Skip to main content

Intelligence for Security

  • Reference work entry
  • First Online:
Handbook of Security Science
  • 1047 Accesses

Abstract

The use of intelligence by states to improve decision making and per se national security has been commonplace. Intelligence – the collection, processing, analysis, and sharing of information – has been seen as a state-based process, ensuring that decision makers are adequately forewarned of events and have the necessary information in front of them to make decisions to protect national security interests, even if, as the chapter shows, the role of intelligence in the private sector and nongovernmental organizations generally is on the increase. This chapter sets out the process of intelligence, discussing intelligence-related activities and the proliferation of intelligence, while concluding that such processes will always be necessary in shaping decision making and policy implementation to improve “security.”

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 549.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • ‘An Interview with Director of Central Intelligence George J. Tenet (S)’. Stud Intell 9

    Google Scholar 

  • Andrew C (2004) Intelligence, international relations and “under-theorisation”. Intell Natl Secur 19(2):170–184

    Article  Google Scholar 

  • Andrew C (2018) The secret world: a history of intelligence. Allan Lane, London

    Book  Google Scholar 

  • Baldwin DA (1997) The concept of security. Rev Int Stud 23:5

    Article  Google Scholar 

  • Ball J (2020) The real story of Cambridge Analytica and Brexit. The Spectator, 11 October 2020

    Google Scholar 

  • Bergman R (2019) Rise and kill first: the secret history of Israel’s targeted assassinations. John Murray, London

    Google Scholar 

  • Bowen W (1999) Open source Intel: a valuable national security resource. Jane’s Intell Rev 11:50–54

    Google Scholar 

  • Breakspear A (2013) A new definition of intelligence. Intell Natl Secur 28(5):1–16

    Google Scholar 

  • Bruce J, George R (2008) Analyzing intelligence: origins, obstacles, and innovations. Georgetown University Press, Washington, DC

    Google Scholar 

  • Buzan B (1977) Rethinking security after the cold war. Coop Confl 32(1):5–28

    Article  Google Scholar 

  • Cisco Annual Internet Report (2018–2023) White paper. https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html

  • Cogan C (2004) Hunters not gatherers: intelligence in the twenty-first century. Intell Natl Secur 19(2):304–321

    Article  Google Scholar 

  • Cradock P (2002) Know your enemy: how the joint intelligence committee saw the world. John Murray, London

    Google Scholar 

  • Davies PHJ (1996) The British secret services. ABC-Clio, Oxford

    Google Scholar 

  • Davies PHJ (2002) Ideas of intelligence: divergent national concepts and institutions. Harv Int Rev 24(3):62–67

    Google Scholar 

  • Davies PHJ (2012) Intelligence and governance in Britain and the United States, Vol. 1: Evolution of the U.S. Intelligence Community. Praeger, Santa Barbara

    Google Scholar 

  • Davies PHJ, Gustafson K, Rigden I (2013) The intelligence cycle is dead, long live the intelligence cycle: rethinking intelligence fundamentals for a new intelligence doctrine, p 3. https://bura.brunel.ac.uk/bitstream/2438/11901/3/Fulltext.pdf

  • Director GCHQ’s Speech at CYBERUK (2019). https://www.gchq.gov.uk/speech/director-s-speech-at-cyberuk-2019

  • DoD News Briefing – Secretary Rumsfield and Gen. Myers (12 February 2002). https://archive.defense.gov/Transcripts/Transcript.aspx?TranscriptID=2636

  • Farson S (1989) Schools of thought: national perceptions of intelligence. Conflict Q 9:52–104

    Google Scholar 

  • Ferris J (2003) Intelligence. In: Boyce R, Maiolo JA (eds) The origins of world war two: the debate continues. Palgrave Macmillan, New York

    Google Scholar 

  • Gentry JA (2020) An INS special forum: US intelligence officers’ involvement in political activities in the Trump era. Intell Natl Secur 35(1):1–19

    Article  Google Scholar 

  • Goodman MS (2010) The British way in intelligence. In: Major P, Moran C (eds) Spooked: Britain, empire and intelligence since 1945. Cambridge Scholars, Cambridge

    Google Scholar 

  • HC 898 (2004) Review of intelligence on weapons of mass destruction: report of a Committee of Privy Counsellors. The Stationary Office, London

    Google Scholar 

  • Herman M (1996) Intelligence power in peace and war. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • Herman M (2004) Ethics and intelligence after September 2001. Intell Natl Secur 19(2):342–358

    Article  Google Scholar 

  • Higgins E (2021) We are Bellingcat: an intelligence agency for the people. Bloomsbury, London

    Google Scholar 

  • Hope B, McNish J (2019) Black cube: the bumbling spies of the “private Mossad”. The Wall Street Journal, June 2019. https://www.wsj.com/articles/black-cube-the-bumbling-spies-of-the-private-mossad-11560793198

  • Houghton DP (2001) US foreign policy and the Iranian hostage crisis. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • Hulnick AS (2006) What’s wrong with the intelligence cycle. Intell Natl Secur 21(6):959–979

    Article  Google Scholar 

  • Jaffel HB, Hoffman A, Kearns O, Larsson S (2020) Collective discussion: toward critical approaches to intelligence as a social phenomenon. Int Polit Psychol 14:323

    Google Scholar 

  • Johnson LK (1986) Making the intelligence “cycle” work. Int J Intell Counter Intell 1(4):1–23

    Article  ADS  Google Scholar 

  • Johnson LK (2017) National security intelligence, 2nd edn. Cambridge, Polity

    Google Scholar 

  • Keefe PR (2010) Privatised spying: the emerging intelligence industry. In: Johnson (ed) National security intelligence. Oxford University Press, Oxford

    Google Scholar 

  • Kent S (1966) Strategic intelligence for American world policy. Princeton University Press, Princeton

    Book  Google Scholar 

  • Kibbe JE (2010) Covert action, pentagon style. In: The Oxford handbook of national security intelligence. Oxford University Press, Oxford

    Google Scholar 

  • Lefebvre S (2004) A look at intelligence analysis. Int J Intell Counter Intell 17:231–264

    Article  Google Scholar 

  • Lomas DWB, Murphy CJ (2019) Intelligence and Espionage: secrets and spies. Routledge, London

    Book  Google Scholar 

  • Lowenthal M (2009) Intelligence: from secrets to policy, 4th edn. CQ Press, Washington, DC

    Google Scholar 

  • Lowenthal M (2018) The future of intelligence. Polity, Cambridge

    Google Scholar 

  • MacGaffin J (2005) Clandestine Human Intelligence. In: Sims JE, Gerber B (eds) Transforming US intelligence. Georgetown University Press, Georgetown

    Google Scholar 

  • McGarrell EF, Freilich JD, Chermak S (2007) Intelligence-led policing as a framework for responding to terrorism. J Contemp Crim Justice 23(2):142–158

    Article  Google Scholar 

  • National Intelligence Machinery (2010). https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/61808/nim-november2010.pdf

  • National Security Act (1947)

    Google Scholar 

  • Obama’s Covert Drone War in Numbers. The Bureau of Investigative Journalism, 17 January 2017

    Google Scholar 

  • Olcott A (2012) Open source intelligence in a networked world. Continuum, London

    Google Scholar 

  • Olson JM (2019) To catch a spy: the art of counterintelligence. Georgetown University Press, Washington

    Google Scholar 

  • Omand D (2010) Securing the state. Hurst, London

    Google Scholar 

  • Omand D (2020) How spies think: ten lessons in intelligence. Viking, London

    Google Scholar 

  • Omand D. Is it time to beyond the intelligence cycle? In Phythian (ed) Understanding the intelligence cycle

    Google Scholar 

  • Omand D, Bartlett J, Miller C (2012) #Intelligence, Demos. https://demosuk.wpengine.com/wp-content/uploads/2017/03/intelligence-Report.pdf

  • Phythian M (2013) Cultures of national intelligence. In: Dover R, Goodman MS, Hillebrand C (eds) Cultures of national intelligence. Routledge, Oxon

    Chapter  Google Scholar 

  • Phythian M, Gill P (2018) Intelligence in an insecure world, 3rd edn. Polity, Cambridge

    Google Scholar 

  • Redhead M (2019) Revolving doors. Jane’s Intell Rev

    Google Scholar 

  • Shorrock T (2008) Spies for hire: the secret world of intelligence outsourcing. Simon & Schuster, New York

    Google Scholar 

  • Sims JE (1995) What is intelligence? Information for decision makers. In: Godson R, May E, Schmitt G (eds) US Intelligence at the crossroads: agendas for reform. Brassey’s, Washington

    Google Scholar 

  • Treverton GF, Jones SG, Boraz S (eds) (2006) Toward a theory of intelligence: workshop report. RAND Corporation, Santa Monica

    Google Scholar 

  • Urban M (1997) UK eyes alpha. Faber & Faber, London

    Google Scholar 

  • van Puyvelde D (2019) Outsourcing U.S. intelligence: contractors and government accountability. Edinburgh University Press, Edinburgh

    Book  Google Scholar 

  • Warner M (2002) Wanted: a definition of “intelligence”. Stud Intell 46(3). https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol46no3/article02.html

  • Warner M (2013) The past and future of the intelligence cycle. In: Phythian M (ed) Understanding the intelligence cycle. Routledge, Oxon

    Google Scholar 

  • Warner M (2014) The rise and fall of intelligence: an international security history. Georgetown University Press, Washington, DC

    Google Scholar 

  • Williams PD (2008) Security studies: an introduction. Routledge, Oxon

    Book  Google Scholar 

  • Wolfers A (1952) “National security” as an ambiguous symbol. Polit Sci Q 67(4):481

    Article  Google Scholar 

  • Wylie C (2019) Mindf*ck: inside Cambridge Analitica’s plot to break the world. Profile Books

    Google Scholar 

  • Zegart A (2020) Intelligence isn’t just for government anymore. Foreign Affairs, 2 November

    Google Scholar 

  • Zuboff S (2019) The age of surveillance capitalism: the fight for a human future at the new frontier of power. Profile Books, London

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel W. B. Lomas .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Lomas, D.W.B. (2022). Intelligence for Security. In: Masys, A.J. (eds) Handbook of Security Science. Springer, Cham. https://doi.org/10.1007/978-3-319-91875-4_38

Download citation

Publish with us

Policies and ethics