6,345
Views
6
CrossRef citations to date
0
Altmetric
ARTICLES

The Professional Ethics of Intelligence Analysis

Pages 22-43 | Published online: 04 Dec 2010

REFERENCES

  • Deborah G. Barger , Toward a Revolution in Intelligence Affairs ( Santa Monica , CA : RAND , 2005 ); and William J. Lahneman, “Is a Revolution in Intelligence Affairs Occurring?,” International Journal of Intelligence and CounterIntelligence, Vol. 20, No. 1, Spring 2007, pp. 1–17 .
  • Bruce Berkowitz , “Failing to Keep Up with the Information Revolution,” Studies in Intelligence, 2003, at http://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol47no1/article07.html (accessed 2 April 2010) .
  • Arthur S. Hulnick , Keeping Us Safe: Secret Intelligence and Homeland Security ( Westport , CT : Praeger , 2004 ); Arthur S. Hulnick, “What's Wrong with the Intelligence Cycle,” Intelligence and National Security, Vol. 21, No. 6, December 2006, pp. 959–979; Michael A. Turner, Why Secret Intelligence Fails (Dulles, VA: Potomac Books, 2005) .
  • Carmen A. Medina , “What to Do When Traditional Models Fail?,” Studies in Intelligence, at 2002, http://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol46no3/article03.html (accessed 17 February 2010); Robert M. Clark, Intelligence Analysis: A Target-Centric Approach (Washington, DC: Congressional Quarterly Press, 2003).
  • John W. Bodnar , Warning Analysis for the Information Age: Rethinking the Intelligence Process ( Washington , DC : Joint Military Intelligence College, Center for Strategic Intelligence Research , 2003 ); Richard L. Russell, “Competitive Analysis: Techniques for Better Gauging Enemy Political Intentions and Military Capabilities,” in Loch K. Johnson, ed., The Oxford Handbook of National Security Intelligence (New York: Oxford University Press, 2010), pp. 375–388 .
  • Rob Johnston , Analytical Culture in the U.S. Intelligence Community ( Washington , DC : Central Intelligence Agency, Center for the Study of Intelligence , 2005 ).
  • Uri Bar-Joseph and Rose McDermott, “Change the Analyst and Not the System: A Different Approach to Intelligence Reforms,” Foreign Policy Analysis, Vol. 4, No. 2, April 2008, pp. 26–44; Shane Harris, “Beautiful Minds,” Government Executive, Vol. 35, No. 13, 2003, pp. 21–34; Richards J. Heuer, “Limits of Intelligence Analysis,” Orbis, Vol. 49, No. 1, Winter 2004, pp. 75–94.
  • Karen J. Greenberg and Joshua L. Dratel , The Torture Papers: The Road to Abu Ghraib ( New York : Cambridge University Press , 2005 ); Jane Mayer , The Dark Side: The Inside Story of How The War on Terror Turned into a War on American Ideals ( New York : Doubleday , 2008 ).
  • Alan M. Dershowitz , Why Terrorism Works: Understanding the Threat, Responding to the Challenge ( New Haven , CT : Yale University Press , 2003 ); Alan M. Dershowitz, “Tortured Reasoning,” in Stanford Levinson, ed., Torture: A Collection (New York: Oxford University Press, 2006), pp. 257–280 .
  • James M. Olson , Fair Play: The Moral Dilemmas of Spying ( Dulles , VA : Potomac Books , 2006 ).
  • Jan Goldman , ed., Ethics of Spying: A Reader for the Intelligence Professional ( Lanham , MD : Scarecrow Press , 2009 ).
  • Hans Born and Ian Leigh , Making Intelligence Accountable: Legal Standards and Best Practice for Oversight of Intelligence Agencies ( Oslo : House of the Parliament of Norway , 2005 ).
  • Michael Herman , Intelligence Power in Peace and War ( Cambridge : Cambridge University Press , 1996 ), p. 376 .
