756
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

The Intelligence War in Northern Ireland

Pages 145-165 | Published online: 09 Jan 2008

References

  • INLA has usually maintained around 50 terrorists with another 400 members in its political wing from whom to recruit replacement cadres, when some of the select 50 are lost to assassination or arrest. For a background on INLA see
  • Maguire , K. 1987 . “The Irish National Liberation Army,” . Armed Forces , 6 ( 6 ) July : 251 – 253 .
  • Maguire , K. 1988 . “Republican Terrorism in Northern Ireland,” . Armed Forces , 7 ( 11 ) November : 412 – 517 .
  • Maguire , K. 1988 . “Loyalist Terrorism in Northern Ireland,” . Armed Forces , 7 ( 10 ) October : 465 – 471 .
  • For Loyalist perceptions of the Northern Ireland conflict, see
  • Guelke , A. 1989 . Northern Ireland: The International Perspective , 62 – 89 . Dublin : Gill and MacMillan .
  • For the problems that the Loyalists had with the justification of political violence, see
  • Nelson , S. 1984 . Ulster's Uncertain Defenders , 87 – 93 . 117 – 127 . Belfast : Appletree Press .
  • Maguire , K. 1988 . “Loyalist Terrorism in Northern Ireland,” . Armed Forces , 7 ( 10 ) November : 465 – 471 .
  • Aughey , A. and Hume , D. 1986 . “Developments Within The U.D.A.: A New Paramilitary Emphasis,” . Teaching Politics , 15 ( 2 ) May : 315 – 327 .
  • Ryder , C. 1989 . The RUC: A Force Under Fire , London : Methuen .
  • Brewer , J. , Guelke , A. , Hume , I. , Moxon‐Browne , E. and Wilford , R. 1988 . The Police, Public Order and the State , 47 – 88 . London : MacMillan .
  • The best article on the role of intelligence in the Northern Ireland conflict is
  • Charters , D. 1977 . “Intelligence and Psychological Warfare Operations In Northern Ireland,” . R.U.SJ. Journal , : 22 – 27 .
  • Smith , T. 1987 . “Counter‐Terrorism,” . Public Policy and Administration , 2 ( 2 ) Spring : 42 – 56 .
  • Bell , J. Bowyer . 1979 . The Secret Army: the IRA 1916–1979 , 199 – 212 . Dublin : Academy Press .
  • McCann , E. 1980 . War and an Irish Town , 120 London : Pluto .
  • McGuire , M. 1973 . To Take Arms , 74 – 75 . London : MacMillan .
  • Geraghty , T. 1985 . Who Dares Wins: The Story of the S.A.S. 1950–1982 , 185 – 186 . London : Fontana .
  • Cronin , S. 1980 . Irish Nationalism: Its Roots and Ideology , 339 – 357 . Dublin : Academy Press .
  • Kitson , F. 1977 . Bunch of Five , 60 – 61 . London : Faber and Faber .
  • Ryder, C., op. cit. pp. 179–185.
  • According to Duncan Campbell and Steve Connor this project was codenamed “Operation Vengeful; see
  • 1986 . On The Record , 258 291 – 293 . London : Michael Joseph .
  • Eveleigh , R. 1978 . Peacekeeping in a Democratic Society: Lessons Of Northern Ireland , 63 – 75 . London : Charles Hurst and Co. .
  • Hamill , D. 1986 . Pig in the Middle: The Army in Northern Ireland , 134 London : Methuen .
  • Ibid. pp. 173–174.
  • Nelson , S. 1984 . Ulster's Uncertain Defenders , 117 – 127 . Belfast : Appletree Press .
  • Burton , F. 1978 . The Politics of Legitimacy , London : Routledge and Kegan Paul .
  • 1988 . The Economist , 25 June
  • 1987 . Belfast Telegraph , 21 July
  • 1988 . Daily Telegraph , 23 November
  • 1986 . Belfast Telegraph , 13 November
  • For the scale of some of the smuggling operations, see the cattle‐tag fraud case in the
  • 1987 . Belfast Telegraph , 21 January
  • The cattle, seized in Armagh, were valued at £1 million. A beef and lamb smuggling operation was discovered by customs officers in Dublin. The value of the smuggled goods was estimated to be 250,000 Irish punts. See the
  • 1987 . Belfast Telegraph , 23 January
  • Geraghty, T., op. cit. p. 196.
  • Witness the ease with which PIRA was able to identify members of Army Intelligence, such as Captain Eldred; see
  • 1975 . Republican News , 12 July
  • The same was true for identifying members of RUC; see the case of Constable Hugh Gorman in
  • 1975 . Republican News , 26 April
  • See T. Geraghty, op. cit. pp. 191–193 for the problems of the military but see also C. Ryder, op. cit., pp. 150, 350–351 for the problems faced by RUC. Two RUC Special Branch officers, who worked on port surveillance, were killed by PIRA while having an off‐duty drink; see the
  • 1987 . Belfast Telegraph , 27 August
  • For an example of such operations in Kenya, see F. Kitson, op. cit. pp. 29–56.
  • Eveleigh, R., op. cit. pp. 143–150.
  • For the background to the capture of Magee see the
  • 1986 . Daily Telegraph , 12 June
  • Ryder, C., op. cit. pp. 286–296.
  • 1989 . Combat , March
  • 1987 . Combat , June
  • 1989 . Ulster , March
  • 1989 . Combat , March
  • Uglow , S. 1988 . Policing Liberal Society , 77 – 92 . Oxford : Oxford University Press .
  • Geraghty, T., op. cit. pp. 20–6–212, for the case of John Boyle; and D. Hamill, op. cit. p. 228 for the case of James Taylor.
  • Ryder, C., op. cit. pp. 345–353.
  • Stalker , J. 1988 . Stalker , 74 – 75 . London : Harrap .
  • Adams , J. , Morgan , Robin and Bainbridge , Anthony . 1988 . Ambush: The War Between The SAS And The IRA , 12 – 17 . London : Pan .
  • For an example of MI5/MI6 operations in Germany, see
  • 1989 . The Times , 16 October
  • For an example of PIRA activists hiding in Sweden, see the
  • 1988 . Belfast Telegraph , 22 November
  • 1987 . Belfast Telegraph , 2 November
  • for coverage of the seizure of the Eksund, which was carrying arms from the Middle East.
  • For an example of the FBI acting against PIRA drug operations, see the
  • 1987 . Daily Telegraph , 22 May
  • For links between PIRA, the American Mafia, and the Bolivian cocaine barons, see the
  • 1988 . Belfast Telegraph , 26 November
  • Goren , R. The Soviet Union And Terrorism , 169 – 171 . London : George Allen and Unwin .
  • Ryder, C., op. cit. pp. 216–219 for the details of Operation Hawk. In this, PIRA had managed to break RUC radio codes in order to discover who in their leadership was under closest surveillance. The importance of intercepting signals traffic is made by
  • Wright , Peter . 1987 . Spycatcher , 89 – 96 . Richmond : Heineman .
  • in his experiments to test whether or not the Soviets had broken MI5 codes.
  • Kelly , J. 1971 . Orders For The Captain , Dublin : privately published .
  • Coogan , T. P. 1981 . The IRA , 465 – 466 . London, Glasgow : Fontana .
  • for the activities of Irish Army Intelligence in Northern Ireland.
  • Geraghty, T., op. cit. pp. 203–204.
  • See Hamill, D., op. cit. pp. 308–309 and J. Brewer, et. al., op. cit pp. 78–80 for the main problems in security cooperation.
  • Adams, J., et. al., op. cit. pp. 142–163 for the background to this incident.
  • An important study of the conflict between Army bomb disposal experts and PIRA bombmakers is contained in
  • Patrick , D. 1981 . Fetch Felix: The Fight Against The Ulster Bombers 1976–1977 , London : Hamish Hamilton .
  • Cronin, S., op. cit. p. 344. This figure was based on those estimated to be receiving full‐time pay from PIRA. Other military writers, such as Lt. Col. M. Dewar puts the figure at 400 in 1985; see
  • Dewar , M. 1985 . The British Army In Northern Ireland , 239 London : Arms And Armour Press .
  • Townsend , C. 1984 . Political Violence in Ireland , 334 – 340 . London : Oxford University Press .
  • The RUC unit that deals with extortion is called C.I3. It was set up in 1982 but with only a small staff. C. 13 of RUC should not be confused with C.13 of the London Metropolitan Police, which is the Anti‐Terrorist Branch. See
  • Thackrah , J. R. , ed. 1985 . Contemporary Policing , 146 London : Sphere .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.