1,046
Views
0
CrossRef citations to date
0
Altmetric
Articles

Schelling Traps as Drivers of Intelligence Failure

Pages 101-130 | Published online: 09 Apr 2021
 

Abstract

A model suggests that Schelling salience through social traplike processes can generate dysfunctional organizational mindsets that increase the likelihood of intelligence failure. Schelling salience refers to how certain aspects can spontaneously and tacitly become collectively cognitively prominent, and thus, coordinate behavior. Short-term benefits of a predominant mindset may generate long-term biases in analysis, collection, and decisionmakers’ responsiveness. Strong mindsets do not inevitably generate intelligence failures. However, a particular organizational state, referred to as a “pleasant attractor,” where sustained strategies produce satisficing outcomes and alternative strategies are more uncertain and/or costly, is conducive to biased mindsets causing intelligence failures. Findings from an examination of nineteen historical cases of intelligence failures and successes, with an emphasis on four sequences of cases with an initial intelligence failure, supported the model.

Notes

1 Amy B. Zegart, “9/11 and the FBI: The Organizational Roots of Failure,” Intelligence and National Security 22, no. 2 (2007), pp. 165–184; Amy B. Zegart, “CNN with Secrets: 9/11, the CIA, and the Organizational Roots of Failure,” International Journal of Intelligence and CounterIntelligence 20, no. 1 ( 2007), pp. 18–49.

2 Kjetil Anders Hatlebrekke and M. L. R. Smith, “Towards a New Theory of Intelligence Failure? The Impact of Cognitive Closure and Discourse Failure,” Intelligence and National Security 25, no. 2 (2010), pp. 147–182; Robert Jervis, Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War (Ithaca, NY and London: Cornell University Press, 2010), pp. 175–178, 189–190.

3 Uri Bar-Joseph and Rose McDermott, Intelligence Success and Failure: The Human Factor (New York: Oxford University Press, 2017).

4 Matthew M. Aid, “Sins of Omission and Commission: Strategic Cultural Factors and US Intelligence Failures during the Cold War,” Intelligence and National Security 26, no. 4 (2011), pp. 481–483; Jack Davis, “Why Bad Things Happen to Good Analysts,” in Analyzing Intelligence: National Security Practitioners’ Perspectives (2nd ed.), edited by Roger Z. George and James B. Bruze (Washington, DC: Georgetown University Press, 2014), pp. 127–129; Irving L. Janis and Leon Mann, Decision Making: A Psychological Analysis of Conflict, Choice and Commitment (New York: The Free Press, 1979), pp. 129–133.

5 Erik J. Dahl, Intelligence and Surprise Attack: Failure and Success from Pearl Harbor to 9/11 and Beyond (Washington, DC: Georgetown University Press, 2013), pp. 2–3, 22–23.

6 Ibid., pp. 2–3, 22–23.

7 Davis, “Why Bad Things Happen to Good Analysts,” pp. 130–131; Arthur S. Hulnick, “What’s Wrong with the Intelligence Cycle,” Intelligence and National Security 21, no. 6 (2006), pp. 967–968; Arthur S. Hulnick, “Intelligence Producer-Consumer Relations in the Electronic Era,” International Journal of Intelligence and CounterIntelligence 24, no. 4 (2011–2012), pp. 748–751; Jervis, Why Intelligence Fails, pp. 157–179.

8 Jervis, Why Intelligence Fails, pp. 9, 179; Gregory F. Treverton and Renanah Miles, “Unheeded Warning of War: Why Policymakers Ignored the 1990 Yugoslavia Estimate,” Intelligence and National Security 32, no. 4 (2017), pp. 506–522.

9 Jervis, Why Intelligence Fails, pp. 174–175.

10 Uri Bar-Joseph, The Watchman Fell Asleep: The Surprise of Yom Kippur and Its Sources (Albany: State University of New York Press, 2005), p. 2; Cf. Dahl, Intelligence and Surprise Attack, pp. 1–3, 22–23.

