100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary Intelligence Revolutions Notes on *SOME* Readings - GRADE 7,5

Rating
-
Sold
16
Pages
16
Uploaded on
03-10-2023
Written in
2023/2024

Summary of *SOME* of the reading materials for the final exam (2023) for Intelligence Revolutions. INCLUDES notes from (Total: 16 pages): Daniel Byman’s article (2013) “The Intelligence War on Terrorism” in “Intelligence and National Security”, pp. 837-863. Charles Cogan’s article (2004) “Hunters not Gatherers: Intelligence in the Twenty-First Century” in “Intelligence and National Security”, pp. 304-321. Richard Aldrich’s article (2021) “From SIGINT to Cyber: A Hundred Years of Britain’s Biggest Intelligence Agency”, pp. 910-917. David Gioe, Michael Goodman and Tim Stevens’ article (2020) “Intelligence in the Cyber Era: Evolution or Revolution”, pp. 191-224. Maureen Ramsay’s article (2006) “Can the Torture of Terrorist Suspects Be Justified?”, pp. 103-119. Mirko Bagaric and Julie Clarke’s article (2005) “Not Enough Official Torture in the World? The Circumstances in Which Torture Is Morally Justifiable”, pp. 581-616. Michael L. Gross’ article (2003) “Fighting by Other Means in the Mideast: a Critical Analysis of Israel's Assassination Policy”, pp. 350-368. Daniel Statman’s article (2003) “The Morality of Assassination: A Response to Gross”, pp. 775-779.

Show more Read less
Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
October 3, 2023
File latest updated on
October 27, 2023
Number of pages
16
Written in
2023/2024
Type
Summary

Subjects

Content preview

Summary of *SOME* of the reading materials for the final exam (2023) for Intelligence Revolutions.
INCLUDES notes from (Total: 16 pages):
● Daniel Byman’s article (2013) “The Intelligence War on Terrorism” in “Intelligence and National Security”, pp.
837-863.
● Charles Cogan’s article (2004) “Hunters not Gatherers: Intelligence in the Twenty-First Century” in “Intelligence
and National Security”, pp. 304-321.
● Richard Aldrich’s article (2021) “From SIGINT to Cyber: A Hundred Years of Britain’s Biggest Intelligence Agency”,
pp. 910-917.
● David Gioe, Michael Goodman and Tim Stevens’ article (2020) “Intelligence in the Cyber Era: Evolution or
Revolution”, pp. 191-224.
● Maureen Ramsay’s article (2006) “Can the Torture of Terrorist Suspects Be Justified?”, pp. 103-119.
● Mirko Bagaric and Julie Clarke’s article (2005) “Not Enough Official Torture in the World? The Circumstances in
Which Torture Is Morally Justifiable”, pp. 581-616.
● Michael L. Gross’ article (2003) “Fighting by Other Means in the Mideast: a Critical Analysis of Israel's
Assassination Policy”, pp. 350-368.
● Daniel Statman’s article (2003) “The Morality of Assassination: A Response to Gross”, pp. 775-779.



Intelligence Revolutions Notes on *SOME* Readings


Table of Contents

“Intelligence and National Security” 1

The Intelligence War on Terrorism 1

“Hunters not Gatherers: Intelligence in the Twenty-First Century” 4

“From SIGINT to Cyber: A Hundred Years of Britain’s Biggest Intelligence Agency” 6

“Intelligence in the Cyber Era: Evolution or Revolution” 7

“Can the Torture of Terrorist Suspects Be Justified?” 10

“Not Enough Official Torture in the World? The Circumstances in Which Torture Is Morally

Justifiable” 12

“Fighting by Other Means in the Mideast: a Critical Analysis of Israel's Assassination

Policy” 14

“The Morality of Assassination: A Response to Gross” 15

, 1


“Intelligence and National Security”

The Intelligence War on Terrorism
Common criticisms of intelligence agencies (e.g., CIA) misunderstand counterterrorism
intelligence’s realities for gaining information on terrorist groups.
➔ Need to recognise differences when evaluating counterterrorism.
➔ Calls for being cautious with intelligence reform (i.e., changing US detention policy, making
the public more aware of the inevitable gaps).

Intelligence’s neglect is attributed to its shadowy nature.
➔ Counterterrorism intelligence is distinct from traditional intelligence & much of the work
does NOT emphasise these crucial distinctions (e.g., criticisms of the US intelligence
community for failing to reform after 9/11).
◆ CIA criticisms:
● Unable to infiltrate Al Qaeda’s inner circle.
● Relies too heavily on technical means to gather information
◆ Lacks attention regarding the importance of signals intelligence, liaison
relationships, document exploitation & interrogation.

What is Counterterrorism Intelligence?
Intelligence cycle:
1. Planning intelligence gathering.
2. Collecting intelligence.
➔ Counterrosim varies, including supplementary steps.
3. Processing the intelligence into a report.
4. Analysing the information.
5. Disseminating the information.

Terrorists as an Intelligence Challenge
Counterterrorism intelligence analysis requires knowing the adversary.
➔ Intelligence’s targets are proven terrorists & anyone who might commit terrorism in the
future = difficult to identify.
◆ Already even more difficult regarding Al Qaeda:
1. Has a global presence.
2. Is aware of the contours of the US intelligence effort & adjusts accordingly.
3. Its structures involve networks/hierarchies, making senior-level penetration
difficult.

Collection, Analysis & Counterterrorism
Variety of methods used in intelligence collection (i.e. ‘INTs’):
● Human spies (HUMINT).
➔ Traditional focus on slowly developing sources whose value pays off over time.
➔ With terrorism:
◆ Information’s value is short-lived.

, 2


◆ Information comes from interrogation (with/without torture).
➔ ‘DocEx’: Document exploitation.
➔ Foreign Liaison Relationships: Unrealistic for a country to have strong unilateral
capabilities in every country where a terrorist group is present. HOWEVER, foreign
governments can fill this gap acting as a force multiplier.
◆ Local governments can be part of the:
● Problem = are often corrupt & undemocratic, creating grievances
that terrorists work to exploit.
● Solution = these grievances create terrorist hotbeds, with allies
having impressive capabilities available (e.g., local languages,
cultural awareness, jails). These states can simply arrest
questionable people, as being a member of a terrorist group or
otherwise supporting violence is almost uniformly illegal.
● Intercepting phone calls, emails, tracking financing & other signals (SIGINT).
➔ Despite being particularly important in counterterrorism, signals intelligence is often
neglected.
➔ Deciding whom to monitor/locate can be exceptionally difficult, HOWEVER, SIGINT
can be valuable when monitoring careless terrorist communications.
● Imagery on terrorist activities (IMINT).

Counterterrorism Analysis
Involves puzzling together name fragments, phone numbers & other small pieces = very difficult.

Different Relationships among Analysts, Collectors & Policymakers
Divide between intelligence & policy in counterterrorism, as the intelligence community is a
producer & consumer of intelligence.
➔ Analysts drive the collection of information.
➔ The consumer of the information is often the intelligence community itself.

Dilemmas & Problems
Counterterrorism poses many challenges:
● Intelligence policy = exacerbated tension in terrorism by working with operatives involved in
violence (ethical & legal challenge).
● Coordination = counterterrorism involves multiple intelligence services.
● Interrogation & lack of an institutionalised detention program = shift away from this
essential practice, with NO suitable alternative.
● Issues overseas = difficulties, corruption & repression in hostile areas (e.g., Afghanistan,
Iran) where governments tolerate terrorist activity for their purposes (e.g., Pakistan, Yemen),
or where there is NO functioning government (e.g., Sudan).
➔ For counterterrorism, allies are found in countries with order problems & poor
economies.
➔ Liaison services may be less skilled in some aspects of counterterrorism. Often
foreign intelligence agencies within an autocratic country do NOT communicate (to
prevent a coup by limiting the necessary flow of information).
➔ Cooperation requires different intelligence partners within a foreign country.
CA$23.22
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
giacomoef Universiteit Leiden
Follow You need to be logged in order to follow users or courses
Sold
919
Member since
4 year
Number of followers
285
Documents
82
Last sold
3 days ago
Leiden University - IRO & CSM Notes

Creating concise notes and study guides for the following Leiden University programmes: - International Relations and Organisations (BSc) - Crisis and Security Management (MSc) [Cyber Security Governance] *All the money made (except the 40% that Stuvia keeps) will be donated to MSF’s (Doctors Without Borders) Palestine fund.*

4.6

135 reviews

5
101
4
23
3
6
2
2
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions