Reducing Challenges to Intelligence Collection: The Fight Against Terrorism and Espionage

Updated on February 2, 2017
Bio-Terrorism Drill
Bio-Terrorism Drill | Source

Three Challenges for Intelligence Collection

In order to fight terrorism, industrial espionage, and other serious threats, it is important for nation-states and governmental organizations to collect valuable intelligence. There are three challenges to such intelligence collection: the first involves ordinary police officers and patrolmen and members of the public, the second only members of the public, and the third the security service organizations.

The first challenge to intelligence collection is that ordinary police officers and patrolmen and members of the public might see intelligence collection as an activity exclusive to a group of specialists. Security services and the protection of national security and democracy, including working against espionage, are thus seen as tasks for certain organizations, with little or no implications either for the daily work of ordinary police officers and patrolmen or members of the public. For example, one can read on the web pages of defense and military forces in a number of countries that issues related to counterespionage and counterterrorism are the responsibility of the nation’s security services. Such messages could contribute to the notion that only specialists should care about intelligence collection with regard to terrorism and industrial espionage. Consequently, issues related to counterespionage and counterterrorism, and the type of information required to expose these acts, are thus perceived more related to defense and the military than to the police and the public, and are far removed from the everyday work and life of police officers and patrolmen and the public.

The second challenge is that members of the public might see intelligence collection as an activity that contributes to an Orwellian-type of Big Brother society. Arguably, there might be members of the public that do not want to engage in matters of intelligence because they are hesitant about contributing information and to what degree they should do it, although they generally want to defend the democratic values of democratic governments, and they understand that intelligence collection reduces the risks of terrorism and industrial espionage. This is so because issues regarding intelligence, security services, and policing are delicate matters in many countries. Even in democratic and seemingly calm and peaceful countries, the security service may have had a history of activities such as, for example, covertly monitoring communications among union members and leaders, which might influence the peoples’ willingness to contribute information.

The third challenge is that intelligence organizations traditionally have been encouraged and worked to keep information to themselves. Consequently, a possible lack of openness between these organizations—i.e., information that perhaps should be shared is not—may be harmful to intelligence collection as a whole and on the level of the nation-state. See Wirtz’s & Rosenwasser’s 2010 article “From Combined Arms to Combined Intelligence” in the journal Intelligence and National Security (volume 25, pages 725–743) for a discussion about this problem, e.g. when one organization perceives data as unrelated whereas another see it as valuable intelligence. Information, regardless of what initial value is attributed to it, needs to be put into a context, and it may be only then that it becomes obvious whether the information is helpful intelligence (i.e., relevant to decision-making).

Pipe bomb in terrorism museum
Pipe bomb in terrorism museum | Source

Reducing the Challenges to Intelligence Collection

The first challenge to intelligence collection—intelligence collection is seen as an activity for specialists—may be reduced by reminding police officers and patrolmen and members of the public that intelligence activities are not exclusive to a group of specialists, and, in the process, invite the public to submit tips and contribute intelligence. The argument for this is that specialists, however well-trained, qualified, and experienced they might be, still seek and appreciate accurate and timely information from other concerned parties such as the public and other governmental authorities. Informing the public about this may be done via the web pages of the security services in the U.S., Europe, and elsewhere. Further, the police authorities may also inform the public about the importance of intelligence and, at the same time, ask the public to be on the lookout, to submit tips, and to contribute intelligence regarding, for example, suspicious persons and activities. See Flyghed’s 2005 article “Crime-control in the post-wall era” in the Journal of Scandinavian Studies in Criminology and Crime Prevention (volume 5, pages 165-182) for a further discussion about this. See also King’s & Sharp’s 2006 “Global Security and Policing Change” in the journal Police Practice and Research (volume 7, pages 379-390). The British police, used as an example here, have a substantial tradition of using intelligence in their work, as discussed by, for example, Carter & Carter in their 2009 article “Intelligence-Led Policing” in the journal Criminal Justice Policy Review (volume 20, pages 310-325). UK Metropolitan Police Commissioner Blair, to use another example, has stated that it will not be a specialist who first confronts a terrorist, but a local cop or a local community support officer and that “it is not the police and the intelligence agencies who will defeat crime and terror [...] it is communities”. (Source: BBC News, “Transcript of Metropolitan Police Commissioner Ian Blair's Dimbleby Lecture speech,” November 16, 2005.)

The second challenge to intelligence collection—the public does not want contribute to intelligence collection—may be reduced by informing the public about the importance of submitting tips and contributing intelligence. Here, it may be important to find new ways to reach the public, and, as said, perhaps use the Internet (i.e., web pages) in this process. The information campaigns conducted by the London Metropolitan Police (LMP), for example, are good examples of such efforts, where police authorities inform the public on the importance of these matters. The MLP informs the public via its website about the value of intelligence in its operations against suicide terrorism and encourages calls from members of the public to contribute such intelligence. More information about this is provided in Swain’s report “Suicide Terrorism” published 27 October, 2005, by the London Metropolitan Police Authority. In 2010, a UK citizen called a hotline telephone number and reported a possible terrorist attack in the London underground during the morning rush hour (the citizen had observed a man with a contraption that looked like a bomb, and the man was apprehended). It was an exemplary action, according to the LMP, in which “the member of the public who spotted him didn’t shout something out and cause a panic on the tube” (Source: Gillard, “Armed officers deployed under Operation Andromeda,” The Sunday Times, March 21, 2010). This example shows that it is important, at least according to the authorities, that the public act in a certain way, which, in turn, shows that it is important for the authorities to distribute guidelines for dealing with spontaneous sightings of suspicious activities. Further, security services probably need a certain level of support from the public to be effective, i.e., the public needs to trust the country’s security services. This may perhaps best be achieved by parliamentary or congressional authority over and clear and democratic insight into the work of the security services. This, in turn, may result in members of the public being less reluctant to contact the security service and more willing to do so when witnessing suspicious activities. The level of trust in the police authorities among the public is also important for intelligence collection to help reduce the risks for the nation-state. UK Metropolitan Police Commissioner Ian Blair—one of many who have emphasized the importance of support from the public—have stated that the police need to “seek out new partnerships with the public, together with new methods of democratic accountability” to be able to provide mainstream services and respond to potential terror threats. (Source: Blair's Dimbleby speech, 2005.)

The third challenge to intelligence collection—a lack of openness between intelligence organizations—may be reduced by raising awareness among managers, directors, and staff about the importance of intelligence sharing. Hence, staff working at different authorities within the same country may be encouraged by their respective managers and directors to distribute and share information with concerned governmental authorities in possession of the necessary security clearances. Here, it may be important to encourage need-to-share policies, openness, and the sharing of information between intelligence and security services that collect and analyze information. An example of this can be seen in the United States in the form of the fusion centers that were implemented nationwide after 9/11, via the Department of Homeland Security (DHS). Fusion centers have been discussed by, for example, Shepherd in the 2011 article "The Role of the Private Sector in Fusion Centers” in the journal Security (volume 48, pages 36-39), and critique has also been voiced over such centers, as discussed by, for example, Newkirk in the 2010 article "The Rise of the Fusion-Intelligence Complex" in the journal Surveillance & Society (volume 8, pages 43-60). Establishing such centers, it has been argued, leads to an increased privatization of state surveillance, which, as a consequence, could be problematic regarding, for example, civil liberties. See also Kinard's American Stasi: Fusion Centers and Domestic Spying for further discussions about fusion centers, intelligence collection, and the integrity of US citizens. (Though Kinard's text is only available as a download for Kindle reading devices.)

The Fusion Centers are examples of organizations that encourage the need-to-share policy, i.e. where collaboration and sharing of information between law enforcement, intelligence agencies, government and private organizations, and institutions of importance to the safety and security of the nation are fostered. An example of openness and sharing of information between security services and the police is that the LMP has increased its cooperative activities with the United Kingdom's counterintelligence and security service. From the perspective of security services, it is also important to work proactively in order to be well prepared for what may lie ahead, and in this work, they cooperate with, for example, the LMP. Both the LMP and the UK’s counterintelligence and security service present similar information about “what to look for” and “how to spot suspicious activities that may be associated with terrorism” on the web (Source: The United Kingdom's Security Service, “What to look for,” (n.d.) available at Mi5’s web site). Further, the LMP’s official policy is that neighborhood policing is inseparable from counterterrorism investigations, and Commissioner Blair has made that clear by reminding us that lessons learnt from “every police inquiry is that, not only the issues that give rise to anti-social behaviour, but also those that give rise to criminal activity and to terrorism begin at the most local level” (Blair's Dimbleby Lecture speech, 2005).

WTC 9/11
WTC 9/11 | Source

Ending Remark

Three potential challenges for intelligence collection as well as possible methods of ameliorating them have been discussed. A question still remains, though: How may the impact and effect of these possible methods be evaluated, if they are to be implemented? Even if it is not within the scope of this text to answer that question, it is important to raise it for the future discussions. Arguably, it may be difficult to determine the output and quality of methods of reducing these challenges for a number of reasons. For example, there is an inherent yet necessary level of secrecy surrounding questions of intelligence and security services, which, by itself, makes it difficult to evaluate the efforts to reduce the challenges to intelligence collection. For a historical perspective on secrecy and intelligence collection, see Crumpton's book America's intelligence officers and their secret missions. (Highly recommended.) You can also take a look at Bjørgos (2016) article "Counter-terrorism as crime prevention" published in the journal Behavioral Sciences of Terrorism and Political Aggression (volume 8, issue 1, pages 25-44). Further, there may be different definitions and discussions regarding the visions, aims, and purposes of intelligence, security services, and policing, and this span of opinions may also have a negative effect on the possibilities to conduct valid and reliable evaluations. Still, hopefully this text will contribute to the continued debate within the groups that have been discussed here and beyond regarding the challenges to intelligence collection.

© 2012 Kent Lofgren

Comments

    0 of 8192 characters used
    Post Comment

    • profile image

      Michael gravel 

      6 days ago

      It not right that y'all can assume an individual is dangerous I believe in freedom. Y'all are destroying it

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, soapboxie.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://soapboxie.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)