  • Roberta Wohlstetter , Pearl Harbor: Warning and Decision ( Stanford , CA : Stanford University Press , 1962 ), p. 382 .
  • See, for example, Edwin T. Layton, “And I was There”: Pearl Harbor and Midway—Breaking the Secrets (New York: William Morrow, 1985); Gordon W. Prange, with Donald M. Goldstein and Katherine V. Dillon, Pearl Harbor: The Verdict of History (New York: Penguin, 1991) .
  • David Kahn , “The Intelligence Failure of Pearl Harbor,” Foreign Affairs , Vol. 70 , No. 5 , Winter 1991–1992 , pp. 138 – 152 , at 147–148 .
  • Barton Whaley , Codeword Barbarossa ( Cambridge , MA : MIT Press , 1973 ); Gabriel Gorodetsky, Grand Delusion: Stalin and the German Invasion of Russia (New Haven, CT: Yale University Press, 1999); David E. Murphy, What Stalin Knew: The Enigma of Barbarossa (New Haven, CT: Yale University Press, 2005); Uri Bar-Joseph and Jack S. Levy, “Conscious Action and the Study of Intelligence Failure,” Political Science Quarterly, Vol. 124, No. 3, Summer 2009, pp. 461–488.
  • Christopher Andrew and Vasili Mitrokhin , The Sword and the Shield: The Mitrokhin Archive and the Secret History of the KGB ( New York : Basic Books , 2000 ), p. 94 .
  • David Halberstam , The Coldest Winter: America and the Korean War ( New York : Hyperion , 2007 ), pp. 373–382, 432 .
  • Uri Bar-Joseph , The Watchman Fell Asleep: The Surprise of Yom Kippur and Its Sources ( New York : SUNY Press , 2005 ), p. 170 .
  • Robert Jervis , Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War ( Ithaca , NY : Cornell University Press , 2010 ).
  • Douglass MacEachin , “Predicting the Soviet Invasion of Afghanistan: The Intelligence Community's Record,” Center for the Studies in Intelligence Publications, March 2003, at http://www.cia.gov/csi/monograph/afghanistan/index.html
  • Melvin A. Goodman , Failure of Intelligence: The Decline and the Fall of the CIA ( Lanham , MD : Rowman and Littlefield , 2008 ).
  • Michael R. Gordon and Bernard E. Trainor , The Generals' War: The Inside Story of the Conflict in the Gulf ( New York : Little, Brown , 1995 ); Richard L. Russell, “CIA's Strategic Analysis in Iraq,” Political Science Quarterly, Vol. 117, No. 2, Summer 2002, pp. 191–207 .
  • Jeffrey T. Richelson , U.S. Intelligence and the Indian Bomb, National Security Archive Electronic Briefing Book No. 187; Document 36, Office of Near Eastern, South Asian, and African Analysis, Central Intelligence Agency. “India: BJP Flexing Muscles, But How Far Will It Go?,” 29 May 1998, at http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB187/index.htm#doc36 (accessed 2 March 2010).
  • The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States ( New York : W.W. Norton , 2004 ).
  • Scott Ritter , Iraq Confidential: The Untold Story of the Intelligence Conspiracy to Undermine the UN and Overthrow Saddam Hussein ( New York : Nation Books , 2006 ), p. viii .
  • Central Intelligence Agency , Declassified—Key Judgments from October 2002 National Intelligence Estimate. Iraq's Continuing Programs for Weapons of Mass Destruction , 18 July 2003 .
  • Uri Bar-Joseph and Arie W. Kruglanski , “Intelligence Failure and the Need for Cognitive Closure: On the Psychology of the Yom Kippur Surprise,” Political Psychology, Vol. 24, No. 1, March 2003, pp. 75–99; Uri Bar-Joseph and Rose McDermott, “Change the Analyst and Not the System.”
  • Richard K. Betts , “Fixing Intelligence,” Foreign Affairs , Vol. 81 , No. 1 , Winter 2002 , pp. 43 – 59 , at p. 59 .
  • Charles Lord , Lee Ross , and Mark Lepper , “Biased Assimilation and Attitude Polarization: The Effect of Prior Theories on Subsequently Considered Evidence,” Journal of Personality and Social Psychology , Vol. 37 , No. 11 , 1979 , pp. 2098 – 2109 .
  • Daniel Kahneman , Paul Slovic , and Amos Tversky , Judgment Under Uncertainty: Heuristics and Biases ( Cambridge , UK : Cambridge University Press , 1982 ).
  • See, for example, Efraim Kam, Surprise Attack, in Hebrew (Tel Aviv: Maarachot, 1990), pp. 107–108.
  • Uri Bar-Joseph , The Watchman Fell Asleep , p. 248 .
  • Irving L. Janis , Victims of Groupthink: A Psychological Study of Foreign Policy Decisions and Fiascos ( Boston : Houghton Mifflin , 1972 ).
  • Uri Bar-Joseph , The Watchman Fell Asleep , pp. 243 – 246 .
  • Irving L. Janis and Leon Mann , Decision Making ( New York : Free Press , 1979 ).
  • Jack S. Levy “Political Psychology and Foreign Policy,” in David O. Sears , Leonie Huddy , and Robert Jervis , eds., Oxford Handbook of Political Psychology (New York : Oxford University Press , 2003), pp. 253–284.
  • Gill Bennett , A Most Extraordinary and Mysterious Business: The Zinoviev Letter of 1924 ( London : Foreign and Commonwealth Office , 1999 ).
  • Shabtai Teveth , Ben-Gurion's Spy ( New York : Columbia University Press , 1996 ).
  • Harry Howe Ransom , “The Politicization of Intelligence,” in Stephen J. Cimbala , ed., Intelligence and Intelligence Policy in a Democratic Society (New York: Simon and Schuster , 1987 ), pp. 25 – 46 , at p. 25 .
  • David Halberstam , The Coldest Winter , pp. 373 – 382 .
  • Sam Adams , War of Numbers: An Intelligence Memoir (Hanover, NH: Steerforth Press, 1998); George W. Allen, None So Blind: A Personal Account of the Intelligence Failure in Vietnam (Chicago: Ivan R. Dee, 2001); Michael C. Hiam, Who the Hell Are We Fighting? The Story of Sam Adams and the Vietnam Intelligence Wars (Hanover, NH: Steerforth Press, 2006). For a different view, see: James J. Wirtz, “Intelligence to Please? The Order of Battle Controversy during the Vietnam War,” Political Science Quarterly, Vol. 106, No. 2, 1991, pp. 239–263 .
  • Bob Woodward , Veil: The Secret Wars of the CIA, 1981–1987 (New York: Simon and Schuster, 1988); Melvin A. Goodman, Failure of Intelligence .
  • Seymour M. Hersh , “Selective Intelligence,” The New Yorker, 12 May 2003; Lawrence Freedman, “War in Iraq: Spelling the Threat,” Survival, Vol. 46, No. 2, January 2004, pp. 7–49.
  • Virenda Sahai Verma , “Intelligence Officers as Professionals,” in Michael Andregg, ed., Intelligence Ethics: The Definitive Work of 2007 (St. Paul, MN: The Center for the Study of Intelligence and Wisdom, 2007), pp. 18–22, at p. 18 .
  • Samuel P. Huntington , The Soldier and the State: The Theory and Politics of Civil-Military Relations ( Cambridge , MA : Harvard University Press , 1959 ).
  • Ibid., pp. 9–10.
  • Mark M. Lowenthal , Intelligence: From Secrets to Policy ( Washington , DC : CQ Press , 2008 ).
  • Christopher Andrew and Oleg Gordievsky , KGB: The Inside Story of Its Foreign Operations from Lenin to Gorbachev ( New York : HarperCollins , 1990 ), pp. 198 – 201 .
  • Wilhelm Agrell , “When Everything Is Intelligence—Nothing Is Intelligence,” The Sherman Kent Center for Intelligence Analysis, Occasional Papers, Vol. 1, No. 4, October 2002, at http://www.cia.gov/library/kent-center-occasional-papers/vol1no4.htm (accessed 3 April 2010).
  • Ezekiel 33:1–6.
  • Samuel P. Huntington , The Soldier and the State , p. 61 .
  • Michael I. Handel , “The Politics of Intelligence,” Intelligence and National Security , Vol. 2 , No. 4 , October 1987 , pp. 5 – 46 , at p. 13 .
  • Richards J. Heuer , Psychology of Intelligence Analysis ( Washington , DC : Central Intelligence Agency, Center for the Study of Intelligence , 1999 ).
  • Lt. Col. Shmuel, “On the Duty of Criticism: In Favor of Control in Military Intelligence,” in Hebrew, in Zvi Offer and Avi Kober eds., Intelligence and National Security (Tel Aviv: Maarachot, 1987), pp. 259–264.
  • Alexander L. George , Presidential Decisionmaking in Foreign Policy: The Effective Use of Information and Advice ( Boulder , CO : Westview Press , 1980 ).
  • Ephraim Kam , Surprise Attack , p. 257 .
  • John 8:32.
  • Richard K. Betts , “Intelligence for Policymaking,” The Washington Quarterly , Vol. 3 , No. 3 , June 1980 , pp. 118 – 129 , at p. 119 .
  • For example, Gary J. Schmitt and Abram N. Shulsky, “Leo Strauss and the World of Intelligence (By Which We Do Not Mean Nouns),” in Kenneth L. Deutsch and John A. Murley, eds., Leo Strauss, the Straussians, and the American Regime (Lanham, MD: Rowman and Littlefield, 1999), pp. 407–412 .
  • Robert M. Gates , “The CIA and Foreign Policy,” Foreign Affairs, Vol. 66, No. 2, Winter 1987/88, pp. 215–230; Robert M. Gates, “An Opportunity Unfulfilled: The Use of Perceptions of Intelligence at the White House,” The Washington Quarterly, Vol. 12, No. 1, 1989, pp. 35–44; Robert M. Gates, “Guarding against Politicization,” Studies in Intelligence: Journal of the American Intelligence Professional, No. 36, Spring 1992, pp. 5–13; Arthur S. Hulnick, “Relations Between Intelligence Producers and Policy Consumers: A New Way of Looking at an Old Problem,” in Stephen J. Cimbala, ed., Intelligence and Intelligence Policy in a Democratic Society (New York: Transnational Publishers, 1987), pp. 129–144.
  • Paul R. Pillar , “Intelligence, Politics, and the War in Iraq,” Foreign Affairs , Vol. 85 , No. 2 , 2006 , pp. 17 – 25 .
  • Richard K. Betts , Enemies of Intelligence: Knowledge and Power in American National Security ( New York : Columbia University Press , 2007 ), p. 79 .
  • Uri Bar-Joseph and Rose McDermott, “The Intelligence Analysis Crisis,” in Loch K. Johnson, ed., The Oxford Handbook of National Security Intelligence (New York: Oxford University Press, 2010), pp. 259–274 .
  • Uri Bar-Joseph , “A Bull in a China Shop: Netanyahu and Israel's Intelligence Community,” International Journal of Intelligence and CounterIntelligence , Vol. 11 , No. 2 , Summer 1998 , pp. 154 – 174 , at p. 154 .
  • Gadi Zohar , “Better a Close Neighbor? The Intelligence Community and the Palestinian Theater,” in Hebrew, in Brig. Gen. (res.) Amos Gilboa and Brig. Gen. (res.) Efraim Lapid, eds., Work of Art: 60 Years for Israel's Intelligence—A Look from Inside, in Hebrew (Tel Aviv: Yediot Ahoronot, 2008), pp. 116–121, at p. 121 .
  • Efraim Lavi , “Intelligence Work at the Palestinian Theater: A Critical Estimate,” The Journal of Israel Intelligence Heritage and Commemoration Center , in Hebrew, No. 52 , 2008 , pp. 30 – 34 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.