Advertisement

Technical research innovations of the US national security system

  • R. Fileto MacielEmail author
  • P. Saskia Bayerl
  • Marta Macedo Kerr Pinheiro
Article
  • 26 Downloads

Abstract

Since the Second World War the US defense has been a major participant in the development of radical innovations in information and communication technologies (ICT’s), most famously probably the digital computer and the internet. A regularly present, but less known creator of R&D innovations is the intelligence community. To understand the role and impact of defense and intelligence-related research for driving ICT innovations, we analyzed which technological paradigms were promoted by US defense and intelligence agencies and the development of these research trajectories over time. Using bibliographic analysis, we clustered 82,239 scientific papers funded by the US national security system, published between 2009–2017, in research fronts, and after that aggregated the research fronts into technological paradigms. Our analysis identified main technological paradigms promoted by the US defense’s sectoral system of innovation, such as quantum science and graphene as fields that could generate high impact in the new generation of radical technologies. The efforts of intelligence agencies was highly concentrated on quantum science, social forecasting, computer cognition and signal processing. Our research highlights the role of US security players in shaping research fields.

Keywords

Innovation Technological paradigm Technological trajectory National security Intelligence Bibliographic analysis 

Mathematics Subject Classification

91C20 

JEL Classification

O32 

Notes

Acknowledgements

Author R. Fileto Maciel has received research grants from Federal Police of Brazil (Polícia Federal do Brasil - Grant Number 08350.014739/2016-14). The findings and observations contained in this paper are those of the authors and do not necessarily reflect the views of the Federal Police of Brazil. We thank Vladmir Brito and Mark van der Giessen for comments on a previous version.

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

References

  1. Acosta, M., Coronado, D., Marín, R., & Prats, P. (2013). Factors affecting the diffusion of patented military technology in the field of weapons and ammunition. Scientometrics, 94(1), 1–22.  https://doi.org/10.1007/s11192-012-0857-8.CrossRefGoogle Scholar
  2. Atwood, C. P. (2015). Activity-based intelligence revolutionizing military intelligence analysis. Joint Force Quarterly, 77, 24–33.Google Scholar
  3. Boyack, K. W., & Klavans, R. (2010). Co-citation analysis, bibliographic coupling, and direct citation: Which citation approach represents the research front most accurately? Journal of the American Society for Information Science and Technology, 61(12), 2389–2404.  https://doi.org/10.1002/asi.21419.CrossRefGoogle Scholar
  4. Boyack, K. W., & Klavans, R. (2014). Including cited non-source items in a large-scale map of science: What difference does it make? Journal of Informetrics, 88(3), 569–580.  https://doi.org/10.1016/j.joi.2014.04.001. Elsevier Ltd.CrossRefGoogle Scholar
  5. Cochran, E. S. (2003). South Korea’s intelligence targets U.S. technology. International Journal of Intelligence and CounterIntelligence, 16(2), 179–201.  https://doi.org/10.1080/08850600390198715.CrossRefGoogle Scholar
  6. Colavizza, G., Boyack, K. W., van Eck, N. J., & Waltman, L. (2017). The closer the better: Similarity of publication pairs at different cocitation levels. Journal of the Association for Information Science and Technology, 00(00), 1–17.  https://doi.org/10.1002/asi.23981.Google Scholar
  7. Cronin, B. (2011). The intelligence disconnect. Journal of the American Society for Information Science and Technology, 62(10), 1867–1868.  https://doi.org/10.1002/asi.21616.CrossRefGoogle Scholar
  8. CWTS—Centre for Science and Technology Studies—Leiden University. (2018). Fields. http://www.leidenranking.com/information/fields.
  9. Daugherty Miles, A. (2016). Intelligence community spending: Trends and issues. Congressional Research Service. https://fas.org/sgp/crs/intel/R44381.pdf.
  10. Davies, P. H. J. (2005). Intelligence, information technology, and information warfare. Annual Review of Information Science and Technology, 36(1), 312–352.  https://doi.org/10.1002/aris.1440360108.CrossRefGoogle Scholar
  11. Dosi, G. (1982). Technological paradigms and technological trajectories: A suggested interpretation of the determinants and directions of technical change. Research Policy, 11(3), 147–162.  https://doi.org/10.1016/0048-7333(82)90016-6.CrossRefGoogle Scholar
  12. Grassano, N., Rotolo, D., Hutton, J., Lang, F., & Hopkins, M. M. (2017). Funding data from publication acknowledgments: Coverage, uses, and limitations. Journal of the Association for Information Science and Technology, 68(4), 999–1017.  https://doi.org/10.1002/jasist.23737.CrossRefGoogle Scholar
  13. Hsuan, H. M., & Chang, C. P. (2014). Detecting research fronts in OLED field using bibliographic coupling with sliding window. Scientometrics, 98(3), 1721–44.  https://doi.org/10.1007/s11192-013-1126-1.MathSciNetCrossRefGoogle Scholar
  14. Kas, M., Khadka, A. G., Frankenstein, W., Abdulla, A. Y., Frank Kunkel, L., Carley, R., et al. (2012). Analyzing scientific networks for nuclear capabilities assessment. Journal of the American Society for Information Science and Technology, 63(7), 1294–1312.  https://doi.org/10.1002/asi.22678.CrossRefGoogle Scholar
  15. Kessler, M. M. (1963). Bibliographic coupling between scientific papers. American Documentation, 14, 10–25.  https://doi.org/10.1002/asi.5090140103.CrossRefGoogle Scholar
  16. Kuhn, T. S. (1970). The structure of scientific revolutions. Vol. II. 2.  https://doi.org/10.1119/1.1969660.
  17. Lancichinetti, A., & Fortunato, S. (2012). Consensus clustering in complex networks. Scientific Reports, 2(1), 336.  https://doi.org/10.1038/srep00336.CrossRefGoogle Scholar
  18. Libaers, D. (2009). Industry relationships of DoD-funded academics and institutional changes in the US university system. Journal of Technology Transfer, 34(5), 474–489.  https://doi.org/10.1007/s10961-008-9099-6.CrossRefGoogle Scholar
  19. Macrakis, K. (2004). Does effective espionage lead to success in science and technology? Lessons from the East German ministry for state security. Intelligence and National Security, 19(1), 52–77.  https://doi.org/10.1080/0268452042000222920.CrossRefGoogle Scholar
  20. Malerba, F. (2002). Sectoral systems of innovation and production. Research Policy, 31(2), 247–64.  https://doi.org/10.1016/S0048-7333(01)00139-1.CrossRefGoogle Scholar
  21. Malik, T. H. (2017). Defence investment and the transformation national science and technology: A perspective on the exploitation of high technology. Technological Forecasting and Social Change, 1981(September), 1–10.  https://doi.org/10.1016/j.techfore.2017.09.020. Elsevier.Google Scholar
