Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-vpsfw Total loading time: 0 Render date: 2024-07-16T19:43:52.708Z Has data issue: false hasContentIssue false

6 - On Counterterrorism and Intelligence

from PART 2 - RESEARCH ON NEW CHALLENGES, METHODS, AND THREATS

Published online by Cambridge University Press:  05 June 2012

Neal A. Pollard
Affiliation:
U.S. National Counterterrorism Center, Georgetown University
Gregory F. Treverton
Affiliation:
RAND Corporation, California
Wilhelm Agrell
Affiliation:
Lunds Universitet, Sweden
Get access

Summary

Counterterrorism is an intelligence war. The intelligence community (IC) plays a central role in counterterrorism in at least three key ways. Counterterrorism relies on intelligence to (1) understand the threat, (2) give warning of adversaries' intentions and capabilities, and (3) find and disrupt the adversary. In these roles, intelligence provides counterterrorism forces with targets and opportunities to attack terrorist capabilities and processes, thereby achieving strategic objectives.

Measuring the effectiveness of counterterrorism strategy is critical to the success of the strategy in order to validate the strategy and consequent resource decisions, to ensure the effectiveness of the plans and underlying action, and to provide policy makers with insight into whether counterterrorism efforts are actually making a difference. Here, the IC plays a fourth key role, in collecting, processing, and analyzing data required to assess effectiveness and providing planners with information necessary to establish “metrics” and measure strategic effectiveness. There are models of assessment that provide ways to measure strategic effectiveness that also provide insight into what is needed from intelligence.

The nature of the terrorist threat, the demands of effective counterterrorism strategy, the role of intelligence in counterterrorism, and the need to measure strategic effectiveness all generate new requirements for intelligence. Research on intelligence tradecraft, tools, process, and policy can provide intelligence agencies with ways to transform their business and better fulfill their counterterrorism roles.

Type
Chapter
Information
National Intelligence Systems
Current Research and Future Prospects
, pp. 117 - 146
Publisher: Cambridge University Press
Print publication year: 2009

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Davis, Jack, “Improving CIA Analytic Performance: Strategic Warning,” Sherman Kent Center for Intelligence Analysis Occasional Papers, 1, 1 (September 2002), p. 3Google Scholar
Davis, Jack, “Strategic Warning: If Surprise Is Inevitable, What Role for Analysts?Sherman Kent Center for Intelligence Analysis Occasional Papers, 2, 1 (January 2003), p. 3Google Scholar
Heidenrich, John G., “The State of Strategic Intelligence: The Intelligence Community's Neglect of Strategic Intelligence.” Studies in Intelligence, 51, 2 (2007), p. 16Google Scholar
Hoffman, Bruce, Inside Terrorism (London: Victor Gollancz, 1998)Google Scholar
Wardlaw, Grant, Political Terrorism: Theory, Tactics, and Counter-Measures (Cambridge: Cambridge University Press, 1989), pp. 131–6CrossRefGoogle Scholar
Fishbein, Warren and Treverton, Gregory, “Making Sense of Transnational Threats,” Sherman Kent Center for Intelligence Analysis Occasional Papers, 3, 1 (October 2004), p. 8Google Scholar
Haass, Richard N., “Supporting U.S. Foreign Policy in the Post-9/11 World,” Studies in Intelligence, 46, 3 (2002), p. 18Google Scholar
Johnson, D. P. and Tierney, D., Failing to Win: Perceptions of Victory and Defeat in International Politics (Cambridge: Harvard University Press, 2006), p. 23CrossRefGoogle Scholar
Nye, Joseph, The Paradox of American Power: Why the World's Only Superpower Can't Go It Alone (Oxford: Oxford University Press, 2002)Google Scholar
Nye, Joseph, Soft Power: The Means to Success in World Politics (Cambridge: Perseus, 2004)Google Scholar
Kearney, A. T., “Measuring Globalization: Economic Reversals, Forward Momentum,” Foreign Policy, 54 (March/April 2004), p. 141Google Scholar
Naim, Moises, Illicit: How Smugglers, Traffickers, and Copycats Are Hijacking the Global Economy (New York: Doubleday, 2005)Google Scholar
Pollard, Neal A., “Globalization's Bastards: Illegitimate Non-State Actors in International Law,” Law Enforcement and Low Intensity Conflict, 11, 2/3 (Winter 2004), pp. 215–16Google Scholar
Naím, Moisés, “The Five Wars of Globalization,” Foreign Policy (January-February 2003), pp. 29–33Google Scholar
Mazzetti, Mark, “Qaeda Leaders Losing Sway over Militants, Study Finds,” The New York Times (November 15, 2006)Google Scholar
Poindexter, John M., “Finding the Face of Terror in Data,” The New York Times (September 10, 2003)Google Scholar
Pollard, Neal A., “Competing with Terrorists in Cyberspace,”Mapping Terrorism Research: State of the Art, Gaps, and Future Direction, Ranstorp, Magnus (ed.) (London: Routledge, 2007), p. 240Google Scholar
,National Research Council, Information Technology for Counterterrorism: Immediate Actions and Future Possibilities (Washington: National Academies Press, 2003), pp. 63–71Google Scholar
Rosa, Mary, Data Mining and Data Analysis for Counterterrorism (Washington: CSIS Press, 2004), pp. 5–6Google Scholar
Carafano, James Jay and Rosenzweig, Paul, Winning the Long War: Lessons from the Cold War for Defeating Terrorism and Preserving Freedom (Washington: Heritage Books, 2005), p. 113Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×