Upload
independent
View
1
Download
0
Embed Size (px)
Citation preview
Student number ID: 00409034
Module: Security Networks, Intelligence and Internal
Security
Critically analyse the benefits and dangers of
international intelligence liaison. Use examples to
illustrate your answer.
International Intelligence liaison has become an
important discussed subject among academics, politicians,
and practitioners. As Adam Svendsen has argued: ‘Liaison
today represents the most significant dimension of
intelligence.’1 While global intelligence liaison is a
static phenomenon, its significance has been highlighted
as a result of 9/11, followed by the proclamation and
implementation of the so-called doctrine of ‘War on
Terror’ against the ‘Axis of Evil.’2 Intelligence liaison
has become a globalized phenomenon. In other words, the
current transition from a unipolar world, with America as
the only hegemon, to a multipolar world has produced some
major challenges regarding relationships within the
international system. If intelligence is seen as a tool
to gain power or security, this transition has resulted
in a strong need from countries to make alliances in
order to overcome and successfully respond to existing or1 Adam Svendsen, ‘Connecting Intelligence and Theory: IntelligenceLiaison and International Relations’, in Intelligence and National Security,2009, Vol. 24, Nr. 5, p. 700.2 Wyn Rees, ‘Securing the Homelands: Transatlantic Cooperation afterBush’, in The British Journal of Politics and International Relations, 2009, Vol. 11,Nr. 1, pp. 109-110.
emerging threats. This need for global intelligence
liaison can be observed by looking at western societies’
policies, discussions, and actions against particular
terrorist groups such as ISIS or Al-Qaeda. Nevertheless,
while assessing the cases of international intelligence
cooperation, it can be observed that the historical
records are mostly focused on western countries such as
United Kingdom, United States, or New Zealand.3 It is for
this reason that global intelligence liaison is a new
phenomenon; while, its implications, these days, are
global. Despite its increasing importance, intelligence
liaison has demonstrated itself to be a non-static
phenomenon. The reason is that in different periods of
time the idea of international intelligence liaison was
either embraced or neglected by actors. Nevertheless, in
the current context the advantages and the disadvantages
of international intelligence cooperation are more
diverse than they used to be last century. As a result,
the essay will have the following structure. First, the
essay will illustrate the advantages of global
intelligence liaison. Additionally, the effects of the
privatisation of intelligence, the new campaign against
terrorism, and global SIGINT cooperation will be
discussed. Secondly, the essay will examine the
disadvantages of the global intelligence liaison. In
addition, the risks caused by different domestic
legislation regarding the liaison material, different
3 Richard J. Aldrich, ‘Transatlantic Intelligence and SecurityCooperation’, in International Affairs, 2004, Vol. 80, Nr. 4, p. 751.
perspectives on threats, and different positions of the
actors towards accountability and transparency will be
addressed. In the end, the essay will conclude that
global intelligence liaison can be achieved by working
with secret agencies, where opportunities should not be
wasted and where the risks from the persisting dangers
must be significantly diminished.
The benefits of international intelligence cooperation
One reason for intelligence cooperation is that
there is always more information potentially available in
the world than any agency can collect by itself.4 Similar
to this idea, not all the states are using the same
collection tools for gathering intelligence material. It
is commonly known that the western states tend to rely on
SIGINT, while those states without the necessary
resources have chosen to focus only on HUMINT (Human
Intelligence). For example, the 9/11 Commission has
stated that: ‘USA [a priori the invasion of Iraq 2003] has
inclined to rely mainly on IMINT and SIGINT; while HUMINT
was significantly neglected.’5 Therefore, by working with
partners the intelligence material collected will be
increased, while the techniques employed will vary and
will more efficiently be used. The advantage of this
4 Michael Herman, Intelligence Power In Peace and War, Cambridge: CambridgeUniversity Press, 1996, p. 204.5 The 9/11 Commission Report, pp. 334-336, vide http://www.9-11commission.gov/report/911Report. pdf [Accessed on 21th February2015].
intelligence cooperation is that belligerents will fill
the void. As Bill Duff has argued during a class lecture
at Salford University: ‘Nowadays, in a globalized world,
local expertise has become one of the most important
components in producing the accurate intelligence product
for dissemination.’6 Focusing on USA, it is not enough for
its intelligence services to have the most advanced high-
tech equipment as an information source; they also have
to take into consideration that information, which could
not have been collected without HUMINT.
Sharing intelligence as information between liaison
partners reduces fog of the war7 and decides the outcome of a
battle. In other words, the advantage of international
intelligence liaison, for example during a military
confrontation, is that the actors involved can exchange
information, assessments, and products for understanding
and responding more efficiently against a particular
threat. The relevance of this mentioned advantage is that
the intelligence support received can place,
strategically speaking, the receiver actor in a better
position during a confrontation or a war. Take as an
example, the value of the intelligence shared between the
USA and UK during the Second World War. In fact, Allies
won the war because of the value of ULTRA, which had
played a significant role in sustaining Allied shipping
and impeding the transportation of Axis supplies across6 Bill Duff, ‘Avoiding the void’, Class lecture, at SalfordUniversity, Greater Manchester, 9th February 2015. 7 Gregory Elder, ‘Intelligence in War: It Can Be Decisive’, in Studies in Intelligence, 2007, Vol. 50, Nr. 2, p. 24.
the Mediterranean.8 Moreover, through ULTRA, UK and USA
were aware both of their own position, and of the
adversary’s interpretation of it. This knowledge,
compared to Axis states’ partial understanding, provided
the Allied forces with the opportunity to reroute their
naval armies and to preserve their lines of support to
their troops in North Africa.9 As these events have
demonstrated, international intelligence cooperation can
help the actors involved to understand and more
efficiently manage their troops and resources in
responding to a specific threat or enemy, as the Axis
Powers did for the Allied forces.
The resources available for the intelligence
services are limited and sometimes insufficient. As
Stéphane Lefebvre has stated in his article ‘no
intelligence service has all the resources - financial,
human, and technical - to be entirely self sufficient in
all areas.’10 Therefore, working with partners on similar
matters, the resources will be increased, while
simultaneously the intelligence coverage of the globe
will be expanded. A public declaration of the former head
of MI6 (Secret Intelligence Service) Sir John Sawers
highlighted the importance that sharing intelligence can
have, these days, within the realm of cyber-security.
8 Maria Robson, ‘Signals in the sea: the value of Ultra intelligencein the Mediterranean in World War II’, in Journal of Intelligence History,2014, Vol. 13, Nr. 2, p. 178.9 Ibidem, p. 179.10 Stéphane Lefebvre, ‘The Difficulties and Dilemmas of InternationalIntelligence Cooperation’, in International Journal of Intelligence andCounterIntelligence, 2nd February 2015, Vol. 16, Nr. 4, pp. 536-537.
Sawers emphasised one of the advantages of intelligence
liaison by declaring that: ‘Cooperation in technology and
in communications are vastly advantageous to our
economies and to our way of life and to family
cohesion.’11 It is for this reason that global
intelligence cooperation is the main imperative for
assuring security, protection, and integrity.
The advantage of intelligence liaison collaboration
is that actors involved can receive intelligence support
through which the receiver partner can identify its
organizational deficiencies and better manage its
activities. This collaboration form is similar to the
idea of sharing information, but in this case the liaison
is characterised by a dominant-subordinate pattern in
which the receiver partner is more dependent on the donor
than vice-versa.12 For example, this type of liaison was
obvious during the 1940s, when Britain offered
intelligence to America’s intelligence services with the
aim of what H. Bradford Westerfield entitled “the pre-
Pearl Harbor covert propaganda collaboration between MI6-
CIA and MI5-FBI.”13 The advantage of this support was also
11 Sir John Sawers apud ‘Ex-MI6 chief Sir John Sawers: We cannot stopterrorism unless we spy on innocent people’ in The Telegraph, 20th
January 2015, vide http://www.telegraph.co.uk/news/uknews /terrorism-in-the-uk/11356645/Ex-MI6-chief-Sir-John-Sawers-We-cannot-stop-terrorism-unless-we-spy-on-innocent-people.html [Accessed on 21th
February 2015]. 12 Jennifer E. Sims, ‘Foreign Intelligence Liaison: Devils, Deals, andDetails’, in International Journal of Intelligence and CounterIntelligence, Vol. 19,Nr. 6, pp. 197-198.13 H. Bradford Westerfield, ‘America and the world of intelligenceliaison’, in Intelligence and National Security, 1996, Vol. 11, Nr. 3, pp.532-534.
