Technology, Intelligence, and Trust

By Howcroft, James R. | Joint Force Quarterly, July 2007 | Go to article overview

Technology, Intelligence, and Trust

Howcroft, James R., Joint Force Quarterly


The outcome of the conflicts that the American military is likely to fight in the decades ahead will increasingly depend on tactical success and the empowerment of small unit leaders. Recent advances in technology have the potential to improve the intelligence collection and dissemination capabilities of tactical military units. Unfortunately, perceptions about who "does" intelligence and the role and responsibilities of intelligence collection, analysis, and dissemination threaten to limit the warfighting potential of intelligence technology on the battlefields of the 21st century. A mindset change is required to maximize the evolving capabilities of modern technology.

Cold War Intelligence Paradigm

During the Cold War, much of our intelligence collection was centralized at the national level and focused on strategic targets, which were seen as the key to victory against conventional armed forces. Cold War targets were generally static sites, such as headquarters, missile silos, airfields, or railroad marshalling yards. Intelligence collection was prioritized to provide accurate targeting data and follow-on bomb damage assessment on these targets for manned and unmanned airborne weapons platforms. The requirements of ground-based tactical and operational level intelligence consumers were only of secondary importance; units at this level were not critical to success. Victory was won or lost at the strategic level.

Strategic level headquarters naturally determined the target sets for this Cold War intelligence collection. Units at the operational or tactical commands could input collection requests, but these requests required validation by every headquarters in the command hierarchy prior to arrival at the national tasking level. The requirements of a unit lower in the hierarchy could be trumped by anyone higher in the chain. In this process, tactical units had little or no visibility. Transparency did not exist to allow a tactical consumer to determine easily when or if his requirement would be collected.

Ironically, the tactical commander who had the most pressing need for the greatest resolution of the battlefield had the least ability to access or influence the centralized intelligence collections architecture. In 2003, following the invasion of Iraq and the capture of Baghdad and Tikrit, the 1st Marine Division in its official after-action report noted, "The Byzantine collections process inhibited our ability to get timely responses to combat requirements.... The existing hierarchical collections architecture is wildly impractical and does not lend itself to providing timely support to combat operations." (1)

Sadly, much of this Byzantine bureaucracy is with us still today. In addition to the burden of competing with every unit above him in the collections chain, the tactical consumer must depend on a collections hierarchy to push critical intelligence down to him rapidly in an accessible, relevant format. The tactical consumer is dependent on those above him in the distant headquarters who carried out the collection and analysis of the raw data to understand and appreciate his specific information needs. If the tactical consumer were successful at precisely describing his requirements days ahead of time and in a manner and method that were understandable to the analyst conducting the "readout" of the collection data, he might just be fortunate enough to receive a useful product.

While Service-centric intelligence is a step in the right direction, the military consumer is still U.S. Central Command or U.S. European Command headquarters in Tampa or Stuttgart, respectively (at least in the eyes of the distant national level intelligence agencies), not an infantry battalion on the Syrian border. The distant analyst often has little visibility or understanding of exactly why the tactical consumer is asking for the information, the impact of the data, or how to package the information so it is actionable for the ground commander. …

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Cite this article

Cited article

Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)


1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25,

Cited article

Technology, Intelligence, and Trust


Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25,

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.