Anda di halaman 1dari 14

Analytic Technique Selection in Scenarios

Prepared by; David Doolittle


Prepared for; Dr. Herbert Kemp
INTL 498 - Midterm
July 16, 2017
I. Introduction
In Philip Heuer and Randolph Phersons 2013 Structured Analytic Techniques For
Intelligence Analysis the authors give an overview of 55 intelligence analysis techniques. 1
These 55 techniques are broken down into 8 families: decompilation/visualization (1, a-k), idea
generation (2, a-g), scenario/indicators (3, a-c), hypotheses generation/ testing (4, a-g),
assessment of cause effect (5, a-e), challenge analysis (6, a-g), conflict management (7, a-g), and
decision support (8, a-g). 2 A full list of techniques can be found in the endnotes for this
document. Using a technique should produce an outcome if it is applicable to the problem. There
are 12 outcomes possible: define the project (A), list forces and variables (B), make sense of data
(C), explain a recent event (D), monitor a situation/avoid surprise (E), generate hypotheses (F),
asses possibility of deception (G), forecast additional outcomes (H), challenge a mental model
(I), sees adversaries perspectives (J), manage conflicting mental models (K), and support roles of
leadership (L). 3
Using a technique is not fixed to a single outcome, and can produce multiple outcomes.
A problem is not always solved also using a singular technique. Often many techniques
contribute to finalized analysis. 4 To better stipulate these outcomes and gain insight into which
techniques are more effective for certain problem sets a few fictional scenarios are
examined.These scenarios are broken down into Priority Intelligence Requirements (PIR) with
underlying Essential Elements of Information (EEI). PIR are questions required to answer the
major problem of the scenario. EEI are factors influencing the PIR which need to be addressed in
order to have an answer to the problem of the scenario.
II. Scenarios
Q2. Oil prices have spiked and Chinese companies have obtained operations and
engineering contracts in multiple Persian Gulf states. What is the likelihood of Chinese
intervention in the Persian Gulf to ensure the supply of oil?
PIR.I. What is the likelihood Chinese will intervene given the scenarios circumstances in
the Persian Gulf?
EEI.A. What is the reasoning behind oil spikes?
EEI.B. What could the contents of the contracts allow in terms of sustaining engineering
and operations if oil supply is threatened?
EEI.C. Of the companies that obtained contracts what is their history of collusion with
the Chinese government?
EEI.D. What countries in the Persian Gulf could have supply threatened by a rise in
prices?
EEI.E. How could China indirectly support a nation to ensure the supply chain remains
unbroken?
EEI.F. What locations could China stage a military intervention from?
EEI.G. Are there any indicators building Chinese presence at EEI.F. locations?
EEI.H. Could China intentionally caused oil prices to spike to justify intervention?
EEI.I. Are there any legitimate threats to the continuation of operations in areas under
contract by the Chinese?
EEI.J. Do factors like political diplomatic or economic consequences weight on China's
choice to intervene?
EEI.K. Are there any historical analogous situations where China has responded to

1
threatened resources with intervention?
EEI.L. What antagonistic forces exist in suspected countries that may pose a threat to
Chinese losing influence in the region?
Q4. The civil war in Sudan is raging and it looks increasingly likely that an even
more extremist leader, a known supporter of Al Qaeda, is coming to power. The new
regime is both virulently anti-American and expansionist, talking about Somalia, Egypt,
and exporting its beliefs. What does this mean for United States security?
PIR.I. How much of a threat is this ne extremist leader to United States interests in the
region?
EEI.A. What is the environment of local support for this leader?
EEI.B. What networks is the leader affiliated with besides Al Qaeda?
EEI.C. Have the leaders affiliations contributed to an increase in capabilities?
EEI.D. How likely is it the leader will come to power?
EEI.E. Which political opponents are the greatest resistance to this leader in the Sudanese
political landscape?
EEI.F. Can political opponents mitigate the leaders influence in the Sudanese political
landscape?
PIR.II. What threats do this extremist group pose to United States interests in the region?
EEI.A. What are the functional levels of support for the group locally?
EEI.B. What networks is the group affiliated with besides Al Qaeda?
EEI.C. What tactics has the group employed to consolidate influence and power within
the region?
EEI.D. What capabilities can the organization acquire, in the immediate future, to expand
their territory?
EEI.E. How stable and resistant are areas sought for expansion to an invading force?
EEI.F. What is the public opinion of the neighboring countries to this group's ideology?
EEI.G. In countries sought for expansion by the group how supportive is the government
to coalition supported intervention if necessary?
Q5. Killings and kidnappings on the US-Mexican border have escalated, spilling
over into the US. More than 2 dozen Americans have been kidnapped in California and
taken to Mexico in the last year and have either been held or executed. Running gun battles
between drug cartels have escalated. The drug cartels are using IEDs, automatic weapons,
and grenades. The government is unable to control the violence and thousands of Mexican
troops and police patrol the border cities. Dozens of people are killed every month in what
has become open warfare. What does this mean for United States security?
PIR.I. What effects is the situation at the US-Mexican border currently having on United
States security?
EEI.A. Why are kidnappings suddenly escalated?
EEI.B. What value do kidnapped victims have to the parties conducting the act?
EEI.C. Is there a correlation between increase in kidnappings and lethality of tactics
being employed?
PIR.II. How ill the situation affect the current intended outcome of policies and strategies
the United States employs at the US-Mexican border area?
EEI.A. What scenarios create the environment for open warfare to cross the border?
EEI.B. Whom is in a position to resist the cartels from within Mexico?

2
EEI.C. What possible future outcomes can be expected without a change in policy
towards the region?
EEI.D. What are the parties involved attempting to accomplish?
Q7. Iranian interference in domestic Iraqi politics and security is on the rise.
Iranian bomb components, weapons, propaganda, and personnel are increasingly crossing
the border into Iraq. What does this mean for the domestic Iraqi security situation?
PIR.I. How is Iranian influence specifically affecting the security of a post ISIS Iraq?
EEI.A. How are bomb components being used, what are the specific targets after
assemblage?
EEI.B. Whom is the recipient of smuggled weapons?
EEI.C. How is propaganda perceived by the Iraqi population?
EEI.D. What reasons can be attributed to the increase in border crossings?
EEI.E. How is the Iraqi government responding to the change of political dynamics
within its borders?
EEI.F. What is Iran trying to achieve with an increased effort in Iraq?
III. Outcomes Figures
Below are two legends describing how figures should be interpreted:

(Family)(Technique)
(EEI.A-x) (Outcome(s))

Can be read for example: When (EEI.x) is addressed using (Family)(Technique) then
the outcome could include (Outcome(s))

Q2.PIR.I
Q4.PIR.I.
Q4.PIR.II.
Q5.PIR.I.
Q5.PIR.II.
Q7.PIR.I

Color corresponds to question and PIR addressed. A black entry is a non applicable
technique to the specific EEI being examined. They are added for easier reference.

The following is several figures and the culmination of exploration into application of
intelligence analysis techniques when used in fictional scenarios:

Figure 1.1
1a 1b 1c 1d 1e 1f 1g 1h 1i 1j 1k
Q2.PIR.I EEI.A. A,B B B B,C B
EEI.B. A,B,F C A,C A,C B,C C

3
EEI.C. A A,B,C,D C A,B,C A,C
EEI.D. A,B A,B,C,D A,B,C C,D,E,F B B
EEI.E. A,B A B,C,D A,B B
EEI.F. A,B A A A,B A,B A,B,C C
EEI.G. B B,C C
EEI.H. A,B B,C,D,E,F B,C
EEI.I. A A A,B B,C B,C,D B,C A,B,C B
EEI.J. A C C A B A,B,C A,B,C
EEI.K. A B A A,B B,C B B,C B
EEI.L. A,B A,B B,C,D,E,F B B,C A,C
Figure 1.2
2a 2b 2c 2d 2e 2f 2g 3a 3b 3c
EEI.A. B,C A,C,I B A,B,C,I C,D,E C,D,E C,D
EEI.B. C C B C,F B C,F
EEI.C. B,C B C C,E C,E,G
EEI.D. B,C B,C,I,K B,C,I B,C B,C A,B,C D,H C,D,H C,D,H
EEI.E. A,B I,K I,K B D,F,H D,E,H E E
EEI.F. A,B A,B,C,I A,B,C,I A,B,C,I D,E,H
EEI.G. B,C,D,E C,D,E,H C,D,E,H C,D,E,H
EEI.H. A,B,C A,B,C E,D,H
EEI.I. A,B,C E,H E,H E,H
EEI.J. A,B,C,I B,C,D,E D,H
EEI.K. A,B C B,C A,B,C E,D,H E,H E,H
EEI.L. A,B,C A,B,C,I A,B,C,I A,B,C,I A,B,C,I A,B,C E,H D,E,H E,H
Figure 1.3
4a 4b 4c 4d 4e 4f 4g 5a 5b 5c
EEI.A. D,F C,D,I D,F,G,I,K D,F,K G A,C,G,I,K D,F,I,K J
EEI.B. F F,I,K F,G,I,K F,I,K G A,C,I,K F,H,I,K G,J
EEI.C. D,I,K D C,G B,C C,G
EEI.D. F D,F,H A,C,F C,D,F D,F,G,H,I,K,L D,F D,F,G C,F,G D,F,I,K C,F
EEI.E. F D,F D,F D,F,G,I,K D,F,K G F,G,H,I,J,K H F,J
EEI.F. F,H C,D,F,I,K C,D,F,I,K F,I,K G C,F,G H C,F,J
EEI.G. F C,D,F,H C,D,I,K D,F,G,H,I,K,L D C,G G,H,I,J,K C,D,E,F,G C,E,J
EEI.H. F D,F,I D,F,G,H,I,K,L D,F D,G A,C,G,I,K H,I,K G,J

4
EEI.I. F D,F C,D D,F,G F,G,H,I,J,K H G,J
D,F,I,
EEI.J. F D,F D,F,I D,F,G,H,I,K,L K D,F,G F,G,H,I,J,K H G,J
EEI.K. D,I,K D,G,H,I,K,L D,G A,C,G,I,K H
EEI.L. D,F,G,H,I,K,L D,F,G F,G,H,I,J,K H J
Figure 1.4
5d 5e 6a 6b 6c 6d 6e 6f 6g
EEI.A. D I,K D,F,I,K D,F,I,K F,G D,E,I,J,K
EEI.B. G,J F,G,H I,K I,K F,G,I,K F,G F,G.H,I,J,K J C,F,G,H,I,K
EEI.C. C,D I,K
EEI.D. J D,H D,H D,H D,H D,H D,H,J F,I,J,K
EEI.E. J J F,H,I,K D,E,H,I D,H,J D,H,J H,I,J,K
EEI.F. G,J D,E,H,I I,K F,G,H,I,K D,H H,J J D,H,I,J
EEI.G. G,J D,E,H E,H,I,K C,D,E,H H,I,J,K
EEI.H. G,J J D,E,H D,E,H,I,K J D,E,H
EEI.I. G,J J D,E,H,I D,E,H,I D,E,H,I D,E,H,I D,E,H,I D,E,H,I,J D,E,H
EEI.J. G,J J D,H,I D,E,H,I D,E,H,I D,E,H,I,J D,E,H
EEI.K. J C,D,E
EEI.L. J D,E,H,I D,E,H,I D,E,H,I,J D,E,H,I,J D,E,H
Figure 1.5
7a 7b 8a 8b 8c 8d 8e 8f 8g
EEI.A. I,K F,I,K D,F,I,K A,D,F,I,K
EEI.B. I,K C,H,L B,L
EEI.C. I,K
EEI.D. J,K J,K D,F,I,K
EEI.E. J,K,L J,K,L L L L L J,L H,L L
EEI.F. B,L A,H,L C,I,K,L
EEI.G. L L C,H,L E,F,H,I,K,L
EEI.H. A,H,L
EEI.I. J,K I,K,L C,H,L B,L D,F,I,K A,D,F
EEI.J. J,K,L J,K,L L L L L J,L H,L
EEI.K.
EEI.L. J,K J,K A,D,F
Figure 2.1
1a 1b 1c 1d 1e 1f 1g 1h 1i 1j

