{"title":"Democratization of Intelligence: Demilitarizing the Greek Intelligence Service after the Junta","authors":"Eleni Braat","doi":"10.1080/08850607.2023.2261824","DOIUrl":"https://doi.org/10.1080/08850607.2023.2261824","url":null,"abstract":"Military dictatorships critically rely on the armed forces and intelligence agencies for the maintenance of their regime. They strengthen these through the allocation of substantial staff and personal resources. We know little about the behavior of intelligence and security services in the transition from authoritarianism to democracy. This article examines the Greek Intelligence Service (KYP) and, since 1986, the National Intelligence Service as its successor. A principal ingredient for the democratic embedment of the service was a break with this dictatorial past and, consequently, its demilitarization. This article shows that the de facto demilitarization of the service was a protracted process that was largely independent from the de jure formal demilitarization in 1986. It both preceded and lagged the legislative decision in 1986. This article particularly focusses on personnel policies aimed at distancing the service from its former ties to the junta regime (1967–1974), the “old KYP.” Its methodological contribution lies in its reliance on original, oral history interviews with former employees of the service and in its systematic analysis of newspaper publications for research on the KYP. I argue and show that internal organizational factors, most notably professionalization and shifting responsibilities, rather than external factors such as party politics or a prodemocratic ideological vision, are the key explanations for a change in the otherwise persistent military staffing of the intelligence service.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135933167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spanish Intelligence in the Early Days of Late-Francoism: Fault Lines and Continuity","authors":"Antonio M. Díaz-Fernández","doi":"10.1080/08850607.2023.2261823","DOIUrl":"https://doi.org/10.1080/08850607.2023.2261823","url":null,"abstract":"","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"29 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135871163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flood of Erroneous Details on Soviet IntelligenceBoris Volodarsky <b>:</b> <i>The Birth of the Soviet Secret Police: Lenin and History’s Greatest Heist 1917–1927</i> Frontline Books, Barnsley, South Yorkshire, 2023, 393 p., £25.00 (hardbound).","authors":"Kevin Riehle","doi":"10.1080/08850607.2023.2259743","DOIUrl":"https://doi.org/10.1080/08850607.2023.2259743","url":null,"abstract":"","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136104859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Simon Oleszkiewicz, Dominick J. Atkinson, Steven Kleinman, Christian A. Meissner
{"title":"Building Trust to Enhance Elicitation","authors":"Simon Oleszkiewicz, Dominick J. Atkinson, Steven Kleinman, Christian A. Meissner","doi":"10.1080/08850607.2023.2255507","DOIUrl":"https://doi.org/10.1080/08850607.2023.2255507","url":null,"abstract":"Drawing on the scientific literature on trust and the experiences of distinguished interviewers, two primary trust-building tactics with potential application in investigative and intelligence interviewing were identified and assessed for their efficacy in this context. Trust-building tactics that demonstrate trustworthiness and demonstrate a willingness to trust portray the interviewer as reliable and dependable (i.e., perceptions of cognitive trust) as well as convey goodwill and warmth (i.e., perceptions of affective trust) were viewed as likely to increase a source’s willingness to disclose critical information. Across three experiments, both tactics were found to be influential in engaging the reciprocity principle in a manner that elicited the sources’ cooperation and enhanced information yield. However, perceptions of cognitive trust were found to function as a direct encouragement to reveal information. In contrast, perceptions of affective trust first facilitated a willingness to cooperate that had the potential for subsequently manifesting as an instrumental form of cooperation.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135994074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Simon Oleszkiewicz, Pär Anders Granhag, Timothy J. Luke
{"title":"Perkins Operations: Tactics Used in Undercover Interactions","authors":"Simon Oleszkiewicz, Pär Anders Granhag, Timothy J. Luke","doi":"10.1080/08850607.2023.2257544","DOIUrl":"https://doi.org/10.1080/08850607.2023.2257544","url":null,"abstract":"In the United States, it is permissible to place an undercover police officer in the jail cell with a suspect. This tactical move is rare and launched only for serious crimes, and it takes place before any charges have been filed. This tactic goes under the name of Perkins operations, from the case ruling that if an individual speaks freely to someone whom they believe is a fellow inmate it is allowed to take advantage of their misplaced trust (Illinois v. Perkins, 1990). In this study, we examine 22 Perkins operations, 60 hours of secretly taped interactions in the cells, and we describe and categorize the different approaches and tactics that the undercover officers used. Based on the descriptive analysis, we conceptualize two pathways to information elicitation (direct and relational) and explore the undercover officers’ use of risky interview tactics. The findings suggest that undercover officers use four broader approaches to establish relationships and gather information, and we were able to identify only a few instances of risky tactics in this sample. The relevance of the findings for human intelligence gathering and counterintelligence are discussed.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136353378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ideology in Costume: A Growing Threat to Intelligence Studies","authors":"John A. Gentry","doi":"10.1080/08850607.2023.2254490","DOIUrl":"https://doi.org/10.1080/08850607.2023.2254490","url":null,"abstract":"Intelligence studies (IS) is a new and rapidly evolving academic discipline. Scholars periodically assess its status, noting considerable progress, but they have barely begun to assess the origins and implications of a significant recent development in IS: infiltration of the discipline by people determined to alter intelligence studies for ideological reasons. This commentary focuses on the destructive impact of neo-Marxian “critical intelligence studies” on IS generally. It addresses the origins and implications of this infection and suggests ways to inoculate IS against further damage.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136353221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Helping Intelligence Analysts Gain Insight","authors":"Adrian Wolfberg","doi":"10.1080/08850607.2023.2257549","DOIUrl":"https://doi.org/10.1080/08850607.2023.2257549","url":null,"abstract":"AbtractDecisionmakers expect intelligence assessments to be insightful. Still, intelligence professionals do not understand the insight process well enough to achieve consistently such indispensable outcomes. Little, if any, research has studied how intelligence analysts achieve insights. A qualitative, interview-based unclassified study was conducted to understand how insight emerges in 36 intelligence analysts who solved novel problems. The results include an emergence process consisting of two interacting elements—internalized tensions and priming—across the emotion–cognition and individual–social dimensions, and that the relationship between the two elements is complex. The emergence of insight is not predictable or controllable, which has significant challenges for the management of intelligence analysts because intelligence agencies typically are hierarchical organizations that emphasize order and control, conditions antithetical for nurturing emergence. This conundrum requires a major individual and cultural shift by management. The study suggests that the findings are generalizable across intelligence analysts in any national security organization, domestic or international. Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 Thomas H. Kean and Lee Hamilton, The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States (Washington, DC: U.S. Government Printing Office, 2004), p. 339. https://www.9-11commission.gov/report/; Laurence H. Silberman and Charles S. Robb, The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (Washington, DC: U.S. Government Printing Office, 2005), p. 560. https://www.govinfo.gov/app/details/GPO-WMD2 Jacob W. Getzels and Mihalyi Csikszentmihalyi, “From Problem Solving to Problem Finding,” in Perspectives in Creativity, edited by Irving A. Taylor and Jacob W. Getzels (Chicago, IL: Aldine, 1975), pp. 90–115.3 Robert J. Sternberg, “A Three-Facet Model of Creativity,” in The Nature of Creativity, edited by Robert J. Sternberg (Cambridge, UK: Cambridge University Press, 1988), pp. 125–147.4 Stephen Marrin, “Understanding and Improving Intelligence Analysis by Learning from Others,” Intelligence and National Security, Vol. 32, No. 5 (2017), pp. 539–547. https://doi.org/10.1080/02684527.2017.1310913; Joseph Soeters, Management and Military Studies: Classical and Current Foundations (New York: Routledge, 2020), pp. 1–10.5 Peter A. Corning, “The Re-Emergence of ‘Emergence’: A Venerable Concept in Search of a Theory,” Complexity, Vol. 7, No. 6 (2002), pp. 18–30. https://doi.org/10.1002/cplx.100436 Steve W. J. Kozlowski and Katherine J. Klein, “A Multilevel Approach to Theory and Research in Organizations: Contextual, Temporal, and Emergent Processes,” in Multilevel Theory, Research, and Methods in Organizations: Foundations, Extensions, and New Directions, edited by Katherine J. Klein","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134947345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stronger Together: Intelligence in the English-Speaking West Indies","authors":"Ryan Shaffer","doi":"10.1080/08850607.2023.2252181","DOIUrl":"https://doi.org/10.1080/08850607.2023.2252181","url":null,"abstract":"AbstractThis article explores intelligence in the English-speaking West Indies by examining institutions, capabilities, and objectives. It highlights how the British Overseas Territories and independent nations separately and collectively gather and utilize intelligence. The article argues the territories and countries’ sizes and resources as well as their geographic locations significantly shape intelligence networks that collect, share, and use vital security information. In doing so, this article provides the first academic analysis of the region’s intelligence as a whole in understanding how intelligence is viewed, utilized, and shared within territories and countries that are not usually examined in the intelligence studies literature. Disclosure statementThe author reports there are no competing interests to declare.Notes1 For example, see: Christopher Andrew, Defend the Realm: The Authorized History of MI5 (London: Allen Lane, 2009), pp. 477–480; Biko Agozino, Ben Bowling, Elizabeth Ward, and Godfrey St Bernard, “Guns, Crime and Social Order in the West Indies,” Criminology & Criminal Justice, Vol. 9, No. 3 (2009). doi:10.1177/1748895809336378; Don D. Marshall and Aretha M. Campbell, “The Consequences of Global Policy Initiatives Against Money Laundering, Terrorist Financing and Tax Evasion on Financial Centres in the Caribbean Region,” in Money Laundering, Terrorist Financing, and Tax Evasion (Cham: Palgrave Macmillan, 2021), pp. 267–324.2 Some examples include: Owen L. Sirrs, Pakistan’s Inter-Services Intelligence Directorate: Covert Action and Internal Operations (New York: Routledge, 2017); Bob de Graaff, “Elements of an Asian Intelligence Culture,” in Intelligence Communities and Cultures in Asia and the Middle East: A Comprehensive Reference, edited by Bob de Graaff (Boulder, CO: Lynne Rienner Publishers, 2020), pp. 461–470; Dheeraj Chaya, India’s Intelligence Culture and Strategic Surprises Spying for South Block (New York: Routledge, 2023); Ryan Shaffer, “Introduction,” African Intelligence Services: Early Postcolonial and Contemporary Challenges, edited by Ryan Shaffer (Lanham, MD: Rowman and Littlefield, 2021), pp. 3–22; Ryan Shaffer, “Introduction,” The Handbook of African Intelligence Cultures, edited by Ryan Shaffer (Lanham, MD: Rowman and Littlefield, 2023), pp. xvii–xxvi; Ryan Shaffer, “Introduction,” The Handbook of Asian Intelligence Cultures, edited by Ryan Shaffer (Lanham, MD: Rowman and Littlefield, 2023), pp. xii–xxi; Ryan Shaffer, “Following in Footsteps: The History of Kenya’s Post-Colonial Intelligence Services,” Studies in Intelligence, Vol. 63, No. 1 (2019), pp. 23–40.3 For example, see: Kevin Peters, “Bahamas-Trinidad Tobago-Jamaica,” in The Handbook of Latin American and Caribbean Intelligence Cultures, edited by Florina Cristiana Matei, Carolyn Halladay, and Eduardo E. Estévez (Lanham, MD: Rowman and Littlefield, 2022), pp. 227–244; Glenn E. McPhee, “Barriers to Collecting ‘Secret Intelligence’ in the Bahamas,”","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135060610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Index for Volume 36","authors":"","doi":"10.1080/08850607.2023.2253083","DOIUrl":"https://doi.org/10.1080/08850607.2023.2253083","url":null,"abstract":"Published in International Journal of Intelligence and CounterIntelligence (Vol. 36, No. 4, 2023)","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138512188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Beyond Bias Minimization: Improving Intelligence with Optimization and Human Augmentation","authors":"David R. Mandel, Daniel Irwin","doi":"10.1080/08850607.2023.2253120","DOIUrl":"https://doi.org/10.1080/08850607.2023.2253120","url":null,"abstract":"For the last half-century, the U.S. and Allied Intelligence Community (IC) has sought to minimize the ostensibly detrimental effects of cognitive biases on intelligence practice. The dominant approach has been to develop structured analytic techniques (SATs), teach them to analysts in brief training sessions, provide the means to use SATs on the job, and hope they work. The SAT approach, however, suffers from severe conceptual problems and a paucity of support from scientific research. For example, a highly promoted SAT—the analysis of competing hypotheses—was shown in several recent studies to either not improve judgment quality or to make it worse. This article recaps the key problems with the SAT approach and sketches some alternative interventions. At the core of these proposals is the idea that intelligence agencies should be focused broadly on improving intelligence and not narrowly on minimizing bias. While the latter contributes to achieving the former, overemphasis on bias minimization could inadvertently bias agencies toward a singular form of intervention, blinding then from potentially more effective interventions. Two lines of alternative intervention are sketched. The first line focuses on postanalytic statistical optimization methods such as recalibration and performance-weighted aggregation of analysts’ judgments. The second line focuses on a broad human augmentation program to optimize human cognition through better sleep, exercise, nutrition (including nootropic compounds), and biometric tracking. Both lines of effort would require substantial scientific investment by the IC to examine risks and efficacy.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135733964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}