Skip to main content Accessibility help
×
Hostname: page-component-7c8c6479df-995ml Total loading time: 0 Render date: 2024-03-28T08:02:49.643Z Has data issue: false hasContentIssue false

2 - How to build a warning system

Published online by Cambridge University Press:  14 May 2010

Paul Bracken
Affiliation:
Yale University, Connecticut
Ian Bremmer
Affiliation:
Eurasia Group, New York
David Gordon
Affiliation:
US Department of State
Get access

Summary

Warning is one critical way to avoid strategic surprise. To some degree it is used in all fields and by nearly all organizations. There are many specialized studies of it in different fields, including epidemiology, finance and national security. Some of the ideas in these fields can be usefully applied to the others. For example, risk analysis and Bayesian networks, developed in operations research and finance, have been imported into the warning programs of the intelligence community.

But there is a more basic prior question that has been given little attention. How does someone actually build a warning system? I mean this in the sense of how it fits in with other important factors, like other ways to deal with risk that do not rely on warning, and with overall strategy. This question is becoming more pressing. Various disasters, like September 11, 2001, the Asian tsunami, African famine and many others involve elements of warning, for sure. But they involve a lot more as well. Getting good warning is only the beginning of a process that has many other political and socio-bureaucratic elements to it. Ignoring this larger setting almost guarantees that warning will not perform well for the simple reason that no one will pay attention to it.

A related issue is that hundreds of billions of dollars are spent on warning technology – IT, satellites, software and sensors. This technology has transformed the structure and behavior of already complex organizations.

Type
Chapter
Information
Managing Strategic Surprise
Lessons from Risk Management and Risk Assessment
, pp. 16 - 42
Publisher: Cambridge University Press
Print publication year: 2008

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

,National Commission on Terrorist Attacks upon the United States, The 9/11 Commission Report: final report of the National Commission on Terrorist Attacks upon the United States Authorized Edition (New York: W. W. Norton, 2004).Google Scholar
Sortino, F. and Satchell, S. (eds.), Managing downside risks in financial markets: theory, practice, and implementation (Oxford: Butterworth-Heinemann, 2001).Google Scholar
Nelson, R. R., The moon and the ghetto (New York: Norton, 1977).Google Scholar
McLean, B. and Elkind, P., The smartest guys in the room: the amazing rise and scandalous fall of Enron (New York: Portfolio, 2004)Google Scholar
Eichenwald, K., Conspiracy of fools: a true story (Broadway, 2005).Google Scholar
Thompson, J. D., Organizations in action (New York: McGraw Hill, 1967)Google Scholar
Thompson, J. D. and McEwen, W. J., “Organizational goals and environment: goal-setting as an interaction process,” American Sociological Review, 23 (1958), 23–31CrossRefGoogle Scholar
Wohlstetter, R., Pearl Harbor: warning and decision (Stanford University Press, 1962).Google Scholar
Betts, R. K., “Surprise, scholasticism, and strategy: a review of Ariel Levite's ‘Intelligence and strategic surprises,’” International Studies Quarterly, 33 (1989), 329–43CrossRefGoogle Scholar
Levite, A., “Intelligence and strategic surprises revisited: a response to Richard K. Betts's ‘Surprise, scholasticism, and strategy,’” International Studies Quarterly, 33 (1989), 345–49.CrossRefGoogle Scholar
Persico, J. E., Roosevelt's secret war: FDR and World War II espionage (New York: Random House, 2001).Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×