Intelligence and Terrorism
Summary and Keywords
Intelligence scholars and practitioners have analyzed the challenges terrorism presents for intelligence organizations and have debated how intelligence analysts and agencies can best respond to the challenge. The literature on intelligence and terrorism changed following the 9/11 attacks; three schools of thought emerged. Although a large body of literature has developed in recent years, a number of important areas remain in which further research is needed.
Although the literature on intelligence and terrorism has burgeoned since the attacks of September 11, 2001, scholars and practitioners have long studied the challenges that terrorism presents for intelligence professionals. This body of literature can be divided into three schools of thought, into which much of the post-9/11 scholarship can be organized. Even though the scholarly and policy literature on intelligence and terrorism has grown significantly in recent years, a number of areas remain understudied and deserve further research.
As an example of the limits of the literature, more than sixteen years after 9/11, there has been surprisingly little in-depth, empirical work produced on the intelligence aspects of those attacks. Amy Zegart’s Spying Blind (Zegart, 2007a) remains the lone book-length academic study of that intelligence failure; other increasingly dated works such as Posner (2005), Russell (2007a), and Betts (2007) examine the use of intelligence in the case of 9/11, but only as part of broader reviews of American intelligence. This gap in the literature may simply reflect the nature of the information involved. Ranstorp comments, “Few academic studies successfully connect the terrorism and intelligence studies fields as it demands mastery of two relatively inaccessible information and analytical domains” (Ranstorp, 2007, p. 16). The time lag may also not be very unusual in an historical context; after all, Roberta Wohlstetter’s seminal work, Pearl Harbor: Warning and Decision, was not published until 1962, well after the event it studied. But the current lag does suggest that despite a few valuable journalistic works, such as the work by Wright (2006), the 9/11 attacks themselves remain understudied from a scholarly perspective, and that, more broadly, additional work is needed on the use of intelligence in counterterrorism.
As the years since the attacks of 9/11 have passed, there has developed within some members of the intelligence studies community a belief that the subject of terrorism has been sufficiently covered in the literature and it is time to focus on other challenges (Johnson & Shelton, 2013). Most of the major edited volumes published in recent years have few, if any, articles focused on terrorism. The authors of a recent survey of the state of intelligence studies argue that “the idea of halting research on intelligence and terrorism, in the middle of a worldwide struggle against Al Qaeda and its associates, would strike many in the field as short-sighted” (Johnson & Shelton, 2013, p. 112). The intelligence failures surrounding the emergence of the Islamic State of Iraq and the Levant (ISIL), and the rash of ISIL and AQ-inspired terrorist attacks throughout Europe and North America, have driven the point home.
Several authors have produced valuable article- and chapter-length overviews of intelligence and terrorism in the post-9/11 era (e.g., Campbell & Flournoy, 2001; Ball, 2002; Sims, 2007a; Rosenbach, 2008; Builta & Heller, 2011; Allen, 2013; Byman, 2014), and useful research has been done concerning specific issues such as the importance of human intelligence and the need for improved international intelligence coordination. But much of the work in this area remains general in nature, with many articles consisting primarily of a reminder that terrorism is an especially difficult problem combined with a recommendation that intelligence agencies place greater emphasis on certain problems or make greater use of particular analytical or collection techniques, and that they increase their focus on domestic collection. Beyond these generalities, there is little agreement in the literature on what specifically must be done to improve intelligence performance against terrorism, or even on whether significant improvement is possible.
This article focuses primarily on how intelligence scholars and practitioners have viewed the challenges terrorism presents for intelligence organizations, and on how those experts believe intelligence agencies can best respond to the challenge. Because it approaches the subject from an intelligence studies perspective, it does not attempt to review the broader literature on terrorism and counterterrorism. In addition, several important intelligence-related topics are discussed elsewhere in the Encyclopedia, so they are not covered in detail here: intelligence reform and oversight, the debate over how to balance liberty and security in domestic intelligence, the ethics of intelligence work, the continually expanding role of drones in intelligence and counterterrorism, the high profile intelligence leaks by Bradley (now Chelsea) Manning and Edward Snowden, and the use of interrogation and torture.
This article is organized into four sections. The first reviews the literature on intelligence and terrorism produced before the 9/11 attacks. The second section looks at how the literature changed after 9/11, and highlights several areas in which there has been general (although by no means unanimous) consensus. The third section reviews how scholars and policy experts have answered what some consider to be the most important questions in this literature: Why have intelligence agencies failed to prevent 9/11 and other major terrorist attacks, and what must be done to improve their ability to prevent future attacks? Here, there is no consensus, and this section argues that the literature can be organized into three schools of thought, each of which offers a quite different explanation of past failures and prescription for the future: the orthodox school, the intelligence reformist school, and the CIA critics’ school. The final section describes additional questions discussed in the literature, and outlines several areas in which further research is needed.
Literature on Intelligence and Terrorism before 9/11
Although the problem of international terrorism was overshadowed by superpower rivalry during the Cold War, there was nonetheless a significant literature focusing on the challenges terrorism presents for intelligence. This early work contains strikingly similar issues and arguments that have appeared continuously since. Several articles note that the effort to gather intelligence on terrorist groups presents particular difficulties for democracies. Their authors discuss the need for oversight of intelligence activities and the difficult question of where the balance should be struck between protecting civil liberties and ensuring public safety (e.g., Cooper, 1978; Robertson, 1987; Taylor, 1987). Other familiar topics include the need for international coordination in counterterrorism intelligence efforts (Kerstetter, 1979) and the differing roles played by the FBI and the CIA in combating terrorism (Prince, 1989).
In this earlier literature, scholars examine major terrorist attacks, such as the 1983 Marine Barracks bombing in Beirut, Lebanon (e.g., Ofri, 1984; Hof, 1985; Hastedt, 1988; Kennedy & Brunetta, 1994) and the bombing of the U.S. Embassy Annex in Beirut in 1984 (Motley, 1986, 1987) as well as local and municipal police intelligence operations against terrorism and other threats (Bouza, 1976). Their conclusions often sound as if they could have been written much more recently: although good intelligence is a key factor in countering terrorism, it is very difficult to obtain, and policy makers should not expect to receive perfect intelligence on terrorist threats. David A. Charters (1991) urged that policy makers and the public should be educated on the possibilities as well as the limits of intelligence against terrorism.
Several authors view human intelligence (HUMINT) as the most important factor in countering terrorism. James Berry Motley (1987) wrote, “[i]t is human intelligence – clandestine agents, informers – that is the key to coping with terrorism” (p. 169; see also Ofri, 1984; Sulc, 1987). But the American intelligence community, in particular, was viewed as weak in its ability to gain HUMINT on terrorist groups. Motley, for example, notes in a separate article (1986, p. 83) that “the U.S. intelligence community to date has been severely limited in its ability to penetrate international terrorist organizations.”
In an important early article, Shlomo Gazit and Michael Handel (1980) make several arguments: (a) that in the intelligence effort against terrorism, overt collection was the least valuable source; (b) aerial photography was not very important; (c) technical intelligence, including signals intelligence, was of greater importance; but (d) the most important source was HUMINT, including information gained through the interrogation of captured terrorists. They described the concept of “intelligence warfare” against terrorists, in which intelligence works closely with operators and methods such as deception, psychological warfare, and covert operations are used alongside the more commonly discussed intelligence methods of collection and analysis. In a comment that still rings true, they stated that “in counterterrorist warfare more than any other type of war, the intelligence organization itself is in the forefront of military operations; frequently the border between intelligence work and combat activity is blurred” (Gazit & Handel, 1980, p. 131).
The primary message of this pre-9/11 literature was, in the words of terrorism expert Bruce Hoffman, that “the importance of intelligence to anticipate, pre-empt, and respond is paramount” (Hoffman, 1996, p. 219). A few authors in the years before 9/11 were relatively optimistic about the ability of intelligence agencies and analysts to track and counter terrorist groups. Ian Lesser, for example, argued (Lesser et al., 1999) that the increasing reliance by terrorists on modern information technology would introduce new possibilities for monitoring and surveillance. But for the most part, scholars were pessimistic about the future, warning about the growing challenge for intelligence from threats such as nuclear terrorism (Beres, 1997; Badey, 2001) and terrorists using weapons of mass destruction more broadly (Marlo, 1999).
After 9/11: Areas of Consensus
The attacks of September 11, 2001, reconfirmed for many scholars both the importance and the difficulty of obtaining useful intelligence on terrorist groups. Academics, policy experts, and intelligence professionals have produced numerous articles and papers examining the current challenges presented for intelligence by terrorism, and on many issues there is broad agreement in the literature. This section reviews these areas of consensus and points out important disagreements.
Increased Importance of Intelligence
Intelligence is generally understood to have increased in importance and prestige since the 9/11 attacks. David Kahn writes that the war on terrorism “has featured intelligence in a starring role” (2006, p. 134), while, according to Michael Herman, “Intelligence has been riding high since 11 September” (Herman, 2002, p. 227). Policy makers as well as scholars have made the point that the war on terrorism is unusual in that intelligence occupies such a critical part. Michael Hayden, former Director of the Central Intelligence Agency (CIA), described intelligence as being more deeply involved in this war than it has been in any other (Hayden, 2007), and the National Security Strategy of the United States published soon after 9/11 stated, “Intelligence—and how we use it—is our first line of defense against terrorists and the threat posed by hostile states” (National Security Strategy, 2002, p. 30). Former British Prime Minister Tony Blair made the same argument in 2003, calling intelligence “Britain’s first line of defence against terrorism” (Herman, 2004, p. 348). The war on terrorism has even been described as an “intelligence war” (Aid, 2012; Hayden, 2010).
