49
9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7 Enduring Inefficiencies in Intelligence Systems By Reducing Errors In Parallel Systems To Defend Homeland Security: A Principal-Agent Approach* Donald J. Calista Master of Public Administration Program School of Management Dyson 360 Marist College Poughkeepsie, NY 12601 +845.575.3345 (T) +845.575.3344 (F) Paper Presented At the Ninth Global Business and Economics Conference October 16-17, 2009 Cambridge University, UK 1

Enduring Inefficiencies in Intelligence Systems By Reducing Errors

Embed Size (px)

Citation preview

Page 1: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

Enduring Inefficiencies in Intelligence Systems By Reducing Errors In Parallel

Systems To Defend Homeland Security: A Principal-Agent Approach*

Donald J. CalistaMaster of Public Administration Program

School of ManagementDyson 360

Marist CollegePoughkeepsie, NY 12601

+845.575.3345 (T)+845.575.3344 (F)

Paper PresentedAt theNinth

Global Business and Economics Conference In

Cambridge University, UK October 16-17, 2009

*© By author. Not for citation or attribution with permission.

October 16-17, 2009Cambridge University, UK

1

Page 2: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

ABSTRACT

Enduring Inefficiencies in Intelligence Systems By Reducing Errors In Parallel

Systems To Defend Homeland Security: A Principal-Agent Approach

The usual critical prescription for counterintelligence (CI) agencies is to focus on their collaborative lapses that evoke proposals to streamline their inter-agency relationships. While not disputing the benefits of such practices, they are secondary to the priority of transforming intra-agency knowledge management by responding with mirror images of terror’s basic organizational tenets. Thus, to evade detection and prevent penetration terror underwhelms communications among members by limiting their understanding of both planning and execution. As prevailing organizational paradigms cannot address these anomalies, they require an oppositional—contrarian—CI strategy. Accordingly, security agencies overwhelm their intelligence capabilities by aligning terror’s sparseness in articulating and discreteness in processing of communications, correspondingly, with exhaustiveness in gathering and robustness in sharing of intelligence. In effect, applying the theory of parallel systems, or redundancy, is the most innovative way to approach counterintelligence (CI) in that it invites sub-agencies to compete with each other. The objective is to avert Type I errors—by preventing a wanted message from disappearing—and second, by avoiding a Type II error—by permitting an unwanted message getting through. The paper employs principal-agent approach to achieve those ends and focuses on the Department of Homeland Security (DHS). Its recent formulation offers an opening to transform its parallel sub-agencies into an atypical CI strategy and effective performance.

October 16-17, 2009Cambridge University, UK

2

Page 3: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

Enduring Inefficiencies in Intelligence Systems By Reducing Errors In Parallel Systems To Defend Homeland Security: A Principal-Agent Approach

The governance structures of terror organizations continue to be subjects of interest and

debate. In addition to providing historical studies and presenting profiles of individuals through

various disciplines, by and large, observers have been of two minds. Some researchers

emphasize rational choice, mostly game theory, which concentrates on micro-analyses of

terrorism. It suggests terror structures stem from calculated member preferences as byproducts of

goal-setting that lead to adopting coherent strategies. Preferences occur in areas such as:

recruitment and training, communications among members, and target timing (Davis and Cragin,

2009). The other view, which is more prominent, highlights the importance of network analysis

in various iterations (Sageman, 2004).

These works range from: detailing differences between collaborative versus dark

networks, showing connections among deadly terrorist networks, and mapping their breaking

points. Common agreement is that network formulations explain terrorist governance as

centralized, but loosely-coupled, organizations. Transnational in design and internationally

financed—in the fashion of al-Qaeda (“the base”) whose members call it the “company”—its

leadership bears the markings of middle to high status individuals of varying nationalities.

Stateless, these broadly-based organizations need tacit state sponsorship to establish a secret

physical presence. Such networks address the principal-agent problem by requiring formal

member allegiances to their own messianic ideology; they look like pyramid schemes without

much scam (Elistrup-Sangiovanni and Jones, 2008).

October 16-17, 2009Cambridge University, UK

3

Page 4: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

New Worlds of Terrorism Uncovered

Recent research challenges both perspectives in two ways. One view holds that terror

governance is now dominated by nation-based “leaderless jihads”—in large part as a response to

the stepped-up and coordinated counterterrorist efforts pursued by numerous governments.

Transnational terror is on the defensive. Jihads are self-organizing; they are as apt to employ

training as not and depend on local (and nefarious) funding for support—in the semblance of the

2004 (3/11) Madrid bombings. A number of the 2005 London (7/7) bombers, however, received

training in Pakistan. Some experts maintain that these groupings are the main terrorist challenge

for counterintelligence (CI) into the near future (Sageman, 2008).

The second perspective employs transaction cost economics (TCE) that proposes

terrorist governance revolves around adoption of either market- or non-market structures

(Helfstein, 2009). Broadly, market-based governance tends to be akin to “leaderless jihad” types.

Congealed by hatred of the West, they are autonomous in nature whose low-status leaders and

members possess homogeneous social ties. Lacking in planning and resources, their preparations

tend to be crude, as in the intercepted 2006 London liquid explosives incident. The inner strength

of market-based terror lies in diminishing the principal-agent problems of monitoring and

shirking, as formal contracts are non-existent.

The other TCE explanation relies upon non-market strategies that are reminiscent of al

Qaeda’s 9/11 configuration. A chain of command format at the top organized around working

clusters of cells. Other experts maintain that transnational terror remains no less worrisome to CI

than before (Riedel, 2008), as in the 2008 Mumbai train station and hotel bombings. They are

selective in recruitment. Yet, because of their heterogeneity in personnel, they accept the

confounding effects of bureaucratic operations, in part to minimize CI invasion, but also to

October 16-17, 2009Cambridge University, UK

4

Page 5: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

garner local support by providing social services. While it is unknown whether al Qaeda retains

the reach of its past transnational structure, much more is known about non-market centralized

regional terrorists, such as Hamas and Hezbollah. Although fast-becoming transnational through

several alliances, they, nonetheless, counter principal-agent problems by demanding member

pledges and limiting sub-unit autonomy (Holfstein, 2009).

It would be pointless to say whether a market or a non-market type of terrorist

governance prevails. Instead, they can both inflict different, but grave, violence upon their near

and far enemies. Both forms of terror seek catastrophic ends. While market and non-market

terror approach the battlefield differently, their operations are secretive—respectively, either as

autonomous unlinked cells or linked combinations of them. The objective of this paper is to

articulate a CI theory that makes the governance structures of terrorism—their distinct

impingements—its centerpiece.

Paper Outline and Objectives

The paper first briefly points out CI definitional difficulties. It then discusses three CI

methods. The next section presents why terror organizations revoke conventional organizational

wisdom—by evading enemy detection and penetration, they constrict member communications.

The paper then proposes a contrarian solution to organizing CI, in particular, on intelligence

gathering and sharing by focusing on the Department of Homeland Security (DHS). It explains

why DHS’ response needs to oppositely mirror to terrorism’s anomalous organizational

dimensions by adopting a parallel systems, redundant, CI strategy; that is, to encourage its sub-

agencies to compete with each other. This strategy achieves two goals: it addresses the problem

of avoiding Type I and Type II errors and exploits terror’s self-generated vulnerabilities. The

final discussion shows how DHS’ own vulnerabilities can also impede high-level CI

October 16-17, 2009Cambridge University, UK

5

Page 6: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

performance. The conclusions demonstrate why a turning stones strategy is a necessary evil. Of

course, the paper’s argument applies to other security agencies whose receptivity to adopting an

antithetical strategy clearly rests on DHS implementing one convincingly.

Definitional Difficulties and Three Counterintelligence Methods

It is important to ask: what is CI. Little agreement exists. In a revealing disclosure, the

Central Intelligence Agency’s (CIA) home page admits to lacking a definition or a theory of CI.

Instead, it presents a 20-page white paper, authored by a long-standing analyst and manager, who

isolates “seven competing [academic and non-academic] definitions of CI.” Most of the paper

focuses on working “towards” a theory of CI (Ehrman, 2009). It does, however, offer two

principal ways to distinguish between types of organizing intelligence. One is external:

“collecting secret information about the capabilities of foreign states and entities;” and the other

is internal: “identifying and countering threats to the security of the host state or entity” by

“threats within their borders.” Clearly, market and non-market terrorist organizations engender

both types of intelligence. One estimate places the number of known terrorist organizations at

154—based on U.S. Department of State statistics (Nationmaster, 2009).

To illustrate, but not exhaust intelligence-gathering methods, three main sources can be

identified. The first one lies in the following example, where the premise is double-loop learning

(Agryris and Schön, 1996). Not untypical of practices in other CI agencies, front-line workers

pass along any and all assumedly pertinent data on to its own counterterrorist unit as well as to

the agency’s partners, including certain interagency collaborative organizations, which add to

profiled information. Various software databases—ranging from dynamic modeling (Gutfraind,

2009) to visualizing (Yang and Sageman, 2009)—then sift through the new material that,

eventually, plays out multiple scenarios based on connections of interest, from indicators as well

October 16-17, 2009Cambridge University, UK

6

Page 7: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

as counter-indicators, such as: facial recognition, sex, country of origin, aliases, age, family

status, affiliations, education and training, criminal record, associates, religion and sect, land and

cell telephone histories, prior travel and with whom, and the like. The output is interactive that

benefits from using “what if” best- and worst- case situations to sort out confirmations and

disconfirmations. The results are recycled to front-line workers. Clearly, a main issue is

information overload about which in a non-computer age would otherwise be daunting.

Compounding this intelligence method is the need for agents to follow-up on leads.

Various law-enforcement agencies have created subunits for that purpose. Some of these units

pool with their counterparts for which the FBI is in the forefront. For example, its office in Los

Angeles, Counterterrorist 6 (CT6), contains 21 people and receives about 1000 leads a year. A

long-standing veteran detective muses: “Someone has to go knock on doors” (Schmitt, 2009).

Five percent, or 50, of the tips prove credible.

Another type of intelligence is technical that can largely be gleaned from the Web and the

Internet. Most CI agencies have created cybercrime subunits concerned with felonious use of the

electronic world. Such criminals include terrorists, but these units go beyond their purview in

pursuit of other areas as: identity theft and financial fraud. Terrorists employ the electronic

medium to great advantage. The Internet provides them with a useful tool for communicating,

although fearing detection and penetration are constants. The Web not only serves terror’s public

relations needs, it also opens possibilities to post coded messages. As electronic communications

are voluminous, CI agencies now employ data mining software that renders bytes whole

(DeRosa, 2004; Kim, 2005). This software “tags” disconnected bits of data to create real-life

stories that have been helpful in thwarting a number of threats. (Gorman, 2009).

October 16-17, 2009Cambridge University, UK

7

Page 8: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

The problem with any of these forms of intelligence is that they are largely behavioral.

That is, the foundation for formulating them stems from typologies based on various social

science models: from anthropology to criminology to psychology and sociology (Davis and

Cragin, 2009). The typologies convey well-known behavioral characteristics developed in a

particular field, say as related to financial predators or political extremists. Typologies may also

be generated by an agency as a home-grown shorthand to classify varying terrorist archetypes or

organizations. Among the persistent criticisms of the CI Community is agency unwillingness to

share information; it is unlikely that announcing archetypes occurs regularly—although

researchers do so (Gunaratna, 2002; Sageman, 2008). Terrorists are aware of this disability and

make deciphering behavioral characteristics more difficult by emitting as much disinformation as

possible.

Revoking Conventional Organizational Wisdom: Terror Avoids Detection and Prevents

Penetration

Terrorists count on these bureaucratic obstacles in CI to augment making themselves

impenetrable to insiders and outsiders (Wise & Nader, 2003). Terror—of both the market and

non-market variety—is managed unlike ordinary organizations. Operationally, they turn

rationality on its head. While non-market organizations may feature the trappings of centralized

structures, the union stops there, as terrorism accounts for its survival by meeting two related

objectives— that results in both market and non-market terrorism constraining and controlling

the flow of information. First, to avoid detection of overall planning, member communications

are sparse and to prohibit penetration of execution they are discrete—that, respectively, assures

their internal and external exclusivity. Operational cautions about execution, in particular,

obstruct what enemies can discover about terror’s clandestine moves. (The arrest and search—

October 16-17, 2009Cambridge University, UK

8

Page 9: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

and release—of the “20th hijacker’s” laptop shortly before 9.11 produced information bounded

by his connections.) Disengaging plans from practices intensifies terror’s already obscure

nature, and, quite incongruously, instead of a closed system causing slippage in steering

information, it renders them lean and mean.

Sparseness and Discreteness Make International Terror Lean and Mean and Creates

Grounded Rationality

Leanness occurs because sparse exchanges among cell members adhere to need-to-know

rituals. Confined communications, often transmitted in make-shift codes, compound the

intelligence problem of sorting out terminologies expressed within cells. Sparseness,

additionally, discourages informal discussions and personal attachments between cell members.

In bin Laden’s now common-knowledge summary of the September 11th attacks: “Those who

were trained to fly didn’t know the others. One group of people did not know the other group”

(Krebs, 2001: 46; italics original). Evasive communication, however, does not usually infringe

upon operatives acting on plans they comprehend only marginally. As planning in non-market

groups are more precisely constructed, in their furtive way, cell members talk a lot about

implementing them, compared with organizations relying upon standard operating procedures

(Elistrup-Sangiovanni and Jones, 2008). Yet, if “chatter” compensates terror operatives for their

fuzzy familiarity with planning, unawareness of the whole story also becomes terrorism’s fringe

benefit during interrogations. Sparse awareness of planning, especially in non-market

organizations, inhibits terror operatives from conveying information about actions in once-

removed cells. Occasionally, secretiveness backfires. In the small-scale market affiliations of the

2004 Madrid (3/11) bombings, secretiveness led to suffering from communications breakdowns.

October 16-17, 2009Cambridge University, UK

9

Page 10: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

Meanness grows out of terrorist members managing communications discretely to

camouflage how their execution will inflict mortal harm. As insiders do little personal gossiping,

discretion also deprives eavesdropping outsiders of revealing extraneous sources of information.

Straining credulity, while cell members unevenly understand what is going on in tertiary cells,

the integrity of reciprocal pursuits ensures their steadfastness. An unsettling example of this

steadfastness lies in observing certain last-minute behaviors of the about-to-die September 11th

terrorists. The mission’s liaison risked exposure by attempting to wire unspent funds to related

network members. Taken together, leanness and meanness coalesce to make dismantling

networks a very murky affair.

In effect, murkiness occurs because, ordinarily, most organizations retreat from the

confines of bounded rationality (Simon, 1957), yet, terrorism welcomes them, notably in the

non-market sphere. Their members operate in a kind of a denied or grounded rationality. While

such operations non-rationally disconnect planning from executing, instead of loosening ties

among cluster members, it consolidates their interdependence. Curbing individual

communications actually seals the loyalty—the catastrophic fate—of cell members to each

another. However distant they are from “headquarters,” members bank on tightly-woven bilateral

relationships to sustain their trust in a messianic ideology. While terrorism validates members

through limited connections, this situation would normally lead to inefficiencies in resource

allocations. Inefficiencies do occur, especially in organizing member competencies to fulfill a

mission—a situation that doomed the 2006 London liquid perpetuators. This forbearance, while

inconvenient, minimally detracts from the effectiveness that terrorist organizations reap from

staying lean and mean.

October 16-17, 2009Cambridge University, UK

10

Page 11: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

The Salience of DHS’ Contrarian Intelligence Strategy

Unlike terror operations with limited exposure to stakeholders—especially for

autonomous market types—internal and external conflicts abound for the U. S. homeland

security agency, notably, in the demands made by its myriad legislative oversight. They extend

from the unheard of reporting to 88 congressional committee and sub-committee chairs,

ostensibly serving as DHS’ shadow board of directors (Treverton, 2004). In 2007 and 2008, DHS

officials gave testimony to 108 committees (Laskow, 2009). Earlier, in 2004, the 9/11

commission report strongly recommended that Congress create one contact point for DHS, but

the agency continues to experience the opposite. Together, these highly differentiated sub-

agency environments produce major task uncertainties (Thompson, 1967). Prioritizing—

unraveling— DHS’ principal-agent connections seems unfathomable.

The Department of Homeland Security (DHS) manages twenty-two—legacy and

specifically-crafted agencies—that differ significantly in their age, budget, norms, and size.

Totaling more than 180,000 civilian and uniformed personnel, the sub-agencies range from a

small research laboratory with about 200 people to three large law enforcement and military

units, each with about 40,000 people. Since its founding in March 2003, DHS has increased is CI

associations. The agency secretary attends the daily National Intelligence Estimates (NIEs)

White House briefings, the PDB, and, since 2007, legislation created an intelligence and security

secretariat, which coordinates intra-department CI activities. DHS’ larger sub-agencies engage in

intelligence gathering as well as partner with major national intelligence networks (GAO, Sept.

2004). These intelligence functions involve six sub-agencies—with about 80 percent of its

personnel—the Coast Guard, Customs and Border Patrol (CBP), Immigration and Customs

Enforcement (ICE), the Protected Critical Infrastructure Information (PCII) program, the Secret

October 16-17, 2009Cambridge University, UK

11

Page 12: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

Service, and the Transportation Security Agency (TSA). It also houses the National Cyber

Security Center and the Domestic Nuclear Detection Office.

Predictably, DHS’ first administrative battle has been to drive out obvious redundancies

in as many places as possible—about which observers point out numerous hurdles hampering

creating agency-wide conformity (Demchak, 2002; Rosenthal, 2003). From the outset, DHS

started downsizing its 22 human resources management systems, which one year later decreased

to 7 (Inspector General, March 2004). It has been seeking to create a uniform pay-for-

performance program for which implementation guidelines appeared in 2005 and 2007, but

largely remain unfilled (GAO, April 2008). A major unresolved issue for DHS personnel

practices is the fact that airport screeners own the highest annual turnover rate in the federal

government—nearly 20 %.) TSA’s long sought-after collective bargaining goal now seems on

the horizon with the Obama administration (Rosenberg, 2009).

On the surface, the various integrative organizational initiatives may appear to have merit

in seeking oneness across the entire agency. In 2004 to 2005, DHS attempted to coordinate its

sub-agencies by incorporating them into four operational directorates that contain all but three of

them. They are: Border and Transportation Security— Transportation Security Administration,

U.S. Customs Service, the border security functions of the Immigration and Naturalization

Service, Animal and Plant Health Inspection Service, and the Federal Law Enforcement Training

Center; Emergency Preparedness and Response (former Federal Emergency Management

Agency; Science and Technology (two former national science laboratories); and Information

Analysis and Infrastructure Protection (Now PCII). The impulse to impose a template across

intelligence operations was proving irresistible. DHS did leave most of the former Bureau of

October 16-17, 2009Cambridge University, UK

12

Page 13: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

Immigration and Naturalization, the United States Coast Guard, and the Secret Service intact. By

2007, all the major agencies returned to their home base.

The Role of Intelligence in DHS

CI among the sub-agencies is driven by different goals that establish their unique

intelligence focus—even for the same arena. For example, in their cyberspace missions the

Secret Service emphasizes financial transactions, while the PCII concentrates on infrastructure—

buildings and sites—operated by leading commercial enterprises and state and local authorities,

as the largest owners of the nation’s governmental properties. DHS also contributes as a unitary

agency to national intelligence networks. For the National Counterterrorism Center (NCTC),

which the CIA directs, DHS and the FBI are spokes, and for the Terrorist Screening Center

(TSC), which the FBI administers (watch- lists), it joins the CIA as a spoke.

Not all of DHS’ agencies are leaping to cooperate over intelligence. For example, CBP’s

prior intelligence monitored the movement of the nation’s domestic cargo, which it now shares—

competes—with TSA that built its own tracking database (Carafano & Heyman, 2004). Doesn’t

this situation beg for commonality, as a turf war is jeopardizing the nation’s security? After all, a

central tenet of organizational wisdom calls for removing redundancies by cutting costs and

reducing waste—especially to root out uncooperativeness among agencies. It is one thing to want

to reckon with the latter as a legitimate issue, but it is another to presume imposing CI

commonalties is valuable. The intelligence contradictions that DHS—and other security agencies

—face cannot be so rationally articulated and resolved—largely as a factor of the peculiarities

posed by terror’s governance structures.

October 16-17, 2009Cambridge University, UK

13

Page 14: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

Intelligence’s Environmental Context at DHS

Understanding these impingements is central to articulating a CI theory. If terror’s

operations do not completely disconfirm the rules of the dominant organizational paradigm, they

certainly qualify as a significant “counterinstance”—an anomaly (Kuhn, 1962: 68). The rules of

organizational science come up short, however, in drawing an appropriate CI blueprint.

Terrorism’s uncommon organizational conditions will not disappear by requiring security

agencies to introduce symmetries across their CI protocols—namely, by driving redundancy

away. Instead, those conditions require an equally audacious—anomalous—intelligence

response. That is, the effectiveness of CI depends upon a strategy that directly challenges

terrorism’s underwhelming its patterns of communications. Accordingly, DHS acquires its own

exceptional strategy by accepting duplication and repetition of intelligence and, thereby, endures

inevitable redundancies. Despite its reputation as bad-theory-in-use (Machado & Burns, 1998)—

redundancy embodies the most re-constructive way for DHS to block catastrophic terror. It is

now time to explain how a redundant intelligence strategy can destabilize terrorism and shape

productive intelligence outcomes.

This strategy redresses the bonus that terrorism receives from obscuring member

communications. To reverse the effects of informational uncertainties, DHS adopts a

counterintuitive intelligence strategy. The salience of the strategy arises from the agency

oppositely mirroring terror’s sparseness in articulating and discreteness of processing member

communications first, with exhaustiveness in gathering intelligence, second, with robustness in

sharing intelligence. Its sub-agencies run parallel—but diverse—intelligence systems. The sub-

agencies submit to a “leave-no-stones-unturned” strategy and, boldly, they abide redundancy to

engulf intelligence. As Comfort (2002:4) notes: “ . . . the quality and effectiveness of the

October 16-17, 2009Cambridge University, UK

14

Page 15: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

information exchange [among intelligence agencies] will be defined by the organizational

processes of training, receptiveness to incoming information that may be inconsistent with prior

assumptions, and willingness to share information regarding actual performance.” To correct for

inconsistency in CI, redundancy counteracts with duplication and repetition across multi-

agencies (Landau & Stout, 1979).

Undermining Terror’s Operational Vulnerabilities: an Emergent CI Theory

Type I Errors. This strategy of sub-agencies following comparable redundant protocols, but

fulfilling them singularly, creates a credible theoretical base for CI. It rests on the risk, or

readiness, to commit a Type I or Type II intelligence error (Bendor, 1985). Tolerance of risk

level hinges on what kinds of statistical error makes domestic security worse off—which

negative outcome is less acceptable for CI to make. To avoid a Type I error (α, or false positive)

involves establishing a number of parallel units engaged in related intelligence gathering. The

objective is to hedge “failing to stop an undesired event” by “blocking of an accurate or desired

message” (p. 50). To sidestep making these errors of omission means stopping tell-tale messages

from falling between the cracks. Front-line intelligence is consciously aware of avoiding Type I

errors, as an FBI anti-threat agent stated recently: “A lot of time we are chasing shadows, but it’s

better to do that than find out later you let something get by” (Schmitt, 2009). (Tragically, the

events of September 11th results from tacitly committing a Type I error—a series of disconnected

bureaucracies—with no common forum, or interest in facilitating critical intelligence—

disbelieved disjointed signals.) Designed duplication and repetition causes agencies to compete

with each other. Competition—defined as rivalry and replication—multiply decreases message

loss among parallel agencies.

October 16-17, 2009Cambridge University, UK

15

Page 16: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

This form of competition differs from the more commonly experienced non-competitive

redundancy. As Bendor (1985) suggests: “In competitive redundancies, rivals must be

differentially rewarded for their achievements. . . . [T]hey must have discretion over which

programs to pursue” (p. 57). As in two DHS agencies inspecting domestic freight—CBP and

TSA—which is not inherently problematic, it now serves as a model of intra-agency

competition, even in pursuing the same targets differently. It is less likely for them to lose

messages under these circumstances and, thereby, to commit a Type I error. Competitiveness

serves as a springboard to insure the success of parallel systems. While the Secret Service owes

its founding in 1862 to the growth of counterfeiting in the Civil War, it now faces competition in

that domain from DHS’ secretariat of intelligence and security, although it operates on a much

smaller scale.

Type II Errors. The mirror image of competition is collaboration. Interagency coordination

intends to obviate a Type II error (β, or a false negative). Operating as a series of units, DHS’

sub-agencies have little choice but to: “guard against the transmission of an inaccurate or

unwanted message,” or, “letting a message through that doesn’t belong there by failing to effect

a desired one” (p.50). Some undeserving person gets an immigration green card. Such errors of

commission are no less lethal as intelligence puts an equal premium on hindering the unwitting

loss of accurate data, in a Type I error, as wittingly inviting an inaccurate one, for a Type II

error. Redundancy is also a natural occurrence of units in parallel systems having limited

familiarity with each other’s operations. As a by-product of agencies’ experiencing contrasting

informational uncertainties, they only have partial knowledge of how other units organize their

intelligence functions. Curtailing Type II errors then depends heavily on intelligence sharing.

October 16-17, 2009Cambridge University, UK

16

Page 17: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

Parallel agencies are less prone to dodge information sharing because they need to find

outlets for their redundant intelligence. Simply put, sharing intelligence by parallel agencies

becomes self-serving. Nonetheless, informational risks still require attention: “one kind of

redundancy can be increased to reduce the total damage even though the total number of errors is

higher than before” (p.50; italics original). The significance of parallel systems benefiting from

the frequency of such messaging is notational—as positive externalities occur. (See Bendor,

1985, pp.61-65 for the numerical extrapolations.)

DHS’ Counterintelligence Coordination Mission

As outpourings of data from the sub-agencies appear, the question of intelligence sharing

turns uppermost for DHS—especially as the CI informational environment has become more

complex since Sept. 11—that is, with the emergence differing market and non-market terror

organizations. The result is that there is a role for pursuing certain commonalities as intelligence

moves from gathering to sharing. The learning curve still remains steep. In a thesis at the Naval

Postgraduate School, a DHS operations analyst calls for the: “Intelligence Community to move

away from a ‘need to know’ culture towards a ‘responsibility to provide’” (Werner, 2008).

DHS’ coordination mission becomes twofold: to insure that the multi-agency CI configurations

are not completely idiosyncratic and, to provide viable vehicles for agency intelligence sharing.

First, as the agencies wrestle with distinguishing fact from both fiction and disinformation,

idiosyncratic agency protocols can undermine cultivating intelligence sharing. Technology has

been helpful. Agencies are regularly transacting with corresponding internal and external

networked databases and are often searching for the same watch-list people and organizations.

Since 2007, an official 16-agency Intelligence Community (Intellipedia) Wiki, with 100,000

users has produced nearly 1 million pages of collaborative intelligence (Vogel, 2009). In

October 16-17, 2009Cambridge University, UK

17

Page 18: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

addition, much as in other security agencies, DHS relies on translation software that makes use

of layered-type techniques to analyze and interpret redundant intelligence. Second, to generate

workable intelligence sharing, DHS opens two-way streets for agencies to cross-walk their

redundant intelligence. To that end, it screens the two worst intelligence sins: to cover up

mistakes in intelligence gathering and to fall victim to groupthink intelligence sharing (The

Economist, March 19, 2005).

Regarding covering up, as web-bloggers and Wikis quickly learn, digitally networked

participants openly keep one another honest. It is wiser to stay on the level because the aftermath

of getting caught telling an untruth is fast and furious punishment—sometimes banishment. If a

DHS agency miscalculates by thwarting an accurate message from getting through, which

produces a Type I error—and then lies about it—comparable treatment is likely—to say nothing

of an event occurring. Put differently, gathering redundant intelligence competitively makes

discovering deception easier—a situation that allows DHS to broker agencies to resist Type I

errors. In pursuing the same terrorist (watch-list) targets sub-agency CI methods differ, yet

competition dissuades agencies from encapsulating themselves, that is, avoiding becoming

completely monopolistic—exclusionist (Niskanen, 1971).

Competition also acts as a buffer against agencies lapsing into groupthink. This deterrent

is especially important in intelligence sharing that shifts agency attention to containing Type II

errors, that is, sharing is a process of cross-checking against failing to notice an undesired

message. Unlike the earlier example of tracking the same suspects, if intelligence in Border

Patrol (CBP) and Transportation Security (TSA) leads them to prosecute different illegal aliens,

their competition acts as a proxy for intelligence sharing. While it is true that by agencies going

after suspects without telling each other, their competitive redundancy is more likely to stumble

October 16-17, 2009Cambridge University, UK

18

Page 19: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

upon related targets. Together, making arrests decreases the chance of committing a Type II

error; yet, wittingly allowing an inaccurate message to pass through—the absence of civilians in

an air strike—can produce tragedy. Redundancy is compensatory. As Bendor (1985) notes:

viewing the situation through the lenses of scarce resources, which sees interdependence of sub-

units as rivalry, “then one channel’s failure may disrupt a duplicate” (p. 55).

Uncovering the Vulnerability of Closed Communications: Trading Off of Targeting Terror

Operatives over Derailing Terror Planners

Admittedly, public sector competition has its downsides. For one, DHS’ sub-agencies try

to outdo one another to produce the silver bullet to elevate their stature in the Intelligence

Community (Grow, 2005, May 30). On balance, however, competitive redundancy yields

multiplier returns. Its cumulative effect uncovers vulnerabilities within terror’s furtive

communications. Redundancies unsettle ever-mindful cells that need to redouble their efforts to

isolate planning from executing. Provoking cell members into raising the volume of chatter

lessens the rewards of secrecy and adds to the burden of terrorists communicating sparsely and

discretely. Stepped up volume, in other words, diminishes the leanness and meanness that terror

derives from seeking impenetrability. Approaching the situation differently, Milward and Raab

(2003) make a similar inference: “The more covert networks have to invest in staying secret the

less attention and resources will be available to their activities” (p. 23). That is, turning stones

distinctively, but divergently, limits the benefits of sparse and discrete communications. Or, as

Krebs (2001) explains: the dark side of terror confining communications is that: “. . . covert

networks trade efficiency for secrecy” (p. 46). The no-stones unturned strategy reflects an

equally decisive trade-off.

October 16-17, 2009Cambridge University, UK

19

Page 20: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

The trade-off profits from terror’s vulnerability. That is, it prioritizes the importance of

disrupting terror operatives from committing catastrophic acts as opposed to chasing after what

planners are generating. Converging on the lesser transactions of terror yields pay-offs that

outweigh the costs of recovering greater knowledge from planners. The trade-off clears the way

for intelligence to pivot on pressing cell chatter to go nowhere. Above all, it exploits the

inefficiency of terrorists rapidly locating and replacing operative competencies through liaisons.

The tangible objective is short-run disruption to draw operatives into the open, as shutting down

entire terror organizations exceeds any CI capability, particularly, well-endowed non-market

types. Eliminating them depends on the highly unlikely occurrence of U. S. foreign policy doing

an about-face, especially towards certain Arab and Muslin nations. Winning the present war

against terrorism, therefore, occurs by bearing down on the margins of terror operations—

through attrition.

Intended and Unintended Consequences of Redundancy

Nonetheless, a bothersome question lingers on: is the medicine worse than the disease?

No one knows with any confidence, however, what constructive consequences come from a

wholesale elimination of redundancy (Landau, 1969), and, certainly not, across multi-agency CI

functions. Efforts to homogenize intelligence functions across subunits, as Betts (2002:2)

counsels, disappoint:

If effective intelligence collection increases by only five percent a year, but the critical warning indicator of an attack turns up in that five percent, gaining a little information will yield a lot of protection. Streamlining intelligence operations and collection is a nice idea in principle but risky unless it is clear what is not needed. When [terror] threats are numerous and complex, it is easier to know what additional capabilities we want than to know what we can safely cut. [Italics added.]

Yet, if efficiency remains the default goal, Betts (2002: 5) again warns: “. . . in a leaner and

meaner system [conventionally understood] there will never be much [intelligence] lying

October 16-17, 2009Cambridge University, UK

20

Page 21: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

around.” Instead, DHS finds solace in its untidy origins by nurturing a redundant intelligence

competitively to secure its effectiveness. As intelligence uniformities are easier for catastrophic

terrorists to discern and disable, holding commonalities to a minimum supports a no-stones-

unturned strategy.

Redundancy Cuts Two Ways: Dealing With DHS’ Fear of Failure

Analogously, DHS expresses its own defensiveness, in particular, quieting doubts

concerning its capabilities to unscramble terror events (Wise & Nader, 2002). Embedded in

public expectations are doubts about its intelligence accountability that point to a potential for a

failure in two major ways. First, it occurs by DHS fearing not stopping an event, and, second, by

the agency not preventing one (Shenon, 2003b). In the face of such potential failures, it is

tempting to insist on common intelligence protocols, but redundancy represents the best of both

worlds. That is, it is more likely for parallel systems, both to identify Type I errors in intelligence

gathering that mistakenly blocks out a wanted signal, and, to deter Type II errors in sharing

intelligence that fails to block an unwanted signal. Creating false commonalities undercuts these

prospects. Ignoring what a contrarian strategy can deliver, then, comes at a high cost.

Strategic and Structural Symmetry through Open-Systems

Two other tendencies may impede DHS from adopting a redundant strategy. The first is

the predictable risk-averseness of public agencies. In discussing risk-averseness, Wise

(2002:132) cautions that newly-formed agencies understandably look backwards:

Institutionalization research suggests that when organizational technologies are poorly understood, when goals are ambiguous, when the environment creates uncertainty, organizations are often modeled on other organizations. Particularly for new organizations, which could serve as sources of innovation and variation, leaders will seek to overcome the liability of newness by imitating established practices within the field.

October 16-17, 2009Cambridge University, UK

21

Page 22: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

Getting around these backward-looking practices means acknowledging that concerns about

DHS’ potential failures can become smokescreens. They divert attention away from

acknowledging that the uncommon operational conditions of terrorism demands unconventional

responses. Moreover, timidity also endangers the usefulness of redundancy identifying the latent

liabilities inhering in terror’s stealthy communications. Of course, it would be easy to dismiss

redundancy itself as a “backwards strategy.” Its effectiveness, however, plays a unique role for

agencies living with the persistent fear of failure—the moral equivalent of terror fearing

detection and penetration.

The second restraining tendency comes from agency evaluators. They continuously press

DHS to turn to the private sector for guidance, usually in the guise of its “best practices.”

Instead, the task uncertainties produced by terror’s anomalous operations serve as the central—

everyday— organizational combat zone for CI (Treverton, 2004; Caudle, 2005). Obviously,

agency evaluators do not recommend employing those uncertainties to invigorate CI. Essentially,

oversight agencies treat DHS’ deadly uncertainties on par with industrial firms learning customer

preferences. They also disregard the compounding effects of DHS untangling its principal-agent

relationships. In its first two years, the Government Accountability Office (GAO) evaluated DHS

directly no less than 10 times (GAO, March, 2005) and then on to multiple annual reports (GAO,

April 2008). GAO offers formulaic advice: “The experience of leading organizations [public

ones are not cited] suggests that performance management systems—that define, align, and

integrate institutional, unit, and individual performance with organizational outcomes—can

provide incentives and accountability for sharing information to help facilitate this shift” (GAO,

Sept. 2004: 1). This advice regularly repeats itself.

October 16-17, 2009Cambridge University, UK

22

Page 23: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

The complexity of living with the agency’s profound informational uncertainties has no

equal in the private sector (Balk and Calista, 2001). Where in the private sector would a firm’s

board of directors request 260 specific documentation reports detailing aspects of the

organization’s accountability (Lipton, 2005)? In 2007 and 2008 DHS officials testified—

defended—the agency at 370 congressional hearings (Laskow, 2009). Combined, DHS’ task and

principal-agent uncertainties make stressing precision alignments, including intelligence

arrangements, in a word, seem fanciful.

Conclusions: Turning Stones as a Necessary Evil

Catastrophic terror makes itself impenetrable by operating under anomalous

organizational conditions. Proscribed terror communications defend against both leakage and

exposure of cell activities, respectively, by confining insider detection of plans and fending off

outsider penetration of execution. Particularly among non-market centralized terrorists,

decoupling planning from executing is anomalous because it lowers the threshold of bounded

rationality and forces terrorists to sanction a form of “grounded” rationality. Instead of grounded

rationality loosening loyalty among members, however, it strengthens their bilateral ties and tilts

CI in favor of terrorists.

To reverse its shortcomings, DHS takes a strategic cue from the organizational anomalies

adhered to by terrorism—essentially from both market and non-market terror underwhelming

their communications. Accordingly, the agency counters terror’s sparseness in articulating and

discreteness in processing of communications with their mirror opposites—exhaustiveness in

gathering and robustness in sharing intelligence. DHS’ acceptance of certain intelligence

redundancies is more efficacious than, belatedly, acknowledging it failed to preserve enough of

them. In these circumstances, redundancy is both a necessary evil and a rational response to

October 16-17, 2009Cambridge University, UK

23

Page 24: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

terrorism. In gathering intelligence DHS bets on averting a Type I error. In many instances, sub-

agencies are turning the same stones differently, each “covers” for the potential slippage of the

others; one, by preventing a wanted message from disappearing. The overall agency suffers

redundancy in order to intensify the division between terror’s sparse and discrete

communications. A trade-off occurs.

As the trade-off forsakes gaining more complete knowledge from terror planners, it

increases the susceptibility of terror operatives to exposure—and arrest—mainly among linked

liaisons and cells. That is, as DHS’ multi-agencies uniquely duplicate and replicate gathering

intelligence, they are especially pressing planners into communicating more surreptitiously,

which raises the volume of worker chatter. Greater volume wears away terror’s impenetrability.

In effect, a competitively redundant strategy capitalizes on a basic weakness residing in terror’s

obscured communications. The strategy carries the anomalies of terror organizations to their

logical conclusion—to reverse the value of underwhelming their communications. Constructing

this multi-agency solution squares with DHS’ oppositional strategy, as it combats terror’s closed

communications system by advancing an open intelligence one.

DHS reverses how agencies under one roof typically achieve efficiency and

effectiveness (O’Toole and Meier, 2004). To become effective, other networks tighten (pool)

their usage of scarce personnel resources, but suffer inefficiency by raising the costs of their

intersecting administrative functions. DHS welcomes this looseness as a vehicle for fostering

intelligence sharing. Sharing is not only a factor of causing its sub-agencies to seek outlets for

their redundant intelligence, but also because it protects against making a Type II error. That is,

no agency wants to be held accountable for letting out-of-place messages get through. In other

words, redundancy creates the necessary maneuverability for agencies to employ intelligence

October 16-17, 2009Cambridge University, UK

24

Page 25: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

sharing to guard against their own transactional shortcomings. While this effort is inefficient, it is

effective, which, ultimately, justifies creating the multi-agency.

What are proposals for future research? A most beneficial form begins by examining a

refutable presumption. The presumption, expectedly, draws on terror’s organizational anomalies

as the basis for exploring DHS’ redundant intelligence strategy. Shaping this vital outcome

involves learning which multi-agency solutions optimally fulfill a redundant strategy. The

immediacy of engaging in this analytical and empirical task is obvious. Ultimately, its value

centers on formulating a reliable knowledge-base that heightens the vulnerability of terror

isolating planning from implementing. As researchers broaden this knowledge-base, they may

find the prevailing organizational paradigm that dismisses redundancy as unwholesome deserves

some questioning.

October 16-17, 2009Cambridge University, UK

25

Page 26: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

Bibliography

Argyris, C. & Schön, D.A. (1996). Organizational learning II: Theory, method, and practice. Reading, MA: Addison-Wesley.

Balk, W. L. & Calista, D. J. (2001). A framework for professional action. Public Performance and Management Review. 25 (1): 88-104.

Bamford, J. (2001). Body of secrets: Now America’s NSA and Britain’s GCHQ eavesdrop on the world. New York: Doubleday.

Bendor, J.B. (1985). Parallel systems: Redundancy in government. Berkeley: University of California Press.

Bearden, M. & Risen, J. (2003). The main enemy: The inside story of the CIA’s final showdown with the KGB. New York: Random House.

Berkowitz, B.D & Goodman, A.J. (2000). Best truth: Intelligence in the information age. New Haven, CT: Yale University Press.

Betts, R. K. (2002). Fixing intelligence. Foreign Affairs, 62(1), 43-59. Retrieved March 28, 2002, http://proquest.umi.com.

Bozeman, B. (2000). Bureaucracy and red tape. Upper Saddle River: NJ: Prentice Hall.

Carafano, J. J. & Heyman, D. (2004, December 13).DHS 2.0: Rethinking the Department of Homeland Security. Washington, DC: The Heritage Foundation.

The Economist. (2005, March 19). Can spies be made better? Pages 29-34.

Caudle, S. (2005). Homeland Security: Approaches to Results Management. Public Performance & Management Review. 28(3), 352-375.

Comfort, L. ( 2002). Institutional re-orientation and change: Security as a learning strategy. The Forum. 2(1). Retrieved May 15, 2003, http://www.bepress.com/forum/vol1/iss2/art4/.

The Counter-Terrorism Page. Retrieved May 15, 2003, http://www.terrorism.net/.

Davis, P. K. and K. Cragin. (2009). Social science for counterterrorism. Rand, Santa Monica, CA. Retrieved Sept. 1, 2009.http://www.rand.org/pubs/monographs/2009/RAND_MG849.sum.pdf.

Demchak, C. C. ( 2002). Un-muddling homeland security: Design principles for national security in a complex world. The Forum. 2(1). Retrieved May 15, 2003,http://www.bepress.com/forum/vol1/iss2/art2/.

DeRosa, M. (2004, March). Data mining and data analysis for counterterrorism. Washington, DC: The CSIS Press

Dubnick, M. J. (2002). Postscripts for a "state of war": Public administration and civil liberties after September 11. Public Administration Review. 62, [Special Issue], 86-91.

October 16-17, 2009Cambridge University, UK

26

Page 27: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

Eilstrup-Sangiovanni, M. and Jones, C. (2008). Assessing the dangers of illicit networks. International Security. 33(2). Retrieved on Sept. 2, 2009. muse.jhu.edu/journals/international.../33.2.eilstrup-sangiovanni.html

Ehrman, J.(2009) Toward a theory of CI: What are we talking about when we talk about counterintelligence? Retrieved Sept. 2, 2009. https://www.cia.gov/...for.../ toward-a-theory-of-

ci .htm

Firestone, D. (2002, November 20). Senate votes, 90-9, to set up a homeland security dept., geared to fight terrorism. The New York Times, A1.

Gertz, B. (2003). Breakdown: The failure of American intelligence to defeat global terror. New York:Plume.

Gorman, S. (2009, September 4). How a team of geeks cracked spy trade. The Wall Street Journal. B1.

Government Accountability Office. (2004, September, 14).Intelligence reform: Human capital considerations critical to the 9/11 Commission’s proposed reforms. Washington, DC.

Government Accountability Office. (2004, September). Information technology: Major federal networks that support homeland security functions. Washington, DC.

Government Accountability Office. (2005, March). Department of Homeland Security: A comprehensive and sustained approach need to achieve management integration. Washington, DC.

Government Accountability Office. (2008, April). Progress made in implementation of management functions, but more work needs to be done. Washington, DC.

Grow, B. (2005, May 30). Hacker hunters. Business Week. 76-82.

Gunaratna, R. (2002). Inside Al Qaeda. New York: Berkley Books.

Gunaratna, R. (2004). New threshold terrorism. In Rohan Gunaratna (Ed.) The changing face of terrorism. Singapore: Marshall Cavendish.

Gutfraind, A. (2009). Understanding terrorism with a dynamic model. Studies in Conflict and Terrorism, 32(1). Retrieved Sept. 2, 2009. www.springerlink.com/index/t172228p2161022t.pdf.

Harknett, R. J. (2002). Barbarians at and behind the gates: The loss of contingency and the search for homeland security. The Forum, 2(1). Retrieved May 15, 2003,http://www.bepress.com/frum/vol1/iss2/art1/.

Hoffman, B. (1998). Inside terror. New York: Columbia University Press.

Houston Chronicle. (2005, May 26). Billions are spent without improving the nation’s defenses against terrorists. Page A8.

Inspector General, Department of Homeland Security. (2004, March). Review of the Status of Department of Homeland Security Efforts to Address Its Major Management Challenges. Washington, DC.

Janofsky, M. (2003, August 19). Intelligence to be shared, Ridge tells governors. The New York Times, A19.

Johnston, D. & Risen J. (2003, February. 23). Lone terrorists may strike in the U.S. agencies warn.

October 16-17, 2009Cambridge University, UK

27

Page 28: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

The New York Times, A15.

Kaufman, H. (1977). Red tape: Its origins, uses, and abuses. Chatham, NJ: Chatham House Press.

Keefe, P. R. (2006, March 12). Can Network Theory Thwart Terrorists? The New York Times Magazine, 16-19.

Kettl, D. F. (2002). The transformation of governance: Public administration for the twenty-first century America. Baltimore, MD: Johns Hopkins University Press.

Kim, W. (2005). On. U.S. homeland security and database technology. Journal of Database Management.16(1). Retrieved Sept. 8, 2009. www.sigmod.org/dblp/db/indices/a-tree/k/ Kim : Won .html

Krebs, Valdis E. (2001). Mapping networks of terrorist cells. Connections, 24, 43-52.

Kuhn, T. (1962). The structure of scientific revolutions. Chicago: University of Chicago Press.

Landau, M. (1969). Redundancy, rationality and the problem of duplication and overlap. Public Administration Review, 29(4), 346-58.

Landau, M. and Stout, R. (1979). To manage is not control: On the folly of Type II Errors. Public Administration Review. 39(2), 148-156.

Laskow, S. (2009, July 15). Is Congress failing on homeland security? Center for Public Integrity. Retrieved on Sept. 2, 2009. www.publicintegrity.org/articles/entry/1549.

Lichtblau, E. (2003a, January 30). Security officials consider plan to combine terror forces. The New York Times, A1.

Lichtblau, E. (2003b, June 19). Retailoring to meet new threats but stretched thin, reports say. The New York Times, A:15.

Lichtblau, E. (2003c, September 5). Al Qaeda still active in U.S. The New York Times, A:11.

Lipton, E. (2002, May 18).House approves $32 billion security budget. The New York Times, A:16.

Lipton, E (2005, June 9). Audit finds security dept. is lacking disaster backups. The New York Times, A:18.

MacDonald, M. S. & Oettinger, A.G. (2002). Information overload. Harvard International Review. 24(1), 44-48.

Machado, N. & Burns, T.R. (1998). Complex social organization: Multiple organizing modes, structural incongruence, and mechanics of integration. Public Administration, 76(2), 355-386.

Maybury, M. (2001). Collaborative virtual environments for analysis and decision support. Association for Computing Machinery. Communications of the ACM. 44,(1) 51-54.

Milward, H. B. & Raab, J. (2003). Dark networks: The structure, operation, and performance of international drug, terror, and arms trafficking networks. Paper presented at the International Conference on theEmpirical Study of Governance, Management and Performance. Barcelona, October.

More flights, passengers to overburden airports. (2001, March 13) ABCNEWS.com. Retrieved May 15, 2003. http://abcnews.com

October 16-17, 2009Cambridge University, UK

28

Page 29: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

Nationmaster.com (2009) Retrieved July 23, 2009.http://www.nationmaster.com/graph/ter_num_of_kno_ter_org_pre-number-known-terrorist

Newmann, W. W. (2002). Reorganizing for national security and homeland security. Public Administration Review, 62, [Special Issue], 126-137.

Niskanen, W. (1971). Representative Bureaucracy. New York: Aldine-Atherton.

Nye, J. (2002, March 21). The new Rome meets the new barbarians. The Economist. Retrieved April 17, 2003, www.economist.com.

Odom, W. E. Fixing intelligence for a more secure America. New Haven, CT: Yale University Press.

Office of Inspector General. (2004). Review of the status of the Department of Homeland Security efforts to address its major management challenges. March 2004. Retrieved March 23, 2004.

http://www.dhs.gov/interweb/assetlibrary/OIG_DHSManagementChallenges0304.pdf

O’Toole, L. J. & Meier, K.J. (2004), Desperately seeking Selznick: Cooptation and the dark side of public management in networks. Public Administration Review. 64(6), 681-694.

Overstaffed Airports. (2003, April 1). CNN TV News, 5:45PM.

Rosenberg, A. (2009, Feb. 25). DHS chief open to expanding collective bargaining rights. Government Executive.Retrieved on Sept. 7, 2009. www.govexec.com/dailyfed/0209/022509ar1.htm

Rosenthal, U. (2003). September 11: Public administration and the study of crises and crisis management. Administration & Society. 35(3), 129-143.

Russell, R. L. (2002). Tug of war: The CIA’s uneasy relationship with the military. SAIS Review, 22, 1-18.

Russell, R. L. (2004). The wrong model for the war on terror. Policy Review, No. 123 (March), 61-72.

Sageman, M. (2004). Understanding terror networks. Philadelphia, PA: University of Pennsylvania Press.

Sageman, M. (2008). The next generation of terror. Foreign Affairs. 165: Mar./Apr. http://www.foreignpolicy.com/users/login.php?story_id=4168&URL=http://www.foreignpolicy.com/story/cms.php?story_id=4168

Scheuer, M. (2004). Imperial hubris: Why the West is losing the war on terror. Washington, DC: Brassey’s Inc.

Schmitt, E. (2009). F.B.I. agents’ role is transformed by terror fight. The New York Times. August 19. B1.

Shanker, T. (2003, April 11). For military intelligence, a new favorite commando. The New York Times, B9.

Shenon, P. (2003a, February 3). Some accuse White House of shortchanging budget for war on terrorism in the U.S. The New York Times, A1.

Shenon, P. (2003b, September 5). U.S. does not plan to raise alert before 9/11 anniversary. The New York Times, A11.

October 16-17, 2009Cambridge University, UK

29

Page 30: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

Shortchanging Security. (2003, August 6). The New York Times, A:16.

Simon, H. A. (1957). Administrative behavior. 2nd ed. New York: Macmillan.

Stevenson, R. W. (2002, November 26). Signing homeland security bill. The New York Times, A1.

Taylor, M. (1991). The fanatics: A behavioural approach to political violence. London: Brassey’s.

Thompson, J. D. (1967). Organizations in action. New York: McGraw-Hill.

Treverton, G. F. (2004, August). Assessing the 9/11 panel’s recommendations for reshaping American intelligence. The Century Foundation. Retrieved on April 7, 2005. www.tcf.org

TSA Blocks Union. (2003, January 10). The Washington Post, A1.

Vogel, S. (2009, Aug. 27). For intelligence officers, A Wiki way to connect dots. The Washington PostA-23.

Weick, K. E. (1979). The social psychology of organizations. 2nd ed. Reading, MA: Addison-Wesley.

Weick, K. E. (1982). Management of organizational change among loosely coupled elements. In Paul S. Goodman (Ed.). Change in organizations (pp. 375-408). San Francisco: Jossey-Bass.

Wise, C. R. ( 2002). Organizing for homeland security. Public Administration Review. 62, 131-144.

Wise, C. R. & Nader, R. ( 2002). Organizing the federal system for homeland security: Problems, issues, and dilemmas. Public Administration Review. 62, [Special Issue], 44-57.

Wong, E. (2003, May 22). Security cutbacks worry airport officials. The New York Times, C1.

Yang, C. C and Sageman, M. (2009). Analysis of terrorist social networks with fractal views Journal of Information Science. 35:3. Retrieved on Sept. 2, 2009.

portal.acm.org/citation.cfm?id=983494

October 16-17, 2009Cambridge University, UK

30

Page 31: Enduring Inefficiencies in Intelligence Systems By Reducing Errors

9th Global Conference on Business & Economics ISBN : 978-0-9742114-2-7

October 16-17, 2009Cambridge University, UK

31