RedSheep SecurityRedSheepSecurity
Foundations — Lesson 7 of 10

Structured Analytic Techniques — Introduction

10 min read

Structured Analytic Techniques (SATs) are systematic methods designed to help intelligence analysts think more rigorously, challenge their assumptions, and reduce the impact of cognitive biases on their judgments. Rooted in decades of intelligence community practice and formalized through works like Richards Heuer's Psychology of Intelligence Analysis and the follow-on Structured Analytic Techniques for Intelligence Analysis by Heuer and Randolph Pherson, SATs are essential tools for any CTI analyst who wants to produce intelligence that is defensible, transparent, and less susceptible to analytic pitfalls.

Learning Objectives

  • Explain what Structured Analytic Techniques are and why they were developed
  • Identify the key cognitive biases that affect intelligence analysis
  • Distinguish between the three major categories of SATs: diagnostic, contrarian, and imaginative
  • Describe core techniques including ACH, Key Assumptions Check, Devil's Advocacy, and Red Team Analysis
  • Determine when and how to apply SATs to improve intelligence quality

Why SATs Exist: The Problem of Cognitive Bias

Intelligence analysis is fundamentally a human cognitive activity. Analysts must evaluate incomplete, ambiguous, and sometimes contradictory information to reach judgments about what is happening and what may happen next. The human brain, while remarkable, relies on mental shortcuts (heuristics) that can introduce systematic errors into this process.

The CIA's recognition of this problem led to the publication of Richards Heuer's Psychology of Intelligence Analysis in 1999, which documented how cognitive biases consistently undermine intelligence judgments — not because analysts are careless, but because the biases are inherent in how human cognition works.

Key Cognitive Biases in Intelligence Analysis

Cognitive bias: A systematic pattern of deviation from rational judgment, arising from the brain's use of mental shortcuts to process information efficiently.

Bias Description CTI Example
Confirmation Bias Seeking or favoring information that confirms existing beliefs while ignoring contradictory evidence An analyst convinced a campaign is state-sponsored overlooks indicators suggesting criminal motivation
Anchoring Bias Over-relying on the first piece of information encountered when making judgments Initial attribution to a specific threat group persists even as new evidence points elsewhere
Availability Heuristic Judging probability based on how easily examples come to mind rather than actual frequency Overestimating ransomware risk because it dominates news coverage, while underestimating insider threats
Mirror Imaging Assuming adversaries think and act the way you would in their situation Expecting a nation-state actor to behave "rationally" by Western strategic logic when their decision-making framework is different
Groupthink Conforming to group consensus to avoid conflict, suppressing dissenting views A CTI team converges on an attribution assessment without anyone challenging the underlying assumptions
Satisficing Accepting the first "good enough" explanation rather than exploring alternatives Attributing an intrusion to a known threat group because TTPs partially match, without considering other candidates

SATs were developed specifically to counteract these biases by imposing structure on the analytic process, forcing analysts to consider alternatives, examine assumptions, and make their reasoning transparent and auditable.

Categories of Structured Analytic Techniques

Heuer and Pherson organize SATs into three broad categories, each serving a different analytic purpose.

Diagnostic Techniques

Diagnostic techniques help analysts examine the quality of their own reasoning. They answer the question: Are we thinking about this correctly?

These techniques are used to surface hidden assumptions, test the logical consistency of arguments, and evaluate how sensitive a conclusion is to changes in key variables. They are typically the first SATs an analyst should learn because they address the most fundamental source of analytic error — flawed reasoning processes.

Key diagnostic techniques include:

  • Key Assumptions Check (KAC): A systematic review of the assumptions underpinning an analytic judgment. The analyst lists every assumption, evaluates whether each is well-supported or vulnerable, and assesses how the conclusion would change if any assumption proved wrong.
  • Analysis of Competing Hypotheses (ACH): A structured method for evaluating multiple hypotheses against available evidence. Rather than building a case for a preferred explanation, ACH forces the analyst to consider all reasonable hypotheses simultaneously and identify which ones the evidence most strongly disconfirms.
  • Quality of Information Check: Evaluating the sources and evidence base for gaps, potential deception, and reliability concerns before drawing conclusions.

Contrarian Techniques

Contrarian techniques deliberately challenge established views, consensus positions, or prevailing assumptions. They answer the question: What if we're wrong?

These techniques are most valuable when the stakes are high, when there is strong consensus that may be suppressing dissent, or when an adversary may be engaged in denial and deception.

Key contrarian techniques include:

  • Devil's Advocacy: Assigning an analyst or team to build the strongest possible case against the prevailing judgment. The devil's advocate is not merely playing a role — they must construct a genuinely compelling counter-argument supported by evidence.
  • Red Team Analysis: Adopting the perspective of the adversary to evaluate how they would plan, execute, or respond to a given situation. In CTI, red teaming might involve asking: "If I were this threat actor, how would I adapt my TTPs in response to the defensive measures we've recommended?"
  • Team A/Team B Analysis: Dividing analysts into separate teams that independently develop competing assessments from the same body of evidence, then comparing and debating results.

Imaginative Techniques

Imaginative techniques help analysts envision possibilities that fall outside conventional thinking. They answer the question: What else could happen?

These techniques are used for forecasting, scenario planning, and identifying potential surprises or "black swan" events.

Key imaginative techniques include:

  • Brainstorming (Structured): A facilitated session with specific rules to generate the widest possible range of ideas before evaluating any of them. Unlike casual brainstorming, structured brainstorming uses techniques like silent generation and round-robin sharing to prevent groupthink.
  • What If? Analysis: Systematically exploring the consequences of a specific scenario that is plausible but not expected. "What if this ransomware group develops a wiper variant?" or "What if a zero-day drops in our most critical platform during a holiday weekend?"
  • High Impact/Low Probability Analysis: Deliberately focusing attention on scenarios that would have severe consequences even if they seem unlikely, to ensure organizations are not blindsided.

Deep Dive: Analysis of Competing Hypotheses (ACH)

ACH is arguably the most widely used SAT in intelligence analysis and deserves a closer look. Developed by Richards Heuer at the CIA, ACH follows a specific process:

  1. Identify all reasonable hypotheses. Cast a wide net — include hypotheses that seem unlikely but are not impossible.
  2. List significant evidence and arguments for and against each hypothesis.
  3. Build a matrix. Place hypotheses across the top and evidence down the side. For each cell, assess whether the evidence is consistent (C), inconsistent (I), or not applicable (N/A) with the hypothesis.
  4. Refine the matrix. Look for evidence that discriminates between hypotheses — evidence that is consistent with one hypothesis but inconsistent with another is the most valuable.
  5. Draw tentative conclusions. The hypothesis with the least inconsistent evidence is the most likely — note that ACH works by disconfirmation, not confirmation.
  6. Analyze sensitivity. Identify which pieces of evidence are most critical. If your conclusion depends heavily on one piece of evidence, assess the reliability of that evidence carefully.
  7. Report conclusions with appropriate confidence and identify milestones — future events or evidence that would cause you to change your assessment.

ACH in CTI Practice

Consider a scenario where you are analyzing a spear-phishing campaign targeting your organization. Possible hypotheses might include:

  • H1: A specific nation-state APT group targeting your sector
  • H2: A financially motivated group conducting broad campaigns
  • H3: A hacktivist group motivated by your organization's public activities
  • H4: An insider threat using phishing as a cover

By systematically evaluating each piece of evidence (email headers, payload analysis, infrastructure, targeting scope, timing, language) against all four hypotheses, ACH prevents the analyst from prematurely locking onto the most obvious explanation.

When to Use SATs

SATs add rigor but also add time and effort. Not every analytic question requires a formal SAT. Use them when:

  • Stakes are high: The assessment will drive significant resource allocation, executive decisions, or defensive actions
  • Ambiguity is significant: The evidence supports multiple interpretations
  • Consensus is strong but untested: The team agrees, but no one has formally challenged the prevailing view
  • Deception is possible: The adversary may be deliberately planting misleading evidence
  • The problem is novel: Familiar analytic patterns may not apply

For routine tactical analysis (IOC enrichment, malware triage), SATs are typically unnecessary. For strategic assessments, attribution judgments, and threat forecasts, they are essential.

How SATs Improve Intelligence Quality

SATs improve intelligence products in several measurable ways:

  • Transparency: The reasoning process is documented and auditable, allowing consumers to understand how conclusions were reached
  • Reduced bias: Structured processes counteract the specific biases that most commonly affect intelligence analysis
  • Alternative consideration: SATs force explicit consideration of alternatives, reducing the risk of surprise
  • Confidence calibration: By exposing assumptions and evidence gaps, SATs help analysts assign more accurate confidence levels to their judgments
  • Collaboration: Many SATs are designed for group application, improving team analytic processes

Key Takeaways

  • SATs are systematic methods designed to counteract cognitive biases in intelligence analysis
  • Key biases include confirmation bias, anchoring, availability heuristic, mirror imaging, and groupthink
  • The three categories of SATs — diagnostic, contrarian, and imaginative — serve different analytic purposes
  • ACH is the most widely used SAT and works by disconfirmation rather than confirmation
  • Key Assumptions Check surfaces hidden assumptions that underpin analytic judgments
  • Devil's Advocacy and Red Team Analysis deliberately challenge prevailing views
  • SATs should be applied when stakes are high, ambiguity is significant, or deception is possible
  • For routine tactical CTI work, SATs are usually unnecessary; for strategic assessments, they are essential

Practical Exercise

Key Assumptions Check Exercise:

Select a recent cyber threat assessment from a public source (CISA advisory, vendor report, or news article that makes a specific claim about attribution or threat actor intent).

  1. Write down the main analytic conclusion of the assessment
  2. List every assumption that must be true for that conclusion to hold (aim for at least 5-7 assumptions)
  3. For each assumption, rate it as: Well-Supported (multiple independent sources), Reasonable (logical but limited direct evidence), or Vulnerable (could easily be wrong)
  4. Identify which vulnerable assumptions, if wrong, would most change the conclusion
  5. Write a brief paragraph describing how you would seek additional evidence to test the most vulnerable assumptions

This exercise builds the habit of examining the foundations of analytic judgments before accepting them at face value.

Further Reading

  • Psychology of Intelligence Analysis by Richards J. Heuer Jr. (Center for the Study of Intelligence, CIA, 1999) — the foundational text on cognitive biases in intelligence work, available free from the CIA's Center for the Study of Intelligence
  • Structured Analytic Techniques for Intelligence Analysis by Richards J. Heuer Jr. and Randolph H. Pherson (CQ Press, 3rd edition 2020) — the comprehensive reference for SATs with detailed methodology for each technique
  • Critical Thinking for Strategic Intelligence by Katherine Hibbs Pherson and Randolph H. Pherson (CQ Press, 3rd edition 2020) — practical application of structured thinking to intelligence problems
  • ODNI Analytic Standards (ICD 203) — the Intelligence Community Directive that establishes standards for analytic integrity, including the requirement to consider alternative hypotheses (https://www.dni.gov/files/documents/ICD/ICD%20203%20Analytic%20Standards.pdf)