{"title":"Ebb and Flow of Wartime Intelligence","authors":"Carl Anthony Wege","doi":"10.1080/08850607.2022.2032270","DOIUrl":"https://doi.org/10.1080/08850607.2022.2032270","url":null,"abstract":"Rupert Allason—most commonly known by his pen name, Nigel West—has had an impressive writing career, with more than 30 books focusing on intelligence and espionage. To be sure, West’s breadth of understanding of our British allies is uncommonly granular, and Secret War: The Story of SOE Britain’s Wartime Sabotage Organization—one of his most recent volumes—is a case in point. In Secret War, West describes a reality of wartime chaos marked by heroism, betrayal, error, and concession that was eclipsed in a postwar world more interested in a sanitized narrative of valor lest those rebuilding a devastated Europe be scandalized by their wartime compromises. The core Special Operations Executive (SOE) was sired in 1940 from the “black propaganda” organization known as Electra House and Branch “D” of the Secret Intelligence Service (Military Intelligence 6 [MI6] or SIS), responsible for sabotage. The core of 140 intelligence officers would serve under three SOE executive directors and eventually manage a cadre of 9,000 agents that would attempt to implement Winston Churchill’s admonition to “set Europe ablaze” across the whole of the British war effort from Scandinavia to Asia. In the summer of 1940, the Sitzkrieg ended, and the Wehrmacht drove through the Ardennes, thundered across France—stunning the Western allies and creating havoc as the British SIS infrastructure in France and its “Z” network dissolved as quickly as the Maginot Line. SIS Section D was then little more than an unfunded paper organization, rescued by an Americanborn British tycoon named Chester Beatty, who provided seed monies out of his personal resources to get things off the ground. Section D began coordinating with MI (R or Research),","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"72 1","pages":"988 - 993"},"PeriodicalIF":0.9,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79381349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inferences and Consequences","authors":"J. Wirtz","doi":"10.1080/08850607.2022.2066460","DOIUrl":"https://doi.org/10.1080/08850607.2022.2066460","url":null,"abstract":"would be ineffective (compared to 10% for liberals). The authors conclude with considerations about how persuadable people are regarding torture. They did not find great cause for optimism for those of us who would like to persuade people that torture is immoral and inefficacious. A maximum of 25% of people are persuadable—not insignificant—but it is much easier to convince them to wrongly embrace the efficacy of torture than persuade them of the truth! Again, some people endorsed torture even when told it would not work, and support for torture also increased when respondents were shown prompts of effective noncoercive interrogation. Other scholars have shown people tend to “double down” on false beliefs when presented contrary evidence when those beliefs are tied up with their identity. For some, willingness to torture may well be one of those beliefs, tied up in some people’s notions of patriotism, toughness, and resoluteness. In all, this short book makes a unique and enlightening addition to the torture debate.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"57 1","pages":"1015 - 1019"},"PeriodicalIF":0.9,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91281665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Standard Text","authors":"Carol E. B. Choksy","doi":"10.1080/08850607.2023.2224463","DOIUrl":"https://doi.org/10.1080/08850607.2023.2224463","url":null,"abstract":"","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"70 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76597821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anatomy of Operation Pimlico","authors":"Avner Barnea","doi":"10.1080/08850607.2023.2219627","DOIUrl":"https://doi.org/10.1080/08850607.2023.2219627","url":null,"abstract":"","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"47 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78704359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial Account of Intelligence–Technology Nexus","authors":"Joel Brenner","doi":"10.1080/08850607.2023.2220647","DOIUrl":"https://doi.org/10.1080/08850607.2023.2220647","url":null,"abstract":"","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"31 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78733169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The FBI’s Border Coverage (BOCOV) Program and the Ambiguity of Intelligence Missions","authors":"Darren E. Tromblay","doi":"10.1080/08850607.2023.2221825","DOIUrl":"https://doi.org/10.1080/08850607.2023.2221825","url":null,"abstract":"Abstract Intelligence services must routinely operate in liminal spaces, both operationally and bureaucratically. The Border Coverage (BOCOV) Program of the Federal Bureau of Investigation (FBI) was a Cold War example of an agency seeking to address the vulnerability inherent to a geographic liminal space. Its implementation of the program illustrated the impact of bureaucratic borders—between the FBI and Central Intelligence Agency and between Intelligence Community (IC) and non-IC agencies. Lessons learned, through the implementation of BOCOV, about interagency relations continue to be applicable as the United States contends with the cyber environment, an even more porous space than the physical U.S.–Mexican border.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"64 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78678009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligence Authorization Acts: Their Impact on the Intelligence Community","authors":"Mark A. Jensen","doi":"10.1080/08850607.2023.2214326","DOIUrl":"https://doi.org/10.1080/08850607.2023.2214326","url":null,"abstract":"","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"46 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73342483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligence and the Military: Introduction","authors":"Sebastiaan Rietjens, Peter de Werd","doi":"10.1080/08850607.2023.2215690","DOIUrl":"https://doi.org/10.1080/08850607.2023.2215690","url":null,"abstract":"Governments spend heavily on intelligence to support their militaries at tactical, operational, and strategic levels. This happens in many different mission areas, abroad as well as at home, and in various contexts, including counterterrorism, homeland security, and peace and stability operations. In the context of out-of-area missions, some have called for reorganizing military intelligence to facilitate counterinsurgency strategies better, while others have argued that such proposals “would match poorly with the traditional nature of military intelligence and the realities of human resources constraints in the military.” However, only limited academic research has been done on intelligence and the military. As a result, prominent academic intelligence journals, including the International Journal of Intelligence and CounterIntelligence, only occasionally publish on this topic. It appears not","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"264 1","pages":"1041 - 1046"},"PeriodicalIF":0.9,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84493365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Caught Red-Handed","authors":"Nigel West","doi":"10.1080/08850607.2023.2205804","DOIUrl":"https://doi.org/10.1080/08850607.2023.2205804","url":null,"abstract":"","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"11 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76429673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}