SATs

Read Time:1 Minute, 4 Second

We once knew SATs to mean standard Arabic transliteration but that has long since changed. We now know this to mean Structured Analytic Techniques. Structured Analytic Techniques involve a step-by-step process that externalizes the analyst’s thinking in a manner that makes it readily apparent to others, thereby enabling it to be reviewed, discussed, and critiqued piece by piece. For this reason, structured analysis usually becomes a collaborative effort in which the transparency of the analytic process exposes participating analysts to divergent or conflicting perspectives. We believe this type of analysis helps to mitigate some of the adverse effects of a single analyst’s cognitive limitations, an ingrained mindset, and the whole range of cognitive biases, misapplied heuristics, and intuitive traps. Frequently used techniques include Cluster Brainstorming, Foresight analysis, Indicators, Analysis of Competing Hypotheses, and Key Assumptions Check. Structured techniques are taught in undergraduate and graduate school programs and many intelligence service training courses. They can be used by analysts who do not have a background in statistics, advanced mathematics, or the hard sciences. Combine your intuition with SATs and reap the benefits of both worlds.

Our courses are on-demand online at Structured Analytic Techniques – SATS | Treadstone 71 Cyber (cyberinteltrainingcenter.com) or in person this Summer in Fort Myers, Florida.  

 

 

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

Author

  • @Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence

Previous post Summer of Cyber Intelligence
Next post Manhunting the Manhunters: Digital Signature Management in the Age of Great Power Competition – Modern War Institute
%d bloggers like this: