2,678
Views
2
CrossRef citations to date
0
Altmetric
ARTICLES

Failing Intelligence: U.S. Intelligence in the Age of Transnational Threats

Pages 195-220 | Published online: 12 Mar 2009

REFERENCES

  • Abdel Bari Atwan , The Secret History of Al-Qa'ida ( London : Abacus , 2007 ), pp. 200 – 201 .
  • George J. Tenet , At the Center of the Storm: My Years at the CIA ( London : Harper Press , 2007 ), p. 248 ; Karen J. Greenberg , ed., Al Qaeda Now: Understanding Today's Terrorists ( Cambridge , UK : Cambridge University Press , 2005 ), p. 227 .
  • Monte and Princess Palmer , At the Heart of Terror: Jihadists and America's War on Terror ( Lanham , MD : Rowman & Littlefield , 2004 ), pp. 127 – 148 .
  • National Commission on Terrorist Attacks Upon the United States , The 9/11 Commission Report ( New York : W.W. Norton , 2004 ), pp. 361–363, 399 .
  • National Security Strategy of the United States of America, September 2002, p. 16, available at http://www.whitehouse.gov/nsc/nss.pdf
  • Peter Calvocoressi , Top Secret Ultra ( London : Sphere Books , 1981 ), p. 3 .
  • Quoted in Christopher Andrew , For the President's Eyes Only: Secret Intelligence and the American Presidency from Washington to Bush ( London : HarperCollins , 1995 ), pp. 142 – 143 .
  • David Kahn , “Codebreaking in World Wars I and II: The Major Successes and Failures,” in Christopher Andrew and David Dilks , eds., The Missing Dimension: Governments and Intelligence Communities in the Twentieth Century ( London : Macmillan , 1984 ), pp. 138 – 158 .
  • See Bradley F. Smith , The Ultra-Magic Deals and the Most Secret Special Relationship, 1940–1946 ( Novato , CA : Presidio Press , 1993 ).
  • F. Harry Hinsley , “British Intelligence in the Second World War,” in Christopher Andrew and Jeremy Noakes , eds., Intelligence and International Relations, 1900–1945 ( Exeter , UK : University of Exeter , 1987 ), pp. 209 – 218 .
  • F. Harry Hinsley , “The Influence of Ultra in the Second World War,” in F. H. Hinsley and Alan Stripp , eds., Codebreakers: The Inside Story of Bletchley Park ( Oxford : Oxford University Press , 1993 ), pp. 1 – 13 ; John Ferris, “The Road to Bletchley Park: The British Experience with Signals Intelligence, 1892–1945,” Intelligence and National Security, Vol. 17, No. 1, 2002, pp. 53–84 .
  • Peter Calvocoressi , Top Secret Ultra , pp. 127 – 129 .
  • Ralph Bennett , Behind the Battle: Intelligence in the War with Germany, 1939–1945 ( London : Pimlico , 1999 ), pp. xxiii – xxv ; Ralph Bennett, Ultra in the West: The Normandy Campaign, 1944–1945 (London: Hutchinson, 1979), pp. 36–38 .
  • Loch K. Johnson , Secret Agencies: US Intelligence in a Hostile World ( New Haven , CT : Yale University Press , 1996 ), pp. 176 – 177 .
  • Ibid .
  • See Jeffrey T. Richelson , America's Space Sentinels: DSP Satellites and National Security ( Lawrence , KS : University Press of Kansas , 1999 ).
  • Christopher Andrew , For the President's Eyes Only , p. 539 ; Loch K. Johnson , Secret Agencies , p. 182 .
  • See David Holloway , Stalin and the Bomb ( New Haven , CT : Yale University Press , 1994 ).
  • Loch K. Johnson , Secret Agencies , pp. 174 – 183 .
  • See Kevin C. Ruffner , ed., CORONA: America's First Satellite Program ( Washington , DC : Center for the Study of Intelligence , 1995 ).
  • Herbert Scoville , “Verification of Soviet Strategic Missile Tests,” in William C. Potter , ed., Verification and SALT: The Challenge of Strategic Deception ( Boulder , CO : Westview Press , 1981 ), p. 163 .
  • The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction, Report to the President of the United States, 31 March 2005, available at http://www.wmd.gov/report/, Overview, p. 4 (henceforth WMD Report) .
  • Richard A. Clarke , Against All Enemies: Inside America's War on Terror (New York : Free Press , 2004), p. 156.
  • See Paul Maddrell , Spying on Science: Western Intelligence in Divided Germany, 1945–1961 ( Oxford : Oxford University Press , 2006 ).
  • WMD Report, Overview, pp. 5, 15–16 .
  • Hans Blix , Disarming Iraq: The Search for Weapons of Mass Destruction ( London : Bloomsbury , 2004 ), pp. 18 – 19 .
