Military Intelligence: From Telling Truth to Power to Bewilderment?

  • Floribert Baudet
  • Eleni Braat
  • Jeoffrey van Woensel
  • Aad Wever
Chapter

Abstract

This introductory chapter discusses 100 years of military intelligence and outlines the main changes that distinguish the post-Cold war period from the preceding one. This is characterised by a blurring of the boundaries between civilian and military intelligence, between investigative services and the intelligence community, and the foreign and domestic realms. The chapter also discusses the rise of oversight mechanisms. All these combined with unprecedented technological change to produce a challenging environment for intelligence services that is more unpredictable than ever before, and at the same time requires adequate, even pre-emptive responses on the part of the intelligence community. The dazzling level of adaptivity required largely obscures the fact that such adaptations were required in earlier periods as well, and intelligence professionals could profit by studying them.

Keywords

Military intelligence Globalisation Adaptation Learning organizations 

References

  1. ahumanright.org (2014) A human right: Everyone connected http://ahumanright.org Accessed 10 December 2015.
  2. Atwan AB (2016) Das digitale Kalifat: Die geheime Macht des Islamischen Staates. Beck, MunichGoogle Scholar
  3. Baudet FH (2013) Quelques réflexions sur l’exploitation du passé dans les forces armées. Air and Space Power Journal – Africa and Francophonie 4(4):4–14Google Scholar
  4. Beausang F (2012) Globalization and the BRICs: Why the BRICs Will Not Rule the World For Long. Palgrave McMillan, LondonGoogle Scholar
  5. Bellingcat (2016) Behind the Dutch terror threat video: the St. Petersburg “Troll Factory” connection. Bellingcat 3 April 2016. https://www.bellingcat.com/news/uk-and-europe/2016/04/03/azov-video/
  6. Berton B, Pawlak P (2015) Cyber jihadists and their web. European Union Institute for Security Studies Brief Issue 2, BrusselsGoogle Scholar
  7. Black J (2016) Air Power: A Global History. Rowman & Littlefield, LondonGoogle Scholar
  8. Brewster D (2014) India’s Ocean: The Story of India’s Bid for Regional Leadership. Routledge, LondonGoogle Scholar
  9. Bunker R (2012) Changing Forms of Insurgency: Pirates, Narco Gangs and Failed States. In: Rich PB, Duyvesteyn I (eds) The Routledge Handbook of Insurgency and Counterinsurgency. Routledge, London, pp. 45–53Google Scholar
  10. Cohen E (2003) Supreme command. Soldiers, statesmen and leadership in wartime. Free Press, New YorkGoogle Scholar
  11. Committee on Legal Affairs and Human Rights of the Parliamentary Assembly of the Council of Europe (2006) Alleged secret detentions in Council of Europe member states. Information Memorandum II, AS/Jur (2006) 03 rev http://assembly.coe.int/committeedocs/2006/20060124_jdoc032006_e.pdf Accessed 8 February 2016
  12. Conversi D (2012) Irresponsible Radicalisation: Diasporas, Globalisation and Long-Distance Nationalism in the Digital Age. Journal of Ethnic and Migration Studies 38(9):1357–1379Google Scholar
  13. Council of Europe. Commissioner for Human Rights (2015) Intelligence: “French Draft law seriously infringes human rights”.Google Scholar
  14. Cunningham F (2002) Theories of democracy: A critical introduction. Routledge, LondonGoogle Scholar
  15. de Wijk R (2012) Hybrid Conflict and the Changing Nature of Actors. In: Lindley-French J, Boyer Y (eds) The Oxford Handbook of War. Oxford University Press, Oxford, pp 358–372Google Scholar
  16. Denécé E (2014) The Revolution in Intelligence Affairs: 1989–2003. International Journal of Intelligence and Counter Intelligence 27(1):27-41Google Scholar
  17. Douhet G (1921) Il dominio dell’aria. C. De Alberti, RomaGoogle Scholar
  18. Duyvesteyn I, Angstrom J (2004) Rethinking the Nature of War. Routledge, LondonGoogle Scholar
  19. Eijkman Q, Van Ginkel B (2011) Compatible or incompatible? Intelligence and human rights in terrorist trials. Amsterdam Law Forum 3(4):3–16Google Scholar
  20. Engelhardt T (2015) The fog of intelligence. http://lobelog.com/the-fog-of-intelligence/ Accessed 23 October 2015
  21. Etling B, Faris R, Palfrey J (2010) Political Change in the Digital Age: The Fragility and Promise of Online Organizing. SAIS Review of International Affairs 30(2):2–10Google Scholar
  22. Farrell Th, Osinga F, Russell JA (2013) (eds) Military adaptation in Afghanistan. Stanford University Press, StanfordGoogle Scholar
  23. Farrell Th, Terriff T (2002) The sources of military change: culture, politics, technology. Lynne Rienner, Boulder, COGoogle Scholar
  24. Ferguson N (2011) Civilization: The West and the Rest. Penguin, New YorkGoogle Scholar
  25. Freier N (2007) Strategic Competition and Resistance in the 21st Century: Irregular, Catastrophic, Traditional, and Hybrid Challenges in Context. Strategic Studies Institute, Carlisle BarracksGoogle Scholar
  26. F-Secure Labs (2015) The Dukes. 7 years of Russian cyberespionage. F-Secure Labs Threat Intelligence WhitepaperGoogle Scholar
  27. Fukuyama F (1992) The End of History and the Last Man. Free Press, Glencoe, ILLGoogle Scholar
  28. Gartmann M, Neef C, Schepp M, Stark H (2014) The Opinion-Makers: How Russia Is Winning the Propaganda War. Der Spiegel 30 May 2014Google Scholar
  29. Gladstone R (2015) Activist links more than 26,000 twitter accounts to ISIS. New York Times, 31 March 2015. http://nytimes.com/2015/04/01/world/middleeast/activist-links-more-than-26000-twitter-accounts-to-isis.html Accessed 27 October 2016
  30. Glaser A (2016) here’s what we know about Russia and the DNC hack. Wired 27 July 2016. https://www.wired.com/2016/07/heres-know-russia-dnc-hack, Accessed 31 August 2016
  31. Hammes TX (2006) The Sling and the Stone: On War in the 21st Century. Zenith, MinneapolisGoogle Scholar
  32. Hancock L, Wexler S (2014) Shadow Warfare: The History of America’s Undeclared Wars. Counterpoint Press, BerkeleyGoogle Scholar
  33. Hill R (2016) Bulk data collection by intelligence agencies breached human rights law. Public Technology.net 19 October 2016. https://www.publictechnology.net/articles/news/bulk-data-collection-intelligence-agencies-breached-human-rights-law Accessed 23 November 2016
  34. Hippler Th (2013) Bombing the People: Giulio Douhet and the Foundations of Air-Power Strategy, 1884–1939. Cambridge University Press, CambridgeGoogle Scholar
  35. Hoffman FG (2007) Conflict in the 21st Century: the rise of hybrid wars. The Potomac Institute for Policy Studies, ArlingtonGoogle Scholar
  36. House JM (1993) Military Intelligence, 1870–1991. A Research Guide. Greenwood Press, Westport, CNGoogle Scholar
  37. Howard Ph (2011) opening closed regimes: what was the role of social media during the Arab Spring? http://philhoward.org/opening-closed-regimes-regimes-what-was-the-role-of-social-media-during-the-arab-spring/ Accessed 29 November 2016
  38. Illeris K (2004) Adult education and adult learning. Krieger, Malabar FL Google Scholar
  39. Immerman R (2010) The CIA in Guatemala: the foreign policy of intervention. University of Texas Press, AustinGoogle Scholar
  40. Ingram Ph (2015) US DoD website hacked by IS. Security News Desk 21 March 2015 http://www.securitynewsdesk.com/us-dod-website-hacked-by-is Accessed 24 September 2015
  41. Kalathil S, Boas TC (2003) Open networks, closed regimes: the impact of the internet on authoritarian rule. Carnegie Endowment, New YorkGoogle Scholar
  42. Kaldor M (2012) New & Old Wars: Organized Violence in a Global Era. Stanford University Press, StanfordGoogle Scholar
  43. Kaplan R (2010) Monsoon: The Indian Ocean and the Future of American Power. Random House, New YorkGoogle Scholar
  44. Kingah S, Quiliconi C (eds) (2016) Global and Regional Leadership of BRICS Countries. Springer, New YorkGoogle Scholar
  45. Kitzen MWM (2016) The Course of Co-option. Dissertation, University of AmsterdamGoogle Scholar
  46. Klang M, Murray A (2005) Human rights in the digital age. Glasshouse, LondonGoogle Scholar
  47. Kuperwasser Y (2007) Lessons From Israel’s Intelligence Reforms. The Brookings Institution, Washington DCGoogle Scholar
  48. Lander S (2004) International intelligence co-operation: an inside perspective. Cambridge review of international affairs 17(3):481–493Google Scholar
  49. Liddell Hart BH (1971) Why don’t we learn from history? Allen Unwin, LondonGoogle Scholar
  50. Long NE (1949) Power and Administration. Public Administration Review 9(4):257–264Google Scholar
  51. MacAskill E, Dance G, Cage F, Chen G, Popovich N (2013) NSA files decoded: Edward Snowden’s surveillance revelations explained. https://www.theguardian.com/us-news/the-nsa-files Accessed 13 October 2016
  52. Mahdi W (2002) The Internet Factor in Indonesia: Was that All? Paper presented at the 54th Annual Meeting of the Association for Asian Studies, Washington D.C. 4–7 April 2002Google Scholar
  53. Malis C (2012) Unconventional Forms of War. In: Lindley-French J, Boyer Y (eds) The Oxford Handbook of War. Oxford University Press, Oxford, pp 185–198Google Scholar
  54. Manwaring MG, Corr EG (eds) (2008) Insurgency, Terrorism, and Crime: Shadows From the Past and Portents for the Future. University of Oklahoma Press, Oklahoma CityGoogle Scholar
  55. Markoff J (2016) Automated pro-Trump bots overwhelmed pro-Clinton messages, researchers say. New York Times 17 November 2016. http://www.nytimes.com/2016/11/18/technology/automated-pro-trump-bots-overwhelmed-pro-clinton-messages-researchers-say.html?smprod=nytcore-ipad&smid=nytcore-ipad-share&_r=0 Accessed 23 November 2016
  56. Marsick VJ, Watkins KE (2005) Learning organization. In: English LM (ed) International Encyclopedia of Adult Education. Palgrave, London pp 355–360Google Scholar
  57. McCulloh T, Johnson R (2013) Hybrid Warfare, JSOU Report 13-4. Joint Special Operations University, MacDill Air Force BaseGoogle Scholar
  58. Merriam SB, Caffarrella RS, Baumgartner LS (2012) Learning in Adulthood. Jossey-Bass, San FranciscoGoogle Scholar
  59. Metselaar MV (1997) Understanding failures in intelligence estimates – UPROFOR, the Dutch, and the Bosnian-Serb attack on Srebrenica. In: Soeters J, Rovers JH (eds) (1997) The Bosnian Experience. Royal Netherlands Military Academy, Breda, pp. 23–50Google Scholar
  60. Mozur P, Scott M (2016) Fake news in U.S. Election? Elsewhere, that’s nothing new. New York Times 17 November 2016. http://www.nytimes.com/2016/11/18/technology/fake-news-on-facebook-in-foreign-elections-thats-not-new.html?smprod=nytcore-ipad&smid=nytcore-ipad-share Accessed 23 November 2016
  61. Murray W, Sennreich R (eds) (2006) The past as prologue. The importance of history to the military profession. Cambridge University Press, CambridgeGoogle Scholar
  62. Olmsted KS (1996) Challenging the Secret Government: The Post-Watergate Investigations of the CIA and the FBI. University of North Carolina Press, Chapel Hill. New York Times, Intelligence Report on Russian hacking. 6 January 2017. http://www.nytimes.com/interactive/2017/01/06/us/politics/document-russia-hacking-report-intelligence-agencies.html?_r=0 Accessed 9 January 2017
  63. Perrow Ch (1999) Normal Accidents. Living with High-Risk Technologies. Basic Books, New YorkGoogle Scholar
  64. Safranek R (2012) The Emerging Role of Social Media in Political and Regime Change. ProQuest Discovery Guide: 2–10Google Scholar
  65. Salih KEO (2013) The Roots and causes of the 2011 Arab Uprisings. Arab Studies Quarterly:185–203. http://www.pinxit.com/page101/page115/downloads-23/files/Arab_Spring_Causes.pdf
  66. Scholte AJ (2000) Globalization: a critical introduction. St. Martin’s, New YorkGoogle Scholar
  67. Segers RT (2008) (ed) A New Japan for the Twenty-First Century. Taylor & Francis, LondonGoogle Scholar
  68. Smith R (2005) The Utility of Force: The Art of War in the Modern World. Allen Lane, LondonGoogle Scholar
  69. Soengas X (2013) The Role of the Internet and Social Networks in the Arab Uprisings – An Alternative to Official Press Censorship. Comunicar, 21(41):147–155Google Scholar
  70. Stuenkel O (2015) The BRICs and the Future of Global Order. Lexington Books, LanhamGoogle Scholar
  71. Thompson PG (2014) Armed Groups: The 21st Century Threat. Rowman and Littlefield, LondonGoogle Scholar
  72. Toffler A (1980) The Third Wave. Bantam Books, New YorkGoogle Scholar
  73. Treverton GF, Agrell W (2009) National Intelligence Systems: Current Research and Future Prospects. Cambridge University Press, New YorkGoogle Scholar
  74. United Nations (2000) Report of the Panel on United Nations Peace OperationsGoogle Scholar
  75. Vanden Berghe Y (2008) De Koude Oorlog. Een nieuwe geschiedenis (1917–1991). ACCO, Leuven and VoorburgGoogle Scholar
  76. Warrick J and Wright R (2008) U.S. Teams weaken insurgency in Iraq. Washington Post 6 September 2008. http://washingtonpost.com/wp-dyn/content/article/2008/09/05/AR2008090503933.html Accessed 1 October 2016

Copyright information

© T.M.C. Asser Press and the authors 2017

Authors and Affiliations

  • Floribert Baudet
    • 1
  • Eleni Braat
    • 2
  • Jeoffrey van Woensel
    • 3
  • Aad Wever
    • 4
  1. 1.Netherlands Defence AcademyBredaThe Netherlands
  2. 2.University of UtrechtUtrechtThe Netherlands
  3. 3.Centre of Research and Expertise, Veterans InstituteDoornThe Netherlands
  4. 4.EnschedeThe Netherlands

Personalised recommendations