But while the war on terrorism has led to larger budgets for intelligence services and a more prominent role for intelligence in national decision making, this greater attention has brought with it greater expectations, which scholars argue the intelligence communities of the United States and other nations are finding it difficult to meet. According to Kahn, “intelligence gathering and analysis are now considered such indispensable government functions—and so much is expected of them—that their inability to disperse the fog of war or of international politics causes outrage” (2006, p. 134).
Additional challenges for intelligence agencies have been created because at the same time that public attention is being focused on intelligence, the struggle against international terrorism has placed more emphasis on the aspects of the intelligence business that are the most secret, such as covert operations and espionage (Herman, 2004; Kibbe, 2007). The lines separating military operations, law enforcement, and intelligence operations are becoming more blurred, creating new operational, legal, and organizational difficulties (Best, 2003; Jenkins, 2006a) as well as ethical dilemmas (Olson, 2008). Charles Cogan writes that intelligence operatives of the 21st century will have to be more like hunters than gatherers: “They will not simply sit back and gather information that comes in, analyze it and then decide what to do about it. Rather they will have to go and hunt out intelligence that will enable them to track down or kill terrorists” (Cogan, 2004, p. 317). This job, he predicts, will be largely one for the military special forces community, with intelligence services such as the CIA relegated to a supporting role. Cogan’s prediction was born out in the U.S. SEAL Team raid that killed Osama bin Laden; the operation was legally conducted by the CIA as a covert action, but in practice it was planned and conducted by the special operations community (Dahl, 2014a).
Among the most useful sources on the intelligence effort that led to the killing of bin Laden are Bergen (2012), Schmitt and Shanker (2011), and Mudd (2013). That operation was the most prominent example of what some have described as a new type of intelligence cycle for counter-terrorism: “finding, fixing, finishing, exploiting and analyzing targets,” or F3EA (Builta & Heller, 2011, p. 6). In this version of the intelligence cycle, intelligence is used to drive operations against a terrorist target, allowing analysts to locate the target (find), identify its precise location (fix), and enable operational personnel to capture or kill the target (finish). This in turn produces intelligence on new targets that can be exploited and analyzed, and so on.
Terrorism Is a More Difficult Problem
Although terrorism is not the only important mission for intelligence services in the 21st century, it is widely considered to be the top priority for Western intelligence services. And most scholars and experts believe it is an especially difficult problem for intelligence to deal with. James Hansen puts it starkly: “The al-Qaeda network is believed by some to be the most difficult intelligence adversary the U.S. has ever faced” (2004, p. 692). The intelligence systems and techniques developed during the Cold War are seen as inappropriate for countering terrorists. Fritz Ermarth notes (2002) that “[g]athering intelligence on terrorists is a far more difficult task than assessing whether a strategic rival is planning a massive military attack on the United States. By nature, the terrorist works by stealth, avoiding targets for which elaborate military-style preparations are necessary.”
American intelligence officials have argued that the nature of the intelligence problem is dramatically different and more difficult today. Former Director of National Intelligence Michael McConnell notes that in dealing with a conventional military threat, there is relatively little problem determining the enemy’s capability—his order of battle. With a conventional foe, the enemy’s intent is the question. But in the case of terrorism, McConnell argues, “it’s just the opposite.” Here the intent to commit harm is clear, and the challenge for intelligence is to learn the enemy’s capability to do so (McConnell, 2007). Then-CIA Director Michael Hayden points out another difference between the problems faced by the intelligence community in the Cold War and today. During the Cold War the enemy’s forces, such as troop formations, tanks, and ballistic missile silos, were relatively easy to find, but hard to kill. Today, on the other hand, “the situation is reversed. We are now in an age in which our primary adversary is easy to kill, but hard to find” (Hayden, 2007).
Gregory Treverton argues (2009, 2010) that terrorism is a more challenging problem for intelligence because it presents a mystery, to which there is no easy answer, rather than a puzzle, which can at least in theory be solved. During the Cold War, U.S. intelligence was charged with finding answers to puzzles such as determining how many missiles were in the Soviet inventory. But today intelligence agencies are finding it much more difficult to solve mysteries: What is the continuing nature of the threat from al-Qaeda? What threat does ISIL pose to the homeland? And what does the future of domestic terrorism from the (ideologically) far right and other groups pose? Because traditional intelligence threat assessments are more difficult to produce, many intelligence and security officials have begun to use vulnerability based assessments that start by identifying one’s own vulnerabilities and then develop scenarios the enemy may follow. Jenkins (2006b, 2006c) points out that such scenarios can take on a life of their own, appearing to produce inevitable and unstoppable threats that may not really exist.
Importance of Domestic and Local-Level Intelligence
Although most studies of intelligence and terrorism focus on the national or international level, a number of authors have pointed out that much of the critical intelligence work is done at the internal, domestic level, by local police and state and regional law enforcement authorities (Peterson, 2005; Riley et al., 2005). Stella Rimington, the former head of Britain’s domestic intelligence organization MI5, writes that terrorism intelligence is not developed by spies overseas as often as one may expect: “My own experience is that effective counter-terrorism frequently begins closer to home and may appear a lot more mundane” (2005, p. 30).
Local police departments may be the first to detect indications of an active terrorist cell, as has been the case several times since 9/11 in cities such as New York (the Herald Square plot in 2004 among others), and hospitals may find themselves on the front lines of a biological attack, as they were during the stateside Ebola scare of 2014. For that reason communications systems and common procedures need to be established that link law enforcement agencies with each other, with potential first responders and with intelligence services (see Hulnick, 2005; Jenkins, 2006a, 2006b; Sims, 2007a). In the United States, significant steps have been taken since 9/11: (a) a proliferation of Joint Terrorism Task Forces (JTTFs) and state and local intelligence fusion centers, (b) the posting of local intelligence officials alongside national-level counterparts at the National Counterterrorism Center (NCTC), and (c) the re-emergence of robust police intelligence operations in New York City and elsewhere (Sullivan & Wirtz, 2008; Svendsen, 2012; Apuzzo & Goldman, 2013; Dahl, 2014b).
The new requirements of countering terrorism at home are driving new methods and models of collection and analysis. Bruce Berkowitz argues that intelligence for homeland security requires a type of tradecraft very different from the old CIA model in which the government secretly collected highly sensitive information from hostile countries and unsavory characters. “The business model for a homeland intelligence agency (if we had one) would sound something like: ‘Collect as much information from as many sources as possible, respect the civil liberties of Americans, and get the product to hundreds of thousands of local officials, public safety officers, and first responders so they can anticipate threats and respond effectively’” (Berkowitz, 2004, pp. 3–4).
Increased domestic intelligence collection presents the opportunity for abuses and violations of civil liberties, as occurred in the 1960s and 1970s with, for example, the FBI’s excesses during the COINTELPRO operations. Commentators such as Marrin (2003) note that homeland security intelligence requires new and greater forms of oversight, like those that emerged from the class-action lawsuit against NYPD’s intelligence service during the 1970s, which resulted in the so-called Handschu agreement limiting intelligence collection by that local agency. In addition, coordination between intelligence and law enforcement is not easy, in large part because the cultures of the two communities are very different and because of real and perceived legal separations between domestic and international intelligence activities (Treverton, 2003; Waxman, 2009).
International Intelligence Cooperation
Several authors have noted that because terrorism today is an increasingly international threat, counterterrorism efforts must be international as well. As Stephen Lander (2004) puts it, “a threat that operates virtually irrespective of nationality and national borders poses particular challenges for intelligence services and for international collaboration between states” (p. 482).
The importance of intelligence liaison relationships for counterterrorism was recognized well before 9/11 (e.g., Motley, 1986), but such arrangements are becoming increasingly important today in what Michael Herman calls the “internationalization” of intelligence (2004, p. 349–350). Useful discussions of the issue include particularly Walsh (2010), as well as Rudner (2004), Sims (2006), Svendsen (2008), Lefebvre (2003), Segell (2004), Lansford (2007), and Stevenson (2006). Nomikos (2005), Norell (2007), and Den Boer (2015) focus on European intelligence cooperation. Not everyone believes, however, that intelligence efforts have yet become sufficiently “international.” Mackmurdo (2007), for example, argues that international intelligence relationships and trust among intelligence services are lacking today. He suggests that the United Nations, in particular, needs to develop an effective intelligence capability to combat international terrorism.
Concerning the United States, Richard J. Aldrich (2002) notes that even the world’s largest intelligence system cannot go it alone in the effort against international terrorism, as “despite its size, the United States finds itself dependent to some degree on intelligence alliances with middle power allies. It produces more intelligence but also has a vast appetite. It is a massive exporter of technical intelligence while it is also surprisingly dependent on friends for certain kinds of espionage” (p. 54). Derek S. Reveron (2006) points out that, in the United States since 9/11, most of the discussion about intelligence sharing has focused inward—on improving information sharing within the U.S. intelligence community. He argues that greater attention should be paid to the need for U.S. intelligence agencies to establish cooperative international relationships, especially bilateral agreements that may take advantage of another country’s comparative intelligence advantage in a particular geographic region or against a certain target. And Daniel Byman (2017) reviews the many difficulties involved with international intelligence cooperation, describing liaison relationships as “a vital but imperfect weapon in the US counterterrorism arsenal” (p. 155).
Human Intelligence Is Increasingly Important
Many experts believe that the most important source of intelligence on terrorist groups is human intelligence (HUMINT). Human intelligence is not seen as the complete answer to the problem of terrorism, of course, and some authors argue that other sources can be very useful, such as signals intelligence (Aid, 2003), or open source intelligence (Sloan, 2006; Lewis & Chenoweth, 2007). It is also frequently pointed out that other types of intelligence community improvements are needed, such as increasing the numbers of interpreters and officers with critical language skills, developing databases to handle the new information, and experimenting with new (and often not-so-new) analytic methods such as red-teaming (see, e.g., Campbell & Flournoy, 2001). But the most commonly heard argument is that technical intelligence collection methods such as imagery intelligence (IMINT) and signals intelligence (SIGINT) are not very useful against terrorist targets, while HUMINT is critical.
Brian Jenkins (2003) expresses this view in his testimony before the 9/11 Commission: “Using intelligence to prevent terrorist attacks is very difficult. There are no troop mobilizations to watch for, no ships, no aircraft to track. Knowing what terrorists may do depends largely on human sources—undercover agents and informants. Penetrating small terrorist groups may take months, years.” As Jenkins indicates, human intelligence is something of a dilemma for intelligence agencies, as on the one hand it is critical in the fight against terrorism, but on the other hand it is extremely difficult to obtain (see also Lewis, 2004; Betts, 2007; Weiner, 2007; and an insightful first-hand account in Crumpton, 2012).
Some are skeptical about the belief that increased HUMINT is the answer. Mark V. Kauppi (2006, p. 424) notes that placing American agents within terrorist groups is very difficult, even if the agent is a native-born speaker of the local language, because many terrorist groups are clan or tribally based. Michael Herman (2003) argues that “even the best HUMINT—and the extensive liaison with foreign services it often entails—will not provide a magical solution on targets of the Al-Qaeda kind” (p. 44). Frederick P. Hitz (2005) writes that recruiting agents (spies) is harder today than it used to be: “In the war on terrorism, the spies will surely be harder to get at than during the Cold War. Their religious, ethnic, and cultural differences from Western spy-runners, and the tight bond of their terrorist commitment, will assure this fact” (p. 731). Several former CIA operations officers have also written about the difficulty terrorism poses for American human intelligence operatives. In a comment written before 9/11 but often cited since those attacks as an illustration of how the CIA has been too risk-averse and bureaucratic, Reuel Marc Gerecht (2001) quotes a CIA case officer as saying: “Operations that include diarrhea as a way of life don’t happen” (p. 40).
One way for intelligence services to address this difficulty may be to expand their use of nontraditional types of human intelligence collection. Richard Russell argues that the CIA “needs to break its umbilical cord to U.S. diplomatic facilities overseas as its primary infrastructure for human intelligence collection.” Instead of relying almost completely on case officers based under diplomatic cover at embassies, he believes, U.S. intelligence must substantially increase its use of officers under nonofficial cover—known as NOCs (Russell, 2004, p. 61; see also Russell, 2007b; Berkowitz, 2002b). Jennifer Sims (2007b) challenges the notion that traditional human intelligence is of little use against terrorist targets. She writes, “the conventional wisdom that human intelligence against terrorist adversaries must operate principally outside traditional diplomatic circles is wrong. Classic modes of collection, including official cover, are crucial to detect and counter state sponsorship of terrorism and to work with foreign agencies engaged in domestic intelligence and law enforcement at the local level” (p. 414). She also argues that the most effective method of collection on terrorism is through a synergistic effort, using technical means as well as human sources (Sims, 2005, p. 55). John Deutch and Jeffrey H. Smith (2002) make the similar point that cooperation between human and technical intelligence makes both stronger, as human sources can provide collectors with access they need to gather signals intelligence, while signals intercepts can help to validate information reported by human sources. Numerous scholars, including Carter, Chermak, Carter, and Drew (2014) have found that human intelligence employed by law enforcement is particularly important in combatting terrorism at the domestic level.
Intelligence Performance against Terrorism: Differing Schools of Thought
One of the most enduring puzzles surrounding the 9/11 attacks continues to be: why had the attacks not been anticipated and prevented, even though American intelligence agencies and others had been warning for years about the threat from bin Laden and international terrorism? James Wirtz puts the puzzle this way: “Even accounting for hindsight, it is difficult to understand how the government, the public, and the scholarly community all failed to respond to the threat posed by al Qaeda, in a way that is eerily similar to the failures that preceded Pearl Harbor” (Wirtz, 2006, p. 56).
There is, of course, no single, universally accepted explanation for what went wrong in the months and years preceding 9/11. Some, especially from within the intelligence community, have argued that the attacks were not the result of an intelligence failure. Some analysts and scholars take a macro view, arguing that blame for 9/11 must be assigned more widely than just to the intelligence community. Joshua Rovner, for example, writes, “September 11 was not an intelligence failure, it was a national failure” (Rovner, 2005, p. 3). Others take a micro view, that the attacks were the result of individual incompetence or bad decisions (e.g., Anonymous [Scheuer], 2004; Clarke, 2004).
Nonetheless, the attacks on 9/11 have been widely seen as an intelligence failure unmatched by any in American history since Pearl Harbor. In addition to the debate on who should bear the responsibility for that intelligence failure, more broadly the question also remains of how well has the U.S. intelligence community has performed against terrorism in general. Much of the literature since 9/11 has attempted to answer these questions and to explain what the U.S. intelligence community (and to a lesser extent, the intelligence services of other nations) can or should do to prevent future attacks. This literature can be divided into three schools of thought, each of which offers a distinct analysis of what has gone wrong in the past and what should be done in the future. (Similar typologies are provided in Parker & Stern , and Copeland .) Although not all scholars and experts fit neatly into this model, these three schools help explain the different approaches taken in the literature.
The most prominent school of thought concerning terrorism and intelligence is also the most pessimistic. These thinkers, in what has been termed the orthodox school, are the intellectual heirs of earlier literature that examined the reasons why conventional military surprise attacks almost always succeed (e.g., Wohlstetter, 1962; Handel, 1977; Betts, 1978; for discussion of the orthodox school, see Honig, 2008). Following much the same logic as the earlier literature, and indeed often including the same thinkers, the orthodox school argues that intelligence failures such as 9/11 are largely unpreventable, and that while some improvements to intelligence are possible, the best policy option is to assume that surprise attacks like 9/11 or the 2013 Boston Marathon bombing will often succeed and prepare to deal with their effects. This school includes a number of well-known writers and thinkers about intelligence (e.g., Pillar, 2003; Heuer, 2005; Hedley, 2005; Betts, 2006). These thinkers believe that the U.S. intelligence community has generally done a good job, even in the years and months leading up to 9/11, especially in terms of strategic intelligence by providing a broad, long-term warning of the rising threat from terrorism and from al-Qaeda in particular. They argue that if anyone is to be held accountable for disasters such as 9/11, it should be the policy makers for having failed to take heed of the intelligence warnings they were provided (Marrin, 2011).
The collection of more precise intelligence may possibly have helped to prevent the attacks, but these orthodox thinkers point out that having more intelligence can just make the problem of analysis more difficult: “The more dots there are, the more ways they can be connected—and which way is correct may become evident only when it is too late, when disaster clarifies which indicators were salient” (Betts, 2007, p. 105). Intelligence analysis with regard to 9/11 was faulty, according to this view, largely because it put too much emphasis on developing tactical level intelligence, which analysts and officials fail to realize will rarely be available. Ephraim Kam, for example, writes that, prior to 9/11, “Intelligence was more oriented toward tactical analysis in support of operations than on the strategic analysis needed to develop a broader understanding of Al Qaeda and the threat it posed” (Kam, 2004, pp. xviii–xix).
Other scholars and analysts take a less pessimistic view than the orthodox thinkers. They argue that changes can be made to the intelligence community to significantly improve its ability to prevent terrorist attacks. This school of thought, which may be called the intelligence reformist school, is expressed most prominently in the 9/11 Commission Report (National Commission on Terrorist Attacks upon the United States, 2004) and in the work of scholars such as Amy Zegart (e.g., Zegart, 2007a, 2007c). This view sees the surprise aspect of the attack as having been caused largely by preventable analytical and communications failures on the part of the intelligence community and policy makers who lacked the imagination to “connect the dots” (as the 9/11 Commission famously argued) and to make sense of the information that had been available (National Commission on Terrorist Attacks, 2004, p. 408).
