- the politics of secrecy - - university of warwick · web viewthe politics of intelligence and...

77
The University of Warwick Department of Politics and International Studies THE VIGILANT STATE: THE POLITICS OF INTELLIGENCE AND SECRECY PO382 Undergraduate Module Handbook, 2010-11 – updated 2 Oct 2010 Lectures (Term 1) Wednesday 11.00 PS1.28 Lectures (Terms 2 & 3)Wednesday 11.00 MS.03 Seminars Thursday 10.00 S1.69 Thursday 11.00 S1.69 Thursday 2.00 S0.03 Thursday 4.00 S0.03 Module tutors: Richard J. Aldrich & Antony Field [email protected] [email protected] 1

Upload: vuongdiep

Post on 04-May-2018

214 views

Category:

Documents


1 download

TRANSCRIPT

The University of Warwick

Department of Politics and International Studies

THE VIGILANT STATE:

THE POLITICS OF INTELLIGENCE AND SECRECY

PO382

Undergraduate Module Handbook, 2010-11 – updated 2 Oct 2010

Lectures (Term 1) Wednesday 11.00 PS1.28Lectures (Terms 2 & 3) Wednesday 11.00 MS.03

Seminars Thursday 10.00 S1.69Thursday 11.00 S1.69Thursday 2.00 S0.03Thursday 4.00 S0.03

Module tutors: Richard J. Aldrich & Antony Field

[email protected]@warwick.ac.uk

Office hours: Tuesday 12.00-1.00 (Aldrich)Wednesdays 12.00-1.00 (Aldrich)

Thursday 1.00-2.00 (Field)

Office BO.12Tel: (024765) 74074

1

THE VIGILANT STATE:

THE POLITICS OF INTELLIGENCE AND SECRECY

Contents

Module aims and objectives 3

Assessment 4-5

Non-Assessed Essays 5

Assessed Essays 6-7

Lecture schedule 8

Seminar schedule 9

Approach to Reading and Key Material 10

Reading List 12

2

* The title of this module draws its inspiration from Bernard Porter, The Origins of the Vigilant State: The London Metropolitan Police Special Branch

before the First World War (1991).

Module Overview

This module aims to investigate the nature of the 'vigilant state'. It focuses upon the apparatus developed by modern states to permit the surveillance of both international and domestic threats to their security. It will examine the major competing theories concerning the repeated failure of the vigilant state in the face of surprise attack at the international level, subjecting these to careful comparative analysis and reviewing the competing theoretical explanations. Consideration will be given to the role of domestic political monitoring within both democratic and authoritarian states. Attention will also be given to the problem of reconciling clandestine and/or covert methods, traditionally associated with operational efficiency, with the degree of transparency and accountability normally expected of the executive of a democratic state. The final section of the module will turn to look at the future development of some of these issues against a background of rapid technical change and globalisation.

In short, this module aims to introduce to the various debates that have characterised the use of secret service by the state in the international and domestic context. Although the terms 'espionage', 'intelligence' and 'secret service' are all central to the concerns of this module they have been deliberately avoided in the above module description given in the handbook. This is because this module aims to situate all these things in a broader governmental context, viewing them as aspects of international statecraft or as constitutional problems or as issues of civil rights. Accordingly, this module is as much about how policy-makers make use, or fail to make use, of intelligence, and how secret services might be regulated within a constitutional framework, as about the practice of secret service itself.

Aims - The module aims to:

develop an understanding of the origins and developments of intelligence services

explore the main theoretical approaches to intelligence and surveillance

offer an understanding of the issues surrounding intelligence failure

analyse key ethical and policy dilemmas and issues raised by CT intelligence

assess the contemporary debates about globalization and the future of intelligence

Objectives- On completion of this module, you should be able to:

3

demonstrate an appreciation of the historical context of intelligence

critically discuss the characteristics of the accountability frameworks

assess the strengths and weaknesses of the key theoretical debates governing the intelligence cycle

critically analyse, both orally and in writing, the current issues facing national and regional approaches to intelligence

Learning Methods

There will be a weekly lecture and a weekly seminar running through the academic year. This is a lecture and seminar-based module, entailing a 40 min lecture by Richard Aldrich on Wednesdays. This will be followed on Thursday by a seminar discussion of the previous week's topic, led by Antony Field, with student presentations and structured student interaction (in the form of group discussion, for example). Students are expected to complete the essential reading for each week and to actively contribute to the discussion. Students are further expected to engage in independent study, employing the reading lists and other sources to deepen their knowledge of the subject.

MODULE ASSESSMENT

The mode of assessment for this module is via one of three methods:

(a) Two assessed essays (each equating to 50% of your final mark).

(b) A 3 hour, 4 question, unseen exam paper

(c) One assessed essay plus a 2 question, 1½ hour unseen exam (each equating to 50% of your final mark).

All students handing in assessed work should ensure that they are aware of therelevant information in the Undergraduate Handbook.

ESSAY GUIDELINES

- for the assessed 5,000 word essay, you can either choose a title from the Assessed Essay title list, or alternatively you can negotiate your own title. I recommend the former.

- if you negotiate a title with your tutor you must submit a title form to the office by the Negotiated Title Deadline listed in the PAIS Undergraduate Handbook 2009/2010.

4

- do not produce fact-hogging 'term papers' on 'topics' as they will get low marks

- pay attention to identifying where the schools of thought are

- make sure you produce an essay that answers the question directly

- get it in 24 hrs before the deadline to allow for computer problems

- DON'T MISS THE DEADLINES

ESSAY QUESTIONS ARE LISTED HERE

Non-assessed Essays (Formative)

1,500 WORDS FOR 14 JANUARY - OPTIONAL - NOT COMPULSORY

1. Are we best defining intelligence largely in terms of "information" or in terms of "secrets"?

2. Could some small states now abandon secret collection through human and technical methods, in favour of harnessing abundant open sources?

3. Consider Michael Handel’s view that surprise attacks are best explained in terms of "paradoxes" ? Are these paradoxes impossible to resolve?

4. Why are leadaer typically poor consumers of intelligence?

5. Why has most sharing of intelligence traditionally occured through cautious bilateral relationships. Has this changed since 9/11?

6 Reading Week

7 "9/11 was not primarily a failure of intelligence but a failure of counter-terrorism policy over the previous decade" Discuss

8 Why have conspiratorial accounts of 9/11 proved to be prevalent in the United States and what can we learn from this?

9 Given that Iraqi WMD was a familiar 'Cold War Type' intelligence problem of strategic weapons estimates, why did western agencies get this so wrong?

5

10 How might we better reconcile effective counter-terrorist intelligence with the protection of civil liberties?

11 "The paramilitaries in Northern Ireland were largely defeated thought the remorseless application of intelligence pressure." Discuss.

12 How has US counter-terrorist intelligence activity changed since January 2009?

13 Was secret policing the defining characteristic of Stalin's Russia?

Assessed Essay Titles (Summative) 5,000 words

1. Is it is useful to talk about secret intelligence as a form of 'soft power', as defined by Joseph Nye? And does it need hard power to make it effective?

2 Western states have spent most of their budgets on technical collection (sigint and imint) rather than humint and opint. Was this a mistake?

3 Does warning of surprise attacks fail more because of bureaucratic obstacles or psychological obstacles to a smooth intelligence process?

4 How can intelligence analysts serve decision makers directly and yet be insulated from politicization by the policy process?

5 What are the main hazards presented by intelligence co-operation between states?

6 Reading Week

7 Critically assess Amy Zegart's assertion that the intelligence failures that resulted in 9/11 reflect a refusal to adapt?

8 How far was the Iraqi WMD fiasco in the USA a product of 'intelligence failure' or else a product of interference by policy-makers and politicians?

9 Why does gathering intelligence in the counter-terrorist context present the liberal state with special problems and dilemmas?

10a Examine how US counter-terrorist intelligence changed since 9/11 in pursuit of the 'new terrorism'.

6

10b How might current UK counter-terrorism intelligence be reformed and improved?

11 Propaganda and not state security agencies were the defining characteristic of Hitler's Germany and Stalin's Russia. Discuss.

12a Assess the effectiveness of the UK Intelligence and Security Committee. How might it be improved?

12b How might we go about extending accountability to intelligence operations involving more then one country?

13 Is the increase in surveillance over the last ten years down to the “cult of counter-terrorism” or do all technological societies and knowledge-based economies naturally produce ‘states of surveillance’ ?

14 'Espionage can deploy ethical codes - but it can never be moral'. Discuss.

15a If an ethical case can be made for shooting an armed bank robber to save lives, then a case can be made for torture during interrogation. Discuss.

15b What exactly is assassination and can an ethical case ever be made for its use as part of state policy?

17 How far would you agree with W. Scott Lucas’s assertion that CIA cultural activities during the Cold War indicate ideological aggression?

18 Use the Fortitude D-Day Deception Campaign to explain the role of intelligence in assisting wartime deception.

19a Should intelligence officers serve as clandestine peace brokers? What advantages and disadvantages do they have?

19b Does intelligence generate transparency and therefore produce a safer and more stable world? Or does it create risk? [You may answer this with reference to the Cold War period, or to post 1989]

20 How should intelligence change to meet the myriad challenges of globalization?

21 We have a narrowly Anglo-American typology of intelligence. How might this be adapted to reflect intelligence ideas and practices elsewhere in the world?

7

MODULE TIMETABLE

LECTURES - WEDNESDAYS

A: INTRODUCTION

1 What is secret intelligence? 6 Oct in F1.11 Enginering

B: FOREIGN INTELLIGENCE

2 In the field: the gritty problems of collection 7 Oct in SO.212a Steve Hewitt on Human Agents and Informers 20 Oct in PS1.283 Estimates and interpretation: the problems of analysis 27 Oct in PS1.284 Intelligence at the top: producer-consumer linkage 3 Nov in PS1.285 Reading Week: No Lectures 8-12 Nov 6 Liaison: the delicate diplomacy of intelligence 17 Nov in PS1.28

C: COUNTER-TERRORISM AND SECURITY

7 9/11 - What kind of failure 24 Nov in PS1.288 Proliferation and WMD - the Iraq Case 1 Dec in PS1.289 Intelligence and the liberal state: counter-terrorism [VIDEO] 8 Dec10 Intelligence and counter-terrorism: the market state 8 Dec in PS1.2811 Intelligence and Tyranny: the non-democratic State 12 Jan in MS.03

D: CONTROLLING INTELLIGENCE12 The problems of accountability and democratic control 19 Jan in MS.0313 The problems of civil rights and intelligence 26 Jan in MS.0314 Ethics and Espionage 2 Feb in MS.0315 Torture and Assassination 9 Feb in MS.03

8

16 Reading Week 14-19 Feb

E. INTELLIGENCE AND THE NEW WARFARE

17 Covert Action 23 Feb in MS.0318 Intelligence and Deception 2 Mar in MS.0319 Intelligence for NGOs and Peacekeeping 9 Mar in MS.03

F: THE FUTURE OF INTELLIGENCE

20 Intelligence in a globalising world 16 March in MS.0321 Revision Q&A session 27 April in MS.03

SEMINAR -THURSDAYS

A: INTRODUCTION

1 Meet to assign seminars and roles 7 Oct2 What is secret intelligence? 14 Oct

B: FOREIGN INTELLIGENCE

3 In the field: the gritty problems of collection 21 Oct4 Estimates and interpretation: the problems of analysis 28 Oct5 Intelligence at the top: producer-consumer linkage 4 Nov6 Reading Week: No Lectures 8-12 Nov7 Liaison: the delicate diplomacy of intelligence 18 Nov

C: COUNTER-TERRORISM AND SECURITY

8 9/11 - What kind of failure 25 Nov9 Proliferation and WMD - the Iraq Case 2 Dec10 Intelligence and the liberal state: counter-terrorism 9 Dec11 Intelligence and counter-terrorism: the market state 13 Jan12 Intelligence and Tyranny: the non-democratic state 20 Jan

D: CONTROLLING INTELLIGENCE13 The problems of accountability and democratic control 27 Jan14 The problems of civil rights and intelligence 3 Feb15 Ethics and Espionage 10 Feb16 Reading Week 14-19 Feb17 Torture and Assassination 24 Feb

9

E. INTELLIGENCE AND THE NEW WARFARE

18 Covert Action 3 Mar19 Intelligence and Deception 10 March20 Intelligence for NGOs and Peacekeeping 17 March

F: THE FUTURE OF INTELLIGENCE

21 Intelligence in a globalising world 28 April

APPROACH TO READING & KEY MATERIAL

1. Quantity and Quality of Reading

The module text books. You are expected to read widely, but selectively. As a broad guideline, for most essays, semester-time or exam-time, it is sufficient to look at the two course text books, two additional books and four articles. There is a lot of reading on this list because different books address different essay titles under each topic heading, and also because I wish to ensure an ample supply of literature.

Please note that this is a new module at Warwick, confronting the Library with the problem of trying to acquire a lot of books that are now out of print. They have done wonders. They do not yet have everything on the bibliography - but they have secured quite a lot of material. If it is not yet there I have entered NIL - but new stuff is arriving all the time, so if the class mark is not added, that does not mean its not there.

This is a fast-moving subject, never more so than the last few years. Accordingly, journal articles are increasingly important. Warwick has everything we need here so if in doubt head for the journal articles. Many of the best ones are collected in the various edited collections/readers.

Subject to legal and operational requirements, copies of all core readings are available either in the Library Short Loan Collection (SLC), Learning Grid or online. If a core reading is not available in this manner, you should consult the Subject Librarian and your module tutor.

2. Case StudiesYou may approach your essays in a variety of different ways. You may wish to write a broad generic essay (and this is a broad generic module) or you may wish to choose to answer a question by focusing upon one or a number of case studies. HOWEVER, YOU

10

MUST BE CLEAR THAT CASE STUDIES IN THIS MODULE ARE INTENDED TO THROW LIGHT UPON GENERAL IDEAS AND PRINCIPLES, NOT VICE VERSA.

3. Module text book -

Six other books/readers that overview well are available - >

* Peter Gill and Mark Pythian, Intelligence in an Insecure World (Cambridge: Polity 2006) UB 250.I6

* M. Herman, Intelligence Power in Peace and War (Cambridge: Cambridge University Press, 1996) & UB 250.H3

L. Johnson & J. Wirtz (eds.), Intelligence and National Security: The Secret World of Spies OUP UB 250.I6

M.M. Lowenthal, Intelligence: From Secrets to Policy (Third Edition -Washington DC: CQ Press, 2006) UB 271.U6

D. Omand, Securing the State (Hurst/Columbia University Press, 2010)

A. Shulsky, Silent Warfare: Understanding the World of Intelligence (NY: Brasseys, 2nd edition 1993) UB 250.S4

5. JournalsThe key journal is - INTELLIGENCE AND NATIONAL SECURITY abbreviated INS. We are missing 1991-6, but the key material from these issues has kindly been scanned for us by the library, so this is not a problem.

Another useful journal is THE INTERNATIONAL JOURNAL OF INTELLIGENCE AND COUNTERINTELLIGENCE

6. Key Handbooks: The major edited collections of essays for this subject are:

a. Loch Johnson (ed.) Strategic Intelligence - 5 Volumes UB 250.S6385

11

* CM Andrew, R.J. Aldrich & W.K. Wark (eds), Secret Intelligence: A Reader (London: Routledge, December 2008). 540pp. 978-0-415-42024-2 UB 250.S3

The Andrew/Aldrich/Wark reader is closely attuned to your module for obvious reasons. It also has reading lists and seminar questions.

b. Loch Johnson (ed.) Handbook of Intelligence Studies JC 842.H2

c. Loch Johnson (ed.) Oxford Handbook of National Security Intelligence Studies

7. Coursework SupportAs your module co-ordinator for the Politics element please contact me if you have any difficulties with the course or the course work. We are available to see you in Room BO.12 in Politics on Tues at 12, Wednesday at 12 or Thursday at 1.00 You can also contact me us by e-mail at [email protected] or [email protected]

8. Module EvaluationFeedback and evaluation are crucial to the success of any module. We want students to have their say on Politics modules. If there are problems with book availability please raise it with the tutors for the module immediately.