5
Q4.PIR.I. EEI.A. A,B A A,B,E A A,B A,C,E A,D,E
EEI.B. B B,C B,C A,B,C,D,E A,B,C
EEI.C. A,B A,B C D,E B,C,D A,B,C A,B,C B,C
EEI.D. A,B A,B,C C C,D,E,F A,B,C A,B B,C
EEI.E. B B A B,C C A,B,C B,C
EEI.F. B B A,B,C A,B,C A,B B,C A,B,C A,B,C A,B,C C
Q4.PIR.II. EEI.A. A,B A B,C D,E
EEI.B. A,B B,C C A,B A,B,C A,B A,B C
EEI.C. A,B,F B,C C B,C,D
EEI.D. A,B,F A,C B,C B A,B,C B,C
EEI.E. B B B B,C,E A C B,C A,B,C
EEI.F. B B,C A,B A A,B
EEI.G. B A,B B,C A,B,C,D A,B,C A,B,C B A,B,C A,B
Figure 2.2
2a 2b 2c 2d 2e 2f 2g 3a 3b 3c
EEI.A. A,C,D,E C,I,K C,I,K B,C B,C,D,E D,E,H D,E,H
EEI.B. A,B B,C B,C
EEI.C. B,C C C C,F B A,B,C C,D,E,H
EEI.D. A,B C A,B,C,I B,C D,E,H C,D
EEI.E. B,C B,C B D,F,H D,H C,D,E,H
EEI.F. A,B C C,F B,C,D,E C
EEI.A. A,B C,I,K C A,B,C,I A,B,C C,D,E D,E,H
EEI.B. B,C C A,B,C,I A,B,C C,D,E C,D,E
EEI.C. C B A,B,C,I A,B,C,I C,D,E D,H C,D,E
EEI.D. A,C,E A,B,C,I A,B,C,I A,B,C,I E,D,H C,E
EEI.E. A,B,C B,C,I,K C E,H E,H E
EEI.F. A,B C B,C B,C E,H D,E,H C,D,H
EEI.G. A,B,C,D C B,C B,C,F B,C E,H E,H C,D
Figure 2.3
4a 4b 4c 4d 4e 4f 4g 5a 5b 5c
EEI.A. C,D,I,K F,G,I,K C,J,I,K G A,C,I,K D,F,I,K C,E,J
EEI.B. F F,H F C,D,I,K G A,C,F D,F,I,K C,E,J
EEI.C. F D,F C,D,I,K C,D,I,K A,C,G,I,K C,G
EEI.D. D,F A,C,F D,I,K D,F,G,H,I,K,L D,F,K G A,C,F H G,J

6
EEI.E. D,F D,F D,G,H,I,K,L F,I,K G A,C,G,I,K H
EEI.F. C,D,F,H F D,F,I D,F,G,I,K D,F G C,F,G C,G
EEI.A. D,F F,G,I,K D,F C,F,G H F,J
EEI.B. F D,F D,F,G,I,K G G,H,I,J,K C,E,J
EEI.C. F F,H F D,F,I F,G,I,K G G,H,I,J,K H C,E,J
EEI.D. F,I,K A,C,F D,F,I D,F,G,H,I,K,L A,C,F H
EEI.E. F D,F D,F D,F,G,H,I,K,L G A,B,C,I,K J
EEI.F. F F,H D,F C,D D,F,G,H,I,K,L G A,C G,J
EEI.G. F F,H D,F C,D,F,I,K D,F,G,H,I,K,L A,C D,F,I,K C,F,J
Figure 2.4
5d 5e 6a 6b 6c 6d 6e 6f 6g
EEI.A. J E,F,J,I,K A,B,C,G,J F,J,I,K C,I,K
EEI.B. J C,D B,C,I,K
EEI.C. J J C,D,E
EEI.D. F,G,H D,E,H D,H F,G,H,I,K F,G D,H,J C,D,E
EEI.E. J D,E,H I,K F,H,I,K D,E,H,I J C,I,K
EEI.F. G,J J C,D D,H D,H D,H J D,E,H
EEI.A. J C,D,E D,E,H,I D,E,H,I,K D,E,H,I C,I,K
EEI.B. G,J E,F,J,I,K D,H I,K D,E,H
EEI.C. J D,H I,K D,H J
EEI.D. E,F,J,I,K D,H H,I,J,K
EEI.E. G,J E,F,J,I,K D,E,H D,E,H F,G D,H D,H,J C,D,E
EEI.F. C,D H,J D,E,H,I,J
EEI.G. G,D,E,J J,I,K C,D D,E,H,I F,G,H,I,K F,G,H,I,K F,G,H,I,J,K D,E,H,I,J C,D,E
Figure 2.5
7a 7b 8a 8b 8c 8d 8e 8f 8g
EEI.A. F,I,K C,D,H,L A,B,L C,I,K,L
EEI.B. I,K
EEI.C. B,C,I,J,K I,K
EEI.D. B,L D,F,I,K
EEI.E. C,D,L
EEI.F. J,K I,K B,L A,H,L
EEI.A. J,K I,K L J,L H,L
EEI.B. B,L A,D,F

7
EEI.C. J,K I,K C,D,H,L A,H,L
EEI.D. J,L H,L
EEI.E. J,L H,L
EEI.F. J,L H,L
EEI.G. J,K I,K C,D,H,L A,B,L
Figure 3.1
1a 1b 1c 1d 1e 1f 1g 1h 1i 1j 1k
Q5.PIR.I. EEI.A. A A A,C A,C C D,E A,B,C A,B,C
EEI.B. A B A,B B B,C,D C,D
EEI.C. C B,C C C
Q5.PIR.II. EEI.A. A B C C C B,C B,C A,B A,B
EEI.B. A,B A B C C B,C B,C C,D
EEI.C. A A B,C B,C B,C B,C,F,H
EEI.D. B B C C B A,B A,B,C
Figure 3.2
3a 3b 3c 4a 4b 4c 4d 4e 4f 4g
EEI.A. C,D,E F F,H C,D,E,F F,G,H,I,K F,G,H,I,J,K G,J
EEI.B. B,C,D,H D,F D,F,H C,F B,F,H F,H F,H,I,K G
EEI.C. C,D,H F C,F,I,K I,K D,G
EEI.A. A,B,C,I,K D,H D,H C,D,E D,E,F,G,H C,D,E G
EEI.B. F F D,F D,E,G,I,K E,D,I,K
EEI.C. C,D,H E E B,C,D E,F,G,H,I,K D,E,H,I,K G,H,I,K
EEI.D. B,C,D,E E E,I,K F D,F,I,K F,G,H,I,K D,F,I,K G
Figure 3.3
5a 5b 5c 5d 5e 6a 6b 6c 6d 6e 6f
EEI.A. B,C,D B,C,H D,J D,J B,C,D D,E,F,I,J,K D,E,F,I,K J
EEI.B. C,D,F D,F D,J D,J I,K I,K D,J
EEI.C. B,C,D,I C,D,H,I,K D,H
EEI.A. A,B,C H C,H B,C,D B,C,D J
EEI.B. C,D,E H D,E,K G,I,J,K
EEI.C. B,C,D,F,H F,H F,G,H,J G,J E,F,I,K I,K F,H F,H F,H F,H
EEI.D. C,D,E H H,I,J,K J B,C,D,F,K A,B,C,J H,J,I,K
Figure 3.4
6g 7a 7b 8a 8b 8c 8d 8e 8f 8g
EEI.A. J I,K D,I,K C,L C,E,L C,D,L

8
EEI.B. C,D,I,K I,K J J L L
EEI.C. I,K F,K,I C,H,L C,H,L
EEI.A. C,D,I,J,K L L L B,C,L C,L
EEI.B. G,J,I,K I,K I,J,K L C,D,L C,D,L C,E,L
EEI.C. F,H I,K F,H,I,K C,L
EEI.D. C,D,I,K A,I,K C,D,I,K L G,L
Figure 4.1
1a 1b 1c 1d 1e 1f 1g 1h 1i 1j 1k
Q7.PIR.I. EEI.A. A C,D C C C C B,C B,C
EEI.B. A C,D C C C C B,C B,C
EEI.C. A A A C,D B B C A,B,C A,B,C
EEI.D. C B,C C C
EEI.E. A,B A,B B,C,D,E,F B B,C A,C
EEI.F. A,B,F A,C B,C B A,B,C B,C A,B
Figure 4.2
2a 2b 2c 2d 2e 2f 2g 3a 3b 3c
EEI.A. A,C C,I,K A A,C B,C C,D B,C C,D,H D,H D,H
EEI.B. A,C C,I,K A A,C B,C C,D B,C C,D,H D,H D,H
EEI.C. A A,C A C B,C B,C A,C,D E E
EEI.D. C,D C,D C C,D,H
EEI.E. A,B,C A,B,C,I A,B,C,I A,B,C,I A,B,C,I A,B,C E,H D,E,H E,H
EEI.F. A,C,E A,B,C,I A,B,C,I A,B,C,I E,D,H C,E
Figure 4.3
4a 4b 4c 4d 4e 4f 4g 5a 5b 5c
EEI.A. F F D,H F,G,H G,I,J,K G C,D,E H J
EEI.B. F F D,H F,G,H G,I,J,K G C,D,E H J
EEI.C. F E,F,H D,E,F,G,H E,I,K G A,C,I,K H,I,K D,I,J,K
EEI.D. F C,F,I,K I,K D,G B,C,D,I
EEI.E. D,F,G,H,I,K,L D,F,G F,G,H,I,J,K H J
EEI.F. F,I,K A,C,F D,F,I D,F,G,H,I,K,L A,C,F H
Figure 4.4
5d 5e 6a 6b 6c 6d 6e 6f 6g 7a 7b
EEI.A. J F,H,J C,D E,F,H E,H J,I,K J C,D,I,K I,K
EEI.B. J F,H,J C,D E,F,H E,H J,I,K J C,D,I,K I,K
EEI.C. J A,J I,K F,I,K D,H,I,K I,K G,I,J,K

