Concurrent Breakout Sessions 9 Breakout Sessions 12



Yüklə 182,25 Kb.
səhifə46/53
tarix04.01.2022
ölçüsü182,25 Kb.
#61878
1   ...   42   43   44   45   46   47   48   49   ...   53
Types of Knowledge (Wilson, 2006)

Intelligence Analysis Examples (Marshall, 2005)

1. Factual knowledge

  • basic to specific disciplines

  • essential facts, terminology, or history that students must know in order to understand the discipline or solve a problem

  • History of the intelligence community

  • Different kinds of evidence: people (HUMINT), imagery (IMINT), technical signals (SIGINT), open source (OSINT), physical science (MASINT)

2. Conceptual knowledge

  • classification, principles, categories

  • models, theories, structures

  • Pillars of the profession: sources and methods. Sources refer to collection and methods refer to analysis

  • Structural analytical methodologies and associated evidence

  • Historical research theories

3. Procedural knowledge

  • subject-specific skills, techniques

  • specific methodologies, methods of inquiry

  • criteria for knowing when to use specific methods, techniques

  • Steps in structured methodologies (e.g., ACH, Situational Logic) to break down problems into pieces and put pieces back together

  • Process of writing brief intelligence reports that start with conclusions

  • Giving an intelligence briefing to a decision-maker who has limited time

4. Metacognitive knowledge

  • strategic or reflective knowledge

  • knowledge of one’s own self and cognitive processes

  • Approaches for effectively presenting an intelligence brief to a decision-maker who has limited knowledge of the topic

  • Self-assessment as the analyst analyzes the adversaries in the present and makes judgments about the future while trying to be culturally-neutral, bias-free, and creative

In Table 2, examples of the different levels of knowledge in intelligence analysis illustrate the skills, challenges, and commitments required of intelligence analysts.


Conclusion

The 9/11 attacks, post-9/11 intelligence reforms, terrorist groups’ sophisticated use of the Internet, and the establishment of the OSC have major impacts on challenges, competencies, and career opportunities associated with the intelligence analyst. The events highlight the need for other educators (e.g., healthcare, information science, digital media) to join the debate and curriculum design teams so they can further discussions with intelligence professors about designing interdisciplinary intelligence-focused curricula that meet the demands of a customer-driven intelligence community that is dealing with increasingly complex cultural, technological, and global problems.


Given the ubiquity and ever increasing power of information and communication, technology (ICT), notwithstanding the lifelong-learning audacity of highly motivated and committed individuals – like the terrorists – today’s intelligence analysts should be fully equipped with the right skills, knowledge, competencies and continuous learning cycles just to match their real and virtual adversaries’ arsenals for their terror campaign. Terrorists have been very adept in tapping the wealth and advantages of constituting a very rich and diverse collectivity of members in their social movement. On the educational side, there is need to do the same thing – tap into other disciplines – that are not normally affiliated with intelligence analysis. Use frameworks such as the Bloom’s taxonomy to support the sharing of ideas about educational partnerships, interdisciplinary apprenticeship programs, and other approaches that can be part of lifelong learning strategies for enhancing the visibility, creativity, and availability of intelligence analysts.
References

Analysis of competing hypothesis. (2008). Wikipedia. Retrieved January 3, 2009 from

http://en.wikipedia.org/wiki/Analysis_of_Competing_Hypotheses
Bean, H. (2007). DNI’s Open Source Center: an Organizational Communication

Perspective. International Journal of Intelligence and CounterIntelligence, 20(2),

240-257.
Bunt, G.R. (2003). Islam in the Digital Age E-Jihad, Online Fatwas and Cyber Islamic

Environments. London: Pluto Press.
DNI Open Source Conference. (2008). Retrieved January 7, 2009 from

http://www.dniopensource.org/


Frieden, T. (2009, January 5). FBI filling nearly 3,000 job openings. Retrieved January 6,

2009 from http://money.aol.com/news/articles/

Internet World Stats. (2009). Internet Growth Statistics: Global Village Online.

Retrieved January 7, 2009 from http://www.internetworldstats.com/


Jenkins, B.M. (2004). World becomes the Hostage of media-Savvy Terrorists:

Commentary. USA Today. Retrieved August 22, 2004 from http://www.rand.org


Johnston, R. (2005). Analytic Culture in the US intelligence Community: An

Ethnographic Study. Center for the Study of Intelligence. Retrieved December 28,

2008 from http://www.fas.org/irp/cia/product/analytic.pdf


Krathwohl, D.R. (2002). A revision of Bloom’s Taxonomy: An overview. Theory Into

Practice, 41(4), Autum, 212-218.
Losey, S. (2007, May 7). Rebuilding the intel analyst work force. Federaltimes.com.

Retrieved January 3, 2009 from http://www.federaltimes.com


Marshall, M.G. (2005). Teaching intelligence research. Defense Intelligence Journal,

14(2), 1-34. Retrieved on December 24, 2008 from http://www.allacademic.com


Ministry of the Interior and Kingdom Relations. (2006). Violent Jihad in the Netherlands:

Current trends in the Islamist terrorist threat. General Intelligence and Security

Services (AIVD) of the Netherlands. Retrieved November 19, 2008 from

http://www.fas.org/irp/world/netherlands/violent.pdf


Pickard, M.J. (2007). New Bloom’s Taxonomy: An overview for family and consumer

sciences. Journal of Family and Consumer Sciences Education, 25(1),

Spring/Summer 45-55.
Reid, E., Chen, H. (2007). Internet savvy U.S. and Middle Eastern extremist groups.

Mobilization: an International Quarterly Review, 12(2), 177-192. Retrieved

Jananuary 7, 2009 from

http://ai.arizona.edu/go/intranet/papers/Internet%20Savvy...etc.pdf
Shrader, K.P. (2004, December 30). Analysts are in great demand: Intelligence agencies

scramble for talent. Washington Post. Retrieved January 3, 2009 from

http://www.washingtonpost.com
Van Geder, T. (2006). Rational Thinking.

http://rtnl.wordpress.com/2008/12/15/future-trend-hypothesis-mapping- displacing-ach/


Weimann, G. (2004). “www.terrorism.net: How Modern Terrorism Uses the Internet.

Special Report 116, U.S. Institute of Peace. Retrieved January 13, 2004 from

http://usip.org/pubs/
Willing, R. (2006, November 28). Intelligence agencies invest in college education. USA

Today. Retrieved September 5, 2007 from http://usatoday.com
Wilson, L.O. (2006). Leslie Owen Wilson’s Curriculum Pages. Beyond Bloom – A new

version of the cognitive taxonomy. Retrieved December 24, 2008 from

http://www.uwsp.edu/education/lwilson/curric/newtaxonomy.htm
Zegart, A.B. (2006). An empirical analysis of failed intelligence reforms before

September 11. Political Science Quarterly, 121(1), 33-60.

Graduate Category-
Patrick John Reyes Ramos


Yüklə 182,25 Kb.

Dostları ilə paylaş:
1   ...   42   43   44   45   46   47   48   49   ...   53




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin