Research Article
BibTex RIS Cite

Thinking about Intelligence Within, Without, and Beyond the State

Year 2014, Volume: 3 Issue: 2, 5 - 20, 29.08.2014
https://doi.org/10.20991/allazimuth.167324

Abstract

References

  • “Awakening Movement in Iraq.” New York Times, December 21, 2010. http://topics.nytimes.com/top/news/ international/countriesandterritories/iraq/awakening_movement/index.html.
  • “Commission of Inquiry into the Actions of Canadian Officials in Relation to Maher Arar.” In A New Review Mechanism for the RCMP”s National Security Activities. Ottawa: Minister of Public Works and Government Services, 2006.
  • Richard Aldrich, “Regulation by Revelation? Intelligence, Transparency and the Media,” in Known Knowns: British and
  • American Intelligence and the Media, ed. R. Dover and M. Goodman (New York: Columbia University Press, 2009), 134.
  • Richard Aldrich, “US-European Intelligence Cooperation on Counter-Terrorism: Low Politics and Compulsion,” British
  • Journal of Politics and International Relations 11, no.1 (2009): 122-39.
  • Cf. Ian Loader and Neil Walker, Civilizing Security (Cambridge: Cambridge University Press, 2007).
  • Cf. Philip Cerny, “Globalisation, governance and complexity,” in Globalization and Governance, ed. Asseem Prakash and
  • Theory: key questions and debates, edited by Peter Gill, Stephen Marrin and Mark Phythian, 208-26. London: Routledge, 2009.
  • Griffith, Samuel. Sun Tzu: The Art of War. London: Oxford University Press, 1963.
  • Grugel Jean. Democratization: a critical introduction, Basingstoke: Palgrave, 2002.
  • Johnson, Loch. “The Church Committee Investigation of 1975 and the Evolution of Modern Intelligence Accountability.” Intelligence and National Security 23, no.2 (2008): 198-225.
  • Kahaner, Larry. Competitive Intelligence: how to gather, analyze, and use information to move your business to the top, New York: Touchstone, 1996.
  • Kinsey, Christopher. “Private security companies and corporate social responsibility.” In Private Military and Security Companies: ethics, policies and civil-military relations, edited by Andrew Alexander, Deane-Peter Baker, Marina Caparini, 70-86. London: Routledge, 2008.
  • Kocsis, Kalman. “Bosnia and Herzegovina.” In PSI Handbook of Global Security and Intelligence, National Approaches, volume 2, edited by Stuart Farson et al., 439-55. Westport, CT: Praeger Security International, 2008.
  • Krahmann, Elke. States, Citizens and the Privatization of Security. Cambridge: Cambridge UP, 2010.
  • Kurban, Dilek. “The Village Guard System as a “Security” Policy.” In Security Sector and Democratic Oversight, edited by Ali Bayramoğlu and Ahmet Insel, 203-10. Istanbul: TESEV, 2010.
  • Loader, Ian and Neil Walker. Civilizing Security. Cambridge: Cambridge University Press, 2007.
  • Marty, Dick. “Alleged Secret Detentions and Unlawful Inter-State Transfers of Detainees Involving Council of Europe Member States: Second Report.” Parliamentary Assembly, Council of Europe, June 11, 2007.
  • Mason, Rowena and Richard Blackden. “Shell to pay $48m Nigrian bribe fine.” The Telegraph, November 4, 2010.
  • Norwitz, Jeffrey. Pirates, Terrorists, and Warlords: the history, influence, and future of armed groups around the world. New York: Skyhorse Publishing, 2009.
  • O”Brien, Kevin. “South Africa.” In PSI Handbook of Global Security and Intelligence, National Approaches, volume 2, edited by Stuart Farson et al., 619-50. Westport, CT: Praeger Security International, 2008.
  • Ranelagh, John. The Agency: the rise and decline of the CIA. New York: Simonand Schuster, 1987.
  • Rangarajan, L.N. ed. Kautilya: The Arthashastra. New Delhi: Penguin, 1992.
  • Richelson, Jeffrey and Desmond Ball. The Ties that Bind. Boston: Unwin Hyman, 1990.
  • Scahill, Jeremy. Blackwater: the rise of the world”s most powerful mercenary army. London: Serpent”s tail, 2007.
  • Scott, Len and Peter Jackson. “The Study of Intelligence in Theory and Practice.” Intelligence and National Security 19, no.2 (2004): 139-69.
  • Sharp, Seena. Competitive Intelligence Advantage: how to minimize risk, avoid surprises and grow your business in a changing world. Hoboken, NJ: John Wiley and Sons, 2009.
  • Shorrock, Tim. Spies for Hire: the secret world of intelligence outsourcing. New York: Simon and Schuster, 2008.
  • Shpiro, Shlomo. “Intelligence, peacekeeping and Peacemaking in the Middle East.” In Peacekeeping Intelligence: emerging concepts for the future, de Jong et al., 101-14. Oakton, VA: OSS International, 2003.
  • Singer, Peter. Corporate Warriors: the rise of the privatized military industry. Ithaca: Cornell University Press, 2003.
  • Tilly, Charles. Democracy, Cambridge: Cambridge University Press, 2007.
  • Vulliamy, Ed. Amexica: war along the borderline. London: The Bodley Head, 2010.
  • Warner, Michael. “Intelligence as Risk Shifting.” In Intelligence Theory: key questions and debates, edited by Gill, et al., 16-32. London: Routledge, 2009.
  • Weber, Max. Political Writings, edited by Lassman and Speirs. Cambridge: Cambridge University Press, 1994.
  • Wikileaks. “Shell Md Discusses The Status Of The Proposed Petroleum.” http://wikileaks.ch/ cable/2009/10/09ABUJA1907.html.
  • Williams K. and Deletant D. Security Intelligence Services in New Democracies: The Czech Republic, Slovakia and Romania. Basingstoke: Palgrave, 2001.

