WWW.THESES.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation
 
<< HOME
CONTACTS



Pages:     | 1 || 3 | 4 |

«Relations between Intelligence Services and Policy Makers: An Analysis of challenges and their causes This article addresses the relations between ...»

-- [ Page 2 ] --

Usually intelligence information and the activity used to gather it is linked to secrecy. There is an issue about whether intelligence and associated activity necessarily needs to be classified? There are different opinions and answers to this question. It is widely known that the intelligence services of contemporary democratic countries collect openly available information from the various sources of media: newspapers, journals, radio, television, internet, etc. Intelligence officers call this type of information open source intelligence (OSINT). But if all intelligence activities and their products were limited to openly accessible information would there be a point for a state to maintain intelligence services? This type of information could be collected and analyzed by those institutions that need it. However, not all information about foreign policy or other spheres of national security is ‘open’. As Laqeuer noted, in 1941 many USA intelligence analysts read Japanese newspapers everyday and still did not find a message about the planned attack on the US forces in the port of Pearl Harbour, executed on 7 December 1941. As well, the Soviet newspaper Pravda did not report on the Soviet missiles9. So it is obvious that while the landestine or discrete activity of states, groups or individuals exist, certain institutions must be informed in a timely manner about possible hazardous events, in order to assure the national security of a state or society in order for them to be able to avoid these events or affect them in a useful or at least less damaging manner. Undoubtedly, intelligence services use classified methods and sources to gather overtly unavailable or secret information, which can not be revealed on any occasion. As Lowenthal explains, the reason why states need intelligence is because some have information they donot reveal to others, so the latter obtain it by using secret methods: because of this and collection methods, they are forced to keep the gathered information classified10. Later, this article will return to the subject of classification and explain why sometimes even intelligence produced on open sources has to be classified.

While analyzing intelligence activity it is necessary to mention its application or the objectives of its practice. Intelligence can be strategic, namely directly corresponding to national demands in the fields of foreign politics, security and defence, for example in the realization or protection of national interests. In short, strategic intelligence can be called an activity that supports the state’s decision makers at the national level. In the practice of this activity the products of intelligence usually encompass medium or long term views and are called ‘intelligence estimates’ (USA) or ‘assessments’ (Great Britain and Australia)11.

Finally, intelligence products have to embody various different aspects as they are special knowledge. In the contemporary world, intelligence information can be exclusively civilian by its content, but it can rarely be only military.

This delineation is especially unsuitable for dividing a strategic intelligence activity and its products into civilian and military. Nevertheless, institutional separation into civil and military intelligence remains mainly because of the needs of both civil and military institutions to receive intelligence fulfilling their different priorities. Intelligence required by the military command is rarely underpinning to a civilian institution. Intelligence assessments supporting contemporary military operations (e.g. military counterterrorist operations, peace establishment and peacekeeping operations, etc.) can involve a very wide spectrum: from traditional military aspects, such as knowledge of adversary’s capabilities and intensions, territorial and geo-meteorological peculiarities, to completely ‘civilian’ factors, for example a region’s economic, social and political aspects, biographies of persons involved in the operation, regional levels of terrorism and crime and also diseases, epidemics and the ecological situation, etc.

Intelligence services can be authorized to carry out operational or tactical intelligence in supporting the Armed Forces. For example, in order to execute

–  –  –

Ibidem, p. 133.

a military operation it is necessary for the command to have certain intelligence on the adversary, its capabilities and intentions, territory of operation, etc. Whereas, in the National level intelligence service (which can also be military) support to the policy makers provides them with current intelligence, the purpose of which is provide customers with the information on the latest ‘hot’ events. This type of intelligence, just like tactical and operational, usually encompasses a short-term period. Generally, the collected current intelligence assists further development of strategic intelligence production. Since the threat of terrorism has increased, intelligence services of many states give priority to intelligence on terrorism. This type of activity normally falls in the category of current intelligence because of the short-term use of the collected intelligence information. By its nature, current intelligence is usually carried out by giving indication and early warning on possible threats12. Operational, tactical and current intelligence activities, which require modern and constantly renewable technical means and a degree of professional personnel, are far more costly than strategic intelligence. It would be wrong to believe that in the contemporary world intelligence services of a National level could be only confined to the strategic level of intelligence. Moreover, as it was previously said, final evaluation of strategic intelligence requires daily current information – the ‘raw material’ of intelligence. From its various and obscure elements, just like in a jigsaw puzzle, a clear image is created. Current threats and challenges to the security of states and societies force states to invest in the creation of complex intelligence capabilities that function at both strategic and tactical levels because sources of tactical threats can become strategic challenges to the security of the country and society. The most obvious illustration of this is the terrorist attacks of Al Qaeda committed in New York, Washington D.C., London and Madrid between 2001 and 2005.





The issue now turns to whether intelligence, its analysis and evaluation need to be regarded as absolute truth? As paradoxical as it would seem, the answer is negative. As Lowenthal claimed ‘truth’ is such an absolute notion that it would be completely impossible for intelligence services to reach its standard if one was determined13. An intelligence service has to collect information, to evaluate certain circumstances which would be difficult to verify - not to mention prove - using other means. If these means existed, it would be more advisable (maybe even less expensive) to use those other, alternative methods.

As Michael M. Handel stated:

In the word of intelligence, even technical data concerning performance or the number of weapons, let alone less quantifiable issues such as intentions, military doctrine, and morale, cannot be objectively assessed – which means that clear agreement on their ‘meaning’ cannot be reached. 14 Shulsky and Schmitt, p. 58-60.

Lowenthal, p.7.

Handel I. M. War, Strategy and Intelligence, London: Frank Cass, 1989, p. 196.

Because intelligence is connected to collecting information on the conditional probability of individual’s actions and the analysis of this collected information, British professors Peter Gill and Mark Phythian suggest naming intelligence ‘art’15. Because of this, when providing its intelligence assessments an intelligence service takes the risks and responsibility for the likelihood of these evaluations. Usually intelligence assessments are related to probable events in the future, which should be treated as anticipated likelihoods or probabilities. By using their knowledge and collected information, intelligence analysts make certain evaluations and conclusions on processes, which will probably happen under certain circumstances and that, are usually affected by human beings in one way or another. The most important requirement to an intelligence service is that their assessments or evaluations should be reliable, unbiased and not politicized.

Should intelligence services be limited to collecting information? In the theory of intelligence, as in practice, there is no unity over this issue. Some services, like the Canadian security intelligence service, are only authorized to advise their government16. On the other hand, some services of Western countries have been given the authority to implement certain policy of the state by carrying out the so called ‘cover operations’17. For example, the CIA carried out cover operations in Chile between 1963 and 1973 in order to influence the political processes within the country18. The extent of a cover operation can be very varied – from influencing through the exploitation of media to organising a coup d’état. Hunting down terrorists in uncontrolled regions (like Afghanistan) can also be called cover operations. Usually cover activity is used by intelligence services because no other organisation has proper arrangements for this kind of activity. By receiving certain information (such as the whereabouts of a wanted terrorist) an intelligence service is authorized to take action on it by itself (in this case – to eliminate or detain this terrorist). In other words, a cover operation is the continuation of intelligence actions and not intelligence activity and it will therefore not be discussed further in this article.

Given the limited extent of this article, counterintelligence will also not be analyzed, although it is concurrent with intelligence activity, not least of all because of the need to protect intelligence activity and to guarantee its success.

In summary, in this article intelligence will be defined as a continuous classified process in which states’ intelligence services collect information on foreign countries, external phenomena and processes taking into account the requirements of authorized institutions. This activity involves the timely resGill P., Phythian M., Intelligence in an Insecure Word, Cambridge: Polity Press, 2007, p. 15.

Canadian Security and Intelligence Service Act: http://laws.justice.gc.ca/en/ShowTdm/cs/C-23///en,

–  –  –

Staff report of the select committee to study governmental operations with respect to intelligence activities. 91st Congress session. “Cover activities in Chile”. http://www.fas.org/irp/ops/policy/church-chile.htm, 2008-06-30.

ponse to possible threats to a state’s or society’s security: after being processed and analyzed, this intelligence is presented to appropriate customers with the purpose of strengthening the security of the state and society and to support the planned and implemented policy of the executive government.

