Abstract
This introductory chapter discusses 100 years of military intelligence and outlines the main changes that distinguish the post-Cold war period from the preceding one. This is characterised by a blurring of the boundaries between civilian and military intelligence, between investigative services and the intelligence community, and the foreign and domestic realms. The chapter also discusses the rise of oversight mechanisms. All these combined with unprecedented technological change to produce a challenging environment for intelligence services that is more unpredictable than ever before, and at the same time requires adequate, even pre-emptive responses on the part of the intelligence community. The dazzling level of adaptivity required largely obscures the fact that such adaptations were required in earlier periods as well, and intelligence professionals could profit by studying them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Lt. gen. (ret.) André Ranson, keynote speech at the NISA/MIVD conference ‘Telling truth to power’, September 2014.
- 2.
Vanden Berghe 2008.
- 3.
Scholte 2000.
- 4.
Cf. Fukuyama 1992. The UN critically evaluated its performance in 2000.
- 5.
- 6.
Witness calls in Britain, France, The Netherlands and Switzerland to renege the European Convention on Human Rights, and such international treaties as the Convention on the Status of Refugees.
- 7.
Witness A Human Right 2014 and Howard 2011. For a discussion of the threats and opportunities offered by new technologies, see Kalathil and Boas 2003; Klang and Murray 2005. See further Salih 2013, pp. 185–203; Soengas 2013, pp. 147–155; Etling et al. 2010, pp. 2–10; Safranek 2012, pp. 2–10. Similar claims have been made about the end of the Suharto era: Mahdi 2002. See also Conversi 2012, pp. 1357–1379.
- 8.
Toffler 1980, p. 165.
- 9.
For an insightful discussion see Cunningham 2002.
- 10.
Gladstone 2015.
- 11.
- 12.
States may prefer to attribute damage to vital infrastructure and networks to bad luck, accidents and technical problems rather than admit weakness.
- 13.
- 14.
MacAskill et al. 2013.
- 15.
See for instance http://www.nytimes.com/interactive/2017/01/06/us/politics/document-russia-hacking-report-intelligence-agencies.html?_r=0; Glaser 2016; Markoff 2016; Mozur and Scott 2016.
- 16.
Committee on Legal Affairs and Human Rights of the Parliamentary Assembly of the Council of Europe 2006.
- 17.
- 18.
See, for instance, Metselaar 1997.
- 19.
Kitzen 2016.
- 20.
House 1993, p. 6.
- 21.
- 22.
- 23.
Lander 2004.
- 24.
See Iliad, X, 195 ff and the Bible, Numbers, 13: 1–33.
- 25.
Kaldor 2012 (1st edition 1999).
- 26.
See for example Denécé 2014.
- 27.
Cf. Kaldor 2012, pp. 4–5, 72–78.
- 28.
Smith 2005.
- 29.
See Cohen 2003.
- 30.
For a discussion, see Duyvesteyn and Angstrom 2004.
- 31.
- 32.
- 33.
De Wijk 2012, p. 358.
- 34.
- 35.
- 36.
Cf. UN 2000.
- 37.
The tendency to ask for expanded competences does not only derive from the desire to become more efficient, but also from the administrative rationale to increase one’s power and as such to secure its administrative ‘lifeblood’ (Long 1949, pp. 257–264).
- 38.
As Bob de Graaff once put it eloquently.
- 39.
Engelhardt 2015.
- 40.
Perrow 1999.
- 41.
Engelhardt 2015.
- 42.
Warrick and Wright 2008.
- 43.
Merriam et al. 2012, p. 44.
- 44.
Marsick and Watkins 2005, p. 357.
- 45.
Farrell and Terriff 2002, p. 6.
- 46.
Farrell et al. 2013, p. 1, 4 (quote).
- 47.
Idem, p. 4.
- 48.
Idem, p. 3.
- 49.
Idem, pp. 305–306.
- 50.
Baudet 2013.
- 51.
Illeris 2004, p. 151.
- 52.
Ferguson 2011, p. xx.
- 53.
Murray and Sennreich 2006.
- 54.
Idem.
- 55.
Liddell Hart 1971, p. 27.
References
ahumanright.org (2014) A human right: Everyone connected http://ahumanright.org Accessed 10 December 2015.
Atwan AB (2016) Das digitale Kalifat: Die geheime Macht des Islamischen Staates. Beck, Munich
Baudet FH (2013) Quelques réflexions sur l’exploitation du passé dans les forces armées. Air and Space Power Journal – Africa and Francophonie 4(4):4–14
Beausang F (2012) Globalization and the BRICs: Why the BRICs Will Not Rule the World For Long. Palgrave McMillan, London
Bellingcat (2016) Behind the Dutch terror threat video: the St. Petersburg “Troll Factory” connection. Bellingcat 3 April 2016. https://www.bellingcat.com/news/uk-and-europe/2016/04/03/azov-video/
Berton B, Pawlak P (2015) Cyber jihadists and their web. European Union Institute for Security Studies Brief Issue 2, Brussels
Black J (2016) Air Power: A Global History. Rowman & Littlefield, London
Brewster D (2014) India’s Ocean: The Story of India’s Bid for Regional Leadership. Routledge, London
Bunker R (2012) Changing Forms of Insurgency: Pirates, Narco Gangs and Failed States. In: Rich PB, Duyvesteyn I (eds) The Routledge Handbook of Insurgency and Counterinsurgency. Routledge, London, pp. 45–53
Cohen E (2003) Supreme command. Soldiers, statesmen and leadership in wartime. Free Press, New York
Committee on Legal Affairs and Human Rights of the Parliamentary Assembly of the Council of Europe (2006) Alleged secret detentions in Council of Europe member states. Information Memorandum II, AS/Jur (2006) 03 rev http://assembly.coe.int/committeedocs/2006/20060124_jdoc032006_e.pdf Accessed 8 February 2016
Conversi D (2012) Irresponsible Radicalisation: Diasporas, Globalisation and Long-Distance Nationalism in the Digital Age. Journal of Ethnic and Migration Studies 38(9):1357–1379
Council of Europe. Commissioner for Human Rights (2015) Intelligence: “French Draft law seriously infringes human rights”.
Cunningham F (2002) Theories of democracy: A critical introduction. Routledge, London
de Wijk R (2012) Hybrid Conflict and the Changing Nature of Actors. In: Lindley-French J, Boyer Y (eds) The Oxford Handbook of War. Oxford University Press, Oxford, pp 358–372
Denécé E (2014) The Revolution in Intelligence Affairs: 1989–2003. International Journal of Intelligence and Counter Intelligence 27(1):27-41
Douhet G (1921) Il dominio dell’aria. C. De Alberti, Roma
Duyvesteyn I, Angstrom J (2004) Rethinking the Nature of War. Routledge, London
Eijkman Q, Van Ginkel B (2011) Compatible or incompatible? Intelligence and human rights in terrorist trials. Amsterdam Law Forum 3(4):3–16
Engelhardt T (2015) The fog of intelligence. http://lobelog.com/the-fog-of-intelligence/ Accessed 23 October 2015
Etling B, Faris R, Palfrey J (2010) Political Change in the Digital Age: The Fragility and Promise of Online Organizing. SAIS Review of International Affairs 30(2):2–10
Farrell Th, Osinga F, Russell JA (2013) (eds) Military adaptation in Afghanistan. Stanford University Press, Stanford
Farrell Th, Terriff T (2002) The sources of military change: culture, politics, technology. Lynne Rienner, Boulder, CO
Ferguson N (2011) Civilization: The West and the Rest. Penguin, New York
Freier N (2007) Strategic Competition and Resistance in the 21st Century: Irregular, Catastrophic, Traditional, and Hybrid Challenges in Context. Strategic Studies Institute, Carlisle Barracks
F-Secure Labs (2015) The Dukes. 7 years of Russian cyberespionage. F-Secure Labs Threat Intelligence Whitepaper
Fukuyama F (1992) The End of History and the Last Man. Free Press, Glencoe, ILL
Gartmann M, Neef C, Schepp M, Stark H (2014) The Opinion-Makers: How Russia Is Winning the Propaganda War. Der Spiegel 30 May 2014
Gladstone R (2015) Activist links more than 26,000 twitter accounts to ISIS. New York Times, 31 March 2015. http://nytimes.com/2015/04/01/world/middleeast/activist-links-more-than-26000-twitter-accounts-to-isis.html Accessed 27 October 2016
Glaser A (2016) here’s what we know about Russia and the DNC hack. Wired 27 July 2016. https://www.wired.com/2016/07/heres-know-russia-dnc-hack, Accessed 31 August 2016
Hammes TX (2006) The Sling and the Stone: On War in the 21st Century. Zenith, Minneapolis
Hancock L, Wexler S (2014) Shadow Warfare: The History of America’s Undeclared Wars. Counterpoint Press, Berkeley
Hill R (2016) Bulk data collection by intelligence agencies breached human rights law. Public Technology.net 19 October 2016. https://www.publictechnology.net/articles/news/bulk-data-collection-intelligence-agencies-breached-human-rights-law Accessed 23 November 2016
Hippler Th (2013) Bombing the People: Giulio Douhet and the Foundations of Air-Power Strategy, 1884–1939. Cambridge University Press, Cambridge
Hoffman FG (2007) Conflict in the 21st Century: the rise of hybrid wars. The Potomac Institute for Policy Studies, Arlington
House JM (1993) Military Intelligence, 1870–1991. A Research Guide. Greenwood Press, Westport, CN
Howard Ph (2011) opening closed regimes: what was the role of social media during the Arab Spring? http://philhoward.org/opening-closed-regimes-regimes-what-was-the-role-of-social-media-during-the-arab-spring/ Accessed 29 November 2016
Illeris K (2004) Adult education and adult learning. Krieger, Malabar FL
Immerman R (2010) The CIA in Guatemala: the foreign policy of intervention. University of Texas Press, Austin
Ingram Ph (2015) US DoD website hacked by IS. Security News Desk 21 March 2015 http://www.securitynewsdesk.com/us-dod-website-hacked-by-is Accessed 24 September 2015
Kalathil S, Boas TC (2003) Open networks, closed regimes: the impact of the internet on authoritarian rule. Carnegie Endowment, New York
Kaldor M (2012) New & Old Wars: Organized Violence in a Global Era. Stanford University Press, Stanford
Kaplan R (2010) Monsoon: The Indian Ocean and the Future of American Power. Random House, New York
Kingah S, Quiliconi C (eds) (2016) Global and Regional Leadership of BRICS Countries. Springer, New York
Kitzen MWM (2016) The Course of Co-option. Dissertation, University of Amsterdam
Klang M, Murray A (2005) Human rights in the digital age. Glasshouse, London
Kuperwasser Y (2007) Lessons From Israel’s Intelligence Reforms. The Brookings Institution, Washington DC
Lander S (2004) International intelligence co-operation: an inside perspective. Cambridge review of international affairs 17(3):481–493
Liddell Hart BH (1971) Why don’t we learn from history? Allen Unwin, London
Long NE (1949) Power and Administration. Public Administration Review 9(4):257–264
MacAskill E, Dance G, Cage F, Chen G, Popovich N (2013) NSA files decoded: Edward Snowden’s surveillance revelations explained. https://www.theguardian.com/us-news/the-nsa-files Accessed 13 October 2016
Mahdi W (2002) The Internet Factor in Indonesia: Was that All? Paper presented at the 54th Annual Meeting of the Association for Asian Studies, Washington D.C. 4–7 April 2002
Malis C (2012) Unconventional Forms of War. In: Lindley-French J, Boyer Y (eds) The Oxford Handbook of War. Oxford University Press, Oxford, pp 185–198
Manwaring MG, Corr EG (eds) (2008) Insurgency, Terrorism, and Crime: Shadows From the Past and Portents for the Future. University of Oklahoma Press, Oklahoma City
Markoff J (2016) Automated pro-Trump bots overwhelmed pro-Clinton messages, researchers say. New York Times 17 November 2016. http://www.nytimes.com/2016/11/18/technology/automated-pro-trump-bots-overwhelmed-pro-clinton-messages-researchers-say.html?smprod=nytcore-ipad&smid=nytcore-ipad-share&_r=0 Accessed 23 November 2016
Marsick VJ, Watkins KE (2005) Learning organization. In: English LM (ed) International Encyclopedia of Adult Education. Palgrave, London pp 355–360
McCulloh T, Johnson R (2013) Hybrid Warfare, JSOU Report 13-4. Joint Special Operations University, MacDill Air Force Base
Merriam SB, Caffarrella RS, Baumgartner LS (2012) Learning in Adulthood. Jossey-Bass, San Francisco
Metselaar MV (1997) Understanding failures in intelligence estimates – UPROFOR, the Dutch, and the Bosnian-Serb attack on Srebrenica. In: Soeters J, Rovers JH (eds) (1997) The Bosnian Experience. Royal Netherlands Military Academy, Breda, pp. 23–50
Mozur P, Scott M (2016) Fake news in U.S. Election? Elsewhere, that’s nothing new. New York Times 17 November 2016. http://www.nytimes.com/2016/11/18/technology/fake-news-on-facebook-in-foreign-elections-thats-not-new.html?smprod=nytcore-ipad&smid=nytcore-ipad-share Accessed 23 November 2016
Murray W, Sennreich R (eds) (2006) The past as prologue. The importance of history to the military profession. Cambridge University Press, Cambridge
Olmsted KS (1996) Challenging the Secret Government: The Post-Watergate Investigations of the CIA and the FBI. University of North Carolina Press, Chapel Hill. New York Times, Intelligence Report on Russian hacking. 6 January 2017. http://www.nytimes.com/interactive/2017/01/06/us/politics/document-russia-hacking-report-intelligence-agencies.html?_r=0 Accessed 9 January 2017
Perrow Ch (1999) Normal Accidents. Living with High-Risk Technologies. Basic Books, New York
Safranek R (2012) The Emerging Role of Social Media in Political and Regime Change. ProQuest Discovery Guide: 2–10
Salih KEO (2013) The Roots and causes of the 2011 Arab Uprisings. Arab Studies Quarterly:185–203. http://www.pinxit.com/page101/page115/downloads-23/files/Arab_Spring_Causes.pdf
Scholte AJ (2000) Globalization: a critical introduction. St. Martin’s, New York
Segers RT (2008) (ed) A New Japan for the Twenty-First Century. Taylor & Francis, London
Smith R (2005) The Utility of Force: The Art of War in the Modern World. Allen Lane, London
Soengas X (2013) The Role of the Internet and Social Networks in the Arab Uprisings – An Alternative to Official Press Censorship. Comunicar, 21(41):147–155
Stuenkel O (2015) The BRICs and the Future of Global Order. Lexington Books, Lanham
Thompson PG (2014) Armed Groups: The 21st Century Threat. Rowman and Littlefield, London
Toffler A (1980) The Third Wave. Bantam Books, New York
Treverton GF, Agrell W (2009) National Intelligence Systems: Current Research and Future Prospects. Cambridge University Press, New York
United Nations (2000) Report of the Panel on United Nations Peace Operations
Vanden Berghe Y (2008) De Koude Oorlog. Een nieuwe geschiedenis (1917–1991). ACCO, Leuven and Voorburg
Warrick J and Wright R (2008) U.S. Teams weaken insurgency in Iraq. Washington Post 6 September 2008. http://washingtonpost.com/wp-dyn/content/article/2008/09/05/AR2008090503933.html Accessed 1 October 2016
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 T.M.C. Asser Press and the authors
About this chapter
Cite this chapter
Baudet, F., Braat, E., van Woensel, J., Wever, A. (2017). Military Intelligence: From Telling Truth to Power to Bewilderment?. In: Baudet, F., Braat, E., van Woensel, J., Wever, A. (eds) Perspectives on Military Intelligence from the First World War to Mali. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-183-8_1
Download citation
DOI: https://doi.org/10.1007/978-94-6265-183-8_1
Published:
Publisher Name: T.M.C. Asser Press, The Hague
Print ISBN: 978-94-6265-182-1
Online ISBN: 978-94-6265-183-8
eBook Packages: Law and CriminologyLaw and Criminology (R0)