The Future of Intelligence 2014
The Future of Intelligence 2014
This volume discusses the challenges the future holds for different aspects of the
intelligence process and for organisations working in the field.
The main focus of Western intelligence services is no longer on the intentions
and capabilities of the Soviet Union and its allies. Instead, at present, there is a
plethora of threats and problems that deserve attention. Some of these problems
are short-term and potentially acute, such as terrorism. Others, such as the
exhaustion of natural resources, are longer-term and by nature often more diffi-
cult to foresee in their implications.
This book analyses the different activities that make up the intelligence
process, or the ‘intelligence cycle’, with a focus on changes brought about by
external developments in the international arena, such as technology and security
threats. Drawing together a range of key thinkers in the field, The Future of
Intelligence examines possible scenarios for future developments, including esti-
mations about their plausibility, and the possible consequences for the function-
ing of intelligence and security services.
This book will be of much interest to students of intelligence studies, strategic
studies, foreign policy, security studies and IR in general.
More Instructions from the Espionage and the Roots of the Cold
Centre War
Christopher and Oleg Gordievsky The conspiratorial heritage
David McKnight
Controlling Intelligence
Edited by Glenn P. Hastedt Swedish Signal Intelligence
1900–1945
Downloaded by [University of Florida] at 05:04 15 February 2017
Spy Fiction, Spy Films, and Real C.G. McKay and Bengt Beckman
Intelligence
Edited by Wesley K. Wark The Norwegian Intelligence Service
1945–1970
Security and Intelligence in a Olav Riste
Changing World
New perspectives for the 1990s Secret Intelligence in the Twentieth
Edited by A. Stuart Farson, Century
David Stafford and Wesley K. Wark Edited by Heike Bungert,
Jan G. Heitmann and Michael Wala
A Don at War
Sir David Hunt K.C.M.G., O.B.E. The CIA, the British Left and the
(reprint) Cold War
Calling the tune?
Intelligence and Military Hugh Wilford
Operations
Edited by Michael I. Handel Our Man in Yugoslavia
The story of a Secret Service operative
Leaders and Intelligence Sebastian Ritchie
Edited by Michael I. Handel
Understanding Intelligence in the
War, Strategy and Intelligence Twenty-First Century
Michael I. Handel Journeys in shadows
Len Scott and Peter Jackson
Strategic and Operational
Deception in the Second World MI6 and the Machinery of Spying
War Philip H. J. Davies
Edited by Michael I. Handel
Twenty-First Century Intelligence
Codebreaker in the Far East Edited by Wesley K. Wark
Alan Stripp
Intelligence and Strategy
Intelligence for Peace Selected essays
Edited by Hesi Carmel John Robert Ferris
The US Government, Citizen Exploring Intelligence Archives
Groups and the Cold War Enquiries into the secret state
The state–private network Edited by R. Gerald Hughes,
Edited by Helen Laville and Peter Jackson and Len Scott
Hugh Wilford
US National Security, Intelligence
Peacekeeping Intelligence and Democracy
New players, extended boundaries The Church Committee and the War
Edited by David Carment and on Terror
Martin Rudner Edited by Russell A. Miller
Downloaded by [University of Florida] at 05:04 15 February 2017
Index 162
About the contributors
Downloaded by [University of Florida] at 05:04 15 February 2017
ens Jubileumsfond.
Arthur S. Hulnick is Associate Professor of International Relations at Boston
University and a veteran of more than thirty-five years in American intelli-
gence. He has written numerous articles on intelligence matters and is the
author of two books, Fixing the Spy Machine (2000) and Keeping Us Safe:
Secret Intelligence and Homeland Security (2004), both published by Praeger.
He is a member of the editorial boards of The International Journal of Intelli-
gence and Counterintelligence and Intelligence and National Security.
Mark M. Lowenthal has served as the Assistant Director of Central Intelligence
for Analysis and Production, and is President and CEO of the Intelligence and
Security Academy. He has written extensively on intelligence and national
security issues, including five books and over ninety articles and studies. His
most recent book, Intelligence: From Secrets to Policy (4th edn, 2009), has
become the standard college and graduate school textbook on the subject.
Sir David Omand was the first UK Security and Intelligence Coordinator,
responsible to the Prime Minister for the professional health of the intelli-
gence community, national counterterrorism strategy and ‘homeland security’.
He has been a visiting professor in the Department of War Studies since
2005/2006. His recent publications include Securing the State (2010).
Jennifer Sims is currently Senior Fellow with the Chicago Council on Global
Affairs. Together with Burton Gerber she co-edited Transforming U.S. Intel-
ligence (2005) and Vaults, Mirrors and Masks: Rediscovering US Counterin-
telligence (2009). Her publications on defence technology and arms control
include Icarus Restrained: An Intellectual History of Nuclear Arms Control
in the United States from 1945 to 1960 (1985), and ‘The American Approach
to Nuclear Arms Control: A Retrospective’, Daedalus (1991).
Gregory F. Treverton is Director of the Center for Global Risk and Security at
the RAND Corporation. His recent work has focused on terrorism, intelli-
gence and law enforcement, with a special emphasis on forms of public–pri-
vate partnership. His latest books are Intelligence for an Era of Terror (2009);
and (with others) Film Piracy, Organized Crime and Terrorism (2009), and
Reorganizing U.S. Domestic Intelligence: Assessing the Options (2008).
About the contributors xiii
Jelle van Buuren is currently a Ph.D. student at the Centre for Terrorism and
Counterterrorism at Campus The Hague, Leiden University. His research
deals with historical relationships and correlations to explain the rise in the
number of threats directed against state officials in the Netherlands, looking
specifically at the rising number of threats by lone wolves, the general level
of trust in the government, and political legitimacy in the Netherlands.
Joop van Reijn is a former director of the Netherlands Defence Intelligence and
Security Service (NL-DISS). His recent publications include ‘Intelligence and
the International Security Assistance Force’, in Secret Intelligence: A Reader
(2009), ‘Sicherheit und Bürgerfreiheit in den Niederlanden’, in Fehlbare
Downloaded by [University of Florida] at 05:04 15 February 2017
In recent years there has been a steady stream of publications and debate about
new security threats and necessary intelligence reforms. The terrorist threat as it
manifested itself during the infamous attacks of 9/11 caused a major upheaval in
the international intelligence community. Some eight years later, however,
insiders maintain that intelligence services are still burdened by the heritage of
the Cold War in their mode of operation, being ill-prepared for proper forecast-
ing in a changed security environment. This is a rather embarrassing observation
for organizations that claim to possess early warning facilities as a trademark.
There seems to be a pervasive feeling that the twenty-first century may hold
more surprises than a mere revival of terrorism, with other major issues
(increased nuclear proliferation, cyber warfare) looming on the horizon.
This edited volume is based on an international conference on the future of
intelligence organized in 2011 to mark the twentieth anniversary of the Nether-
lands Intelligence Studies Association (NISA). Its contents address several
important questions: What are new security threats and do they also provide new
opportunities? Does the development of technology help or hinder the intelli-
gence services? Is it possible to speak of a new intelligence revolution? To what
extent do new developments require intelligence sharing, not only nationally but
also internationally? And, last but not least: Do these developments pose new
judicial and ethical challenges?
NISA is a non-partisan, voluntary association established in 1991. The Asso-
ciation’s principal purposes are threefold: (1) to provide informed debate in the
Netherlands on intelligence and security issues in the widest possible sense; (2)
to support historical research in the field; and (3) to promote and contribute to
higher education. NISA members cover a broad range of expertise on the work
of intelligence, security and police services: their history, development, organ-
ization and structure, the trajectory of intelligence research, debates on method-
ology, and the significance of new technologies. It comprises an extensive
network of national and international contacts, both academic and professional.
Through its members, NISA is connected with Dutch and foreign research insti-
tutes, study groups and professionals, and works closely with them in a variety
of cooperative ventures.
Acknowledgements
Downloaded by [University of Florida] at 05:04 15 February 2017
NISA is grateful to Routledge Publishers for the opportunity offered to share the
outcome of its 2011 conference with a larger audience. NISA is also grateful to
the Taylor & Francis Group for the permission granted to include Wilhelm
Agrell’s article ‘The Next 100 Years: Reflections on the Future of Intelligence’
in this volume. The manuscript has been completed in the early spring of 2013.
A special word of thanks goes to a number of long-term members of NISA:
Isabelle Duyvesteyn (Leiden University) for her support in shaping the volume
and for very effectively and smoothly communicating with the authors; Giles
Scott-Smith (Roosevelt Study Center and Leiden University) for his editorial
work on the draft manuscript; Bob de Graaff (Utrecht University and Nether-
lands Defence Academy) and George Dimitriu (Ministry of Defence, The
Hague) for their introduction and conclusion to the volume respectively; and the
editors, Ben de Jong (Amsterdam University) and Joop van Reijn (Maj. Gen.,
ret.) for a job well done. Last, but certainly not least, NISA would like to express
its profound thanks to the authors of this volume for their fine contributions to
the project.
Michael Kowalski
Chairman, Netherlands Intelligence Studies Association
Downloaded by [University of Florida] at 05:04 15 February 2017
Introduction
It is possible to think of an intelligence organization or an intelligence com-
munity as part of an open societal system in transition (De Haan and Rotmans
2011: 90–102; De Graaff 1997: 25–32). In this line of thought the intelligence
organization operates in an environment that may be defined in terms of both
tasks and values. The task environment consists of all the actors that may have
an influence upon the intelligence organization and/or may be influenced by its
acts and products. The value environment is the cultural and ideological climate
in which the organization has to operate. The larger systems (of security, politics
or the military), of which the intelligence organization or community forms a
subsystem, set out the wider environment in which this takes place. The inter-
action between the organization and its environment(s) may be interpreted in
terms of input and output.
Input may be divided into support and demand (from the perspective of an
intelligence organization these may also be interpreted in terms of threats and
opportunities). Support may be defined in terms of money or other material
means, but also recruited or contracted employees, or information that has to be
processed into intelligence. Demand may be defined as the intelligence consum-
ers’ requirements or public expectations. Demands may come from politics or
the public at large regarding the organization’s performance, products, and legal
or ethical restrictions. They may also take the form of information that the organ-
ization is forced to act upon in order to maintain itself in its specific
environment.
The output of an intelligence organization comprises finished intelligence, but
may also include covert actions or active measures. The processes within the
intelligence organization that convert support and demand into output could be
called ‘throughput’ or ‘withinput’. This throughput covers parts of the so-called
intelligence cycle, such as processing the information (decrypting, translation,
photo-interpretation and so on), assessment, evaluation and analysis. These are
the processes that transform raw intelligence into finished intelligence. Through-
puts may also include the decision-making process within the intelligence organ-
ization that leads up to certain actions.
2 B. de Graaff
It is against this backdrop of a systemic approach that I would like to intro-
duce the various contributions on the future of intelligence which make up this
volume.
Future threats
When one addresses possible futures of intelligence one would ideally hope to
be able to sketch a picture that would address all parts of this open system:
changes in task and value environments, shifts in support and demand functions,
modifications in working processes, and alterations in production and output.
However, much of the thinking on the future of intelligence merely emphasizes
Downloaded by [University of Florida] at 05:04 15 February 2017
ics, migration patterns, and (perhaps the worst of all) information overload (see
also Bamford 2004: 111; Shultz 2005; Turner 2006: 57; Treverton 2009: 15;
Agrell 2009: 111; Lahneman 2010: 214; Meeuws 2010; Aid 2012: 213, 215).
However, it may not be the threats which these experts agree upon that are
the most dangerous, but exactly the ones they do not even mention. The fact that
there is so much agreement among them could rather be a cause for concern.
Where is the out-of-the-box thinking, where is the imagination that takes us into
a dark world of unknowns? Or is the future already dark enough as it is? Above
all, is it complex because the threats have become blurred? (Blair 2010: 45–46;
Thomas 2008: 146).
I think everyone will indeed agree that the task environments of intelligence
agencies have become more complex. Not only state actors, but an increasing
number of non-state actors may become opponents. The clustering of possible
opponents along the lines of the Cold War dichotomy has been superseded by an
ever-increasing multitude of state and (especially) non-state actors that may
enter into all kinds of temporary relationships hidden from preying eyes and lis-
tening ears. Furthermore, intelligence has become a phenomenon that seems to
have penetrated every aspect of social life. Not only is intelligence more and
more appreciated in the armed forces and law enforcement circles, as the chap-
ters by Monica den Boer and Jelle van Buuren illustrate, but today almost every
individual who uses the internet behaves like an intelligence officer or agent:
using passwords, encrypting messages, employing cover names, creating net-
works, and using satellite pictures to look, for instance, at one’s neighbour’s
estate (Wheaton 2012; Warner 2012: 148). After the Second World War the
heads of some Western intelligence agencies were championing a government
monopoly on intelligence gathering similar to the government’s monopoly on
violence, a position that is now unthinkable (De Graaff and Wiebes 1992;
Krieger 2009: 100). These days, private intelligence companies and contractors
flourish, and no longer only in the United States (Bean 2011: 9, 14). As Wilhelm
Agrell argues, the more complicated the tasks of intelligence agencies become
and the more technologically advanced the techniques that are required, the more
these same agencies will depend on private initiatives.
It seems to be only a question of time before a group of friends will establish
an intelligence agency not for a living but for a noble cause or even just for fun.
4 B. de Graaff
Treverton mentions the Grey Balloons initiative where people were asked to vol-
unteer working a few hours a week, unpaid, to assist intelligence agencies to do
their job. But one might imagine that in some cases, if the work is unpaid
anyway, people may decide to do it for themselves instead of working for an
agency that benefits from the results. One does not have to be a Marxist to
understand that many would loathe this kind of alienation from what they
produce. Treverton does see possibilities for amateur intelligence that may
compete with official agencies – why not, in the ‘age of the amateur’? (Keen
2007; Reynolds 2006: 92). Such a private initiative has existed since October
2011: Open Briefing (see www.openbriefing.org). What will be the consequences
for established intelligence agencies if such private endeavors produce better
Downloaded by [University of Florida] at 05:04 15 February 2017
results than they do? Treverton recommends seeking help as a key to reshaping
intelligence. That is both a noble and humble approach, but hardly one that
seems to square with the public notion that intelligence agencies are there to
come to the rescue by supplying the right information at the right moment.
Another question regarding the distinctive position of intelligence agencies is
generated by the identification of new types of threat. If, for instance, climate
change and pandemics result in security threats, how great will the distinction
then be between the work of the Intergovernmental Panel on Climate Change
and the World Health Organization on the one hand and that of intelligence
agencies on the other?
1900 and in the 1940s. What is to be expected from intelligence in the future?
How will it reconstitute itself once more? In the past many authors have drawn a
clear dividing line between information and intelligence. The question is whether
the information revolution will pass without leaving any traces on the intelli-
gence process. It is unlikely that many scholars of intelligence would think so.
Many intelligence professionals already have to cope with the so-called ‘CNN
effect’ of traditional journalism or the speediness of ‘new journalism’ via social
media, and the literature on the significance of this is extensive (Ott 1993: 141;
FitzSimmonds 1995: 287; Medina 2002: 26; Bodnar 2003: 14–15, 55–58;
O’Connell and Tomes 2003: 25; Steiner 2004; Center for the Study of Intelli-
gence 2004: 3, 5, 20; Andrus 2005; Davis 2005: 27, 29, 32; Johnston 2005: 107;
Teitelbaum 2005: 10, 205, 208; Treverton 2005: 30–31; Faddis 2008: 3;
Goodman 2008: 355–356; Steele 2009: 133, 137, 142–143; Williams 2011).
Will intelligence agencies maintain early warning as one of their core functions,
only to find out that others are almost always faster at reporting looming dis-
asters or at indicating opportunities? Or will they shift the current balance
between timeliness, accuracy and trustworthiness by putting more emphasis on
the validation of news and knowledge, as Wilhelm Agrell and others predict
(Rathmell 2002: 99; Medina 2002: 26; Barger 2005: 19; Betts 2007: 5–6)?
One of the strong points of this volume is the emphasis it puts on new forms
of international collaboration between intelligence agencies. The descriptions of
intelligence cooperation in EU institutions by Jelle van Buuren en Björn Fäger-
sten show that the age-old adage of ‘quid pro quo’ no longer regulates intelli-
gence cooperation the way it did in the past. Communities of interest and
multilateral working relationships are gaining a foothold as trust is established.
The question arises, however, what the implications are for intelligence and
security agencies if they are no longer the guardians of national sovereignty.
Whereas on the one hand new circumstances ask for closer international cooper-
ation (Herman 2010: 116; Lahneman 2011: 100), the experience with the politi-
cized intelligence process leading up to the invasion of Iraq convinced some
countries that they should have their own intelligence capability independent
from their American and British partners (Report 2010).
New threats, new forms of international cooperation, closer public scrutiny,
greater transparency and an increasing demand from the public for legitimacy
6 B. de Graaff
may also reintroduce the question of for whose benefit intelligence agencies
actually operate. A distinction can be made on whether they work for the state or
for the incumbent government. In the United States they represent the interests
of ‘we, the people,’ while in Germany they protect the constitution. Do these
ultimate ends add a specific meaning to their daily working processes? Or will
such points of departure exactly become more significant as a result of future
developments? Will the ultimate goal of intelligence and security agencies in the
future ´risk society´ no longer be the protection of the interests of the state but
the protection of the interests of its citizens and society, as Omand seems to
imply here and elsewhere (Omand 2012: 154)? This last competence would
seem to conflict with concerns about the growing powers of intrusion of intelli-
Downloaded by [University of Florida] at 05:04 15 February 2017
gence agencies into private spheres, the pervasiveness of alert and alarm
systems, or the undeclared warfare by intelligence agencies using drones for tar-
geted killings in remote parts of the world. Intelligence and security organiza-
tions are then not the great protectors but the originators of an intelligence or
surveillance state, as Omand and others recognize (Schaar 2007; De Koning
2008; Landau 2010; Chesterman 2011). Will the intelligence community then
become one of the big players in the game of social and political risk transfer
from one citizenry to the other? As Jelle van Buren indicates in this volume, that
would then increase the need for forms of accountability that transgress national
boundaries.
were during the Cold War? Finally, has the technological advantage enjoyed by
several intelligence agencies over the rest of society during the Cold War now
been undermined by a more democratic distribution of technology? (Berkowitz
and Goodman 2000: 43–45; Berkowitz 2003: 67–74; Barger 2005: 116; Zegart
2007: 11; Rossmiller 2008: 139–141).
The output
Perhaps the greatest challenge of the future pertains to the output and especially
the dissemination of the intelligence product. If Gregory Treverton and others
are right that current and future intelligence organizations are becoming (or at
least should be) less engaged with solving puzzles and more involved with
addressing mysteries or so-called ‘wicked problems’ for which no easy solutions
present themselves (Treverton 1994; Davis 1994: 7–15; Steiner 2004; Treverton
2009: 16–21; Moore 2011: x), this will have major consequences for the place of
intelligence in democratic society. This will have a far greater impact than the
form in which finished intelligence will be presented, another ‘revolution’ that
Treverton addresses. Intelligence analysts and their representatives will no
longer solely present facts on the numbers of long-distance missiles, the newest
gadgets in submarines, or changes in the line of succession within an opaque
gerontocracy in a foreign power. Intelligence agencies of the future are not likely
to be, as Sir David Omand predicts, primarily knowledge management organiza-
tions (Omand 2012: 156), but instead they will become sense-makers. ‘Suddenly
the ability to make sense of information is as valued a skill as collecting it’,
Richard Fadden, Director of the Canadian Security and Intelligence Service
(CSIS), stated in a recently publicized speech (Wheaton 2012). Intelligence ana-
lysts will become sense-makers defining opponents for government and the
public at large as terrorists, insurgents, a social movement, religious fanatics,
cunning Machiavellists or irrational radicals. They will produce the metaphors
and the graphs that will make cyber attacks understandable. Instead of present-
ing reality they will be shaping it (Codevilla 1992: 19–23; Berkowitz and
Goodman 2000: 99; O’Connell and Tomes 2003: 27; Fishbein and Treverton
2004; Treverton 2005; George 2007; Agrell 2009: 93; Treverton 2009: 16, 22,
27–28, 33–36; Bean 2011: xii; Moore 2011). Analysts will have to become
8 B. de Graaff
communicators, in the process engaging with decision-makers who themselves
make more use of open source intelligence. Sherman Kent’s dividing line
between intelligence and policy, established at the beginning of the Cold War,
will become obsolete because making sense is itself a policy act (Bean 2011:
11). Hulnick discusses the relevance of this Kentian tradition in his contribution
to this volume, indicating that some American authors are beginning to question
whether it remains sound practice. Decision-makers and intelligence analysts
will have to sit together to construct reality, not reconstruct it. Monologue will
have to be set aside in favour of dialogue (Turner 2006: 173–174; Davis 2009:
178, 183, 186–187; Treverton 2009: 9–11). The knowledge-based domain of the
intelligence analyst and the value-based domain of politicians and other decision-
Downloaded by [University of Florida] at 05:04 15 February 2017
makers will tend to fuse. They will write the narratives that give individual facts
a place and a context, in doing so making them understandable. No longer will
intelligence only have a support function in relation to policy, but analysts will
be involved in actually shaping policies together with others through an iterative
process of sense-making (O’Connell and Tomes 2003: 24). Although such a situ-
ation seems to be developing almost naturally out of the evolving task environ-
ment of the intelligence community, it remains to be seen whether its value
environment is ready for such a step. Will it be acceptable to a democratic
society that its dominating perceptions and decisions are shaped by intelligence
analysts who partly base their insights on information that is not transparent?
How can legitimacy be created for government based on a continuous and
intense interaction between intelligence and policy (the scenario that Treverton
predicts)? It may lead to closer parliamentary and public scrutiny, but one should
recognize that this is not necessarily a guarantee against politicizing intelligence.
On the contrary, one could say.
Bibliography
Agrell, W. (2009) ‘Intelligence Analysis after the Cold War – New Paradigm or Old
Anomalies?’, in G.F. Treverton and W. Agrell (eds), National Intelligence Systems:
Current Research and Future Prospects, Cambridge: Cambridge University Press.
Aid, M. (2012) Intel Wars: The Secret History of the Fight Against Terror, New York:
Bloomsbury Press.
American Bar Association Standing Committee on Law and National Security, Office of
the National Counterintelligence Executive, and National Strategy Forum (2011) No
More Secrets: National Security Strategies for a Transparent World. Online. Avail-
able: www.virginia.edu/cnsl/pdf/no-more-secrets.pdf (accessed 3 March 2013).
Andrus, D.C. (2005) ‘The Wiki and the Blog: Toward a Complex Adaptive Intelligence
Community’, Studies in Intelligence, 49. Online. Available: www.cia.gov/library/
center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol. 49no3/html_
files/Wik_and_%20Blog_7.htm (accessed 3 March 2013).
Bamford, J. (2004) A Pretext for War: 9/11, Iraq, and the Abuse of America’s Intelli-
gence Agencies, New York: Anchor.
Bar-Joseph, U. and McDermott, R. (2008) ‘Change the Analyst and Not the System: A
Different Approach to Intelligence Reform’, Foreign Policy Analysis, 4: 127–145.
Barger, Deborah G. (2005) Toward a Revolution in Intelligence Affairs, Santa Monica,
CA: RAND Corporation. Online. Available: www.rand.org/content/dam/rand/pubs/
technical_reports/2005/RAND_TR242.pdf (accessed February 28, 2013).
Bean, H. (2011) No More Secrets: Open Source Information and the Reshaping of U.S.
Intelligence, Santa Barbara, CA: Praeger.
Berkowitz, B. (2003) ‘Failing to Keep Up With the Information Revolution’, Studies in
Intelligence, 47: 67–74.
Berkowitz, B. and Goodman, A. (2000) Best Truth: Intelligence in the Information Age,
New Haven, CT/London: Yale University Press.
Blair, D.C. (2010) Annual Threat Assessment of the US Intelligence Committee for the
Senate Select Committee on Intelligence, Washington, DC: Office of the Director of
National Intelligence. Online. Available: www.au.af.mil/au/awc/awcgate/dni/threat_
assessment_2feb10.pdf (accessed 3 March 2013).
10 B. de Graaff
Bodnar, J.W. (2003) Warning Analysis for the Information Age: Rethinking the Intelli-
gence Process, Washington, DC: Joint Military Intelligence College.
Brand, S. (2000) The Clock of the Long Now: Time and Responsibility, New York: Basic
Books.
Center for the Study of Intelligence (2004) Intelligence for a New Era in American
Foreign Policy, Report of the conference held in Charlottesville, Virginia, 10–11
September 2003, Washington, DC: Central Intelligence Agency. Online. Available:
www.fas.org/irp/cia/product/newera.pdf (accessed 3 March 2013).
Chapman, R.D. (2010) ‘Intelligence Reinvented’, International Journal of Intelligence
and Counterintelligence, 23: 384–393.
Chesterman, S. (2011) One Nation under Surveillance: A New Social Contract to Defend
Freedom Without Sacrificing Liberty, Oxford: Oxford University Press.
Downloaded by [University of Florida] at 05:04 15 February 2017
Codevilla, A. (1992) Informing Statecraft: Intelligence for a New Century, New York:
Free Press.
Colby, E.A. (2007) ‘Making Intelligence Smart’, Policy Review, 144. Online. Available:
www.hoover.org/publications/policy-review/article/5843 (accessed 3 March 2013).
Cole, R.T. and Chiego, C. (2009) ‘A Season of (Info)Sharing: An Empirical Assessment
of Intelligence Reform’, University of Georgia. Online. Available: http://juro.uga.
edu/2009/papers/rocky_cole_chris_chiego.pdf (accessed 13 November 2012).
Davis, J. (1994) ‘A Policymaker’s Perspective on Intelligence Analysis’, Studies in Intel-
ligence, 38: 7–15.
–––– (2005) ‘Terrorism and Intelligence Reform’, in D. Aaron (ed.), Three Years After: Next
Steps in the War on Terror, Santa Monica, CA: RAND Corporation. Online. Available:
www.rand.org/content/dam/rand/pubs/conf_proceedings/2005/RAND_CF212.pdf
(accessed 3 March 2013).
–––– (2009) ‘Strategic Warning: Intelligence Support in a World of Uncertainty and Sur-
prise’, in L.K. Johnson (ed.), Handbook of Intelligence Studies, London/New York:
Routledge.
