1
threatened resources with intervention?
EEI.L. What antagonistic forces exist in suspected countries that may pose a threat to
Chinese losing influence in the region?
Q4. The civil war in Sudan is raging and it looks increasingly likely that an even
more extremist leader, a known supporter of Al Qaeda, is coming to power. The new
regime is both virulently anti-American and expansionist, talking about Somalia, Egypt,
and exporting its beliefs. What does this mean for United States security?
PIR.I. How much of a threat is this ne extremist leader to United States interests in the
region?
EEI.A. What is the environment of local support for this leader?
EEI.B. What networks is the leader affiliated with besides Al Qaeda?
EEI.C. Have the leaders affiliations contributed to an increase in capabilities?
EEI.D. How likely is it the leader will come to power?
EEI.E. Which political opponents are the greatest resistance to this leader in the Sudanese
political landscape?
EEI.F. Can political opponents mitigate the leaders influence in the Sudanese political
landscape?
PIR.II. What threats do this extremist group pose to United States interests in the region?
EEI.A. What are the functional levels of support for the group locally?
EEI.B. What networks is the group affiliated with besides Al Qaeda?
EEI.C. What tactics has the group employed to consolidate influence and power within
the region?
EEI.D. What capabilities can the organization acquire, in the immediate future, to expand
their territory?
EEI.E. How stable and resistant are areas sought for expansion to an invading force?
EEI.F. What is the public opinion of the neighboring countries to this group's ideology?
EEI.G. In countries sought for expansion by the group how supportive is the government
to coalition supported intervention if necessary?
Q5. Killings and kidnappings on the US-Mexican border have escalated, spilling
over into the US. More than 2 dozen Americans have been kidnapped in California and
taken to Mexico in the last year and have either been held or executed. Running gun battles
between drug cartels have escalated. The drug cartels are using IEDs, automatic weapons,
and grenades. The government is unable to control the violence and thousands of Mexican
troops and police patrol the border cities. Dozens of people are killed every month in what
has become open warfare. What does this mean for United States security?
PIR.I. What effects is the situation at the US-Mexican border currently having on United
States security?
EEI.A. Why are kidnappings suddenly escalated?
EEI.B. What value do kidnapped victims have to the parties conducting the act?
EEI.C. Is there a correlation between increase in kidnappings and lethality of tactics
being employed?
PIR.II. How ill the situation affect the current intended outcome of policies and strategies
the United States employs at the US-Mexican border area?
EEI.A. What scenarios create the environment for open warfare to cross the border?
EEI.B. Whom is in a position to resist the cartels from within Mexico?
2
EEI.C. What possible future outcomes can be expected without a change in policy
towards the region?
EEI.D. What are the parties involved attempting to accomplish?
Q7. Iranian interference in domestic Iraqi politics and security is on the rise.
Iranian bomb components, weapons, propaganda, and personnel are increasingly crossing
the border into Iraq. What does this mean for the domestic Iraqi security situation?
PIR.I. How is Iranian influence specifically affecting the security of a post ISIS Iraq?
EEI.A. How are bomb components being used, what are the specific targets after
assemblage?
EEI.B. Whom is the recipient of smuggled weapons?
EEI.C. How is propaganda perceived by the Iraqi population?
EEI.D. What reasons can be attributed to the increase in border crossings?
EEI.E. How is the Iraqi government responding to the change of political dynamics
within its borders?
EEI.F. What is Iran trying to achieve with an increased effort in Iraq?
III. Outcomes Figures
Below are two legends describing how figures should be interpreted:
(Family)(Technique)
(EEI.A-x) (Outcome(s))
Can be read for example: When (EEI.x) is addressed using (Family)(Technique) then
the outcome could include (Outcome(s))
Q2.PIR.I
Q4.PIR.I.
Q4.PIR.II.
Q5.PIR.I.
Q5.PIR.II.
Q7.PIR.I
Color corresponds to question and PIR addressed. A black entry is a non applicable
technique to the specific EEI being examined. They are added for easier reference.
