Skip to main content

Military Intelligence: From Telling Truth to Power to Bewilderment?

  • Chapter
  • First Online:
Perspectives on Military Intelligence from the First World War to Mali

Abstract

This introductory chapter discusses 100 years of military intelligence and outlines the main changes that distinguish the post-Cold war period from the preceding one. This is characterised by a blurring of the boundaries between civilian and military intelligence, between investigative services and the intelligence community, and the foreign and domestic realms. The chapter also discusses the rise of oversight mechanisms. All these combined with unprecedented technological change to produce a challenging environment for intelligence services that is more unpredictable than ever before, and at the same time requires adequate, even pre-emptive responses on the part of the intelligence community. The dazzling level of adaptivity required largely obscures the fact that such adaptations were required in earlier periods as well, and intelligence professionals could profit by studying them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Lt. gen. (ret.) André Ranson, keynote speech at the NISA/MIVD conference ‘Telling truth to power’, September 2014.

  2. 2.

    Vanden Berghe 2008.

  3. 3.

    Scholte 2000.

  4. 4.

    Cf. Fukuyama 1992. The UN critically evaluated its performance in 2000.

  5. 5.

    See Ferguson 2011. On some of these contenders: Kaplan 2010; Brewster 2014; Segers 2008; Kingah and Quiliconi 2016; Stuenkel 2015. For a contrary view: Beausang 2012.

  6. 6.

    Witness calls in Britain, France, The Netherlands and Switzerland to renege the European Convention on Human Rights, and such international treaties as the Convention on the Status of Refugees.

  7. 7.

    Witness A Human Right 2014 and Howard 2011. For a discussion of the threats and opportunities offered by new technologies, see Kalathil and Boas 2003; Klang and Murray 2005. See further Salih 2013, pp. 185–203; Soengas 2013, pp. 147–155; Etling et al. 2010, pp. 2–10; Safranek 2012, pp. 2–10. Similar claims have been made about the end of the Suharto era: Mahdi 2002. See also Conversi 2012, pp. 1357–1379.

  8. 8.

    Toffler 1980, p. 165.

  9. 9.

    For an insightful discussion see Cunningham 2002.

  10. 10.

    Gladstone 2015.

  11. 11.

    Ingram 2015. On the rise of cyber Jihadis: Berton and Pawlak 2015; Atwan 2016.

  12. 12.

    States may prefer to attribute damage to vital infrastructure and networks to bad luck, accidents and technical problems rather than admit weakness.

  13. 13.

    For Russia’s use of these means F-Secure Labs 2015. Cf. Bellingcat 2016; Gathmann et al. 2014.

  14. 14.

    MacAskill et al. 2013.

  15. 15.

    See for instance http://www.nytimes.com/interactive/2017/01/06/us/politics/document-russia-hacking-report-intelligence-agencies.html?_r=0; Glaser 2016; Markoff 2016; Mozur and Scott 2016.

  16. 16.

    Committee on Legal Affairs and Human Rights of the Parliamentary Assembly of the Council of Europe 2006.

  17. 17.

    Hill 2016; Eijkman and Van Ginkel 2011, p. 16; Council of Europe. Commissioner for Human Rights 2015.

  18. 18.

    See, for instance, Metselaar 1997.

  19. 19.

    Kitzen 2016.

  20. 20.

    House 1993, p. 6.

  21. 21.

    Douhet 1921; for a discussion, see Hippler 2013. Cf. Black 2016.

  22. 22.

    Hancock and Wexler 2014; Immerman 2010; Olmsted 1996.

  23. 23.

    Lander 2004.

  24. 24.

    See Iliad, X, 195 ff and the Bible, Numbers, 13: 1–33.

  25. 25.

    Kaldor 2012 (1st edition 1999).

  26. 26.

    See for example Denécé 2014.

  27. 27.

    Cf. Kaldor 2012, pp. 4–5, 72–78.

  28. 28.

    Smith 2005.

  29. 29.

    See Cohen 2003.

  30. 30.

    For a discussion, see Duyvesteyn and Angstrom 2004.

  31. 31.

    Hoffman 2007. Compare Malis 2012, pp. 187–190; McCulloh and Johnson 2013.

  32. 32.

    Hoffman 2007, p. 36. See also Freier 2007.

  33. 33.

    De Wijk 2012, p. 358.

  34. 34.

    Thompson 2014; Manwaring and Corr 2008, pp. 75–77; Bunker 2012, pp. 45–53; Denécé 2014, pp. 29–30.

  35. 35.

    The description is based on Kuperwasser 2007, p. 4; Hammes 2006, p. 35 and Treverton and Agrell 2009, pp. 2–3.

  36. 36.

    Cf. UN 2000.

  37. 37.

    The tendency to ask for expanded competences does not only derive from the desire to become more efficient, but also from the administrative rationale to increase one’s power and as such to secure its administrative ‘lifeblood’ (Long 1949, pp. 257–264).

  38. 38.

    As Bob de Graaff once put it eloquently.

  39. 39.

    Engelhardt 2015.

  40. 40.

    Perrow 1999.

  41. 41.

    Engelhardt 2015.

  42. 42.

    Warrick and Wright 2008.

  43. 43.

    Merriam et al. 2012, p. 44.

  44. 44.

    Marsick and Watkins 2005, p. 357.

  45. 45.

    Farrell and Terriff 2002, p. 6.

  46. 46.

    Farrell et al. 2013, p. 1, 4 (quote).

  47. 47.

    Idem, p. 4.

  48. 48.

    Idem, p. 3.

  49. 49.

    Idem, pp. 305–306.

  50. 50.

    Baudet 2013.

  51. 51.

    Illeris 2004, p. 151.

  52. 52.

    Ferguson 2011, p. xx.

  53. 53.

    Murray and Sennreich 2006.

  54. 54.

    Idem.

  55. 55.

    Liddell Hart 1971, p. 27.

References

  • ahumanright.org (2014) A human right: Everyone connected http://ahumanright.org Accessed 10 December 2015.

  • Atwan AB (2016) Das digitale Kalifat: Die geheime Macht des Islamischen Staates. Beck, Munich

    Google Scholar 

  • Baudet FH (2013) Quelques réflexions sur l’exploitation du passé dans les forces armées. Air and Space Power Journal – Africa and Francophonie 4(4):4–14

    Google Scholar 

  • Beausang F (2012) Globalization and the BRICs: Why the BRICs Will Not Rule the World For Long. Palgrave McMillan, London

    Google Scholar 

  • Bellingcat (2016) Behind the Dutch terror threat video: the St. Petersburg “Troll Factory” connection. Bellingcat 3 April 2016. https://www.bellingcat.com/news/uk-and-europe/2016/04/03/azov-video/

  • Berton B, Pawlak P (2015) Cyber jihadists and their web. European Union Institute for Security Studies Brief Issue 2, Brussels

    Google Scholar 

  • Black J (2016) Air Power: A Global History. Rowman & Littlefield, London

    Google Scholar 

  • Brewster D (2014) India’s Ocean: The Story of India’s Bid for Regional Leadership. Routledge, London

    Google Scholar 

  • Bunker R (2012) Changing Forms of Insurgency: Pirates, Narco Gangs and Failed States. In: Rich PB, Duyvesteyn I (eds) The Routledge Handbook of Insurgency and Counterinsurgency. Routledge, London, pp. 45–53

    Google Scholar 

  • Cohen E (2003) Supreme command. Soldiers, statesmen and leadership in wartime. Free Press, New York

    Google Scholar 

  • Committee on Legal Affairs and Human Rights of the Parliamentary Assembly of the Council of Europe (2006) Alleged secret detentions in Council of Europe member states. Information Memorandum II, AS/Jur (2006) 03 rev http://assembly.coe.int/committeedocs/2006/20060124_jdoc032006_e.pdf Accessed 8 February 2016

  • Conversi D (2012) Irresponsible Radicalisation: Diasporas, Globalisation and Long-Distance Nationalism in the Digital Age. Journal of Ethnic and Migration Studies 38(9):1357–1379

    Google Scholar 

  • Council of Europe. Commissioner for Human Rights (2015) Intelligence: “French Draft law seriously infringes human rights”.

    Google Scholar 

  • Cunningham F (2002) Theories of democracy: A critical introduction. Routledge, London

    Google Scholar 

  • de Wijk R (2012) Hybrid Conflict and the Changing Nature of Actors. In: Lindley-French J, Boyer Y (eds) The Oxford Handbook of War. Oxford University Press, Oxford, pp 358–372

    Google Scholar 

  • Denécé E (2014) The Revolution in Intelligence Affairs: 1989–2003. International Journal of Intelligence and Counter Intelligence 27(1):27-41

    Google Scholar 

  • Douhet G (1921) Il dominio dell’aria. C. De Alberti, Roma

    Google Scholar 

  • Duyvesteyn I, Angstrom J (2004) Rethinking the Nature of War. Routledge, London

    Google Scholar 

  • Eijkman Q, Van Ginkel B (2011) Compatible or incompatible? Intelligence and human rights in terrorist trials. Amsterdam Law Forum 3(4):3–16

    Google Scholar 

  • Engelhardt T (2015) The fog of intelligence. http://lobelog.com/the-fog-of-intelligence/ Accessed 23 October 2015

  • Etling B, Faris R, Palfrey J (2010) Political Change in the Digital Age: The Fragility and Promise of Online Organizing. SAIS Review of International Affairs 30(2):2–10

    Google Scholar 

  • Farrell Th, Osinga F, Russell JA (2013) (eds) Military adaptation in Afghanistan. Stanford University Press, Stanford

    Google Scholar 

  • Farrell Th, Terriff T (2002) The sources of military change: culture, politics, technology. Lynne Rienner, Boulder, CO

    Google Scholar 

  • Ferguson N (2011) Civilization: The West and the Rest. Penguin, New York

    Google Scholar 

  • Freier N (2007) Strategic Competition and Resistance in the 21st Century: Irregular, Catastrophic, Traditional, and Hybrid Challenges in Context. Strategic Studies Institute, Carlisle Barracks

    Google Scholar 

  • F-Secure Labs (2015) The Dukes. 7 years of Russian cyberespionage. F-Secure Labs Threat Intelligence Whitepaper

    Google Scholar 

  • Fukuyama F (1992) The End of History and the Last Man. Free Press, Glencoe, ILL

    Google Scholar 

  • Gartmann M, Neef C, Schepp M, Stark H (2014) The Opinion-Makers: How Russia Is Winning the Propaganda War. Der Spiegel 30 May 2014

    Google Scholar 

  • Gladstone R (2015) Activist links more than 26,000 twitter accounts to ISIS. New York Times, 31 March 2015. http://nytimes.com/2015/04/01/world/middleeast/activist-links-more-than-26000-twitter-accounts-to-isis.html Accessed 27 October 2016

  • Glaser A (2016) here’s what we know about Russia and the DNC hack. Wired 27 July 2016. https://www.wired.com/2016/07/heres-know-russia-dnc-hack, Accessed 31 August 2016

  • Hammes TX (2006) The Sling and the Stone: On War in the 21st Century. Zenith, Minneapolis

    Google Scholar 

  • Hancock L, Wexler S (2014) Shadow Warfare: The History of America’s Undeclared Wars. Counterpoint Press, Berkeley

    Google Scholar 

  • Hill R (2016) Bulk data collection by intelligence agencies breached human rights law. Public Technology.net 19 October 2016. https://www.publictechnology.net/articles/news/bulk-data-collection-intelligence-agencies-breached-human-rights-law Accessed 23 November 2016

  • Hippler Th (2013) Bombing the People: Giulio Douhet and the Foundations of Air-Power Strategy, 1884–1939. Cambridge University Press, Cambridge

    Google Scholar 

  • Hoffman FG (2007) Conflict in the 21st Century: the rise of hybrid wars. The Potomac Institute for Policy Studies, Arlington

    Google Scholar 

  • House JM (1993) Military Intelligence, 1870–1991. A Research Guide. Greenwood Press, Westport, CN

    Google Scholar 

  • Howard Ph (2011) opening closed regimes: what was the role of social media during the Arab Spring? http://philhoward.org/opening-closed-regimes-regimes-what-was-the-role-of-social-media-during-the-arab-spring/ Accessed 29 November 2016

  • Illeris K (2004) Adult education and adult learning. Krieger, Malabar FL

    Google Scholar 

  • Immerman R (2010) The CIA in Guatemala: the foreign policy of intervention. University of Texas Press, Austin

    Google Scholar 

  • Ingram Ph (2015) US DoD website hacked by IS. Security News Desk 21 March 2015 http://www.securitynewsdesk.com/us-dod-website-hacked-by-is Accessed 24 September 2015

  • Kalathil S, Boas TC (2003) Open networks, closed regimes: the impact of the internet on authoritarian rule. Carnegie Endowment, New York

    Google Scholar 

  • Kaldor M (2012) New & Old Wars: Organized Violence in a Global Era. Stanford University Press, Stanford

    Google Scholar 

  • Kaplan R (2010) Monsoon: The Indian Ocean and the Future of American Power. Random House, New York

    Google Scholar 

  • Kingah S, Quiliconi C (eds) (2016) Global and Regional Leadership of BRICS Countries. Springer, New York

    Google Scholar 

  • Kitzen MWM (2016) The Course of Co-option. Dissertation, University of Amsterdam

    Google Scholar 

  • Klang M, Murray A (2005) Human rights in the digital age. Glasshouse, London

    Google Scholar 

  • Kuperwasser Y (2007) Lessons From Israel’s Intelligence Reforms. The Brookings Institution, Washington DC

    Google Scholar 

  • Lander S (2004) International intelligence co-operation: an inside perspective. Cambridge review of international affairs 17(3):481–493

    Google Scholar 

  • Liddell Hart BH (1971) Why don’t we learn from history? Allen Unwin, London

    Google Scholar 

  • Long NE (1949) Power and Administration. Public Administration Review 9(4):257–264

    Google Scholar 

  • MacAskill E, Dance G, Cage F, Chen G, Popovich N (2013) NSA files decoded: Edward Snowden’s surveillance revelations explained. https://www.theguardian.com/us-news/the-nsa-files Accessed 13 October 2016

  • Mahdi W (2002) The Internet Factor in Indonesia: Was that All? Paper presented at the 54th Annual Meeting of the Association for Asian Studies, Washington D.C. 4–7 April 2002

    Google Scholar 

  • Malis C (2012) Unconventional Forms of War. In: Lindley-French J, Boyer Y (eds) The Oxford Handbook of War. Oxford University Press, Oxford, pp 185–198

    Google Scholar 

  • Manwaring MG, Corr EG (eds) (2008) Insurgency, Terrorism, and Crime: Shadows From the Past and Portents for the Future. University of Oklahoma Press, Oklahoma City

    Google Scholar 

  • Markoff J (2016) Automated pro-Trump bots overwhelmed pro-Clinton messages, researchers say. New York Times 17 November 2016. http://www.nytimes.com/2016/11/18/technology/automated-pro-trump-bots-overwhelmed-pro-clinton-messages-researchers-say.html?smprod=nytcore-ipad&smid=nytcore-ipad-share&_r=0 Accessed 23 November 2016

  • Marsick VJ, Watkins KE (2005) Learning organization. In: English LM (ed) International Encyclopedia of Adult Education. Palgrave, London pp 355–360

    Google Scholar 

  • McCulloh T, Johnson R (2013) Hybrid Warfare, JSOU Report 13-4. Joint Special Operations University, MacDill Air Force Base

    Google Scholar 

  • Merriam SB, Caffarrella RS, Baumgartner LS (2012) Learning in Adulthood. Jossey-Bass, San Francisco

    Google Scholar 

  • Metselaar MV (1997) Understanding failures in intelligence estimates – UPROFOR, the Dutch, and the Bosnian-Serb attack on Srebrenica. In: Soeters J, Rovers JH (eds) (1997) The Bosnian Experience. Royal Netherlands Military Academy, Breda, pp. 23–50

    Google Scholar 

  • Mozur P, Scott M (2016) Fake news in U.S. Election? Elsewhere, that’s nothing new. New York Times 17 November 2016. http://www.nytimes.com/2016/11/18/technology/fake-news-on-facebook-in-foreign-elections-thats-not-new.html?smprod=nytcore-ipad&smid=nytcore-ipad-share Accessed 23 November 2016

  • Murray W, Sennreich R (eds) (2006) The past as prologue. The importance of history to the military profession. Cambridge University Press, Cambridge

    Google Scholar 

  • Olmsted KS (1996) Challenging the Secret Government: The Post-Watergate Investigations of the CIA and the FBI. University of North Carolina Press, Chapel Hill. New York Times, Intelligence Report on Russian hacking. 6 January 2017. http://www.nytimes.com/interactive/2017/01/06/us/politics/document-russia-hacking-report-intelligence-agencies.html?_r=0 Accessed 9 January 2017

  • Perrow Ch (1999) Normal Accidents. Living with High-Risk Technologies. Basic Books, New York

    Google Scholar 

  • Safranek R (2012) The Emerging Role of Social Media in Political and Regime Change. ProQuest Discovery Guide: 2–10

    Google Scholar 

  • Salih KEO (2013) The Roots and causes of the 2011 Arab Uprisings. Arab Studies Quarterly:185–203. http://www.pinxit.com/page101/page115/downloads-23/files/Arab_Spring_Causes.pdf

  • Scholte AJ (2000) Globalization: a critical introduction. St. Martin’s, New York

    Google Scholar 

  • Segers RT (2008) (ed) A New Japan for the Twenty-First Century. Taylor & Francis, London

    Google Scholar 

  • Smith R (2005) The Utility of Force: The Art of War in the Modern World. Allen Lane, London

    Google Scholar 

  • Soengas X (2013) The Role of the Internet and Social Networks in the Arab Uprisings – An Alternative to Official Press Censorship. Comunicar, 21(41):147–155

    Google Scholar 

  • Stuenkel O (2015) The BRICs and the Future of Global Order. Lexington Books, Lanham

    Google Scholar 

  • Thompson PG (2014) Armed Groups: The 21st Century Threat. Rowman and Littlefield, London

    Google Scholar 

  • Toffler A (1980) The Third Wave. Bantam Books, New York

    Google Scholar 

  • Treverton GF, Agrell W (2009) National Intelligence Systems: Current Research and Future Prospects. Cambridge University Press, New York

    Google Scholar 

  • United Nations (2000) Report of the Panel on United Nations Peace Operations

    Google Scholar 

  • Vanden Berghe Y (2008) De Koude Oorlog. Een nieuwe geschiedenis (1917–1991). ACCO, Leuven and Voorburg

    Google Scholar 

  • Warrick J and Wright R (2008) U.S. Teams weaken insurgency in Iraq. Washington Post 6 September 2008. http://washingtonpost.com/wp-dyn/content/article/2008/09/05/AR2008090503933.html Accessed 1 October 2016

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Floribert Baudet .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 T.M.C. Asser Press and the authors

About this chapter

Cite this chapter

Baudet, F., Braat, E., van Woensel, J., Wever, A. (2017). Military Intelligence: From Telling Truth to Power to Bewilderment?. In: Baudet, F., Braat, E., van Woensel, J., Wever, A. (eds) Perspectives on Military Intelligence from the First World War to Mali. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-183-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-94-6265-183-8_1

  • Published:

  • Publisher Name: T.M.C. Asser Press, The Hague

  • Print ISBN: 978-94-6265-182-1

  • Online ISBN: 978-94-6265-183-8

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics