieved 8 September 2023.