The following is several figures and the culmination of exploration into application of
intelligence analysis techniques when used in fictional scenarios:
Figure 1.1
1a 1b 1c 1d 1e 1f 1g 1h 1i 1j 1k
Q2.PIR.I EEI.A. A,B B B B,C B
EEI.B. A,B,F C A,C A,C B,C C
3
EEI.C. A A,B,C,D C A,B,C A,C
EEI.D. A,B A,B,C,D A,B,C C,D,E,F B B
EEI.E. A,B A B,C,D A,B B
EEI.F. A,B A A A,B A,B A,B,C C
EEI.G. B B,C C
EEI.H. A,B B,C,D,E,F B,C
EEI.I. A A A,B B,C B,C,D B,C A,B,C B
EEI.J. A C C A B A,B,C A,B,C
EEI.K. A B A A,B B,C B B,C B
EEI.L. A,B A,B B,C,D,E,F B B,C A,C
Figure 1.2
2a 2b 2c 2d 2e 2f 2g 3a 3b 3c
EEI.A. B,C A,C,I B A,B,C,I C,D,E C,D,E C,D
EEI.B. C C B C,F B C,F
EEI.C. B,C B C C,E C,E,G
EEI.D. B,C B,C,I,K B,C,I B,C B,C A,B,C D,H C,D,H C,D,H
EEI.E. A,B I,K I,K B D,F,H D,E,H E E
EEI.F. A,B A,B,C,I A,B,C,I A,B,C,I D,E,H
EEI.G. B,C,D,E C,D,E,H C,D,E,H C,D,E,H
EEI.H. A,B,C A,B,C E,D,H
EEI.I. A,B,C E,H E,H E,H
EEI.J. A,B,C,I B,C,D,E D,H
EEI.K. A,B C B,C A,B,C E,D,H E,H E,H
EEI.L. A,B,C A,B,C,I A,B,C,I A,B,C,I A,B,C,I A,B,C E,H D,E,H E,H
Figure 1.3
4a 4b 4c 4d 4e 4f 4g 5a 5b 5c
EEI.A. D,F C,D,I D,F,G,I,K D,F,K G A,C,G,I,K D,F,I,K J
EEI.B. F F,I,K F,G,I,K F,I,K G A,C,I,K F,H,I,K G,J
EEI.C. D,I,K D C,G B,C C,G
EEI.D. F D,F,H A,C,F C,D,F D,F,G,H,I,K,L D,F D,F,G C,F,G D,F,I,K C,F
EEI.E. F D,F D,F D,F,G,I,K D,F,K G F,G,H,I,J,K H F,J
EEI.F. F,H C,D,F,I,K C,D,F,I,K F,I,K G C,F,G H C,F,J
EEI.G. F C,D,F,H C,D,I,K D,F,G,H,I,K,L D C,G G,H,I,J,K C,D,E,F,G C,E,J
EEI.H. F D,F,I D,F,G,H,I,K,L D,F D,G A,C,G,I,K H,I,K G,J
4
EEI.I. F D,F C,D D,F,G F,G,H,I,J,K H G,J
D,F,I,
EEI.J. F D,F D,F,I D,F,G,H,I,K,L K D,F,G F,G,H,I,J,K H G,J
EEI.K. D,I,K D,G,H,I,K,L D,G A,C,G,I,K H
EEI.L. D,F,G,H,I,K,L D,F,G F,G,H,I,J,K H J
Figure 1.4
5d 5e 6a 6b 6c 6d 6e 6f 6g
EEI.A. D I,K D,F,I,K D,F,I,K F,G D,E,I,J,K
EEI.B. G,J F,G,H I,K I,K F,G,I,K F,G F,G.H,I,J,K J C,F,G,H,I,K
EEI.C. C,D I,K
EEI.D. J D,H D,H D,H D,H D,H D,H,J F,I,J,K
EEI.E. J J F,H,I,K D,E,H,I D,H,J D,H,J H,I,J,K
EEI.F. G,J D,E,H,I I,K F,G,H,I,K D,H H,J J D,H,I,J
EEI.G. G,J D,E,H E,H,I,K C,D,E,H H,I,J,K
EEI.H. G,J J D,E,H D,E,H,I,K J D,E,H
EEI.I. G,J J D,E,H,I D,E,H,I D,E,H,I D,E,H,I D,E,H,I D,E,H,I,J D,E,H
EEI.J. G,J J D,H,I D,E,H,I D,E,H,I D,E,H,I,J D,E,H
EEI.K. J C,D,E
EEI.L. J D,E,H,I D,E,H,I D,E,H,I,J D,E,H,I,J D,E,H
Figure 1.5
7a 7b 8a 8b 8c 8d 8e 8f 8g
EEI.A. I,K F,I,K D,F,I,K A,D,F,I,K
EEI.B. I,K C,H,L B,L
EEI.C. I,K
EEI.D. J,K J,K D,F,I,K
EEI.E. J,K,L J,K,L L L L L J,L H,L L
EEI.F. B,L A,H,L C,I,K,L
EEI.G. L L C,H,L E,F,H,I,K,L
EEI.H. A,H,L
EEI.I. J,K I,K,L C,H,L B,L D,F,I,K A,D,F
EEI.J. J,K,L J,K,L L L L L J,L H,L
EEI.K.
