THE POLITICS OF SECRECY

advertisement
The University of Warwick
Department of Politics and International Studies
THE VIGILANT STATE:
THE POLITICS OF INTELLIGENCE AND SECRECY
PO382
Undergraduate Module Handbook, 2012-13 – updated 23 August 2012
Lectures
Wednesday 12.00 LIB1
Seminars
Thursday 10.00 S2.81
Thursday 11.00 S2.81
Thursday 2.00 S0.03
Thursday 4.00 S0.03
Friday 10.00 H4.01
Module tutors:
Richard J. Aldrich & Rory Cormac
r.j.aldrich@warwick.ac.uk
r.m.k.cormac@warwick.ac.uk
Office hours:
Wednesday 11.00-12.00 (Aldrich)
Wednesday 13.30-14.30 (Cormac)
Friday 11.30-12.30 (Cormac)
Office BO.12
Tel: (024765) 74074
1
THE VIGILANT STATE:
THE POLITICS OF INTELLIGENCE AND SECRECY
Contents
Module aims and objectives 3
Assessment 4-5
Non-Assessed Essays 5
Assessed Essays 6-7
Lecture schedule 8
Seminar schedule 9
Approach to Reading and Key Material 10
Reading List 12
* The title of this module draws its inspiration from Bernard Porter, The Origins of the Vigilant State:
The London Metropolitan Police Special Branch before the First World War (1991).
2
Module Overview
This module aims to investigate the nature of the 'vigilant state'. It focuses upon the
apparatus developed by modern states to permit the surveillance of both international and
domestic threats to their security. It will examine the major competing theories
concerning the repeated failure of the vigilant state in the face of surprise attack at the
international level, subjecting these to careful comparative analysis and reviewing the
competing theoretical explanations. Consideration will be given to the role of domestic
political monitoring within both democratic and authoritarian states. Attention will also
be given to the problem of reconciling clandestine and/or covert methods, traditionally
associated with operational efficiency, with the degree of transparency and accountability
normally expected of the executive of a democratic state. The final section of the module
will turn to look at the future development of some of these issues against a background
of rapid technical change and globalisation.
In short, this module aims to introduce to the various debates that have characterised the
use of secret service by the state in the international and domestic context. Although the
terms 'espionage', 'intelligence' and 'secret service' are all central to the concerns of this
module they have been deliberately avoided in the above module description given in the
handbook. This is because this module aims to situate all these things in a broader
governmental context, viewing them as aspects of international statecraft or as
constitutional problems or as issues of civil rights. Accordingly, this module is as much
about how policy-makers make use, or fail to make use, of intelligence, and how secret
services might be regulated within a constitutional framework, as about the practice of
secret service itself.
Aims - The module aims to:





develop an understanding of the origins and developments of intelligence services
explore the main theoretical approaches to intelligence and surveillance
offer an understanding of the issues surrounding intelligence failure
analyse key ethical and policy dilemmas and issues raised by CT intelligence
assess the contemporary debates about globalization and the future of intelligence
Objectives- On completion of this module, you should be able to:




demonstrate an appreciation of the historical context of intelligence
critically discuss the characteristics of the accountability frameworks
assess the strengths and weaknesses of the key theoretical debates governing the
intelligence cycle
critically analyse, both orally and in writing, the current issues facing national and
regional approaches to intelligence
3
Learning Methods
There will be a weekly lecture and a weekly seminar running through the academic year.
This is a lecture and seminar-based module, entailing a 40 min lecture by Richard
Aldrich on Wednesdays. This will be followed on Thursday by a seminar discussion of
the previous week's topic, led by Simon Willmetts, with student presentations and
structured student interaction (in the form of group discussion, for example). Students are
expected to complete the essential reading for each week and to actively contribute to the
discussion. Students are further expected to engage in independent study, employing the
reading lists and other sources to deepen their knowledge of the subject.
MODULE ASSESSMENT
The mode of assessment for this module is via one of three methods outlined in the
undergraduate handbook. Please see this for details. NB essays are 5,000 words.
All students handing in assessed work should ensure that they are aware of the
relevant information in the Undergraduate Handbook.
ESSAY GUIDELINES
- for the assessed 3,000 word essay, you can either choose a title from the Assessed
Essay title list, or alternatively you can negotiate your own title. I recommend the former.
- if you negotiate a title with your tutor you must submit a title form to the office by the
Negotiated Title Deadline listed in the PAIS Undergraduate Handbook.
- do not produce fact-hogging 'term papers' on 'topics' as they will get low marks
- pay attention to identifying where the schools of thought are
- try and include an element of literature review
- make sure you produce an essay that answers the question directly
- do not hesitate to take issue with the wording of the question
- get it in 24 hrs before the deadline to allow for computer problems
- DON'T MISS THE DEADLINES
4
ESSAY QUESTIONS ARE LISTED HERE
Non-assessed Essays (Formative)
1,500 WORDS FOR 14 JANUARY - OPTIONAL - NOT COMPULSORY
1.
Is it best to conceptualize intelligence largely in terms of "information" or in terms of
"secrets" or in terms of “conspiracies”?
2.
Can most states now abandon costly secret collection through human and technical
methods, in favour of harnessing abundant open sources such as the internet?
3.
Critically assess Michael Handel’s view that surprise attacks are best explained in
terms of "paradoxes" ? Are these paradoxes impossible to resolve?
4.
Who are the characteristics of a good consumer of intelligence?
5.
Why has there traditionally been so little multi-lateral intelligence sharing? Has this
changed since 9/11?
6
Reading Week
7
"9/11 was primarily a failure of intelligence collection” Discuss
8
Why have conspiratorial accounts of 9/11 proved to be so widely accepted in the
United States?
9
Given that Iraqi WMD was a familiar 'Cold War Type' intelligence problem of
strategic weapons estimates, why did western agencies get this so wrong?
10
Can effective counter-terrorist intelligence be reconciled with the robust protection
of civil liberties?
11
"The paramilitaries in Northern Ireland were largely defeated thought the
remorseless application of intelligence pressure." Discuss.
12
Discuss the changing role of intelligence in US counter-terrorist activity between
2001 and 2011?
13
Was secret policing the defining characteristic of Hitler’s Germany?
5
Assessed Essay Titles by Topic (Summative) 3,000 words
1a.
Is secret intelligence as a form of 'power', akin to economic power? If so – how is
this so-called intelligence power operationalised?
1b
Do intelligence activities generate transparency and therefore produce a safer
and more stable world – or do they make the world more dangerous?
1c.
Why are our ideas of intelligence mostly derived from Anglo-American
examples? Where might we look for different typologies of intelligence?
2a
Do you agree with Robert Baer that the new challenges of the twenty- first
century require more human intelligence with agents and less technical collection via
imint and sigint?
2b
“In the twitter age the distinctions between human and technical collection is
increasingly irrelevant.” Discuss
3a
Do you agree with Richard Betts that surprise attack is inevitable and the best
thing we can do is simply to expect less of intelligence?
3b
In his latest book Intelligence and its Enemies Richard Betts describes
intelligence agencies as “tragic”. What does he mean - and do you agree with him?
4
Which political leaders were great consumers of intelligence? What made them
discerning and sophisticated customers? You can restrict this essay to US Presidents or
UK Prime Ministers if you wish.
5
Can IR theory explain intelligence co-operation between states?
6
Reading Week
7
To what extent do you accept Amy Zegart's optimistic assertion that the
intelligence failures that resulted in 9/11 were avoidable and can be fixed by adaptation?
8a
Analyse the Iraqi WMD intelligence fiasco in the USA and the UK. Were the
causes of failure similar or different?
9
How far would you accept that the contention that UK intelligence gathering on
the para-militaries in Northern Ireland between 1972 and 1989 was broadly a story of
success?
10a
US counter-terrorist activity by the intelligence agencies has changed and
adapted in the period since 2000. Critically evaluate these changes.
10b Consider how has UK counter-terrorism intelligence been reformed and improved
since 2000? Would you have done it differently?
11a
Compare and contrast the roles of the state security agencies in Hitler's Germany
and Stalin's Russia.
6
11b
Why did Argentina become embroiled in a self-destructive “Dirty War” of countersubversion during the 1970s?
12a
Critically assess the 2011 government Green Paper on Security and Justice
setting out an expanded role for the UK Intelligence and Security Committee and a new
approach to balancing secrecy with demands by the courts to see intelligence material.
12b Explore the sorts of mechanisms that might allow us to extend accountability to
international intelligence operations involving more than one country?
13a
How far do you accept David Lyons assertions that all technological societies are
watchful - and that increasing surveillance is not the result of conspiracy by individuals but merely a by-product of modernity?
13b
How far do you accept Armand Mattelart’s arguments that the new global
surveillance economy is about a convergence of policing and marketing?
14
'Espionage is an exercise in enticing others to do what is unpleasant and often
unlawful - and so it can never be moral'. Discuss.
15a
On 28 October 2010, Sir John Sawers, Chief of MI6 said: “If we know or believe
action by us will lead to torture taking place, we’re required by UK and international law
to avoid that action, and we do, even though that allows that terrorist activity to go
ahead.” His position is legally correct - but is it ethical?
15b
The right of self-defence is often used to justify killing people in war - and is
widely accepted. Does it also allow us to justify the use of torture?
15c
Can we define the concept of assassination with any precision? And if so can an
ethical case ever be made for its use as part of state policy?
16
Reading Week
17
Why did the CIA sponsor music, art and literature as a symbol of the free ideas of
the West during the Cold War? Was this initiative successful?
17b
Why is covert action a problem for advocates of democratic peace theory?
18
Explain the success of the “Fortitude” D-Day Deception Campaign.
19a
Should intelligence officers serve as clandestine peace brokers? What
advantages do they have over traditional diplomats and arbitrators?
19b
Why do peacekeepers and peacemakers need intelligence?
20a How should UK intelligence agencies change to meet the myriad changes and
challenges of the twenty-first century?
20b
Assess the efforts to reform American intelligence since 1990.
7
MODULE TIMETABLE
LECTURES – WEDNESDAYS
A:
1
INTRODUCTION
What is secret intelligence? 3 Oct in LIB.1
B:
2
3
4
5
FOREIGN INTELLIGENCE
In the field: the gritty problems of collection 10 Oct in LIB.1
Estimates and interpretation: the problems of analysis 17 Oct in LIB.1
Intelligence at the top: producer-consumer linkage 24 Oct in LIB.1
Liaison: the delicate diplomacy of intelligence 31 Oct in LIB.1
6
Reading Week: No Lectures 5-9 Nov
C:
7
8
9
10
11
COUNTER-TERRORISM AND SECURITY
9/11 - What kind of failure 14 Nov in LIB.1
Proliferation and WMD - the Iraq Case 21 Nov in LIB.1
Intelligence and the liberal state: counter-terrorism [VIDEO] 28 Nov in LIB.1
Intelligence and counter-terrorism: the market state 5 Dec in LIB.1
Intelligence and Tyranny: the non-democratic State 9 Jan in LIB.1
D:
12
13
14
15
CONTROLLING INTELLIGENCE
The problems of accountability and democratic control 16 Jan in LIB.1
The problems of civil rights and intelligence 23 Jan in LIB.1
Ethics and Espionage 30 Jan in LIB.1
Torture and Assassination 6 Feb in LIB.1
16
Reading Week 11-16 Feb
E.
17
18
19
INTELLIGENCE AND THE NEW WARFARE
Covert Action 20 Feb in LIB.1
Intelligence and Deception 27 Mar in LIB.1
Intelligence for NGOs and Peacekeeping 5 Mar in LIB.1
F:
20
21
THE FUTURE OF INTELLIGENCE
Intelligence in a globalising world 12 March in LIB.1
Revision Q&A session 24 April in LIB.1
8
SEMINARS – THURSDAYS & FRIDAYS
A:
INTRODUCTION
1
2
Meet to assign seminars and roles 4/5 Oct
What is secret intelligence? 11/12 Oct
B:
FOREIGN INTELLIGENCE
3
4
5
6
7
In the field: the gritty problems of collection 18/19 Oct
Estimates and interpretation: the problems of analysis 25/6 Oct
Intelligence at the top: producer-consumer linkage 1/2 Nov
Reading Week: No Lectures 5-9 Nov
Liaison: the delicate diplomacy of intelligence 16/17 Nov
C:
COUNTER-TERRORISM AND SECURITY
8
9
10
11
12
9/11 - What kind of failure 22/23 Nov
Proliferation and WMD - the Iraq Case 29/30 Jan
Intelligence and the liberal state: counter-terrorism 6/7 Dec
Intelligence and counter-terrorism: the market state 10/11 Jan
Intelligence and Tyranny: the non-democratic state 17/18 Jan
D:
13
14
15
16
17
CONTROLLING INTELLIGENCE
The problems of accountability and democratic control 24/5 Jan
The problems of civil rights and intelligence 31Jan/1 Feb
Ethics and Espionage 7/8 Feb
Reading Week 11-15 Feb
Torture and Assassination 21/22 Feb
E.
INTELLIGENCE AND THE NEW WARFARE
18
19
20
Covert Action 28 Feb/1 Mar
Intelligence and Deception 7/8 March
Intelligence for NGOs and Peacekeeping 14/15 March
F:
THE FUTURE OF INTELLIGENCE
21
Intelligence in a globalising world 25/26 April
9
APPROACH TO READING & KEY MATERIAL
1. Quantity and Quality of Reading
The module text books. You are expected to read widely, but selectively. As a broad
guideline, for most essays, semester-time or exam-time, it is sufficient to look at the two
course text books, two additional books and four articles. There is a lot of reading on this
list because different books address different essay titles under each topic heading, and
also because I wish to ensure an ample supply of literature.
Please note that this is a relatively new module at Warwick, confronting the Library with
the problem of trying to acquire a lot of books that are now out of print. They have done
wonders!!! They do not yet have everything on the bibliography - but they have secured
almost all the material. If it is not yet there I have entered NIL - but new stuff is arriving
all the time, so if the class mark is not added, that does not mean its not there – so check!
This is a fast-moving subject, never more so than the last few years. Accordingly, journal
articles are increasingly important. Warwick has everything we need here so if in doubt
head for the journal articles. Many of the best ones are collected in the various edited
collections/readers. But note the missing years of INS – which we have put on the web.
Copies of most core readings are available either in the Library Short Loan Collection (SLC),
Learning Grid or online. If a core reading is not available in this manner, you should consult
the Subject Librarian and your module tutor.
2. Case Studies
You may approach your essays in a variety of different ways. You may wish to write a
broad generic essay (and this is a broad generic module) or you may wish to choose to
answer a question by focusing upon one or a number of case studies. HOWEVER, YOU
MUST BE CLEAR THAT CASE STUDIES IN THIS MODULE ARE INTENDED TO
THROW LIGHT UPON GENERAL IDEAS AND PRINCIPLES, NOT VICE VERSA.
3. Module text book * CM Andrew, R.J. Aldrich & W.K. Wark (eds), Secret Intelligence: A Reader
(London: Routledge, December 2008). 540pp. 978-0-415-42024-2
UB 250.S3
The Andrew/Aldrich/Wark reader is closely attuned to this module for obvious
reasons. It also has reading lists and seminar questions.
Six other books/readers that overview well are available - >
10
Peter Gill and Mark Phythian, Intelligence in an Insecure World (Cambridge: Polity
2006) UB 250.I6
M. Herman, Intelligence Power in Peace and War (Cambridge: Cambridge
University Press, 1996) & UB 250.H3
L. Johnson & J. Wirtz (eds.), Intelligence and National Security: The Secret World of
Spies OUP UB 250.I6
M.M. Lowenthal, Intelligence: From Secrets to Policy (Third Edition -Washington
DC: CQ Press, 2006) UB 271.U6
D. Omand, Securing the State (Hurst/Columbia University Press, 2010) UA 647.043
A. Shulsky, Silent Warfare: Understanding the World of Intelligence (NY: Brasseys,
2nd edition 1993)
UB 250.S4
5. Journals
The key journal is - INTELLIGENCE AND NATIONAL SECURITY abbreviated INS.
We are missing 1991-6, but the key material from these issues has kindly been scanned
for us by the library, so this is not a problem. See the link on web page.
Another useful journal is THE INTERNATIONAL JOURNAL OF INTELLIGENCE AND
COUNTERINTELLIGENCE
6. Key Handbooks: The major edited collections of essays for this subject are:
a. Loch Johnson (ed.) Strategic Intelligence - 5 Volumes UB 250.S6385
b. Loch Johnson (ed.) Handbook of Intelligence Studies JC 842.H2
c. Loch Johnson (ed.) Oxford Handbook of National Security Intelligence UB 250.O9
7. Coursework Support
As your module co-ordinator for the Politics element please contact me if you have any
difficulties with the course or the course work. We are available to see you during our
office hours. You can also contact us by e-mail at r.j.aldrich@warwick.ac.uk or
r.cormac@warwick.ac.uk
8. Module Evaluation
Feedback and evaluation are crucial to the success of any module. We want students to
have their say on Politics modules. If there are problems with book availability please
raise it with the tutors for the module immediately.
11
A: INTRODUCTION
1 What is intelligence? How is it defined?
Seminar paper questions
1.1 To what extent does the nature and value of 'intelligence' differ from 'information'?
1.3 How far do you accept Michael Herman's contention that it is useful to talk about
secret intelligence as a form of 'state power', akin to economic or military power?
1.3 How far do you accept Michael Warner's definition that "Intelligence is secret, state
activity to understand or influence foreign entities." ?
1.4 Why is political science literature on intelligence so often about America - and is this
a problem?
1.5 If we can we meaningfully talk about national strategic culture, can we also talk
about national intelligence culture?
Books - Core Reading
Andrew, Aldrich & Wark (eds), Secret Intelligence Chs.1&2 UB 250.S6
B. Berkowitz and A. Goodman, Strategic Intelligence for American National Security UB.250.B3
P. Gill, S. Marrin & M. Pythian, Intelligence Theory: Key Questions and Debates Chs 2, 3, 4, 5.
UB 250.I6
M. Herman, Intelligence Power, chs 1-3, 7, 21, UB 250.H3
L.K. Johnson & J. J. Wirtz, Intelligence and National Security: The Secret World of Spies UB
250.I6
L. Krizan, Intelligence Essentials for Everyone [a good short primer] UB 271.U6
Mark Lowenthal, Intelligence: From Secrets to Policy chapter 1. UB 271.U6
Books - Supplementary Reading
A. Dulles, The Craft of Intelligence [old but a good primer] UB 270.DB
J.R. Ferris, Intelligence and Strategy UB 250.F47
Peter Gill and Mark Pythian, Intelligence in and Insecure World, chapters 1 & 2. UB 270.G535
R. Godson, Intelligence Requirements, vols 1-4, UB 250.I6
Michael Herman, Intelligence Services in the Information Age UB 250.H47 chapter 1.
L. Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of Government esp.
chapters 1-3 UB 250.S6385 REF ONLY
R.V. Jones, Reflections on Intelligence NIL
J. Keegan, Intelligence in War, pp. 7-26, 321-52 UB 250.K4
S. Kent, Strategic Intelligence for American World Policy chapter 1 UB 250.K3
W. Laqueur, World of Secrets: The Uses and Limits of Intelligence pp.4-70 UB 271.U6
12
R.P. Pfaltzgraff et al (eds.), Intelligence Policy and National Security ch. 3. UB 250.I6
B. Porter, Plots and Paranoia (good on domestic security and high policing) NIL
Abram N. Shulsky and Gary J. Schmitt, Silent Warfare: chapter 1. UB 250.S4
G. F. Treverton, Seth G. Jones, Steven Boraz, Phillip Lipscy, Toward a Theory of Intelligence
Workshop Report, RAND available at --http://www.rand.org/pubs/conf_proceedings/CF219/
B. Westerfield, Inside the CIA's Private World UB 271.U6
Articles - Core Reading
Christopher Andrew, 'Intelligence, International Relations and "Under-theorisation"' in L.V. Scott
& P.D. Jackson, (eds.), Understanding Intelligence in the Twenty-First Century: Journeys in
Shadows, pp.29-41. [this book is also Intelligence and National Security, 20, 1 (2004)] UB
250.U53
P. Davies, 'Ideas of Intelligence: Divergent Concepts and National Institutions', Harvard
International Review 24, 3 (2002): 62-66
P. Gill, ‘Theories of Intelligence’, in Loch Johnson (ed.) The Oxford Handbook of National
Security Intelligence.
L.K. Johnson, 'Preface to a Theory of Strategic Intelligence', International Journal of Intelligence
and Counterintelligence 16, 4 (Winter 2003-2004): 638-663.
D. Kahn, 'An Historical Theory of Intelligence', INS 16, 3 (2001): 79-92. Good on the issue of
intelligence and international stability.
D. Omand, 'Reflections on Secret Intelligence' in Peter Hennessy (ed.), The New Protective State
pp.97-122. Also at - http://www.cscs.ucl.ac.uk/club/e-library/secret-int/
L. Scott and P.D Jackson, 'Journeys in Shadows', Ch 1. in LV Scott and PD Jackson (eds.)
Understanding Intelligence in the 21st Century [this book is also Intelligence and National
Security, Vol. 20, No. 1 (Summer 2004)] UB 250.U53
Michael Warner, 'Fragile and Provocative: Notes on Secrecy and Intelligence', Intelligence
and National Security 27/2 (2012): 223-240.
Articles - Supplementary Reading
James De Derian, 'Anti-Diplomacy, Intelligence Theory and International Relations', INS 8, 3
(July 1993): 29-51.
S. Farson, 'Schools of thought: National perceptions of intelligence', Conflict Quarterly 9/2
(1989) pp.52-104. Good on the issue of different national cultures of intellgence.
J. Ferris, 'The Historiography of American Intelligence Studies', Diplomatic History 19, 1 (Winter
1995).
M.R.D. Foot, ‘What Use Are Secret Services?’ in In the Name of Intelligence: Essays in Honor of
Walter Pforzheimer, (eds.) Hayden B. Peake and Samuel Halpern, 277-282
M. Handel, 'The Politics of Intelligence', INS 2, 4 (October 1987): 5-46.
L.K. Johnson, 'Bricks and Mortar for a Theory of Intelligence', Comparative Strategy 22, 1
(2003)
Loch K. Johnson, 'Preface to a Theory of Strategic Intelligence,' International Journal of
Intelligence and Counterintelligence 16/4 (2003): 638-663.
A. Rathmell, 'Towards Postmodern Intelligence', INS 17, 3 (2002) pp.87–104.
J. Sims, 'What Is Intelligence? Information for Decision Makers' in Roy S. Godson et al., eds.,
U.S. Intelligence at the Crossroads: Agendas for Reform,
T.F. Troy, ’The 'Correct' Definition of Intelligence’ International Journal of Intelligence and
Counterintelligence 5, 4 (Winter 1991-1992): 433-454.
See also: Intelligence and National Security, 26/6 (2011) Special Issue: Intelligence in the
Cold War: What Difference Did It Make?
13
Specifically for the questions on culture, US dominance, alternative
national approaches and ethnocentrism Books
Philip Davies, Intelligence and Government in Britain and the United States A Comparative
Perspective 2 vols
S. Farson, P. Gill, M. Phythian & S. Shpiro (eds.), PSI Handbook of Global Security and
Intelligence: National Approaches: Volume 1 - The Americas and Asia, & Volume 2 - Europe, the
Middle East and South Africa (Westport, CT: Praeger Security International, 2008).
Michael Kackman, Citizen Spy: Television, Espionage, and Cold War Culture (University of
Minnesota Press, 2005);
A.Soldatov and I. Borogan, The New Nobility: The Restoration of Russia's Security State and the
Enduring Legacy of the KGB, (New York: Public Affairs, 2010).
Articles
Intelligence and National Security, 26/4 (2012) Special Issue: Intelligence and Strategic
Culture: Essays on American and British Praxis since the Second World War
R.J. Aldrich & J. Kasuku, ‘Escaping From American Intelligence: Culture, Ethnocentrism and the
Anglosphere’, International Affairs, 89/5 (2012).
J. Anderson, "The Chekist Takeover of the Russian State", International Journal of Intelligence
and Counter-Intelligence, 19/2 (2006): 237 - 288.
Adda Bozeman, ‘Political Intelligence in Non-Western Societies: Suggestions for Comparative
Research’ in Roy Godson (ed.) Comparing Foreign Intelligence: The U.S., the USSR, the U.K. &
the Third World (Washington: Pergamon-Brassey’s International Defence Publishers, 1988).
R. Callum, 'The Case for Cultural Diversity in the Intelligence Community', International Journal
of Intelligence and Counter-Intelligence, 14/1 (2001).
I. Duvesteyn, Intelligence and Strategic Culture: Some Observations, INS 26/4 (2011): 321-30.
And also see the other essay in this special issue.
Loch Johnson (ed.) Oxford Handbook of National Security Intelligence UB 250.O9
Part X - Intelligence in Other Lands ; Especially chapters 46, 47, 48 and 49.
S.H. Campbell, 'A Survey of the U.S. Market for Intelligence Education', International Journal of
Intelligence and CounterIntelligence, 24/2 (2011), pp.307 — 337.
Colin S. Gray, “National Style in Strategy: The American Example,” International Security, 6/2
(Fall 1981), pp.21-22.
Alastair Iain Johnston, ‘Thinking about Strategic Culture,’ International Security, 19 (Spring
1995), pp.36–43;
Colin S. Gray, 'Strategic culture as context: the first generation of theory strikes back', Review of
International Studies (1999), pp.49–69;
Alastair Iain Johnston, 'Strategic Cultures Revisited: Reply to Colin Gray; Review of
International Studies, 25/3 (Jul., 1999), pp.519-523.
Robert L. Paarlberg, “Knowledge as Power: Science, Military Dominance, and U.S. Security”,
International Security, 29/1, (Summer 2004), pp.122-151.
14
B:
2
FOREIGN INTELLIGENCE
In the field: the gritty problems of collection
Seminar paper questions
2.1 Compare and contrast the problems/advantages presented by the collection of the
following types of intelligence: open source (Opint), human (Humint), signals (Sigint),
imagery (Imint).
2.2 What are the major challenges in the realm of foreign intelligence gathering for
developed West European state in 20011/12? Illustrate with two or three examples.
2.3 Open sources often constitute the majority of the sources of information used by
government. So why is 'Opint' usually under-rated and badly resourced?
2.4 What is David Omand’s “prot-int” and is it the shape of the future? [see Omand’s
IPPR paper on the module website]
Books - Core Reading
M. Aid, Secret Sentry, especially last section UB 271.U6
M. Aid Intel Wars Bloomsbury 2012
R.J. Aldrich, GCHQ, especially last section UB 251.A4
Andrew, Aldrich & Wark (eds), Secret Intelligence Chs. 3, 4 & 5 UB 250.S6
W.E. Burrows, Deep Black: The Secrets of Space Espionage UG 475.B87
Henry A Crumpton, The Art of Intelligence: Lessons from a Life in the CIA's Clandestine Service
(Hardback) Penguin Press, United States, 2012.
O. Gordievsky, Next Stop Execution [a good example of humint] UB 271.R9G6
M. Herman, Intelligence Power, chs 4-7 UB 250.H3
A.N. Shulsky, Silent Warfare: Understanding the World of Intell. ch1, 2, 3, UB 250.S4
B. Westerfield, Inside the CIA's Private World, chs. 1-11, especially 1, 2, 10, & 11 UB 271.U6
Books - Supplementary Reading
W.E. Burrows, By Any Means Necessary: America’s Secret Air War... E 183.8.S65 B89
D.D. Clarridge, A Spy for All Seasons: My Life in the CIA [see the detailed account of humint
agent recruitment] UB 271.U6
G. Corera, The Art of Betrayal: Life and Death in the British Secret Service W&N 2011
A. Dulles, The Craft of Intelligence UB 270.DB
P. Gill and M Pythian, Intelligence in and Insecure World chapter 4. UB 250.I6
L. Johnson, Strategic Intelligence, Volume II. The Intelligence Cycle: From Spies to
Policymakers esp chapters 1-6 UB 250.S6385 REF ONLY
Ishmael Jones: The Human Factor: Inside the CIA's Dysfunctional Intelligence Culture JC 842.J6
J. Keegan, The Second World War ch on intelligence D 743.K3
D.T. Lindgren, Trust But Verify: Imagery Analysis in the Cold War [good on Imint] UG
763.L56
M. Lowenthal, Intelligence: From Secrets to Policy chapter 5. UB 271.U6
15
J. Prados, The Soviet Estimate: US Intelligence Analysis and the Soviet Military Threat UB
271.U6
J. Richelson, The Wizards of Langley, Westview 2001
J. Schecter and P. Deriabin, The Spy Who Saved the World NIL
R. Steele, On Intelligence [value of Opint - Open Sources] NIL
R. Wallace & HK Melton, Spycraft UB 271.U6
Articles - Core Reading
M. Aid, ‘The Time of Troubles: The US National Security Agency in the Twenty-First Century’
INS 15, 3 (1999) [very good on pros and cons of sigint] (also reproduced as chapter 7 in Johnson
and Wirtz, Intelligence and National Security: The Secret World of Spies UB 250.I6
Matthew Aid, 'All Glory Is Fleeting: Sigint and the Fight against International Terrorism', INS
18/4 (Winter 2003): 72-120.
M.M. Aid, ‘ The Troubled Inheritance: The National Security Agency and the Obama
Administration’, in Loch Johnson (ed.) The Oxford Handbook of National Security Intelligence
UB 250.O9
R. Butterworth, 'Collection' in R Godson ed Intelligence Requirements for the 1990s: Collection,
Analysis, Counterintelligence and Covert Action UB 250.I6
JL. Gaddis, 'Intelligence, Espionage and Cold War History', Diplomatic History (1989) and also
in his The United States and the End of the Cold War
B. Gerber, 'Managing Humint: The need for a new Approach', in Jennifer Sims & Burton Gerber
(eds.) Transforming US Intelligence UB 250.T7
F.P. Hitz, ‘The Human Collection of Intelligence’ in Loch Johnson (ed.) The Oxford Handbook of
National Security Intelligence UB 250.O9
A.S. Hulnick, ‘The Dilemma of Open Sources Intelligence: Is OSINT Really Intelligence?’ in
Loch Johnson (ed.) The Oxford Handbook of National Security Intelligence UB 250.O9
G. Jones, 'It’s a Cultural Thing: Thoughts on a Troubled CIA', Orbis 50/1 (2006): 25-41.
R.D. Steele, The Importance of Open Source Intelligence to the Military', ch.9 in Johnson and
Wirtz, Intelligence and National Security: The Secret World of Spies UB 250.I6
Articles - Supplementary
J.M. Diamond, 'Re-examining Problems and Prospects in U.S. Imagery Intelligence', ch.5 in
Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies, UB 250.I6
D. D. Fitzgerald, 'Risk Management and National Reconnaissance form the Cold war up to the
Global War on Terrorism,' National Reconnaissance - A Journal of the Discipline and Practice 1
(2005) pp.9-18.
J.L. Gaddis, 'The Evolution of a Reconnaissance Satellite Regime' in A.L. George and others
(eds.) US-Soviet Security Co-operation (OUP, 1988). NIL
S Gibson, ‘Open Source Intelligence: An Intelligence Lifeline’ RUSI journal 149/1 (2004) 16-23.
M. M. Lowenthal, 'OSINT: The State of the Art, the Artless State,' Studies in Intelligence 45/3
(2001) pp.62-66.
Stephen Mercado, 'A Venerable Source in a New Era: Sailing the Sea of OSINT in the
Information Age', Studies in Intelligence 48/3 (2004): 45-55.
W.C. Prillaman & M.P. Dempsey, 'Mything the Point: What's Wrong with the Conventional
Wisdom about the CIA', Intelligence and National Security 19/1 (2004) pp.1-29.
H Ransom, 'Strategic Intelligence and Foreign Policy', World Politics 27 (Oct 74) 131-45.
Jeffrey T. Richelson, 'High Flyin' Spies', Bulletin of Atomic Scientists 52/2 (1996) pp.48-54.
Jeffrey T. Richelson, 'The Satellite Gap', Bulletin of Atomic Scientists 59/1 (2003) pp.48-54.
PR Riley, 'CIA and Its Discontents', chapter 4 in Johnson and Wirtz, Intelligence and National
Security: The Secret World of Spies UB 250.I6
16
3
Estimates & interpretation: the problems of analysis
Seminar paper questions
3.1 Is it correct to dismiss the followers of R.K. Betts as doom-mongers on the matter of
"intelligence failure” – or are they right to say it is inevitable"?
3.2 Can the organizational reform of intelligence have an impact on the main pathologies
of intelligence analysis and intelligence interpretation?
3.3 ‘Attempts at resolving failures in the realm of analysis have focused on the
organizational, but the roots of the problem are actually psychological’. Discuss.
Books - Core Reading
Andrew, Aldrich & Wark (eds), Secret Intelligence Chs. 6 & 7 UB 250.S6
Richard K. Betts and Thomas G. Mahnken, eds. Paradoxes of Strategic Intelligence: Essays in
Honor of Michael I. Handel UB 250.P34
H.P. Ford, Estimative Intelligence UB 271.U6
R.G. George and J.B. Bruce (eds) Analyzing Intelligence <e book>
Mark Lowenthal, Intelligence: From Secrets to Policy, chapter 6. UB 271.U6
D Omand, Securing the State Ch. 6-8 UA 647.043
A N Shulsky, Silent Warfare: Understanding the World of Intelligence ch 3 8
G. Treverton, Intelligence for an Age of Terror JC 704.2.T7
L UB 250.S4
Books - Supplementary
A Cahn, Killing Detente: The Right Attacks the CIA . UB 271.U6
Peter Gill and Mark Pythian, Intelligence in an Insecure World chapter 5. UB 270.G535
Richard Heuer, Psychology of Intelligence Analysis QZ 340.H38
R. Godson, Intelligence Requirements for the 1990s L UB 250.I6
I Janis, Groupthink HC 5120.J2
L Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of Government esp.
chapter 7 UB 250.S6385 REF ONLY
L Johnson, Strategic Intelligence, Volume II. The Intelligence Cycle: From Spies to Policymakers
esp chapters 8-9 UB 250.S6385 REF ONLY
S. Kent, Strategic Intelligence for American World Policy [the classic idealist statement from
the creator of ONE/CIA] L UB 250.K3
W. Matthias, America's Strategic Blunders: Intelligence Analysis and National Security Policy,
1936-1991 UB 250.M3
E.R. May, Knowing One's Enemies, [especially May's conclusions ] NIL
H. E. Meyer, Real-World Intelligence L HN 5100.M3
R.P. Pfaltzgraff et al (eds.), Intelligence Policy and National Security chs. 6 & 7 UB 250.I6
J. Prados, The Soviet Estimate: US Intelligence Analysis & the Soviet Military Threat UB 271.U6
Sir K. Strong, Intelligence at the Top NIL
J. Richards, The Art and Science of Intelligence Analysis, UB 250.R4
B. Westerfield, Inside the CIA's Private World, chs. 11-28, 31, but especially 11, 12, 14, 17, 25,
26, 27, 31 UB 271.U6
R. Wohlstetter, Pearl Harbor: Warning and Decision D 767.92.W6
17
Vietnam case study
S. Adams, War of Numbers DS 557.A6
G.W. Allen None So Blind : A Personal Account of the Intelligence Failure in Vietnam L DS
557.A6
H P Ford, CIA and the Vietnam Policy Makers DS 551.F6
J.J. Wirtz, The Tet Offensive: Intelligence Failure in War NIL
Articles - Core Reading
R K Betts, 'Analysis, War, Decision: Why Intelligence Failures are Inevitable' World Politics
(1978/9) (also reproduced as chapter 8 in Johnson and Wirtz, Intelligence and National Security:
The Secret World of Spies, UB 250.I6
R Betts, ‘Surprise Despite Warning: Why Sudden Attacks Succeed' Political Science Quarterly
95 (Winter 1980) 551-72.
D. Hart and S. Simon, 'Thinking straight and talking straight: Problems of intelligence analysis',
Survival 48/1 (2006) pp.35-60.
K.A. Hatlebrekke & M.L. Smith, ‘Towards a New Theory of Intelligence Failure? The Impact of
Cognitive Closure and Discourse Failure’, INS 25, 2 (2010): 147-182.
M.N. Lowenthal, 'Towards a Reasonable Standard for Analysis: How Right, How Often on
Which Issues?', INS, 23/3 (2008): 303-315.
S. Marrin, 'At Arm's Length or At the Elbow?: Explaining the Distance between Analysts and
Decisionmakers', International Journal of Intelligence and CounterIntelligence, 20, 3 (2007):
401-414.
Carmen Medina, 'What To Do When Traditional Models Fail', Studies in Intelligence 46/3
(2002): 23-9. (It is also worthwhile looking at the response - S.R. Ward, 'Evolution Beats
Revolution in Analysis', Studies in Intelligence 46/3 (2002): 29-36.
W.E. Odom, 'Intelligence Analysis', INS, 23/3 (2008): 316-332.
Articles - Supplementary Reading
R. Callum, ‘The Case for Cultural Diversity in the Intelligence Community’ International
Journal of Intelligence and Counterintelligence 14, 1 (2001): 25-48. JSTOR
E Cohen, 'Analysis' in R Godson (ed.) Intelligence Requirements for the 1990s: Collection,
Analysis, Counter-intelligence and Covert Action. UB 250.I6
S. Gazit, 'Estimates and Fortune-Telling in Intelligence Work,' INS 4/4 (1980): 36-56.
S. Gazit, 'Intelligence Estimates and the Decision-Maker,' INS 3/3 (1988): 261-287.
RZ George, 'Fixing the Problem of Analytical Mind-Sets: Alternative Analyses ', International
Journal of Intelligence and Counterintelligence 17/3 (2004): 385-404.
M. Gladwell, 'Connecting the Dots: The Paradoxes of Intelligence Reform,' The New Yorker, 10
March 2003, pp.83-88.
R. Jervis, 'Hypotheses on Misperception', World Politics, 20/ 3 (April 1968): 454-79.
Mark A. Jensen, 'Intelligence Failures: What Are They Really and What Do We Do about
Them?', Intelligence and National Security 27/2 (2012): 261-282.
Stephen Marrin, 'Intelligence Studies Centers: Making Scholarship on Intelligence
Analysis Useful', Intelligence and National Security 27/3 (2012): 398-422.
L. Johnson, ‘Analysis for a New Age’, INS 11/4 (October 1996): 657-71.
G. Schmitt, 'Truth to Power: Rethinking Intelligence Analysis' in P. Berkowitz (ed.) The Future
of American Intelligence (Hoover Institute Press 2004) NIL
18
4
Intelligence at the Top: Producer-Consumer Linkage
Seminar paper questions
4.1 Should intelligence be ‘a function of command’ [view of US Joint Chiefs of Staff] or
objective and insulated from the policy process [view of CIA's Sherman Kent] ?
4.2 If we accept Betts's hypothesis that "intelligence failures are inevitable", how should
the leaders of states approach the problem of surprise?
4.3 Are the leaders of democratic states typically better consumers of intelligence?
4.4 Which US Presidents does Christopher Andrew consider to have been good at
intelligence - and why?
Books - Core Reading
Andrew, Aldrich & Wark (eds), Secret Intelligence Chs. 8 & 9 UB 250.S6
C.M. Andrew, For the President’s Eyes Only JC 842.A6
R.K. Betts, Surprise Attack U 163.B3
A. Codevilla, Informing Statecraft UB 271.U6
R.K. Betts & TG Mahken, Paradoxes of Strategic Intelligence UB 250.P34
Richard K. Betts, Enemies of Intelligence UB 271.U6
M. Handel (ed.), Leaders and Intelligence [special issue of INS 3/3] UB 250.L44
A. Levite, Intelligence and Strategic Surprise UB 250.L48
Mark Lowenthal, Intelligence: From Secrets to Policy chapter 9. UB 271.U6
D. Omand, Securing the State Ch. 6-8 UA 647.043
R L. Pfaltzgraff & V. Ra'anan (eds.), Intelligence Policy & National Security ch. 13-17, 19, 20,
23 UB 250.I6
Books - Supplementary Reading
Peter Gill and Mark Pythian, Intelligence in an Insecure World chapter 6. UB 250.I6
B. Gertz, Betrayal. [Critique of Clinton and Intelligence] JE 242.G3
L Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of Government esp.
chapter 8 UB 250.S6385 REF ONLY
R.V. Jones, Reflections on Intelligence, Chapter 6 NIL
*E. Kam, Surprise Attack: The Victim's Perspective U 163.K27
W. Laqueur, World of Secrets UB 271.U6
H.H. Ransom, 'The Politicization of Intelligence', ch.14 in Johnson and Wirtz, Intelligence and
National Security: The Secret World of Spies, UB 250.I6
J. Rovner, Fixing the facts : national security and the politics of intelligence (Cornell University
Press, 2011)
A.N. Shulsky, Silent Warfare: Understanding the World of Intelligence ch. 3, 8 UB 250.S4
S. Turner, Burn Before Reading: Presidents, CIA Directors and Secret Intelligence Hyperion
2006
B. Whaley, Codeword Barbarossa D 764.W4
19
Articles - Core Reading
C.M. Andrew, 'American Presidents and their Intelligence Communities', INS 1/4 (1995): 95-113.
R.K. Betts, 'Surprise, Scholasticism and Strategy' and rejoinder by Levite, International Studies
Quarterly, 33, 3 (September 1989).
R.K. Betts, ' 'Politicization of Intelligence: Costs and Benefits' in R Betts and T Mahnken, eds.,
Paradoxes of Intelligence: Essays in Honor of Michael Handel 59–79. UB 250.P34
R K Betts, 'Analysis, War, Decision: Why Intelligence Failures are Inevitable' World Politics
(78/9)
S Chan, 'The Intelligence of Stupidity: Understanding Failures in Strategic Warning' American
Political Science Review 73, 1 March 1979
J. Davis, ‘ Intelligence analysts and policymakers; benefits and dangers of tensions in the
relationship, INS 21/6 (2000) 999-1021
S. Farson, (eds.) Security and Intelligence in a Changing World, ch 12. UB 250.C69
K.L. Gardiner, ’Squaring the Circle: Dealing with Intelligence-Policy Breakdowns’, INS 6/1
(1991):141-152.
M. Herman, 'Intelligence and National Action', ch.15 in Johnson and Wirtz, Intelligence and
National Security: The Secret World of Spies, UB 250.I6
M.M Lowenthal, ‘The Policymaker-Intelligence Relationship’, in Loch Johnson (ed.) The Oxford
Handbook of National Security Intelligence
P. Jackson, ‘On Uncertainty and the Limits of Intelligence’, in Loch Johnson (ed.) The Oxford
Handbook of National Security Intelligence
R. Jervis, ‘Why intelligence and policy-makers clash’, Political Science Quarterly, 125/2, (2010):
185-204.
P. Pillar, ‘The Perils of Politicization’, in Loch Johnson (ed.) The Oxford Handbook of National
Security Intelligence
D. Robarge, ‘Leadership in an Intelligence Organization: The Directors of Central Intelligence
and the CIA’, in Loch Johnson (ed.) The Oxford Handbook of National Security Intelligence
Articles - Supplementary Reading
On intelligence at the top –
K.L. Gardiner, ‘Dealing with Intelligence-Policy Disconnects' in Inside CIA's Private World, ed.
H. Bradford Westerfield, 344-356
D. Gries, ‘New Links Between Intelligence and Policy’ in Inside CIA's Private World, ed. H.
Bradford Westerfield, 357-365
*M. Handel, 'Intelligence and Military Operations' , INS 5/2 (April 1990).
M. Herman, 'Intelligence Warning and the Occupation of the Falkland Islands' in A. Danchev ed
International Perspectives on the Falklands Conflict
*R. Jervis, 'Intelligence and Effective Policy' in A.S. Farson et al eds Security and Intelligence in
Changing World UB 250.C69
D. Kahn, 'Clausewitz and Intelligence' in M. Handel (ed) Clausewitz and Modern Strategy
A. Kovacs, ‘Using Intelligence’, INS 12/4 (October 1997): 145-64.
R. Jervis, 'Strategic Intelligence and Effective Policy' in A. Farson, D. Stafford and W. Wark
(eds) Security and Intelligence in a Changing World UB 250.C69
Martin Petersen, 'The Challenge of the Political Analyst', Studies in Intelligence 47/1 (2003)
pp.51-6.
20
Specifically on intelligence failure R Cline, 'Policy Without Intelligence' Foreign Policy Winter 1974
T. Cubbage, 'Westmoreland v CBS: Was Intelligence Corrupted by Policy Demands?' INS July
1988 [c.f Sam Adams, War of Numbers, above]
S. J. Flanagan, 'Managing the Intelligence Community' International Security 10, 1 1985 58M. Herman, 'Intelligence Warning of the Occupation of the Falkland Islands: Some
Organisational Issues', in A Danchev ed International Perspectives on the Falklands Crisis
A. S. Hulnick, 'The Intelligence Producer-Policy Consumer Linkage' INS 1, 2 May 1986
G. Hopple, 'Intelligence and Warning: Implications and Lessons of the Falklands Islands War'
World Politics April 1984
R.V. Jones, 'Intelligence and Command' INS July 1988
E. May, 'Intelligence: Backing into the Future' Foreign Affairs 71/3 (1992) 63-73
A. Reuben, 'Stalin and June 22 1941' International Affairs 42 (66) 662-73
5
Liaison: the delicate diplomacy of intelligence
Seminar paper questions
5.1 'There are no friendly intelligence services, only the intelligence services of friendly
powers.' Discuss.
5.2 Identify the main problems and benefits that are involved in intelligence co-operation
between small states.
5.3 Why have Europe and America co-operated so closely on intelligence since 9/11,
despite public arguments over matters such as the War on Terror and Iraq?
Books - Core Reading (but the articles are better on this subject)
Andrew, Aldrich & Wark (eds), Secret Intelligence Ch. 10 UB 250.S6
W. Blitzer, Territory of Lies the Exclusive Story of Jonathan Jay Pollard: The American Who
Spied on His Country for Israel and How He Was Betrayed [a US-Israeli case] UB 271.I82
M Deflem, Policing World Society. Historical Foundations of International Police Cooperation.
HF 3800.D3
J.J. Fialka, War by Other Means, Economic Espionage in America HN 355.F4
P. Schweizer, Friendly Spies HN 355.S2
A Svendsen, Anglo-American Intelligence Co-operation JE 300.T3.S93
J.I. Walsh, Intelligence Politics of Intelligence Sharing, UB 270.W2
Books - Supplementary Reading (but the articles are better on this subject)
M. Anderson, Policing the World HF 3800.A6
J. Bamford, The Puzzle Palace UB 271.U6
21
R. Cline, Secrets, Spies and Scholars NIL
H Cohen, The Good Arabs, Good Arabs : the Israeli security agencies and the Israeli Arabs Uni
of Cal Press 2010
A.J. Cristol, The Liberty Incident: The 1967 Israeli Attack on the U.S. Navy Spy Ship
W.J. Ennes, Assault on the Liberty NIL
N. Hager, Secret Power, 1996 NIL
J. Jakub, Spies and Saboteurs, especially Chapter 7 NIL
T. Mangold, Cold Warrior, esp ch 5 on the SAPPHIRE/de Vosjoli case. UB 271.U6.M36
Y. Melman, & D. Raviv. Friends in Deed: Inside the U.S.-Israel Alliance. [see especially
chapters 4, 7, 15] E 183.8.I7
J. Richelson, Ties That Bind: 2nd Edition UB 270.R4
J. Richelson, The US Intelligence Community, Chapter 10 UB 271.R4
M. Yossi and D. Raviv, The Imperfect Spies: A History of Israeli Intelligence [published in the
US as: every spy a prince] NIL
Articles - Core Reading
R.J. Aldrich, ‘Dangerous Liaisons: Post September 11 Intelligence Alliances’, Harvard
International Review 24/3 (2002): 50-54.
S. Lander, 'International Intelligence Co-operation: An Inside Perspective', Cambridge Review of
International Studies 17/3 (October 2004): 481-93.
J.T. Richelson, ‘The Calculus of Intelligence Cooperation.’ International Journal of Intelligence
and Counterintelligence 4/3 (Fall 1990): 307-323.
Articles - Supplementary Reading
R.J. Aldrich, 'Transatlantic Intelligence and Security Cooperation,' International Affairs 80/4
(2004): 731-54.
B. Champion, 'A Review of Selected cases of Industrial Espionage', INS 13/2 (1998): 123-44
C. Clough, ‘Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation’,
The International Journal of Intelligence and Counterintelligence, 17/4 (2004)
B. De Graaff, & C. Wiebes. 'Intelligence and the Cold War behind the Dikes: The Relationship
between the American and Dutch Intelligence Communities' INS 12/1 (1997): 41-58.
A.S. Hulnick, ‘Intelligence Cooperation in the Post-Cold War Era: A New Game Plan?’
International Journal of Intelligence and Counterintelligence 5/4 (1991-1992) pp.455-465.
S. Lefebvre, 'The Difficulties and Dilemmas of International Intelligence Cooperation',
International Journal of Intelligence and Counterintelligence 16/4 (2003) pp.527-542.
B. Müller-Wille, 'The Effect of International Terrorism on EU Intelligence Co-operation', Journal
of Common Market Studies, 46/1 (2008) pp.49-73.
B. Müller-Wille, ‘EU intelligence cooperation: A Critical Analysis’, Contemporary Security
Policy, 23/2 (2002)
W. Rosenau, 'Liaisons Dangereuses? Transatlantic Intelligence Co-operation and the Global War
on Terrorism', in Co-operating Against Terrorism: EU-US Relations Post September 11-Conference Proceedings (Sweden: Swedish National Defence College, 2007) pp.31-40.
M. Rudner, 'Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism,'
International Journal of Intelligence and Counterintelligence, 17/2 (2004) pp.193-230.
M. Rudner, 'Britain Betwixt and Between: UK SIGINT Alliance Strategy's Transatlantic and
European Connections', INS 19/4 (2004): 571D.S. Reveron, ‘Old Allies, New Friends: Intelligence-Sharing in the War on Terror’, Orbis
(Summer, 2006).
22
J.E. Sims, ‘Foreign Intelligence Liaison: Devils, Deals, and Details’, International Journal of
Intelligence and CounterIntelligence, 19 (2006)
A. Svendsen, ‘The globalization of intelligence since 9/11: frameworks and operational
parameters’, Cambridge Review of International Affairs 21/1 (2008) pp.131-146.
J.I. Walsh, ‘Intelligence-Sharing in the European Union: Institutions Are Not Enough’, Journal of
Common Market Studies, 44/3 (2006), pp.625-43.
J.I. Walsh, 'Defection and Hierarchy in International Intelligence Sharing', Journal of Public
Policy, 27/2 (2007): 151-181.
M. Warner, 'Intelligence Transformation and Intelligence Liaison,' SAIS Review 24/1 (2004)
pp.77-89.
Joe Wippl, 'Intelligence Exchange Through InterIntel', , International Journal of Intelligence and
CounterIntelligence, 25/1 (2012): 1-18.
Also the special Issue of INS 13/1 Knowing Your Friends especially chs 1, 5 and 11
6 Reading Week - No Lecture
C: COUNTER-TERRORISM AND SECURITY
7 - The Attacks of 9/11: What Kind of Failure?
Seminar paper questions
7.1 The 9/11 attack was the result of an 'intelligence failure', and especially a failure of
the collection of intelligence. Discuss.
7.2 How far do you agree with Amy Zegart's assertion that the intelligence failures that
resulted in 9/11 are about the self-interested groups that prevent adaptation?
7.3 A second Pearl Harbor? Consider the similarities and differences between 11
September 2001 and 7 December 1941.
Internet
Senate, Select Committee on Intelligence and House, Permanent Select Committee
on Intelligence, Joint Inquiry Into Intelligence Community Activities Before and
After the Terrorist Attacks of September, Washington D.C.: Government Printing
Office, 2003 Soft Cover. available at http://www.gpoaccess.gov/serialset/creports/911.html
23
if you want the hearings which are very detailed see http://www.fas.org/irp/congress/
9/11 Commission Report: Final Report of the National Commission on Terrorist
Attacks Upon the United States (Official Edition) including the Executive Summary
1577363418 & HV6432.7.N2
The 'Final Report of the National Commission on Terrorist Attacks Upon the
United States, Official Government Edition,' dated 22 July 2004,
available at http://www.fas.org/irp/offdocs/911comm.html.
Books -Core Reading
MM Aid, The Secret Sentry UB 271.U6
Andrew, Aldrich & Wark (eds), Secret Intelligence Chs. 11 & 12 UB 250.S6
D. Benjamin and S. Simon, The Age of Sacred Terror JE 300 T3.B3
B Gertz, Breakdown: How America’s Intelligence Failures led to September 11
JE 300.T3.G3
Bob Graham, with Jeff Nussbaum. Intelligence Matters: The CIA, the FBI, Saudi Arabia, and the
Failure of American's War on Terror JC 704.2.G7
T. Naftali, Blind Spot
JE 300.T3.N2
See also the useful review summary of Naftali by Crenshaw at
http://www.foreignaffairs.org/20050701fareviewessay84414/martha-crenshaw/counterterrorismin-retrospect.html
G. Posner, Why America Slept: The Failure to Prevent 9/11
E 888.P6
R. Posner, Preventing Surprise Attacks: Intelligence Reform in the Wake of 9/11 UB 250.P6
P Shenon, The Commission: The Uncensored History of the 9/11 Investigation
(ISBN: 0446580759 / 0-446-58075-9 )
A. Summers and R. Swann. The Eleventh Day: The Ultimate Account of 9/11, Doubleday 2011
S Strasser, The 9/11 Investigations E 888.N4
A Zegart, Spying Blind: The CIA, the FBI, and the Origins of 9/11 UB 271.U6
Books - Supplementary Reading
P Bergen, Holy War Inc: Inside the Secret World of Osama Bin Laden JE 300.T3
Richard A. Clarke, Against All Enemies. JC 704.2.C5
Der Spiegel, Inside 9-11: What Really Happened E 888.I6
Y. Fouda and N. Fielding, Masterminds of Terror: the Truth Behind the Most Devastating Attack
the World Has Ever Seen, JE 242.F6
L Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of Government esp.
chapter 9 UB 250.S6385 REF ONLY
M Mahle Boyle, Denial and Deception: An Insider's View of the CIA from Iran-Contra to 9/11
UB 271.U6.M34
J Miller The Cell: Inside the 9/11 Plot and Why the FBI and the CIA Failed to Stop It NIL
Y Bodansky, Bin Ladin: the man who declared war on America JE 300.T3 B6
S Reeve, The New Jackals Rami Yousef, Osamar Bin Ladin & the Future of Terrorism JE
300.T3.R3
L. Wright, The Looming Tower JE 300.T.3
24
Articles - Core Reading
R.K.Betts, ‘Two Faces of Intelligence Failure : September 11 and Iraq's Missing WMD’
Political Science Quarterly 122/4 (2007): 585-606
R.A. Falkenrath, 'The 9/11 Commission Report a Review Essay, International Security 29/3
(2004), 170-190.
A.B. Zegart, '9/11 and the FBI: The organizational roots of failure', INS, 22/2 (2007): 165-184.
A.B. Zegart, 'September 11 and the Adaptation Failure of U.S. Intelligence Agencies',
International Security 29/4 (2005): 78-111.
Articles - Supplementary Reading
B Lee, W Enders, T Sandler, '9/11: What Did We Know And When Did We Know It?', Defence
and Peace Economics, 20/2, (2009): 79-93.
F.L. Borch, 'Comparing Pearl Harbor and "9/11": Intelligence Failure? American
Unpreparedness? Military Responsibility?' The Journal of Military History 67/3 (2003): 845-860.
H.D.E. Bruijn, 'One fight, one team: The 9/11 Commission Report on Intelligence, Fragmentation
and Information', Public Administration 84/2 (2006):.267-87.
D. Byman, 'Strategic Surprise and The September 11 Attacks', Annual Review of Political
Science 8 (2005): 145-170.
T.G. Carpenter, 'Missed Opportunities: The 9/11 Commission Report and US Foreign Policy',
Mediterranean Quarterly 16/1 (2005): 52-61.
S. Clarke, 'Conspiracy Theories and the Internet: Controlled Demolition and Arrested
Development', Episteme: A Journal of Social Epistemology 4/2 (2007):167-180.
E. J. Dahl, 'Warning of Terror: Explaining the Failure of Intelligence Against Terrorism', Journal
of Strategic Studies 28/1 (2005): 31-55.
H. Fessenden 'The Limits of Intelligence Reform', Foreign Affairs 84/6 (2005): 106-120.
R.A. Goldberg, 'Who Profited From the Crime? Intelligence Failure, Conspiracy Theories and the
Case of September 11', Ch.6. in L.V. Scott and P.D. Jackson (eds.) Understanding Intelligence in
the 21st Century UB 250.U53 [this is also Intelligence and National Security, 20/1 (2004)]
M.A. Goodman, '9/11: The Failure of Strategic Intelligence', INS - (2003) 18/4: 59-71
T. Homer-Dixon,‘The Rise of Complex Terrorism’ Foreign Policy 2002 [on the FP website]
G. Ilardi, ‘The 9/11 Attacks—A Study of Al Qaeda's Use of Intelligence and
Counterintelligence’, Studies In Conflict And Terrorism, 32/3 (2009): 171-187.
S. Lefebvre, . 'A Look at Intelligence Analysis.' International Journal of Intelligence and
Counterintelligence 17/2 (2004): 231-264.
P.R. Neumann & M.L.R Smith. 'Missing the Plot? Intelligence and Discourse Failure', Orbis
49/1 ( 2004/2005): 95-107
C.F. Parker & E.K. Stern 'Blindsided? September 11 and the Origins of Strategic Surprise',
Political Psychology 23/3 (2002): 601–630.
P.R. Pillar, 'Good literature and bad history: The 9/11 commission's tale of strategic intelligence',
INS, 21/6 (2006): 1022-44.
J. Simon, ‘Parrhesiastic Accountability: Investigatory Commissions and Executive Power in an
Age of Terror’, Yale Law Journal, Vol. 114, (2005).
J. J. Wirtz, ‘Deja Vu? Comparing Pearl Harbor and September 11’, Harvard International Review
24/3 (2002): 73–77.
J Wirtz, 'Responding To Surprise', [compares responses to Pearl Habor and 9/11] Annual Review
of Political Science 9 (2006): 45-65.
A.B. Zegart, 'An Empirical Analysis of Failed: Intelligence Reforms Before September 11,'
Political Science Quarterly 121/1 (2006): 33-60.
25
Topic 8 Proliferation and WMD - the Iraq Case
Seminar paper questions
8.1 To what extent was the Iraqi WMD fiasco in the USA a product of intelligence failure
and to what extent the product of interference by policy-makers and politicians?
8.2 What problems and weaknesses in the UK intelligence system have been
illuminated by the Iraqi WMD saga and the 4 subsequent inquiries held in 2003 and
2004?
8.3 Why did Canada and the Netherlands get the WMD question right - while German
and France and Australia got it wrong? [you will need to prowl the web for this one]
US Reading
Internet
Senate Select Committee Report on WMD
Available at http://www.fas.org/irp/congress/2004_rpt/index.html#ssci
WMD Commission Report
Available at - http://www.fas.org/irp/offdocs/wmdcomm.html
Books - Core Reading
Select Committee on Intelligence, Report of the Select Committee on Intelligence on
the United States Intelligence Community's Prewar Intelligence Assessments on Iraq,
M.M. Aid, The Secret Sentry Ch13 UB 271.U6
Andrew, Aldrich & Wark (eds), Secret Intelligence Ch. 13 UB 250.S6
J. Bamford, Pretext for War DS 79.6.B2
M.A. Goodman, Failure of intelligence: the decline and fall of the CIA UB 250.G6
R. Jervis, Why intelligence fails: lessons from the Iranian Revolution and the Iraq War E
183.8.I57
Paul Pillar, Intelligence and U.S. Foreign Policy: Iraq, 9/11 and Misguided Reform
(Columbia 2011)
J. Risen, State of War UB 271.U6
Books - Supplementary Reading
H. Blix, Disarming Iraq: The Search for Weapons of Mass Destruction DS 79.591.B5
Y. Bodansky, The secret history of the Iraq War NIL
26
M. DeLong, Inside CentCom: The Unvarnished Truth About the Wars in Afghanistan and Iraq
NIL
Bob Drogin, Curveball: Spies, Lies, and the Con Man Who Caused a War DS 79.591.D7
Tyler Drumheller, On the Brink: An Insider's Account of How the White House Compromised
American Intelligence UB 271.U6
Peter Gill and Mark Pythian, Intelligence in an Insecure World chapter 7. UB 250.I6
S.M. Hersh, Chain of command : the road from 9/11 to Abu Ghraib JE 242.H3
L. Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of Government esp.
chapter 9 UB 250.S6385 REF ONLY
G. Tenet, At the Center of the Storm JC 842.T3
C.R. Whitney (ed.) The WMD Mirage DS 79.76.W484
Articles - Core Reading
R.K.Betts, ‘Two Faces of Intelligence Failure : September 11 and Iraq's Missing WMD’
Political Science Quarterly 122/4 (2007): 585-606.
P. Conway, 'Red Team: How the Neoconservatives Helped Cause the Iraq Intelligence Failure',
Intelligence and National Security 27/4 (2012): 488-512.
Robert Jervis, 'Reports, Politics, and Intelligence Failures: The Case of Iraq', Journal of Strategic
Studies 29, 1 (2006): 3-52.
*David Isenberg, See, Speak, and Hear No Incompetence: An Analysis of the Findings of The
Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass
Destruction BASIC Report 2005 available at - http://www.basicint.org/pubs/pubindex.htm
Articles - Supplementary Reading
R. Best, ‘What the Intelligence Community Got Right About Iraq’, INS 23/3 (2008): 289-302
C. Kaufmann, 'Threat Inflation and the Failure of the Marketplace of Ideas: The Selling of the
Iraq War', International Security 29/1 (2004): 5-48.
K. Pollack, 'Spies, Lies and Weapons: What went wrong' Atlantic Monthly, 293/1 (2004):
http://www.theatlantic.com/doc/200401/pollack
R.L. Russell, 'CIA's Strategic Intelligence in Iraq', in also reproduced as chapter 12 in Johnson
and Wirtz, Intelligence and National Security: The Secret World of Spies UB 250.I6
K. Russell, 'The Subjectivity of Intelligence Analysis and Implications for U.S. National Security
Strategy.' SAIS Review, 24/1 (2004): 147-163.
R.L. Russell, ‘A Weak Pillar for American National Security : The CIA's Dismal
Performance against WMD Threats’ Intelligence and National Security - 20/3 (2005):
466-485
UK Reading
Internet
Foreign Affairs Committee Report
http://www.fas.org/irp/threat/ukiraq0703.pdf
Intelligence and Security Committee Report
27
http://www.fas.org/irp/world/uk/index.html
Hutton Report
http://www.fas.org/irp/world/uk/index.html
Lord Butler Report
http://www.fas.org/irp/world/uk/index.html
Glen Rengwala also has some useful material at
http://middleeastreference.org.uk/fac030616.html
Books - Core Reading
Andrew, Aldrich & Wark (eds.), Secret Intelligence Chs.14 UB 250.S6
Tim Coates & Lord Butler, Lord Butler's Report: Espionage and and Iraq War DS 79.591.L6
A. Glees & P. Davies, Spinning the Spies, UB 250.G5
B. Jones, Failing Intelligence How We Were Fooled into Going to War in Iraq DS 79.76.J66
Books - Supplementary Reading
H Blix, Disarming Iraq: The Search for Weapons of Mass Destruction DS 79.591.B5
A. Campbell, The Blair Years DA 592.7.C2
G. Corera, The Art of Betrayal: Life and Death in the British Secret Service, Ch.10 UB 251.G7
S. Kettell, Dirty Politics? New Labour, British Democracy & the Invasion of Iraq. Ch 4 JE
232.K3
G. Rangwala & D. Plesch, A Case To Answer DA 591.B56
A Seldon, Blair DA 592..7.B5
Articles - Core Reading
R.J. Aldrich, 'Whitehall and the Iraq War: The UK's Four Intelligence Enquiries', Irish Studies in
International Affairs, 16, 1 (2005) online at - http://www.ria.ie/publications/journals/isia/
A. Danchev, 'Story Development, or, Walter Mitty the Undefeated', ch.7 in A. Danchev & J.
Macmillan (eds.), The Iraq War and Democratic Politics DS 79.6.I7
Philip Davies, 'Intelligence Culture and Intelligence Failure in Britain and the United States',
Cambridge Review of International Affairs, 12/3 (2004): 495-520.
Ian Davis and Andreas Persbo, ‘After the Butler report: time to take on the Group Think in
Washington and London’, BASIC papers: occasional papers in international security, no. 46
(July 2004) available at http://www.basicint.org/pubs/Papers/BP46.htm
David Hannay, ‘Three Iraq Intelligence Failures Reconsidered’, Survival, 51/6
(December 2009): 13 – 20.
S. Kettell, ‘Who's Afraid of Saddam Hussein? Re-examining the 'September Dossier' Affair’,
Contemporary British History, 22/3 (2008): 407-426
J. Morrison, ‘British Intelligence Failures in Iraq’, Intelligence and National Security
26/4 (2011): 509-520
28
Articles - Supplementary Core Reading
C. Bluth, ‘The British road to war: Blair, Bush and the decision to invade Iraq’, International
Affairs 80/5 (2004): 851-872.
A Doig, ’45 Minutes of Infamy? Hutton, Blair and the Invasion of Iraq’, Parliamentary Affairs,
58/1 (2005).
A. Doig & M. Phythian, 'The national interest and the politics of threat exaggeration: the Blair
government's case for war against Iraq'. Political Quarterly 76/1 (2005): 368-376.
P. Gill, 'Keeping "Earthly Awkwardness": Failures of Intelligence in the United Kingdom', in
T.C. Bruneau & Steven C. Boraz (eds.), Reforming Intelligence: Obstacles to Democratic
Control and Effectiveness (Texas University Press, 2007) chapter 4. UB 250.R4 <e>
A Glees, ‘Evidence-based policy or policy-based evidence? Hutton and the government’s use of
secret intelligence’, Parliamentary Affairs, 58/1 (2005).
E. O'Halpin, 'British Intelligence and the Case for Confronting Iraq: Evidence from the Butler and
Hutton Reports,' Irish Studies in International Affairs 16 (2005): 89–102. [http://www.ria.ie/cgibin/ria/papers/100537.pdf]'
J Humphries, ‘The Iraq dossier and the meaning of spin’ Parliamentary Affairs, 58, 1 (2005):
156-70.
L Freedman, ‘War in Iraq: selling the threat’, Survival 46, 2 (2004): 7-50.
For both also read the Australian Account - A. Wilkie, Axis of Deceit DS 79.76.W54
9
Security Intelligence and Counter-terrorism:
The Liberal State before 1990
Seminar paper questions
9.1 Why did intelligence in the counter-terrorist context present the liberal state with
special problems in the period 1967-89?
9.2 Was there a particular UK doctrine of counter terrorist intelligence that emerged from
Northern Ireland? Does it remain valid ?
Books - Core Reading
C Andrew, In Defence of the Realm, Section E , chs. 3, 5 & 10 pp 600-27, 644-56 734-53 UB271.G7
Andrew, Aldrich & Wark (eds), Secret Intelligence Ch.16 UB 250.S6
J Boyer Bell, Dynamics of the Armed Struggle – chapter on intelligence JE 300.T3.B3
S. Farson, (eds.) Security and Intelligence in a Changing World, ch 13. UB 250.C69
P Taylor, Brits: The War Against the IRA DA 990.U468
Books - Supplementary Reading
J. Adams, The New Spies, chs.14 & 15 UB 250.A3
M.G. Davidson, Combatting Terrorism NIL
29
A.Marenches, The fourth world war: diplomacy and espionage in the age of terrorism D 860.M3
T.R. Mockaitis, British Counter-Insurgency in the Post Imperial Era UA 647.M63
Northern Ireland - Recommended Case Study
J. Adams et al, Ambush NIL
J. Bowyer Bell, The dynamics of the armed struggle JE 300.T3
M Dillon, The Enemy Within L DA 990.U463
P. Foot, Who Framed Colin Wallace? . NIL
T Geraghty, The Irish War L DA 990.U464
T Hennessey & C Thomas, Spooks: The Unofficial History of MI5 Ch 36 UB 271.G7
J. Holland, Phoenix: Policing in the Shadows NIL
M McGartland 50 Dead Men Walking NIL
P. Neumann, Britain's long war: British strategy in the Northern Ireland conflict, 1969-98 DA
990.U46 and <ebook>
M. Smith, The Spying Game UB 251.S6
M Urban, Big Boys Rules DA 990.U46
Articles - Core Reading
B. Bamford, 'The Role and Effectiveness of Intelligence in N Ireland', INS, 20/4 (2005): 581-607.
D.A. Charters, 'Counter-Terrorism Intelligence: Sources, Methods, Processes and Problems' in
D.A. Charters (ed.), Democratic Responses to International Terrorism 227-267,
Ilardi, “IRA Operational Intelligence: the heartbeat of the war”, Small wars and insurgencies,
21/2 (2010)
Ilardi, “Irish Republican Army counterintelligence”, International Journal of Intelligence and
Counterintelligence, 23/1 (2009)
Kirk-Smith and Dingley, “Countering terrorism in Northern Ireland: the role of intelligence”,
Small Wars and Insurgencies, 20/3-4 (2009)
Moran, “Evaluating Special Branch and the use of informant intelligence in Northern Ireland”,
Intelligence and National Security, 25/1 (2010)
Sarma, “Informers and the battle against republican terrorism”, Police Practice and Research, 6/2
(2005)
Tuck, “Northern Ireland and the British approach to counterinsurgency”, Defense and Security
Analysis, 23/2 (2007)
Articles - Supplementary Reading
S.A. Farson, 'Criminal Intelligence vs. Security Intelligence: Re-evaluation of the Police Role in
the Response to Terrorism' in D.A. Charters (ed) Democratic Responses, 191-227. JE 300 T3.D3
F. Hitz, 'Unleashing the Rogue Elephant: September 11 and Letting the CIA Be the CIA', ch.29 in
Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies, UB 250.I6
*K.G. Robertson, 'Intelligence, Terrorism and Civil Liberties', Conflict Quarterly, 7/2 (1987) –
reproduced in the P. Wilkinson et al volume Contemporary Research on Terrorism JE 300.T3
30
10
Security Intelligence and Counter-terrorism:
The Market State
Seminar paper questions
10.1 To what extent may terrorist organizations be considered to be simply malignant
forms of secret service ?
10.2 Does counter-terrorist intelligence require special forms of control, regulation and
oversight and if so what shape should it take?
Books - Core Reading
Andrew, Aldrich & Wark (eds), Secret Intelligence Chs.15 & 27 UB 250.S6
R.D. Crelinsten, Intelligence and Counter-Terrorism in a Multi-Centric World (Swedish National
Defence College, War Studies Research Reports No.13, 2006) JE 300.T3.C7
P. Chalk & W Rosenau, Confronting 'the Enemy Within': Security Intelligence, the Police, and
Counterterrorism in Four Democracies, UB 250.C4
T. Naftali, Blind Spot JE 300.T3.N2
R. Posner, Countering Terrorism JC 704.2.P6
G. Treverton, Intelligence for an Age of Terror JC 704.2.T7
Wesley K. Wark (ed.), Twenty-First Century Intelligence JC 842.T9
Books - Supplementary Reading
Anonymous, [Michael Scheuer] Imperial Hubris: Why the West is Losing the War on Terror JE
300.T3.S2
J. Arquilla, Countering the New Terrorism RAND JE 300.T3 C68
Philip Bobbitt, Terror and Consent: The Wars for the Twenty-first Century JE 300.T3
A. Cronin & J Ludes, Attacking Terrorism, (ch.5 on intelligence by Pillar) JC 704..2.A8
D.D. Clarridge, A Spy for all seasons: my life in the CIA [on creation of CT centre] UB 271.U6
R. Baer, See No Evil JC 701.42.B2
Peter Chalk & W. Rosenau, Confronting 'the Enemy Within': Security Intelligence, the Police,
and Counterterrorism in Four Democracies. available at http://www.rand.org/pubs/monographs/MG100/ UB 250.C4
P. Hennessy (ed.), The New Protective State UB 251.N3
T. Hennessey & C Thomas, Spooks: The Unofficial History of MI5 Ch.37
S. Hewitt, The British War on Terror JE 300 11.T3
P. Heymann, Terrorism, Freedom and Security especially Part II, 37-87 JE 300.42.T3
A. Hulnick, Keeping us Safe NIL
L. Johnson, Strategic Intelligence: Volume III. Covert Action: Behind the Veils of Secret Foreign
Policy esp chapter 9 UB 250.S6385 REF ONLY
L. Johnson, Strategic Intelligence: Volume IV. Counterintelligence and Counterterrorism:
Defending the Nation Against Hostile Forces esp chapter 6-8 UB 250.S6385 REF ONLY
J. Prados, America Confronts Terrorism TE 300.T3 A6
W. Rosenau, Confronting the Enemy Within
31
G. Treverton, Intelligence for an Age of Terror Ch.2 JC 704.2.T7
Articles - Core Reading
C. Cogan, 'Hunters not gatherers: Intelligence in the twenty-first century', INS, 19/2 (2004):.304–
321.
Antony Field, ‘Tracking terrorist networks: problems of intelligence sharing within the UK
intelligence community’, Review of International Studies, 35 (2009): 997-1009
F. Foley, ‘The expansion of intelligence agency mandates: British counter-terrorism in
comparative perspective’, Review of International Studies 35/4 (2009): 983-996.
John R Schindler, 'Defeating the Sixth Column: Intelligence and Strategy in the War on Islamist
Terrorism', Orbis 49/4 (2005) pp.695-712.
J. Sims, 'Intelligence to counter terror: The importance of all-source fusion', INS, 22/1 (2007): 3856.
John P. Sullivan, 'Terrorism Early Warning and Counterterrorism Intelligence', International
Journal of Intelligence and CounterIntelligence, 21/1 (2008): 13-25.
G. Treverton, ‘Addressing "Complexities" in Homeland Security’ in Loch Johnson (ed.) The
Oxford Handbook of National Security Intelligence
Articles - Supplementary Reading
Thomas C. Bruneau, 'Democracy and Effectiveness: Adapting Intelligence for the Fight Against
Terrorism', International Journal of Intelligence and CounterIntelligence, 21/3 (2008): 448-460.
D.A. Charters, 'Counter-Terrorism Intelligence: Sources, Methods, Processes and Problems' in
D.A. Charters (ed.), Democratic Responses to International Terrorism, pp.227-67. JE 300 T3.D3
S.A. Farson, 'Criminal Intelligence vs. Security Intelligence: Re-evaluation of the Police Role in
the Response to Terrorism' in D.A. Charters (ed.), Democratic Responses to International
Terrorism, pp.191-227. JE 300 T3.D3
L. Freedman, ‘The Politics of Warning: Terrorism and Risk Communication’, INS 20/3 (2005):
379-418.
P. Gill, 'Securing the Globe: Intelligence and the Post-9/11 Shift from 'Liddism' to 'Drainism' ,
INS 19/3 (2004): 467-489.
P. Gill, 'Security Intelligence and Human Rights: Illuminating the 'Heart of Darkness'?', INS, 24/1
(2009): 78-102.