9
EEI.D. C,D,H,I,K D,H I,K F,K,I
EEI.E. J D,E,H,I D,E,H,I D,E,H,I,J D,E,H,I,J D,E,H J,K J,K
EEI.F. E,F,J,I,K D,H H,I,J,K
Figure 4.5
8a 8b 8c 8d 8e 8f 8g
EEI.A. L L
EEI.B. L L
EEI.C. C,D,I,K,L C,I,K,L I,K,L
EEI.D. C,H,L C,H,L
EEI.E. A,D,F
EEI.F. J,L H,L

IV. Conclusion
Heuer and Pherson warn analysts can easily get in tool ruts using analytic techniques
they are comfortable with. 5 This can lead to confirmation bias among other analytic flaws in the
technique selection process. The figures above address these issues in the analytic process in 4
main ways: by seeing which techniques are effective at choosing desired outcomes an analyst
could be less predispositioned to a single technique if others produce similar results, multiple
techniques used in an analytic product help make a more comprehensive presentation of the
problems analyses to the consumer, seeing which tools are not effective at producing an outcome
for a certain scenario eliminate wasting time on approaching the problem with that technique,
improves efficiency of the analyst by having the techniques applicable available from the
beginning of an analytic project. Altogether analytic tools that establish an input (problem and
technique) to a specified result (outcomes) creates an intelligence analysis methodology. The
methodology construction in this project has been subjective. These findings are open to further
exploration and interpretations with additional scenarios using more scientific approaches. Such
studies could possibly produce intelligence methodology theory.

10
V. Appendix

1. Decomposition/Visualization 4. Hypothesis Generation/Testing b. Structured Debate


a. Getting Started Checklist a. Simple 8. Decision Support
b. Customer Checklist b. Multiple a. Decision Trees
c. Issue Redefinition c. Quadrant b. Decision Matrix
d. Chronologies, Timelines d. Diagnostic Reasoning c. Pros-Cons, Faults-Fixes
e. Sorting e. ACH d. Force Fields
f. Ranking, Scoring, Prioritizing f. Argument Mapping e. Impact Matrix
g. Matrices g. Deception Detection f. Complexity Manager
h. Venn Analysis 5. Assessment of Cause/Effect g. SWOT
i. Network Analysis a. Key Assumptions Check
j. Mind Maps, Concept Maps b. Structured Analogies
k. Process Maps, Gantt Charts c. Role Playing
2. Idea Generation d. Red Hat
a. Structured Brainstorming e. Outside In Thinking
b. Virtual Brainstorming 6. Challenge Analysis
c. Nominal Group Techniques a. Premortem Analysis
d. Starbursting b. Structured Self Critique
e. Cross Impact Matrix c. What if?

f. Morphological Analysis d. High Impact/ Low Probability


g. Quadrant Crunching e. Devil's Advocacy
3. Scenarios/Indicators f. Red Team
a. Scenario Analysis g. Delphi Method
b. Indicator Analysis 7. Conflict Management
c. Indicator Validation a. Adversarial Collaboration

11
VI. Notes

1. Richards J. Heuer, and Randolph H. Pherson. Structured Analytic Techniques for


Intelligence Analysis. 2015.
2. Ibid
3. Ibid
4. Ibid
5. ibid

12
Bibliography

Heuer, Richards J., and Randolph H. Pherson. Structured Analytic Techniques for Intelligence
Analysis. 2015.

13

Anda mungkin juga menyukai