EEI.L. J,K J,K A,D,F
Figure 2.1
1a 1b 1c 1d 1e 1f 1g 1h 1i 1j
5
Q4.PIR.I. EEI.A. A,B A A,B,E A A,B A,C,E A,D,E
EEI.B. B B,C B,C A,B,C,D,E A,B,C
EEI.C. A,B A,B C D,E B,C,D A,B,C A,B,C B,C
EEI.D. A,B A,B,C C C,D,E,F A,B,C A,B B,C
EEI.E. B B A B,C C A,B,C B,C
EEI.F. B B A,B,C A,B,C A,B B,C A,B,C A,B,C A,B,C C
Q4.PIR.II. EEI.A. A,B A B,C D,E
EEI.B. A,B B,C C A,B A,B,C A,B A,B C
EEI.C. A,B,F B,C C B,C,D
EEI.D. A,B,F A,C B,C B A,B,C B,C
EEI.E. B B B B,C,E A C B,C A,B,C
EEI.F. B B,C A,B A A,B
EEI.G. B A,B B,C A,B,C,D A,B,C A,B,C B A,B,C A,B
Figure 2.2
2a 2b 2c 2d 2e 2f 2g 3a 3b 3c
EEI.A. A,C,D,E C,I,K C,I,K B,C B,C,D,E D,E,H D,E,H
EEI.B. A,B B,C B,C
EEI.C. B,C C C C,F B A,B,C C,D,E,H
EEI.D. A,B C A,B,C,I B,C D,E,H C,D
EEI.E. B,C B,C B D,F,H D,H C,D,E,H
EEI.F. A,B C C,F B,C,D,E C
EEI.A. A,B C,I,K C A,B,C,I A,B,C C,D,E D,E,H
EEI.B. B,C C A,B,C,I A,B,C C,D,E C,D,E
EEI.C. C B A,B,C,I A,B,C,I C,D,E D,H C,D,E
EEI.D. A,C,E A,B,C,I A,B,C,I A,B,C,I E,D,H C,E
EEI.E. A,B,C B,C,I,K C E,H E,H E
EEI.F. A,B C B,C B,C E,H D,E,H C,D,H
EEI.G. A,B,C,D C B,C B,C,F B,C E,H E,H C,D
Figure 2.3
4a 4b 4c 4d 4e 4f 4g 5a 5b 5c
EEI.A. C,D,I,K F,G,I,K C,J,I,K G A,C,I,K D,F,I,K C,E,J
EEI.B. F F,H F C,D,I,K G A,C,F D,F,I,K C,E,J
EEI.C. F D,F C,D,I,K C,D,I,K A,C,G,I,K C,G
EEI.D. D,F A,C,F D,I,K D,F,G,H,I,K,L D,F,K G A,C,F H G,J
6
EEI.E. D,F D,F D,G,H,I,K,L F,I,K G A,C,G,I,K H
EEI.F. C,D,F,H F D,F,I D,F,G,I,K D,F G C,F,G C,G
EEI.A. D,F F,G,I,K D,F C,F,G H F,J
EEI.B. F D,F D,F,G,I,K G G,H,I,J,K C,E,J
EEI.C. F F,H F D,F,I F,G,I,K G G,H,I,J,K H C,E,J
EEI.D. F,I,K A,C,F D,F,I D,F,G,H,I,K,L A,C,F H
EEI.E. F D,F D,F D,F,G,H,I,K,L G A,B,C,I,K J
EEI.F. F F,H D,F C,D D,F,G,H,I,K,L G A,C G,J
EEI.G. F F,H D,F C,D,F,I,K D,F,G,H,I,K,L A,C D,F,I,K C,F,J
Figure 2.4
5d 5e 6a 6b 6c 6d 6e 6f 6g
EEI.A. J E,F,J,I,K A,B,C,G,J F,J,I,K C,I,K
EEI.B. J C,D B,C,I,K
EEI.C. J J C,D,E
EEI.D. F,G,H D,E,H D,H F,G,H,I,K F,G D,H,J C,D,E
EEI.E. J D,E,H I,K F,H,I,K D,E,H,I J C,I,K
EEI.F. G,J J C,D D,H D,H D,H J D,E,H
EEI.A. J C,D,E D,E,H,I D,E,H,I,K D,E,H,I C,I,K
EEI.B. G,J E,F,J,I,K D,H I,K D,E,H
EEI.C. J D,H I,K D,H J
EEI.D. E,F,J,I,K D,H H,I,J,K
EEI.E. G,J E,F,J,I,K D,E,H D,E,H F,G D,H D,H,J C,D,E
EEI.F. C,D H,J D,E,H,I,J
EEI.G. G,D,E,J J,I,K C,D D,E,H,I F,G,H,I,K F,G,H,I,K F,G,H,I,J,K D,E,H,I,J C,D,E
Figure 2.5
7a 7b 8a 8b 8c 8d 8e 8f 8g
EEI.A. F,I,K C,D,H,L A,B,L C,I,K,L
EEI.B. I,K
EEI.C. B,C,I,J,K I,K
EEI.D. B,L D,F,I,K
EEI.E. C,D,L
EEI.F. J,K I,K B,L A,H,L
EEI.A. J,K I,K L J,L H,L
EEI.B. B,L A,D,F
7
EEI.C. J,K I,K C,D,H,L A,H,L
EEI.D. J,L H,L
EEI.E. J,L H,L
EEI.F. J,L H,L
EEI.G. J,K I,K C,D,H,L A,B,L
Figure 3.1
1a 1b 1c 1d 1e 1f 1g 1h 1i 1j 1k
Q5.PIR.I. EEI.A. A A A,C A,C C D,E A,B,C A,B,C
EEI.B. A B A,B B B,C,D C,D
EEI.C. C B,C C C
Q5.PIR.II. EEI.A. A B C C C B,C B,C A,B A,B
EEI.B. A,B A B C C B,C B,C C,D
EEI.C. A A B,C B,C B,C B,C,F,H
EEI.D. B B C C B A,B A,B,C
Figure 3.2
3a 3b 3c 4a 4b 4c 4d 4e 4f 4g
EEI.A. C,D,E F F,H C,D,E,F F,G,H,I,K F,G,H,I,J,K G,J
EEI.B. B,C,D,H D,F D,F,H C,F B,F,H F,H F,H,I,K G
EEI.C. C,D,H F C,F,I,K I,K D,G
EEI.A. A,B,C,I,K D,H D,H C,D,E D,E,F,G,H C,D,E G
EEI.B. F F D,F D,E,G,I,K E,D,I,K
EEI.C. C,D,H E E B,C,D E,F,G,H,I,K D,E,H,I,K G,H,I,K
EEI.D. B,C,D,E E E,I,K F D,F,I,K F,G,H,I,K D,F,I,K G
Figure 3.3
5a 5b 5c 5d 5e 6a 6b 6c 6d 6e 6f
EEI.A. B,C,D B,C,H D,J D,J B,C,D D,E,F,I,J,K D,E,F,I,K J
EEI.B. C,D,F D,F D,J D,J I,K I,K D,J
EEI.C. B,C,D,I C,D,H,I,K D,H
EEI.A. A,B,C H C,H B,C,D B,C,D J
EEI.B. C,D,E H D,E,K G,I,J,K
EEI.C. B,C,D,F,H F,H F,G,H,J G,J E,F,I,K I,K F,H F,H F,H F,H
EEI.D. C,D,E H H,I,J,K J B,C,D,F,K A,B,C,J H,J,I,K
Figure 3.4
6g 7a 7b 8a 8b 8c 8d 8e 8f 8g
EEI.A. J I,K D,I,K C,L C,E,L C,D,L
8
EEI.B. C,D,I,K I,K J J L L
EEI.C. I,K F,K,I C,H,L C,H,L
EEI.A. C,D,I,J,K L L L B,C,L C,L
EEI.B. G,J,I,K I,K I,J,K L C,D,L C,D,L C,E,L
EEI.C. F,H I,K F,H,I,K C,L
EEI.D. C,D,I,K A,I,K C,D,I,K L G,L
Figure 4.1
1a 1b 1c 1d 1e 1f 1g 1h 1i 1j 1k
Q7.PIR.I. EEI.A. A C,D C C C C B,C B,C
EEI.B. A C,D C C C C B,C B,C
EEI.C. A A A C,D B B C A,B,C A,B,C
EEI.D. C B,C C C
EEI.E. A,B A,B B,C,D,E,F B B,C A,C
EEI.F. A,B,F A,C B,C B A,B,C B,C A,B
Figure 4.2
2a 2b 2c 2d 2e 2f 2g 3a 3b 3c
EEI.A. A,C C,I,K A A,C B,C C,D B,C C,D,H D,H D,H
EEI.B. A,C C,I,K A A,C B,C C,D B,C C,D,H D,H D,H
EEI.C. A A,C A C B,C B,C A,C,D E E
EEI.D. C,D C,D C C,D,H
EEI.E. A,B,C A,B,C,I A,B,C,I A,B,C,I A,B,C,I A,B,C E,H D,E,H E,H
EEI.F. A,C,E A,B,C,I A,B,C,I A,B,C,I E,D,H C,E
Figure 4.3
4a 4b 4c 4d 4e 4f 4g 5a 5b 5c
EEI.A. F F D,H F,G,H G,I,J,K G C,D,E H J
EEI.B. F F D,H F,G,H G,I,J,K G C,D,E H J
EEI.C. F E,F,H D,E,F,G,H E,I,K G A,C,I,K H,I,K D,I,J,K
EEI.D. F C,F,I,K I,K D,G B,C,D,I
EEI.E. D,F,G,H,I,K,L D,F,G F,G,H,I,J,K H J
EEI.F. F,I,K A,C,F D,F,I D,F,G,H,I,K,L A,C,F H
Figure 4.4
5d 5e 6a 6b 6c 6d 6e 6f 6g 7a 7b
EEI.A. J F,H,J C,D E,F,H E,H J,I,K J C,D,I,K I,K
EEI.B. J F,H,J C,D E,F,H E,H J,I,K J C,D,I,K I,K
EEI.C. J A,J I,K F,I,K D,H,I,K I,K G,I,J,K
9
EEI.D. C,D,H,I,K D,H I,K F,K,I
EEI.E. J D,E,H,I D,E,H,I D,E,H,I,J D,E,H,I,J D,E,H J,K J,K
EEI.F. E,F,J,I,K D,H H,I,J,K
Figure 4.5
8a 8b 8c 8d 8e 8f 8g
EEI.A. L L
EEI.B. L L
EEI.C. C,D,I,K,L C,I,K,L I,K,L
EEI.D. C,H,L C,H,L
EEI.E. A,D,F
EEI.F. J,L H,L
IV. Conclusion
Heuer and Pherson warn analysts can easily get in tool ruts using analytic techniques
they are comfortable with. 5 This can lead to confirmation bias among other analytic flaws in the
technique selection process. The figures above address these issues in the analytic process in 4
main ways: by seeing which techniques are effective at choosing desired outcomes an analyst
could be less predispositioned to a single technique if others produce similar results, multiple
techniques used in an analytic product help make a more comprehensive presentation of the
problems analyses to the consumer, seeing which tools are not effective at producing an outcome
for a certain scenario eliminate wasting time on approaching the problem with that technique,
improves efficiency of the analyst by having the techniques applicable available from the
beginning of an analytic project. Altogether analytic tools that establish an input (problem and
technique) to a specified result (outcomes) creates an intelligence analysis methodology. The
methodology construction in this project has been subjective. These findings are open to further
exploration and interpretations with additional scenarios using more scientific approaches. Such
studies could possibly produce intelligence methodology theory.
10
V. Appendix
11
VI. Notes
12
Bibliography
Heuer, Richards J., and Randolph H. Pherson. Structured Analytic Techniques for Intelligence
Analysis. 2015.
13