A: INTRODUCTION

1 What is intelligence?

Seminar paper questions

1.1 To what extent does the nature and value of 'intelligence' differ from 'information'?

1.2 Why has secret intelligence constituted a growth industry since 1945?

1.3 How far do you accept Michael Herman's contention that it is useful to talk about secret intelligence as a form of 'state power', akin to economic or military power?

1.4 How far do you accept Michael Warner's definition that "Intelligence is secret, state activity to understand or influence foreign entities." ?

Books - Core ReadingAndrew, Aldrich & Wark (eds), Secret Intelligence Chs.1&2 UB 250.S6B. Berkowitz and A. Goodman, Strategic Intelligence for American National Security UB.250.B3 P. Gill, S. Marrin & M Pythian, Intelligence Theory: Key Questions and Debates Chs 2, 3, 4, 5. UB 250.I6M. Herman, Intelligence Power, chs 1-3, 7, 21, UB 250.H3 L.K. Johnson & J. J. Wirtz, Intelligence and National Security: The Secret World of Spies UB 250.I6L. Krizan, Intelligence Essentials for Everyone [a good short primer] UB 271.U6Mark Lowenthal, Intelligence: From Secrets to Policy chapter 1. UB 271.U6

Books - Supplementary ReadingA. Dulles, The Craft of Intelligence [old but a good primer] UB 270.DB

12

J.R. Ferris, Intelligence and Strategy NILPeter Gill and Mark Pythian, Intelligence in and Insecure World, chapters 1 & 2. UB 270.G535R. Godson, Intelligence Requirements, vols 1-4, UB 250.I6Michael Herman, Intelligence Services in the Information Age UB 250.H47 chapter 1.L. Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of Government esp. chapters 1-3 UB 250.S6385 REF ONLY R.V. Jones, Reflections on Intelligence NILJ. Keegan, Intelligence in War, pp. 7-26, 321-52 NILS. Kent, Strategic Intelligence for American World Policy chapter 1 UB 250.K3W. Laqueur, World of Secrets: The Uses and Limits of Intelligence pp.4-70 UB 271.U6R.P. Pfaltzgraff et al (eds.), Intelligence Policy and National Security ch. 3. UB 250.I6B. Porter, Plots and Paranoia (good on domestic security and high policing) NILAbram N. Shulsky and Gary J. Schmitt, Silent Warfare: chapter 1. UB 250.S4G. F. Treverton, Seth G. Jones, Steven Boraz, Phillip Lipscy, Toward a Theory of Intelligence Workshop Report, RAND available at --http://www.rand.org/pubs/conf_proceedings/CF219/B. Westerfield, Inside the CIA's Private World UB 271.U6Articles - Core ReadingChristopher Andrew, 'Intelligence, International Relations and "Under-theorisation"' in L.V. Scott & P.D. Jackson, (eds.), Understanding Intelligence in the Twenty-First Century: Journeys in Shadows, pp.29-41. [this book is also Intelligence and National Security, 20, 1 (2004)] UB 250.U53P. Davies, 'Ideas of Intelligence: Divergent Concepts and National Institutions', Harvard International Review 24, 3 (2002): 62-66P. Gill, ‘Theories of Intelligence’, in Loch Johnson (ed.) The Oxford Handbook of National Security Intelligence.L.K. Johnson, 'Preface to a Theory of Strategic Intelligence', International Journal of Intelligence and Counterintelligence 16, 4 (Winter 2003-2004): 638-663.D. Kahn, 'An Historical Theory of Intelligence', INS 16, 3 (2001): 79-92.D. Omand, 'Reflections on Secret Intelligence' in Peter Hennessy (ed.), The New Protective State pp.97-122. Also at - http://www.cscs.ucl.ac.uk/club/e-library/secret-int/L. Scott and P.D Jackson, 'Journeys in Shadows', Ch 1. in LV Scott and PD Jackson (eds.) Understanding Intelligence in the 21st Century [this book is also Intelligence and National Security, Vol. 20, No. 1 (Summer 2004)] UB 250.U53

Articles - Supplementary ReadingJames De Derian, 'Anti-Diplomacy, Intelligence Theory and International Relations', INS 8, 3 (July 1993): 29-51.S. Farson, 'Schools of thought: National perceptions of intelligence', Conflict Quarterly 9/2 (1989) pp.52-104.J. Ferris, 'The Historiography of American Intelligence Studies', Diplomatic History 19, 1 (Winter 1995).M.R.D. Foot, ‘What Use Are Secret Services?’ in In the Name of Intelligence: Essays in Honor of Walter Pforzheimer, (eds.) Hayden B. Peake and Samuel Halpern, 277-282 M. Handel, 'The Politics of Intelligence', INS 2, 4 (October 1987): 5-46. L.K. Johnson, 'Bricks and Mortar for a Theory of Intelligence', Comparative Strategy 22, 1 (2003) Loch K. Johnson, 'Preface to a Theory of Strategic Intelligence,' International Journal of Intelligence and Counterintelligence 16/4 (2003): 638-663.

13

A. Rathmell, 'Towards Postmodern Intelligence', INS 17, 3 (2002) pp.87–104.J. Sims, 'What Is Intelligence? Information for Decision Makers' in Roy S. Godson et al., eds., U.S. Intelligence at the Crossroads: Agendas for Reform, T.F. Troy, ’The 'Correct' Definition of Intelligence’ International Journal of Intelligence and Counterintelligence 5, 4 (Winter 1991-1992): 433-454

B: FOREIGN INTELLIGENCE

2 In the field: the gritty problems of collection

Seminar paper questions

2.1 Compare and contrast the problems/advantages presented by the collection of the following types of intelligence: open source (Opint), human (Humint), signals (Sigint), imagery (Imint).

2.2 What are the major challenges in the realm of foreign intelligence gathering for developed West European state in 2005/6? Illustrate with two or three examples.

2.3 Open sources often constitute the majority of the sources of information used by government. So why is 'Opint' usually under-rated and badly resourced?

Books - Core ReadingM Aid, Secret Sentry, last section UB 271.U6RJ Aldrich, GCHQ, last section Andrew, Aldrich & Wark (eds), Secret Intelligence Chs. 3, 4 & 5 UB 250.S6W.E. Burrows, Deep Black: The Secrets of Space Espionage UG 475.B87O. Gordievsky, Next Stop Execution [a good example of humint] UB 271.R9G6M Herman, Intelligence Power, chs 4-7 UB 250.H3 A.N. Shulsky, Silent Warfare: Understanding the World of Intell. ch1, 2, 3,UB 250.S4B. Westerfield, Inside the CIA's Private World, chs. 1-11, especially 1, 2, 10, & 11 UB 271.U6

Books - Supplementary ReadingW.E. Burrows, By Any Means Necessary: America’s Secret Air War in the Cold War NILD.D. Clarridge, A Spy for All Seasons: My Life in the CIA [see the detailed account of humint agent recruitment] NILA. Dulles, The Craft of Intelligence UB 270.DB

14

P. Gill and M Pythian, Intelligence in and Insecure World chapter 4. UB 250.I6L. Johnson, Strategic Intelligence, Volume II. The Intelligence Cycle: From Spies to Policymakers esp chapters 1-6 UB 250.S6385 REF ONLY Ishmael Jones: The Human Factor: Inside the CIA's Dysfunctional Intelligence Culture Encounter Books, New York and London, 2008, 383 p., $27.95. J. Keegan, The Second World War ch on intelligence D 743.K3 D.T. Lindgren, Trust But Verify: Imagery Analysis in the Cold War [good on Imint] UG 763.L56M. Lowenthal, Intelligence: From Secrets to Policy chapter 5. UB 271.U6J. Prados, The Soviet Estimate: US Intelligence Analysis and the Soviet Military Threat UB 271.U6 J. Richelson, The Wizards of Langley, . NILJ. Schecter and P. Deriabin, The Spy Who Saved the World NILR. Steele, On Intelligence [value of Opint - Open Sources] NIL R. Wallace & HK Melton, Spycraft UB 271.U6

Articles - Core ReadingM Aid, ‘The Time of Troubles: The US National Security Agency in the Twenty-First Century’ INS 15, 3 (1999) [very good on pros and cons of sigint] (also reproduced as chapter 7 in Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies UB 250.I6Matthew Aid, 'All Glory Is Fleeting: Sigint and the Fight against International Terrorism', Intelligence and National Security 18/4 (Winter 2003): 72-120. M.M. Aid, ‘ The Troubled Inheritance: The National Security Agency and the Obama Administration’, in Loch Johnson (ed.) The Oxford Handbook of National Security IntelligenceR Butterworth, 'Collection' in R Godson ed Intelligence Requirements for the 1990s: Collection, Analysis, Counterintelligence and Covert Action JL. Gaddis, 'Intelligence, Espionage and Cold War History', Diplomatic History (1989) and also in his The United States and the End of the Cold War B. Gerber, 'Managing Humint: The need for a new Approach', in Jennifer Sims & Burton Gerber (eds.) Transforming US Intelligence UB 250.T7F.P. Hitz, ‘The Human Collection of Intelligence’ in Loch Johnson (ed.) The Oxford Handbook of National Security IntelligenceA.S. Hulnick, ‘The Dilemma of Open Sources Intelligence: Is OSINT Really Intelligence?’ in Loch Johnson (ed.) The Oxford Handbook of National Security IntelligenceR.D. Steele, The Importance of Open Source Intelligence to the Military', ch.9 in Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies UB 250.I6

Articles - SupplementaryJ.M. Diamond, 'Re-examining Problems and Prospects in U.S. Imagery Intelligence', ch.5 in Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies, UB 250.I6 D. D. Fitzgerald, 'Risk Management and National Reconnaissance form the Cold war up to the Global War on Terrorism,' National Reconnaissance - A Journal of the Discipline and Practice 1 (2005) pp.9-18J.L. Gaddis, 'The Evolution of a Reconnaissance Satellite Regime' in A.L. George and others (eds.) US-Soviet Security Co-operation (OUP, 1988). NILG. Jones, 'It’s a Cultural Thing: Thoughts on a Troubled CIA', Orbis 50/1 (2006): 25-41.M. M. Lowenthal, 'OSINT: The State of the Art, the Artless State,' Studies in Intelligence 45/3 (2001) pp.62-66.

15

Stephen Mercado, 'A Venerable Source in a New Era: Sailing the Sea of OSINT in the Information Age', Studies in Intelligence 48/3 (2004): 45-55.W.C. Prillaman & M.P. Dempsey, 'Mything the Point: What's Wrong with the Conventional Wisdom about the CIA', Intelligence and National Security 19/1 (2004) pp.1-29.H Ransom, 'Strategic Intelligence and Foreign Policy', World Politics 27 (Oct 74) 131-45.Jeffrey T. Richelson, 'High Flyin' Spies', Bulletin of Atomic Scientists 52/2 (1996) pp.48-54.Jeffrey T. Richelson, 'The Satellite Gap', Bulletin of Atomic Scientists 59/1 (2003) pp.48-54.PR Riley, 'CIA and Its Discontents', chapter 4 in Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies UB 250.I6

3 Estimates & interpretation: the problems of analysis

Seminar paper questions

3.1 How far do you accept R.K. Betts's hypothesis that "intelligence failures are inevitable"?

3.2 Can the organizational reform of intelligence have an impact on the main pathologies of intelligence analysis and interpretation?

3.3 ‘Attempts at resolving failures in the realm of analysis have focused on the organizational, but the roots of the problem are psychological’. Discuss.

Books - Core ReadingAndrew, Aldrich & Wark (eds), Secret Intelligence Chs. 6 & 7 UB 250.S6Richard K. Betts and Thomas G. Mahnken, eds. Paradoxes of Strategic Intelligence: Essays in Honor of Michael I. Handel UB 250.P34H.P. Ford, Estimative Intelligence UB 271.U6R.G. George and J.B. Bruce (eds) Analyzing Intelligence <e book>Mark Lowenthal, Intelligence: From Secrets to Policy, chapter 6. UB 271.U6D Omand, Securing the State (Hurst/Columbia University Press, 2010) Ch. 6-8A N Shulsky, Silent Warfare: Understanding the World of Intelligence ch 3 8 L UB 250.S4G. Treverton, Intelligence for an Age of Terror JC 704.2.T7

Books - SupplementaryA Cahn, Killing Detente: The Right Attacks the CIA . NILPeter Gill and Mark Pythian, Intelligence in an Insecure World chapter 5. UB 270.G535Richard Heuer, Psychology of Intelligence Analysis . NILR. Godson, Intelligence Requirements for the 1990s L UB 250.I6I Janis, Groupthink HC 5120.J2

16

L Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of Government esp. chapter 7 UB 250.S6385 REF ONLY L Johnson, Strategic Intelligence, Volume II. The Intelligence Cycle: From Spies to Policymakers esp chapters 8-9 UB 250.S6385 REF ONLY S. Kent, Strategic Intelligence for American World Policy [the classic idealist statement from the creator of ONE/CIA] L UB 250.K3W Matthias, America's Strategic Blunders: Intelligence Analysis and National Security Policy, 1936-1991 .NILE.R. May, Knowing One's Enemies, [especially May's conclusions ] NILH. E. Meyer, Real-World Intelligence L HN 5100.M3R.P. Pfaltzgraff et al (eds.), Intelligence Policy and National Security chs. 6 & 7 UB 250.I6J Prados, The Soviet Estimate: US Intelligence Analysis and the Soviet Military Threat NILSir K. Strong, Intelligence at the Top NILJ. Richard, The Art and Science of Intelligence Analysis, OUP 2010 B. Westerfield, Inside the CIA's Private World, chs. 11-28, 31, but especially 11, 12, 14, 17, 25, 26, 27, 31 NILR. Wohlstetter, Pearl Harbor: Warning and Decision D 767.92.W6

Vietnam case studyS. Adams, War of Numbers DS 557.A6G.W. Allen None So Blind : A Personal Account of the Intelligence Failure in Vietnam L DS 557.A6H P Ford, CIA and the Vietnam Policy Makers DS 551.F6J.J. Wirtz, The Tet Offensive: Intelligence Failure in War NIL

Articles - Core ReadingR K Betts, 'Analysis, War, Decision: Why Intelligence Failures are Inevitable' World Politics (1978/9) (also reproduced as chapter 8 in Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies, UB 250.I6R Betts, ‘Surprise Despite Warning: Why Sudden Attacks Succeed ' Political Science Quarterly 95 (Winter 1980) 551-72D. Hart and S. Simon, 'Thinking straight and talking straight: Problems of intelligence analysis', Survival 48/1 (2006) pp.35-60. K.A. Hatlebrekke & M.L. Smith, ‘Towards a New Theory of Intelligence Failure? The Impact of Cognitive Closure and Discourse Failure’, INS 25, 2 (2010): 147-182. M.N. Lowenthal, 'Towards a Reasonable Standard for Analysis: How Right, How Often on Which Issues?', INS, 23/3 (2008): 303-315. S. Marrin, 'At Arm's Length or At the Elbow?: Explaining the Distance between Analysts and Decisionmakers', International Journal of Intelligence and CounterIntelligence, 20, 3 (2007): 401-414. Carmen Medina, 'What To Do When Traditional Models Fail', Studies in Intelligence 46/3 (2002): 23-9. (It is also worthwhile looking at the response - S.R. Ward, 'Evolution Beats Revolution in Analysis', Studies in Intelligence 46/3 (2002):29-36.W.E. Odom, 'Intelligence Analysis', INS, 23/3 (2008): 316-332.

Articles - Supplementary ReadingR. Callum, ‘The Case for Cultural Diversity in the Intelligence Community’ International Journal of Intelligence and Counterintelligence 14, 1 (2001): 25-48. JSTOR

17

E Cohen, 'Analysis' in R Godson (ed.) Intelligence Requirements for the 1990s: Collection, Analysis, Counter-intelligence and Covert Action. UB 250.I6S. Gazit, 'Estimates and Fortune-Telling in Intelligence Work,' INS 4/4 (1980): 36-56.S. Gazit, 'Intelligence Estimates and the Decision-Maker,' INS 3/3 (1988): 261-287.RZ George, 'Fixing the Problem of Analytical Mind-Sets: Alternative Analyses ', International Journal of Intelligence and Counterintelligence 17/3 (2004): 385-404.M. Gladwell, 'Connecting the Dots: The Paradoxes of Intelligence Reform,' The New Yorker 10 March 2003, pp.83-88.R. Jervis, 'Hypotheses on Misperception', World Politics, 20, 3 (April 1968): 454-79.L. Johnson, ‘Analysis for a New Age’, INS 11, 4 (October 1996): 657-71.G. Schmitt, 'Truth to Power: Rethinking Intelligence Analysis' in P. Berkowitz (ed.) The Future of American Intelligence (Hoover Institute Press 2004) NIL

4 Intelligence at the Top: Producer-Consumer Linkage

Seminar paper questions

4.1 Should intelligence be ‘a function of command’ [view of US Joint Chiefs of Staff] or objective and insulated from the policy process [view of CIA's Sherman Kent] ?

4.2 If we accept Betts's hypothesis that "intelligence failures are inevitable", how should the leaders of states approach the problem of surprise?

4.3 Why are the leaders of states typically poor consumers of intelligence? Can anything be done to change this state of affairs?

Books - Core ReadingAndrew, Aldrich & Wark (eds), Secret Intelligence Chs. 8 & 9 UB 250.S6R.K. Betts, Surprise Attack U 163.B3 A. Codevilla, Informing Statecraft UB 271.U6R.K. Betts & TG Mahken, Paradoxes of Strategic Intelligence UB 250.P34Richard K. Betts, Enemies of Intelligence UB 271.U6M. Handel (ed.), Leaders and Intelligence [special issue of INS 3/3] UB 250.L44A. Levite, Intelligence and Strategic Surprise UB 250.L48Mark Lowenthal, Intelligence: From Secrets to Policy chapter 9. UB 271.U6D Omand, Securing the State (Hurst/Columbia University Press, 2010) Ch. 6-8R. L. Pfaltzgraff & V. Ra'anan (eds.), Intelligence Policy & National Security ch. 13-17, 19, 20, 23 UB 250.I6

Books - Supplementary ReadingPeter Gill and Mark Pythian, Intelligence in an Insecure World chapter 6. UB 250.I6B. Gertz, Betrayal. [Critique of Clinton and Intelligence] NILL Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of Government esp. chapter 8 UB 250.S6385 REF ONLY R.V. Jones, Reflections on Intelligence, Chapter 6 NIL*E. Kam, Surprise Attack: The Victim's Perspective U 163.K27

18

W. Laqueur, World of Secrets UB 271.U6H.H. Ransom, 'The Politicization of Intelligence', ch.14 in Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies, UB 250.I6A.N. Shulsky, Silent Warfare: Understanding the World of Intelligence ch. 3, 8 UB 250.S4B. Whaley, Codeword Barbarossa D 764.W4

Articles - Core ReadingC.M. Andrew, 'American Presidents and their Intelligence Communities', INS 1/4 (1995): 95-113. R.K. Betts, 'Surprise, Scholasticism and Strategy' and rejoinder by Levite, International Studies Quarterly, 33, 3 (September 1989).R.K. Betts, ' 'Politicization of Intelligence: Costs and Benefits' in R Betts and T Mahnken, eds., Paradoxes of Intelligence: Essays in Honor of Michael Handel 59–79. NILR K Betts, 'Analysis, War, Decision: Why Intelligence Failures are Inevitable' World Politics (78/9)S Chan, 'The Intelligence of Stupidity: Understanding Failures in Strategic Warning ' American Political Science Review 73, 1 March 1979S. Farson, (eds.) Security and Intelligence in a Changing World, ch 12. UB 250.C69K.L. Gardiner, ’Squaring the Circle: Dealing with Intelligence-Policy Breakdowns’, INS 6/1 (1991):141-152. M. Herman, 'Intelligence and National Action', ch.15 in Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies, UB 250.I6M.M Lowenthal, ‘The Policymaker-Intelligence Relationship’, in Loch Johnson (ed.) The Oxford Handbook of National Security IntelligenceP. Jackson, ‘On Uncertainty and the Limits of Intelligence’, in Loch Johnson (ed.) The Oxford Handbook of National Security IntelligenceP. Pillar, ‘The Perils of Politicization’, in Loch Johnson (ed.) The Oxford Handbook of National Security IntelligenceD. Robarge, ‘Leadership in an Intelligence Organization: The Directors of Central Intelligence and the CIA’, in Loch Johnson (ed.) The Oxford Handbook of National Security Intelligence

Articles - Supplementary Reading

On intelligence at the top – K.L. Gardiner, ‘Dealing with Intelligence-Policy Disconnects' in Inside CIA's Private World, ed. H. Bradford Westerfield, 344-356 D. Gries, ‘New Links Between Intelligence and Policy’ in Inside CIA's Private World, ed. H. Bradford Westerfield, 357-365 *M. Handel, 'Intelligence and Military Operations' , INS 5, 2 (April 1990). M. Herman, 'Intelligence Warning and the Occupation of the Falkland Islands' in A. Danchev ed International Perspectives on the Falklands Conflict *R. Jervis, 'Intelligence and Effective Policy' in A.S. Farson et al eds Security and Intelligence in Changing World UB 250.C69D. Kahn, 'Clausewitz and Intelligence' in M. Handel (ed) Clausewitz and Modern Strategy A. Kovacs, ‘Using Intelligence’, INS 12, 4 (October 1997): 145-64.R. Jervis, 'Strategic Intelligence and Effective Policy' in A. Farson, D. Stafford and W. Wark (eds) Security and Intelligence in a Changing World UB 250.C69Martin Petersen, 'The Challenge of the Political Analyst', Studies in Intelligence 47/1 (2003) pp.51-6.

19

Specifically on intelligence failure -

R Cline, 'Policy Without Intelligence' Foreign Policy Winter 1974T Cubbage, 'Westmoreland v CBS: Was Intelligence Corrupted by Policy Demands?' Intelligence and National Security July 1988 [c.f Sam Adams, War of Numbers, above]S J Flanagan, 'Managing the Intelligence Community' International Security 10, 1 1985 58-M Herman, 'Intelligence Warning of the Occupation of the Falkland Islands: Some Organisational Issues', in A Danchev ed International Perspectives on the Falklands Crisis A S Hulnick, 'The Intelligence Producer-Policy Consumer Linkage' INS 1, 2 May 1986G Hopple, 'Intelligence and Warning: Implications and Lessons of the Falklands Islands War ' World Politics April 1984R Jones, 'Intelligence and Command' INS July 1988E May, 'Intelligence: Backing into the Future' Foreign Affairs 71, 3 (1992) 63-73A Reuben, 'Stalin and June 22 1941' International Affairs 42 (66) 662-73

5 Liaison: the delicate diplomacy of intelligence

Seminar paper questions

5.1 'There are no friendly intelligence services, only the intelligence services of friendly powers.' Discuss.

5.2 Identify the main problems and benefits that are involved in intelligence co-operation between states.

5.3 Why have Europe and America co-operated so closely on intelligence since 9/11, despite public arguments over matters such as the War on Terror and Iraq?

Books - Core Reading (but the articles are better on this subject)Andrew, Aldrich & Wark (eds), Secret Intelligence Ch. 10 UB 250.S6W. Blitzer, Territory of Lies the Exclusive Story of Jonathan Jay Pollard: The American Who Spied on His Country for Israel and How He Was Betrayed [a US-Israeli case] UB 271.I82M Deflem, Policing World Society. Historical Foundations of International Police Cooperation. NIL J.J. Fialka, War by Other Means, Economic Espionage in America HN 355.F4 P. Schweizer, Friendly Spies HN 355.S2A Svendsen, Anglo-American Intelligence Co-operation JE 300.T3.S93JI Walsh, Intelligence Politics of Intelligence Sharing, Columbia University Press 2009.

Books - Supplementary Reading (but the articles are better on this subject)M. Anderson, Policing the World NILJ. Bamford, The Puzzle Palace UB 271.U6 R. Cline, Secrets, Spies and Scholars NILH Cohen, The Good Arabs, Good Arabs : the Israeli security agencies and the Israeli Arabs Uni of Cal Press 2010A.J. Cristol, The Liberty Incident: The 1967 Israeli Attack on the U.S. Navy Spy Ship

20

W.J. Ennes, Assault on the Liberty NILN. Hager, Secret Power, 1996 NILJ. Jakub, Spies and Saboteurs, especially Chapter 7 NILT. Mangold, Cold Warrior, esp ch 5 on the SAPPHIRE/de Vosjoli case. NIL Y. Melman, & D. Raviv. Friends in Deed: Inside the U.S.-Israel Alliance. [see especially chapters 4, 7, 15] NILJ. Richelson, Ties That Bind: 2nd Edition J. Richelson, The US Intelligence Community, Chapter 10 NILM. Yossi and D. Raviv, The Imperfect Spies: A History of Israeli Intelligence [published in the US as: every spy a prince] NIL

Articles - Core ReadingR.J. Aldrich, ‘Dangerous Liaisons: Post September 11 Intelligence Alliances’, Harvard International Review 24/3 (2002): 50-54.S. Lander, 'International Intelligence Co-operation: An Inside Perspective', Cambridge Review of International Studies 17, 3 (October 2004): 481-93. J.T. Richelson, ‘The Calculus of Intelligence Cooperation.’ International Journal of Intelligence and Counterintelligence 4, 3 (Fall 1990): 307-323.

Articles - Supplementary ReadingR.J. Aldrich, 'Transatlantic Intelligence and Security Cooperation,' International Affairs 80/4 (2004): 731-54.B. Champion, 'A Review of Selected cases of Industrial Espionage', INS 13, 2 (1998): 123-44C. Clough, ‘Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation’, The International Journal of Intelligence and Counterintelligence, 17, 4 (2004) B. De Graaff, & C. Wiebes. 'Intelligence and the Cold War behind the Dikes: The Relationship between the American and Dutch Intelligence Communities' INS 12, 1 (1997): 41-58.A.S. Hulnick, ‘Intelligence Cooperation in the Post-Cold War Era: A New Game Plan?’ International Journal of Intelligence and Counterintelligence 5/4 (1991-1992) pp.455-465.S. Lefebvre, 'The Difficulties and Dilemmas of International Intelligence Cooperation', International Journal of Intelligence and Counterintelligence 16/4 (2003) pp.527-542.B. Müller-Wille, 'The Effect of International Terrorism on EU Intelligence Co-operation', Journal of Common Market Studies, 46, 1 (2008) pp.49-73.B. Müller-Wille, ‘EU intelligence cooperation: A Critical Analysis’, Contemporary Security Policy, 23, 2 (2002)W. Rosenau, 'Liaisons Dangereuses? Transatlantic Intelligence Co-operation and the Global War on Terrorism', in Co-operating Against Terrorism: EU-US Relations Post September 11--Conference Proceedings (Sweden: Swedish National Defence College, 2007) pp.31-40.M. Rudner, 'Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism,' International Journal of Intelligence and Counterintelligence, 17/2 (2004) pp.193-230.M. Rudner, 'Britain Betwixt and Between: UK SIGINT Alliance Strategy's Transatlantic and European Connections', INS 19, 4 (2004): 571-D.S. Reveron, ‘Old Allies, New Friends: Intelligence-Sharing in the War on Terror’, Orbis (Summer, 2006).J.E. Sims, ‘Foreign Intelligence Liaison: Devils, Deals, and Details’, International Journal of Intelligence and CounterIntelligence, 19 (2006)

21

A. Svendsen, ‘The globalization of intelligence since 9/11: frameworks and operational parameters’, Cambridge Review of International Affairs 21, 1 (2008) pp.131-146.J.I. Walsh, ‘Intelligence-Sharing in the European Union: Institutions Are Not Enough’, Journal of Common Market Studies, 44, 3 (2006), pp.625-43. J.I. Walsh, 'Defection and Hierarchy in International Intelligence Sharing', Journal of Public Policy, 27, 2 (2007): 151-181. M. Warner, 'Intelligence Transformation and Intelligence Liaison,' SAIS Review 24/1 (2004) pp.77-89.

Also the special Issue of INS 13/1 Knowing Your Friends especially chs 1 5 and 11

6 Reading Week - No Lecture

C: COUNTER-TERRORISM AND SECURITY

7 - The Attacks of 9/11: What Kind of Failure?

Seminar paper questions

7.1 Was 9/11 the result of an 'intelligence failure', and if so was it one of the collection, management or analysis of intelligence?

7.2 How far do you agree with Amy Zegart's assertion that the intelligence failures that resulted in 9/11 are about the failure of organizations to adapt?

7.3 A second Pearl Harbor? Consider the similarities and differences between 11 September 2001 and 7 December 1941.

Internet

Senate, Select Committee on Intelligence and House, Permanent Select Committee on Intelligence, Joint Inquiry Into Intelligence Community Activities Before and After the Terrorist Attacks of September, Washington D.C.: Government Printing Office, 2003 Soft Cover. -

available at http://www.gpoaccess.gov/serialset/creports/911.html

if you want the hearings which are very detailed see http://www.fas.org/irp/congress/

22

9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (Official Edition) including the Executive Summary 1577363418 & HV6432.7.N2

The 'Final Report of the National Commission on Terrorist Attacks Upon the United States, Official Government Edition,' dated 22 July 2004,

available at http://www.fas.org/irp/offdocs/911comm.html.

Books -Core ReadingMM Aid, The Secret Sentry (Bloomsbury 2009) Ch.12Andrew, Aldrich & Wark (eds), Secret Intelligence Chs. 11 & 12 UB 250.S6B Gertz, Breakdown: How America’s Intelligence Failures led to September 11 JE 300.T3.G3Bob Graham, with Jeff Nussbaum. Intelligence Matters: The CIA, the FBI, Saudi Arabia, and the Failure of American's War on Terror JC 704.2.G7T. Naftali, Blind Spot JE 300.T3.N2See also the useful review summary of Naftali by Crenshaw at http://www.foreignaffairs.org/20050701fareviewessay84414/martha-crenshaw/counterterrorism-in-retrospect.htmlG. Posner, Why America Slept: The Failure to Prevent 9/11 E 888.P6R. Posner, Preventing Surprise Attacks: Intelligence Reform in the Wake of 9/11 UB 250.P6 S Strasser, The 9/11 Investigations E 888.N4D. Benjamin and S. Simon, The Age of Sacred Terror JE 300 T3.B3A Zegart, Spying Blind: The CIA, the FBI, and the Origins of 9/11 UB 271.U6

Books - Supplementary ReadingP Bergen, Holy War Inc: Inside the Secret World of Osama Bin Laden JE 300.T3Richard A. Clarke, Against All Enemies. JC 704.2.C5Der Spiegel, Inside 9-11: What Really Happened NILY. Fouda and N. Fielding, Masterminds of Terror: the Truth Behind the Most Devastating Attack the World Has Ever Seen, JE 242.F6L Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of Government esp. chapter 9 UB 250.S6385 REF ONLY M Mahle Boyle, Denial and Deception: An Insider's View of the CIA from Iran-Contra to 9/11 NILJ Miller The Cell: Inside the 9/11 Plot and Why the FBI and the CIA Failed to Stop It NILY Bodansky, Bin Ladin: the man who declared war on America NIL S Reeve, The New Jackals Rami Yousef, Osamar Bin Ladin & the Future of Terrorism JE 300.T3.R3L. Wright, The Looming Tower JE 300.T.3

Articles - Core ReadingR.A. Falkenrath, 'The 9/11 Commission Report a Review Essay, International Security 29/3 (2004), 170-190.A.B. Zegart, '9/11 and the FBI: The organizational roots of failure', INS, 22/2 (2007): 165-184.

23

A.B. Zegart, 'September 11 and the Adaptation Failure of U.S. Intelligence Agencies', International Security 29/4 (2005): 78-111.