Thinking about Intelligence Within, Without, and Beyond the State

Year 2014, Volume: 3 Issue: 2, 5 - 20, 29.08.2014
https://doi.org/10.20991/allazimuth.167324

Abstract

The reform or ‘democratization’ of intelligence has been studied in many countries essentially as a process of transition from authoritarian or ‘counterintelligence’ states to liberal democratic regimes in which security and intelligence agencies are subject to (more or less) democratic control and oversight. These studies have contributed to the growth in comparative studies of intelligence but have often ignored some key issues, including the conditions for the very existence of ‘state’ intelligence, the continuing significance of parallel non-state intelligence entities and the involvement of an increasing number of corporate actors in intelligence activities. This chapter examines intelligence as it works within and between different ‘sectors’ and the implications for democratization.

References

  • “Awakening Movement in Iraq.” New York Times, December 21, 2010. http://topics.nytimes.com/top/news/ international/countriesandterritories/iraq/awakening_movement/index.html.
  • “Commission of Inquiry into the Actions of Canadian Officials in Relation to Maher Arar.” In A New Review Mechanism for the RCMP”s National Security Activities. Ottawa: Minister of Public Works and Government Services, 2006.
  • Richard Aldrich, “Regulation by Revelation? Intelligence, Transparency and the Media,” in Known Knowns: British and
  • American Intelligence and the Media, ed. R. Dover and M. Goodman (New York: Columbia University Press, 2009), 134.
  • Richard Aldrich, “US-European Intelligence Cooperation on Counter-Terrorism: Low Politics and Compulsion,” British
  • Journal of Politics and International Relations 11, no.1 (2009): 122-39.
  • Cf. Ian Loader and Neil Walker, Civilizing Security (Cambridge: Cambridge University Press, 2007).
  • Cf. Philip Cerny, “Globalisation, governance and complexity,” in Globalization and Governance, ed. Asseem Prakash and
  • Theory: key questions and debates, edited by Peter Gill, Stephen Marrin and Mark Phythian, 208-26. London: Routledge, 2009.
  • Griffith, Samuel. Sun Tzu: The Art of War. London: Oxford University Press, 1963.
  • Grugel Jean. Democratization: a critical introduction, Basingstoke: Palgrave, 2002.
  • Johnson, Loch. “The Church Committee Investigation of 1975 and the Evolution of Modern Intelligence Accountability.” Intelligence and National Security 23, no.2 (2008): 198-225.
  • Kahaner, Larry. Competitive Intelligence: how to gather, analyze, and use information to move your business to the top, New York: Touchstone, 1996.
  • Kinsey, Christopher. “Private security companies and corporate social responsibility.” In Private Military and Security Companies: ethics, policies and civil-military relations, edited by Andrew Alexander, Deane-Peter Baker, Marina Caparini, 70-86. London: Routledge, 2008.
  • Kocsis, Kalman. “Bosnia and Herzegovina.” In PSI Handbook of Global Security and Intelligence, National Approaches, volume 2, edited by Stuart Farson et al., 439-55. Westport, CT: Praeger Security International, 2008.
  • Krahmann, Elke. States, Citizens and the Privatization of Security. Cambridge: Cambridge UP, 2010.
  • Kurban, Dilek. “The Village Guard System as a “Security” Policy.” In Security Sector and Democratic Oversight, edited by Ali Bayramoğlu and Ahmet Insel, 203-10. Istanbul: TESEV, 2010.
  • Loader, Ian and Neil Walker. Civilizing Security. Cambridge: Cambridge University Press, 2007.
  • Marty, Dick. “Alleged Secret Detentions and Unlawful Inter-State Transfers of Detainees Involving Council of Europe Member States: Second Report.” Parliamentary Assembly, Council of Europe, June 11, 2007.
  • Mason, Rowena and Richard Blackden. “Shell to pay $48m Nigrian bribe fine.” The Telegraph, November 4, 2010.
  • Norwitz, Jeffrey. Pirates, Terrorists, and Warlords: the history, influence, and future of armed groups around the world. New York: Skyhorse Publishing, 2009.
  • O”Brien, Kevin. “South Africa.” In PSI Handbook of Global Security and Intelligence, National Approaches, volume 2, edited by Stuart Farson et al., 619-50. Westport, CT: Praeger Security International, 2008.
  • Ranelagh, John. The Agency: the rise and decline of the CIA. New York: Simonand Schuster, 1987.
  • Rangarajan, L.N. ed. Kautilya: The Arthashastra. New Delhi: Penguin, 1992.
  • Richelson, Jeffrey and Desmond Ball. The Ties that Bind. Boston: Unwin Hyman, 1990.
  • Scahill, Jeremy. Blackwater: the rise of the world”s most powerful mercenary army. London: Serpent”s tail, 2007.
  • Scott, Len and Peter Jackson. “The Study of Intelligence in Theory and Practice.” Intelligence and National Security 19, no.2 (2004): 139-69.
  • Sharp, Seena. Competitive Intelligence Advantage: how to minimize risk, avoid surprises and grow your business in a changing world. Hoboken, NJ: John Wiley and Sons, 2009.
  • Shorrock, Tim. Spies for Hire: the secret world of intelligence outsourcing. New York: Simon and Schuster, 2008.
  • Shpiro, Shlomo. “Intelligence, peacekeeping and Peacemaking in the Middle East.” In Peacekeeping Intelligence: emerging concepts for the future, de Jong et al., 101-14. Oakton, VA: OSS International, 2003.
  • Singer, Peter. Corporate Warriors: the rise of the privatized military industry. Ithaca: Cornell University Press, 2003.
  • Tilly, Charles. Democracy, Cambridge: Cambridge University Press, 2007.
  • Vulliamy, Ed. Amexica: war along the borderline. London: The Bodley Head, 2010.
  • Warner, Michael. “Intelligence as Risk Shifting.” In Intelligence Theory: key questions and debates, edited by Gill, et al., 16-32. London: Routledge, 2009.
  • Weber, Max. Political Writings, edited by Lassman and Speirs. Cambridge: Cambridge University Press, 1994.
  • Wikileaks. “Shell Md Discusses The Status Of The Proposed Petroleum.” http://wikileaks.ch/ cable/2009/10/09ABUJA1907.html.
  • Williams K. and Deletant D. Security Intelligence Services in New Democracies: The Czech Republic, Slovakia and Romania. Basingstoke: Palgrave, 2001.
There are 37 citations in total.

Details

Primary Language English
Journal Section Articles
Authors

Peter Gill This is me

Publication Date August 29, 2014
Published in Issue Year 2014 Volume: 3 Issue: 2

Cite

Chicago Gill, Peter. “Thinking about Intelligence Within, Without, and Beyond the State”. All Azimuth: A Journal of Foreign Policy and Peace 3, no. 2 (August 2014): 5-20. https://doi.org/10.20991/allazimuth.167324.

Manuscripts submitted for consideration must follow the style on the journal’s web page.The manuscripts should not be submitted simultaneously to any other publication, nor may they have been previously published elsewhere in English. However, articles that are published previously in another language but updated or improved can be submitted. For such articles, the author(s) will be responsible in seeking the required permission for copyright. Manuscripts may be submitted via Submission Form found at: http://www.allazimuth.com/authors-guideline/. For any questions please contact: allazimuth@bilkent.edu.tr