2. the Role of Policy Makers and their Impact on Intelligence Services’ Activity and Information

2.1. The Role of Politics in Intelligence and Associated Challenges It would be a mistake to believe that the process of intelligence ends when an intelligence service of a democratic state delivers its product (an intelligence paper) to their appropriate intelligence customers. Lowenthal says that the role of politicians and decision makers regarding intelligence services is not limited to receiving intelligence information – “they shape it”19. In democratic states, intelligence services are connected to institutions of the executive government, which are the main consumers of intelligence.

These institutions include: the state’s President and/or Prime Minister, government, various ministries (especially those responsible for the state’s foreign, defence and security policy), the command of Armed Forces, lawenforcement institutions and often also other ministries and institutions.

These may be responsible for economics and the financial system (or the state’s economy, trade, internal affairs, transportation, or even on occasions, environmental protection and health services, etc.). Finally, additional connections include those to other intelligence and security services of that country. The role of parliament is to ensure democratic control and oversight of intelligence services20. Put simply, intelligence services are the instruments of government in assuring the national interests of security making, controlling the power and influence of policy formers and other decision makers over intelligence services and its activity – which is self-explanatory. Hence, the role of policy makers and other intelligence customers is one of the main factors influencing the process of intelligence. This role of connecting customers and intelligence obliges both sides to understand each other’s tasks, responsibilities and abilities or limitations. When there is a lack of this type of understanding, tension or conflict emerges between politics and intelligence. The reasons for conflict between intelligence services and policy makers are complex. The most dramatic cases happen when Lowenthal p.174.

More about parliamentarian oversight of intelligence services: Bagdonas G., “The Role and Control of Secret Intelligence Services in A Democratic State”, Kardas, 2006 m. No2 (419) (in the Lithuanian language).

an intelligence service fails (or allegedly fails) to fulfil its expected tasks.

Particularly severe consequences may occur when an intelligence service does not provide an early warning and so-called strategic surprise takes place, which results from an unpredicted security crisis: this is perhaps popularly known as an unexpected and successful attack by an adversary. An example of this type of unexpected security crises that resulted in blaming the intelligence services of not providing intelligence about threats, are the terrorist attacks in New York and Washington, D.C. on September 11, 200121.



Pages:     | 1 || 3 | 4 |


Similar works:

«Case Study Approach Examining Local Wellness Policy Development and the Perceived Impact to the School Community National Food Service Management Institute The University of Mississippi 1-800-321-3054 This publication has been produced by the National Food Service Management Institute – Applied Research Division, located at The University of Southern Mississippi with headquarters at The University of Mississippi. Funding for the Institute has been provided with federal funds from the U.S....»

«Engaging with academics: how to further strengthen open policy making A guide for policy makers January 2013 Contents Overview Dos and don’ts Ways of engaging 1. Secondments, placements and fellowships 2. Commissioned research 3. Networks Hints for successful engagement Conclusions and further reading Acknowledgements Overview What’s this all about? This document is primarily aimed at policy makers working in science, technology or engineering related areas, but should be useful for any in...»

«ПЕР Occasional Papers No. 71 F R O M POLICY ANALYSIS T O POLICY FORMULATION A N D POLICY IMPLEMENTATION: THE PERSPECTIVE OF THE NATIONAL EDUCATION COUNCIL, THAILAND Sanghirun Uraiwan Unesco: International Institute for Educational Planning F r o m policy analysis to policy formulation and policy 71 implementation: the perspective of the National Education Council, Thailand Sanghirun Uraiwan F r o m policy analysis to policy formulation and policy implementation: the perspective of the...»

«Multiple Engagements and Network Bridging in Contentious Politics: Digital Media Use of Protest Participants ABSTRACT Based on three series of protest surveys across nations, issues, and time, the study examines to what extent the use of digital media permits activists to sustain multiple engagements in different protest events and different movement organizations. We find that digital media use stimulates multiple activism. Through Information and Communication Technologies (ICTs), activists...»