  • WMD Report, Overview, p. 16; Report to the House of Commons of the Butler Committee of Privy Counsellors , Review of Intelligence on Weapons of Mass Destruction ( London : Stationery Office , 2004 ), p. 53 .
  • WMD Report, Overview , p. 521 .
  • George Tenet , At the Center of the Storm , pp. 261 – 268 .
  • Ibid. , pp. 268 , 281 – 287 .
  • Richard A. Clarke , Against All Enemies , pp. 158 – 160 .
  • Patrick Radden Keefe , Chatter: Dispatches from the Secret World ( New York : Random House , 2005 ), p. 211 .
  • Jeffrey T. Richelson , Spying on the Bomb: American Nuclear Intelligence from Nazi Germany to Iran and North Korea ( New York : W. W. Norton , 2006 ), p. 539 .
  • Jeffrey T. Richelson , The US Intelligence Community , 5th ( Boulder , CO : Westview Press , 2008 , edition), p. 296 .
  • Oleg Bukharin , “US Atomic Energy Intelligence against the Soviet Target, 1945–1970,” Intelligence and National Security , Vol. 19 , No. 4, 2004 , p. 675 .
  • See Khidhir Hamza , Saddam's Bombmaker: The Terrifying Inside Story of the Iraqi Nuclear and Biological Weapons Agenda ( New York : Touchstone , 2000 ).
  • Richard L. Russell , “A Weak Pillar for American National Security: The CIA's Dismal Performance against WMD Threats,” Intelligence and National Security , Vol. 20 , No. 3 , 2005 , pp. 466 – 473 . See also Jeffrey T. Richelson, Spying on the Bomb, pp. 527–544 .
  • WMD Report, Overview, p. 9 .
  • WMD Report, p. 4. See also Overview, p. 15 .
  • WMD Report, Overview, pp. 11–12 .
  • Oleg Bukharin, “US Atomic Energy Intelligence against the Soviet Target, 1945–1970,” pp. 666–667, 674–676 .
  • See Jeffrey T. Richelson , “MASINT: The New Kid in Town,” International Journal of Intelligence and CounterIntelligence , Vol. 14 , No. 1, Spring 2001 , pp. 149 – 192 .
  • 9/11 Commission Report, p. 365 .
  • David Charters , “Counterterrorism Intelligence: Sources, Methods, Process, and Problems,” in David Charters , ed., Democratic Responses to International Terrorism ( Ardsley-on-Hudson , NY : Transnational Publishers , 1991 ), pp. 228 – 234 .
  • Parliamentary Intelligence and Security Committee, Report into the London Terrorist Attacks on 7 July 2005 (London : Stationery Office , 2006).
  • Christopher Andrew , For the President's Eyes Only , pp. 482 – 484 .
  • See Michael York Dartnell , Action Directe: Ultra-Left Terrorism in France, 1979–1987 (London: Frank Cass, 1995); Jeremy Varon, Bringing the War Home: The Weather Underground, the Red Army Faction, and Revolutionary Violence in the Sixties and Seventies (Berkeley, CA: University of California Press, 2004) .
  • See Mark L. Urban , Big Boys' Rules: The Secret Struggle Against the IRA (London: Faber & Faber, 1992); Martin Ingram and Greg Harkin, Stakeknife: Britain's Secret Agents in Ireland (Dublin: The O'Brien Press, 2004) .
  • Anonymous [Michael Scheuer], Imperial Hubris: Why The West Is Losing the War on Terror (Washington, DC: Brassey's, 2004), p. 246 .
  • Frank Kitson , Low Intensity Operations: Subversion, Insurgency and Peacekeeping (London: Faber & Faber, 1971), p. 95 .
  • Anonymous [Michael Scheuer], Imperial Hubris, pp. 66–71 .
  • Ibid., p. 252; “Foreign Network at Front of CIA's Terror Fight,” The Washington Post, 18 November 2005 .
  • James Risen , State of War: The Secret History of the CIA and the Bush Administration ( London : Free Press , 2006 ), p. 170 .
  • Declassified Key Judgments of the National Intelligence Estimate “Trends in Global Terrorism: Implications for the United States,” dated April 2006, available at: http://www.dni.gov/press_releases/Declassified_NIE_Key_Judgments.pdf
  • 9/11 Commission Report , p. 88 ; Jarret M. Brachman , “High-Tech Terror: Al-Qaeda's Use of New Technology,” The Fletcher Forum of World Affairs , Vol. 30 , No. 2, 2006 , pp. 149 – 164 .
  • National Intelligence Council (NIC), Mapping the Global Future: Report of the National Intelligence Council's 2020 Project, http://www.cia.gov/nic/NIC_globaltrend2020.html, “Transmuting International Terrorism.” National Intelligence Council (NIC), Mapping the Global Future: Report of the National Intelligence Council's 2020 Project, http://www.cia.gov/nic/NIC_globaltrend2020.html, “Transmuting International Terrorism.”
  • Martin Rudner, “Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism,” International Journal of Intelligence and CounterIntelligence , Vol. 17 , No. 2, Summer 2004 , p. 194 .
  • Ibid ., pp. 208 – 211 .
  • Address to the Nation, 20 March 2003, available at http://www.pm.gov.au/news/speeches/speech79.html
  • Martin Rudner , “Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism,” p. 214 .
  • “Foreign Network at Front of CIA's Terror Fight,” The Washington Post, 18 November 2005; Jeffrey T. Richelson, The US Intelligence Community, p. 349 .
  • George Tenet , At the Center of the Storm , pp. 159 – 160 .
  • Ibid ., pp. 272 – 276 .
  • Martin Rudner , “Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism,” p. 217 .
  • Richard A. Clarke , Against All Enemies , p. 284.
  • George Tenet , At the Center of the Storm , p. 244 .
  • “Foreign Network at Front of CIA's Terror Fight,” The Washington Post .
  • Bob Woodward , Bush At War: Inside the Bush White House ( New York : Simon & Schuster , 2002 ), p. 162 .
  • Richard A. Clarke , Against All Enemies , pp. 185 – 190 ; George Tenet , At the Center of the Storm , pp. 139–142 , 179–181 .
  • “Bush Secret Order to Send Special Forces into Pakistan,” The Guardian, 12 September 2008, p. 1 .
  • James Risen , State of War , pp. 169 – 171 .
  • David Albright and Holly Higgins, “A Bomb for the Ummah,” Bulletin of the Atomic Scientists , Vol. 59 , No. 2, March–April 2003 , pp. 49 – 55 ; Richard A. Clarke , Against All Enemies , pp. 279 – 280 ; WMD Report , p. 519 . See also Gordon Corera , Shopping for Bombs: Nuclear Proliferation, Global Insecurity and the Rise and Fall of the A. Q. Khan Network ( London : Hurst & Co. , 2006 ).
  • Richard L. Russell , “A Weak Pillar for American National Security,” pp. 470 – 471 .
  • James Risen , State of War , pp. 173 – 177 .
  • Richard A. Clarke , Against All Enemies , pp. 112–118 , 153, 281 – 283 .
  • James Risen , State of War , pp. 175 – 191 .
  • George Tenet , At the Center of the Storm , pp. 229–230 , 249 – 250 .
  • Anonymous [Michael Scheuer] , Imperial Hubris , pp. 187 – 188 .
  • David Charters , Democratic Responses to International Terrorism , pp. 236 – 240 .
  • George Tenet , At the Center of the Storm , p. 256 .
  • James Risen , State of War , pp. 20 – 22 .
  • Bob Woodward , Bush At War , p. 303 ; see also Anonymous [Michael Scheuer] , Imperial Hubris , pp. 192–199 . Hence the U.S. government's decision to order the NSA to intercept electronic communications within the United States. It is here trying to eliminate a technological sanctuary for terrorists: see James Risen , State of War , pp. 43 – 60 .
  • Bob Woodward , Bush At War , pp. 4 – 26 .
  • Ibid ., p. 27 .
  • Matthew Aid , “The Time of Troubles: The US National Security Agency in the Twenty-first Century,” Intelligence and National Security , Vol. 15 , No. 3, 2000 , pp. 9 – 24 .
  • Richard A. Clarke , Against All Enemies , pp. 199 – 200 ; Bob Woodward , Bush At War , p. 26 .
  • George Tenet , At the Center of the Storm , pp. 250 – 257 .
  • Richard A. Clarke , Against All Enemies , pp. 198 – 202 .
  • On these efforts, see Richard Posner , Uncertain Shield: The US Intelligence System in the Throes of Reform ( Lanham , MD : Rowman & Littlefield , 2006 ), pp. 55 – 86 .
  • Anonymous [Michael Scheuer] , Imperial Hubris , p. 169 .
  • Gregory Treverton , Analytic Challenges Posed by Terrorism and Other Transnational Issues (Workshop, 2003) (Santa Monica, CA: RAND, 2005), pp. 5, 12–13.
  • 9/11 Commission Report , pp. 346 – 348 ; John Miller , Michael Stone , with Chris Mitchell , The Cell: Inside the 9/11 Plot, and Why the FBI and CIA Failed to Stop It ( New York : Hyperion , 2002 ), pp. 287 – 289 .
  • George Tenet , At the Center of the Storm , p. 232 .
  • WMD Report , Overview , p. 521 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.