Aldrich - University of Warwick

advertisement
The University of Warwick
Department of Politics and International Studies
THE VIGILANT STATE:
THE POLITICS OF INTELLIGENCE AND SECRECY
PO382
Undergraduate Module Handbook, 2008-2009
Lectures
Wednesday 11.00 MS B3.03
Seminars
Thursday 10.00 SI.69
Thursday 11.00 SI.69
Thursday 2.00 SI.03
Module tutors:
Richard J. Aldrich
r.j.aldrich@warwick.ac.uk
Antony Field
antony.field@warwick.ac.uk
Office hours:
Tuesday 12.00-1.00 (Aldrich)
Wednesdays 12.00-1.00 (Aldrich)
Thursday 12.00-1.00 (Field)
Office BO.12
Tel: (024765) 74074
1
THE VIGILANT STATE *
THE POLITICS OF INTELLIGENCE AND SECRECY
Contents
Module aims 3
Assessment 4-5
Rules and regs 5-6
Lecture schedule 6
Seminar schedule 7
Approach to Reading and Key Material 8
Reading List 10
* The title of this module draws its inspiration from Bernard Porter, The Origins of the Vigilant State:
The London Metropolitan Police Special Branch before the First World War (1991).
2
Module Aims
This module aims to investigate the nature of the 'vigilant state'. It focuses upon the
apparatus developed by modern states to permit the surveillance of both international and
domestic threats to their security. It will examine the major competing theories
concerning the repeated failure of the vigilant state in the face of surprise attack at the
international level, subjecting these to careful comparative analysis and reviewing the
competing theoretical explanations. Consideration will be given to the role of domestic
political monitoring within both democratic and authoritarian states. Attention will also
be given to the problem of reconciling clandestine and/or covert methods, traditionally
associated with operational efficiency, with the degree of transparency and accountability
normally expected of the executive of a democratic state. The final section of the module
will turn to look at the future development of some of these issues against a background
of rapid technical change and globalisation.
In short, this module aims to introduce to the various debates that have characterised the
use of secret service by the state in the international and domestic context. Although the
terms 'espionage', 'intelligence' and 'secret service' are all central to the concerns of this
module they have been deliberately avoided in the above module description given in the
handbook. This is because this module aims to situate all these things in a broader
governmental context, viewing them as aspects of international statecraft or as
constitutional problems or as issues of civil rights. Accordingly, this module is as much
about how policy-makers make use, or fail to make use, of intelligence, and how secret
services might be regulated within a constitutional framework, as about the practice of
secret service itself.
By the end of the module students should achieve 1. A clear understanding of the competing definitions of secret intelligence.
2. An appreciation of the various explanations of the rapid expansion of secret service
activity in the modern era.
3. An understanding of the problems confronting states who wish to avoid major
diplomatic or strategic surprise.
4. Insights into the roles of (domestic) security intelligence within efforts to preserve
social order and political stability across different types of states.
5. An appreciation of the problems of reconciling secret service with the transparency and
accountability aspired to by some liberal states.
6. An awareness of the current debates over the future of secret service.
.
3
Learning Methods
There will be a weekly lecture and a weekly seminar running through the academic year.
This is a lecture and seminar-based module, entailing a 40 min lecture by Richard
Aldrich on Wednesdays. This will be followed on Thursday by a seminar discussion of
the previous week's topic, led by Antony Field, with student presentations and structured
student interaction (in the form of group discussion, for example). Students are expected
to complete the essential reading for each week and to actively contribute to the
discussion. Students are further expected to engage in independent study, employing the
reading lists and other sources to deepen their knowledge of the subject.
MODULE ASSESSMENT
The mode of assessment for this module is via one of three methods:
(a) Two assessed essays (each equating to 50% of your final mark).
(b) A 3 hour, 4 question, unseen exam paper
(c) One assessed essay plus a 2 question, 1½ hour unseen exam (each equating to 50% of
your final mark).
All students handing in assessed work should ensure that they are aware of the
relevant information in the Undergraduate Handbook.
For students taking options (a) or (c), the deadline/s for essay submissions are.
_______________________
_______________________
ESSAY GUIDELINES
- for the assessed essay, you can either choose a title from the essay titles in BOLD
below under each topic, or alternatively you can negotiate your own title.
- if you negotiate a title with your tutor you must submit a title form to the office by the
Negotiated Title Deadline listed in the PAIS Undergraduate Handbook 2008/2009.
- do not produce fact-hogging 'term papers' on 'topics' as they will get low marks
- pay attention to identifying where the schools of thought are
- make sure you produce an essay that answers the question directly
- get it in 24 hrs before the deadline to allow for computer problems
4
- DON'T MISS THE DEADLINES
Also note: Your essays should not be merely descriptive. They should aim at critical and
nuanced analysis of a complex question, using examples to back up the points you are
making. You must be able to situate your argument, backed by substantial evidence,
within the academic literature on the topic.
Please be aware of University Regulation 13 which states that: “…failure to attend
prescribed classes or to complete prescribed coursework may result in a student being
required to submit additional assessed work, or to sit an additional written examination,
or in the student being required to withdraw from his/her course of study.” (Regulation
13.1 Section 1)
Penalties for late submission of assessed work:
According to University rules, late submission of an assessed essay will, unless an
extension has been granted in advance of the deadline, result in the following penalty
deduction from your mark: 5 marks per day (with no upper limit).
Attendance and completion of work
Regulation 13: “…failure to attend prescribed classes or to complete prescribed
coursework may result in a student being required to submit additional
assessed work, or to sit an additional written examination, or in the student
being required to withdraw from his/her course of study.” (Regulation 13.1
Section 1)
NB - Referencing and Plagiarism:
There are severe penalties for cheating of any kind in all forms of University test.
Plagiarism is a form of cheating, as it attempts to acquire a benefit from the work of
others unfairly. The Department’s policy on Plagiarism is fully explained in the PAIS
Undergraduate Handbook 2008/2009, available both in hard copy and on the PAIS
website. The handbook explains how the University’s published regulation may be
accessed on the web.
'The PAIS Plagiarism Committee will submit all assessed work for a number of
modules to plagiarism detection software. No announcement about the identity of
these modules will be made'.
ESSAY QUESTIONS ARE LISTED UNDER EACH WEEK/TOPIC
QUESTIONS FOR ASSESSED ESSAYS ARE IN BOLD
5
MODULE TIMETABLE
LECTURES - WEDNESDAYS
A:
INTRODUCTION
1
What is secret intelligence? 1 Oct
B:
FOREIGN INTELLIGENCE
2
3
4
5
6
In the field: the gritty problems of collection 8 Oct
Estimates and interpretation: the problems of analysis 15 Oct
Intelligence at the top: producer-consumer linkage 22 Oct
Liaison: the delicate diplomacy of intelligence 29 Oct
Reading Week: No Lectures 3-7 Nov
C:
COUNTER-TERRORISM AND SECURITY
7
8
9
10
11
9/11 - What kind of failure 12 Nov
Proliferation and WMD - the Iraq Case 19 Nov
Intelligence and the liberal state: counter-terrorism 26 Nov
Intelligence and counter-terrorism: the market state 3 Dec
Intelligence and Tyranny: the non-democratic State 7 Jan
D:
12
13
14
15
CONTROLLING INTELLIGENCE
The problems of accountability and democratic control 14 Jan
The problems of civil rights and intelligence 21 Jan
Ethics and Espionage 28 Jan
Torture and Assassination 4 Feb
16
Reading Week 9-13 Feb
E.
INTELLIGENCE AND THE NEW WARFARE
17
18
19
Covert Action 18 Feb
Intelligence and Deception 25 Feb
Intelligence for NGOs and Peacekeeping
F:
THE FUTURE OF INTELLIGENCE
20
Intelligence in a globalising world 11 March
6
4 March
SEMINAR -THURSDAYS
A:
INTRODUCTION
1
2
Meet to assign seminars and roles 2 Oct
What is secret intelligence? 9 Oct
B:
FOREIGN INTELLIGENCE
3
4
5
6
7
In the field: the gritty problems of collection 16 Oct
Estimates and interpretation: the problems of analysis 23 Oct
Intelligence at the top: producer-consumer linkage 30 Oct
Reading Week: No Lectures 3-7 Nov
Liaison: the delicate diplomacy of intelligence 13 Nov
C:
COUNTER-TERRORISM AND SECURITY
8
9
10
11
12
9/11 - What kind of failure 20 Nov
Proliferation and WMD - the Iraq Case 27 Nov
Intelligence and the liberal state: counter-terrorism 4 Dec
Intelligence and counter-terrorism: the market state 8 Jan
Intelligence and Tyranny: the non-democratic State 15 Jan
D:
13
14
15
16
17
CONTROLLING INTELLIGENCE
The problems of accountability and democratic control 22 Jan
The problems of civil rights and intelligence 29 Jan
Ethics and Espionage 5 Feb
Reading Week 9-13 Feb
Torture and Assassination 19 Feb
E.
INTELLIGENCE AND THE NEW WARFARE
18
19
20
Covert Action 26 Feb
Intelligence and Deception 5 March
Intelligence for NGOs and Peacekeeping 12 March
F:
THE FUTURE OF INTELLIGENCE
21
22
Intelligence in a globalising world 23 April
Revision Sessions 30 April
7
APPROACH TO READING & KEY MATERIAL
1. Quantity and Quality of Reading
The module text books. You are expected to read widely, but selectively. As a broad
guideline, for most essays, semester-time or exam-time, it is sufficient to look at the two
course text books, two additional books and four articles. There is a lot of reading on this
list because different books address different essay titles under each topic heading, and
also because I wish to ensure an ample supply of literature.
Please note that this is a new module at Warwick, confronting the Library with the
problem of trying to acquire a lot of books that are now out of print. They have done
wonders, acquiring all the core material marked with * and a great deal of the peripheral
material. They do not yet have everything on the bibliography.
I have not removed the older/out of print books that we are still chasing from the reading
list. This is because some of them are 'in process' and are likely to arrive this year. Others
you may happen to obtain during the vacation if you use other libraries. Of course its
vexing not to have everything, but on balance I have thought it better to keep some of
these titles on the list even of we do not yet have them. None the remaining items we are
chasing are vital. Material that I believe to be in the library at this moment (July 08) is
marked with class mark or with 'L' but the situation changes daily.
This is a fast-moving subject, never more so than the last few years. Accordingly, journal
articles are increasingly important. Warwick has everything we need here so if in doubt
head for the journal articles. Many of the best ones are collected in the various edited
collections that have been produced by Loch Johnson.
2. Case Studies
You may approach your essays in a variety of different ways. You may wish to write a
broad generic essay (and this is a broad generic module) or you may wish to choose to
answer a question by focusing upon one or a number of case studies.
HOWEVER, YOU MUST BE CLEAR THAT CASE STUDIES IN THIS MODULE
ARE INTENDED TO THROW LIGHT UPON GENERAL IDEAS AND PRINCIPLES,
NOT VICE VERSA.
8
3. Six text books are available C.M. Andrew, R.J. Aldrich & Wesley K. Wark, (eds.)
Secret Intelligence: A Reader (London: Routledge, January 2009) 540 pp.
ISBN: 978-0-415-42024-2
This is specifically designed to support this module and is a recommended purchase
Peter Gill and Mark Pythian, Intelligence in and Insecure World (Cambridge: Polity
2006)
M. Herman, Intelligence Power in Peace and War (Cambridge: Cambridge
University Press, 1996) & UB 250.H3
L. Johnson & J. Wirtz, Intelligence and National Security: The Secret World of Spies
OUP L
M.M. Lowenthal, Intelligence: From Secrets to Policy (Third Edition -Washington
DC: CQ Press, 2006) L
A. Shulsky, Silent Warfare: Understanding the World of Intelligence (NY: Brasseys,
2nd edition 1993)
These books are all very serviceable. Shulsky & Lowenthal both cover more topics but
are less intellectually demanding - indeed first year texts really. Try and read one of these
quickly as an intro. Herman is intellectually more rigorous but has a narrower focus. I
would advise that you buy Herman. Herman is better value for money and you can read
both Shulsky and Lowenthal in an evening. All these three texts suffer from being
excessively focused on the English-speaking world or indeed on the US only. The
Johnson/Wirtz collection is a good resource but it is has an excessively American focus
and its structure is still tinged with the Cold War.
5. Journals
The key journal is - INTELLIGENCE AND NATIONAL SECURITY abbreviated INS
Another useful journal is THE INTERNATIONAL JOURNAL OF INTELLIGENCE AND
COUNTERINTELLIGENCE
6. Key Handbooks
The major edited collections of essays for this subject are:
a. Loch Johnson (ed) Strategic Intelligence - 5 Volumes UB 250.S6385
9
b. Loch Johnson (ed) Handbook of Intelligence Studies JC 842.H2
7. Coursework Support
As your module co-ordinator for the Politics element please contact me if you have any
difficulties with the course or the course work. We are available to see you in Room
BO.12 in Politics on Tues at 12, Wednesday at 12 or Thursday at 1.00 You can also
contact me us by e-mail at r.j.aldrich@warwick.ac.uk or antony.field@warwick.ac.uk
8. Module Evaluation
Feedback and evaluation are crucial to the success of any module. We want students to
have their say on Politics modules. If there are problems with book availability please
raise it with the tutors for the module immediately.
A: INTRODUCTION
1 What is intelligence?
1.1 To what extent does the nature and value of 'intelligence' differ from
'information'?
1.2 Why has secret intelligence constituted a growth industry since 1945?
1.3 How far do you accept Michael Herman's contention that it is useful to talk
about secret intelligence as a form of 'state power', akin to economic or military
power?
1.4 How far do you accept Michael Warner's definition that "Intelligence is
secret, state activity to understand or influence foreign entities." ?
Books
*B. Berkowitz and A. Goodman, Strategic Intelligence for American National Security L
A Dulles, The Craft of Intelligence [old but a good primer] L
J.R. Ferris, Intelligence and Strategy
Peter Gill and Mark Pythian, Intelligence in and Insecure World, chapters 1 & 2.
R. Godson, Intelligence Requirements, vols 1-4, L
**M Herman, Intelligence Power, chs 1-3, 7, 21, UB 250.H3
L. Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of
Government esp. chapters 1-3 UB 250.S6385 REF ONLY
R.V. Jones, Reflections on Intelligence
J. Keegan, Intelligence in War, pp. 7-26, 321-52
10
S. Kent, Strategic Intelligence for American World Policy chapter 1 L
*L. Krizan, Intelligence Essentials for Everyone [a good short primer]
W. Laqueur, World of Secrets: The Uses and Limits of Intelligence pp 4-70 L
Mark Lowenthal, Intelligence: From Secrets to Policy chapter 1. L
R.P. Pfaltzgraff et al (eds.), Intelligence Policy and National Security ch. 3.
B. Porter, Plots and Paranoia .
Abram N. Shulsky and Gary J. Schmitt, Silent Warfare: chapter 1. L
*LV Scott and PD Jackson (eds.) Understanding Intelligence in the 21st Century [this
book is also Intelligence and National Security, Vol. 20, No. 1 (Summer 2004)] L
G. F. Treverton, Seth G. Jones, Steven Boraz, Phillip Lipscy, Toward a Theory of
Intelligence Workshop Report, RAND available at -http://www.rand.org/pubs/conf_proceedings/CF219/
B. Westerfield, Inside the CIA's Private World, L .
Articles
* Christopher Andrew, 'Intelligence, International Relations and "Under-theorisation"' in L.V.
Scott & P.D. Jackson, (eds.), Understanding Intelligence in the Twenty-First Century: Journeys
in Shadows, pp.29-41. L
* P. Davies, 'Ideas of Intelligence: Divergent Concepts and National Institutions',
Harvard International Review 24, 3 (2002): 62-66
James De Derian, 'Anti-Diplomacy, Intelligence Theory and International Relations', INS
8, 3 (July 1993): 29-51.
S. Farson, 'Schools of thought: National perceptions of intelligence', Conflict Quarterly
9/2 (1989) pp.52-104.
J. Ferris, 'The Historiography of American Intelligence Studies', Diplomatic History 19, 1
(Winter 1995).
* MRD Foot, ‘What Use Are Secret Services?’ in In the Name of Intelligence: Essays in
Honor of Walter Pforzheimer, eds. Hayden B. Peake and Samuel Halpern, 277-282
M. Handel, 'The Politics of Intelligence', INS 2, 4 (October 1987): 5-46.
*L.K. Johnson, 'Preface to a Theory of Strategic Intelligence', International Journal of
Intelligence and Counterintelligence 16, no. 4 (Winter 2003-2004): 638-663.
L.K. Johnson, 'Bricks and Mortar for a Theory of Intelligence', Comparative Strategy 22,
1 (2003)
*D. Kahn, 'An Historical Theory of Intelligence', INS 16, 3 (Autumn 2001): 79-92.
* D. Omand, 'Reflections on Secret Intelligence' in Peter Hennessy (ed.), The New
Protective State pp.97-122. Also at - http://www.cscs.ucl.ac.uk/club/e-library/secret-int/
A. Rathmell, 'Towards Postmodern Intelligence', INS 17/ 3 (2002) pp.87–104.
*L. Scott and P.D Jackson, 'Journeys in Shadows', Ch 1. in LV Scott and PD Jackson
(eds.) Understanding Intelligence in the 21st Century [this book is also Intelligence and
National Security, Vol. 20, No. 1 (Summer 2004)] L
J. Sims, 'What Is Intelligence? Information for Decision Makers' in Roy S. Godson et al.,
eds., U.S. Intelligence at the Crossroads: Agendas for Reform,
T.F. Troy, ’The 'Correct' Definition of Intelligence’ International Journal of Intelligence
and Counterintelligence 5, 4 (Winter 1991-1992): 433-454
11
B:
2
FOREIGN INTELLIGENCE
In the field: the gritty problems of collection
2.1 Compare and contrast the problems/advantages presented by the
collection of the following types of intelligence: open source (Opint),
human (Humint), signals (Sigint), imagery (Imint).
2.2 What are the major challenges in the realm of foreign intelligence gathering
for European states post 9/11? Illustrate with two or three examples.
2.3 Open sources often constitute the majority of the sources of information used
by government. So why is 'Opint' usually under-rated and badly resourced?
Books
*W.E. Burrows, Deep Black: The Secrets of Space Espionage
L
W.E. Burrows, By Any Means Necessary: America’s Secret Air War in the Cold War
D.D. Clarridge, A Spy for All Seasons: My Life in the CIA [see the detailed account of humint
agent recruitment]
*A. Dulles, The Craft of Intelligence L
P Gill and M Pythian, Intelligence in and Insecure World chapter 4.
*O. Gordievsky, Next Stop Execution [a good example of humint] L
**M Herman, Intelligence Power, chs 4-7 UB 250.H3
L Johnson, Strategic Intelligence, Volume II. The Intelligence Cycle: From Spies to
Policymakers esp chapters 1-6 UB 250.S6385 REF ONLY
J. Keegan, The Second World War ch on intelligence D 743.K3
* D.T. Lindgren, Trust But Verify: Imagery Analysis in the Cold War [good on Imint]
M Lowenthal, Intelligence: From Secrets to Policy chapter 5.
J. Prados, The Soviet Estimate: US Intelligence Analysis and the Soviet Military Threat
J. Richelson, The Wizards of Langley, .
J. Schecter and P. Deriabin, The Spy Who Saved the World
*A. N. Shulsky, Silent Warfare: Understanding the World of Intelligence ch1, 2, 3, L
R. Steele, On Intelligence [value of Opint - Open Sources]
*B. Westerfield, Inside the CIA's Private World, chs. 1-11, especially 1, 2, 10, & 11 L
12
Articles
** M Aid, ‘The Time of Troubles: The US National Security Agency in the Twenty-First
Century’ INS 15, 3 (1999) [very good on pros and cons of sigint] (also reproduced as
chapter 7 in Johnson and Wirtz, Intelligence and National Security: The Secret World of
Spies .
** Matthew Aid, 'All Glory Is Fleeting: Sigint and the Fight against International
Terrorism', Intelligence and National Security 18/4 (Winter 2003): 72-120.
*R Butterworth, 'Collection' in R Godson ed Intelligence Requirements for the 1990s:
Collection, Analysis, Counterintelligence and Covert Action
J.M. Diamond, 'Re-examining Problems and Prospects in U.S. Imagery Intelligence', ch.5
in Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies,
D. D. Fitzgerald, 'Risk Management and National Reconnaissance form the Cold war up
to the Global War on Terrorism,' National Reconnaissance - A Journal of the Discipline
and Practice 1 (2005) pp.9-18
*J.L. Gaddis, 'Intelligence, Espionage and Cold War History', Diplomatic History (1989)
and also in his The United States and the End of the Cold War
J.L. Gaddis, 'The Evolution of a Reconnaissance Satellite Regime' in A.L. George and
others (eds.) US-Soviet Security Co-operation (OUP, 1988).
*Burton Gerber, 'Managing Humint: The need for a new Approach', in Jennifer Sims &
Burton Gerber (eds.) Transforming US Intelligence (Washington DC: Georgetown
University Press, 2005), L
G. Jones, 'It’s a Cultural Thing: Thoughts on a Troubled CIA', Orbis 50/1 (2006): 25-41.
M. M. Lowenthal, 'OSINT: The State of the Art, the Artless State,' Studies in Intelligence
45/3 (2001) pp.62-66.
Stephen Mercado, 'A Venerable Source in a New Era: Sailing the Sea of OSINT in the
Information Age', Studies in Intelligence 48/3 (2004): 45-55.
W.C. Prillaman & M.P. Dempsey, 'Mything the Point: What's Wrong with the
Conventional Wisdom about the CIA', Intelligence and National Security 19/1 (2004)
pp.1-29.
*H Ransom, 'Strategic Intelligence and Foreign Policy', World Politics 27 (Oct 74) 13145.
Jeffrey T. Richelson, 'High Flyin' Spies', Bulletin of Atomic Scientists 52/2 (1996) pp.4854.
Jeffrey T. Richelson, 'The Satellite Gap', Bulletin of Atomic Scientists 59/1 (2003) pp.4854.
PR Riley, 'CIA and Its Discontents', chapter 4 in Johnson and Wirtz, Intelligence and
National Security: The Secret World of Spies L
R.D. Steele, The Importance of Open Source Intelligence to the Military', ch.9 in Johnson
and Wirtz, Intelligence and National Security: The Secret World of Spies L
13
3
Estimates & interpretation: the problems of analysis
3.1 How far do you accept R.K. Betts's hypothesis that "intelligence failures
are inevitable"?
3.2 Can the organizational reform of intelligence have an impact on the main
pathologies of intelligence analysis and interpretation?
3.3 ‘Attempts at resolving failures in the realm of analysis have focused on the
organizational, but the roots of the problem are psychological’. Discuss.
Books
*Richard K. Betts and Thomas G. Mahnken, eds. Paradoxes of Strategic Intelligence:
Essays in Honor of Michael I. Handel L
A Cahn, Killing Detente: The Right Attacks the CIA .
*H.P. Ford, Estimative Intelligence L
Peter Gill and Mark Pythian, Intelligence in and Insecure World chapter 5.
Richard Heuer, Psychology of Intelligence Analysis .
R. Godson, Intelligence Requirements for the 1990s L
I Janis, Groupthink HC 5120.J2
L Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of
Government esp. chapter 7 UB 250.S6385 REF ONLY
L Johnson, Strategic Intelligence, Volume II. The Intelligence Cycle: From Spies to
Policymakers esp chapters 8-9 UB 250.S6385 REF ONLY
S. Kent, Strategic Intelligence for American World Policy [the classic idealist statement
from the creator of ONE/CIA] L
Mark Lowenthal, Intelligence: From Secrets to Policy, chapter 6.
W Matthias, America's Strategic Blunders: Intelligence Analysis and National Security
Policy, 1936-1991 .
E.R. May, Knowing One's Enemies, [especially May's conclusions ]
H. E. Meyer, Real-World Intelligence L
R.P. Pfaltzgraff et al (eds.), Intelligence Policy and National Security chs. 6 & 7
*J Prados, The Soviet Estimate: US Intelligence Analysis and the Soviet Military Threat
*A N Shulsky, Silent Warfare: Understanding the World of Intelligence ch 3 8 L
Sir K. Strong, Intelligence at the Top L
B. Westerfield, Inside the CIA's Private World, chs. 11-28, 31, but especially 11, 12, 14,
17, 25, 26, 27, 31 L
R. Wohlstetter, Pearl Harbor: Warning and Decision D 767.92.W6
A Zegart, Flawed by Design: The Evolution of the CIA, JCS, and NSC L
14
Vietnam case study
S. Adams, War of Numbers
*GW Allen None So Blind : A Personal Account of the Intelligence Failure in Vietnam L
*H P Ford, CIA and the Vietnam Policy Makers L
J. J. Wirtz, The Tet Offensive: Intelligence Failure in War
Articles
**R K Betts, 'Analysis, War, Decision: Why Intelligence Failures are Inevitable' World
Politics (1978/9) (also reproduced as chapter 8 in Johnson and Wirtz, Intelligence and
National Security: The Secret World of Spies, L
**R Betts, ‘Surprise Despite Warning: Why Sudden Attacks Succeed' Political Science
Quarterly 95 (Winter 1980) 551-72
R. Callum, ‘The Case for Cultural Diversity in the Intelligence Community’ International
Journal of Intelligence and Counterintelligence 14, no. 1 (Spring 2001): 25-48. JSTOR
*E Cohen, 'Analysis' in R Godson (ed.) Intelligence Requirements for the 1990s:
Collection, Analysis, Counter-intelligence and Covert Action. L
S. Gazit, 'Estimates and Fortune-Telling in Intelligence Work,' INS 4/4 (1980):.36-56.
S. Gazit, 'Intelligence Estimates and the Decision-Maker,' INS 3/3 (1988): 261-287.
RZ George, 'Fixing the Problem of Analytical Mind-Sets: Alternative Analyses ',
International Journal of Intelligence and Counterintelligence 17/3 (2004): 385-404.
M. Gladwell, 'Connecting the Dots: The Paradoxes of Intelligence Reform,' The New
Yorker 10 March 2003, pp.83-88.
*D. Hart and S. Simon, 'Thinking straight and talking straight: Problems of intelligence
analysis', Survival 48/1 (2006) pp.35-60.
R. Jervis, 'Hypotheses on Misperception', World Politics, 20, 3 (April 1968): 454-79.
L. Johnson, ‘Analysis for a New Age’, INS 11, 4 (October 1996): 657-71.
*E. Kahana, 'Early Warning Versus Concept: The Case of the Yom Kippur War 1973',
INS, 17,2 - also ch.13 in Johnson and Wirtz, Intelligence and National Security: The
Secret World of Spies.
Carmen Medina, 'What To Do When Traditional Models Fail', Studies in Intelligence
46/3 (2002) : 23-9. (It is also worthwhile looking at the response - S.R. Ward, 'Evolution
Beats Revolution in Analysis', Studies in Intelligence 46/3 (2002) :.29-36).
G. Schmitt, 'Truth to Power: Rethinking Intelligence Analysis' in P. Berkowitz (ed.) The
Future of American Intelligence (Hoover Institute Press 2004)
15
4
Intelligence at the Top: Producer-Consumer Linkage
4.1 Should intelligence be ‘a function of command’ [view of US Joint Chiefs of
Staff] or objective and insulated from the policy process [view of CIA's Sherman
Kent] ?
4.2 If we accept Betts's hypothesis that "intelligence failures are inevitable", how
should the leaders of states approach the problem of surprise?
4.3 Why are the leaders of states typically poor consumers of intelligence?
Can anything be done to change this state of affairs?
Books
*R.K. Betts, Surprise Attack U 163.B3 L
R.K. Betts & TG Mahken, Paradoxes of Intelligence L
Richard K. Betts, Enemies of Intelligence
*A. Codevilla, Informing Statecraft L
Peter Gill and Mark Pythian, Intelligence in an Insecure World chapter 6. L
B. Gertz, Betrayal. [Critique of Clinton and Intelligence]
*M. Herman, 'Intelligence and National Action', ch.15 in Johnson and Wirtz, Intelligence
and National Security: The Secret World of Spies, . L
*M. Handel (ed), Leaders and Intelligence (Frank Cass, 1989) [a special issue of INS
3/3] L
L Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of
Government esp. chapter 8 UB 250.S6385 REF ONLY
R.V. Jones, Reflections on Intelligence, Chapter 6
*E. Kam, Surprise Attack: The Victim's Perspective L
W. Laqueur, World of Secrets L
*A. Levite, Intelligence and Strategic Surprise L
Mark Lowenthal, Intelligence: From Secrets to Policy chapter 9. L
*R. L. Pfaltzgraff & Intelligence Policy & National Security ch. 13-17 19 20 23
V. Ra'anan (eds)
H.H. Ransom, 'The Politicization of Intelligence', ch.14 in Johnson and Wirtz,
Intelligence and National Security: The Secret World of Spies, L
J. Rusbridger, The Intelligence Game, [useful for Q 4.4]
*S. Sagan, The Limits of Safety, [ good for essay 4.4 - use section on the errant Alaskan
U-2 sniffer flight of 1962] L
A. N. Shulsky, Silent Warfare:Understanding the World of Intelligence ch 3 8 L
*B. Whaley, Codeword Barbarossa L
Articles
On intelligence at the top –
16
*C.M. Andrew, 'American Presidents and their Intelligence Communities', INS 1/4
(1995): 95-113.
*R.K. Betts, 'Surprise, Scholasticism and Strategy' and rejoinder by Levite, International
Studies Quarterly, 33, 3 (September 1989).
*R.K. Betts, ' 'Politicization of Intelligence: Costs and Benefits' in R Betts and T
Mahnken, eds., Paradoxes of Intelligence: Essays in Honor of Michael Handel 59–79.
*S. Farson, (eds.) Security and Intelligence in a Changing World, ch 12. L
*K.L. Gardiner, ’Squaring the Circle: Dealing with Intelligence-Policy Breakdowns’, INS
6/1 (1991):141-152.
K.L. Gardiner, ‘Dealing with Intelligence-Policy Disconnects' in Inside CIA's Private
World, ed. H. Bradford Westerfield, 344-356 L
D. Gries, ‘New Links Between Intelligence and Policy’ in Inside CIA's Private World,
ed. H. Bradford Westerfield, 357-365 L
*M. Handel, 'Intelligence and Military Operations' , INS 5, 2 (April 1990). L
M. Herman, 'Intelligence Warning and the Occupation of the Falkland Islands' in A.
Danchev ed International Perspectives on the Falklands Conflict L
*R. Jervis, 'Intelligence and Effective Policy' in A.S. Farson et al eds Security and
Intelligence in Changing World L
D. Kahn, 'Clausewitz and Intelligence' in M. Handel (ed) Clausewitz and Modern
Strategy L
A. Kovacs, ‘Using Intelligence’, INS 12, 4 (October 1997): 145-64.
R. Jervis, 'Strategic Intelligence and Effective Policy' in A. Farson, D. Stafford and W.
Wark (eds) Security and Intelligence in a Changing World L
Martin Petersen, 'The Challenge of the Political Analyst', Studies in Intelligence 47/1
(2003) pp.51-6.
.
Specifically on intelligence failure *R K Betts, 'Analysis, War, Decision: Why Intelligence Failures are Inevitable' World
Politics (78/9)
*S Chan, 'The Intelligence of Stupidity: Understanding Failures in Strategic Warning'
American Political Science Review 73, 1 March 1979
R Cline, 'Policy Without Intelligence' Foreign Policy Winter 1974
T Cubbage, 'Westmoreland v CBS: Was Intelligence Corrupted by Policy Demands?'
Intelligence and National Security July 1988 [c.f Sam Adams, War of Numbers, above]
S J Flanagan, 'Managing the Intelligence Community' International Security 10, 1 1985
58M Herman, 'Intelligence Warning of the Occupation of the Falkland Islands: Some
Organisational Issues', in A Danchev ed International Perspectives on the Falklands
Crisis L
A S Hulnick, 'The Intelligence Producer-Policy Consumer Linkage' INS 1, 2 May 1986
G Hopple, 'Intelligence and Warning: Implications and Lessons of the Falklands Islands
War' World Politics April 1984
R Jones, 'Intelligence and Command' Intelligence and National Security July 1988
E May, 'Intelligence: Backing into the Future' Foreign Affairs 71, 3 (Summer 1992) 6373
A Reuben, 'Stalin and June 22 1941' International Affairs 42 (Oct 66) 662-73
17
5
Liaison: the delicate diplomacy of intelligence
5.1 'There are no friendly intelligence services, only the intelligence
services of friendly powers.' Discuss.
5.2 Identify the main problems and benefits that are involved in intelligence cooperation between states.
5.3 Why have Europe and America co-operated so closely on intelligence since
9/11, despite public arguments over matters such as the War on Terror and Iraq?
Books - but the articles are better on this subject
M. Anderson, Policing the World
J. Bamford, The Puzzle Palace UB 271.U6
*W. Blitzer, Territory of Lies the Exclusive Story of Jonathan Jay Pollard: The American
Who Spied on His Country for Israel and How He Was Betrayed [a US-Israeli case] l
R. Cline, Secrets, Spies and Scholars
A.J. Cristol, The Liberty Incident: The 1967 Israeli Attack on the U.S. Navy Spy Ship
M Deflem, Policing World Society. Historical Foundations of International Police
Cooperation.
W.J. Ennes, Assault on the Liberty
*J.J. Fialka, War by Other Means, Economic Espionage in America L
N. Hager, Secret Power, 1996
J. Jakub, Spies and Saboteurs, especially Chapter 7
T. Mangold, Cold Warrior, esp ch 5 on the SAPPHIRE/de Vosjoli case.
Y. Melman, & D. Raviv. Friends in Deed: Inside the U.S.-Israel Alliance. [see especially
chapters 4, 7, 15]
J. Richelson, Ties That Bind: 2nd Edition
J. Richelson, The US Intelligence Community, Chapter 10
**P. Schweitzer, Friendly Spies L
*D. Schoenbraum, The US and Israel, L
*M. Yossi and D. Raviv, The Imperfect Spies: A History of Israeli Intelligence [published
in the US as: every spy a prince] L
Articles
R.J. Aldrich, ‘Dangerous Liaisons: Post September 11 Intelligence Alliances’, Harvard
International Review 24/3 (2002): 50-54.
R.J. Aldrich, 'Transatlantic Intelligence and Security Cooperation,' International Affairs
80/4 (2004): 731-54.
18
B. Champion, 'A Review of Selected cases of Industrial Espionage', INS 13, 2 (Summer
1998): 123-44
C. Clough, ‘Quid Pro Quo: The Challenges of International Strategic Intelligence
Cooperation’, The International Journal of Intelligence and Counterintelligence, 17, 4
(2004)
B. De Graaff, & C. Wiebes. 'Intelligence and the Cold War behind the Dikes: The
Relationship between the American and Dutch Intelligence Communities, 1946-1994.'
INS 12, 1 (Jan. 1997): 41-58.
A.S. Hulnick, ‘Intelligence Cooperation in the Post-Cold War Era: A New Game Plan?’
International Journal of Intelligence and Counterintelligence 5/4 (1991-1992) pp.455465.
*S. Lander, 'International Intelligence Co-operation: An Inside Perspective', Cambridge
Review of International Studies 17, 3 (October 2004): 481-93.
S. Lefebvre, 'The Difficulties and Dilemmas of International Intelligence Cooperation',
International Journal of Intelligence and Counterintelligence 16/4 (2003) pp.527-542.
B. Müller-Wille, 'The Effect of International Terrorism on EU Intelligence Co-operation',
Journal of Common Market Studies, 46/1 (2008) pp.49-73.
B. Müller-Wille, ‘EU intelligence cooperation: A Critical Analysis’, Contemporary
Security Policy, 23, 2 (August 2002)
*J.T. Richelson, ‘The Calculus of Intelligence Cooperation.’ International Journal of
Intelligence and Counterintelligence 4, 3 (Fall 1990): 307-323.
W. Rosenau, 'Liaisons Dangereuses? Transatlantic Intelligence Co-operation and the
Global War on Terrorism', in Co-operating Against Terrorism: EU-US Relations Post
September 11--Conference Proceedings (Stockholm, Sweden: Swedish National Defence
College, 2007) pp.31-40.
M. Rudner, 'Hunters and Gatherers: The Intelligence Coalition Against Islamic
Terrorism,' International Journal of Intelligence and Counterintelligence, 17/2 (2004)
pp.193-230.
M. Rudner, 'Britain Betwixt and Between: UK SIGINT Alliance Strategy's Transatlantic
and European Connections', INS 19, 4 (2004): 571D.S. Reveron, ‘Old Allies, New Friends: Intelligence-Sharing in the War on Terror’,
Orbis (Summer, 2006).
J.E. Sims, ‘Foreign Intelligence Liaison: Devils, Deals, and Details’, International
Journal of Intelligence and CounterIntelligence, 19 (Summer, 2006)
A. Svendsen, ‘The globalization of intelligence since 9/11: frameworks and operational
parameters’, Cambridge Review of International Affairs 21/1 (2008) pp.131-146.
J.I. Walsh, ‘Intelligence-Sharing in the European Union: Institutions Are Not Enough’,
Journal of Common Market Studies, 44, 3 (2006), pp.625-43.
M. Warner, 'Intelligence Transformation and Intelligence Liaison,' SAIS Review 24/1
(2004) pp.77-89.
Also the special Issue of INS 13/1 Knowing Your Friends especially chs 1 5 and 11
19
6 Reading Week - No Lecture
C: COUNTER-TERRORISM AND SECURITY
7 - The Attacks of 9/11: What Kind of Failure?
7.1 Was 9/11 the result of an 'intelligence failure', and if so was it one of the
collection, co-operation, management or analysis of intelligence?
7.2 How far do you agree with Amy Zegart's assertion that the intelligence
failures that resulted in 9/11 are about the failure of organizations to adapt?
7.3 A second Pearl Harbor? Consider the similarities and differences between
11 September 2001 and 7 December 1941.
Internet
Senate, Select Committee on Intelligence and House, Permanent Select Committee
on Intelligence, Joint Inquiry Into Intelligence Community Activities Before and
After the Terrorist Attacks of September, Washington D.C.: Government Printing
Office, 2003 Soft Cover. available at http://www.gpoaccess.gov/serialset/creports/911.html
if you want the hearings which are very detailed see http://www.fas.org/irp/congress/
9/11 Commission Report: Final Report of the National Commission on Terrorist
Attacks Upon the United States (Official Edition) including the Executive Summary
1577363418 & HV6432.7.N2
The 'Final Report of the National Commission on Terrorist Attacks Upon the
United States, Official Government Edition,' dated 22 July 2004,
available at http://www.fas.org/irp/offdocs/911comm.html.
20
Books
P Bergen, Holy War Inc: Inside the Secret World of Osama Bin Laden
Richard A. Clarke, Against All Enemies L
Der Spiegel, Inside 9-11: What Really Happened
Y. Fouda and N. Fielding, Masterminds of Terror: the Truth Behind the Most
Devastating Attack the World Has Ever Seen,
*B Gertz, Breakdown: How America’s Intelligence Failures led to September 11 L
*Bob Graham, with Jeff Nussbaum. Intelligence Matters: The CIA, the FBI, Saudi
Arabia, and the Failure of American's War on Terror L
L Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of
Government esp. chapter 9 UB 250.S6385 REF ONLY
M Mahle, Denial and Deception: An Insider's View of the CIA from Iran-Contra to 9/11
J Miller 2002. The Cell: Inside the 9/11 Plot and Why the FBI and the CIA Failed to
Stop It
*T. Naftali, Blind Spot L
See also the useful review summary of Naftali by Crenshaw at
http://www.foreignaffairs.org/20050701fareviewessay84414/marthacrenshaw/counterterrorism-in-retrospect.html
*G. Posner, Why America Slept: The Failure to Prevent 9/11 L
R. Posner, Preventing Surprise Attacks: Intelligence Reform in the Wake of 9/11
Y Bodansky, Bin Ladin: the man who declared war on America
S Reeve, The New Jackals Rami Yousef, Osamar Bin Ladin & the Future of Terrorism L
* S Strasser, The 9/11 Investigations L
D. Benjamin and S. Simon, The Age of Sacred Terror
**A Zegart, Spying Blind: The CIA, the FBI, and the Origins of 9/11 L
Articles
F.L. Borch, 'Comparing Pearl Harbor and "9/11": Intelligence Failure? American
Unpreparedness? Military Responsibility?' The Journal of Military History 67/3
(2003):.845-860.
H.D.E. Bruijn, 'One fight, one team: The 9/11 Commission Report on Intelligence,
Fragmentation and Information', Public Administration 84/2 (2006):.267-87.
D. Byman, 'Strategic Surprise and The September 11 Attacks', Annual Review of
Political Science 8 (2005): 145-170.
T.G. Carpenter, 'Missed Opportunities: The 9/11 Commission Report and US Foreign
Policy', Mediterranean Quarterly 16/1 (2005): 52-61.
S. Clarke, 'Conspiracy Theories and the Internet: Controlled Demolition and Arrested
Development', Episteme: A Journal of Social Epistemology 4/2 (2007):.167-180.
E. J. Dahl, 'Warning of Terror: Explaining the Failure of Intelligence Against Terrorism',
Journal of Strategic Studies 28/1 (2005): 31-55.
H. Fessenden 'The Limits of Intelligence Reform', Foreign Affairs 84/6 (2005): 106-120.
R.A. Goldberg, 'Who Profited From the Crime? Intelligence Failure, Conspiracy Theories
and the Case of September 11', Ch.6. in L.V. Scott and P.D. Jackson (eds.)
21
Understanding Intelligence in the 21st Century Routledge 2004 [this book is also
Intelligence and National Security, Vol. 20, No. 1 (Summer 2004)] L
M.A. Goodman, '9/11: The Failure of Strategic Intelligence', INS - (2003) 18; 4: 59-71
T. Homer-Dixon,‘The Rise of Complex Terrorism’ Foreign Policy 2002 [available on the
FP website]
*R.A. Falkenrath, 'The 9/11 Commission Report a Review Essay, International Security
29, 3, October 2004, 170-190.
S. Lefebvre, . 'A Look at Intelligence Analysis.' International Journal of Intelligence and
Counterintelligence 17/2 (2004): 231-264.
C.F. Parker & E.K. Stern 'Blindsided? September 11 and the Origins of Strategic
Surprise', Political Psychology 23/3 (2002): 601–630.
J. J. Wirtz, ‘Deja Vu? Comparing Pearl Harbor and September 11’, Harvard
International Review 24/3 (2002): 73–77.
J Wirtz, 'Responding To Surprise', [compares responses to Pearl Habor and 9/11] Annual
Review of Political Science 9 (2006): 45-65.
A.B. Zegart, 'An Empirical Analysis of Failed: Intelligence Reforms Before September
11,' Political Science Quarterly 121/1 (2006): 33-60.
*A.B. Zegart, 'September 11 and the Adaptation Failure of U.S. Intelligence Agencies',
International Security 29/4 (Spring 2005): 78-111.
22
Topic 8 Proliferation and WMD - the Iraq Case
8.1 To what extent was the Iraqi WMD fiasco in the USA a product of 'intelligence
failure' and to what extent the product of interference by policy-makers and
politicians?
