Skip to main content

Stovepiping Within Multinational Military Operations: The Case of Mali

  • Chapter
  • First Online:
Information Sharing in Military Operations

Abstract

Information sharing within multinational military operations presents challenges for the intelligence process. This chapter draws on intelligence, military, and organizational studies to analyze information sharing in the intelligence process of the United Nations Multidimensional Integrated Stabilization Mission in Mali. This mission consisted of 41 different African, Asian, and European countries. Three clusters of issues—technological, organizational, and politics and policy—emerged to render information sharing between militaries suboptimal, though the main problem was stovepiping: information that should have been shared remained compartmentalized. Mutual distrust and turf wars resulting from unfamiliarity, different practices, and a suboptimal level of interoperability made sharing information a liability rather than a means of improving the quality of the intelligence assessments. Several remedies for these information sharing challenges are proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Homer (2015) tells of a reconnaissance mission in which a Trojan spy is turned and his information used against the Trojans (Iliad, Book X, lines 195–553). In Joshua 2:1–24, the Bible tells how the prostitute Rahab protected two Hebrew spies inside Jericho, while Numbers 13:1–33 recounts a joint spying mission by twelve chosen men representing each of the Hebrew tribes.

  2. 2.

    TREVI originated in 1975 and consisted of the heads of a number of European intelligence services. The acronym stood for terrorisme, radicalisme et violence internationale. Until the advent of the Common Security and Foreign Policy of the EU, its member services exchanged intelligence on a case-by-case, quid pro quo basis. For a brief description see Fägersten (2014), Walsh (2006), and Block (2011).

  3. 3.

    For a critique, see Hulnick (2006). For a discussion of the cycle, see Dorn (2010), 278–282.

  4. 4.

    See the breakdown of the mission at http://www.un.org/en/peacekeeping/missions/minusma/facts.shtml.

  5. 5.

    Presentation by representative of UN Department of Peacekeeping Operations, Carlisle, United States, January 28, 2015.

References

  • Alberts, D. S., Garstka, J. J., & Stein, F. P. (1999). Network centric warfare: Developing and leveraging information superiority (2nd ed.). Washington: CCRP Publication.

    Google Scholar 

  • Barry, J. A. (2012). Bolstering United Nations intelligence: Cultural and structural solutions. American Intelligence Journal, 30(1), 7–16.

    Google Scholar 

  • Block, L. (2011). From politics to policing. The rationality gap in EU Council policy-making. Unpublished doctoral dissertation, VU University, Amsterdam.

    Google Scholar 

  • Brazelton, J., & Gorry, G. A. (2003). Creating a knowledge-sharing community: If you build it, will they come? Communications of the ACM, 46(2), 23–25.

    Article  Google Scholar 

  • Cammaert, P. C. (2003). Intelligence in peacekeeping operations: Lessons for the future. In B. de Jong, W. Platje, & R. D. Steele (Eds.), Peacekeeping intelligence: Emerging concepts for the future (pp. 11–30). Oakton: OSS International Press.

    Google Scholar 

  • Clegg, S., & Bailey, J. R. (2008). International encyclopedia of organization studies. London: SAGE.

    Book  Google Scholar 

  • Dawes, S. S. (1996). Interagency information sharing: Expected benefits, manageable risks. Journal of Policy Analysis and Management, 15(3), 377–394.

    Article  Google Scholar 

  • Dawes, S. S., Gharawi, M. A., & Burke, G. B. (2012). Transnational public sector knowledge networks: Knowledge and information sharing in a multi-dimensional context. Government Information Quarterly, 29(1), s112–s120.

    Article  Google Scholar 

  • Dorn, A. W. (2010). United Nations peacekeeping intelligence. In L. K. Johnson (Ed.), Oxford handbook of national security intelligence (pp. 275–295). Oxford, UK: Oxford University Press.

    Google Scholar 

  • Dumbrell, J. (2004). The US–UK “special relationship” in a world twice transformed. Cambridge Review of International Affairs, 17(3), 437–450.

    Article  Google Scholar 

  • Fägersten, B. (2014). European intelligence cooperation. In I. Duyvesteyn, B. de Jong, & J. Van Reijn (Eds.), The future of intelligence. Challenges in the 21st century (pp. 94–112). London: Routledge.

    Google Scholar 

  • Gil-Garcia, J. R., Chengalur-Smith, I., & Duchessi, P. (2007). Collaborative e-government: Impediments and benefits of information-sharing projects in the public sector. European Journal of Information Systems, 16(2), 121–133.

    Google Scholar 

  • Goransson, S. (2014). Intelligence in UN peacekeeping: A case study of the challenges facing ASIFU. Unpublished bachelor’s thesis, Norwegian Military Academy, Linderud.

    Google Scholar 

  • Homer. (2015). Iliad (Samuel Butler, Trans.). Perseus Project. Retrieved from http://www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A1999.01.0217%3Abook%3D10%3Acard%3D1

  • Hulnick, A. S. (2006). The future of the intelligence process. The end of the intelligence cycle? In I. Duyvesteyn, B. de Jong, & J. van Reijn (Eds.), The future of intelligence. Challenges in the 21st century (pp. 47–57). London: Routledge.

    Google Scholar 

  • Jackson, B. A. (2014). How do we know what information sharing is really worth?. Santa Monica: Rand Corporation.

    Google Scholar 

  • Jeffreys-Jones, R. (2012). The end of an exclusive special intelligence relationship: British-American intelligence co-operation before, during and after the 1960s. Intelligence and National Security, 27(5), 707–721.

    Article  Google Scholar 

  • Kim, S., & Lee, H. (2006). The impact of organizational context and information technology on employee knowledge-sharing capabilities. Public Administration Review, 66(3), 370–385.

    Article  Google Scholar 

  • Lefebvre, S. (2003). The difficulties and dilemmas of international intelligence cooperation. International Journal of Intelligence and CounterIntelligence, 16(4), 527–542.

    Article  Google Scholar 

  • McGill, A. K. S., & Gray, D. H. (2012). Challenges to international counterterrorism intelligence sharing. Global Security Studies, 3(3), 76–86.

    Google Scholar 

  • Norheim-Martinsen, P. M., & Ravndal, J. A. (2011). Towards intelligence-driven peace ope-rations? The evolution of UN and EU intelligence structures. International Peacekeeping, 18(4), 454–467.

    Article  Google Scholar 

  • Reveron, D. S. (2006). Old allies, new friends: Intelligence-sharing in the war on terror. Orbis, 50(3), 453–68.

    Article  Google Scholar 

  • Rietjens, S. J. H., Verlaan, K., Brocades-Zaalberg, T., & de Boer, S. J. (2009). Inter-organisational communication in civil–military cooperation during complex emergencies: A case study in Afghanistan. Disasters, 33(3), 412–435.

    Article  Google Scholar 

  • Sales, N. A. (2010). Share and share alike: Intelligence agencies and information sharing. George Washington Law Review, 78(2), 279–352.

    Google Scholar 

  • Sims, J. E. (2006). Foreign intelligence liaison: Devils, deals, and details. International Journal of Intelligence and CounterIntelligence, 19(2), 195–217.

    Article  Google Scholar 

  • Snabilie, I. (2014). The organizational dynamics of knowledge production: How the Dutch intelligence community produces knowledge of complex conflict environments: The case of MINUSMA, Mali. Unpublished master’s thesis, University of Utrecht, Utrecht.

    Google Scholar 

  • Svendsen, A. (2008). The globalization of intelligence since 9/11: Frameworks and operational parameters. Cambridge Review of International Affairs, 21(1), 129–144.

    Article  Google Scholar 

  • Treglia, J. V. & Park, J. S. (2009, June). Towards trusted intelligence information sharing. Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics (CSI-KDD), Paris, France.

    Google Scholar 

  • Van den Heuvel, G. (2010, June). Share to win: Unraveling information sharing in dynamic coalitions. Paper presented at the 18th European Conference on Information Systems, Pretoria, South Africa.

    Google Scholar 

  • Van den Heuvel, G., Grant, T., & Soeters, J. M. M. L. (2008). Research model of cultural influences on information sharing via C2 systems. In D. S. Alberts (Ed.), Proceedings, 13th International Command & Control Research & Technology Symposium (pp. 1–139). Washington, DC: Command and Control Research Program.

    Google Scholar 

  • Walsh, J. I. (2006). Intelligence-sharing in the European Union: Institutions are not enough. Journal of Common Market Studies, 44(3), 625–643.

    Article  Google Scholar 

  • Wenjing, L. (2011). Government information sharing: Principles, practice, and problems—An international perspective. Government Information Quarterly, 28(3), 363–373.

    Article  Google Scholar 

  • Wiebes, C. (2002). Intelligence and the war in Bosnia 1992-1995: The role of the intelligence and security services, Appendix II, Srebrenica: A “safe” area. Amsterdam: Boom.

    Google Scholar 

  • Willem, A., & Buelens, M. (2007). Knowledge sharing in public sector organizations: The effect of organizational characteristics on interdepartmental knowledge sharing. Journal of Public Administration Research and Theory, 17(4), 581–606.

    Article  Google Scholar 

  • Yang, T. M., & Maxwell, T. A. (2011). Information-sharing in public organizations: A literature review of interpersonal, intra-organizational and inter-organizational success factors. Government Information Quarterly, 28(2), 164–175.

    Article  Google Scholar 

  • Yang, T. M., Pardo, T., & Wu, Y. J. (2014). How is information shared across the boundaries of government agencies? An e-government case study. Government Information Quarterly, 31(4), 637–652.

    Article  Google Scholar 

  • Zhang, J., & Dawes, S. S. (2006). Expectations and perceptions of benefits, barriers, and success in public sector knowledge networks. Public Performance & Management Review, 29(4), 433–466.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sebastiaan Rietjens .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing

About this chapter

Cite this chapter

Rietjens, S., Baudet, F. (2017). Stovepiping Within Multinational Military Operations: The Case of Mali. In: Goldenberg, I., Soeters, J., Dean, W. (eds) Information Sharing in Military Operations. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-42819-2_13

Download citation

Publish with us

Policies and ethics