obvious through W. Churchill’s letter, in 1942, when he
advised President Roosevelt about the weaknesses of
America’s diplomatic codes that must urgently be
improved. As Churchill wrote: ‘From the moment when we
became allies […] the danger of our enemies having
achieved a measure of success cannot […] be [admitted].’14
In today’s context this information support has two
advantages, similar to what the example outlined has
indicated. First, the intelligence provided from another
agency, in this case United Kingdom’s agencies, helps the
partner agency, America, to better understand the
realities and organize a successful operation. In other
words, the relevance of this advantage is that America
can receive insight of an event that otherwise could have
been misinterpreted.15 Secondly, through this support the
receiver partner manages to identify its deficiencies in
order to undertake policies of improving the services of
its intelligence agencies. As professor Damon Wells has
argued: ‘[…] the USA-UK intelligence liaison is the main
reason why the Americans were appreciative, lastingly so,
and to a remarkable degree.’16
14 Stephen Budiansky, ‘The Difficult Beginnings of US-British Codebreaking Co-operation’, in David Stafford & Rhodri Jeffreys-Jones(eds.), American-British-Canadian Intelligence Relations 1939-2000, London: FRANKCASS, 2000, pp. 52-53.15 Eric Rosenbach, ‘Intelligence and International Cooperation’, inConfrontation of Collaboration in Congress and the Intelligence Community, July 2009,pp. 50-53, vide http://belfercenter.ksg.harvard.edu/publication/19153/intelligence_and_international_cooperation.html [Accessed on 21st February 2015]. 16 Damon Wells apud Westerfield, op. cit., p. 534.
The benefit of international intelligence liaison is
that it reduces the costs for high-tech equipment needed
by the intelligence agencies. Nowadays, SIGINT (signals
intelligence) satellites and their ground processing
facilities are extremely costly, especially if a global
coverage is needed. These huge costs, around 1 billion
dollars apiece, are obvious as a result of Britain’s
attempts to design its own SIGINT satellite, known as
Zircon. But the cost of owning such a satellite by the
GCHQ (Government Communications Headquarters) is simply
unaffordable. 17 Therefore, the United Kingdom agreed to
contribute to USA satellite programmes through developing
different technological platforms, human capital, and
investments. As a consequence, this arrangement provided
the UK with time-share operational control over a global
SIGINT satellite capability. The negative aspect of this
arrangement for UK is that the American secret
intelligence will remain the decisive actors in
positioning, targeting, and collecting information
through USA’s satellites.18 This dependency on USA’s
satellite capabilities is obvious by examining other
European states’ SIGINT capabilities, such as France or
Germany. However, in the context of the war on terrorism,
the existing intelligence liaison agreement is of great
17 Maciej Osowski, ‘EU-US intelligence sharing post 9/11: predictionsfor the future’, in E-International Relations Students, 8th March 2011, videhttp://www.e-ir.info/2011/03/08/eu-us-intelligence-sharing-post-911-predictions-for-the-future/ [Accessed on 21st February 2015].18 Martin Rudner, ‘Hunters and Gatherers: The Intelligence CoalitionAgainst Islamic Terrorism’, in International Journal of Intelligence andCounterIntelligence, 17th August 2010, Vol. 17, Nr. 2, pp. 200-201.
value even for USA taking into consideration the
weaknesses outlined by the Silberman-Robb Reports (2005)
regarding USA’s performances in areas such as HUMINT a
priori the invasion of Iraq in 2003.19 Therefore, if the
answer to the terrorism as a threat is global
intelligence liaison; then, the collaboration between USA
and other states is a necessity. As former intelligence
director of MI5, Dame Stella Rimington, has stated: ‘[…]
in a world where the threats get more sophisticated and
more global, the intelligence task gets more difficult,
and cooperation between intelligence allies is vital.’20
International intelligence cooperation helps actors,
such as super powers, to be present everywhere across the
globe.21 Even those states, such as USA or UK, with
overwhelming intelligence machinery in terms of resources
and capabilities still need liaison partners and
intelligence cooperation. Geographically speaking, it is
hard for a super power such as USA or UK to be present in
all the regions of the globe. As professor Barry Buzan
has stated in his works: ‘In todays’ context, it is
impossible to talk about a hegemon [as USA has proved to
be] that can intervene everywhere and at anytime across
the globe. [More precisely,] the world nowadays is
composed of regions with specific actors [states] within
19 Silberman-Robb Reports (2005) apud Mark Phythian, ‘The PerfectIntelligence Failure? U.S. Pre-War Intelligence on Iraqi Weapons ofMass Destruction’, in Politics & Policy, 2006, Vol. 34, Nr. 2, pp. 406-410.20 Dame Stella Rimington, Open Secret: The Autobiography of the Former DirectorGeneral of MI5, London: Hutchinson, 2001, p. 205. 21 Michael Herman, op. cit., p. 207.