11 Thomas Donaldson and Lee E. Preston, “The Stakeholder Theory of the Corporation: Concepts, Evidence, and Implications,” The Academy of Management Review 20, no. 1 (1995), pp. 65–91; Robert Phillips, R. Edward Freeman, and Andrew C. Wicks, “What Stakeholder Theory Is Not,” Business Ethics Quarterly 13, No. 4 (2003), pp. 479–502.

12 Thomas C. Schelling, The Strategy of Conflict (Cambridge, MA: Harvard University, 1960), pp. 54–58; see also Neil Martin, “Strategy as Mutually Contingent Choice: New Behavioral Lessons from Thomas Schelling’s The Strategy of Conflict,” SAGE Open 6, no. 2, (2016), pp. 1–12; Judith Mehta, Chris Starmer, and Robert Sugden, “An Experimental Investigation of Focal Points in Coordination and Bargaining: Some Preliminary Results,” in Decision Making Under Risk and Uncertainty, edited by John Geweke (Dordrecht: Kluwer Academic Publishers, 1992), pp. 211–219; Judith Mehta, Chris Starmer, and Robert Sugden, “The Nature of Salience: An Experimental Investigation of Pure Coordination Games,” The American Economic Review 84, no. 3 (1994), pp. 658–673; Judith Mehta, Chris Starmer, and Robert Sugden, “Focal Points in Pure Coordination Games: An Experimental Investigation,” Theory and Decision 36, no. 2 (1994), pp. 163–185; John Platt, “Social Traps,” American Psychologist 28, no. 8 (1973), pp. 641–651.

13 Compare to Ralf Lillbacka, “The Finnish Intelligence Failure on the Karelian Isthmus in 1944,” The International Journal of Intelligence, Security, and Public Affairs 21, no. 1 (2019), pp. 25–48.

14 See, for example, Steven W. Semler, “Systematic Agreement: A Theory of Organizational Alignment,” Human Resource Development Quarterly 8, no. 1 (1997), pp. 23–40; Isabel Quiros, “Organizational Alignment. A Model to Explain the Relationships between Organizational Relevant Variables,” International Journal of Organizational Analysis 17, no. 4 (2009), pp. 285–305; Jorge Walter, Franz W. Kellermanns, Steven W. Floyd, John F. Veiga, and Curtis Matherne, “Strategic Alignment: A Missing Link in the Relationship between Strategic Consensus and Organizational Performance,” Strategic Organization 11, no. 3 (2013), pp. 304–328.

15 Beng-Chong Lim and Katherine J. Klein, “Team Mental Models and Team Performance: A Field Study of the Effects of Team Mental Model Similarity and Accuracy,” Journal of Organizational Behaviour 27, no. 4 (2006), pp. 403–418; John E. Mathieu, Gerald F. Goodwin, Tonia S. Heffner, Eduardo Salas, and Janis A. Cannon-Bowers, “The Influence of Shared Mental Models on Team Process and Performance,” Journal of Applied Psychology 85, no. 2 (2000), pp. 273–283.

16 Gazi Islam, “Extending Organizational Cognition: A Conceptual Exploration of Mental Extension in Organizations,” Human Relations 68, no. 3 (2015), pp. 463–487.

17 Jack Davis, “Combatting Mind-Set,” Studies in Intelligence 36, no. 5, unclassified edition (1992), pp. 33–38; Davis, “Why Bad Things Happen to Good Analysts,” pp. 121–134.

18 Richards J. Heuer, Psychology of Intelligence Analysis (Washington, DC: Center for the Study of Intelligence, Central Intelligence Agency, 1999), p. 10.

19 Robert Sugden, “Spontaneous Order,” Journal of Economic Perspectives 3, no. 4 (1989), pp. 85–97.

20 Schelling, The Strategy of Conflict; see also Shaun P. Hargreaves Heap, David Rojo Arjona, and Robert Sugden, “Coordination When There are Restricted and Unrestricted Options,” Theory and Decision 83, no. 2 (2017), pp. 107–129; Mehta et al., “The Nature of Salience,” pp. 658–662; Mehta et al., “Focal Points in Pure Coordination Games,” pp. 163–164; Martin, “Strategy as Mutually Contingent Choice,” pp. 1–3; Mehta et al., “An Experimental Investigation of Focal Points in Coordination and Bargaining,” pp. 211–213; André Orléan, “What is a Collective Belief?” in Cognitive Economics: An Interdisciplinary Approach, edited by Paul Bourgine and Jean-Pierre Nadal (Berlin: Springer, 2003), pp. 200–204.

21 Hargreaves Heap et al., “Coordination When There are Restricted and Unrestricted Options,” Mehta et al., “The Nature of Salience”; Mehta et al., “Focal Points in Pure Coordination Games”; Mehta et al., “An Experimental Investigation of Focal Points in Coordination and Bargaining.”

22 Schelling, The Strategy of Conflict, pp. 58–74, 112; see also Vincent P. Crawford, Uri Gneezy, and Yuval Rottenstreich, “The Power of Focal Points Is Limited: Even Minute Payoff Asymmetry May Yield Large Coordination Failures,” American Economic Review 98, no. 4 (2008), pp. 1443–1458 regarding the impact of asymmetric payoffs.

23 Hargreaves Heap et al., “Coordination When There are Restricted and Unrestricted Options.”

24 Martin, “Strategy as Mutually Contingent Choice”; Orléan, “What is a Collective Belief?” pp. 199–212; Schelling, The Strategy of Conflict, p. 74.

25 Herbert Simon, “Theories of Bounded Rationality,” in Decision and Organization: A Volume in Honor of Jacob Marschak, edited by C. Bartlett McGuire and Roy Radner (Amsterdam: North-Holland, 1972), pp. 161–176.

26 See the review in John Conlisk, “Why Bounded Rationality?” Journal of Economic Literature 34, no. 2 (1996), pp. 670–671; Sanjit Dhami, Ali Al-Nowaihi, and Cass R. Sunstein, “Heuristics and Public Policy: Decision-Making Under Bounded Rationality,” Studies in Microeconomics 7, no. 1 (2019), pp. 7–58.

27 Gerd Gigerenzer, “The Adaptive Toolbox,” in Bounded Rationality: The Adaptive Toolbox, edited by Gerd Gigerenzer and R. Selten (Cambridge, MA: The MIT Press, 2001), pp. 37–50; Gerd Gigerenzer and Henry Brighton, “Homo Heuristicus: Why Biased Minds Make Better Inferences,” Topics in Cognitive Science 1, no. 1 (2009), pp. 107–143; Peter M. Todd, Laurence Fiddick, and Stefan Krauss, “Ecological Rationality and Its Contents,” Thinking & Reasoning 6, no. 4 (2000), pp. 375–384.

28 Timur Kuran and Cass R. Sunstein, “Availability Cascades and Risk Regulation” (Chicago: University of Chicago Public Law & Legal Theory Working Paper No. 181, 2007).

29 Orléan, “What is a Collective Belief?” pp. 208–211.

30 Platt, “Social Traps.”

31 Danny Miller, The Icarus Paradox. How Exceptional Companies Bring About Their Own Downfall (New York: Harper Business, 1990); Danny Miller, “The Icarus Paradox: How Exceptional Companies Bring about Their Own Downfall,” Business Horizon 31, no. 1 (1992), pp. 24–35; Danny Miller, “The Architecture of Simplicity,” The Academy of Management Review 18, no. 1 (1993), pp. 116–138; Robert P. Wright, “Organizational Paradoxes: When Opposites Cease To Be Opposites,” in The Wiley Handbook of Personal Construct Psychology (1st ed.), edited by David A. Winter and Nick Reed (Chichester: John Wiley & Sons, 2016, 1st ed.), p. 307.

32 Miller, The Icarus Paradox, p. 185.

33 Miller, “The Icarus Paradox,” pp. 30–31; Miller, “The Architecture of Simplicity,” pp. 119–121, 125; Miller, The Icarus Paradox, pp. 16–17, 177–183.

34 Miller, “The Architecture of Simplicity,” pp. 119–121; Miller, The Icarus Paradox, pp. 16, 177–179.

35 Bar-Joseph and McDermott, Intelligence Success and Failure, p. 3.

36 Nassim Nicholas Taleb, Antifragile: Things that Gain from Disorder (London: Penguin, 2012).

37 David L. Levy, “Applications and Limitations of Complexity Theory in Organization Theory and Strategy,” in Handbook of Strategic Management (2nd ed.), edited by Jack Rabin, Gerald J. Miller, and W. Bartley Hildreth (New York: M. Dekker, 2000), pp. 67–87.

38 John W. Milnor, “Attractor,” Scholarpedia 1, no. 11 (2006), p. 1815. DOI:10.4249/scholarpedia.1815

39 Edward Ott, “Basin of Attraction,” Scholarpedia 1, no. 8 (2006), p. 1701. DOI:10.4249/scholarpedia.1701

40 Compare to the notion of “data immersion” by Heuer, Psychology of Intelligence Analysis, pp. 40–41.

41 John R. Boyd, A Discourse on Winning and Losing: Air University Press (Maxwell AFB, AL: Curtis E. LeMay Center for Doctrine Development and Education, 2018), pp. 383–385, https://www.airuniversity.af.edu/Portals/10/AUPress /Books/B_0151_Boyd_Discourse_Winning_Losing.PDF (accessed 14 October 2020).

42 Leslie A. DeChurch and Jessica R. Mesmer-Magnus, “Measuring Shared Team Mental Models: A Meta-Analysis,” Group Dynamics: Theory, Research, and Practice 14, no. 1 (2010), pp. 1–14.

43 Peter Gill, “Explaining Intelligence Failure: Rethinking the Recent Terrorist Attacks in Europe,” International Journal of Intelligence and CounterIntelligence 33, no. 1 (2020), pp. 43–67; see also Dahl, Intelligence and Surprise Attack, pp. 13–14.

44 For a discussion, see, for example, Richard K. Betts, “Surprise, Scholasticism, and Strategy: A Review of Ariel Levite’s Intelligence and Strategic Surprises,” International Studies Quarterly 33, no. 3 (1989), pp. 329–343; Ariel Levite, “Intelligence and Strategic Surprises Revisited: A Response to Richard K. Betts’s ‘Surprise, Scholasticism, and Strategy,’” International Studies Quarterly 33, no. 3 (1989), pp. 345–349; James J. Wirtz, “Review of Ariel Levite, Intelligence and Strategic Surprises,” Survival 30, no. 5 (1988), pp. 478–479.

45 Dahl, Intelligence and Surprise Attack, pp. 48–50.

46 See, for example, Vic Hasselblad and Lokhnygina, Yulia, “Tests for 2 × 2 Tables in Clinical Trials,” Journal of Modern Applied Statistical Methods 6, no. 2 (2007), pp. 456–468; Cyrus R. Mehta and Pralay Senchaudhuri, “Conditional versus Unconditional Exact Tests for Comparing Two Binomials” (Cambridge, MA: Cytel Software Cooperation, 2003), pp. 1–5, https://cdn2.hubspot.net/hub/1670/file-686659455-pdf/Blog_Article_April_2014-1.pdf (accessed 28 October 2020).

47 Adam Claasen, “The German Invasion of Norway, 1940: The Operational Intelligence Dimension,” Journal of Strategic Studies 27, no. 1 (2004), pp. 114–135; Olav Riste, “Intelligence and the ’Mindset’: The German Invasion of Norway in 1940,” Intelligence and National Security 22, no. 4 (2007), pp. 521–536.

48 Martin S. Alexander, “Radio-Intercepts, Reconnaissance and Raids: French Operational Intelligence and Communications in 1940,” Intelligence and National Security 28, no. 3 (2013), pp. 337–376; Eugenia C. Kiesling, “The Fall of France: Lessons of the 1940 Campaign,” Defence Studies 3, no. 1 (2003), pp. 109–123; Douglas Porch, “French Intelligence and the Fall of France, 1930–40,” Intelligence and National Security 4, no. 1 (1989), pp. 28–58.

49 Bar-Joseph and McDermott, Intelligence Success and Failure, pp. 55, 61–97.

50 Lloyd Clark, Kursk. The Greatest Battle (London: Headline Publishing Group, 2012), pp. 188, 190–193; David M. Glantz and Jonathan M. House, The Battle of Kursk (Lawrence: University Press of Kansas, 1999), pp. 1–2, 28–32, 55, 77–78, 84–85, 361–365; David M. Glantz, “Soviet Operational Intelligence in the Kursk Operation,” Intelligence and National Security 5, no. 1 (1990), pp. 5–49; Timothy P. Mulligan, “Spies, Ciphers and ‘Zitadelle’: Intelligence and the Battle of Kursk, 1943,” Journal of Contemporary History 22, no. 2 (1987), pp. 235–260; Valerii Nikolaevic Zamulin, “On the Role of Soviet Intelligence During the Preparation of the Red Army for the Summer Campaign of 1943,” The Journal of Slavic Military Studies 32, no. 2 (2019), pp. 235–255.

51 Anthony Cave Brown, Bodyguard of Lies. Volume 1 (New York: Harper & Row, 1975), pp. 472–473; Anthony Cave Brown, Bodyguard of Lies, Volume 2 (New York: Harper & Row, 1975), pp. 694–698, 715–718; Roger Hesketh, Fortitude: The D-Day Deception Campaign (London: St. Ermin’s Press, 1999), pp. 8, 46–57, 60, 168–169, 191–212; Joshua Levine, Operation Fortitude: The Greatest Hoax of the Second World War (London: Harper Collins, 2011); Timothy J. Smith, “Overlord/Bodyguard: Intelligence Failure through Adversary Deception,” International Journal of Intelligence and CounterIntelligence 27, no. 3 (2014), pp. 550–568.

52 Kevin R. Austra, “The Battle of the Bulge: The Secret Offensive,” in U.S. Army Military Intelligence History: A Sourcebook, edited by James P. Finley (Fort Huachuca, AZ: U.S. Army Intelligence Center & Fort Huachuca, 1995), pp. 202–208; Hugh M. Cole, The Ardennes: Battle of the Bulge (Washington, DC: Center of Military History, United States Army, 1993), pp. 3, 21–22, 49, 51, 57–63, 75.

53 Edward Drea, “Missing Intentions: Japanese Intelligence and the Soviet Invasion of Manchuria, 1945,” Military Affairs 48, no. 2 (1984), pp. 66–73; David Glantz, August Storm: Soviet Operational and Tactical Combat in Manchuria, 1945 (Fort Leavenworth, KS: Combat Studies Institute, U.S. Army Command and General Staff College, 1983), pp. 1, 15–16.

54 Borer et al., “Problems in the Intelligence-Policy Nexus,” pp. 820–825; Alexander Ovodenko, “Visions of the Enemy from the Field and from Abroad: Revisiting CIA and Military Expectations of the Tet Offensive,” The Journal of Strategic Studies 34, no. 1 (2011), pp. 119–144; James J. Wirtz, The Tet Offensive. Intelligence Failure in War (Ithaca, NY: Cornell University Press, 1991).

55 Bar-Joseph and McDermott, Intelligence Success and Failure, pp. 14–15; John H. Gill, An Atlas of the 1971 India—Pakistan War: The Creation of Bangladesh (Washington, DC: National Defense University, Near East South Asia Center for Strategic Studies, 2003), pp. 11–13, 62; Srinath Raghavan, 1971: A Global History of the Creation of Bangladesh 1971 (Cambridge, MA: Harvard University Press, 2013), pp. 205–210, 222–234.

56 Paul Eddy, Magnus Linklater, and Peter Gillman, The Falklands War (London: André Deutsch Limited, 1983), pp. 44–56, 68–80; Richard Ned Lebow, “Revisiting the Falklands Intelligence Failures,” RUSI Journal 152, no. 4 (2007), pp. 68–73.

57 For a review, see, for example, Dahl, Intelligence and Surprise Attack, pp. 29–33.

58 Bar-Joseph and McDermott, Intelligence Success and Failure, pp. 19, 21; Congress of the United States, Hearings before the Joint Committee in the Investigation of the Pearl Harbor Attack 1945–1946 [Hereafter: Pearl Harbor Hearings], Vol. 14, pp. 1000–1002, 1024, 1026, 1031, 1044, http://www.ibiblio.org/pha/congress/ (accessed 16 July 2020); Dahl, Intelligence and Surprise Attack, pp. 33–36, 39–42, 45; Gerhard Krebs, “Signal Intelligence in the Pacific War,” Journal of Intelligence History 1, no. 2 (2001), pp. 151, 157–158; Rose McDermott and Uri Bar-Joseph, “Pearl Harbor and Midway: The Decisive Influence of Two Men on the Outcomes,” Intelligence and National Security 31, no. 7 (2016), pp. 951–955; Roberta Wohlstetter, Pearl Harbor: Warning and Decision (Stanford, CA: Stanford University Press, 2016), pp. 40–48, 55, 394.

59 Bar-Joseph and McDermott, Intelligence Success and Failure, pp. 19–20; Dahl, Intelligence and Surprise Attack, pp. 29–31, 36–45; Krebs, “Signal Intelligence in the Pacific War,” p. 151; McDermott and Bar-Joseph, “Pearl Harbor and Midway,” pp. 950–952; Pearl Harbor Hearings, Vol. 8, pp. 3384–3385; Pearl Harbor Hearings, Vol. 14, pp. 1061–1062, 1083, 1335–1338, 1363, 1368, 1371–1372, 1377–1382, 1783, 1825, 1839–1842; Wohlstetter, Pearl Harbor, pp. 40–50, 55, 385–393.

60 Carl Cavanagh Hodge, “The Key to Midway: Coral Sea and a Culture of Learning,” Naval War College Review 68, no. 1 (2015), pp. 121–122; Krebs, “Signal Intelligence in the Pacific War,” p. 158; Frederick D. Parker, A Priceless Advantage: U.S. Navy Communications Intelligence and the Battles of Coral Sea, Midway, and the Aleutians (Fort George G. Meade, MD: Center for Cryptologic History, National Security Agency, 2017), pp. 3–5, 10, 15–27; Milan Vego, Major Fleet-versus-Fleet Operations in the Pacific War, 1941–1945 (Newport, RI: U.S. Naval War College, Historical Monographs 22, 2016), pp. 1–9, 35–44, 47, 51–66, 72.

61 Dahl, Intelligence and Surprise Attack, pp. 47–67; Michael I. Handel, “Intelligence and Military Operations,” in Intelligence and Military Operations, edited by Michael I. Handel (Oxon: Frank Cass, 1990), pp. 34–39; John Keegan, Intelligence in War: Knowledge of the Enemy from Napoleon to Al-Qaeda (New York: Alfred A. Knopf, 2003), pp. 201, 205–209, 211, 215–220; Krebs, “Signal Intelligence in the Pacific War,” p. 158; McDermott and Bar-Joseph, “Pearl Harbor and Midway,” pp. 959–961.

62 IV Armeijakunnan esikunta, operatiivinen osasto. (1944, March 29). Karjalan kannaksella mahdollisesti alkavaan offensiiviin viittaavat merkit. N:o149/II/203 sal. Sotarkisto (T 8480/5). Helsinki, Suomi/Finland: The National Archives of Finland.

63 Päämaja. Tiedusteluosasto. (1944, May 25). Katsaus vihollistilanteen kehitykseen N:o 10, 11. 5.-25.5.1944,VTK 10. 25. 5.1944. Tied. Pvk. N:o 6400/Tied. 1/sal. Sotarkisto (T 8480/5). Helsinki, Suomi/Finland: The National Archives of Finland.

64 Lillbacka, “The Finnish Intelligence Failure.”

65 Ibid.

66 Ibid.

67 Ibid., pp. 31–32; see also Niilo Lappalainen, Ihantala Kesti (Porvoo: Werner Söderström Oy, 1994), pp. 11–19, 205–207, 229–231, 271–279, 283–285, 328–330; Lauri Lehtonen, Timo Liene, and Ohto Manninen, Sanomansieppaajia ja koodinmurtajia (Jyväskylä: Docendo, 2016), pp. 344–349.

68 Bar-Joseph and McDermott, Intelligence Success and Failure, pp. 124–143; Central Intelligence Agency, Weekly Summary Excerpt, 13 January 1950, Far East: Soviet Relations; Korea: Troop Buildup, 20 July 2020, https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/assessing-the-soviet-threat-the-early-cold-war-years/5563bod3.pdf; Central Intelligence Agency, ORE 18-50 Excerpt, 19 June 1950, Current Capabilities of the Northern Korean Regime, 20 July 2020, https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/assessing-the-soviet-threat-the-early-cold-war-years/5563bod4.pdf

69 Bar-Joseph and McDermott, Intelligence Success and Failure, pp. 145–183; Michael E. Bigelow, “Disaster Along the Ch’ongch’on: Intelligence Breakdown in Korea,” in U.S. Army Military Intelligence History: A Sourcebook, edited by James P. Finley (Fort Huachuca, AZ: U.S. Army Intelligence Center & Fort Huachuca, 1995), pp. 224–229; Douglas A. Borer, Stephen Twing, and Randy P. Burkett, “Problems in the Intelligence-Policy Nexus: Rethinking Korea, Tet, and Afghanistan,” Intelligence and National Security 29, no. 6 (2014), pp. 811–836.

70 Bar-Joseph, The Watchman Fell Asleep, pp. 42–58, 81–111, 134–139, 141–174, 179–186, 236–251; Bar-Joseph and McDermott, Intelligence Success and Failure, pp. 184–215; Yoav Gelber, “The Collapse of the Israeli Intelligence’s Conception: Apologetics, Memory and History of the Israeli Response to Egypt’s Alleged Intention to Open War in May 1973,” Intelligence and National Security 28, no. 4 (2013), pp. 520–546; Ephraim Kahana, “Early Warning Versus Concept: The Case of the Yom Kippur War 1973,” Intelligence and National Security 17, no. 2 (2002), pp. 81–104; Khalid Sindawi and Ephraim Kahana, “The Yom Kippur War: The Successes of Israeli Intelligence,” International Journal of Intelligence and CounterIntelligence 28, no.4 (2015), pp. 762–774.

71 Bar-Joseph and McDermott, Intelligence Success and Failure, pp. 185–187, 190–191, 217–229; Sindawi and Kahana, “The Yom Kippur War,” p. 771.

72 “Barnard’s Test Calculator,” SciStatCalc, https://scistatcalc.blogspot.com/2013/11/barnards-test-calculator.html (accessed 2 October 2020).

73 “Bayes Factor for a Binomially Distributed Observation,” Perception and Cognition Lab, Department of Psychological Sciences, University of Missouri, http://pcl.missouri.edu/bf-binomial (accessed 2 October 2020).

74 See, for example, Vic Barnett, Comparative Statistical Inference, 2nd ed. (Chichester, UK: John Wiley & Sons, 1982), p. 217.

75 Levels are “anecdotal” (1/1–3/1), “moderate” (3/1–10/1), “strong” (10/1–30/1), “very strong” (30/1–100/1), and “extreme evidence” (>100/1). see, for example, Emma Beard, Zoltan Dienes, Colin Muirhead, and Robert West, “Using Bayes Factors for Testing Hypotheses about Intervention Effectiveness in Addictions Research,” Addiction 111, no. 12 (2016), p. 2231.

76 This is consistent with the notions presented by Dahl, Intelligence and Surprise Attack, pp. 66–67.

77 The distances between the targets and the group centroid were calculated with the aid of the web page “Latitude/Longitude Distance Calculator,” National Hurricane Center and Central Pacific Hurricane Center, https://www.nhc.noaa.gov/gccalc.shtml (accessed 2 October 2020). The location of the centroid was determined by means of the web page “GPS Coordinates on Google Maps,” MAPS.ie, https://www.maps.ie/coordinates.html (accessed 2 October 2020).

78 For northeast Australia the city of Cairns was used for approximation, and Vladivostok for southeastern USSR; otherwise country capitals or regional capitals (as Unalaska for the Aleutians) were used.

Additional information

Notes on contributors

Ralf Lillbacka

Dr. Ralf Lillbacka is a Senior Lecturer at Novia, the University of Applied Sciences, Vaasa, Finland. Previously, he was a researcher at Åbo Akademi University in Finland, where he earned his Ph.D. degrees in Political Science. He has published extensively on issues of intelligence and military science, primarily on matters concerning intelligence and security in Northern Europe. The author can be contacted at [email protected].

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 214.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.