  22. Matheny, J. (2016). Forecasting innovation: Lessons from IARPA’s research programs. Research-Technology Management, 59(6), 36–40.  https://doi.org/10.1080/08956308.2016.1232137.CrossRefGoogle Scholar
  23. Moreno, C., del Carmen, M., Auzinger, T., & Werthner, H. (2016). On the uncertainty of interdisciplinarity measurements due to incomplete bibliographic data. Scientometrics, 107(1), 213–32.  https://doi.org/10.1007/s11192-016-1842-4.CrossRefGoogle Scholar
  24. Morris, S. A., Yen, G., Zheng, W., & Asnake, B. (2003). Time line visualization of research fronts. Journal of the American Society for Information Science and Technology, 54(5), 413–422.  https://doi.org/10.1002/asi.10227.CrossRefGoogle Scholar
  25. Mowery, D. C. (2012). Defense-related R&D as a model for “grand Challenges” technology policies. Research Policy, 41(10), 1703–1715.  https://doi.org/10.1016/j.respol.2012.03.027. Elsevier B.V.CrossRefGoogle Scholar
  26. National Intelligence Council. (2012). Global trends 2030: Alternative worlds. https://doi.org/ISBN 978-1-929667-21-5.
  27. OECD. (2018). Main science and technology indicators. Paris: OECD.Google Scholar
  28. Office of the Director of National Intelligence, and United States Intelligence community. (2014). FY2015-2019 IC S&T INVESTMENT LANDSCAPE: ensuring future capabilities align to mission needs. https://www.dni.gov/files/documents/atf/FY2015-2019IC_S&T_Investment_Landscape.pdf.
  29. Olijnyk, N. V. (2018). Examination of China’s performance and thematic evolution in quantum cryptography research using quantitative and computational techniques. Edited by Judit Bar-Ilan. PLoS ONE, 13(1), e0190646.  https://doi.org/10.1371/journal.pone.0190646.CrossRefGoogle Scholar
  30. Plummer, L. A., & Gilbert, B. A. (2015). The effect of defense agency funding of university research on regional new venture creation. Strategic Entrepreneurship Journal, 9(2), 136–152.  https://doi.org/10.1002/sej.1199.CrossRefGoogle Scholar
  31. Porter, A. L., & Rafols, I. (2009). Is science becoming more interdisciplinary? Measuring and mapping six research fields over time. Scientometrics, 81(3), 719–745.  https://doi.org/10.1007/s11192-008-2197-2.CrossRefGoogle Scholar
  32. Ruttan, V. W. (2006). Is war necessary for economic growth? Military procurement and technology development. December 2017.  https://doi.org/10.1093/0195188047.001.0001.
  33. The United States Intelligence Community. (2018). Member Agencies. https://www.intelligence.gov/how-the-ic-works.
  34. Trajtenberg, M. (2003). Crafting defense R&D policy in the anti-terrorist era. Cambridge, MA: National Bureau of Economic Research.  https://doi.org/10.3386/w9725.CrossRefGoogle Scholar
  35. United States President. (2017). Organization of the national security council, the homeland security council, and subcommittees. https://www.law.cornell.edu/uscode/text/50/3021.
  36. Upham, S. P., & Small, H. (2010). Emerging research fronts in science and technology: Patterns of new knowledge development. Scientometrics, 83(1), 15–38.  https://doi.org/10.1007/s11192-009-0051-9.CrossRefGoogle Scholar
  37. van Eck, N. J., & Waltman, L. (2017). Citation-based clustering of publications using CitNetExplorer and VOSviewer. Scientometrics, 111(2), 1053–70.  https://doi.org/10.1007/s11192-017-2300-7. Springer Netherlands.CrossRefGoogle Scholar
  38. Vogel, K. M., & Knight, C. (2015). Analytic outreach for intelligence: Insights from a workshop on emerging biotechnology threats. Intelligence and National Security, 30(5), 686–703.  https://doi.org/10.1080/02684527.2014.887633.CrossRefGoogle Scholar
  39. Wagner, C. S., & Jonkers, K. (2017). Open countries have strong science. Nature, 550(7674), 32–33.  https://doi.org/10.1038/550032a.CrossRefGoogle Scholar
  40. Waltman, L., & Van Eck, N. J. (2012). A new methodology for constructing a publication-level classification system of science. Journal of the American Society for Information Science and Technology, 63(12), 2378–92.  https://doi.org/10.1002/asi.22748.CrossRefGoogle Scholar
  41. Waltman, L., Eck, V., & Jan, N. (2013). A smart local moving algorithm for large-scale modularity-based community detection. European Physical Journal B, 86(11), 471.CrossRefGoogle Scholar
  42. Warner, M. (2012). Reflections on technology and intelligence systems. Intelligence and National Security, 27(1), 133–153.  https://doi.org/10.1080/02684527.2012.621604.MathSciNetCrossRefGoogle Scholar

Copyright information

© Akadémiai Kiadó, Budapest, Hungary 2019

Authors and Affiliations

  1. 1.Escola de Ciência da InformaçãoUniversidade Federal de Minas GeraisBelo HorizonteBrazil
  2. 2.Centre of Excellence in Public Safety Management (CESAM), Rotterdam School of ManagementErasmus UniversityRotterdamThe Netherlands
  3. 3.Centre of Excellence in Terrorism, Resilience, Intelligence and Organised Crime Research (CENTRIC)Sheffield Hallam UniversitySheffieldUK
  4. 4.Sistema de Informação e Gestão do ConhecimentoUniversidade FUMECBelo HorizonteBrazil

Personalised recommendations