those regions that can influence the interactions,
events, or respectively the dynamics of a particular
region.’22 Shortly, according to Barry Buzan’s
perspective, global intelligence similar to global
security can only be formed through world cooperation.
This can be only achieved by working with other actors,
which are located in different regions of the globe. It
is for this reason that the number of intelligence-
security partnerships has recently increased dramatically
in the world. In this sense, there are multifarious
examples of intelligence cooperation such as the NATO
Special Committee, the Club of Berne, the CAZAB Club, the
Kilowatt Group, UK-USA Agreement, or the Egmont Group of
Financial Intelligence Units. As Stéphane Lefebvre has
illustrated in his article regarding the need of
intelligence liaison: ‘Most intelligence agencies have
recently accepted the idea that their needs, goals, and
aims can be only accomplished by relying on allied
intelligence services to fill the void.’23
In a globalized context, intelligence liaison is an
advantage because in this way belligerents involved can
more successfully conduct and undertake special or
counter-intelligence operations. Even if the idea of
intelligence liaison is not something new for the
intelligence literature24, its importance has been22 Barry Buzan & Ole Waever, Regions and Powers: The Structure of InternationalSecurity, London: Cambridge University Press, 2003, pp. 40-51.23 Lefebvre, op. cit., p. 533.24 There are examples of intelligence liaison from the early stages ofhuman history such as the moment illustrated in the Old Testamentwhen Moses sent spies to gather information about the land of Canaan;
highlighted especially as a result of the globalization
of terrorist activities. As former DCI R. James Woolsey
has famously argued: ‘We live now in a jungle filled with
a bewildering variety of poisonous snakes.’25 The
statement is important because of two reasons. First, it
reveals in an indirect manner that the threats nowadays
have a different nature, fluctuating from the traditional
threats specific before 9/11 to those emerging in today’s
context. Secondly, it outlines that the answer to these
emerging threats is influenced by the intensity of global
intelligence cooperation amongst belligerents. As EU’s
Counter-Terrorism Coordinator, Gilles de Kerchove, has
repeatedly emphasised: ‘The key to counter-terrorism is
the global [intelligence] liaison between actors.’26 In
essence, these ideas, outlined as a response against
terrorist groups, were materialised through the creation
of a multilateral intelligence cooperation named the
Alliance Base. As 2006 Pulitzer Prize winner Dana Priest
has stated: ‘the CIA has established joint operation
centres in more than two-dozen countries […], where the
or more recent moments such as the American Revolution, when theContinental Army used for-hire spy networks to supplement militaryreconnaissance and information gathering operations. Also, vide GlennJ. Voelz, ‘Contractors and Intelligence: The Private Sector in theIntelligence Community’, in International Journal of Intelligence andCounterIntelligence, 2009, Vol. 22, Nr. 4, pp. 586-589.25 James R. Woolsey apud Loch K. Johnson, ‘America’s IntelligenceLiaison with International Organisations’, in Ben de Jong, WiesPlatje, Robert David Steele (eds.), Peacekeeping Intelligence: EmergingConcepts for the Future, Virginia: OSS International Press, April 2003, p.363.26 Gilles de Kerchove apud Richard J. Aldrich, ‘Internationalintelligence cooperation in practice’, in Born, Hans, and Leigh, Ianand Wills, Aidan (eds.), International intelligence cooperation and accountability.Studies in Intelligence, New York: Routledge, 2011, p 18.
intelligence agencies involved work side by side for
identifying, tracking, and capturing or killing those
committed jihadists [who are willing to undertake
terrorist activities].’27 This strategy of global
intelligence liaison proved to be a great advantage for
the actors involved. As Zivanovic Katrina has illustrated
in her article ‘Global intelligence liaison is the best
strategy in fighting against terrorism.’28 Moreover, the
value of intelligence liaison was also strengthened by
the declaration of the CIA’s Deputy Director of
Operations in 2005: ‘Virtually every capture or killing
of a suspected terrorist outside Iraq since September,
11, 2001, attacks - more than 3,000 - was a result of
foreign services working alongside the agency.’29 It is
for this reason that global intelligence liaison is a
great advantage for all the actors involved.
The risks of international intelligence cooperation
The paramount disadvantage of intelligence liaison
is that actors involved are at the risk of being
penetrated by third parties. As expert Jennifer E. Sims
has argued: ‘The most important aspect for the actors
involved in intelligence liaison is security.’30 In other27 Dana Priest, ‘Foreign Network at Front of CIA's Terror Fight’, inWashington Post, 18 November 2005, p. A01, videhttp://www.pulitzer.org/archives/6957 [Acessed on 22th February 2015].28 Zivanovic Katrina, ‘International Cooperation of IntelligenceAgencies against Transnational Terroris Targets’, in The QuarterlyJournal, 2008, Vol. 8, Nr. 1, pp. 134-135.29 Priest, op. cit., p. A01. 30 Sims, op. cit., p. 197.
words, the actors involved are never sure about the
effectiveness of their counter-intelligence operations.
As Stéphane Lefebvre has argued in his writings ‘[…]
there is a ubiquitous fear among the participants that the
intelligence exchanged, or knowledge acquired, through
intelligence liaison can be compromised or passed on to a
third party without the originator’s consent.’31 There are
multifarious examples of penetration, but one of the most
important is the case of Kim Philby and Guy Burgess.32
Philby was a British Secret Intelligence Service (SIS)
officer who secretly worked as a mole for the KGB
(Committee for State Security); while, he was officially
serving as a liaison officer to the CIA (Central
Intelligence Agency). In essence, he used his knowledge
to derail a joint SIS-CIA infiltration operation in
Albania, thereby leading to the death of at least 300
individuals.33 As a consequence because CIA was
penetrated, Russia managed to accomplish its political
interests in Albania after World War II. However, the
Philby case is paramount because it illustrates one of
the disadvantages of international intelligence liaison,
and also, why actors are sceptical about sharing
intelligence.
31 Lefebvre, op. cit., p. 535.32 Stan A. Taylor & Daniel Snow, ‘Cold War Spies: Why they Spied andHow They Got Caught’, in Intelligence and National Security, April 1997, Vol.12, Nr. 2, pp. 105-110.33 Lefebvre, op. cit., pp. 535-536.
Moreover, H. Bradford Westerfield, an expert in
intelligence liaison, goes event further in explaining
another risk as a result of being penetrated:
“The risk is not just that one’s people who are
conducting the liaison may become vulnerable, and end
being recruited as ‘moles’. The other service can also
work through its liaison partner connections for extending
its information-collection goals but also for extending
its influence goals.”34
According to Bradford Westerfield, immediately after
an intelligence service is penetrated, there is a huge
possibility that the penetrated system is going to be
used as a tool for accomplishing the goals of the actor
who penetrated that agency. In other words, the
disadvantage is that the intelligence exchanged through a
liaison relationship can be used for unintended purposes,
while one of the actors manages to achieve his security
goals and political aims. ‘This was the case in June 1981
when Israel, the USA’s intelligence liaison partner,
attacked Iraq’s Osirak reactor, thanks to the SIGINT
(satellite imagery) obtained from the CIA.’35 It is for
this reason, of not being used as tool for accomplishing
partner’s goals, why actors are sceptical in sharing
critical intelligence information with its liaison
partners.
34 Westerfield, op. cit., p. 539.35 Lefebvre, op. cit., p. 536.
The disclosure policy of classified liaison material
can be a real risk for the partners involved in
international intelligence liaison. This risk appears
because of the differences between an actors’ domestic
legislation and legal intervention compared to those of
its liaison partners. For example,
“The Binyam Mohamed case is an evidence of UK’s
judicial policies concerning international intelligence’s
shared material, and demonstrates that the courts from UK
do not recognise the principle according to which liaison
material should not be disclosed without the producers’
consensus.”36
Therefore, if a state cannot provide a guarantee to
its liaison partners that sensitive material will not be
disclosed during different trials then the international
intelligence liaison is unlikely to exist. For example,
due to UK’s policies on public disclosure, foreign
partners, such as USA, will choose not to share sensitive
intelligence that could be important for its safety,
accountability, and security. This reluctance from USA
towards UK was emphasised in a letter from USA
authorities regarding UK-USA intelligence liaison. The
latter emphasised clearly the SUA position: ‘If it is
determined that your service is unable to protect
information […] because of your judicial system, we will
review with greatest care the sensitivity of information
36 Intelligence and Security Committee of Parliament, Annual Report2009-2010, 2010, pp. 17.
we can provide in the future.’37 Therefore, the Binyam
Mohamed case highlighted what risks an actor assumes when
it chooses to liaise with a partner that has a different
juridical system and policy towards the disclosure of
classified liaison material.
Another disadvantage for sharing information and
conducting collaborative analysis is the very real danger
of what Irving Janis has described as groupthink.38 Shortly,
groupthink is a mode of behaviour where individuals, in
this case states that are engaged, are more willing to
maintain the group’s cohesiveness than to consider
alternative perspectives. In this case, if the
intelligence disseminated by one of the intelligence
services is incorrect, then it will produce a domino
effect that will put in danger all the operations mounted
against a specific threat. This disadvantage of
international intelligence cooperation was acknowledged
after the invasion of Iraq in 2003. As former UNSCOM
weapons inspector David Kay has argued: “The US
intelligence was ‘dead wrong’ in almost every respect,
causing series of [intelligence] failures and mistakes in
motivating and planning the invasion of Iraq.”39 In
essence, the problem was that the other intelligence
services from Europe choose to rely on US’s intelligence
products, while neglecting their conclusions and
potential arguments against US’s intelligence products.37 Ibidem, p. 18.38 Irving L. Janis, Groupthink: Psychological Studies of Policy Decisions and Fiascoes,Second Edition, Boston: Houghton Mifflin Company, 1982, p. 9. 39 David Kay apud Phythian, op. cit., pp. 408-409.
It is for this reason that intelligence liaison is of
great risk, and a potential disadvantage for the actors
willing to engage in an international intelligence
partnership.
Organizational behaviour is another major reason for
why intelligence liaison is a great risk. As Talcott
Parson has argued: ‘organizations are social units (or
human groupings) deliberately constructed and
reconstructed to achieve specific aims.’40 According to
Parson’s definition the risk of sharing intelligence
appears under the following two forms: First of all,
organizations are comprised of individuals, each with
specific tasks and needs; secondly, the organizations
exist for a specific reason, without which the
organization would not have been created. This
organizational risk can be especially observed by
examining US’ intelligence community. For example, US’
intelligence community is composed of fifteen different
agencies. All these agencies have specific tasks and
mandates to accomplish them. But, when it comes to
categorizing these intelligence agencies, it can be seen
that some of these agencies have a double membership.
This is the case of the State Deparment’s Bureau of
Intelligence and Research (State/INR), which is
simultaneously a member of the intelligence community and
also a part of the overall Department of State.41 Its40 Talcott Parsons, Structure and Process in Modern Societies, Glencoe: The FreePress, 1960, p. 17.41 Major Andrew W. Green, Why the US Intelligence Community does not Shareinformation, A Research Report, Alabama: Maxwell Air Force Base, July
employees are bound by the rules and regulations of the
State Department. Therefore, if an external intelligence
agency is exchanging intelligence as information with the
Bureau of Intelligence and Research, then the possibility
of that information to be politicised is very high. In
the end, the receiver can become what Michael Herman has
named: ‘the foreign political tool of an actor [operating
from shadow].’42
As Jennifer E. Sims has argued in her article:
‘[Another disadvantage or risk] regarding intelligence
liaison is related to the transparency and accountability
from the actors involved.’43 This is the case of the
democratic states, which, based on democratic principles,
have to demonstrate high ethical standards and compliance
with human rights and human dignity. In this sense, the
issue is that some democratic states, such as USA, have
chosen to encourage unethical behaviour towards its
prisoners as a result of the privatisation of
intelligence44 and an immediate need for intelligence
material. The alleged abuse of prisoners by contract
interrogators at Abu Ghraib is the perfect example in
this sense.45 As a consequence, the recent accusations
against USA have raised discussions and issues concerning
the use of torture in interrogation. Moreover, these
unorthodox interrogation methods have led to rekindled
2005, p. 8, vide http://www.au.af.mil/au /awc/awcgate/saas/green.pdf[Accessed on 9th March 2015].42 Michael Herman, op. cit., p. 210.43 Sims, op. cit., p. 211.44 Voelz, op. cit., p. 586.45 Ibidem, p. 598.
debates about whether actors should refuse or not an
international intelligence liaison with these partners.
Therefore, as a reaction the UK, as an intelligence
actor, has stated clearly that its secret services will
not share intelligence with partners that cannot
guarantee a decent treatment for those people detained.46
It is for this reason that some international
intelligence liaison between actors can be impossible to
continue, as in the UK-USA case, or exist, as in the case
between potential future partners.
Conclusion
This essay has provided an insight into the
importance of international intelligence liaison in
today’s context. Apart from the mentioned facts that
explained why the intelligence liaison had been partly
neglected before 9/11, the recent events have shown that
global intelligence liaison has become a characteristic
of the current international system. As professor Adam
Svendsen has argued: ‘Liaison today represents the most
significant dimension of intelligence.’47 Moreover, as
Richard J. Aldrich has argued: “Intelligence cooperation
is the most important weapon in the struggle to contain
the ‘new’ terrorism, but its significance is even greater
than that.”48 However, as any intelligence activity, when46 Intelligence and Security Committee of Parliament, Annual Report2012-2013, 2013, pp. 15-18.47 Svendsen, op. cit., p. 700.48 Aldrich, op. cit., p. 754.
it comes to assessing the advantages and disadvantages,
international intelligence liaison is similar to a ‘coin’.
Consequently, actors willing to form a global
international intelligence have to manage the risk in
order for the advantages to be illustrative for their
activities. In other words, the majority of dangers or
disadvantages underlined within this essay can be
effectively managed by undertaking the appropriate
measures. In this sense, effective counter-intelligence
operations can be organised to counter the threats
emerging from any hostile intelligence agency; while the
impact of false or vague shared information can be
reduced by specialised analytical methods combined with
double-checking that piece of information received with
other reliable sources. Some risks can also constitute
opportunities, for example intelligence partnerships can
improve both the security and the services. In this
sense, USA’s intelligence services are the perfect
example. Additionally, using private contractors can also
be an advantage in achieving those aims that a democratic
state such as USA cannot achieve without protests towards
its actions or foreign policies. For actors, the key to
outweighing the disadvantages caused by international
intelligence liaison is by acting to achieve their
primary goals and managing to cope with the risks.
Bibliography
Books and Chapters in books:
1) Aldrich J. Richard, ‘International
intelligence cooperation in practice’, in
Born, Hans, and Leigh, Ian and Wills,
Aidan (eds.), International intelligence cooperation
and accountability. Studies in Intelligence, New York:
Routledge, 2011.
2) Budiansky Stephen, ‘The Difficult
Beginnings of US-British Code breaking Co-
operation’, in David Stafford & Rhodri
Jeffreys-Jones (eds.), American-British-
Canadian Intelligence Relations 1939-2000, London:
FRANK CASS, 2000.
3) Buzan Barry & Waever Ole, Regions and Powers:
The Structure of International Security, London:
Cambridge University Press, 2003.
4) Herman Michael, Intelligence Power In Peace and
War, Cambridge: Cambridge University
Press, 1996.
5) Janis L. Irving, Groupthink: Psychological Studies
of Policy Decisions and Fiascoes, Second Edition,
Boston: Houghton Mifflin Company, 1982.
6) Johnson K. Loch, ‘America’s Intelligence
Liaison with International Organisations’,
in Ben de Jong, Wies Platje, Robert David
Steele (eds.), Peacekeeping Intelligence: Emerging
Concepts for the Future, Virginia: OSS
International Press, April 2003.
7) Parsons Talcott, Structure and Process in Modern
Societies, Glencoe: The Free Press, 1960.
8) Rimington Dame Stella, Open Secret: The
Autobiography of the Former Director General of MI5,
London: Hutchinson, 2001.
Articles:
1) Aldrich J. Richard, ‘Transatlantic
Intelligence and Security Cooperation’, in
International Affairs, 2004, Vol. 80, Nr. 4.
2) Elder Gregory, ‘Intelligence in War: It
Can Be Decisive’, in Studies in Intelligence,
2007, Vol. 50, Nr. 2.
3) Katrina Zivanovic, ‘International
Cooperation of Intelligence Agencies
against Transnational Terroris Targets’,
in The Quarterly Journal, 2008, Vol. 8, Nr. 1.
4) Lefebvre Stéphane, ‘The Difficulties and
Dilemmas of International Intelligence
Cooperation’, in International Journal of
Intelligence and CounterIntelligence, 2nd February
2015, Vol. 16, Nr. 4.
5) Phythian Mark, ‘The Perfect Intelligence
Failure? U.S. Pre-War Intelligence on
Iraqi Weapons of Mass Destruction’, in
Politics & Policy, 2006, Vol. 34, Nr. 2.
6) Robson Maria, ‘Signals in the sea: the
value of Ultra intelligence in the
Mediterranean in World War II’, in Journal of
Intelligence History, 2014, Vol. 13, Nr. 2.
7) Rees Wyn, ‘Securing the Homelands:
Transatlantic Cooperation after Bush’, in
The British Journal of Politics and International
Relations, 2009, Vol. 11, Nr. 1.
8) Rudner Martin, ‘Hunters and Gatherers: The
Intelligence Coalition Against Islamic
Terrorism’, in International Journal of Intelligence
and CounterIntelligence, 17th August 2010, 17th
August 2010, Vol. 17, Nr. 2.
9) Sims Jennifer E., ‘Foreign Intelligence
Liaison: Devils. Deals, and Details’, in
International Journal of Intelligence and
CounterIntelligence, 2006, Vol. 19, Nr. 2.
10) Svendsen Adam, ‘Connecting
Intelligence and Theory: Intelligence
Liaison and International Relations’, in
Intelligence and National Security, 2009, Vol. 24,
Nr. 5.
11) Taylor A. Stan & Snow Daniel, ‘Cold
War Spies: Why they Spied and How They Got
Caught’, in Intelligence and National Security,
April 1997, Vol. 12, Nr. 2.
12) Voelz J. Glenn, ‘Contractors and
Intelligence: The Private Sector in the
Intelligence Community’, in International
Journal of Intelligence and CounterIntelligence, 2009,
Vol. 22, Nr. 4.
13) Westerfield H. Bradford, ‘America and
the world of intelligence liaison’, in
Intelligence and National Security, 1996, Vol. 11,
Nr. 3.
Sources accessed online:
1) ***, ‘Ex-MI6 chief Sir John Sawers: We
cannot stop terrorism unless we spy on
innocent people’ in The Telegraph, 20th
January 2015, vide
http://www.telegraph.co.uk/news/uknews
/terrorism-in-the-uk/11356645/Ex-MI6-
chief-Sir-John-Sawers-We-cannot-stop-
terrorism-unless-we-spy-on-innocent-
people.html [Accessed on 21th February
2015].
2) Major Green Andrew W., Why the US Intelligence
Community does not Share information, A Research
Report, Alabama: Maxwell Air Force Base,
July 2005, p. 8, vide
http://www.au.af.mil/au
/awc/awcgate/saas/green.pdf [Accessed on
9th March 2015].
3) Osowski Maciej, ‘EU-US intelligence
sharing post 9/11: predictions for the
future’, in E-International Relations Students, 8th
March 2011, vide
http://www.e-ir.info/2011/03/08/eu-us-
intelligence-sharing-post-911-predictions-
for-the-future/ [Accessed on 21st February
2015].
4) Priest Dana, ‘Foreign Network at Front of
CIA's Terror Fight’, in Washington Post, 18
November 2005, p. A01, vide
http://www.pulitzer.org/archives/6957
[Acessed on 22th February 2015].
5) Rosenbach Eric, ‘Intelligence and
International Cooperation’, in Confrontation
of Collaboration in Congress and the Intelligence
Community, July 2009, vide
http://belfercenter.ksg.harvard
.edu/publication/19153/intelligence_and_in
ternational_cooperation.html [Accessed on
21st February 2015].
6) The 9/11 Commission Report, vide
http://www.9-11commission.gov/repo
rt/911Report. pdf [Accessed on 21th
February 2015].
Class lecture:
1) Bill Duff, ‘Avoiding the void’, Class
lecture, at Salford University, Greater
Manchester, 9th February 2015.
Official annual reports made by the ISC (Intelligence and
Security Committee):
1) Intelligence and Security Committee of
Parliament, Annual Report 2009-2010,
2010.