National Intelligence
CHAPTER 10
IntelIigence, Terrorism,
and National Security
Blaise Cronin
Indiana University
Introduction
This chapter deals with the nature of extreme terrorism and the
threat it poses to national security. It analyzes the challenges faced by
intelligence and counterintelligence services in the U.S., focusing in particular on the comparative strengths and weaknesses associated with
the dominant organizational forms favored by, on one hand, radical terrorist groups (network) and, on the other, national intelligence agencies
(bureaucracy).
Intelligence, Terrorism and National Security is not the first ARIST
chapter to treat the subject of national intelligence. That honor goes to
Philip Daviess Intelligence, Information Technology, and Information
Warfare, which appeared in volume 36; an earlier chapter by Cronin
and Davenport (1993) on social intelligence addressed only tangentially
classical notions of governmental intelligence and statecraft. P. H. J.
Davies (2002, p. 313) rightly noted in his introduction that it is indeed
difficult to find any topic in information science and technology not relevant to intelligence, information warfare, and national security, or conversely. Recent events have merely underscored the validity of his
claim, a claim that is buttressed in the present volume by Lee Strickland
in his compendious chapter on domestic security surveillance and civil
liberties.
Theoretical insights and professional developments in information
science have had, as one might expect, an effect on the practice of intelligence work; and there have been close ties since World War I1 between
the intelligence and information science professions (Farkas-Conn,
1990, chapter 6; B. Wilson, 2001). Moreover, many of the concepts, tools,
and techniques developed by information scientists are used routinely in
the gathering, organizing, retrieval, and dissemination of information
and data by intelligence specialists in a wide variety of institutional and
organizational contexts (Cronin, 2000; Cronin & Crawford, 1999b;
Sigurdson & TAgerud, 1992). But this chapter is less about information
395
and communication technologies (ICTs) than the ways, subtle and profound, in which organizational structure and organizational culture can
influence both individual and institutional information behaviorsincluding the adoption and use of information systems-and, ultimately,
the effectiveness of national intelligence and security services.
(with, for instance, predictable career paths, clear lines of reporting, and
unity of command) and generally favor functional specialization: see S.
T. Thomas (1999, p. 407) on the CIAS long history of bureaucratic
entrenchment. And according to Berkowitz and Goodman (2000, p. 671,
who provide concrete illustrations of organizational failings and operational failures:
The intelligence community is a classical bureaucracy,
characterized by centralized planning, routinized operations,
and a hierarchical chain of command. All of these features
leave the intelligence organization ill suited for the
Information Age.
Few would nominate the CIA and FBI as examples of risk-taking cultures. Both organizations-high profile instances of normative drift and
moral delinquency notwithstanding (e.g., Chomsky, 1 9 8 8 k a r e publicly
accountable, and as such are expected to behave in certain ways. To
resort to clich6, changing the culture of either the CIA or FBI is akin to
making a U-turn in a supertanker, only much more difficult, as many a n
ex-DCI (Director of Central Intelligence) has learned to his cost: DCIs
come and go, but the core culture remains seemingly resolute (Baer,
2002; Berkowitz & Goodman, 2000; Johnson, 2000; Jones, 2001). The
CIA and its Soviet era equivalent, the KGB (Committee for State
Security), were children of their time. But the enemy (henceforth for
convenience Al Qaeda, which means the base in Arabic, will be used
metonymically for the extreme terrorism threat spectrum) has changed:
it is no longer a nation state, territorially defined, physically embodied,
bureaucratically organized, and possessed of a conventional military.
Rather it is a network, albeit one that is at various times and in various
ways state-sponsored (e.g., Bodansky, 2001; Daskal, 2003)-more accurately, a network or coalition of networks, structurally and dynamically
different in many respects from colossi such as the CIA or the U S . military. These differences are not merely academic; they, in fact, create
potentially powerful advantages for the networked organization and
raise plausible concerns about fitness for purpose within the intelligence
establishment. As Berkowitz and Goodman (2000, p. 63) wrote prior to
September l l t h , the traditional (late twentieth century) model for producing intelligence (is outdated ... hierarchical, linear, and isolated.
Among the first to grasp the competitive advantages accruing to networked organizations in an informational society was Manuel Castells
(but see also, for example, Ouchi [19801 and Thompson, Frances,
Levacic, & Mitchell [1991]). In volume one of his monumental trilogy,
The Information Age: Economy, Society and Culture (Castells, 2000, p.
187), he provides a generic definition of an organization as a system of
means structured around the purpose of achieving particular goals.
Castells next distinguishes between bureaucracies, enterprises, and network enterprises. For bureaucracies, reproduction of their system of
strategic gaming and risk calculation that characterized the Cold War
standoff between the U S . and the Soviet Union have no relevance today.
As Paul Davis and Brian Jenkins (2002, p. xviii) concluded in their
study of deterrence and influence in the war on Al Qaeda, the concept
of deterrence is both too limiting and too nayve to be applicable to the
war on terrorism. Reason, force, and concessions will all come to
naught. While the prospect of mutually assured destruction (MAD) may
have helped keep the two superpowers ICBMs (inter-continental ballistic missiles) in their silos, the concept of MAD does not enter the calculus of radical Islamic fundamentalist groups, as the popularity of suicide
bombing among young, rational, and well-educated recruits in the
Middle East and elsewhere (e.g., Sri Lanka, Chechnya) demonstrates
compellingly (Krueger & Maleckova, 2003). Significantly, it appears that
poverty is not a necessary, let alone sufficient, condition for suicidal terrorism and, further, that the bomber has no clear profile (Martyrdom
and murder, 2004, p. 21; see also Ganor, 2003). Recruits-male and
female-are as easy for terrorists to attract as they are difficult for intelligence analysts to identify; and their motivations are as likely to be secular as religious (Merari, 2002; see Hudson, 2002 for a comprehensive
review of the research literature on terrorist profiling). It is probably
only a matter of time before suicide bombing-self-chosen martyrdom,
in the language of Hamas (Juergensmeyer, 2003, p.74)-is exported to
the U S . homeland and elsewhere by sleeper cells acting under instructions from the leadership of Al Qaeda or local sympathizers, be they resident aliens or U S . citizens, acting autonomously or in concert.
Al Qaeda (both the core elements and the constellation of geographically dispersed groups that subscribe, self-interestedly or otherwise, to
its ideology or draw inspiration from its leadership) thus constitutes an
unprecedented threat, both ideologically and organizationally, for traditionally minded and conventionally structured intelligence services. The
enemy (the target) is not simply scattered across the globe and organizationally nimble; it has its own sophisticated intelligence and counterintelligence capability. Yossef Bodansky has described how Osama bin
Ladens right hand man, Ayman al-Zawahiri, reviewed with his multinational commanders the organizations entire chain of command to
make sure that the new redundant, resilient modus operandi would
withstand future onslaughts by hostile intelligence service, including
the arrest and interrogation of senior leaders (Bodansky, 2001, p. 393).
AI Qaeda is a good if idiosyncratic example of a learning organization
(Senge, 1990), though Silke (2003a, online) would argue that it is as
much ua state of mind as a formal organization:
To begin with, Al-Qaeda is not a traditional terrorist organization. It does not have a clear hierarchy, military mindset
and centralized command. At best it is a network of affiliated
groups sharing religious and ideological backgrounds, but
which often interact sparingly. Al-Qaeda is a state of mind, as
(Berrigan, 2001; see Mayer [2004] for a discussion of the role of private
contractors in the war on, and reconstruction of, Iraq; and Berkowitz &
Goodman [2000, chapters 2 and 31 on exploiting the private sector). One
of the largest of a growing band of PMCs is DynCorp, which boasts
annual revenues in excess of $2 billion (Baum, 2003). The rapid corporatization and globalization of the age-old mercenary business allows a
government to control fixed costs by outsourcing certain military and
quasi military functions and a t the same time to create arms-length separation between itself and the contractor, which can be most convenient
when things go awry, such as when U.S. civilians in Columbia working
for DynCorp were involved in a firefight between FARC (Revolutionary
Armed Forces of Colombia) guerrillas and Colombian police. Under such
an arrangement, the federal government can, in theory a t least, maintain plausible deniability as far as the direct involvement of U.S. forces
is concerned (Berrigan, 2001).
Network Advantage
To understand why bureaucracies are ill-fitted to the task of combating contemporary terrorist threats, it is necessary to examine in more
detail prevailing conceptions of netwar and also consider the ways in
which networked terrorist groups go about their business. There is a burgeoning literature on the nature and dynamics of networked organizations in general and on terrorist and organized crime networks in
particular (e.g., Arquilla & Ronfeldt, 1996, 2001c; Barabasi, 2003;
Castells, 2000; Zabludoff, 1997).Arquilla and Ronfeldt (2001a, p. 7) take
pains to distinguish among, and provide illustrations of, the three generic
forms of network: chain, star, and all-channel. By way of illustration, in
a chain network message flow is uni- or bi-directional, whereas in an allchannel network communication (increasingly facilitated by pervasive
cellular phone technology, global internetworking, and the World Wide
Web) will be many-to-many and typically dense (hence the frequent
media allusions to high levels of terrorist chatter, although chatter can
just as easily be misinformation). More specifically,Arquilla and Ronfeldt
(2001a, p. 10) acknowledge the influence on their thinking of the early
research on social movements carried out by Luther Gerlach and Virginia
Hine, in particular the notion of segmented, polycentric, ideologically
integrated networks (SPINSs), defined by Gerlach as follows:
By segmentary I mean that it is cellular, composed of many
different groups of varying size, scope, mission and capability. ... By polycentric I mean that it has many different leaders or centers of direction. ... Leaders are often no more than
first among equals and some act chiefly as traveling evangelists, criss-crossing the movement network. ... By networked I mean that the segments and the leaders are
reticulated systems of networks through various structural,
impaired in the way that those of Sender0 Luminoso (the Shining Path
movement) in Peru were following the capture by government troops of
its charismatic founder, Abimel Guzman. In Al Qaeda, authority [is]
determined by knowledge or function rather than position (Todd &
Bloch, 2003, p. 13).The organization is a t once leaderless and leader-driven (leader-inspired, is perhaps a better way of putting it), centralized
and distributed or, in the terminology of Arquilla and Ronfeldt (1996, p.
9), acephalous (headless) and polycephalous (Hydra-headed). This
structural flexibility-schizophrenia, one is tempted to say-finds its
echo in the organizations modus operandi, notably the use of
surgelunsurge and pulselwithdraw tactics to put a designated target off
balance (see Arquilla & Ronfeldt, 2001c; Stewart, 2001a). Al Qaeda,
broadly understood, has shown repeatedly that it has the ability to
mount simultaneous attacks on carefully selected targets (e.g., the 1998
East African embassy bombings and, in 2003, the tightly coordinated
bombing attacks in both Saudi Arabia and Turkey) and then swiftly disperse and regroup. To complicate matters, A1 Qaeda does not limit itself
to targeting American assets, andor those of American allies; it will
strike a t any target or asset it deems to be contaminated by infidel values. From a counterterrorism perspective, the breadth of the threat
spectrum, and the political and ideological mix of nations thus affected,
can mightily complicate intelligence gathering and sharing activities
and also counterintelligence efforts.
The tactics associated with small-unit swarming (an approach used
by gangs of muggers on Londons Oxford Street and the New York subway a t various times in the recent past) are very different from the mass
maneuvers and waves of attacks associated with conventional military
thinking. Al Qaedas preferred mode of operation (in addition to postc a r d target selection, i.e., targets with high symbolic value or high
human intensity, such as the World Trade Center [Miller & Stone, 2002,
p. 2641) is the use of sustainable, pulsing force across a wide theater of
operations. Mark Juergensmeyer (2003, p. 121; p. 124) talks revealingly
of a theater of terror and performance violence. Additionally, A1
Qaedas willingness to devolve operational autonomy to the local level
means that intelligence and security forces struggle to come to grips
with a sprawling, self-synchronizing, loosely coupled terrorist collectivity apparently capable of launching attacks in almost any place a t any
time, as demonstrated by the 2003 bombings in Bali and Casablanca
and the March 2004 bombings in Madrid. As Gerlach (1987, p. 16)
observed generally of social movements, the autonomy and self-sufficiency of local groups make it difficult for its opposition t o gather intelligence information about it and to know what all of its groups will do.
For the reasons just adumbrated, bureaucratic organizations-both traditional intelligence agencies and conventional armed forces-are
reassessing their effectiveness and the appropriateness of their structures in the face of a new and escalating threat to not only national but
also international security.
guerrilla attacks, and, no less important, the organizations money laundering mechanisms, exceptionally complex and well developed in the
case of Al Qaeda (de Borchgrave, 1998; The money trail, 2002).
The fifth and final dimension that Ronfeldt and Arquilla (2001) identify is sociakultural solidarity, a n especially important factor as far as
Al Qaeda is concerned. This refers to the networked enterprises ability
to create or capitalize on (through, for instance, intra- or inter-group
marriage) kinship and other solidifying sociocultural ties (ethnicity, language, religion), an example, according to J. Gray (2003, p. 80), of the
organizations pre-modern values. A similar phenomenon has been
noted recently by U.S. military personnel serving in Iraq: Its the Arabic
rule of five. ... The insurgency is self-replicating, like a virus through the
vengeance of brothers, sons, cousins and nephews (Hirsch, 2004, p. 39).
In the Middle East, Hamas recruits suicide bombers for its struggle
against Israel through friendship networks in school, sports, and
extended families (Juergensmeyer, 2003, p. 79). In similar vein,
Gunaratna (2002, p. 96) describes Al Qaeda as being organized along the
lines of a broad-based family clan with its constituent multi-national
members designated as brothers. The denser these kinship and cultural ties, the more robust the overall network; and the more resistant
it is to infiltration by spies.
Sociologists (e.g., Granovetter, 1973, 1983) have long recognized the
communicative value of weak ties:
Weak ties are asserted to be important because their likelihood of being bridges is greater than (and that of strong ties
less than) would be expected from their numbers alone. This
does not preclude the possibility that most weak ties have no
such function. (Granovetter, 1983, p. 229)
However, sociocultural cohesiveness may well be hard to maintain as
the network (of networks) expands over time and space and the number
of weak ties or links increases. The disadvantage of having a large numbers of weak ties is that the network becomes potentially vulnerable to
penetration-after all, it is only as strong as the weakest link.
A sixth dimension might be added to the RAND list: mass support.
Revolutionary groups such as the IRA,Tamil Tigers, or PLO depend for
their existence on both the active and passive support of their heartland
constituencies. If actions are too extreme or target selection grossly
insensitive (e.g., the Real IRAS 1998 bombing in Omagh, Northern
Ireland, which claimed 28 lives and injured 200) the group runs the risk
of alienating public opinion and losing critical support within its own
ranks. With Al Qaeda things are quite different. Its brand of radical
Islamic fundamentalism seeks the overthrow of the West, its value system, and all those who sympathize, collaborate, or ally themselves with
the West, including the Saudi royal family and the ruling elites in other
Arab nations, most notably Egypt. Al Qaeda does not wish t o become
Counterterrorism Challenges
In February 15, 2001, the United States Commission on National
Securityl2lst Century produced a report, Road Map for National
Security: Imperative for Change, which made a number of predictions
and recommendations covering the next quarter century. The HartRudman Report, as it has come to be known, correctly identified the
imminent threat of attack against the U.S. homeland (it actually
occurred seven months later), but at the same time concluded that the
basic structure of the U.S. intelligence community does not require
change. ... We recommend no major structural change (U.S.
Commission on National SecuritylBlst Century, 2001, pp. 81-82). One
wonders whether the authors would have produced a different recommendation had their report appeared after the September 11th attacks.
In any event, it seems likely that meaningful reforms of the status quo
can be carried out that do not necessitate wholesale organizational
restructuring, but that could nonetheless alleviate some of the dysfunctionalities arising from cultural conflicts and institutional rivalries
within the intelligence establishment.
During the Cold War, the CIA was tasked with gathering intelligence
against a monolithic government and a large military-industrial infrastructure, the principal elements and instrumentalities of which were
knowable and, in the main, fixed. The stabilities of the bi-polar world
(United States us. Soviet Union) are no more, and the U.S. has become
the lonely superpower (Huntington, 1999, p. 35). Todays threat spectrum includes numerous nonstatelsubstate actors, groups that are operationally scattered and often very loosely coupled, examples, one might
say, of distributed cognition (see Hutchins, 1995) a t the organizational
level. These challenges cannot be met by a conventional force-on-force
military campaign (Daskal, 2003, online). The nature (indeed, the very
existence) of some terrorist groups is unknown, or a t best little known,
and the complex of relationships among the various affiliates and factions is only partially apprehended. For example, Al Qaedas use of
Collaboration tools permit the formation of high-performance agile teams from a wide spectrum of organizations.
These tools must support both top-down, hierarchically organized and directed, center-based teams as well as bottomup, self-organized and directed adhocracies-edge-based
collaboration. These two modes of operation must also be able
to interoperate: center-edge coexistence. (Popp et al., 2004,
p. 40)
Generally speaking, there is a need t o develop more agile multisource intelligence capability, which would include making greater use
of open source information (e.g., from the World Wide Web) and also
more use of unclassified lookers,business travelers, NGO (nongovernmental organizations) employees, and others, whose eyes and ears could
be used in the harvesting of information and insights on specific countries, regions, or subjects. These and other ideas have been explored in
detail by Treverton (2001), although the case for open source intelligence
(making better use of unclassified information in the public domain) and
also citizen intelligence has been made persistently and cogently by
Steele (ZOOO), and also more recently by Barlow (2002).
the CIA of a government-initiated inquiry into the efficacy of its intelligence gathering and analysis capability.
Although networks may offer certain inbuilt advantages over other
forms of organizational design, as Castells (2000) maintains, they are
certainly not indestructible. Fareed Zakaria (2002, p. 4) has tried to
inject some balance into the current debate, noting as follows: Things
are not as bleak as they look. Terrorists today have few substantive
advantages. Their resources are pitiful when compared with the combined power of governments all working together. This point has been
made more recently and generally by the doyen of military historians,
John Keegan (2003, p. 349):
Foreknowledge is no protection against disaster. Even
real-time intelligence is never real enough. Only force finally
counts. As the civilized states begin to chart their way
through the wasteland of a universal war on terrorism without foreseeable end, may their warriors shorten their swords.
Intelligence can sharpen their gaze. The ability to strike sure
will remain the best protection against the cloud of unknowing, prejudice and ignorance that threatens the laws of
enlightenment.
But there is more to it than that. Zakaria goes on to quote (2002, p.
44) Edward Luttwak, who makes the perhaps obvious but all too easily
overlooked point that the terrorists are a t an inherent disadvantage.
Every time they attack they emerge. So you hunt them down, find them
and kill them. In other words, every terrorist action is a possible window into the network, or at least into the workings of a particular cell or
node, which, of course, is precisely the reason why both military and
covert intelligence forces are keen to stimulate reactions; to force terrorists to show their faces, both literally and figuratively (e.g., Vistica,
2004). The challenge for intelligence analysts is to construct from the
meticulous collection and examination of fragmentary evidence a viable
picture of the networks overarching organizational structure and the
important nodes. One way of doing this is to use and adapt techniques
developed by social network analysts (e.g., Krebs, 2002; Stewart, 2001b).
Formal network theory is now beginning to inform our understanding of
how terrorist networks organize themselves. According to Albert-Laszlo
Barabasi (2003, p. 2231, even if Mohammad Atta had been taken out, the
hijacker cell would not have been crippled:
Many suspect that the structure of the cell involved in the
September 11 attack characterizes the whole terrorist organization. Because of its distributed self-organized topology, Al
Qaeda is so scattered and self-sustaining that even the elimination of Osama bin Laden and his closest deputies would
deeper theoretical appreciation of the structural characteristics and evolutionary dynamics of social networks: understanding the enemys
strengths and vulnerabilities is, after all, a prerequisite of effective
engagement, whether the battlefield is physical or virtual.
But, as we know, Al Qaeda is quick to learn. It has its own intelligence
network and counterintelligence capability. Its operatives are deep
inside enemy targets, security, and intelligence forces, as the assassination of Egypts Anwar al-Sadat in 1981 and multiple attempts on Egypts
President Hosni Mubarak in 1995 and on Pakistans President Pervez
Musharraf in late 2003 convincingly demonstrate. Al Qaeda listens and
watches as national security and military forces adapt themselves to
deal with a new kind of enemy, and the terrorists, in turn, make organizational and procedural adaptations in light of what they learn from
open sources, their operational failures, and their own agents. The battle is as much a battle of minds and ideas as of bombs and bullets: Think
of it as a perpetual dialectic (or as a high stakes game of poker) as each
side tries to pull and remain one step ahead of the other.
ICTs play in contemporary warfare (and also provided us with a new lexicon: netcentric warfare, digital warfare, postmodern war, meta-war,
strategic information warfare, softwar, etc. [e.g., Adams, 1998; Cronin,
2001; de Landa, 1991; C. H. Gray, 1997; Molander et al., 1996; Rattray,
20011). As the invasions of both Afghanistan and Iraq have demonstrated, brute force, when augmented with high-technology, precisionguided weapon systems, and intelligence-based battlespace planning,
makes for a lethal combination. The RMA has challenged established
theories about the conduct of war within the curricula of the nations
war colleges and also among the armed services top brass (e.g., Libicki,
1995).
Antipathy in some quarters toward the new thinking, which places
greater emphasis on intelligence; digital technologies; smaller, nimbler,
and more flexible fighting units; aggressive deployment of special forces;
and the like, has been both predictable and dogged. But recent U.S. military successes around the globe (whether or not credible cases of j u s ad
bellum, or, for that matter, evidence of sage foreign policy) and the growing terrorist threat suggest that the proponents of force transformation will eventually prevail. Military might and muscle will indubitably
still matter, but the enemy-to use the terminology associated with
Fourth Generation Warfare (4GW)-will resort to neither massed firepower nor massed manpower:
It will be nonlinear, possibly to the point of having no
definable battlefields or fronts. The distinction between
If an enormous bureaucracy such as the U.S. military can accommodate large-scale conceptual and organizational reengineering, albeit
grudgingly, to deal with the threat of post-Clausewitzian wars (J. Gray,
2003, p. 73), there is no logical reason why the same should not hold for
the intelligence community, the best efforts of the gorillas in the
stovepipes-the various agency directors (Johnson, 2003, p. 643)notwithstanding. What James Bamford (2002a, p. 650) said of the NSA,
come to make some critical trade-offs and adaptations to the new reality
without in the process abandoning proven and necessary elements of the
dominant organizational form. The alternative, in the language of
Berkowitz and Goodman (2000, p. 166), is likely to be reform by catastrophe.
There might also be several lessons for information science in the
foregoing summary or continuing narrative of intelligence, terrorism,
and national security. A reading of recent events might raise questions
about the focus and foundations of information science research, broadly
construed, which has typically been oriented to systems user satisfaction
approaches, with an emphasis on information storage and retrieval,
information user profiling and usage patterns, bibliometrics, and the
like. Have developments in information science and technology served
largely to reinforce some of the shortcomings addressed here, such as
bureaucratic rigidity, the creation of information fiefdoms and hoarding,
relevance filtering, preferences for data collecting rather than dissemination, false feelings of security or outright arrogance, risk aversion,
inward-directedness, and inappropriate secrecy? It seems that the
nascent, and frankly still fuzzy, field of social informatics (e.g., Kling,
ZOOO), augmented with cultural anthropology might at least partially
provide a platform for reformed intelligence and information gathering
and processing t o deal with the widespread and still incipient global terrorist movement.
Acknowledgments
This chapter grew out of a public lecture, Netcentric Terrorism, originally delivered in May 2003 a t St. Anthonys College, University of
Oxford, as part of the Trinity term seminar series, Intelligence Services
in the Modern World. An updated version was presented at Napier
University, Edinburgh, in November 2003. Feedback received at both
events is gratefully acknowledged, as are the many helpful comments of
Elisabeth Davenport, Glynn Harmon, Kathryn La Barre, Major Craig
Normand (US. Army), Alice Robbin, Yvonne Rogers, and Debora Shaw.
References
Adams, J. (1998). The next world war: Computers are the weapons and the front line is everywhere. New York Simon & Schuster.
Allen-Mills, T., Fielding, N., & Leppard, D. (2004, January 11). Database duel lets terrorists through. The Sunday Times, 10.
Armanios, F. (2003). Islamic religious schools, Madrasas: Background. CRS Report for
Congress. October 29, 2003. Retrieved January 24, 2004, from http://www.dec.
org/pdf_docs/FCAAB 157.pdf
Arquilla, J., & Ronfeldt, D. (1996). The advent of netwar. Santa Monica, C A RAND.
Arquilla, J., & Ronfeldt, D. (2001a). The advent of netwar (revisited). In J . Arquilla & D.
Ronfeldt (Eds.), Networks and netwars: The future of terror, crime, and militancy (pp.
1-25). Santa Monica, C A RAND.
Arquilla, J., & Ronfeldt, D. (2001b). Afterword (September 2001): The sharpening fight for
the future. In J . Arquilla & D. Ronfeldt (Eds.), Networks and netwars: The future of terror, crime, and militancy (pp. 363-371). Santa Monica, CA. RAND.
Arquilla, J., & Ronfeldt, D. (Eds.). (2001~).Networks and netwars: The future of terror,
crime, and militancy. Santa Monica, C A RAND.
Baer, R. (2002). See no evil: The true story of a ground soldier in the CIAS war on terrorism.
New York: Crown.
Bamford, J . (2002a). Body of secrets: Anatomy of the ultra-secret National Security Agency.
New York: Anchor Books.
Bamford, J . (2002b, September 8). Eyes in the sky, ears to the wall, and still wanting. The
New York Times, 5.
Barabasi, A,-L. (2003). Linked: How everything is connected to everything else and what it
means for business, science, and everyday life. New York: Plume.
Barlow, J. P. (2002, October 7). Why spy? Forbes ASAP, 4 2 4 7 .
Barry, J., & Hosenball, M. (2004a, February 16). The tale of the lying defector. Newsweek,
34.
Barry, J., & Hosenball, M. (2004b, February 9). What went wrong. Newsweek, 24-31.
Baum, D. (2003, February). This gun for hire. Wired. Retrieved January 23, 2004, from
http://www.wired.comlwired/archive/ll.02/~nhire.html
Beetham, D. (1991). Models of bureaucracy. In G. Thompson, J . Frances, R. Levacic, & J.
Mitchell (Eds.), Markets, hierarchies and networks: The coordination of social life (pp.
128-140). London: Sage.
Benjamin, D., & Simon, S. (2002). The age of sacred terror. New York: Random House.
Bergen, P. (2001). Holy war: Inside the secret world of Osama bin Laden. New York: Free
Press.
Bergen, P. L. (2002). Picking up the pieces. What we can learn from-and about-9/11,
Foreign Affairs, 81(2), 169-175.
Berkowitz, B. (2003). Failing to keep up with the information revolution. Studies in
Intelligence, 47(I). Retrieved January 26, 2004, from http:/lwww.cia.gov/csiktudies/
vol47nol/articleO7.html
Berkowitz, B. D., & Goodman, A. E. (2000). Best truth: Intelligence in the information age.
New Haven, C T Yale University Press.
Berrigan, F. (2001, February). The ugly American problem in Colombia. Foreign Policy i n
Focus. Retrieved January 26, 2004, from http://www.fpif.org/pd~gac/O102colombia.pdf
Bodansky, Y. (2001).Bin Laden: The man who declared war on America. New York: Random
House.
Bruner, J. (2002). Making stories: Law, literature, life. New York: Farrar, Straus & Giroux.
Burke, J. (2004). Al-Qaeda: Casting a shadow of terror. London: I. B. Tauris.
Campen, A. D., Dearth, D. H., & Goodden, R. T. (Eds.). (1996). Cyberwar: Security, strategy
and conflict in the information age. Fairfax, V A AFCEA International Press.
Carothers, T. (2003). Promoting democracy and fighting terror. Foreign Affairs, 82(1),
84-97.
Castells, M. (2000). The rise of the network society (2nd ed.). Oxford, U K Blackwell.
Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W., & Schroeder, J . (2003). Coplink: Managing
law enforcement data and knowledge. Communications ofthe A C M , 46(1), 28-34.
Chomsky, N. (1988). The culture ofterrorism. Boston: South End Press.
Chossudovsky, M. (2002). War and globalisation: The truth behind September 11. Shanty
Bay, Ontario: Global Outlook.
Clarke, R. A. (2004). Against all enemies: Inside Americas war on terror. New York: Free
Press.
Coffman, T., Greenblatt, S., & Marcus, S. (2004). Graph-based technologies for intelligence
analysis. Communications of the A C M , 47(3), 45-47.
Gunaratna, R. (2002). Inside A1 Qaeda: Global network of terror: New York: Columbia
University Press.
Gunaratna, R. (2003a). Al-Qaedas trajectory in 2003. Retrieved January 23, 2004, from
http://www.ntu.edu.sg/idss/Perspective/research_050303.htm
Gunaratna, R. (2003b, February 14). Cooking for terrorists. The Times Higher Education
Supplement, 20-21.
Hammond, T.H. (1986). Agenda control, organizational structure, and bureaucratic politics.
American Journal of Political Science, 30(2), 379-420.
Hammond, T. H. (1993). Toward a general theory of hierarchy: Books, bureaucrats, basketball tournaments, and the administrative structure of the nation-state. Journal of
Public Administration Research and Theory, 3(1), 120-145.
Hammond, T. H., & Miller, G. (1985). A social choice perspective on expertise and authority
in bureaucracy. American Journal of Political Science, 29(1), 1-28.
Harmon, G. (2002).Aircraft delivery platforms for biological attack: Systems for prevention,
detection and countermeasures. Proceedings of B T R 2002: Unified Science and
Technology for Reducing Biological Threats and Countering Terrorism, 215-223.
Harmon, G. (in press). Predicting major terrorist attacks: An exploratory analysis of predecessor event intervals in timelines. Proceedings of B T R 2003: Unified Science and
Technology for Reducing Biological Threats and Countering Terrorism.
Herman, M. (1998). Where hath our intelligence been? The revolution in military affairs.
RUSI Journal, 143(6), 62-68.
Herman, M. (2001). Intelligence services in the information age: Theory and practice.
London: Cass.
Herman, M. (2002). 11September: Legitimizing intelligence? International Relations, 16(2),
227-24 1.
Hirsch, M.(2002). Bush and the world. Foreign Aflairs, 81(5), 18-43.
Hirsch, M. (2004, February 2). Blood & honor. Newsweek, 38-40.
Hitz, F. P., & Weiss, B. J . (2004). Helping the CIA and FBI connect the dots in the war on
terror. International Journal of Intelligence and Counterintelligence, 17(1), 1-41.
Holton, G. (2002, February 4). Reflections on modern terrorism. Edge, 97. Retrieved
January 27,2004, from http://www.edge.org/3rd_culture/holton/holton~p6.html
Hudson, R. A. (2002). Who becomes a terrorist and why: The 1999 government report on profiling terrorists. Guilford, CT The Lyons Press.
Huntington, S. P. (1999). The lonely superpower. Foreign Affairs, 78(2), 3 5 4 9 .
Hutchins, E. (1995). Cognition in the wild. Cambridge, MA: MIT Press.
Ignatieff, M. (2003). The ethics of emergency. Lecture four in the Gifford Lectures 2003104,
The lesser euil: Political ethics i n a n age of terror. Edinburgh, U K The University of
Edinburgh. Retrieved January 19, 2004, from http://www.facultyoffice.arts.ed.ac.uk/
Giffordgifford-lectures. htm
Isenberg, D. (2002, November 5). P20G allows Pentagon to fight dirty. Asia Times.
Retrieved January 21, 2004, from http://www.atimes.com/atimes/Middle-East/
DK05Ak02.html
Isikoff, M. (2003, June 2). Censoring the report about 9-11? Newsweek, 8.
Isikoff, M. (2004, February 16). A new fight over secret 9/11 docs. Newsweek, 5.
Jacoby, L. E. (2003). Global threat. Statement for the record. Senate Select Committee on
Intelligence, 11 February. Retrieved January 15, 2004, from http://www.nti.org/eresearch/official~docs/dod2003/dod021103.pdf
Johnson, L. K. (2000). The DCI vs the eight-hundred-pound gorilla. International Journal
of Intelligence and Counterintelligence, 13(1),35-48.
Johnson, L.K.(2003). Preface to a theory of strategic intelligence. International Journal of
Intelligence and Counterintelligence, 16(4), 638-663.
Ouchi, W. (1980). Markets, bureaucracies and clans. Administrative Science Quarterly, 25,
124-141.
Popp, R., Armour, T., Senator, T., & Numrych, K. (2004). Countering terrorism through
information technology. Communications of the ACM, 47(3), 36-43.
Ranstorp, M. (2002, September 8). Quoted in: D. Frantz. Learning to spy with allies. The
New York Times, Section 4: 1, 7.
Rattray, G. R. (2001). Strategic warfare in cyberspace. Cambridge, MA: MIT Press.
Rheingold, H. (2002). Smart mobs; The next social reuolution. New York Perseus Books.
Richelson, J . T. (1999). The U.S. intelligence community (4th ed.). Boulder, CO: Westfield.
Riebling, M. (1994). Wedge: The secret war between the FBI and CIA. New York Knopf.
Risen, J., & Johnston, D. (2002, September 8). Not much has changed in a system that
failed. The New York Times, Section 4: 1, 7.
Roach, A,, & Omerod, P. (2002, June 13). Get medieval with al-Qaida. The Times Higher
Education Supplement, 21.
Ronfeldt, D., & Arquilla, J. (2001). What next for networks and netwars? In J. Arquilla &
D. Ronfeldt. (Eds.),Networks and netwars: The future of terror, crime, and militancy (pp.
311-361). Santa Monica, CA. RAND.
Rowley, C. (2002). Memo to FBI director Robert Mueller. Retrieved January 24,2004, from
http://www.time.comltime/covers/llOlO2O6O3/memo.html
Rumsfeld, D. H. (2002). Transforming the military. Foreign Affairs,81(3), 20-32.
Schwartau, W. (Ed.). (1996). Information warfare: Protecting your personal security in the
electronic age. New York Thunders Mouth Press.
Scott, W. B., & Hughes, D. (2003, January 27). Nascent net-centric war gains Pentagon toehold. Aviation Week & Space Technology, 50.
Scruton, R. (2002, Fall). The political problem of Islam. The Intercollegiate Reuiew, 3-15.
Senge, P. (1990). The fifth discipline: The art and practice ofthe learning organization. New
York: Doubleday.
Shachtman, N. (2004, February). The bastard children of Total Information Awareness.
Wired, 26.
Shelby, R. C. (2002). September 11 and the imperative of reform in the U.S. intelligence community. Additional Views of Senator Richard C. Shelby Vice Chairman, Senate Select
Committee on Intelligence. Retrieved January 15, 2004, from http://intelligence.senate.gov/shelby.pdf
Sigurdson, J., & Tlgerud, Y. (1992). (Eds.). The intelligent corporation: The privatisation of
intelligence. London: Taylor Graham.
Silke. A. (2003a). Profiling terror. Police Review. Retrieved January 26, 2004, from
http://www,ianes.com/security/law_enforcement/news/pr/prO30807~l~n.shtml
Silke, A. (2003b). Terrorists, victims and society: Psychological perspectiues on terrorism and
its consequences. New York: Wiley.
Steele, R. D. (2000). Possible presidential intelligence initiatives. International Journal of
Intelligence and Counterintelligence, 13(4), 409-423.
Steele, R. D. (2002).Crafting intelligence in the aftermath of disaster. International Journal
of Intelligence and Counterintelligence, 15(2), 161-178.
Stern, J . (2003, July/August). The protean enemy. Foreign Affairs. Retrieved January 26,
2004, from http://www.foreignaffairs.org/20030701faessay15403/jessica-ste~the-protean-enemy.htm1
Stewart, T. A. (2001a). Americas secret weapon. Business 2.0. %lo), 54-63.
Stewart, T. A. (2001b). Six degrees of Mohamed Atta. Business 2.0.2(10), 63.
Still out there. (2004, January 10). The Economist, 9-10,
Stone, D. (2002). Policy paradox: The art ofpolitical decision making (Rev. ed.). New York:
Norton.
Strickland, L. S., & Willard, J . (2002a). Re-engineering the immigration system: A case for
data mining and information assurance to enhance homeland security. Part I:
Identifying the current problems. Bulletin of the American Society for Informution
Science and Technology, 2911). 16-21.
Strickland, L. S., & Willard, J . (2002b). Re-engineering the immigration system: A case for
data mining and information assurance to enhance homeland security. Part 11: Where
do we go from here? Bulletin of the American Society for Information Science and
Technology, 29(1), 22-26.
Taylor, P. (2004, February 10). The secret war against al-Qaeda. BBC News Magazine.
Retrieved February 10, 2004, from http://news.bbc.co.uWl/hi/magazine/3476121.stm
Tenet, G. J . (2004, February 5). Iraq and weapons of mass destruction. Retrieved February
11, 2004, from http://www.cia.gov/cia/public~affairs/speeches/2004/tenet~eorgetownspeech~02052004.html
Thomas, H. (2002, December 16). Assigning blame for 9/11 not so easy. Retrieved January
25, 2004, from http://www.wesh.comihelenthomas/l84ll7O/detail.html
Thomas, S. T. (1999). The CIAS bureaucratic dimensions. International Journal of
Intelligence and Counterintelligence, 12(4), 399413.
Thomas, T. L. (2003, spring). Al Qaeda and the Internet: The danger of cyberplanning.
Parameters, 112-123.
Thompson, G., Frances, J., Levacic, R., & Mitchell, J. (Eds.). (1991). Markets, hierarchies
and networks: The co-ordination of social life. London: Sage.
Todd, P., & Bloch, J . (2003). Global intelligence: The worlds secret services today. London:
Zed Books.
Toffler, A., & Toffler, H. (1993). War and antiwar: Survival at the dawn of the 21st century.
Boston: Little, Brown.
Toobin, J. (2004, February 9). Inside the wire. New Yorker, 36-41.
Treverton, G. F. (2001). Reshaping national intelligence for a n age of information.
Cambridge, U K Cambridge University Press.
U.S. Commission on National Security/Zlst Century. (2001).Road Map for National
Security: Imperative for Change. Retrieved January 24, 2004, from http://www.nssg.
govPhase 1IIFR.pdf
U.S. Senate. Select Committee on Intelligence, & U.S. House of Representatives.
Permanent Select Committee on Intelligence. (2002). Joint inquiry into intelligence community activities before and after the terrorist attacks of September 11, 2001.