Reformists believe that the likelihood of future failures can be reduced by intelligence reforms along lines that have been proposed for the past 50 years—which often stress organizational change—and by efforts to ensure that decision makers take heed of intelligence warnings. While the orthodox thinkers believe that the intelligence community has done a good job in an almost impossible task, the reformists argue that American intelligence agencies have done a much poorer job than they should have. This view is expressed by the title of an op-ed by Amy Zegart in the Los Angeles Times: “American Intelligence—Still Stupid” (Zegart, 2006). Zegart argues that, years after 9/11, the intelligence community remains disorganized, lacks central direction, and duplicates much of its efforts.
According to reformists, American intelligence agencies prior to 9/11 had been too focused on the tactical level and did not produce enough broad, long-range, strategic-level intelligence assessments on the threat from bin Laden and al-Qaeda. Unlike orthodox school thinkers, who believe the U.S. intelligence community did a good job in terms of strategic intelligence, the reformist school holds that if intelligence officials had done a better job of assembling the available warning signs into strategic assessments for senior policy makers, the attacks may have been preventable (see, e.g., Steinberg et al., 2003; Bazerman & Watkins, 2004; Zegart, 2007b.)
Intelligence reformists tend to agree with the orthodox school that intelligence warnings are usually available prior to major failures. They believe that the major problem is that intelligence is not sufficiently shared and coordinated within the vast intelligence community and government bureaucracy.
A third school of analysts and scholars argues that terrorist attacks have succeeded because terrorism presents a dramatically new and different threat against which our intelligence and national security organizations have not been prepared. Many of these writers focus on mistakes and failings of the Central Intelligence Agency, so this school may be called the CIA critics’ school. According to this view, prior to 9/11 the CIA and its Directorate of Operations (DO) that managed human intelligence failed to place enough emphasis on developing human intelligence sources on al-Qaeda and other terrorist groups (Jenkins, 2003; Gerecht, 2004; Berkowitz, 2005; Baer, 2005). Former CIA officer Gerecht (2004, p. 1) describes the principal problem as “the failure of the CIA to develop a clandestine service with a methodology and officers capable of penetrating the Islamic holy-warrior organizations in Europe, the Middle East, and elsewhere.” In the words of Robert Baer, also a former CIA officer (2005, p. 66), “Not to be too blunt about it, but if the DO had a source close to Osama bin Laden, 9/11 would not have happened.”
The CIA critics’ school argues there was not enough intelligence to have anticipated and prevented the attacks. The failure was not primarily one of analysis or of an inability to share information that was already in the system. The failure of 9/11 was a failure of intelligence collection. In the words of The Economist (2003, p. 30): “There were too few useful dots.” The critical problem leading to a lack of intelligence collection on the threat was the failure of the U.S. intelligence community—and particularly the CIA—to place enough emphasis on developing human intelligence sources on al-Qaeda and other terrorist groups. Reuel Marc Gerecht expresses this view in arguing that the example of John Walker Lindh demonstrates that it was possible for Americans to penetrate al-Qaeda. Before 9/11, the CIA never tried to develop their own John Walker Lindh, “Yet even one such source could have obviated any need for Washington to ‘connect the dots’” (Gerecht, 2004).
What Is the Root Cause of the Problem for Intelligence?
Although the orthodox school believes the immediate cause of failure is analytical, for these thinkers the more fundamental cause lies in the limits of human cognition and psychological factors such as an overreliance on preconceived assumptions (on these cognitive problems, see Byman, 2005; Parker & Stern, 2002, 2005). The emphasis on cognitive and psychological factors helps explain why this school of thought tends to see intelligence failure as largely unavoidable. Just as human nature and patterns of cognition are resistant to change, psychological limitations on intelligence are resistant to improvement. Betts, for example, notes in his classic statement of the orthodox approach to intelligence failure that “[u]nlike organizational structure . . . cognition cannot be altered by legislation” (Betts, 1978, p. 83).
For reformist thinkers, the fundamental problem underlying the inability of the intelligence community to share and process information properly lies at the level of structure and organization. Amy Zegart, for example, argues that the CIA and FBI missed 23 potential opportunities to disrupt the 9/11 attacks, largely because organizational routines and cultures were resistant to change, and because intelligence and national security organizations were unwilling to adapt to the development of new threats. “While individuals made mistakes, organizational deficiencies were the root cause of 11 September” (Zegart, 2007b, p. 43).
For thinkers in the CIA critics’ school, the fundamental problem is that terrorism is a more difficult threat than intelligence and national security agencies have previously had to deal with. This is partly because terrorist groups have “smaller signatures” than the nation-state enemies of the past, and because terrorists practice deception. Many in this group argue that America and the world are facing a new type of warfare; Bruce Berkowitz, for example, writes that the 9/11 attacks were “an act of military genius—and may well foreshadow the next era of warfare” (Berkowitz, 2002a, pp. 291–292; see also Shultz & Vogt, 2003).
What Should Be Done?
Most observers of the American intelligence community agree that some sort of change is needed if intelligence agencies are to cope satisfactorily with the threat of terrorism. But much of the advice offered may be difficult to put in practice, such as the call for the intelligence community to “become as agile and as innovative as its terrorist adversary” (Harris, 2002, p. 13).
The three schools of thought offer strikingly different prescriptions for the future of intelligence. Scholars in the orthodox camp tend to be the most cautious about calls for major reform, and they argue that dramatic change is neither needed nor helpful. Paul Pillar, for example, argues that the U.S. intelligence community has been working hard on the problem of international terrorism since at least 1986, when the CIA’s Counterterrorist Center was established. The FBI and municipal police departments have been combatting domestic terrorism for even longer, developing intelligence on and infiltrating terrorist organizations on the political right and left as far back as the era of anarchism and more recently during the tumultuous 1960s and 1970s.
Since 9/11, the number of analysts working on terrorism has increased, but Pillar believes this change is less significant than it looks—and in fact may be reducing the quality of intelligence available. “A surge in the number of analysts assigned to counterterrorist components meant analysts were almost stumbling over each other in turning out large numbers of papers, only a tiny proportion of which could be expected to be of real use in heading off the next major attack” (Pillar, 2007, p. 156). The best way to improve the intelligence community’s “batting average” against terrorist attacks, according to this view, is to improve the quality of intelligence analysis, first by improving the selection and training of analysts, and second by doing a better job of long-term, strategic-level analysis (Betts, 2002).
The orthodox view is a pessimistic one. Because the reasons for failure today are largely the same as in the past, orthodox scholars argue that there seems little reason to believe that the current generation of intelligence officials will be more successful in avoiding surprise than their predecessors were at avoiding surprise attacks such as Pearl Harbor.
Other observers—many of whom can be associated with the intelligence reformist school—believe that dramatic change is needed in the structure, operations, and culture of intelligence agencies. Reformist thinkers tend to be more optimistic than orthodox thinkers about the prospect for significant improvement in intelligence capabilities against terrorism, possibly because the organizational problems they see at work appear to them to be more correctable than the orthodox perceive psychological and cognitive problems to be. Some reformists focus on improving the systems, networks, and procedures used to process and analyze information within the intelligence community (Kamarck, 2005). But the most common call—most notably by the 9/11 Commission—has been for greater centralization of the American intelligence community, leading to the creation of what has become the Office of the Director of National Intelligence.
Other reformists believe that the intelligence community needs to be less centralized, adopting structures more akin to networks, with flatter hierarchies. Jennifer Sims and others argue that the push for greater centralization is misguided because the future of conflict and warfare is leading toward network structures and decentralized enemies, and it takes a network to fight a network (Sims, 2005; see also Arquilla & Ronfeldt, 2001; Barger, 2005; Cronin, 2005; Atran, 2006).
Thinkers in the reformist school do not argue that the necessary changes will be as easy as simply changing the line-and-block organizational diagrams of intelligence communities and individual intelligence agencies. Effective change will require, according to this view, reforming the basic culture of intelligence organizations (Barger, 2005; on the culture of intelligence organizations see Davies, 2004, and Johnston, 2005). And it may require an even more dramatic and fundamental change. Some thinkers argue that the new threats since 9/11, combined with changes in information technology and in the nature of warfare, require nothing less than a “revolution in intelligence affairs” (Barger, 2005; see also Lahneman, 2007).
Thinkers in the CIA critics’ school often advocate greater use of covert operations and preemptive military force against terrorist targets, but the major recommendation from this school is for increased emphasis on human intelligence. The Economist, for example, argues (2003, p. 30) that the focus on improving analysis found in much of the discussion about intelligence reform “distracts attention from the real need: improved espionage, to provide the essential missing intelligence.” The best way to do it, the magazine’s editors argued, is to place spies within the “innermost councils” of terrorist organizations. But writers in this school are often gloomy about the prospect for change in American intelligence, largely because they do not believe the CIA will be able or willing to make the changes needed. Gerecht (2006, p. 3), for example, writes, “Regrettably, reform at the CIA is now dead.”
Additional Topics and Gaps in the Literature
Although the topics reviewed here are some of the most commonly discussed issues in the literature on intelligence and terrorism, many authors have focused on more specific questions. Some have examined the use of intelligence in countering particular types of terrorist threats, such as nuclear (Zenko, 2006; Mowatt-Larssen, 2009), biological (Enemark, 2006), chemical (Pita, 2007), or cyber terrorism (Gosler, 2005; Rudner, 2013; Wirtz, 2014). The American intelligence community’s poor performance in assessing Iraq’s weapons of mass destruction programs suggests to some that the community may not be up to the task of countering weapons of mass destruction (WMD)–armed terrorist adversaries (e.g., Russell, 2005).
Recommendations for intelligence agencies in the effort against terrorism include greater focus on tracking terrorist finances (Rudner, 2005; Williams, 2005; Winston, 2007), increased monitoring of terrorist related Internet sites (Renfer & Haas, 2008), and more emphasis on the broader themes and messages of propaganda from groups such as al-Qaeda (Jordan et al., 2004; Bouzis, 2015).
While most of the literature on intelligence and terrorism since 9/11 has focused on the threat from al-Qaeda and other Islamist groups such as ISIL (Pillar, 2014; Bouzis, 2015), some authors look at other terrorist problems. Examples include the British use of intelligence in Northern Ireland (Bamford, 2005), Greek intelligence success in dismantling the 17 November group (Nomikos, 2007), and the lessons to be learned from the Israeli intelligence community’s experience with terrorism (Kahana, 2005; Pedahzur & Perliger, 2007).
Although there continues to be agreement that greater information sharing is needed within the intelligence and counterterrorism communities, there is a growing belief that an equally important problem is that of having too much information. Builta and Heller (2011) write, “Many of today’s problems are rooted in the problem of having too much data, too many diverse stovepipes creating it, and difficulties in scrutinizing the abundance across unique data sets” (p. 4). Studies focusing on the importance of “big data” for counterterrorism intelligence include Skillicorn and Vats (2007) and Leetaru (2015).
Scholars studying the intersection of intelligence and terrorism are quite aware of the importance of producing policy-relevant work. As Arthur Hulnick (2005) writes, “Nothing is more important in the world of intelligence than preventing surprise” (p. 593). But in general, the literature on intelligence and terrorism is more useful for understanding the limitations of intelligence in preventing terrorist attacks than in proposing ways to improve that performance. A few writers, including Hulnick, Khalsa (2004), and Sinai (2007), have examined the question of developing indications and warning (I&W) systems for forecasting terrorist attacks, and more work here could potentially be of great value.
Another area where additional research is needed is in the study of intelligence success against terrorism. Marrin has called for such work, but he notes that research on intelligence success is likely to be difficult, because the information needed is probably classified: “while such a study of successes may be promising, it would also be very difficult to accomplish from outside the intelligence community” (Marrin, 2004, p. 661). Among the few works that do discuss intelligence successes are Betts (2002, 2007), Irons (2008), and Dahl (2013).
Much of this literature focuses on the analysis and collection of information and on how it is disseminated to decision makers and other customers. Although several authors note that other intelligence disciplines such as covert action and counterintelligence are critical in the struggle against terrorism, relatively little work has been done that focuses on those topics. Exceptions include Le Gallo (2005) on covert action, and Wannall (2002), Danis (2007), Shultz and Beitler (2004), and Mobley (2012) on counterintelligence.
The problems inherent in balancing security with civil liberties in democracies have been examined by Bruneau (2008) and Richards (2012), among others. Although a full discussion of this topic is beyond the scope of this essay, the literature in this area has expanded considerably since the revelations by Edward Snowden of the National Security Agency intelligence collections programs.
Scholars such as Arce and Sandler (2007) use the tools of game theory to improve our understanding of how intelligence can be used against terrorism, and more work here could prove very useful.
More broadly, there has been little work attempting to carefully examine the question of whether terrorism presents a truly new problem for intelligence, or whether it simply echoes the challenges seen by earlier generations of analysts and collectors. (Exceptions include Lesser et al.  and Copeland .) A number of scholars and analysts have noted similarities between the two most notable examples of such attacks against America, Pearl Harbor and 9/11; useful examples include Wirtz (2002) and Borch (2003). But more research is needed into the broader theoretical similarities and differences between the problem of surprise attack from terrorism today, and into the challenges posed for intelligence by conventional attack or by other types of surprises. (A notable exception to this gap is Marrin .)
Relatively few detailed case studies have been produced of how intelligence performed in the face of terrorist attacks other than 9/11, likely because information is difficult to obtain. Exceptions include Segell (2005) on the Madrid train bombings and Dahl (2005) on the 1983 Marine Barracks bombing in Lebanon. Most studies of the American intelligence community focus on the CIA and (to a lesser degree) the FBI. Considerably less work has been done on the many other agencies that make up U.S. intelligence. Exceptions include Jones (2006), Logan (2010), and Steiner (2015) on the intelligence activities of the Department of Homeland Security.
Links to Digital Materials
The Office of the Director of National Intelligence. Established after the 9/11 attacks to impose greater centralization on the vast U.S. intelligence community. Its website provides information on American intelligence organization and policy; it also offers links to the other agencies that make up the intelligence community.
The National Counterterrorism Center. Established in 2004 as the primary U.S. government organization for analyzing terrorism related intelligence, and for planning and coordinating counterterrorism activities across the entire government.
The website of the 9/11 Commission. Now managed by the National Archives and Records Administration. In addition to the 9/11 Commission Report itself, this site includes links to the many other products of the 9/11 Commission’s work, including staff statements, monographs, and public hearings.
The website of the Federation of American Scientists. A useful resource for government documents and reports of all kinds on intelligence and other security and defense matters.
The National Consortium for the Study of Terrorism and Responses to Terrorism (START). A Department of Homeland Security Center of Excellence located at the University of Maryland.
The website of the U.S. Department of State, Bureau of Counterterrorism. The website makes available Country Reports on Terrorism and other useful materials.
Aid, M. M. (2003). All glory is fleeting: Sigint and the fight against international terrorism. Intelligence and National Security, 18(4), 72–120.Find this resource:
Aid, M. M. (2012). Intel wars: The secret history of the fight against terror. New York: Bloomsbury Press.Find this resource:
Aldrich, R. J. (2002). Dangerous liaisons: Post-September 11 intelligence alliances. Harvard International Review, 24(3), 50–54.Find this resource:
Allen, M. (2013). Blinking red: Crisis and compromise in American intelligence after 9/11. Washington, DC: Potomac Books.Find this resource:
Anonymous [Scheuer, M.]. (2004). How not to catch a terrorist. Atlantic Monthly (December), 50.Find this resource:
Apuzzo, M., & Goldman, A. (2013). Enemies within: Inside the NYPD secret spying unit and bin Laden’s final plot against America. New York: Touchstone.Find this resource:
Arce, D. G., & Sandler, T. (2007). Terrorist signalling and the value of intelligence. British Journal of Political Science, 37, 573–586.Find this resource:
Arquilla, J., & Ronfeldt, D. (Eds.). (2001). Networks and netwars: The future of terror, crime, and militancy. Santa Monica, CA: RAND.Find this resource:
Atran, S. (2006). Commentary: A failure of imagination (intelligence, WMDs, and “virtual jihad”). Studies in Conflict & Terrorism, 29(3), 285–300.Find this resource:
Badey, T. J. (2001). Nuclear terrorism: Actor-based threat assessment. Intelligence and National Security, 16(2), 39–54.Find this resource:
Baer, R. (2005). Wanted: Spies unlike us. Foreign Policy, 147, 66–70.Find this resource:
Ball, D. J. (2002). Desperately seeking bin Laden: The intelligence dimension of the war against terrorism. In K. Booth & T. Dunne (Eds.), Worlds in collision: Terror and the future of global order (pp. 60–73). Basingstoke, U.K.: Palgrave.Find this resource:
Bamford, B. W. C. (2005). The role and effectiveness of intelligence in Northern Ireland. Intelligence & National Security, 20(4), 581–607.Find this resource:
Barger, D. G. (2005). Toward a revolution in intelligence affairs. Santa Monica, CA: RAND.Find this resource:
Bazerman, M. H., & Watkins, M. D. (2004). Predictable surprises: The disasters you should have seen coming, and how to prevent them. Boston: Harvard Business School Press.Find this resource:
Beres, L. R. (1997). Preventing the ultimate nightmare: Nuclear terrorism against the United States. International Journal of Intelligence & CounterIntelligence, 10(3), 333–342.Find this resource:
Bergen, P. L. (2012). Manhunt: The ten-year search for Bin Laden from 9/11 to Abbottabad. New York: Crown.Find this resource:
Berkowitz, B. D. (2002a). Deep cover. Hoover Digest, 4.Find this resource:
Berkowitz, B. D. (2002b). Intelligence and the war on terrorism. Orbis, 46(2), 289–300.Find this resource:
Berkowitz, B. D. (2004). Intelligence for the homeland. SAIS Review, 24(1), 1–6.Find this resource:
Berkowitz, P. (Ed.). (2005). The future of American intelligence. Stanford, CA: Hoover Institution.Find this resource:
Best, R. A., Jr. (2003). Intelligence to counter terrorism: Issues for Congress. Washington, DC: Congressional Research Service.Find this resource:
Betts, R. K. (1978). Analysis, war, and decision: Why intelligence failures are inevitable. World Politics, 31(1), 61–89.Find this resource:
Betts, R. K. (2002). Fixing intelligence. Foreign Affairs, 81(1), 43–59.Find this resource:
Betts, R. K. (2006). How to think about terrorism. Wilson Quarterly, 30, 44–49.Find this resource:
Betts, R. K. (2007). Enemies of intelligence: Knowledge and power in American national security. New York: Columbia University Press.Find this resource:
Borch, F. L. (2003). Comparing Pearl Harbor and “9/11”: Intelligence failure? American unpreparedness? Military responsibility? Journal of Military History, 67(3), 845–860.Find this resource:
Bouza, A. V. (1976). Police intelligence: The operations of an investigative unit. New York: AMS Press.Find this resource:
Bouzis, K. (2015). Countering the Islamic State: U.S. counterterrorism measures. Studies in Conflict & Terrorism, 38(10), 885–897.Find this resource:
Bruneau, T. (2008). Democracy and effectiveness: Adapting intelligence for the fight against terrorism. International Journal of Intelligence & CounterIntelligence, 21(3), 448–460.Find this resource:
Bryant, R., Hamre, J., Lawn, J., MacGaffin, J., Shapiro, H., Smith, J. (2003). America needs more spies. The Economist, (July 12), 30–31.Find this resource:
Builta, J. A., & Heller, E. N. (2011). Reflections on 10 years of counterterrorism analysis. Studies in Intelligence, 55(3), unclassified extracts, 1–15.Find this resource:
Byman, D. (2005). Strategic surprise and the September 11 attacks. Annual Review of Political Science, 8, 145–170.Find this resource:
Byman, D. (2014). The intelligence war on terrorism. Intelligence & National Security, 29(6), 837–863.Find this resource:
Byman, D. (2017). US counterterrorism intelligence cooperation with the developing world and its limits. Intelligence & National Security, 32(2), 145–160.Find this resource:
Campbell, K. M., & Flournoy, M. A. (2001). Intelligence: The long pole in the tent. In K. M. Campbell & M. A. Flournoy (Eds.), To prevail: An American strategy for the campaign against terrorism (pp. 77–89). Washington, DC: CSIS Press.Find this resource:
Carter, D., Chermak, S., Carter, J., & Drew, J. (2014). Understanding law enforcement intelligence processes. National Consortium for the Study of Terrorism and Responses to Terrorism (START), July.Find this resource:
Charters, D. A. (1991). Counterterrorism intelligence: Sources, methods, process, and problems. In D. A. Charters (Ed.), Democratic responses to international terrorism (pp. 227–266). Ardsley-on-Hudson, NY: Transnational.Find this resource:
Clarke, R. A. (2004). Against all enemies: Inside America’s war on terror. New York: Free Press.Find this resource:
Cogan, C. (2004). Hunters not gatherers: Intelligence in the twenty-first century. Intelligence & National Security, 19(2), 304–321.Find this resource:
Cooper, H. H. A. (1978). Terrorism and the intelligence function. In M. H. Livingston, L. B. Kress, & M. G. Wanek (Eds.), International terrorism in the contemporary world (pp. 287–296). Westport, CT: Greenwood.Find this resource:
Copeland, T. E. (2001). Is the “new terrorism” really new? An analysis of the new paradigm of terrorism. Journal of Conflict Studies, 21(2), 91–105.Find this resource:
Copeland, T. E. (2007). Fool me twice: Intelligence failure and mass casualty terrorism. Leiden, The Netherlands: Martinus Nijhoff.Find this resource:
Cronin, B. (2005). Intelligence, terrorism, and national security. Annual Review of Information Science & Technology, 39, 395–432.Find this resource:
Crumpton, H. A. (2012). The art of intelligence: Lessons from a life in the CIA’s clandestine service. New York: Penguin.Find this resource:
Dahl, E. J. (2005). Warning of terror: Explaining the failure of intelligence against terrorism. Journal of Strategic Studies, 28(1), 31–55.Find this resource:
Dahl, E. J. (2013). Intelligence and surprise attack: Failure and success from Pearl Harbor to 9/11 and beyond. Washington, DC: Georgetown University Press.Find this resource:
Dahl, E. J. (2014a). Finding Bin Laden: Lessons for a new American way of intelligence. Political Science Quarterly, 129(2), 179–210.Find this resource:
Dahl, E. J. (2014b). Local approaches to counterterrorism: The New York Police Department model. Journal of Policing, Intelligence & Counter Terrorism, 9(2), 81–97.Find this resource:
Danis, A. A. (2007). Al Qaeda’s surveillance offensive against America, 2000–2003: Implications for U.S. homeland countersurveillance. In J. J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: International perspectives. Strategic and tactical considerations (Vol. 1, pp. 502–524). Westport, CT: Praeger.Find this resource:
Davies, P. H. J. (2004). Intelligence culture and intelligence failure in Britain and the United States. Cambridge Review of International Affairs, 17(3), 495–520.Find this resource:
Den Boer, M. (2015). Counter-terrorism, security and intelligence in the EU: Governance challenges for collection, exchange and analysis. Intelligence & National Security, 30(2–3), 402–419.Find this resource:
Deutch, J., & Smith, J. H. (2002). Smarter intelligence. Foreign Policy, 128, 64–69.Find this resource:
Enemark, C. (2006). Biological attacks and the non-state actor: A threat assessment. Intelligence & National Security, 21(6), 911–930.Find this resource:
Ermarth, F. (2002). Signs and portents: The “I&W” paradigm post-9/11. [Electronic version]. In the National Interest. Available online.
Gazit, S., & Handel, M. I. (1980). Insurgency, terrorism, and intelligence. In R. Godson (Ed.), Intelligence requirements for the 1980s: Counterintelligence (pp. 125–158). New Brunswick, NJ: Transaction.Find this resource:
Gerecht, R. M. (2001). The counterterrorist myth. Atlantic Monthly 288, 38–42.Find this resource:
Gerecht, R. M. (2004). Not worth a blue ribbon. Washington, DC: American Enterprise Institute policy paper.Find this resource:
Gerecht, R. M. (2006). Intelligence deficit disorder. Washington, DC: American Enterprise Institute on the Issues paper.Find this resource:
Gosler, J. R. (2005). The digital dimension. In J. E. Sims & B. Gerber (Eds.), Transforming intelligence (pp. 96–114). Washington, DC: Georgetown University Press.Find this resource:
Handel, M. I. (1977). The Yom Kippur war and the inevitability of surprise. International Studies Quarterly, 21(3), 461–502.Find this resource:
Hansen, J. (2004). U.S. Intelligence confronts the future. International Journal of Intelligence & CounterIntelligence, 17(4), 673–709.Find this resource:
Harris, J. W. (2002). Building leverage in the long war: Ensuring intelligence community creativity in the fight against terrorism. Cato Institute Policy Analysis, 439, 1–14.Find this resource:
Hastedt, G. P. (1988). Intelligence failure and terrorism: The attack on the Marines in Beirut. Conflict Quarterly, 8(2), 7–22.Find this resource:
Hayden, M. (2010 September 27). Protecting America and winning the intelligence war. The Heritage Foundation, Heritage Lectures, No. 1167.Find this resource:
Hayden, M. V. (2007 September 7). Prepared remarks at the Council on Foreign Relations. New York.Find this resource:
Hedley, J. H. (2005). Learning from intelligence failures. International Journal of Intelligence & CounterIntelligence, 18(3), 435–450.Find this resource:
Herman, M. (2002). 11 September: Legitimizing intelligence? International Relations, 16(2), 227–241.Find this resource:
Herman, M. (2003). Counter-terrorism, information technology and intelligence change. Intelligence & National Security, 18(4), 40–58.Find this resource:
Herman, M. (2004). Ethics and intelligence after September 2001. Intelligence & National Security, 19(2), 342–358.Find this resource:
Heuer, R. J., Jr. (2005). Limits of intelligence analysis. Orbis, 49(1), 75–94.Find this resource:
Hitz, F. P. (2005). The myths and current reality of espionage. International Journal of Intelligence & CounterIntelligence, 18(4), 730–733.Find this resource:
Hof, F. C. (1985). The Beirut bombing of October 1983: An act of terrorism? Parameters, 15(2), 69–74.Find this resource:
Hoffman, B. (1996). Intelligence and terrorism: Emerging threats and new security challenges in the post–Cold War era. Intelligence & National Security, 11(2), 207–223.Find this resource:
Honig, O. (2008). Surprise attacks—Are they inevitable? Moving beyond the orthodox–revisionist dichotomy. Security Studies, 17(1), 72–106.Find this resource:
Hulnick, A. S. (2005). Indications and warning for homeland security: Seeking a new paradigm. International Journal of Intelligence & CounterIntelligence, 18(4), 593–608.Find this resource:
Irons, L. (2008). Recent patterns of terrorism prevention in the United Kingdom. Homeland Security Affairs, 4(1).Find this resource:
Jenkins, B. M. (2003 March 31). Statement to the National Commission on Terrorist Attacks upon the United States. Washington, DC.Find this resource:
Jenkins, B. M. (2006a). Intelligence and homeland security. In A. Dalgaard-Nielsen & D.S. Hamilton (Eds.), Transatlantic homeland security: Protecting society in the age of catastrophic terrorism (pp. 126–146). London: Routledge.Find this resource:
Jenkins, B. M. (2006b). Lessons for intelligence in the campaign against al Qaeda. Vanguard (March 1).Find this resource:
Jenkins, B. M. (2006c). Unconquerable nation: Knowing our enemy, strengthening ourselves. Santa Monica, CA: RAND.Find this resource:
Johnson, M., & Shelton, A. (2013). Thoughts on the state of intelligence studies: A survey report. Intelligence & National Security, 28(1), 109–120.Find this resource:
Johnston, R. (2005). Analytic culture in the U.S. intelligence community: An ethnographic study. Washington, DC: Central Intelligence Agency Center for the Study of Intelligence.Find this resource:
Jones, S. G. (2006). Terrorism and the battle for homeland security. In R. D. Howard, J. J. F. Forest, & J. C. Moore (Eds.), Homeland security and terrorism: Readings and interpretations (pp. 266–271). New York: McGraw-Hill.Find this resource:
Jordan, J., Torres, M. R., & Horsburgh, N. (2004). The Intelligence Services’ struggle against al-Qaeda propaganda. International Journal of Intelligence & CounterIntelligence, 18(1), 31–49.Find this resource:
Kahana, E. (2005). Analyzing Israel’s intelligence failures. International Journal of Intelligence & CounterIntelligence, 18(2), 262–279.Find this resource:
Kahn, D. (2006). The rise of intelligence. Foreign Affairs, 85(5), 125–134.Find this resource:
Kam, E. (2004). Surprise attack: The victim’s perspective, with a new preface. Cambridge, MA: Harvard University Press.Find this resource:
Kamarck, E. C. (2005). Transforming the intelligence community: Improving the collection and management of information. Washington, DC: IBM Center for the Business of Government.Find this resource:
Kauppi, M. V. (2006). Counterterrorism analysis and homeland security. In D. G. Kamien (Ed.), The McGraw-Hill homeland security handbook (pp. 413–426). New York: McGraw-Hill.Find this resource:
Kennedy, D., & Brunetta, L. (1994). Lebanon and the intelligence community: A case study. Studies in Intelligence, 37(5), 37–51.Find this resource:
Kerstetter, W. A. (1979). Terrorism and intelligence. Terrorism: An International Journal, 3(1–2), 109–115.Find this resource:
Khalsa, S. K. (2004). Forecasting terrorism: Indicators and proven analytic techniques. Lanham, MD: Scarecrow.Find this resource:
Kibbe, J. D. (2007). Covert action and the pentagon. Intelligence & National Security, 22(1), 57–74.Find this resource:
Lahneman, W. J. (2007). Is a revolution in intelligence affairs occurring? International Journal of Intelligence & CounterIntelligence, 20(1), 1–17.Find this resource:
Lander, S. (2004). International intelligence cooperation: An inside perspective. Cambridge Review of International Affairs, 17(3), 481–493.Find this resource:
Lansford, T. (2007). Multinational Intelligence Cooperation. In J. J. F. Forest (Ed.), Countering Terrorism and Insurgency in the 21st Century: International Perspectives. Strategic and Tactical Considerations (Vol. 1, pp. 420–39). Westport, CT: Praeger,Find this resource:
Leetaru, K. (2015 April 15). Why we can’t just read english newspapers to understand terrorism, and how big data can help. Foreignpolicy.com.
Lefebvre, S. J. (2003). The difficulties and dilemmas of international intelligence cooperation. International Journal of Intelligence & CounterIntelligence, 16(4), 527–542.Find this resource:
Le Gallo, A. (2005). Covert action: A vital option in U.S. national security policy. International Journal of Intelligence & CounterIntelligence, 18(2), 354–359.Find this resource:
Lesser, I. O., Hoffman, B., Arquilla, J., Ronfeldt, D., Zanini, M., & Jenkins, B. M. (1999). Countering the new terrorism. Santa Monica, CA: RAND.Find this resource:
Lewis, O. A., & Chenoweth, E. (2007). Facilitating interagency communication and open source intelligence for counterterrorism. In J. J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: International perspectives. Strategic and tactical considerations (Vol. 1, pp. 487–501). Westport, CT: Praeger.Find this resource:
Lewis, R. C. (2004). Espionage and the war on terrorism: Investigating U.S. efforts. Brown Journal of World Affairs, 11(1), 175–182.Find this resource:
Logan, K. G. (Ed.). (2010). Homeland security and intelligence. Santa Barbara, CA: Praeger.Find this resource:
Mackmurdo, C. (2007). Intelligence and international security after 9/11. In C. Ankersen (Ed.), Understanding global terror (pp. 195–216). Cambridge, MA: Polity.Find this resource:
Marlo, F. H. (1999). WMD terrorism and U.S. intelligence collection. Terrorism & Political Violence, 11(3), 53–71.Find this resource:
Marrin, S. (2003). Homeland security intelligence: Just the beginning. Journal of Homeland Security (November).Find this resource:
Marrin, S. (2004). Preventing intelligence failures by learning from the past. International Journal of Intelligence & CounterIntelligence, 17(4), 655–672.Find this resource:
Marrin, S. (2011). The 9/11 terrorist attacks: A failure of policy not strategic intelligence analysis. Intelligence & National Security, 26(2–3), 182–202.Find this resource:
McConnell, J. M. (2007). Remarks and Q&A by the Director of National Intelligence. Project on National Security Reform Conference (July 26), Washington, DC.Find this resource:
Mobley, B. W. (2012). Terrorism and counterintelligence: How terrorist groups elude detection. New York: Columbia University Press.Find this resource:
Motley, J. B. (1986). International terrorism: A challenge for U.S. intelligence. International Journal of Intelligence & CounterIntelligence, 1(1), 83–96.Find this resource:
Motley, J. B. (1987). Coping with the terrorist threat: The U.S. intelligence dilemma. In S. J. Cimbala (Ed.), Intelligence and intelligence policy in a democratic society (pp. 165–175). Dobbs Ferry, NY: Transnational.Find this resource:
Mowatt-Larssen, R. (2009). Preventing nuclear terrorism: A global intelligence imperative. Washington Institute for Near East Policy, PolicyWatch 1511, April 30.Find this resource:
Mudd, P. (2013). Takedown: Inside the hunt for Al Qaeda. Philadelphia: University of Pennsylvania Press.Find this resource:
National Commission on Terrorist Attacks upon the United States. (2004). The 9/11 Commission Report: Final Report of the National Commission on terrorist attacks upon the United States, authorized ed. New York: W. W. Norton.Find this resource:
National Security Strategy of the United States of America. (2002). Washington, DC: The White House.Find this resource:
Nomikos, J. M. (2005). A European Union intelligence service for confronting terrorism. International Journal of Intelligence & CounterIntelligence, 18(2), 191–203.Find this resource:
Nomikos, J. M. (2007). Terrorism, media, and intelligence in Greece: Capturing the 17 November group. International Journal of Intelligence & CounterIntelligence, 20(1), 65–78.Find this resource:
Norell, M. (2007). Intelligence coordination and counterterrorism: A European perspective. In J. J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: International perspectives. Strategic and tactical considerations (Vol. 1, pp. 440–464). Westport, CT: Praeger.Find this resource:
Ofri, A. (1984). Intelligence and counterterrorism. Orbis, 28(1), 41–52.Find this resource:
Olson, J. M. (2008). Intelligence and the war on terror: How dirty are we willing to get our hands? SAIS Review, 28(1), 37–45.Find this resource:
Parker, C. F., & Stern, E. K. (2002). Blindsided? September 11 and the origins of strategic surprise. Political Psychology, 23(3), 601–630.Find this resource:
Parker, C. F., & Stern, E. K. (2005). Bolt from the blue or avoidable failure? Revisiting September 11 and the origins of strategic surprise. Foreign Policy Analysis, 1(3), 301–331.Find this resource:
Pedahzur, A., & Perliger, A. (2007). Coping with terrorism: Lessons learned from the Israeli intelligence community. In J. J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: International perspectives. Strategic and tactical considerations (Vol. 1, pp. 465–486). Westport, CT: Praeger.Find this resource:
Peterson, M. (2005). Intelligence-led policing: The new intelligence architecture. Washington, DC: U.S. Department of Justice, Bureau of Justice Assistance.Find this resource:
Pillar, P. R. (2003). Metaphors and mantras: A comment on Shultz and Vogt’s discussion of terrorism, intelligence, and war. Terrorism and Political Violence, 15(2), 139–151.Find this resource:
Pillar, P. R. (2007). Adapting intelligence to changing issues. In L. K. Johnson (Ed.), Handbook of intelligence studies (pp. 148–162). London: Routledge.Find this resource:
Pillar, P. R. (2014 October 3). ISIS and the politics of surprise. The National Interest.Find this resource:
Pita, R. (2007). Assessing al-Qaeda’s chemical threat. International Journal of Intelligence & CounterIntelligence, 20(3), 480–511.Find this resource:
Posner, R. A. (2005). Preventing surprise attacks: Intelligence reform in the wake of 9/11. Stanford, CA: Rowman and Littlefield.Find this resource:
Prince, J. (1989). Is there a role for intelligence in combating terrorism? Conflict, 9(3), 301–318.Find this resource:
Ranstorp, M. (2007). Introduction: Mapping terrorism research. In M. Ranstorp (Ed.), Mapping terrorism research: State of the art, gaps and future direction (pp. 1–28). London: Routledge.Find this resource:
Renfer, M. A., & Haas, H. S. (2008). Systematic analysis in counterterrorism: Messages on an Islamist internet-forum. International Journal of Intelligence & CounterIntelligence, 21(2), 314–336.Find this resource:
Reveron, D. S. (2006). Old allies, new friends: Intelligence-sharing in the war on terror. Orbis, 50(3), 453–468.Find this resource:
Richards, J. (2012). Intelligence dilemma? Contemporary counter-terrorism in a liberal democracy. Intelligence and National Security, 27(5), 761–780.Find this resource:
Riley, K. J., Treverton, G. F., Wilson, J. M., & Davis, L. M. (2005). State and local intelligence in the war on terrorism. Santa Monica, CA: RAND.Find this resource:
Rimington, S. (2005 January 3). “Humint” begins at home. Wall Street Journal, A8.Find this resource:
Robertson, K. G. (1987). Intelligence, terrorism and civil liberties. Conflict Quarterly, 7(2), 43–62.Find this resource:
Rosenbach, E. (2008). The incisive fight: Recommendations for improving counterterrorism intelligence. Annals of the American Academy of Political & Social Science, 618, 133–147.Find this resource:
Rovner, J. (2005). Why intelligence isn’t to blame for 9/11. MIT Center for International Studies. Audit of the Conventional Wisdom, 5(13).Find this resource:
Rudner, M. (2004). Hunters and gatherers: The intelligence coalition against Islamic terrorism. International Journal of Intelligence & CounterIntelligence, 17(2), 193–230.Find this resource:
Rudner, M. (2005). Using financial intelligence against the funding of terrorism. International Journal of Intelligence & CounterIntelligence, 19(1), 32–58.Find this resource:
Rudner, M. (2013). Cyber-threats to critical national infrastructure: An intelligence challenge. International Journal of Intelligence & Counterintelligence, 26(3), 453–481.Find this resource:
Russell, R. L. (2004). Spies like them. The National Interest, 77, 59–62.Find this resource:
Russell, R. L. (2005). A weak pillar for American national security: The CIA’s dismal performance against WMD threats. Intelligence & National Security, 20(3), 466–485.Find this resource:
Russell, R. L. (2007a). Sharpening strategic intelligence: Why the CIA gets it wrong, and what needs to be done to get it right. New York: Cambridge University Press.Find this resource:
Russell, R. L. (2007b). The intelligence war against global terrorism. In L. K. Johnson (Ed.), Strategic intelligence. Counterintelligence and counterterrorism: Defending the nation against hostile forces (Vol. 4, pp. 127–138). Westport, CT: Praeger.Find this resource:
Schmitt, E., & Shanker, T. (2011). Counterstrike: The untold story of America’s secret campaign against Al Qaeda. New York: Times Books.Find this resource:
Segell, G. M. (2004). Intelligence agency relations between the European Union and the U.S. International Journal of Intelligence & CounterIntelligence, 17(1), 81–96.Find this resource:
Segell, G. M. (2005). Intelligence methodologies applicable to the Madrid train bombings, 2004. International Journal of Intelligence & CounterIntelligence, 18(2), 221–238.Find this resource:
Shultz, R. H., Jr., & Beitler, R. M. (2004). Tactical deception and strategic surprise in Al-Qaida operations. Middle East Review of International Affairs, 8(2), 56–79.Find this resource:
Shultz, R. H., Jr., & Vogt, A. (2003). It’s war! Fighting post–11 September global terrorism through a doctrine of preemption. Terrorism & Political Violence, 15(1), 1–30.Find this resource:
Sims, J. E. (2005). Transforming espionage: A contrarian’s approach. Georgetown Journal of International Affairs, 6(1), 53–59.Find this resource:
Sims, J. E. (2006). Foreign intelligence liaison: Devils, deals, and details. International Journal of Intelligence & CounterIntelligence, 19(2), 195–217.Find this resource:
Sims, J. E. (2007a). Intelligence to counter terror: The importance of all-source fusion. Intelligence & National Security, 22(1), 38–56.Find this resource:
Sims, J. E. (2007b). The contemporary challenges of counterterrorism intelligence. In J. J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: International perspectives. Strategic and tactical considerations (Vol. 1, pp. 397–419). Westport, CT: Praeger.Find this resource:
Sinai, J. (2007). Forecasting terrorist groups’ warfare: “Conventional” to CBRN. In J. J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: International perspectives. Strategic and tactical considerations (Vol. 1, pp. 525–536). Westport, CT: Praeger.Find this resource:
Skillicorn, D. B, & Vats, N. (2007). Novel information discovery for intelligence and counterterrorism. Decision Support Systems, 43, 1375–1382.Find this resource:
Sloan, S. (2006). The new terrorist threat environment: Continuity and change in counter-terrorism intelligence. In P. Katona, M. D. Intriligator, & J. P. Sullivan (Eds.), Countering terrorism and WMD: Creating a global counter-terrorism network (pp. 199–211). London: Routledge.Find this resource:
Steinberg, J. B., Graham, M., & Eggers, A. (2003). Building intelligence to fight terrorism, Brookings Institution Policy Brief 125. Washington, DC: Brookings Institution.Find this resource:
Steiner, J. E. (2015). Homeland security intelligence. Los Angeles: CQ Press.Find this resource:
Stevenson, J. (2006). Law-enforcement and intelligence capabilities. Adelphi Papers, 44(367), 47–71.Find this resource:
Sulc, L. (1987). Terrorism and the importance of intelligence. Studies in Conflict & Terrorism, 10(2), 133–138.Find this resource:
Sullivan, J. P., & Wirtz, J. J. (2008). Terrorism early warning and counterterrorism intelligence. International Journal of Intelligence & CounterIntelligence, 21(1), 13–25.Find this resource:
Svendsen, A. D. M. (2008). The globalization of intelligence since 9/11: Frameworks and operational parameters. Cambridge Review of International Affairs, 21(1), 129–144.Find this resource:
Svendsen, A. D. M. (2012). The Federal Bureau of Investigation and change: Addressing US domestic counter-terrorism intelligence. Intelligence & National Security, 27(3), 371–397.Find this resource:
Taylor, R. W. (1987). Terrorism and intelligence. Defense & Security Analysis, 3(2), 165–175.Find this resource:
Treverton, G. F. (2003). Terrorism, intelligence and law enforcement: Learning the right lessons. Intelligence & National Security, 18(4), 121–140.Find this resource:
Treverton, G. F. (2009). Intelligence for an age of terror. Cambridge, U.K.: Cambridge University Press.Find this resource:
Treverton, G. F. (2010). Addressing “complexities” in homeland security. In L. Johnson (Ed.), The Oxford handbook of national security intelligence (pp. 343–348). New York: Oxford University Press.Find this resource:
Walsh, J. I. (2010). The international politics of intelligence sharing. New York: Columbia University Press.Find this resource:
Wannall, W. R. (2002). Undermining counterintelligence capability. International Journal of Intelligence & CounterIntelligence, 15(3), 321–329.Find this resource:
Waxman, M. C. (2009). Police and national security: American local law enforcement and counterterrorism after 9/11. Journal of National Security Law & Policy, 3, 377–407.Find this resource:
Weiner, T. (2007). How to make a spy. Foreign Policy, 162, 44–48.Find this resource:
Williams, P. (2005). Warning indicators, terrorist finances, and terrorist adaptation. Strategic Insights, 4(1).Find this resource:
Winston, T. (2007). Intelligence challenges in tracking terrorist internet fund transfer activities. International Journal of Intelligence & CounterIntelligence, 20(2), 327–343.Find this resource:
Wirtz, J. J. (2002). Deja Vu? Comparing Pearl Harbor and September 11. Harvard International Review, 24(3), 73–77.Find this resource:
Wirtz, J. J. (2006). Responding to surprise. Annual Review of Political Science, 9, 45–65.Find this resource:
Wirtz, J. J. (2014). The cyber Pearl Harbor. In E. O. Goldman & J. Arquilla (Eds.), Cyber analogies (pp. 7–14). Monterey, CA: Naval Postgraduate School.Find this resource:
Wohlstetter, R. (1962). Pearl Harbor: Warning and decision. Stanford, CA: Stanford University Press.Find this resource:
Wright, L. (2006). The looming tower: Al Qaeda and the road to 9/11. New York: Knopf.Find this resource:
Zegart, A. B. (2006 September 17). American intelligence—still stupid. Los Angeles Times, M2.Find this resource:
Zegart, A. B. (2007a). Spying blind: The CIA, the FBI, and the origins of 9/11. Princeton, NJ: Princeton University Press.Find this resource:
Zegart, A. B. (2007b). CNN with secrets: 9/11, the CIA, and the organizational roots of failure. International Journal of Intelligence & CounterIntelligence, 20(1), 18–49.Find this resource:
Zegart, A. B. (2007c). 9/11 and the FBI: The organizational roots of failure. Intelligence & National Security, 22(2), 165–184.Find this resource:
Zenko, M. (2006). Intelligence estimates of nuclear terrorism. Annals of the American Academy of Political & Social Science, 607(1), 87–102.Find this resource: