Skip to main content
Log in

The Puzzle of Intelligence Expertise: Spaces of Intelligence Analysis and the Production of “Political” Knowledge

  • Published:
Qualitative Sociology Aims and scope Submit manuscript

Abstract

Intelligence expertise presents a theoretical puzzle that challenges ideal-typical understandings of professional fields. Intelligence is not a strongly autonomous field where experts control the production and accreditation of knowledge. Yet, intelligence is not a field in decline. This paper explores this puzzle through the example of fusion centers, a national network of 78 interagency intelligence centers recognized by the Department of Homeland Security. It draws from over a year of fieldwork and interviews with 75 people who work in fusion centers in New York and New Jersey. It finds that the jurisdictional rivalries within fusion centers produce a dialectic tension: Efforts to secure professional autonomy are frustrated by forces that marshal intelligence expertise as a resource in larger battles in the bureaucratic field. This dialectic produces continual battles over institutional resources and a deeper definitional struggle over the nature of intelligence. Theoretically, this paper suggests that intelligence expertise is located in “spaces between fields.” While some have positioned “spaces between fields” as a transitional stage in the formation or decline of a field, intelligence expertise constitutes a unique form of expert knowledge that persists in the interstices between more established fields. As a result of this liminal and ambiguous position, intelligence expertise does not produce “rational” knowledge on its own terms. Instead, it produces “political” knowledge shaped by the shifting dynamics of the bureaucratic field.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. There were many reasons for mission creep. Administrators needed to justify the resources invested, and, in the absence of threats from terrorism, analysts had to use their time constructively (Monahan and Regan 2013, 10). In the aftermath of Hurricane Katrina, many fusion centers expanded their mission in an effort to facilitate collaboration with public health and emergency services (Rollins 2008, 21, 23).

  2. This review does not cover all the specialized intelligence literature. The interdisciplinary subfield of intelligence studies, for example, began as the professional project of CIA analaysts, who established Studies in Intelligence, a peer reviewed journal covering intelligence history and tradecraft. In 1990, the CIA partially declassified the journal. Since the end of the Cold War, intelligence studies expanded into the academic field (Westerfield 1995, xii-xvi). Reflecting its origins, however, intelligence studies remains mostly focused on foreign intelligence. For example, Intelligence and National Security, the main academic journal of US-based intelligence studies, includes only one article on fusion centers (Sims 2007).

  3. Similar to the controversy that followed the 2009 DHS report, the transition from the wartime OSS to the Cold War CIA involved scandal. A group of analysts were purged after their skeptical assessments of the USSR’s ambitions in Eastern Europe were leaked to a group of Republican senators (Simpson 1988, 58–59). Four years later in 1949, Cold War politics were so entrenched in intelligence analysis that they suppressed Project Jigsaw, a report that concluded that Moscow did not meaningfully control communist movements across the world (Barnes 1981, 651).

  4. There are several examples of intelligence analysts succumbing to pressure to support desired policing shifts. During the abandonment of détente and the massive increase in defense spending under Reagan and the 2003 invasion of Iraq, for example, administration officials willfully ignored skeptical intelligence assessments and created special teams to produce conclusions that supported their desired policies (Gervasi 1986, 152–165, 209–212, 225–229; Cahn 1998, 139–162; Prados 2004; Pillar 2006; Tenent 2007, 309–318). More recently, 50 intelligence analysts went public to allege that senior officials manipulated their reports to present US efforts to overthrow the Islamic State in a more favorable light (Mazzetti and Appuzo 2015).

  5. Existing work on intelligence analysis further supports this assertion. Rob Johnston’s ethnographic study of CIA analysts finds that, although intelligence work is trending towards shorter pieces (both in length and scope), analysts still place a premium on longer-term strategic assessment. Accordingly, analysts expressed frustration with their inability to assert their analytic independence and conduct strategic assessments and other “big picture” work (Johnston 2005, 13–14, 27).

References

  • Abold, Justin. Lewis, Raymond Guidetti, and Douglas Keyer. (2012). Strengthening the value of the national network of fusion centers by leveraging specialization: Defining “centers of analytical excellence.” Homeland Security Affairs 8(1): 2–28.

  • Barnes, Trevor. (1981). The secret Cold War: The CIA and American foreign policy in Europe, 1946–1956. Part I. The Historical Journal 24(2): 399–415.

    Article  Google Scholar 

  • Beirich, Heidi. (2011). Inside the DHS: Former top analyst says agency bowed to political pressure. Southern Poverty Law Center. Intelligence Report. Summer. http://www.splcenter.org/get-informed/intelligence-report/browse-all-issues/2011/summer/inside-the-dhs-former-top-analyst-says-agency-bowed. Accessed 20 August 2012.

  • Biernacki, Patrick, and Dan Waldorf. (1981). Snowball sampling: Problems and techniques of chain referral sampling. Sociological Methods and Research 10(2): 141–163.

    Google Scholar 

  • Bourdieu, Pierre. 1975. The specificity of the scientific field and the social conditions of the progress of reason. Social Science Information 14(6): 19–47.

    Article  Google Scholar 

  • Bourdieu, Pierre. (1996). The rules of art: Genesis and structure of the literary field. Stanford: Stanford University Press.

  • Bourdieu, Pierre. (1998). Practical reason: On the theory of action. Stanford: Stanford University Press.

  • Bourdieu, Pierre. (2000). Pascalian meditations. Stanford: Stanford University Press.

  • Bourdieu, Pierre. (2005). The political field, the social science field, and the journalistic field. In Bourdieu and the journalistic field, eds. Rodney Benson and Erik Neveu, 29–47. Malden: Polity.

  • Cahn, Anne. Hessing. (1998). Killing détente: The right attacks the CIA. University Park: Pennsylvania State University Press.

  • Carter, Jeremey, and Steven Chermak. (2012). Evidence-based intelligence practices: Examining the role of fusion centers as a critical source of information. Evidence-based Counterterrorism Policy 3: 65–88.

    Article  Google Scholar 

  • Cooney, Mikaela, Jeff Rojek, and Robert Kaminski. (2011). An assessment of the utility of a state fusion center by law enforcement executives and personnel. IALEIA Journal 20(1): 1–18.

    Google Scholar 

  • DHS, Office of Intelligence and Analysis. (2009). Right wing extremism: Current economic and political climate fueling a resurgence in radicalization and recruitment. The Department of Homeland Security. http://fas.org/irp/eprint/rightwing.pdf. Accessed 20 August 2012.

  • Eyal, Gil. (2006). The disenchantment of the Orient: Expertise in Arab affairs and the Israeli state. Stanford: Stanford University Press.

  • Eyal, Gil. (2013). Spaces between fields. In Bourdieu and historical analysis, ed. Philip Gorski, 162–177. Chapel Hill: Duke University Press.

    Google Scholar 

  • Eyal, Gil, and Grace Pok. (2015). What is security expertise? In Security expertise: Practice, power, responsibility, eds. Trine Villumsen Berling, and Christian Bueger, 37–59. New York: Routledge.

    Google Scholar 

  • Frickel, Scott, and Neil Gross. (2005). A. General Theory of Scientific/Intellectual Movements American Sociological Review 70(2): 204–232.

    Google Scholar 

  • Fung, Brian. (2014). 5.1 million Americans have security clearances. That’s more than the entire population of Norway. Washington Post, March 24. https://www.washingtonpost.com/news/the-switch/wp/2014/03/24/5-1-million-americans-have-security-clearances-thats-more-than-the-entire-population-of-norway/. Accessed 1 July 2014.

  • Galison, Peter. (2004). Removing knowledge. Critical Inquiry 3(1): 229–243.

    Article  Google Scholar 

  • German, Mike and Jay Stanley. (2007), December. What’s wrong with fusion centers. American Civil Liberties Union. http://www.aclu.org/files/pdfs/privacy/fusioncenter_20071212.pdf. Accessed 3 January 2012.

  • German, Mike and Jay Stanley. (2008), July. Fusion center update. American Civil Liberties Union. http://www.aclu.org/files/pdfs/privacy/fusion_update_20080729.pdf. Accessed 3 January 2012.

  • Gervasi, Tom. (1986). The myth of soviet military supremacy. New York: Harper Collins.

  • Graphia-Joyal, Renee. (2010). Are fusion centers achieving their intended purposes? Findings from a qualitative study on the internal efficacy of state fusion centers. IALEIA Journal 19(1): 54–76.

    Google Scholar 

  • Graphia-Joyal, Renee. (2012). How far have we come? Information sharing, interagency collaboration, and trust within the law enforcement community. Criminal Justice Studies 25(4): 357–370.

    Google Scholar 

  • Greenberg, Andy. (2012). This machine kills secrets: Julian Assange, the cypherpunks, and their fight to empower ehistleblowers. New York: Penguin.

  • Guidetti, Rarymond and Morentz, James. (2010). Geospatial statistical modeling for intelligence-led policing. The Police Chief LXXVII. http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_archandarticle_id=2152andissue_id=82010. Accessed 4 August 2012.

  • Hodai, Beau. (2013). Dissent or terror: How the nations counter terrorism apparatus, in partnership with corporate America, turned on Occupy Wall Street. Center for Media and Democracy and BDA Press, May http://www.prwatch.org/files/Dissent%20or%20Terror%20FINAL.pdf. Accessed 20 May 2013.

  • Holden, Jeremy. (2009). Conservative media freak-out: Claim Obama DHS targeting conservatives in report on right-wing extremists. Media Matters, April 15. http://mediamatters.org/research/2009/04/15/conservative-media-freak-out-claim-obama-dhs-ta/149185. Accessed 2 July 2015.

  • Jackson, Arrick, and Micheal Brown. (2007). Ensuring effficiency, interagency cooperation, and protection of civil liberties: Shifting from a traditional model of policing to an intelligence-led policing (ILP) paradigm. Criminal Justice Studies 20(2): 111–129.

    Article  Google Scholar 

  • Johnston, Rob. (2005). Analytic culture in the intelligence community: An ethnographic study. Pittsburg: Government Printing Office.

    Google Scholar 

  • Maguire, Mark, and John Tom. (2006). Intelligence-led policing, managerialism and community engagement: Competing priorities and the role of the national intelligence model in the UK. Policing and Society 16(1): 67–85.

    Article  Google Scholar 

  • Marrapodi, Eric. (2009). Napolitano apologizes to veterans over “extremist” flap. CNN, April 24. http://www.cnn.com/2009/POLITICS/04/24/napolitano.am.legion/. Accessed 2 July 2015.

  • Martin, William, and Brendan McQuade. (2014). Militarising – And marginalising? – African studies USA. Review of African Political Economy 41(141): 441–457.

    Article  Google Scholar 

  • Mazzetti, Mark. and Appuzo, Matt. (2015). Military analysts again raises red flags on progress in Iraq. New York Times, September 23. http://www.nytimes.com/2015/09/24/world/military-analyst-again-raises-red-flags-on-progress-in-iraq.html. Accessed 23 September 2015.

  • McQuade, Brendan. (2016). Police and the post-9/11 surveillance surge: “Technological dramas” in the “bureaucratic field.” Surveillance and Society 14(1): 1–19.

  • Medvetz, Thomas. (2012a). Think tanks in America. Chicago: University of Chicago Press.

    Book  Google Scholar 

  • Medvetz, Thomas. (2012b). Murky power: “think tanks” as boundary organizations. Research in the Sociology of Organizations 34: 113–133.

    Article  Google Scholar 

  • Milgram, Anne. (2008). Attorney General Law Enforcement Directive No. 2008–1: Submission and Analysis of Information Relating to Seized and Recovered Firearms. State of New Jersey, Office of Attorney General, Department of Law and Public Safety, March 17 http://www.nj.gov/oag/newsreleases08/dir20080318.pdf. Accessed 20 January 2012.

  • Miller, Judith. (2008). Intelligent policing comes to New Jersey. City Journal 18 http://www.city-journal.org/2008/18_3_snd-new_jersey_policing.html. Accessed 24 October 2012.

  • Monahan, Torin, and Priscilla Regan. (2013). Zones of opacity: Data fusion in post-9/11 security organizations. Canadian Journal of Law and Society 27(3): 301–317.

  • National Commission on Terrorist Attacks upon the United States. (2004). The 9/11 commission report: Final report of the national commission on terrorist attacks upon the United States. New York: WW Norton and Company.

  • NJ ROIC. Intelligence Analysis Threat Unit. (2014a) NJ ROIC intelligence and analysis threat unit daily overview. New Jersey Regional Operations Intelligence Center, March 14. https://groups.google.com/forum/#!searchin/nj-fire-chiefs/NJ$20ROIC$20march$2014/nj-fire-chiefs/XiYyO76yh7I/DpFx24RPr4YJ. Accessed 25 June 2014.

  • NJ ROIC. Intelligence Analysis Threat Unit. (2014b). NJ ROIC intelligence and analysis threat unit daily overview. The New Jersey Regional Operations Intelligence Center, July 24 https://groups.google.com/forum/#!searchin/nj-fire-chiefs/ROIC$20july$2025/nj-fire-chiefs/c3DHmwn5MDI/PUlw-RJtuj4J. Accessed July 27, 2014.

  • NYSIC. (n.d.) The WIRE connections/successes. New York State Intelligence Center.

  • Paglen, Trevor. (2010). Blank spots on the map: The dark geography of the Pentagons secret world. New York: Penguin.

  • Pillar, Paul. (2006). Intelligence, policy, and the war in Iraq. Foreign Affairs 85: 15–27.

    Article  Google Scholar 

  • Prados, John. (2004). Hoodwinked: The documents that reveal how Bush sold us a war. New York: The New Press.

  • Price, Michael. (2013). National security and local police. The Brennan Center. http://www.brennancenter.org/sites/default/files/publications/NationalSecurity_LocalPolice_web.pdf. Accessed 24 March 2013.

  • Priest, Dana, and William Arkin, W. M. (2011). Top secret America: The rise of the new American security state. New York: Little, Brown and Co.

  • Ratcliffe, Jerry. (2008). Intelligence-led policing. Portland: Wilan Publishing.

  • Ratcliffe, Jerry, and Raymond Guidetti. 2008. State police investigative structure and the adoption of intelligence-led policing. Policing: An International Journal of Police Strategies and Management 31(1): 109–128.

    Article  Google Scholar 

  • Ratcliffe, Jerry, and Kyle Walden. (2010). State police and the intelligence center: A study of intelligence flow to and from the street. IALEIA 19(1): 1–19.

    Google Scholar 

  • Regan, Priscilla and Torin Monahan. (2013). Beyond counterterrorism: Data sharing, privacy and organizational histories of DHS Fusion Centers.” International Journal of E-Politics 4 (3): 1–14.

  • Regan, Priscilla, and Torin Monahan. (2014). Fusion center accountability and intergovernmental information sharing. Publius: The Journal of Federalism 44(3): 475–498.

    Article  Google Scholar 

  • Regan, Priscilla, Torin Monahan, and Krista Craven. (2015). Constructing the suspicious: Data production, circulation, and interpretation by DHS fusion centers. Administration and Society 47(6): 740–762.

    Article  Google Scholar 

  • Rollins, John. (2008). Fusion centers: Issues and options for congress. Congressional Research Service. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA482006. Accessed 12 March 2012.

  • Sheptycki, James. (2004). Organizational pathologies in police intelligence systems some contributions to the lexicon of intelligence-led policing. European Journal of Criminology 1(3): 307–332.

    Article  Google Scholar 

  • Simpson, Christopher. (1988). Blowback: The first full account of Americas recruitment of Nazis and its disastrous effect on the Cold War, our domestic and foreign policy. New York: Weidenfeld and Nicolson.

  • Sims, Jennifer. (2007). Intelligence to counter-terror: The importance of all-source fusion. Intelligence and National Security. 22(1): 38–56.

    Article  Google Scholar 

  • Smith, R. Jeffrey. (2011). Homeland security department curtails home-grown terror analysis. The Washington Post, July 7. http://www.washingtonpost.com/politics/homeland-security-department-curtails-home-grown-terror-analysis/2011/06/02/AGQEaDLH_story.html. Accessed 2 July 2015.

  • Stampnitzky, Lisa. (2011). Disciplining an unruly field: Terrorism experts and theories of scientifisc/intellectual production. Qualitative Sociology 34(1): 1–19.

    Article  Google Scholar 

  • Stampnitzky, Lisa. (2013). Disciplining terror: How experts inventedterrorism.” New York: Cambridge University Press.

  • Tenent, G. (2007). At the center of the storm: My years at the CIA. New York: Harper Collins.

  • US Senate, Permanent Subcommittee on Investigations. (2012). Federal Support for and Involvement in State and Local Fusion Centers, October 3. http://www.coburn.senate.gov/public/index.cfm/files/serve?File_id= 693b820a-0493-405f-a8b5-0e3438cc9b24. Accessed 3 October 2012.

  • Wacquant, Loic. (2010). Crafting the neoliberal state: Workfare, prisonfare, and social insecurity. Sociological Forum 25(2): 197–220.

    Article  Google Scholar 

  • Westerfield, H. Bradford. (1995). Inside CIAs private world: Declassified articles from the agencys internal journal, 1955–1992. New Haven: Yale University Press.

Interviews Cited

  • Chief of staff, county prosecutor’s office. 2013. Interview by Author. June 9.

  • Detective. 2013. Interview by Author. June 5.Detective lieutenant. 2013. Interview by Author. March 13.

  • Intelligence analyst. 2013a. Interview by Author. January 28.

  • Intelligence analyst. 2013b. Interview by Author. February 27.

  • Intelligence analyst. 2013c Interview by Author. February 27.

  • Intelligence analyst. 2013d. Interview by Author. February 27.

  • Intelligence analyst. 2013e. Interview by Author. February 27.

  • Intelligence analyst. 2013 f. Interview by Author. February 27.

  • Intelligence analyst. 2013 g. Interview by Author. April 30.

  • Intelligence analyst. 2013 h. Interview by Author. July 1.

  • Intelligence analyst. 2013i. Interview by Author. July 21.

  • Intelligence analyst. 2013j. Interview by Author. August 2.

  • Intelligence analyst. 2013 k. Interview by Author. August 7.

  • State trooper. 2013a. Interview by Author. January 29.

  • State trooper. 2013b. Interview by Author. February 27.

  • State trooper. 2013c. Interview by Author. February 27.

  • State trooper. 2013d. Interview by Author. May 14.

  • State trooper. 2013e. Interview by Author. May 14.

  • State trooper. 2013 f. Interview by Author. May 14.

Download references

Acknowledgments

The author thanks Philip Lewin, Sara Lillo, Brian Perkins, and Lisa Stampnitzky, along with several anonymous reviewers for Qualitative Sociology for their helpful comments on earlier drafts. I am extremely grateful to all those who agreed to be interviewed about their work in domestic intelligence.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Brendan McQuade.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

McQuade, B. The Puzzle of Intelligence Expertise: Spaces of Intelligence Analysis and the Production of “Political” Knowledge. Qual Sociol 39, 247–265 (2016). https://doi.org/10.1007/s11133-016-9335-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11133-016-9335-6

Keywords

Navigation