8.2 What problems and weaknesses in the UK intelligence system have
been illuminated by the Iraqi WMD saga and the 4 subsequent inquiries
held in 2003 and 2004?
8.3 What does the Iraqi WMD saga tell us about the problems and advantages of
releasing intelligence into the public domain to inform debate about foreign
policy?
US Reading
Internet
Senate Select Committee Report on WMD
Available at http://www.fas.org/irp/congress/2004_rpt/index.html#ssci
WMD Commission Report
Available at - http://www.fas.org/irp/offdocs/wmdcomm.html
Books
Select Committee on Intelligence, Report of the Select Committee on Intelligence on
the United States Intelligence Community's Prewar Intelligence Assessments on Iraq,
*J. Bamford, Pretext for War L
H. Blix, Disarming Iraq: The Search for Weapons of Mass Destruction L
Y. Bodansky, The secret history of the Iraq War
M. DeLong, Inside CentCom: The Unvarnished Truth About the Wars in Afghanistan and
Iraq
Bob Drogin, Curveball: Spies, Lies, and the Con Man Who Caused a War
Tyler Drumheller, On the Brink: An Insider's Account of How the White House
Compromised American Intelligence
Peter Gill and Mark Pythian, Intelligence in an Insecure World chapter 7. L
M.A. Goodman, Failure of intelligence: the decline and fall of the CIA L
S.M. Hersh, Chain of command : the road from 9/11 to Abu Ghraib JE 242.H3
L. Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of
Government esp. chapter 9 UB 250.S6385 REF ONLY
23
*J. Risen, State of War L
G. Tenet, At the Center of the Storm L
C.R. Whitney (ed.) The WMD Mirage
Articles
Robert Jervis, 'Reports, Politics, and Intelligence Failures: The Case of Iraq', Journal of
Strategic Studies 29, 1 (2006): 3-52
C. Kaufmann, 'Threat Inflation and the Failure of the Marketplace of Ideas: The Selling
of the Iraq War', International Security 29, 1 (2004): 5-48.
K. Pollack, 'Spies, Lies and Weapons: What went wrong' Atlantic Monthly, Vol.293,
No.1 (2004): http://www.theatlantic.com/doc/200401/pollack
R.L. Russell, 'CIA's Strategic Intelligence in Iraq', in also reproduced as chapter 12 in
Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies
*David Isenberg, See, Speak, and Hear No Incompetence: An Analysis of the Findings of
The Commission on the Intelligence Capabilities of the United States Regarding
Weapons of Mass Destruction BASIC Report 2005 available at http://www.basicint.org/pubs/pubindex.htm
K. Russell, 'The Subjectivity of Intelligence Analysis and Implications for U.S. National Security
Strategy.' SAIS Review, 24/1 (2004) pp.147-163.
UK Reading
Internet
Foreign Affairs Committee Report
http://www.fas.org/irp/threat/ukiraq0703.pdf
Intelligence and Security Committee Report
http://www.fas.org/irp/world/uk/index.html
Hutton Report
http://www.fas.org/irp/world/uk/index.html
Lord Butler Report
http://www.fas.org/irp/world/uk/index.html
Glen Rengwala also has some useful material at
http://middleeastreference.org.uk/fac030616.html
24
Books
H Blix, Disarming Iraq: The Search for Weapons of Mass Destruction L
A Campbell, The Blair Years L
*Tim Coates & Lord Butler, Lord Butler's Report: Espionage and and Iraq War L
*A. Glees & P. Davies, Spinning the Spies, L
S Kettell, Dirty Politics? New Labour, British Democracy & the Invasion of Iraq. Ch 4 L
G Rangwala & D Plesch, A Case To Answer L
A Seldon, Blair L
Articles
R.J. Aldrich, 'Whitehall and the Iraq War: The UK's Four Intelligence Enquiries', Irish
Studies in International Affairs, 16, 1 (2005) online at http://www.ria.ie/publications/journals/isia/
C Bluth, ‘The British road to war: Blair, Bush and the decision to invade Iraq’,
International Affairs 80, 5 (2004): 851-872.
A. Danchev, 'Story Development, or, Walter Mitty the Undefeated', ch.7 in A. Danchev
& J. Macmillan (eds.), The Iraq War and Democratic Politics DS 79.6.I7
*Philip Davies, 'Intelligence Culture and Intelligence Failure in Britain and the United
States', Cambridge Review of International Affairs, 12, 3 (October 2004): 495-520.
*Ian Davis and Andreas Persbo, ‘After the Butler report: time to take on the Group Think
in Washington and London’, BASIC papers: occasional papers in international security,
no. 46 (July 2004) available at http://www.basicint.org/pubs/Papers/BP46.htm
A Doig, ’45 Minutes of Infamy? Hutton, Blair and the Invasion of Iraq’, Parliamentary
Affairs, 58, 1 (2005).
A. Doig & M. Phythian, 'The national interest and the politics of threat exaggeration: the
Blair government's case for war against Iraq'. Political Quarterly 76, 1 (2005): 368-376.
P. Gill, 'Keeping "Earthly Awkwardness": Failures of Intelligence in the United
Kingdom', in T.C. Bruneau & Steven C. Boraz (eds.), Reforming Intelligence: Obstacles
to Democratic Control and Effectiveness (Texas University Press, 2007) chapter 4.
A Glees, ‘Evidence-based policy or policy-based evidence? Hutton and the government’s
use of secret intelligence’, Parliamentary Affairs, 58, 1 (2005).
E. O'Halpin, 'British Intelligence and the Case for Confronting Iraq: Evidence from the
Butler and Hutton Reports,' Irish Studies in International Affairs 16 (2005) pp.89–102.
[http://www.ria.ie/cgi-bin/ria/papers/100537.pdf]'
J Humphries, ‘The Iraq dossier and the meaning of spin’ Parliamentary Affairs, 58, 1
(2005): 156-70.
L Freedman, ‘War in Iraq: selling the threat’, Survival 46, 2 (2004): 7-50.
For both also read the Australian Account - A. Wilkie, Axis of Deceit
25
9
Security Intelligence and Counter-terrorism:
The Liberal State before 1990
9.1 Why does intelligence in the counter-terrorist context present the liberal
state with special problems and dilemmas?
9.2 Was there a particular UK doctrine of counter-terrorist intelligence that
emerged from Northern Ireland? Does it remain valid ?
Books
J. Adams, The New Spies, chs.14 & 15
*J Boyer Bell, Dynamics of the Armed Struggle – chapter on intelligence L
M.G. Davidson, Combatting Terrorism
*S. Farson, (eds.) Security and Intelligence in a Changing World, ch 13. L
A.M. Marenches, The fourth world war : diplomacy and espionage in the age of
terrorism
T.R. Mockaitis, British Counter-Insurgency in the Post Imperial Era
Northern Ireland - Recommended Case Study
J. Adams et al, Ambush
J. Bowyer Bell, The dynamics of the armed struggle JE 300.T3
M Dillon, The Enemy Within L
P. Foot, Who Framed Colin Wallace? .
*T Geraghty, The Irish War L
J. Holland, Phoenix: Policing in the Shadows
M McGartland 50 Dead Men Walking
M. Smith, The Spying Game
*P Taylor, Brits: The War Against the IRA DA 990.U468
M Urban, Big Boys Rules L
*B. Bamford, 'The Role and Effectiveness of Intelligence in Northern Ireland', INS, 20/4
(2005): 581-607.
*D.A. Charters, 'Counter-Terrorism Intelligence: Sources, Methods, Processes and
Problems' in D.A. Charters (ed.), Democratic Responses to International Terrorism 227267, L
S.A. Farson, 'Criminal Intelligence vs. Security Intelligence: Re-evaluation of the Police
Role in the Response to Terrorism' in D.A. Charters (ed.), Democratic Responses ,
pp.191-227.
F. Hitz, 'Unleashing the Rogue Elephant: September 11 and Letting the CIA Be the CIA',
ch.29 in Johnson and Wirtz, Intelligence and National Security: The Secret World of
Spies, L
*K.G. Robertson, 'Intelligence, Terrorism and Civil Liberties', Conflict Quarterly, 7, 2
(Spr 87) – this is reproduced in the P. Wilkinson et al volume Contemporary Research on
Terrorism L
26
10
Security Intelligence and Counter-terrorism:
The Market State
10.1 To what extent may terrorist organizations be considered to be simply
malignant forms of secret service ?
10.2 Does counter-terrorist intelligence require special forms of control,
regulation and oversight and if so what shape should it take?
10.3 What impact has globalization had upon intelligence to support counterterrorism activities?
10.4 How has counter-terrorist intelligence changed since 9/11 in pursuit
of the 'new terrorism' - and how far have we forgotten important lessons
from the twentieth century?
Anonymous, [Michael Scheuer] Imperial Hubris: Why the West is Losing the War on
Terror L
J Arquilla, Countering the New Terrorism RAND
A. Cronin & J Ludes, Attacking Terrorism, (ch.5 on intelligence by Pillar)
D.D. Clarridge, A spy for all seasons : my life in the CIA [section on creation of the CT
centre]
R Baer, See No Evil L
Peter Chalk & W. Rosenau, Confronting 'the Enemy Within': Security Intelligence, the
Police, and Counterterrorism in Four Democracies. available at http://www.rand.org/pubs/monographs/MG100/
*RD Crelinsten, Intelligence and Counter-Terrorism in a Multi-Centric World (Swedish
National Defence College, War Studies Research Reports No.13, 2006) L
*P Chalk & W Rosenau, Confronting 'the Enemy Within': Security Intelligence, the
Police, and Counterterrorism in Four Democracies, RAND L
P Hennessy (ed.), The New Protective State
P Heymann, Terrorism, Freedom and Security especially Part II, 37-87
L Johnson, Strategic Intelligence: Volume III. Covert Action: Behind the Veils of Secret
Foreign Policy esp chapter 9 UB 250.S6385 REF ONLY
L Johnson, Strategic Intelligence: Volume IV. Counterintelligence and Counterterrorism:
Defending the Nation Against Hostile Forces esp chapter 6-8 UB 250.S6385 REF ONLY
*T. Naftali, Blind Spot L
*R Posner, Countering Terrorism L
J. Prados, America Confronts Terrorism
* Wesley K. Wark (ed.), Twenty-First Century Intelligence L
27
Articles
CT intelligence since 9/11
C. Cogan, 'Hunters not gatherers: Intelligence in the twenty-first century', INS, 19/2 (2004):.304–
321.
D.A. Charters, 'Counter-Terrorism Intelligence: Sources, Methods, Processes and Problems' in
D.A. Charters (ed.), Democratic Responses to International Terrorism (NY: Transnational
Publishers 1990) pp.227-267. L
S.A. Farson, 'Criminal Intelligence vs. Security Intelligence: Re-evaluation of the Police Role in
the Response to Terrorism' in D.A. Charters (ed.), Democratic Responses to International
Terrorism (NY: Transnational Publishers 1990) pp.191-227.
L. Freedman, ‘The Politics of Warning: Terrorism and Risk Communication’, INS 20/3 (2005):
379-418.
P. Gill, 'Securing the Globe: Intelligence and the Post-9/11 Shift from 'Liddism' to 'Drainism' ,
INS 19/3 (2004): 467-489.
M. Herman, 'Counter-Terrorism, Information Technology and Intelligence Change', INS 18/4
(December 2003): 40-58.
B. Hoffman, ‘Intelligence and Terrorism: Emerging Threats and New Security Challenges in the
Post-Cold War Era,’ INS 11/2 (1996): 207-223.
P.R Pillar, 'Counterterrorism after Al Qaeda,' The Washington Quarterly 27/3 (2004): 101-113.
M. Rudner, 'Financial Intelligence, Terrorism Finance, and Terrorist Adaptation,” International
Journal of Intelligence and CounterIntelligence 19/1 (2006):32-58.
J.E. Sims, Intelligence to Counter Terror: The Importance of All Source Fusion, Intelligence and
National Security 22/1 (2007):.38-56.
G. Treverton, 'Terrorism, Intelligence and Law Enforcement: Learning the Right Lessons.' INS
18/4 (2003): 121-40.
W. Wark, 'Learning Lessons (and how) in the War on Terror: The Canadian Experience,'
International Journal 60/1 (2004-2005): 71-90.
A dozen useful short articles on terrorism in general from the Harvard International
Review are available online at >
http://hir.harvard.edu/special/
The journal International Security has also put its terrorism articles on line- you can find
these by going to the sample articles page for the journal on the MIT press website
28
11
Security Intelligence and Tyranny
11.1 What functions does security intelligence perform in the authoritarian state?
11.2 Discuss the relationship between political policing and state development in
Continental Europe and Russia in the 18th and 19th Centuries
11.3 To what extent are the organisations of state security the defining
characteristic of the totalitarian [not authoritarian] state?
Books
Literature on the general relationship between political policing and repressive regimes is
limited. Specific material is plentiful.
General
*J. Adelman (ed.), Terror and Communist Politics: The Role of the Secret Police in
Communist States
R. Bengalli and C. Summer, Social Control and Political Order HD 5020.S6
BB Campbell & AD Brenner, Death Squads in Global Perspective HV6322.C2
*B. Chapman, Police State JC 11.C4
J.E. Cronin, The Politics of State Expansion
*C. Dandeker, Surveillance, Power and Modernity: Bureaucracy and Discipline form
1700 to the Present Day HB 6000.D2
*M. Deflem, Policing World Society
JJ Linz, Totalitarian and authoritarian regimes JB 2500.L4
M. Mazower, (ed.) The policing of politics in the twentieth century HF 3800.P6
S. Schafer, The Political Criminal HF 3200.S2
S. Tormey, On Tyranny, for the nature of the totalitarian state in general.
DR Villa, Politics, Philosophy, Terror: Essays on the Thought of H Arendt JB 1742.A75
Articles
D Banley, ‘The Police and Political Development in Europe’ in The Formation of
National States in Western Europe, ed. by C. Tilly D 217.T4
D.H. Bayley, 'The Police and Political Development in Europe' in C.H. Tilly (ed.) The
Formation of Nation States in Europe D 217.T4
C Davenport, ‘Multi-Dimensional Threat Perception and State Repression: An Enquiry into
Why States Apply Negative Sanctions’ American Journal of Political Science 39, 3
(August 1995): 683-713
29
*M. Raeff, 'The Well-ordered Police State and the Development of Modernity in
Seventeenth and Eighteenth Century Europe', American Historical Review, 80, 5
(December 1975): 1221-43.
Argentina
C Aldini, That Inferno
M Feitlowitz, Lexicon of Terror F 2849.5.F3
P.H. Lewis, Guerrillas and Generals: The Dirty War in Argentina
I Guest, Behind the disappearances : Argentina's dirty war against human rights and the
United Nations JC 545.A7
Czarist Russia & Early European Police States
R.J. Goldstein, Political Repression in Nineteenth Century Europe
*Hsi Huey Liang, The Rise of the Modern Police and European State System
BB Fischer, Okhrana
J Daly, The Watchful State
*J Daly, Autocracy Under Siege
R Hingley, The Russian Secret Police HF 3831.H4
S Monas, The Third Section DK 211.M6
* M Raeff, The Well-Ordered Police State. Social and Institutional Change through law
in the Germanies and Russia, 1600-1800. DD 175.R2
C Ruud and S Stepanov, Fontanka 17
PS Squire, The Third Department DK 211.S7
F.S. Zuckerman, The Tsarist Secret Police in Russian Society,
Imperial India
C. Bayly, Empire and Information: Intelligence Gathering and Social Communication in
India DS 475.1.B2
U. Singh, Political Prisoners in India
Nazi Germany
GC Browder, Foundations of the Nazi Police State
GC Browder, Hitler’s Enforcers DD 256.5.B7
M Burleigh, The Third Reich DD 256.5.B8 esp Chapter 2, pp.146-205
R Gellately, The Gestapo and German Society HF 3823.G3
W Sofsjky, The Order of Terror
* E Johnson, The Nazi Terror DD 256.5.J6
see especially pp 1-50
*T Todorov, Moral Life in the Concentration Camps D 804.G4
German Democratic Republic
*D. Childs and R. Popplewell, The Stasi, DD 261.2.C4
30
*Helena Flam, Mosaic of Fear, Poland and East Germany before 1989
M. Fulbrook, Anatomy of a Dictatorship, DD 261.F8 .
A. Funder, Stasiland DD 261.2.F8
*J Koehler, The Stasi, HV8210.5.K6
B Miller, Narratives of Guilt, HV8210.5.M4
EN Peterson, The Limits of Secret Police Power DD 261.2.P3
Cary. 2001. ‘The Demise of East Germany’, The Journal of Modern History 73: 617-651
Soviet Russia
*C.M. Andrew, KGB: the Inside Story UB 271.R9
E. T. Bacon, The Gulag at War: Stalin’s Forced Labour System in the Light of the
Archives HM 5531.B2
R Conquest, Inside Stalin's Secret Police HF 3831.C6
S Courtois et al, The Black Book of Communism JB 2300.L4
*A. Dallin & G. Breslauer, Political Terror in Communist Systems JB 2300.A1
* Y. Druzhnikov, Informer 001: The Myth of Pavlik Morozov.
J.A. Getty and R. Thompson (eds.), Stalinist Terror: New Perspectives DK 267.S8
J. Harris, The Great Urals: Regionalism & the Evolution of the Soviet System HV
1630.H2
*A. Knight, The KGB, especially, chs 1, 10 & 11
A Knight, Beria DK 268.B32
I Kershaw & M Lewin, Stalinism and Nazism : dictatorships in comparison DK 267.S8
B. Moore, Terror and Progress, HE 1003.1.M6
D. Priestland, Stalinism and the Politics of Mobilisation DK 268.P7
*R.C. Tucker, Stalinism: Essays in Historical Interpretation JB 2351.S8
J. Arch Getty, Gabor T. Rittersporn, V. N. Zemskov, 'Victims of the Soviet Penal System
in the Pre-War Years', American Historical Review vol. 98, no. 4, (1993), pp. 1017-1049.
J. Harris, ‘The Growth of the Gulag: Forced Labor in the Urals Region, 1929-1931’, The
Russian Review, 56 (April 1997): 265-280.
J. Harris, ‘The Purging of Local Cliques in the Urals Region, 1936-7’ in Sheila
Fitzpatrick ed., Stalinism: New Directions, pp.262-285. DK 267.S8
J. Harris, ‘Dual Subordination? The Political Police and the Party in the Urals Region,
1918-1953’ in Cahiers du Monde Russe 42, 2 (2001)
* J. Harris, ‘Resisting the Plan in the Urals, 1928-1956, Or Why Regional Officials
Needed 'Wreckers' and 'Saboteurs' ‘ in Lynne Viola ed., Contending with Stalinism
J. Harris, Stalinism in a Russian Province. Journal of Modern History 71 (1999): 785786
*P. Holquist, ' 'Information is the Alpha and Omega of our Work' Bolshevik Surveillance
in its Pan European Context', Journal of Modern History 69, 3 (Sept 1997): 415-50.
T. Martin, ‘The Origins of Soviet Ethnic Cleansing’, Journal of Modern History 70, 4
(1998): 813-861
David J. Norlander, ‘Origins of a Gulag Capital: Magadan and Stalinist Control in the
early 1930s,’ Slavic Review, 57, 4 (1998): 791-81
31
D: CONTROLLING INTELLIGENCE
12 The Problems of Oversight and Accountability
12.1 'The first rule of a secret service is that it should be secret. Democratic
control is incompatible with this.' Discuss.
12.2 Compare and contrast the systems of accountability employed by at
least two English-speaking states. [Possibilities include UK, US, Canada,
Australia, New Zealand]
12.3 Consider the structure and functions of the UK Intelligence and Security
Committee. Comment on its effectiveness and suggest ways in which it might be
improved.
Books
*W Baker & J Reisman, Regulating Covert Action
U. Bar-Joseph, Intelligence Intervention in the Politics of Democratic States: The United
States, Israel and Britain
William C Banks and P Raven-Hansen, National Security Law and the Power of the
Purse
P. Birkinshaw, Reforming the Secret State
*Hans Born, Loch K. Johnson & Ian Leigh, (eds.) Who's Watching the Spies? Establishing
Intelligence Service Accountability
*P Brodeur et al, Democracy, Law, and Security: Internal Security Services in
Contemporary Europe
*F. Cain, The Australian Security and Intelligence Organization: An Unofficial History .
EA Cohen, Commandos and Politicians: Elite Military Units in Modern Democracies
*S. Farson, (eds.) Security and Intelligence in a Changing World, chs 2, 4-8 L
*P. Gill, Policing Politics: Security Intelligence and the Liberal Democratic State
*P Gill and Mark Pythian, Intelligence in and Insecure World chapter 8.
G.P. Hastedt, Controlling Intelligence [specifically on USA and CIA]
M Hollingsworth & N Fielding, Defending the Realm
L Johnson, Strategic Intelligence: Volume V. Intelligence and Accountability: Safeguards
Against the Abuse of Secret Power esp chapter 6-8 UB 250.S6385 REF ONLY
L Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of
Government esp. chapter 4 UB 250.S6385 REF ONLY
L Johnson, Hans Born and Iain Leigh (eds.) Who's Watching the Spies? Establishing
Intelligence Service Accountability, (Potomac Books,2005), 255 pp.
**H Koh, The National Security Constitution
32
*L. Lustgarten and I. Leigh, In From the Cold: National Security and Democracy
JE 215.L8 and esp parts I, IV & V
DP Moynihan, Secrecy: The American Experience
D. McKnight, Australia's Spies and their Secrets .
R. Norton-Taylor, Truth is a Difficult Concept
K Olmsted, Challenging the Secret Government: The Post-Watergate Investigations of
the CIA and FBI,
*A Roberts, Blacked Out L
*KG Robertson, Secrecy and Open Government
*F.J. Smist, Congress Oversees the United States Intelligence Community JC 242.S53
*A Thomkins, The Constitution After Scott esp ch 4 KM 61.T6
B Thompson & FF Ridley, Under the Scott Light JD 300.32.U6
D. Williams, Not in the Public Interest JC 832.W4
*D Vincent, The Culture of Secrecy JC 832.V4
*Edward Woodward, One Brief Interval
Articles
H. Barnett, 'Legislation-based National Security Services', INS 9, 2 (April 1994): 287300.
L. Britt Snyder, 'Congressional Accountability and Intelligence after September 11,' in
Jennifer E. Sims, and Burton L. Gerber, (eds.) Transforming U.S. Intelligence pp.239-58.
L
William J. Daugherty, 'Approval and Review of Covert Action Programs since Reagan.'
International Journal of Intelligence and Counterintelligence 17/1 (2004): 62-80.
P Gill, 'Evaluating intelligence oversight committees: The UK Intelligence and Security
Committee and the 'war on terror', Intelligence & National Security 22/1 (2007):.14-37.
P. Gill, 'Symbolic or Real? The Impact of the Canadian Security Intelligence Review
Committee, 1984-88?', INS 4, 3 (July 1989): 550-75.
P. Gill, 'Democratic and Parliamentary Accountability of Intelligence Services after
September 11 th'. Working Paper 103, Geneva Centre for Democratic Control of Armed
Forces, January. http://www.dcaf.ch/publications/Working_Papers/103.pdf
*P. Gill ‘Re-asserting Control’, INS 1, 2 (1996)
Anthony Glees & Philip H.J. Davies. 'Intelligence, Iraq and the Limits of Legislative
Accountability during Political Crisis,' Intelligence and National Security 21/ 5 (2006):
848-883.
A. Hulnick, 'Openness: Being Public About Secret Intelligence.' International Journal of
Intelligence and Counterintelligence, (Winter 1999), v. 12, no. 4, p. 463-483.
*W.H. Jackson, ‘Congressional Oversight of Intelligence: Search for a Framework’, INS
5, 3 (Jul. 1990): 113-147.
S.F. Knott, ‘The Great Republican Transformation on Oversight’, International Journal
of Intelligence and Counterintelligence 13/1 (2000): 49-63.
L Johnson, ’The CIA and the Question of Accountability’, INS 12, no. 1 (Jan. 1997): 178200
33
L Johnson, 'Covert Action and Accountability: Decision-Making for America's Secret
Foreign Policy', ch.28 in Johnson & Wirtz, Intelligence and National Security: The Secret
World of Spies, L
H. P. Lee, 'The Australian Security Intelligence Organisation: New Mechanisms for
Accountability', The International and Comparative Law Quarterly 38/4 (1989):.890-905
*L. Johnson, 'Accountability and America's Secret Foreign Policy: Keeping a Legislative
Eye on the Central Intelligence Agency', Foreign Policy Analysis, 1, 1 (2005): 99L. Lustgarten, 'Accountability of the Security Services in Western Democracies', 1992
Current Legal Problems 145
FF Manget, ‘Another System of Oversight: Intelligence and the Rise of Judicial
Intervention.’, Studies in Intelligence 39, 5 (1996): 43-50. Also reproduced as ch.31 in
Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies,
K.G. Robertson, 'Accountable Intelligence: The British Experience', Conflict Quarterly,
VIII, 1 (1988).
* S.F. Knott, ‘The Great Republican Transformation on Oversight’, International Journal
of Intelligence and Counterintelligence 13, 1 (Spring 2000): 49-63.
F.F. Manget, ‘Another System of Oversight: Intelligence and the Rise of Judicial
Intervention,’ Studies in Intelligence 39/5 (1996): 43-50.
G. Merom, 'Virtue, Expediency and the CIA's Institutional Trap', INS 7, 2 (April 1992):
30-52.
*M.C. Ott, 'Partisanship and the Decline of Intelligence Oversight.' International Journal
of Intelligence and Counterintelligence, (Spring 2003) 16, 1, p. 69-94.
M. Phythian, 'Still a Matter of Trust: Post-9/11 British Intelligence and Political Culture',
International Journal of Intelligence and CounterIntelligence 18/4 (2005):.653-81.
*M. Phythian, 'The British experience with intelligence accountability', INS 22/1 (2007):
75-99.
R. Rempel, 'Canada's Parliamentary Oversight of Security and Intelligence,' International
Journal of Intelligence and Counterintelligence 17/4 (2004): 634-54.
*K.G. Robertson, 'Recent Reform of Intelligence in the UK', INS 13, 2 (Summer 1999):
144-59.
F.A.O. Schwarz, 'The Church Committee and a New Era of Intelligence Oversight,'
Intelligence and National Security 22/2 (2007):.270-297.
Matthew B. Walker, 'Reforming Congressional Oversight of Intelligence.' International
Journal of Intelligence and Counterintelligence 19/4 (2006-7):.702-720
G.R. Weller, 'Oversight of Australia's Intelligence Services', International Journal of
Intelligence and CounterIntelligence 12/4 (1999): 484-503.
R. Whitaker, 'The "Bristow Affair": A Crisis of Accountability in Canadian Security
Intelligence', INS 11, 2 (April 1996): 279-305.
R. Whitaker, 'The Politics of Security Intelligence Policy-making in Canada: I 1970-84',
INS 6, 4 (October 1992): 649-668.
R. Whitaker, 'The Politics of Security Intelligence Policy-making in Canada: II 1984-91',
INS 7, 2 (April 1992); 53-76.
34
13
The Problem of Surveillance and Civil Liberties
13.1 How far can civil liberties be reconciled with the security demands made of
the modern surveillance state after 11 September 2001?
13.2 Do technological societies and knowledge-based economies naturally
produce ‘states of surveillance’, or do such new developments help us to curb
excessive surveillance by the state ?
13.3 To what extent are security, democracy, affluence and privacy
compatible in developed democratic states in the twenty-first century ?
13.4 ‘If citizens demand transparency of the state, then the state is entitled to
demand transparency of its citizens.’ Discuss.
C. Ackroyd et al, The Technology of Police Control
R. Bengalli and C. Summer, Social Control and Political Order.HD 5020.S6
A. Bergin and R. Hall (eds) Intelligence and Australian National Security
R. Billingsley, T. Nemitz and P. Bean. Informers : policing, policy, practice HF 3811.I6
W. Bogard, The Simulation of Surveillance: Hypercontrol in Telematic Societies.
R.H. Blum, Surveillance and Espionage in a Free Society
D. Campbell and S Connor, On the Record JC 532.C2
M. Castells, The Rise of the Network Society HP 994.3.C2 FH Cate, Privacy in the Information Age
D. Cohen & J. Wells, (eds.) American National Security and Civil Liberties in an Era of
Terrorism 3 DAY-L 1-4039-6200-6
D. Cole and JX Dempsey, Terrorism and the Constitution Free Press 2002 1565847822
* W Diffie & S Landau, Privacy on the Line, QA 73.4.D4
*A Etzioni, The Limits of Privacy JC 542.E8
A. Etzioni, & JH Marsh, eds. Rights vs. Public Safety After 9/11: America in the Age of
Terrorism
K.D. Ewing & C.A. Gearty, Freedom Under Thatcher, JC 532.E9
*S. Farson, (eds.) Security and Intelligence in a Changing World, chs 2, 4-8 L
S. Field and C Pelser (eds.) Invading the private : state accountability and new
investigative methods in Europe
Simon Garfinkel, Database Nation JC 542.G2
*P. Gill, Policing Politics: Security Intelligence and the Liberal Democratic State
* P Gill, Rounding Up The Usual Suspects: Developments in Contemporary Law
Enforcement Intelligence
John Gilliom, Overseers of the poor: surveillance, resistance, and the limits of privacy
P. Hanks and J McManus (eds.), National Security: Surveillance and Accountability in a
Democratic Society
PB Heymann, Terrorism, Freedom and Security
Philip B. Heymann and Juliette N. Kayyem, Protecting Liberty in an Age of Terror
35
Michael Ignatieff, The Lesser Evil: Political Ethics in an Age of Terror JE 300.T3
P Hillyard, Suspect Community, Peoples Experiences of the PTA in Britain HF 3200.H4
M. Hollingsworth & R. Norton-Taylor, Blacklist: The Inside Story of Political Vetting
HF 3500.H6
R. Hunter, World without secrets: business, crime, and privacy in the age of ubiquitous
computing
**R Jeffreys-Jones, The CIA and American Democracy UB 271.U6
G Kinsman, et al (eds) Whose national security? Canadian state surveillance and the
creation of enemies
R Leone & G Anrig, The War on Our Freedoms,
*David Michael Levin, The Philosopher’s Gaze
T. Y. Levin, U. Frohne and P. Weibel. (ed) Rhetorics of surveillance from Bentham to
Big Brother
S. Levy, Crypto: Secrecy and Privacy in the New Code War
*L. Lustgarten and I. Leigh, In From the Cold: National Security and Democracy
JE 215.L8
and especially parts I, II & III
D. Lyon, The Electronic Eye: The Rise of the Surveillance Society QA 73.4.L9
*D. Lyon, Surveillance After September 11 HD 5062.L9 ]
H. Margetts, Information Technology and Government: Britain and America
*C. Fijnaut, Gary T. Marx, Undercover : police surveillance in comparative perspective
S. Milne, The Enemy Within DA 592.5.M4 L
R. Morgan & T. Newburn. The Future of Policing.
C. Norris and G. Armstrong, The Maximum surveillance society : the rise of CCTV
HD 5011.N6
R. Norton-Taylor, In Defence of the Realm?
J Rosen, The Unwanted Gaze: The destruction of privacy in America
*M Sidel, More Secure Less Free?
*B Stockton, Flawed Patriot
S. Sharpe, Search and surveillance : the movement from evidence to information
D. Stafford, The Delicate Balance: Security, Liberty and the Canadian Intelligence
Community JC 543.S8
W.G. Staples, Everyday surveillance : vigilance and visibility in postmodern life
William G. Staples, The Culture of Surveillance: Discipline and social control in the
United States.
D. Thomas & B.D. Loader, (eds.) Cybercrime : law enforcement, security and
surveillance in the information age HF 3200.C9 L
C. Walker, The Prevention of Terrorism in British Law KM 562.2.W2
*F. Webster, Theories of the Information Society HE 1500.W3
[in Webster see especially chapter 4 on Anthony Giddens and surveillance]
*R Whitaker, The end of privacy : how total surveillance is becoming a reality &
I. Will, The Big Brother Society,
The FBI during the Cold War provides an interesting case study –
36
D. Cunningham, There's something happening here : the New Left, the Klan, and FBI
counterintelligence E 850.C8
J.K. Davis, Spying on America: The FBI's Domestic Counter-Intelligence Programme
*D.J. Garrow, The FBI and Martin Luther King L
*C. Gentry, J Edgar Hoover L
R Jeffreys-Jones, Cloak and dollar: a history of American secret intelligence UB 271.U6
R. Powers, Secrecy and Power L
R. Radosh & J Milton, The Rosenberg File KB 65.R6 L
K. O’Reilly, Racial Matters: The FBI’s Secret File on Black America E 185.615.O7 L
K. O’Reilly, Hoover and the UnAmericans
N.S. Robbins, Alien Ink: The FBI’s War on Freedom of Expression
*A Summers, Official and Confidential L
*A.G. Theoharis & John Stuart Cox. The Boss: J. Edgar Hoover and the Great American
Inquisition. E 835.5.H6 L
*A.G Theoharis, Chasing Spies : How the FBI Failed in Counterintelligence but
Promoted the Politics of McCarthyism in the Cold War Years
.L
Some good historical surveys include *S. Diamond, Compromised Campus: the collaboration of [US] universities and the
intelligence community, 1945-1955
*K. Ewing and C. Gearty, The Struggle for Civil Liberties, 1914-45 KM 201.E9
P Hennessy, The Secret State UA 647.H3
*A.W. Simpson, In the Highest Odious KM 233.3.S4
J. Topey, The Invention of the Passport KM 175.T6
Articles
Akdeniz, Y., Taylor, N., and Walker, C., "Regulation of Investigatory Powers Act 2000:
Bigbrother.gov.uk" [2001] Criminal Law Review 73-90
L. Amoore, 'Biometric borders: Governing mobilities in the war on terror', Political
Geography 25/ 3 (2006) pp.336-351.
C. Bell, ‘Surveillance Strategies and Populations at Risk’, Security Dialogue 37/2 (2006)
pp.147-65.
M. De Rosa, 'Privacy in the Age of Terror', The Washington Quarterly 26:3 (2003): 27–
41. Online at - http://www.twq.com/03summer/docs/03summer_derosa.pdf
Robin Evans, ‘Bentham’s Panopticon: An incident in the social history of architecture,’
Architectural Association Quarterly 3/2 (1971) pp.21-37.
C. Gearty, ‘Terrorism and Human Rights’, Government and Opposition 42/3 (2007)
pp.340-62.
P. Gill, 'Defining Subversion: The Canadian Experience since 1977,' Public Law 617
(1989) pp.617-636.
37
Peter Gill, 'Not Just Joining the Dots But Crossing the Borders and Bridging the Voids:
Constructing Security Networks after 11 September 2001' Policing and Society 16/1
(2006) pp.27-49.
Michael Levi & David Wall, 'Technologies, Security, and Privacy in the Post-9/11
European Information Society', Journal of Law and Society 31/ 2 (2004) pp.194-220.
M. Lianos and M. Douglas, ‘Dangerization and the End of Deviance: The Institutional
Environment’ in R. Sparks and D. Garland (Eds) Criminology and Social Theory. Oxford
University Press. 2000. HV6025.C7
Kate Martin, 'Domestic Intelligence and Civil Liberties', SAIS Review 24/1, (2004), pp.721.
Gary Marx, 'Some Concepts that May be Useful in Understanding the Myriad Forms and
Contexts of Surveillance', in L.V. Scott and P.D. Jackson (eds.) Understanding
Intelligence in the 21st Century (London: Routledge 2004), pp.78-98.
Thomas Mathieson, ‘The Viewer Society: Foucault’s Panopticon revisited’ in Theoretical
Criminology 1: 125-134. 1997.
G. Marx, 'Some Concepts that May be Useful in Understanding the Myriad Forsm and
Context of Surveillance' Ch 5. In LV Scott and PD Jackson (eds.) Understanding
Intelligence in the 21st Century Routledge 2004 [this book is also Intelligence and
National Security, Vol. 20, No. 1 (Summer 2004)]
Mark Poster, ‘Databases as discourse, or Electronic Interpellations,’ in D. Lyon and E.
Zureik [Eds.] Computers, Surveillance and Privacy. (Minneapolis: University of
Minnesota Press, 1996) pp.175-192. QA 73.4.C6
Ken Roach, 'The World Wide Expansion of Terrorism Laws after September 11,' Studi
Senesi 116 (2004) pp.487-524.
K.G. Robertson, 'Intelligence, Terrorism and Civil Liberties', Conflict Quarterly, 7/2
(1987) pp.43-62 also in P. Wilkinson & AM Stewart (eds.) Contemporary Research on
Terrorism (Aberdeen: University of Aberdeen Press, 1987).
Shlomo Shpiro, 'No Place to Hide: Intelligence and Civil Liberties in Israel', Cambridge
Review of International Affairs 19/4 (2006) pp.629-48
Thomas Mathieson, ‘The Viewer Society: Foucault’s Panopticon revisited’ in Theoretical
Criminology 1 (1997) pp.125-134.
*K.G. Robertson, 'Intelligence, Terrorism and Civil Liberties', Conflict Quarterly, 7, 2
(Spring 1987) available in P Wilkinson & AM Stewart (eds) Contemporary Research on
Terrorism
*J. Sheptycki, 'High Policing in the Security Control Society', Policing 1/1 (2007): 70-79.
Jennifer Sims, 'Intelligence to counter terror: The importance of all-source fusion',
Intelligence & National Security, 22/1 (2007) pp.38-56.
Lee S. Strickland, 'Civil Liberties vs. Intelligence Collection: The Secret Foreign
Intelligence Surveillance Act Court Speaks in Public.' Government Information Quarterly
20/1 (2003) pp.1-12.
*HE Ventura, J Miller, J. Mitchell, M Deflem, ‘Governmentality and the War on Terror:
FBI Project Carnivore and the Diffusion of Disciplinary Power’, Critical Criminology
13/1 (2005) 55-71
38
14 The Ethics of Espionage
14.1 Can espionage form part of an ethical foreign policy?
14.2 'Espionage can be ethical but can never be moral'. Discuss.
14.3 How useful is the concept of 'Just War' as an ethical benchmark for both
foreign intelligence collection and covert action?
Espionage and ethics generally
Books
Jan Goldman, (ed.), Ethics of Spying: A Reader for the Intelligence Professional
M. Herman, Intelligence in the Information Age
J Kish, International Law and Espionage
James Olson, Fair Play: The Moral Dilemmas of Spying
Articles
H Cohen & R Dudai, 'Human Rights Dilemmas in Using Informers to Combat Terrorism:
The Israeli-Palestinian Case'. Terrorism and Political Violence 17 (Winter 2005):229-243
William E. Colby, 'Public Policy, Secret Action' Ethics and International Affairs 3
(1989) pp.61-71.
GE Drexel. 'Ethics & Intelligence', Foreign Affairs 56, 3 (Apr. 1978): 624-642.
Paul G. Ericson, 'The Need for Ethical Norms,' Studies in Intelligence 36/5 (1992) pp.1518.
*T Erskine, 'As Rays of Light to the Human Soul', Ch.13. In LV Scott and PD Jackson
(eds.) Understanding Intelligence in the 21st Century Routledge 2004 [also Intelligence
and National Security, Vol. 20, No. 1 (Summer 2004)]
*M Herman, 'Ethics and Intelligence after September 2001', Ch.12 in In LV Scott and PD
Jackson (eds.) Understanding Intelligence in the 21st Century Routledge 2004 [also
Intelligence and National Security, Vol. 20, No. 1 (Summer 2004)]
M. Herman, 'Modern Intelligence Services: Have They a Place in Ethical Foreign
Policies.' In Agents for Change: Intelligence Services in the 21st Century, ed. Harold
Shukman, 287-311.
Michael Herman, 'Intelligence Services and Ethics in the New Millenium,' Irish Studies
in International Affairs 10 (1999) pp.260-261.
Michael Herman, 'Modern Intelligence Services: Have They a Place in Ethical Foreign
Policies' in, Harold Shukman (ed.) Agents for Change: Intelligence Services in the 21st
Century (London: St. Ermin's 2000) pp.287-311.
Arthur S Hulnick & David W. Mattausch. 'Ethics and Morality in United States Secret
Intelligence,' Harvard Journal of Law & Public Policy 12/2 (1989) pp.509-522.
39
F. Hitz, 'Unleashing the Rogue Elephant: September 11 and Letting the CIA Be the CIA'
ch.29 in Johnson and Wirtz, Intelligence and National Security: The Secret World of
Spies,
Andrew Hurrell, ‘‘There Are No Rules’ (George W. Bush): International Order After
September 11th,’ International Relations 16, 2 (2002).
Angela Gendron, 'Just War, Just Intelligence: An Ethical Framework for Foreign
Espionage', International Journal of Intelligence and Counterintelligence 18, 3 (Fall
2005) 398-434
E.D. Godfrey, 'Ethics and Intelligence, ch.30 in Johnson and Wirtz, Intelligence and
National Security: The Secret World of Spies L
William R Johnson, 'Ethics and Clandestine Collection,' Studies in Intelligence 27/1
(1983) pp.1-8.
John, S.J. Langan, 'Moral Damage and the Justification of Intelligence Collection from
Human Sources,' Studies in Intelligence 25/2 (1981) pp.57-64.
Sir David Omand, 'Ethical Guidelines in Using Secret Intelligence for Public Security',
Cambridge Review of International Affairs 19/4 (2006): 613-28.
Kent Pekel, 'Integrity, Ethics, and the CIA: The Need for Improvement,' Studies in
Intelligence (1998) pp.85-94.
David L. Perry, 'Repugnant Philosophy: Ethics, Espionage, and Covert Action,' Journal
of Conflict Studies, 15/1 (1995) pp.92–115.
Tony Pfaff & Jeffrey Tiel, 'The ethics of espionage', Journal of Military Ethics 3/1,
(2004) pp.1-15.
Sir Michael Quinlan, 'Just Intelligence: Prolegomena to an Ethical Theory.' Intelligence
and National Security 22/1 (2007) pp.1-13, also in Peter Hennessy (ed.), The New
Protective State (London: Continuum 2007) pp.97-122.
Gregory F. Treverton, 'Imposing a Standard: Covert Action and American Democracy,'
Ethics & International Affairs 3 (1989) pp.27-43.
G Treverton, "Covert Action and Open Society." Foreign Affairs 65, 5 (Summer 1987):
995-1014
Richard R. Valcourt, 'Controlling U.S. Hired Hands.' International Journal of
Intelligence and Counterintelligence 2/2 (1988) pp.163-178.
40
15 Torture and Assassination
15.1 Can an ethical case ever be made for the use of torture during
interrogation?
15.2 Can an ethical case ever be made for assassination?
TORTURE - articles are the key thing
Books
M Bagaric, J Clarke, Torture: When the Unthinkable,
*R Crelinsten & A Schmid, The Politics of Pain
M Danner, Torture and Truth
J. Gray, M. Benvenisti & B. Ehrenreich, Abu Ghraib: The Politics of Torture
K Greenberg, Torture Debate in America
K Greenberg & J Dratel, The Torture Papers HF 3342.T6 also e-resource
S Grey, Ghost Plane Hurst
J Jaffer, A Singh Administration of Torture e-book
M Lazreg, Torture and the Twilight of Empire: From Algiers to Baghdad
* S Levinson (ed.) Torture, esp pp. 257-90. L
C Mackey & G. Miller, The Interrogators: Inside the Secret War Against al Qaeda
AW McCoy, A Question of Torture: CIA Interrogation, from the Cold War to the War on
Terror
R Meeropol, America’s Disappeared: Secret Imprisonment, Detainees and the War on
Terror
T Paglen & AC Thompson, Torture Taxi
S. Philippe, Lawless World esp chs 7 & 9 JE 210.S2
*D Rejali, Torture and Democracy
E. Saar, Inside the Wire : A Military Intelligence Soldier's Eyewitness Account of Life at
Guantanamo
S. Strasser, The Abu Ghraib Investigations: The Official Reports of the Independent
Panel and Pentagon on the Shocking Prisoner Abuse in Iraq L
Michael Walzer. Arguing about war L
T Williamson, Investigative Interviewing
Articles
F. Allhof, 'Terrorism and Torture', International Journal of Applied Philosophy 17/1
(2003) pp.105-18.
Thomas E Ayres, ' "Six Floors" of Detainee Operations in the Post-9/11 World',
Parameters, 35/3 (Autumn 2005) pp.3-53.
41
Mirko Bagaric and Julie Clarke, 'Not Enough Official Torture in the World? The
Circumstances in Which Torture Is Morally Justifiable,' University of San Francisco of
Law Review 39 (2005) pp.581-616. [see reply by Rumney below]
Alex Bellamy, 'No pain, no gain? Torture and ethics in the war on terror', International
Affairs 82/1 (2006) pp.121-48.
Ruth Blakeley, 'Language, policy and the construction of a torture culture in the war on
terrorism', Review of International Studies 33/1 (2007) pp.373-94.
*Mark Bowden, 'The Dark Art of Interrogation,' Atlantic Monthly, 292/3 (2003) pp.51–
76.
R. Crelinsten, 'The World of Torture: A Constructed Reality,' Theoretical Criminology
7/3 (2003) pp.293-318.
Alex Danchev, ‘Accomplicity: Britain, Torture and Terror’, The British Journal of
Politics and International Relations 8 (4) 2006
Alan M. Dershowitz, “Reply: Torture Without Visibility And Accountability Is Worse
Than With It,” University of Pennsylvania Journal of Constitutional Law 6 (2003):326.
[reply to Kriemer, see below]
Alan M. Dershowitz, 'The Torture Warrant: a Response to Professor Strauss", New York
Law School Law Review 48 (2003) pp.275-294 [reply to Strauss, see below]
HA Giroux, 'Education after Abu Graib: Revisiting Adorno's Poltics of education'
Cultural Studies 18, 6 (2004) 779-815.
G Hooks & C Mosher, 'Outrages against personal dignity: Rationalizing abuse and torture
in the war on terror' Social Forces, 83, 4 (2005): 1627-46.
Richard Jackson, 'Language, policy and the construction of a torture culture in the war on
terrorism', Review of International Studies 33/1 (2007) pp.353-371.
Seth Kreimer, 'Too Close to the Rack and the Screw: Constitutional Constraints on
Torture in the War on Terror,' University of Pennsylvania Journal of Constitutional Law
6 (2003) 278 [see reply by Dershowitz above]
AC McCarthy 'Ticking Time bombs: Continuing the Torture Debate' National Review
online 2005Alfred W. McCoy, 'Cruel Science: CIA Torture and U.S. Foreign Policy',
New England Journal of Public Policy, 19/2 (2005) pp.1-54.
Assaf Meydani, 'The Interrogation Policy of the Israeli General Security Service:
Between Law and Politics', International Journal of Intelligence and CounterIntelligence
21/1 (2008) pp.26-39.
Assaf Meydani, 'Security and Human Rights Policy: Israel and the Interrogation Case of
1999', Contemporary Security Policy 28/3 (2007) pp.579-96.
R Morgan' The Utilitarian Justification of Torture' Punishment and Society 2, 2 (2000)
181-96
GL Neuman, 'Comment Counter-terrorist operations and the rule of law' European
Journal of International Law 15, 5 (2004) 1019-29
AW McCoy, 'Cruel Science: CIA Torture and U.S. Foreign Policy', New England
Journal of Public Policy, 19, 2 ( Winter 2005): 1-54.
John T. Parry, 'What Is Torture, Are We Doing It, and What If We Are?' University of
Pittsburgh Law Review 64 (2003) pp.237-262.
*Maureen Ramsay, 'Can the torture of terrorist suspects be justified?', The International
Journal of Human Rights 10, 2 (2006):103-19.
42
*A Roberts, ‘Review Essay: Torture and Incompetence in the “War on Terror”’, Survival,
49, 1 (Spring 2007): 199-212
Philip N.S. Rumney, 'Is Coercive Interrogation of Terrorist Suspects Effective? A
Response to Bagaric and Clarke,' University of San Francisco of Law Review 40 (2006)
pp.479-513 [see Bagaric and Clarke above]
H Schue, 'Torture', Philosophy and Public Affairs 7, 2 (1978): 124-43
*Jerome Slater, 'Tragic Choices in the War on Terrorism: Should We Try to Regulate and
Control Torture?', Political Science Quarterly 121/2 (2006) pp.191-215.
*Marcy Strauss, 'Torture'. New York Law School Law Review, 48/1&2 (2004) pp.201-274
[see reply by Dershowitz above]
Peace and Conflict: Journal of Peace Psychology, 13/4 (2007) is a special issue of eight
essays focusing on torture.
ASSASSINATION - almost all articles
Books
Fabian Escalante, The Cuba Project 2004
L. Johnson, Bombs, Bugs, Drugs and Thugs,
* B Stockton, Flawed Patriot
Articles
B Berkowtiz, 'Is Assassination and Option', Hoover Digest 2002, 1 at http://www.hoover.org/publications/digest/4477731.html
R.J. Bruemmer, "The Prohibition on Assassination: A Legal & Ethical Analysis." In In
the Name of Intelligence: Essays in Honor of Walter Pforzheimer, eds. Hayden B. Peake
and Samuel Halpern, 137-165.
*Daniel S Byman 'Time to Kill? Assassinations and Foreign Policy,' 85/2 Foreign Affairs
(2006) pp.95-111.
J Claburn, "Public Constraints on Assassination as an Instrument of U.S. Foreign Policy."
International Journal of Intelligence and Counterintelligence 7, 1 (Spring 1994): 97-109.
Steven R. David & Yael Stein, 'Israel's Policy of Targeted Killings,' Ethics and
International Affairs 17/2 (2003) pp.111-126.
K. Eichensehr, 'On the Offensive: Assassination Policy Under International Law',
Harvard International Review 25/3 (Fall 2003)
43
*ML Gross, 'Fighting by other means in the Mideast: a Critical Analysis of Israel's
Assassination Policy', Political Studies 51/2 (2003) pp.350-68 [see the reply by Statman
below].
BM Johnson, "Executive Order 12,333: The Permissibility of an American Assassination
of a Foreign Leader" Cornell International Law Journal 25, 2 (Spring 1992): 401-436.
Asa Kasher &Amos Yadlin, 'Assassination and Preventive Killing', SAIS Review, XXV,
1, (winter-spring, 2005): 41-57.
Asa Kasher & Amos Yadlin, 'Assassination and Preventive Killing', SAIS Review, 25/1
(2005) pp.41-57.
D. Krezmer, ‘Targeted Killing of Suspected Terrorists: Extra-judicial Executions or
Legitimate Means of Defence?’, European Journal of International Law 16/2 (2005)
pp.171-212.
C Lotrione, 'When to target Leaders', Washington Quarterly 26, 3 (2003): 73-86
Eric Patterson & Teresa Casale, 'Targeting Terror: The Ethical and Practical Implications
of Targeted Killing,' International Journal of Intelligence and Counterintelligence 18/4
(2005-2006) pp.638-652.
JT Richelson, "When Kindness Fails: Assassination as a National Security Option."
International Journal of Intelligence and Counterintelligence 15, 2 (Summer 2002): 243274.
Bruce A. Ross, 'The Case for Targeting Leadership in War,' Naval War College Review
46/1 (1993) pp.73-93.
MN Schmitt, "State-Sponsored Assassination in International and Domestic Law" Yale
Journal of International Law 17 (1992): 609-685.
*Daniel Statman (2003) 'The Morality of Assassination: A Response to Gross' Political
Studies 51 (4), 775–779. [see Gross above]
T Ward, 'Norms and Security: The Case of International Assassination', International
Security 25, 1 (2000): 105-33.
T. Ward, 'The New Age of Assassination', SAIS Review 25/1 (2005) pp.27-39.
Patricia Zengel, 'Assassination and the Law of Armed Conflict,' Military Law Review 131
(1991) pp.23-55.
.
16 Reading Week - no lectures or seminars
44
E: INTELLIGENCE AND THE NEW WARFARE
17. Covert Action as Culture
17.1 How far do you accept the view of Francis Stoner Saunders that
'those who pay the piper call the tune'?
17.2 How far would you agree with Coleman's description of CIA cultural
activities as a 'liberal conspiracy'?
17.3 What did the CIA hope to achieve through its cultural programmes, and
who were its targets?
Case Study of Tom Braden’s International Organisations Division
Books
RJ Aldrich, The Hidden Hand, chapters 5 & 16 E 183.8.G7
*D Caute, The Dancer Defects D 843.C2
P Coleman, The Liberal Conspiracy: The Congress for Cultural Freedom and the
Struggle for the Mind of Postwar Europe. D 839.2.C6
R. Helms, A Look Over My Shoulder,
W Hixson, Parting the Curtain: Propaganda, Culture, and the Cold War E 812.5.H4
**R Jeffreys-Jones, The CIA and American Democracy UB 271.U6
* H Krabbendam and Giles Scott-Smith (eds.), The Cultural Cold War in Western
Europe, 1945-1960 (London: Frank Cass, 2003) L [good on Saunders]
L Johnson, Strategic Intelligence: Volume III. Covert Action: Behind the Veils of Secret
Foreign Policy esp chapter 6 UB 250.S6385 REF ONLY
J Kotek, Students and the Cold War. JD 301.K6
*H Laville, Cold War Women, JD 195.42.L2
*H Laville & H Wilford, The US Government, Citizen Groups and the Cold War
*WS Lucas, Freedom’s War: The US Crusade Against the Soviet Union E 183.8.R9
C Meyer, Facing Reality: From World Federalism to the CIA
S Mickelson, America's Other Voices: The Story of Radio Free Europe and Radio
Liberty.
M Nelson, War of the Black Heavens: The Battles of Western Broadcasting in the Cold
War
GD Rawnsley, (ed). Cold-War Propaganda in the 1950s D 843.R2
**FS Saunders, Who Paid the Piper? The CIA and the Cultural Cold War. E 812.5.S2
*G Scott-Smith, Giles. The Politics of Apolitical Culture: The Congress of Cultural
Freedom, the CIA and Post-War American Hegemony.
*G Treverton, Covert Action: The Limits of Intervention in the Postwar World L
H Wilford, The CIA, the British Left and the Cold War: Calling the Tune? JE 242.W4
H Wilford, The Mighty Wurlitzer: How the CIA Played America [critiques Saunders]
45
Articles
R Aldrich, 'OSS, CIA and European Unity: The American Committee on United Europe,
1949-1960', Diplomacy and Statecraft, 8, 1 (March 1997): 184-227.
J Kotek, 'Youth Organizations as a Battlefield in the Cold War.' Intelligence and National
Security 18, no. 2 (Summer 2003): 168-191.
H Laville, 'The Committee of Correspondence: CIA Funding of Women's Groups, 19521967.' Intelligence and National Security 12, 1 (Jan. 1997): 104-121.
WS Lucas, 'Beyond Freedom, Beyond Control: Approaches to Culture and the StatePrivate Network in the Cold War.' Intelligence and National Security 18, no. 2 (Summer
2003): 53-72.
**WS Lucas, 'Revealing the Parameters of Opinion: An Interview with Frances Stonor
Saunders,' Intelligence and National Security 18, 2 (Summer 2003): 15-40, for an
interview with Saunders from January 2002.
WS Lucas, 'Campaigns of Truth: The Psychological Strategy Board and American
Ideology, 1951-1953.' International History Review 18, 2 (1996): 253-394.
WS Lucas, 'Beyond Freedom, Beyond Control: Approaches to Culture and the StatePrivate Network in the Cold War,' in Hans Krabbendam and Giles Scott-Smith (eds.),
The Cultural Cold War in Western Europe, 1945-1960 L
WS Lucas, 'Master and Servant? The US Government and the Founding of the British
Association for American Studies,' European Journal of American Culture (2002)
WS Lucas, 'Mobilising Culture: The CIA and State-Private Networks in the Early Cold
War' in D. Carter and R. Clifton (eds.), Global Horizons (London: Macmillan, 2002)
WS Lucas, 'Beyond Diplomatic History: Propaganda, Ideology, and US Foreign Policy,'
in G. Rawnsley (ed.), Cold War Propaganda in the 1950s L
WS Lucas, 'Negotiating Freedom', Libertas, online at http://www.libertas.bham.ac.uk/publications/articles/Negotiating%20Freedom.pdf
JPC Matthews, 'The West's Secret Marshall Plan for the Mind.' International Journal of
Intelligence and Counterintelligence 16, 3 (Fall 2003): 409-427.
K Paget, 'From Stockholm to Leiden: The CIA's Role in the Formation of the
International Student Conference.' INS 18, 2 (Summer 2003): 134-167.
SJ Parry-Giles, 'The Eisenhower Administration's Conceptualization of the USIA: The
Development of Overt and Covert Propaganda Strategies.' Presidential Studies Quarterly
24 (Spring 1994): 263-276.
Edward Said, 'Hey Mister, You Want to Buy a Dirty Book?', [review of Saunders]
London Review of Books, 30 Sept 1989
G Scott-Smith, ''The Masterpieces of the Twentieth Century' Festival and the Congress
for Cultural Freedom: Origins and Consolidation, 1947-52.' INS 15,1 (2000): 121-168.
G Scott-Smith, ' "A Radical Democratic Political Offensive": Melvin J. Lasky, Der
Monat, and the Congress of Cultural Freedom.' Journal of Contemporary History 35, 2
(Apr. 2000): 263-280.
M Warner, 'Origins of the Congress for Cultural Freedom, 1949-50.' Studies in
Intelligence 38, 5 (1995): 89-98.
M Warner, 'Sophisticated Spies: CIA's Links to Liberal Anti-Communists, 1949-1967.'
International Journal of Intelligence and Counterintelligence 9, 4 (1996/97): 425-433.
46
18 Intelligence and Deception
18.1 Why was the D-Day Deception campaign so successful?
18.2 What role does intelligence play in a campaign of military deception?
D-Day case study
BOOKS
J Bowyer Bell & Barton Whaley Cheating and Deception
C Cruickshank, Deception in World War II. D 744.C7
T Harris, Garbo: The Spy Who Saved D-Day D 810.S8
R Hesketh, Fortitude: The D-Day Deception Campaign UB 271.G7
T Holt, The Deceivers: Allied Military Deception in the Second World War
M Howard, Strategic Deception. Vol. 5 of FH Hinsley, et. al. British Intelligence in the
Second World War: Its Influence on Strategy and Operations. D 810.S7
*JC Masterman, The Double-Cross System in the War of 1939-1945 D 810.S7
R Miller, Codename TRICYCLE
ES Montagu, Beyond Top Secret Ultra.
J Pujol, with Nigel West. Garbo ..
D Wheatley, The Deception Planners: My Secret War.
Articles
*Bowyer J. Bell, 'Toward a Theory of Deception,' International Journal of Intelligence
and Counterintelligence 16/2 (2003) pp.244-279.
R Bennett, 'Fortitude, Ultra and the 'Need to Know.'' Intelligence and National Security 4,
no. 3 (Jul. 1989): 482-502.
TL Cubbage, II. 'The Success of Operation Fortitude: Hesketh's History of Strategic
Deception.' INS 2, 3 (Jul. 1987): 327-346.
*J Ferris, 'The Intelligence-Deception Complex: An Anatomy.' INS 4, 4 (1989): 719-734.
**J Ferris, ''FORTITUDE' in Context: The Evolution of British Military Deception in
Two World Wars, 1914-1945.' In Paradoxes of Strategic Intelligence: Essays in Honor of
Michael I. Handel, eds. Richard K. Betts and Thomas G. Mahnken, 117-165. L
MI Handel, 'Introduction: Strategic and Operational Deception in Historical Perspective,'
INS 2, 3 (July 1987) - [special issue on deception]
Michael Handel, 'Intelligence and the Problem of Strategic Surprise,' Journal of Strategic Studies
7/3 (1984) pp.229-281.
Richard J. Hueur, 'Strategic Deception and Counter-Deception', International Studies Quarterly
25/2 (1981) pp.294-327.
KJ Müller, 'A German Perspective on Allied Deception Operations in the Second World
War.' INS 2, no. 3 (Jul. 1987): 301-326.
*B Whaley, 'Towards a general theory of deception', Journal of Strategic Studies, 5, 1
(March 1982): 178-92.
B Whaley and J Busby, 'Detecting Deception: Practice, Practitioners, and Theory,' in R.
Godson & J. Wirtz (eds.), Strategic Denial. and Deception: The Twenty-First Century
47
19 Intelligence for Peace:
NGOs, Peacemaking and Peacekeeping
19.1 Does intelligence-gathering produce a safer and more stable world? Or
does it provoke neighbours, while encouraging policy-makers in the belief that
they are omniscient ?
19.2 Is a permanent UN intelligence agency desireable? If so, is it feasible?
19.3 What kinds of intelligence support are required for peacekeeping
operations?
19.4 Examine the role of intelligence officers as clandestine peace brokers?
What advantages and disadvantages do they carry?
Books
*Ben de Jong et al (eds.) Peacekeeping Intelligence: Emerging Concepts for the Future,
OSS Ltd,
H Carmel (ed.), Intelligence for Peace
*David Carment & Martin Rudner, eds., Peacekeeping Intelligence: New Players,
Extended Boundaries L
Klass van Walraven (ed), Early Warning and Conflict Prevention
*Cees Wiebes. Intelligence and The War in Bosnia 1992-1995
Articles
DA Charters, 'Out of the Closet: Intelligence Support for UN Peacekeeping', in DA Charters
(ed.) Intelligence. and Peacekeeping. Clementsport, NS: Canadian Peacekeeping
S Chesterman, ‘Does the UN have intelligence?’, Survival, 48, 3 (Autumn 2006), 149-64.
William E. Demars, 'Hazardous Partnership: NGOs and United States Intelligence in
Small Wars', International Journal of Intelligence and Counterintelligence 14/2 (2001)
pp.193-222.
A. Walter Dorn and David J.H. Bell, 'Intelligence and Peacekeeping: The UN Operation
in the Congo 1960-64', International Peacekeeping 2/1 (1995) pp.11-33.
A Walter Dorn, 'The Cloak and the Blue Beret: Limitations on Intelligence in UN
Peacekeeping. International Journal of Intelligence and counterintelligence, Vol. 12, 1998
also at - http://www.rmc.ca/academic/gradrech/dorn9_e.html
*Bassey Ekpe, 'The Intelligence Assets of the United Nations: Sources, Methods, and
Implications', International Journal of Intelligence and CounterIntelligence 20/3 (2007)
pp.377 - 400.
48
Pär Eriksson, 'Intelligence in peacekeeping operations', International Journal of
Intelligence and CounterIntelligence 10/1 (1997) pp.1-18.
Anna Fitzgerald, 'Linkages Between SSR and Peacekeeping Intelligence', Journal of
Security Sector Management, 1, 3 (December 2003): 1-8.
D. Hannay, ‘Intelligence and International Agencies’, in Shukman (ed.), Agents for
change. Intelligence services in the 21st century, London, 2000, 179.
*Paul Johnston, 'No Cloak and Dagger Required: Intelligence Support to UN
Peacekeeping,' Intelligence and National Security, 12, 4, (1997)
* T. Quiggen, 'Response to 'No Cloak and Dagger', INS 13, 4 (Winter 1998): 203-8.
Sir David Ramsbotham, 'Analysis and Assessment for Peacekeeping Operations,
Intelligence and National Security 10/4 (1995) pp.162-75.
Martin Rudner, 'The Future of Canada's Defence Intelligence', International Journal of
Intelligence and CounterIntelligence 15/4 (2002) pp.540-564.
* Len Scott, 'Secret Intelligence, Covert Action and Clandestine Diplomacy', Intelligence
and National Security 19, 2 (2004) 322-34.
* S. Shpiro, 'The CIA as Middle East Peace Broker?', Survival, 45, 2, (2003): 91-112.
H. Smith, 'Intelligence and UN Peacekeeping', Survival, 36, 3 (Autumn 1994): 174-92.
Robert David Steele, 'Peacekeeping Intelligence and Information Peacekeeping',
International Journal of Intelligence and CounterIntelligence, 19/3 (2006) pp.519 - 537
John D. Stempel, 'Covert Action and Diplomacy,' International Journal of Intelligence
and Counterintelligence 20/1 (2007) pp.122-135.
A. Waller & D. Bell, 'Intelligence and Peacekeeping: The UN Operation in the Congo,
1960-64', International Peacekeeping, 2, 1 (Spring 1999).
Peter Wilson, 'The contribution of intelligence services to security sector reform',
Conflict, Security and Development 5/1 (2005) pp. 87-107.
49
F: THE FUTURE OF INTELLIGENCE
20 Reforming Intelligence in a Globalising World
20.1 Examine the contention that present day secret services remain locked in
obsolete Cold War bureaucratic forms and have not yet addressed the perils of
globalisation.
20.2 Why did the United States encountered such difficulty in reforming its
intelligence community to meet new challenges between 1989 and 2001?
20.3 What sort of challenges does globalization offer to secret services?
20.4 'Only the privatisation of intelligence will permit secret services to achieve
the fluidity required to deal with the transnational challenges the globalisation has
helped to create'. Discuss.
A. GLOBALISATION ISSUES
Books
B.J. Barber, Jihad vs McWorld JE 213.B2
B.J. Barber, Fear's Empire: War Terrorism and Democracy JE 242.B2
Deborah G. Barger RAND Toward a Revolution in Intelligence Affairs Available at http://www.rand.org/pubs/technical_reports/2005/RAND_TR242.pdf
*TC Bruneau, Reforming Intelligence
H Friman & P Andreas (eds) The Illicit Global Economy and State Power HY 100.I5
H.R Friman, Narcodiplomacy,
Roger Scruton, The West and the Rest JE 210.S2
B Schneier, Beyond Fear JE 242.S2
*S Tsang (ed.), Intelligence and Human Rights in the Era of Global Terrorism
F Varese, The Russian Mafia HF 3103.1.V2
Articles
* Stevyn Gibson, 'In the Eye of the Perfect Storm: Re-imagining Reforming and
Refocusing Intelligence for Risk, Globalisation and Changing Societal Expectation', Risk
Management 7, 4 (2005): 23-41.
Gregory F. Treverton, “Intelligence and the Market State,” Studies in Intelligence, No. 10
(Winter-Spring 2001)
Welsey K. Wark, 'Learning to Live with Intelligence', Intelligence and National Security
18/4 (Winter 2003) pp.1-14.
B. POST 9/11 EFFORTS AT REFORM
50
Books
R. Baer, See No Evil: The True Story of a Groundsoldier in the CIA’s Counter-Terrorism
Wars JC 701.42.B2 .
*William E Odom, Fixing Intelligence: For a More Secure America. .
Anonymous, [Michael Scheuer], Imperial Hubris L
*R. Posner, Preventing Surprise Attacks: Intelligence Reform in the Wake of 9/11
R Posner, Uncertain Shield: the US Intelligence System in the Throes of Reform (NY
2006)
R Russell, Sharpening Strategic Intelligence Why the CIA Gets It Wrong and What
Needs to Be Done to Get It Right,
*J Sims & B Gerber, Transforming US Intelligence L
* WK Wark, Twenty-first Century Intelligence L
K Williams & D Deletant, Security Intelligence Services in New Democracies: The Czech
Republic, Slovakia and Romania,
Articles
*RK Betts, ‘Fixing Intelligence’ Foreign Affairs, 81 (January/February 2002)
**RK Betts, 'The New Politics of Intelligence: Will Reforms Work This Time?' Foreign
Affairs, 83, 3 (May/June 2004)
* C. Cogan, 'Hunters not Gatherers: Intelligence in the 21st Century' Ch.11. In LV Scott
and PD Jackson (eds.) Understanding Intelligence in the 21st Century [this book is also
Intelligence and National Security, 20, 1 (Summer 2004)]
H Fessenden, 'The Limits of Intelligence Reform', Foreign Affairs 84 (NovemberDecember 2005): 106-20
M. Herman, 'The Future of Intelligence After September 11', International Relations, 16,
2 (August 2002)
Richards J. Heuer, 'Limits of Intelligence Analysis', Orbis 49, 1 (Winter 2005)
W. Rees & R.J. Aldrich, 'Contending Cultures of Counter-Terrorism: Transatlantic
Convergence or Divergence', International Affairs 81, 5 (October 2005)
Peter R. Neumann and M. L. R. Smith, 'Missing the Plot? Intelligence and Discourse
Failure' Orbis 49, 1 (Winter 2005)
C. THE OLD NEW THREATS OF THE 1990S
Books
*J. Adams, The New Spies,
C.A. Appleby, Intelligence and Arms Control
JL Davies & TR Gurr, Preventative Measures
C. Eisendrath, National Insecurity: US Intelligence after the Cold War
S. Farson, (eds.) Security and Intelligence in a Changing World, ch 11. for a comparative
Canadian discussion l
**AE Goodman & B Berkowtiz, Best Truth: Intelligence in the Information Age
*M Herman, Intelligence Services in the Information Age : Theory and Practice
P Holt, Secret Intelligence and Public Policy
51
*AS Hulnik & R Valcourt Fixing the Spy Machine : Preparing Intelligence for the TwentyFirst Century (Praeger 1999)
* LK Johnson, Secret Agencies: US Intelligence in a Hostile World
LK Johnson, Bombs Bugs Drugs and Thugs
SP McCarthy, The Functions of Intelligence Management in Crisis
*C. Runde and G. Voss (eds.) Intelligence and the New World Order: Former Cold War
Adversaries Look towards the Twentieth Century UB 250.I6 .
*H. Shukman, Agents for Change: Intelligence Services in the 21st Century (London: St
Ermin, 2000)
M Smith, The Spying Game p.397 ff
R Steele, On Intelligence: Spies and Secrecy in an Open World
* G. Treverton, Reshaping National Intelligence for an Age of Information
M. Urban, UK Eyes Alpha, UB 271.G7
Articles
S. Baker, 'Should Spies be Cops?', Foreign Policy 97 (Winter 1994-5): 36-52.
Bruce Berkowitz, ‘Intelligence reform, the third act’, ORBIS 45 (1) (2001) :152-161
Bruce D. Berkowitz, ‘The Secret Shares’, ORBIS 12 (3) (1998) :511-519.
D.L. Boren, 'The Intelligence Community: How Crucial?', Foreign Affairs, 71, 3
(Summer 1992)
G. Carver, 'Intelligence an in the Age of Glasnost', Foreign Affairs, 69, 3 (Summer 1990)
C.G. Cogan, 'Intelligence and Crisis Management', INS 9, 4 (October 1994): 633-50
*P. Hennessy, 'The Itch After Amputation', in KG Robertson, War, Resistance and
Intelligence, .
*B. Hoffman, 'Intelligence and Terrorism: Emerging Threats and New Security
Challenges in the Post-Cold War Era', INS 11, 2 (April 1996): 207-23.
A.E. Goodman and B.D. Berkowitz, 'Intelligence Without the Cold War', INS, 9, 2 (April
1994).
J.L. J Gaddis, 'Learing to Live with Transparency', in his The Long Peace.
D. Gries, 'A New Look for Intelligence', INS 10, 1 (January 1995): 170-83.
Roger Hilsman, 'Does the CIA Still Have a Role?' Foreign Affairs, September/October
1995
E. May, 'Intelligence: Backing Into the Future', Foreign Affairs, 71, 3 (Summer 1992)
D. Miller, 'Intelligence and Proliferation: Lessons from the Matrix Churchill Affair' INS
11, 2 (April 1996): 193-206.
S.D. Porteous, 'Economic Espionage', INS 9, 4 (October 1994); 735-52.
Special Issue of INS, 10, 4 (October 1995) sections I & IV.
P Schweizer, ‘The Growth of Economic Espionage: America Is Target Number One’,
Foreign Affairs, January/February 1996)
J.G. Stewart, 'Looking into the Dirty Laundry', INS 11, 1 (January 1996): 154-7.
END
52
Download