Peter Gill, 'Intelligence, Threat, Risk and the Challenge of Oversight', Intelligence and
National Security 27/2 (2012): 206-40.
M. Herman, 'Counter-Terrorism, Information Technology and Intelligence Change', INS 18/4
(December 2003): 40-58.
B. Hoffman, ‘Intelligence and Terrorism: Emerging Threats and New Security Challenges in the
Post-Cold War Era,’ INS 11/2 (1996): 207-223.
Torin Monahan and Neal A. Palmer, 'The Emerging Politics of DHS Fusion Centers', Security
Dialogue, 40/6 (2009): 617-636.
P.R Pillar, 'Counterterrorism after Al Qaeda,' The Washington Quarterly 27/3 (2004): 101-113.
Mark Phythian, 'Policing Uncertainty: Intelligence, Security and Risk', Intelligence and
National Security 27/2 (2012): 187-205.
M. Rudner, 'Financial Intelligence, Terrorism Finance, and Terrorist Adaptation,” International
Journal of Intelligence and CounterIntelligence 19/1 (2006):32-58.
Jennifer Sims, 'Intelligence to counter terror: The importance of all-source fusion', Intelligence &
National Security, 22/1 (2007) pp.38-56.
32
G. Treverton, 'Terrorism, Intelligence and Law Enforcement: Learning the Right Lessons.' INS
18/4 (2003): 121-40.
W. Wark, 'Learning Lessons (and how) in the War on Terror: The Canadian Experience,'
International Journal 60/1 (2004-2005): 71-90.
A dozen useful short articles on terrorism in general from the Harvard International Review are
available online at >
http://hir.harvard.edu/special/
The journal International Security has also put its terrorism articles on line- you can find these by
going to the sample articles page for the journal on the MIT press website
11
Security Intelligence and Tyranny
Seminar paper questions
11.1 What functions does security intelligence perform in the authoritarian state?
11.2 Discuss the relationship between political policing and state development in
Continental Europe and Russia in the 18th and 19th Centuries
11.3 To what extent are the organisations of state security the defining characteristic of
the totalitarian [not authoritarian] state?
Books - General - Core Reading
Literature on the general relationship between political policing and repressive regimes is
limited. Specific material is plentiful.
*J. Adelman (ed.), Terror and Communist Politics: The Role of the Secret Police in Communist
States JE 300.T3.T3
*B. Chapman, Police State JC 11.C4
*C. Dandeker, Surveillance, Power and Modernity: Bureaucracy and Discipline form 1700 to the
Present Day HB 6000.D2
*M. Deflem, Policing World Society HF 3800.D3
Books - General - Supplementary Reading
R. Bengalli and C. Summer, Social Control and Political Order HD 5020.S6
B.B. Campbell & A.D. Brenner, Death Squads in Global Perspective HV6322.C2
J.E. Cronin, The Politics of State Expansion DA 566.7.C7
33
JJ Linz, Totalitarian and authoritarian regimes JB 2500.L4
M. Mazower, (ed.) The policing of politics in the twentieth century HF 3800.P6
S. Schafer, The Political Criminal HF 3200.S2
Jacob Soll , The information master: Jean-Baptiste Colbert's secret state intelligence system (
Ann Arbor : University of Michigan Press , 2009 )
S. Tormey, On Tyranny, for the nature of the totalitarian state in general. NIL
DR Villa, Politics, Philosophy, Terror: Essays on the Thought of H Arendt JB 1742.A75
Articles - Core Reading
M. Raeff, 'The Well-ordered Police State and the Development of Modernity in Seventeenth and
Eighteenth Century Europe', American Historical Review, 80, 5 (December 1975): 1221-43.
Articles - Supplementary Reading
D. Banley, ‘The Police and Political Development in Europe’ in The Formation of National
States in Western Europe, ed. by C. Tilly D 217.T4
D.H. Bayley, 'The Police and Political Development in Europe' in C.H. Tilly (ed.) The Formation
of Nation States in Europe D 217.T4
C. Davenport, ‘Multi-Dimensional Threat Perception and State Repression: An Enquiry into Why
States Apply Negative Sanctions’ American Journal of Political Science 39, 3 (August 1995): 683713
Under specific country headings - the best material has an asterisk
Argentina
C Aldini, That Inferno NIL
David Cox, Dirty Secrets, Dirty War: The Exile of Robert J. Cox (Buenos Aires, Argentina: 19761983)ISBN: 0981873502 / 0-9818735-0-2 Evening Post Publishing Company, 2008
M Feitlowitz, Lexicon of Terror F 2849.5.F3
P.H. Lewis, Guerrillas and Generals: The Dirty War in Argentina F 2849.2.L3
I Guest, Behind the disappearances : Argentina's dirty war against human rights and the United
Nations JC 545.A7
H. Verbitsky, Confessions of an Argentine Dirty Warrior ISBN: 156584985X / 1-56584-985-X
The New Press, New York, 2005
Czarist Russia & Early European Police States
R.J. Goldstein, Political Repression in Nineteenth Century Europe D 363.G6
*Hsi Huey Liang, The Rise of the Modern Police and European State System HF 3820.L4
B.B. Fischer, Okhrana HF 3831.O5
J. Daly, The Watchful State HF 3831.D2
*J. Daly, Autocracy Under Siege DK 221.D2
R. Hingley, The Russian Secret Police HF 3831.H4
S. Monas, The Third Section DK 211.M6
* M. Raeff, The Well-Ordered Police State. Social and Institutional Change through law in the
Germanies and Russia, 1600-1800. DD 175.R2
C. Ruud and S Stepanov, Fontanka 16 <e book >
P.S. Squire, The Third Department DK 211.S7
F.S. Zuckerman, The Tsarist Secret Police in Russian Society, D 363.G6
34
F.S. Zuckerman, The Tsarist Secret Police abroad <e book>
Imperial India
C. Bayly, Empire and Information: Intelligence Gathering and Social Communication in India
DS 475.1.B2
U. Singh, Political Prisoners in India JC 572.S4
Nazi Germany
G.C. Browder, Foundations of the Nazi Police State DD 253.6.B7
G.C. Browder, Hitler’s Enforcers DD 256.5.B7
M. Burleigh, The Third Reich DD 256.5.B8 esp Chapter 2, pp.146-205
R. Gellately, The Gestapo and German Society HF 3823.G3
M Mazower, Nazi Rule in Occupied Countries, D 802 A2
W. Sofsjky, The Order of Terror NIL
* E. Johnson, The Nazi Terror DD 256.5.J6 see especially pp 1-50
*T. Todorov, Moral Life in the Concentration Camps D 804.G4
Eric A. Johnson, ‘Some thoughts on social control in Totalitarin society, the case for Nazi
Germany’ in C. Emsley et al Social control in Europe, 1800-2000 HD 5020.S6
S. Wheatcroft, ‘The scale and nature of German and Soviet repression and mass killings’,
Europe-Asia Studies 48 (1996)
German Democratic Republic
*D. Childs and R. Popplewell, The Stasi, DD 261.2.C4
*Helena Flam, Mosaic of Fear, Poland and East Germany before 1989 JB 2334.1.F5
M. Fulbrook, Anatomy of a Dictatorship, DD 261.F8 .
A. Funder, Stasiland DD 261.2.F8
*J Koehler, The Stasi, HV8210.5.K6
Kristie Macrakis: Seduced by Secrets: Inside the Stasi's Spy-Tech World UB 271.G35
B Miller, Narratives of Guilt, HV8210.5.M4
EN Peterson, The Limits of Secret Police Power DD 261.2.P3
T. Wegener Friis K. Macrakis and H. Müller-Enbergs, (eds) East German Foreign Intelligence
UB 271.G35
Soviet Russia
*C.M. Andrew, KGB: the Inside Story UB 271.R9
E. T. Bacon, The Gulag at War: Stalin’s Forced Labour System in the Light of the Archives HM
5531.B2
R Conquest, Inside Stalin's Secret Police HF 3831.C6
S Courtois et al, The Black Book of Communism JB 2300.L4
*A. Dallin & G. Breslauer, Political Terror in Communist Systems JB 2300.A1
* Y. Druzhnikov, Informer 001: The Myth of Pavlik Morozov. DK 268.M66
* J. Fedor, Russia and the Cult of State Security JC 705.1.F3
J.A. Getty and R. Thompson (eds.), Stalinist Terror: New Perspectives DK 267.S8
J. Harris, The Great Urals: Regionalism & the Evolution of the Soviet System HV 1630.H2
D.L. Hoffman, (ed.) Stalinism : the essential readings, chapters 1,4,6,7 DK 267.S8
*A. Knight, The KGB, especially, chs 1, 10 & 11 HF 3831.K6
35
A Knight, Beria DK 268.B32
I Kershaw & M Lewin, Stalinism and Nazism : dictatorships in comparison DK 267.S8
B. Moore, Terror and Progress, HE 1003.1.M6
D. Priestland, Stalinism and the Politics of Mobilisation DK 268.P7
*R.C. Tucker, Stalinism: Essays in Historical Interpretation JB 2351.S8
J. Arch Getty, Gabor T. Rittersporn, V. N. Zemskov, 'Victims of the Soviet Penal System in the
Pre-War Years', American Historical Review 98, 4, (1993), pp. 1017-1049.
Sheila Fitzpatrick, 'Revisionism in Soviet History', History and Theory, Volume 46, Issue 4,
(2007): 77–91.
J. Harris, ‘The Growth of the Gulag: Forced Labor in the Urals Region, 1929-1931’, The Russian
Review, 56 (April 1997): 265-280.
J. Harris, ‘The Purging of Local Cliques in the Urals Region, 1936-7’ in Sheila Fitzpatrick ed.,
Stalinism: New Directions, pp.262-285. DK 267.S8
J. Harris, ‘Dual Subordination? The Political Police and the Party in the Urals Region, 19181953’ in Cahiers du Monde Russe 42, 2 (2001)
* J. Harris, ‘Resisting the Plan in the Urals, 1928-1956, Or Why Regional Officials Needed
'Wreckers' and 'Saboteurs' ‘ in Lynne Viola ed., Contending with Stalinism
J. Harris, Stalinism in a Russian Province. Journal of Modern History 71 (1999): 785-786
**P. Holquist, ' 'Information is the Alpha and Omega of our Work' Bolshevik Surveillance in its
Pan European Context', Journal of Modern History 69, 3 (Sept 1997): 415-50.
T. Martin, ‘The Origins of Soviet Ethnic Cleansing’, Journal of Modern History 70, 4 (1998):
813-861
David J. Norlander, ‘Origins of a Gulag Capital: Magadan and Stalinist Control in the early
1930s,’ Slavic Review, 57, 4 (1998): 791-81
D: CONTROLLING INTELLIGENCE
12 The Problems of Oversight and Accountability
Seminar paper questions
12.1 'The first rule of a secret service is that it should be secret. Democratic control is
incompatible with this.' Discuss.
12.2 Compare and contrast the systems of accountability employed by at least two
English-speaking states. [Possibilities include UK, US, Canada, Australia, New Zealand]
12.3 Consider the structure and functions of the UK Intelligence and Security
Committee. Comment on its effectiveness and suggest ways in which it might be
improved.
12.4 Is a free press the only really effective form of intelligence oversight?
36
Books - Core Reading
Andrew, Aldrich & Wark (eds), Secret Intelligence Chs. 18 & 19 UB 250.S6
Hans Born, Loch K. Johnson & Ian Leigh, (eds.) Who's Watching the Spies? Establishing
Intelligence Service Accountability UB 250.B6
Hans Born, Ian Leigh, A. Wills, International Intelligence Co-operations and Accountability, UB
270.I6 also <e book>
Hans Born and Marina Caparini (eds.) - Democratic Control of Intelligence Services. Containing
Rogue Elephants. UB 250.D3
Thomas C. Bruneau and Steven C. Boraz (eds.) Reforming Intelligence. Obstacles to Democratic
Control and Effectiveness. UB 250.R4 also <e book>
P. Brodeur et al, Democracy, Law, and Security: Internal Security Services in Contemporary
Europe HF 3820.D3
P. Gill, Policing Politics: Security Intelligence and the Liberal Democratic State UB 270.G4
P Gill and Mark Pythian, Intelligence in and Insecure World chapter 8. UB 250.I6
H. Koh, The National Security Constitution E 873.K6
M. Lowenthal, Intelligence: From Secrets to Policy, ch.10. UB 271.U6
L. Lustgarten and I. Leigh, In From the Cold: National Security and Democracy
JE 215.L8 and esp parts I, IV & V
Books - Supplementary Reading
W. Baker & J. Reisman, Regulating Covert Action KC 1311.R3
U. Bar-Joseph, Intelligence Intervention in the Politics of Democratic States: The United States,
Israel and Britain UB 271.B3
David M. Barrett: The CIA and Congress: The Untold Story from Truman to Kennedy, UB
271.U6.B38
W.C. Banks and P Raven-Hansen, National Security Law and the Power of the Purse KM 233.B2
P. Birkinshaw, Reforming the Secret State KM 207.B4
F. Cain, The Australian Security and Intelligence Organization JE 215.91.C2
EA Cohen, Commandos and Politicians: Elite Military Units in Modern Democracies U 262.C6
S. Farson, (eds.) Security and Intelligence in a Changing World, chs 2, 4-8 UB 250.C69
R. Dover and M. Goodman (eds.) Spinning Intelligence
JD 305.S74
G.P. Hastedt, Controlling Intelligence [specifically on USA and CIA] UB 271.U6
M Hollingsworth & N Fielding, Defending the Realm UB 271.G7
L Johnson, Strategic Intelligence: Volume V. Intelligence and Accountability: Safeguards Against
the Abuse of Secret Power esp chapter 6-8 UB 250.S6385 REF ONLY
L Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of Government esp.
chapter 4 UB 250.S6385 REF ONLY
L Johnson, Hans Born and Iain Leigh (eds.) Who's Watching the Spies? Establishing Intelligence
Service Accountability, UB 250.B6
D. McKnight, Australia's Spies and their Secrets. NIL
R. Norton-Taylor, Truth is a Difficult Concept
K. Olmsted, Challenging the Secret Government: The Post-Watergate Investigations UB 271.O5
A. Roberts, Blacked Out L JC 801.R6
KG Robertson, Secrecy and Open Government JC 832.R6
F.J. Smist, Congress Oversees the United States Intelligence Community JC 242.S53
A. Thomkins, The Constitution After Scott esp ch 4 KM 61.T6
B. Thompson & FF Ridley, Under the Scott Light JD 300.32.U6
D. Williams, Not in the Public Interest JC 832.W4
37
D. Vincent, The Culture of Secrecy JC 832.V4
Edward Woodward, One Brief Interval KB 15.W6
Articles - Core Reading
R.J. Aldrich, ‘Global Intelligence Co-operation versus Accountability: New Facets to an Old
Problem’, INS 24, 1 (2009): 26-56.
P. Gill ‘Re-asserting Control’, INS 1, 2 (1996)
P. Gill, The Intelligence and Security Committee and the challenge of security networks. Review
of International Studies, 35 (2009): pp 929-941
G. Hastedt, ‘The Politics of Intelligence Accountability’ in Loch Johnson (ed.) The Oxford
Handbook of National Security Intelligence
W.H. Jackson, ‘Congressional Oversight of Intelligence: Search for a Framework’, INS 5, 3 (Jul.
1990): 113-147.
L. Johnson, 'Accountability and America's Secret Foreign Policy: Keeping a Legislative Eye on
the Central Intelligence Agency', Foreign Policy Analysis, 1, 1 (2005): 99S.F. Knott, ‘The Great Republican Transformation on Oversight’, International Journal of
Intelligence and Counterintelligence 13, 1 (2000): 49-63.
A.J. O'Connell, ‘The Architecture of Smart Intelligence: Structuring and Overseeing Agencies in
the Post-9/11 World’, 94 Cal. L. Rev. 1655 (2006).
D. Omand, 'Can we have the Pleasure of the Grin without Seeing the Cat? Must the Effectiveness
of Secret Agencies Inevitably Fade on Exposure to the Light?', INS, 23/5, 593-607.
M.C. Ott, 'Partisanship and the Decline of Intelligence Oversight.' International Journal of
Intelligence and Counterintelligence, (2003) 16, 1, p. 69-94.
M. Phythian, 'The British experience with intelligence accountability', INS 22/1 (2007): 75-99.
M. Pythian, ‘ "A Very British Institution": The ISC and Intelligence Accountability in the United
Kingdom’ in Loch Johnson (ed.) The Oxford Handbook of National Security Intelligence
K.G. Robertson, 'Recent Reform of Intelligence in the UK', INS 13, 2 (1999): 144-59.
A. Zegart, ‘The domestic politics of irrational intelligence oversight’, Political Science Quarterly,
126/1 (2011)1-25.
Articles - Supplementary Reading
H. Barnett, 'Legislation-based National Security Services', INS 9, 2 (April 1994): 287-300.
L. Britt Snyder, 'Congressional Accountability and Intelligence after September 11,' in Jennifer E.
Sims, and Burton L. Gerber, (eds.) Transforming U.S. Intelligence pp.239-58. UB 250.T7
William J. Daugherty, 'Approval and Review of Covert Action Programs since Reagan.'
International Journal of Intelligence and Counterintelligence 17/1 (2004): 62-80.
A.Defty, ‘Educating Parliamentarians about intelligence, the role of the ISC, Parliamentary
Affairs, 61/4 (2008) 621-41;
S. Farson & G. Whitaker, ‘Accounting for the Future or the Past?: Developing Accountability and
Oversight Systems to Meet Future Intelligence Needs’, in Loch Johnson (ed.) The Oxford
Handbook of National Security Intelligence
P. Gill, 'Evaluating intelligence oversight committees: The UK Intelligence and Security
Committee and the 'war on terror', Intelligence & National Security 22/1 (2007):.14-37.
P. Gill, 'Symbolic or Real? The Impact of the Canadian Security Intelligence Review Committee,
1984-88?', INS 4, 3 (July 1989): 550-75.
P. Gill, 'Democratic and Parliamentary Accountability of Intelligence Services after September
11 th'. Working Paper 103, Geneva Centre for Democratic Control of Armed Forces, January.
http://www.dcaf.ch/publications/Working_Papers/103.pdf
Anthony Glees & Philip H.J. Davies. 'Intelligence, Iraq and the Limits of Legislative
Accountability during Political Crisis,' Intelligence and National Security 21/ 5 (2006): 848-883.
38
A. Hulnick, 'Openness: Being Public About Secret Intelligence.' International Journal of
Intelligence and Counterintelligence, (Winter 1999), v. 12, no. 4, p. 463-483.
J. Kibbe, ‘Congressional Oversight of Intelligence: Is the Solution Part of the Problem?’
INS 25, 1 (2010): 24-49.
S.F. Knott, ‘The Great Republican Transformation on Oversight’, International Journal of
Intelligence and Counterintelligence 13/1 (2000): 49-63.
L. Johnson, ’The CIA and the Question of Accountability’, INS 12, no. 1 (Jan. 1997): 178-200
L. Johnson, 'Covert Action and Accountability: Decision-Making for America's Secret Foreign
Policy', ch.28 in Johnson & Wirtz, Intelligence and National Security: The Secret World of Spies,
UB 250.I6
H.P. Lee, 'The Australian Security Intelligence Organisation: New Mechanisms for
Accountability', The International and Comparative Law Quarterly 38/4 (1989): 890-905
L. Lustgarten, 'Accountability of the Security Services in Western Democracies', 1992 Current
Legal Problems 145
FF Manget, ‘Another System of Oversight: Intelligence and the Rise of Judicial Intervention.’,
Studies in Intelligence 39, 5 (1996): 43-50. Also reproduced as ch.31 in Johnson and Wirtz,
Intelligence and National Security: The Secret World of Spies, UB 250.I6
K.G. Robertson, 'Accountable Intelligence: The British Experience', Conflict Quarterly, VIII, 1
(1988).
F.F. Manget, ‘Another System of Oversight: Intelligence and the Rise of Judicial Intervention,’
Studies in Intelligence 39/5 (1996): 43-50.
G. Merom, 'Virtue, Expediency and the CIA's Institutional Trap', INS 7, 2 (1992): 30-52.
M. Phythian, 'Still a Matter of Trust: Post-9/11 British Intelligence and Political Culture',
International Journal of Intelligence and CounterIntelligence 18/4 (2005):.653-81.
R. Rempel, 'Canada's Parliamentary Oversight of Security and Intelligence,' International Journal
of Intelligence and Counterintelligence 17/4 (2004): 634-54.
F.A.O. Schwarz, 'The Church Committee and a New Era of Intelligence Oversight,' Intelligence
and National Security 22/2 (2007):270-297.
Matthew B. Walker, 'Reforming Congressional Oversight of Intelligence.' International Journal
of Intelligence and Counterintelligence 19/4 (2006-7):702-720
G.R. Weller, 'Oversight of Australia's Intelligence Services', International Journal of Intelligence
and CounterIntelligence 12/4 (1999): 484-503.
R. Whitaker, 'The "Bristow Affair": A Crisis of Accountability in Canadian Security Intelligence',
INS 11/2 (1996): 279-305.
R. Whitaker, 'The Politics of Security Intelligence Policy-making in Canada: I 1970-84', INS 6/4
(1992): 649-668.
R. Whitaker, 'The Politics of Security Intelligence Policy-making in Canada: II 1984-91', INS 7/2
(1992); 53-76.
39
13
The Problem of Surveillance and Civil Liberties
Seminar paper questions
13.1 How far can civil liberties be reconciled with the security demands made of the
modern surveillance state after 11 September 2001?
13.2 Do technological societies and knowledge-based economies help us to curb
excessive surveillance by the state – as David Brin sugggests ?
13.3 To what extent are security, democracy, affluence and privacy compatible in
developed democratic states in the twenty-first century ?
13.4 ‘If citizens demand transparency of the state, then the state is entitled to demand
transparency of its citizens.’ Discuss.
Books - Core Reading
Andrew, Aldrich & Wark (eds), Secret Intelligence Chs. 20 & 21 UB 250.S6
David Brin, The Transparent Society, Longman 1989
W. Diffie & S. Landau, Privacy on the Line, QA 73.4.D4
A. Etzioni, The Limits of Privacy JC 542.E8
K. Ewing, The bonfire of the liberties: New Labour, human rights, and the rule of law KM
201.E9
S. Harris, The watchers: the rise of America’s surveillance state JE 300.T3 H27
Sean Hier and Joshua Greenberg., The surveillance studies reader TK 7882.E2.S87
R Jeffreys-Jones, The CIA and American Democracy UB 271.U6
David Michael Levin, The Philosopher’s Gaze B 825.5.L3
D. Lyon, The Electronic Eye: The Rise of the Surveillance Society QA 73.4.L9
D. Lyon, Surveillance After September 11 HD 5062.L9 ]
Armand Mattelart, The Globalization of Surveillance HD 5011.M2
J Rosen, The Unwanted Gaze: The destruction of privacy in America KM 209.P7
M Sidel, More Secure Less Free? JD 300.42.S4
B Stockton, Flawed Patriot UB 271.U6
F. Webster, Theories of the Information Society HE 1500.W3 [in Webster see especially chapter
4 on Anthony Giddens and surveillance]
R. Whitaker, The end of privac : how total surveillance is becoming a reality HD 2000.W4 &
Books - Supplementary Reading
C. Ackroyd et al, The Technology of Political Control U 240.T3
R. Bengalli and C. Summer, Social Control and Political Order.HD 5020.S6
R. Billingsley, T. Nemitz and P. Bean. Informers: policing, policy, practice HF 3811.I6
Roger Billingsley, Covert Human Intelligence Sources: The 'Unlovely' Face of Police Work HF
3811.C69
W. Bogard, The Simulation of Surveillance: Hypercontrol in Telematic Societies. QA 73.4.B69
R.H. Blum, Surveillance and Espionage in a Free Society NIL
M. Castells, The Rise of the Network Society HP 994.3.C2 FH Cate, Privacy in the Information Age NIL
Simon Chesterman, One Nation under Surveillance HD 5011.C4
40
D. Cohen & J. Wells, (eds.) American National Security and Civil Liberties in an Era of
Terrorism 1-4039-6200-6
D. Cole and JX Dempsey, Terrorism and the Constitution Free Press 2002 1565847822 NIL
Dyzenhaus, D, Civil Rights and Security, Ashgate Abingdon 2009
A. Etzioni, & JH Marsh, eds. Rights vs. Public Safety After 9/11: America in the Age of Terrorism
JD 300.42.R4
S. Field and C. Pelser (eds.) Invading the private: state accountability and new investigative
methods in Europe NIL
Simon Garfinkel, Database Nation JC 542.G2
J. Gilliom, Overseers of the poor: surveillance, resistance, and the limits of privacy NIL
K.D. Haggerty & RV Ericson, The New Politics of Surveillance and Visibility TK 7882.E2.N485
P. Hanks and J McManus (eds.), National Security: Surveillance and Accountability in a
Democratic Society NIL
S. Hewitt, Snitch! a history of the modern intelligence informer UB 250.H3
PB Heymann, Terrorism, Freedom and Security JE 300..42.T3
Philip B. Heymann and Juliette N. Kayyem, Protecting Liberty in an Age of Terror JD 300.42.H3
R. Hunter, World without secrets: business, crime, and privacy in the age of ubiquitous
computing NIL
J Kampfner, Freedom for sale : why the world is trading democracy for security 2010
G Kinsman, et al (eds) Whose national security? Canadian state surveillance and the creation of
enemies NIL
R Leone & G Anrig, The War on Our Freedoms, NIL
T. Y. Levin, U. Frohne and P. Weibel. (ed) Rhetorics of surveillance from Bentham to Big
Brother NIL
S. Levy, Crypto: Secrecy and Privacy in the New Code War QA 77.3.L3
T. Monahan. Surveillance in the time of insecurity Rutgers UP 2009
C. Norris and G. Armstrong, The Maximum surveillance society : the rise of CCTV
HD 5011.N6
Joseph Pugliese, Biometrics: Bodies, Technologies, Biopolitics (Routledge 2010)
S. Sharpe, Search and surveillance : the movement from evidence to information NIL
D. Stafford, The Delicate Balance: Security, Liberty and the Canadian Intelligence Community
JC 543.S8
W.G. Staples, Everyday surveillance : vigilance and visibility in postmodern life NIL
William G. Staples, The Culture of Surveillance: Discipline and social control in the United
States. NIL
D. Thomas & B.D. Loader, (eds.) Cybercrime : law enforcement, security and surveillance in the
information age HF 3200.C9 L
C. Walker, The Prevention of Terrorism in British Law KM 562.2.W2
Articles - Core Reading
K.G. Robertson, 'Intelligence, Terrorism and Civil Liberties', Conflict Quarterly, 7, 2 (Spring
1987) available in P Wilkinson & AM Stewart (eds) Contemporary Research on Terrorism
M. De Rosa, 'Privacy in the Age of Terror', The Washington Quarterly 26:3 (2003): 27–41.
Online at - http://www.twq.com/03summer/docs/03summer_derosa.pdf
J. Sheptycki, 'High Policing in the Security Control Society', Policing 1/1 (2007): 70-79.
HE Ventura, J Miller, J. Mitchell, M Deflem, ‘Governmentality and the War on Terror: FBI
Project Carnivore and the Diffusion of Disciplinary Power’, Critical Criminology 13/1 (2005) 5571.
41
Articles - Supplementary Reading
Akdeniz, Y., Taylor, N., and Walker, C., "Regulation of Investigatory Powers Act 2000:
Bigbrother.gov.uk" [2001] Criminal Law Review 73-90
L. Amoore, 'Biometric borders: Governing mobilities in the war on terror', Political Geography
25/ 3 (2006) pp.336-351.
C. Bell, ‘Surveillance Strategies and Populations at Risk’, Security Dialogue 37/2 (2006) pp.14765.
Robin Evans, ‘Bentham’s Panopticon: An incident in the social history of architecture,’
Architectural Association Quarterly 3/2 (1971) pp.21-37.
C. Gearty, ‘Terrorism and Human Rights’, Government and Opposition 42/3 (2007) pp.340-62.
P. Gill, 'Defining Subversion: The Canadian Experience since 1977,' Public Law 617 (1989)
pp.617-636.
Peter Gill, 'Not Just Joining the Dots But Crossing the Borders and Bridging the Voids:
Constructing Security Networks after 11 September 2001' Policing and Society 16/1 (2006)
pp.27-49.
Michael Levi & David Wall, 'Technologies, Security, and Privacy in the Post-9/11 European
Information Society', Journal of Law and Society 31/ 2 (2004) pp.194-220.
M. Lianos and M. Douglas, ‘Dangerization and the End of Deviance: The Institutional
Environment’ in R. Sparks and D. Garland (Eds) Criminology and Social Theory. Oxford
University Press. 2000. HV6025.C7
Kate Martin, 'Domestic Intelligence and Civil Liberties', SAIS Review 24/1, (2004), pp.7-21.
Gary Marx, 'Some Concepts that May be Useful in Understanding the Myriad Forms and
Contexts of Surveillance', in L.V. Scott and P.D. Jackson (eds.) Understanding Intelligence in the
21st Century, pp.78-98. UB 250.U53
Thomas Mathieson, ‘The Viewer Society: Foucault’s Panopticon revisited’ in Theoretical
Criminology 1: 125-134. 1997.
G. Marx, 'Some Concepts that May be Useful in Understanding the Myriad Forsm and Context of
Surveillance' Ch 5. In LV Scott and PD Jackson (eds.) Understanding Intelligence in the 21st
Century [this book is also Intelligence and National Security, 20, 1 (2004)] UB 250.U53
Mark Poster, ‘Databases as discourse, or Electronic Interpellations,’ in D. Lyon and E. Zureik
[Eds.] Computers, Surveillance and Privacy. (Minneapolis: University of Minnesota Press, 1996)
pp.175-192. QA 73.4.C6
Ken Roach, 'The World Wide Expansion of Terrorism Laws after September 11,' Studi Senesi
116 (2004) pp.487-524.
K.G. Robertson, 'Intelligence, Terrorism and Civil Liberties', Conflict Quarterly, 7/2 (1987)
pp.43-62 also in P. Wilkinson & AM Stewart (eds.) Contemporary Research on Terrorism JE
300.T3
Shlomo Shpiro, 'No Place to Hide: Intelligence and Civil Liberties in Israel', Cambridge Review
of International Affairs 19/4 (2006) pp.629-48
Thomas Mathieson, ‘The Viewer Society: Foucault’s Panopticon revisited’ in Theoretical
Criminology 1 (1997) pp.125-134.
Lee S. Strickland, 'Civil Liberties vs. Intelligence Collection: The Secret Foreign Intelligence
Surveillance Act Court Speaks in Public.' Government Information Quarterly 20/1 (2003) pp.112.
42
14 The Ethics of Espionage
Seminar paper questions
14.1 Can espionage form part of an ethical foreign policy?
14.2 'Espionage can be ethical but it can never be moral'. Discuss.
14.3 How useful is the concept of 'Just War' as an ethical benchmark for both foreign
intelligence collection and covert action?
Books - Core Reading
Andrew, Aldrich & Wark (eds), Secret Intelligence Chs. 22 & 23 UB 250.S6
Jan Goldman, (ed.), Ethics of Spying: A Reader for the Intelligence Professional JC 842.E8
David L. Perry, Partly Cloudy: Ethics in War, Espionage, Covert Action,
and Interrogation Lanham, MD: The Scarecrow Press, Inc. 2009.
Books - Supplementary Reading
M. Herman, Intelligence in the Information Age UB 250.H47
J Kish, International Law and Espionage KC 1306.K4
James Olson, Fair Play: The Moral Dilemmas of Spying JC 842.O4
Articles - Core Reading
M. Andregg, ‘Ethics and Professional Intelligence’, in Loch Johnson (ed.) The Oxford Handbook
of National Security Intelligence
R.W. Bellaby, ‘What’s the Harm? The Ethics of Intelligence Collection in the 21st Century’
Intelligence and National Security 27/1 (2012): 93-117.
*T Erskine, 'As Rays of Light to the Human Soul', Ch.13. In LV Scott and PD Jackson (eds.)
Understanding Intelligence in the 21st Century [also Intelligence and National Security, 20, 1
(2004)] UB 250.U53
M.Herman, 'Ethics and Intelligence after September 2001', Ch.12 in In LV Scott and PD Jackson
(eds.) Understanding Intelligence in the 21st Century [this is also Intelligence and National
Security, 20, 1 (2004)] UB 250.U53
F. Hitz, 'Unleashing the Rogue Elephant: September 11 and Letting the CIA Be the CIA' ch.29 in
Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies, UB 250.I6
Sir David Omand, 'Ethical Guidelines in Using Secret Intelligence for Public Security',
Cambridge Review of International Affairs 19/4 (2006) pp.613-28.
D. L. Perry, 'Repugnant Philosophy: Ethics, Espionage, and Covert Action,' Journal of Conflict
Studies, 15, 1 (1995): 92–115.
Sir Michael Quinlan, 'Just Intelligence: Prolegomena to an Ethical Theory.' Intelligence and
National Security 22/1 (2007) pp.1-13, also in Peter Hennessy (ed.), The New Protective State
pp.97-122. UB 251.N3
43
Articles - Supplementary Reading
Ross Bellaby, 'What's the Harm? The Ethics of Intelligence Collection', Intelligence and
National Security 27/1 (2012): 93-117.
H Cohen & R Dudai, 'Human Rights Dilemmas in Using Informers to Combat Terrorism: The
Israeli-Palestinian Case'. Terrorism and Political Violence 17 (2005): 229-243
William E. Colby, 'Public Policy, Secret Action' Ethics and International Affairs 3 (1989):61-71.
GE Drexel. 'Ethics & Intelligence', Foreign Affairs 56/3 (1978): 624-642.
Paul G. Ericson, 'The Need for Ethical Norms,' Studies in Intelligence 36/5 (1992) pp.15-18.
M. Herman, 'Modern Intelligence Services: Have They a Place in Ethical Foreign Policies.' In
Agents for Change: Intelligence Services in the 21st Century, ed. Harold Shukman, 287-311.
Michael Herman, 'Intelligence Services and Ethics in the New Millenium,' Irish Studies in
International Affairs 10 (1999) pp.260-261.
Michael Herman, 'Modern Intelligence Services: Have They a Place in Ethical Foreign Policies'
in, Harold Shukman (ed.) Agents for Change: Intelligence Services in the 21st Century (London:
St. Ermin's 2000) pp.287-311.
Arthur S Hulnick & David W. Mattausch. 'Ethics and Morality in United States Secret
Intelligence,' Harvard Journal of Law & Public Policy 12/2 (1989) pp.509-522.
A. Hurrell, ‘‘There Are No Rules’ (George W. Bush): International Order After September 11th,’
International Relations 16/2 (2002).
Angela Gendron, 'Just War, Just Intelligence: An Ethical Framework for Foreign Espionage',
International Journal of Intelligence and Counterintelligence 18/3 (Fall 2005): 398-434
E.D. Godfrey, 'Ethics and Intelligence, ch.30 in Johnson and Wirtz, Intelligence and National
Security: The Secret World of Spies UB 250.I6
William R Johnson, 'Ethics and Clandestine Collection,' Studies in Intelligence 27/1 (1983):.1-8.
John, S.J. Langan, 'Moral Damage and the Justification of Intelligence Collection from Human
Sources,' Studies in Intelligence 25/2 (1981): 57-64.
Sir David Omand, 'Ethical Guidelines in Using Secret Intelligence for Public Security',
Cambridge Review of International Affairs 19/4 (2006): 613-28.
Kent Pekel, 'Integrity, Ethics, and the CIA: The Need for Improvement,' Studies in Intelligence
(1998): 85-94.
Allison Shelton, "Framing the Oxymoron: A New Paradigm for Intelligence Ethics," Intelligence
and National Security, 26/1 (2011).
Tony Pfaff & Jeffrey Tiel, 'The ethics of espionage', Journal of Military Ethics 3/1, (2004):1-15.
G. Treverton, 'Imposing a Standard: Covert Action and American Democracy,' Ethics &
International Affairs 3 (1989):27-43.
G Treverton, "Covert Action and Open Society." Foreign Affairs 65/5 (Summer 1987): 995-1014
Richard R. Valcourt, 'Controlling U.S. Hired Hands.' International Journal of Intelligence and
Counterintelligence 2/2 (1988): 163-178.
44
15 Torture and Assassination
Seminar paper questions
15.1 Can an ethical case ever be made for assassination?
15.2 Can an ethical case ever be made for the use of torture during interrogation?
15a TORTURE – journal articles are the key thing here
Books - Core Reading
Andrew, Aldrich & Wark (eds), Secret Intelligence Ch.24 UB 250.S6
M Bagaric, J Clarke, Torture: When the Unthinkable, [pro] State Uni Press of New York 2007.
R. Crelinsten & A. Schmid, The Politics of Pain Boulder: Westview Press, 1994.
S Levinson (ed.) Torture, esp pp. 257-90. HF 4100.T6
Tara McKelvey, Monstering: Inside America's Policy of Secret Interrogations and Torture in the
Terror War, Basic Books 2012
D Rejali, Torture and Democracy HF 4010.R3
J.E.S. Philips, None of us were like this before: American soldiers and torture HF 3300.P4
I.Resnick, Idrian and Cohn, Marjorie, The United States and Torture: Interrogation, Incarceration,
and Abuse: NEW YORK UNIV PR, 2012
P. Sands, Torture Team: Uncovering War Crimes in the Land of the Free JE 300.T3.S2
Michael Skerker, An Ethics of Interrogation, (The University of Chicago Press, 2012).
Books - Supplementary Reading
M. Danner, Torture and Truth HF 3342.D3
J. Gray, M. Benvenisti & B. Ehrenreich, Abu Ghraib: The Politics of Torture NIL
K. Greenberg, Torture Debate in America <e book>
K. Greenberg & J. Dratel, The Torture Papers HF 3342.T6 also e-resource
S. Grey, Ghost Plane UB 271.U6
J. Jaffer, A Singh Administration of Torture <e book>
M. Lazreg, Torture and the Twilight of Empire: From Algiers to Baghdad HF 3300.L2
C. Mackey & G. Miller, The Interrogators: Inside the Secret War Against al Qaeda NIL
A.W. McCoy, A Question of Torture: CIA Interrogation, from the Cold War to the War on Terror
UB 271.U6
A. McCoy, Torture and Impunity: The US. Doctrine of Coercive Interrogation, Univ of
Wisconsin Pr, 2012
R. Meeropol, America’s Disappeared: Secret Imprisonment, Detainees & the War on Terror JC
542.A63
T. Paglen & A.C. Thompson, Torture Taxi NIL
Gareth Peirce, Dispatches from the Dark Side: On Torture and the Death of Justice HF 4010.P3
E. Saar, Inside the Wire : A Military Intelligence Soldier's Eyewitness Account of Life at
Guantanamo JE 300.T3.S2
P. Sands, Lawless World esp chs 7 & 9 JE 210.S2
45
S. Strasser, The Abu Ghraib Investigations: The Official Reports of the Independent Panel and
Pentagon on the Shocking Prisoner Abuse in Iraq L NIL on order since 25 Aug 2011?
T. Williamson, Investigative Interviewing HF 3800.I6
Articles - Core Reading
Mark Bowden, 'The Dark Art of Interrogation,' Atlantic Monthly, 292/3 (2003): 51–76. [pro]
Mirko Bagaric and Julie Clarke, 'Not Enough Official Torture in the World? The Circumstances
in Which Torture Is Morally Justifiable,' University of San Francisco of Law Review 39 (2005)
pp.581-616. [see reply by Rumney below]
Gary Kern, 'Torture and Intelligence in the Global War on Terror', INS, 24/3 (2009): 429-57
P.D. Kenny, ‘The Meaning of Torture’, Polity 42/2 (2010): 131-155
Maureen Ramsay, 'Can the torture of terrorist suspects be justified?', The International Journal of
Human Rights 10/ 2 (2006): 103-19.
A. Roberts, ‘Review Essay: Torture and Incompetence in the “War on Terror”’, Survival, 49/1
(2007): 199-212.
Philip N.S. Rumney, 'Is Coercive Interrogation of Terrorist Suspects Effective? A Response to
Bagaric and Clarke,' University of San Francisco of Law Review 40 (2006) pp.479-513 [see
Bagaric and Clarke above]
H Schue, 'Torture', Philosophy and Public Affairs 7/2 (1978): 124-43
Jerome Slater, 'Tragic Choices in the War on Terrorism: Should We Try to Regulate and Control
Torture?', Political Science Quarterly 121/2 (2006) pp.191-215. [pro]
David Sussman, ‘What's Wrong with Torture?’ Philosophy and Public Affairs, 33/1 (2005):1–33
[pro]
Marcy Strauss, 'Torture'. New York Law School Law Review, 48/1 & 2 (2004) pp.201-274 [see
reply by Dershowitz above]
Articles - Supplementary Reading
R.J. Aldrich, ‘ "A skeleton in our cupboard" : British interrogation procedures in Northern
Ireland’, in R. Dover and M. Goodman (eds.) Learning from the secret past: cases from British
intelligence history UB 271.G7
F. Allhof, 'Terrorism and Torture', Int. Jnl of Applied Philosophy 17/1 (2003) pp.105-18.
T.E. Ayres, ' "Six Floors" of Detainee Operations in the Post-9/11 World', Parameters, 35/3
(2005): 3-53.
Alex Bellamy, 'No pain, no gain? Torture and ethics in the war on terror', International Affairs
82/1 (2006): 121-48.
Ruth Blakeley, 'Language, policy and the construction of a torture culture in the war on
terrorism', Review of International Studies 33/1 (2007): 373-94.
A.W. Clarke, ‘Rendition to Torture: A Critical Legal History’, Rutgers Law Review 62, 1 (2009):
1-74.
C.R. Conrad & W.H. Moore, ‘What Stops the Torture?’, American Journal of Political Science
54/2 (2010): 459-476.
R. Crelinsten, 'The World of Torture: A Constructed Reality,' Theoretical Criminology 7/3
(2003): 293-318.
Alex Danchev, ‘Accomplicity: Britain, Torture and Terror’, The British Journal of Politics and
International Relations 8/4 (2006)
Alan M. Dershowitz, “Reply: Torture Without Visibility And Accountability Is Worse Than With
It,” University of Pennsylvania Journal of Constitutional Law 6 (2003):326. [reply to Kriemer,
see below]
Alan M. Dershowitz, 'The Torture Warrant: a Response to Professor Strauss", New York Law
School Law Review 48 (2003) pp.275-294 [reply to Strauss, see below]
46
HA Giroux, 'Education after Abu Graib: Revisiting Adorno's Politics of education' Cultural
Studies 18/6 (2004): 779-815.
G. Hooks & C. Mosher, 'Outrages against personal dignity: Rationalizing abuse and torture in the
war on terror' Social Forces, 83/4 (2005): 1627-46.
Richard Jackson, 'Language, policy and the construction of a torture culture in the war on
terrorism', Review of International Studies 33/1 (2007) pp.353-371.
Seth Kreimer, 'Too Close to the Rack and the Screw: Constitutional Constraints on Torture in the
War on Terror,' University of Pennsylvania Journal of Constitutional Law 6 (2003) 278 [see
reply by Dershowitz above]
A. Lankford, ‘Assessing the Obama Standard for Interrogations: An Analysis of Army Field
Manual 2-22.3’, Studies in Conflict and Terrorism, 33/1 (2010): 20-35.
A.C. McCarthy 'Ticking Time bombs: Continuing the Torture Debate' National Review online
2005
D. Leebaert, 'The CIA in Unknown Terrain: ‘The Education of an Interrogator’,
Intelligence and National Security 27/4 (2012): 582-591.
Alfred W. McCoy, 'Cruel Science: CIA Torture and U.S. Foreign Policy', New England Journal
of Public Policy, 19/2 (2005) pp.1-54.
Assaf Meydani, 'The Interrogation Policy of the Israeli General Security Service: Between Law
and Politics', International Journal of Intelligence and CounterIntelligence 21/1 (2008): 26-39.
Assaf Meydani, 'Security and Human Rights Policy: Israel and the Interrogation Case of 1999',
Contemporary Security Policy 28/3 (2007) pp.579-96.
R. Morgan' The Utilitarian Justification of Torture', Punishment and Society 2, 2 (2000) 181-96
G.L. Neuman, 'Comment Counter-terrorist operations and the rule of law' European Journal of
International Law 15, 5 (2004) 1019-29
A.W. McCoy, 'Cruel Science: CIA Torture and U.S. Foreign Policy', New England Journal of
Public Policy, 19/2 (2005): 1-54.
John T. Parry, 'What Is Torture, Are We Doing It, and What If We Are?' University of Pittsburgh
Law Review 64 (2003) pp.237-262.
Peace and Conflict: Journal of Peace Psychology, 13/4 (2007) is a special issue of eight essays
focusing on torture.
15b ASSASSINATION – again almost all the material is articles
Books
Fabian Escalante, The Cuba Project 2004 NIL
Roland W. Haas: Enter the Past Tense: My Secret Life as a CIA Assassin Potomac Books,
Dulles, VA, 2007, 264 p., $24.95.
L. Johnson, Bombs, Bugs, Drugs and Thugs, UB 271.U6.J75 <e book>
B. Stockton, Flawed Patriot UB 271.U6
Articles - Core Reading
Daniel S Byman 'Time to Kill? Assassinations and Foreign Policy,' 85/2 Foreign Affairs (2006)
pp.95-111.
ML Gross, 'Fighting by other means in the Mideast: a Critical Analysis of Israel's Assassination
Policy', Political Studies 51/2 (2003) pp.350-68 [see the reply by Statman below].
47
J.T. Richelson, "When Kindness Fails: Assassination as a National Security Option."
International Journal of Intelligence and Counterintelligence 15, 2 (Summer 2002): 243-274.
Daniel Statman (2003) 'The Morality of Assassination: A Response to Gross' Political Studies
51/4 (2003):, 775–779. [see Gross above]
T. Ward, 'Norms and Security: The Case of International Assassination', International Security
25/1 (2000): 105-33.
Articles - Supplementary Reading
Louis Ren Beres, 'On Assassination, Preemption, and Counterterrorism: The View from
International Law', International Journal of Intelligence and CounterIntelligence, 21/4
(2008): 694-725.
B. Berkowtiz, 'Is Assassination an Option?', Hoover Digest 2002, 1 at http://www.hoover.org/publications/digest/4477731.html
R.J. Bruemmer, "The Prohibition on Assassination: A Legal & Ethical Analysis." In In the Name
of Intelligence: (eds.) Hayden B. Peake and Samuel Halpern, 137-165.
J. Claburn, "Public Constraints on Assassination as an Instrument of U.S. Foreign Policy."
International Journal of Intelligence and Counterintelligence 7/1 (1994): 97-109.
Steven R. David & Yael Stein, 'Israel's Policy of Targeted Killings,' Ethics and International
Affairs 17/2 (2003) pp.111-126.
K. Eichensehr, 'On the Offensive: Assassination Policy Under International Law', Harvard
International Review 25/3 (Fall 2003)
Z. Iqvbal & C. Zorn, ‘Sic Semper Tyrannis? Power, Repression and Assassination since the
Second World War 2’, The Journal of Politics, 68/3 (2006): 489-501.
B.M. Johnson, "Executive Order 12,333: The Permissibility of an American Assassination of a
Foreign Leader" Cornell International Law Journal 25/2 (Spring 1992): 401-436.
Asa Kasher & Amos Yadlin, 'Assassination and Preventive Killing', SAIS Review, 25/1 (2005)
pp.41-57.
D. Krezmer, ‘Targeted Killing of Suspected Terrorists: Extra-judicial Executions or Legitimate
Means of Defence?’, European Journal of International Law 16/2 (2005) pp.171-212.
C. Lotrione, 'When to target Leaders', Washington Quarterly 26, 3 (2003): 73-86
Eric Patterson & Teresa Casale, 'Targeting Terror: The Ethical and Practical Implications of
Targeted Killing,' International Journal of Intelligence and Counterintelligence 18/4 (2005-2006)
pp.638-652.
D. Pickard, ‘Legitimizing assassination Terrorism the CIA and international law’, Georgia
Journal of International and Comparative Law 30/1 (2001): 3-34
Bruce A. Ross, 'The Case for Targeting Leadership in War,' Naval War College Review 46/1
(1993) pp.73-93.
M.N. Schmitt, "State-Sponsored Assassination in International and Domestic Law" Yale Journal
of International Law 17 (1992): 609-685.
H.A. Wachtel, ‘Targeting Osama bin laden: examining the legality of assassination as a tool of
US foreign policy’, Duke Law Journal, 55/3 (2005): 677-710.
T. Ward, 'The New Age of Assassination', SAIS Review 25/1 (2005) pp.27-39.
Patricia Zengel, 'Assassination and the Law of Armed Conflict,' Military Law Review 131 (1991)
pp.23-55.
M. Wiebe, ‘Assassination in Domestic and International Law; The CIA, State sponsored
Terrorism and the right to self defence’, Tulsa Journal of Comparative and International Law,
11/3 (2003): 365-404.
48
16 Reading Week - no lectures or seminars
E: INTELLIGENCE AND THE NEW WARFARE
17. Covert Action as Culture
Seminar paper questions
17.1 How far do you accept the view of Francis Stoner Saunders that those who pay the
piper call the tune?
17.2 How far would you agree with Coleman's description of CIA cultural activities as a
'liberal conspiracy'?
17.3 What did the CIA hope to achieve through its cultural programmes, and who were
its targets?
17.4 To what extent does covert action create problems for democratic peace theory?
[see last section of this part of the reading list below for this subject]
This week is a case Study of Tom Braden’s CIA International Organisations Division
Books - Core Reading
The book that started the argument is -
F.S. Saunders, Who Paid the Piper? The CIA and the Cultural Cold War. E 812.5.S2
D. Caute, The Dancer Defects D 843.C2
R. Jeffreys-Jones, The CIA and American Democracy UB 271.U6
H. Krabbendam and Giles Scott-Smith (eds.), The Cultural Cold War in Western Europe, 19451960 (London: Frank Cass, 2003) [good on Saunders] JE 224.C79
H. Laville, Cold War Women, JD 195.42.L2
H. Laville & H Wilford, The US Government, Citizen Groups and the Cold War JB 2142.U8
W.S. Lucas, Freedom’s War: The US Crusade Against the Soviet Union E 183.8.R9
H. Laville & H Wilford, The US Government, Citizen Groups and the Cold War JB 2142.U8
W.S. Lucas, Freedom’s War: The US Crusade Against the Soviet Union E 183.8.R9
G. Scott-Smith, The Politics of Apolitical Culture: The Congress of Cultural Freedom, the CIA
and Post-War American Hegemony. JE 224.S2
H. Wilford, The Mighty Wurlitzer: How the CIA Played America [critiques Saunders] UB 271.U6
Books - Supplementary Reading
R.J. Aldrich, The Hidden Hand, chapters 5 & 16 E 183.8.G7
49
V.R. Berghahn, America and the Intellectual Cold Wars in Europe: Shepherd Stone Between
Philanthropy, Academy, and Diplomacy E 183.7.B3
P. Coleman, The Liberal Conspiracy: The Congress for Cultural Freedom and the Struggle for
the Mind of Postwar Europe. D 839.2.C6
R. Helms, A Look Over My Shoulder, UB 271.U6
W. Hixson, Parting the Curtain: Propaganda, Culture, and the Cold War E 812.5.H4
L. Johnson, Strategic Intelligence: Volume III. Covert Action: Behind the Veils of Secret Foreign
Policy esp chapter 6 UB 250.S6385 REF ONLY
J. Kotek, Students and the Cold War. JD 301.K6
C. Meyer, Facing Reality: From World Federalism to the CIA UB 271.U6
S. Mickelson, America's Other Voice: The Story of Radio Free Europe and Radio Liberty. HD
8561.M42
M. Nelson, War of the Black Heavens: The Battles of Western Broadcasting in the Cold War HD
6300.N3
G.D. Rawnsley, (ed). Cold-War Propaganda in the 1950s D 843.R2
G. Treverton, Covert Action: The Limits of Intervention in the Postwar World UB 271.U6
H. Wilford, The CIA, the British Left and the Cold War: Calling the Tune? JE 242.W4
Articles - Core Reading
Really Important - WS Lucas, 'Revealing the Parameters of Opinion: An Interview with
Frances Stonor Saunders,' Intelligence and National Security 18, 2 (2003): 15-40, for an
interview with Saunders from January 2002.
WS Lucas, 'Beyond Freedom, Beyond Control: Approaches to Culture and the State-Private
Network in the Cold War.' Intelligence and National Security 18, 2 (Summer 2003): 53-72.
M Warner, 'Origins of the Congress for Cultural Freedom, 1949-50.' Studies in Intelligence 38/5
(1995): 89-98.
Articles - Supplementary Reading
R.J. Aldrich, 'OSS, CIA and European Unity: The American Committee on United Europe, 19491960', Diplomacy and Statecraft, 8/1 (March 1997): 184-227.
J Kotek, 'Youth Organizations as a Battlefield in the Cold War.' Intelligence and National
Security 18/2 (Summer 2003): 168-191.
H. Laville, 'The Committee of Correspondence: CIA Funding of Women's Groups, 1952-1967.'
Intelligence and National Security 12/1 (Jan. 1997): 104-121.
WS Lucas, 'Campaigns of Truth: The Psychological Strategy Board and American Ideology,
1951-1953.' International History Review 18/2 (1996): 253-394.
W.S. Lucas, 'Master and Servant? The US Government and the Founding of the British
Association for American Studies,' European Journal of American Culture (2002)
WS Lucas, 'Mobilising Culture: The CIA and State-Private Networks in the Early Cold War' in D.
Carter and R. Clifton (eds.), Global Horizons (London: Macmillan, 2002)
W.S. Lucas, 'Beyond Diplomatic History: Propaganda, Ideology, and US Foreign Policy,' in G.
Rawnsley (ed.), Cold War Propaganda in the 1950s
W.S. Lucas, 'Negotiating Freedom', Libertas, online at http://www.libertas.bham.ac.uk/publications/articles/Negotiating%20Freedom.pdf
J.P.C. Matthews, 'The West's Secret Marshall Plan for the Mind.' International Journal of
Intelligence and Counterintelligence 16/3 (Fall 2003): 409-427.
K. Paget, 'From Stockholm to Leiden: The CIA's Role in the Formation of the International
Student Conference.' INS 18/2 (2003): 134-167.
50
SJ Parry-Giles, 'The Eisenhower Administration's Conceptualization of the USIA: The
Development of Overt and Covert Propaganda Strategies.' Presidential Studies Quarterly 24
(Spring 1994): 263-276.
E.Pullin, 'Money Does Not Make Any Difference to the Opinions That We Hold' : India,
the CIA, and the Congress for Cultural Freedom, 1951-58’, Intelligence and National
Security 26/2-3 (2011): 377-398
Tony Shaw, ‘The Politics of Cold War Culture’, Journal of Cold War Studies, 3/3 (2001): 59-76.
Edward Said, 'Hey Mister, You Want to Buy a Dirty Book?', [review of Saunders] London
Review of Books, 30 Sept 1999, 21/19
G Scott-Smith, ''The Masterpieces of the Twentieth Century' Festival and the Congress for
Cultural Freedom: Origins and Consolidation, 1947-52.' INS 15/1 (2000): 121-168.
G Scott-Smith, ' "A Radical Democratic Political Offensive": Melvin J. Lasky, Der Monat, and
the Congress of Cultural Freedom.' Journal of Contemporary History 35/2 (Apr. 2000): 263-280.
M Warner, 'Sophisticated Spies: CIA's Links to Liberal Anti-Communists, 1949-1967.'
International Journal of Intelligence and Counterintelligence 9/4 (1996/97): 425-433.
Or if you don't like Cold War history – then try the debate over Covert
Action and Democratic Peace Theory William Avilés, 'The Democratic-Peace Thesis and U.S. Relations with Colombia and
Venezuela', Latin American Perspectives, 32/3 (2005): 33-59.
W.J. Daugherty, ‘Covert Action: Strengths and Weaknesses’, in Loch Johnson (ed.) The Oxford
Handbook of National Security Intelligence
A.B. Downes and M.L. Lilley, ‘Overt Peace, Covert War?: Covert Intervention and the
Democratic Peace’, Security Studies, 19/2 (2010): 266–306.
Tarak Barkawi and Mark Laffey, "The Imperial Peace: Democracy, Force, and Globalization,"
European Journal of International Relations 5/4 (1999).
T. Barkawi, ‘War inside the Free World: The Democratic Peace and the Cold War in the
Third World” in Tarak Barkawi and Mark Laffey (eds.) Democracy, Liberalism, and
War: The Democratic Peace Debate (Lynne Rienner, 2001), pp.107-128 – see web-site.
Christopher I. Clement, Enmity over Amity: US Belligerence toward Latin American
Elected Governments, Presented at the International Studies Association 2008 Annual
Conference – see web-site.
David P. Forsythe, 'Democracy, War, and Covert Action', Journal of Peace Research, 29/4
(1992): 385-395.
P. James and G.E. Mitchell II, ‘Targets of Covert Pressure: The Hidden Victims of The
Democratic Peace’, International Interactions, 21/1 (1995) 85-107.
J. Kim, 'Democratic Peace and Covert War: A Case Study of the U.S. Covert War in Chile;,
Journal of International and Area Studies, 12/1, (2005): 25-47 - see web-site.
Mary Lauren Lilley and Alexander B. Downes, 'Covert Action, Democratic Peace, And The Cold
War', Paper prepared for the annual meeting of the International Studies Association, San
Francisco, CA, March 26-29, 2008. [On module web site]
Sebastian Rosato, 'The Flawed Logic of Democratic Peace Theory', American Political Science
Review, 97/4 (November 2003).
51
18 Intelligence and Deception D-Day case study
Seminar paper questions
18.1 Why was the D-Day Deception campaign so successful?
18.2 What role does intelligence play in a campaign of military deception?
Books - Core Reading
C. Andrew,The Defence of the Realm, MI5, pp.287-300 UB 271.G7
J.C. Masterman, The Double-Cross System in the War of 1939-1945 D 810.S7
Books - Supplementary Reading
J. Bowyer Bell & Barton Whaley Cheating and Deception BJ 1421.B69
C. Cruickshank, Deception in World War II. D 744.C7
M. Handel (ed.) Strategic Deception in the Second World War D 810.S7
T. Harris, Garbo: The Spy Who Saved D-Day D 810.S8
R. Hesketh, Fortitude: The D-Day Deception Campaign UB 271.G7
T. Holt, The Deceivers: Allied Military Deception in the Second World War D 744.H64
M. Howard, Strategic Deception. Vol. 5 of FH Hinsley, et. al. British Intelligence in the Second
World War: Its Influence on Strategy and Operations. D 810.S7
J. Levine, Operation Fortitude, D 756.5.N6
B. MacIntyre, Doublecross Bloomsbury 2012
R. Miller, Codename TRICYCLE NIL
ES Montagu, Beyond Top Secret Ultra. NIL
J. Pujol, with Nigel West. Garbo . D 810.S8
N. Rankin, Genius for Deception, U 165.R3
M. Seaman, Garbo: The spy who saved D-Day D 810.S8
D. Wheatley, The Deception Planners: My Secret War. NIL
Articles - Core Reading
Bowyer J. Bell, 'Toward a Theory of Deception,' International Journal of Intelligence and
Counterintelligence 16/2 (2003) pp.244-279.
B Whaley, 'Towards a general theory of deception', Journal of Strategic Studies, 5, 1 (March
1982): 178-92.
J Ferris, 'The Intelligence-Deception Complex: An Anatomy.' INS 4, 4 (1989): 719-734.
J Ferris, ''FORTITUDE' in Context: The Evolution of British Military Deception in Two World
Wars, 1914-1945.' In Paradoxes of Strategic Intelligence: Essays in Honor of Michael I. Handel,
eds. Richard K. Betts and Thomas G. Mahnken, 117-165. UB 250.P34
Articles - Supplementary Reading
R Bennett, 'Fortitude, Ultra and the 'Need to Know.'' Intelligence and National Security 4, no. 3
(1989): 482-502.
TL Cubbage, II. 'The Success of Operation Fortitude: Hesketh's History of Strategic Deception.'
INS 2, 3 (1987): 327-346.
52
MI Handel, 'Introduction: Strategic and Operational Deception in Historical Perspective,' INS 2, 3
(July 1987) - [special issue on deception]
Michael Handel, 'Intelligence and the Problem of Strategic Surprise,' Journal of Strategic Studies
7/3 (1984) pp.229-281.
Richard J. Hueur, 'Strategic Deception and Counter-Deception', International Studies Quarterly
25/2 (1981) pp.294-327.
KJ Müller, 'A German Perspective on Allied Deception Operations in the Second World War.'
INS 2, no. 3 (1987): 301-326.
B Whaley and J Busby, 'Detecting Deception: Practice, Practitioners, and Theory,' in R. Godson
& J. Wirtz (eds.), Strategic Denial. and Deception: The Twenty-First Century
19 Intelligence for Peace:
NGOs, Peacemaking and Peacekeeping
Seminar paper questions
19.1 Does intelligence-gathering produce a safer and more stable world? Or does it
provoke neighbours, while encouraging policy-makers in the belief that they are
omniscient ?
19.2 Is a permanent UN intelligence agency desirable? If so, is it feasible?
19.3 What kinds of intelligence support is required for peacekeeping operations?
19.4 Examine the role of intelligence officers as clandestine peace brokers? What
advantages and disadvantages do they carry?
Books - Core Reading
Andrew, Aldrich & Wark (eds), Secret Intelligence Chs. 28 & 29 UB 250.S6
Ben de Jong et al (eds.) Peacekeeping Intelligence: Emerging Concepts for the Future, OSS Ltd,
UB 250.P3
David Carment & Martin Rudner, eds., Peacekeeping Intelligence: New Players, Extended
Boundaries L UB 250.P4
Books - Supplemetary Reading
H Carmel (ed.), Intelligence for Peace UB 250.I6
Klass van Walraven (ed), Early Warning and Conflict Prevention NIL
Cees Wiebes. Intelligence and The War in Bosnia 1992-1995 DR 1313.7.M54.W5
Articles - Core Reading
W. Dorn, ‘United Nations Peacekeeping Intelligence’ in Loch Johnson (ed.) The Oxford
Handbook of National Security Intelligence
53
Bassey Ekpe, 'The Intelligence Assets of the United Nations: Sources, Methods, and
Implications', International Journal of Intelligence and CounterIntelligence 20/3 (2007): 377 400.
Paul Johnston, 'No Cloak and Dagger Required: Intelligence Support to UN Peacekeeping,'
Intelligence and National Security, 12/4, (1997)
T. Quiggen, 'Response to 'No Cloak and Dagger', INS 13/4 (Winter 1998): 203-8.
On peace-brokers see –
A.Mumford, ‘Covert Peacemaking : Clandestine Negotiations and Backchannels with the
Provisional IRA during the Early 'Troubles', 1972-76’, Journal of Imperial and
Commonwealth History 39/4 (2011): 633-648.
Len Scott, 'Secret Intelligence, Covert Action and Clandestine Diplomacy', Intelligence and
National Security 19, 2 (2004) 322-34.
S. Shpiro, 'The CIA as Middle East Peace Broker?', Survival, 45, 2, (2003): 91-112.
John D. Stempel, 'Covert Action and Diplomacy,' International Journal of Intelligence and
Counterintelligence 20/1 (2007) pp.122-135.
Articles - Supplemetary Reading
D.A. Charters, 'Out of the Closet: Intelligence Support for UN Peacekeeping', in DA Charters (ed.)
Intelligence. and Peacekeeping. Clementsport, NS: Canadian Peacekeeping
S Chesterman, ‘Does the UN have intelligence?’, Survival, 48, 3 (Autumn 2006), 149-64.
S. Chesterman, 'Shared Secrets: Intelligence And Collective Security', Lowy Institute, Paper 10
(2006) available at http://iilj.org/research/documents/chesterman_shared_secrets_2006.pdf
William E. Demars, 'Hazardous Partnership: NGOs and United States Intelligence in Small Wars',
International Journal of Intelligence and Counterintelligence 14/2 (2001) pp.193-222.
A. Walter Dorn and David J.H. Bell, 'Intelligence and Peacekeeping: The UN Operation in the
Congo 1960-64', International Peacekeeping 2/1 (1995) pp.11-33.
A Walter Dorn, 'The Cloak and the Blue Beret: Limitations on Intelligence in UN Peacekeeping.
International Journal of Intelligence and Counterintelligence, Vol. 12, 1998 also at http://www.rmc.ca/academic/gradrech/dorn9_e.html
A.W. Dorn, ‘Intelligence-led Peacekeeping: The United Nations Stabilization Mission in Haiti
(MINUSTAH), 2006-07’, INS 24, 6 (2009): 805-835.
Pär Eriksson, 'Intelligence in peacekeeping operations', International Journal of Intelligence and
CounterIntelligence 10/1 (1997) pp.1-18.
Anna Fitzgerald, 'Linkages Between SSR and Peacekeeping Intelligence', Journal of Security
Sector Management, 1, 3 (December 2003): 1-8.
D. Hannay, ‘Intelligence and International Agencies’, in Shukman (ed.), Agents for
change. Intelligence services in the 21st century, London, 2000, 179.
Sir David Ramsbotham, 'Analysis and Assessment for Peacekeeping Operations, Intelligence and
National Security 10/4 (1995) pp.162-75.
Martin Rudner, 'The Future of Canada's Defence Intelligence', International Journal of
Intelligence and CounterIntelligence 15/4 (2002) pp.540-564.
P. Shetler-Jones, 'Intelligence in Integrated UN Peacekeeping Missions: The Joint Mission
Analysis Centre', International Peacekeeping, 15, 4 (August 2008): 517-27.
H. Smith, 'Intelligence and UN Peacekeeping', Survival, 36, 3 (Autumn 1994): 174-92.
54
Robert David Steele, 'Peacekeeping Intelligence and Information Peacekeeping', International
Journal of Intelligence and CounterIntelligence, 19/3 (2006) pp.519 - 537
A. Waller & D. Bell, 'Intelligence and Peacekeeping: The UN Operation in the Congo, 1960-64',
International Peacekeeping, 2, 1 (Spring 1999).
Peter Wilson, 'The contribution of intelligence services to security sector reform', Conflict,
Security and Development 5/1 (2005) pp. 87-107.
Especially for Assessed Essay 19.1 - stability and risk
*M. Herman, Intelligence Service in the Information Age, Ch.9, UB 250.H47
R. Jeffreys-Jones, Cloak and Dollar: A History of American Secret Intelligence UB
271.U6
J. Rusbridger, The Intelligence Game, UB 270.R87
S. Sagan, The Limits of Safety, [use section on the errant Alaskan U-2 sniffer flight of
1962] U 264.3.S24
F: THE FUTURE OF INTELLIGENCE
20 What is to be done?
Reforming Intelligence in a Globalising World
Seminar paper questions
20.1 What sort of challenges does globalization offer to secret services?
20.2 Examine the contention that present day secret services remain locked in obsolete
Cold War bureaucratic forms and have not yet addressed the perils of globalisation.
20.3 Why did the United States encountered such difficulty in reforming its intelligence
community to meet new challenges after 2001?
20.4 'Only the privatisation of intelligence will permit secret services to achieve the
fluidity required to deal with the transnational challenges the globalisation has helped to
create'. Discuss.
55
A. GLOBALISATION ISSUES
Books - Core Reading
Andrew, Aldrich & Wark (eds), Secret Intelligence Ch.30 UB 250.S6
TC Bruneau & S Boraz, Reforming Intelligence UB 250.R4 <e>
S Tsang (ed.), Intelligence and Human Rights in the Era of Global Terrorism JE 300.T3.I6
G. Treverton, Intelligence for an Age of Terror (Cambridge 2009) Ch.2
Books - Supplementary Reading
G. Adams, Buying National Security, Routledge 2010
B.J. Barber, Jihad vs McWorld JE 213.B2
B.J. Barber, Fear's Empire: War Terrorism and Democracy JE 242.B2
Deborah G. Barger RAND Toward a Revolution in Intelligence Affairs Available at http://www.rand.org/pubs/technical_reports/2005/RAND_TR242.pdf NIL
Simon Chesterman, One Nation under Surveillance HD 5011.C4
H Friman & P Andreas (eds) The Illicit Global Economy and State Power HY 100.I5
H.R Friman, Narcodiplomacy, NIL
Roger Scruton, The West and the Rest JE 210.S2
B Schneier, Beyond Fear JE 242.S2
F Varese, The Russian Mafia HF 3103.1.V2
Articles - Core Reading
Wilhelm Agrell, 'The Next 100 Years? Reflections on the Future of Intelligence,
Intelligence and National Security, 27/1 (2012): 118-132.
Sir David Omand, 'Into the Future: A Comment on Agrell and Warner', Intelligence and
National Security, 27/1 (2012): 154-156.
R.J. Aldrich, 'Beyond the Vigilant State? Globalization and Intelligence', Review of International
Studies, 35/4 (2009).
Zygmunt Bauman, 'Reconnaissance Wars of the Planetary Frontierland', Theory, Culture
& Society 19/4 (2002): 81–90.
Myriam Dunn Cavelty and Victor Mauer, ‘Postmodern Intelligence: Strategic Warning in an Age
of Reflexive Intelligence’, Security Dialogue, 40/2 (2009): 123-144.
Stevyn Gibson, 'In the Eye of the Perfect Storm: Re-imagining Reforming and Refocusing
Intelligence for Risk, Globalisation and Changing Societal Expectation', Risk Management 7/4
(2005): 23-41.
Flemming Splidsboel Hansen, 'An Argument for Reflexivity in Intelligence Work', Intelligence
and National Security 27/3 (2012): 349-370.
William J. Lahneman (2010): The Need for a New Intelligence Paradigm, International Journal
of Intelligence and CounterIntelligence, 23:2, (2010): 201-225.
William J. Lahneman, ‘‘Is a Revolution in Intelligence Affairs Occurring?,’’ International
Journal of Intelligence and CounterIntelligence, 20/1, (2007):. 1–17.
K.A. O'Brien,. Managing national security and law enforcement intelligence in a globalised
world. Review of International Studies, 35 (2009): 903-915.
56
P. Maddrell, 'Failing Intelligence: U.S. Intelligence in the Age of Transnational Threats',
International Journal of Intelligence and CounterIntelligence, 22/2 (2009): 195-220.
Michael Warner, 'Reflections on Technology and Intelligence Systems', Intelligence and National
Security , 27/1 (2012): 133-153.
Articles - Supplementary Reading
Peter Gill, 'Not Just Joining the Dots But Crossing the Borders and Bridging the Voids:
Constructing Security Networks after 11 September 2001', Policing & Society, 16, 1 (March
2006): 27-49
Gregory F. Treverton, “Intelligence and the Market State,” Studies in Intelligence, No. 10
(Winter-Spring 2001)
Welsey K. Wark, 'Learning to Live with Intelligence', Intelligence and National Security 18/4
(Winter 2003) pp.1-14.
B. POST 9/11 EFFORTS AT REFORM in the USA
Books - Core Reading
R. Dover and M. Goodman (eds.) Spinning Intelligence JD 305.S74
William E Odom, Fixing Intelligence: For a More Secure America. JC 704.2.O33
Anonymous, [Michael Scheuer], Imperial Hubris JE 300.T3.S2
R. Posner, Preventing Surprise Attacks: Intelligence Reform in the Wake of 9/11 UB 250.P6
J Sims & B Gerber, Transforming US Intelligence UB 250.T7
*WK Wark, Twenty-first Century Intelligence JC 842.T9
Books - Supplementary Reading
R. Baer, See No Evil: The True Story of a Groundsoldier in the CIA’s Counter-Terrorism Wars
JC 701.42.B2 .
L.K. Johnson, The Threat on the Horizon, OUP 2011
R Posner, Uncertain Shield: the US Intelligence System in the Throes of Reform UB 271.U6
Thomas Quiggin, Seeing the Invisible: National Security Intelligence in an Uncertain Age <e
book>
A. J. Rossmiller: Still Broken: A Recruit's Inside Account of Intelligence Failures, From Baghdad
to the Pentagon JC 842.R6
R Russell, Sharpening Strategic Intelligence Why the CIA Gets It Wrong and What Needs to Be
Done to Get It Right, UB 271.U6
K Williams & D Deletant, Security Intelligence Services in New Democracies: The Czech
Republic, Slovakia and Romania, UB 250.W4
Articles - Core Reading
RK Betts, ‘Fixing Intelligence’ Foreign Affairs, 81 (January/February 2002)
RK Betts, 'The New Politics of Intelligence: Will Reforms Work This Time?' Foreign Affairs,
83/3 (May/June 2004)
C. Cogan, 'Hunters not Gatherers: Intelligence in the 21st Century' Ch.11. In LV Scott and PD
Jackson (eds.) Understanding Intelligence in the 21st Century [this book is also Intelligence and
National Security, 20/1 (2004)] UB 250.U53
G. Hastedt, 'Foreign policy by commission: Reforming the intelligence community', INS 22/4
(2007): 443-472.
57
A.S. Hulnick, ‘Intelligence Reform 2007: Fix or Fizzle?’ International Journal of Intelligence
and Counterintelligence 20/4 (2007): 567-582.
A.S. Hulnick, 'Intelligence Reform 2008: Where to from Here?', International Journal of
Intelligence and CounterIntelligence, 21/4 (2008): 621-634.
Articles - Supplementary Reading
W. Daugherty, 'Review Essay: Gregory F. Treverton, Intelligence for an Age of Terror',
Intelligence and National Security 27/3 (2012): 423-429.
H Fessenden, 'The Limits of Intelligence Reform', Foreign Affairs 84 (November- December
2005): 106-20
M. Herman, 'The Future of Intelligence After September 11', International Relations, 16/2
(August 2002)
Richards J. Heuer, 'Limits of Intelligence Analysis', Orbis 49/1 (Winter 2005)
Arthur S. Hulnick, 'Intelligence Reform 2007: Fix or Fizzle?', International Journal of
Intelligence and CounterIntelligence, 20/4 (2007): 567-582.
W. Rees & R.J. Aldrich, 'Contending Cultures of Counter-Terrorism: Transatlantic Convergence
or Divergence', International Affairs 81/5 (October 2005)
P.R. Neumann and M. L. R. Smith, 'Missing the Plot? Intelligence and Discourse Failure' Orbis
49/1 (Winter 2005)
C. PRIVATISATION OF INTELLIGENCE
G. Adams, Buying National Security, JE 215.42.A3
RY Pelton, Licensed to Kill JC 704.2.P3
J Scahill, Blackwater the rise of the world's most powerful mercenary army JC 704.2.S2
T. Shorrock, Spies for Hire UB 271.U6
Adam White, The Politics of Private Security HF 3711.W4
P.R. Keefe, ‘Privatized Spying: The Emerging Intelligence Industry’, in Loch Johnson (ed.) The
Oxford Handbook of National Security Intelligence UB 250.O9
J.D. Michaels, ‘All the President's Spies: Private-Public Intelligence Partnerships in the War on
Terror’, 96 Cal. L. Rev. 901 (2008).
A. Martin & P. Wilson, 'The Value of Non-Governmental Intelligence: Widening the Field', INS,
23/6 (2008): 767-776.
D. POST 9/11 EFFORTS AT REFORM in LATIN AMERICA
END
58
59
Download