«THE SOUTHERN AFRICAN MIGRATION PROJECT CROSS-BORDER RAIDING AND COMMUNITY CONFLICT IN THE LESOTHO-SOUTH AFRICAN BORDER ZONE MIGRATION POLICY SERIES NO. 21 CROSS-BORDER RAIDING AND COMMUNITY CONFLICT IN THE LESOTHO-SOUTH AFRICAN BORDER ZONE GARY KYNOCH AND THERESA ULICKI WITH TSEPANG CEKWANE, BOOI MOHAPI, MAMPOLOKENG MOHAPI, NTSOAKI PHAKISI AND PALESA SEITHLEKO Published by Idasa, 6 Spin Street, Church Square, Cape Town, 8001, and Queen’s University, Canada. Copyright Southern African...»

«CORPORATE POLICY Policy Title: Sponsorship and Advertising Policy Policy Category: Administration Policy Policy No.: A-016 Department: Corporate Services Approval Date: June 22, 2015 Revision Date: Author: Jillian Fleming, Manager – Marketing and Sponsorship Attachments: Related Documents/Legislation: Municipal Freedom of Information and Protection of Privacy Act Canadian Code of Advertising Standards Ontario Human Rights Code Canadian Anti-Spam Legislation City of Waterloo Code of Conduct...»

«UNESCO Dakar Annual Report UNESCO Dakar Annual Report 2013 Table of Contents Introduction: Chapter 1: Attaining quality education for all and lifelong learning Chapter 2: Mobilizing science knowledge and policy for sustainable development Chapter 3: Addressing emerging social challenges Chapter 4: Protecting heritage and fostering creativity Chapter 5: Building inclusive knowledge societies through information and communication Chapter 6: Cross Cutting Activities Annexes: 1. Financial Report 2....»

«Gennaro AVALLONE El campo neoliberal y su crisis. Agricultura, sociedad LIBROS CRÍTICA DE local y migraciones en la Europa del Sur El campo neoliberal y su crisis. Agricultura, sociedad local y migraciones en la Europa del Sur* 1 The Neoliberal country and its crisis. Farming, local society and migrations in the Southern Europe Gennaro AVALLONE Università degli Studi di Salerno gavallone@unisa.it BIBLID [ISSN 2174-6753, nº6: 39-55] Artículo ubicado en: www.encrucijadas.org Fecha de...»

«contact@al-shabaka.org www.al-shabaka.org al-shabaka policy brief THE CUSTOMS UNION & ISRAEL’S NO-STATE SOLUTION By Amal Ahmad November 2014 Israel has had a customs union trade arrangement with the Occupied Palestinian Territory (OPT) since 1967, a de facto situation that was institutionalized by the Oslo Accords in 1994. The customs union, which on the surface appears to simply be a trade arrangement, was and remains key to Israel’s containment of the OPT, a strategy in which Israel...»

«POLICY MEMORANDUM: Preventing Indiscriminate Attacks and Wilful Killings of Civilians by the Myanmar Military March 2014 The International Human Rights Clinic at Harvard Law School works to protect the human rights of clients and communities around the world. The Clinic undertakes projects focusing on fact-finding, litigation, legal and policy analysis, report drafting for international oversight bodies, and the development of advocacy strategies. Through supervised practice, students learn the...»

«Evelyn Waugh That's What's Wrong with England Patrick Adcock Professor of English Abstract Evelyn Waugh, dead for over thirty years, is a social critic who can still stir violent controversy. His novels and nonfiction books, stylistically brilliant, take no prisoners. He satirizes the working class and the nonwhite races just as savagely as he satirizes everybody else. The Catholicism in his novels, especially in scenes which reveal the Hand of God directing human affairs, runs counter to...»

«November 8, 2016 Elections Candidacy Requirements For U.S. House of Representatives Revised 12/28/2015 General Disclaimer This candidacy requirements bulletin provides an overview of Virginia electoral requirements. It is not legal advice nor a binding statement of official policy. Applicable laws and regulations are subject to change in content and interpretation. Candidates are responsible for verifying the status and complying with current laws and regulations. Introduction This bulletin and...»





 
<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.