Problem
• Fingar discusses the Iraq WMD Estimate, now the classic example of an "intelligence failure." Describe each of the three intelligence process flaws that contributed to the "failure" of this estimate and note if/how each of these flaws has been addressed.
• Explain the options intelligence organizations have in obtaining intelligence from computer networks that are not connected to the internet. What role can HUMINT play in these activities? Is it possible to guard against these efforts? How?