Articles - Supplementary ReadingB Lee, W Enders, T Sandler, '9/11: What Did We Know And When Did We Know It?', Defence and Peace Economics, 20, 2, (2009): 79-93.F.L. Borch, 'Comparing Pearl Harbor and "9/11": Intelligence Failure? American Unpreparedness? Military Responsibility?' The Journal of Military History 67/3 (2003): 845-860. H.D.E. Bruijn, 'One fight, one team: The 9/11 Commission Report on Intelligence, Fragmentation and Information', Public Administration 84/2 (2006):.267-87.D. Byman, 'Strategic Surprise and The September 11 Attacks', Annual Review of Political Science 8 (2005): 145-170.T.G. Carpenter, 'Missed Opportunities: The 9/11 Commission Report and US Foreign Policy', Mediterranean Quarterly 16/1 (2005): 52-61. S. Clarke, 'Conspiracy Theories and the Internet: Controlled Demolition and Arrested Development', Episteme: A Journal of Social Epistemology 4/2 (2007):167-180.E. J. Dahl, 'Warning of Terror: Explaining the Failure of Intelligence Against Terrorism', Journal of Strategic Studies 28/1 (2005): 31-55.H. Fessenden 'The Limits of Intelligence Reform', Foreign Affairs 84, 6 (2005): 106-120.R.A. Goldberg, 'Who Profited From the Crime? Intelligence Failure, Conspiracy Theories and the Case of September 11', Ch.6. in L.V. Scott and P.D. Jackson (eds.) Understanding Intelligence in the 21st Century UB 250.U53 [this is also Intelligence and National Security, 20, 1 (2004)] M.A. Goodman, '9/11: The Failure of Strategic Intelligence', INS - (2003) 18/4: 59-71 T. Homer-Dixon,‘The Rise of Complex Terrorism’ Foreign Policy 2002 [on the FP website]G. Ilardi, ‘The 9/11 Attacks—A Study of Al Qaeda's Use of Intelligence and Counterintelligence’, Studies In Conflict And Terrorism, 32, 3 (2009): 171-187. S. Lefebvre, . 'A Look at Intelligence Analysis.' International Journal of Intelligence and Counterintelligence 17/2 (2004): 231-264.P.R. Neumann & M.L.R Smith. 'Missing the Plot? Intelligence and Discourse Failure', Orbis 49/1 ( 2004/2005): 95-107C.F. Parker & E.K. Stern 'Blindsided? September 11 and the Origins of Strategic Surprise', Political Psychology 23, 3 (2002): 601–630. P.R. Pillar, 'Good literature and bad history: The 9/11 commission's tale of strategic intelligence', INS, 21/6 (2006): 1022-44. J. J. Wirtz, ‘Deja Vu? Comparing Pearl Harbor and September 11’, Harvard International Review 24/3 (2002): 73–77. J Wirtz, 'Responding To Surprise', [compares responses to Pearl Habor and 9/11] Annual Review of Political Science 9 (2006): 45-65. A.B. Zegart, 'An Empirical Analysis of Failed: Intelligence Reforms Before September 11,' Political Science Quarterly 121/1 (2006): 33-60.

24

Topic 8 Proliferation and WMD - the Iraq Case

Seminar paper questions

8.1 To what extent was the Iraqi WMD fiasco in the USA a product of intelligence failure and to what extent the product of interference by policy-makers and politicians?

8.2 What problems and weaknesses in the UK intelligence system have been illuminated by the Iraqi WMD saga and the 4 subsequent inquiries held in 2003 and 2004?

US Reading

Internet

Senate Select Committee Report on WMD

Available at http://www.fas.org/irp/congress/2004_rpt/index.html#ssci

WMD Commission Report

Available at - http://www.fas.org/irp/offdocs/wmdcomm.html

Books - Core Reading

Select Committee on Intelligence, Report of the Select Committee on Intelligence on the United States Intelligence Community's Prewar Intelligence Assessments on Iraq,

M.M. Aid, The Secret Sentry (Bloomsbury 2009) Ch13Andrew, Aldrich & Wark (eds), Secret Intelligence Ch. 13 UB 250.S6J. Bamford, Pretext for War DS 79.6.B2M.A. Goodman, Failure of intelligence: the decline and fall of the CIA NIL

25

R Jervis, Why intelligence fails : lessons from the Iranian Revolution and the Iraq War Cornell UP 2010 J. Risen, State of War UB 271.U6

Books - Supplementary ReadingH. Blix, Disarming Iraq: The Search for Weapons of Mass Destruction DS 79.591.B5Y. Bodansky, The secret history of the Iraq War NILM. DeLong, Inside CentCom: The Unvarnished Truth About the Wars in Afghanistan and Iraq NIL Bob Drogin, Curveball: Spies, Lies, and the Con Man Who Caused a WarTyler Drumheller, On the Brink: An Insider's Account of How the White House Compromised American Intelligence UB 271.U6Peter Gill and Mark Pythian, Intelligence in an Insecure World chapter 7. UB 250.I6S.M. Hersh, Chain of command : the road from 9/11 to Abu Ghraib JE 242.H3 L. Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of Government esp. chapter 9 UB 250.S6385 REF ONLY G. Tenet, At the Center of the Storm JC 842.T3C.R. Whitney (ed.) The WMD Mirage NIL

Articles - Core ReadingRobert Jervis, 'Reports, Politics, and Intelligence Failures: The Case of Iraq', Journal of Strategic Studies 29, 1 (2006): 3-52.*David Isenberg, See, Speak, and Hear No Incompetence: An Analysis of the Findings of The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction BASIC Report 2005 available at - http://www.basicint.org/pubs/pubindex.htm

Articles - Supplementary ReadingR. Best, ‘What the Intelligence Community Got Right About Iraq’, INS 23, 3 (2008): 289-302 C. Kaufmann, 'Threat Inflation and the Failure of the Marketplace of Ideas: The Selling of the Iraq War', International Security 29, 1 (2004): 5-48.K. Pollack, 'Spies, Lies and Weapons: What went wrong' Atlantic Monthly, 293, 1 (2004): http://www.theatlantic.com/doc/200401/pollack R.L. Russell, 'CIA's Strategic Intelligence in Iraq', in also reproduced as chapter 12 in Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies UB 250.I6K. Russell, 'The Subjectivity of Intelligence Analysis and Implications for U.S. National Security Strategy.' SAIS Review, 24/1 (2004): 147-163.

UK Reading

Internet

Foreign Affairs Committee Report

http://www.fas.org/irp/threat/ukiraq0703.pdf

Intelligence and Security Committee Report

26

http://www.fas.org/irp/world/uk/index.html

Hutton Report

http://www.fas.org/irp/world/uk/index.html

Lord Butler Report

http://www.fas.org/irp/world/uk/index.html

Glen Rengwala also has some useful material at

http://middleeastreference.org.uk/fac030616.html

Books - Core ReadingAndrew, Aldrich & Wark (eds.), Secret Intelligence Chs. 14 UB 250.S6Tim Coates & Lord Butler, Lord Butler's Report: Espionage and and Iraq War DS 79.591.L6A. Glees & P. Davies, Spinning the Spies, UB 250.G5

Books - Supplementary ReadingH Blix, Disarming Iraq: The Search for Weapons of Mass Destruction DS 79.591.B5A Campbell, The Blair Years DA 592.7.C2S Kettell, Dirty Politics? New Labour, British Democracy & the Invasion of Iraq. Ch 4 JE 232.K3G Rangwala & D Plesch, A Case To Answer DA 591.B56A Seldon, Blair DA 592..7.B5

Articles - Core ReadingR.J. Aldrich, 'Whitehall and the Iraq War: The UK's Four Intelligence Enquiries', Irish Studies in International Affairs, 16, 1 (2005) online at - http://www.ria.ie/publications/journals/isia/ A. Danchev, 'Story Development, or, Walter Mitty the Undefeated', ch.7 in A. Danchev & J. Macmillan (eds.), The Iraq War and Democratic Politics DS 79.6.I7 Philip Davies, 'Intelligence Culture and Intelligence Failure in Britain and the United States', Cambridge Review of International Affairs, 12, 3 (2004): 495-520. Ian Davis and Andreas Persbo, ‘After the Butler report: time to take on the Group Think in Washington and London’, BASIC papers: occasional papers in international security, no. 46 (July 2004) available at http://www.basicint.org/pubs/Papers/BP46.htm

Articles - Supplementary Core ReadingC. Bluth, ‘The British road to war: Blair, Bush and the decision to invade Iraq’, International Affairs 80, 5 (2004): 851-872.A Doig, ’45 Minutes of Infamy? Hutton, Blair and the Invasion of Iraq’, Parliamentary Affairs, 58, 1 (2005).A. Doig & M. Phythian, 'The national interest and the politics of threat exaggeration: the Blair government's case for war against Iraq'. Political Quarterly 76, 1 (2005): 368-376.P. Gill, 'Keeping "Earthly Awkwardness": Failures of Intelligence in the United Kingdom', in T.C. Bruneau & Steven C. Boraz (eds.), Reforming Intelligence: Obstacles to Democratic Control and Effectiveness (Texas University Press, 2007) chapter 4. UB 250.R4 <e>

27

A Glees, ‘Evidence-based policy or policy-based evidence? Hutton and the government’s use of secret intelligence’, Parliamentary Affairs, 58, 1 (2005).E. O'Halpin, 'British Intelligence and the Case for Confronting Iraq: Evidence from the Butler and Hutton Reports,' Irish Studies in International Affairs 16 (2005): 89–102. [http://www.ria.ie/cgi-bin/ria/papers/100537.pdf]' J Humphries, ‘The Iraq dossier and the meaning of spin’ Parliamentary Affairs, 58, 1 (2005): 156-70. L Freedman, ‘War in Iraq: selling the threat’, Survival 46, 2 (2004): 7-50.

For both also read the Australian Account - A. Wilkie, Axis of Deceit NIL

9 Security Intelligence and Counter-terrorism: The Liberal State before 1990

Seminar paper questions

9.1 Why does intelligence in the counter-terrorist context present the liberal state with special problems?

9.2 Was there a particular UK doctrine of counter terrorist intelligence that emerged from Northern Ireland? Does it remain valid ?

Books - Core ReadingC Andrew, In Defence of the Realm, Section E UB271.G7Andrew, Aldrich & Wark (eds), Secret Intelligence Ch.16 UB 250.S6J Boyer Bell, Dynamics of the Armed Struggle – chapter on intelligence JE 300.T3.B3S. Farson, (eds.) Security and Intelligence in a Changing World, ch 13. UB 250.C69P Taylor, Brits: The War Against the IRA DA 990.U468

Books - Supplementary ReadingJ. Adams, The New Spies, chs.14 & 15 UB 250.A3M.G. Davidson, Combatting Terrorism NILA.M. Marenches, The fourth world war : diplomacy and espionage in the age of terrorism NILT.R. Mockaitis, British Counter-Insurgency in the Post Imperial Era UA 647.M63

Northern Ireland - Recommended Case StudyJ. Adams et al, Ambush NILJ. Bowyer Bell, The dynamics of the armed struggle JE 300.T3M Dillon, The Enemy Within L DA 990.U463P. Foot, Who Framed Colin Wallace? . NILT Geraghty, The Irish War L DA 990.U464T Hennessey & C Thomas, Spooks: The Unofficial History of MI5 Ch 36 UB 271.G7J. Holland, Phoenix: Policing in the Shadows NILM McGartland 50 Dead Men Walking NILM. Smith, The Spying Game NILM Urban, Big Boys Rules DA 990.U46

28

Articles - Core ReadingB. Bamford, 'The Role and Effectiveness of Intelligence in N Ireland', INS, 20/4 (2005): 581-607. D.A. Charters, 'Counter-Terrorism Intelligence: Sources, Methods, Processes and Problems' in D.A. Charters (ed.), Democratic Responses to International Terrorism 227-267,

Articles - Supplementary ReadingS.A. Farson, 'Criminal Intelligence vs. Security Intelligence: Re-evaluation of the Police Role in the Response to Terrorism' in D.A. Charters (ed) Democratic Responses, 191-227. JE 300 T3.D3F. Hitz, 'Unleashing the Rogue Elephant: September 11 and Letting the CIA Be the CIA', ch.29 in Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies, UB 250.I6*K.G. Robertson, 'Intelligence, Terrorism and Civil Liberties', Conflict Quarterly, 7, 2 (1987) – reproduced in the P. Wilkinson et al volume Contemporary Research on Terrorism JE 300.T3

10 Security Intelligence and Counter-terrorism:The Market State

Seminar paper questions

10.1 To what extent may terrorist organizations be considered to be simply malignant forms of secret service ?

10.2 Does counter-terrorist intelligence require special forms of control, regulation and oversight and if so what shape should it take?

Books - Core ReadingAndrew, Aldrich & Wark (eds), Secret Intelligence Chs.15 & 27 UB 250.S6*RD Crelinsten, Intelligence and Counter-Terrorism in a Multi-Centric World (Swedish National Defence College, War Studies Research Reports No.13, 2006) JE 300.T3.C7*P Chalk & W Rosenau, Confronting 'the Enemy Within': Security Intelligence, the Police, and Counterterrorism in Four Democracies, UB 250.C4T. Naftali, Blind Spot JE 300.T3.N2R Posner, Countering Terrorism JC 704.2.P6G. Treverton, Intelligence for an Age of Terror JC 704.2.T7Wesley K. Wark (ed.), Twenty-First Century Intelligence JC 842.T9

Books - Supplementary ReadingAnonymous, [Michael Scheuer] Imperial Hubris: Why the West is Losing the War on Terror JE 300.T3.S2J Arquilla, Countering the New Terrorism RAND NILPhilip Bobbitt, Terror and Consent: The Wars for the Twenty-first Century PenguinA. Cronin & J Ludes, Attacking Terrorism, (ch.5 on intelligence by Pillar) JC 704..2.A8 D.D. Clarridge, A Spy for all seasons: my life in the CIA [on creation of the CT centre] NILR Baer, See No Evil JC 701.42.B2Peter Chalk & W. Rosenau, Confronting 'the Enemy Within': Security Intelligence, the Police, and Counterterrorism in Four Democracies. available at - http://www.rand.org/pubs/monographs/MG100/ UB 250.C4

29

P Hennessy (ed.), The New Protective State UB 251.N3T Hennessey & C Thomas, Spooks: The Unofficial History of MI5 Ch 37S Hewitt, The British War on Terror JE 300 11.T3P Heymann, Terrorism, Freedom and Security especially Part II, 37-87 JE 300.42.T3A. Hulnick, Keeping us Safe NILL Johnson, Strategic Intelligence: Volume III. Covert Action: Behind the Veils of Secret Foreign Policy esp chapter 9 UB 250.S6385 REF ONLY L Johnson, Strategic Intelligence: Volume IV. Counterintelligence and Counterterrorism: Defending the Nation Against Hostile Forces esp chapter 6-8 UB 250.S6385 REF ONLY J. Prados, America Confronts Terrorism NILW. Rosenau, Confronting the Enemy WithinG. Treverton, Intelligence for an Age of Terror Ch.2 JC 704.2.T7

Articles - Core ReadingC. Cogan, 'Hunters not gatherers: Intelligence in the twenty-first century', INS, 19/2 (2004):.304–321.Antony Field, ‘Tracking terrorist networks: problems of intelligence sharing within the UK intelligence community’, Review of International Studies, 35 (2009): 997-1009F Foley, ‘The expansion of intelligence agency mandates: British counter-terrorism in comparative perspective’, Review of International Studies 35, 4 (2009): 983-996.John R Schindler, 'Defeating the Sixth Column: Intelligence and Strategy in the War on Islamist Terrorism', Orbis 49/4 (2005) pp.695-712.J. Sims, 'Intelligence to counter terror: The importance of all-source fusion', INS, 22/1 (2007): 38-56. John P. Sullivan, 'Terrorism Early Warning and Counterterrorism Intelligence', International Journal of Intelligence and CounterIntelligence, 21/1 (2008): 13-25.G. Treverton, ‘Addressing "Complexities" in Homeland Security’ in Loch Johnson (ed.) The Oxford Handbook of National Security Intelligence

Articles - Supplementary ReadingThomas C. Bruneau, 'Democracy and Effectiveness: Adapting Intelligence for the Fight Against Terrorism', International Journal of Intelligence and CounterIntelligence, 21/3 (2008): 448-460. D.A. Charters, 'Counter-Terrorism Intelligence: Sources, Methods, Processes and Problems' in D.A. Charters (ed.), Democratic Responses to International Terrorism, pp.227-67. JE 300 T3.D3S.A. Farson, 'Criminal Intelligence vs. Security Intelligence: Re-evaluation of the Police Role in the Response to Terrorism' in D.A. Charters (ed.), Democratic Responses to International Terrorism, pp.191-227. JE 300 T3.D3L. Freedman, ‘The Politics of Warning: Terrorism and Risk Communication’, INS 20/3 (2005): 379-418.P. Gill, 'Securing the Globe: Intelligence and the Post-9/11 Shift from 'Liddism' to 'Drainism' , INS 19/3 (2004): 467-489.P. Gill, 'Security Intelligence and Human Rights: Illuminating the 'Heart of Darkness'?', INS, 24/1 (2009): 78-102. M. Herman, 'Counter-Terrorism, Information Technology and Intelligence Change', INS 18/4 (December 2003): 40-58.B. Hoffman, ‘Intelligence and Terrorism: Emerging Threats and New Security Challenges in the Post-Cold War Era,’ INS 11/2 (1996): 207-223.P.R Pillar, 'Counterterrorism after Al Qaeda,' The Washington Quarterly 27/3 (2004): 101-113.

30

M. Rudner, 'Financial Intelligence, Terrorism Finance, and Terrorist Adaptation,” International Journal of Intelligence and CounterIntelligence 19/1 (2006):32-58.G. Treverton, 'Terrorism, Intelligence and Law Enforcement: Learning the Right Lessons.' INS 18/4 (2003): 121-40.W. Wark, 'Learning Lessons (and how) in the War on Terror: The Canadian Experience,' International Journal 60/1 (2004-2005): 71-90.

A dozen useful short articles on terrorism in general from the Harvard International Review are available online at > http://hir.harvard.edu/special/

The journal International Security has also put its terrorism articles on line- you can find these by going to the sample articles page for the journal on the MIT press website

11 Security Intelligence and Tyranny

Seminar paper questions

11.1 What functions does security intelligence perform in the authoritarian state?

11.2 Discuss the relationship between political policing and state development in Continental Europe and Russia in the 18th and 19th Centuries

11.3 To what extent are the organisations of state security the defining characteristic of the totalitarian [not authoritarian] state?

Books - General - Core Reading

Literature on the general relationship between political policing and repressive regimes is limited. Specific material is plentiful.

*J. Adelman (ed.), Terror and Communist Politics: The Role of the Secret Police in Communist States JE 300.T3.T3 *B. Chapman, Police State JC 11.C4 *C. Dandeker, Surveillance, Power and Modernity: Bureaucracy and Discipline form 1700 to the Present Day HB 6000.D2 *M. Deflem, Policing World Society HF 3800.D3

Books - General - Supplementary ReadingR. Bengalli and C. Summer, Social Control and Political Order HD 5020.S6 BB Campbell & AD Brenner, Death Squads in Global Perspective HV6322.C2J.E. Cronin, The Politics of State Expansion DA 566.7.C7JJ Linz, Totalitarian and authoritarian regimes JB 2500.L4M. Mazower, (ed.) The policing of politics in the twentieth century HF 3800.P6 S. Schafer, The Political Criminal HF 3200.S2 S. Tormey, On Tyranny, for the nature of the totalitarian state in general. NILDR Villa, Politics, Philosophy, Terror: Essays on the Thought of H Arendt JB 1742.A75

31

Articles - Core ReadingM. Raeff, 'The Well-ordered Police State and the Development of Modernity in Seventeenth and Eighteenth Century Europe', American Historical Review, 80, 5 (December 1975): 1221-43.

Articles - Supplementary ReadingD Banley, ‘The Police and Political Development in Europe’ in The Formation of National States in Western Europe, ed. by C. Tilly D 217.T4D.H. Bayley, 'The Police and Political Development in Europe' in C.H. Tilly (ed.) The Formation of Nation States in Europe D 217.T4C Davenport, ‘Multi-Dimensional Threat Perception and State Repression: An Enquiry into Why States Apply Negative Sanctions’ American Journal of Political Science 39, 3 (August 1995): 683-713

Under specific country headings - the best material has an asterisk

ArgentinaC Aldini, That Inferno NILM Feitlowitz, Lexicon of Terror F 2849.5.F3 P.H. Lewis, Guerrillas and Generals: The Dirty War in Argentina NILI Guest, Behind the disappearances : Argentina's dirty war against human rights and the United Nations JC 545.A7

Czarist Russia & Early European Police StatesR.J. Goldstein, Political Repression in Nineteenth Century Europe NIL*Hsi Huey Liang, The Rise of the Modern Police and European State System NILBB Fischer, Okhrana NILJ Daly, The Watchful State NIL*J Daly, Autocracy Under Siege DK 221.D2R Hingley, The Russian Secret Police HF 3831.H4 S Monas, The Third Section DK 211.M6 * M Raeff, The Well-Ordered Police State. Social and Institutional Change through law in the Germanies and Russia, 1600-1800. DD 175.R2C Ruud and S Stepanov, Fontanka 17 NILPS Squire, The Third Department DK 211.S7 F.S. Zuckerman, The Tsarist Secret Police in Russian Society, NIL

Imperial IndiaC. Bayly, Empire and Information: Intelligence Gathering and Social Communication in India DS 475.1.B2U. Singh, Political Prisoners in India NIL

Nazi GermanyGC Browder, Foundations of the Nazi Police State NILGC Browder, Hitler’s Enforcers DD 256.5.B7 M Burleigh, The Third Reich DD 256.5.B8 esp Chapter 2, pp.146-205R Gellately, The Gestapo and German Society HF 3823.G3

32

W Sofsjky, The Order of Terror NIL* E Johnson, The Nazi Terror DD 256.5.J6 see especially pp 1-50*T Todorov, Moral Life in the Concentration Camps D 804.G4

German Democratic Republic*D. Childs and R. Popplewell, The Stasi, DD 261.2.C4 *Helena Flam, Mosaic of Fear, Poland and East Germany before 1989 JB 2334.1.F5M. Fulbrook, Anatomy of a Dictatorship, DD 261.F8 .A. Funder, Stasiland DD 261.2.F8 *J Koehler, The Stasi, HV8210.5.K6 Kristie Macrakis: Seduced by Secrets: Inside the Stasi's Spy-Tech World Cambridge University Press, Cambridge, UK and New York, 2008, 370 p., $28.00. B Miller, Narratives of Guilt, HV8210.5.M4 EN Peterson, The Limits of Secret Police Power DD 261.2.P3 T. Wegener Friis K. Macrakis and H. Mu ̈ller-Enbergs, (eds) East German Foreign Intelligence Routledge 2010

Soviet Russia*C.M. Andrew, KGB: the Inside Story UB 271.R9 E. T. Bacon, The Gulag at War: Stalin’s Forced Labour System in the Light of the Archives HM 5531.B2R Conquest, Inside Stalin's Secret Police HF 3831.C6 S Courtois et al, The Black Book of Communism JB 2300.L4 *A. Dallin & G. Breslauer, Political Terror in Communist Systems JB 2300.A1* Y. Druzhnikov, Informer 001: The Myth of Pavlik Morozov. DK 268.M66J.A. Getty and R. Thompson (eds.), Stalinist Terror: New Perspectives DK 267.S8 J. Harris, The Great Urals: Regionalism & the Evolution of the Soviet System HV 1630.H2 *A. Knight, The KGB, especially, chs 1, 10 & 11 HF 3831.K6A Knight, Beria DK 268.B32 I Kershaw & M Lewin, Stalinism and Nazism : dictatorships in comparison DK 267.S8B. Moore, Terror and Progress, HE 1003.1.M6D. Priestland, Stalinism and the Politics of Mobilisation DK 268.P7*R.C. Tucker, Stalinism: Essays in Historical Interpretation JB 2351.S8J. Arch Getty, Gabor T. Rittersporn, V. N. Zemskov, 'Victims of the Soviet Penal System in the Pre-War Years', American Historical Review 98, 4, (1993), pp. 1017-1049.J. Harris, ‘The Growth of the Gulag: Forced Labor in the Urals Region, 1929-1931’, The Russian Review, 56 (April 1997): 265-280.J. Harris, ‘The Purging of Local Cliques in the Urals Region, 1936-7’ in Sheila Fitzpatrick ed., Stalinism: New Directions, pp.262-285. DK 267.S8J. Harris, ‘Dual Subordination? The Political Police and the Party in the Urals Region, 1918-1953’ in Cahiers du Monde Russe 42, 2 (2001)* J. Harris, ‘Resisting the Plan in the Urals, 1928-1956, Or Why Regional Officials Needed 'Wreckers' and 'Saboteurs' ‘ in Lynne Viola ed., Contending with Stalinism J. Harris, Stalinism in a Russian Province. Journal of Modern History 71 (1999): 785-786**P. Holquist, ' 'Information is the Alpha and Omega of our Work' Bolshevik Surveillance in its Pan European Context', Journal of Modern History 69, 3 (Sept 1997): 415-50.T. Martin, ‘The Origins of Soviet Ethnic Cleansing’, Journal of Modern History 70, 4 (1998): 813-861

33

David J. Norlander, ‘Origins of a Gulag Capital: Magadan and Stalinist Control in the early 1930s,’ Slavic Review, 57, 4 (1998): 791-81

D: CONTROLLING INTELLIGENCE

12 The Problems of Oversight and Accountability

Seminar paper questions

12.1 'The first rule of a secret service is that it should be secret. Democratic control is incompatible with this.' Discuss.

12.2 Compare and contrast the systems of accountability employed by at least two English-speaking states. [Possibilities include UK, US, Canada, Australia, New Zealand]

12.3 Consider the structure and functions of the UK Intelligence and Security Committee. Comment on its effectiveness and suggest ways in which it might be improved.

12.4 How might we go about extending accountability to intelligence operations involving more then one country?

Books - Core Reading Andrew, Aldrich & Wark (eds), Secret Intelligence Chs. 18 & 19 UB 250.S6Hans Born, Loch K. Johnson & Ian Leigh, (eds.) Who's Watching the Spies? Establishing Intelligence Service Accountability UB 250.B6Hans Born and Marina Caparini (eds.) - Democratic Control of Intelligence Services. Containing Rogue Elephants. UB 250.D3Thomas C. Bruneau and Steven C. Boraz (eds.) Reforming Intelligence. Obstacles to Democratic Control and Effectiveness. UB 250.R4 <e book> P. Brodeur et al, Democracy, Law, and Security: Internal Security Services in Contemporary Europe HF 3820.D3 P. Gill, Policing Politics: Security Intelligence and the Liberal Democratic State UB 270.G4P Gill and Mark Pythian, Intelligence in and Insecure World chapter 8. UB 250.I6H. Koh, The National Security Constitution E 873.K6

34

M. Lowenthal, Intelligence: From Secrets to Policy, ch.10. UB 271.U6L. Lustgarten and I. Leigh, In From the Cold: National Security and Democracy JE 215.L8 and esp parts I, IV & V

Books - Supplementary Reading W. Baker & J. Reisman, Regulating Covert Action KC 1311.R3U. Bar-Joseph, Intelligence Intervention in the Politics of Democratic States: The United States, Israel and Britain NILDavid M. Barrett: The CIA and Congress: The Untold Story from Truman to Kennedy, University Press of Kansas, Lawrence, Kansas, 2005, 542 p., $39.95William C Banks and P Raven-Hansen, National Security Law and the Power of the Purse NILP. Birkinshaw, Reforming the Secret State KM 207.B4F. Cain, The Australian Security and Intelligence Organization JE 215.91.C2EA Cohen, Commandos and Politicians: Elite Military Units in Modern Democracies U 262.C6S. Farson, (eds.) Security and Intelligence in a Changing World, chs 2, 4-8 UB 250.C69G.P. Hastedt, Controlling Intelligence [specifically on USA and CIA] NILM Hollingsworth & N Fielding, Defending the Realm NILL Johnson, Strategic Intelligence: Volume V. Intelligence and Accountability: Safeguards Against the Abuse of Secret Power esp chapter 6-8 UB 250.S6385 REF ONLY L Johnson, Strategic Intelligence, Volume I. Understanding the Hidden Side of Government esp. chapter 4 UB 250.S6385 REF ONLY L Johnson, Hans Born and Iain Leigh (eds.) Who's Watching the Spies? Establishing Intelligence Service Accountability, UB 250.B6D. McKnight, Australia's Spies and their Secrets . NILR. Norton-Taylor, Truth is a Difficult Concept K Olmsted, Challenging the Secret Government: The Post-Watergate Investigations of the CIA and FBI, UB 271.O5A Roberts, Blacked Out L JC 801.R6KG Robertson, Secrecy and Open Government JC 832.R6F.J. Smist, Congress Oversees the United States Intelligence Community JC 242.S53A Thomkins, The Constitution After Scott esp ch 4 KM 61.T6 B Thompson & FF Ridley, Under the Scott Light JD 300.32.U6 D. Williams, Not in the Public Interest JC 832.W4D Vincent, The Culture of Secrecy JC 832.V4 Edward Woodward, One Brief Interval KB 15.W6

Articles - Core ReadingR.J. Aldrich, ‘Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem’, INS 24, 1 (2009): 26-56. P. Gill ‘Re-asserting Control’, INS 1, 2 (1996) P. Gill, The Intelligence and Security Committee and the challenge of security networks. Review of International Studies, 35 (2009): pp 929-941G. Hastedt, ‘The Politics of Intelligence Accountability’ in Loch Johnson (ed.) The Oxford Handbook of National Security IntelligenceW.H. Jackson, ‘Congressional Oversight of Intelligence: Search for a Framework’, INS 5, 3 (Jul. 1990): 113-147.L. Johnson, 'Accountability and America's Secret Foreign Policy: Keeping a Legislative Eye on the Central Intelligence Agency', Foreign Policy Analysis, 1, 1 (2005): 99-

35

S.F. Knott, ‘The Great Republican Transformation on Oversight’, International Journal of Intelligence and Counterintelligence 13, 1 (2000): 49-63. D. Omand, 'Can we have the Pleasure of the Grin without Seeing the Cat? Must the Effectiveness of Secret Agencies Inevitably Fade on Exposure to the Light?', INS, 23/5, 593-607. M.C. Ott, 'Partisanship and the Decline of Intelligence Oversight.' International Journal of Intelligence and Counterintelligence, (2003) 16, 1, p. 69-94. M. Phythian, 'The British experience with intelligence accountability', INS 22/1 (2007): 75-99. M. Pythian, ‘ "A Very British Institution": The Intelligence and Security Committee and Intelligence Accountability in the United Kingdom’ in Loch Johnson (ed.) The Oxford Handbook of National Security IntelligenceK.G. Robertson, 'Recent Reform of Intelligence in the UK', INS 13, 2 (1999): 144-59.

Articles - Supplementary ReadingH. Barnett, 'Legislation-based National Security Services', INS 9, 2 (April 1994): 287-300.L. Britt Snyder, 'Congressional Accountability and Intelligence after September 11,' in Jennifer E. Sims, and Burton L. Gerber, (eds.) Transforming U.S. Intelligence pp.239-58. UB 250.T7William J. Daugherty, 'Approval and Review of Covert Action Programs since Reagan.' International Journal of Intelligence and Counterintelligence 17/1 (2004): 62-80.S. Farson & G. Whitaker, ‘Accounting for the Future or the Past?: Developing Accountability and Oversight Systems to Meet Future Intelligence Needs’, in Loch Johnson (ed.) The Oxford Handbook of National Security IntelligenceP Gill, 'Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the 'war on terror', Intelligence & National Security 22/1 (2007):.14-37. P. Gill, 'Symbolic or Real? The Impact of the Canadian Security Intelligence Review Committee, 1984-88?', INS 4, 3 (July 1989): 550-75.P. Gill, 'Democratic and Parliamentary Accountability of Intelligence Services after September 11 th'. Working Paper 103, Geneva Centre for Democratic Control of Armed Forces, January. http://www.dcaf.ch/publications/Working_Papers/103.pdfAnthony Glees & Philip H.J. Davies. 'Intelligence, Iraq and the Limits of Legislative Accountability during Political Crisis,' Intelligence and National Security 21/ 5 (2006): 848-883.A. Hulnick, 'Openness: Being Public About Secret Intelligence.' International Journal of Intelligence and Counterintelligence, (Winter 1999), v. 12, no. 4, p. 463-483. J. Kibbe, ‘Congressional Oversight of Intelligence: Is the Solution Part of the Problem?’ INS 25, 1 (2010): 24-49. S.F. Knott, ‘The Great Republican Transformation on Oversight’, International Journal of Intelligence and Counterintelligence 13/1 (2000): 49-63. L Johnson, ’The CIA and the Question of Accountability’, INS 12, no. 1 (Jan. 1997): 178-200L Johnson, 'Covert Action and Accountability: Decision-Making for America's Secret Foreign Policy', ch.28 in Johnson & Wirtz, Intelligence and National Security: The Secret World of Spies, UB 250.I6H. P. Lee, 'The Australian Security Intelligence Organisation: New Mechanisms for Accountability', The International and Comparative Law Quarterly 38/4 (1989): 890-905L. Lustgarten, 'Accountability of the Security Services in Western Democracies', 1992 Current Legal Problems 145FF Manget, ‘Another System of Oversight: Intelligence and the Rise of Judicial Intervention.’, Studies in Intelligence 39, 5 (1996): 43-50. Also reproduced as ch.31 in Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies, UB 250.I6K.G. Robertson, 'Accountable Intelligence: The British Experience', Conflict Quarterly, VIII, 1 (1988).

36

F.F. Manget, ‘Another System of Oversight: Intelligence and the Rise of Judicial Intervention,’ Studies in Intelligence 39/5 (1996): 43-50. G. Merom, 'Virtue, Expediency and the CIA's Institutional Trap', INS 7, 2 (1992): 30-52. M. Phythian, 'Still a Matter of Trust: Post-9/11 British Intelligence and Political Culture', International Journal of Intelligence and CounterIntelligence 18/4 (2005):.653-81. R. Rempel, 'Canada's Parliamentary Oversight of Security and Intelligence,' International Journal of Intelligence and Counterintelligence 17/4 (2004): 634-54.F.A.O. Schwarz, 'The Church Committee and a New Era of Intelligence Oversight,' Intelligence and National Security 22/2 (2007):270-297.Matthew B. Walker, 'Reforming Congressional Oversight of Intelligence.' International Journal of Intelligence and Counterintelligence 19/4 (2006-7):702-720G.R. Weller, 'Oversight of Australia's Intelligence Services', International Journal of Intelligence and CounterIntelligence 12/4 (1999): 484-503. R. Whitaker, 'The "Bristow Affair": A Crisis of Accountability in Canadian Security Intelligence', INS 11, 2 (1996): 279-305.R. Whitaker, 'The Politics of Security Intelligence Policy-making in Canada: I 1970-84', INS 6, 4 (1992): 649-668.R. Whitaker, 'The Politics of Security Intelligence Policy-making in Canada: II 1984-91', INS 7, 2 (1992); 53-76.

13 The Problem of Surveillance and Civil Liberties

Seminar paper questions

13.1 How far can civil liberties be reconciled with the security demands made of the modern surveillance state after 11 September 2001?

13.2 Do technological societies and knowledge-based economies naturally produce ‘states of surveillance’, or do such new developments help us to curb excessive surveillance by the state ?

13.3 To what extent are security, democracy, affluence and privacy compatible in developed democratic states in the twenty-first century ?

13.4 ‘If citizens demand transparency of the state, then the state is entitled to demand transparency of its citizens.’ Discuss.

Books - Core Reading Andrew, Aldrich & Wark (eds), Secret Intelligence Chs. 20 & 21 UB 250.S6W Diffie & S Landau, Privacy on the Line, QA 73.4.D4 A Etzioni, The Limits of Privacy JC 542.E8K, Ewing, The bonfire of the liberties : New Labour, human rights, and the rule of law 2010S. Harris, The watchers : the rise of America’s surveillance state JE 300.T3 H27R Jeffreys-Jones, The CIA and American Democracy UB 271.U6 David Michael Levin, The Philosopher’s Gaze B 825.5.L3

37

D. Lyon, The Electronic Eye: The Rise of the Surveillance Society QA 73.4.L9 D. Lyon, Surveillance After September 11 HD 5062.L9 ]J Rosen, The Unwanted Gaze: The destruction of privacy in America KM 209.P7M Sidel, More Secure Less Free? JD 300.42.S4B Stockton, Flawed Patriot UB 271.U6F. Webster, Theories of the Information Society HE 1500.W3 [in Webster see especially chapter 4 on Anthony Giddens and surveillance]R Whitaker, The end of privacy : how total surveillance is becoming a reality HD 2000.W4 &

Books - Supplementary Reading C. Ackroyd et al, The Technology of Political Control U 240.T3R. Bengalli and C. Summer, Social Control and Political Order.HD 5020.S6R. Billingsley, T. Nemitz and P. Bean. Informers: policing, policy, practice HF 3811.I6W. Bogard, The Simulation of Surveillance: Hypercontrol in Telematic Societies. NILR.H. Blum, Surveillance and Espionage in a Free Society NILD. Campbell and S Connor, On the Record JC 532.C2M. Castells, The Rise of the Network Society HP 994.3.C2 - FH Cate, Privacy in the Information Age NILD. Cohen & J. Wells, (eds.) American National Security and Civil Liberties in an Era of Terrorism 1-4039-6200-6D. Cole and JX Dempsey, Terrorism and the Constitution Free Press 2002 1565847822 NILDyzenhaus, D, Civil Rights and Security, Ashgate Abingdon 2009A. Etzioni, & JH Marsh, eds. Rights vs. Public Safety After 9/11: America in the Age of Terrorism JD 300.42.R4S. Field and C Pelser (eds.) Invading the private : state accountability and new investigative methods in Europe NILSimon Garfinkel, Database Nation JC 542.G2P Gill, Rounding Up The Usual Suspects: Developments in Contemporary Law Enforcement Intelligence NIL John Gilliom, Overseers of the poor: surveillance, resistance, and the limits of privacy NILK.D. Haggerty & RV Ericson, The New Politics of Surveillance and Visibility (U Torotno Press, 2005) P. Hanks and J McManus (eds.), National Security: Surveillance and Accountability in a Democratic Society NILS. Hewitt, Snitch! a history of the modern intelligence informer UB 250.H3PB Heymann, Terrorism, Freedom and Security JE 300..42.T3Philip B. Heymann and Juliette N. Kayyem, Protecting Liberty in an Age of Terror JD 300.42.H3Michael Ignatieff, The Lesser Evil: Political Ethics in an Age of Terror JE 300.T3 R. Hunter, World without secrets: business, crime, and privacy in the age of ubiquitous computing NILJ Kampfner, Freedom for sale : why the world is trading democracy for security 2010G Kinsman, et al (eds) Whose national security? Canadian state surveillance and the creation of enemies NILR Leone & G Anrig, The War on Our Freedoms, NILT. Y. Levin, U. Frohne and P. Weibel. (ed) Rhetorics of surveillance from Bentham to Big Brother NILS. Levy, Crypto: Secrecy and Privacy in the New Code War QA 77.3.L3H. Margetts, Information Technology and Government: Britain and America NIL T. Monahan. Surveillance in the time of insecurity Rutgers UP 2009C. Fijnaut, Gary T. Marx, Undercover : police surveillance in comparative perspective NIL

38

L. Lustgarten and I. Leigh, In From the Cold: National Security and Democracy JE 215.L8 and especially parts I, II & IIIC. Norris and G. Armstrong, The Maximum surveillance society : the rise of CCTV HD 5011.N6 R. Norton-Taylor, In Defence of the Realm? NILS. Sharpe, Search and surveillance : the movement from evidence to information NILD. Stafford, The Delicate Balance: Security, Liberty and the Canadian Intelligence Community JC 543.S8 W.G. Staples, Everyday surveillance : vigilance and visibility in postmodern life NILWilliam G. Staples, The Culture of Surveillance: Discipline and social control in the United States. NILD. Thomas & B.D. Loader, (eds.) Cybercrime : law enforcement, security and surveillance in the information age HF 3200.C9 LC. Walker, The Prevention of Terrorism in British Law KM 562.2.W2

Articles - Core ReadingK.G. Robertson, 'Intelligence, Terrorism and Civil Liberties', Conflict Quarterly, 7, 2 (Spring 1987) available in P Wilkinson & AM Stewart (eds) Contemporary Research on Terrorism M. De Rosa, 'Privacy in the Age of Terror', The Washington Quarterly 26:3 (2003): 27–41. Online at - http://www.twq.com/03summer/docs/03summer_derosa.pdfJ. Sheptycki, 'High Policing in the Security Control Society', Policing 1/1 (2007): 70-79.HE Ventura, J Miller, J. Mitchell, M Deflem, ‘Governmentality and the War on Terror: FBI Project Carnivore and the Diffusion of Disciplinary Power’, Critical Criminology 13/1 (2005) 55-71.

Articles - Supplementary ReadingAkdeniz, Y., Taylor, N., and Walker, C., "Regulation of Investigatory Powers Act 2000: Bigbrother.gov.uk" [2001] Criminal Law Review 73-90 L. Amoore, 'Biometric borders: Governing mobilities in the war on terror', Political Geography 25/ 3 (2006) pp.336-351. C. Bell, ‘Surveillance Strategies and Populations at Risk’, Security Dialogue 37/2 (2006) pp.147-65.Robin Evans, ‘Bentham’s Panopticon: An incident in the social history of architecture,’ Architectural Association Quarterly 3/2 (1971) pp.21-37. C. Gearty, ‘Terrorism and Human Rights’, Government and Opposition 42/3 (2007) pp.340-62.P. Gill, 'Defining Subversion: The Canadian Experience since 1977,' Public Law 617 (1989) pp.617-636.Peter Gill, 'Not Just Joining the Dots But Crossing the Borders and Bridging the Voids: Constructing Security Networks after 11 September 2001' Policing and Society 16/1 (2006) pp.27-49.Michael Levi & David Wall, 'Technologies, Security, and Privacy in the Post-9/11 European Information Society', Journal of Law and Society 31/ 2 (2004) pp.194-220.M. Lianos and M. Douglas, ‘Dangerization and the End of Deviance: The Institutional Environment’ in R. Sparks and D. Garland (Eds) Criminology and Social Theory. Oxford University Press. 2000. HV6025.C7Kate Martin, 'Domestic Intelligence and Civil Liberties', SAIS Review 24/1, (2004), pp.7-21.Gary Marx, 'Some Concepts that May be Useful in Understanding the Myriad Forms and Contexts of Surveillance', in L.V. Scott and P.D. Jackson (eds.) Understanding Intelligence in the 21st Century, pp.78-98. UB 250.U53

39

Thomas Mathieson, ‘The Viewer Society: Foucault’s Panopticon revisited’ in Theoretical Criminology 1: 125-134. 1997. G. Marx, 'Some Concepts that May be Useful in Understanding the Myriad Forsm and Context of Surveillance' Ch 5. In LV Scott and PD Jackson (eds.) Understanding Intelligence in the 21st Century [this book is also Intelligence and National Security, 20, 1 (2004)] UB 250.U53Mark Poster, ‘Databases as discourse, or Electronic Interpellations,’ in D. Lyon and E. Zureik [Eds.] Computers, Surveillance and Privacy. (Minneapolis: University of Minnesota Press, 1996) pp.175-192. QA 73.4.C6 Ken Roach, 'The World Wide Expansion of Terrorism Laws after September 11,' Studi Senesi 116 (2004) pp.487-524. K.G. Robertson, 'Intelligence, Terrorism and Civil Liberties', Conflict Quarterly, 7/2 (1987) pp.43-62 also in P. Wilkinson & AM Stewart (eds.) Contemporary Research on Terrorism JE 300.T3Shlomo Shpiro, 'No Place to Hide: Intelligence and Civil Liberties in Israel', Cambridge Review of International Affairs 19/4 (2006) pp.629-48Thomas Mathieson, ‘The Viewer Society: Foucault’s Panopticon revisited’ in Theoretical Criminology 1 (1997) pp.125-134. Jennifer Sims, 'Intelligence to counter terror: The importance of all-source fusion', Intelligence & National Security, 22/1 (2007) pp.38-56.Lee S. Strickland, 'Civil Liberties vs. Intelligence Collection: The Secret Foreign Intelligence Surveillance Act Court Speaks in Public.' Government Information Quarterly 20/1 (2003) pp.1-12.

14 The Ethics of Espionage

Seminar paper questions

14.1 Can espionage form part of an ethical foreign policy?

14.2 'Espionage can be ethical but can never be moral'. Discuss.

14.3 How useful is the concept of 'Just War' as an ethical benchmark for both foreign intelligence collection and covert action?

Books - Core Reading Andrew, Aldrich & Wark (eds), Secret Intelligence Chs. 22 & 23 UB 250.S6Jan Goldman, (ed.), Ethics of Spying: A Reader for the Intelligence Professional NIL

Books - Supplementary Reading M. Herman, Intelligence in the Information Age NILJ Kish, International Law and Espionage KC 1306.K4James Olson, Fair Play: The Moral Dilemmas of Spying NIL

40

Articles - Core ReadingM. Andregg, ‘Ethics and Professional Intelligence’, in Loch Johnson (ed.) The Oxford Handbook of National Security Intelligence*T Erskine, 'As Rays of Light to the Human Soul', Ch.13. In LV Scott and PD Jackson (eds.) Understanding Intelligence in the 21st Century [also Intelligence and National Security, 20, 1 (2004)] UB 250.U53M.Herman, 'Ethics and Intelligence after September 2001', Ch.12 in In LV Scott and PD Jackson (eds.) Understanding Intelligence in the 21st Century [this is also Intelligence and National Security, 20, 1 (2004)] UB 250.U53F. Hitz, 'Unleashing the Rogue Elephant: September 11 and Letting the CIA Be the CIA' ch.29 in Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies, UB 250.I6Sir David Omand, 'Ethical Guidelines in Using Secret Intelligence for Public Security', Cambridge Review of International Affairs 19/4 (2006) pp.613-28.Sir Michael Quinlan, 'Just Intelligence: Prolegomena to an Ethical Theory.' Intelligence and National Security 22/1 (2007) pp.1-13, also in Peter Hennessy (ed.), The New Protective State pp.97-122. UB 251.N3

Articles - Supplementary ReadingH Cohen & R Dudai, 'Human Rights Dilemmas in Using Informers to Combat Terrorism: The Israeli-Palestinian Case'. Terrorism and Political Violence 17 (2005): 229-243 William E. Colby, 'Public Policy, Secret Action' Ethics and International Affairs 3 (1989) pp.61-71.GE Drexel. 'Ethics & Intelligence', Foreign Affairs 56, 3 (1978): 624-642.Paul G. Ericson, 'The Need for Ethical Norms,' Studies in Intelligence 36/5 (1992) pp.15-18.M. Herman, 'Modern Intelligence Services: Have They a Place in Ethical Foreign Policies.' In Agents for Change: Intelligence Services in the 21st Century, ed. Harold Shukman, 287-311. Michael Herman, 'Intelligence Services and Ethics in the New Millenium,' Irish Studies in International Affairs 10 (1999) pp.260-261.Michael Herman, 'Modern Intelligence Services: Have They a Place in Ethical Foreign Policies' in, Harold Shukman (ed.) Agents for Change: Intelligence Services in the 21st Century (London: St. Ermin's 2000) pp.287-311. Arthur S Hulnick & David W. Mattausch. 'Ethics and Morality in United States Secret Intelligence,' Harvard Journal of Law & Public Policy 12/2 (1989) pp.509-522.A. Hurrell, ‘‘There Are No Rules’ (George W. Bush): International Order After September 11th,’ International Relations 16, 2 (2002).Angela Gendron, 'Just War, Just Intelligence: An Ethical Framework for Foreign Espionage', International Journal of Intelligence and Counterintelligence 18, 3 (Fall 2005) 398-434 E.D. Godfrey, 'Ethics and Intelligence, ch.30 in Johnson and Wirtz, Intelligence and National Security: The Secret World of Spies UB 250.I6William R Johnson, 'Ethics and Clandestine Collection,' Studies in Intelligence 27/1 (1983):.1-8.John, S.J. Langan, 'Moral Damage and the Justification of Intelligence Collection from Human Sources,' Studies in Intelligence 25/2 (1981): 57-64.Sir David Omand, 'Ethical Guidelines in Using Secret Intelligence for Public Security', Cambridge Review of International Affairs 19/4 (2006): 613-28.Kent Pekel, 'Integrity, Ethics, and the CIA: The Need for Improvement,' Studies in Intelligence (1998): 85-94.

41

D. L. Perry, 'Repugnant Philosophy: Ethics, Espionage, and Covert Action,' Journal of Conflict Studies, 15, 1 (1995): 92–115.Tony Pfaff & Jeffrey Tiel, 'The ethics of espionage', Journal of Military Ethics 3/1, (2004):1-15.G. Treverton, 'Imposing a Standard: Covert Action and American Democracy,' Ethics & International Affairs 3 (1989) pp.27-43.G Treverton, "Covert Action and Open Society." Foreign Affairs 65, 5 (Summer 1987): 995-1014Richard R. Valcourt, 'Controlling U.S. Hired Hands.' International Journal of Intelligence and Counterintelligence 2/2 (1988) pp.163-178.

15 Torture and Assassination

Seminar paper questions

15.1 Can an ethical case ever be made for assassination?

15.2 Can an ethical case ever be made for the use of torture during interrogation?

15a TORTURE - articles are the key thing

Books - Core Reading Andrew, Aldrich & Wark (eds), Secret Intelligence Ch.24 UB 250.S6R. Crelinsten & A. Schmid, The Politics of Pain Boulder : Westview Press, 1994. S Levinson (ed.) Torture, esp pp. 257-90. HF 4100.T6D Rejali, Torture and Democracy HF 4010.R3P. Sands, Torture Team: Uncovering War Crimes in the Land of the Free JE 300.T3.S2

Books - Supplementary Reading M Bagaric, J Clarke, Torture: When the Unthinkable, NILM Danner, Torture and Truth NILJ. Gray, M. Benvenisti & B. Ehrenreich, Abu Ghraib: The Politics of Torture NILK Greenberg, Torture Debate in America <e book>K Greenberg & J Dratel, The Torture Papers HF 3342.T6 also e-resourceS Grey, Ghost Plane UB 271.U6J Jaffer, A Singh Administration of Torture <e book>M Lazreg, Torture and the Twilight of Empire: From Algiers to Baghdad HF 3300.L2C Mackey & G. Miller, The Interrogators: Inside the Secret War Against al Qaeda NIL AW McCoy, A Question of Torture: CIA Interrogation, from the Cold War to the War on Terror UB 271.U6R Meeropol, America’s Disappeared: Secret Imprisonment, Detainees & the War on Terror NILT Paglen & AC Thompson, Torture Taxi NILE. Saar, Inside the Wire : A Military Intelligence Soldier's Eyewitness Account of Life at Guantanamo JE 300.T3.S2P. Sands, Lawless World esp chs 7 & 9 JE 210.S2 S. Strasser, The Abu Ghraib Investigations: The Official Reports of the Independent Panel and Pentagon on the Shocking Prisoner Abuse in Iraq L NIL

42

T Williamson, Investigative Interviewing HF 3800.I6

Articles - Core ReadingMark Bowden, 'The Dark Art of Interrogation,' Atlantic Monthly, 292/3 (2003) pp.51–76.Gary Kern, 'Torture and Intelligence in the Global War on Terror', INS, 24, 3 (2009): 429 - 457 P.D. Kenny, ‘The Meaning of Torture’, Polity 42, 2 (2010): 131-155 Maureen Ramsay, 'Can the torture of terrorist suspects be justified?', The International Journal of Human Rights 10, 2 (2006):103-19.A Roberts, ‘Review Essay: Torture and Incompetence in the “War on Terror”’, Survival, 49, 1 (Spring 2007): 199-212H Schue, 'Torture', Philosophy and Public Affairs 7, 2 (1978): 124-43Jerome Slater, 'Tragic Choices in the War on Terrorism: Should We Try to Regulate and Control Torture?', Political Science Quarterly 121/2 (2006) pp.191-215.Marcy Strauss, 'Torture'. New York Law School Law Review, 48,1 & 2 (2004) pp.201-274 [see reply by Dershowitz above]

Articles - Supplementary ReadingF. Allhof, 'Terrorism and Torture', Int. Jnl of Applied Philosophy 17/1 (2003) pp.105-18.T.E. Ayres, ' "Six Floors" of Detainee Operations in the Post-9/11 World', Parameters, 35/3 (2005) pp.3-53.Mirko Bagaric and Julie Clarke, 'Not Enough Official Torture in the World? The Circumstances in Which Torture Is Morally Justifiable,' University of San Francisco of Law Review 39 (2005) pp.581-616. [see reply by Rumney below] Alex Bellamy, 'No pain, no gain? Torture and ethics in the war on terror', International Affairs 82/1 (2006) pp.121-48.Ruth Blakeley, 'Language, policy and the construction of a torture culture in the war on terrorism', Review of International Studies 33/1 (2007) pp.373-94.A.W. Clarke, ‘Rendition to Torture: A Critical Legal History’, Rutgers Law Review 62, 1 (2009): 1-74. C.R. Conrad & W.H. Moore, ‘What Stops the Torture?’, American Journal of Political Science 54, 2 (2010): 459-476. R. Crelinsten, 'The World of Torture: A Constructed Reality,' Theoretical Criminology 7/3 (2003) pp.293-318. Alex Danchev, ‘Accomplicity: Britain, Torture and Terror’, The British Journal of Politics and International Relations 8 (4) 2006Alan M. Dershowitz, “Reply: Torture Without Visibility And Accountability Is Worse Than With It,” University of Pennsylvania Journal of Constitutional Law 6 (2003):326. [reply to Kriemer, see below]Alan M. Dershowitz, 'The Torture Warrant: a Response to Professor Strauss", New York Law School Law Review 48 (2003) pp.275-294 [reply to Strauss, see below]HA Giroux, 'Education after Abu Graib: Revisiting Adorno's Politics of education' Cultural Studies 18, 6 (2004) 779-815.G Hooks & C Mosher, 'Outrages against personal dignity: Rationalizing abuse and torture in the war on terror' Social Forces, 83, 4 (2005): 1627-46.Richard Jackson, 'Language, policy and the construction of a torture culture in the war on terrorism', Review of International Studies 33/1 (2007) pp.353-371.Seth Kreimer, 'Too Close to the Rack and the Screw: Constitutional Constraints on Torture in the War on Terror,' University of Pennsylvania Journal of Constitutional Law 6 (2003) 278 [see reply by Dershowitz above]A. Lankford, ‘Assessing the Obama Standard for Interrogations: An Analysis of Army Field Manual 2-22.3’, Studies in Conflict and Terrorism, 33, 1 (2010): 20-35.

43

AC McCarthy 'Ticking Time bombs: Continuing the Torture Debate' National Review online 2005Alfred W. McCoy, 'Cruel Science: CIA Torture and U.S. Foreign Policy', New England Journal of Public Policy, 19/2 (2005) pp.1-54.Assaf Meydani, 'The Interrogation Policy of the Israeli General Security Service: Between Law and Politics', International Journal of Intelligence and CounterIntelligence 21, 1 (2008): 26-39. Assaf Meydani, 'Security and Human Rights Policy: Israel and the Interrogation Case of 1999', Contemporary Security Policy 28/3 (2007) pp.579-96. R Morgan' The Utilitarian Justification of Torture', Punishment and Society 2, 2 (2000) 181-96GL Neuman, 'Comment Counter-terrorist operations and the rule of law' European Journal of International Law 15, 5 (2004) 1019-29AW McCoy, 'Cruel Science: CIA Torture and U.S. Foreign Policy', New England Journal of Public Policy, 19, 2 (2005): 1-54.John T. Parry, 'What Is Torture, Are We Doing It, and What If We Are?' University of Pittsburgh Law Review 64 (2003) pp.237-262. Philip N.S. Rumney, 'Is Coercive Interrogation of Terrorist Suspects Effective? A Response to Bagaric and Clarke,' University of San Francisco of Law Review 40 (2006) pp.479-513 [see Bagaric and Clarke above]

Peace and Conflict: Journal of Peace Psychology, 13/4 (2007) is a special issue of eight essays focusing on torture.

15b ASSASSINATION - almost all the material is articles

Books Fabian Escalante, The Cuba Project 2004 NILRoland W. Haas: Enter the Past Tense: My Secret Life as a CIA Assassin Potomac Books, Dulles, VA, 2007, 264 p., $24.95. L. Johnson, Bombs, Bugs, Drugs and Thugs, NILB Stockton, Flawed Patriot UB 271.U6

Articles - Core ReadingDaniel S Byman 'Time to Kill? Assassinations and Foreign Policy,' 85/2 Foreign Affairs (2006) pp.95-111.ML Gross, 'Fighting by other means in the Mideast: a Critical Analysis of Israel's Assassination Policy', Political Studies 51/2 (2003) pp.350-68 [see the reply by Statman below].Daniel Statman (2003) 'The Morality of Assassination: A Response to Gross' Political Studies 51 (4), 775–779. [see Gross above]

Articles - Supplementary ReadingLouis Ren Beres, 'On Assassination, Preemption, and Counterterrorism: The View from International Law', International Journal of Intelligence and CounterIntelligence, 21/4 (2008): 694-725. B Berkowtiz, 'Is Assassination an Option?', Hoover Digest 2002, 1 at -http://www.hoover.org/publications/digest/4477731.htmlR.J. Bruemmer, "The Prohibition on Assassination: A Legal & Ethical Analysis." In In the Name of Intelligence: (eds.) Hayden B. Peake and Samuel Halpern, 137-165. J Claburn, "Public Constraints on Assassination as an Instrument of U.S. Foreign Policy." International Journal of Intelligence and Counterintelligence 7, 1 (1994): 97-109.

44

Steven R. David & Yael Stein, 'Israel's Policy of Targeted Killings,' Ethics and International Affairs 17/2 (2003) pp.111-126.K. Eichensehr, 'On the Offensive: Assassination Policy Under International Law', Harvard International Review 25/3 (Fall 2003)BM Johnson, "Executive Order 12,333: The Permissibility of an American Assassination of a Foreign Leader" Cornell International Law Journal 25, 2 (Spring 1992): 401-436.Asa Kasher & Amos Yadlin, 'Assassination and Preventive Killing', SAIS Review, 25/1 (2005) pp.41-57.D. Krezmer, ‘Targeted Killing of Suspected Terrorists: Extra-judicial Executions or Legitimate Means of Defence?’, European Journal of International Law 16/2 (2005) pp.171-212.C Lotrione, 'When to target Leaders', Washington Quarterly 26, 3 (2003): 73-86Eric Patterson & Teresa Casale, 'Targeting Terror: The Ethical and Practical Implications of Targeted Killing,' International Journal of Intelligence and Counterintelligence 18/4 (2005-2006) pp.638-652.JT Richelson, "When Kindness Fails: Assassination as a National Security Option." International Journal of Intelligence and Counterintelligence 15, 2 (Summer 2002): 243-274.Bruce A. Ross, 'The Case for Targeting Leadership in War,' Naval War College Review 46/1 (1993) pp.73-93.MN Schmitt, "State-Sponsored Assassination in International and Domestic Law" Yale Journal of International Law 17 (1992): 609-685.T Ward, 'Norms and Security: The Case of International Assassination', International Security 25, 1 (2000): 105-33.T. Ward, 'The New Age of Assassination', SAIS Review 25/1 (2005) pp.27-39.Patricia Zengel, 'Assassination and the Law of Armed Conflict,' Military Law Review 131 (1991) pp.23-55.

16 Reading Week - no lectures or seminars

E: INTELLIGENCE AND THE NEW WARFARE

17. Covert Action as Culture

Seminar paper questions

17.1 How far do you accept the view of Francis Stoner Saunders that those who pay the piper call the tune?

17.2 How far would you agree with Coleman's description of CIA cultural activities as a 'liberal conspiracy'?

17.3 What did the CIA hope to achieve through its cultural programmes, and who were its targets?

45

17.4 To what extent does covert action create problems for democratic peace theory? [see last section of this part of the reading list below for this subject]

Case Study of Tom Braden’s International Organisations Division

Books - Core Reading

The book that started the argument is -

FS Saunders, Who Paid the Piper? The CIA and the Cultural Cold War. E 812.5.S2

D Caute, The Dancer Defects D 843.C2 R Jeffreys-Jones, The CIA and American Democracy UB 271.U6 H Krabbendam and Giles Scott-Smith (eds.), The Cultural Cold War in Western Europe, 1945-1960 (London: Frank Cass, 2003) [good on Saunders] JE 224.C79H Laville, Cold War Women, JD 195.42.L2 H Laville & H Wilford, The US Government, Citizen Groups and the Cold War JB 2142.U8WS Lucas, Freedom’s War: The US Crusade Against the Soviet Union E 183.8.R9 H Laville & H Wilford, The US Government, Citizen Groups and the Cold War JB 2142.U8WS Lucas, Freedom’s War: The US Crusade Against the Soviet Union E 183.8.R9 G Scott-Smith, Giles. The Politics of Apolitical Culture: The Congress of Cultural Freedom, the CIA and Post-War American Hegemony. JE 224.S2H Wilford, The Mighty Wurlitzer: How the CIA Played America [critiques Saunders] NIL

Books - Supplementary ReadingRJ Aldrich, The Hidden Hand, chapters 5 & 16 E 183.8.G7 P Coleman, The Liberal Conspiracy: The Congress for Cultural Freedom and the Struggle for the Mind of Postwar Europe. D 839.2.C6 R. Helms, A Look Over My Shoulder, UB 271.U6W Hixson, Parting the Curtain: Propaganda, Culture, and the Cold War E 812.5.H4 L Johnson, Strategic Intelligence: Volume III. Covert Action: Behind the Veils of Secret Foreign Policy esp chapter 6 UB 250.S6385 REF ONLY J Kotek, Students and the Cold War. JD 301.K6 C Meyer, Facing Reality: From World Federalism to the CIA NILS Mickelson, America's Other Voices: The Story of Radio Free Europe and Radio Liberty. NILM Nelson, War of the Black Heavens: The Battles of Western Broadcasting in the Cold War NILGD Rawnsley, (ed). Cold-War Propaganda in the 1950s D 843.R2 G Treverton, Covert Action: The Limits of Intervention in the Postwar World L NILH Wilford, The CIA, the British Left and the Cold War: Calling the Tune? JE 242.W4

Articles - Core ReadingReally Important - WS Lucas, 'Revealing the Parameters of Opinion: An Interview with Frances Stonor Saunders,' Intelligence and National Security 18, 2 (2003): 15-40, for an interview with Saunders from January 2002.WS Lucas, 'Beyond Freedom, Beyond Control: Approaches to Culture and the State-Private Network in the Cold War.' Intelligence and National Security 18, 2 (Summer 2003): 53-72.M Warner, 'Origins of the Congress for Cultural Freedom, 1949-50.' Studies in Intelligence 38, 5 (1995): 89-98.

46

Articles - Supplementary ReadingR Aldrich, 'OSS, CIA and European Unity: The American Committee on United Europe, 1949-1960', Diplomacy and Statecraft, 8, 1 (March 1997): 184-227.J Kotek, 'Youth Organizations as a Battlefield in the Cold War.' Intelligence and National Security 18, no. 2 (Summer 2003): 168-191.H Laville, 'The Committee of Correspondence: CIA Funding of Women's Groups, 1952-1967.' Intelligence and National Security 12, 1 (Jan. 1997): 104-121.WS Lucas, 'Campaigns of Truth: The Psychological Strategy Board and American Ideology, 1951-1953.' International History Review 18, 2 (1996): 253-394.WS Lucas, 'Master and Servant? The US Government and the Founding of the British Association for American Studies,' European Journal of American Culture (2002) WS Lucas, 'Mobilising Culture: The CIA and State-Private Networks in the Early Cold War' in D. Carter and R. Clifton (eds.), Global Horizons (London: Macmillan, 2002) WS Lucas, 'Beyond Diplomatic History: Propaganda, Ideology, and US Foreign Policy,' in G. Rawnsley (ed.), Cold War Propaganda in the 1950s WS Lucas, 'Negotiating Freedom', Libertas, online at -http://www.libertas.bham.ac.uk/publications/articles/Negotiating%20Freedom.pdfJPC Matthews, 'The West's Secret Marshall Plan for the Mind.' International Journal of Intelligence and Counterintelligence 16, 3 (Fall 2003): 409-427.K Paget, 'From Stockholm to Leiden: The CIA's Role in the Formation of the International Student Conference.' INS 18, 2 (2003): 134-167. SJ Parry-Giles, 'The Eisenhower Administration's Conceptualization of the USIA: The Development of Overt and Covert Propaganda Strategies.' Presidential Studies Quarterly 24 (Spring 1994): 263-276.Edward Said, 'Hey Mister, You Want to Buy a Dirty Book?', [review of Saunders] London Review of Books, 30 Sept 1999, 21/19 G Scott-Smith, ''The Masterpieces of the Twentieth Century' Festival and the Congress for Cultural Freedom: Origins and Consolidation, 1947-52.' INS 15,1 (2000): 121-168.G Scott-Smith, ' "A Radical Democratic Political Offensive": Melvin J. Lasky, Der Monat, and the Congress of Cultural Freedom.' Journal of Contemporary History 35, 2 (Apr. 2000): 263-280.M Warner, 'Sophisticated Spies: CIA's Links to Liberal Anti-Communists, 1949-1967.' International Journal of Intelligence and Counterintelligence 9, 4 (1996/97): 425-433.

Or if you don't like history try Covert Action and Democratic Peace Theory -

W.J. Daugherty, ‘Covert Action: Strengths and Weaknesses’, in Loch Johnson (ed.) The Oxford Handbook of National Security IntelligenceMary Lauren Lilley and Alexander B. Downes, 'Covert Action, Democratic Peace, And The Cold War', Paper prepared for the annual meeting of the International Studies Association, San Francisco, CA, March 26-29, 2008. [On module web site]David P. Forsythe, 'Democracy, War, and Covert Action', Journal of Peace Research, 29, 4, (1992): 385-395.Tarak Barkawi and Mark Laffey, "The Imperial Peace: Democracy, Force, and Globalization," European Journal of International Relations 5, 4 (1999).Sebastian Rosato, 'The Flawed Logic of Democratic Peace Theory', American Political Science Review, 97, 4 (November 2003).

47

18 Intelligence and Deception D-Day case studySeminar paper questions

18.1 Why was the D-Day Deception campaign so successful?

18.2 What role does intelligence play in a campaign of military deception?

Books - Core ReadingJC Masterman, The Double-Cross System in the War of 1939-1945 D 810.S7

Books - Supplemtary ReadingJ Bowyer Bell & Barton Whaley Cheating and Deception NILC Cruickshank, Deception in World War II. D 744.C7 T Harris, Garbo: The Spy Who Saved D-Day D 810.S8 R Hesketh, Fortitude: The D-Day Deception Campaign UB 271.G7 T Holt, The Deceivers: Allied Military Deception in the Second World War NILM Howard, Strategic Deception. Vol. 5 of FH Hinsley, et. al. British Intelligence in the Second World War: Its Influence on Strategy and Operations. D 810.S7 R Miller, Codename TRICYCLE NILES Montagu, Beyond Top Secret Ultra. NILJ Pujol, with Nigel West. Garbo .. NILD Wheatley, The Deception Planners: My Secret War. NIL

Articles - Core ReadingBowyer J. Bell, 'Toward a Theory of Deception,' International Journal of Intelligence and Counterintelligence 16/2 (2003) pp.244-279.B Whaley, 'Towards a general theory of deception', Journal of Strategic Studies, 5, 1 (March 1982): 178-92. J Ferris, 'The Intelligence-Deception Complex: An Anatomy.' INS 4, 4 (1989): 719-734.J Ferris, ''FORTITUDE' in Context: The Evolution of British Military Deception in Two World Wars, 1914-1945.' In Paradoxes of Strategic Intelligence: Essays in Honor of Michael I. Handel, eds. Richard K. Betts and Thomas G. Mahnken, 117-165. NIL

Articles - Supplementary ReadingR Bennett, 'Fortitude, Ultra and the 'Need to Know.'' Intelligence and National Security 4, no. 3 (1989): 482-502.TL Cubbage, II. 'The Success of Operation Fortitude: Hesketh's History of Strategic Deception.' INS 2, 3 (1987): 327-346.

48

MI Handel, 'Introduction: Strategic and Operational Deception in Historical Perspective,' INS 2, 3 (July 1987) - [special issue on deception]Michael Handel, 'Intelligence and the Problem of Strategic Surprise,' Journal of Strategic Studies 7/3 (1984) pp.229-281.Richard J. Hueur, 'Strategic Deception and Counter-Deception', International Studies Quarterly 25/2 (1981) pp.294-327.KJ Müller, 'A German Perspective on Allied Deception Operations in the Second World War.' INS 2, no. 3 (1987): 301-326.B Whaley and J Busby, 'Detecting Deception: Practice, Practitioners, and Theory,' in R. Godson & J. Wirtz (eds.), Strategic Denial. and Deception: The Twenty-First Century

19 Intelligence for Peace:

NGOs, Peacemaking and Peacekeeping

Seminar paper questions

19.1 Does intelligence-gathering produce a safer and more stable world? Or does it provoke neighbours, while encouraging policy-makers in the belief that they are omniscient ?

19.2 Is a permanent UN intelligence agency desireable? If so, is it feasible?

19.3 What kinds of intelligence support is required for peacekeeping operations?

19.4 Examine the role of intelligence officers as clandestine peace brokers? What advantages and disadvantages do they carry?

Books - Core ReadingAndrew, Aldrich & Wark (eds), Secret Intelligence Chs. 28 & 29 UB 250.S6Ben de Jong et al (eds.) Peacekeeping Intelligence: Emerging Concepts for the Future, OSS Ltd, UB 250.P3David Carment & Martin Rudner, eds., Peacekeeping Intelligence: New Players, Extended Boundaries L UB 250.P4

Books - Supplemetary ReadingH Carmel (ed.), Intelligence for Peace UB 250.I6Klass van Walraven (ed), Early Warning and Conflict Prevention NILCees Wiebes. Intelligence and The War in Bosnia 1992-1995 DR 1313.7.M54.W5

Articles - Core ReadingW. Dorn, ‘United Nations Peacekeeping Intelligence’ in Loch Johnson (ed.) The Oxford Handbook of National Security IntelligenceBassey Ekpe, 'The Intelligence Assets of the United Nations: Sources, Methods, and Implications', International Journal of Intelligence and CounterIntelligence 20/3 (2007): 377 - 400.

49

Paul Johnston, 'No Cloak and Dagger Required: Intelligence Support to UN Peacekeeping,' Intelligence and National Security, 12/4, (1997)T. Quiggen, 'Response to 'No Cloak and Dagger', INS 13/4 (Winter 1998): 203-8.

On peace-brokers see- Len Scott, 'Secret Intelligence, Covert Action and Clandestine Diplomacy', Intelligence and National Security 19, 2 (2004) 322-34.S. Shpiro, 'The CIA as Middle East Peace Broker?', Survival, 45, 2, (2003): 91-112.(The last two are good for the peace-brokers essay)John D. Stempel, 'Covert Action and Diplomacy,' International Journal of Intelligence and Counterintelligence 20/1 (2007) pp.122-135.

Articles - Supplemetary ReadingD.A. Charters, 'Out of the Closet: Intelligence Support for UN Peacekeeping', in DA Charters (ed.) Intelligence. and Peacekeeping. Clementsport, NS: Canadian Peacekeeping S Chesterman, ‘Does the UN have intelligence?’, Survival, 48, 3 (Autumn 2006), 149-64. S. Chesterman, 'Shared Secrets: Intelligence And Collective Security', Lowy Institute, Paper 10 (2006) available at -http://iilj.org/research/documents/chesterman_shared_secrets_2006.pdfWilliam E. Demars, 'Hazardous Partnership: NGOs and United States Intelligence in Small Wars', International Journal of Intelligence and Counterintelligence 14/2 (2001) pp.193-222.A. Walter Dorn and David J.H. Bell, 'Intelligence and Peacekeeping: The UN Operation in the Congo 1960-64', International Peacekeeping 2/1 (1995) pp.11-33.A Walter Dorn, 'The Cloak and the Blue Beret: Limitations on Intelligence in UN Peacekeeping. International Journal of Intelligence and Counterintelligence, Vol. 12, 1998 also at - http://www.rmc.ca/academic/gradrech/dorn9_e.html A.W. Dorn, ‘Intelligence-led Peacekeeping: The United Nations Stabilization Mission in Haiti (MINUSTAH), 2006-07’, INS 24, 6 (2009): 805-835. Pär Eriksson, 'Intelligence in peacekeeping operations', International Journal of Intelligence and CounterIntelligence 10/1 (1997) pp.1-18. Anna Fitzgerald, 'Linkages Between SSR and Peacekeeping Intelligence', Journal of Security Sector Management, 1, 3 (December 2003): 1-8.D. Hannay, ‘Intelligence and International Agencies’, in Shukman (ed.), Agents forchange. Intelligence services in the 21st century, London, 2000, 179.Sir David Ramsbotham, 'Analysis and Assessment for Peacekeeping Operations, Intelligence and National Security 10/4 (1995) pp.162-75.Martin Rudner, 'The Future of Canada's Defence Intelligence', International Journal of Intelligence and CounterIntelligence 15/4 (2002) pp.540-564. P. Shetler-Jones, 'Intelligence in Integrated UN Peacekeeping Missions: The Joint Mission Analysis Centre', International Peacekeeping, 15, 4 (August 2008): 517-27. H. Smith, 'Intelligence and UN Peacekeeping', Survival, 36, 3 (Autumn 1994): 174-92.Robert David Steele, 'Peacekeeping Intelligence and Information Peacekeeping', International Journal of Intelligence and CounterIntelligence, 19/3 (2006) pp.519 - 537 A. Waller & D. Bell, 'Intelligence and Peacekeeping: The UN Operation in the Congo, 1960-64', International Peacekeeping, 2, 1 (Spring 1999).Peter Wilson, 'The contribution of intelligence services to security sector reform', Conflict, Security and Development 5/1 (2005) pp. 87-107.

50

Especially for Assessed Essay 19.1 - stability and risk

*M Herman, Intelligence Service in the Information Age, Ch.9, UB 250.H47R. Jeffreys-Jones, Cloak and Dollar: A History of American Secret Intelligence UB 271.U6J. Rusbridger, The Intelligence Game, NILS. Sagan, The Limits of Safety, [use section on the errant Alaskan U-2 sniffer flight of 1962] U 264.3.S24

F: THE FUTURE OF INTELLIGENCE

20 Reforming Intelligence in a Globalising World

Seminar paper questions

20.1 What sort of challenges does globalization offer to secret services?

20.2 Examine the contention that present day secret services remain locked in obsolete Cold War bureaucratic forms and have not yet addressed the perils of globalisation.

20.3 Why did the United States encountered such difficulty in reforming its intelligence community to meet new challenges after 2001?

20.4 'Only the privatisation of intelligence will permit secret services to achieve the fluidity required to deal with the transnational challenges the globalisation has helped to create'. Discuss.

A. GLOBALISATION ISSUES

Books - Core ReadingAndrew, Aldrich & Wark (eds), Secret Intelligence Ch.30 UB 250.S6TC Bruneau & S Boraz, Reforming Intelligence UB 250.R4 <e>S Tsang (ed.), Intelligence and Human Rights in the Era of Global Terrorism JE 300.T3.I6T. Shorrock, Spies for HireG. Treverton, Intelligence for an Age of Terror (Cambridge 2009) Ch.2

Books - Supplementary ReadingG. Adams, Buying National Security, Routledge 2010

51

B.J. Barber, Jihad vs McWorld JE 213.B2 B.J. Barber, Fear's Empire: War Terrorism and Democracy JE 242.B2 Deborah G. Barger RAND Toward a Revolution in Intelligence Affairs -Available at http://www.rand.org/pubs/technical_reports/2005/RAND_TR242.pdf NILH Friman & P Andreas (eds) The Illicit Global Economy and State Power HY 100.I5 H.R Friman, Narcodiplomacy, NILRY Pelton, Licensed to Kill (Crown) 140009781-9J Scahill, Blackwater (Nation) 1560259795Roger Scruton, The West and the Rest JE 210.S2 B Schneier, Beyond Fear JE 242.S2 F Varese, The Russian Mafia HF 3103.1.V2

Articles - Core ReadingR.J. Aldrich, 'Beyond the Vigilant State? Globalization and Intelligence', Review of International Studies, 35/4 (2009).

Stevyn Gibson, 'In the Eye of the Perfect Storm: Re-imagining Reforming and Refocusing Intelligence for Risk, Globalisation and Changing Societal Expectation', Risk Management 7/4 (2005): 23-41.

K.A. O'Brien,. Managing national security and law enforcement intelligence in a globalised world. Review of International Studies, 35 (2009): 903-915.

P. Maddrell, 'Failing Intelligence: U.S. Intelligence in the Age of Transnational Threats', International Journal of Intelligence and CounterIntelligence, 22/2 (2009): 195-220.

A. Martin & P. Wilson, 'The Value of Non-Governmental Intelligence: Widening the Field', INS, 23/6 (2008): 767-776.

Articles - Supplementary ReadingPeter Gill, 'Not Just Joining the Dots But Crossing the Borders and Bridging the Voids: Constructing Security Networks after 11 September 2001', Policing & Society, 16, 1 (March 2006): 27-49Gregory F. Treverton, “Intelligence and the Market State,” Studies in Intelligence, No. 10 (Winter-Spring 2001) Welsey K. Wark, 'Learning to Live with Intelligence', Intelligence and National Security 18/4 (Winter 2003) pp.1-14.

B. POST 9/11 EFFORTS AT REFORM

Books - Core ReadingR. Dover and M. Goodman (eds.) Spinning Intelligence (Hurst 2009) William E Odom, Fixing Intelligence: For a More Secure America. JC 704.2.O33Anonymous, [Michael Scheuer], Imperial Hubris JE 300.T3.S2R. Posner, Preventing Surprise Attacks: Intelligence Reform in the Wake of 9/11 UB 250.P6J Sims & B Gerber, Transforming US Intelligence UB 250.T7*WK Wark, Twenty-first Century Intelligence JC 842.T9

52

Books - Supplementary ReadingR. Baer, See No Evil: The True Story of a Groundsoldier in the CIA’s Counter-Terrorism Wars JC 701.42.B2 . R Posner, Uncertain Shield: the US Intelligence System in the Throes of Reform (NY 2006) UB 271.U6A. J. Rossmiller: Still Broken: A Recruit's Inside Account of Intelligence Failures, From Baghdad to the Pentagon (Presidio Press/Ballantine Books), New York, 2008, 236 p., $25.00.R Russell, Sharpening Strategic Intelligence Why the CIA Gets It Wrong and What Needs to Be Done to Get It Right, UB 271.U6K Williams & D Deletant, Security Intelligence Services in New Democracies: The Czech Republic, Slovakia and Romania, UB 250.W4

Articles - Core ReadingRK Betts, ‘Fixing Intelligence’ Foreign Affairs, 81 (January/February 2002)RK Betts, 'The New Politics of Intelligence: Will Reforms Work This Time?' Foreign Affairs, 83, 3 (May/June 2004)C. Cogan, 'Hunters not Gatherers: Intelligence in the 21st Century' Ch.11. In LV Scott and PD Jackson (eds.) Understanding Intelligence in the 21st Century [this book is also Intelligence and National Security, 20, 1 (2004)] UB 250.U53G. Hastedt, 'Foreign policy by commission: Reforming the intelligence community', INS 22/4 (2007): 443-472. Arthur Hulnick, 'Intelligence Reform 2008: Where to from Here?', International Journal of Intelligence and CounterIntelligence, 21/4 (2008): 621-634. P.R. Keefe, ‘Privatized Spying: The Emerging Intelligence Industry’, in Loch Johnson (ed.) The Oxford Handbook of National Security Intelligence

Articles - Supplementary ReadingH Fessenden, 'The Limits of Intelligence Reform', Foreign Affairs 84 (November- December 2005): 106-20M. Herman, 'The Future of Intelligence After September 11', International Relations, 16, 2 (August 2002)Richards J. Heuer, 'Limits of Intelligence Analysis', Orbis 49, 1 (Winter 2005)Arthur S. Hulnick, 'Intelligence Reform 2007: Fix or Fizzle?', International Journal of Intelligence and CounterIntelligence, 20/4 (2007): 567-582. W. Rees & R.J. Aldrich, 'Contending Cultures of Counter-Terrorism: Transatlantic Convergence or Divergence', International Affairs 81, 5 (October 2005)P.R. Neumann and M. L. R. Smith, 'Missing the Plot? Intelligence and Discourse Failure' Orbis 49, 1 (Winter 2005)

END

53

54