De Graaff, B.G.J. (1997) ‘Kalm temidden van woedende golven’. Het ministerie van Kol-
oniën en zijn taakomgeving 1912–1940, The Hague: Sdu.
–––– (2012a) Intelligence revolution. Dramatische verandering, ontsporing of gril?,
Breda: Nederlandse Defensie Akademie.
–––– (2012b) De ontbrekende dimensie: intelligence binnen de studie van internationale
betrekkingen, Utrecht: Universiteit van Utrecht.
De Graaff, B.G.J. and Wiebes, W. (1992) Gladio der vrije jongens. Een particuliere
geheime dienst in Koude Oorlogstijd, The Hague: Sdu.
De Haan, J. and Rotmans, J. (2011) ‘Patterns in Transitions: Understanding Complex
Chains of Change’, Technological Forecasting and Social Change, 78: 90–102.
De Koning, B. (2008) Alles onder controle. De overheid houdt u in de gaten, Amsterdam:
Balans.
Faddis, C.S. (2008) Beyond Repair: The Decline and Fall of the CIA, Guildford, CT:
Lyons Press.
Fishbein, W. and Treverton, G.F. (2004) ‘Making Sense of Transnational Threats’,
Sherman Kent Center Occasional Papers, 3. Online. Available: www.cia.gov/library/
kent-center-occasional-papers/vol.3no1.htm (accessed 3 March 2013).
Fitsanakis, J. (2012) ‘Analysis: Biometric Passports, Iris Scanners, Worry Undercover
Spooks’, IntelNews, 13 April. Online. Available: http://intelnews.org/2012/04/
13/01–969/ (accessed 3 March 2013).
FitzSimmonds, J.R. (1995) ‘Intelligence and the Revolution in Military Affairs’, in R.
Introduction 11
Godson, E.R. May and G. Schmitt (eds), U.S. Intelligence at the Crossroads: Agendas
for Reform, Washington, DC/London: Brassey’s.
George, R.Z. (2007) ‘Meeting 21st Century Transnational Challenges: Building a Global
Intelligence Paradigm’, Studies in Intelligence, 51. Online. Available: www.cia.gov/
library/center- for-the- study-of- intelligence/csi- publications/csi- studies/studies/
vol.51no3/building-a-global-intelligence-paradigm.html (accessed 3 March 2013).
Goodman, M.A. (2008) Failure of Intelligence: The Decline and Fall of the CIA,
Lanham, MD: Rowman & Littlefield.
Green, A.W. (2005) It’s Mine! Why the US Intelligence Community Does Not Share
Information, research report, Maxwell Air Force Base, Alabama. Online. Available:
www.au.af.mil/au/awcgate/saas/green.pdf (accessed 2 March 2013).
Hedley, J.H. (2009) ‘Analysis for Strategic Intelligence’, in L.K. Johnson (ed.), Hand-
Downloaded by [University of Florida] at 05:04 15 February 2017
The international security environment for Western nations today has changed
from that of the late twentieth century. Threats are perceived as emanating from
so-called non-state actors, terrorists, proliferators, organized criminals and cyber
hackers, as much as from potential state aggression. Globalization of communica-
tions has sensitized social attitudes to issues such as famine and disease, inter-
national human rights, migration and immigration. Technology has continued to
transform our lives and has raised new concerns over personal privacy in a digital
age. Such profound changes are having their impact on our intelligence agencies
as much as on any other sector of society, and they are likely to continue shaping
the future of intelligence communities over the next twenty years (Omand 2010).
A first question intelligence studies should ask therefore is whether we will
still mean the same thing in twenty years’ time when we speak of ‘intelligence’
or ‘secret intelligence’ as we mean today when we use those terms, just as the
situation twenty years ago was very different, with the Cold War just over and
the explosion in open sources of information through the internet still to come.
Those now in charge of our intelligence communities had their formative experi-
ences in a very different world of information scarcity rather than overload.1
There is, however, a simple truth at the heart of intelligence work. The most
basic purpose of intelligence today remains the same as it was in the sixteenth
century when Sir Francis Walsingham set up Europe’s first effective espionage
network: to help improve the quality of decision-making by reducing ignorance.
In his case it was to uncover and exploit the machinations of the Catholic mon-
archies against his Protestant sovereign Queen Elizabeth I. That purposeful defi-
nition applies to all forms of intelligence today. A further important distinction
may then be made: secret intelligence is simply achieving that purpose in respect
of information that other people do not want you to have, from which flow all of
the characteristic moral hazards associated with the world of intelligence so
beloved of fiction and film.
By what alchemy is raw information to be transmuted into intelligence? There
are a number of unique features about this process that deserve to be highlighted
by intelligence studies in examining future challenges.
First, the basic purpose of intelligence is, as stated, to help improve the
quality of decisions, not to guarantee that result. Intelligence very rarely deals in
Threats, challenges and opportunities 15
certainties, and it will continue to be incomplete, fragmentary and sometimes
wrong. But the argument in favour of intelligence work is that used systemati-
cally and sensibly it will improve the odds on a decision being the best possible
in the circumstances, whether by a National Security Council, foreign policy
official, border policeman or military commander. The overall outcome will
therefore likely be better than if the decisions had been made using hunch or
instinct, valuable as these are, or just by the toss of a coin. This is similar to
investment analysts, who on any one day may see their portfolio fall below the
market due to some unwise purchases, but over time the good analysts will
generate returns for their funds better than a single market index. Like invest-
ment fund managers, intelligence analysts are well advised to be very chary of
Downloaded by [University of Florida] at 05:04 15 February 2017
intelligence world and its plurality of trusted customers now needs to be fast,
digital, reliable and ultra secure, and increasingly have the bandwidth to transmit
not just text but also voice and high-resolution moving images.
Sixth, the customers for intelligence have to understand and accept the signif-
icance of what they are being told. A welcome cannot be guaranteed for the
bearer of bad tidings, especially when the intelligence tends to show that some
external situation has arisen affecting national interests that will necessarily
divert the government from being able to devote as much attention to its most
cherished domestic policies, or that a policy or military operation was miscon-
ceived and is failing in its purpose (as in Bosnia in 1992–1993). In such circum-
stances, a natural reaction is to ask for further work to be undertaken to clarify
the reporting, or to commission a second opinion. The well-understood phenom-
enon of cognitive dissonance may be observed when what is being reported is
clearly wholly inconsistent with the model of reality being followed by the
leader or leadership team (witness the fall of Singapore in 1942).
Finally, customers have to make the right judgements on what actually should
be done on the basis of the intelligence – and have the means to do something
about it. Secret knowledge is not always comfortable, especially when the source
is highly sensitive and has to be protected, so that the intelligence cannot there-
fore be used as the public justification for anticipatory action. For military com-
manders today, intelligence can be provided in a way that gives unparalleled
real-time situational awareness using fusion and virtual reality visualization tools
that would have been unimaginable to the field commanders under Generals
Montgomery or Patton. That said, the caveat about needing the means to do
something with the intelligence will remain a constant of warfare. As the military
historian John Keegan has so clearly described in his writings on intelligence, in
the end, the clash of arms is determined by factors that Clausewitz would have
understood (Keegan 2003). The battle for Crete in 1941 is perhaps the classic
and tragic example that even the best intelligence (in that case from Enigma
decrypts of German air force communications) cannot always win battles if there
is insufficient force under the hand of the commander.
At each link in the above chain, well-known cognitive weaknesses may
appear to delay or distort connections that need to be made: intelligence studies
literature is full of discussion of group think, mirror imaging, transferred
Threats, challenges and opportunities 19
judgements, confirmation bias and similar hiatuses (Heuer 1999). These weak-
nesses can apply to both analysts and their customers alike.
enable the intelligence community to work closely with the commercial opera-
tors of that infrastructure.
A second feature of the planning of modern national security is a logical con-
sequence of this citizen focus. The driving logic behind it has become that of
risk management. This is especially so now that national security has the wider
responsibility of maintaining public confidence that risks are being satisfactorily
managed (thus maintaining a collective psychological state) as well as creating
the objective reality of freedom from attack and foreign invasion. Of course, the
search for risk avoidance through collective defence and deterrence remains as
an insurance policy against the (re-)emergence of more traditional state threats.
People need to feel sufficiently safe domestically to justify investment, to be pre-
pared to travel, indeed to leave the house in the morning to get on with ordinary
life and to live it to the full even in the face of threats such as terrorism and
hazards such as pandemics. Our adversaries – and the international markets –
must know we have the confidence to defend ourselves against all possible
vectors of attack. A feeling of insecurity is highly corrosive for a healthy society.
In this sense it is justifiable to define modern national security as a state of confi-
dence on the part of the public that the major risks are indeed being managed, in
ways consistent with our values, to a level where normal life can continue. A
glance at those nations not fortunate enough to enjoy this sense of collective
confidence in security will reveal just how damaging a situation they are in,
where even international efforts to provide much-needed humanitarian assistance
is frustrated by lack of security on the ground.
The third step in the argument follows on from this: national security depends
more than ever on effective pre-emptive intelligence to allow the identification,
anticipation and management of risk upstream. This throws increased weight on
better-informed decision-making by government and thus on the work of the
intelligence community.
That said, there is always a residual uncertainty that cannot be insured against
or otherwise managed away. Efforts to eliminate all uncertainty can do more
harm than good, since the law of unintended consequences often applies. In par-
ticular, governments can, in their pursuit of intelligence and security, run the risk
of compromising freedom of movement and of speech, the rule of law, and civic
harmony. Indeed, an important ingredient in public security in a democracy is
Threats, challenges and opportunities 21
confidence in the government’s ability to manage risk in ways that respect
human rights and the values of society.
Governments ideally need to be prepared to act as dangers begin to become
clear, but preferably before the dangers become present. They must therefore
convince their public that they are justified in investing in security measures in
anticipation, and in order to act upstream of impending danger. The public will
expect to be given a proper justification for sacrifices, whether in terms of lives
brought into hazard and resources spent on security, or the occasional inconven-
ience of security measures or invasion of privacy. That is why British govern-
ments now regularly publish a national risk matrix along with the national
security strategy, setting out the principal threats and hazards facing society that
Downloaded by [University of Florida] at 05:04 15 February 2017
are being addressed by government security policy. The matrix shows the two
principal dimensions of risk: likelihood of occurrence and impact should it
happen, with a third dimension, national vulnerability to the risk, folded out of
sight largely for security reasons.
As NATO has recognized in its new strategic concept (North Atlantic Council
2010), increasingly in modern society it will be too late to wait until the adver-
sary is at the gate or even right inside the city – as was seen on the streets of
Mumbai in November 2008 – before taking action to prevent, protect and
prepare. Some potential risks, such as rogue states armed with nuclear weapons
or terrorists armed with a dirty bomb, would be so potentially destructive of con-
fidence in urban life (or indeed in civilization itself ) that they demand pre-
emptive action. In different ways, the consequences of other risks, such as those
likely to flow from resource stress due to global climate change, equally require
that governments anticipate the potential impact on our security and act now to
avoid or mitigate future consequences.
If there is to be acceptance of that fundamental proposition, then clearly
greater media and public understanding is needed of what is really involved
behind the scenes in ‘securing the state’, distinguishing it from what is simply
popular cinematic or television fantasy. There is a valuable role for intelligence
studies in demystification.
Modelling intelligence
With good intelligence there is some hope that major risks can be anticipated,
within the limits of the knowable, allowing government to decide in sufficient
time whether to act to try to reduce the risk, to act to reduce society’s vulner-
ability to it, or in some cases sensibly to decide to leave well alone. This task of
helping to improve decision-making through reducing ignorance is of course the
very purpose of intelligence.
Anticipation also places a great responsibility on the intelligence of those who
are to provide strategic notice of emerging risks. It places even more weight on
the wisdom of those who have to decide whether and how to act upon such
warning. Machiavelli offered an infallible rule: ‘A Prince who is himself not
wise cannot be well advised’ (Machiavelli 1991: 127).
22 D. Omand
A valuable service that intelligence studies can provide is to help model the
intelligence process in ways that reflect the reality of how twenty-first-century
intelligence may be expected to function in support of such a modern definition of
national security (Omand 2010). The traditional intelligence cycle (Herman 1996)
stands in need of reinterpretation in an age where the users of intelligence often
interact with those involved in collection in ways more reminiscent of the detective
investigating a crime than a Cold War analyst piecing together the adversary’s
order of battle. In addition, rather than the collection of intelligence from traditional
secret sources, it is the real-time access to digitized data that may hold the key.
A traditional way of modelling intelligence knowledge, drawn from its
application to military affairs, is to make a distinction between estimates of cap-
Downloaded by [University of Florida] at 05:04 15 February 2017
which provide a catalogue of all the disasters that may occur are only a building
block for a sensible risk management process. What is required at this level of
thinking about security is a deep understanding of the phenomena in question,
and their roots, causes and possible future development, expressed in ways that
will help the policy staffs to develop options for government. One of the most
important benefits of good strategic notice is in enhancing the ability of govern-
ment to commission full intelligence assessments or longer term scientific and
other research to illuminate the phenomena. This should be done systematically
as a cross-government exercise. Open sources come into their own here, includ-
ing academic intelligence studies.
To provide ‘strategic notice’ is not necessarily to predict that future (or in
particular its timing) but to provide the advance notice that allows intelligence,
diplomatic and scientific effort to be cued to look for signs that those potentiali-
ties are becoming realities. Without strategic notice (for example, of terrorist
interest in new unconventional attack methods), it is less likely that the intelli-
gence system will be geared to bring together data drawn from different agen-
cies, or stovepipes within agencies, for the analyst to assess as a whole.
Without the quartet of situational awareness, explanation, prediction and stra-
tegic notice, intelligence analysts are less likely to generate in their minds the
right set of possible hypotheses, and therefore very much less likely that they
will share the data and join up the correct dots that are appearing into a genuine
new pattern of threat.
Looked at in this light, current and future organizational reforms in response
to the standard criticisms of intelligence performance may not bring as much
improvement as reformers hope, since there is an irreducible level of uncertainty
about intelligence work (Jervis 2006). Post-mortem inquiries such as those into
9/11, 7/7 and Iraqi Weapons of Mass Destruction will usually reveal mistakes
and poor processes that can be improved, but it does not follow that these were
responsible for the warning and intelligence failures.
One of the implications of such thinking is that the intelligence community
needs to build data management systems so that hypotheses may be run across
different domains and patterns of interest identified for further, more traditional
investigation. Simply complaining that the different intelligence, police and
security authorities ‘failed to join up the dots’ misses the point. We need analysts
Threats, challenges and opportunities 25
to be actively researching a hypothesis and testing explanations against the evid-
ence, successively improving their models, not passively waiting for a pattern to
emerge. We need hunters, not gatherers.
Historians now write about the twentieth century as ‘the century of intelli-
gence’ in which states developed formal institutions called secret services and
used them to spy ruthlessly on each other. By the end of the century most states
had ended up avowing their existence publicly, establishing widespread overseas
liaisons with each other, and attempting to regulate and oversee their activities
by judges and parliamentarians. This chapter has described two of the forces that
caused this reshaping of the intelligence community. The first was the shift from
the Cold War secret state to the modern protecting state with its different
Downloaded by [University of Florida] at 05:04 15 February 2017
demands for intelligence. The second was the way in which societal attitudes
themselves have developed what has been called the end of deference towards
authority, a reduced tolerance of risk (and a propensity to look for someone to
blame, or sue, when things go wrong), and above all the rise of 24/7 mass media
and social networking. These changes are not reversible, but further develop-
ments are to be expected over the coming years, especially stemming from the
third shaping force that is science and technology.
It may well be that there will not be comparable scientific and technological
revolutions around the corner that will have as transformative an effect on intel-
ligence work as the scientific revolutions of the twentieth century that brought
radio, radar, solid state electronics, satellites, computers and the internet,
although new generation search engines and the semantic web will allow greater
exploitation of open sources. Probably the biggest revolution going on now is in
the bio-sciences, so we may expect new man–machine interfaces, the ability to
access virtual reality representations of operating environments, and other ways
of fusing information to transform the work of the intelligence officer.
What is certain is that all the effective intelligence agencies of the future will
be knowledge management organizations par excellence. Such organizations
tend to have flat hierarchies to encourage innovation and creativity, to have the
minimum of regulations, to have the agility to adapt and put together teams at
very short notice, and to use all the experience and talent from within and
outside the organization: in short, the opposite of a late twentieth-century peace-
time government department. I have high confidence that the United Kingdom’s
intelligence agencies have the message and the capacity to reinvent themselves
to meet new circumstances, and I hope that will be true for all our allies and
partners. I also believe that the public is beginning to understand better the
essential role intelligence plays, for all its inherent limitations, in keeping us in
relative security in a troubled world.
Notes
1 James R. Clapper, ‘How 9/11 Transformed the US Intelligence Community’, Wall
Street Journal, 7 September 2011.
2 The CPNI website may be accessed at www.cpni.gov.uk/about/cni/.
26 D. Omand
Bibliography
Deutsch, David (2011) The Beginning of Infinity, London: Allen Lane.
Hennessy, Peter (2002) The Secret State, London: Allen Lane.
Herman, Michael (1996) Intelligence Power in Peace and War, Cambridge: Cambridge
University Press.
Heuer, Richard J. (1999) The Psychology of Intelligence Analysis, Washington, DC: CIA
Center for the Study of Intelligence.
HM Government (2010) A Strong Britain in an Age of Austerity: The National Security
Strategy, London: Cabinet Office.
Jervis, Robert (2006) ‘Reports, Politics and Intelligence Failures: The Case of Iraq’,
Journal of Strategic Studies, 29: 3–52.
Downloaded by [University of Florida] at 05:04 15 February 2017
and weak defences. This interaction between ‘us’ and ‘them’ has very awkward
implications for US intelligence, especially those agencies with foreign missions
such as the CIA that have traditionally been prevented from doing domestic
intelligence.
The last major difference between transnational targets (especially terrorists)
and state targets like the Soviet Union may be the most important of all. In prin-
ciple, the fight against terror is an intelligence fight. In the Cold War, strategy
did not depend much on intelligence. Now it does. If the goal is prevention, not
deterrence, then there is enormous pressure on intelligence to reach into poten-
tial adversaries, their organization, proclivities and capabilities. How can intelli-
gence achieve that? Table 3.1 lays out the difference, in slight caricature,
between Cold War state threats and post-Cold War transnational threats.
find themselves in the position of trying to frame and convey essentially sub-
jective judgements based on their expertise.
‘Complexities are mysteries-plus’ (Snowden 2002).1 Large numbers of relat-
ively small actors respond to a shifting set of situational factors. Thus, they do
not necessarily repeat behaviour in any established pattern and are not amenable
30 G.F. Treverton
to predictive analysis in the same way as mysteries. These characteristics
describe many transnational targets – small groups forming and reforming,
seeking to find vulnerabilities, thus adapting constantly and interacting in ways
that may be new. Indeed, a definition of wicked problems suggests the chal-
lenges for intelligence, and in particular the ‘connectedness’ of the threat with
our own actions and vulnerabilities:
Conveying uncertainty
The terrorism warning example drives home the point that uncertainty cannot be
eliminated, only assessed and then perhaps managed. This is more and more
obvious when the analytic task moves away from warning (especially very tacti-
cal warning) towards dealing with more strategic and forward-looking mysteries
for which the analysis begins where the information ends and uncertainty is ines-
capable. In framing this task, it is useful to compare Carl von Clausewitz with
his lesser-known contemporary strategist, Antoine-Henri, Baron de Jomini
(Friedman and Zeckhauser 2012). Jomini, a true child of the Enlightenment, saw
strategy as a series of problems with definite solutions. He believed that math-
ematical logic could derive ‘fundamental principles’ of strategy, which if fol-
lowed should mean for the sovereign that ‘nothing very unexpected can befall
him and cause his ruin’ (Jomini 2007: 250). By contrast, Clausewitz believed
that unpredictable events were inevitable in war, and that combat involved some
irreducible uncertainty (or ‘friction’). He characterized war as involving ‘an
interplay of possibilities, probabilities, good luck and bad’, and argued that ‘in
the whole range of human activities, war most closely resembles a game of
cards’ (von Clausewitz 1976: 85–86).3
Intelligence, perhaps especially in the United States, talks in Clausewitzian
terms, arguing that uncertainty, hence risk, can only be managed, not eliminated.
Changing threats, evolving methods 33
Yet Jomini casts a long shadow over both war and intelligence. In fact, intelli-
gence is still non-Clausewitzian in implying that uncertainty can be reduced,
perhaps even eliminated. That theme runs back to Roberta Wohlstetter’s classic
book about Pearl Harbor, which paints a picture of ‘systemic malfunctions’
(Wohlstetter 1962). There were plenty of indications of an impending attack, but
a combination of secrecy procedures and divided organizations prevented them
from being put together into a clear warning. If, though, the dots had been con-
nected, to use a recently much-overused phrase, the attack could have been pre-
dicted. So, too, the US report on 9/11 imposes a kind of Wohlstetter template,
searching for signals that were present but not put together (National Commis-
sion on Terrorist Attacks 2004). The perception of linearity is captured by the
Downloaded by [University of Florida] at 05:04 15 February 2017
formulation ‘the system is blinking red’. Table 3.3 summarizes the differences
between the Jominian and Clausewitzian approaches.
The Jominian approach pervades how analysis is conducted and taught. Most
assessments, like US National Intelligence Estimates (NIEs), provide a ‘best’
estimate or ‘key judgements’. They may then set out alternatives or excursions,
but the process tends to privilege probability over consequences, when in fact it
is the combination of the two that matters to policy. This emphasis on ‘best bets’
also runs through familiar analytic techniques such as the analysis of competing
hypotheses (ACH). This points to the question ‘competition for what?’ The usual
answer is likelihood. Indeed, the original description of ACH, in the now-classic
book by Richard Heuer, explains its goal as being to determine ‘Which of
several possible explanations is the correct one? Which of several possible out-
comes is the most likely one?’ (Heuer 1999: 95).
A true Clausewitzian approach would rest, instead, on three principles. First,
confidence and probability are different; thus there is no reason not to be explicit
about probabilities, even with low confidence. Second, content of information
matters as much as reliability; so, again, important information should not be
excluded simply because it is deemed unreliable. Third, and perhaps most impor-
tantly, consequence matters in evaluating information and in constructing altern-
atives; thus consequential possibilities should not be relegated to the sidelines
simply because they are judged unlikely.
Jominian Clausewitzian
discussion than the others. The NIE thus neglected neither probability nor con-
sequence. It conveyed no sense that one scenario should be thought of as ‘best’
or ‘correct’; nor did it require readers to parse the meaning of concepts like
‘significant’, ‘serious’ or ‘important’ (even if those were elaborated on in a glos-
sary, as is now the practice for NIEs). In the end, it allowed readers to decide for
themselves which possibilities deserved pride of place.
Yet the question of whether busy senior policy-makers would sit still for a
Clausewitzian approach is a fair one. The easy answer would be to try it as an
experiment for a handful of estimates on issues that are both important and very
uncertain. A hint of an answer was provided by Stephen Hadley, President George
W. Bush’s national security adviser. A November 2007 NIE on Iran’s nuclear
intentions and capabilities provoked a firestorm of controversy when its ‘key judge-
ments’ were declassified and released. The first clause seemed to undercut not only
any argument for military action against Iran but also the international campaign
for sanctions against the country that the Bush administration had targeted. The
President called the opening ‘eye-popping’, all the more so because it came ‘despite
the fact that Iran was testing missiles that could be used as a delivery system and
had announced its resumption of uranium enrichment’ (Bush 2010: 418).
Based on that experience, Hadley made the intriguing (and Clausewitzian in
spirit) suggestion that for the several most important, and uncertain, issues a
president faces, intelligence might present its assessment in ways different from
the ‘we judge with medium confidence’ format. Imagine, for example, a pie
chart representing all the United States would like to know about an issue. Dif-
ferent slices might be different sizes based on judgements about how important
they are. In this case, the ‘is Iran weaponizing?’ slice would have been signi-
ficant but smaller than the ‘is it enriching?’ piece, since the latter paces the coun-
try’s nuclear programme. The slices may show clearly how much US intelligence
knew about that piece. The weaponization slice would have indicated good
information on that score.
kin, that are causing this revolution. Twitter grew by 1,500 per cent in the three
years before 2010, and it now has, by its own statistics, about 175 million users.
Facebook reached 500 million users in mid-2010, a scant six years after being
created in a Harvard dorm room. The iPhone and other ‘smart’ handsets let users
gain access to the internet and download mobile applications, including games,
social networking programs and productivity tools. These same devices also
allow users to upload information to network-based services for the purpose of
communication and sharing.
The dominance of images, not words is plain with Facebook but is increas-
ingly the case for Twitter as well. Making use of a traditional computer required
literacy, but the same is not true of a smartphone. Apparently, these kinds of
images can be powerful in shaping public opinion, and perhaps policy outcomes,
both domestically and internationally, even if most of the posited effects are still
anecdotal. Consider the effects of the pictures from Abu Graibh, or the YouTube
video of a US helicopter strike apparently killing civilians in Baghdad in 2007.4
Compare those with the leak through WikiLeaks of 92,000 US military docu-
ments pertaining to Afghanistan.5 If the latter seemed to have less impact, that
was probably largely because the main story lines – collateral damage and Paki-
stani complicity with the Taliban – were familiar (the former in part because of
previous images). But the documents were just that: words; thus a quintessential
newspaper story and not images that might go viral on the web.
Characterizing the future world in which social media are the leading wave
demonstrates how dramatic the change will be for intelligence. That future world
will be one of ubiquitous sensing and transparency. For the former, think of
those closed-circuit TVs (CCTVs), which number 1.85 million in Britain, or one
for every thirty-two inhabitants. Transparency will be driven by those ubiquitous
sensors and their location awareness, by the increasing computational power of
devices, and by increases in communication and connectivity. ‘Converged
sources’ has been a buzzword for nearly a generation but only became a reality
in recent years with the smartest of smartphones, not to mention the iPad and its
kin. These personal mobile devices indicate who their users are; where and when
they are, have been and will be located; what they are doing, have been doing
and will be doing; with whom or what they are interacting; and the characteris-
tics of their surrounding environment.
36 G.F. Treverton
At the same time, threat signatures and footprints will continue to shrink –
notice the challenge of attributing cyber attacks. Background noise will continue
to rise. Given current technology, for instance, because of the huge volume and
low reliability, Twitter is useful for intelligence analysis only in two circum-
stances: when information about what is happening is in short supply so that
Twitter can supplement it (as was the case during the Mumbai attack of 2008);
and when there is no other source of ‘public opinion’ (as in the aftermath of the
2009 Iranian presidential elections). Finally, these technological capabilities will
continue to proliferate as cutting-edge research and technology go global. If it is
not always that the bad guys can do everything the good guys can; the gap
between the two cannot safely be counted on to be very large.
Downloaded by [University of Florida] at 05:04 15 February 2017
Perhaps because of their newness, it is not clear how important social net-
working media will be in organizing, for instance, anti-government groups. In
Iran and other countries, they have been the latest IT innovation in organizing in
a line that runs from Ayatollah Khomeini’s audio cassette speeches smuggled
in in the 1970s, through to the fax machines that played a role in Eastern
Europe’s transitions in the 1980s. In crisis periods, such as that following the
Iranian elections, social media had the attractions of speed and relative anonym-
ity from government retaliation, but they also carried the challenge of validating
who was real and who was not (and who was a government agent).
On the operational side, ignoring social media can be done only at the peril of
endangering the cover, and perhaps the lives, of intelligence officials. If twenty-
somethings are not on Facebook or Twitter, they only become ‘conspicuous by
their absence’. They may as well advertise ‘I work for intelligence’. Tomorrow,
if not already today, if officials are undercover, they have to live that cover in
virtual worlds as well as physical ones. They have to be prepared to move
quickly from one medium to another. Indeed, ‘official’ cover as it has been prac-
tised by the United States and many other nations is already an artefact of the
past, though intelligence organizations have not yet quite realized it. All the ele-
ments of transparency – from biometrics through geolocation – mean than any
cover will be fleeting, with the possible exceptions of intelligence operatives
who really live their cover, being and not just pretending to be businesspeople or
some other professional, and never coming close to any government establish-
ment. The technologies don’t just apply to the future either. They also capture
the past, for instance, as names, passport numbers, and perhaps biometrics like
fingerprints that were collected at borders are digitized and thus made searchable
in the present and future.
On the analytic side, if the challenges of a huge volume and low reliability
are already plain, so are some of the possibilities. Social media have the poten-
tial to become a repository for collected information, in the process enabling
amateur intelligence analysis. Already, the founder of Greylogic, a noted expert
on cyber warfare and a consultant to the US intelligence community, has
launched a trial balloon on Twitter – called Grey Balloons – seeking volunteers
who might spend a few hours per week, unpaid, to help intelligence agencies do
their jobs, especially in connecting the dots.6 Intelligence has long fretted about
Changing threats, evolving methods 37
competition from professionals like CNN, but now may find itself competing
with amateurs for the attention of its customers. It may be asked to vet and vali-
date amateur intelligence efforts, and it may be required to allocate its resources
to fill in the gaps not covered by amateur efforts.
Social media are important in and of themselves, but they are also at the
cutting edge of broader changes that are enveloping intelligence. Social media
are active, not passive. They completely blur the distinctions that have been used
to organize intelligence – among collector, analyst and operator, or between pro-
ducer and consumer. They completely upset existing notions about what intelli-
gence’s ‘products’ are. Coupled with smartphones, they will turn any human
being into a geolocated collector and real-time analyst. They offer enormous
Downloaded by [University of Florida] at 05:04 15 February 2017
promise, but also carry large risks and obstacles. Small wonder, then, that a
study of social media for the US National Geospatial Intelligence Agency
(NGA) found:
Notes
1 The term is from Snowden (2002). His ‘known problems’ are like puzzles and his
‘knowable problems’ are akin to mysteries.
2 The provenance of Bayes theorem is complicated, but an English preacher, Thomas
Bayes, is generally credited with publishing it in 1763. It has come to describe both an
inclination and a process to update subjective probabilities in light of new evidence.
3 For a nice comparison of Clausewitz and Jomini, see Calhoun (2011).
4 The video is available at www.youtube.com/watch?v=5rXPrfnU3G0 (accessed 4
February 2013).
5 For excerpts and analysis, see the New York Times, 26 July 2010.
6 See Jeffrey Carr’s Twitter site at http://twitter.com/greyballoons (accessed 4 February
2013).
38 G.F. Treverton
Bibliography
Bush, George W. (2010) Decision Points, New York: Crown Publishers.
Calhoun, Mark T. (2011) ‘Clausewitz and Jomini: Contrasting Intellectual Frameworks in
Military Theory’, Army History, 80: 22–37.
Clausewitz, Carl von (1976) On War, trans. Michael Howard and Peter Paret, Princeton,
NJ: Princeton University Press.
Flores, Robert A. and Markowitz, Joe (2009) Social Software – Alternative Publication
@ NGA, Harper’s Ferry, VA: Pherson Associates.
Friedman, Jeffrey A. and Zeckhauser, Richard (2012) ‘Assessing Uncertainty in Intelli-
gence’, Intelligence and National Security, 27: 824–847.
Heuer, Richard (1999) The Psychology of Intelligence Analysis, Washington, DC: Center
Downloaded by [University of Florida] at 05:04 15 February 2017
For many years now, both the US intelligence community and its many critics –
both well intentioned and not – have struggled to find ways to improve intelli-
gence analysis. I have constantly tried to remind people that intelligence analysis
is, at its core, an intellectual activity. What I have meant by this is the fact that
most of the important things that go on in intelligence analysis happen in the
minds of the analysts. No amount of tinkering with organizational charts, or
inventing new analytical tools or succumbing to the latest ‘buzzword’ of the
month – picture a crowd of wise black swans blinking at the tipping point – will
change this. Yet having made this plea about the intellectual basis of intelligence
analysis and still believing in it, we must also face the very strong possibility
that the US intelligence community is also somewhat anti-intellectual.
training and education remains sporadic and haphazard. This being the case, pro-
fessional education and training is therefore very uneven from agency to agency.
The main emphasis has always been on-the-job training, which is a good thing
but is hardly sufficient. The US Army remains the ideal here, with education and
training an ongoing and continuous experience throughout an officer’s career.
How do we account for the difference? Simply put, culture: the Army values
education and training, and the intelligence community does not. The usual
excuse within intelligence agencies as to why they allow few such opportunities
is that they are too busy. Yes, they are. But busier than the Army? Unlikely.
Instead, in intelligence agencies we have what some of us used to call the Ben-
Hur approach to personnel management: chain them to their desks and tell them
to keep time with the guy with the drum.
Moreover, education and training in the intelligence community is not tied to
career development. Indeed, it would be difficult – if not impossible – to tie
education and training to career development in intelligence as we barely have
that concept in hand, beyond entry, middle and high. Finally, to cite the military
again, one of their goals is ‘to train how we fight’. The intelligence community
talks a great deal about integration and collaboration but it really does not train
that way. There is a still nascent (after more than six years) National Intelligence
University designed to train across the intelligence community but, in truth,
training takes place predominantly within individual agencies.
The second reason I would cite is the rather steady decline of the intelligence
community as a learning institution. What does it mean to be a learning institu-
tion? Turning once again to Merriam-Webster, learning is defined as, first,
knowledge or skill acquired by instruction or study, and second, modification of
behavioural tendency by experience. I would argue that the intelligence com-
munity falls short on the first but is better on the second, although not in an
organized manner. The key issue in learning is to capture that which you have
learned. This should be done systematically and continuously. Again, this tends
not to be the case with intelligence agencies. The usual excuse, once more, is
time pressure and the ongoing rush of issues. This is undoubtedly penny-wise
and pound-foolish. US intelligence would be better off, once again, in following
the lead of the Army, which has the Center for Army Lessons Learned (CALL).
CALL’s mission is to collect, analyse, disseminate and archive a variety of
44 M.M. Lowenthal
operational data rapidly, ‘in order to facilitate rapid adaptation . . . and conduct
focused knowledge sharing and transfer that informs the Army and enables oper-
ationally based decision making and innovation’.4 To be fair, there is a rudimen-
tary lessons-learned capability within the office of the DNI, but this office
remains woefully undermanned and has nowhere near the same central role that
CALL has for the Army.
My final argument is that we do not value knowledge because we no longer
systematically develop knowledge. To some extent this again reflects the greater
number of pressing issues (as opposed to the old single dominant issue) and the
tendency to push analysts from one crisis to another. The intelligence com-
munity was not the sole fount of expertise on the Soviet Union but its capabil-
Downloaded by [University of Florida] at 05:04 15 February 2017
ities in this area went quite deep. It is difficult to find similar reservoirs of
knowledge (as opposed to talent) today. Here we must make a cautionary note:
even though knowledge is highly preferable to ignorance, even deep knowledge
will not entirely preclude making analytical mistakes or, on occasion, being
surprised.
Knowledge is like sound: it requires a source, propagation and reception.
Knowledge must not only be created but preserved so that it can be transmitted.
However, if one is engaged in day-to-day tactical episodes, such knowledge-
building becomes much more difficult. There is little time to learn and to absorb
as one moves from one intellectual fire-fight to another. There has been some
progress made in the preservation of knowledge, or at least the amassing of all
disseminated analyses, in the Library of National Intelligence. Whether analysts
use this as a regular resource as they craft new analyses is an open question. The
one area of knowledge that consistently fails to be preserved is the knowledge
held by retirees. It is rare for anyone to think about asking a senior analyst who
is about to retire to sit down with junior analysts and pass along what he has
learned, words of wisdom or career advice. This invaluable resource is allowed
simply to walk away.
One final aspect that leads to anti-intellectualism are the analysts who have
been (and are still) hired since 2001. What follows are some general observa-
tions, not true in each individual case but true often enough to be of concern.
First, they are the first generation to be raised on the internet. They are very good
at finding discrete packets of information but less skilled at the broader vision of
context, flow and especially precedent. If the baby boomers were the ‘Me Gen-
eration’ then this group might be called the ‘Now Generation’. They live almost
entirely in the present and have little reference to the past, even the recent past.
Their research skills beyond the internet are largely non-existent and their ability
to communicate in writing appears to have been severely crippled by the extreme
telegraphy of text messaging and Twitter. Having spent so much time multi-
tasking and jumping from task to task in rapid fashion, they appear to have a
similar view of their careers. They would like to move from issue to issue as
each new issue attracts them, rather than focus on one issue long enough to
develop the expertise that is really needed. I would compare this to viewing their
careers as an endless buffet rather than as a series of eight-course meals in which
Is US intelligence anti-intellectual? 45
each course must be properly digested. Finally, too few of them exhibit any
historical or cultural knowledge: if it did not happen in their lifetime it is, by def-
inition, uninteresting.
Solutions
Rather than allow this to be a dreary jeremiad, here are some steps the intelli-
gence community could take to restore a necessary degree of intellectualism.
First, even though most of us believe that intelligence is a profession, we need
to treat it as a profession both in and out of government. This means having a
serious discussion about what it means to be an intelligence professional in terms
Downloaded by [University of Florida] at 05:04 15 February 2017
of skills, expertise and career expectations. It also means thinking about what a
progression of skills looks like across an analyst’s career. Some of this will be
general and some will have to allow for the fact that as an analyst becomes more
specialized and finds his or her niche, or niches, degrees of specialization will
take place. Having done that, we should develop a curriculum of education and
training that carries across a career and then allow the analyst the necessary
opportunities to take part in this curriculum – not as exceptions but as an essen-
tial part of his or her professional development. Indeed, there should be more
rewards for education and training, and more penalties for those who avoid it.
Second, we should be serious about the need for a coherent and well-
integrated lessons-learned capability, instead of the lip-service one we have now.
Finally, and most importantly, we must create incentives for the building of
knowledge and expertise. The excuse of being too busy not only rings false but
is also a very short-term and self-wounding decision. In part, a decision to invest
more time and energy into building knowledge means making choices about
what is important and what is less important. The more important areas will
receive the greater investment. This has always been a fact of life in intelligence,
along with the recognition that once-unimportant areas can and will suddenly
rise to great importance overnight. Still, it should be possible to make some cal-
culated investments in the areas where true depth of knowledge is most needed,
and to begin incentivizing those areas now by placing sufficient emphasis on
them so as to make them more attractive to analysts. Much is said these days
about the ‘knowledge worker’, a term of which I am not fond. Regrettably, many
of the definitions of the knowledge worker seem little different from how one
would define a computer data specialist. If we in intelligence are serious about
knowledge we should give serious thought to what it is, what it looks like and
what it really takes to create, preserve and transmit knowledge. I would argue
that this requires a shift away from the current emphasis on data and back to
knowledge in its broader sense. This means a deeper understanding and a more
comprehensive approach and commitment to the concept of knowledge within
intelligence agencies and in the various academic programs that focus on train-
ing intelligence analysts.
We spend a great deal of time discussing what we want intelligence to be but
precious little putting those thoughts into action. If we want highly educated,
46 M.M. Lowenthal
well-trained and deeply knowledgeable analysts, we will have to build them our-
selves. They will not simply show up at our doorsteps. It is time, like the
military, to educate and train the way we intend to fight.
Notes
1 ‘The Office of Strategic Services: Research and Analysis Branch’, available online at
www.cia.gov/news-information/featured-story-archive/2010-featured story-archive/oss-
research-and-analysis.html (accessed on 24 January 2012).
2 Eagleburger gave a speech in September 1989, for which he was later accused of being
nostalgic about the Cold War, which he denied (see Friedman 1989).
3 See www.merriam-webster.com/dictionary/intellectual (accessed on 8 February 2013).
Downloaded by [University of Florida] at 05:04 15 February 2017
Bibliography
Friedman, Thomas (1989) ‘U.S. Voicing Fears That Gorbachev Will Divide West’, New
York Times, 16 September.
Hinsley, Sir F.H. and Stripp, Alan (eds) (2001) Codebreakers: The Inside Story of Bletch-
ley Park, Oxford: Oxford University Press.
Lowenthal, Mark M. (2009, 4th edn) Intelligence: From Secrets to Policy, Washington,
DC: CQ Press.
McKay, Sinclair (2011) The Secret Life of Bletchley Park: The WWII Codebreaking
Centre and the Men and Women Who Worked There, London: Aurum.
Nicolson, Harold (1939) Peacemaking 1919, New York: Harcourt, Brace and Company.
Reuters (2010) ‘U.S. Vows Unified Response to N. Korea’, available online at
www.reuters.com/article/2010/11/23/us-korea-north-usa-idUSTRE6AM48720101123
(accessed on 8 February 2013).
5 The future of the intelligence
process
The end of the intelligence cycle?
Arthur S. Hulnick
Downloaded by [University of Florida] at 05:04 15 February 2017
Introduction
As students of intelligence will know, I have long argued that the intelligence
cycle model, taught almost everywhere as an appropriate and accurate depiction
of how intelligence systems function, is, in fact, neither appropriate nor accurate
(Hulnick 2007). The cycle model seems to have its origins in the growth of intel-
ligence systems in the Second World War, and has been taught both in the US
and in other countries ever since.1 This has created some serious problems as
intelligence officers complete their training and start working in the field.
Nothing works in the ways they have been taught to expect. I usually differenti-
ate between military intelligence systems, which seem to be somewhat more
attuned to the intelligence cycle, and civilian governmental systems, which are
not. The intelligence system that comes closest to the cycle model lies in the
private sector, although intelligence literature rarely mentions this.
In the civilian government world, policy-makers rarely give good direction to
intelligence managers, and they certainly do not give specific requirements for
intelligence collection. This means that intelligence managers have to translate
what little direction they receive into more specific requirements, usually based
on gaps in the existing intelligence database. In military systems, requirements
for collection may be driven by specific operations, contingency planning, or
even weapons procurement, and thus may provide more detail for intelligence
units. Military intelligence systems in battlefield conditions may approach the
intelligence cycle model even more closely as commanders deal with tactical
situations that require specific intelligence inputs. In the private sector, because
managers usually hire intelligence professionals to deal with specific issues, the
requirements for intelligence collection are often agreed on a contractual basis.
The intelligence cycle model does not specify how intelligence should be col-
lected, but we know that there are three main categories of collection systems.
Open sources usually make up the bulk of the material to be tapped for intelli-
gence, especially in civilian systems, while technical collection systems, includ-
ing communication or signals intercepts and imagery, are increasingly prevalent
in military intelligence. Both civilian and military intelligence collectors are
users of human intelligence systems, from diplomatic or liaison contacts to
48 A.S. Hulnick
espionage, and civilian intelligence agencies lay heavy emphasis on the value of
human intelligence (Humint) (Hitz 2007).
In the private sector, espionage is supposed to be off limits, but there is
increasing evidence that the use of such techniques are well known to private
intelligence practitioners, perhaps because many of them have learned their trade
in government intelligence agencies (Javers 2010). Private intelligence relies as
well on technical sensors, which have become more readily available in the elec-
tronic age. The use of electronic search engines, while hardly comparable to
signals intercepts, is a boon to private practitioners, and such programs as
Google Earth give the private sector access to overhead imagery that was once
reserved for specialized government agencies. Open source intelligence, of
Downloaded by [University of Florida] at 05:04 15 February 2017
course, makes up the bulk of the material collected in the private sector, just as
in government.
The cycle model suggests that intelligence collection drives the analysis
process, but this is not usually the case in reality. In both civilian and military
intelligence, analysts work from an enormous existing database. They do not
have to wait for new inputs to meet the needs of intelligence consumers. Despite
frequent calls by civilian politicians for more long-range intelligence analysis,
most intelligence analytic output tends to have a short focus. This is caused by
crises that disrupt long-range policy-making, and the increasingly short focus of
government decision-makers as they deal with these crises (George 2011). Polit-
ical leaders rarely have the time to read longer term analysis, and depend on
their staffs to turn detailed products into something that can be absorbed quickly.
Still, intelligence managers push in-depth analysis, especially in regard to
forecasts of the future, called ‘estimates’ in the US. These estimates are con-
sidered by intelligence professionals to be the premier product of intelligence
analysis. Estimates can easily become politicized, especially if the judgements
are revealed to the public. Even before the infamous estimate on Weapons of
Mass Destruction during the George W. Bush administration in the US, estim-
ates on Soviet capabilities and intentions sparked a debate when conservatives
argued that the estimates undervalued Soviet strength. Now that the Cold War is
over and we have learned more about the actual situation in Russia, we know
that the US intelligence community’s judgements were about right.
Intelligence analysts have been pressed to adopt more rigorous methodologies
in their analysis, to avoid overlooking important but hidden items or ideas. The
first push for structured analysis in this direction took place in the 1970s, but
was not imbedded in the analysts’ thinking. It was said at the time that they were
too busy to adopt the more time-consuming use of methodologies that were
pressed on them. Since then many new analysts and managers have apparently
come into intelligence and are eager to try what did not work the first time. In
military circles, longer term analysis is perhaps more readily used than in the
civilian world, since contingency planning and weapons procurement require
more far-reaching threat analyses. Of course, daily briefings and current analyses
remain the main focus of intelligence production in the military, especially in
regard to war fighting. Tactical intelligence during combat is an important part
The end of the intelligence cycle? 49
of military intelligence, and comes closer to the intelligence cycle model than
the civilian sector. In fact, civilian decision-makers rarely rely on intelligence in
making policy. This stands in sharp contrast to the intelligence cycle model,
which suggests that policy is made only after intelligence products are delivered
or, in intelligence jargon, disseminated. Nothing could be further from reality.
This is the part of the intelligence cycle model that has caused the most
trouble. Analysts have all been trained to believe that the cycle actually works
and that policy officials are waiting for the delivery of intelligence products
before deliberating on policy. In reality, policy officials often have an agenda
that has nothing to do with intelligence, and make decisions based on a variety
of inputs. Their staffs often have access to the same intelligence inputs as intelli-
Downloaded by [University of Florida] at 05:04 15 February 2017
gence analysts and are able to advise policy officials well before intelligence
products are delivered.
When the intelligence products are finally delivered, they go most often to the
staffs rather than to the principals. If the products agree with what the staffs have
already concluded, then the intelligence is of little use. If the intelligence dis-
agrees, then the staffs may either suppress the intelligence, or deliver the product
to show how the intelligence stands at odds with what the policy officials
wanted. It is not surprising that civilian policy officials often find intelligence to
be unhelpful, inconvenient, or even insubordinate. A good illustration of this was
the recent testimony of US Director of National Intelligence (DNI) James
Clapper before the Senate. Clapper expressed the view that Colonel Ghaddafi of
Libya would probably outwit the rebel opposition.2 This brought immediate calls
for Clapper’s resignation because he was out of step with the White House on
the issue. Of course, we now know that the DNI was quite wrong.
Interestingly, because the intelligence cycle model works very well in the
private sector, the problems described above are not relevant. Private sector
managers who have contracted for intelligence do want to wait for the deliver-
ables. That is, after all, what they are paying for. This is in contrast to the civil-
ian government sector, where intelligence officers are by tradition supposed to
avoid offering advice about policy and withdrawing when policy discussions
take place. This tradition of intelligence analysts absenting themselves from
civilian policy discussions may be unique to the US. In many countries, the
intelligence analysis units are not in the intelligence agencies at all, but rather in
a separate office close to the chief of government. This is certainly true in both
Canada and the United Kingdom.
This strict separation from policy discussions in the US has even involved the
director of the CIA. Although some directors were close to policy officials and
did not hesitate to give advice, others were criticized for this practice. While
William Casey, both a CIA director and close confidant of President Reagan,
became a member of the president’s cabinet and thus a policy-maker, his succes-
sor, the judge William Webster, made clear that he would withdraw from policy
discussions and would not be a cabinet member (Hulnick 2004).
As stated above, in the military, whether in the US or elsewhere, military
intelligence officers at the command level (the J-2 in US parlance) are part of the
50 A.S. Hulnick
commander’s staff, as are the officers in charge of operations or other functions.
The J-2 takes part in decision-making on an equal footing with the others. This
is an even older tradition and seems to be common worldwide. In the US, some
writers are beginning to question whether or not the practice of staying out of
policy debates in the civilian sector is still relevant in the modern era (Kerbel
and Olcott 2010).
sectors. The main failing is that it leaves out two of the key functions of intelli-
gence: counter-intelligence (CI) and covert action (CA). Therefore I have argued
that a better theoretical model is one that covers all the key functions of intelli-
gence, from collection and analysis to CI and CA. Rather than depict these func-
tions in a cyclical fashion, I suggest that they are rather parallel to each other and
function most often in that fashion (Hulnick 2000). In thinking about the future,
then, it would be best to consider each of the functions separately, since they do
operate more or less independently of each other, while also considering how
they connect.
My theory of intelligence, which I have called the ‘matrix model’, has so far
not received much attention in the US. Instead, many intelligence scholars have
continued to use the intelligence cycle model as if no other model existed. For
example, in his most recent book on intelligence, Loch Johnson uses the cycle
model in its traditional form (Johnson 2011). In his book on Dutch intelligence,
however, Giliam De Valk cites the matrix model as one of three models useful
in studying the intelligence process (De Valk 2005). The matrix model, I
contend, is a much more realistic model of the intelligence process.
We begin with the collection function. All intelligence services whose
mandate is foreign intelligence must have some way of gathering intelligence
outside the country they serve. The US has the most complex system for fulfill-
ing this function, but even in much smaller services the collection function is
critical if it is to determine what activities abroad concern or threaten the nation.
There are three key methods for gathering intelligence abroad: the acquisition of
open sources, the use of technical sensors, and obtaining information from
human sources. Although the functions have not changed much over time, the
methods have, and they will probably continue to change even more in the
future.
For example, open source intelligence, once focused largely on print and
broadcast media, has become increasingly web-based (Steele 2007). The advent
of electronic media provides almost universal access to news and developments
to intelligence services that were once dependent on their respective overseas
missions for exploiting local open sources. The downside of this development is
that the proliferation of electronic media often overwhelms the collectors who
gather this material. Various new methodologies for data mining have to be used
The end of the intelligence cycle? 51
to separate key information from the vast sources available. The rapidity of elec-
tronic collection of open sources gives collectors little time to determine what
may be passed to other parts of the intelligence system, or to policy officials
(Hulnick 2010).
Technical collection systems have also changed over time. During the Cold
War only the most sophisticated and advanced intelligence systems could inter-
cept communications or other electronic signals, mostly using satellites for the
purpose. Now most intelligence systems can engage in cyber espionage –
hacking is the more common term – to penetrate an adversary’s communica-
tions. As increasingly advanced encryption systems are developed to protect
communications, hackers glory in being able to break into those systems to steal
Downloaded by [University of Florida] at 05:04 15 February 2017
data. Of course, governments can do this without much restriction, but this is
technically illegal in private sector intelligence, and can lead to lawsuits when
the hacking is revealed.
The world of imagery collection has undergone an even more radical change.
When the US developed the first digital imagery system for overhead reconnais-
sance in the 1970s, it replaced the rather cumbersome film return systems that
both the US and the then Soviet Union were using for spying from space. While
digital space systems are still in use, many intelligence services have begun to
rely on drone aircraft for imagery. Drone systems are much cheaper than space-
based systems and are more flexible in terms of targeting. What is more, publicly
available overhead imagery from such servers as Google Earth has allowed even
the smallest intelligence services to become adept at imagery analysis. This trend
seems likely to continue.
In addition to open sources and technical sensors, intelligence services have
not given up on seeking human sources to obtain the kinds of intelligence elec-
tronic systems sometimes miss. Espionage has always been considered an essen-
tial part of intelligence collection, and most intelligence services should be able
to carry out such operations, even if only focused on their neighbouring states.
Espionage requires a level of training and experience, however, that may be
missing in current systems. Recruiting and handling spies can be dangerous, and
very often the spies are so-called ‘walk-ins’ or volunteers whose reliability is not
so certain.
While military intelligence services have often sought to recruit and maintain
an espionage network, there does not seem to be a great pay-off for such efforts,
although there are some interesting historical examples of military spies. Rather,
espionage seems best suited to the civilian intelligence sector for agencies such
as the CIA or MI6. In the private sector, espionage is supposed to be off-limits,
but we see increasing evidence that private business uses espionage to gather
proprietary data, using techniques that would be familiar to government intelli-
gence systems. People who are caught undertaking espionage on behalf of their
governments may face severe penalties from other authorities, but in the modern
era trading disgraced spies is more the norm. In the private sector, failed espio-
nage operations usually result in lawsuits and embarrassment for the firm or
individuals involved.
52 A.S. Hulnick
According to the intelligence cycle model, intelligence collection should
trigger intelligence analysis. In reality, the reports that are generated reach policy
officials at about the same time as intelligence analysts receive them in most
systems today. According to my alternative matrix model, the analysis process
works in parallel with the collection process. This reflects what actually happens
in the real world. Intelligence analysis may function quite independently of the
collection process, and analysts are able to evaluate events based on the existing
database. New information that comes from the collection process may trigger or
assist evaluation, but is not completely necessary in most cases.
Policy planners or business managers may begin to act on the so-called ‘raw
reports’ without waiting for the analysis to take place. In the electronic era this
Downloaded by [University of Florida] at 05:04 15 February 2017
practice is almost universal in application, and works at all levels where there is
a staff intelligence officer. This practice may well serve as a model for setting
aside the restrictions in the civilian system.
In the private sector, the issue of policy avoidance does not arise because
executives want and expect advice from their intelligence people, whether they
are part of the organization or from a consultancy unit. In all these cases, in order
to be helpful, intelligence analysts must concern themselves with policy options,
feasible policy solutions and the implementation of policy.
The intelligence cycle model suggests that policy-makers will wait for intelli-
gence to be delivered before making decisions. This is rarely the case. The reli-
ance on the cycle model over many generations has frustrated analysts who have
been taught to expect decision-makers to wait for intelligence before making
policy. Therefore, understanding the true nature of how intelligence is used
would benefit intelligence analysts, and bringing them into the decision process
would not only make intelligence more relevant but also more timely.
The US has not suffered any serious problems with subversion in the modern
era, but many countries that have devote intelligence resources to identifying
subversive groups. Even deeply rooted democracies like the United Kingdom,
Canada and France have had to fight off efforts to disrupt the government. In
countries where democratic government is less firmly fixed, the fight against
subversion often becomes the main issue for domestic security services. In
dictatorships, intelligence services may find that protecting the regime in power
by far outweighs any other demands. Penetrating subversive groups and placing
key actors under surveillance are effective methods for countering subversion.
More and more, subversive groups are using social media to rally their fol-
lowers. The overthrow of the Egyptian regime is just the latest case where this
played a role.
Whatever the target, it appears that the hybrid model of a domestic security
service, such as the FBI in the US which combines investigation and law
enforcement, is not as popular or effective as the models that separate the two
functions. While there is little pressure in the US to adopt the British MI5 model,
this issue may well arise again if there is another major terrorist attack. Mean-
while it appears clear that, whatever the organizational model, there will have to
be a closer relationship between intelligence and law enforcement in countering
threats from espionage, terrorism and global organized crime. The connection
between intelligence and special operations forces seems much easier to
manage.
Finally, we come to the second function that is ignored in the intelligence
cycle, that of covert action, or secret operations (Johnson 2007). Traditionally,
covert action has been used to help friends and allies, or to carry out security
policy in such a way that the hand of the sponsoring country is hidden. The US
has a long history of using covert action, dating back to the War of Independ-
ence when irregular military units fought against the British. Covert action
reached a high point in the Cold War when the CIA and the KGB applied it to
help allies and disrupt the enemy. Covert action can also be carried out by
military forces, but civilian intelligence services seem best suited to such opera-
tions because they have the secret agents and clandestine resources at hand.
Covert action has not disappeared with the end of the Cold War. It was a
critical element in the battle against the Taliban in Afghanistan, where covert
56 A.S. Hulnick
operatives laid the groundwork for the insertion of regular military forces, and it
has figured in other aspects of US security policy in the fight against terrorism.
Yet covert action has come in for considerable criticism, especially the use of
‘extraordinary renditions’ in kidnapping and transferring terrorist suspects to
partner countries for interrogation, often leading to abuse and errors. In order to
prevent problems the US has established a rather rigorous oversight mechanism
with Congress, so that presidents who order the use of covert action have to con-
vince the intelligence oversight committees that their plans are sound.
Covert action may involve a so-called ‘agent of influence’, someone recruited
not to steal intelligence but rather to aid friends and confuse the enemy. This
may mean the circulation of false information. Increasingly, covert action refers
Downloaded by [University of Florida] at 05:04 15 February 2017
to secret military operations, such as the kind that took out Osama Bin Laden. In
order to carry out covert action, intelligence services have to develop a special
cadre of professionals well trained for such operations. This may be more than
many smaller intelligence services can manage.
Conclusion
What does the future hold for the intelligence functions I have described? Will
they continue to be relevant in a world in which superpower relationships have
shifted, and the problems of developing countries impact the more developed
world? Some things seem clear. Political leaders will expect their intelligence
services to be able to manage their key functions in support of policy, whether in
a democracy or a dictatorship.
With this in mind, it is time for those who teach intelligence to abandon the
inaccurate and misleading intelligence cycle model for something that more
closely resembles real-world experience. This is especially true for the training
of intelligence professionals who are being misled by the model’s inaccuracies.
Much has been written in the past decade about the various functions of intelli-
gence, and more and more colleges and universities have developed courses on
what was once the rather arcane world of intelligence. Perhaps it is time for the
professionals to catch up with the state of intelligence education in our changing
world, and consider the matrix model as a more accurate basis for understanding
how intelligence processes are supposed to work.
Notes
1 Professor Kristan J. Wheaton has been trying to track down the origins of the intelli-
gence cycle. See his blog post on 4 January 2011. Available at: http://sourcesandmeth-
ods.blogspot.nl/2011/01/rfi-who-invented-intelligence-cycle.html (accessed 8 February
2013).
2 David E. Sanger, ‘U.S. Escalates Pressure on Libya Amid Mixed Signals’, New York
Times, 11 March 2011, p. A10.
3 Mark Mazetti, Helene Cooper and Peter Baker, ‘Behind the Hunt for Bin Laden’, New
York Times, 3 May 2011, p. A1.
The end of the intelligence cycle? 57
Bibliography
Betts, Richard K. (2007) Enemies of Intelligence: Knowledge and Power in American
National Security, New York: Columbia University Press.
De Valk, Giliam (2005) Dutch Intelligence: Towards a Qualitative Framework for Ana-
lysis, Rotterdam: Legal Publishers.
George, Roger Z. (2011) ‘Reflections on CIA Analysis: Is It Finished?’, Intelligence and
National Security, 26: 72–81.
Hitz, Frederick P. (2007) ‘The Importance and Future of Espionage’, in Loch K. Johnson
(ed.), Strategic Intelligence Volume 2: The Intelligence Cycle, Westport, CT: Praeger.
Hulnick, Arthur S. (2000) Fixing the Spy Machine: Preparing American Intelligence for
the 21st Century, Westport, CT: Praeger.
Downloaded by [University of Florida] at 05:04 15 February 2017
–––– (2004) Keeping Us Safe: Secret Intelligence and Homeland Security, Westport, CT:
Praeger.
–––– (2007) ‘What’s Wrong with the Intelligence Cycle’, in Loch K. Johnson (ed.) Stra-
tegic Intelligence Volume 2: The Intelligence Cycle, Westport CT: Praeger.
–––– (2010) ‘The Dilemma of Open Source Intelligence: Is OSINT Really Intelligence’,
in Loch K. Johnson (ed.), The Oxford Handbook of National Security Intelligence,
Oxford: Oxford University Press.
Javers, Eamon (2010) Broker, Trader, Lawyer, Spy: The Secret World of Corporate Espi-
onage, New York: Harper Collins.
Johnson, Loch K. (2007) Strategic Intelligence Volume 3: Covert Action: Behind the
Veils of Secret Foreign Policy, Westport, CT: Praeger.
–––– (2011) National Security Intelligence, Malden, MA: Polity Press.
Kerbel, Josh and Olcott, Anthony (2010) ‘The Intelligence–Policy Nexus: Synthesizing
with Clients, Not Analyzing for Customers’, Studies in Intelligence, 54: 11–27.
Kessler, Ronald (2002) The Bureau: The Secret History of the FBI, New York: St Mar-
tin’s Press.
Steele, Robert David (2007) ‘Open Source Intelligence’, in Loch K. Johnson (ed.), Stra-
tegic Intelligence Volume 2: The Intelligence Cycle, Westport, CT: Praeger.
Taylor, Stan A. (2007) ‘Definitions and Theories of Counterintelligence’, in Loch K.
Johnson (ed.), Strategic Intelligence Volume 4: Counterintelligence and Counterterror-
ism, Westport, CT: Praeger.
6 The future of counter-intelligence
The twenty-first-century challenge
Jennifer Sims
Downloaded by [University of Florida] at 05:04 15 February 2017
The theory
Downloaded by [University of Florida] at 05:04 15 February 2017
information flows among scientists rather than aiming for maximized secrecy.
Much depends on how quickly and intensely a competition is crystallizing and
how technologically capable an opponent is judged to be – all assessments in
which intelligence and counter-intelligence officials must collaborate if the
balance between defence and offence is to be wisely struck.
Yet, despite the theoretical logic of seamless intelligence and counterintelli-
gence operations, practice has often diverged from the ideal, for good reasons.
Especially in democracies, those who practise intelligence, counter-intelligence
and security operate separately to some degree because those who spy and those
who use the law to stop spying see their domestic missions so differently. More
important, however, is the threat to democracy entailed in any optimized intelli-
gence system that joins intelligence, legitimate force and the powers of arrest.
Perfected ability to gain information dominance empowers those in power to
keep it, to hide the mechanisms by which they do so, and to deceive those to
whom they must be accountable. For this reason, joining powers to spy with the
powers of arrest threatens the balance between the governed and the governors
in democracies; those holding the powers of arrest and espionage must remain
accountable to the people they serve, even as they fight adversaries infiltrating
their homelands. Dictatorships are not, however, so constrained.
The practice: lessons and legacies from the Cold War: the US case
The natural tension that attends the relationships among security, counter-
intelligence and intelligence has troubled democracies since the beginning of the
Cold War, particularly in the United States, where a political culture of privacy
and federal restraint runs deep and shapes the American way of life the state is
designed to protect. Yet, at the same time, the Cold War represented for the US
as well as its allies an existential threat that demanded a vigorous counter-
intelligence response. This mix brewed aggressive approaches to intelligence
within the NATO alliance that, larded with rules, political truces and bureau-
cratic boundaries, left a legacy of costs and benefits after the Cold War ended.
On the positive side of the ledger, most NATO governments had institutional-
ized strong counter-intelligence functions, enforced espionage laws, and placed
limits on domestic spying. Most legislatures had developed mechanisms for
64 J. Sims
some measure of oversight. On the negative side, these same democratic govern-
ments suffered from occasional intelligence and counter-intelligence over-reach
and from gaps in counter-intelligence training and practice as agencies developed
institutionally rigid views of their missions.
These trends were perhaps particularly evident in the United States. With the
end of the bipolar strategic threat and the emergence of diverse transnational
ones, US intelligence and counter-intelligence bureaucracies became ever more
tightly wedded to existing counter-intelligence practices as they worked to
defend their budgets in the post-Cold War environment. Although the Federal
Bureau of Investigation (FBI) did recognize the upswing in industrial espionage
and the new authorities it would need to counter it, the Bureau missed the
Downloaded by [University of Florida] at 05:04 15 February 2017
deep, defensive bias that allied them more with security missions than with
national security policy. Repeated failures, particularly against the Cuban target,
fear of foreign dangles, and failed double agent operations rendered the discipline
increasingly subordinate. Over time, disuse of strategic deception led to lapses in
training for it, which in turn led to inabilities to recognize its use by others.
Failures caused by these gaps in collaboration among intelligence and
counter-intelligence officials probably never outweighed counter-intelligence
successes during the Cold War (although the documentary record is not com-
plete, making final judgements impossible). It is nonetheless clear that these
gaps began to bite deeply after the Cold War ended and transnational threats
gathered momentum. The FBI, working with its own atrophied processes for
identifying and prioritizing new threats and the domestic tools needed to meet
them, was slow to develop new collaborative initiatives with the CIA, and slow
to advise political leaders of the policy implications of what they did know.
These gaps in intelligence and counter-intelligence performance caused serious
problems for US policy-making in the 1990s, including slow recognition of the
domestic threat posed by international terrorism and international organized
crime. Despite growing recognition of transnational threats, the intelligence
community only fitfully disseminated information to domestic entities, such as
the Federal Aviation Authority, Amtrak and city police forces (though dissemi-
nation to industry in the face of growing threats from industrial espionage was a
noteworthy exception).
Latent problems, which had long resided in the rigid allocation of responsibil-
ities between federal law enforcement agencies and the national intelligence
community, became salient on 9/11 and during its aftermath. Counter-
intelligence contributed to failures prior to the First Gulf War, when Saddam
Hussein’s deceptions led to underestimation of his nuclear capabilities, and
before the 2003 war, when Saddam Hussein’s apparent attempts to deceive
others caused NATO allies to over-estimate what he had. These ‘failures’ were,
in part, the predictable result of a system designed to be slow to damage personal
privacy, to give rights to those residing on US soil, and to hold espionage agen-
cies accountable. Ironically, they are therefore also a reflection of its success.
The system is, in a sense, designed to succeed both by thwarting adversaries and
resisting the temptation to undermine the very democracy it is sworn to protect.
68 J. Sims
Indeed, in some ways, weaknesses in US counter-intelligence are necessary
because of the symbiotic relationship between these vulnerabilities and one of
the chief priorities: to avoid a national surveillance state. It is reasonable, then,
to hope for laws that may guide us through the twenty-first century, a time when
transnational threats are becoming more important. Unfortunately, the legacy of
confusing US espionage laws and regulations is not helpful in sorting out how to
strike the right balance between surveillance and privacy. Moving into the
twenty-first century, the US counter-intelligence system, which is described and
contained by a plethora of laws, is also dangerously entangled in them.9 Most
glaring are the differences in definitions of classified information (which cannot
be released to the public), defence information (technically ‘unclassified’ but
Downloaded by [University of Florida] at 05:04 15 February 2017
The message for policy-makers is that they need to connect with these newly
enabled citizens; the message for counter-intelligence services is that govern-
ments will likely seek a deeper grip on their own and foreign populations than
ever before, not through superior data, but through the interpretation of events
for those whom they govern or hope to manipulate. Terrorists and other
Downloaded by [University of Florida] at 05:04 15 February 2017
Table 6.1 World internet usage and population statistics, 31 December 2011
World regions Population Internet users Internet users Penetration Growth 2000–2011 Users %
(2011 Est.) 31 December 2000 latest data (% population) (%) of table
Source: www.internetworldstats.com/stats.htm.
Notes
1 Internet Usage and World Population Statistics are for 31 December 2011.
2 CLICK on each world region name for detailed regional usage information.
3 Demographic (population) numbers are based on data from the US Census Bureau and local census agencies.
4 Internet usage information comes from data published by Nielsen Online, by the International Telecommunications Union, by GfK, local Regulators and other reli-
able sources.
5 For definitions, disclaimers and navigation help, please refer to the Site Surfing Guide.
6 Information in this site may be cited, giving the due credit towww.internetworldstats.com. Copyright © 2001–2012, Miniwatts Marketing Group. All rights reserved
worldwide.
Counter-intelligence: the 21st century 71
adversaries can reach deep inside states to turn the governed against themselves
and their governors. New users are particularly likely to be unsophisticated in
their appreciation for how the internet can be used to manipulate and monitor
them and generate bias, making states undergoing rapid internet penetration par-
ticularly vulnerable to disruption. On the other hand, savvy governments enjoy-
ing the trust of the governed can rely on them for early warning and
self-organization during crises. From this perspective, the shift of state power
from West to East seems less certain and the risks of instability in the latter
seem, in any case, rather grave.
To better understand the implications of the information revolution for
counter-intelligence, it is useful to explore three related technological trends
Downloaded by [University of Florida] at 05:04 15 February 2017
shaping the information environment in somewhat greater depth: big data and its
processing; miniaturization and proliferation of sensors and platforms; and the
evolution of the cyber domain. These technologies are shaping not only who
competes in political contests both nationally and internationally, but also how
they do so. Although all relevant technologies cannot be reviewed, a few exam-
ples will give a flavour of the changes underway.
Big data
In 2009, Richard Way of the Guardian newspaper captured the startling growth
of the world’s stockpile of digital information:
Way observed that, at this rate, the digital universe would double over the next
eighteen months. Actually, in 2010, the globe produced 1.2 zettabytes and in
2011, 1.8 zettabytes (1.8 trillion gigabytes) of data,14 mostly as a result of the
spread of cell phones and personal computers to individuals using new ‘apps’
and sharing pictures and videos. EMC2, the company that posted the data Way
used for his article, explains why it thinks such trends are important: by 2020
digital data will have grown by 50 per cent, but the number of human beings
managing it will grow by only 1.7 per cent.15 Information managers are facing
digital chaos, and companies such as EMC2 want to help them gain control.
The implications for intelligence practice seem clear: if information is power,
then those who master this digital chaos first, and derive meaning from it, will
likely gain critical advantages. Intelligence professionals, whether in business or
in service to the state, are therefore in a silent race to develop tools for mining
and analysing growing volumes of swiftly moving information and then to use it
to understand the competitive security environment and help policy-makers
72 J. Sims
shape it in their favour. In the United States, the intelligence community runs an
open source intelligence (OSINT) centre, which has sources in over 160 coun-
tries that report in over eighty languages.16 The centre provides foreign source
material to the public through the Commerce Department’s National Technical
Information Service’s online World News Connection. This data-feed only
becomes good intelligence, however, when the centre adds timeliness and atten-
tiveness to provenance (examining where the foreign newspapers, government
spokesmen, map-makers and best-selling authors acquired their information, and
the motives they had for sharing it). Open information is rarely born pristine;
much of it is offered and replicated with a purpose. It is, even if ‘true’, nonethe-
less biased. Open source counter-intelligence is necessary to reveal the intent
Downloaded by [University of Florida] at 05:04 15 February 2017
Cyber
Most discussions of cyber begin with the vulnerabilities of critical information
infrastructure to hacking and other forms of attack. Counter-intelligence discus-
sions usually cover the difficulties of tracking, intercepting and attributing such
74 J. Sims
attacks. In essence, there are four critical challenges posed by the cyber domain
(Hayden 2011):
works vary greatly, and may not be coincident with governments’ interests
in protecting national security. The conduct of firms could trigger war or
prevent states from bringing it to an end.18
In these circumstances, governments could become embroiled in new
forms of industrial espionage as they seek to understand and map the threats
that corporations pose for the state, both because of their vulnerabilities and
their policies in cyberspace. These policies might prompt retribution against
hardware located within state territory.
Distinguishing between cyber espionage and cyber attack will likely plague
international conflict and its successful resolution for years to come. What con-
stitutes an act of war in cyberspace? How are wars terminated if they can be
prosecuted by private hackers with axes to grind?
Most of these issues and the problems they raise for counter-intelligence have
been addressed at length elsewhere (Brenner 2011). What has been less appreci-
ated is the role the integrity of cyber plays in managing information wars in the
public domain and the role offensive counter-intelligence might play in that
process. Joel Brenner, former director of the US National Counterintelligence
Executive (NCIX), has explained that one of the foremost challenges of cyber
espionage is its potential for peacetime use with wartime ends in mind. He points
to the penetration of US networks by the Chinese for the purpose of robbing US
industries of their intellectual property. To counter such espionage, the US needs
to penetrate the networks of adversaries to see what is coming and to deflect or
destroy the effort. Who, then, is the attacker? Both sides live in the networks of
others to avoid surprise; yet one also exploits that pre-positioning for purposes
of economic espionage, not simply defence. Telling the difference between the
guard at the gate and the thief is impossible. In this silent war, in which objec-
tives (resources, industry) can be achieved without battle, what matters is control
of the cyber domain, not necessarily its destruction. Governments that can sort
thieves and guards and act quickly to ally with private sector interests or release
information at an adversary’s expense will be best able to prevent losses and
shape the way critical audiences react, influencing who wins and loses.
This last idea, which relates to deception, is perhaps the most frequently
forgotten dimension of what is widely understood to be the threat from cyber
Counter-intelligence: the 21st century 75
operations. It is not just that states and hackers can burrow into information
systems to damage, steal and disrupt; they do it to influence as well, sometimes
for the sake of no one state’s agenda but for the sake of ‘free information’ or
some private cause. Leaked secrets, absent competitive context, offer the oppor-
tunity to gain advantages; open source information, as explained above, is never
born pristine and can be competitively neutral in its significance, until one side
or the other shapes meaning from it. Bradley Manning’s treachery in leaking
volumes of classified cables to Wikileaks was not driven by sympathy for any
particular adversary. Manning probably didn’t even know who would win or
lose from his act. As the cables emerged in the public domain, counter-
intelligence officials brought public criticism on the government with hopeless
Downloaded by [University of Florida] at 05:04 15 February 2017
efforts to staunch the flow. Less attention was given to the equally important
effort to manage how others sought to understand and use the information. An
effective counter-intelligence response could have included silence on some
issues, such as the authenticity of certain documents, and emphasis on others,
such as the role US diplomats were playing in pressing dictators for democratic
changes. To effectively manage such an effort, policy-makers needed to lead,
with the willing involvement of counter-intelligence officials. To some extent
this was done, but less by design than by default.
With technological advance, cyber deceptions are likely to grow, infecting
not only how adversaries derive meaning from stolen data, but drive meaning
into shared data. Intelligence wars entail influence operations; modern counter-
intelligence must entail counter-influence informed by solid appreciation of open
sources. Counter-intelligence as it exists now can do well in catching the perpe-
trator but fail utterly in managing spills and cyber poisons unless capacity for
offensive counter-intelligence matches that of spy catching. And to manage nar-
rative in the age of information, one needs not only an active and cooperative
citizenry that trusts officials not to manipulate them, but the attentive participa-
tion of policy-makers who understand their role in managing the information
environment and, most importantly, how to shape the meaning of events without
lying about the facts. A counter-intelligence culture imbued with the missions of
stealing and protecting truths is poorly equipped to work with policy-makers in
such a world of grey. In any case, with people power becoming ever more
important in managing international conflict – whether to induce panic from ter-
rorist acts or to reduce it and hunt down the perpetrators – control of the integrity
of cyber systems is a critical problem.
Twenty-first-century challenges
The modern counter-intelligence problem is complex, turning on computer and
communications technologies, legal statutes governing their use, and the intent
of adversaries to exploit them. Instantaneous communication is simultaneously a
boon to information managers and so ubiquitous that advantages are hard to
capture and retain for competitors. When new communications capabilities
develop, they hit the market immediately, driven by a private sector with
76 J. Sims
worldwide reach. Steps the US takes to ramp up the internal capabilities of intel-
ligence agencies empower insiders to use expanded access for unauthorized pur-
poses. At the same time, the digital revolution threatens to shackle governments
with petabytes of new media, such as email, video and the like – secrets whose
worth is as uncertain as are the consequences of their release and yet which will
entail enormous effort and expense to store, review and declassify. In demo-
cracies, technology is charging ahead and the law is scrabbling to keep up.
Three consequences of these trends seem particularly important for counter-
intelligence: the rise in insider threats, the importance of private sector collabo-
ration, and the increasing imperative of streamlining laws governing the
relationship between policing, policy and counter-intelligence. It seems sensible
Downloaded by [University of Florida] at 05:04 15 February 2017
Insider spies
The first and perhaps most immediate consequence of the trends outlined above
concerns the likely rise in insider espionage over the coming decade. With
empowerment of the individual comes his mobilization for causes of all kinds:
political, social, environmental, economic, military and criminal. Moreover, the
capability to act decisively now travels with the person in the form of cell
phones, secure, wireless lap tops, digital recording devices, cameras and the like.
From a single location, an individual can connect with friends, participate in a
poll, pay for parking tickets, buy movie tickets, order a book and read it instanta-
neously, ‘go’ to the movies or order dinner. The idea of acting decisively at any
moment travels with people to their workplaces, and the connectivity with others
of like mind encourages spontaneity, not caution. This social dynamic raises the
risk of insider spying not so much because people are more easily recruited by
foreign powers but because they are more easily disgruntled and able to act on
that feeling.
theon of national security agencies. This will be a difficult transition for states,
such as the US, that have developed a law enforcement culture comfortable with
catching spies but historically walled off from the larger intelligence enterprise.
Domestic intelligence agencies, which have grown in size and mission since
9/11, have a new need for domestic sources and thus liaison with law enforce-
ment, while the police will also expect better sharing of threats at the state and
local level. As the technological capacities for surveillance increase, largely
spurred by business and national security interests, the police will want to be
‘first adopters’ of those technologies suitable for the public domain. In states
with good systems of law enforcement and intelligence oversight, the legitimacy
of private sector surveillance will be settled early, making law enforcement rel-
atively empowered to act in concert with domestic interest groups chasing law-
breakers of all kinds, be they slaughterhouses or terrorists. Carefully managed,
law enforcement agencies can become ever more trusted interlocutors among
citizens, businesses and state agencies involved in domestic intelligence. If mis-
managed, however, they can evolve into the intelligence arms of excessively
intrusive surveillance agencies, with consequential effects for governments
struggling to maintain legitimacy with the governed. For this reason, perhaps,
the power shift we see occurring from West to East may be too premature
to call.
Notes
1 This chapter was prepared with support from the American Academy of Arts and Sci-
ences and with the assistance of Ryan McKinistry and Alexandra Bellay, my research
assistants at Georgetown University in early 2012.
2 Colum Lynch, ‘Syrian Opposition Seeks to Wipe the Assad Name off the Map – via
Google’, Washington Post, 14 February 2012. Online. Available: www.washingtonpost.
com/world/national-security/syrian-opposition-seeks-to-wipe-the-assad-name-off-the-
map–via-google/2012/02/14/gIQAad5aER_story.html (accessed 28 January 2013).
3 Ibid.
4 To understand the measurement problem, it may be helpful to consider two views of
the somewhat analogous mission of a librarian. In its most limited sense, the job of a
librarian is to maintain track of books in order to keep them safe and available for
users. Libraries might therefore measure their staff ’s success by assessing whether all
the library’s holdings are in proper order on the shelves. In a larger sense, however,
78 J. Sims
a librarian’s mission is to serve a community of learners. Understood in this way, the
number of books accounted for but not on the shelves would be positively correlated
with success. In fact, overdue books might be less of a worry than books that are safe
but never checked out. Counter-intelligence officers ought to differ from security
officers in a similar way: the former should measure success in terms of the strategic
purpose of those they serve, not the security of information per se. Security most cer-
tainly matters, because secrets or advantages lost cannot usually be regained; but, if
security rules, the strategists may lose opportunities to go on the offensive or the flex-
ibility they need to shape their opponent’s perceptions.
5 Some CI experts noted that, though accidental, the loss of a helicopter during the opera-
tion had a salutary effect, because its easily photographed pieces served as publicly
available proof that the operation had indeed taken place and that the US was involved.
6 A striking example comes from the Second World War, when cable and radio censor-
Downloaded by [University of Florida] at 05:04 15 February 2017
ship included, among other things, ‘[t]he civil, military, industrial, financial, or eco-
nomic plans of the United States, or other countries opposing the Axis powers, or the
personal or official plans of any official thereof,’ ‘[w]eather conditions (past, present, or
forecast)’ and ‘criticism of equipment, appearance, physical condition or morale of the
collective or individual armed forces of the United States or other nations’ opposing the
Axis powers (U.S. Cable and Radio Censorship Regulations $$1801–18(d), (g), (k), 7
Fed. Reg. 1499,1500 (1942), cited in Edgar and Schmidt 1973: 934). Press dispatches
were excluded from this particular rule and were covered in another regulation.
7 Major failures have indeed happened, but successes are likely under-appreciated
because of the sparse public record. What matters is which services ‘won’ overall.
The official historians of the DNI and FBI note that more than seventy-two spies were
successfully prosecuted between 1978 and 1985. The Senate’s Select Committee on
Intelligence, in its 1986 report Meeting the Espionage Challenge, revealed the (largely
still classified) contributions of CIA counter-intelligence during the Cold War with
hints of this kind:
A major element in counterintelligence is offensive operations, especially efforts
to recruit agents-in-place within hostile intelligence services and to induce defec-
tions from those services. The strategic payoff of agents and defectors can be
immense as demonstrated by the exposure of Edward Lee Howard and the suc-
cessful prosecution of Ronald Pelton.
(p. 63)
8 Interview with a former DDCI, 11 July 2011.
9 US intelligence laws are riddled with semantic distinctions and conceptual gaps that
make navigating the terrain of national security especially perilous. The underlying
inconsistencies among the various provisions of US espionage laws have never been
resolved. The creation of the US classification system and the US intelligence agen-
cies followed the original Defense Secrets Act of 1911 by several decades. The 1911
Act was incorporated into the Espionage Act of 1917, which in turn has been amended
several times. This law was in turn incorporated into 18 U.S. Code 793, which was
modified in 1950 by the Internal Security Act. The last added 18 U.S. Code 794.
10 See the website of the Public Interest Declassification Board (PIDB) for more
information on the current confusion concerning classification and declassification:
www.archives.gov/declassification/pidb/index.html (accessed 19 December 2012).
11 In a widely cited article, Edgar and Schmidt (1973) exposed how bad the situation
had already become by that time. As they wrote in the introduction to their now
classic treatise:
When we turned to the United States Code to find out what Congress had done,
we became absorbed in the effort to comprehend what the current espionage stat-
utes mandate with respect to the communication and publication of defense
Counter-intelligence: the 21st century 79
information. The longer we looked, the less we saw. Either advancing myopia
had taken its toll, or the statutes implacably resist the effort to understand.
For the persistence of this problem, see Herbig (2008: 23).
12 China lags behind both Azerbeijan and Armenia (44.1 per cent and 47.1 per cent
respectively) in internet use. See www.internetworldstats.com/stats3.htm.
13 ‘Internet data heads for 500bn gigabytes: World’s digital content equivalent to stack of
books stretching from Earth to Pluto 10 times’, Guardian, 18 May 2009. Online. Avail-
able: www.guardian.co.uk/business/2009/may/18/digital-content-expansion (accessed
23 May 2012).
14 ‘Produced’ here refers to information created and replicated as data ‘in motion’ on the
internet.
15 See their website at www.emc.com/leadership/programs/digital-universe.htm (accessed
Downloaded by [University of Florida] at 05:04 15 February 2017
29 January 2013).
16 See their website at www.opensource.gov/ (accessed 29 January 2013).
17 See the website at http://reclaimdemocracy.org/walmart/2007/spying_operation.php
(accessed 29 January 2013).
18 Google Maps is, for example, a new voice regarding the boundaries of states and even
the naming of towns and roads. See John D. Sutter, ‘Google Maps border becomes
part of international dispute’, CNN, 5 November 2010. Online. Available: www.cnn.
com/2010/TECH/web/11/05/nicaragua.raid.google.maps/index.html (accessed 29
January 2013).
Bibliography
Brenner, Joel (2011) America the Vulnerable: Inside the New Threat Matrix of Digital
Espionage, Crime and Warfare, New York: Penguin.
Edgar, Harold and Schmidt, Benno (1973) ‘The Espionage Statutes and the Publication of
Defense Information’, Columbia Law Review, 73: 930–1087.
Hayden, Michael (2011) ‘The Future of Things “Cyber” ’, Strategic Studies Quarterly, 5:
3–7.
Herbig, Katherine (2008) ‘Changes in Espionage by Americans, 194’007’, Department of
Defense Technical Report 08–05.
Hill, Kashmir (2012) ‘Potential Drone Use: Finding Rivers of Blood’, Forbes Magazine.
Online. Available: www.forbes.com/sites/kashmirhill/2012/01/25/potential-drone-use-
finding-rivers-of-blood/ (accessed 29 January 2013).
Hinsley, F.H. (1993) British Intelligence in the Second World War, Abridged edn, Cam-
bridge: Cambridge University Press.
Holloway, David (1994) Stalin and the Bomb: The Soviet Union and Atomic Energy, New
Haven, CT/London: Yale University Press.
Latell, Brian (2012) Castro’s Secrets: The CIA and Cuba’s Intelligence Machine, Basing-
stoke: Palgrave Macmillan.
O’Connell, Kevin T. and Forster, Randall T. (2011) Intelligence Integration Strategy: Re-
alignment of Sources and Methods for 21st Century National Security, prepared for the
Office of the Director of National Intelligence/Deputy for Intelligence Integration
(ODNI/DII).
Sims, Jennifer E. and Gerber, Burton (eds) (2009) Vaults, Mirrors and Masks: Rediscov-
ering US Counterintelligence, Washington, DC: Georgetown University Press.
Warner, Michael and Fox, James (2009) ‘Counterintelligence: The American Experi-
ence’, in Jennifer E. Sims and Burton Gerber (eds), Vaults, Mirrors and Masks, Wash-
ington, DC: Georgetown University Press, pp. 51–68.
7 Analysing international
intelligence cooperation
Institutions or intelligence
assemblages?
Jelle van Buuren
Downloaded by [University of Florida] at 05:04 15 February 2017
Nodal governance
These developments, however, are not a phenomenon related exclusively to the
intelligence community; nor are they the only response to the emerging net-
worked world of terrorism. The governance of security has been radically trans-
formed in recent decades. Established notions are based on the idea of
autonomous, territorially bound nation-states in which state agencies like the
police, border guards and intelligence services are responsible for the delivery of
security. Today, we inhabit a world of multi-level, multi-centre security govern-
ance, in which states are joined, criss-crossed and contested by an array of trans-
national organizations and factors that operate via regional and global
governmental bodies, commercial security outfits and informal networks (Wood
and Shearing 2007: 3). One could think, for instance, of global private players
like Control Risk or Stratfor, which deliver a range of security and intelligence
82 J. van Buuren
products and services to both private and public parties and who work together
with public intelligence agencies in informal or personal networks.
This has been termed the ‘nodal governance’ of security, consisting of a plu-
rality of decision centres in which no clear hierarchy between centres exists; the
core of the decision structures itself consists of networks; the boundaries of deci-
sion structures are fluid; and the actors include professional experts, and public
and private actors (Goetz 2008: 262). Whether the state in this new fluid security
amalgam is ‘stripped of its commanding heights’ (Neocleous 2007: 346), ‘hol-
lowed out’ and is just one ‘nodal actor’ among many, or whether it continues to
function as a kind of ‘eminence grise’, a ‘shadow entity lurking off-stage’
(Hawkins 1984: 190), is a subject of fierce academic debate (van Buuren 2010).
Downloaded by [University of Florida] at 05:04 15 February 2017
Leaving this dispute aside for a moment, there seems to be agreement among
scholars studying and researching changes in governance that nowadays we are
facing the multiplication of auspices and providers of security (Shearing and
Wood 2003: 406), and that security is not provided only by the institutions of the
state, nor shaped solely by thinking and acting originating from the state sphere
(Wood and Shearing 2006).
These insights from governance theory on the nodalization and hybridization
of security (vertical and horizontal models of security governance and practices
are combined together in more or less integrated modes of interaction), however,
seem to be overlooked when it comes to the study of European intelligence and
security cooperation. The story of this cooperation is commonly told from an
institutional perspective, centring on treaties, structures, competences, legal
powers and institutional developments (Bendiek 2006; Bossong 2008; Kaunert
2010; Monar 2007; Müller-Wille 2002; Zimmermann 2006). Typical questions
that arise from this perspective would be as follows: What are the opportunities
offered by the new Lisbon Treaty for intelligence cooperation? What will be the
influence of qualified majority voting in the relevant European institutions? How
relevant are the new powers of the European Parliament? How should we appre-
ciate the new European External Action Service? Is the European Joint Situation
Centre (van Buuren 2009) the embryo of a true European central intelligence
agency?
It is not that these kinds of questions are irrelevant. More traditional theories
and concepts from political science or public administration can be deployed to
analyse and evaluate the development of cross-border intelligence structures,
patterns of cooperation, conflicts of interest, bureaucratic turf wars, or the
problem that agencies sometimes are reluctant to follow political directives.
Fägersten, for instance, showed nicely how bureaucratic interests and conflicting
bureaucratic cultures hindered the European police organization Europol in ful-
filling the intelligence and counter-terrorist mandate which the political leaders
of the European Union wanted it to have (Fägersten 2010). In his article, Fäger-
sten criticizes the ‘state-centric view on intelligence cooperation’ which assumes
that states are unitary and sole actors when it comes to the development of intel-
ligence cooperation, and that state preferences are thus the key to understanding
cooperative outcomes. The basic assumption behind the state-centric view
International intelligence cooperation 83
‘is that states get what they want: if the strategic calculus is in favour of coopera-
tion, then cooperation will occur.’ However, states will in fact not always get
what they want, due to – among other things – bureaucratic cultural wars (Fäger-
sten 2010: 500–501).
Although Fägersten criticizes the state-centric view, he himself seems unable
to escape what I would like to call the ‘normative state-centric view’. At the end
of his article, Fägersten advises policy-makers to include bureaucratic perspec-
tives at an early stage in the planning process, otherwise governments may find
themselves in ‘the uncomfortable position’ of not getting what they want (Fäger-
sten 2010: 520). Although from a normative point of view this advice is under-
standable – we will return to this discussion at the end of this chapter – there
Downloaded by [University of Florida] at 05:04 15 February 2017
Intelligence assemblages
Acknowledging that institutions and policies cannot be the self-evident concep-
tual point of departure paves the way for the use of other concepts and theories
that could shed light on the practices of internationalization of intelligence. A
challenging way of addressing the reality of international and hybrid intelligence
cooperation is by looking at it as ‘intelligence assemblages’, a concept that has
also been used to study public–private security cooperation at the national (Schu-
Downloaded by [University of Florida] at 05:04 15 February 2017
ilenburg 2008) and international level (Abrahamsen and Williams 2009), and
surveillance practices (Haggerty and Ericson 2000). The concept of (intelli-
gence) assemblages introduces a ‘radical notion of multiplicity into phenomena
which we traditionally approach as being discretely bounded, structured and
stable’ (Haggerty and Ericson 2000: 608). ‘Assemblages’ consist of a ‘multiplic-
ity of heterogeneous objects, whose unity comes solely from the fact that these
items function together, that they “work” together as a functional entity’ (Patton
1994: 158). The concept of assemblages refers therefore to self-organizing pro-
cesses from below, from the bottom up. The concept of intelligence assemblages
assumes that when different public, private, national and international actors
work together, they produce a new reality, a new order, and give new meanings
to this order. It also assumes that these new practices can no longer be under-
stood or conceptualized by just looking at the parts from which they were
initially constructed.
The emerging hybrid intelligence and security practices can be looked at in
the same way. We should no longer try to understand and analyse these practices
by referring to the different parts and the logic embedded in them, but under-
stand them as something new: fluid and hybrid intelligence assemblages that
produce order and meaning through self-organizing processes. These can no
longer be understood or appreciated by only looking at the policies, interests,
cultures, powers or motives that set them in place. An assemblage has its own
dynamic, it is a self-organizing activity that cannot be reduced to its elements; its
essence lies instead in the relationships between the elements that make up the
assemblage. The concept of assemblages may therefore be understood as a radi-
calization of the notion of nodal governance. Not only is the state-centric view
contested (as with the concept of nodal governance), but the different nodes – be
it public or private or hybrid, be it national or international – are partly dissolved
into a new reality, the essence of which cannot be analysed by only looking at its
origins.
The notion of assemblages gives conceptual manoeuvrability to focus ana-
lyses of international intelligence and security cooperation on what exactly is
happening inside these assemblages. This can examine the role security entre-
preneurs play inside networks, or the importance of informal rules and cultures.
Of course, it is a little bit tricky to use insights from network theory to analyse
International intelligence cooperation 85
assemblages. Adherents of these theoretical strands will argue (correctly) that
this comes close to comparing apples and oranges. Yet, as stated at the begin-
ning of this chapter, this is a deliberate ‘picking and mixing’ from different
theoretical and conceptual strands to offer new perspectives on European intelli-
gence cooperation. We do not pretend to offer a hermetically sealed theory as
the be-all and end-all of international intelligence cooperation.
Following Charles Tilly (1998: 456), networks are taken to be a ‘continuing
series of transactions to which participants attach shared understandings, memo-
ries, forecasts, rights, and obligations’. Within networks, a special role is
reserved for what Bardach (1998: 29) has labelled the ‘smart practices of crea-
tive craftsmen’. Creative craftsmen are characterized by two elements: creativity
Downloaded by [University of Florida] at 05:04 15 February 2017
received from national agencies. This information, once received and assessed
by SitCen, formally qualified as ‘EU information’ and could therefore be subject
to EU policies giving member states equivalent right of access to each other’s
information. By maintaining the principle of originator control, SitCen could
guarantee that no documents would be passed on without the permission of the
member states that had contributed the information (House of Lords 2005: 57).
Network theory also offers opportunities to look into the hybridization of
intelligence and security, as entrepreneurs have the ability to bridge cultural
fragmentation by speaking ‘multivocally’ across networks (Padgett and Ansell
1993: 1263). Entrepreneurs can use language that may be interpreted coherently
from multiple perspectives simultaneously. Because listeners occupy different
structural positions, they interpret a broker’s ideas through divergent cultural
lenses and histories. As a result, any symbol, word or event can be read with
contradictory, even mutually exclusive meanings. Entrepreneurs thrive on multi-
vocal language: the more multivocal the entrepreneur’s ideas, the more likely it
is that they will be accepted and adopted across fragmented networks (Goddard
2009: 266). Within the European Union, for instance, a formal and institutional-
ized distinction between internal security and external security exists. The intel-
ligence and security agencies of the member states put forward the idea that this
distinction was artificial and counterproductive. Members of the Club de Berne,
the informal cooperation mechanism of both intelligence and security services,
therefore established the Counterterrorism Group (CTG) that levelled this ‘artifi-
cial’ distinction. There was however no institutional connection between the
CTG and the EU. SitCen realized the importance of connecting with CTG, but
from the perspective of diplomats and constitutional lawyers this was something
close to an institutional nightmare. By constantly invoking the need for a ‘com-
prehensive approach to terrorism’ and arguing in policy and strategy papers for a
‘global approach’, SitCen slowly developed a reasonable discourse acceptable to
actors responsible for both internal and external security.4 This resulted in the
acceptance of a small presence of CTG within SitCen, enabling the fusion of
inputs from internal and external services (House of Lords 2005: 54–55).
To be sure, the altering of ideas, identities, cultures and even structures or
institutions is not something that can simply be understood as the conscious
result of strategies deployed by entrepreneurs to achieve a set of predefined
International intelligence cooperation 87
goals. Just as the concept of assemblages prioritizes the inherently open and fluid
multiplicity whose unity comes solely from the fact that these items function
together, so network theorists underline that ideas that are introduced in net-
works often resonate in unpredictable ways. By deploying inventive ideas, entre-
preneurs can produce autonomous and unanticipated structural effects in
networks (Goddard 2009: 268). Helmke and Levitsky (2004: 725), in studying
the role of informal rules, also underline that the ‘rules of the game’ which struc-
ture political life are informal, in that they are created, communicated and
enforced outside of officially sanctioned channels. Informal rules and informal
structures therefore shape the performance of formal institutions in important
and often unexpected ways.
Downloaded by [University of Florida] at 05:04 15 February 2017
from different academic disciplines. The starting point is that the international-
ization and hybridization of intelligence and security have initiated practices that
fruitfully may be conceptualized as intelligence assemblages. These assemblages
and especially their ‘working’ cannot be primarily understood as the conscious
and rational result of political-administrative decision-making, institutional
changes or policies (although institutions and policies of course have their effect
on these practices).
It is also proposed that it is important to look closer at the role which intelli-
gence entrepreneurs play inside these assemblages, and their potential to influ-
ence or change practices, cultures, discourses, operations, policies and even
institutions. SitCen, administratively located in the Secretariat-General of the EU
Council, was from the beginning careful not to become a formal part of the
second pillar of the EU (external security) because the importance of working
cross-pillar was understood. This fragmentation into different pillars, with their
own powers, interests and cultures, in an important way determines the dynamics
of the EU as a whole. SitCen noticed that the Ministers of Justice and Home
Affairs (JHA, the third pillar) regarded it as something from the second pillar,
covering foreign and security policy. As a result, SitCen devoted considerable
time to persuading the JHA ministers that it also wanted to work for them, and
that the JHA ministers should be co-owners of the project. Thanks to these
efforts SitCen was capable of bridging the classical division between the pillars
and was welcomed at JHA meetings. This was quite uncommon within the EU.
In the words of Shapcott himself: ‘I now go to a host of JHA committee
meetings which I would never have dreamt of a long time ago’ (House of Lords
2005: 60–61).
The entrepreneurs and the assemblages they are embedded in are guided and
informed mostly by the logic of practicality, instead of the rules, norms, cultures
and policy preferences from which they were initially constructed. In these
assemblages different ‘practicalities’, informed by their public or private,
national or international, and formal or informal habitus, collide with each other
and merge into new, unforeseen logics of practicality. In particular, the domain
of intelligence, characterized by informality, craftsmanship, creativity, discretion
and unorthodoxy, seems pre-eminently suitable for approaches that make use of
the logic of practicality. To clarify: if we take the logic of practicality seriously,
International intelligence cooperation 89
we have to give more weight to what is happening in assemblages in order to
understand the internationalization of intelligence rather than continue relying
on approaches that centre around institutions, treaties, policy-makers and pol-
icies. The best way to appreciate possible futures for (European) intelligence and
security cooperation is to look at the practices, order and meaning that are con-
structed from below by different intelligence assemblages. The developmental
trajectory of SitCen illustrates this perfectly.
Obstacles
Various obstacles stand in the way of this approach. First, there is a scientific
Downloaded by [University of Florida] at 05:04 15 February 2017
in the Netherlands, so long as there was no guarantee that this information would
never be transmitted to the Portuguese service (Hoekstra 2004: 41–42, 53–54).
Apart from restraint exercised by intelligence practitioners themselves, however,
it is noteworthy that recent scandals, notably the practices of rendition, torture
and other violations of basic civil and human rights by the US, were initiated,
directed and approved at the highest political levels (see e.g. Human Rights
Watch 2010). It would give a false impression of events to suggest that the moral
high ground in intelligence is exclusively populated by politicians and policy-
makers. It is the opinion here that all actors engaged in hybrid intelligence and
security practices should be made aware of the ethical issues involved, including
– or especially – those at the highest political levels.
Third, there is of course a huge practical problem in researching intelligence
cooperation from a grounded approach. Research into intelligence and security
is an inherently difficult enterprise given the extreme levels of secrecy that, out
of dire necessity, political expediency, power games, or by default, are the rule
inside the intelligence community. No easy solutions are available to solve this
problem. It calls for courage from both the academic world as well as the intelli-
gence community to make such solutions possible. Historical studies into prac-
tices of international and hybrid intelligence and security cooperation are a
logical point of departure for further research. The approach proposed here is not
without its difficulties, but it nevertheless offers an improvement on more estab-
lished models. At a time when different institutions are wrestling with their role,
function and legitimacy in a new, hybrid, horizontal or ‘flattened’ world, practi-
tioners are dealing with it on a daily basis. They cannot simply wait for the polit-
ical level to come up with some magic formula to reconnect the vertical,
compartmentalized world of politics with the horizontal and hybrid world of
practices. Solutions, innovations, ideas and practices from below produce order
and meaning through self-organizing processes originating from assemblages. If
we really want to understand the internationalization and hybridization of intelli-
gence and want to see a glimpse of the future, assemblages are the locations we
should have a closer look at in the present.
International intelligence cooperation 91
Notes
1 The author would like to thank Peter Keller for his commentary and assistance in
understanding and illustrating practices of European intelligence cooperation.
2 Informal cooperation between national intelligence and security services is the favoured
model. This is form-free cooperation in which national interests and cultures prevail and
some of the characteristics of intelligence cooperation – third-party rule, confidentiality
– are being guaranteed. For the same reason, bilateral cooperation occurs more often
than multilateral cooperation. An example of informal multilateral intelligence coopera-
tion is the Club de Berne in which most European agencies cooperate.
3 Modesty seems to be an underestimated value in international cooperation. Newly
established EU agencies show a tendency to overstrain their voices in underlining their
importance, thereby only provoking resistance from the national agencies they have to
Downloaded by [University of Florida] at 05:04 15 February 2017
work with. This was one of the problems Europol faced, as its officials later admitted
(van Buuren and van der Schans 2003: 81, 109).
4 Between 1993 and 2009 internal security was the ‘third pillar’, Justice and Home
Affairs (later Police and Judicial Cooperation in Criminal Matters), while external
security was the ‘second pillar’, Common Foreign and Security Policy.
5 By mètis Scott refers to ‘a rudimentary kind of knowledge that can be acquired only by
practice and that all but defies being communicated in written or oral form apart from
actual practice’ (Scott 1998: 315).
Bibliography
Abrahamsen, R. and M.C. Williams (2009) ‘Security Beyond the State: Global Security
Assemblages in International Politics’, International Political Sociology, 1: 1–17.
Adamson, F.B. (2005) ‘Globalisation, Transnational Political Mobilisation, and Networks
of Violence’, Cambridge Journal of International Affairs, 18: 31–49.
Agrell, W. (2006) ‘Sweden and the Dilemmas of Neutral Intelligence Liaison’, Journal of
Strategic Studies, 29: 633–651.
Aldrich, R.J. (2004) ‘Transatlantic Intelligence and Security Cooperation’, International
Affairs, 80: 731–753.
–––– (2009) ‘Global Intelligence Co-operation versus Accountability: New Facets to an
Old Problem’, Intelligence and National Security, 24: 26–56.
Arthur, H.S. (1996) ‘The Uneasy Relationship between Intelligence and Private Industry’,
International Journal of Intelligence and CounterIntelligence, 9: 17–31.
Bardach, E. (1998) Getting Agencies to Work Together. The Practice and Theory of Man-
agerial Craftmanship, Washington, DC: Brookings Institution Press.
Bendiek, A. (2006) EU Strategy on Counter-terrorism. Steps towards a Coherent
Network Policy, SWP Research Paper, Berlin: SWP.
Block, L. (2010) ‘Bilateral Police Liaison Officers: Practices and European Policy’,
Journal of Contemporary European Research, 6: 194–210.
Boer, M. den (2006) ‘Fusing the Fragments. Challenges for EU Internal Security Govern-
ance on Terrorism’, in D. Mahncke and J. Monar (eds), International Terrorism. A
European Response to a Global Threat?, College of Europe Studies No. 3, Brussels:
Peter Lang, pp. 83–111.
Boer, M. den, C. Hillebrand and A. Nölke (2008) ‘Legitimacy under Pressure: The Euro-
pean Web of Counter-terrorism Networks’, Journal of Common Market Studies, 46:
101–124.
Born, H. (2007) International Intelligence Cooperation: The Need for Networking
Accountability, NATO Parliamentary Assembly, Reykjavik, 6 October.
92 J. van Buuren
Bossong, R. (2008) The EU’s Mature Counterterrorism Policy – A Critical Historical
and Functional Assessment, LSE Challenge Working Paper.
Bourdieu, P. (1990) The Logic of Practice, Stanford, CA: Stanford University Press.
Bourdieu, P. and L.J.D. Wacquant (1992) ‘The Purpose of Reflexive Sociology’, in P.
Bourdieu and L.J.D. Wacquant (eds), An Invitation to Reflexive Sociology. Chicago,
IL: University of Chicago Press, pp. 61–215.
Burgess, J.P. (2009) ‘Cooperation and Conflict. There is No European Security, Only
European Securities’, Cooperation and Conflict: Journal of the Nordic International
Studies Association, 44: 309–328.
Buuren, J. van (2009) Secret Truth. The EU Joint Situation Centre, Amsterdam: Euro-
watch. Online. Available: www.statewatch.org/news/2009/aug/SitCen2009.pdf
(accessed on 11 February 2013).
Downloaded by [University of Florida] at 05:04 15 February 2017
–––– (2010) ‘Private Security Ethics. Reintroducing Public Values’, in M. den Boer and
E. Kolthoff (eds), Security Ethics, The Hague: Eleven International Publishing,
pp. 165–188.
Buuren, J. van and W. van der Schans (2003) Keizer in Lompen. Politiesamenwerking in
Europa, Breda: Papieren Tijger.
Fägersten, B. (2010) ‘Bureaucratic Resistance to International Intelligence Cooperation –
The Case of Europol’, Intelligence and National Security, 25: 500–520.
Goddard, S.E. (2009) ‘Brokering change: networks and entrepreneurs in international pol-
itics’, International Theory, 1: 249–281.
Goetz, K.H. (2008) ‘Governance as a Path to Government’, West European Politics, 31:
258–279.
Haggerty, K.D. and R.V. Ericson (2000) ‘The Surveillant Assemblage’, British Journal
of Sociology, 51: 605–622.
Hawkins, K. (1984) Environment and Enforcement: Regulation and the Social Definition
of Pollution, Oxford: Clarendon Press.
Helmke, G. and S. Levitsky (2004) ‘Informal Institutions and Comparative Politics: A
Research Agenda’, Perspectives on Politics, 2: 725–740.
Hoekstra, F. (2004) In dienst van de BVD. Spionage en contraspionage in Nederland,
Amsterdam: Boom.
Hoogenboom, B. (2006) ‘Grey Intelligence’, Crime, Law and Social Change, 4: 373–381.
House of Lords (2005) After Madrid: The EU’s Response to Terrorism. Report with Evid-
ence, London: Stationery Office.
Human Rights Watch (2010) ‘No Questions Asked’. Intelligence Cooperation with Coun-
tries that Torture, New York: Human Rights Watch.
Johnston, L. and C. Shearing (2003) Governing Security. Explorations in Policing and
Justice, London: Routledge.
Kaunert, C. (2010) ‘The External Dimension of EU Counter-terrorism Relations: Compe-
tences, Interests, and Institutions’, Terrorism and Political Violence, 22: 41–61.
Loader, I. (2000) ‘Plural Policing and Democratic Governance’, Social and Legal Studies,
9: 323–345.
–––– (2002) ‘Governing European Policing: Some Problems and Prospects’, Policing and
Society, 12: 291–305.
Monar, J. (2007) ‘Common Threat and Common Response? The European Union’s
Counter-terrorism Strategy and its Problems’, Government and Opposition, 42:
292–313.
Müller-Wille, B. (2002) ‘EU Intelligence Co-operation. A Critical Analysis’, Con-
temporary Security Policy, 23: 61–86.
International intelligence cooperation 93
Neocleous, M. (2007) ‘Security, Commodity, Fetishism’, Critique, 35: 339–355.
Padgett, J.F. and C.K. Ansell (1993) ‘Robust Action and the Rise of the Medici,
1400–1434’, The American Journal of Sociology, 98: 1259–1319.
Patton, P. (1994) ‘MetamorphoLogic: Bodies and Powers in A Thousand Plateaus’,
Journal of the British Society for Phenomenology, 25: 157–169.
Pouliot, V. (2008) ‘The Logic of Practicality: A Theory of Practice of Security Com-
munities’, International Organization, 62: 257–288.
Schatzki, T.R., K.K. Cetina and E. von Savigny (2001) The Practice Turn in Con-
temporary Theory, New York: Routledge.
Schuilenburg, M (2008) ‘The Dislocating Perspective of Assemblages. Another Look at
the Issue of Security’, Open, 15.
Scott, J.C. (1998) Seeing Like a State: How Certain Schemes to Improve the Human Con-
Downloaded by [University of Florida] at 05:04 15 February 2017
Introduction
The notion of European intelligence cooperation may sound highly improbable.
The general difficulties with multilateral intelligence cooperation have been
thoroughly covered in the literature (Lefebvre 2003; Clough 2004; Sims 2006;
Walsh 2007). Furthermore, why would European governments that have been
fighting hard for their fiscal sovereignty be willing to cede it in the security area
by coordinating the work of their national security services? On the other hand,
the increasing number of transnational risks resulting from our ever more inter-
connected societies demand effective international collaboration. Only by
sharing information and resources – or producing them collectively – can
complex security threats be successfully forecast, analysed and managed. From
this perspective, European intelligence cooperation becomes a natural extension
of the already high levels of interconnectedness that characterize European states
following decades of regional integration. As the former head of the European
Union’s Center for Intelligence Analysis argues:
It is perhaps no surprise that the EU, with its relatively small membership
and the breadth and depth of its competencies and interrelationships, has
made more progress in building an assessment and warning structure than
NATO and the UN.
(Shapcott 2011: 126)
border authorities inside and outside the EU, other EU agencies and institutions,
international organizations and open sources. Based on the analysis of this
information, the agency produces annual and biannual risk assessments as well
as tailored reports, for example, on joint border operations carried out by
member states (Laitinen 2008).
In addition to the cooperative forums discussed above, the EU has technical
and legal mechanisms in place for the more or less automatic transfer of informa-
tion among different users. Although not forums for intelligence cooperation per
se, these arrangements greatly facilitate the transfer of what David Omand calls
PROTINT (protected personal information held by commercial entities and gov-
ernments) between European agencies and beyond.3 One example is the Schen-
gen Information System (SIS), a common database where national agencies can
file alerts for wanted or missing persons, as well as details of entry bans or stolen
property. This information is then instantly available to law enforcement and
customs personnel in all the participating countries. Although the information
that can be stored on any individual is quite restricted, additional information
may be exchanged using the Supplementary Information Request at the National
Entry (SIRENE) system, which has bureaux in each member state. SIS/SIRENE
is for public authorities only, but other information systems connect commercial
actors with national and EU agencies. Examples include the EU data retention
directive, which requires the providers of public communication systems to store
data on traffic, locations and subscribers for at least six months, and the EU–US
Society for Worldwide Interbank Financial Transfers (SWIFT) and Passenger
Name Record (PNR) agreements, which regulate how data on financial transac-
tions and air passengers can be transmitted to authorities in the United States
(European Commission 2010).
Based on this material, IntCen produces annually around 200 situation assess-
ments of a strategic nature as well as around fifty reports tailored to more spe-
cific ends. IntCen works closely with the intelligence directorate of the European
Union’s military staff (IntDir) through the Single Intelligence Analysis Capacity
(SIAC). In practice, this means that the two entities coordinate the requests for
information (RFI) they send to member state intelligence suppliers and then
produce reports by way of joint task forces, most often with IntCen as the lead
agency. The internal work of IntCen is divided up between the Analysis Divi-
sion, which receives intelligence from member states and produces reports, and
the General and External Relations Division, which runs administration, com-
munications and open source collection. In addition to its mission to supply the
EU foreign policy machinery with early warning and strategic assessments con-
cerning foreign hot spots, IntCen is also charged with analysing the threat of ter-
rorism, both inside and outside Europe (Shapcott 2009; Ashton 2012a, 2012b).
The deployment of EU military missions has also increased the demand for intel-
ligence support of a more operational character, a clear deviation from IntCen’s
main focus on strategic level analysis.
IntDir manages intelligence analysis on military issues. It is run by officers
seconded from the EU member states, and feeds defence intelligence to the
EEAS. As with IntCen, its analytical work has expanded over time from early
warning and situation assessment at the strategic level to include providing more
operational-level support to EU missions. The EU’s ambition to take a ‘compre-
hensive approach’ to managing crises – essentially merging the civilian and
military elements of its missions – means that the work of IntDir is conducted in
close proximity to that of the civilian analysts at IntCen. At the moment they
work closely within the SIAC framework, but discussions are ongoing about
how to further synthesize and streamline intelligence support within the EEAS.
Finally, important intelligence support for foreign and security policy is
delivered by the EU Satellite Centre (SatCen). As the EU’s only agency devoted
to intelligence collection, SatCen produces geospatial and imagery intelligence
products on behalf of the High Representative and the EEAS. The primary
sources of satellite data are commercial providers, but agreements with specific
member states allow SatCen some access to national resources as well. Like the
agencies described above, SatCen is increasingly being requested to provide
98 B. Fägersten
intelligence support for EU missions. To that end, the Centre now has a standing
operational support function at its headquarters in Torrejon, Spain. In addition to
feeding its intelligence products to the EEAS, SatCen is able to support member
states, the European Commission, third states and other international
organizations.
In general, the dense mesh of bilateral relations that was strengthened follow-
ing the 9/11 terrorist attacks illustrates the asymmetry of transatlantic intelli-
gence cooperation. Pressed by the US, individual European countries had little
chance of resisting calls for intensified cooperation in the ‘War on Terror’.
Indeed, the development of the CTG, as discussed above, was partly motivated
by the urge to gain an autonomous European capacity to perform terrorism risk
assessments in the light of tough US pressure to engage in the fight against inter-
national terrorism.8 The decade following the 9/11 attacks also saw many Euro-
pean intelligence and security services establish cooperation with agencies in the
Middle East and North Africa (MENA) region. Usually, the relationship is
between a Western intelligence agency and a partner agency focused on internal
security in one of the countries in those regions.9 The main objective, at least in
the post-9/11 era, has been to help Western governments keep track of poten-
tially dangerous foreign extremists, and/or of citizens from European countries
travelling to the region to receive training and guidance. Such cooperation obvi-
ously poses great challenges due to different viewpoints on matters such as the
rule of law and human rights. At the same time, it is important not to forget that
the sometimes lax regulations on interrogation methods have in some instances
been the very reason for the cooperation on the part of Western intelligence ser-
vices. It became clear following the Arab Spring that intelligence cooperation
with authoritarian regimes in the MENA region often has its downside, espe-
cially when it becomes public. Not only can it provoke criticism from Western
advocates of human rights, but it can also nurture popular disdain from within
the region should the authoritarian regimes fall. British–Libyan intelligence
cooperation, which was exposed following the ousting of Muammar Gaddafi, is
a case in point.10
Finally, European intelligence cooperation on a variety of issues takes place
within the North Atlantic Treaty Organization (NATO). NATO promotes and
hosts arrangements for intelligence cooperation in various fields. The Civilian
Intelligence Committee (CIC) – formerly known as the Special Committee –
brings together NATO member states’ heads of security services and civilian
intelligence agencies for discussions on threats to the security of the Organiza-
tion and its member states, such as terrorism and foreign espionage. As NATO
has broadened its scope from territorial defence to global crisis management, the
European intelligence cooperation 101
CIC has adapted its work accordingly. However, leaked reports suggest that its
member states differ over whether the CIC should or is competent to cover
threats relating to out-of-area operations, such as those in Afghanistan.11 The
Committee has a rotating presidency, a formula which provoked some contro-
versy when in 2008 Hungary appointed a KGB-trained officer to chair the meet-
ings.12 Another important NATO body is the Intelligence Unit (IU), which brings
together mostly civilian staff from the member states to perform strategic intelli-
gence analysis on behalf of the Atlantic Council. The IU, which focuses on a
variety of transnational threats such as proliferation, state instability and ter-
rorism, works in close cooperation with the military intelligence branch of
NATO – the Intelligence Division of the International Military Staff. Other
Downloaded by [University of Florida] at 05:04 15 February 2017
Explaining cooperation
The above section provides an overview of current multilateral intelligence
cooperation in Europe. It also discusses parallel and to some extent competing
arrangements – for example, bilateral and transatlantic cooperation – that are rel-
evant for gaining an overall understanding of the frameworks involved. While
much cooperation evidently takes place on a bilateral basis, the rapid develop-
ment of multilateral arrangements for cooperation has been striking. This section
addresses this puzzle. How can we explain the development of multilateral coop-
eration in an area that is at the heart of national sovereignty?
As a basis for analysing intelligence cooperation, the vast majority of state
interests at play may be summarized as involving a simple trade-off: achieving
intelligence and policy gains while minimizing the costs in terms of loss of auto-
nomy and increased vulnerability (Fägersten 2010a). Intelligence gains are the
intelligence-related benefits of cooperation. They include access to currently
102 B. Fägersten
unavailable sources, methods, technologies and information. Policy gains relate
to the political motives for cooperation, such as the granting of legitimacy to an
actor or organization, the strengthening of political relationships or – in cases
where cooperation is publicized – the need to display commitment in the eyes of
the public. In their aim to maximize any combination of these gains through
intelligence cooperation, however, states are held back by issues of cost as well
as risk. The main cost arises when states accept any development that curtails
their authority, either in their internal or external affairs. This includes, for
example, being dependent on external sources of information in order to be
able to make decisions, or being drawn into intelligence operations by alli-
ance commitments. The main risk of intelligence cooperation is linked to the
Downloaded by [University of Florida] at 05:04 15 February 2017
Drivers of cooperation
What has made European states more willing to pursue intelligence and policy
gains over time? Two factors appear to be determinants in generating demand
for cooperation in the European case. The first is the growing perception of a
common threat in the form of radical Islamist terrorism. This has increased the
demand for both intelligence and policy gains relating to a greater awareness of
terrorist movements (in the case of the former) and new institutional arrange-
ments to show commitment (in the case of the latter). Europe has a long history
of terrorist activity, but the threat posed by Islamist extremism greatly accentu-
ated the need for international cooperation, in particular in support of societal
protection and law enforcement, but also in support of foreign and security
policy. It is important to note that an increase in the level of threat will only
generate a need for cooperation if it challenges the capacity of individual states.
If states can handle a threat unilaterally, they will prefer to do so. In addition,
cooperation will only develop on a multilateral basis in cases where many states
have similar perceptions of the nature of a threat. In the case of preference asym-
metries on the preferred means to counter terrorism, states are more likely to
seek bilateral cooperation with like-minded actors. The increased level of threat
from Islamist extremists qualified on both counts. Compared to earlier forms
of politically motivated terrorism, which had a fairly high degree of local
specificity, this phenomenon was perceived as a threat with clearly international
European intelligence cooperation 103
dimensions which many states had inadequate resources to counter. One intelli-
gence director, speaking in 2010, summed up the picture:
The main driver was that all of us, from our respective horizons, saw that
the threat [from terrorism] came closer to Europe, and simultaneously
increased in volume. Furthermore, terrorists cross borders, which forced us
to cooperate. This was not something any state could handle on its own.14
The second factor driving cooperation was the internal demand created by the
process of European integration. Scholars of integration talk of spillover when
cooperative measures in one area create the need for cooperation in adjacent
Downloaded by [University of Florida] at 05:04 15 February 2017
areas (Haas 1968; Schmitter and Niemann 2009). This was clearly the main
driver of intelligence cooperation in the field of foreign and security policy,
where growing ambitions for a common European foreign and security policy
increased the demand for supporting intelligence analysis. IntCen is a case in
point. The initial decision to set up the agency, the choice to increase coopera-
tion by seconding national intelligence analysts, the development of a close
working relationship with the military intelligence branch of the EU, and the
increasing role in operational support were all developments that were motivated
by endogenous demands. Not only was intelligence demand created by spillover
from other areas of integration, but in line with this concept it was also articu-
lated and championed by actors within the common institutions. IntCen innova-
tively managed to formulate solutions to problems they themselves had
articulated (Shapcott 2005). This highly proactive entrepreneurial approach
gained additional leverage due to external shocks, most notably the terrorist
attacks in Madrid in 2004 and London in 2005.
may be said about security service cooperation in the CTG and the Club de
Berne. While these bodies did not enjoy any organizational autonomy – their
arrangements were fully decentralized – they were allowed to function in a non-
politicized environment, something which proved beneficial to cooperation. As
one analyst explained, ‘this is a venue for real cooperation, not for politics’.17 At
the other end of the spectrum, the arrangements for intelligence cooperation
among law enforcement agencies were put under strict bureaucratic and political
controls – for very good reasons – and thus cooperation to a large extent fol-
lowed the lowest common denominator. Interestingly, these somewhat contro-
versial design principles – hierarchy and organizational autonomy – seem to be
interrelated. When powerful states sense that their interests are being taken into
account (by formal or informal means) they tend to be more willing to delegate
authority to third parties or supranational institutions to manage cooperation.
lateral venues for cooperation can lead to considerable intelligence gains even in
the absence of ‘A-grade’ intelligence. Pooling analytical resources on a multi-
lateral basis can be one way to manage the ‘information overload’ that could
otherwise overwhelm national services.18 In addition, multilateral pooling has an
edge over decentralized bilateral exchanges in situations where states are unable
to determine the value of a specific piece of information for other actors. A piece
of information that is of little relevance to one actor may actually be ‘A-grade’
intelligence for another.
Second, multilateral cooperation can play an important role in fostering trust
and diffusing norms of democratic governance of intelligence. By way of joint
analysis, it also creates a common perception of threats and challenges. A coord-
inated response to transnational challenges requires a common understanding
that is difficult to reach by way of unilateral or bilateral intelligence analysis. By
producing common information, multilateral intelligence cooperation paves the
way for collective action.
Finally, multilateral cooperation can generate intelligence gains by paving the
way for enhanced bilateral or ‘mini-lateral’ cooperation. A precondition for real-
izing cooperative gains is to identify a common interest. In many cases such
interests are fairly obvious; for example, between neighbouring states with more
or less porous borders. Increasingly, however, forces that are generally con-
sidered consequences of globalization will create common interests between
actors that otherwise might not see themselves as ‘natural’ partners. Although
separated by distance, states may face similar challenges related to cyber security
or, for example, they may find that both have minorities of the same origin
which support separatist movements in a third country. Multilateral cooperation
can be an effective way to identify possible gains from cooperation which may
then be captured in a bilateral arrangement. Even between countries that already
cooperate, multilateral intelligence gatherings, in a setup that resembles an aca-
demic conference, provide a fertile ground for the establishment of broader per-
sonal and inter-agency contacts. Hence, by enabling networking and identifying
interest commonalities, multilateral intelligence arrangements can generate
intelligence gains. Some of these gains may be pursued within the multilateral
forum, while others will be captured in parallel bilateral partnerships. This also
means that bilateral and multilateral cooperation is not as clearly separated as
European intelligence cooperation 107
established theory suggests. The two formats can be intimately intertwined. For
example, states can assess threats in a multilateral setting, then manage or
counter these threats by way of bilateral cooperation, and finally report back and
share best practices in the multilateral forum.
first time’ (de Vries 2005). This chapter has discussed the factors that explain
how this development has reached its current level. How are these factors likely
to play out in the future? What will be the effects on the development of cooper-
ation? The main conclusion is that the scope and depth of European intelligence
cooperation are likely to increase in the years to come. However, the pace and
character of this increase will be determined by two interrelated variables. First,
how far the European Union will be transformed by the financial crisis. Second,
the extent to which EU member states want to use the EU to pursue their inter-
ests on the international political stage.
What kind of European Union will emerge from the financial crisis? The
crisis has proved the complexities involved in operating a common currency
alongside a national economic policy. Differences in current account balances,
competitiveness and access to financial markets among member states have
resulted in a highly unbalanced currency union. In managing the crisis, politi-
cians and institutions have tried to address mounting debt levels by prescribing
financial austerity while simultaneously taking steps towards a tighter political
union in order to address underlying structural problems. At the same time, both
the austerity measures and the steps towards deeper European integration are
being met with increasing levels of scepticism in many EU member states. All
these aspects – austerity, integration and the legitimacy of both in the eyes of the
public – will affect the future of European intelligence cooperation.
First of all, austerity could lead to either less or more cooperation, depending
on whether European cooperation is seen as a luxury add-on which cannot be
afforded in times of crisis, or as a cost-saving measure that can relieve national
budgets through specialization and economies of scale (in the latter case,
member states would have to accept that the common European level of cooper-
ation would not only complement, but in some instances replace national com-
petences). This is a calculation that will look different to different member states,
so the most likely effect will be one of fragmentation.
Further to this is the point that more integration on a general level is most
likely to result in more intelligence cooperation. The analysis of current coopera-
tion suggests strong spillover effects between measures to cooperate in related
fields and the need to develop increased joint intelligence capacities. For
example, if the Eurozone members move forward with deeper economic and
108 B. Fägersten
financial integration, it is likely that tighter cooperation on immigration, judicial
matters and defence industrial production will follow (Piris 2012). These are all
areas that benefit from joint intelligence work. However, it is clear that not all
the EU member states will take part in this journey. Britain in particular, but also
other countries outside the Eurozone, are reluctant to move towards increasing
cooperation. Hence, increased integration (like austerity) may lead to increased
fragmentation, where some countries deepen intelligence cooperation while
others choose to opt out.
Another question relates to the EU as an instrument for managing European
states’ security and international interests. Collective action in the foreign,
security and defence fields clearly calls for common information and situational
Downloaded by [University of Florida] at 05:04 15 February 2017
Notes
1 For the purpose of this text, intelligence cooperation is defined as cooperation between
national agencies with an explicit intelligence mandate and/or the establishment of
international bodies with such mandates.
2 ‘Societal protection’ refers to measures to protect a society, including its institutions
and values.
3 See Chapter 2 by Sir David Omand (this volume).
4 Although this task at times overlaps with law enforcement intelligence, the main
objective is rather different. Law enforcement is focused on bringing criminals to
justice by way of securing evidence, while societal protection aims to avoid harm to a
society, its values and its institutions. The latter is usually carried out by national
security services, and typical work includes countering terrorism, monitoring groups
with subversive agendas, and thwarting the actions of foreign intelligence
organizations.
5 Other actors with a modest impact on European intelligence cooperation include the
Terrorism Working Group (TWG), which brings together staff from interior minis-
tries and security services for discussions on internal aspects of terrorism; the
Working Party on Terrorism – International Aspects (COTER), which deals with
external aspects such as policies towards third countries and international organiza-
tions; and finally, the Standing Committee on Operational Cooperation on Internal
110 B. Fägersten
Security (COSI) which is supposed to facilitate and coordinate security cooperation at
the operational level. However, during its first years COSI has been occupied with
discussions about its own role and to some extent with the implementation of the
EU’s internal security strategy, and it is not involved in legislation or in any opera-
tional work.
6 ‘Italy’s high court upholds convictions of 23 Americans in Abu Omar rendition’,
Washington Post, 20 September 2012.
7 Following the exposure of a US Surveillance Detection Unit (SDU) in Oslo, and its
close cooperation with former employees of Norwegian police and defence agencies,
investigations concerning similar arrangements were opened in Sweden, Denmark,
Finland and Iceland. In none of these cases could the extent to which surveillance had
been unlawful be confirmed. Investigations did show, however, that local authorities
had been informed to varying degrees about ongoing activities. See, for example,
Downloaded by [University of Florida] at 05:04 15 February 2017
Bibliography
Agrell, W. (2006) ‘Sweden and the Dilemmas of Neutral Intelligence Liaison’, Journal of
Strategic Studies, 29: 633–651.
Argomaniz, J. and Rees, W. (2012) ‘The EU and Counter-terrorism’, in S. Biscop and
R.G. Whitman (eds), The Routledge Handbook of European Security, London:
Routledge, pp. 225–234.
European intelligence cooperation 111
Ashton, C. (2012a) ‘EU Intelligence Analysis Centre (IntCen). Reply to Question in
European Parliament nr E-006017/2012’.
–––– (2012b) ‘EU Intelligence Analysis Centre (IntCen): Products and Information.
Reply to Question in European Parliament nr E-006018/2012’.
Clough, C. (2004) ‘Quid Pro Quo: The Challenges of International Strategic Intelligence
Cooperation’, International Journal of Intelligence and Counterintelligence, 17:
601–613.
Council of the European Union (2008) ‘Report on the Implementation of the European
Security Strategy: Providing Security in a Changing World’, S407/08. Online. Avail-
able: www.consilium.europa.eu/ueDocs/cms_Data/docs/pressdata/EN/reports/104630.
pdf (accessed 28 December 2012).
–––– (2010) ‘Draft Internal Security Strategy for the European Union: “Towards a Euro-
Downloaded by [University of Florida] at 05:04 15 February 2017
the UKUSA Countries – the United Kingdom, the United States of America, Canada,
Australia, and New Zealand, Boston, MA: Allen & Unwin.
Schmitter, P.C. and Niemann, A. (2009) ‘Neo-functionalism’, in A. Wiener and T. Diez
(eds), European Integration Theory, 2nd edn, Oxford: Oxford University Press, pp.
45–66.
Shapcott, W. (2005) ‘Oral Evidence’, in House of Lords, European Union Committee,
‘After Madrid: The EU’s Response to Terrorism, Report with Evidence’, pp. 53–62.
–––– (2009) ‘Situation Report – Interview with William Shapcott’, Jane’s Intelligence
Review, 21: 58.
–––– (2011) ‘Do They Listen? Communicating Warnings: An Intelligence Practitioner’s
Perspective’, in C. de Franco and C.O. Meyer (eds), Forecasting, Warning, and
Responding to Transnational Risks, Basingstoke: Palgrave Macmillan, pp. 117–126.
Sims, J.(2006) ‘Foreign Intelligence Liaison: Devils, Deals, and Details’, International
Journal of Intelligence and Counterintelligence, 19: 195–217.
Sloan, E. (2012) ‘Canada and NATO: A Military Assessment’, Strategic Studies Working
Group Papers, Canadian International Council, Canadian Defence and Foreign Affairs
Institute.
Treaty of European Union (1992) Article 4:2. Online. Available: http://eur-lex.europa.
eu/LexUriServ/LexUriServ.do?uri=OJ:C:2010:083:0013:0046:en:PDF (accessed 27
December 2012).
Vries, G. de (2005) ‘Gijs de Vries on Terrorism, Islam and Democracy’. Interview in
Euractiv, published 4 March. Online. Available: www.euractiv.com/security/gijs-vries-
terrorism-islam-democracy/article-136245 (accessed 20 March 2013).
Walsh, J.I. (2007) ‘Defection and Hierarchy in International Intelligence Sharing’,
Journal of Public Policy, 27: 151–181.
9 Intelligence-led policing in Europe
Lingering between idea and
implementation
Monica den Boer
Downloaded by [University of Florida] at 05:04 15 February 2017
Introduction
Intelligence-led policing (ILP) has been a recent hype in national and inter-
national discourse on law enforcement.1 Within the international context it is
widely suggested that this model of policing, which intends to embed the rational
and managerial use of information in processes of policing with the intention to
reduce crime in a preventive manner, is more effective than purely responsive
styles of policing. This chapter takes an in-depth look at the concept of ILP as it
is practised in the member states of the European Union (EU). The ambiguity of
the concept may have consequences for the way in which ILP is welcomed and
used in police agencies throughout Europe. These ambiguities are caused by
unresolved strategic choices concerning the level and direction of intelligence
sharing (hierarchical and layered versus horizontal and networked); the organ-
izational context and the actors involved in ILP (general versus specialist); the
extent to which intelligence may be used to manage a police organization or to
‘manage and predict risks in the outside world’ (managerialism versus risk
assessment); and the way in which ILP will develop in the near future.
There is a fundamental normative debate in the domestic security field about
the mandate and professional capacity of police organizations with regard to
intelligence gathering and analysis. Intelligence agencies are of the view that this
is a highly demanding, complex and secretive task which cannot be delegated to
the public police forces (see e.g. Gregory 2008: 47–61). However, with the blur-
ring of the line between ordinary police practices such as surveillance and the
(proactive) high policing practices of gathering information on activists and ter-
rorists, intelligence has definitely gained an undeniable position in the discourse
of mainstream policing. Several European countries have introduced
intelligence-led policing as an important if not the leading model of policing into
their work practices. Hence, this chapter takes the law enforcement discourses
about ILP as a point of departure.
Traditionally, ILP is associated with running informants under proactive
policing methods with the purpose of collecting sensitive information on the
basis of which an analysis can be made. However, as time has passed, ILP has
gradually transformed into an overall practice in which information is brought
114 M. den Boer
together in the form of analytical products. This knowledge, which is supposed
to be acquired in a systematic, rational and professional fashion, provides input
for decisions by police managers and state prosecutors about priority setting,
employment of capacity, instruments, and longer term strategies such as educa-
tional development within the police forces and cooperation with public and
private agents (Johnston 1999; Stenning 2000). Moreover, the introduction of
ILP has been facilitated by an increased focus on transnational criminal networks
and the apparent need for new police management models (Gill 1998).
According to Ratcliffe (2008), some universal drivers explain the push for the
ILP model. These drivers include trends such as new governance challenges,
technological innovation, proactive information gathering and multi-agency
Downloaded by [University of Florida] at 05:04 15 February 2017
policing. The popularity of ILP hinges upon several factors. First, ILP allows
police organizations to keep their former responsive style of policing intact while
at the same time seeking to innovate along proactive lines of performance.
Reactive policing was increasingly regarded as an insufficient response to rising
crime levels, both at the local and global levels (transnational organized crime
and terrorism). In other words, the lack of an effective response culminated in a
demand gap: high volumes of crime persisted despite numerous law enforcement
interventions. Second, ILP is a managerial model which allows for the control of
information-based processes from the top to the bottom of the organization. In
other words, analytical intelligence products like risk assessments can assist
police leadership to make informed strategic choices about the employment
of police personnel and the definition of strategic focus points. Third, ILP allows
police organizations to create interconnections, both internally between police
processes and externally with other (security) actors. For instance, intelligence
plays a crucial role in predicting public order problems, and this can assist in the
preparation of police operations. Fourth, the ILP philosophy encourages police
organizations to take recourse to alternative means, such as early detection, inter-
ference, disturbance and the improvement of criminogenic environments. These
alternative means of intervention may weigh less heavily on the already overbur-
dened criminal justice system, because an interception of illegal goods, for
instance, may not always culminate in legal proceedings against a suspect. The
flipside of proactive intervention is however that it may be a challenge for law
enforcement organizations to demonstrate the effectiveness of their intervention,
for instance, in terms of choking off a profitable market for a criminal organiza-
tion. Statistics on the cost-effectiveness of proactive, intelligence-led operations
are generally hard to get, but those interventions may lead to a greater sense of
safety among citizens. Fifth, because of its rationality-based approach, ILP sup-
ports priority setting, which is seen as important from a managerial and
budgetary perspective, given the scarce capacities. Last but not least,
intelligence-led policing is facilitated by the vast possibilities offered by
information and communications technology. In sum, these arguments fold into
a rather convincing rhetoric which explains the attractiveness of the ILP model.
However, as we will see in more detail below, despite the popularity of ILP
in several European countries, there is also cultural and legal resistance to the
Intelligence-led policing in Europe 115
introduction of intelligence gathering for ordinary law enforcement purposes.
While ILP was originally introduced for the purposes of counter-terrorism, it has
already been stretched towards the control of organized crime, serious crime,
public order management, immigration and border control. This may imply a
whole series of practical and ethical consequences which often tend to be over-
looked. These consequences may range from privacy issues to the potential pro-
fessional misuse of intelligence, or the exploitation of intelligence for ordinary
criminal justice procedures. On a deeper level, ubiquitous intelligence to which
law enforcement organizations may have unlimited access causes fears related to
Bentham’s Panopticon: a surveillance society where citizens remain under the
constant gaze of law enforcement organizations (see e.g. Hoogenboom 1994;
Downloaded by [University of Florida] at 05:04 15 February 2017
Whitaker 1999). In some Western European societies such as Great Britain, this
is already a concern. Although widely used surveillance methods like CCTV and
automatic number plate recognition (ANPR) do not by themselves produce intel-
ligence products, the information may be used to compose intelligence pictures
on the transactions, movements, and numerous other activities of all citizens all
of the time.
Another reason for the introduction of ILP may well have been a failure of
information processing (Deukmedjian and De Lint 2007). At the international
level, Interpol regards the strategic analysis of information and intelligence as a
means to inform higher level decision-makers, provide early warning of threats,
and support senior decision-makers ‘in setting priorities to prepare their organi-
zations to deal with emerging issues’ which may imply the reallocation of
resources to different areas of crime.3
Within the United Kingdom, it was particularly the Kent County Constabu-
lary that was influential in spreading the concept of ILP. This came after the use
of intelligence-led policing in Northern Ireland, where the Royal Ulster Constab-
ulary (RUC) had been involved in a long-term anti-terrorism campaign against
the Irish Republican Army (IRA). Tilley (2003: 321) claims that there does not
seem to be a real philosophy behind the development of ILP, but one could argue
that it reflects an awareness within law enforcement circles that the policing of
criminal activities on the basis of intelligence seems more apt to modern times
as the world develops into a global society with a high frequency of transnational
transfers and transactions, as well as hyper-mobility, anonymity and fragmented
governance (Bekkers et al. 2006; Den Boer 2012). In addition, the concept of
ILP – even though there is confusion on the definition – has the potential to be
transplanted from one region to the other, as well as from one country or organ-
ization to the other.
For a theoretical grounding of ILP we must consult a variety of authors,
including Brodeur, Ratcliffe, Gill and Harfield. Ratcliffe (2008) advocates a defi-
nition of ILP which emphasizes the business and managerial aspects of data ana-
lysis and criminal intelligence. In this view ILP provides a decisional framework
118 M. den Boer
which facilitates the reduction of problems and crime, and which is based on
strategic management and effective enforcement strategies. The leading idea
behind this definition is the need to focus on the most prolific and serious offend-
ers and the ways in which information and intelligence can be used more ration-
ally, seeking to reduce human error, arbitrary decision-making, tunnel vision,
prejudice and lack of professionalism. In Ratcliffe’s view, the elementary com-
ponents of ILP are interpretation, influence and impact, which are interrelated
processes in the intelligence cycle, which tends to involve the collection of data
on the basis of certain objectives and specified issues, followed by validation
and assessment, interpretation, dissemination, and an impact assessment, leading
to a potential reformulation of objectives (Phillips 2008: 27).
Downloaded by [University of Florida] at 05:04 15 February 2017
Complex intelligence products are often not acted upon in terms of operational
policing. Meanwhile, police officers tend to rely mostly on their traditional
frames of understanding and thereby ignore the potential value of analytical
products (Cope 2004: 201).
Further down the intelligence-processing chain, decision-makers either reject or
accept intelligence for further use. Van den Hengst and Regterschot (2012: 23) add
Downloaded by [University of Florida] at 05:04 15 February 2017
duction of the real-time intelligence concept has also occurred at the international
level of policing. Interpol has established a Major Events Support Service to
facilitate the real-time exchange of messages and police data with member states
through its Command and Coordination Centre and Real-Time Analytical Intel-
ligence Database (RAID).5
United Kingdom
Following the integration of the European Crime Intelligence Model (ECIM),
every EU member state should now have a National Intelligence Model in place.
The UK pioneered this development. The National Intelligence Model (NIM)
was implemented by the forty-three police forces in England and Wales by 1
April 2004. The Code of Practice of the Association of Chief Police Officers
(ACPO) on the NIM, issued in 2005 by the Home Secretary under the Police
Reform Act 2002, provided a statutory basis for the introduction of a set of prin-
ciples. Hence, in the United Kingdom, the NIM became ‘the major vehicle for
conducting intelligence-led policing’ (Tilley 2003: 321), and was then further
developed by the National Criminal Intelligence Service (NCIS). In theory, the
NIM works by interconnecting different levels in the information and intelli-
gence hierarchy, ranging from local to national to international. Some critics
have argued that ‘NIM’ is a misnomer because it ‘does not, in and of itself, facil-
itate the acquisition, collation and management of intelligence’ (Harfield 2008:
2). Moreover, as Carter and Carter (2009: 312) have argued, the implementation
of NIM in the UK was held up because ‘many did not understand the concept’
and it could be interpreted in different ways (Ratcliffe (2010) refers to a similar
misunderstanding in the Australian context). Moreover, it required a reallocation
of resources – which always gives rise to tensions within organizations – as
every police force now needed an analytical capability (Carter and Carter 2009:
313). However, in comparison to the US, it was easier for the British police
service to adopt NIM, ‘having had a solid history of sophisticated law enforce-
ment intelligence’ (Carter and Carter 2009: 213) in relation to the Irish Repub-
lican Army.
The Netherlands
In the Netherlands, national drivers for change were ongoing discussions about
the restructuring of the police organization and its information exchange proc-
esses, the adoption of a new strategy which advocated the interconnection of
the global and local levels, and the arrival of new complex threats such as
cybercrime. In line with the British police forces, the Board of Chief Police
124 M. den Boer
Commissioners in the Netherlands adopted a Dutch National Intelligence Model
(NIM) in 2008 (Van den Hengst and Staffeleu 2012: 188). The implementation
of the NIM had to be fulfilled by the twenty-five regional police forces and the
national police agency, on the basis of a National Intelligence Agenda (NIA)
containing the priority subjects (Van den Hengst and Regterschot 2012: 24). The
main challenge was therefore to implement a form of standardization which – at
the same time – would correspond to the needs and practices of the individual
police forces. The Board of Chief Police Commissioners established a national
intelligence programme committee (Van den Hengst and Staffeleu 2012: 189) to
guide and support the police forces with the implementation of ILP. The pro-
cedure required that the national committee apply an incremental model, gradu-
Downloaded by [University of Florida] at 05:04 15 February 2017
ILP has met with unsympathetic attitudes, cultural resistance and low
morale among police officers who perform administrative tasks, because
they feel excluded from this policing task.
(Tilley 2003: 333)
[I]t is difficult to show evidence that the application of ILP leads to the
reduction of crime and criminal opportunities.9
uniquely well placed to establish among the police forces of the Member
States a common understanding of intelligence-led policing. Europol should
work with the Heads of National Units and the European Police College to
organize training which will encourage the adoption and use of Intelligence-
Led Policing as the common working method.
(House of Lords 2007–2008: point 76)
Notes
1 The author would like to thank the editors of this volume, and Paul Minnebo
(Europol) and Willy Bruggeman (Federal Police Council Belgium) for their thorough
Downloaded by [University of Florida] at 05:04 15 February 2017
and useful comments. Any omissions are the sole responsibility of the author.
2 See www.theiacp.org/PublicationsGuides/Projects/IntelligenceLedCommunityPolic-
ing/tabid/1006/Default.aspx (accessed 14 September 2012).
3 See www.interpol.int/INTERPOL-expertise/Intelligence-analysis (accessed 7 September
2012).
4 Europol Information Management: Products and Services. Online. Available: www.
mvr.gov.mk/Uploads/Europol%20Products%20and%20Services-Booklet.pdf
(accessed 14 September 2012).
5 See www.interpol.int/INTERPOL-expertise/Command-Coordination-Centre (accessed
14 September 2012).
6 ‘Wet van 21 juli 2007, houdende regels inzake de verwerking van politiegegevens
(Wet politiegegevens)’ [Law of 21 July 2007 Pertaining to the Rules on the Process-
ing of Police Data]. Online. Available: http://wetten.overheid.nl/BWBR0022463/
geldigheidsdatum_28–11–2012 (accessed 17 January 2013).
7 ‘Invoering van de politiewet, en aanpassing van overige wetten aan die wet (Invoer-
ings- en aanpassingswet Politiewet 201X)’ [Introduction of the Police Law and
Adaptation of Additional Laws to this Law (Introduction and Adaptation Legislation
Police Law 201X)], 30 August 2012. Online. Available: http://wetten.overheid.nl/
BWBR0031794/geldigheidsdatum_17–01–2013 (accessed 17 January 2013).
8 Concept Inrichtingsplan Nationale Politie [Draft Plan for the National Police], 25 June
2012. Online. Available: www.rijksoverheid.nl/documenten-en-publicaties/rapporten/
2012/06/25/inrichtingsplan-natinale-politie.html (accessed 17 September 2012).
9 However, see e.g. Bureau of Justice Assistance (2008) ‘Reducing Crime Through
Intelligence-led Policing’. Online. Available: www.bja.gov/Publications/Reducing
CrimeThroughILP.pdf (accessed 8 November 2012).
10 European Council (2010) ‘The Stockholm Programme – An Open and Secure Europe
Serving and Protecting Citizens’, 2010/C 115/01Par 4.1.
11 European Commission (2010) ‘The Internal Security Strategy in Action: Five Steps
Towards a More Secure Europe’, Communication from the Commission to the Euro-
pean Parliament and the Council, Brussels, 22.11.2010 COM (2010) 673 final. Online.
Available: http://ec.europa.eu/commission_2010–2014/malmstrom/archive/internal_
security_strategy_in_action_en.pdf (accessed 11 July 2012).
12 House of Lords Select Committee on European Union, 29th Report, 2007–2008. Online.
Available: www.publications.parliament.uk/pa/ld200708/ldselect/ldeucom/183/18307.
htm (accessed 11 July 2012).
13 Ibid., point 29.
14 Ibid., point 82.
130 M. den Boer
Bibliography
Bayer, M. (2010) The Blue Planet. Informal International Police Networks and National
Intelligence, Washington, DC: National Defense Intelligence College.
Bekkers, V., Van Sluis, A. and Siep, P. (2006) De Nodale Oriëntatie van de Nederlandse
Politie: Over Criminaliteitsbestrijding in de Nederlandse netwerksamenleving. Bouws-
tenen voor een beleidstheorie, Rotterdam: Public Innovation/Erasmus Universiteit.
Online. Available: www.politieenwetenschap.nl/pdf/nodale_orientatie.pdf (accessed 20
December 2012).
Brodeur, J-P. (2007) ‘High and Low Policing in Post 9/11 Times’, Policing: A Journal of
Policy and Practice, 1: 25–37.
Brodeur, J-P. and Leman-Langlois, S. (2003) ‘Surveillance-fiction or Higher Policing?’,
Downloaded by [University of Florida] at 05:04 15 February 2017
–––– (2007) ‘High Policing in the Security Control Society’, Policing. A Journal of
Policy and Practice, 1: 70–79.
Stenning, P. (2000) ‘Powers and Accountability of Private Police’, European Journal on
Criminal Policy and Research, 8: 325–352.
Tilley, N. (2003; reprinted 2005) ‘Community Policing, Problem-oriented Policing and
Intelligence-led Policing’, in T. Newburn (ed.), The Handbook of Policing, Cullomp-
ton, Devon: Willan Publishing.
Van den Hengst, M. and Regterschot, H. (2012) ‘Intelligence gestuurd politiewerk: een
maturity model’, Het Tijdschrift voor de Politie, 74: 23–27.
Van den Hengst, M. and Staffeleu, E. (2012) ‘Different Information Organizations to
Produce the Same High Quality Intelligence: An Overview of the Police Forces in the
Netherlands’, Policing: A Journal of Policy and Practice, 6: 187–193.
Van Mantgem, J. van, Grapendaal, M. and Van der Wel, M.A. (2012) ‘De CSV-manager
4.2: waar strategisch en tactisch elkaar ontmoeten’, Het Tijdschrift voor de Politie, 74:
23–26.
Villasenor, J. (2011) ‘Recording Everything: Digital Storage as an Enabler of Authorit-
arian Governments’, Governance Studies, Center for Technology Innovation, The
Brookings Institution. Online. Available: www.brookings.edu/~/media/research/files/
papers/2011/12/14%20digital%20storage%20villasenor/1214_digital_storage_villase-
nor.pdf (accessed 20 December 2012).
Vis, T. (2012), Intelligence, politie en veiligheidsdienst: verenigbare grootheden?,
Tilburg: Universiteit van Tilburg.
Walker, N. (2003; reprinted 2005) ‘The Pattern of Transnational Policing’, in T. Newburn
(ed.), The Handbook of Policing, Collompton, Devon: Willan Publishing.
Whitaker, R. (1999) The End of Privacy. How Total Surveillance is Becoming a Reality,
New York: The New Press.
10 The next 100 years?
Reflections on the future of
intelligence
Wilhelm Agrell
Downloaded by [University of Florida] at 05:04 15 February 2017
century intelligence was in many European countries focused on the national and
international threat from anarchistic terrorism, just as early twenty-first-century
intelligence has focused on the threat from international terrorism.
So, if the perception of twenty-first-century intelligence as simply a continu-
ing gradual process of adaptation and modernization would end up as a rather
poor one, so would probably the corresponding concept of ‘the end of intelli-
gence’, as mirrored in the brief debate in the 1990s over institutions without a
mission and the need for survival strategies in terms of redefinition and reorien-
tation. Intelligence will inevitably transform; the question is which factors will
determine this transformation. But at the same time, the factors of change also
change over time. If we look at technology, this transformation of the dynamics
of change may be observed. In the nineteenth century new technology was the
product of invention, engineering and industrial entrepreneurship. In the course
of the twentieth century, new technology became the output of massive commer-
cial, national and eventually multinational research and development efforts. So
while the dynamics and social impact of new technology continue, the institu-
tions and procedures behind the innovations have changed completely.
A number of fundamental driving factors may be identified behind the estab-
lishment and transformation of intelligence in the twentieth century, which does
not necessary imply that no other factors or circumstances have been relevant.
However, there are at least five factors that run through the whole period and cut
across the various national experiences:
to turn up a document from early 1905, where funding was provided for the
establishment of a network for secret intelligence collection led by two junior
officers (Frick and Rossander 2004). The reason for this invention was obvious,
and so was the target: Norway. The unequal union between the two Scandin-
avian countries was coming apart through a process of mutual nationalism, and
the former brothers were transforming into enemies in a destructive and all too
well-known process of polarization.
As it turned out, war on the Scandinavian peninsula was averted at the brink and
secession was accomplished without bloodshed. But Swedish military intelligence
continued to exist, though no longer directed at a secessionist threat. This pattern
seems to be common, and illustrates one of the basic dynamics of intelligence
organizations, whether as independent institutions, as a department or merely as a
function carried out within a bureaucracy or organization. Once intelligence has
been ‘invented’ in fiscal or organizational terms it seems that it is seldom ‘unin-
vented’, as new needs always tend to appear on the horizon. Swedish military intel-
ligence turned from Norway to the rising threat from the Russian Baltic Fleet,
replaced in the 1920s by the perceived threat of Bolshevik subversion, followed by
Stalin’s rearmament and expansion towards Finland and the Baltic States, German
expansion in Scandinavia during the Second World War, the post-war re-
establishment of the Baltic Fleet, the gradual Cold War expansion of the Soviet
capability for amphibious warfare, the post-Cold War Russian transfer of offensive
resources from the Central Front towards the flanks following the withdrawal from
united Germany, the continued strategic instability posed by the Kaliningrad
enclave and the security implications of the underwater pipeline being built by
Russian Gazprom through the Baltic. There is nearly always a need to know,
although the exact focus of that need may change, and then change back again.
The evolution of the means of warfare was perhaps the most powerful
dynamic factor affecting the conduct of intelligence until the end of the Cold
War. Intelligence grew into large structures with thousands or tens of thousands
of employees and innumerable agents, subcontractors or assets, not primarily
due to bureaucratic momentum, which set in later, but originally to meet the
demand for intelligence from new means of warfare that certainly resorted to, or
was preparing to resort to, the employment of destructive force. Intelligence was
in itself not decisive, but in combination with a military potential it was, as
138 W. Agrell
underlined by Keegan in one of his later works (Keegan 2003).2 But intelligence
itself also became dependent on an ever-increasing flow of raw information, data
banks and continuously updated assessments. We can certainly discuss the actual
impact of intelligence on the subsequent events or non-events, from Magic (US),
Ultra (UK) and G-Schreiber (Sweden), to the massive efforts of Cold War intel-
ligence and counter-intelligence. ‘Did intelligence matter?’ (Herman et al. 2006)
is a highly relevant question, but it is perhaps less relevant for the development
of the structures and patterns, the very idea of intelligence as something vital to
national and international security. Here the perception of intelligence seems to
have been more important than the actual direct or indirect impact.
However, without this massive demand-pull from the process of militariza-
Downloaded by [University of Florida] at 05:04 15 February 2017
tion and focus on national security, it is hard to see how the establishment of
twentieth-century intelligence within the realm of national security would have
come about. And just as in the field of research and development of new tech-
nologies and systems, the pattern set by the military applications was transferred
to other fields, and thus created other intelligence needs (Treverton 2009).
duction or rather creation of institutional and social ignorance,4 defined here not
as the conscious lack of knowledge but the flawed perception of knowing, while
in fact not knowing, or comprehending. If intelligence, in the words of Francis
Bacon, could be regarded as the ‘light of the state’, then the main hazard is
perhaps not darkness but the misconception that the illuminated spot around the
lamppost constitutes the world.5
The conduct of intelligence in terms of the technological basis, collection
ability and focus changed dramatically during the twentieth century. What did
not change in a corresponding way was the underlying theory of cognition, the
idea that in the end intelligence is about facts, about the ‘real’ world, and that
this will be revealed more or less by itself through a linear and to an increasing
extent industrialized knowledge production system (Herman 1996: 305–338).
Perhaps because of this conviction, and the immense expansion of intelligence
collection and use (and misuse) of technology as the universal solution to almost
every upcoming intelligence task or problem, analysis has remained a small and
sometimes insignificant bypass link in the huge intelligence machinery. Analysis
has not only been diminutive in terms of staff and financial resources, it has also,
due to the design of the intelligence cycle and its assumed rationality, been
assigned a reactive role, often far down the intelligence assembly line (George
and Bruce 2008; Marrin 2009; Agrell 2009; Charters et al. 1996).
As a consequence, analysis has not developed in a way similar to collection.
In certain fields it could be argued that analysis has not developed at all or even
moved backwards under the pressure from mass collection and mass dissemina-
tion. There has been only limited and scattered development of the field since
the publication of Sherman Kent’s classical book on strategic intelligence in
1949 (Kent 1949). Kent argued for the introduction of scientific methods in
intelligence, not only to comprehend specific problems and fields but to make
verifiable assessments. The non-development of a scientific approach to an array
of analytic problems is a striking feature of twentieth-century intelligence; there
is not only an ‘under-theorization’ in the study of intelligence and the impact of
intelligence on international relations, as Christopher Andrew observes (Andrew
2004), but also a crucial under-theorization in intelligence itself (Johnston 2005).
Looking ahead, it is hard to see how this unsatisfactory state of the art
can continue for any prolonged period of time. This underdevelopment or
The future of intelligence: reflections 143
under-theorization thus constitutes an area with the most obvious growing poten-
tial for change. Sooner or later a process is bound to start, similar to the one
familiar in most research fields, with an explicit and visible interest in methodo-
logical development, the establishment of a methodologically relevant literature
and a theoretical discourse.
An intellectual process of this kind may in itself become a factor changing
not only the concepts and intellectual perspective of intelligence analysis, but
also affecting the wider intelligence culture and thus in the end the way intelli-
gence is organized, employed and regarded. It is hard to see how a serious focus
on methodological issues could be accomplished within the framework of the
traditional closed twentieth-century intelligence organizations. Thus, structures
Downloaded by [University of Florida] at 05:04 15 February 2017
may change and the walls of secrecy slowly crumble, not necessarily because of
an open source revolution or the growth of public demand for transparency, but
because of the need for future intelligence systems to be able to supply reliable
and above all verifiable assessments.
Like scientific research, intelligence analysis is about uncertainty. The simil-
arities are sometimes striking and it may be argued that there is a process of con-
vergence where intelligence analysis increasingly relies not only on scientific
output and competence but also on borrowed or transformed methods, applied to
specific intelligence problems. This also illustrates the other side of the conver-
gence; with an increasing role for science in early warning, prediction and pre-
scription over a wide range of political issues, science and research organizations
are, with all the well-known problems from the intelligence field, becoming
intelligence oriented, a process constituting a vital element in what may be called
a social intelligence revolution, the emergence of intelligence-based societies or,
if not that, then at least intelligence-demanding ones.
Notes
1 One prominent example of the over-simplification of cases is the Israeli intelligence
failure prior to the Yom Kippur or October War 1973, often referred to as the para-
mount example of cognitive traps and groupthink in intelligence analysis. This inter-
pretation rested on the account of the Agranat Commission published in 1974, which
for security reasons withheld the role of possibly the most important Israeli intelligence
asset at the time, the Egyptian official Ashraf Marwan. Yom Kippur remains an
important historical case, but perhaps in a slightly different way than originally per-
ceived. See Bar-Joseph (2005).
146 W. Agrell
2 Keegan quotes David Kahn’s assessment that all the code-breaking efforts of Poland
prior to the outbreak of the Second World War in 1939 came to nothing, as intelligence
can only work through strength (Kahn 1991: 91).
3 A recent example of this is the effort of the Swedish government to give the signals
intelligence service access to communications to and from the country through the
fibre-optic cables (they had tapped a considerable amount of cables and satellite links
before with secret approval or silent consent from the government). First presented in
2005, the proposed bill stated that the existing intelligence oversight body could handle
the approval. When the bill was finally put before Parliament in 2008, a new inde-
pendent approval body was suggested and a few months later the government agreed to
this in the face of fierce public and parliamentary pressure as well as pressure from
within the ruling alliance. It proposed a new independent intelligence court to decide if
permission was to be granted for specific Comint operations.
Downloaded by [University of Florida] at 05:04 15 February 2017
Bibliography
Agrell, W. (2009) ‘Intelligence analysis after the Cold War: New paradigms or old anom-
alies?’, in G. Treverton and W. Agrell (eds), National Intelligence Systems: Current
Research and Future Prospects, Cambridge: Cambridge University Press.
Aid, M. (2009) The Secret Sentry: The Untold History of the National Security Agency,
New York: Bloomsbury Press.
Aldrich, R.J. (2001) The Hidden Hand: Britain, America and Cold War Secret Intelli-
gence, London: John Murray.
Andrew, C. (2004) ‘Intelligence, international relations and “under-theorisation” ’, in L.V.
Scott and P. Jackson, Understanding Intelligence in the Twenty-first Century, London:
Routledge.
–––– (2009) The Defence of the Realm. The Authorized History of MI5, London: Allen
Lane.
Bar-Joseph, U. (2005) The Watchman Fell Asleep: The Surprise of Yom Kippur and its
Sources, New York: State University of New York Press.
Betts, R.K. (1982) Surprise Attack: Lessons for Defense Planning, Washington, DC:
Brookings Institution.
–––– (2007) Enemies of Intelligence. Knowledge & Power in American National Security,
New York: Columbia University Press.
Born, H., Johnson L.K. and Leigh, D. (eds) (2005) Who’s Watching the Spies? Establish-
ing Intelligence Accountability, Washington, DC: Potomac Books.
Charters, D.A., Farson, S.A. and Hastedt, G.P. (eds) (1995) ‘Special Issue on Intelligence
Analysis and Assessment’, Intelligence and National Security,10.
–––– (eds) (1996) Intelligence Analysis and Assessment, London: Frank Cass.
Davidsen-Nielsen, H. (2008) Spionernes krig. Historien om Forsvarets Efterretningstjen-
ste [The War of the Spies. The History of the Defence Intelligence Service], Copen-
hagen: Politikens Forlag.
The future of intelligence: reflections 147
Dedijer, S. (1983) ‘The Rainbow Scheme: British Secret Service and Pax Britannica’, in
Wilhelm Agrell and Bo Huldt (eds), Clio goes Spying: Eight Essays on the History of
Intelligence, Lund: Lund Studies in International History.
Frick, L.W. and Rossander, L. (2004) Bakom hemligstämpeln [Behind Classified Secret],
Lund: Historiska Media.
George, R.Z. and Bruce, J.B. (eds) (2008) Analyzing Intelligence: Origins, Obstacles and
Innovations, Washington, DC: Georgetown University Press.
Goodman, A.E. (1996) ‘The future of US intelligence’, Intelligence and National
Security, 11: 645–656.
Herman, M. (1996) Intelligence Power in Peace and War, Cambridge: Cambridge Uni-
versity Press.
Downloaded by [University of Florida] at 05:04 15 February 2017
Herman, M., McDonald, J.K. and Mastny, V. (2006) Did Intelligence Matter in the Cold
War?, Oslo: Instutt for Forsvarsstudier.
Hutchinson, R. (2007) Elisabeth’s Spy Master: Francis Walsingham and the Secret War
that Saved England, London: Phoenix.
Johnson, C. (1966) Revolutionary Change, Boston, MA: Little, Brown and Company.
Johnston, R. (2005) The Analytic Culture of the U.S. Intelligence Community, Washing-
ton, DC: Central Intelligence Agency.
Jones, R.V. (1979) Most Secret War: British Scientific Intelligence 1939–1945, London:
Coronet Books.
Kahn, D. (1991) Seizing the Enigma, Boston, MA: Houghton Mifflin.
Kam, E. (1988) Surprise Attack: The Victims’ Perspective, Cambridge, MA: Harvard
University Press.
Keegan, J. (1998) The Face of Battle: A Study of Agincourt, Waterloo and the Somme,
London: Pimlico.
–––– (2003) Intelligence in War: Knowledge of the Enemy from Napoleon to Al-Qaeda,
London: Hutchinson.
Kent, S. (1949) Strategic Intelligence for American World Policy, Princeton, NJ:
Princeton University Press.
Marrin, S. (2009) ‘Intelligence analysis and decision-making: Methodological chal-
lenges’, in P. Gill, S. Marrin and M. Phythian, Intelligence Theory: Key Questions and
Debates, New York: Routledge.
Naimark, N.M. (1995) The Russians in Germany: A History of the Soviet Zone of Occu-
pation, 1945–1949, Cambridge, MA: Harvard University Press.
Proctor, R. and Schiebinger, L. (eds) (2008) Agnotology: The Making and Unmaking of
Ignorance, Stanford, CA: Stanford University Press.
Pryser, T. (1999) ‘From Petsamo to Venona’, Scandinavian Journal of History, 24:
75–89.
Rentola, K. (2009) ‘Suojelupoliisi kylmässä sodassa’ [The Security Police in the Cold
War], in M. Simola (ed.), Ratakatu 12, Suojelupoliisi 1949–2009 [Ratakatu 12, The
Security Police 1949–2009], Helsinki: WSOY.
Richelson, J.T. (1995) A Century of Spies. Intelligence in the Twentieth Century, Cam-
bridge: Cambridge University Press.
Sheptycki, J. (2009) ‘Policing, intelligence theory and the new human security paradigm:
Some lessons from the field’, in P. Gill, S. Marrin and M. Phythian (eds), Intelligence
Theory: Key Questions and Debates, London: Routledge.
Steele, R.D. (2000) On Intelligence: Spies and Secrecy in an Open World, Fairfax:
AFCEA International Press.
148 W. Agrell
Treverton, G.F. (2001) Reshaping National Intelligence for an Age of Information, Cam-
bridge: Cambridge University Press.
–––– (2009) Intelligence for an Age of Terror, Cambridge: Cambridge University Press.
Weiner, T. (2007) Legacy of Ashes: The History of the CIA, New York: Doubleday.
Whaley, B. (1973) Codeword Barbarossa, Cambridge, MA: The MIT Press.
Wohlstetter, R. (1962) Pearl Harbor: Warning and Decision, Stanford, CA: Stanford
University Press.
Downloaded by [University of Florida] at 05:04 15 February 2017
11 Conclusions
It may be 10 September 2001 today
George Dimitriu and Isabelle Duyvesteyn
Downloaded by [University of Florida] at 05:04 15 February 2017
Introduction
True intelligence is about the future and what is likely to happen in the time ahead
(Clark 2007: 172). The security situation in Western societies has changed signif-
icantly since the collapse of the Soviet Union. There is no longer a single and
clearly visible enemy threatening Western security. Nowadays intelligence com-
munities are confronted with the combined threat of terrorists, insurgents, organ-
ized criminals, proliferators, hacktivists, as well as state actors or their proxies.
Furthermore, as David Omand has pointed out in Chapter 2, globalization, the
revolution in the communications domain and other technological developments
have impacted upon the work of intelligence agencies as any other sector of
society, and will continue to do so in the foreseeable future.
In 1985 Walter Laqueur, looking ahead at the future of intelligence services,
noted that the public had mixed feelings. During crises and war the public would
call for the strengthening of these agencies, while in relatively peaceful times an
aversion against intelligence grew. During the 1970s and 1980s, public debates
in the US took place on subjects such as intelligence leaks, the ethics of certain
collection methods, the role of intelligence in the Vietnam War and covert action
in foreign policy. In the end, Laqueur concluded, congressional investigations,
adverse publicity, and extracted or volunteered revelations led to a decline in the
level of effectiveness of intelligence activity.
With regard to the future, Laqueur emphasized the need for more training and
education, not only for the intelligence professionals but – more importantly –
also for intelligence consumers (Laqueur 1985). US intelligence historian David
Kahn would echo these words in 2001 in his assessments of the future of intelli-
gence. A fundamental challenge would remain in the future: How to get states-
men and generals to accept information that they do not like (Kahn 2001, 2009).
Kahn therefore reasoned that in order to fully realize their potential, future intel-
ligence agencies needed to improve their assessments and become more con-
vincing for leaders to accept their reports.
The contributors to this volume have followed in Laqueur’s and Kahn’s foot-
steps and attempted a comprehensive overview of the future of intelligence. While
choices in the past have bound intelligence agencies to a certain path dependency,
150 G. Dimitriu and I. Duyvesteyn
the situation now, as Wilhelm Agrell recognizes in Chapter 10 (this volume),
demands that intelligence agencies can no longer extend and extrapolate from
previous trends and will have to engage in more out-of-the-box reasoning.
Conceptualizing intelligence
To discuss intelligence, we need to have a common understanding of what intel-
ligence is. Many have wondered why a business so old and important in state
affairs as intelligence still lacks an accepted definition or a solid theoretical
basis. Motivated by the need to develop theories about how intelligence works,
attempts have been made to define the term (Warner 2011), but what compli-
Downloaded by [University of Florida] at 05:04 15 February 2017
Technological developments
Technological developments have an impact on society at large, on the state, and
on conceptions of power. As we will show below, technology enhances certain
aspects of intelligence while on the other hand restricting it, and it has a similar
impact on the intelligence services’ opponents, whether they be state or non-state
actors.
As several authors in this volume argue, the communication revolution is one
of the most important factors that shape the future role of intelligence. New
media and the internet have created a new virtual battlefield for insurgents and
terrorists to engage adversaries and reach audiences. With the empowerment of
152 G. Dimitriu and I. Duyvesteyn
the individual, everyone can now write news reports and instantly disseminate
them worldwide. Whereas in the past states and media corporations controlled the
distribution of reports, citizens now make their own news. Terrorists, insurgents
and ordinary civilians are no longer passive consumers of information; they are
news-makers as well. All have the potential to find supporters, to inform, manipu-
late and mobilize (Kurth Cronin 2006; Weimann 2006: 64–91, 110).
The revolution in the communication domain enables not only active citizen-
ship but also leads to a shifting security threat. The internet offers a means for
terrorists from different parts of the world to gather and plan terrorist attacks
online, in a virtual world which is not easily penetrated by intelligence services.
Moreover, so-called lone wolves can radicalize in the virtual domain without any
Downloaded by [University of Florida] at 05:04 15 February 2017
ished; we are just in the midst of a communication revolution and the pace of
developments is increasing exponentially. Technological developments not only
influence the intelligence services, they also impact upon the environment in
which intelligence operates.
The paradox is, however, that when people feel safe, they tend to be less con-
cerned about the state of intelligence services. In relatively peaceful times, the
incentive for further investments fades away and governments can easily carry
out budget cuts. When crises occur, citizens will again call for a greater intelli-
gence effort, while at the same time paying less attention to moral values and
feeling fewer scruples about the means used by intelligence services (Ruttenberg
2001; Alter 2001; Dershowitz 2002: 131–164). These often changing demands
do not make it easier for intelligence services to function to the satisfaction of
the general public.
In sum, the Western public expresses a latent aversion for intelligence and
conflict, but demands a delicate balance to cope with the dangers of ‘risk society’
(Beck 1992, 2008). Many of the authors in this volume agree that the influence of
the public on intelligence is most likely to increase. Intelligence services will
have to deal with mounting public pressure for accountability, transparency and
oversight. Intelligence has an increasingly sceptical public, suspicious of develop-
ments in surveillance, data mining and monitoring, especially after revelations
about torture, drone attacks and renditions. Problems related to these develop-
ments cannot be solely ascribed to intelligence services because in the last resort
it is politicians and not intelligence agencies who are to blame for these practices.
However, this does not change popular perceptions. In the end, the perceived
practices of intelligence may bring such negative connotations that policy-makers
may feel the need to change its name, as hinted by Agrell. This is what happened,
for instance, with the term Psychological Operations (PSYOP), which was
changed, due to its negative connotations, to Military Information Support to
Operations (MISO) by the US in 2010 (Csrnko 2010; Exum 2010: 219).
As several authors in this volume argue, developments in technology and
society have resulted in a stronger and more influential public voice and a partly
value-driven, partly interest-driven opinion about intelligence. Furthermore, as
den Boer points out (Chapter 9), borders become less relevant, globalization
continues, and intelligence no longer merely belongs to the realm of the state but
becomes expropriated by its citizens. The services’ primary consumers are those
who hold power. It is also up to these decision-makers to explain the necessity
and importance of intelligence to the public and to stimulate and contribute to
the debate on the balance between collective security and individual liberty.
Conclusions 155
Policy-makers have an important responsibility for shaping public opinion to
create resilience and influence people’s subjective security perceptions. While
intelligence services need to educate the policy-makers and politicians, it is up to
those in power to educate society.
nisms (van der Meer 2009). Western politics, as Jelle van Buuren observes
(Chapter 7), have also developed a system of multi-level, multi-centred security
governance. Multi-level governance is characterized by the sharing of power
across multiple levels. Power is no longer solely concentrated in state actors, but
in different semi-state and non-state actors as well. Furthermore, multi-level
governance means a more equal power distribution between different tiers of
governance, while at the same time relations are increasingly determined through
networks (van den Berg and Toonen 2007). In Manuel Castells’ view (2009), a
network society can be characterized as an open, highly dynamic and innovative
social system without a centre of gravity, but operating as a connection of differ-
ent nodes of power communicating with each other through common codes and
values. Ongoing globalization and the further development of the network
society will lead to an increased blurring of the distinction between intelligence
and domains such as policing, armed forces, private intelligence companies,
international intelligence communities of intergovernmental organizations such
as NATO and the EU, and policy-makers. This may raise concerns about
accountability, responsibility and power distribution, and lead to questions by
intelligence services about their mission, vision and purpose. These issues will
be dealt with in turn.
First, the distinction between domestic and external threats has faded. Terror-
ists, insurgents and cyber activists can wreak havoc on the lives of Western
citizens while based abroad, a reason why Omand, van Buuren and Agrell
foresee an increasingly artificial separation between domestic and foreign intelli-
gence. Law enforcement, police, domestic security and foreign intelligence will
have to work together. As Monica den Boer convincingly argues, intelligence-
led policing (ILP), originally introduced for the purpose of counter-terrorism,
has already been applied in other fields such as the fight against organized crime,
public order management, immigration and border control.
Second, the development of multi-layered governance has led to a further dif-
fusion of power, as well as the growth of horizontal (different disciplines) and
vertical (different tiers and levels) intelligence networks. We can think here of
intelligence networks of intergovernmental organizations such as the UN, NATO
and the EU. Furthermore, van Buuren notes the closer connections between
private security companies and intelligence services, which blur the distinction
156 G. Dimitriu and I. Duyvesteyn
between what is public and what is private in the world of intelligence. Trever-
ton even discusses the idea of involving citizens voluntarily as amateur analysts
in the intelligence process.
Third, another increasingly fuzzy distinction is that between intelligence and
the use of armed force. Currently, the communication from ‘sensor to shooter’
occurs within seconds. A striking example is the positive identification and
fixing of a target by a UAV with the help of signals and imagery intelligence,
and the subsequent release of a Hellfire missile from the same platform. The
military is now increasingly involved in counter-terrorism tasks. According to
Arthur Hulnick, the cooperation between Special Operations Forces (SOF ) and
intelligence services has become an essential element in the US counter-
Downloaded by [University of Florida] at 05:04 15 February 2017
terrorism campaign since 9/11. This also shows clearly in recent reports, which
indicate that the US Defense Intelligence Agency (DIA) has forged a tight rela-
tionship with the SOF community. Admiral William McRaven, Commander of
US Special Operations Command, has called for increased cooperation between
SOF and intelligence operatives (Miller 2012).
What are the implications of these developments for the future of intelli-
gence? First of all, and most importantly, multi-level networked states and the
accompanying blurring of distinctions between activities and responsibilities on
different levels will significantly challenge oversight and accountability arrange-
ments. As den Boer argues, this leads to transnational intelligence clouds in
which ownership of intelligence can no longer be easily identified. Moreover, it
may be unclear for which actors intelligence services are actually working. Who
is accountable for unsavoury practices when the collection of intelligence has
been outsourced to different private subcontractors? Proxy services are not
always easily controlled, but their activities often reflect heavily on those whom
they serve (Dimitriu 2013). At the international level similar problems occur.
Björn Fägersten (Chapter 8) argues that international cooperation may lead to
unintentionally embarrassing situations, of which the exposure of British–Libyan
intelligence cooperation following the ousting of Muammar Gaddafi is a typical
example.
Second, as most of the authors note, the shift to a network society will have a
strong impact on how Western societies will view intelligence organizations,
structures and institutions. Intelligence production will no longer be the playing
field solely of intelligence services, but will, as den Boer observes, be increas-
ingly provided by a variety of private, public, collective and commercial agents.
New intelligence cooperation initiatives at supranational levels will alter long-
established institutions such as the ‘quid pro quo’ adage, while at the same time
communities of interest and multilateral working relationships may come and
go. While the hybridization of intelligence networks and multi-disciplinary intel-
ligence sharing may have some positive impact on the future of intelligence,
such as increased output and effectiveness, Fägersten doubts whether the future
will only bring more cooperation. He foresees more fragmented cooperation,
such as ‘coalitions of the willing’. This makes sense, as equal cooperation
requires a balance in investments, a high level of trust, the will to share sensitive
Conclusions 157
intelligence and a somewhat common idea of future threats. What if the eco-
nomic divide between Northern and Southern Europe widens? As Sims notes,
when competition between states increases in intensity and perceptions of threats
rise, incentives to withhold information will also grow. In sum, as Bob de Graaff
warns in the Introduction, increased international collaboration and the rise of
networks may not be a panacea for the improvement of future intelligence. The
internationalization and blurring of intelligence will undoubtedly challenge the
sovereignty of Western states.
Questions of power
Downloaded by [University of Florida] at 05:04 15 February 2017
services that present intelligence which governments then act upon (Gill 2005:
12–33). But with the ‘politicization’ of intelligence, the knowledge–power role
is reversed. The will to act by policy-makers precedes the delivery of knowledge
by intelligence services. The information delivered by intelligence services will
be judged according to its ability to support the desired actions. An often quoted
example of this is the ‘cherry picking’ of policy-makers in the US and the UK
relating to intelligence on weapons of mass destruction prior to the invasion of
Iraq in 2003 (Morrison 2011). This subjective use of intelligence can tempor-
arily empower governments but ultimately misleads the public. Of course, there
are various possible relationships between knowledge and power, this being only
a negative example.
Changes in the concepts of power will likely have their impact on the future
development of intelligence services. The further blurring of borders between
power and intelligence may be one of the consequences. It is increasingly
unclear which actors actually possess power and how power is distributed. Ulti-
mately, fragmented and diffused power will impact on the ability of policy-
makers to formulate preferred policy outcomes and, as a consequence, to
optimize strategies, convert resources and direct intelligence.
Conclusions
When Walter Laqueur (1985) wrote about the future of intelligence almost three
decades ago, he advocated a reorientation of its focus. In those days, Laqueur
opined that there was an overemphasis on military-strategic intelligence, instead
of a focus on political-strategic and economic intelligence. In the context of the
Cold War this was probably logical. Laqueur’s vision of the reorientation of
intelligence has not been heeded. Agrell foresees the rise of new fields of know-
ledge in the future, but at this moment policy-makers mainly demand actionable
or military-tactical intelligence. This is, as Omand observes, a preference which
seems to show continuity with what Laqueur noted thirty years ago.
One is reminded again of Laqueur’s statement of three decades ago on the
brittle relationship between society and intelligence. A delicate balance is
required between the growing aversion of the public, at least in Western soci-
eties, against torture and the use of force and violations of the private sphere on
Conclusions 159
the one hand, and the demand for personal security and protection against ter-
rorism on the other. In the future this popular opinion will probably increase in
strength, while at the same time a steady number of almost real-time images of
the use of armed force and consequences of sometimes unsavoury intelligence
practices will enter everyone’s living-room. Therefore, as the authors in this
volume argue, intelligence services in Western democracies can expect mount-
ing public pressure for accountability, transparency and democratic oversight in
the years to come.
In Western democracies, there is a constant need for those who hold power to
explain the role and necessity of intelligence services to the public. This will
become increasingly important. Official communication on the role of intelli-
Downloaded by [University of Florida] at 05:04 15 February 2017
gence services, however, has to compete with media which seek dramatic and
newsworthy stories lacking any responsibility for balance (Stimson 2004). More-
over, changing ideas of power and the blurring of borders between intelligence
and power could lead to a highly ambiguous role for intelligence. The role of
intelligence services to interpret the world for policy-makers could, for instance,
lead to a temptation to shape public perceptions about those services.
To conclude: the distribution of power will become increasingly diffuse, as
Western states are turning increasingly into network societies and becoming
characterized by multi-level governance, which will impact on intelligence.
Once an exclusive tradecraft of civil servants and the military, intelligence will
increasingly become a playing field of different public and private organizations,
international networks as well as ordinary people. This will seriously challenge
proper oversight and accountability. Attention should be paid to what intelli-
gence is in essence about. Intelligence does not exist just for its own sake, but
always serves another purpose. It enables optimal use of resources and serves
policy-makers in their process of deciding which way to go in war and peace.
For these same reasons, intelligence will probably continue to play an important
role in the foreseeable future. In spite of all far-reaching changes in recent
decades, an observation made by Laqueur almost three decades ago still holds
true today:
Bibliography
Alter, Jonathan (2001) ‘Time to Think About Torture’, Newsweek, 5 November.
Beck, Ulrich (1992) Risk Society, Towards a new Modernity, London: Sage Publications.
–––– (2008) World at Risk, Cambridge: Polity Press.
160 G. Dimitriu and I. Duyvesteyn
Berg, Caspar F. van den and Toonen, Theo A.J. (2007) ‘National Civil Service Systems
and the Implications of Multi-level Governance: Weberianism Revisited?’, in Jos C.N.
Raadschelders, Theo A.J. Toonen and Frits M. van Der Meer (eds), The Civil Service
in the 21st Century, Comparative Perspectives, New York: Palgrave Macmillan, pp.
103–120.
Berinsky, Adam J. (2009) In Time of War, Understanding American Public Opinion from
World War II to Iraq, Chicago, IL: University of Chicago Press.
Castells, Manuel (2009) The Rise of the Network Society: The Information Age: Economy,
Society, and Culture, Malden, MA: Wiley-Blackwell.
Central Intelligence Agency: Office of Public Affairs (1999) A Consumer’s Guide to
Intelligence: Gaining Knowledge and Foreknowledge of the World Around Us, Wash-
ington, DC: Central Intelligence Agency.
Downloaded by [University of Florida] at 05:04 15 February 2017
accountability 9, 10, 15, 16, 22, 48, 80, 90, classical political economy 57
153 coding unit 86–7
accounting 5–17, 26–7, 31, 37, 39, 41, 45, coefficient 129–31, 134–9, 143–4, 148
48–9, 51, 53, 55, 57–9, 61, 66, 74, 76, collinearity 129–30, 143
80–1, 86, 90–1, 94, 96, 101, 107, 126, community 10, 17–18, 22, 28, 36, 44–6,
140, 150 61, 99, 109, 118, 122
agency theory 39–42, 94 conflict 40–1, 47, 57, 70, 76, 79
agenda 28 Confucianism 61
anti-corruption 124 constituent 40, 42, 47, 53–4
Asian 1, 29, 37 constructionism 75
association 19, 23–5, 30, 34, 36, 48, consumer visibility 20, 67–8, 72, 84, 103,
65–72, 109, 119, 123, 130–3, 144–9 132
assurance 4, 153 content analysis 5–6, 11, 20, 23–4, 36–7,
auditor 30, 64, 66–7, 99, 101, 109, 132, 80–90, 93, 95–6, 105, 150, 153
140, 153 context disclosure 96–8, 110
continuous scales 97, 100
belief systems 46 control variables 102, 104, 143, 145–7
benchmark 83, 89, 96–7, 107, 111, 138 corporate characteristics 5, 7, 30, 37, 48,
Big Four 66, 101, 141, 153 59–60, 64, 66–7, 69, 72–3, 100–3, 128,
bivariate 143, 146 132, 140, 142–4, 146–7, 149, 152, 154
board committee 70–3, 104, 142–3, 146 corporate citizen 53, 133
board composition 32–5 corporate governance 5, 7–8, 28, 32–6, 55,
board of directors 70, 143 68–73, 82, 102, 142, 146, 149, 152
board ownership 70–3, 104, 142–3, 146 corporate reputation 6–7, 26–8, 33–7,
board size 34–6, 70–3, 104, 142–3, 146 52–9, 63, 68–72, 82, 102, 104, 142,
bourgeois political economy 57–8 146–9
business ethics 55, 62 corporate websites 18, 24, 85
correlation 22, 129–30, 136, 138, 142–6
capital market 24 cost of equity capital 26
case study 81–2 creditor 19, 21, 33, 54, 64–7, 94, 101, 109,
categories 20, 23, 50–1, 55, 57, 81, 85–7, 129–33, 140, 152
97–9, 109–16, 124, 128–9, 132, 134 CSR report 4–7, 33–41, 59–60, 64, 68–73,
CEO/chairman duality 70, 73, 104, 144, 82–5, 88–9, 93, 96–108, 113–26,
146, 149, 152 141–54
charitable 51, 63 customer 54–5, 95, 99, 108–9, 125–6
China 1–8, 30–3, 36–8, 48, 60–4, 70–1,
82–4, 101, 103, 107–8, 114, 126–7, 132, data collection 82, 91, 154
140, 146, 149–52 decision-making 21, 55–6, 85, 94
Chi-squared 201–12 deductive process 78
Index 163
dependent variable 83, 101, 104, 128, 130, frequency 6, 92–3, 95–6, 113
132, 136, 138, 140, 142–3
descriptive research 77 GDP 1
determinant 5, 11–12, 15, 19–21, 30, 32, general narrative 83, 93, 96–7, 107,
37–8, 56–7, 63–4, 67, 69, 81, 83, 132, 110–12, 138
140, 142, 150–2 geographic segment 96–7, 107, 138
developing country 1, 28, 31, 112, 126, government 2–4, 19, 21, 33, 35, 40, 54–5,
149–50 60–2, 64–5, 67, 84, 99, 101, 103, 108–9,
dichotomy 50 114, 118, 132, 140, 153
disaggregate 83, 96–7, 107, 111–12, 138 GRI 6, 12, 18–19, 24, 26, 37, 83, 87–8, 90,
disclosure items 6, 82–5, 93–6, 99–100, 92–100, 105–29, 132–8, 147, 154
106–12, 133, 136, 147, 151
disclosure quality 83, 92–5, 151 halo effect 146
Downloaded by [University of Florida] at 05:04 15 February 2017