Skip to main content

The Strategic Intelligence Community

  • Chapter
  • First Online:
Intelligence Security in the European Union

Part of the book series: New Security Challenges ((NSECH))

Abstract

This chapter introduces the concept of intelligence and elaborates on its meaning, theoretical foundations, explanatory properties and cognitive values. The meaning of strategic intelligence is also explained. The concept of intelligence community is presented and discussed with reference to the related terms ‘security community’ and ‘epistemic community’. The cognitive framework explained in this chapter focuses on transnational network structures of bilateral or multilateral interconnections built on common strategic interests, congenial ideological bases and like-minded attitudes to national interests. Considerable differences in the understandings of the intelligence community by EU officials and government representatives are explained by the interpretation of the EU intelligence community as a distorted epistemic community.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Bibliography

  • Agrell, W. (2002). When everything is intelligence—Nothing is intelligence. The Sherman Kent center for intelligence analysis occasional papers, 1(4). At https://www.cia.gov/library/kent-center-occasional-papers/vol1no4.htm. Accessed 14 Sept 2012.

  • Agrell, W., & Treverton, G. F. (2015). National intelligence and science. Beyond the great divide in analysis and policy. Oxford/New York: Oxford University Press.

    Book  Google Scholar 

  • Akhgar, B., Yates, S., & Lockley, E. (2013). Introduction: Strategy formation in a globalized and networked age—A review of the concept and its definition. In B. Akhgar & S. Yates (Eds.), Strategic intelligence management. National security imperatives and information and communications technologies. Waltham/Kidlington: Butterworth-Heinemann.

    Google Scholar 

  • Altshuler, Y., et al. (Eds.). (2013). Security and privacy in social networks. New York/Heidelberg/Dordrecht/London: Springer.

    Google Scholar 

  • Antoniades, A. (2003). Epistemic communities, epistemes and the construction of (world) politics. Global Society, 17(1), 21–38.

    Article  Google Scholar 

  • Babcock, C. (2010). The cloud revolution. How cloud computing is transforming business and why you can’t afford to be left behind. New York/Chicago/San Francisco: McGraw-Hill.

    Google Scholar 

  • Bamford, P. (2004). Pretext for war: 9/11, Iraq, and the abuse of America’s intelligence agencies. New York: Doubleday.

    Google Scholar 

  • Barger, D. G. (2005). Toward a revolution in intelligence affairs. RAND Technical Report TR-242. Santa Monica: RAND Corporation.

    Google Scholar 

  • Bean, H. (2011). No more secrets: Open source information and the reshaping of U.S. intelligence. Santa Barbara/Denver/London: Praeger.

    Google Scholar 

  • Ben-Zvi, A. (1976). Hindsight and foresight: A conceptual framework for the analysis of surprise attack. World Politics, 28(3), 381–395.

    Article  Google Scholar 

  • Berkowitz, B. D., & Goodman, A. E. (1989). Strategic intelligence for American national security. Princeton: Princeton University Press.

    Google Scholar 

  • Betts, R. K. (2000). Is strategy an illusion? International Security, 25(2), 5–50.

    Article  Google Scholar 

  • Betts, R. K. (2003). Politicization of intelligence: Costs and benefits. In R. K. Betts, & Th. G. Mahnken (Eds.), Paradoxes of strategic intelligence: Essays in honor of Michael I. Handel. London: Frank Cass.

    Google Scholar 

  • Betts, R. K. (2007). Enemies of intelligence: Knowledge and power in American national security. New York/Chichester: Columbia University Press.

    Google Scholar 

  • Blanken, L. J. (2012). Reconciling strategic studies … with itself: A common framework for choosing among strategies. Defense & Security Analysis, 28(4), 275–287.

    Article  Google Scholar 

  • Boren, D. L. (1992). The intelligence community: How crucial? Foreign Affairs, 71(3), 52–62.

    Article  Google Scholar 

  • Bozeman, A. B. (1992). Strategic intelligence & statecraft: Selected essays. Washington, DC: Brassey’s.

    Google Scholar 

  • Bowman, E. C. (2012). Intelligence, Surveillance, and Reconnaissance Processing, Exploitation, and Dissemination System in Support of Global Strike in 2035. Maxwell AFB: Air War College.

    Google Scholar 

  • Breakspear, A. (2013). A new definition of intelligence. Intelligence and National Security, 28(5), 678–693.

    Article  Google Scholar 

  • Brown, S. D. (2007). The meaning of criminal intelligence. International Journal of Police Science & Management, 9(4), 336–340.

    Article  Google Scholar 

  • Button, M. (2008). Doing security. Critical reflections and an agenda for change. Basingstoke/New York: Palgrave Macmillan.

    Google Scholar 

  • Cimbala, S. J. (1988). Amorphous wars. International Journal of Intelligence and Counterintelligence, 2(1), 73–89.

    Article  Google Scholar 

  • Clark, R. M. (2013). Intelligence analysis: A target-centric approach (4th ed.). Thousand Oaks: CQ Press.

    Google Scholar 

  • Clough, C. (2004). Quid Pro Quo: The challenges of international strategic intelligence cooperation. International Journal of Intelligence and CounterIntelligence, 17(4), 601–613.

    Article  Google Scholar 

  • Collins, J. M. (2002). Military strategy: Principles, practices, and historical perspectives. Washington, DC: Potomac Books.

    Google Scholar 

  • Dahl, E. J. (2011). The plots that failed: Intelligence lessons learned from unsuccessful terrorist attacks against the United States. Studies in Conflict and Terrorism, 34(8), 621–648.

    Article  Google Scholar 

  • Davis, J. (2002). Sherman Kent and the profession of intelligence analysis. The Sherman Kent Center for Intelligence Analysis Occasional Papers, 1(5). At https://www.cia.gov/library/kent-center-occasional-papers/vol1no5.htm. Accessed 18 Dec 2011.

  • Davis Cross, M. K. (2013a). Rethinking epistemic communities twenty years later. Review of International Studies, 39(1), 137–160.

    Article  Google Scholar 

  • Díaz Fernández, A. M. (2010). The Spanish intelligence community: A diffuse reality. Intelligence and National Security, 25(2), 223–244.

    Article  Google Scholar 

  • Dupont, A. (2003). Intelligence for the twenty-first century. Intelligence and National Security, 18(4), 15–39.

    Article  Google Scholar 

  • Einstein, A. (1954). Ideas and opinions. New York: Crown Publisher.

    Google Scholar 

  • Europol. (2000). Analytical guidelines. The Hague: Europol.

    Google Scholar 

  • Evans, G. (2009). Rethinking military intelligence failure—Putting the wheels back on the intelligence cycle. Defence Studies, 9(1), 22–46.

    Article  Google Scholar 

  • Fingar, T. (2011). Reducing uncertainty: Intelligence analysis and national security. Stanford: Stanford University Press.

    Google Scholar 

  • Flanagan, S. J. (1985). Managing the intelligence community. International Security, 10(1), 58–95.

    Article  Google Scholar 

  • Freedman, L. (2013). Strategy. A history. Oxford: Oxford University Press.

    Google Scholar 

  • Galbreath, D. J., & McEvoy, J. (2013). How epistemic communities drive international regimes: The case of minority rights in Europe. Journal of European Integration, 35(2), 169–186.

    Article  Google Scholar 

  • George, R. Z. (2008). The art of strategy and intelligence. In R. Z. George & J. B. Bruce (Eds.), Analyzing intelligence: Origins, obstacles, and innovations. Washington, DC: Georgetown University Press.

    Google Scholar 

  • George, R. Z., & Bruce, J. B. (Eds.). (2008). Analyzing intelligence: Origins, obstacles, and innovations. Washington, DC: Georgetown University Press.

    Google Scholar 

  • Gibson, S.D. (2004). Open Source Intelligence: An Intelligence Lifeline. Royal United Services Institute Journal, 149(1), 16–22.

    Google Scholar 

  • Gill, P. (2004). Securing the globe: Intelligence and the post-9/11 shift from ‘liddism’ to ‘drainism’. Intelligence and National Security, 19(3), 467–489.

    Article  Google Scholar 

  • Gill, P., & Phythian, M. (2006). Intelligence in an insecure world. Cambridge: Polity Press.

    Google Scholar 

  • Gill, P., & Phythian, M. (2012). Intelligence in an insecure world (2nd ed.). Cambridge: Polity Press.

    Google Scholar 

  • Gupta, R., & Brooks, H. (2013). Using social media for global security. Indianapolis: Wiley.

    Google Scholar 

  • Gutjahr, M.M.H. (2005). The Intelligence Archipelago: The Community's Struggle to Reform in the Globalized Era. Washington, DC: Joint Military Intelligence College.

    Google Scholar 

  • Haas, P. M. (1989). Do regimes matter? Epistemic communities and Mediterranean pollution control. International Organization, 43(3), 377–403.

    Article  Google Scholar 

  • Haas, P. M. (1992a). Introduction: Epistemic communities and international policy coordination. International Organization, 46(1), 1–35.

    Article  Google Scholar 

  • Haas, P. M. (1992b). Banning chlorofluorocarbons: Epistemic community efforts to protect stratospheric ozone. International Organization, 46(1), 187–224.

    Article  Google Scholar 

  • Hall, W. M., & Citrenbaum, G. (2010). Intelligence analysis: How to think in complex environments. Santa Barbara: ABC-CLIO.

    Google Scholar 

  • Handel, M. (1987). The politics of intelligence. Intelligence and National Security, 2(4), 5–46.

    Article  Google Scholar 

  • Handel, M. I. (2003). Intelligence and the problem of strategic surprise. In R. K. Betts & Th. G. Mahnken (Eds.), Paradoxes of strategic intelligence: Essays in honor of Michael I. Handel. London: Frank Cass.

    Google Scholar 

  • Heidenrich, J. G. (2007). The Intelligence Community’s Neglect of Strategic Intelligence. Studies in Intelligence, 51(2), 15−26.

    Google Scholar 

  • Herman, M. (1996). Intelligence power in peace and war. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Herrera, L. (2014). Revolution in the age of social media: The Egyptian popular insurrection and the internet. London/New York: Verso.

    Google Scholar 

  • Heuser, B. (2010). The evolution of strategy: Thinking war from antiquity to the present. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Hilsman, R., Jr. (1952). Intelligence and policy-making in international affairs. World Politics, 5(1), 1–45.

    Article  Google Scholar 

  • Hilsman, R. (1956). Strategic intelligence and national decisions. Glencoe: The Free Press.

    Google Scholar 

  • Hulnick, A. S. (1999). Fixing the spy machine: Preparing American intelligence for the 21st century. Westport: Praeger.

    Google Scholar 

  • Hulnick, A. S. (2006a). What’s wrong with the intelligence cycle. Intelligence and National Security, 21(6), 959–979.

    Article  Google Scholar 

  • Hulnick, A. S. (2006b). U.S. intelligence reform: Problems and prospects. International Journal of Intelligence and CounterIntelligence, 19(2), 302–315.

    Article  Google Scholar 

  • Jablonsky, D. (2004). Why is strategy difficult? In J. B. Bartholomees Jr. (Ed.), U.S. Army War College guide to national security policy and strategy. Strategic Studies Institute, U.S. Army War College: Carlisle.

    Google Scholar 

  • Jeffreys-Jones, R. (2011). Rise, fall and regeneration: From CIA to EU. In L. Scott, R. G. Hughes, & M. S. Alexander (Eds.), Intelligence and international security. New perspectives and agendas. London/New York: Routledge.

    Google Scholar 

  • Jervis, R. (2006). Reports, politics, and intelligence failures: The case of Iraq. Journal of Strategic Studies, 29(1), 3–52.

    Article  Google Scholar 

  • Johnson, L. K. (Ed). (2007a). Strategic intelligence, 4 vols. Westport/London: Praeger Security International.

    Google Scholar 

  • Johnson, L. K. (Ed). (2007b). Handbook of intelligence studies. London/New York: Routledge.

    Google Scholar 

  • Johnson, L. K., & Wirtz, J. J. (Eds.). (2004). Strategic intelligence: Windows into a secret world. Los Angeles: Roxbury.

    Google Scholar 

  • Johnson, J. L., Kartchner, K. M., & Larsen, J. A. (2009). Introduction. In J. L. Johnson, K. M. Kartchner, & J. A. Larsen (Eds.), Strategic culture and weapons of mass destruction: Culturally based insights into comparative national security policymaking. London/New York: Palgrave Macmillan.

    Chapter  Google Scholar 

  • Johnston, R. (2005a). Analytic Culture in the US Intelligence Community. Washington, DC: The Center for the Study of Intelligence.

    Google Scholar 

  • Kahn, D. (2009). An historical theory of intelligence. In P. Gill, S. Marrin, & M. Phythian (Eds.), Intelligence theory. Key questions and debates. Abingdon/New York: Routledge.

    Google Scholar 

  • Kendall, W. (1949). The function of intelligence. World Politics, 1(4), 542–552.

    Article  Google Scholar 

  • Kent, S. (1966). Strategic intelligence for American world policy. Princeton: Princeton University Press.

    Google Scholar 

  • Kindsvater, L. C. (2003). The need to reorganize the intelligence community: A senior officer’s perspective. Studies in Intelligence, 47(1), 33–37.

    Google Scholar 

  • Kirkpatrick, Jr., L. B. (1997). Intelligence. In B. W. Jentleson & Th. G. Paterson (Eds.), Encyclopedia of US foreign relations, vol. 2. Oxford/New York: Oxford University Press.

    Google Scholar 

  • Kozłowski, J., & Palacios-Coronel, J.-M. (2014). Single Intelligence Analysis Capacity (SIAC)—A part of the EU comprehensive approach. Impetus. Magazine of the EU Military Staff, 17, 10–11.

    Google Scholar 

  • Lander, S. (2004). International intelligence cooperation: An inside perspective. Cambridge Review of International Affairs, 17(3), 481–493.

    Article  Google Scholar 

  • Laqueur, W. (1985). A world of secrets: The uses and limits of intelligence. New York: Basic Books.

    Google Scholar 

  • Lefebvre, S. (2003). The difficulties and dilemmas of international intelligence cooperation. International Journal of Intelligence and CounterIntelligence, 16(4), 527–542.

    Article  Google Scholar 

  • Lerner, K. L., & Lerner, B. W. (2004). Tradecraft. In K. L. Lerner & B. W. Lerner (Eds.), Encyclopedia of espionage, intelligence, and security (Vol. 3). Detroit: Thomson Gale.

    Google Scholar 

  • Lowenthal, M. M. (2008). Intelligence: From secrets to policy (4th ed.). Washington, DC: CQ Press.

    Google Scholar 

  • Lykke, A. F., Jr. (1989). Military strategy: Theory and application. Carlisle: U.S. Army War College.

    Google Scholar 

  • Manosevitz, J. U. (2013). Needed: More thinking about conceptual frameworks for analysis—The case of influence. Studies in Intelligence, 57(4), 15–22.

    Google Scholar 

  • Marrin, S. (2009). Intelligence analysis and decision-making: Methodological challenges. In P. Gill, S. Marrin, & M. Phythian (Eds.), Intelligence theory. Key questions and debates. Abingdon/New York: Routledge.

    Google Scholar 

  • Marrin, S. (2011). Improving intelligence analysis. Bridging the gap between scholarship and practics. London/New York: Routledge.

    Google Scholar 

  • Marrin, S. (2012). Evaluating the quality of intelligence analysis: By what (mis) measure? Intelligence and National Security, 27(6), 896–912.

    Article  Google Scholar 

  • Maurer, A. C., Turnstall, M. D., & Keagle, J. M. (Eds.). (1985). Intelligence: Policy and process. Boulder: Westview Press.

    Google Scholar 

  • Mercado, S. C. (2004). Sailing the sea of OSINT in the information age. Studies in Intelligence, 48(3), 45–55.

    Google Scholar 

  • Mintz, A., & DeRouen, K., Jr. (2010). Understanding foreign policy decision making. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Moore, D. T. (2007). Critical thinking and intelligence analysis. Occasional Paper No. 14. Washington, DC: National Defense Intelligence College.

    Google Scholar 

  • Muller, D. G., Jr. (2008). Intelligence analysis in red and blue. International Journal of Intelligence and CounterIntelligence, 21(1), 1–12.

    Article  Google Scholar 

  • Munton, D., & Fredj, K. (2013). Sharing secrets: A game theoretic analysis of international intelligence cooperation. International Journal of Intelligence and CounterIntelligence, 26(4), 666–692.

    Article  Google Scholar 

  • Nicander, L. D. (2011). Understanding intelligence community innovation in the post-9/11 world. International Journal of Intelligence and CounterIntelligence, 24(3), 534–568.

    Article  Google Scholar 

  • Olcott, A. (2014). Open source intelligence in a networked world. London/New York: Continuum.

    Google Scholar 

  • Omand, D. (2010). Creating intelligence communities. Public Policy and Administration, 25(1), 99–116.

    Article  Google Scholar 

  • Omand, D. (2013). The intelligence cycle. In R. Dover, M. S. Goodman, & C. Hillebrand (Eds.), Routledge companion to intelligence studies. London: Routledge.

    Google Scholar 

  • Papacharissi, Z. (2009). The virtual geographies of social networks: A comparative analysis of Facebook, LinkedIn and A SmallWorld. New Media & Society, 11(1–2), 199–220.

    Article  Google Scholar 

  • Phythian, M. (2005). Intelligence, policy-making and the 7 July 2005 London bombings. Crime, Law & Social Change, 44(4-5), 361–385.

    Article  Google Scholar 

  • Phythian, M. (Ed.). (2013a). Understanding the intelligence cycle. London/New York: Routledge.

    Google Scholar 

  • Politi, A. (Ed.). (1998a) Towards a European intelligence policy. Chaillot Paper No. 34. Paris: Institute for Security Studies of the WEU.

    Google Scholar 

  • Rathmell, A. (2002). Towards postmodern intelligence. Intelligence and National Security, 17(3), 87–104.

    Article  Google Scholar 

  • Richards, J. (2010). The art and science of intelligence analysis. Oxford/New York: Oxford University Press.

    Google Scholar 

  • Richelson, J. T. (1999). The U.S. intelligence community (4th ed.). Boulder/Oxford: Westview Press.

    Google Scholar 

  • Richelson, J. T. (2012). The U.S. intelligence community (6th ed.). Boulder: Westview Press.

    Google Scholar 

  • Robertson, S. (1997). Intelligence-led policing: A European Union view. In A. Smith (Ed.), Intelligence-led policing. International perspectives on policing in the 21st century. Lawrenceville: IALEIA.

    Google Scholar 

  • Rolington, A. (2013). Strategic intelligence for the 21st century. The mosaic method. Oxford: Oxford University Press.

    Google Scholar 

  • Rovner, J. (2011). Fixing the facts: National security and the politics of intelligence. Ithaca: Cornell University Press.

    Google Scholar 

  • Rovner, J. (2013). Is politicization ever a good thing? Intelligence and National Security, 28(1), 55–67.

    Article  Google Scholar 

  • Russell, R. L. (2007a). Sharpening strategic intelligence. Why the CIA gets it wrong, and what needs to be done to get it right. Cambridge/New York: Cambridge University Press.

    Book  Google Scholar 

  • Sebenius, J. K. (1992). Challenging conventional explanations of international cooperation: Negotiation analysis and the case of epistemic communities. International Organization, 46(1), 323–365.

    Article  Google Scholar 

  • Shelton, C. (2011). The roots of analytic failures in the U.S. Intelligence community. International Journal of Intelligence and CounterIntelligence, 24(4), 637–655.

    Article  Google Scholar 

  • Sims, J. E. (2005). Understanding friends and enemies: The context for American intelligence reform. In J. E. Sims & B. Gerber (Eds.), Transforming US intelligence. Washington, DC: Georgetown University Press.

    Google Scholar 

  • Staar, R. F. (2003). The US intelligence community. Review of Policy Research, 20(4), 713–726.

    Article  Google Scholar 

  • Steele, R. D. (2002). The new craft of intelligence. Personal, public, & political. Oakton: OSS International Press.

    Google Scholar 

  • Strang, S. J. (2014). Network analysis in criminal intelligence. In A. J. Masys (Ed.), Networks and network analysis for defence and security. Heidelberg: Springer.

    Google Scholar 

  • Sullivan, J. P. (2007). The new great game: Military, police and strategic intelligence for global security. Journal of Policing, Intelligence and Counter Terrorism, 2(2), 15–29.

    Article  Google Scholar 

  • Terranova, T. (2004). Network culture: Politics for the information age. Ann Arbor: Pluto Press.

    Google Scholar 

  • Treverton, G. F. (2001). Reshaping national intelligence in an age of information. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Treverton, G. F. (2005). Foreword. In R. Johnston (Ed.), Analytic culture in the US intelligence community. Washington, DC: The Center for the Study of Intelligence.

    Google Scholar 

  • Treverton, G. F. (2009). Intelligence for an age of terror. Cambridge/New York: Cambridge University Press.

    Book  Google Scholar 

  • Trottier, D. (2012). Social media as surveillance: Rethinking visibility in a converging world. Farnham/Burlington: Ashgate.

    Google Scholar 

  • Tucker, D. (2014). The end of intelligence: Espionage and state power in the information age. Stanford: Stanford University Press.

    Google Scholar 

  • Turner, S. (1991). Intelligence for a new world order. Foreign Affairs, 70(4), 150–166.

    Google Scholar 

  • Van Cleave, M. (2007). Strategic counterintelligence: What is it, and what should we do about it? Studies in Intelligence, 51(2), 1–13.

    Google Scholar 

  • Walters, V. (1978). Silent missions. Garden City: Doubleday.

    Google Scholar 

  • Waltz, E. (2003). Knowledge management in the intelligence enterprise. Boston/London: Artech House.

    Google Scholar 

  • Warner, M. (2009). Intelligence as risk shifting. In P. Gill, S. Marrin, & M. Phythian (Eds.), Intelligence theory. Key questions and debates. Abingdon/New York: Routledge.

    Google Scholar 

  • Westerfield, H. B. (1996). America and the world of intelligence liaison. Intelligence and National Security, 11(3), 523–560.

    Article  Google Scholar 

  • Wheaton, K. J. (2011). Teaching strategic intelligence through games. International Journal of Intelligence and CounterIntelligence, 24(2), 367–382.

    Article  Google Scholar 

  • Wheaton, K. J., & Beerbower, M. T. (2006). Towards a new definition of intelligence. Stanford Law & Policy Review, 17(2), 319–331.

    Google Scholar 

  • White, C. M. (2012). Social media, crisis communication, and emergency management. Leveraging Web 2.0 technologies. Boca Raton/London/New York: CRC Press.

    Google Scholar 

  • Wippl, J. W. (2012). Intelligence exchange through interintel. International Journal of Intelligence and CounterIntelligence, 25(1), 1–18.

    Article  Google Scholar 

  • Wohlstetter, R. (1965a). Cuba and Pearl Harbor: Hindsight and foresight. Memorandum RM-4328-ISA. Santa Monica: RAND Corporation. At http://www.rand.org/content/dam/rand/pubs/research_memoranda/2007/RM4328.pdf. Accessed 2 Dec 2012.

  • Wohlstetter, R. (1965b). Cuba and Pearl Harbor: Hindsight and foresight. Foreign Affairs, 43 (4), 691–707.

    Google Scholar 

  • Woodard, N. (2013). Tasting the forbidden fruit: Unlocking the potential of positive politicization. Intelligence and National Security, 28(1), 91–108.

    Article  Google Scholar 

  • Xu, M. (Ed.). (2007). Managing strategic intelligence: Techniques and technologies. Hershey/London: Information Science Reference.

    Google Scholar 

  • Xu, M., & Kaye, R. (2007). The nature of strategic intelligence, current practice and solutions. In M. Xu (Ed.), Managing strategic intelligence: Techniques and technologies. Hershey/London: Information Science Reference.

    Chapter  Google Scholar 

  • Yarger, H. R. (2006). Strategic theory for the 21st century: The little book on big strategy. Carlisle: Strategic Studies Institute, U.S. Army War College.

    Google Scholar 

  • Zegart, A. B. (1999). Flawed by design: The evolution of the CIA, JCS, and NSC. Stanford: Stanford University Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Copyright information

© 2016 The Author(s)

About this chapter

Cite this chapter

Gruszczak, A. (2016). The Strategic Intelligence Community. In: Intelligence Security in the European Union. New Security Challenges. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-45512-3_2

Download citation

Publish with us

Policies and ethics