Philip H. J. Davies, Kristian C. Gustafson Intelligence Elsewhere Spies and Espionage Outside The Anglosphere
Philip H. J. Davies, Kristian C. Gustafson Intelligence Elsewhere Spies and Espionage Outside The Anglosphere
Philip H. J. Davies, Kristian C. Gustafson Intelligence Elsewhere Spies and Espionage Outside The Anglosphere
PHILIP H. J. DAVIES
and
KRISTIAN C. GUSTAFSON
Editors
䡬
⬁ This book is printed on acid-free paper meeting the requirements of the American
National Standard for Permanence in Paper for Printed Library Materials.
15 14 13 9 8 7 6 5 4 3 2 First printing
CONTENTS
Contributors 299
Index 303
PART I
I
n the decades since Christopher Andrew and David Dilks resurrected Sir
Alexander Cadogan’s description of intelligence as the ‘‘missing dimension
of diplomatic history,’’ scholars of intelligence have themselves been uncov-
ering assorted additional absent axes within the study of intelligence.1 Indeed,
there are moments when intelligence scholars begin to feel a little like quantum
physicists who find themselves wrestling with the idea of large numbers of dif-
ferent dimensions curled up, or ‘‘compactified,’’ in normal, three-dimensional
space.2 Among the compactified dimensions that have begun to unravel under
scrutiny are questions of organizational structure and behavior, cultural analy-
sis,3 and even foreign language competency.4 All these approaches have been
found wanting in a field dominated by historical study on one side of the Atlan-
tic and normative political and policy analysis on the other. This should come
as no surprise in a comparatively newborn field of study. Before the 1960s intel-
ligence and related activities such as covert action and protective security pol-
icy were so shrouded by strong formal and informally constituted rules of secrecy
that the necessary evidence base for intelligence studies simply did not exist.5
There was also a sense that the underhanded nature of espionage meant that
intelligence was not quite a respectable sphere of study for academics. However,
/ 3 /
4 / Philip H. J. Davies and Kristian C. Gustafson
there has since been a sea change both in the availability of information and in
perceptions of the need to have a scholarly understanding of intelligence—
accelerated in recent years by events such as the September 11, 2001, terrorist
attacks on the United States and the furors over the role of intelligence in the
US decision to invade Iraq in 2003.
One of the compactified dimensions of the study of intelligence that still
needs to be properly examined (and that actually entails many different axes of
inquiry in its own right) is the comparative analysis of intelligence institutions
and processes in government. Comparative politics is, of course, a well-
established field. And the tools and conventions of overall comparative analysis
have been clearly articulated. But they have yet to be applied really vigorously
and systematically to the cross-national study of intelligence. Comparative
investigation has been widely advocated since the 1980s, but very little actual
in-depth, systematic comparative work has been undertaken.6 And yet compar-
ative analysis is one of the most powerful methodological tools available in the
contemporary social science arsenal.
Comparison as Protection
There is, to be sure, a tendency to view comparative methods as being mainly
a protection against the limitations of stand-alone cases. Scholars are fond of
invoking comparative analysis as a protection against ‘‘ethnocentrism.’’7 But
the idea of ethnocentrism is not particularly transparent, and it can all too
easily carry with it the pejorative suggestion of chauvinism rather than a merely
limitedly parochial perspective. In practical terms the main problem with exam-
ining cases in isolation rather than comparatively is that it can induce two
alternative but complementary optical illusions regarding the case at hand. It
is, for example, all too easy to approach a case with the conviction that it is
somehow unique and then develop a characterization of that case that suppos-
edly identifies distinctive features that are actually not unique at all. By the
same token, it is all too easy for one to assume that the way things are done in
one’s own community or context represents inherent criteria for the task that
must be echoed in every instance. This is perhaps the classic sense of ethnocen-
trism, but it might more usefully be thought of as the illusion of universality.
Thus one finds accounts of the US machinery of government built on organiza-
tional politics, and neoinstitutional paradigms of internecine organizational
relations,8 that take that internecine nature as not merely universal but also as
intrinsic to institutional processes.9 The problem here is that these approaches
work very well for poorly coordinated systems but fail entirely to account for
more orderly and integrated governmental machineries such as the UK central
government.10
An Agenda for the Comparative Study of Intelligence / 5
At the same time, one can find attempts to articulate phenomena that are
putatively particular or unique, such as Michael Turner’s 2002 effort to ar-
ticulate a distinctive US intelligence identity or culture. Among the distinctive
features of the American approach to intelligence are an emphasis on secrecy,
‘‘intelligence exceptionalism’’ (the idea that intelligence is a different order of
information from other sources), the separation of intelligence and law enforce-
ment, a multiagency ‘‘confederal structure,’’ the separation of intelligence from
policy, its role in policy support, debates over the merits of in-depth analysis as
against the demands of current intelligence, and the provision of ‘‘accurately,
timely and relevant intelligence’’ as among the distinguishing features of US
intelligence. Although other elements of Turner’s model—such as the ‘‘pri-
macy’’ of analysis (i.e., the broad as opposed to narrow view of intelligence that
will feature throughout this volume), competitive intelligence, and the so-
called can-do attitude—might be more pronounced in America than elsewhere,
the rest are pretty uniform to the intelligence communities of all the Anglo-
American liberal democracies. Certainly they are just as true of the United
Kingdom as they are of the United States. Though they may indeed be charac-
teristics of the US system, they are hardly particular to it; they are not actually
distinctive.11 Consequently, some sort of comparative effort is required to test
whether an issue is common or purely localized.
Comparison as Diagnostic
However, comparative analysis can do more. It can help articulate judgments
of degree in qualitative matters where articulating quantitative metrics may be
intractable for various reasons. In the absence of an absolute cardinal measure
of, say, more or less effective interagency coordination, one can make an ordinal
judgment that this case is more well ordered than that one and then set about
identifying variations between them and the relevance and consequences of
these variations. Indeed, this is the strength of the fundamental logic of the
comparative method that was originally articulated by John Stuart Mill in the
nineteenth century, in particular his notion of arguments from difference and
from similarity—in other words, taking two outwardly similar cases with a dif-
ferent outcome and then asking what drives them apart, or taking two different
cases with similar outcomes and seeking to understand what drives them
together.
It can be very useful to visualize comparative analysis in this role as being
loosely analogous to resolving multiple parallel equations in algebra. In algebra
one arranges the assorted equations with their shared variables in a common
order and then performs some elementary arithmetic manipulations to one by
one eliminate variables from expressions on the left hand side of the system
until one is left with one value for the remaining variable. In principle the
6 / Philip H. J. Davies and Kristian C. Gustafson
methods of similarity and difference are likewise also about eliminating vari-
ables. Where one has similar cases with different outcomes, one is in the busi-
ness of knocking out features that the cases have in common in order to be left
with those points of difference, some or all of which may drive the cases to
different outcomes. Conversely, one may eliminate differences between a num-
ber of cases to identify those properties that they share, some or all of which
drive them to a common outcome. Unfortunately, like most social science, such
logical strategies are not much more than heuristic in practice and are virtually
impossible to apply with the same rigor as in mathematics. Part of the problem
is that parallel equations are only resolvable when one has at least the same
number of equations as variables; otherwise, one is left with an ineradicable
residual uncertainty in the need to express at least some variables in terms of
other variables. And the real-world, comparative study of humanity is actually
always a situation where the number of potential variables in society and histor-
ical events exceeds the number of possible cases for which one could even
realistically hope.
To make matters worse, the ‘‘variables’’ in social sciences—such as political,
economic, physical, and personal impact—are not what mathematicians call
countable. That is, they cannot be treated as wholly separate, individually dis-
crete items. Instead they all have overlapping, fuzzy edges (and often fuzzy cen-
ters), where economic matters are also inherently political ones, the conduct of
individual personalities is inextricable from their institutionalized background
expectations and worldviews, and so on. As a result, even cataloguing the vari-
ables or factors one is trying to eliminate or include is a pretty rough-and-
ready affair and could entirely be reasonably articulated very differently from
an alternative analytical point of view. In principle, however, like alternative
mathematical solutions to a common problem (e.g., using algebra, matrices, or
integral calculus to solve a rectangular volume), those alternative articulations
should be at least homomorphic; the terminology may differ, and the workings
on paper vary, but the essential shape of the answer one reaches is logically
equivalent even if rhetorically seemingly far removed. Like Marxist concepts of
‘‘ideology’’ and ‘‘material forces’’ or ‘‘superstructure’’ and ‘‘base’’ placed along-
side functionalist notions like Talcott Parsons’s duality of ‘‘norms’’ and ‘‘condi-
tions’’ (in his earlier formulations12) or ‘‘information’’ and ‘‘energy’’ in later
expressions, there is actually a common underlying and basic idea of how the
world works, despite variations in normative perspective (consequently, much
theoretical debate involves thinkers actually and regrettably talking past one
another).13 And so, at some level, articulating a consistent framework for analy-
sis is almost more important than which framework one employs. And in a field
like comparative analysis, where trying to step outside the bounds of parochial
viewpoints is one of the principal goals, this is a natural point of departure.
An Agenda for the Comparative Study of Intelligence / 7
the user. If used in this fashion, the core functions paradigm should constitute
a case of the optical illusion of universality discussed above, because it is not
about uprooting one particular parochial institutional practice and finding par-
allels elsewhere; it is about basic functional tasks that can be chopped, changed,
and redistributed, but without which intelligence, however organized and insti-
tutionalized, cannot happen.
There may be cross-connections and feedback loops between the functions
of intelligence, with raw reports being presented hurriedly to national leaders
or analysts telling the collectors what they need to know and what needs to be
collected to make their appreciations sound. But the essential logical steps do
not simply evaporate; like dividing oncoming traffic into separate lanes or even
ensuring that the road surface is reasonably flat and smooth, they are basic
requirements of the task at hand. And of course the core functions of intelli-
gence may be performed more or less efficiently or competently, and sometimes
(like maintaining proper road surfaces or actually obeying the highway code)
may not happen at all. The presence, absence, or adequacy will have palpable
consequences—the policy and operational equivalents of road mortality rates.
Within these core logical functions there are likewise similar tasks: Informa-
tion must be acquired from sources, exfiltrated, evaluated for both truthfulness
and content if true; fragmentary reporting must be collated, and its net meaning
and implications must be identified. Any nation operating surveillance satellites
must cope with common technological and procedural processes; and any
nation trying to break codes must grapple with similar technical and managerial
challenges. All these activities must be managed institutionally, paid for one
way or another, and somehow fit into wider machineries of government or
governance—whether as subordinate gofers providing information support to
the decisions of others in Anglo-American liberal democracies or as Soviet-
style underpinning architectures of social control and political order in what
John Dziak has called ‘‘counterintelligence states.’’15 In the last analysis, there-
fore, one of the virtues of the study of intelligence is that it often provides
common axes of comparison between outwardly diverse individual cases.
Prophet Muhammad, and the early caliphs, has impressed the current practice
of intelligence in the Arab and Muslim world. Assumptions have always been
that Arab countries’ practice reflected that of their Soviet or American advis-
ers, but Al-Asmari makes a compelling case for indigenous origins.
To open part III, in chapter 7 Robert Johnson undertakes a fascinating
examination of Inter-Services Intelligence’s enigmatic role within the Pakistani
state. In chapter 8 Carl Anthony Wege, an experienced analyst on Iran and on
terrorist issues, shows us how Tehran’s intelligence bureaucracies and various
clerical factions have become pillars of the Islamic Republic of Iran, which ties
back to Al-Asmari’s discussion of the Islamic practice of intelligence. In chap-
ter 9 the volume continues its tour around the world, as Peter Gill and Lee
Wilson tackle security-sector reform in postauthoritarian Indonesia. Then, in
chapter 10, Ken Kotani of the Japanese Defense Ministry discusses the place of
intelligence within Japan’s self-defense forces and their problems adapting to
new challenges. In chapter 11 Emmanuel Kwesi Aning, Emma Birikorang, and
Ernest Ansah Lartey of the Kofi Annan Peacekeeping Centre in Accra cover
the development of intelligence culture in Ghana, one of Africa’s most stable
states, in a postcolonial context. In chapter 12 Eduardo Estévez discusses the
increasingly stable intelligence culture in postdictatorship Argentina. In chap-
ter 13 the Swedish scholar Wilhelm Agrell shows how, despite his nation’s
strong bureaucratic tradition and socialist tendencies, its intelligence structure
has remained remarkably independent and powerful in comparison with those
of other modern states. And in chapter 14, the Finnish researcher Lauri Holm-
ström shows that though still European, Finland’s intelligence practices differ
greatly from those of other Western countries; he does so by looking at the
Finnish Security Service, and at how protection from economic espionage has
become a matter of national security concern. The book concludes with part
IV, consisting of chapter 15, which discusses the legacies, identities, improvisa-
tion, and innovations of intelligence.
As a final point, the editors note that this volume would not have been
possible without the support of a seminar series grant (RES-451–26–0480) from
the United Kingdom’s Economic and Social Sciences Research Council, which
funded the original workshop at which a number of the papers that now make
up this book were originally presented.
Notes
1. Christopher Andrew and David Dilks, The Missing Dimension: Government and Intelli-
gence in the 20th Century (London: Macmillan, 1984), 1.
2. See, e.g., Philip H. J. Davies, ‘‘The Missing Dimension’s Missing Dimension,’’ Public
Policy and Administration 25, no. 1 (January 2010). However, the ‘‘organization piece’’ can be
traced back much further, to the beginnings of contemporary intelligence studies in the mid-
1960s and to Harold Wilensky, Organizational Intelligence (New York: Basic Books, 1967).
An Agenda for the Comparative Study of Intelligence / 11
3. The culture issue became an active area of discussion in early 2000s with three schol-
ars articulating broadly similar approaches and ideas entirely independently of one another.
See Philip Murphy, ‘‘Creating a Commonwealth Intelligence Culture: The View from Cen-
tral Africa 1945–1960,’’ Intelligence and National Security 17, no. 3 (Summer 2002); Philip
H. J. Davies, ‘‘Ideas of Intelligence: Divergent National Concepts and Institutions,’’ Harvard
International Review 24, no. 3 (Fall 2002); and Michael Turner, ‘‘A Distinctive US Intelli-
gence Identity,’’ International Journal of Intelligence and Counterintelligence 17, no. 1 (January
2004). Also, however, a substantial earlier contribution was made by H. Bradford Westerfield,
‘‘American Exceptionalism and American Intelligence,’’ Freedom Review 28, no. 2 (Summer
1997).
4. Hilary Footitt, ‘‘Another Missing Dimension? Foreign Languages in World War II
Intelligence,’’ Intelligence and National Security 25, no. 3 (June 2010).
5. The secrecy surrounding intelligence was often as much a function of consensual
taboos as official secrets legislation. The 1976 Church Committee final report noted that
the emerging pressure for openness on intelligence resulted in the first instance from the
breakdown of just such a consensus (chiefly because of Vietnam and Watergate); see, e.g.,
Loch K. Johnson, A Season of Inquiry: The Senate Intelligence Investigation (Lexington: Univer-
sity Press of Kentucky, 1985), 11. A somewhat paradoxical comparison is the United King-
dom, where the Official Secrets Act 1911 covered the entirety of Civil Service activity and
the particular concerns about intelligence were little more than a somewhat tenuous special
case; see K. G. Robertson, Public Secrets (London: Macmillan, 1984); and K. G. Robertson,
‘‘The Politics of Secret Intelligence: British and American Practice’’ in British and American
Approaches to Intelligence, edited by K. G. Robertson (London: Macmillan, 1987).
6. See, variously, Angelo Codevilla, ‘‘Comparative Historical Experience of Doctrine
and Organization’’ in Intelligence Requirements for the 1980s: Analysis and Estimates, edited by
Roy Godson (Washington, DC: National Strategy Information Center, 1986; orig. pub.
1980); Adda Bozeman, ‘‘Political Intelligence in Non-Western Societies,’’ in Comparing For-
eign Intelligence, edited by Roy Godson (Washington, DC: National Strategy Information
Center, 1985); Angelo Codevilla, ‘‘Comparative Historical Experience of Doctrine and
Organization,’’ in Intelligence Requirements, ed. Godson; K. G. Robertson, ‘‘Preface,’’ in British
and American Approaches to Intelligence, by K. G. (Ken) Robertson (London: Macmillan,
1987), xii; Kevin M. O’Connell, ‘‘Thinking about Intelligence Comparatively,’’ Brown Jour-
nal of World Affairs 11, no. 1 (Summer–Fall 2004); and Peter Gill, ‘‘Knowing the Self, Know-
ing the Other: The Comparative Analysis of Security Intelligence,’’ in Handbook of
Intelligence Studies, edited by Loch Johnson (London: Routledge, 2009).
7. See, e.g., Mattei Dogan and Dominique Pelassy, How to Compare Nations: Strategies in
Comparative Politics (Chatham, NJ: Chatham House, 1984), 6, 8.
8. In wider defense, the classic illustration of this approach is taken by Graham T. Alli-
son, Essence of Decision: Explaining the Cuban Missile Crisis (New York: HarperCollins, 1971).
In the 1990s Amy Zegart applied the neoinstitutional approach to the Joint Chiefs of Staff,
National Security Council, and Central Intelligence Agency; Amy Zegart, Flawed by Design
(Stanford, CA: Stanford University Press, 1999).
9. That sense of intrinsic conflict is a fundamental approach to the later, neoinstitu-
tional derivatives of the original organizational politics paradigm, such as the ‘‘garbage can
theory’’ articulated by James G. March (a founder of the original organizational politics
model) and Johan P. Olsen; see, e.g., James G. March and Johan P. Olsen, ‘‘The New Institu-
tionalism: Organizational Facts in Political Life,’’ American Political Science Review 78 (1984):
12 / Philip H. J. Davies and Kristian C. Gustafson
734–49. Also see M. D. Cohen, ‘‘A Garbage Can Model of Organizational Choice,’’ Adminis-
trative Science Quarterly 17 (1972).
10. Philip H. J. Davies, ‘‘Intelligence and the Machinery of Government: Conceptualizing
the Intelligence Community,’’ Public Policy and Administration 25, no. 1 (January 2010):
39–40.
11. Turner, ‘‘Distinctive US Intelligence Identity.’’ It is important to stress that the issue
here is not the accuracy of Turner’s account but the suggested particularity of the specific
characterization.
12. Talcott Parsons, The Structure of Social Action (New York: Free Press, 1937).
13. Talcott Parsons and Jackson Toby, eds., The Evolution of Societies (Englewood Cliffs,
NJ: Prentice Hall, 1979).
14. Although the American direction–collection–processing–analysis–dissemination ver-
sion of the intelligence cycle is commonly seen, the distinction between analysis and assess-
ment within a common superclass of ‘‘processing’’ in the NATO version of the cycle is
articulated most explicitly by Lord Butler, Review of Intelligence on Weapons of Mass Destruc-
tion (London: TSO, 2004), 10.
15. John J. Dziak, Chekisty: A History of the KGB (Lexington, MA: Lexington Books,
1985).
CHAPTER 2
Political Culture
Approaches and Prospects
Stephen Welch
T
he idea of ‘‘intelligence culture’’ is not a free-standing invention of intelli-
gence studies but rather is a projection into it of numerous applications of
the concept of culture in the social sciences, most obviously the concept
of ‘‘political culture’’ that has developed primarily (though not exclusively)
within political science. Neither, however, is ‘‘political culture’’ a free-standing
invention of political science; rather, it is the projection into it of wider cur-
rents of thought that have eddied around the concept of culture since it first
began to be used by historians and social philosophers around the time of, and
largely in reaction to, the Enlightenment. In the idea of intelligence culture,
therefore, we find an application of an already applied concept.
It does not, however, follow that one can find out all one needs to know
about the concept of intelligence culture by looking at the concept of political
culture; nor, by the same token, that the history of the uses of the concept of
culture would be a complete guide to the issues surrounding the concept of
political culture in political science. When concepts are transplanted, they
embark on a new phase of growth within their new environment of discipline
or field. At the same time, if the borrowing is anything more than the most
superficial deployment of a portentous phrase, various genetic legacies from the
donor fields will continue to make their presence felt.
/ 13 /
14 / Stephen Welch
All this is by way of situating the task of this chapter, which is to outline
the concept of political culture for the purpose of elucidating that of intelli-
gence culture. It is also by way of acknowledging how presumptuous it would
be to dictate to intelligence studies from the perspective of political science
how it should conduct its business with the new concept, not least because
political science has struggled to define its own applied ‘‘culture’’ concept, polit-
ical culture, in a manner that frees it from its genetic inheritance. It is by no
means a complete guide to the usage of ‘‘intelligence culture’’ to lay out how
political culture has been understood. But nor is it irrelevant; and it is the
premise of this chapter that it may be helpful. And, incidentally, the possibility
that the development of the derivative concept within intelligence studies may
in turn, reciprocally, offer useful cues for thinking about political culture should
not be overlooked.
In this chapter, then, I outline the development and current condition of
political culture research and offer a few words about its prospects. In noting
how the disciplinary setting of political science both inherits and modifies dis-
putes over culture more generally, I imply the same possibilities for the field of
intelligence studies as it works with the new concept of intelligence culture,
possibilities that are further considered in the remaining chapters of this
collection.
the scope of political science to take place without threatening its distinctive-
ness vis-à-vis other disciplines; the survey data become the discipline’s proprie-
tary materials, and it thereby wards off the threat of becoming a branch of any
of the other disciplines, such as anthropology, that claim expertise in the analy-
sis of culture. Thus the concept of political culture was an important resource
in the disciplinary consolidation of political science in the postwar period.
The opposite quarter from which critique of the Almondian paradigm has
been launched finds not a failure to live up to the highest standards of scientific
(particularly quantitative) rigor, but rather an error in aspiring to them in the
first place.
historians who began their rise to prominence in this discipline at about the
same time.16 And his arguments have recently been restated forcefully, though
somewhat forgetfully of their earlier deployment, in a critique of political cul-
ture research by Chabal and Daloz titled Culture Troubles, whose specific critical
target is the Culture Matters book and project mentioned earlier.17 Geertz there-
fore merits closer scrutiny.
In the political culture literature, Geertz’s most often cited essay is ‘‘Thick
Description: Toward an Interpretive Theory of Culture.’’ Probably its most
quoted passages are these: ‘‘Believing, with Max Weber, that man is an animal
suspended in webs of significance he himself has spun, I take culture to be those
webs, and the analysis of it to be therefore not an experimental science in
search of law but an interpretive one in search of meaning.’’ Also: ‘‘Culture is
not a power, something to which social events, behaviors, institutions or proc-
esses can be causally attributed; it is a context, something within which they
can be intelligibly—that is, thickly—described.’’18
From these passages and similar ones in Geertz’s later essays (though not his
earlier ones), one can get a clear idea of to what Geertz objects.19 The Almond-
ian search for the political-cultural variable that can be correlated with out-
comes such as stable democracy—a ‘‘science in search of law’’ that construes
culture as a ‘‘power’’ impeding certain outcomes and promoting others—is
firmly rejected. Indeed, Geertz goes further in a later essay, when he announces:
‘‘Calls for ‘a general theory’ of just about anything social sound increasingly
hollow, and claims to have one megalomanic.’’20 He instead embraces a ‘‘semi-
otic’’ or ‘‘hermeneutic’’ conception of culture. Its implications are stated more
explicitly in his ‘‘Deep Play’’ essay, where he says that his approach ‘‘shifts the
analysis of cultural forms from an endeavor in general parallel to dissecting an
organism, diagnosing a symptom, deciphering a code, or ordering a system . . .
to one in general parallel with penetrating a literary text.’’21
Geertz’s skeptical pronouncements tap into long-standing doubts about the
possibility of a scientific and particularly quantitative grasp of human social life.
These doubts first surfaced when aspirations to create such a science became
prominent around the time of the Enlightenment, when hopes were high that
the progress in natural science exemplified by Isaac Newton could be replicated
in the study of society. Indeed, it was the concept of culture that was a principal
vehicle for the expression of these doubts among anti-Enlightenment, ‘‘roman-
tic,’’ and ‘‘historicist’’ writers. One of these, Johann Gottfried von Herder, was
indeed the first to coin the term ‘‘political culture,’’ which ironically therefore
first appeared as a reaction against the current of thought that was to lead to
Almond’s political culture paradigm.22
Needless to say, this reactive current of thought has gone through many
twists and turns between its emergence in the late eighteenth century and its
expression by Geertz.23 Indeed, the twists have continued; Geertz’s work itself
Political Culture / 19
has been criticized by subsequent anthropological critics who find the concept
of culture to represent all too confident an assertion of the ‘‘readability’’ of the
alien social setting, as if it were a text.24 Little of this complex story seems to
be known to the promoters of Geertz’s position in political science, who despite
their extradisciplinary reach, are perhaps as keen as Almond was to confine
that reach to a narrow range—like his, it is really more of an extradisciplinary
border raid.
This tends to leave Geertz as an unchallenged authority for his followers in
the study of politics. An ‘‘endeavour . . . in general parallel with penetrating a
literary text’’ is, however, in need of considerable further specification when it
is adopted as a method in political science. In Chabal and Daloz’s recent and
forceful restatement of the Geertzian paradigm, the emphasis is recurrently on
‘‘context,’’ understood as semiotic or interpretive context; on discovering what
politics means, how it is understood, in the alien locality, and taking care not
to import alien understandings such as those of Western political science. There
is something salutary in the warning against ‘‘dogmatic theory’’ that these
authors issue, but like Geertz they take an antitheoretical posture too far. As
was noted above, Geertz’s supposition that the anthropologist can achieve a
grasp of the context by immersion in a narrow locality for a prolonged period
has itself been challenged by later anthropological critics; but the difficulty of
achieving such a grasp must be considerably greater when one’s field of study,
as for Chabal and Daloz (and something similar can be said for students of
politics generally), extends to a context as large as that of Sub-Saharan Africa.
In such a case the method must be quite different from ethnographic field-
work. One cannot experience a context as large as a global region or even a
nation-state directly (if indeed one can experience any social context directly),
and it is therefore necessary for the interpreter of culture or political culture on
such a scale to work indirectly.25 What this typically means is drawing on exist-
ing general descriptions such as those of historians, journalists, diplomats, and
so forth. One gets to a Geertzian understanding of social life as a text by literally
reading texts. This is the set of methods previously known by the name of ‘‘area
studies’’—the source, indeed, of the contributions made to political culture and
political development, among other examples of political culture research.26 To
be sure, the practitioner of area studies would, like an ethnographer, need to be
well versed in the area, ideally to have lived there for a time, and to be able to
speak the local language. Opposing universal generalizations would be his or
her stock in trade. But quite wide local generalizations would nevertheless be
made, as expressions of the synoptic grasp that area studies would claim of the
cross-disciplinary range of materials (from history to theology and philology)
upon which it necessarily drew.
In the use of such a method, a large and visible role is played by the interpre-
tive contribution of the analyst. When one speaks of the ‘‘interpretive context’’
20 / Stephen Welch
social field, the field designated ‘‘political.’’ The same is true of concepts such
as ‘‘economic culture,’’ ‘‘policy culture,’’ ‘‘strategic culture,’’ and of course
‘‘intelligence culture.’’30 The narrower these get, the easier it seems to be to
ignore the kinds of questions I have been airing.31 One might, for instance,
think of intelligence culture as a causal factor or variable, without doing any
surveys. Instead, one might draw on existing surveys, or recount in the interpre-
tive style established notions of, for instance, what it means to be British. My
claim, however, is that the problem of the dialectic of culture should not be
ignored, because ultimately it is a challenge to the theoretical adequacy of the
explanations offered.
I do not, however, wish to end here, with a reminder of the contested back-
ground in political culture research from which the idea of intelligence culture
draws, and of the further background shared by all such applied theories of
culture in the dialectical history of this concept itself. Instead, I offer the sug-
gestion that concepts like intelligence culture might offer some resources for
getting beyond the dialectic in ways other than by simply ignoring it or
unthinkingly juxtaposing its alternatives. Perhaps it is not the case that first the
concept of culture must be sorted out, then that of political culture, and finally
the narrower applications such as intelligence culture. Perhaps some enlighten-
ment can flow in the other direction.
I can make this case only very briefly in the space available. The first thing
to notice is the narrowness of the application of the concept of culture that
the idea of intelligence culture represents. This means that when looking at
intelligence culture, one is looking at a very highly delimited field of activity,
so that pretty much unavoidably, one is looking at human behavior quite
closely. To be sure, the special qualities of intelligence as a field of study include
the secrecy that surrounds the production of intelligence, so that intelligence
organizations are not going to be the easiest organizations to study. Still, the
scope of the concept does provide a strong incentive to think of the study in
terms of specific organizational locations.
Here one might make a quick jump to the idea of ‘‘organizational culture’’
as a resource for the study of intelligence culture. This is not of immediate
benefit, however, given that the study of organizational culture itself is riven by
the same disputes that I have been describing in the case of political culture,
even if these are not quite so visible and explicitly stated. There is something
akin to an Almondian paradigm in the work of the influential writer Geert
Hofstede, who employs surveys and points toward the assertion that organiza-
tional behavior in organizations such as the large corporation (IBM) that he
studied is the expression of one of a small set of value orientations that these
surveys reveal.32 But it has received criticism in somewhat Geertzian vein that
‘‘cultures have meanings which depend upon the entire context. No one ele-
ment in that context dictates meaning to the whole.’’33 In turn, this position
22 / Stephen Welch
very idea of an attitude, and therefore treats the method of the attitude survey.
Social psychologists in recent years have developed some interesting arguments,
quite substantially backed up by experimental studies, to suggest that very often
behavior is caused by factors of which the actors are not consciously aware; that
the causes of one’s actions and the motives one can bring to mind as attitudes
when asked to do so are two sets of phenomena running in parallel.35 This
means that surveys reveal not motives—that is, the real causes of behavior—but
rather the prevailing modes of accounting for behavior in the relevant setting.
Such theories of ‘‘dual attitudes’’ or ‘‘automaticity’’ lead one toward a dualistic
understanding of culture, an understanding that recognizes the duality of cul-
ture itself. And a theoretical understanding of the duality of culture is some-
thing very different from a recurrent and unresolved dialectic of approaches to
culture.
The study of intelligence culture, and of other applied forms of cultural
study on this kind of scale, encourages the sort of bottom-up theoretical con-
struction of political culture and culture more generally that I have briefly been
recommending. That is, it need not start with an understanding of a broader
cultural setting and try to read this in a narrower sense—to read intelligence
culture in Britain, for example, as an expression of British cultural values. It
might very well note that these are invoked, in one form or another, in the
accounts that participants give of their organizational practice, particularly
when they are asked to compare their organizational practice with that in agen-
cies elsewhere. It does not follow, however, that these accounts are an adequate
explanation of the continuities and differences that can be observed in practice.
These may have a simpler explanation in skills and habits, and their mutual
coordination, that form the standard operating procedures of the setting. When
these encounter friction or disruptions—as they are likely to when, for instance,
interagency contacts occur—there will be a natural tendency to account for
them in terms of prevailing cultural stereotypes. Depending on what sort of
friction is occurring, these may be stereotypes of, for instance, the ‘‘American
way’’ of thinking; or in other cases of the military mindset as contrasted with
the civilian one. In some cases there will be an incentive for participants to
think of intelligence culture as nationally varying; in others, one would tend to
think of it as a sui generis type of organizational culture (defined, perhaps, by
its vocation of secrecy or its concern with ‘‘national security’’), to be contrasted
with others not so defined. These are differences in accounts; they need not
constitute the actual causes of the observed frictions. Both the accounting and
the behavior of which it is an accounting constitute the dual reality of the
cultural process. Close scrutiny of this process in a narrow, applied context is
the particular advantage that the study of intelligence culture might be able to
realize.
24 / Stephen Welch
Concepts of Culture
To conclude, I outline the principal lines of debate within political science as
to the definition and use of the concept of political culture. This concept is an
application of the broader concept of culture, though the extent to which the
connotations of the broader concept should feed into the narrower one is one
of the main points of controversy. Intelligence culture is, in turn, an application
of the idea of political culture in the specific field of intelligence studies. As in
other applied fields of cultural analysis, such as strategic culture, the extent to
which serious attention is paid to the debates in the donor discipline is likely
to vary. My argument has been, however, that they are indeed relevant, and
problematic, for the new field.
Despite this, and more positively, I have argued that the study of intelligence
culture need not wait upon the unlikely prospect of a resolution of the long-
standing dialectic of cultural analysis. There may be ways, offered by the nar-
rowness of the setting of intelligence culture studies and the close scrutiny it
affords, of thinking differently about culture in this setting. The overt organiza-
tional design, the mission statements and explicit rules, and the everyday justi-
ficatory talk of actors in the intelligence setting are all worthy of study as the
discursive aspects of intelligence culture. So, too, are the operating procedures,
habits, and routines that will always outrun what the rules can encompass.
Whether the participants’ own discursive rendering of these behavioral patterns
emphasizes their national, intelligence, or specific agency characteristics, or
perhaps numerous others, depends on the kind of frictions that arise between
different sets of practices, and the availability of ways of accounting for them.
Such points of friction therefore become exceptionally interesting sites of study.
And in the field of intelligence, with its links to national security, its distinctive
reliance on secret information, and its proliferation of agencies—all in the
context of a perceived global threat that appears to mandate maximum coordi-
nation—such sites are not difficult to find.
Notes
1. Gabriel A. Almond, ‘‘Comparative Political Systems,’’ Journal of Politics 18, no. 3
(August 1956): 391–409, at 396.
2. Gabriel A. Almond and Sidney Verba, The Civic Culture: Political Attitudes and Democ-
racy in Five Nations, abridged ed. (Newbury Park, CA: Sage, 1989; orig. pub. 1963).
3. Gabriel A. Almond, ‘‘Communism and Political Culture Theory,’’ Comparative Politics
15, no. 2 (January 1983): 127–38, at 127.
4. Thomas S. Kuhn, The Structure of Scientific Revolutions, 2nd ed. (Chicago: Chicago
University Press, 1970), 10f.
5. Ronald Inglehart, Modernization and Postmodernization: Cultural, Economic, and Politi-
cal Change in 43 Societies (Princeton, NJ: Princeton University Press, 1997).
Political Culture / 25
6. See, e.g., Frederick J. Fleron Jr., ‘‘Post-Soviet Political Culture in Russia: An Assess-
ment of Recent Empirical Investigations,’’ Europe-Asia Studies 48, no. 2 (March 1996):
225–66.
7. See Lawrence E. Harrison and Samuel P. Huntington, Culture Matters: How Values
Shape Human Progress (New York: Basic Books, 2000). And for a summary, see Lawrence E.
Harrison, The Central Liberal Truth: How Politics Can Change a Culture and Save It from Itself
(Oxford: Oxford University Press, 2006).
8. Raymond Williams, Keywords: A Vocabulary of Culture and Society, rev. ed. (London:
Fontana, 1983), 87.
9. For a sample of these critiques, see William H. Reisinger, ‘‘The Renaissance of a
Rubric: Political Culture as Concept and Theory,’’ International Journal of Public Opinion
Research 7, no. 4 (Winter 1995): 328–52; and Robert W. Jackman and Ross A. Miller, ‘‘A
Renaissance of Political Culture?’’ American Journal of Political Science 40, no. 3 (August
1996): 632–59. For a defense of political culture research against rational choice theory, see
Harry Eckstein, ‘‘A Culturalist Theory of Political Change,’’ American Political Science Review
82, no. 3 (September 1988): 789–804; and Harry Eckstein, ‘‘Culture as a Foundation Con-
cept for the Social Sciences,’’ Journal of Theoretical Politics 8, no. 4 (October 1996): 471–97.
For an attempt to combine political-cultural and rational choice approaches, see Ruth Lane,
‘‘Political Culture: Residual Category or General Theory?’’ Comparative Political Studies 25,
no. 3 (October 1992): 362–87.
10. See Fareed Zakaria and Lee Kuan Yew, ‘‘Culture Is Destiny: A Conversation with Lee
Kuan Yew,’’ Foreign Affairs 73, no. 2 (March–April 1994): 109–26; and Richard Robison,
‘‘The Politics of Asian Values,’’ Pacific Review 9, no. 3 (1996): 309–27.
11. See Stephen Welch, The Concept of Political Culture (London: Macmillan, 1993), 73.
12. Sidney Verba, ‘‘Conclusion: Comparative Political Culture,’’ in Political Culture and
Political Development, edited by Lucian W. Pye and Sidney Verba (Princeton, NJ: Princeton
University Press, 1965), 518.
13. Robert C. Tucker, ‘‘Culture, Political Culture, and Communist Society,’’ Political Sci-
ence Quarterly 88, no. 2 (June 1973): 173–90, at 179.
14. Clifford Geertz, The Interpretation of Cultures (London: Hutchinson, 1975).
15. For discussions of this debate, see Archie Brown, ed., Political Culture and Communist
Studies (London: Macmillan, 1984); and Stephen Welch, ‘‘Issues in the Study of Political
Culture: The Example of Communist Party States (review article),’’ British Journal of Political
Science 17, no. 4 (October 1987): 479–500.
16. William H. Sewell Jr., ‘‘Geertz, Cultural Systems, and History: From Synchrony to
Transformation,’’ Representations 59 (Special Issue: ‘‘The Fate of Culture: Geertz and
Beyond’’; Summer 1997): 35–55.
17. Patrick Chabal and Jean-Pascal Daloz, Culture Troubles: Politics and the Interpretation
of Meaning (London: Hurst, 2006).
18. Geertz, Interpretation of Cultures, 3–30, at 5, 14.
19. In the earlier essays gathered in Interpretation of Cultures, apart from another famous
one, ‘‘Deep Play: Notes on the Balinese Cockfight,’’ Geertz pays a good deal of homage to
Talcott Parsons and Piotr Sorokin, both social theorists who sought to incorporate culture
into explanatory theory.
20. Clifford Geertz, Local Knowledge: Further Essays in Interpretive Anthropology (London:
Fontana Press, 1993), 4.
21. Geertz, Interpretation of Cultures, 412–53.
26 / Stephen Welch
Subversive Information
The Historical Thrust of Chinese Intelligence
Ralph D. Sawyer
F
or more than twenty-five-hundred years Chinese intelligence activities
have been marked by vibrant theorizing and dedicated practice—the for-
mer encompassed within the essentially continuous military writings; the
latter implemented throughout the virtually interminable warfare that plagued
China, whenever its nominal geopolitical unity was shattered and millenarian
movements ravaged the land.1 Internally directed security measures also prolif-
erated in both the fragmented states and overarching dynasties as the emperor
and local rulers sought to control not only the populace but also powerful
regional factions, royal family members, court minions, and the bureaucracy at
large. Surprisingly, rather than being dismissed as relics from an antique age,
they continue to be scrutinized by the military institutions of the People’s
Republic of China (PRC) for viable methods and applicable techniques that
/ 29 /
30 / Ralph D. Sawyer
are in accord with the thrust to formulate and excel at a uniquely Chinese way
of warfare.2
Spies reportedly assisted the Shang Dynasty in overthrowing the Xia
Dynasty; oracular inscriptions indicate that intelligence gathering and report-
ing date back to the middle Shang (1200 bce), and historical vestiges confirm
that agents were employed in the Spring and Autumn Period (722–481), a time
when warfare dramatically escalated. Without accurate information of enemy
activities, any of the emergent states then increasingly entangled in the era’s
multiparty conflict would almost have certainly perished. Battlefield develop-
ments and the growing severity of the threat prompted experienced command-
ers, governmental authorities, and political thinkers to analyze military clashes
and ponder collateral diplomatic incidents in a quest to discern replicable
patterns and devise essential measures. Unfortunately, the earliest military
writings, which were essentially protobooks consisting of often-enigmatic
comments written on narrow bamboo strips, now exist only as scattered pro-
nouncements embedded in later works. However, when coupled with fragments
preserved in the first historical chronicles, the evolving nature of intelligence
activities visible in China’s earliest surviving military treatise—the Art of War,
attributed to the infamous Sunzi (referred to as Sun Tze elsewhere in this
volume), perhaps the world’s first professional security adviser—becomes
apparent.3
a question of rationally determining the prospects for victory, all combat being
eschewed without certainty that the enemy can be conquered. Furthermore,
emotional factors should never become proximate causes for warfare: ‘‘If it is
not advantageous, do not move. If objectives cannot be attained, do not employ
the army. Unless endangered do not engage in warfare. The ruler cannot mobi-
lize the army out of personal anger. The general cannot engage in battle because
of personal frustration. When it is advantageous, move; when not advantageous,
stop. Anger can revert to happiness, annoyance can revert to joy, but a van-
quished state cannot be revived, the dead cannot be brought back to life.’’6
In concert with what might be termed the ‘‘ruthless practice of efficient
warfare’’ and the realization that ‘‘warfare is the Dao of deception,’’ the Art of
War stressed manipulating the enemy and shaping, or at least exploiting, the
battle space.7 Enemies must be tricked and maneuvered, lured and enticed,
frustrated and enervated until a local tactical imbalance can be created and the
army’s strategic power can be applied in an overwhelming manner analogous
to a whetstone crushing an egg.8 Effecting these measures requires thorough
knowledge of the enemy and oneself:
If I know our troops can attack but do not know the enemy cannot be attacked,
it is only halfway to victory. If I know the enemy can be attacked but do not
realize our troops cannot attack, it is only halfway to victory.
Knowing that the enemy can be attacked and knowing that our army can
affect the attack, but not knowing the terrain is not suitable for combat, is only
halfway to victory. One who truly knows the army will never be deluded when
he moves, never be impoverished when initiating an action.
Thus it is said if you know them and know yourself, your victory will not be
imperiled. If you know Heaven and know Earth, your victory can be complete.9
An often-quoted passage from the Art of War reiterating the need for mili-
tary and political intelligence elucidates some of the essentials: ‘‘The prosecu-
tion of military affairs lies in according with and learning in detail the enemy’s
intentions. Anyone who does not know the plans of the feudal lords cannot
forge preparatory alliances. Anyone who does not know the topography of
mountains and forests, ravines and defiles, wetlands and marshes cannot maneu-
ver the army. Anyone who does not employ local guides will not secure advan-
tages of terrain. Anyone who does not know one of these four or five cannot
command the army of a hegemon or a true king.’’10
Although often ignored in actual practice, the Art of War’s behest would be
reiterated by subsequent military and political thinkers in various forms, includ-
ing Qi’s well-known adviser, Guan Zhong: ‘‘Being ignorant about estimations
and calculations but yet wanting to undertake military affairs is like wanting to
cross over a dangerous river without a boat or oars. Anyone who is not knowl-
edgeable about the enemy’s government cannot make plans against them; any-
one who is not knowledgeable about the enemy’s true situation cannot
32 / Ralph D. Sawyer
constrain them with agreements; anyone who is not knowledgeable about the
enemy’s generals cannot mobilize the army first; and anyone who is not knowl-
edgeable about the enemy’s officers cannot deploy an army against them.’’11
An esoteric text known as the Taibai Yinjing attributed to Li Quan states,
‘‘When the enemy is quiet observe their yang aspects (visible behavior), when
they move investigate their yin (silent, hidden) side. First observe their traces,
thereafter know the enemy’s mind.’’12 The dynasty’s most successful early mili-
tary commander, Li Jing, similarly stressed the importance of deliberately
acquiring knowledge of the enemy: ‘‘The measures for achieving decisive vic-
tory lie in investigating the opposing general’s talent and abilities; analyzing
the enemy’s strengths and weaknesses; determining the configuration and stra-
tegic advantages of terrain; observing the advantages of the appropriate
moment; and first being victorious, only thereafter engaging in combat and
defending positions without losing them. This is termed the Dao for certain
victory.’’13
Several later writers, echoing Sunzi’s broad condemnation of commanders
who failed to undertake the necessary intelligence-gathering efforts, also acerbi-
cally condemned rulers. In the late Song Dynasty (960–1279), Shi Zimei con-
clusively attacked both of them:14
Armies remain locked in a standoff for years to fight for victory on a single day,
yet generals begrudge bestowing ranks and emoluments of one hundred pieces
of gold and therefore do not know the enemy’s situation. This is the ultimate
inhumanity. Such a person is not a general for the people, an assistant for a
ruler, or the arbiter of victory.
Rulers easily acquire things, but the enemy’s true situation is especially dif-
ficult to know. If easily acquired things such as money and gold can be employed
to gain elusive information, how can anyone be parsimonious and not give them
in exchange? Furthermore, victory or defeat may be decided on a single momen-
tous day, so being incapable of employing agents to spy upon the enemy’s situa-
tion would be the greatest inhumanity!’’
In about the mid–sixteenth century an unknown author proclaimed that
‘‘any general who, having assumed the mantle of authority over the Three
Armies and controlling the fate of ten thousand men, confronts fierce enemies
or pursues them into the wilds to engage in a standoff but does not know the
enemy’s situation, is a blockhead. When two forces struggle to control each
other, anyone who does not undertake spycraft techniques is a wild animal.’’15
In ancient China, particularly during the Shang Dynasty, the prospects for
victory and thus the advisability of undertaking military actions were deter-
mined by consulting the ancestors through divination, a practice that contin-
ued to have a major impact in the Western Zhou Dynasty and often thereafter
when the Yi Jing came to be employed.16 However Sunzi, who advanced a strong
Subversive Information / 33
economic argument for deploying agents in the first paragraphs of his ‘‘Employ-
ing Spies,’’ banished esoteric methods in favor of human agency by boldly
asserting that ‘‘the means by which enlightened rulers and sagacious generals
moved and conquered others, that their achievements surpassed the masses, was
advance knowledge. Advance knowledge cannot be gained from ghosts and
spirits, inferred from phenomena, or projected from the measures of Heaven,
but must be gained from men, for it is the knowledge of the enemy’s true
situation.’’17
For Sunzi, this knowledge was both broad and highly detailed: ‘‘You must
first know the names of the defensive commander, his assistants, staff, door
guards, and attendants for any armies that you want to strike, cities you want
to attack, and men you want to assassinate.’’18 Therefore, only human agents
operating in the enemy’s environment can possibly acquire it. ‘‘You must have
your spies search out and learn them all.’’ In the middle of the fourth century
bce, the ‘‘Military Methods’’ compiled by Sun Bin, Sunzi’s brilliant descendant,
thus emphasized the importance of knowledge gained through spy activities:
‘‘One who does not use spies will not be victorious.’’19
The late Sung Dynasty Unorthodox Strategies, a much-pondered text in
recent PRC military science reformulation, similarly asserts: ‘‘Whenever plan-
ning to conduct a major military expedition you should first employ spies to
determine the enemy’s troop strength, emptiness or fullness, and movement
and rest, and only thereafter mobilize the army. Great achievements can then
be attained and you will always be victorious in combat.’’20 Continuity through
the Ming Dynasty is apparent in this paragraph from the mid-sixteenth-century
Toubi Futan, which coincidentally indicates the fundamentally active nature of
Chinese agents:
Attacking other states through their ruler is more intelligent than attacking
them yourself. Plotting against people through their ministers is more intelligent
than plotting against them yourself. Dispersing alliances and bringing allies
together in conflict is more intelligent than engaging them in combat yourself.
In this fashion you can attack others through their ruler, plot against men
through their ministers, disperse their alliances and instigate conflict among
them. But without agents, how can you investigate their true nature, without
spies how can you employ these techniques? Moreover, whenever two armies
stand off against each other, it is not just we who plot against the enemy, but
also the enemy who plots against us. To fail to gain accurate information about
the enemy’s situation but recklessly engage in battle is senseless.21
Such pronouncements are not just found in the military treatises but also War-
ring States Period works on statecraft, such as the work attributed to Han Feizi,
sometimes contemptuously disparaged in the West as ‘‘China’s Machiavelli.’’
34 / Ralph D. Sawyer
Treatise on Spycraft
Whenever the Art of War was actually completed, the laconic ‘‘Employing
Spies’’ not only remains the world’s first theoretical treatise on spycraft but was
also the progenitor of all subsequent Chinese thought about covert agents and
activities. Later writers would expand the categories, detail the methods, offer
countermeasures, and even contradict the basic formulations, but never ignore
them.22 Minus the paragraphs already cited, this brief chapter may be translated
as follows:
When you send an army of a hundred thousand forth on a campaign, marching
them out a thousand li, the expenditures of the common people and the contri-
butions of the feudal house will be one thousand pieces of gold per day. Those
inconvenienced and troubled both within and without the border, who are
exhausted on the road or unable to pursue their agricultural work, will be seven
hundred thousand families.
Armies remain locked in a standoff for years to fight for victory on a single
day, yet generals begrudge bestowing ranks and emoluments of one hundred
pieces of gold and therefore do not know the enemy’s situation. This is the
ultimate inhumanity. Such a person is not a general for the people, an assistant
for the ruler, or the arbiter of victory.
Thus there are five types of spies to be employed: local spy, internal spy,
turned spy [double agent], dead [expendable] spy, and the living spy. When all
five are employed together and no one knows the Tao of their employment, it is
termed ‘‘spiritual methodology.’’ They are a ruler’s treasures.
Local spies employ people from the local district. Internal spies employ their
officials. Double agents employ the enemy’s spies. Expendable spies employ
them to spread disinformation outside the state. Provide our expendable spies
with false information and have them leak it to enemy agents.23 Living spies
return with their reports.
Thus, of all the Three Armies’ affairs, no relationship is closer than with
spies; no rewards are more generous than those given to spies; no affairs are
more secret than those pertaining to spies.24
Unless someone has the wisdom of a Sage, he cannot use spies; unless he
is benevolent and righteous, he cannot employ spies; unless he is subtle and
perspicacious, he cannot perceive the substance in intelligence reports. It is
subtle, subtle! There are no areas in which one does not employ spies.
If the mission is exposed before it has begun, the spy and all those he
informed should be put to death.
You must search for enemy agents who have come to spy on us. Tempt them
with profits, instruct and retain them, thereby obtaining and employing double
agents. Through knowledge gained from them you can recruit both local and
internal spies. Through knowledge gained from them the expendable spy can
spread his falsehoods and be used to misinform the enemy. Through knowledge
gained from them our living spies can be employed as the moment requires.
Subversive Information / 35
The ruler must know these five aspects of espionage work. Because such
knowledge invariably depends on turned spies, you must be generous to double
agents.
In antiquity, when the Shang arose they had Yi Yin in the Xia and when
the Zhou arose they had Lu Ya in the Shang. Thus enlightened rulers and saga-
cious generals who are able to get intelligent spies invariably attain great
achievements. This is the essence of the military, what the Three Armies rely
on to move.
them can be secretly lured in and forced to inform us about the enemy’s secret
affairs.’’
The two categories of expendable and double or turned agents occasioned
the most conceptual difficulty throughout Chinese history and therefore the
most extensive discussion. Sunzi’s original concept of expendable agents being
spies deliberately dispatched on missions likely to result in their deaths became
somewhat muddled over the centuries and eventually encompassed any agent
who died in the performance of their mission. It was generally assumed that to
be effective the agent would never know that they were about to be sacrificed
to accomplish some greater goal, and many of the most famous exemplars were
in fact unaware that they were doomed.
Enemy agents could also be deliberately deceived, provided with false infor-
mation and specious plans that they would report back to their masters, causing
them to be executed for their incompetence or apparent collusion with the
enemy when events unfolded or the truth was unveiled. Thus Du You com-
mented, ‘‘Undertake feigned and false affairs outside the state and leak them
about. Inform our agents about something and dispatch them into the enemy’s
midst so that they will divulge it when captured. When the enemy, believing
their accounts, follows up but our actions differ, the spy will be executed.’’
Zhang Zhao, who took a somewhat different approach, stated that ‘‘expendable
agents transmit disinformation outside the state. Have our spies learn of some-
thing and transmit it to the enemy’s agents. When their spies hear of it they
will report back to the enemy.’’ Citing this, Shi Zimei concluded that ‘‘this
should be understood as creating some sort of secret affair that is leaked to our
spies. Our spies in turn see that it is leaked to the enemy’s agents so that the
enemy will learn of this feigned affair. When it proves to be a ruse, the enemy’s
spies will be executed!’’ Even though they hardly fit into the category of
‘‘expendable agents,’’ the enemy’s spies are thus eliminated.
Sunzi’s definition of double or turned agents was premised upon them hav-
ing been dispatched by the enemy and subsequently and, most important, con-
sciously turned. However, as has already become apparent, the concept came to
entail the manipulation of enemy personnel whether they were active agents or
not, consciously recruited or not. Sunzi highly esteemed true double agents
because they were the most likely to provide extensive, detailed information
about the enemy’s internal situation. Shi Zimei subsequently observed:
Zhang Zhao said that ‘‘we employ agents to spy on others and other men also
employ agents to spy on us. It is vitally necessary to preserve deep secrecy and
not leak out the crux of affairs. For this reason when the enemy has agents spy
on us, we must strive to learn of their coming and turn them around to our own
use.’’ Probably it is normal human emotion that if we satisfy their desires they
will do what we want. If we coerce them with their anxieties, they will not
know that we are using them. When an agent who comes to spy on us can be
Subversive Information / 37
Li Quan, writing in the Taibai Yinjing, advised that the enemy’s spies can be
converted into local guides: ‘‘We can capitalize upon the men dispatched by
the enemy to observe our defects by offering them higher ranks and making
their salaries more generous. Thereafter, investigate their words and compare
them with actuality. If they prove accurate, you can then employ them; if spe-
cious, you can execute them. Employ them as ‘local guides.’ ’’26
In the late Ming Dynasty, more than two thousand years later, the innova-
tive military thinker Jie Xuan expanded the list of jian, a term normally under-
stood as referring to human agents, to encompass several techniques and a few
inanimate objects. His explanation, which again shows the aggressive activities
envisioned for agents, marks the culmination of the intelligence tradition in
China:27
Those who enter among the enemy and implement unorthodox measures are
termed ‘‘agents.’’28 Agents strike fear in the enemy’s general staff, slay the ene-
my’s beloved generals, and cause chaos in the enemy’s estimates and strategies.
The methods for employing agents include living, dead [expendable], written,
civil, rumors, prophecy, songs, bribes, things, rank, the enemy, villagers [local
guides], friends, women, good will, and awe.
Spies [die] who are dispatched and then return are living agents. Those who
enter enemy territory but do not return are dead agents.29 Creating forged letters
is clandestine written action. Holding discussions that stupefy the enemy is
clandestine civil action. Sullying and contaminating the enemy’s generals is
clandestine action by rumor. Creating prophetic verses that circulate among the
people is clandestine action by prophecy. Songs used to disperse the troops is
clandestine action through song.
Using ten thousand ounces of gold to make bribes is clandestine action
through bribery. Sometimes seizing things, sometimes granting gifts, is clandes-
tine action through things. To promise rank and position is clandestine bribery
through rank. Allowing the enemy’s agents to return and report is clandestine
action though enemy agents. Forming connections with subordinates and parti-
san cliques with hamlets is clandestine action through local agents. Influencing
people through their friends is clandestine action through friends.
Bribes that penetrate the women’s quarters constitutes clandestine action
through women. Exploiting personal friendship is clandestine action through
goodwill. Inflicting bodily harm to implement plans is clandestine action
through awesomeness.
38 / Ralph D. Sawyer
At the end of his explication Jie ruefully concluded that ‘‘it is not implementing
clandestine activities that is difficult, but employing men that is difficult.
Therefore employing agents is more difficult than employing the army.’’30
body with lacquer to disguise his appearance and swallowed charcoal to alter
the sound of his voice.38 Even more heinous, Yao Li reportedly had King Holu
conspicuously execute his own wife and children, burn their bodies in the mar-
ketplace, and chop off his right hand to establish a reason for his hatred and
thus be welcomed by the valiant son of Holu’s uncle, then in exile.39
Although imperial China resorted to assassins to eliminate troublesome
external enemies, particularly those out on the steppe, and to silence threats
within the country, this readiness to employ covert agents for assassination
purposes was particularly manifest during periods of fragmentation when
numerous states were contending for power.40 Nevertheless, the most famous
instance remains Jing Ke’s botched attempt late in the Warring States Period
to stab the king of Qin with a dagger concealed in a map case.
Prince Dan of Yan adopted this desperate measure to forestall an imminent
invasion by overwhelming Qin forces. The exploit, which is preserved in the
Shiji’s ‘‘Assassins’’ and provided the impetus for recent movies, struck such a
responsive cord in subsequent Chinese generations that the name of the warrior
chosen for the task, Jing Ke, became a common term for ‘‘assassin.’’41 It hap-
pened that a disfavored Qin general had recently sought refuge with the prince,
so the subterfuge of offering his head and a map of Yan was employed to gain
access to the heavily isolated emperor. To ensure that the extremely sharp dag-
ger would prove lethal, the prince even had it drenched with poison and ‘‘tried
out on men whereupon it was found that if their clothes were stained by blood
they immediately died.’’
When the crucial moment arrived, rather than stabbing the emperor, the
heroic Jing Ke unexpectedly decided to extort an agreement and was eventually
struck down by a physician who used his medicine bag as a weapon. Thus,
despite the absence of armed guards on the dais and the emperor’s inability to
draw his own long sword, the effort devolved into an exercise in righteous
futility. Moreover, it compelled the king of Yan to execute his own son for
having initiated the plot and to present his head to Qin in an attempt to
preserve the state—though to little avail, because Yan was executed five years
later in 222 bce.
The Art of War initiated consciousness of the importance of disinformation,
but it was the authors of the late Warring States work known as the Six Secret
Teachings (Liutao) who compiled two explosive chapters on clandestine pro-
grams that were designed to systematically undermine enemy states, and even
overthrow or subjugate them without conflict, thereby realizing the Art of War’s
ideal of victory without combat.42 As late as the Ming Dynasty, these two chap-
ters, coupled with the Art of War’s ‘‘Employing Spies,’’ continued to be viewed
as the very foundation of spycraft.43 The first, titled ‘‘Civil Offensive,’’ though
purportedly a program developed by the Tai Gong to undermine the Shang
40 / Ralph D. Sawyer
are sufficiently rich and honored, continue to increase them. When your faction
has been fully established, you will have attained the objective referred to as
‘‘blocking his access.’’
Twelfth, support his dissolute officials in order to confuse him. Introduce
beautiful women and licentious sounds in order to befuddle him. Send him
outstanding dogs and horses in order to tire him. From time to time, allow him
great power in order to entice him to greater arrogance.
When these twelve measures are fully employed, they will become a military
weapon.
Several of the later military writings include at least a few passages on tech-
niques that might be employed to adversely affect, if not fatally subvert, enemy
rulers, including Li Quan’s ‘‘Techniques for Secret Plots,’’ in which economic
measures are visible:
Subjugating the enemy’s forces without engaging in combat is the pinnacle of
excellence. The pinnacle employs plots and plans, the next highest human
affairs, while the lowest conducts warfare by attacking. Those who employ plots
and plans mystify and confuse the enemy’s ruler; secretly influence his slander-
ous ministers to affect his affairs; muddle him with sorcerers and soothsayers;
and cause him to respect ghosts and serve spirits. They cause him to indulge in
colors and embroidery while cheapening the value he places on grains and food-
stuffs, thereby emptying out his granaries and warehouses. They send him beau-
tiful women to unsettle his mind and dispatch skilled carpenters to inveigle him
into constructing palaces, rooms, and high towers in order to exhaust the state’s
wealth and dissipate their strength in labor, thus changing the ruler’s nature
and inducing licentious practices.
When you block off the ruler’s access to external information and debauch
him with licentiousness, attack him with the lure of profits, pleasure him with
42 / Ralph D. Sawyer
music, nurture his tastes, and cause him to regard the deceitful as the trustwor-
thy, the trustworthy as deceitful, the loyal as rebellious, and the rebellious as
loyal, then those who offer loyal remonstrance will perish while sycophants will
be rewarded.
When he exiles worthy men to the wilds, retains menial men in official
positions, issues urgent orders, and imposes brutal punishments, the people will
not sustain his mandate to rule. This is termed overthrowing the ruler through
secret plots without fighting. When the destruction of his state has been
achieved, if you follow up with troops the ruler can be captured, his state subju-
gated, his cities seized, and his masses scattered.45
then strove to negate the effects of any criticism directed against Yue and pre-
vent the imposition of restrictive measures.48 Wen Zhong then formulated the
following nine-point program intended to strengthen the state and subvert
Wu’s government:
First, revere Heaven and serve ghosts in order to seek their blessings. Second,
make generous presents and monetary gifts to the ruler and numerous presents
and bribes to please his ministers. Third, make the five grains expensive in order
to empty their state, take advantage of what the ruler desires in order to weary
his people. Fourth, present the ruler with beautiful women in order to befuddle
his mind and confuse his plans. Fifth, send the ruler skilled artisans and excel-
lent materials to stimulate him to undertake palaces and mansions and thereby
exhaust their wealth. Sixth, dispatch sycophantic ministers, causing the ruler to
become easily attacked. Seventh, stiffen those ministers who dare to remon-
strate, forcing them to commit suicide. Eighth, enrich your country and prepare
the implements of war. Ninth, discipline your soldiers in order to exploit the
ruler’s perversity.
through a sudden fervent strike, slew Zhao’s commanding general, and captured
both the king and his generals. Qin then extinguished the state of Zhao.’’52
About 237 bce the noted strategist Wei Liaozi similarly advised the king to
systematically employ bribes to weaken the other feudal states and ‘‘confuse
their plans.’’53 Concurring, the king appointed him as an adviser, whereupon Li
Si, who wielded the government’s power, added a lethal dimension by ‘‘secretly
dispatching strategists bearing gold and jewels to offer as presents as they wan-
dered among the feudal lords exercising their persuasions. Famous officials in
the courts of the feudal lords who might be tempted by material goods were to
be entangled with abundant gifts; those unwilling to collaborate were to be
assassinated with sharp swords. Whenever his plan to estrange the feudal lords
from their ministers proved successful, the king of Qin would then have his
expert generals follow up with attacks.’’54
In conjunction with the successful implementation of these subversive mea-
sures, the specter of Qin’s awesome military power, augmented by its reputation
for ferocity, cowered many states into abandoning ‘‘provocative’’ military prepa-
rations and adopting policies of appeasement. Whether they remained ignorant
of the threat’s extensiveness or simply wished to avoid antagonizing the king of
Qin, they not only failed to conclude strategic partnerships but also stupidly
inflicted substantial losses on each other by battling among themselves. Sunzi’s
ideal of ‘‘thwarting their alliances’’ having been realized, the isolated states were
then sequentially defeated with comparative ease, which illustrates well the
dual emphasis of traditional Chinese intelligence practice: information coupled
with active subversion.
Notes
1. In contrast with the West, spycraft was a much-discussed topic in Chinese antiquity.
For earlier Western practices, see N. J. E. Austin and N. B. Rankov, Exploratio: Military and
Political Intelligence in the Roman World from the Second Punic War to the Battle of Adrianople
(London: Routledge, 1995).
2. For a discussion of how traditional theory and historical practice are being employed
in contemporary China, see Ralph Sawyer, ‘‘Chinese Strategic Power: Myths, Intent, and
Projections,’’ Journal of Military and Strategic Studies 9, no. 2 (2006); and the final chapters of
Ralph Sawyer, The Tao of Deception: Unorthodox Warfare in Historic and Modern China (New
York: Basic Books, 2007).
3. Historians continue to debate whether the Art of War (or at least the core of the text)
was composed by Sunzi at the end of the sixth century bce, compiled by his disciples shortly
after his death, or created from lessons derived from fifth-century and early-fourth-century
warfare in the mid–fourth century. For an overview, see ‘‘Historical Introduction,’’ in Ralph
Sawyer, Sun-tzu Art of War (Boulder, CO: Westview Press, 1994).
4. Ibid., ‘‘Initial Estimations.’’
5. Ibid. According to Michael Handel, Sunzi was ‘‘the first to explicitly discuss the role
of what is today termed net assessment.’’ See ‘‘Intelligence in Historical Perspective,’’ in
Michael Handel, Go Spy the Land (Westport, CT: Praeger, 1992), 179–80.
46 / Ralph D. Sawyer
47. The highly melodramatic story of Fuchai and Goujian’s conflict quickly became the
stuff of legend, streetside tales, and operas, and thus known to everyone, strategists as well as
peasants. Core materials may be found in Wu Zixu’s biography in the Shihji.
48. The WuYue Chunqiu is a somewhat fictionalized account probably written in the first
century ce of the dramatic conflict between the two states of Wu and Yüeh. Although the
reliability of its dialogues is highly questionable, the author may well have had access to oral
transmission and records no longer extant, and was thoroughly knowledgeable about the
area.
49. Contemporary Chinese strategists have particularly focused on the rise of the Qin as a
model for emulation.
50. ‘‘Qinyu, 3,’’ Zhanguoce.
51. ‘‘Qinyu, 4,’’ Zhanguoce.
52. ‘‘Zhaoyu,’’ Zhanguoce.
53. For a discussion of the incident and a complete translation of the book attributed to
Wei Liaozi, see Sawyer, Seven Military Classics.
54. Shi Ji, ‘‘Li Si Liezhuan.’’ The king referred to in the passage is the eventual unifier of
all China, the first emperor of the Qin Dynasty.
CHAPTER 4
The arrow shot by an archer may or may not kill a single man; but
skilful intrigue devised by wise men can kill even those who are in
the womb.
—Kautilya
A
lthough research into ever-more-archaic antecedents of contemporary
thought in fields like political theory and strategic thought is well estab-
lished, only recently has a comparable effort been made with regards to
intelligence. In such discussions the typical point of departure is China’s Sun
Tze whose chapter on the ‘‘divine skein’’ of military intelligence and his taxon-
omy of spies is often taken as the oldest nonscriptural account of espionage.1
That discourse has been examined and expanded upon most intensively in
recent years by Ralph Sawyer (see chapter 3).2 More fragmentary information
has also been examined to try and draw out a picture of intelligence in classical
Rome, but close examination of other traditions such as the Arab and Islamic
worlds and Byzantium has had to wait very much for the chapters in the present
volume to receive at least some of the attention that they warrant.3 Much the
same might also be said of the Sanskrit tradition of intelligence thought as a
/ 49 /
50 / Philip H. J. Davies
branch line within ancient Indian writing on strategy and statecraft. Although
there are passing references to the Kautilya, probably the leading figure in this
lineage, there has been no detailed attempt to bring that tradition into the
wider discussion of intelligence theory.4 This is long overdue: India has been
steadily emerging as one of the globe’s leading powers, a crucial (and demo-
cratic) counterweight to mainland China in the Asian balance of power, and a
major intelligence player in the current international arena.
Kautilya’s Arthashastra represents one of the oldest treatises on strategy and
statecraft. From an intelligence studies point of view, it has two main bases for
relevance to the study of so-called intelligence theory. In the first place, unlike
Sun Tze’s work, the Arthashastra is a comprehensive textbook on statecraft,
domestic governance, diplomacy, and foreign affairs as well as war. Conse-
quently, it provides an intelligence doctrine relevant to peacetime as well as
war and deals with domestic intelligence as well as foreign surveillance issues.
This provides a breadth of intelligence doctrine that the ‘‘divine skein’’ does
not need to articulate: domestic counter-espionage, criminal intelligence plus
covert political and psychological operations, and what today we would term
‘‘disruptive action’’ all feature in the work of Kautilya’s ‘‘institutes’’ of spies.
Second, the work of spies is a theme that runs through the entire document in
a way that Sun Tze’s doctrine of what amounts to operational and tactical
intelligence alone does not. For Kautilya, espionage underpins almost every
domain of government activity. His ‘‘institutes of espionage’’ play key roles in
everything from trading standards, taxation and revenue and criminal investiga-
tion to civil service performance monitoring, let alone national and regime
security concerns more familiar to intelligence scholarship. Kautilya’s vision is
not merely of a counterintelligence state but an untrammeled espionage state
where surveillance and provocation are as essential to the work of government
as coinage and road building.
With this in mind, it is impossible not to reflect on what aspects of the
Kautilyan tradition may have been resuscitated and carried forward in subconti-
nental politics since independence. For the most part, a detailed examination
of the current influence of Kautilya on intelligence theory and practice on the
subcontinent lies beyond the purview of the current discussion apart from some
preliminary observations and speculations at the end of this chapter. Neither
does the present author pretend to be an authority on Sanskrit or Indian culture
and politics. Rather, the goal in the present discussion is to lift out a range of
key concepts and lines of reasoning from the Arthashastra so that they may
be placed alongside other traditions and lineages of and general issues within
‘‘intelligence theory.’’ The source text used herein is the fourth edition of
Rudrapatnam Shamasastry’s translation, published in 1951. Even with the lim-
ited ambitions of the current work, however, it is apparent that a profound
understanding of Kautilya’s thinking on intelligence awaits a return to, and
The Original Surveillance State / 51
mining down into, the original Sanskrit to unpack subtleties and details of the
original that may well have escaped the original translator. Shamasastry was
an Orientalist and antiquarian and not a military or intelligence scholar or
practitioner.5 In this capacity, the following discussion should be read as a
purely preliminary exploration of the question, and as an exhortation to those
with the necessary combination of linguistic and intelligence studies compe-
tencies to perform the kind of thorough archaeology of Kautilya’s theory of
intelligence that it so richly deserves and strategic thought in the globalized
twenty-first-century world so seriously needs.
Kautilya’s Context
Since Shamasastry’s rediscovery of the manuscript of the Arthashastra at the
turn of the last century, the exact identity of its author and provenance of its
specific contents has been subject to considerable uncertainty and debate.6 In
some discussions Kautilya’s authorship is accepted as a working hypothesis,7
whereas in others it is simply taken as a given.8 However, the actual provenance
of the Arthashastra is virtually irrelevant to its impact and perceived credibility
and consequently its authority and influence in shaping contemporary Indian
strategic thought. What matters is the intellectual credibility and authority the
Arthashastra holds in subcontinental military and strategic thought, and that is
more than evident.9 For the present intents and purposes, it is sufficient to say
that the conventional account is that Kautilya was the eminence grise behind
the founder of the Maurya Empire, Chadragupta Maurya. The Maurya Empire
lasted from approximately 321–185 bc, and was the first empire to consolidate
the lion’s share of the subcontinent under its third ruler, Ashoka the Great.
Kautilya, also known in various contexts as Vishnugupta and more commonly
Chanakya, supposedly mentored Chandragupta in establishing the empire, then
subsequently served as his prime minister. The Arthashastra, which means
roughly ‘‘science [shastra] of politics [artha],’’ was one of three texts attributed
to Kautilya as manuals for Chandragupta and his successors on the conduct
of government and the economy. The other texts dealt primarily with moral
philosophy and so fall outside the current discussion.
Despite its antiquity, the Arthashastra was by no means the first Indian text
to discuss the role of spies in politics and war. Apart from internal evidence in
the text in which Kautilya appears to debate the wisdom of prior authors, the
use of spies is discussed in the Rigveda religious text, which dates to the second
millennium bc and in which spies serve the deities Varuna, Agni, and Soma.10
The Arthashastra does, however, appear to predate the Baghavad Gita, which
also sees spies playing a role in the conflict between the two great houses of the
Pandavas and the Kauravas.11 It also predates another main text on statecraft,
52 / Philip H. J. Davies
the Ordinances of Manu, which were written in response to the political strife
that followed the collapse of the Mauryas. This suggests an attitude toward
espionage at least paralleling if not deriving directly from that of Kautilya. As
Richard Popplewell has noted of the Arthashastra, ‘‘Though a prescription for
ideal government, [it] undoubtedly describes a state of affairs approximating
reality,’’ which was emulated not only by Chandragupta but also by his greatest
Maurya successor Ashoka the Great and later by the Islamic Mogul emperors
(although they were also inheritors of the Arab and Islamic intelligence tradi-
tion discussed elsewhere in this volume).12
The Arthashastra subsequently appears to have been lost in or around the
twelfth century until found by Shamasastry circa 1904. The discovery was virtu-
ally by accident, as Shamasastry was sorting through palm-leaf manuscripts at
the Oriental Research Institute in Mysore. After having discovered and recog-
nized the document for what it was, Shamasastry edited and published the
Sanskrit text in 1909, and then followed with an English translation in 1915.13
Despite its interval of obscurity, however, Kautilya’s text can be said to have a
pivotal and formative role in the development of Indian political thought in
the early and medieval periods.
ascetic practicing austerities.’’ Like the recluse, the ascetic is expected to recruit
disciples as subagents, but he is also expected to make a show of living in
poverty as a sign of their holiness—although, Kautilya adds, ‘‘he may take in
secret his favorite foodstuffs.’’ In a similar fashion, agents may join the retinue
of a public or religious figure to serve as ‘‘fraudulent disciples’’ and report on
their nominal masters.19 Wandering female spies were also supposed to employ
religious cover. For targeting the upper two castes, the Brahmins and Kshatriyas,
Kautilya recommends a ‘‘poor widow of Brahman cast, very clever and desirous
to earn her livelihood.’’ Such an agent would be ‘‘honored in the king’s harem
[and] shall frequent the residences of the king’s prime ministers’’ reporting on
the intimate lives of the highest political elites. Equivalent monitoring of lower-
caste communities could be secured by recruiting women from the Sudra caste
who would shave their heads and affect a spiritual and ascetic lifestyle.20
Among the middle-class Vaishya caste of traders and farmers, the Arthshastra
recommends recruiting ‘‘cultivators’’ who have fallen on hard times as ‘‘house-
holder spies.’’ Provided the individuals in question are gifted, like the recluse,
with ‘‘foresight and pure character,’’ they should be provided with funds and
assistance to reestablish themselves in exchange for acting as informants.21 Mer-
chants should also be recruited, not only for the information they provide but
also to reinforce the cover of agents using religious cover by becoming supposed
disciples of recluses and ascetics. In this capacity they could widely attribute
supernatural powers to their supposed spiritual leader and also collude with the
ascetic in choreographing fraudulent public demonstrations of such powers.
This, in turn, would strengthen their reputations and improve the access of
recluses and ascetics and of their subagents serving as full-time disciples.22
The notion of ‘‘classmate spies’’ (satri) is a more idiosyncratic concept. Not
so much a form of operational cover as a recruitment pool, satri are described as
‘‘orphans (asambindhinah) who are necessarily fed by the state and are put to
study science, palmistry, . . . sorcery, . . . the duties of the various orders of
religious life, legerdemain, . . . and reading of omens and augury.’’23 From within
these professions, satri could report on what they observed, but they could also
serve as agents provocateurs flushing out opponents of the regime by pretending
to be ‘‘opposing factions shall carry on disputations in places of pilgrimage . . .
in assemblies, houses, corporations, . . . and amid congregations of people.’’24
Besides providing their own information, satri were also designated as the pre-
ferred couriers for the various wandering spies.25
Kautilya places a heavy emphasis on provocation and special operations.
Consequently, a particularly central role is occupied throughout the Arthashas-
tra by tikshna, so-called firebrands or fiery spies. Firebrands are colorfully
described as ‘‘brave desperados of the country who, reckless of their own life,
confront elephants or tigers [and] fight mainly for the purpose of earning
money.’’26 Firebrands were to be recruited to serve as saboteurs, assassins, and
The Original Surveillance State / 55
Hardly any walk of life was to pass unobserved and unreported. Besides watch-
ing domestic developments activities, the network would also hold a counterin-
telligence brief, in which ‘‘spies sent by foreign kings shall also be found out by
local spies; spies by spies of like profession.’’30 In many respects the intelligence
machine was actually the foundation of the rest of the government apparatus
to ensure effectiveness, efficiency, and—above all—control.
Thus not merely did intelligence form a central component of the ruler’s daily
routine; he was also fully expected by Kautilya to act as his own intelligence
officer.
Although the Arthashastra covers domestic and foreign policy and security
in considerable depth, Kautilya takes the view that domestic threats ‘‘should
first be got rid of; for . . . internal troubles, like the fear from a lurking snake,
are more serious than external troubles.’’ As a result, internal and regime secur-
ity occupy the opening chapters of the book, whereas the later portions are
concerned with foreign relations and war. This also means that to understand
Kautilya’s view of intelligence, it is also necessary to take internal security and
domestic policy as the point of departure for understanding his approach to
espionage and intelligence, even when conducted abroad.
Kautilya’s thought is more detailed than equivalent other thinkers, and espio-
nage plays a central role in all three areas. As Kautilya warns his student com-
paratively early on, a ‘‘government officer, not caring to know the information
gathered by espionage and neglecting to supervise the dispatch of work in his
own department as regulated, may occasion loss of revenue to the government
owing to his ignorance, or owing to idleness.’’36 The significance of espionage
arises because the misappropriation of funds has fewer obvious indicators than
other property crimes like theft. Indeed, concludes Kautilya, ‘‘cases of embezzle-
ment . . . can be ascertained through spies alone.’’37
As a result, a central figure in Kautilya’s doctrine of intelligence is the
collector-general of taxes. Besides the usual tasks of collecting taxes and for-
warding the revenue to the Treasury, the collector-general was expected to
recruit networks of spies targeted at a number of different requirements. The
first target for this activity was to verify that households were contributing their
allotted taxes and not underreporting revenues and assets. Toward this the
collector-general was to recruit householder spies whose task it was to ‘‘ascer-
tain the validity of the accounts (of the village and district officers) regarding
the fields, houses, and families of each village—the area and output of produce
regarding fields, right of ownership and remission of taxes with regard to houses,
and the caste and profession regarding families.’’ These spies were also to ‘‘ascer-
tain the total number of men and beasts . . . as well as the amount of income
and expenditure of each family.’’ Above and beyond this, they were expected
to ‘‘find out the causes of emigration and immigration of persons of migratory
habit, the arrival and departure of men and women of condemnable . . . charac-
ter,’’ explained by Shamasastry as including ‘‘dancers, actors, and the like.’’
Finally, they were also to report on ‘‘the movement of (foreign) spies.’’38
The second arm of this organization was to be provided by merchant spies.
Their role was to report on ‘‘quantity and price’’ of items ‘‘such as minerals, or
products of gardens, forest, and fields, or manufactured articles.’’ Additionally,
these agents were to monitor incoming foreign merchandise ‘‘of superior or
inferior quality’’ and report to the collector-general on costs to foreign traders,
such as road tolls, transportation fares, warehousing fees, and the subsistence
costs of those traders.39 A third network was to be established to keep tabs on
the criminal underworld. This consisted of ‘‘spies under the guise of old and
notorious thieves with their student bands’’ based at locations as diverse as
crossroads, religious sites, bathing houses, and areas of the wilderness (‘‘desert
tracts, mountains, and thick-grown forests’’). From these vantage points they
were to report on ‘‘the causes of arrival and departure, and halt of thieves,
enemies [of the state]’’ and, slightly oddly, ‘‘persons of undue bravery.’’40 The
resulting trio of networks would, therefore, provide the collector-general with
the means to check reported revenues in the peasant agricultural sector, indus-
try and trade in the cities and across frontiers, and finally the black and gray
economies.
The Original Surveillance State / 59
Kleptocracy
Even as Kautilya recommended espionage to ensure the forthrightness of the
monarch’s underlings, he also offered it as a means for fraud and theft against
those self-same underlings by the monarch. In a chapter titled ‘‘Replenishment
of the Treasury,’’ the Arthashastra advises that a king ‘‘who finds himself in a
great financial trouble and needs money may collect’’ revenue through fraud
conducted by the very covert machinery used to ensure commercial integrity.
Toward this end he recommends an assortment of ploys to squeeze additional
funds from his populace by deception and manipulation. For example, the mon-
arch should arrange for a highly visible group of benefactors who publicly make
a show of paying ‘‘handsome donations, and with this example, the king may
demand of others,’’ whereas ‘‘spies posing as citizens shall revile those who pay
less.’’ Fraudulent ‘‘sorcerers’’ should stage false infestations of spirits to panic
townsfolk and then demand money to ‘‘propitiate’’ those demons. Other spies
might arrange for the spectacle of ‘‘a serpent with numberless heads in a well
connected with a subterranean passage,’’ which is, in fact, a ‘‘drugged cobra,’’
and then would ‘‘collect fees’’ from curiosity seekers who wish to view the
monstrosity.45
60 / Philip H. J. Davies
many respects, one of their most significant points of divergence. For though
spying as information collection figures centrally in the Arthashastra’s approach
to diplomacy, spying in wartime is described primarily in terms of sabotage,
assassination, and irregular warfare—as special operations rather than special
intelligence.
Kautilya outlines the role of envoys and their use of spies comparatively
early in his volume (as compared with warfare, which is relegated to later but
substantial chapters), and he places covert collection at the center of the
envoy’s role. Apart from assessing a potential adversary by direct observation in
his accredited role, the running of espionage networks is taken as a basic task
of the diplomatic envoy. In part this was to acquire information that was not
overtly available, but it was also partly to verify the envoy’s impressions from
open sources and liaison: ‘‘Whatever information [the envoy] thus gathers he
shall try to test by intrigues.’’51 Toward these ends, the envoy was enjoined to
secure the services of ‘‘ascetic and merchant spies’’ and their disciples, ‘‘spies
under the disguise of physicians, and heretics’’ and ‘‘individuals receiving sala-
ries from two states.’’ These informants would also inform the diplomat of the
activities of groups either favorable or hostile to his own monarch. As a result,
in the Arthashastra the diplomat’s tasks are to include not just the usual above-
board tasks of conveying top-level messages and negotiating treaties, but also
‘‘gaining of friends, intrigue, sowing dissension among friends, fetching secret
force’’ as well as kidnapping the relatives of foreign leaders, ‘‘gathering informa-
tion about the movements of [enemy] spies, treaty violations and subversion by
winning over the favor of envoy and government officers of the enemy.’’52
By the same token, Kautilya warns his readers to be on the outlook for
attempts to subvert their state by foreign envoys or covert actors. Thus he rec-
ommends deploying spies who warn off his own citizens being wooed by the
representative of a foreign power. Failing this, spies ‘‘in the garb of traitors’’
should mix with genuine traitors and distinguish domestic from foreign subver-
sives. As a follow-up, ‘‘fiery spies’’ should then intervene and, having ‘‘made
friendship with traitors,’’ then ‘‘kill them with weapons or poison,’’ and then
murder and expose the ‘‘plotting foreigners.’’53
Although the chapters on war outline the making of encampments, troop
configurations, and the choice between set-piece battles and hit-and-run
‘‘treacherous’’ warfare, there is no equivalent to a chapter on the role of spies
in war for operational or tactical intelligence support. Perhaps this is because
the preexistence of espionage networks set up by embassies, envoys, and expatri-
ate residents before the outbreak of any conflict is taken by Kautilya as a given.
Instead, there are various stratagems for using spies to set foreign states against
one another, or for dividing groups and factions within an adversary’s polity
among themselves. Setting groups against one another over marital relation-
ships plays a central role in much of this,54 culminating in a chapter concerned
62 / Philip H. J. Davies
entirely with what is termed the ‘‘battle of intrigue,’’ in which a weaker king
uses such disruptions as jealousy, kidnapping, and planting evidence of atroci-
ties by the rival’s troops against his own people to undermine a stronger foe.55
There are proposed schemes for using fiery spies to engineer the assassination
of the rival potentate either directly or by prompting members of his court to
consider regicide, divide his military and political leaders, and even encourage
‘‘wild tribes’’ to attack and pillage the opponent on a new front.56
There is also an extended discussion of the use of spies to conduct a sabotage
campaign. Suggested techniques include using agents to poison food and drink
supplies, both for human consumption and that of livestock. Some spies dis-
guised as cowherds or hunters should release dangerous animals to cause chaos
and confusion. ‘‘Secret spies,’’ it is also suggested, ‘‘may slay from behind the
chiefs of infantry, cavalry, chariots, or elephants or they may set fire to the chief
residences of the enemy.’’ At the same time, ‘‘traitors’’ as well as wild tribes
could initiate fighting and try to devastate the countryside and vulnerable
transportation routes. Psychological ruses included having spies enter the ene-
my’s capital, blow a large number of trumpets, and falsely claim that the city
has fallen. In the confusion they might then kill the king or arrange for others
to ambush him in the panic.57 Spies occupy much the same roles when besieg-
ing a city.58
some level the surveillance state of the Arthashastra might have required its
spies to perform the same basic domestic understanding role as the Stuarts,
there was definitely an intrusive and ruthless political ethos above and beyond
knowing one’s national political self. K. J. Shah has argued in some detail that
one must see Kautilya’s stratagems as being set in the moderating moral context
of dharma.61 But even then he is forced to acknowledge that Kautilya’s pursuit
of an artha that meets the standards of dharma does so in terms that are ‘‘authori-
tarian and without the institution of rights.’’62
Although the original Arthashastra may have been lost for more than seven
centuries between the twelfth and early twentieth centuries, it was in circula-
tion and was influencing Indian thought on statecraft and intelligence for some-
thing like twice that duration after it was written. As one Indian scholar has
noted of Kautilya’s immediate intellectual successor: ‘‘The King was advised by
Manu to constantly ascertain the strength of his enemy as well as his own
through spies, through display of energy and through actual conduct of opera-
tions.’’63 Thus Kautilya’s espionage state provides the underlying context for
Popplewell’s observation that ‘‘one of the most notable differences between the
two empires was the unwillingness of the British to continue Mogul practice of
controlling both civil service and population through the extensive and system-
atized use of espionage.’’64 In many respects, however, the intelligence agencies
of the subcontinent appear to have returned to the Sanskrit pattern of espio-
nage. India’s agencies, especially the domestic Intelligence Bureau and external
Research and Analysis Wing, have reputations for what might be termed an
‘‘action orientation,’’65 après Douglas Porch discussing the French agencies.66
Much the same might also be said of the Pakistani intelligence apparatus and
its sponsorship of Jihadist militants in Khashmir and elsewhere over the decades
as what Kautilya would label tikshna or ‘‘firebrand spies.’’67 Even though it passed
into obscurity for a substantial interval, the Arthashastra’s legacy and influence
have been substantial throughout the evolution of politics, strategy, statecraft,
and intelligence on the Indian subcontinent, and they remain so today.
Notes
1. There are a number of renderings of this particular concept; Griffith’s choice of
this phrase is a usefully evocative one; see Samuel B. Griffith, ed., Sun Tzu: The Art of War
(Oxford: Oxford University Press, 1971), 145.
64 / Philip H. J. Davies
2. See, variously, Ralph D. Sawyer, The Seven Military Classics of Ancient China (Oxford:
Westview Press, 1993), esp. 145–86; and Ralph D. Sawyer, The Tao of Spycraft: Intelligence
Theory and Practice in Traditional China (Boulder, CO: Westview Press, 2004).
3. See, e.g., Daniel A. Fournie, ‘‘Harsh Lessons: Roman Intelligence in the Hannibalic
War,’’ International Journal of Intelligence and Counterintelligence 17, no. 3 (Fall 2004). Also see
various works by Rose Mary Sheldon—e.g., Rose Mary Sheldon, ‘‘The Ancient Imperative:
Clandestine Operations and Covert Action,’’ International Journal of Intelligence and Counter-
intelligence 10, no. 3 (Fall 1997); Rose Mary Sheldon, ‘‘Caesar, Intelligence, and Ancient
Britain,’’ International Journal of Intelligence and Counterintelligence 15, no. 1 (Spring 2002);
and Rose Mary Sheldon, ‘‘The Spartacus Rebellion: A Roman Intelligence Failure?’’ Interna-
tional Journal of Intelligence and Counterintelligence 6, no. 1 (Spring 1993).
4. See, e.g., Richard Popplewell, Intelligence and Imperial Defence: British Intelligence and
the Defence of the Indian Empire 1904–1924 (London: Frank Cass, 1995), 8–9; and David
Kahn, ‘‘An Historical Theory of Intelligence,’’ Intelligence and National Security 16, no. 3
(Autumn 2001): 80.
5. Similar debates ran for decades concerning the relative merits of the various transla-
tions of Sun Tze.
6. The debates and uncertainties concurrent with Shamasastry’s various editions of the
work can be charted in successive prefaces to the Arthashastra, vii–xxxiii.
7. See, e.g., Rashed Uz Zaman, ‘‘Kautilya: The Indian Strategic Thinker and Indian
Strategic Culture,’’ Comparative Strategy 25 (2006): 233–35. I am indebted to Kristian Gus-
tafson for this reference.
8. See, e.g., K. J. Shah, ‘‘Of Artha and the Arthashastra,’’ in Comparative Political Philoso-
phy: Studies under the Upas Tree, edited by Anthony J. Parel and Ronald C. Keith (New Delhi:
Sage, 1992), 141–62.
9. Kautilya’s authority and authorship are likewise taken as a given by Bhakar, Dikshitar,
and Sarkar.
10. S. K. Bhakari, Indian Warfare: An Appraisal of Strategy and Tactics in War in the Early
Medieval Period (Calcutta: Munshiram Manoharlal, n.d.), 87; V. R. Ramachandra Dikshitar,
War in Ancient India (Madras: Macmillan, 1944), 351–52; Jagadish Narayan Sarkar, The Art
of War in Medieval India (Calcutta: Munshiram Manoharlal, 1983), 176.
11. Dikshitar, War, 352–53. Current estimates date the Gita to the first century bc rather
than somewhere between the fifth and second centuries, as had previously been believed.
12. Popplewell, Intelligence, 9.
13. A. V. Narasimha Murthy, ‘‘Centenary of Arthashastra’s Publication R Shamasastry:
Discoverer of Kautilya’s Arthashastra,’’ Organiser, June 21, 2009; Arthashastra, iii–iv.
14. E.g., Bhakari, Indian Warfare, 86, refers to ‘‘an organisation [samstha] consisting of five
categories or institutes’’ of agents, while Dikshitar, War, 354, takes a similar view of samstha,
referring to a central espionage agency with ‘‘four important chapters on [sic] this institu-
tion.’’ However, as will be seen below, Kautilya actually describes several different intelli-
gence collection offices in departments as diverse as the Treasury, the military, and the
monarch’s private staff. Shamasastry himself gives the Sanskrit in the Arthashastra text in a
manner that strongly indicates that samstha refers to the categories of spy and not their
controlling headquarters, e.g., Arthashastra, 19. This is a typical point where an effective
understanding of Kautilya still awaits a new interpretation of the original Sanskrit and cross-
referencing to other manuscripts of the Arthashastra that were located after Shamasastry’s
original discovery.
The Original Surveillance State / 65
O
ne of the great hopes of the last generation was that Russia, once freed
from the bonds of communism, would rejoin the family of nations as an
equal, free, and democratic state. Russia’s progress since the collapse of
the USSR has of course not proceeded as some might have expected. As Dimitri
Obolensky has commented, ‘‘There is much in contemporary Russia that seems
unfamiliar and puzzling to the modern Western observer—ideas, institutions,
and methods of government that seem to run counter to the basic trends of his
own culture.’’1 With economic and demographic collapse followed by boom,
and with the progress of democracy questionable at times, the early hopes of
1991 have long since faded, replaced with a realization that Russia would not
/ 67 /
68 / Kristian C. Gustafson
culture was far more profound and permanent than that of the Turko-Mongol
hordes and more homogenous than that of the modern West.’’7 If not the sole
driver, Byzantium is a key driver of Russian political, strategic, and intelligence
culture. Thus, understanding the Byzantine security culture can help one
understand Russian security culture even today. As we note elsewhere in this
volume, culture may not suggest what a people will do, but it may suggest how
they might do it.
Only when Constantinople fell to the Turks in 1453 did the Russians seize the
mantle both as the temporal inheritors of the empire and also the spiritual
inheritors, Kiev and then Moscow assuming leadership (in their minds, if not
that of the patriarch in Constantinople) of the Orthodox world. The Soviet
scholars I. M. Lotman and B. A. Uspensky commented that ‘‘it is characteristic
that the idea of Moscow, the Third Rome, could quite soon be transformed into
the idea of Moscow, the Third Jerusalem,’’ implying in Russia, as in Byzantium,
a sense of universal authority and the duty to spread their Right Belief (the
meaning of the Greek word ‘‘Orthodox’’) to the rest of the world.14 The late-
nineteenth-century political theorist Konstantin Leontiev positively used the
term ‘‘Byzantism’’ to describe the type of society that the Russian Empire
needed to counter the ‘‘degenerating’’ influence of the West. Leontiev praised
the Byzantine Empire and the tsarist autocracy as societies with a political
system that comprised the authoritative power of the monarch and devout fol-
lowing of the Russian Orthodox Church.15 A number of scholars have pointed
out these traits in the communist empire of the Soviets that succeeded the
Russian Empire. Obolensky says ‘‘it would be difficult to resist the impression
that there is at least something in common between the religious messianism
of the Second and the Third Rome and the belief of the Russian Communist
in the exclusive truth of the Marxist Gospel, immortally enshrined in the col-
lective works of Marx.’’16
John Dziak, scholar of Soviet security systems, observes that in the Soviet
Union one saw something resembling the idea of Christian Empire, but with
the Christianity replaced by an alternate ideology: ‘‘In a sense a secular theoc-
racy was born in which a priesthood (the party), served by a combined holy
office and temple guard (the Cheka), sought to exercise its will.’’17 Toynbee saw
in the inheritance of Byzantine political theory the seeds of totalitarianism in
Russia and the USSR.18
Modern Russia is certainly not a modernized simulacrum of Byzantium; this
would take the comparison too far, ignoring the many other influences—
Eastern, Western, and indigenous—on Russia since the collapse of Byzantium
and its ‘‘commonwealth.’’19 This chapter attempts to make the comparison on
a much more restricted scale, by looking primarily at the Byzantine culture of
intelligence and security. If we are to discern whether there is some noticeable
or significant remnant of Byzantine intelligence and security culture left in
modern Russia, we first must establish what that Byzantine culture looked like.
We can point, however, to a number of incidents that have led many commen-
tators to say that postcommunist Russia is a very similar polity to the USSR
before it: Putin’s autocracy and near-permanency at the head of government,
deeply flawed elections and press censorship, Russia’s behavior in Chechnya and
Georgia, its often lethal treatment of political critics of the regime domestically
and abroad, and even the persecution of non-Orthodox religious groups.20 One
Protecting the New Rome / 71
can take the constructivist view that Russia’s political culture is greater than its
particular political ideology—whether imperial, communist, or officially federal
and democratic—and that it is this culture that most greatly influences how
the state handles such matters as security.
war during the 1,100 years of its existence, and its views on intelligence would
have been conditioned by the fact that no foreign (i.e., non-Orthodox and,
later, non–Greek-speaking) person or state could be trusted. Indeed, one might
argue that the Byzantines would have viewed war as the natural state of being,
with peace as an aberration, rather the opposite of the current mindset in the
West. What is more, the Byzantines knew that war was expensive and danger-
ous. As John Haldon has written, the Byzantine self-image ‘‘was one of a belea-
guered Christian state fighting the forces of darkness, with foes against whom
it had constantly to be on its guard.’’26 This mindset—of constant, dangerous,
expensive conflict—naturally put the Byzantines’ thoughts toward how to avoid
war despite its prevalence.27 As Haldon continued, the Byzantines sought to
‘‘evolve a whole panoply of defensive techniques, among which warfare was
only one element, and by no means necessarily the most useful.’’28 Intelligence,
covert action, trickery, and gold-lubricated diplomacy were thus the natural
recourse of a state that sought to manage the threats to God and emperor that
lurked at every single border.
Byzantium was, in short, paranoid—and justifiably so. In Constantinople
the whole machinery of state was geared to security: State infrastructure served
to facilitate the movements of armies and the intelligence that triggered their
deployments; the functionaries of state—both internal and external, and cen-
tral and provincial—had as their main duties the detection of enemies or their
destruction; and the Orthodox Church, the source of religious legitimacy for
the emperor, played a central role in the security of the state through actual
intelligence functions as well as offering strong diplomatic entrée abroad. As
with Dziak’s description of the USSR, in the Byzantine world all the organs of
state were designed to ensure the ‘‘self-perpetuation’’ of the state rather than its
well-being.29 Examining this infrastructure in detail helps in understanding its
pervasiveness in the medieval state.
One piece of security infrastructure inherited by the Byzantines from its
Rome-based antecedent was the postal system. The sixth-century historian Pro-
copius notes in his Secret History that the ‘‘earlier emperors, in order to gain
the most speedy information concerning the movements of the enemy in each
territory, seditions or unforeseen accidents in individual towns, and the actions
of the governors and other officials in all parts of the Empire, and also in order
that those who conveyed the yearly tribute might do so without danger or delay,
had established a rapid service of public couriers.’’30 If a modern Westerner were
to be told that their state’s postal system was there primarily to spy on external
enemies, governors, and citizens alike, they would likely be slightly concerned,
but this system was a natural consequence of the strategic and political environ-
ment in which the state existed and which was the cause of its elaborate gover-
nance. As a system designed for purposes of security and intelligence, it should
not be a revelation that those who worked for the post were in turn security
Protecting the New Rome / 73
functionaries, the agentes in rebus (literally ‘‘agents for things,’’ perhaps best
translated as ‘‘general agents’’). Their duties included the supervision of the
roads and inns of the cursus publicus (later the Hellenized δημουσος δρ
μος),
the carrying of letters, and verifying that a traveler was carrying the right war-
rant (evectio, δρνθημα) while using the cursus. Other tasks of the agentes
included supervising the provincial bureaucracy and delivering imperial com-
mands, often staying in the area to ensure their implementation. Being outside
the control of the provincial governors, some agentes, the curiosi (Greek:
διατρχοντες), were appointed as inspectors and acted as a sort of secret police
reporting to the emperor.31 They were used, also, to supervise the arrest of
senior officials as required, to escort senior Romans into exile, and so even to
assist in the enforcement of government regulation of the Church—a require-
ment of the caeseropapist state.32
The public post was part of a larger internal security structure. The tenth-
century great hetaeriarch (μγας ταιρειρχης), or captain of one of the guard
units, was the chief officer responsible for protecting the emperor against plots.33
One might presume that it was these officers who ‘‘at once informed’’ Emperor
Alexius I of the senatorial/military plot against him in 1083, the officers’ plot
of 1091, the nobles’ plot of 1094, and half a dozen other plots besides.34 Byzan-
tine history is infamous and eponymous for its endless cycle of plots—the con-
temporary chronicler Michael Psellus describes some nineteen serious plots
against emperors in the period 976–1081—and in reading the various Byzantine
primary texts, one sees how often these were smashed, often based on what the
chroniclers describe only as the information ‘‘of a peasant,’’ perhaps ‘‘a priest,’’
or often just ‘‘somebody.’’35
Ultimately, Byzantium resembles to a good degree Dziak’s ‘‘counterintelli-
gence state,’’ where people were constantly searching for plots that were
assumed to always be present—which in the case of Constantinople they likely
were. It was a dangerous business being a Byzantine emperor; between the years
395 and 1453 there were 107 Byzantine emperors, with an average of ten years
on the throne. Only 34 of these emperors died natural deaths. Psellus recounts
the advice given to the great warrior-emperor Basil II (who would convert the
Kievan Slavs to Christianity and begin the great relationship between the Byz-
antines and the Russians) from his would-be overthrower, Sclerus: ‘‘Cut-down
the governors who become over-proud. . . . Let no generals on campaign have
too many resources. Exhaust them with unjust taxations to keep them busied
with their own affairs. Admit no women to the imperial councils. Be accessible
to no one. Share with few your intimate plans.’’36
One might think these words were those Stalin himself might have uttered.
We can surmise that Alexius I, founder of the Comnene Dynasty, ran a large
network of agents to protect his reign. With regard to plotting, phrases such as
‘‘the Emperor, however, was not unaware of it’’ or ‘‘he had reliable information’’
74 / Kristian C. Gustafson
from ‘‘many informants’’ dot the Alexiad; indeed, they are pointedly made by
Anna Comnena in her The Alexiad to show her father’s shrewdness in beating
the enemies of the state through superior information.37 The eleventh-century
provincial official Kekaumenos offers this advice in his Strategikon: ‘‘If you hear
of [an accusation] against your official, that he is plotting against your majesty,
do not let the evil lie hidden within your soul and aim to destroy him. Instead,
make a thorough investigation, at first keeping things secret. But if you then
discover the truth, the charge against him should be made openly.’’ Failing to
collect all the evidence with enough skill, the text then seems to say (it has
lacunas), ‘‘You then make [him] your enemy and many other [enemies] on
account of him.’’38 Being clever enough to weed out and condemn plotters had
a practical and social value in Byzantium. A sound-minded Byzantine ruler,
Kekaumenos suggests, always distrusts the motivations of his servants and
actively works to protect against their plotting. We should add that this is not
a uniquely Byzantine view of Byzantine life; the Crusaders who came into con-
tact with the empire almost uniformly viewed the Byzantines as perfidious,
treacherous, and undependable, as well as unmanly for being so.39
Let us go back to the official security structures of the state, which may have
helped emperors such as Basil II and Alexius I secure their thrones for so long.
As the Byzantine Empire moved past the near-fatal crisis of the Arab invasions
of the seventh and eighth centuries, the administration of the postal system
evolved, with the senior officer becoming the senior minister and principal
adviser to the emperor until superseded in the twelfth century by the logothete
of the secreton (offices or bureaus, μογοθτης το σεκρτον), a position not
unlike the ‘‘principal secretary’’ post filled by Sir Francis Walsingham in Eliza-
bethan England.40 Thus effectively, the roads and the post—the intelligence
infrastructure—were managed by the closest thing the Byzantines had to a com-
bined foreign minister and prime minister, which shows the importance of
security and intelligence gathering in the governance of the state. Perhaps more
interestingly, for our purposes here, it was administratively grouped either with
or alongside the Scrinium Barbarorum (βρβαρος), or Bureau of Barbarians.
Mistaking the Bureau of Barbarians as an espionage office, as has been done
by some, betrays a Western cast of mind: that such duties are entrusted to a
single agency, whereas in Constantinople security intelligence was the job of
much of the government.41 Regardless, the bureau was established in the mid–
fifth century, and it is first mentioned in the Constitution of Theodosius II.42 It
was still in existence at the time of Philotheos in the tenth century, and it is
presumed by J. M. Bury to have ‘‘exercised supervision over all foreigners visit-
ing Constantinople.’’43 Although, on the surface, it was a protocol office—its
main duty was to ensure that foreign envoys were properly cared for and
received sufficient state funds for their maintenance, and it kept all the official
Protecting the New Rome / 75
translators—it clearly had a security function as well. Though not directly asso-
ciated with the Bureau of Barbarians, an anonymous work called On Strategy
from the sixth century offers advice about foreign embassies and envoys that
was no doubt shared by the Bureau: ‘‘[Envoys] who are sent to us should be
received honorably and generously, for everyone holds envoys in high esteem.
Their attendants, however, should be kept under surveillance to keep them
from obtaining any information by asking questions of our people.’’44 This was
the job likely fulfilled by the bureau. A twelfth-century Italian ambassador to
Byzantium, Bishop Liudprand of Cremono, spits venom about his Greek mind-
ers, whom, he perceived accurately, were there as his jailers rather than his
protectors.45 We know such surveillance failed from time to time; the Arab
hostage Al Jarmi sent back to the caliphs of Damascus a detailed Byzantine
order of battle in the year 845.46
The Byzantines knew well that embassies and envoys were as much for intel-
ligence purposes as for diplomatic, that indeed the former was a precondition
for the latter.47 A number of Byzantine texts thus speak of the role of envoys and
how they should be selected and trained, with a premium placed on religious
orthodoxy and reliability: ‘‘The envoys we send out should be men who have
the reputation of being religious, who have never been denounced for any crime
or publicly condemned.’’48 This same work stresses that the envoy must be able
to dissemble and lie about Roman intentions, and not to give too much of the
empire’s intentions away if he happens to find the receiving state unexpectedly
unfriendly. Theophanes offers the example of Daniel of Sinope, an envoy sent
to Emir Walid of Syria not really to discuss terms, but ‘‘to make a precise exami-
nation of the Arabs’ move against Romania, and their forces.’’49 Above all, the
envoy was there to protect the security of the emperor (and thus empire) in any
way he could. As Bréhier notes: ‘‘It was above all in the relations with the
established states, whose power could menace Constantinople, that imperial
diplomacy had to deploy all its resources, following with attention the evolu-
tions of their internal politics and producing intelligence on their forces, in an
era where the idea of permanent embassies did not exist. Thanks to its strong
traditions and its ability to discover the weak points of its enemies, [Byzantine
diplomats] several times preserved the existence of the Empire, in instances
where [information] proved more advantageous than military force.’’50
For the Byzantines diplomacy was the handmaiden of intelligence, and
intelligence was the shield of the state. It seems the polities within the Byzan-
tine sphere of interest understood this well. On receiving a Byzantine envoy in
the tenth century, the khagan of the Central Asian Turks asked, ‘‘Are you not
those Romans who have ten tongues and one deceit?’’51
The Church, as well as diplomats, was always a potential source of intelli-
gence for the Byzantines. Interestingly, it was monks who were involved in the
most famous case of Byzantine industrial espionage: the theft of silkworms from
76 / Kristian C. Gustafson
68) the empire was defended by what was called the ‘‘thematic’’ system, themes
being provinces ruled by military governors and defended by militias of settled
ex-soldiers.59 The thematic armies were thus largely static and nonprofessional,
and were bolstered by the Tagma, the smaller imperial professional field force
kept near the capital. Worse, from the mid-seventh to early tenth centuries, the
empire was on the defensive on many fronts, surrounded by enemies, and with
never enough troops to deal with everyone at once. Accordingly, much of the
day-to-day defense of the empire was delegated to the thematic governors, who
had to absorb attacks as best they could, conduct guerrilla and small-unit
harassment as they could, and hope the tagmatic forces might show up in time
to assist in the destruction of the enemy as it retreated loaded with booty.60
Edward Luttwak argues persuasively that this ‘‘elastic’’ defensive system suited
the empire’s more limited military means and naturally placed a premium on
intelligence.61
Moreover, the enemies of the state varied, and field army commanders
needed to know who they were fighting to know how they were going to fight.
As the great warrior-emperor Maurice (582–602) says in his Strategikon: ‘‘We
must now treat of the tactics and characteristics of each race which might cause
trouble to our state. The purpose of this chapter is to enable those who intend
to wage war against these peoples to prepare themselves properly. For all nations
do not fight in a single formation or in the same manner, and one cannot deal
with them all in the same way.’’62
Following this is a description of the tactics, techniques, and procedures of
many of the neighboring peoples, and in this we can perceive the great intelli-
gence structures the Byzantines maintained. Constantine VII’s De Admin-
istrando Imperio is a critical guide to foreign policy and diplomacy written for
the emperor’s youthful son, and spends much of its substantial length giving
detailed descriptions of the empire’s neighboring peoples, their internal politics,
and thus how the empire could best deal with them. Romilly Jenkins, an editor
of the work, notes how some of the material in this ‘‘secret and confidential
document’’ is clearly derived from secret sources.63 We also know that though
Constantine authored this work in his long years of enforced idleness, some of
the material is drawn from other, preexisting sources.64 Was there in Byzantium
a system whereby information from diplomats, governors, the Church, the
Bureau of Barbarians, the logothetes, and other sources was compiled and pushed
out to consumers in government and in military commands? We have no infor-
mation to indicate whether this was the case, but it is possible that it existed at
points before the early thirteenth century.
To understand the fullness of the Byzantine approach to intelligence, one
therefore needs to look to the numerous military manuals published for the
edification of both emperors and governors alike. In the defensive centuries of
the empire, a premium was placed on knowing the enemy and on trying to
78 / Kristian C. Gustafson
emperor suggests that the governor ought to attempt redundant coverage of the
foe: ‘‘He ought also to have the businessmen go out’’ to spy.69 Byzantine leaders
were not too class conscious, however, and also ‘‘sent spies disguised as beggars,’’
as Leo the Deacon says.70
The Byzantines, as one can see, had a very highly developed conception of
the role and practice of intelligence. Unlike any other organized polity until
the modern era, they maintained bureaucratically organized security structures
(though never intelligence organizations specifically), which century after cen-
tury ensured a constant flow of information about the external and internal
enemies of the state to leader and field commanders. All levels of the state
leadership were engaged in spying on the emperor’s ubiquitous foes, in what
closely matches Dziak’s description of the counterintelligence state. The role of
the entire structure of governance was ‘‘to put it briefly, to make sure that
nothing which [the enemy] might be thinking of will escape us.’’71 Because
everyone who was not Orthodox or Byzantine was almost by definition a foe,
intelligence needed to be an ongoing and natural part of governance. Luttwak
argues persuasively that two key tenets of Byzantine ‘‘operational code’’ were
‘‘gather intelligence on the enemy and his mentality, and monitor his move-
ments constantly’’ and ‘‘subversion is the path to victory.’’72 This ongoing and
ambient need for intelligence, and the stress on covert action, made the Byzan-
tines distinct from their predecessors in Rome, Greece, and elsewhere—and
were part of what links them to modern Russia.
the Russian state, and that has served the Soviet and subsequent post-Soviet
Russian state.
There are links that show the Tsarist and then Soviet security apparatus to
have a Byzantine pedigree based on inherited political culture. The secret chan-
cery, or prikaz tainykh del, is described by Russian historians as the personal
chancery of the tsar in the seventeenth century. Initially, it was led by a secret
clerk called a d’yak. This word is interesting because it is etymologically derived
from the Greek work diakonos (deacon), a monastic or Church rank that hints
at the strong role of Byzantine Church governance in Kievan and early Musco-
vite Russia. The main function of the secret prikaz was to supervise both other
prikazy and other officials of the tsar, such as diplomats and military officers.
The d’yak reported directly to the sovereign.74 A subsequent organization was
the eighteenth-century Tainaya rozysknykh del kantselyariya. Under the leader-
ship of A. I. Ushakov, a veteran from the previous secret chancery, this office
supervised the investigation of political suspects throughout the empire and
took immediate responsibility for the most dangerous delinquents.75 These
offices bear a resemblance, in bureaucratic terms, to the logothetes and secretum
of tenth-century Byzantium, not surprising given the clerical origin of both. It
is in these organizations, modeled at least in part on Byzantine methods of
government, that we find the predecessors of the modern Russian security appa-
ratus.76 The Cheka, the NKVD, and eventually the KGB were all the successors
of the Ohkrana ‘‘in at least equal size and in more merciless temper, if in some-
what different form.’’77 The FSB and SVR would emerge from the Soviet struc-
tures much more seamlessly.
One can draw no specific indication of Byzantine bureaucratic organization
in the organization of the Soviet and subsequent Russian state, but in spirit, the
way the Soviets organized their government for security purposes is still quite
Russian. Few would argue that in his control of the security organs of the state,
Joseph Stalin’s Soviet Union behaved in an imperial fashion and forms the
model of Dziak’s counterintelligence state. Like the Byzantine system, Amy
Knight observed that in early post-Soviet Russia ‘‘the president ‘directs the
activity’ of the security services, and [the law] diminishes the role of parliamen-
tary oversight entirely.’’78 Other observers have noted, as mentioned above, that
modern Russia’s government and elites come in large part from the security
services.79 Like their Byzantine forebears, the Soviets drew no particular distinc-
tion between ‘‘overt’’ and ‘‘covert’’ in the persecution of the enemies of the
state. Diplomacy in the Western usage tries to draw a broad line between its
proper functioning and the underhanded methods of the state’s intelligence
agencies, to the point where organizations such as the UK Secret Intelligence
Service (a.k.a. MI-6) are entrusted with the specific task of ‘‘secret diplomacy’’
where their Foreign Office colleagues could not tread.80 The Soviet term ‘‘active
measures’’ (activinyye meropriatia) took in both overt and covert actions to
Protecting the New Rome / 81
influence foreign countries, whereas most other terms used in the West focus on
the covert.81 As Richard Shultz and Roy Godson point out, the terms ‘‘special
activities’’ and ‘‘covert actions’’ tend to indicate that they are made of separate
stuff from the substance of foreign policy, but ‘‘in the Soviet view, . . . no
such distinctions are apparent.’’82 Whereas a Western ambassador might balk at
purposefully deceiving an interlocutor for fear of losing credibility, the Byzan-
tine, Russian, or Soviet diplomat would not, as might be witnessed in the story
of Soviet diplomatic disinformation surrounding the Cuban Missile Crisis.
Of the purges and show trials of Stalin’s Russia, we have ample evidence in
the Byzantine state. Theophanes notes Justinian’s behavior after discovering a
plot against him by one Herakleios, who
was brought in bonds from Thrace along with all the other officers who were his
comrades. Justinian hanged them all on the wall. He also sent men into the
interior who rooted out many more officers and killed them, those who had
been active against him and those who had not alike. . . . Justinian blinded the
patriarch Kallinikos and exiled him to Rome. . . . [He] destroyed an uncountable
number of political and military figures; many he gave bitter deaths by throwing
them into the sea in sacks. He invited others to a fine meal and hanged some of
them when they got up; others he cut down. Because of all this everyone was
terrified.83
If one were to change the names from Herakleios and Kallinikos to Tukachev-
sky and Zinoviev, and substitute Stalin for Justinian, this story retains a fright-
ening degree of fidelity. Such Soviet-sounding stories are repeated in
Comnena’s The Alexiad, who notes even her adored father’s use of torture to
uncover plots against him.84
The Russians and Byzantines also share a penchant for disposing of dissi-
dents in particularly brutal fashion. As with the assassination of Georgi Markov
in London by the Bulgarian secret police, or the assassination of Leon Trotsky
in Mexico by the NKVD, so the Byzantines were willing and able to destroy
enemies of the state abroad. After making a peace treaty with the Bulgarians,
Emperor Constantine V ‘‘sent men into Bulgaria who seized Sklabounos the
ruler of Sebereis, a man who had worked many evils in Thrace. Christianos, an
apostate from Christianity who headed the Skamaroi, was also captured. His
hands and feet were cut off at the mole of St. Thomas. . . . [He was eviscerated]
and then he was burned.’’85 Look at what is described here: Imperial agents did
not just execute a traitor, they also kidnapped him and returned him to imperial
territory so that he could be executed spectacularly. Examples of such ‘‘extraor-
dinary rendition’’ are noted several times in Byzantine texts. The poisoning of
Alexander Litvinenko, as it is suggested, by his former Chekist peers would not
seem strange to the Byzantines in any aspect other than the particular
method.86 They would likely heartily agree with the assassination’s necessity.
82 / Kristian C. Gustafson
For the Byzantines, various populations along the borders were troublesome,
and so they were forcibly uprooted and moved to parts of the empire where
they had less opportunity to cause harm. The heretical Athenganoi, the Pauli-
cians, and much of the Armenian aristocracy were relocated between the eighth
and tenth centuries ‘‘to remove recalcitrant elements which, if left in their
homeland, might have become serious sources of trouble.’’87 Such forced move-
ments of populations, most often minority groups perceived as security risks,
were a frequent recourse of Stalin, who took thirteen entire minority nations
that ‘‘totaled more than 2 million people [and] deported [them] to internal
exile.’’88 This has even occurred in post-Communist Russia, though to a much
smaller degree.89 Beyond these, however, is a general climate of security. Like
the Byzantines, Russia has for most of its political existence viewed itself as
being surrounded by threats. As George Kennan put it in his famous ‘‘Long
Telegram,’’ at bottom a ‘‘neurotic view of world affairs is [a] traditional and
instinctive [part of the] Russian sense of insecurity.’’90 Causation and correlation
are hard to distinguish here. Do the Byzantines and the Russians look alike
simply because they share, randomly, a similar worldview? Or do they share a
similar worldview because of a shared religious/ideological background? Here
the ‘‘layer cake’’ of culture and the thickness of the intervening centuries of
history make it hard to give a definitive answer.
One of the most curious aspects of the current Russian security environment
is the resurgence of religion. In the 2000 National Security Concept, the Putin
administration stated, ‘‘assurance of the Russian Federation’s national security
also includes protecting the cultural and spiritual-moral legacy and the histori-
cal traditions and standards of public life, and preserving the cultural heritage
of all Russia’s peoples. There must be a state policy to maintain the population’s
spiritual and moral welfare, prohibit the use of airtime to promote violence or
base instincts, and counter the adverse impact of foreign religious organizations
and missionaries.’’91 Here we have the highest authority directly relating the
health of Russia’s traditional religion, Orthodoxy, to the security of the state.
Several significant works of scholarship have identified that this ‘‘tendency to
see religious difference as, at least in part, a potential security threat is shared’’
by both the Orthodox Church and Vladimir Putin, and presumably the current
government.92 Equally interesting is the fact that Putin, an apparently practic-
ing Orthodox Christian himself, ensured that in 2002 the Federal Security
Agency (FSB) rededicated its traditional Orthodox chapel in the Lubyanka.
This, wrote Julie Elkner, ‘‘set the seal on the special relationship between the
FSB and the Russian Orthodox Church (Moscow Patriarchate).’’ Deputy FSB
director Vladimir Shul’ts hailed the consecration of the church as a ‘‘truly
emblematic event,’’ which, Elkner suggests, should be ‘‘viewed in the light of
the complex and dramatic history of relations between the secret police and
the Orthodox Church.’’93 One commentator has convincingly described how
Protecting the New Rome / 83
the Russian Foreign Ministry has been harnessing the Orthodox Church as a
tool to control expatriate Russian communities outside Russia via the reuniting
of the Russian Orthodox Church Outside Russia with the Patriarchate in
Moscow.94
Although John Anderson relates this increasing state Orthodoxy to the
politicized Patriarchate under Peter the Great, it is clear on review that the
tradition of politicized state religion has a longer pedigree indeed, and one
can note the similarity to Byzantine views on the subject going back nearly a
millennium. What will be interesting to see is if this view continues with the
current degree of energy once Putin has left the political scene. Regardless, that
Orthodoxy should be so resurgent in Russia after seventy years of enforced athe-
ism shows the resilience of cultural habit over the longer term. It reinforces our
argument in the conclusion of this volume that culture is an indicator not of
what but how.
Echoes of Empire
By no means is it the case that Russia is solely bound by its Byzantine heritage,
for though there are many similarities, differences abound as well. As was noted
in the introduction to this volume, there are simply too many unaccountable
variables that scholars simply cannot untangle. At each stage of Russia’s history
since the founding of the Kievan and Muscovite states, the Russians as a people
have been a unique and independent force in European and Asian history.
There have been many influences on Russia over the centuries, each piling on
top of the other like layers in a cake: Byzantine, Mongol, Western European,
and the powerful rules of men like Ivan IV, Peter the Great, Lenin, and Stalin,
who shaped history and culture with sheer force of personality. But just as
biblical scholars and paleographers seek the ‘‘ur-text’’ as they trace their work’s
history, so in the field of intelligence and security one can seek some original
source of behaviors that predate any future evolutions. In Russia one has a clear
source of this in the history of the Byzantine Empire.
The importance of this particular argument can neither be overstated nor
ignored. As explained above, it must be clear that the Russians are their own
people, with a political and social volition beyond their cultural antecedents.
When the nations of the West, conversely, try to understand the behavior of
the Russian state—or the historic behavior of its Soviet or Tsarist predeces-
sors—some keys need to be provided to unlock the behavior and make sense of
it. Especially when dealing with the behavior of Russia in its security culture
and its manifestation in intelligence, a heritage significantly different from that
of the Western European and Anglo-Saxon states is clearly at work. It is in the
parallels to the great empire of Constantinople where one may begin to see
inside, or rather deeply behind, many Russian behaviors.
84 / Kristian C. Gustafson
Can one extend the argument made here about Russia’s Byzantine inheri-
tance to other states of the Byzantine Commonwealth, such as Romania, Bul-
garia, Serbia, and the closest inheritor, Greece? Perhaps to some degree. Here
one would also need to account not only for the reimported Russian influence of
the Communist era but also for more than five hundred years of the Ottomans’
occupation—and the latter featured rule by their dragoman and hospodar client
rulers, often Phanariote Greeks, which, though strongly Hellenic, was more
clerical in tone.95 Greece under the colonels was strongly authoritarian and had
all the features of a police state, and Bulgaria and Serbia have clearly had their
troubles with authoritarian security cultures since their post-Communist inde-
pendence; yet just as clearly, states such as Romania (noted for its strong Phana-
riote political culture as late as the nineteenth century96) have altered their
political culture radically since the end of communist rule and cut a hard course
toward democracy and an accountable security structure in a Western European
mold.97 Ultimately, as quoted elsewhere in this volume, as W. Somerset
Maugham asserted, it is clear that ‘‘tradition is a guide and not a gaoler.’’
Notes
1. Dimitry Obolensky, Byzantium and the Slavs (Crestwood, NY: St. Vladimir’s Seminary
Press, 1994).
2. Edward Lucas, The New Cold War (New York: Palgrave, 2008).
3. Reuel Marc Gerecht, ‘‘A Rogue Intelligence State? Why Europe and America Cannot
Ignore Russia,’’ European Outlook (American Enterprise Institute), no. 2 (2007): 1.
4. Olga Kryshtanovskaya and Stephen White, ‘‘Putin’s Militocracy,’’ Post-Soviet Affairs
19, no. 4 (2003): 289.
5. See Amy Knight, Spies without Cloaks: The KGB’s Successors (Princeton, NJ:
Princeton University Press, 1998), in passim; Gerecht, ‘‘Rogue Intelligence State?’’; and
Kryshtanovskaya and White, ‘‘Putin’s Militocracy.’’
6. Knight, Spies without Cloaks, 244.
7. Obolensky, Byzantium and the Slavs, 83.
8. G. Ostrogorsky, History of the Byzantine State, translated by J. Hussey (New Brunswick,
NJ: Rutgers University Press, 1957), 509.
9. For a less sanguine view of Byzantine influence on early Russia, see J. L. I. Fennell,
Ivan the Great of Moscow (New York: Macmillan, 1961), 319–20.
Protecting the New Rome / 85
10. Cornelius Krahn, ‘‘Messianism-Marxism,’’ Journal of Bible and Religion 31, no. 3 (July
1963): 211.
11. F. L. Cross and E. A. Livingstone, eds., Oxford Dictionary of the Christian Church, 2nd
ed. (Oxford: Oxford University Press, 1983), 218. See also Edward Luttwak, The Grand Strat-
egy of the Byzantine Empire (Cambridge, MA: Belknap Press, 2009), 137.
12. Dimitri Stremooukhoff, ‘‘Moscow the Third Rome: Sources of the Doctrine,’’ Specu-
lum 28, no. 1 (January 1953): 85.
13. Obolensky, Byzantium and the Slavs, 79.
14. J. S. Duncan, Russian Messianism: Third Rome, Revolution, Communism and After (Lon-
don: Routledge, 2000), 11.
15. Stephen Schenfield, Russian Fascism: Traditions, Tendencies and Movements (London:
M. E. Sharpe, 2001), 29; Richard Pipes, Russian Conservatism and Its Critics: A Study in
Political Culture (New Haven, CT: Yale University Press, 2007), 148–49.
16. Obolensky, Byzantium and the Slavs, 101.
17. John J. Dziak, Chekisty: A History of the KGB (Lexington, MA: Lexington Books,
1988), 4.
18. Arnold J. Toynbee, A Study of History, 2nd ed. (London: Oxford University Press,
1948), 320–408; on Caesaro-Papism, see 164–83.
19. Dimitri Obolensky, Byzantine Commonwealth: Eastern Europe 500–1453 (London:
Phoenix, 2000).
20. Zoe Katerina Knox, Russian Society and the Orthodox Church: Religion in Russia after
Communism (London: Routledge, 2004), 170–71.
21. Nikolas Oikonomides, ‘‘The Role of the Byzantine State in the Economy,’’ in The
Economic History of Byzantium, edited by Angeliki E. Laiou (Washington, DC: Dumbarton
Oaks, 2007), 973, www.doaks.org/resources/publications/doaks-online-publications/byzantine-
studies/the-economic-history-of-byzantium/ehb44-state-and-the-economy.
22. Dziak, Chekisty, 2.
23. Ibid., 1.
24. Ibid., 2.
25. Branko Milanovic, ‘‘An Estimate of Average Income and Inequality in Byzantium
around Year 1000,’’ Review of Income and Wealth 52, no. 3 (September 2006): 450. See also
Angeliki E. Laiou and Cecile Morrisson, The Byzantine Economy (Cambridge: Cambridge
University Press, 2007), chap. 4 passim.
26. John Haldon, Byzantium at War (New York: Osprey, 2001), 74.
27. Luttwak, Grand Strategy, 416.
28. Haldon, Byzantium at War, 74.
29. Dziak, Chekisty, 2.
30. Procopius, Secret History, xxx.
31. Alexander Kazhdan, ed., Oxford Dictionary of Byzantium (Oxford: Oxford University
Press, 1991), 37. See also Louis Bréhier, Les Institutions de l’Empire Byzantin (Paris: Editions
Albin Michel, 1949), 327.
32. William J. Sinnegen, ‘‘Two Branches of the Roman Secret Service,’’ American Journal
of Philology 80, no. 3 (1959): 238–54.
33. John Bagnall Bury, Philotheus: The Imperial Administrative System of the Ninth Century,
with a Revised Text of the Kletorologion of Philotheos (London: Oxford University Press, 1911),
106.
34. Anna Comnena, The Alexiad, translated by E. R. A. Sewter (New York: Penguin,
2004), 186, 261, 282.
86 / Kristian C. Gustafson
See Treadgold, ‘‘Notes,’’ passim; and Romilly Jenkins, Byzantium: The Imperial Centuries
(London: Weidenfeld & Nicolson, 1966), 16.
60. J. F. Haldon and H. Kennedy, ‘‘The Arab-Byzantine Frontier in the Eighth and Ninth
Centuries: Military Organisation and Society in the Borderlands,’’ in The Byzantine and Early
Islamic Near East, edited by H. Kennedy (Aldershot, UK: Ashgate, 2006), 79–81.
61. Luttwak, Grand Strategy, 5–6, 416.
62. Maurice, The Strategikon, translated by George T. Dennis (Philadelphia: University of
Pennsylvania Press, 1984), book XI, para. 1, 113.
63. Constantine VII, 13.
64. Constantine VII was first under the regency, then the rule, of the former admiral
Romanus Lecapenus, who made himself emperor and ruled from 922 to 940. Only on Roman-
us’s death did Constantine VII rise to be sole emperor.
65. Nikephoros Phokas, attrib., On Skirmishing, in Three Byzantine Military Treatises, trans-
lated by George T. Dennis, 163.
66. Anonymous (ca. 960 CE), Campaign Organisation, in Three Byzantine Military Treatises,
293.
67. On Strategy, para. 42, 123.
68. On Skirmishing, para. 7, 163.
69. Ibid.
70. Leo the Deacon, The History, translated by Alice-Mary Talbot and Denis Sullivan
(Washington, DC: Dumbarton Oaks, 2005), book VII, para. 5, 168.
71. Campaign Organization, para. 18, 293.
72. Luttwak, Grand Strategy, 416–17.
73. Francis Dvornik, ‘‘Byzantine Influence on the Kievan State,’’ Dumbarton Oaks Papers
9 (1956): 76.
74. Daniel Tarschys, ‘‘Secret Institutions in Russian Government,’’ Soviet Studies 37, no.
4 (October 1985): 528.
75. Tarschys, ‘‘Secret Institutions,’’ 529.
76. Ibid., 532.
77. Christopher Andrew and Oleg Gordievsky, KGB: The Inside Story (London: Hod-
der & Stoughton, 1998), 28.
78. Knight, Spies without Cloaks, 221.
79. Andrei Soldatov and Irina Borogan, The New Nobility: The Restoration of Russia’s
Security State (New York: PublicAffairs, 2010), 28–29.
80. Len Scott, ‘‘Secret Intelligence, Covert Action and Clandestine Diplomacy,’’ Intelli-
gence and National Security, 19, no. 2 (2004): 335.
81. Ibid., 323.
82. Richard Shultz and Roy Godson, Dezinformatsia: The Strategy of Soviet Disinformation
(New York: Berkley Books, 1986), 16.
83. Theophanes, Chronicle of Theophanes, para. 375, 71–72.
84. Comnena, Alexiad, 384.
85. Theophanes, Chronicle of Theophanes, para. 436, 125.
86. See Alex Goldfarb and Marina Litvinenko, Death of a Dissident: The Poisoning of Alex-
ander Litvinenko and the Return of the KGB (London: Free Press, 2007).
87. Peter Charanis, ‘‘The Transfer of Population as a Policy in the Byzantine Empire,’’
Comparative Studies in Society and History 3, no. 2 (January 1961): 151.
88. J. Otto Pohl, ‘‘Stalin’s Genocide against the ‘Repressed Peoples,’ ’’ Journal of Genocide
Research 2, no. 2 (2000): 267.
88 / Kristian C. Gustafson
89. B. Nahajlo, ‘‘Forcible Population Transfers, Deportations and Ethnic Cleansing in the
CIS: Problems in Search of Responses,’’ Refugee Survey Quarterly 16, no. 3 (1997).
90. George Kennan, ‘‘The Long Telegram,’’ cable, Embassy in Moscow to State Depart-
ment, February 22, 1946.
91. Vladimir Putin, ‘‘2000 Russian National Security Concept,’’ www.russiaeurope.mid
.ru/russiastrat2000.html.
92. John Anderson, ‘‘Putin and the Orthodox Church: Asymmetric Symphonia?’’ Journal
of International Affairs 61, no. 1 (2007): 195.
93. Julie Elkner, Spiritual Security in Putin’s Russia, History and Policy Paper 26, July 2005,
www.historyandpolicy.org/papers/policy-paper-26.html噛summ.
94. Daniel P. Payne, ‘‘Spiritual Security, the Russian Orthodox Church, and the Russian
Foreign Ministry: Collaboration or Cooptation?’’ Journal of Church and State 52, no. 4 (2010).
95. L. S. Stavrianos, The Balkans since 1453 (London: Hurst, 2002), 270. The Phanar was
the neighborhood in Constantinople left to the Greeks after the conquest of 1453, and
repopulated in the decades after by Greek speakers from other parts of the Ottoman Empire,
often traders. Their language skills were harnessed by the Ottomans, and the term ‘‘Drago-
man’’ means ‘‘translator,’’ the representative of the Ottoman governor, who himself would
remain distant from the local population.
96. Ibid., 692.
97. Larry L. Watts, ‘‘Intelligence Reform in Europe’s Emerging Democracies: Conflicting
Paradigms, Dissimilar Contexts,’’ Studies in Intelligence 48, no. 1 (2004).
CHAPTER 6
I
n his epistle ‘‘Secret Keeping and Mincing Words,’’ the prolific ninth-century
Arab writer and philosopher Al-Jahiz says that it is human nature ‘‘to seek
news and intelligence.’’1 According to Al-Jahiz, humanity’s search for news
is as old as history. The reason is not difficult to see. Life, or rather survival,
requires constant responses to questions and queries that must be answered if
one is to protect oneself and prepare for unforeseen eventualities. Arabs, like
other nations of the world, used intelligence and engaged in a variety of espio-
nage activities during peacetime as well as wartime. Understanding the religious
and ideological basis of any given society is a prerequisite for any effective
engagement with that society. This is no less true of the Arab and Islamic
worlds than of anywhere else, especially given that, though religion underlies
basic beliefs in most parts of the world, ‘‘it is not normally toxically linked with
politics in the same way as it is in the Middle East.’’2 It is also essential in a
broader context than the Middle East because Islam is a global religion, and
many communities and governments in Africa, Asia, the Trans-Caucasus, and
other regions are as much inheritors of an Islamic intellectual and intelligence
legacy as they may be of indigenous, pre-Islamic influences.
This chapter demonstrates that there is an Arab concept of intelligence
that dates back long before the rise of Islam in the first half of the seventh
century, more specifically to the Age of Jahiliya (Ignorance) of the second and
third centuries and beyond. During those ancient times the Qahtani tribes of
/ 89 /
90 / Abdulaziz A. Al-Asmari
Southern Arabia, like all inhabitants of the northern and central parts of the
Arab Peninsula, had their own networks of spies and secret agents, who were
quite active during both war and peace. In the early stages of Islam,3 the Prophet
Muhammad (pbuh) and his followers first made use of and later enriched and
developed those intelligence notions and practices that they had inherited from
their Arab predecessors.4 As Richard Gabriel has observed, the Prophet
Muhammad was not merely ‘‘a tactician, military theorist, organizational
reformer, strategic thinker, operational-level combat commander, political-
military leader, heroic soldier and revolutionary, inventor of the theory of insur-
gency and history’s first successful practitioner’’; he was also ‘‘a master of intelli-
gence in war, and his intelligence service eventually came to rival those of
Rome and Persia, especially in the area of political intelligence.’’5 That being
said, a pre-Islamic Arab tradition underpins the subsequent Islamic approach
to intelligence, which has since spread with that religion well beyond the Arab
world.
been waged by the tribes of Arabia for no other reason than to control or
monopolize wells and water resources. Scouting for water and pastureland was
not only customary but necessary before a Bedouin group could fold camp and
move on.
Special mention must be made of the early Arabic term bareed. This widely
used word—which has always denoted ‘‘news reporting’’ or, more broadly,
‘‘post’’ or ‘‘mail’’—signifies the interest shown by the early Arabs in this activ-
ity. The term appears in a number of ancient documents and poems, most
famously in a poem written by the sixth-century Arab poet Imru’ al-Qais. The
Prophet Muhammad also used this word in one of his sayings when he enjoined
his followers to give earnest and careful consideration to such reporting.24
intelligence activities carried out by the Arab states appears in the multivolume
anthology and encyclopedia Kitab al-Aghani (Book of Songs), which was com-
piled in the tenth century by Abu Faraj al-Asbahani. According to al-Asbahani,
the most important task of the uyoun was to provide personal security for their
monarchs and superiors. Al-Asbahani relates the story of a Manathira spy who
was able to save the life of his king, Al-Naman bin Al-Munthir (ad 582–610).29
The spy, who was based deep inside the Ghassanid state in northern Arabia
(Syria), wrote to his master, warning that a rival had sent an agent for the
purpose of assassinating the king. With this vital intelligence, Al-Naman bin
Al-Munthir ordered his men to track down and shadow the newly arrived
would-be assassin. He was caught preparing for his deadly mission and killed
before he could carry it out.30
There is evidence that the Qahtani Arabs of southern Arabia engaged in
intelligence activities as early as the second century bc. Extant inscriptions
from the time contain references to such activities, which, despite the primitive
methods and tactics, were in many ways quite well organized. A recent study in
old south Arabian epigraphy shows that a high proportion of the ancient Qah-
tani army was charged with intelligence-related duties. Ten percent of all fight-
ing men were assigned to such activities as skirmishing, scouting, and
reconnoitering. As A. F. Beeston has shown, the Qahtanis recruited nomadic
Bedouins and a variety of mercenaries to carry out espionage missions, despite
the fact that these sources were not fully trusted or deemed reliable by their
handlers.31
With the possible exception of those living in Mecca and Medina, who
mainly worked as traders, the majority of the population of Arabia comprised
nomadic Bedouins, who moved from one place to another in search of water
and pasture. The early war records of the Bedouins of central Arabia contain
numerous references to the use of ain,32 rabee’ah,33 and talee’ah.34 This indicates
the existence of some sort of tactical intelligence, albeit in an undeveloped and
primitive form. The general system that governed Bedouin social relationships
was based on total allegiance to the leader of the tribe or clan. These tribal
communities—whose main occupation was keeping camels, goats, and sheep—
lived ‘‘in semi-isolation from the rest of the world . . . in a state of perpetual
war.’’35 Because these nomads were totally unmindful of the outside world, they
produced a culture in which, as Philip K. Hitti has put it, ‘‘the raid or ghazwa,
. . . otherwise considered a form of brigandage, [was] raised by the economic
and social conditions of desert life to the rank of a national constitution.’’ It
lay ‘‘at the base of the economic structure of Bedouin pastoral society,’’ in which
‘‘the fighting mood [was]a chronic mental condition’’ and ‘‘raiding is one of the
few manly occupations.’’ Hitti further quotes a poet of the period who observed
that ‘‘our business is to make raids on the enemy, on our neighbor and on our
own brother, in case we find none to raid but a brother!’’36 Although not on
96 / Abdulaziz A. Al-Asmari
the scale of a general war, the raids were so common that a new Arabic term,
su’louk, was coined to describe those involved in this specific form of attack, in
which numerous Arab poets took part. These poet brigands often boasted about
their exploits, which frequently involved scouts and spies.
Scouting and intelligence gathering were always an organic part of the skir-
mishes and clashes of su’louk. Before an attack was launched, one or more
rabee’ah elements would be called upon to scout the area and report any sight-
ings of the targets or any unusual happenings. The work carried out by desert
scouts and reconnoiters was considered more critical and perilous than that of
the ordinary fighting men. Severe punishments were meted out to those cap-
tured. The poet Aws bin Al-Hajar describes the rabee’ah as living ‘‘in perpetual
fear, chronically thirsty. So scared are they of the light, that when the sun
shines, they turn their faces the other way.’’37 The rabee’ah agents were so cen-
tral to these conflicts that one such conflict, the Basous War (494–534)
between the Taghlib and Bakr tribes, is also remembered as the ‘‘Days of the
Rabee’ah.’’ In his mammoth anthology of Arabic prose and poetry from pre-
Islamic times until the tenth century, Al-Asbahani writes of the efforts each
tribe involved exerted to trace and uncover the spies working in its midst. He
also recounts how the agents of the tribe of Bakr bin Wa’el managed to infiltrate
the ranks of the Ka’ab bin Rabee’ah tribe during the Falj War.38
Precisely because of the Bedouin raiding tradition, spies were also entrusted
with the vital task of protecting the commercial caravans across the vast deserts
of Arabia.39 Intratribal routes, overland arteries between the Bedouin areas and
urban centers, and the communication lines between the northern parts and
the southern frontiers of the Arab Peninsula were all under the close watch of
those early intelligence pioneers.40 The use of uyoun was sometimes dictated by
the need to honor the Quraishis’ treaty obligations with the many tribes whose
commercial caravans bound for Mecca or the north normally passed through
what was then a trading town called Yethrib but would later become the city of
Medina. To ensure that caravans and travelers might pass peacefully and with-
out incident in the vicinity of Medina, or indeed across the entire region con-
trolled by them, the Quraishis made extensive use of scouts, spies, and
watchmen. Chief among their targets were those who violated agreements, con-
spired against their implementation, or sought to incite other tribes to trans-
gress and breach the accords.
The early spies of Arabia underwent vigorous training in a range of arts and
skills. Above all else, they were trained to be patient and resilient, to bear
unexpected physical or psychological hardships, and to blend in with the target
community. Camouflage became an essential part of espionage. Significantly,
the chronicler and commentator Muhammed Ibn Al-Tabari (d. 923) speaks of
some undercover agents who carried dedication to their profession to great
Origins of an Arab and Islamic Intelligence Culture / 97
lengths, when they underwent voluntary surgery in order to mask their identi-
ties, deceive the enemy, and be in a better position to carry out their duties.
Tabari explains how primitive surgical or noninvasive procedures were some-
times performed to alter the shape of the nose or ears of such agents.41
Prospective agents were also trained in survival and communications skills.
To communicate with their base or with each other, the early uyoun used fire
at night and smoke during the day. They also exchanged coded messages in
order to circumvent detection or exposure. An important and regular source of
information came from concubines and slaves,42 who were used to gather gen-
eral information and to provide valuable and accurate details about their mas-
ters’ plans, movements, contacts, and close associates.43 For verification
purposes, the early Arabs normally dispatched two spies on any particular mis-
sion.44 Spies were also used to entrap rivals and also in starting disinformation
campaigns designed to dispel specific perceptions and rumors and to frustrate
enemy efforts. Poison was occasionally used to eliminate enemies or those
deemed to pose a grave danger to the community.45
in which it is not difficult to see the intelligence cycle at work. In the Quran,
some references tend to suggest that intelligence operations carried out against
the enemies of Islam and in the interests of Muslims at large are quite legitimate
and admissible. This explains why contemporary Islamic groups—which base
their ideology on Islam and which strive to achieve a specific aim in the interest
of Muslims, such as liberating occupied lands, expelling colonialists, and spread-
ing Islam—view any attempt at undermining the enemy as not only legitimate
but also a religious duty. Conversely, spying on the private lives of individuals
is illegal and inadmissible according to the Quran. Islam also accentuates the
negative impact of espionage against the Muslim Umma (community), describ-
ing those planted amid the Muslims who work for the enemies of Islam as
munafiqoon, who are to be detested and severely punished.
These intelligence methods constituted part of the cultural heritage of the
Arabian Peninsula before the advent of Islam. The Muslims who inherited them
in turn developed them to serve their own needs and requirements. Clandestine
methods and organizational approaches have a particular relevance to Islamic
doctrines because of the role of covert activity in the earliest years of the reli-
gion’s development. During these years, when the Prophet Muhammad was at
risk from potentially violent persecution by the established Quraishi political
and religious leaderships of the day, his call to the new faith was shrouded in
secrecy. In particular, in the first three years, known in Islamic history as the
Secret Stage, all his movements, contacts, and meetings with his followers were
carried out clandestinely. This difficult period was followed by what Arab histo-
rians call the Open Stage, when Muslims embarked upon a vigorous, open
campaign aimed at spreading the word of Allah to their fellow Arabs. These
changes also reflect a shift from covert to overt conflict and from cold to hot
warfare.
The formative impact of clandestinity on Islam is reflected in the articula-
tion of moral regulations concerning espionage and practical, almost instruc-
tional exemplars of intelligence activities, especially human intelligence and
paramilitary special activities. In terms of what might be called concepts and
doctrines of intelligence, these latter activities are particularly instructive. The
Open Stage, of course, involved open conflict, and Muhammad’s organizational
skills and leadership proved quite competent and innovative here, especially in
his use of what may be called military intelligence, including the appointment
of one of the earliest recognizable dedicated intelligence (in modern parlance)
cells, which was headed by Umar bin Al-Khattab. The Haddith and Sunnah, in
conjunction with early Islamic historical narratives, provide an extensive and
detailed body of guidance on the conduct of clandestine human intelligence;
the exploitation of intelligence sources, including early materials exploitation;
and human source reporting and organization, and the implementation of oper-
ational and tactical military intelligence.
Origins of an Arab and Islamic Intelligence Culture / 99
would mix with other shepherds in the area, carefully listening and memorizing
details of the stories and rumors they related to each other. These details would
reach the Prophet Muhammad and Abu Bakr by nightfall. Abdullah’s sister,
Asma, may be said to be the first female ain spy in Islamic history, as she too
carried out clandestine collection and reported to the Prophet Muhammad,
when her brother was for one reason or another unable to deliver his reports.
Informants included people from all walks of life—men and women; young
and old; rich and poor; close relatives and freed slaves; Muslims, Jews, and poly-
theists; Arabs and non-Arabs. Despite the many differences among these pre-
cursors of modern intelligence, what united them all was dedication to the
cause, adherence to secrecy, and respect for the unity of command.50 The
reporting network in Mecca, for example, was headed by the Prophet Muham-
mad’s own uncle, Abu Al-Fadhl Al-Abbas, and was undoubtedly the most
important source of intelligence during the period before its conquest by the
Muslims. But many other intelligence-gathering stations, as we would say in
modern parlance, were dispersed over most parts of Arabia. There was indeed
hardly a tribe or a clan that did not have a secret ain agent reporting on its
general affairs, alliances, and intentions. But the Prophet Muhammad had other
sources of information: recent converts to Islam and traveling Copts and Syri-
ans, as well as local merchants and traders. These often acted as valuable sources
of information, either voluntarily or for some form of material reward, such as
cash or weapons. The early Muslims also resorted to envoys and couriers to
gather information on the lands and people to whom they were dispatched.
The immunity conferred upon these men afforded them an opportunity to move
from one place to another with relative ease and to mingle more freely with
their targets.51
The Prophet Muhammad’s clandestine operators were also important in the
economic war that the Muslims launched against hostile Mecca. During the
period when the Prophet Muhammad was planning to impose a total economic
blockade on his religious adversaries, he did all he could to hinder and intercept
caravan routes linking Mecca to the outside world, especially the desert over-
land routes from Mecca and Syria in the north to Yemen in the South. When
he once learned of the approach of a Mecca-bound caravan belonging to Abu
Sufyan, one of the wealthiest and most influential Quraishi chieftains and the
main rival of the Prophet Muhammad on the battlefield, he immediately
ordered three men to go to Mecca in order to seek details of its exact destina-
tion.52 To tighten the grip around the Meccan polytheists, the Prophet Muham-
mad had to rely on the reports of lookouts and agents who were well dispersed
in and around Mecca and Medina. The raiding operations that were planned
and executed on the strength of their reports brought all Meccan foreign trade
to a standstill. Describing the tight blockade on Mecca, Thumamah bin Athal
Origins of an Arab and Islamic Intelligence Culture / 101
al-Hanafi told his fellow Meccans: ‘‘By Allah, not a single grain of wheat
reaches you unless the Messenger of Allah, peace be upon him, permits it.’’53
On the eve of the Battle of Uhud, the Prophet Muhammad sent two agents
to scout the area around Medina and Mount Uhud and to collect as much
information as they could on the Quraishis, especially the number of fighting
men deployed against him and the areas in which they were concentrated. They
reported that the enemy had arrived at a place called Al-Aridh, northeast of
Medina, famous for its wide expanse of rich agricultural soil, but that its fields
and orchards had almost vanished and that the green areas had turned into a
wasteland. The sudden disappearance of the rich foliage, which was devoured
by the livestock and draft animals of the Quraishis, provided a clear indication
as to the size of the Quraishi battalions. Because the number of beasts of burden
and other animals was directly proportional to that of the advancing armies,
the Prophet Muhammad and his men concluded that they were facing a very
large army. Even after the end of fighting at Uhud, the Prophet Muhammad
continued his intelligence activities when he ordered that the Quraishi retreat
be closely monitored. He specifically wanted details of the means of transporta-
tion used by the Quraishis, especially the numbers and types of draft animals
they employed. He instructed his agent Saad bin Abi Waqqas to ‘‘bring us news
of their movements. If they have mounted the camels rather than the horses,
then this signifies that they have decided to depart. But if they have mounted
their horses rather than their camels, then most likely they are bent on attack-
ing Medina.’’54
Besides the deployment and operation of human intelligence sources, there
was also guidance on the validation and analysis of this intelligence. On the
eve of the Battle of Badr, the Prophet Muhammad dispatched three of his close
confidants and eminent companions—Ali bin Abi Talib,55 Al-Zubair bin Al-
Awwam,56 and Sa’d bin Abi Waqqas57—to reconnoiter the area that was to
witness the first major armed confrontation with his Quraishi enemies. The
three men headed toward a place known to be water-rich and frequented by
caravans as well as inhabitants of nearby lands. The scouts spotted two young
boys drawing water from a well, captured them, and led them to the Prophet
Muhammad’s headquarters, where it was hoped that the Prophet would extract
useful information from them. Finding that the Prophet was busy performing
his prayers, the three men began interrogating the captives. When asked for
whom they were carrying the water, the boys gave what sounded like an evasive
answer, saying that they were working for the Quraishi army advancing toward
Medina. This answer was not to the liking of the Prophet’s companions, who
had been under the impression that the boys belonged to Abu Sufayan’s cara-
van, which had suddenly changed course and vanished in the desert. To force
the boys to tell the truth, they started to beat them severely.58
102 / Abdulaziz A. Al-Asmari
These beatings compelled the young boys to say that they were in fact work-
ing for Abu Sufyan, leader of the richly laden Quraishi caravan, which was on
its way from Syria to Mecca. Upon this admission, they were then left alone.59
When the Prophet Muhammad finished his prayers, he was advised of what had
happened and how the boys had changed their story. Examining the details
carefully, the Prophet disapproved of what the three scouts had done to the
boys and felt that something was amiss. Censuring his companions, the Prophet
said: ‘‘When the boys utter the truth, you beat them, and when they tell a lie,
you release them!’’ He then decided to conduct the interrogation of the water
carriers himself. Without resorting to violence or the threat of force, the
Prophet Muhammad managed to extract crucial information about three areas
of interest to the Muslim army: the whereabouts of the Quraishi army, the
number of fighting men deployed by Quraish, and the names of their command-
ing officers.60
The Prophet Muhammad started by asking the boys where the Quraishis
had camped. He was told that they were behind the sand dunes at Adwa Quswa.
When he asked them how many fighting men there were, they said that they
did not know. To extract this vital information, the Prophet then asked the
young boys how many camels were slaughtered each day. They said ‘‘9 on one
day and 10 on another.’’ Given that camels were the main source of sustenance
for tribesmen during raids and battles, and that it was common knowledge
among all desert dwellers that a camel can feed between 90 and 100 people,
the Prophet indirectly learned that the advancing army numbered between 900
and 1,000 men. He then inquired about the leaders of the Quraishi army. He
was told that among the commanding officers were Utbah bin Rabee’ah, Shee-
bah Akhah, Umayya bin Khalaf, Al-Abbas bin Abdul-Muttalib, and Sahl bin
Amru. These names gave the Prophet a relatively clear picture of what to
expect, for he knew these men, their backgrounds, their points of strength, and
their tribal connections. The Prophet also realized that the opposing army was
three times larger than his own. When he finished the interrogation, the
Prophet turned to his companions and said: ‘‘Mecca has deployed the cream of
Quraishi fighters against you.’’ He then made his battle plans in the light of the
information obtained from the water carriers.61
Agents were also used for tactical and operational deception. This may
clearly be seen in what is now known as the Hamra’ Al-Asad operation. One
result of the Battle of Badr was the growing awareness among the Quraishis that
their commerce and caravan routes were under constant threat as long as
Medina remained in Muslim hands. Despite successes scored by the Quraishis
against the Prophet Muhammad’s army, the Battle of Uhud was far from deci-
sive. Both sides suffered heavy losses and retreated from the battlefield, the
Muslims toward their base in Medina and the Quraishis toward Mecca. But
Origins of an Arab and Islamic Intelligence Culture / 103
each side kept a watchful eye on the other; just as the Muslims had numerous
uyoun in Mecca, the Quraishis had their own among the Muslims.
When the leader of the Quraishis, Abu Sufyan, ordered his troops to camp
at a place called Al-Rawha’, 14 kilometers from Medina, his military command-
ers met to discuss and review the events at Uhud.62 According to Al Tabari:
One group said to another: ‘‘You did nothing. Although you broke down their
[the Muslims’] force, you made no use of your achievement. . . . There are still
some distinguished men among them who will probably gather people up to
fight you again. So let us go back and annihilate them and crush their forces.’’
It was in fact a hasty decision taken by shallow-minded people who misjudged
the potential power and morale of both parties, which is why an eminent leader
of Quraish, Safwan bin Omaiyah, tried to dissuade his people from pursuing that
venture, saying: ‘‘O people. Do not do such a thing! For I fear that he [Muham-
mad] will gather up those who had stayed behind and did not fight in Uhud. Go
back home as victorious.’’ I am not certain about the outcome or about the turn
events might take if we return to reengage the Muslims in the battlefield.63
advised to the contrary. In the light of this news, the resolution and determina-
tion of the Meccan army failed. Panic and terror took firm hold of them. They
consequently deemed it safest to fold camp and complete their withdrawal to
Mecca.64
gained wide popularity among the tribes. In one of her poems she attacks Mus-
lims and those tribes that embraced Islam; ridicules the character of the
‘‘stranger,’’ the Prophet Muhammad; and calls upon her fellow tribesmen to
end the Muslim question by murdering the Prophet:
I despise Banu Malik and al-Nabit
And Auf and Banu al-Khazraj.
You obey a stranger who is none of yours,
One not of Murad or Madhhij.
Do you expect good from him
After the killing of your chiefs
Like a hungry man waiting for a cook’s broth?
Is there no man of pride who would attack him by surprise?
And cut off the hopes of those who expect aught from him?68
The man who eliminated this sharp-tongued satirist was Omeir bin Wahab
Al-Awsi, who managed to enter her home and stab her while she slept.69 This
assassination had not, however, been authorized in advance by the Prophet
Muhammad. When Al-Awsi met the Prophet and asked if he would be taken
to task for what he did to the poetess, however, he was assured that ‘‘no two
goats would butt over her death.’’70
Among the first poets to be silenced on the Prophet Muhammad’s instruc-
tions was Abu Afak, who had reportedly attained the age of 120 years and was
notorious for incitement against the person of the Prophet, for his venomous
denunciations, and for his denigration of Islam and Muslims. A very intricate
plan was prepared to silence him in the courtyard of his own house.71 The man
assigned to carry out the operation was one of the poet’s own tribesmen, so that
when the murder was uncovered, it would not lead to any tribal repercussions
or start an endless cycle of revenge.
Covert action was not confined to poets and influential figures; it was also
conducted against leaders of rival religious movements. Among those who were
assassinated for propagating what the Muslims considered a revisionist brand of
Islam was Al-Aswad al-Ansi, who claimed to be a prophet sent by Allah.72 The
Prophet Muhammad’s followers, however, considered him to be nothing more
than a magician or a fortune-teller:
But he was no minor magician or fortune-teller. . . . He was powerful and influ-
ential and possessed a strange power of speech that mesmerized the hearts of his
listeners and captivated the minds of the masses with his false claims. With his
wealth and power he managed to attract not just the masses but people of status
as well. . . . Al-Aswad’s tribe were the first to respond positively to his claims to
prophethood. With this tribal force he mounted a raid on San’a. He killed the
governor, Shahr and took his wife to himself. From San’a he raided other
regions. Through his swift and startling strikes, a vast region in southern Arabia,
106 / Abdulaziz A. Al-Asmari
from Hadramawt to At-Taif and from al-Ahsa to Aden came under his
influence.73
To silence Al-Aswad al-Ansi and stop his movement before any further
damage occurred, the Prophet Muhammad ordered his execution.74 He com-
manded Wabrah bin Yahnus to head for Yemen secretly in order to prepare an
assassination plan. Wabrah devised an intricate plan in which a number of
Muslims of Persian origin were to take part. Most crucial was the role played by
al-Ansi’s wife, Mirzabanah, who was known to harbor nothing but disdain and
hatred for Al-Ansi, who had killed her first husband and forced her to marry
him. Mirzabanah provided vital intelligence on Al-Ansi’s movements and facil-
itated the killers’ entrance to her castle, where the operation was successfully
carried out.75
Some covert action was intended to boost the morale of Muslims. An illus-
trative example of this may be seen in the operations aimed at retrieving the
body of Khabeeb bin Uday. Khabeeb was among the early Muslims who vigor-
ously supported the Prophet Muhammad and fought under his banner in the
decisive Battle of Badr, where he was reported to have killed a number of Mec-
can polytheists. Soon after this battle, the Prophet sent him on a reconnais-
sance mission to observe the movements of the Quraishis and check whether
they were, as reported, engaged in any military preparations. But Khabeeb and
his nine fellow scouts were discovered, tracked, and surrounded. Seven of them
died in the engagement that followed while Khabeeb and two other men were
tricked into surrendering in the hope that they would be set free. Instead, they
were sold to the Meccans, who, in order to exact revenge on Khabeeb for killing
so many of their men at Badr, crucified him and left his corpse to rot in the
desert.
Khabeeb’s fate grieved the Prophet Muhammad, who immediately ordered
one of his uyoun, Amru bin Ummaya Al-Dhamiri, to head for Mecca and
retrieve his body. As long as the decomposing corpse of the renowned fighter
remained on the cross, the morale of the Muslims was low, whereas that of the
Quraishis was boosted. Amru stealthily went to the spot where Khabeeb’s cross
had been erected, scaled it, and hastily detached the crucified corpse. He then
sped back to Medina, stopping only briefly to provide a proper burial for his
fallen comrade. When the Quraishis later discovered that the corpse had van-
ished, they were at a loss as to what had happened. The operation had a nega-
tive impact on their morale while boosting that of the Muslims.76
Muhammad’s Meccan enemies, however, did not lag behind the Muslims in
terms of intelligence. When Abu Sufyan inquired if anybody had spotted
strangers or heard of any spies working for the Prophet Muhammad, he soon
learned about two men who had been sent to spy on him. When he was shown
Origins of an Arab and Islamic Intelligence Culture / 107
the spot where the two men had tied their camels, Abu Sufyan ordered his men
to bring him a sample of their dung, in which he discovered some palm date
stones. ‘‘This,’’ he declared, ‘‘is the fodder of [Medina]. The two men must be
the Prophet Muhammad’s spies.’’ He then ordered the caravan to change course
and make haste.77 Successive attempts at the life of the Prophet were also made.
One such attempt, which proved futile, was that of Omeir bin Wahab Al-Jamhi.
Consequently, counterintelligence and protective security were at a premium
in the Prophet’s intelligence operations.
Although the Prophet Muhammad himself was the overall commander-in-
chief of state security in Medina, Umar bin al-Khattab was effectively in charge
of running what we would call today the counterintelligence machinery, imple-
menting day-to-day orders and following up on security policies.78 In a more
productive application of robust interrogation than that of the two water carri-
ers referred to above, a suspected spy was taken to Umar who started to interro-
gate him by asking him first to identify himself and say where he came from
and what he was after. The man was quite economical in his responses. But
after a while he was pressured into revealing that he was actually a spy.79 He
also told his interrogators that he was carrying a message from the Ghaftanis to
the Jews of Khaibar in order to barter military help for palm-tree dates. When
asked if there were any fighting men on their way to succor Khaibar, the spy
then told them that there were two hundred men under the command of Wabar
bin Oleim. To avoid death, the man then cooperated with the Muslims and led
them to the area where they had kept their cattle. He led them to the Ghatfan
camp, but when the members of the Muslim detachment, led by none other
than Muhammad’s cousin Ali, arrived, they discovered that the camp had been
totally deserted.80
In another case, the Prophet Muhammad’s agents in the Islamic stronghold
of Medina unmasked an elaborate Byzantine plan to spy on the Muslims. Just
nine years after the Prophet had established his rule in Medina, the Byzantines
instructed one of their priests, Abu Amie Al-Khazraji, to declare that he had
converted to Islam. He was also directed to build a new mosque in order to
provide a secure venue for his agents. The choice of its location was quite
significant, in the same neighborhood and very close to the Qiba’ mosque,
which the Prophet’s men had constructed earlier. The ‘‘Muslim’’ monk asked
the Prophet to inaugurate the place of worship and bless it with his presence.
The Prophet responded by saying that he was quite busy and requested post-
ponement of the ceremony until he had accomplished a mission with which he
was preoccupied at the time. Meanwhile, the Prophet’s men, whose suspicions
had been raised, watched closely what happened in and around the newly built
mosque. When sufficient evidence was obtained, the Prophet ordered the
mosque to be demolished.81
108 / Abdulaziz A. Al-Asmari
Conclusion
The intelligence activities that were practiced by ancient Arabs constitute part
of the cultural heritage of the Arabian Peninsula. The Muslims who benefited
from the rich legacy left them by their forebears in turn ameliorated and devel-
oped them to serve their own needs and requirements in accordance with their
own topography and circumstances.
The Prophet Muhammad, from the start of his mission, was fully aware of
the vital role of intelligence in securing success for his operations and in achiev-
ing tactical and strategic goals. Throughout the various stages of his call to
Islam, the Prophet carried out all sorts of intelligence activities. During the
early Secret Stage of his mission, which lasted three years, he felt it necessary
to keep his movements and contacts quite confidential. To this end, he
approached only those whom he knew well and trusted. Good character and
personal qualities as well as certain strict criteria had to be met before a person
was invited to embrace the new faith. Once he had secured their allegiance,
the Prophet would embark on training and educating new recruits in the ways
of Islam, without fearing that he would be betrayed. This period was character-
ized by extreme secrecy, alertness, and caution so that the new religion would
not be crushed before it could grow.
During the subsequent Open Stage, the tactic of secrecy was abandoned.
Having established a small but firm base in Meccan society, the Prophet
Muhammad took fewer precautions and openly advocated his new faith, not
only to his fellow Meccans but also to those who came to Mecca for business,
religious, or personal reasons. The third stage began with the Prophet’s emigra-
tion to Medina, where he succeeded in establishing the first Muslim state. This
last stage witnessed intense and bloody confrontations between those who
responded to his call and adopted the new faith and those who adhered to
their ancestral religions and sets of values. It was during this stage that Islamic
intelligence work may be said to have come of age. New tactics and methodolo-
gies were employed to protect the fledgling state and spread the new faith out-
side the confines of Medina.
These intelligence activities—entirely conforming with Roy Godson’s clas-
sic ‘‘elements of intelligence’’ formula entailing clandestine collection, analysis,
counterintelligence, and covert operations—strongly affected the course of
Islamic history, especially in the struggle between the Prophet Muhammad and
his followers on one hand, and the enemies of Islam on the other hand.82 The
Prophet appears to have managed within a relatively short time to rejuvenate
Bedouin society and to create a new state based on the new faith. If we exclude
the spiritual dimension and divine intervention to which the Muslim faithful
attribute the Prophet’s successes, Muslim intelligence activities may be seen as
having played a decisive role in instilling, nurturing, and spreading Islam in the
Origins of an Arab and Islamic Intelligence Culture / 109
deserts of Arabia. The activities, operations, and tactics employed during the
three stages of Islam have firmly established themselves in Islamic history as
part of the Sunnah and the heritage of Islam. And as part of the Quranic and
Islamic tradition, they represent a deeply rooted body of principles and practice
of intelligence that will inevitably inform the norms, values, and activities of
governments and substate actors who define themselves in terms of this tradi-
tion. If one is to properly understand the intelligence cultures of the Arab and
wider Islamic worlds, it is beneficial and indeed necessary to understand the
pre-Islamic Arab legacy of intelligence and the formative experience of intelli-
gence at the birth of Islam.
Notes
1. Fatih Abdul Salam Haroun, ed., Rasa’el Al-Jahiz (Al-Jahiz’s Epistles) (Cairo: Maktabat
al-Khanji, 1964), 1:145.
2. John D. Stempel, ‘‘The Impact of Religion on Intelligence,’’ International Journal of
Intelligence and CounterIntelligence 18, no. 2 (2005): 282.
3. A. F. L. Beeston, Warfare in Ancient South Arabia, in Studies in Old South Arabian
Epigraphy Series 3 (London: Luzac, 1976), 7–11.
4. Muslims are enjoined to use the honorific appendage ‘‘pbuh’’ (peace be upon him)
every time the name of the Prophet Muhammad is mentioned, whether orally or in writing.
Since the seventh century, this has become an established tradition in all manner of writings,
religious tracts as well as academic research and journalism. Its omission would imply not
only an anticlerical attitude but would also suggest disbelief atheism or apostasy.
5. Richard A. Gabriel, Muhammad: Islam’s First Great General, Campaigns and Command-
ers (Norman: University of Oklahoma Press, 2007), xviii–xix.
6. See Lisan Al-‘Arab Lexicon, 2:1090, under ‘‘khabar.’’ The word is often used in the
Quran in the form of ‘‘khabeer’’ as in the Surah of ‘‘Fatir,’’ verse 14: ‘‘None can inform you
like him who is aware’’ and the Surah of the ‘‘Ant,’’ verse 88: ‘‘And thou seest the hills thou
deemest solid flying with the flight of clouds: the doing of Allah Who perfecteth all things.
Lo! He is informed of what ye do.’’
7. See entries under ( ) in the following dictionaries and lexicons: Taj Al-‘Arūs, Lisan
Al-‘Arab , Al-Qamūs Al-Muh.it., and Al-Aghani.
8. However, some countries, such as the kingdom of Saudi Arabia, have adopted the
term ‘‘Istikhabarat’’ to refer to what the other Arab countries call ‘‘Mukhabarat.’’
9. See entries under ( ), ‘‘Jasous,’’ in Lisan Al-‘Arab.
10. See entries under ( ) in Lisan Al-‘Arab, Al-Qamūs Al-Muh.it., and Al-Aghani.
11. Muhammed bin Ali al-Shawkani, Fatah Al-Qadir (The Almighty’s Bestowment of
Victory) (Beirut: Dar Al-Fikr, n.d.), 40.
12. Surah of ‘‘Chambers,’’ verse 12.
13. Surah of ‘‘Joseph,’’ verse 87.
14. See Taj Al-‘Arūs, 13:303; 6:38.
15. See ‘‘ ’’ in Jaj Al-‘Arūs, Lisan Al-‘Arab, and Al-Aghani lexicons.
16. Urwa Bin Al-Ward Al-Abssi, Diwan Urwa Bin Al-Ward (Collected Poems of Urwa
Bin Al-Ward) (Beirut: Dar Al-Ketab Al-Arabi, 1994), 55.
110 / Abdulaziz A. Al-Asmari
17. Aws Bin Hajar, Al-Diwan (Collected Poems), edited by Muhammed Yousuf Najm
(Beirut: Dar Sadir, n.d.), 66.
18. Ali Izz Al-Din Ibn Al-Athir, Al-Kamil Fi Al-Tarikh (The Complete History) (Beirut:
Dar Sadir, 1982), 1:492.
19. Ibid., 33.
20. See entries in Taj Al-‘Arus, Lisan Al-‘Arab, and Al-Qamus Al-Muhit.
21. Surah of ‘‘Women,’’ verses 144–45.
22. Ali Izz al-Din Ibn al-Athir, Al-Kamil Fi Al-Tarikh, 1:116.
23. Abu ‘Ubayd ‘Abd Allah Ibn ‘Abd Al-‘Aziz Al-Bakri, Mu‘jam Ma Ista‘jam (Lexicon of
Foreign Words) (n.p., n.d.), 1:80.
24. Lisan al-Arab, 16:5750.
25. Ali Izz al-Din Ibn Al-Athir, Al-Kamil Fi Al-Tarikh (The Complete History) (Beirut:
Dar Sadir, 1982), p. 139.
26. See chapter 5 in this volume, by Kristian Gustafson.
27. John Glubb, A Short History of the Arab Peoples (London: Hodder & Stoughton, 1969),
23–24.
28. Mohamed Bayoumi Mehran, Studies in the History of the Ancient Arabs (Alexandria:
Dar Al-Ma’rifa Al-Jami’iyya, 2005), 503–5, 508ff.
29. Kheireddine Zrcelli, Figures (Beirut: Dar Al-’Ilm Lil-Malayin, 2002), 2:153–54.
30. Abu Al-Faraj Al-Isbahani, Kitab Al-Aghani (The Book of Songs) (n. p., n.d), 12:158.
31. Beeston, Warfare, 7–11.
32. Abu ‘Ubayd ‘Abd Allah Ibn ‘Abd Al-‘Aziz Al-Bakri, Mu‘jam Ma Ista‘jam, 1:181.
33. Ibid., 1:882.
34. Ibid., 1:586.35. Glubb, Short History, 25.
36. Philip K. Hitti, The Arabs: A Short History (London: Macmillan, 1950), 13.
37. Aws bin Hajar, Al-Diwan (Collected Poems), edited by Muhammed Yousuf Najm
(Beirut: Dar Sadir, n.d.), 66.
38. Al-Asbahani, Al-Aghani, 5:22.
39. Abu Ubaidah Muammar Bin Al-Muthana, Ayyam Al-Arab Qabl Al-Islam: Naqa‘‘Idh
Jareer Wa Al-Farazdaq (Days of the Arabs before Islam: The Satires of Jareer and Farazdaq)
(Beirut: Dar Al-Kitab al-Arabi, 1908–9), 2:650–75, 781–84.
40. Rad Mahmud Ahmad al-Barhawi, Al-‘Uyūn Wa-Al-Jawasis fi Al-Dawlah Al-Islamiyah
Mundhu ‘ahd Al-Rasūl Wa-Ilá Nihayat Al-‘As.r Al-Umawi (Spies and Agents in the Islamic
State) (Irbid, Jordan: Dar Al-Mutannabi, 2002), 26.
41. Abu Ja’far Muhammed Ibn Jareer Al-Tabari, Tarikh Al-Umam wa Al-Mulook (History
of Nations and Kings) (n.p., 1960), 1:617–25.
42. Uthman bin Amru al-Jahiz, Al-Bayan wa al-Tabyeen (Eloquence and Poetic Devices),
edited by Abdul Salam Haroun (Kuwait: Al-Maktab Al-Arabi, 1968), 1:98.
43. Al-Bakri, Mu‘jam, 1:92.
44. Ibid., 2:411.
45. Mus.‘ab ibn ‘Abd Allah Al-Zubayri and Évariste Lévi-Provençal, Kitab Nasab Quraysh
(Book of Quraish’s Descendants) (Al-Qahirah: Dar al-Ma‘arif lil-T.iba‘ah wa-al-Nashr,
1953), 210.
46. Gabriel, Muhammad, xxv.
47. Richard A. Gabriel, ‘‘Muhammad: The Warrior Prophet,’’ Quarterly Journal of Military
History 47 (Summer 2007): 4.
48. Saifur Rahman al-Mubarakpuri, Ar-Raheeq Al-Makhtoom (The Sealed Nectar) (Al-
Riyadh: Darussalam, 1979), 80.
Origins of an Arab and Islamic Intelligence Culture / 111
49. Ibid.
50. Al-Barhawi, Al-Uyoun wa Al-Jawasees, 82.
51. Ibid., 59.
52. Al-Tabari, Tarikh, 2:296.
53. Ibn Hisham, 1:420.
54. Muh.ammad ibn ‘Umar Al-Waqidi and J. M. B. Jones, Kitab Al-Maghazi ⳱ the Kitab
Al-Maghazi of Al-Waqidi [Kitab al-maghazi] (London: Oxford University Press, 1966), 1:298.
55. Ali bin abi Talib, the first of the fedayeen in Islam, was Muhammad’s paternal cousin
and confidant. He took part in all the battles during the lifetime of Muhammad. Ali was the
fourth and last of the Rashidi caliphs, who ruled the state of Islam after Muhammad. His
caliphate lasted four years, eight months, and twenty-two days.
56. Al-Zubair bin Al-Awwam was the son of Muhammad’s aunt Safiya. He embraced
Islam at the age of seventeen and was one of the six-member Shura Council, who elected
Omar bin Khattab to be the second Rashidi caliph after Abu Bakr.
57. Saad bin Abbi Waqas was also one of Muhammad’s relatives on his mother’s side. He
too was one of the earliest converts to Islam and known in Islamic history as the first warrior
who used his arrows and spears to further the cause of Islam.
58. Al-Waqidi, Kitab Al-Maghazi, 1:52.
59. Abu Sufyan was one of the most cunning minds in Arab history. He was ten years
older than Muhammad and died aged ninety, almost twenty years after Muhammad’s death.
He had fought against Muhammad until the conquest of Mecca, when he embraced Islam.
60. Al-Waqidi, Kitab Al-Maghazi, 1:52.
61. Ibid., 1:53.
62. Al-Tabari, Tafsir Al-Tabari (Al-Tabari’s Commentaries) (Dar al-Maarifa, 1990), 4:68.
63. Al-Mubarakpuri, Ar-Raheeq Al-Makhtoom, 129–30.
64. Ibid., 130.
65. Gabriel, Muhammad, xxi.
66. From a purely nonreligious standpoint, the Prophet Muhammad has been judged to
be a very astute leader, as has been attested to here by Gabriel, and by others elsewhere.
However, Muslims believe him to be a prophet, and in that context, it would only be right
to say that terminologies such as ‘‘assassination,’’ ‘‘maneuver,’’ ‘‘propaganda,’’ ‘‘psychological
warfare,’’ and others found elsewhere in this treatise must never be seen in separation from
his religious role. The things he performed would have been instructed to him by God, or
deemed by the prophet to be religiously correct. Seen under that light, and notwithstanding
his abstract brilliance as a commander, these deeds performed by the prophet have a deeper
meaning and a wider implication than what the mere military or intelligence analysis
implies.
67. Hanna Al-Farkhouri, Tarikh Al-Al-Adab al-Arabi (History of Arabic Literature), 8th
ed. (Beirut: Al-Matba’a Al-Bulsiya, 1961), 59. Commenting on the impact of the poets on
ordinary people, a Muslim scholar, Ibn Taimiya, points out that poetry, unlike prose, can
popularize anti-Islamic feelings and drive people away from the path of Allah. See Abu Al-
Fath Al-Shahristani, Mosuat Almell wa Madaheb (Encyclopaedia of Peoples and Sects), 1st
ed. (Beirut: n. p., n. d), 84.
68. Ibn Ishaq: Sirat Rasul Allah (A. Guillaume’s Translation of The Life of Muhammad),
675–76.
69. Al-Waqidi, 1:173. See also Sirat Ibn Hisham ([Muhammad’s] Biography by Ibn His-
ham, Al-Marji‘‘Al-Akbar Lil-Turath al-Islami (Greatest Primary Sources of Islamic Heritage),
1:414ff.
112 / Abdulaziz A. Al-Asmari
70. Sirat Ibn Hisham ([Muhammad’s] Biography by Ibn Hisham, Al-Marji‘‘Al-Akbar Lil-
Turath al-Islami (Greatest Primary Sources of Islamic Heritage), 1:418.
71. Yusuf ibn ‘Abd Allah Ibn Abdul Barr, Al-Isti‘ab fi ma‘rifat Al-As.h.ab (Comprehension
in Knowing Friends) (Al-Qahirah: Dar Al-Maarifah, 2006), 3:1218; Ah.mad ibn Yah.yá and
Muhammad Hamidullah Baladhuri, Ansab Al-Ashraf (Ancestry) (Al-Qahirah: Dar al-
Ma‘arif, 1987), 1:373.
72. Ali Muhammed Al-Sallabi, Sirat Abu Bakr Al-Siddiq: Shakhsiyatuhu wa Asruhu (A
Biography of the Life and Times of Abu Bakr Al-Siddiq) (Cairo: Muasasat Iqra, 2006), 162ff.
73. See ‘‘Fayruz Ad-Daylami,’’ at Department of Islamic Affairs and Charitable Activities,
Government of Dubai, website, www.dicd.gov.ae/vEnglish/detailnewspage.jsp?ar
ticleID⳱3627&page Flag⳱1.
74. Al-Tabari, Tarikh, 3:185.
75. Ah.mad ibn Yah.yá Baladhuri, Futūh. Al-Buldan (Conquests of Countries) (Beirut: Dar
al-Nashr lil-Jami‘iyin, 1958), 125–26.
76. Yusuf ibn ‘Abd Allah Ibn Abdul Barr, Al-Isti‘ab fi ma‘rifat Al-As.h.ab, 3:1383–85.
77. Battle of Badr, www.johina.net/vb/t13799.html.
78. Al-Barhawi, Al-Uyoun wa Al-Jawasees, 99–102.
79. The Arabic word used in the original text is . This can also be translated as
meaning ‘‘they were rough or severe with him.’’
80. Al-Waqidi, Kitab Al-Maghazi, 2:562.
81. Ibid., 3:1047.
82. See, for example, Roy Godson, Intelligence Requirements for the 1980s: Elements of
Intelligence (Washington, DC: National Strategy Information Center, 1979).
PART III
Pakistan’s Inter-Services
Intelligence
Robert Johnson
I
n September 2011, ten years after the attacks in New York and Washington
by al-Qaeda, and the initiation of United States–led operations in Afghani-
stan, the US chairman of the Joint Chiefs of Staff, Admiral Mike Mullen,
announced that a truck bomb attack against a NATO post south of Kabul, an
assault on the US Embassy, and a similar high-profile raid on the Intercontinen-
tal Hotel in the Afghan capital had been planned and conducted by the mili-
tant Jihadist Haqqani network with the support of the Directorate of Pakistan’s
Inter-Services Intelligence (ISI).1 This accusation, he argued, was based on
‘‘credible evidence.’’ Rehman Malik, Pakistan’s interior minister, stated: ‘‘I cat-
egorically deny it,’’ suggesting ‘‘we have no such policy to attack or aid attack(s)
through Pakistani forces or through any Pakistani assistance.’’2 Prime Minister
Yusuf Raza Gilani added that ‘‘we strongly reject assertions of complicity with
the Haqqanis or proxy war.’’3 Turning the accusations back against the Ameri-
cans, he continued: ‘‘The allegations betray a confusion and policy disarray
within the US establishment on the way forward in Afghanistan. . . . Pakistan
cannot be held responsible for the security of US–NATO–ISAF [International
Security Assistance Force] forces in Afghanistan.’’ When it was hinted the
Americans might enforce a principle of ‘‘hot pursuit’’ against Haqqani fighters
across the Afghan border, Malik reiterated that ‘‘the Pakistan nation will not
allow the boots on our ground, never,’’ citing Pakistan’s existing cooperation
with the United States in return for respect for national sovereignty.
/ 115 /
116 / Robert Johnson
true strategic ends were its desire to survive a variety of threats and challenges—
economic, environmental, and military—then its use of the ISI to make agree-
ments, to co-opt allies, and to neutralize rivals would provide a persuasive
alternative explanation to that advanced by those apt to see only conspiracy.
The absence of reliable evidence fuels suspicions of complicity in terrorist out-
rages, although the absence of empirical evidence is a situation not unfamiliar
to scholars of intelligence elsewhere. Despite the problems of fragmentary evi-
dence, the ISI’s past record offers a glimpse of the organization’s track record
and might offer the opportunity to assess its culture in terms of ethos, methods,
and approach. Understanding the habitual, normative culture of the ISI might
move us toward a better appreciation of how its strategy and priorities are
shaped, although we should acknowledge that the culture of the ISI remains
subordinate to its primary function: the preservation of state power.
The ISI is directed by the senior figures of the Pakistan Army to serve the
interests of the state and the armed forces. The supremacy of the ISI mirrors
the paramountcy of the Pakistan army in the country’s political arena and the
economy. The ISI is a servant of the armed forces with a degree of its own
‘‘agency,’’ which is the result of its distinctive mission, and it has evolved
through a history of clandestine operations and the requirement to manage
intermediate groups or individuals. Despite sharing the ISI’s objective of pre-
serving the state, the army officer corps has often had a somewhat strained
relationship with its intelligence wing; service in it is sometimes seen as a
career-end appointment, detrimental to the unity of the army’s chain of com-
mand in operational planning and, formerly, too involved in religious or politi-
cal conspiracies. To many army officers, it has also lacked the prestige and
honor of other, more conventional appointments. However, the ISI has often
been at the forefront of efforts to confront Pakistan’s chief regional rival, India,
and it is seen as a useful tool for the formulation of military and strategic plans.
It has a great deal of experience working with leaders on the Pakistan frontier
and among insurgents from Afghanistan, which gives the Pakistan army ‘‘reach’’
beyond its own frontiers. It is therefore considered a useful organization for the
projection of Pakistan’s national interests into Afghanistan and Central Asia.
It has been an indispensable instrument for coercion in domestic politics in
order to protect the army’s interests and therefore those of the state, and its
actions are justified by rhetoric that gives the impression that it is able to pre-
serve the nation against a variety of existential threats.
Since the 1980s the ISI has built up a cadre of well-trained operatives who
are experienced in working alongside Jihadist organizations. Those hired by the
ISI as intermediaries operate with a great deal of independence. Despite offi-
cially distancing themselves from Jihadist movements, the militants are still
seen as potential allies in the pursuit of Pakistan’s national interests.12 In Kash-
mir the ISI fostered militant Jihadists to fight there when operations in Afghan-
istan throughout the 1980s were being wound down. Impressed by the utility of
Pakistan’s Inter-Services Intelligence / 119
that it would stir up a hornet’s nest at a time when the United States could not
afford to open another front against Jihadist militants.20 Rather than revealing
a conspiracy, the comment suggests perhaps that Pakistan is unable to contain
the militancy in its frontier districts.
In the 1980s and 1990s, during Pakistan’s sponsorship of insurgency in
Afghanistan and Kashmir, the ISI worked alongside Islamic extremists. When
the West withdraws from Afghanistan and its interest in the region diminishes,
then Pakistan will want to reassert itself and may use the same type of nonstate
actors to further its influence, to develop its strategic depth, and to keep India
distracted. The ISI is likely to be at the forefront of that effort. Pakistan is
working on developing closer relations with Iran and China while gaining what
it can through its somewhat strained relationship with the United States. It is
concerned about India’s interest in Afghanistan and believes that it is in its
strategic interests to have a compliant, pro-Pakistan regime in Kabul.
The ISI was the conduit through which Western support for the Afghan
Mujahideen was deployed during the Soviet occupation of Afghanistan, and
this cooperation occurred at a time when the ISI was increasingly influenced
by radical Islamist thinking, a fact that was officially sanctioned by General
Zia ul Haq and by successive chiefs of the ISI. During the Afghan Civil War
(1989–2001), the ISI played a key role in promoting Pakistan’s interests—
namely, establishing a regime in Kabul favorable to Islamabad so as to create an
imaginary ‘‘strategic depth’’ in any struggle with India. Its role was not limited
to intelligence gathering or the processing of neutral ‘‘product,’’ but took the
form of overt political sponsorship and covert operations. The ISI was also
active in the ultimately disastrous Kargil Operations against India in 1999.21
With Pakistan’s sudden abandonment of the Taliban and cessation of its
sponsored insurgency in Kashmir in light of 9/11 and Operation Enduring Free-
dom in 2001, President General Pervez Musharraf cut militant personnel gradu-
ally from the armed forces and intelligence services and cooperated with the
West in counterinsurgency operations in South Waziristan in 2004 following
insurgent attacks astride the Afghanistan–Pakistan border. Although Musharraf
was publicly critical of the Islamist agenda of previous governments, it was the
ISI that brokered deals with the militants in the frontier areas. The ISI facili-
tated the Shakai Agreement. In return for a cease-fire by insurgents and intelli-
gence on ‘‘foreign fighters,’’ the Pakistan government agreed to offer funds to
the Pakistani Taliban, the Tehrik-i Taliban Pakistan. The agreement failed in
2009 when ‘‘Uzbek’’ fighters clashed with the Pakistan army, which also
involved South Waziristan local insurgents. The Tehrik-i Taliban Pakistan
leader, Beitullah Mehsud, nevertheless miscalculated, and after renewed fight-
ing he was killed in August that year.22 The threat of fragmentation of the
militant movement was nevertheless prevented by the intervention of Sirajud-
din Haqqani, the Taliban leader based in North Waziristan, who was, ironically,
122 / Robert Johnson
the chief interlocutor for the Pakistan Army. The ISI has tried to foster allies
among the Waziristan militants to take on Jihadist factions and foreign fighters,
and count on the support of the Abdullah Mehsud group, Mullah Nazir and
Turkistan Bhittani, as well as the Punjabi Taliban in Wana. In light of militancy
in Swat and unrest in the major cities—including the so-called Lal Masjid (Red
Mosque) uprising of 2007—the ISI and the Army feel that national security is
again at stake.23 The civilian government has struggled to come to grips with an
array of domestic problems, namely, insurgency in the frontier districts, violent
sectarianism, a long-standing low-intensity conflict in Balochistan, the conse-
quences of the Indus River’s flooding in 2011, and the global economic
downturn.
The ISI is today responsible for the gathering and processing of foreign and
domestic intelligence, and the coordination of intelligence between the armed
forces’ own branches. The ISI trains agents, provides security for its senior
officers, and protects the country’s nuclear weapons program. The ISI has also
been involved in more aggressive activities in the past, including foreign espio-
nage, counterintelligence, and ‘‘covert operations.’’ Its functions have included
telephone tapping and other signals interception, surveillance, the monitoring
of extremists, and interference in the democratic process, including election
rigging and the intimidation of politicians. It has also been alleged that it has
indulged in assassination, narcotics smuggling, and the sponsorship of terrorism,
although these are often impossible to verify. There have been accusations that
it carried out the assassination of Benazir Bhutto because she wanted to reduce
the political power of the armed forces in the country, and the ISI has been
regarded as the mastermind behind the 2008 attacks in Mumbai.24
The key point, in terms of the ISI’s role and culture, is that senior army
officers believe that the ISI and the army are there to ‘‘protect national secur-
ity,’’ a broadly defined concept that includes not only the defense of the sover-
eignty of Pakistan but also the interests and institutions of the army, navy, and
air force, which regard themselves as the central pillars of the nation and the
very embodiment of its culture. They believe that, without the armed forces
playing a central role in the life of the state, the nation would be weakened and
broken up by separatist forces, and, in that condition, would be overrun by
India. India’s size and proximity loom large in the minds of Pakistan’s com-
manders, and the involvement of India in the breaking up of East Pakistan and
West Pakistan in 1971 and in the protracted conflict in Kashmir has strongly
influenced their views of the country’s vulnerabilities.
There is no doubt that the political culture of a country affects the activity
of its intelligence services. In Pakistan, though the ISI has a professional ethos
and serves its commanders loyally, it regards civilian politicians with suspicion,
if not contempt, and it has frequently operated outside the law to achieve its
objectives. It regards its mission of national security as a higher calling, above
Pakistan’s Inter-Services Intelligence / 123
the authority of politicians and lawyers. It uses secrecy and the concept of
national security as the means to avoid infringements of its freedom of action.
Indeed, the intelligence services are a key component of the semimilitarized
state of Pakistan. The ISI has the role of coordinating the armed services’ intel-
ligence machinery as well as gathering, analyzing, and assessing foreign intelli-
gence, both military and nonmilitary. However, despite the existence of the
Intelligence Branch, the civilian intelligence organization under the Interior
Ministry with responsibility for internal security, the ISI has often processed
and acted on intelligence in domestic affairs. The ISI’s director-general is
always a serving officer of lieutenant general rank, as are the three deputy
directors-general, and even the Intelligence Branch is led by serving or retired
military officers.25 The ISI also has specialist units for its tasks that extend
beyond a purely ‘‘intelligence’’ function: The Joint Intelligence North sup-
ported insurgents that crossed the border into Indian Jammu and Kashmir, and
was the agency that backed the Taliban in the 1990s. The division also main-
tained links with Islamist organizations inside Pakistan, including Harkat-ul-
Mujahideen, Lashkar-e Toiba, Al Badr, and Jaish-e-Mohammad. The Joint
Intelligence Miscellaneous is also thought to have played a role in acquiring
nuclear technology and carrying out covert action. As in other intelligence
services, specialist branches appear, are retitled, and are reabsorbed depending
on their tasks.
As his popular support ebbed away, Bhutto turned to a closer alliance with
the Islamists, purging the administration of certain secularists who threatened
national cohesion. Haunted by the specter of separatism, he exploited India’s
first nuclear weapons test to call for the creation of an ‘‘Islamic bomb’’ for
Pakistan.27 In the elections of 1977 Bhutto used the ISI to check all the candi-
dates and blocked certain opposition members from standing through police
orders. Protest rioters were attacked by the Federal Security Force. However,
the ISI and the Pakistan army, especially the junior ranks, were strongly influ-
enced by Islamist arguments that, in fact, Bhutto was undermining Islam and
was insincere in his politics. In July this cohort informed its senior officers that
they would no longer support the prime minister, despite a last-minute decree
that favored Islamist demands. The commander of the army, Zia ul Haq, there-
fore seized power in a coup d’état. Zia ul Haq continued the trend toward
Islamization for much the same reasons as Bhutto, although he was genuinely
more devout than the former prime minister. Zia established a Federal Shariat
Court and a Council of Islamic Ideology to decide on what, in legal terms, was
‘‘repugnant to Islam,’’ and he encouraged, promoted, and supported an Islamist
agenda.28 The decision to elevate theocratic forces to positions of constitutional
authority in the service of unifying political ideas severely damaged Pakistan’s
intelligence and security forces.29 At the tactical level Islamist thinking has
long been a strong motivational force for intelligence operatives and troops.
But, as so many other ideologically driven forces around the globe indicate, it
is this very thinking that clouds analysis, strategic calculation, and economy of
effort. Nowhere was this demonstrated more clearly than in the operations in
Afghanistan and Kashmir.
For Pakistan, controlling Afghanistan or at least having a compliant regime
there apparently offered ‘‘strategic depth’’ for two reasons: One, it held out the
possibility that Pashtuns of the region would assist in any conflict with India;
and, two, it neutralized the threat of an independent ‘‘Pashtunistan’’ being cre-
ated, a potential separatist phenomenon that threatened the territorial integrity
of Pakistan.30 The Soviet invasion of Afghanistan in 1979 created the opportu-
nity of American assistance and thus support for the Zia regime. The Americans
regarded the containment of the Soviets as a far higher priority than any con-
cerns about Pakistan’s internal politics. Nevertheless, the United States could
not be seen to be supporting the Afghan resistance directly, and so assistance
to the Mujahideen was channeled through the ISI. To avoid detection, funds,
arms, and supplies were handled exclusively by the ISI’s Afghan Bureau, with
few checks on who received them.31 American personnel were not permitted
inside Afghanistan, so all guidance, munitions distribution, and advice also
fell to the ISI. The ISI’s director-general, Lieutenant General Akhtar Abdur
Pakistan’s Inter-Services Intelligence / 125
Rahman, was a ‘‘no-nonsense officer with a singular vision of fighting the Sovi-
ets and clearing them out of Afghanistan.’’ According to Shuja Nawaz, he
‘‘brooked little interference—even from the Americans—in the internal opera-
tions of the ISI.’’32 In addition, the ISI and Special Services Group trained
83,000 Afghan Mujahideen in bases inside Pakistan between 1983 and 1997.
In turn, ISI agents of the Covert Action Division received training by the
Central Intelligence Agency (CIA) in the United States.
Mohammad Yousaf, a former ISI officer, wrote that the relationship between
the ISI and the CIA had been close, especially in the Reagan era, and there
was cordiality with the Saudi intelligence service, which was also backing the
Afghan effort, although there were no associations with the other Arab backers
or the Arab volunteers inside Afghanistan. However, it was not a relationship
without problems. Despite the huge amount of American funding, some $30
billion in 1987, most of the money was spent on arms purchases, so the ISI was
left struggling to support the Mujahideen in the country. The stores to support
the training camps cost $1.5 million every month in 1987, and there were
significant costs in providing trucks, mules, fodder, fuel, and rations across the
border. CIA operatives also displayed their ignorance of conditions inside
Afghanistan in terms of the equipment they sometimes supplied.
Yousaf noted that it was American intelligence that was the most valued.
Signals intelligence was particularly useful in assessing the morale and perfor-
mance of Soviet and Afghan government forces. Satellite photography assisted
in the selection of targets. CIA demolitions advice was a great asset. In terms
of a relationship with the United States, clearly some ISI officers had little
sympathy with American values, but Yousaf believes that, despite the suspicions
of their generous donors, there were few episodes of corruption.33 This can be
explained partly through the professional ethos of the organization, but also a
growing sense of affinity with the Mujahideen and its embattled cause, which
was often expressed in religious terms. Some regular Pakistani army personnel
operated inside Pakistan as members of the ISI. They tended to be men
recruited from the North West Frontier Province who were fluent in Dari,
Pashto, or Afghan Farsi, and, though styled ‘‘volunteers,’’ they were not always
as enthusiastic as their title suggests. They had strict instructions not to reveal
their identity if captured and were informed that they would be denied
anyway.34
The ISI and General Zia not only bypassed the Pakistan Foreign Ministry
on the Afghanistan issue; the army command was also not consulted. This may
have been due, in part, to their desire to get an Islamist government into power
in Kabul after the Soviets withdrew, to which the United States would not
have agreed.35 It also suggests that the ISI and its leadership will always put
126 / Robert Johnson
1990s in an effort to secure a military victory for its faction. By contrast, the
Pakistani civilian government just wanted an end to the war. Nevertheless, it
was clear that the ISI and the army had developed an appetite for proxy opera-
tions using its Pashtun allies.
In 1993 the United States placed Pakistan on the watch list of states sus-
pected of supporting terrorism because Lieutenant General Javed Nasir, then
the head of the ISI, had made it impossible for the Americans to buy back
the FIM-92 Stinger surface-to-air missiles given to the Mujahideen during the
Soviet–Afghanistan conflict, and it was known that the ISI was supplying the
terrorist Harkat ul-Ansar organization, and possibly funding the radical
madrassa Markaz Dawa Al Irshad. Six months after America’s designation,
Nasir was retired and Pakistan was removed from the watch list. American focus
switched away from Pakistan and Afghanistan to threats in the horn of Africa,
Southeastern Europe, and the Middle East.
to assume that conspiratorial agencies, like the ISI, are responsible for all epi-
sodes of unrest and terrorism inside India. However, after the recent bombings
of Mumbai, the available evidence suggested that ‘‘homegrown’’ Jihadists,
operating independently of Pakistan, were capable of carrying out attacks of
this nature. Much of the unrest in the North East of India is centered on specific
local and regional issues rather than a deliberate Pakistani policy of Balkaniza-
tion to reduce India’s power.
As so often is the case, intelligence agencies, particularly those with an
emphasis on covert action, create an exaggerated sense of their power and a
formidable reputation. This reputation, and their secrecy, serve to project their
influence and conceal their mistakes. The fact is that the sponsorship of insur-
gency in Kashmir did not achieve the ISI’s objectives, although it created more
misery for those who endured it and exasperated the Indian security forces. The
failure of covert action led to a far more dangerous escalation of the Kashmir
conflict in 1999. The Kargil operations of that year in turn generated calls for
nuclear deployments and necessitated urgent American diplomatic interven-
tion. Ironically, the escalation of the threat persuaded the ISI that it was the
key agency in the defense of national security. It could argue that it was taking
the fight to the enemy, but the operations in Afghanistan and Kashmir had
also rather conveniently given it the opportunity to obtain more funding,
expansion of its personnel, and greater freedom of action. It is important to
note that, for the Pakistan army and the ISI, the scale of the Indian threat has
been a key driver in its strategy for Kashmir and for the projection of its influ-
ence in Afghanistan.
There were concerns that the United States had turned a blind eye to Paki-
stan’s nuclear program until the matter came to light from Libyan sources.
However, the Americans were quick to seize on the intelligence from Libya, so
it is possible that the full extent of the illegal sales may not have been known
to the United States until they got the Libyan tip-off.49 The Americans were
able to intercept a German vessel carrying centrifuge parts en route to Dubai
in October 2003. However, it has also been alleged that the CIA had protected
Khan from prosecution in Europe (for the theft of nuclear secrets from the
Netherlands), and that their reassurances that they had him ‘‘under surveil-
lance’’ was really an excuse to give him a free hand, although no motive has
been advanced for this action. The Dutch judge, Anita Leeser, who oversaw the
case against Khan in 1983, remarked that key documents had ‘‘disappeared.’’
However, there was evidence to suggest that the ISI had set up front companies
in Europe to conceal Khan’s activities, and they had intermediaries working for
them in Dubai. It also appears that China was also assisting in the sale and
transfer of technical knowledge, following ISI requests. Even though he was
questioned about the alleged sale of secrets, Khan maintained that his opera-
tions had to be kept secret to avoid detection by the Americans. Shuja Nawaz,
who consulted army archives and interviewed leading officers, believes that
‘‘either the army was complicit in Khan’s activities or it had been derelict in its
security and surveillance duties.’’50 It seems inconceivable that the ISI did not
know about Khan’s dealings; but if it did not, then it reveals another failure of
considerable magnitude. There was some alarm in the West when Khan, who
had been under house arrest, was granted immunity from prosecution and
released in February 2009, while all eleven of his colleagues were released from
prison by May 2006.51 Pakistan’s attitude toward the Khan case reveals not only
the culture of security that pervades the establishment but also the culture of
secrecy that gives rise to accusations of double-dealing from its allies.
doubt, some of the rank-and-file members of the ISI were still sympathetic to
their Islamist allies, and they shared a deep disquiet about any association with
America.59 Musharraf admitted, when pressed about a lack of commitment to
the war on terror, that renegade or ‘‘retired’’ ISI officers and agents may indeed
have been supporting the Taliban. However, he was at pains to point out that
Pakistan was playing a proactive role in defeating the Taliban and capturing al-
Qaeda. In South Waziristan in 2004, attempts by the Pakistan army to root out
foreign fighters caused defiance and then active resistance. As the army pro-
ceeded with its operations, it came under attack from local insurgents, many of
whom were Taliban veterans.60 There were heavy casualties, but the troops were
withdrawn because of the impossibility of achieving any political success with
a military campaign.
It is not just the outbursts of Islamists that cause doubts amongst Western
governments. The cease-fire and negotiations with the Tehrik-i Taliban Paki-
stan (TTP) and allied tribal groups in Waziristan caused disappointment in the
International Security Assistance Force (ISAF). Coalition forces in Afghani-
stan were unable to pursue the insurgents across the border into Pakistan and
turned to strikes by unmanned aerial vehicles (i.e., drones) instead. Effectively,
Pakistan frontier areas provide a ‘‘safe haven,’’ and attacks are still launched
across the international border. There have been disturbing reports that, in
October 2006, Coalition troops had to fight not only entrenched Afghan Tali-
ban south of Kandahar but also their Taliban reinforcements, who had arrived
in pickup trucks ‘‘waved on by Pakistani border guards.’’63 The Pakistan army’s
conclusion of its military operations in South Waziristan in 2004 certainly gave
the Taliban a crucial respite, but more active support of the Haqqani network
represents direct aid against American and Western interests.64 Shelling across
the Pakistani border into Afghanistan appeared to have been carried out with
the connivance of Pakistani troops or the ISI and seemed to be retaliation for
unmanned aerial vehicle operations and the strike against Osama bin Laden’s
compound in Abbottabad. In July 2011 the United States withheld a third of
its military aid to Pakistan in protest.
The United States–led coalition believed that it could trace Taliban support
to Pakistani training camps run by members of the ISI, with munitions dumps
and new weapons caches along the border and a Taliban headquarters based
near Quetta. It is estimated that in the battle with the ISAF in southern
Afghanistan in mid-2006, the Afghan Taliban fired a staggering 400,000 rounds
of ammunition, 2,000 rocket-propelled grenades, and 1,000 mortar shells—
quantities that in fact seemed likely to have come from outside Afghanistan.
Moreover, madrassas in Pakistan are dominated by the Jamiat-e-Ulema Islam, a
group that provided the spiritual impetus to hundreds of Taliban before 2001.
Migrant Pakistani laborers, who looked to get employment in the opium harvest
in the south of Afghanistan, were recruited at the end of every season to partici-
pate in the Jihad against Western forces and the Afghan National Security
Forces. The cost of the weapons stocks overrun by NATO in southern Afghani-
stan were estimated to be £2.6 million. This suggests that narco-dollars, or
perhaps vigorous fund-raising, was supporting the insurgency.
The Pakistan government nevertheless insisted that it had nothing to do
with supporting insurgency, and it is fair to say that the border areas have rarely
been firmly under Islamabad’s control. In 2004, the Pakistani army deployed up
to 80,000 troops in the region, while NATO had just 31,000 in Afghanistan.
Moreover, the ISI carried out more than 700 arrests of prominent Jihadists and
members of al-Qaeda, including Khaled Sheikh Mohammed, the architect of
9/11. Pakistan’s casualties from militancy totaled 3,600 in 2007, 8,400 in 2008,
and more than 4,000 in 2009, with a similar trend thereafter. Nevertheless,
Pakistan’s Inter-Services Intelligence / 133
Matt Waldman asserted, through a report based on interviews with several Tali-
ban, that the ISI was so complicit in supporting the Taliban that it was as
evident, in the fighters’ words, as ‘‘the sun in the sky.’’65 Musharraf was quick to
dispute the report, arguing that the Taliban could not have a headquarters at
Quetta and that it was contrary to the ISI’s interests to support the Afghan
insurgents. He was prepared to accept that ‘‘rogue elements’’ of former ISI offi-
cers could have been active. Some of those who worked for the ISI had the
same ethnic background and worldview as their Taliban comrades and had
many years’ experience sharing their hardships and cultural ethos, so the extent
to which they could be considered ‘‘renegade’’ seemed doubtful.66 However,
without explaining the motive, critics believe that the regular ISI could be
using these ‘‘rogue elements’’ as a convenient cover for its operations. When a
large vehicle-borne bomb was detonated outside Indian hostelries in Kabul in
2010, many local Afghans believed that it was an ISI operation delivered by
Haqqani.67 Musharraf had in fact tended to target al-Qaeda and foreign fighters
in Pakistan, rather than the Afghan Taliban, which enjoyed a strong following
in some of the frontier districts. This may have been due in part to the question
of limited resources, but it is also true that Musharraf had to tread a delicate
course between his Western allies and his own disaffected people, particularly
the Islamists, who were a useful political counterweight to the opposition.
The ISI may also have an eye on the future. It suited Pakistan’s national
interests to displace the focus of the TTP and Afghan Taliban into Afghanistan
and away from Pakistan. Grooming the Haqqani network offered the opportu-
nity for potential pro-Pakistani Afghan leaders in the future. At the very least,
the Haqqani could offer to continue to act as negotiators for the ISI, especially
in South Waziristan. Many in Pakistan expect the Western forces to pull out of
Afghanistan in 2014, and this begs the question of what political dispensation
will exist there. Some clearly feel that, once the ISAF has gone, some sort of
accommodation with the Taliban will be necessary, and this affects the current
handling of them.68 Equally, some, especially Indian analysts, believe that
extremists within the armed forces, following Musharaf’s resignation in 2008,
could effectively ‘‘Talibanize’’ Pakistan. However, this is a misconception.
Although a few of the senior officers subscribe to a conservative brand of Islam,
Tableeghi Jamaat, the vast majority of the officer corps are secular, professional,
and loyal. Since 2002, whenever the Pakistan army was attacked by the Taliban
and their allies in South Waziristan, the sympathies for Jihadists were no longer
guaranteed. Attacks on patrols in the area were seen as an attack on the institu-
tion of the army and the state. The army ‘‘closed ranks’’ against this threat.
Where there were episodes of indiscipline, they came from the Frontier Con-
stabulary, an organization with familial and ethnic ties to the tribesmen of the
region. The priority for the army and the ISI remains the preservation of the
state and the ruthless pursuit of Pakistan’s national interests.
134 / Robert Johnson
Assessments
The army has been eager to contain Islamism, while pension, financial, or land
rewards ensure loyalty.69 The army and the ISI were always reliable agencies for
Musharraf, despite episodes of sectarian or communal conflict that broke out in
most major cities and tribal areas after 2001. The ISI will, no doubt, continue
to operate in its traditional roles, protecting the nation’s ‘‘security’’ by preserv-
ing the power of the armed forces, and projecting its influence beyond the
borders of Pakistan and treating Islamist proxies as secondary to its strategic
interests. However, as its record shows, it has not always been successful in
suppressing popular unrest, providing accurate intelligence on the threat, or
containing Islamism. Whether it is able to do so in the future, therefore,
remains in doubt. Democrats are nevertheless deeply disturbed by the effect of
such a powerful intelligence service. The Nation captured the complaint in an
editorial: ‘‘[The ISI] is a government within a government—the intelligence
agencies . . . [have a] virtually autonomous role in the political affairs of the
country. The baneful influence of the intelligence agencies has spread its
malign shadow over the political destiny of the country.’’70
This anxiety resurfaced with the assassination of Benazir Bhutto on Decem-
ber 27, 2007. Although the government was at pains to point out that the
assassins were members of the al-Qaeda-affiliated Lashkar-e-Jhangvi, led by the
militant Beitullah Mehsud, members of the Pakistan People’s Party argued that
the ISI was behind the murder.71 Bhutto had written a letter herself on October
16, 2007, which named four men who intended to kill her, and they included
the head of the Intelligence Branch, Ijaz Shah, and Hamid Gul, the former
chief of the ISI. The Times subsequently carried a story of alleged renegade ISI
involvement in the assassination.72 Perhaps the tragedy is that a number of
groups had motives to kill her, including the TTP and the Jihadist militants of
the Punjab.
Religion is easily recognizable as a badge of identity, and therefore ‘‘culture’’
appears to be the most important element in dictating the radicalized fortunes
of the ISI and its support for Jihadist organizations in the 1980s and 1990s. But
state power is the real root of the ISI’s raison d’être. In Afghanistan, in Kashmir,
and the North West Frontier Province of Pakistan, though religious rhetoric
could be invoked to win popular support, it was Pakistan’s preservation or pro-
jection of power that mattered most. The ISI’s support for the Afghan Taliban
was motivated by the realpolitik of dominating the region on Pakistan’s western
and northern approaches, rather than the ‘‘other worldly’’ cultural concerns of
building a caliphate based on the Sharia. As the free press and democratically
minded have already recognized, it is not Islamism but the ISI’s arbitrary exploi-
tation of power that is most feared. It is the elements that operate on the fringes
of the ISI, and independent extremists, that pose the most deadly menace.
Pakistan’s Inter-Services Intelligence / 135
Notes
1. ‘‘Pakistan’s Spy Agency Is Tied to Attack on US Embassy,’’ New York Times, Septem-
ber 22, 2011.
2. Ibid.
3. ‘‘Pakistani PM Gilani Hits Back at the US Accusations,’’ Reuters, September 24,
2011.
4. ‘‘Pakistan Scorns US Scolding on Terrorism,’’ New York Times, September 23, 2011.
5. ‘‘Pakistan Spat Highlights Bitter Truths Facing the US in Afghanistan,’’ Time, Sep-
tember 26, 2011.
6. Thomas Ruttig, ‘‘The Haqqani Network as an Autonomous Entity,’’ in Decoding the
New Taliban: Insights from the Afghan Field, edited by Antonio Giustozzi (London: Hurst,
2009); ‘‘Pakistan Scorns US Scolding’’; Carlotta Gall, ‘‘Former Pakistani Officer Embodies a
Policy Puzzle,’’ New York Times, March 3, 2010.
7. ‘‘Afghanistan Warns Pakistan against Border Fighting,’’ USA Today, September 25,
2011.
8. Cases in point are the February 2005 Srarogha agreement, the treaty with the Utman-
zai Waziris in September 2006, and separate agreements with the TTP in South Waziristan.
9. ‘‘The Endgame in Afghanistan: How Do We End the Proxy Wars?’’ Time.com, Sep-
tember 23, 2011.
10. On the fear and sensationalism that the ISI generates in India, see Lal Bhure, The
Monstrous Face of ISI: The Real Story behind the Inter-Services Intelligence Agency of Pakistan
(New Delhi: Siddharth, 2000); and Srinkanta Ghosh, Pakistan’s ISI: Network of Terror in
India (New Delhi: A. P. H., 2000).
11. Imtiaz Gul, The Most Dangerous Place (New York: Viking, 2010); Abdel Bari Atwan,
The Secret History of Al-Qaeda (Berkeley: University of California Press, 2006).
12. Steve Coll, ‘‘Don’t Look Back,’’ New Yorker, March 1, 2010.
13. Author’s interview with Jason Burke, October 18, 2011.
14. Dexter Filkins, ‘‘The Journalist and the Spies,’’ New Yorker, September 19, 2011.
15. Jason Burke, ‘‘Mumbai Spy Says He Worked for Terrorists, Then Briefed Pakistan,’’
The Guardian, October 18, 2011.
16. Hasan Zaidi, ‘‘The Changing Face of the Taliban,’’ InPaper Magazine, Dawn, Septem-
ber 2011; Dexter Filkins, ‘‘The Journalist and the Spies,’’ New Yorker, September 19, 2011.
17. Military culture has been much-debated as a concept; see Theo Farrell and Terry
Terriff, The Sources of Military Change: Culture, Politics, Technology (Boulder, CO: Westview
Press, 2002), 3–21; Theo Farrell, ‘‘Culture and Military Power,’’ Review of International Stud-
ies, 24 (1998): 407–16; Ann Swidler, ‘‘Culture in Action: Symbols and Strategies,’’ American
Sociological Review 51, no. 2 (April 1986); and Peter Wilson, ‘‘Defining Military Culture,’’
Journal of Military History 71, no. 1 (2008): 11–43.
18. ‘‘Endgame in Afghanistan.’’
19. ‘‘Pakistan Warns That US Accusations May Cost Washington,’’ Los Angeles Times,
September 24, 2011.
20. Ibid.
21. For details of accusations of the degree of clandestine involvement in terror in India,
see Rajeev Sharma, Pak Proxy War: A Story of ISI, Bin Laden, and Kargil (New Delhi: Kaveri
Books, 1999).
22. Imtiaz Ali, ‘‘Beitullah Mehsud: The Taliban’s New Leader in Pakistan,’’ Jamestown
Terrorism Focus, January 9, 2008.
Pakistan’s Inter-Services Intelligence / 137
56. The Pakistan army argued that Pashtuns were forced to retaliate against American
occupation and drone strikes; they blamed the United States for the energy crisis in Pakistan,
citing the delay to the Turkmenistan–Pakistan pipeline project caused by American opera-
tions in Afghanistan; they stated that drug abuse is increasing in Pakistan because of the
Afghan conflict, fueling domestic crime. The increase in attacks on the security services, the
rise in kidnapping as a tactic from Afghanistan and the ability of India to exploit a potential
‘‘second front’’ against Pakistan are all attributable to the United States’ policies. Author’s
interviews, 2011.
57. Mahmud Ahmed had told the Taliban’s ambassador, Abdul Salam Zaeff, in 2001:
‘‘We want to assure you that you will not be alone in this Jihad against America. We will be
with you.’’ Allegedly, President Zardari had addressed Taliban prisoners in a similar manner
in 2010: ‘‘You are our people; we are friends; and after your release we will of course support
you to do your operations.’’ Matt Waldman, ‘‘The Sun in the Sky: The Relationship between
Pakistan’s ISI and Afghan Insurgents,’’ Crisis States Discussion Paper, London School of
Economics and Political Science, June 2010, 8.
58. Robert Johnson, A Region in Turmoil: South Asian Conflicts since 1947 (London: Reak-
tion Books, 2005), 231.
59. There were continuing supplies of weapons to the Taliban in September 2001. Owen
Bennett Jones, Pakistan: Eye of the Storm (New Haven, CT: Yale University Press, 2003),
241.
60. Anand Gopal, Mansur Khan Mahsud, and Brian Fishman, ‘‘The Battle for Pakistan:
Militancy and Conflict in North Waziristan,’’ New America Foundation, available at
Counter-terrorism.newamerica.net.
61. Imtiaz Gul, Most Dangerous Place: Pakistan’s Lawless Frontier (New York: Penguin,
2009), 171; Linschoten and Kuehn, Enemy We Created, 298.
62. Rory McCarthy, ‘‘Dangerous Game of State-Sponsored Terror That Threatens
Nuclear Conflict,’’ The Guardian, May 25, 2002.
63. Ahmed Rashid, ‘‘Nato’s Top Brass Accuse Pakistan over Taliban Aid,’’ Daily Telegraph,
October 6, 2006.
64. Steve Schippert, ‘‘Pakistan Cedes North Waziristan to Taliban,’’ September 6, 2006,
http://inbrief.ThreatsWatch.org/2006/09/pakistan-cedes-north-wazirista/.
65. Waldman, ‘‘Sun in the Sky.’’ For reactions, see ‘‘Pakistani Agents Funding and Train-
ing Afghan Taliban,’’ BBC, June 13, 2010.
66. Antonio Giustozzi, Koran, Kalashnikov and Laptop (London: Hurst, 2007), noted there
were those with long-standing experience of working in Afghanistan or with militants on
the frontier; Seth Jones referred to elements of the Frontier Corps and the ISI who were
engaged in supporting insurgents in Afghanistan; Seth Jones, ‘‘Counter-Insurgency in
Afghanistan,’’ RAND Counter-Insurgency Study 4 (Santa Monica, CA: RAND Corpora-
tion, 2008); Waldman, ‘‘Sun in the Sky,’’ 5.
67. Author’s interviews, March 2010.
68. Ayesha Siddiqa, ‘‘Between Military and Militants,’’ World Today: Chatham House 63,
no. 4 (2007): 6.
69. Ibid.
70. The Nation, editorial, June 28, 1997.
71. Syed Faisal Shakeel, ‘‘PPP Demands Probe Based on Benazir’s Letter,’’ Dawn, Decem-
ber 30, 2007.
72. Jeremy Page, ‘‘Main Suspects Are Warlords and Security Forces,’’ The Times, Decem-
ber 27, 2007.
73. Ahmed Rashid, interview at King’s College London, June 2011.
This page intentionally left blank
CHAPTER 8
Iranian Intelligence
Organizations
Carl Anthony Wege
T
he Islamist government of Iran is rooted in a vision of Twelver (Ithna-
Ashari) Shi’ism, which traditionally asserted that any government other
than that of the hidden imam1 was necessarily illegitimate.2 Clerical
authorities came to govern Iran directly without intervening or parallel political
structures only following the historically unique 1979 Revolution.3 To para-
phrase Gabriel Almond, as quoted by Stephen Welch in chapter 2, the 1979
Revolution changed the ‘‘pattern of orientations to political action’’ wherein
‘‘every political system is embedded.’’ Revolutionary Iran became a neotheoc-
racy ideologically driven by a radicalized Shiism to foster regional revolution.4
The structure of Iran’s intelligence establishment derived from the imperatives
of this revolutionary state, whereas Persia’s renewed ambitions to further a Shi’a
Islamist imperium transformed political dynamics across the region.
Mohammed Khatami (1997–2005).27 VAVAK, during the 1990s, also came into
competition with the al-Quds element of the IRGC in establishing relations
with various militant Shi’a organizations outside Iran.28
Although the IRGC’s initial 1979 mission was to defend the regime from
internal enemies, it also acted directly in furtherance of the Islamic Revolu-
tion’s foreign policy goals.29 The Pasdaran, after attaining the status of an inde-
pendent ministry in 1982, emerged as a Praetorian Guard for both the Islamic
Republic of Iran and the clerics leading it. The IRGC and the regular armed
forces (Artesh), though integrated at the level of the national command,
remain competitor organizations. The rivalry was analogous with both Ger-
many’s Waffen SS of the Nazi era and the modern Chinese People’s Liberation
Army. The IRGC, like the Waffen SS, constituted an ideologically anchored
security force in political competition with the regular army for both resources
and political influence respecting national security policy. The Pasdaran, like
the People’s Liberation Army, had also entered the state economy at nearly all
levels, which created economic interests that the IRGC had to protect at the
policy level.
Within the IRGC the al-Quds security apparatus, consisting of about 1,000
men, undertook both intelligence gathering and covert action outside Iran.30
This was distinct from the larger al-Quds special operations forces, which num-
bered several thousand and served in Lebanon, Bosnia, Sudan, and elsewhere.
The Islamic Republic of Iran, following Syria and using the instrument of al-
Quds, expanded the use of state-supported terrorism as an instrument of foreign
and intelligence policy.31
A litany of public domain al-Quds operations outside Iran is unnecessary
except to note that the IRGC al-Quds demonstrated a global reach in support
of Iran’s national foreign policy goals. The African hub that Tehran established
in Sudan illustrates this global reach. Iran’s efforts began early, when Hassan al-
Turabi’s National Islamic Front’s successful 1989 Islamist coup in Sudan caused
Iranian president Akbar Hashemi Rafsanjani, joined by the IRGC along with
Hezbollah’s Imad Mugniyah, to visit Khartoum.32 The result of the 1991 meet-
ing was the transfer of approximately 2,000 IRGCs into Sudan, where they
organized twelve terrorist training camps in the eastern part of the country
while reorganizing the country’s security services.33 Sudan became a focal point
that allowed Iranian intelligence to co-opt and service networks of Sunni Islam-
ists. Iran understood early on that cooperation with Sunni Islamists would be
in its interests. The utility of these Islamist assets for al-Quds is truncated by
the degradation of operational management and the flexibility intrinsic in
politically quasi-independent entities. The operational skill set of the Sunni
networks are also limited compared with those available to al-Quds profession-
als. Sudan, by the end of the twentieth century, and now ruled by Omar Hassan
al-Bashir, became a refuge for Palestinians from Hamas, the Palestinian Islamic
Iranian Intelligence Organizations / 145
Jihad, and Fatah operatives who were wanted by Israel. Sudan also facilitated a
method whereby some wanted terrorists could return to the fight by going from
Khartoum first to Iran and then infiltrating back into operational areas of the
Middle East.34 Sudan by the late 1990s still had hundreds of IRGC members in
the country training foreign terrorists in addition to engaging in other military
missions.35 In the early twenty-first century Sudan developed a significant role
in Iran’s global arms-smuggling networks as a regional center for larger Iranian
arms-trafficking efforts.36 Hezbollah members, acting on Iran’s behalf, bought
weapons and transported them north through Egypt and into the Sinai, where
Bedouin smugglers moved them on into Gaza. In 2009 Israel was concerned
enough about the volume and quality of weapons moving north to risk an
international incident by attacking a convoy ferrying Iranian weapons that were
en route to Gaza via Egypt.37 At the end of the day, however, what remains is
that a substantive Iranian-facilitated arms-smuggling network, aided by Hezbol-
lah operatives, is moving large quantities of arms through Africa into the Mid-
dle East. Some of these arms are smuggled to Hezbollah in Lebanon, some to
Hamas in Gaza, and some furthering other Iranian interests in Africa.
In 1992 the global reach of al-Quds, using intelligence networks through
Iran’s embassy to coordinate local operational support, facilitated attacks in
Argentina against the Israeli Embassy and in 1994 a Jewish Community Center
in Buenos Aires.38 Some Argentine Islamist organizations sympathetic to Iran
were used for initial surveillance and target designation. Such preplanning
sometimes uses Iranian veterans of the Afghanistan war against the USSR, who
have high status among Islamists, to assist local sympathizers in creating target
packages. These targets may later be attacked using professionals following a
political decision in Tehran.39
In the Palestinian theater of war, Iran used Lebanon’s Hezbollah as a surro-
gate. Iranian overtures to Hamas, both directly and through Hezbollah, allowed
Iran to directly confront Israel. This began with Israel’s ill-advised deportation
of roughly four hundred Hamas and Islamic Jihad activists to the Marj al-
Zahour area of Lebanon in 1992, which inadvertently furthered Iranian-
inspired Sunni Shi’a cooperation in the anti-Israeli Resistance (Muqawama).
Although it was a failure in hindsight, as a proposal Israel’s deportations must
have initially appeared to have some merit in that Sunni religious and political
activists would be marooned in a region dominated by the Shi’a and with a
history of friction with the Palestinians. The hope, if there was a specific hope
articulated within Israeli councils of government by the Shin Bet, would be
that these activists would never return to Israel. They would be limited to voic-
ing anti-Israeli propaganda while kept on a very short leash by their new hosts.
Alas, the result was a textbook example of blowback. Rather than living as
unwanted guests, the Palestinians were taken under the wing of Hezbollah and
tutored in the arts of the Muqawama. Imad Mugniyah, assisted by Abdallah
146 / Carl Anthony Wege
The Shatterbelt
In Iran itself, the revolutionary bureaucracy was Islamicized, so that the instru-
ments of authoritarian control all manifest a Shi’a veneer that reflects the direct
Iranian Intelligence Organizations / 147
Najaf, Karbala, Kut, Basra, and Kirkuk.56 In the geographic area of Iraqi Kurdis-
tan, the Iranians are faced with a more difficult problem. The Kurds, although
carrying a tragic history of betrayal by the Western powers, are nonetheless a
point of access into Iran. Israel’s Mossad has maintained a substantive presence
in Kurdistan since at least the early 1970s, and American penetration expanded
following the first Gulf War.57
Central Asia presents an opportunity for VAVAK—albeit one mitigated by
both the traditional Turkish/Iranian rivalry reborn in Central Asia and the
resurgence of Russian power in the region. Nations contiguous with Iran, such
as Azerbaijan and Turkmenistan, offer the most significant prospects. The Ira-
nian security services are increasingly essential as Iran forges its place in the
sun in the Near Eastern milieu. The shah-era ‘‘triple alliance’’ of the non-Arab
states of Iran, Turkey, and Israel hemming in the Sunni Arabs has been reduced
to a bilateral Turkish–Israeli relationship, which is further deteriorating as the
Turks face the rise of their own Islamist political parties. Nonetheless, the
maturing Iranian services have some established level of stability with respect
to their relationships with foreign services. There are even instances of commu-
nication between Iranian services and the US intelligence community through
the good offices of the Jordanians,58 whose military intelligence component has
maintained relations with MOIS.59
Archie Roosevelt argued long ago that a lust for knowing, seeking under-
standing unclouded by worldview, must animate the intelligence enterprise.68
The Shi’a worldview of the clerics leading the Tehran government substantially
undermines the Iranian intelligence enterprise to the detriment of the Islamic
Republic of Iran.
Notes
1. The twelfth imam recognized by the Shi’a, Muhammad al Mahdi, was hidden from
the world by divine intervention in ad 874. It is expected that his return will usher in the
Day of Judgment. The Shi’a community also includes Zaydis or Fivers, who claim five true
imams, and Seveners or Ismailis, who now live primarily in an arc from Central Asia and
Afghanistan to Western China.
2. Iran’s sixteenth-century Safavid Dynasty circumvented this problem by asserting that
the Shah and associated institutions derived their authority from Allah. The seventeenth-
century creation of the office of Mullabashi (chief mullah) precipitated ongoing contention
between religious and secular power in Iran. See Roger M. Savory, ‘‘The Problem of Sover-
eignty in an Ithna Ashari (‘‘Twelver’’) Shi’i State,’’ in Religion and Politics in the Middle East,
edited by Michael Curtis (Boulder, CO: Westview Press, 1981), 135–37.
3. Azar Tabari, ‘‘The Role of the Clergy in Modern Iranian Politics,’’ in Religion and
Politics in Iran, edited by Nikki R. Keddie (New Haven, CT: Yale University Press, 1983), 72.
4. Mir Zohair Husain, Global Islamic Politics (New York: HarperCollins, 1995), 227–35.
5. Wilfred Buchta, ‘‘Ideological Factions within the Power Apparatus,’’ in Who Rules
Iran? (Washington, DC: Washington Institute for Near East Policy, 2000), 14.
6. Mahammad Amjad, Iran: From Royal Dictatorship to Theocracy (Westport, CT: Green-
wood Press, 1989), 65.
7. See Abbas William Samii, ‘‘The Shah’s Lebanon Policy: The Role of SAVAK,’’ Middle
Eastern Studies 33, no. 1 (January 1997): 66–91.
8. Robin Wright, In The Name of God: The Khomeini Decade (New York: Touchstone,
1989), 110.
9. Edgar O’Balance, Islamist Fundamentalist Terrorism, 1979–1995: The Iranian Connec-
tion (New York: New York University Press, 1997), 38. Relations between Khomeini and
Arafat deteriorated following the latter’s support for Saddam Hussein during the Iran–Iraq
War of the 1980s.
10. Gholam R. Afkhami, The Iranian Revolution: Thanatos on a National Scale (Washing-
ton, DC: Middle East Institute, 1985), 114. Also see Ervand Abrahamian, The Iranian
Mojahedin (New Haven, CT: Yale University Press, 1989), 50.
11. Haleh Afshar, ‘‘The Iranian Theocracy,’’ in Iran: A Revolution in Turmoil, edited by
Haleh Afshar (Albany: State University of New York Press, 1985), 191.
12. There is technically a coalition of law enforcement forces under the authority of the
Ministry of the Interior consisting of city police, countryside police, and the gendarmerie
and various revolutionary committees. These entities are of limited intelligence significance.
13. The SVR was the Russian Foreign Intelligence Service established in 1991 as a follow-
on to the old KGB First Directorate.
14. The Russians provided training in intelligence collection methods using three-month
training cycles under the direction of the Russian Interior Ministry and under the auspices
Iranian Intelligence Organizations / 153
of Yevgeni Primakov. See ‘‘Russian Agents Teach Iranians How to Spy,’’ Washington Times,
September 11, 1995.
15. ‘‘Iran’s Spies,’’ Sunday Herald, December 24, 2006. This was allegedly accomplished
by feeding false information to various Iraqi opposition organizations infiltrated by MOIS.
16. ‘‘The Iranian Intelligence Services,’’ Note for News (French Centre for Research on
Intelligence), no. 200, January 5, 2010, available at www.cf2r.org.
17. Intelligence Newsletter, no. 286, April 18, 1996.
18. The Peoples Mujahidin Organization is a Marxist organization founded in 1965 and
dedicated to the overthrow of the Islamic Republic of Iran. Although considered a terrorist
organization by the United States, it has nonetheless provided apparently accurate informa-
tion on Iran’s nuclear program.
19. ‘‘MOIS Structure,’’ February 28, 2006, www.iranterror.com/content/view/176/66.
20. ‘‘The Iranian Intelligence Services,’’ Note for News, no. 200, January 5, 2010, available
at www.cf2r.org.
21. Precision in this sort of thing is always problematic due to everything from definitional
differences respecting what constitutes a ministry employee to active disinformation efforts
on the part of the ministry.
22. ‘‘Iranian Intelligence Services.’’
23. The German courts referred to Misbahi as witness ‘‘C’’ in German terrorism trials
involving a VAVAK-sponsored assassination. Misbahi, in addition to being a close aide to
Rafsanjani and cofounder of VAVAK, managed intelligence networks in Iranian expatriate
communities in Europe. See ‘‘Former Official Disclosed Iran’s Complicity in Murders,’’ Wash-
ington Post, April 12, 1997.
24. Indicative of this was the visit of Iranian intelligence minister Fallahian with Germa-
ny’s BND chief Bernd Schmidbauer. The meeting allegedly dealt with humanitarian issues.
See ‘‘Iran’s State of Terror,’’ Time, Atlantic Edition, November 11, 1996. Schmidbauer
returned the favor by visiting Tehran secretly in 1996. See Brief on Iran, no. 462, July 25,
1996. Germany has also supplied computer equipment and training to the Iranian services.
O’Balance, Islamic Fundamentalist Terrorism, 157.
25. Although given the close post–World War II relationship between Germany and Israel
and Israel’s close pre-Revolution relationship with the shah of Iran, it is likely that the old
access channels between Israel and Iran and current channels among Germany, Israel, and
Iran have yielded a significant amount of back-channel interaction.
26. This was particularly applicable to cadre from the Peoples’ Mujahidin and Iranian
Kurdish Democratic Party.
27. Douglas Jehl, ‘‘Killing of Three Rebel Writers Turns Hope into Fear in Iran,’’ New
York Times, December 14, 1998.
28. Frederic Wehrey, Jerrold D. Green, Brian Nichiporuk, Alireza Nader, Lydia Hansell,
Rasool Nafisi, and S. R. Bohandy, Rise of the Pasdaran (Washington, DC: RAND National
Defense Research Institute Intelligence Policy Center, 2010), 10.
29. O’Balance, Islamic Fundamentalist Terrorism, 41. The IRGC ceded this role to MOIS
in 1983 but regained it following the election of President Khatami in 1997.
30. Buchta, Who Rules Iran? 69.
31. See Grant Wardlaw, ‘‘Terror as an Instrument of Foreign Policy,’’ in Inside Terrorist
Organizations, edited by David C. Rapoport (New York: Columbia University Press, 1988).
Libya also attempted to use state-sponsored terror but proved not very competent at it.
32. Sudan’s Islamic Front was a local version of the Ikhwan; by 2011 the Islamic Front
had evolved into something called the National Congress Party. Al-Turabi would himself be
154 / Carl Anthony Wege
imprisoned and released multiple times between 2004 and 2011 by one-time allies in Sudan’s
Islamist government. Mugniyah would be assassinated in Damascus Syria, presumably by
Mossad’s Kidon element.
33. The number of Iranian personnel would swell to 3,000 in 1996, decline to about 1,500
by the turn of the century, and numbers a few hundred today. See ‘‘Sudan Is a Surrogate for
Iranian Terrorism,’’ Washington Times, April 27, 1994; and ‘‘Elite Iran Unit Said to Control
Sudan’s Security,’’ Washington Times, August 28, 1993. It is also worth noting that Iran had
named Majid Kamal as its chargé d’affaires in Khartoum. He had previously served in Beirut
in the early 1980s assisting in the creation of Hezbollah. Administratively, a committee
including al-Turabi’s aide, Ali Othman Taha, and General Rahim Safavi of the IRGC was
responsible for the particulars of Iranian intelligence-related assistance under the auspices of
Ali Manshawi. Many of the camps in the early 1990s training foreign terrorists were run by
Ali Alhaja, a close associate of al-Turabi. See Shaul Shay, Somalia between Jihad and Restora-
tion (New Brunswick, NJ: Transaction Publishers, 2008), 63. Initially, the major terrorist
training camps were Al-Shambat and Al Amzraa, later including camps at Khadolfi, Al-Grif,
Benda, Karda, and Bahra. See Shaul Shay, Red Sea Terror Triangle: Sudan, Somalia, Yemen,
and Islamic Terror (New Brunswick, NJ: Transaction Publishers, 2006), 47. Nearly two dozen
additional camps existed for training terrorists under the tutelage of Osama bin Laden
Salafists. These camps basically dissolved after 9/11.
34. ‘‘Israeli, US Intelligence Report Says Sudan Becoming Haven for Hamas, Hezbollah,’’
BBC Summary of World Broadcasts, March 14, 2001.
35. See Amir Taheri, ‘‘Sudan: An Expanding Civil War with an Iran Connection,’’ Inter-
national Herald Tribune, April 9, 1997. Sudan also allowed mooring facilities in Port Sudan
to service Iranian submarines.
36. Smuggling is sustained in part by tribal relationships and religious affiliations that are
centuries old and stretch across a geographic arc from East Africa all the way around to
Pakistan. See Annette Hübschle, ‘‘Unholy Alliance? Assessing the Links between Organized
Criminals and Terrorists in Southern Africa,’’ ISS Paper 93 (Paris: Institute for Security
Studies, 2004), 9.
37. Israeli Air Force assets including Hermes drones out of Palmachim Air Base near Tel
Aviv, accompanied by an Eitan unmanned aerial vehicle (i.e., drone), carried out at least
two separate operations in January and February 2009. They attacked two separate convoys
carrying Fajr 3 rockets intended to be smuggled from Egypt for use by Hamas in Gaza. It
appears that dozens of smugglers and Iranian escorts were killed in the operation. See ‘‘Israeli
Drones Destroy Rocket-Smuggling Convoys in Sudan,’’ Sunday Times, March 29, 2009. US
Department of Defense Special Operations Task Forces (88/145) also covertly engaged al-
Qaeda across the Horn of Africa following the 1998 Embassy bombings. See Donovan C.
Chau, US Counterterrorism in Sub-Saharan Africa: Understanding Costs, Cultures, and Conflicts
(Carlisle, PA: Strategic Studies Institute of the US Army War College, 2008), 18.
38. ‘‘Iranian Diplomats Said to Be Suspects in Blast at Argentina Jewish Center,’’ Wash-
ington Post, July 29, 1994.
39. ‘‘The Iranian Hand on the Plunger,’’ Yediot Ahronot, July 29, 1994; and Foundation
for Democracy in Iran, Weekly News Update, May 27, 1996.
40. ‘‘The Changing Colors of Imad Mugniyah,’’ Jerusalem Report, December 3, 2002, 4. In
one of the region’s many ironies, Israel had been tolerant of Hamas in the Gaza during the
early 1980s as a counterweight to Fatah.
41. Musa Keilani, ‘‘Another Split with Worrisome Repercussions,’’ Jordan Times, March
21, 2010. The two thousand or so fighters under the command of Colonel Muir Maqdah,
Iranian Intelligence Organizations / 155
formerly of Fatah’s Force 17, had a history of auctioning themselves to the highest bidder,
deep involvement in alleged corruption in the Ain Hilwa refugee camp, and Maqdah was on
the losing end of a political dispute with Palestinian president Mahmoud Abbas.
42. ‘‘The Muslim Brotherhood in Egypt: Hurdles on the Way to Power,’’ Center for Secur-
ity Studies, Zurich, October 2011.
43. ‘‘Iran Builds Up Network of Terror Schools,’’ Electronic Telegraph, July 8, 1996. Addi-
tional camps have included the Nahavand camp in Hamadan for Lebanon’s Hezbollah, and
the Imam Ali camp in east Tehran, which is the largest camp and used by Saudi opposition
groups. Iranian exile groups have also named Bahonar Barracks, Mostafa Kohomeini Bar-
racks, Ghayoor Asli Barracks, Imam Sadegh Camp, Korreit Camp, Lavizan and Abyek train-
ing centers, etc. See ‘‘Terrorist Training by the Quds Force and the VEVAK,’’ February 28,
2006, available at www.iranterror.com.
44. See ‘‘Iran’s Al-Quds Octopus Spreads Its Arms,’’ Jerusalem Post, October 27, 2008.
45. See Nazih Ayubi, ‘‘Arab Bureaucracies: Expanding Size, Changing Roles,’’ in The
Arab State, edited by Giacomo Luciani (Berkeley: University of California Press, 1990). A
civil society is here understood in Lockean terms, whereby government is created by a social
contract among individuals to protect individual rights to life, liberty, and property.
46. Bill and Leiden have commented; in the patrimonial style of Middle Eastern leader-
ship, the leader becomes the fount of all important ideas and strategies. Policies and programs
emanate from him. See James A. Bill and Carl Leiden, Politics in the Middle East (Boston:
Little, Brown, 1984), 151–52.
47. ‘‘Iran’s Lurking Enemy Within,’’ Asia Times, January 8, 2006.
48. ‘‘Iran Exile Group: Khamenei Tightens Intelligence Grip,’’ Reuters, November 12,
2009. Khamenei was assisted by Ali Asghar Hejazi. Hejazi was directly involved in creating
the MOIS and has coordinated intelligence agencies under Khamenei since 1989.
49. In this context Dubai has become a Near Eastern version of Vienna during the Cold
War, and Oman functions as a major covert asset of the United States, as does Jordan.
50. See Abedin Mahan, ‘‘The Iranian Intelligence Services and the War on Terror,’’
Terrorism Monitor 2, no. 10 (May 19, 2004), www.jamestown.org/programs/gta/terrorismmon
itorgta/.
51. ‘‘Major Personnel Boost for Oghab-2,’’ Intelligence Online, May 11, 2007.
52. Pisheen is on the Baluchistan–Pakistan border with Iran near the Persian Gulf. See
‘‘Iran’s Lurking Enemy Within.’’ The United States has apparently attempted to exploit
what amounts to a tribal militia, albeit one with its own ties to al-Qaeda, to conduct opera-
tions against Iran. In February 2010 Iran managed to capture the leader of Jundallah, Abdol
Malek Rigi, following a visit to a US facility in Pakistan. It was a significant blow to the
Jundallah organization.
53. ‘‘MOIS Structure,’’ February 28, 2006, www.iranterror.com/content/view/176/66.
54. Department 9000 was apparently established to act as a liaison between local Iraqi
Shi’a militants and al-Quds. See ‘‘Tehran’s Secret Department 9000,’’ Newsweek, May 28,
2007.
55. Bill Roggio, ‘‘Iran’s Ramazan Corps and the Ratlines into Iraq,’’ Long War Journal,
December 5, 2007, www.longwarjournal.org/archives/2007/12/irans_ramazan_corps.php.
56. See ‘‘The Iranian Intelligence Services,’’ January 5, 2010, Note for News (French Cen-
tre for Research on Intelligence), no. 200, available at www.cf2r.org.
57. Eliezer Tsafrir, who had been a senior Mossad official, revealed that Israeli–Kurdish
relations were so good that Israel had military advisers in Iraqi Kurdish regions during the
156 / Carl Anthony Wege
period 1963–75 and the Kurds had assisted in the movement of Jews from the area to Israel
as far back as the 1950s. Reuters, February 21, 1999.
58. ‘‘The Iranian Intelligence Services and the War on Terror,’’ Terrorism Monitor 2, no.
10 (May 29, 2004), www.Jamestownfoundation.org.
59. ‘‘Iranian Intelligence Services,’’ Note for News.
60. See ‘‘Revolutionary Disintegration,’’ Time, June 26, 1995.
61. See ‘‘Iran’s Clerical Spymasters,’’ Asia Times, July 21, 2007. Likewise, there is what
amounts to a ‘‘commissar system’’ of clergy in every entity of governance that reports directly
to the supreme leader. It is also relevant that much of the leadership in MOIS have attended
the Madrase-ye Haqqani theological school in Qom. See Buchta, Who Rules Iran? 166. The
Haqqani school itself was founded by the Hojjatieh, a semisecret anti-Sunni society that
technically rejects the velayat-e faqih of postrevolutionary Iran. See ‘‘Shi’ite Supremacists
Emerge from Iran’s Shadows,’’ Asia Times, September 9, 2005.
62. See ‘‘Daily Update,’’ Intelligence Watch Reports 3, no. 116 (April 26, 1996). E.g., Iran
managed to dismantle a network of American collection assets by 1989, and in 1995 it broke
up five espionage networks set up by Turkey within the country. This continued to the 2010
detention of several American ‘‘hikers’’ who entered Iran via Kurdistan and were finally
released in 2011. See ‘‘US Hikers Arrested at Iran Border,’’ Guardian, August 2, 2009.
63. ‘‘Defector Spied on Iran for Years,’’ Sunday Times, March 11, 2007.
64. ‘‘Major Personnel Boost for Oghab-2,’’ Intelligence Online, May 11, 2007. IRGC man-
agement was evident in Oghab-2’s first iteration under General Gholam Mohrabi but is still
anchored in the Pasdaran with the top tiers, including General Ahmad Wahidi and his
second, General Akbar Dianatr, coming from the IRGC. The third level does begin to
diversify with Ali Naqdi formerly of the Tehran police. Major efforts have apparently been
made to excise moles in the nuclear program from Pakistan’s ISI acting under US auspices.
65. Iran’s experience with the weaponized software called the Stuxnet worm perfectly
illustrates the problem. The worm exploits vulnerabilities in the commercial Microsoft Win-
dows computer operating system.
66. A cybersecurity unit within the IRGC, the ‘‘Control Center for Internet Activities,’’
is relatively small with quite limited resources as compared with their Western counterparts.
It was initially headquartered in the Firouzeh Palace (Ghasreh Firouzeh) district of Kamali
Township. See ‘‘Iran Exile Group.’’
67. Tom Armour, DARPA Tech Symposium 2002, Information Awareness Office, Cogni-
tive Amplification, citing Bo Dahlbomand and Lar-Erik Janlen.
68. Archie Roosevelt, For Lust of Knowing: Memoirs of an Intelligence Officer (Boston:
Little, Brown, 1988).
CHAPTER 9
Intelligence and
Security-Sector Reform
in Indonesia
Peter Gill and Lee Wilson
I
n the past thirty years throughout Europe, the Americas, and more sporadi-
cally elsewhere, the issue of how to institute some democratic control over
security intelligence agencies has steadily permeated the political agenda.
This shift has been a central, and sometimes painful, aspect of the democratiza-
tion of formerly authoritarian regimes, both civilian and military. For example,
the death of the dictator Francisco Franco in 1976 precipitated democratization
in Spain that included the demilitarization of intelligence. Military rule ended
in Brazil in 1985, though the military-dominated National Intelligence Service
was not replaced until 1990 as part of a continuing process of demilitarization.
During the years 1993–94, a more rapid transformation of formerly repressive
security agencies was attempted in South Africa. In the countries of the former
Soviet bloc, no agency has been immune from the changes—although the
amount of real, as opposed to nominal, reform varies widely. Even in what
might be described as the ‘‘old’’ democracies of North America, Western
Europe, Australia, and New Zealand, legislative or judicial inquiries into scan-
dals involving abuses of power and rights by the agencies have resulted in new
legal and oversight structures for the agencies.
Such changes have been less common in Asia, though there are exceptions,
such as South Korea.1 In this chapter we examine the situation in Indonesia,
/ 157 /
158 / Peter Gill and Lee Wilson
where the first law on state intelligence was passed in 2011. We discuss the
competing approaches to the analysis of intelligence democratization; provide
an account of the development of intelligence since the country achieved inde-
pendence; and analyze the current prospects for democratization given the
social, economic, and political context of the country’s state and security
networks.
including: core security actors (e.g., armed forces, police, gendarmerie, border
guards, customs and immigration, and intelligence and security services); secur-
ity management and oversight bodies (e.g., ministries of defense and internal
affairs, financial management bodies and public complaints commissions); jus-
tice and law enforcement institutions (e.g., the judiciary, prisons, prosecution
services, traditional justice systems); and nonstatutory security forces (e.g., pri-
vate security companies, guerrilla armies, and private militia).5
Bruneau and Matei argue that this variety of definitions and the inclusion of
nonstate bodies reduces the utility of the SSR concept, but, conversely, the
CMR model risks unduly privileging the military mode of intelligence; we can
find almost as many cases of civilian as of military intelligence abuse.6
The other strength of the SSR model is that it invites us to look at intelli-
gence ‘‘beyond the state.’’ Conventional intelligence studies have been too
dominated by the examination of state agencies, despite wide variations
between countries in terms of where the locus of intelligence activity lies.7
This may be the consequence of the general underdevelopment of modern state
institutions, but it can also be observed in older democracies with well-
established state institutions where the corporate intelligence sector has grown
in significance since the end of the Cold War. As we shall see, the need to
examine intelligence beyond the state is especially important in the Indonesian
case, even though the continuing dominance of the military in domestic gov-
ernment and politics might suggest the superiority of the CMR framework. The
SSR perspective is preferred precisely because it facilitates the study of the
many different types of security actors operating at the neighborhood, regional,
and national levels. Given the European origin of SSR, applying it to an Asian
country will provide an interesting test of its utility for comparative research—
including its shortcomings. Whichever model is deployed, note that democrati-
zation is a process, not an event, and, as such, may progress or regress.8
and Order (Kopkamtib) three days after the coup attempt to mobilize the armed
forces against the PKI. Since the start of Indonesia’s ‘‘Confrontation’’ with the
United Kingdom over Malaysia in 1963, propaganda had been deployed by both
sides, but the United Kingdom took advantage of the coup to intensify its attack
on Sukarno and Subrandio, helping to damage their image, inciting people
against the PKI, and undermining support for the Confrontation campaign.16
As the commander of Kopkamtib, in the name of national security, Suharto
proclaimed a need to forge a chain of intelligence to monitor community activi-
ties considered to be a danger to the government. In 1966 he created the State
Intelligence Command (Komando Intelegen Negara [KIN]), a strategic body
responsible directly to him, incorporating all intelligence agencies to report on
foreign and domestic security issues.17 Opsus (special operations), which was
responsible for covert political and diplomatic operations, had worked for
Suharto since the West Irian campaign in 1960 and continued its work. When
Sukarno was forced to delegate government authority to Suharto in March 1966,
the army attacked the BPI headquarters building and detained everyone there.
In March 1967 KIN became the State Intelligence Coordination Agency (Badan
Koordinasi Intelijen Negara [BAKIN]), with essentially the same mandate, and
BAKIN immediately formed close ties with the CIA because BAKIN wanted
help with its domestic anticommunist campaign and in foreign communist coun-
tries; likewise, the CIA wanted regional help given the mire in which it was
becoming steeped in Vietnam. In 1968 a special unit was created for foreign
counterintelligence—the Special Intelligence Unit, eventually known as Satsus
Intel, which received CIA funding and also support from other Western agencies,
including training from MI-6 and Mossad. By 1973 Satsus Intel employees were
considered honorary employees of BAKIN but remained separate.18
The failed coup was the pretext for the initiation of the New Order by
means of the mass slaughter over the next six months of anywhere up to 1
million people by military and intelligence agencies led by Suharto and orches-
trated by Kopkamtib.19 Such extensive violence became a theme of the regime,
which justified killings by reference to the need to eliminate ever-present
threats to the security of the state. As Tony Day suggests, it is hard to imagine
the New Order without the constant threat of disorder.20 Lindsey notes the
ways in which informal systems of violence and extortion became institutional-
ized under the New Order, in which ‘‘the territorialized system of the preman
[gangsters] as urban standover criminals was writ large as the state used vio-
lence, systematic terror, and intimidation to extract the japrem [illegal rent] that
funded the crony capitalism of the New Order. This led also to a proliferation of
dekking or bekking (‘backing’), the mechanism by which state officials protected
street-level preman. Rival criminal ‘gang’ structures linked political and business
elites through the military to preman, who sometimes mutated into private
armies or militias linked to political and business leaders.’’21
162 / Peter Gill and Lee Wilson
And yet this excessive violence, it can be argued, resulted also from the felt
need of the security apparatus to show that it was more in command than it
necessarily was. Much of the ceremony surrounding the New Order drew upon
the attempted coup of 1965, the September 30 Movement (Gestapu, gerakan
September tiga puluh, G30S). The official version of events is retold in books
and films in which the events of G30S assume the role of foundational myth
for the New Order. Commemorative events served to reify and instantiate the
threat of the PKI, thus underlining the Suharto administration’s ability to
restore and maintain order after cataclysmic social upheaval and appalling
slaughter.22 National vigilance courses were introduced to make citizens aware
of the alleged threats to the social order.23 Although the security apparatus
could display ruthless efficiency in specific places at certain times, the very
nature of Indonesia meant that it was unable to actually maintain control
everywhere, though it certainly was able to intimidate enough to deter serious
threats.24 The first quarter century of the New Order coincided with the Cold
War, when the concern of the older democracies with interests in the region,
especially the United States and Australia, was with anticommunism. More-
over, for the international order, based upon the recognition of the monopoly
of a state’s absolute authority within its domain, the appearance of a strong
centralized state—whether police state or military dictatorship—able to pro-
vide security was important.25
In 1970 BAKIN was reorganized into two main departments, one foreign,
the other domestic, plus a third for Special Operations, though most of these
were still carried out via Opsus, for example, ensuring election victories for
Suharto and the growth of the Golkar electoral machine that underpinned the
New Order.26 Infighting between Opsus and BAKIN during the years 1973–74
eventually led to the former being merged within BAKIN’s third department,
which was now tasked with ‘‘conditioning’’—that is, molding public opinion
especially in five areas: Muslims, military, mass media, students, and business
leaders.27 However, during the late 1970s BAKIN was essentially subordinated
to military intelligence. Following a fundamentalist-inspired aircraft hijack that
was successfully thwarted by military special forces, military intelligence used
its suspicions of BAKIN’s involvement to virtually emasculate the agency. The
military’s own Strategic Intelligence Center now expanded into the Strategic
Intelligence Agency (Badan Intelegen Strategis [BAIS]), which absorbed many of
the investigative and enforcement powers of Kopkamtib. One of few areas
where BAKIN held its own was in counterintelligence against foreign espio-
nage, much helped by continuing support from the CIA.28
state by authoritarian governments and their allied elites. Indonesia signed the
International Covenant on Civil and Political Rights in 2006, and the key
question is the extent to which national legal reforms stay within the ‘‘margin
of appreciation’’ permitted by rights conventions to all countries.
The Indonesian Criminal Code provides a legal basis for the control of
police and security operations but is widely ignored, in part because of an inade-
quate judiciary that is still subject to de facto control by the executive and the
failure to enforce even those rare sentences of rights violators that are passed.36
In the immediate post–New Order period a number of factors combined to
bring about a worsening rather than any improvement of human rights, includ-
ing the entrenched elites’ corruption, the collapse of the economy, and local
independence movements. In such a context the military and security forces
rested on their accustomed role as guardians of national unity and security and
committed widespread atrocities with impunity.37 Although the tragic circum-
stances of the 2004 tsunami precipitated some resolution of separatist claims in
Aceh, in other cases autonomy disputes persist. For example, in Papua the Peo-
ple’s Council resolved that all candidates in district-level elections should be
indigenous Papuans, but this measure has been rejected by Jakarta as discrimi-
natory and in violation of national law.38
The case that has come to symbolize the apparent impunity with which the
State Intelligence Agency, now known as Badan Intelijen Negara (BIN), is able
to operate, however, is the murder of Munir Said Thalib, one of Indonesia’s
most respected human rights lawyers and founder of the Commission for Miss-
ing Persons and Victims of Violence (Kontras) and the Indonesian Human
Rights Monitor (Imparsial). He was poisoned with arsenic on a flight from
Jakarta to Amsterdam in September 2004. The only person so far convicted of
his murder is a former Garuda Indonesia airline pilot who was traveling on the
plane and was known to have close links with BIN; for example, his mobile
telephone records showed more than two dozen calls in the days before and
after the murder with a top BIN official. However, a former BIN deputy chief,
Muchdi Purwopranjono, was acquitted in December 2008 of all the charges
eventually brought against him. Actions in both district courts and the Supreme
Court have left many entirely dissatisfied with the failure to conduct a thorough
investigation of Munir’s murder, and its anniversary remains a rallying point for
human rights campaigners.39
Economic Society
In Indonesia there is considerable resistance to capitalism and there is also a
residual mistrust of market forces for several reasons, including a rejection of
the Dutch colonial legacy and disenchantment with the large (often foreign)
firms that benefited under Suharto. Yet economic performance was good during
Intelligence and Security-Sector Reform in Indonesia / 165
the three decades of the New Order; annual growth averaged 7.4 percent, which
posed something of a paradox for Duncan and McLeod because the usual
requirements for an effective market economy—secure private property rights,
impartial enforcement of contracts, and a neutral bureaucracy—were absent.
Rather, firms and individuals were vulnerable to extortion from preman, the
military, the police, and rent-seeking by bureaucrats. However, though this
contributed to minimal change or innovation in the informal or traditional
economy, the more modern and dynamic sector did benefit from the security
of property and enforceability of contracts. This resulted from the symbiotic
relationship between Suharto, his ministers, key bureaucrats, and the military
and the conglomerates, large foreign firms, and ‘‘first-family firms.’’ Here the
wealth generated was shared to mutual advantage under relatively secure condi-
tions enforced by the police, the military, the judiciary, and private militias. By
contrast, ‘‘outsider’’ firms were subjected to relatively predatory behavior by the
regime.40
With the collapse of this ‘‘Suharto Franchise’’ after 1998, economic per-
formance weakened because there was no rapid adoption of new business prac-
tices to match that of electoral politics.41 A law was passed in 2004 requiring
military disengagement from business, but this has been resisted by the mili-
tary.42 Corruption remains endemic, though it is quite ‘‘orderly’’; for example,
although some rackets have been pushed out of the state system since 1998,
they have gone ‘‘private’’ and now operate against the government, which is, of
course, harder for the state to control; and this danger is aggravated by any
decline in state capacity as a result of shrinking budgets.43 Or, to put it another
way, one Suharto has been replaced by many rent-seeking ‘‘mini-Suhartos.’’44
Political Society
Because Suharto resigned in 1998, there have been a series of more or less free
multiparty elections—the most recent in 2009—that are the clearest manifes-
tation of a more democratic Indonesia. However, it is not clear that the transi-
tion has gone much beyond establishing an ‘‘electoral democracy.’’ The 1945
Constitution includes the five principles of Pancasila:
$ protect the citizens of Indonesia,
$ protect the land of Indonesia,
$ attain public prosperity,
$ educate the nation, and
$ participate in global security efforts based on independence, eternal
peace, and social justice.
All state intelligence agencies are established to protect the country’s Con-
stitution, but what is more significant is that the Indonesian Constitution is
166 / Peter Gill and Lee Wilson
the desire to increase the ‘‘reach’’ of the state among highly dispersed communi-
ties, they also provide the opportunity for local interests to dominate security
governance. These will include gang leaders, or preman, who have now entered
local government or Parliament and are legally representing their ‘‘communi-
ties.’’52 It is easy to see these groups as illegitimate, but it is not, in our view
anyway, so clear-cut. There is a gray zone of legality that is being constantly
negotiated, that might be viewed as a process of de facto sovereignty, and that
needs to be acknowledged alongside more conventional notions of constructing
‘‘democratic’’ states.
Civil Society
Active and politicized civil society groups are an important element of democ-
ratization. But although the 1997–98 economic crisis, including the collapse of
the rupiah, saw genuine popular resistance to Suharto after he was ‘‘reelected’’
in March 1998, forcing his resignation two months later, civil society remains
underdeveloped with only a small number of active organizations.53 Thus,
Makaarim refers to the lost momentum of SSR because civil society never
replaced the military in controlling the direction of reform: ‘‘SSR is no longer
a process that is influenced by the direction that comes from civil society,
instead it is fully dependent on how much the ideas can be compromised with
the interests of security elite and actors.’’54 However, it must be noted that there
are a number of active civil society organizations, such as Pacivis and Lesperssi,
which, as is shown below, have intervened directly in the debate on intelligence
reform. In the last decade a more pluralist civil society has developed, though
critical media, including television channels, and media access to conflict areas
such as Papua and Aceh, are normally blocked and freedom to report on security
service abuses is limited.55
of governance, often lays itself open to the very forces of separatism regularly
used to justify continued military intervention or local elites’ control of vio-
lence that defies democratization.58
The main state intelligence actors are the Strategic Intelligence Agency
(BAIS) of the Indonesian National Armed Forces (Tentara Nasional Indonesia
[TNI]), BIK Polri within the national police, and BIN. All three maintain a
domestic intelligence capability. As we saw above, a weak BAKIN played little
role in Suharto’s downfall, and its weakness was aggravated by the lack of funds
in the wake of the economic collapse, the fact that its Cold War targets (as for
other Western agencies) had diminished, and by Habibie’s (Suharto’s immedi-
ate successor) purging of the Christians in senior posts who had been preferred
by Suharto. However, Abdurrahman Wahid (a.k.a. Gus Dur) became president
in October 1999, and in 2000 he sought to revamp intelligence by creating the
State Intelligence Institute, which answered to the minister of defense and had
the authority to oversee military intelligence. This direct assertion of civilian
control was not appreciated by the military.
BAKIN was redesignated BIN in January 2001, and its budget was expanded
at the expense of military intelligence.59 The series of Christmas Eve 2000
church bombings in Indonesia exposed BIN’s ‘‘scanty knowledge’’ of the Jem-
aah Islamiyah network that was responsible, and very shortly the insignificance
of internal intelligence (other than for the purposes of repression) was to be
reversed. First, when Megawati Sukarnoputri (Sukarno’s daughter) was made
president by the National Assembly in July 2001, she appointed a new BIN
chief—A. M. Hendropriyono—who was also given ministerial status;60 second,
after the 9/11 attacks in the United States and the Bali bombing in October
2002, BIN was not only given more responsibility for the coordination of intel-
ligence but also increased its operational focus. In part this was indicated by
the opening of offices in the provinces, regencies, and municipalities to which
government powers were devolved in the hope that BIN would provide coordi-
nation between military and police at local level.61 The first civilian head of
BIN was appointed in 2009, but he was replaced by another military head in
2011 immediately after the passage of the Intelligence Law.62
The military had maintained an administrative structure parallel to that of
the state during the New Order, and even though the new law on TNI 2004
sought to reduce the military’s role, it still included ‘‘assisting in local gover-
nance’’ as one of its responsibilities ‘‘other than war.’’63 Thus, the links between
the military, police, and intelligence run from the top to the bottom of Indone-
sian government—but only with a great deal of organizational friction. There
are specific policy areas in which these links become more crucial, such as
counterinsurgency and counterterrorism, in which they are all involved. For
example, in a well-meaning effort to civilianize counterinsurgency, responsibil-
ity was shifted in 2000 from the military to the police—specifically to its para-
military unit, Brimob—but for various reasons, including inadequate training,
Intelligence and Security-Sector Reform in Indonesia / 169
few members showed much interest in the issue.72 The lawmaking process in
Indonesia is quite distinctive; the commission would assign an ad hoc working
committee (panja) to discuss the bill with government representatives. If inter-
party differences represented on the panja can be settled, there will be no voting
when the bill goes back, neither in the full commission nor in the subsequent
plenary session.73
There have been at least three official draft laws on intelligence. The first
was dated January 2002 and was leaked, having been prepared by BIN after
9/11. It proposed extensive powers of arrest and detention along with restric-
tions on legal representation and the right to silence, but it was dropped after a
barrage of criticism from the chief justice, the police, and human rights organi-
zations. However, in the wake of further bombings, including that of the Austra-
lian Embassy in September 2004, another draft law began circulating, which
again included extensive arrest powers.74 Nongovernmental organizations
responded to this in the form of a 2005 draft law prepared by the Global Center
for Civil Society Studies (Pusat Kajian Global Civil Society [sic] or PACVIS)
based at the Universitas Indonesia. Although still drawn in broader terms than
the intelligence legislation typically found in Europe and the Americas, this
was certainly an improvement on that written by BIN. For example, it proposed
that a separate body be established for strategic foreign and defense intelligence
and that there be a body for the coordination of intelligence assessments sepa-
rate from BIN itself, and it set out procedures for the external authorization of
the use of covert information gathering and for the control and oversight of
intelligence by the executive branch and the DPR.75
These proposals did not seem to have had much impact on official thinking,
judging from the next government draft published in March 2006, which
retained an extremely broad grant of discretionary powers to the agencies with
little in the way of control or oversight.76 BIN retained overall coordinating
authority (article 8), and arrest powers and covert information gathering would
not require external authorization (article 12). Further, as well as enumerating
the main intelligence agencies, it said that ‘‘other performers of intelligence
functions’’ could be established by presidential decree (article 7[2]), which
rather missed the point as to why legislation is seen as important for democratic
control. (This provision was not included in the 2010 redraft, but it is a moot
point as to whether the president would regard himself or herself as prevented
from appointing other agencies.)
The 2010 redraft of the law was distinctive,77 in that it was initiated by a
group of new members of Parliament on Commission One who had experience
of and interest in legislating for intelligence.78 After amendment, this became
law in October 2011, and it included signs that some of the provisions most
criticized in the 2006 version had been addressed; for example, the preamble
Intelligence and Security-Sector Reform in Indonesia / 171
Oversight Tasks
Since 1999 the DPR has had much-enhanced legislative, budgetary, and super-
visory functions, including the right to investigate. Parliamentary commissions
have become very active in requesting information from the government and in
holding hearings, but so far this has had little impact on intelligence matters
(which, to be fair, is also the case in many much older democracies). The
development of serious intelligence oversight is hardly advanced by the custom
of representatives and journalists accepting money from ministers to ask the
‘‘right’’ questions.
As noted above, Commission One covers foreign, defense, and security mat-
ters, but its members have been preoccupied with the first of these. On the face
of it, Commission One has achieved much by means of its control of the budget;
for example, the actual figures earmarked by its budget committee for counter-
terrorism and intelligence were published in 2002 in the wake of the first Bali
bombing, and the total was actually less than proposed by BIN. However, it is
not clear how significant this is, given that BIN is still able to raise money from
its own businesses, for example, its newspaper. A key element of democratic
control is that agencies may only spend money allocated by parliament—this is
still lacking from the new law.82 Article 43 of the new law provides only for
supervision of BIN by unspecified internal mechanisms and a special commis-
sion within the DPR. This will have some potential influence by means of
endorsing the president’s appointments of agency heads and is empowered to
question them.83 However, civil society organizations fear that the law’s provi-
sions for severe penalties for ‘‘leaking intelligence information’’ could be used
to hinder oversight by civil society and media organizations.84 This, the lack of
provision for citizens to complain, and the uncertainty surrounding the powers
of the parliamentary commission all suggest that oversight of even this one
intelligence agency will remain very weak.85
Conclusion
The literature on postauthoritarian regimes in Europe and Latin America sug-
gests there are broadly three main ways of describing the situation in these
regimes: democracy is ‘‘consolidated,’’86 and all politically significant groups
adhere to democratic ‘‘rules of the game’’; second, early change is at a ‘‘stand-
still,’’87 where change has stopped at, for example, ‘‘feckless pluralism’’88 or
‘‘pseudodemocracy’’;89 and third, there may be ‘‘regression,’’ and Putin’s Russia
is often cited as an example.90 Although the passage of the new Intelligence
Law represents a significant milestone in Indonesia, it cannot really be charac-
terized as any of these three. Defects in the law itself and uncertainties as to
what change it will make in practice certainly do not permit the conclusion
that democracy in Indonesia has been consolidated. Conversely, it is clearly
Intelligence and Security-Sector Reform in Indonesia / 173
ensure that greater control and accountability of the intelligence sector can be
addressed. In a decentralized state with networks of multiple security actors in
each area, the idea of parliamentary oversight is somewhat fanciful. This issue
can only be addressed through the education and empowerment of civil and
political societies locally, bearing in mind that currently some of these actors
may be more of a security problem than its solution. Thus, the broader notion
of SSR provides a better analytical perspective, but both the process and the
outcomes will be very different from those envisaged in Europe.
Notes
1. Jonathan Moran, ‘‘The Role of the Security Services in Democratization: An Analysis
of South Korea’s Agency for National Security Planning,’’ Intelligence and National Security
13, no. 4 (1998): 1–32.
2. Peter Gill, ‘‘Theories of Intelligence: Where Are We, Where Should We Go, and
How Might We Proceed?’’ in Intelligence Theory: Key Questions and Debates, edited by Peter
Gill, Stephen Marrin, and Mark Phythian (London: Routledge, 2009), 208–26, at 214.
3. The intellectual origins of CMR are described by Samuel P. Huntington, The Soldier
and the State (Cambridge, MA: Harvard University Press, 1957). Its object was to maximize
national security with least sacrifice to other social values by balancing the power of civil
and military groups. SSR is a paradigm for good governance that sprang from the need for
normative order in Central and Eastern Europe following the collapse of socialism and the
reconstruction of the Balkans. Miroslav Hadžić, ‘‘The Concept of Security Sector Reform,’’
in Sourcebook of Security Sector Reform: Collection Papers, edited by Philipp Fluri and Miroslav
Hadžić (Geneva and Belgrade: Geneva Centre for the Democratic Control of Armed Forces
and Centre for Civil–Military Relations, 2004), 11–44, at 12. SSR is a constantly evolving
and hotly debated concept that has rapidly become a central plank in EU foreign policy,
part of a democratizing agenda in which progress is measured in accordance with the extent
to which public control is exercised over the various state and nonstate actors that constitute
the ‘‘security system.’’
4. Thomas C. Bruneau and Steven Boraz, ‘‘Intelligence Reform: Balancing Democracy
and Effectiveness,’’ in Reforming Intelligence: Obstacles to Democratic Control and Effectiveness,
edited by Thomas C. Bruneau and Steven Boraz (Austin: University of Texas Press, 2007),
2–6.
5. See Organization for Economic Cooperation and Development, The OECD DAC
Handbook on Security System Reform (SSR) Supporting Security and Justice (Paris: Organization
for Economic Cooperation and Development, 2007), www.oecd.org/dataoecd/43/25/
38406485.pdf; cf. Timothy Edmunds, ‘‘Security Sector Reform: Concepts and Implementa-
tion,’’ in Towards Security Sector Reform in Post–Cold War Europe: A Framework for Assessment,
edited by W. N. Germann and T. Edmunds (Geneva and Bonn: Geneva Centre for the
Democratic Control of Armed Forces and Bonn International Center for Conversion, 2003),
11–25, at 11–12; Heiner Hänggi, ‘‘Conceptualising Security Sector Reform and Reconstruc-
tion,’’ in Reform and Reconstruction of the Security Sector, edited by Alan Bryden and Hänggi
(Münster: Lit Verlag, 2004), 1–9, table 1.1.
6. Thomas C. Bruneau and Florina Cristiana Matei, ‘‘Towards a New Conceptualization
of Democratization and Civil–Military Relations,’’ Democratization 15, no. 5 (2008): 909–29,
at 914.
Intelligence and Security-Sector Reform in Indonesia / 175
to brief both the military and the civil administration on the possible threats to national
stability. A joint project between Lemhannas and the Operational Command for the Resto-
ration of Order and Security (Kopkamtib, Komando Operasi Pemulihan Keamanan dan Keterti-
ban), tarpadnas was instigated following the crackdown of the student movement against
Suharto in 1978. Jun Honna, ‘‘Military Ideology in Response to Democratic Pressure during
the Late Suharto Era: Political and Institutional Contexts,’’ Indonesia 67 (April 1999): 77–
126, at 79–82.
24. Derdzinski, Internal Security Services, 87–88.
25. Adrian Vickers, ‘‘The New Order: Keeping Up Appearances,’’ in Indonesia Today, ed.
Lloyd and Smith, 72–84. In political theory and international relations, sovereign statehood
is typically predicated on the supreme authority of the government of a populated territory
within its jurisdiction. International recognition of domestic authority by other governments
thus assumes a normative aspect in which sovereignty is presumed to be coherent and to
reside in the state. Internationally this then becomes ‘‘a necessary condition of outward
agency.’’ Jens Bartelson, A Genealogy of Sovereignty (Cambridge: Cambridge University Press,
1995), 26.
26. Adrianus Harsawaskita and Evan A. Laksmana, Rethinking Terrorism in Indonesia: Les-
sons from the 2002 Bali Bombing, UNISCI Discussion Paper 15 (Madrid: Research Unit on
International Security and Cooperation, 2007), 74–75, www.ucm.es/info/unisci/revistas/
UNISCI15_Harsawaskita-Laksmana.pdf.
27. Conboy, Intel, 65–87.
28. Ibid., 150–56.
29. Georg Sørensen, Democracy and Democratization: Processes and Prospects in a Changing
World (Boulder, CO: Westview Press, 2008), 33.
30. Peter Wilson, ‘‘The Contribution of Intelligence Services to Security Sector Reform,’’
Conflict, Security and Development 5, no. 1 (April 2005).
31. Conboy, Intel, 199.
32. Renske Dorenspleet and Petr Kopecký, ‘‘Against the Odds: Deviant Cases of De-
mocratisation,’’ Democratization 15, no. 4 (2008): 697–713.
33. International Crisis Group, Indonesia: Rethinking Internal Security Strategy, Asia Report
90 (Jakarta and Brussels: International Crisis Group, 2004), 20–22.
34. Juan Linz and Alfred Stepan, Problems of Democratic Transition and Consolidation:
Southern Europe, South America and Post-Communist Europe (Baltimore: John Hopkins Uni-
versity Press, 1996), 7–15.
35. See Douglas E. Ramage, Politics in Indonesia: Democracy, Islam, and the Ideology of
Tolerance (London: Routledge, 1995); and Elizabeth Fuller Collins, ‘‘Indonesia: A Violent
Culture?’’ Asian Survey 42, no. 4 (2002): 582–604. For a robust defense of the notion of
universal human rights against claims of ‘‘Asian values,’’ see Jack Donnelly, Universal Human
Rights in Theory and Practice, 2nd ed. (Ithaca, NY: Cornell University Press, 2003), 107–23.
36. Derdzinski, Internal Security Services, 101–4.
37. Ibid., 112–14; Elizabeth F. Drexler, Aceh, Indonesia: Securing the Insecure State (Phila-
delphia: University of Pennsylvania Press, 2008).
38. International Crisis Group, ‘‘Indonesia: The Deepening Impasse in Papua,’’ press
release, August 3, 2010, www.crisisgroup.org/en/publication-type/media-releases/2010/asia/
indonesia-the-deepening-impasse-in-papua.aspx.
39. Jakarta Post, September 7, 2010.
40. Ron Duncan and Ross McLeod, ‘‘The State and the Market in Democratic Indone-
sia,’’ in Indonesia: Democracy and the Promise of Good Governance, edited by Ron Duncan and
Ross McLeod (Singapore, ISEAS Publishing, 2007), 73–92, at 75–78.
Intelligence and Security-Sector Reform in Indonesia / 177
41. Ibid.; see also Natasha Hamilton-Hart, ‘‘Government and Private Business: Rents,
Representation and Collective Action,’’ in Indonesia, ed. Duncan and McLeod, 93–114.
42. Damien Kinsbury, ‘‘Indonesia,’’ in PSI Handbook of Global Security and Intelligence:
National Approaches, vol. 1, edited by Stuart Farson, Peter Gill, Mark Phythian, and Shlomo
Shpiro (Westport, CT: Praeger Security International, 2008), 247–62, at 258.
43. Lindsey, ‘‘Criminal State,’’ 285.
44. B. Ghoshal, ‘‘Democratic Transition and Political Development in Post-Soeharto
Indonesia,’’ Contemporary Southeast Asia 26, no. 3 (2004): 506–29, cited by Derdzinski, Inter-
nal Security Services, 93.
45. Cf. Derdzinski, Internal Security Services, 98–101.
46. International Crisis Group, ‘‘Christianisation’’ and Intolerance, Asia Briefing 114
(Jakarta and Brussels: International Crisis Group, 2010).
47. International Crisis Group, Indonesia: Debate over a New Intelligence Bill, Asia Briefing
124 (Jakarta and Brussels: International Crisis Group, 2011), 4–5.
48. I Ketut Putra Erewan, ‘‘Tracing the Progress of Local Governments since Decentralisa-
tion,’’ in Indonesia, eds. Duncan and McLeod, 55–69.
49. Derdzinski, Internal Security Services, 99.
50. Richard Robison, Ian Wilson, and Adrianus Meliala, ‘‘Governing the Ungovernable’’:
Dealing with the Rise of Informal Security in Indonesia, Policy Brief 1 (Perth: Asia Research
Centre, Murdoch University, 2008).
51. Stein Kristiansen and Lambang Trijono, ‘‘Authority and Law Enforcement: Local
Government Reforms and Security Systems in Indonesia,’’ Contemporary Southeast Asia 27,
no. 2 (2005): 236–54.
52. Loren Ryter, ‘‘Their Moment in the Sun: The New Indonesian Parliamentarians,’’ in
State of Authority: The State in Society in Indonesia, edited by Gerry van Klinken and Joshua
Barker (Ithaca, NY: Cornell University Press, 2009); International Crisis Group, Indonesia:
Debate over New Intelligence Bill, 3.
53. Jean Grugel, Democratization: A Critical Introduction (London: Palgrave, 2002).
54. Mufti A. Makaarim, ‘‘Civil Society and Security Sector Reform,’’ in Journey of Reform:
Security Sector Reform in Indonesia, edited by Beni Sukadis and Eric Hendra (Jakarta:
Lesperssi, 2008), 135–43, at 137.
55. Derdzinski, Internal Security Services, 107–8.
56. Grugel, Democratization, 45.
57. Derdzinski, Internal Security Services, 88–92.
58. E.g., see Vedi Hadiz, Localizing Power in Post-Authoritarian Indonesia: A Southeast Asian
Perspective (Stanford, CA, and Singapore: Stanford University Press and Institute of South-
east Asian Studies, 2011).
59. Conboy, Intel, 203–5.
60. Ibid., 213–14.
61. Derdzinski, Internal Security Services, 96–97.
62. Jakarta Post, October 23, 2011.
63. International Crisis Group, Indonesia: Rethinking Internal Security Strategy, 11.
64. Ibid., 5.
65. Ken Conboy, Kopassus: Inside Indonesia’s Special Forces (Jakarta: Equinox, 2003);
International Crisis Group, Indonesia: Rethinking Internal Security Strategy, 5–6; Kingsbury,
‘‘Indonesia,’’ 251–52.
66. Fatima Astuti, ‘‘In Focus: Indonesia’s National Counter Terrorism Agency (BNPT),’’
Counter Terrorist Trends and Analysis 2, no. 20 (2010): 1–3; International Centre for Political
178 / Peter Gill and Lee Wilson
89. Larry Diamond, Developing Democracy: Towards Consolidation (Baltimore: John Hop-
kins University Press, 1999), 15.
90. Andrei Soldatov, ‘‘Russia,’’ in PSI Handbook, vol. 2, eds. Farson et al., 479–97.
91. Edmunds, ‘‘Security Sector Reform,’’ 16–19.
92. Lee Wilson, ‘‘Beyond the Exemplary Centre: Knowledge, Power and Sovereign Bodies
in Java,’’ Journal of the Royal Anthropological Institute 17 (2011): 301–17.
93. Carl A. Trocki, ‘‘Democracy and the State in Southeast Asia,’’ in Gangsters, Democ-
racy and the State in Southeast Asia, edited by Carl A. Trocki (Ithaca, NY: Cornell University
Press, 1998), 7–16. Although, as Ryter points out, attempts to evaluate governance in Indo-
nesia on the basis of the degree to which democratic principles are implemented runs the
risk of assuming a ‘‘categorical abstract’’—democracy—as the baseline against which a state
is assumed to be succeeding or failing and disregarding quite different configurations of
authority and power. Ryter, ‘‘Their Moment in the Sun,’’ 215.
94. Also of the power of social networking media in civil society discourse. Detective
Chief Commander General Susno Duaji rather naively coined the phrase ‘‘cicak lawan
buaya,’’ or ‘‘lizard versus crocodile,’’ in reference to the corruption eradication committee’s
investigation (KPK, Komisi Peberantasan Korupsi) into impropriety amongst senior police
officers. The phrase became emblematic of the attempts by the KPK, a small and under-
resourced commission, to attempt to tackle the huge issue of endemic corruption in the
police force. After the police arrested KPK officials Bibit Samad Rianto and Chandra M.
Hamzah on alleged corruption charges, more than 1 million members joined a Facebook
campaign calling for their release.
This page intentionally left blank
CHAPTER 10
A Reconstruction of
Japanese Intelligence
Issues and Prospects
Ken Kotani
O
n April 4, 2009, the Japanese government mistakenly announced that
North Korea had launched a Taepodong-2 ballistic missile. The false
news was distributed around the world. This incident does not mean
that Japan always has a tendency to cry wolf, but it is true that Japanese intelli-
gence has been much more vulnerable to these types of incidents compared
with other countries. After World War II, Japan failed to build an overseas
intelligence apparatus or develop an institutionalized intelligence community,
something regarded as an imperative for modern states in developing and build-
ing a proper security and foreign policy. Instead of developing these tools, succes-
sive Japanese governments have been able to rely on US intelligence gathering,
a situation that is fostered and maintained in the United States–Japan Alliance.
Another factor that made the development of an intelligence community in
Japan problematic was the country’s pacifist Constitution, specifically its prohibi-
tion of overseas military operations. These factors resulted in a vulnerable and
late-developing intelligence function within the Japanese government.
A number of times during the Cold War, the Japanese government did actu-
ally try to establish intelligence service and antiespionage laws, but the plans
usually faced strong opposition from liberal public opinion and bureaucratic
/ 181 /
182 / Ken Kotani
Intelligence Department, which has now become the Intelligence and Analysis
Service. In the absence of a foreign intelligence-collecting agency, MOFA’s
service is regarded as a kind of overseas intelligence. However, because all
MOFA personnel are trained and employed as diplomats, they cannot function
as true intelligence operatives. It is prohibited, for example, for MOFA person-
nel to engage in intelligence and covert activities in foreign countries. It is said
that about eighty staff members are allocated to MOFA’s intelligence section.
Logically, this section can collect diplomatic information through hundreds of
embassies and consulates all over the world, but actually overseas embassies can
bypass the Intelligence Department and send information directly to MOFA’s
policymaking departments. MOFA has a counterpart to the US State Depart-
ment’s Bureau of Intelligence and Research called the Intelligence and Analysis
Service. This organization has long been regarded as a backwater in the minis-
try, although attempts are under way to overhaul MOFA intelligence analysis.10
in 1976 when Soviet air force lieutenant Victor Ivanovich Belenko flew his
MiG-25 jet fighter to Hakodate airport in order to defect, the Japanese police
force tried to keep military officers out of the airport. It was a typical dispute
over bureaucratic turf, and a humiliating incident for the military specialists
who were not allowed to examine the MiG during the initial phase of the
incident.11
The NPA also shows interest in international cooperation, including
increased exchanges with foreign agencies to fight common threats. After
Japan’s signing of the Mutual Assistance Treaty with the United States, South
Korean, Chinese, EU members, and Russian governments, the NPA was able to
share information directly with police forces of those countries over the head
of MOFA. Despite this growth of influence, the NPA remains essentially a law
enforcement organization collecting information for their own investigations,
not for shaping foreign and security policy. In other words, the NPA is the most
efficient collector of information in Japan, but that information is kept in dead
storage.
the Prime Minister’s Office’s control over information flows in the Japanese
government, (4) developing a more coherent intelligence infrastructure, and
(5) overhauling the entire Japanese security system. It would be fair to say that
this report sought to establish a collegial machinery modeled on the United
Kingdom’s Joint Intelligence Organization. This built on an earlier Cabinet
Office paper, Improvement of Counter-Intelligence Functions, in August 2007, on
the basis of which CIRO had set up a Counter-Intelligence Center by the
subsequent April.17 The conclusions of these two papers were brought together
by CIRO in February 2009 for the Fourth Council on Security and Defense,
held in the Prime Minister’s Office.18
Ultimately, the various reports and investigations converged on relatively
similar diagnoses of the difficulties and shortfalls of the current Japanese intelli-
gence system. These dysfunctions include a lack of overseas HUMINT-
collection capabilities, the absence of an effective centralized intelligence
machinery and poor intelligence sharing among ministries, problems in tasking
and direction, and an inadequate protective security system. Another issue,
which stretches back more or less to World War II, is the low status of the
intelligence function and its consequent vulnerability to politicization.
that the US Navy had been driven out of the area. In actual fact, no US ships
had been sunk in the battle and the Japanese Army, relying on the false figures
of the navy, changed its strategy accordingly. Its officers believed that Japan
had succeeded in taking air superiority in the area. The army had planned to
wage a decisive battle against the US troops on Luzon Island, but the false
reports of the destruction of the US task force caused the army to attempt a
new campaign to take Leyte Island, which was located hundreds of miles south
of Luzon. The army then tried to redeploy its main force by sea from Luzon to
Leyte, with the net result that most of its troops were annihilated by US air
attacks during transit.24
After the war, the Japanese government reflected that the lack of central
intelligence machinery had caused disastrous situations in war planning and set
up CIRO, taking the CIA as its model. Despite this promising start, the Japa-
nese government did not understand the CIA effectively and CIRO’s intelli-
gence duty was very restricted without the authority to force other bureaucratic
apparatuses to share information. In other words MOFA, MOD, and NPA were
not and still are not obliged to pass information to CIRO. These ministries
continued to send their staff to the Prime Minister’s Office as aides and personal
secretaries to the prime minister and were able to bypass CIRO and deliver
information personally and directly to the prime minister himself.25 The
information-gathering and analyses processes are subsequently not to be consid-
ered equal across the board. As a result, the situation became Balkanized, and
the secretaries of the prime minister and the chief cabinet secretary became
buried under piles of intelligence and information documents, which are not in
an order of priority, have not been sufficiently evaluated, and sometimes contra-
dict each other.
CIRO is also under the influence of the NPA, with many chief positions
being held by ex-members of the police force, so there is a strong image of a
police-style detective culture, rather than an intelligence-gathering and assess-
ment culture.26 MOD and MOFA are afraid that giving information to CIRO
means giving information to the NPA, which is well-known in Kasumigaseki
for its secrecy. Legend has it that it has never shared any information with
MOD and MOFA.27 Unless the underlying situation changes, however much
CIRO is strengthened, it is hard to see the information-gathering problem
being resolved. In the half century that has passed since CIRO was established
after World War II, it has been Japan’s central intelligence organization, yet its
function has not been adapted to meet the demands of the present day, and it
is now in a state where it is necessary to make serious changes.
In the 1980s the Japanese government had begun to realize that centraliza-
tion was not working well. Initially, senior officials simply thought that an
American-style system did not fit Japan, so there was an attempt to introduce
A Reconstruction of Japanese Intelligence / 191
the British system in 1986 without dissolving CIRO. The result was the cre-
ation of the Cabinet Intelligence Committee, which is made up of deputy secre-
taries and chief secretaries and which has only two meetings a year, with each
meeting lasting only about an hour, which clearly does not provide any
dynamic or responsive capability.28 In contrast, there are the twice-monthly
meetings of the British Joint Intelligence Committee at the level of bureau
chiefs, who are much more involved in actual operations. The British commit-
tee system is fundamentally based on the idea of collegiality, but the strongly
turf-minded Japanese bureaucrats did not welcome the committee system. As a
result, the reality of the committee is like a table talk rather than a discussion
of national intelligence. This is because the committee does not possess a per-
manent secretariat staff; nor does it have an assessment staff that can write
papers for the committee. In April 2008 CIRO appointed five cabinet intelli-
gence analysis staffs to draft a National Intelligence Estimate in order to assist
in better managing national intelligence.
Before World War II there was no center of power in the Japanese political
arena. Even the prime minister was no more than a first among equals, and he
faced difficulties in building a consensus on Japanese foreign policy. For exam-
ple, before World War II the prime minister, Fumimaro Konoe, who was not
enthusiastic about the war against the United States, failed to persuade the
military leaders and finally abdicated his role as prime minister. After the war
the position of the prime minister was strengthened, but consensus building
remained important. Article 65 of the Japanese Constitution states, ‘‘adminis-
trative power is vested in the Cabinet.’’ In other words, the Japanese prime
minister cannot decide anything without obtaining the consent of other cabi-
net members and the cabinet is usually managed on the basis of unanimity. The
Japanese prime minister sometimes spends much of his energy persuading the
minister of education or the minister of health on overseas and security matters.
In this decision-making process, the prime minister does not need secret intelli-
gence for deciding overseas policy. Richard Betts wrote that ‘‘the importance
of successful intelligence ultimately varies with the policies it has to support,’’
but Japanese intelligence has been generally forsaken by political leaders.31
In 1986 the prime minister was granted the authority to convene the Secur-
ity Council of Japan in case of an emergency. The council is made up of nine
ministers who engage in overseas and security matters, but the role of the coun-
cil is to consider the situation, not to be a decision-making body. The council
fell into abeyance during the Cold War period, because Far Eastern interna-
tional circumstances were relatively stable under US dominance in the region,
and Japanese politicians’ need for secret information remained very low. Not
until 2006, under Prime Minister Shinzo Abe, was there any attempt to regular-
ize such interdepartmental coordination. Abe had plans to set up a new
National Security Council (NSC) in the Cabinet Office that would supersede
the largely moribund Security Council. The new NSC was to be composed of
inner cabinet members and would allow for swift foreign and security policy
decision making.32 The NSC was also expected to give direction to the intelli-
gence community by issuing national requirements and incorporating the intel-
ligence produced in response directly into its policy deliberations. Thus the
NSC was intended to effectively implement an intelligence cycle between the
Prime Minister’s Office and intelligence community. Unfortunately, the sudden
resignation of Abe in September 2007 preempted these plans.
which intelligence officers of Japanese military forces are sometimes asked ‘‘Is
there anything wrong with your health?’’—implying that able-bodied men do
not do such work. During World War II there may have been intelligence
departments that existed to assess foreign intelligence in principle, but, in fact,
operational elements conducted their own intelligence appreciations with little
or no reference to the specialist intelligence cells. The best and brightest of the
army and navy were usually deployed to the operations branches, and the sec-
ond best were deployed to intelligence duties. Moreover, though both depart-
ments often had the same information sources, the operations staff members
believed that their assessment was superior to that of the intelligence staff.40
This trend was caused by the ambiguousness of the Japanese word commonly
used to denote ‘‘intelligence.’’
This problem has been exacerbated by the fact that the Japanese term for
‘‘intelligence’’ suffers from much the same ambiguity as the English term. In
Japanese the term joho can mean, variously, information in general, a finished
intelligence assessment, and intelligence from secret sources. The resulting
ambiguity has led to both confusion and conflict in Japanese intelligence prac-
tice. For military operations staffs, joho is taken to refer generically to ‘‘informa-
tion,’’ leading them to take the view that the job of an intelligence department
was to gather raw, mainly open information or data, such as newspaper clip-
pings. Operations elements had an exaggerated perception of their own role in
the Imperial Japanese Army and believed that they should perform the analytic
function. Conversely, intelligence staff took joho to mean analytic work and the
production of finished intelligence. They therefore believed that it was their
duty to analyze information and produce the finished appreciations that would
be incorporated into operational decision making and war planning. The gap
between the operations staff and the intelligence staff was so serious that the
chief of the army’s Intelligence Department was completely alienated from the
army’s war planning throughout much of the Pacific War. During the battle of
Guadalcanal, Major General Seizo Arisue, chief of army intelligence, realized
that his intelligence assessments had been neglected by the operations staff and
he resented integrating the Operations and Intelligence departments.41 This
failure to both integrate and exploit intelligence in the command process con-
tributed in significant part to the decisiveness of the Allied defeat of Japanese
forces during this campaign.
The situation has changed very little since the end of the war. Current
operations and policy personnel retain much the same primacy over intelligence
personnel in the Japanese bureaucracy, and intelligence assessments are hardly
used by policymakers. This unequal relationship can lead to both the marginali-
zation and politicization of intelligence in the making of Japanese foreign pol-
icy. For example, in September 1994 MOFA ignored the overseas information
that public security in Rwanda was getting worse, which resulted in significant
196 / Ken Kotani
Notes
1. Ken Kotani, Japanese Intelligence in World War II (Oxford: Osprey, 2009), 12–71.
2. Kazuo Kamaga, ‘‘Daitoa Senso ni Okeru Ango-sen to Gendai Ango’’ (Covert War
in the Pacific War and Modern Code), Dodai Kurabu Keizai Konwakai (Tokyo) 2 (1989):
186–90.
3. Hajime Kitaoka, ‘‘Sengo Nihon no Interijensu’’ (Japanese Intelligence after World
War II), in Interijensu no 20 Seiki (Intelligence in the 20th Century), edited by Terumasa
Nakanishi and Ken Kotani (Tokyo: Chikura Shobo, 2007), 166–78.
4. Mikio Haruna, Himitsu no Fairu; CIA no Tainichi Kousaku (Jou) (Secret Files; CIA’s
Covert Activities in Japan, vol. 1) (Tokyo: Kyodotsusin, 2000), 521–30.
5. Order for the organization of the Cabinet Office, no. 219, July 31, 1952, www.cas
.go.jp/jp/hourei/seirei/naikaku_s.html.
6. Oros’s article is a comprehensive study of the present Japanese intelligence commu-
nity; Andrew Oros, ‘‘Japan’s Growing Intelligence Capability,’’ International Journal of Intelli-
gence and Counterintelligence, 15, no. 1 (2002).
7. Ibid., 6.
8. Sankei, March 29, 2004.
9. Asahi, September 23, 2011.
10. Taigai Joho Kinou Kyouka ni Kansuru Kondankai (Committee of Enhancement of
Overseas Intelligence), www.mofa.go.jp/mofaj/press/release/17/rls_0913a.html.
11. Yahiro Okoda, Migu 25 Jiken no Shinsou (The Truth of the MiG-25 Incident) (Tokyo:
Gakushu Kenkyusha, 2001).
12. Council on Security and Defense Capabilities, Japan’s Visions for Future Security and
Defense Capabilities, www.kantei.go.jp/jp/singi/ampobouei/dai13/13siryou.pdf.
13. ‘‘Taigai joho no kinou kyouka ni mukete,’’ www.mofa.go.jp/mofaj/press/release/17/
pdfs/rls_0913a.pdf.
14. PHP Research Institute, ed., Nihon no Interijensu Taisei: Henkaku heno Rood Mappu
(Japanese Intelligence: A Road Map to Transformation) (Tokyo: PHP Research Institute, 2006),
http://research.php.co.jp/research/risk_management/policy/data/seisaku01_teigen33_00.pdf.
15. Liberal Democratic Party, Kokka no joho kinou kyouka ni kansurr teigen (Report of
Enhancement of National Intelligence), www.jimin.jp/jimin/seisaku/2006/pdf/seisaku-
016.pdf.
16. Cabinet Office, Kantei ni okeru joho kihou no kyouka no houshin (The Improvement of
Intelligence Functions of the Prime Minister’s Office), www.kantei.go.jp/jp/singi/zyouhou/
080214kettei.pdf.
17. Cabinet Office, Kaunta interijyensu kinou no kyouka ni okeru kihon houshin (Improve-
ment of Counterintelligence Functions), www.cas.go.jp/jp/seisaku/counterintelligence/pdf/
basic_decision_summary.pdf.
198 / Ken Kotani
W
ith the possible exception of South Africa, Ghana is one of the few
states in Sub-Saharan Africa with a historical intelligence culture.
This is unique in postindependence Africa, where the use and abuse
of intelligence became more focused on regime protection and its sustainability.
In Ghana, however, because of the particular nature of the leadership of the
country’s independence struggle, when it won its independence in 1957, a key
focus of its leaders became establishing institutions, structures, and procedures
for the use of intelligence to serve national interests—though certainly, in some
instances, for the misapplication of intelligence to serve the regime. Admit-
tedly, some of these structures had existed and been used by the colonial power
against the independence struggle. Nonetheless, this tradition and institution-
alization of the processes and mechanisms for the application of intelligence to
serve multiple interests has continued throughout all phases of Ghana’s politi-
cal development. Over the past fifty years these unique processes have been
developing, yet very little scholarly work has been undertaken to appreciate
the complexities, challenges, and milieu within which Ghana’s intelligence
community has functioned and, over time, developed a particular culture.1
/ 199 /
200 / Emmanuel Kwesi Aning, Emma Birikorang, and Ernest Ansah Lartey
support from, and the loyalty of, the public, this also means forging closer syner-
gies among the various actors in the sector, and adopting dynamic approaches
that respond to human rights concerns while safeguarding the national interest.
One of the important challenges to attaining these goals is the question of
the intelligence sector in Ghana and the extent to which it can be brought
under effective, accountable, and transparent democratic oversight and freed
from its historical baggage of intimidation and violence. Since 2009 the sector
has come under severe public criticisms.2 These criticisms have mostly centered
on human rights abuses, which suggest in many ways that the intelligence ser-
vices still retain some of their pre-1992 makeup that allowed them to intimidate
and harass citizens and political opponents under the authoritarian regimes of
the past.3 The question is: Has the intelligence culture in Ghana always proved
adversarial to the democratic development of the country? What impact have
the democratic processes made on the intelligence services in Ghana? This
chapter investigates the answers to these questions by tracing the history of the
intelligence services in Ghana to the preindependence era, followed by an anal-
ysis of the evolving service since postindependence, through the various politi-
cal dispensations that the country has experienced, and how these experiences
and challenges have contributed to shaping the intelligence culture in Ghana.
the two parties that security and intelligence delivery in the immediate post-
independence period also became tainted by it, and most liberal interpretations
of intelligence and security during Nkrumah’s stewardship between 1951 and
1966 have been examined through this lens.4 For example, according to Kofi
Quantson, even at independence, there were signs of the possible national
security problems that the country could face: ‘‘These indications emanated
from the fact that independence was not achieved with a general political una-
nimity. Very far from that. Independence was achieved in a poisonous atmo-
sphere riddled with an acrimonious political divisiveness and unconcealed
hatred between Nkrumah’s CPP government and the combined opposition
forces, the United Party. . . . Independence was attained on a virtually winner/
loser basis with Nkrumah’s CPP feeling openly buoyant and triumphant and
opposition forces feeling naturally peeved, even frustrated and cheated.’’5
This situation set the tone for a particular type of divisive politics and
national security challenges that confronted the country. In the face of this
animus Nkrumah did not make any attempts at national unity, but further
alienated himself from the opposition by employing the national security appa-
ratus as a personal defense force for his regime against opposition elements.
Also, in the period immediately preceding and following independence, there
were at least four assassination attempts against Nkrumah; fingers were naturally
pointed at his political detractors.6 As a result of these persistent threats, the
Security Services Bill was eventually passed in 1963. This resulted in counter-
measures aimed at the opposition, and the strong security measures to deal with
the menace would be loud enough to push for measures that could veer toward
repression and suppression.7
It is widely acknowledged that even though intelligence activities were evi-
dent in Ghana before independence in 1957, it took the seminal events of the
February 1948 riots—when veterans of World War II marched to Osu Castle,
the official seat of the colonial administration—to demand from the British
fulfillment of promises that had been made before their participation in the
war. The spate of violence and stealth with which this march had been orga-
nized compelled the British colonial administration to establish a formal intelli-
gence institution with surveillance, analysis, and data storage capability known
as the Special Branch, which was an offshoot of the colonial police administra-
tion and the Reserve Unit. It became obvious that the colonial administration
did not anticipate the intensity and spread of the 1948 riots given its existing
security apparatus. A major security failure was perceived by the regular police
service, leading to the establishment of the Special Branch, which was to focus
on the collection of vital political and security information concerned with
individuals thought to be indulging in subversive activities. The Reserve Unit
was used to quell street protests and other demonstrations.
Developing a Democratic Intelligence Culture in Ghana / 203
The intelligence structure and culture under Nkrumah were similar to what
had existed during the colonial period. However, the exigencies of Nkrumah’s
Pan-Africanist outlook, as well as the Cold War confrontation between the
Communist and Western political blocs, in 1958 necessitated the formation of
an external intelligence capability, which was known as the Foreign Service
Research Bureau and was attached to the Foreign Ministry.8 As noted by Johnny
Kwadjo, the primary reason for the bureau’s formation was to acquire ‘‘reliable
intelligence and counterintelligence capability’’ that would allow the regime
to maintain its political independence while the East/West bipolar ideological
hostilities raged on, as they might, and their protagonists came to have antago-
nistic or self-interested relations with the Nkrumah regime. As a result, the
presidency ‘‘carved out an elite corps from the Foreign Ministry’s Research
Bureau to form the African Affairs Secretariat, which came under the adminis-
trative and operational control of the Presidency.’’9
In the early years of postindependence Ghana, the Special Branch also
became a tool for general security appreciation in the country, and also increas-
ingly for identifying and arresting persons who were perceived to be threats to
the personal security of President Nkrumah. The Special Branch, together with
several newly established institutions such as the Presidential Detail Depart-
ment and the President’s Own Guard Regiment, became the agencies responsi-
ble for the protection of the president. By 1958 there was a clear sense that
a ‘‘new’’ and decidedly political form of intelligence was beginning to take
shape—namely, the separation of intelligence into two facets: domestic intelli-
gence dealing with internal matters, and external intelligence dealing with
Nkrumah’s obsession with the anticolonial struggle in Africa. As a result, a
culture of limited oversight developed, whereby allocated funds were sometimes
classified as available for broad ‘‘intelligence purposes’’ and placed under the
personal control of trusted senior officials of the Ministry of Foreign Affairs.10
According to Kwadjo, the usage of intelligence for regime protection pur-
poses started in the immediate postindependence period and became the focus
of domestic intelligence across the colonial and postindependence eras. There
was no difference between the outlook of the new intelligence services of this
emerging, new postcolonial state and what had preceded it. Rather, it used the
colonial police culture of heavy-handedness and harassment to intimidate the
citizenry.11 This period was marked, effectively, by the inappropriate use of the
national security apparatus and the judiciary against opposition elements.
According to Quantson, the direct intervention of the executive in the trial of
cases against the opposition created security challenges, because this was
regarded as the ‘‘crucifixion of due process for political expediency.’’12 This was
the beginning of a dangerous intelligence and national security culture in
Ghana, in which the judiciary, intelligence services, and national security
204 / Emmanuel Kwesi Aning, Emma Birikorang, and Ernest Ansah Lartey
apparatus like the police and the military became extended arms of the execu-
tive, with minimal control and oversight. As a result, these agencies catered for
regime security and not to the broader national security interest, such that with
every new government that came to power, the first appointment focused on
changes of the inspector general of police, the chief of Defense Staff, the
national security coordinator, the chief of the Naval Staff, the head of military
intelligence, the head of external intelligence (the Research Department of the
Ministry of Foreign Affairs), and the head of the Bureau of National Investiga-
tion (BNI). This has become the accepted security culture in Ghana—that all
top appointees in the security and intelligence services will be changed when-
ever there is a new political administration.
From 1958 onward, Ghana operated an elaborate intelligence system with
an emerging culture with both internal and external capabilities, though with
clear oversight differences. Proper coordination and coherence of culture
among these capabilities remained doubtful because their collective efforts
failed to uncover the coup d’état that eventually toppled the regime in 1966.
Several questions arise with respect to the initial hesitant attempts at establish-
ing institutions with their distinctive culture. In particular, what has been the
impact of military coups and regimes on the intelligence and security sector in
Ghana? To fully answer this question, we provide a chronology of key political
developments in Ghana in table 11.1, which indicates a high level of political
instability and the institutional hollowing-out that followed each change of
government and its attendant divisiveness. In all these developments, the role
of the security services, especially the military and the intelligence services, has
critically contributed to either the attainment or retention of power by leaders
or their abuse against Ghanaian citizens who have been perceived as enemies
of the regime in power.
A closer look at the political past of Ghana indicates that there have been
several instances where, for the sake of a perverted sense of national security,
individual security and community security have been sacrificed. This has
resulted in atrocities being committed against people merely upon suspicion of
engaging in activities that were unilaterally deemed to threaten national secu-
rity. National security has deliberately been confused with regime security. This
phenomenon has enabled the ruling regime to subject opponents—real and
imagined—to brutal treatment for committing acts of subversion. The BNI and
the Military Intelligence Unit (MIU), the two foremost domestic intelligence
agencies, have thus become synonymous with political brutality.
A major concern for the intelligence sector is that in the wake of military
coups d’état, newly established regimes quickly take over to redirect the work
of the intelligence services to their own safety and often subsume intelligence
command and responsibility structures under the military leadership, creating a
highly politicized and militarized intelligence sector that works solely toward
Table 11.1 Ghana’s Political History and Regime Types
Date or Period Regime Type Name of Regime Leader Comment
1951–57 Self-government Democratic, key functions of Kwame Nkrumah (leader of Gained full independence for
foreign, defense, finance, and government business) Ghana in 1957 and became
intelligence under British prime minister and eventually
colonial administration president
March 6, 1957 Democratic Convention People’s Party Kwame Nkrumah Overthrown by military with
Central Intelligence Agency
support in 1966
August 29, 1969 Democratic Progress Party Kofi Abrefa Busia Overthrown by military in
January 1972
January 13, 1972 Military dictatorship National Redemption Council Ignatius Kutu Acheampong Internal power play leading to
change of name to Supreme
Military Council I and II
June 4, 1979 Revolutionary military junta Armed Forces Revolutionary Jerry John Rawlings Held power for four months
Council and organized elections
September 24, 1979 Democratic People’s National Party Hilla Limann Overthrown by Jerry Rawlings
in December 1981
December 31, 1981 Military/civilian dictatorship Provisional National Defence Jerry Rawlings Ruled until 1992 when
Council (PNDC) transformed PNDC into
political party, National
Democratic Congress and
fourth Republication
Constitution promulgated
January 1992 Democratic National Democratic Congress Jerry Rawlings Served two terms until
defeated in elections in 2000
January 2001 Democratic New Patriotic Party John Agyekum Kufuor Served two terms and party
defeated in 2008 elections
January 2009 Democratic National Democratic Congress John Evans Atta-Mills Current president of Ghana
Source: Authors’ data.
206 / Emmanuel Kwesi Aning, Emma Birikorang, and Ernest Ansah Lartey
the protection of the regime.13 After the 1966 coup, for instance, it was realized
that most of the key elements within the Criminal Investigations Department
of the Police Service and the Special Branch had been instrumental in staging
the coup.14 This became apparent when they took up key appointments in the
new military government of the National Liberation Council (NLC). To ensure
the protection of the NLC regime, the government established the MIU while
disbanding the African Affairs Secretariat that had been functioning in the
previous regime. This probably marked the beginning of the militarization of
the internal intelligence architecture in Ghana.
The role of the MIU was to ensure that successive governments came into
being through means other than the military. The paradox is that whereas the
MIU was created to ensure regime security, it nevertheless became the focus for
regime instability under subsequent military rulers. Kwadjo aptly asked: ‘‘Which
was worse: repeated acts of conspiracy to overthrow the state perpetrated by
elements in the security agencies or the persistent failure of the security estab-
lishment to thwart these coups?’’15 Between 1966, when the first coup took
place, and 1979, when the Armed Forces Revolutionary Council took over
power following a military uprising, the MIU had facilitated two military coups
d’état that brought into power the National Redemption Council (NRC) in
1972 and the Supreme Military Council (SMC) in 1978.16 Even though the
Armed Forces Revolutionary Council ensured a smooth democratic transition
of power, it later emerged again on the political scene as the Provisional
National Defence Council (PNDC) following the 1981 coup that overthrew
the civilian government it had initially installed.
In effect, not only did the emergence of the MIU trigger a spiral of military
incursions into national politics in the country, it also ultimately led to a loss
of trust and credibility in the entire intelligence services. The MIU was later
disbanded after the 1981 coup d’état as a regime-protection strategy. It should
be said that during all this, the focus of the internal intelligence continued to
remain regime protection, with the increased politicization and militarization
of the sector. The need to overhaul the entire security system became impera-
tive not only as a political expediency but also to craft a new intelligence
architecture that would remain independent of the military and police.
became the justification for the commission of acts of violence against citizens.
Thus, a culture emerged in which, under the rubrics of ‘‘national security’’ and
‘‘national interest,’’ anyone suspected of breaching the amorphous concept of
national security automatically forfeited their human rights, and anything done
to them became acceptable.17 The frequency and ease with which these laws
were passed demonstrate the lack of national consensus in their formulation,
and were merely a tool employed by the executive to perpetrate violence against
citizens. For example, the Preventive Detention Act, which had a five-year limit
for detention without charge, was passed early in 1958 by the CPP to be used
to curb the activities of those whose acts were perceived as dangerous to the
security of the new state. Thus, persons could be arrested, detained, and ques-
tioned, but they would remain in detention even without trial if considered a
national security threat by the regime.18
The Law on Protective Custody was passed by the government of the NLC,
which overthrew Kwame Nkrumah in 1966. This law contained its own version
of detention without trials. The passage of the Elections and Public Officers
Disqualification Decrees in 1968 (NLCD 223) debarred persons associated with
the CPP from holding any appointment in the public service for a period of ten
years, starting January 10, 1968. This provision, as instituted by the NLC, not
only deprived the persons concerned of their right to work in any field they
chose, but also made them subject to public ridicule and impoverished them
and their dependents.
The Subversion Decree of 1972 (NRCD 90), under which civilians were
tried by military law and tribunals, continued under the government of the
NRC. The Armed Forces (Special Powers) Decree of 1973 (NRCD 236) pro-
vided for the detention for an indeterminate period in military barracks,
ordered by regional commissioners, for offenses involving financial loss to the
state. The law on protective custody continued throughout the regimes of the
NRC and the SMC I and II. During this period all functionaries, however lowly,
were put in prison merely for having been officials of the ousted ruling political
party; this law was used to intimidate and deter political opposition.
During the period of NRC rule there was no independent press, but the
government found itself so much the subject of rumors that it passed the Prohi-
bition of Rumours Decree of 1973 (NRCD 82). The decree was repealed a year
later, however, because the government had acquired the image of an intolerant
and repressive regime, fueling yet more popular discontent. The SMC passed
another law, the Prohibition of Rumours Decree of 1977 (SMCD 92), in the
heat of the anti-union-government campaign.19 The Preventive Detention Law
of 1982 (PNDCL 4), which was first introduced during Nkrumah’s regime,
would later be promulgated by the PNDC, which came to power by overthrowing
President Hilla Limann in 1981. Under this law, persons classified as dangerous
to national security could be arrested and detained for long periods without trial.
208 / Emmanuel Kwesi Aning, Emma Birikorang, and Ernest Ansah Lartey
Another law, the Habeas Corpus (Amendment) Law of 1984 (PNDCL 92), was
promulgated to prohibit the courts from examining the grounds upon which
anyone had been detained. With these types of laws in effect, all manner of
persons were therefore detained, often based upon mere allegation or suspicion
of wrongdoing, and they were not given the benefit of a fair judicial review.
especially if funds are not being used according to the spirit and intent of their
rationale. They can also question the policy, as their writ extends beyond fidu-
ciary responsibility.29 Based on emerging parliamentary praxis, the chairman of
the PAC should be from the minority group in Parliament. This, to some extent,
allows the chairman to discharge his or her duties dispassionately. The Finance
Committee, another committee whose broad remit brings it into contact with
the intelligence community, deals with matters related to finance and the econ-
omy generally, but it has the authority where ‘‘there has arisen an urgent or
unforeseen need for expenditure . . . to authorize advances from the Contin-
gency Fund to meet the need and report to Parliament.’’ Furthermore, when
such an advance has been made, the committee is bound to ensure that ‘‘supple-
mentary estimates for replacement of the advance are prepared and laid before
the House.’’30 So far, however, the Finance Committee, like the PAC and the
PSCD&I, has not flexed any muscle on intelligence oversight issues.
Parliament needs better institutional capacity to exercise its mandated over-
sight functions, together with the resources to enable and sustain such changes.
Furthermore, existing legislation limits effective oversight, whereas frequent
shifts in personnel and the excessive politicization of oversight institutions
undermine an already weak human resource base. Parliament’s oversight role
needs to be complemented by the emergence of more security-conscious civil
society actors. A critical study of the powers, capacity, and political will of these
committees, and of the Ghanaian Parliament’s ability to carry out effective
oversight of the security sector, points to the following. First, the complex
nature of the security sector presents a challenge for effective oversight; some
issues are too technical for those without experience or training in security
issues, and committees lack specialized support staff to overcome this problem.
Excessive secrecy in national security matters frustrates effective parliamentary
oversight, because security agencies often invoke national security to inhibit
oversight of sensitive issues. There has also been a culture of self-censorship in
Parliament. The Security and Intelligence Agencies Act of 1996, Act 526, only
requires the executive to report to Parliament annually. However, it can be
interpreted as providing a broader mandate for parliamentary oversight. Unfor-
tunately, Act 526 does not provide for any systems of parliamentary oversight.
It provides no guidance on the composition, mode of selection, mandate, or
degree of access to sensitive information of oversight committees. In accordance
with Act 526, the reporting arrangement seeks to hold the security agencies
accountable and within the rule of law. However, the executive has often failed
to meet its obligation to report to Parliament on security issues. Party loyalty
and discipline limit oversight, because parliamentarians are unwilling to chal-
lenge members of government from their own party.
212 / Emmanuel Kwesi Aning, Emma Birikorang, and Ernest Ansah Lartey
questioned and his statement accordingly taken, in the company of his law-
yer.’’36 Such conduct by the BNI has been seen by many observers as a healthy
development for the country’s democracy and a deepening of the rule of law.
However, there are still difficulties in the way the BNI operates. For instance,
though the government argued that Mensah was questioned in the company of
his lawyer, the client argued that ‘‘he was interrogated on two occasions without
his lawyer and when he insisted on the presence of the lawyer, the BNI officials
said it was an informal session and therefore did not require his lawyer.’’37 The
position of the BNI official in this particular instance was contrary to the court
ruling, which enjoins the BNI to grant access to counsel when interrogating
clients.
institution has the right to write a rejoinder.’’40 The best place to seek redress
is the National Media Commission and never the BNI. This statement aptly
encapsulates the BNI’s overzealous tendencies while also undermining the role
of other key institutions such as the National Media Commission. The arrest
and subsequent detention of the journalist prompted the Ghana Journalists
Association to issue a statement, describing as ‘‘frightful’’ the involvement of
the BNI in the manhandling of the journalist over his publication that claimed
that there were going to be changes in the top hierarchy of the Ghana Armed
Forces. It was further stated that even though journalists are not above the law,
they must be treated humanely when arrested.41 The security and the intelli-
gence agencies contend that such stories in the media are fabricated to create
insecurity in the security sector, and hence are the justification for the arrest
and the interrogations of the editor in order to verify the authenticity of the
reporting.
Conclusion
The growth and development of Ghana’s intelligence services has been a slow
and painful process. The intelligence service, just like the country’s other secu-
rity services, has been manipulated and used for the purpose of abusing the
citizenry instead of protecting national security. From regime to regime, laws
and principles governing the sector have been enacted; however, even these
laws, for the most part, have served the interests of the rulers. The democratic
dispensation of 1992, which brought along with it powers for the judiciary and
legislature, has to some extent controlled some of the excesses of the intelli-
gence services. The intelligence culture of Ghana originally developed over
several decades preceding the independence period. Now that the country has
experienced democratic rule continuously for twenty years, its intelligence ser-
vice can be expected to develop a democratic culture that serves the national
interests and not simply the narrow power interests of the ruling regime. In this
context, a model for the effective and accountable functioning of Ghana’s
security sector would operate on several levels. In the first instance, and at the
strategic level, Parliament should have complete oversight over security policy
and objectives. At the tactical level, all operational issues should be examined
only with the involvement of key stakeholders and experts. Civil society organi-
zations should be brought in as an extraparliamentary source of oversight in
order to offset suspicion between political elites and the security sector.
Notes
1. See, e.g., Sandy Africa and Johnny Kwadjo, eds., Changing Intelligence Dynamics in
Africa (Birmingham: GFN/SSR, 2009).
216 / Emmanuel Kwesi Aning, Emma Birikorang, and Ernest Ansah Lartey
2. Asante Fordjour, ‘‘A Review of the Conflicting Roles of the BNI and Ghana Police
Service,’’ 2009, www.ghanaweb.com/GhanaHomePage/features/artikel.php?ID⳱173175;
Guure Brown Guure, ‘‘BNI: Bureau of National Intimidations—The Case for a National
Security Strategy,’’ 2010, www.ghanaweb.com/GhanaHomePage/NewsArchive/artikel.php
?ID⳱178496.
3. Bismark Bebli, ‘‘BNI Brings Back Dark PNDC Days’’ and ‘‘Dreaded BNI Arrest Edi-
tor,’’ both Ghanaian Chronicle, March 18, 2011.
4. There has been a near industry of revisionist literature about this period. See, e.g.,
Dennis Austin, Politics in Ghana 1946–1960 (Oxford: Oxford University Press, 1964).
5. K. B. Quantson, Ghana: National Security (Accra: Bestas Press–NAPASVIL Ventures,
2003), 1.
6. The immediate response to the fourth assassination attempt was the enactment of the
Security Services Bill; see Debates 34 (November 25, 1963): 962–1012.
7. Quantson, Ghana, 9.
8. W. Scott Thompson, Ghana’s Foreign Policy, 1957–1966: Diplomacy, Ideology, and the
Foreign Policy of a New State (Princeton, NJ: Princeton University Press, 1969), 20ff.
9. Ibid., 100.
10. Ibid. One of the best books on this period; see esp. 59ff.
11. Ibid.
12. Quantson, Ghana, 9.
13. Hutchful Eboe, ‘‘Pulling Back from the Brink: Ghana’s Experience,’’ in Governing
Insecurity: Democratic Control of Military and Security Establishments in Transitional Democra-
cies, edited by Gavin Cawthra and Robin Luckham (London: Zed Books, 2003), 78–101.
14. It was identified after the 1966 coup d’état that the commissioner and deputy commis-
sioner of the Criminal Investigations Department and the head of the Special Branch were
part of those who staged the coup. Africa and Kwadjo, Changing Intelligence Dynamics, 100.
15. Ibid., 101.
16. Ibid.
17. Government of Ghana, Ghana National Reconciliation Commission Report (Accra: Gov-
ernment of Ghana, 2004).
18. For an interesting analysis of this act, see Ekow Nelson and Michael Gyamerah, ‘‘The
Origins of Preventive Detention in Ghana,’’ September 14, 2006, www.ghanaweb.com/Gha
naHomePage/features/artikel.php?ID⳱110547.
19. ‘‘Union government,’’ a concept brought forward by General Acheampong in 1977,
sought to make Ghana a nonparty state. This was widely perceived as a ploy by the head of
state to retain power.
20. Government of Ghana, Security and Intelligence Agencies Act (Act 526) of 1996,
Section I:1.
21. Ibid., preamble.
22. Ibid.; see section II.
23. See, e.g., Kwesi Aning, ‘‘Security Sector Governance in Ghana,’’ in Security Sector
Governance in West Africa, edited by Osita Eze and Jens-U Hettmann (Abuja: Frederich Ebert
Stiftung, 2005), 68–102.
24. See, e.g., Government of Ghana, Anti-Money Laundering Act, 2008 (Act 749); Gov-
ernment of Ghana, Economic and Organised Crimes Act, 210; Mutual Legal Assistance Bill,
2008.
25. This section draws on our earlier work; see Kwesi Aning and Ernest Lartey, Parliamen-
tary Oversight of the Security Sector: Lessons from Ghana (New York: Centre on International
Cooperation, 2009).
Developing a Democratic Intelligence Culture in Ghana / 217
26. Standing Orders of Parliament, Order 158, under ‘‘Functions and Powers of Commit-
tees,’’ November 2000.
27. Constitution of Ghana, Article 103 (3), 1992; Standing Orders of Parliament, 190,
November 2000.
28. Constitution of Ghana, Article 103 (6), 1992; Standing Orders of Parliament, 155,
November 2000.
29. Standing Orders of Parliament, Order 165 (2); see also Constitution of Ghana, chap-
ter 13, 1992 and Article 187 (2), ibid. There seems to be some dissonance in the House of
Parliament concerning the extent of PAC’s oversight functions. According to the minority
leader, Alban Bagbin, ‘‘It appears from the provisions of the Constitution and the Standing
Orders so far mentioned that the committee’s work is limited to examining only reports
presented by the Auditor-General. This view is sometimes held by some of my colleagues
but I hold a contrary opinion. I believe the committee, as a watchdog wing of Parliament in
matters of public finance, can institute investigation into any matter of public interest where
public funds are involved.’’
30. Standing Orders of Parliament, 169–70 (1) and (2), November 2000.
31. GhanaWeb, ‘‘BNI Cannot Seize Passports, High Court Declares,’’ 2009, http://
mobile.ghanaweb.com/wap/artcle.php?⳱166710.
32. Modern Ghana News, ‘‘BNI Must Allow Access to Counsel,’’ 2009, http://modernghana
.com/print/233711/1/bni-munt-allow-access-to-co unsel.html.
33. Ibid.
34. Proper authorization could mean the BNI securing an arrest warrant from a judge.
35. Herbert Mensah is a close friend of former president Rawlings’s family. He was invited
to the BNI to assist in the investigation of a purported tape allegedly in his possession, the
content of which revealed that the incumbent president, John Mills, intended to expend
GH 90 million on the NDC presidential primaries in July 2011.
36. ‘‘Herbert Mensah Fails to Produce Tape,’’ Graphic.com.gh, 2011, www.com.gh/
print_article.php?news⳱12963&link⳱/dailygraphic/page.php?n.
37. See ‘‘External Powers Are Influencing BNI-Herbert Mensah,’’ 2011, www.multi
tvworld.com.
38. ‘‘Prof Karikari Slams BNI for Arresting Editor,’’ myjoyonline.com, 2011, http://news
.myjoyonline.com/tools/printnesw.asp?contentid⳱62897.
39. Kwame Karikari is the executive director of the Media Foundation for West Africa.
40. This comment was made by Kwame Karikari on Xfm, a local radio station based in
Accra. See the comment at www.xfmnewscenter.com/news/news.php?cat⳱General&title
⳱MediaⳭFoundationⳭForⳭWestⳭAfricaⳭCondemnsⳭArrestⳭOfⳭDaybreakⳭEditor
Ⳮ噛.
41. ‘‘GJA Warns BNI over Interference,’’ http://vibeghana.com/2011/03/22/gja-warns-
bni-over-interference/.
This page intentionally left blank
CHAPTER 12
Intelligence Community
Reforms: The Case of Argentina
Eduardo E. Estévez
A
fter decades of dictatorships and military influence in domestic politics,
Latin America’s new democracies faced the challenge to restore the
respect for the rule of law and human rights. Intelligence is one of the
issues with which they needed to deal. In fact, during the transition from the
twentieth century to the twenty-first century, this challenge was twofold: to
democratize the intelligence sector, and to adapt it to the threats and risks
arising in a new and changing security environment. Significant progress in the
democratization of intelligence can be verified in Latin American countries—
for example, new legal frameworks, enhanced democratic control, revamped
structures and professional education, and a tendency to openness through the
interaction with scholars.1 Yet the effectiveness and level of transparency the
intelligence communities have achieved throughout the region are quite differ-
ent and even questionable to some extent.2 This situation can also be observed
in other emerging democracies in the world.3
For decades, Argentina’s intelligence community was heavily influenced and
controlled by the armed forces, and it became engaged in political policing.
The authoritarianism that dominated most of the twentieth century culminated
in the military government that ruled from 1976 to 1983, which was widely
known due to ‘‘the Dirty War,’’ which was a period of state terrorism during the
counterinsurgency struggle, and ‘‘the disappeared,’’ that is, those people who
were victims of repression. Since December 1983, however, Argentina has been
/ 219 /
220 / Eduardo E. Estévez
living under stable democratic rule. A major goal for democratic leaders was to
establish civilian democratic control over the traditionally highly autonomous
military, security ‘‘police,’’ and intelligence sectors. The main outcome was a
set of pieces of legislation on intelligence, which included national defense and
domestic security laws, within a major framework, the National Intelligence
Law passed in December 2001. This chapter is about the process of the democ-
ratization of intelligence in Argentina from mid-1980s to the present; it
explores the peculiarities of the governance of the intelligence sector as well as
the pertinent issues, challenges, accomplishments, and results.4
that are likely to be most relevant to the process and outcome of interest.’’14
The ‘‘process tracing method allows one to trace the operation of the causal
mechanism(s)—for example, conversion, layering, increasing returns—at work
in a given situation.’’15 The reconstruction of the chronology of events that
makes up the process is central.
Consistent with the expectations of path dependence theory, even under
democratic rule the resilience of authoritarian legacies in the intelligence sec-
tor—including decision-making styles, doctrines, and practices—have resulted
in significant institutional inertia.16 Successive political actors committed to
promoting change have tried to overcome this inertia.17 Several tools may prove
useful to evaluate the status of intelligence democratization and to assess the
outcomes. It is relevant to detect critical junctures and significant events that
trigger institutional change, as well as to identify the actors who were aware of
such opportunities. Structural determinants—for example, strategic environ-
ment, politicization of security and intelligence, securitized domestic environ-
ment, and military influence—may shape the outcomes.18 The levels of
transparency, control, effectiveness, autonomy, and penetration are relevant
indicators.19 Certain relevant topics to consider are respect/violation of rights
of citizens, use/misuse of secret expenses, intelligence failures endangering the
democratic system, fully democratic regulations, effectiveness of parliamentary
control, consistency between intelligence policy (determined by democratic
authorities) and activities, access to archives of repression, media and judicial
controls, evidence of change in the culture and practices of intelligence person-
nel, and intelligence-sector reliability in the international community.20 This
analysis also takes into consideration the recently described factors that either
support or arrest progress in the process of intelligence democratization.21 The
next two sections trace the historical development of Argentina’s intelligence
sector and its democratization since the mid-1980s.
In 1946 the elected president, Juan Domingo Perón, created an office for
the Coordination of Information of the Presidency and subsequently positioned
it in the Ministry of War. In 1949 it was renamed the Office of Coordination
of State Information. The State Information Service, under the presidency,
replaced this office in 1951. The intelligence services of the army, the navy,
and the air force had also been set up in 1946. The Federal Police, created in
1943, were also an active player, and the Federal Coordination Information
Corps was its main intelligence element. For the historian Patricia Funes, 1956
represented a Gordian knot in the structuring of Argentina’s twentieth-century
intelligence sector,24 when it was engaged in targeting communism and other
extremisms.25 That year, the State Information Secretariat (Secretarı́a de Inteli-
gencia de Estado, SIDE) was set up under Decree 776 of the military govern-
ment, named ‘‘Liberating Revolution.’’ A decade later, in 1966, a new
coordination and analytical body under the president, the National Intelligence
Center (Central Nacional de Inteligencia, CNI), was established by law.
As Ana Lemos-Nelson puts it, a significant historical consideration in
understanding the politics of Latin America is the presence of the military in
internal law enforcement—domestic security—as a constant element since the
prerepublican experience.26 Argentina is no exception. During these decades
under varied arrangements, military officers dominated the civilian intelligence
agencies, and also the intelligence staffs of the police and security forces. For
example, Secret Law 20,195 of 1973 specified that the secretary and undersecre-
taries of SIDE should be appointed from the senior ranks of the armed forces.27
The politically authoritarian but economically neoliberal military regime
that ruled from 1976 to 1983 undertook the National Reorganization Process,
which is remembered chiefly because of the ‘‘disappeared,’’ the significant num-
bers of people eliminated by the government during that period.28 The regime
imposed changes aimed at promoting a market economy while executing the
so-called Dirty War against supposed subversion, and became engaged in the
South Atlantic conflict of 1982 with the United Kingdom over the Malvinas/
Falkland Islands. 29 The Dirty War entailed a powerful conjunction of state
resources,30 in which the intelligence agencies became essential instruments.31
The scope of military intelligence activities during the dictatorship is illustrated
by the scale of monitoring and infiltration of the education sector.32 Signifi-
cantly, Argentina was not acting entirely alone. At the regional level the mili-
tary commanders of Argentina and other Latin American countries designed
and implemented Operation Condor between late 1973 and early 1974. This
operation was a broad and cooperative military and intelligence effort focused
on counterinsurgency and counterterrorism.33 The politicization of military
intelligence also contributed to the South Atlantic conflict, of which it has
been observed that ‘‘a crucial influence in the Argentine decision to invade
the Malvinas Islands was the Argentine intelligence community’s reluctance to
Intelligence Community Reforms in Argentina / 223
Congress passed the National Defense Law 23,554. This law replaced the exist-
ing National Security Doctrine, which required internal security to be defined
by an additional special law. The new law confined the armed forces to con-
fronting external threats. Consequently, military intelligence was banned from
conducting activities related to domestic political affairs. The analytical pro-
duction of military intelligence would be carried out by an agency composed of
the armed forces’ intelligence agencies under the authority of the minister of
defense.
Tense civil–military relations, including several military uprisings, charac-
terized the period. In fact, ‘‘the insistence of the armed forces upon retaining
their monopoly of intelligence and domestic security during the 1980s indi-
cated that the military still regarded surveillance of domestic policies as a key
reserved domain.’’37 After the unexpected ultraleftist command attack on an
army base in January 1989,38 the reactive measures and short-lived decisions
undertaken by President Alfonsı́n and later by President Menem—the creation
of a Security Council,39 and a Committee on Domestic Security40 —raised con-
cern about military involvement in domestic intelligence.
A number of intelligence scandals mushroomed during Carlos Menem’s
consecutive administrations (1989–95; 1995–99), and these were joined by
issues such as the impact of the two international terrorist bombings and tend-
encies to involve the military in domestic intelligence and internal security.41
The first intelligence chief of the Menem administration was the journalist
Juan Bautista ‘‘Tata’’ Yofre. Curiously, retired general Carlos Alberto Martı́nez,
former chief of intelligence during the military regime, was posted as director
of the National Intelligence College (Escuela Nacional de Inteligencia, ENI).42
Also curiously, Yofre’s undersecretary, Carlos Cañón, who was also the CNI
chief, supported the domestic use of military intelligence.43 The dispute be-
tween the two chiefs became public, ending with Cañon’s resignation in Octo-
ber 1989.44 Intending to legitimize intelligence activities, Menem’s second
intelligence chief, Hugo Anzorreguy, tasked SIDE to support judicial criminal
investigations, a matter that was open to question.45
The Internal Security Law 24,059 of 1992, which was also approved by
consensus, established the civilian management of the police and security
forces. It founded the National Congress Joint Committee for the Oversight of
Internal Security and Intelligence Activities and Agencies and also the Internal
Security Council within the executive, and it created the Directorate for Inter-
nal Intelligence under the Internal Security Secretariat of the Ministry of the
Interior. This directorate, the first body on domestic intelligence with demo-
cratic legitimacy, was instituted as a permanent entity with an integrated staff
trained in intelligence and active duty officers of the federal police, security
forces, and provincial police agencies, as well as intelligence specialists, as
deemed necessary.46
Intelligence Community Reforms in Argentina / 225
The current statute also provides for legislative intelligence oversight in the
form of the Congressional Joint Committee for the Oversight of Intelligence
Activities and Agencies. The committee’s responsibilities include the legality
of intelligence activities, intelligence policy, the management and administra-
tion of the intelligence system and agencies, the system’s effectiveness, person-
nel education plans, secret budgets and expenditures, data on requests for
interceptions of communications, and public complaints about the agency or
its personnel.
The National Intelligence Law did not solve debates about the relative mer-
its of the centralizing or decentralizing approaches to the intelligence structure.
The resulting formula is, therefore, a hybrid. It combines relative centralization
at the top (where the SI concentrates most of the executive’s control compe-
tences) and decentralized lower echelons (under some degree of ministerial
control).71
much in transition while the military lobbied against changes, and even still
performed illegal operations. Following the enactment of the 2001 statute, the
executive took a more active role in furthering reforms. Throughout, the reform
process has been hindered by factors such as the complexity of intelligence
reform, the remnants and practices of the authoritarian past, resistance and
reluctance to change in a number of quarters, variable and often insufficient
political will, and finally, persistent tendencies to politicize intelligence.73 The
most significant factor driving progress has been the willingness of decision
makers to democratize intelligence—initially, this effort was led by legislators
and their advisers; more recently, the momentum has included the ministerial
administrators in charge of policy implementation.
In sum, two distinct but partially overlapping stages can be seen in the
reform of Argentina’s intelligence community. The first stage was focused on
debating and passing legislation to reorganize the intelligence community and
permit the exercise of executive and legislative control and oversight. And the
second stage was characterized by a set of executive actions taken to enhance
control over the system, as seen with military intelligence reform, declassifica-
tion of archives on human rights grounds, and refurbishing criminal
intelligence.
cause of public concern during the 1990s.76 The misuse of secret funds also
continued to be a significant ongoing problem. However, successful prosecu-
tions of such malfeasance are a good indication that institutional constraints
such as judicial measures can work. Critical weaknesses in Argentina’s intelli-
gence in terms of warning and emergency response were also exposed by the
two international terrorist attacks during the 1990s. In Decree 815 of 2005,
President Kirchner acknowledged the government’s responsibility regarding the
bombing of the Asociación Mutual Israelita Argentina. Significantly, regional
efforts to cooperate on intelligence and counterterrorism have since been coor-
dinated by civilian officials in collaboration with members of the intelligence
agencies. This is an important step for the exercise of democratic control.
In the 2000s, the executive sponsored and implemented a second generation
of reforms concerning military intelligence and airport security intelligence.
The secrecy policy related to the disclosure of information and the declassifica-
tion of files is a major step in terms of transparency, and the relevance of its
impact for human rights must not be underestimated. However, intelligence is
still a subject of controversy and sporadic scandals, and it still lacks the confi-
dence of society. The NGOs that focus on media and human rights have
exposed incidents of misconduct and blunders. The new law has not yet had
quite the impact on changes in culture and practices that had been hoped for.
Moreover, the legislature has been less effective than it might be in exerting
congressional oversight.77 As a legislative adviser with a prominent role in
developing the intelligence bills warned, the lack of experience of both mem-
bers of the intelligence community and legislators with living harmoniously
under the new legal framework is perhaps the greatest obstacle to overcome in
the future.78 It has also been observed that ‘‘the main challenges for Argentina
now are to ensure that intelligence remains an issue of interest to Congress, to
develop further mechanisms to support intelligence control, and to ensure that
priorities, resources, and capacities are congruent.’’79 These challenges remain.
Experts and academics concur that there is still a long way to go in the democ-
ratization of intelligence.
Conclusion
Path dependence and institutional change may prove useful in explaining the
outcomes of the complex process of intelligence democratization, and in articu-
lating the issues that arise in new democracies pursuing intelligence reform.
The restoration of democracy by itself is not a sufficient condition to trigger
intelligence democratization and reform. A genuine fresh start never occurs, a
central question being whether the existing intelligence machinery can adapt
its organization, policies, and practices to the new political environment—
assuming it even can be adapted—and how.80 Sooner or later, democracies and
232 / Eduardo E. Estévez
democratic leaders reach a point where, for a range of possible reasons, they
have a real need to exert control of their intelligence communities. The politi-
cal realization of the magnitude and significance of violations of human rights
by security and intelligence agencies appears to be one such necessary condi-
tion. In this case, a significant driver of intelligence democratization initiatives
is an accurate appreciation of the legal abuses and human rights violations
committed by the preceding military regime. Consequently, an effective investi-
gation of past activities by a special commission coupled with prosecution in
civilian courts serve as significant drivers in the initial stages of the reform
process.
The twenty-first century found Argentina’s intelligence community reorga-
nized, with a new structure, responsibilities, and accountability mechanisms
under the law enacted in 2001. The main pressure for reform came from Con-
gress, and only after 2003 did the executive take up this initiative. In the mean-
time, the judiciary also dealt with several key cases. As mentioned above,
punctuated changes occurred in certain institutional layers, with moments of
backsliding arising from problems like politicians looking to military command-
ers to lead the intelligence sector. Throughout the decades of democratization
examined here, there has been a consistently weak political commitment to
maintaining the momentum of intelligence reform over time. For all these rea-
sons it is still premature to speak about deeply rooted intelligence reform in
Argentina. Intelligence democratization remains an ongoing process character-
ized by periodic bursts driven by significant events, moments of crisis, and the
responses of politicians.
Notes
1. For a comparative perspective on democratic civilian control and effectiveness in
Argentina, Brazil, Chile, and Colombia, see Thomas C. Bruneau, ‘‘Democracy and Effective-
ness: Adapting Intelligence for the Fight against Terrorism,’’ International Journal of Intelli-
gence and Counterintelligence 21, no. 3 (2008): 448–60. For a comparison of military
intelligence reforms, see Gregory Weeks, ‘‘A Preference for Deference: Reforming the Mili-
tary’s Intelligence Role in Argentina, Chile and Peru,’’ Third World Quarterly 29, no. 1
(2008): 45–61. On legislation and mechanisms for coordination and control of intelligence
in Latin America, see FLACSO–Chile, Reporte del Sector de Seguridad en América Latina y el
Caribe (Santiago: FLACSO–Chile, 2007), 115–25. For an account on legal structures, see
José M. Ugarte, ‘‘América Latina, Actividad de Inteligencia y su Control: El Estado de la
Cuestión,’’ paper prepared for annual meeting of Latin American Studies Association,
Toronto, October 6–9, 2010.
2. According to Carlos Maldonado, South American intelligence services confront two
types of dilemmas, old ones, such as lack of legitimacy, deprofessionalization, lack of national
intelligence systems, militarization, securitization, and politicization; and modern ones, such
as foreign interference, remilitarization, privatization of intelligence, and failed or unfinished
reforms. Carlos Maldonado, ‘‘Dilemas Antiguos y Modernos en la Inteligencia Estratégica en
Sudamérica,’’ Security and Defense Studies Review 9, nos. 1–2 (2009): 50–51.
Intelligence Community Reforms in Argentina / 233
3. See Thomas C. Bruneau and Florina Cristiana (Cris) Matei, ‘‘Intelligence in the
Developing Democracies: The Quest for Transparency and Effectiveness,’’ in The Oxford
Handbook of National Security Intelligence, edited by Loch K. Johnson (Oxford: Oxford Uni-
versity Press, 2010), 771.
4. This chapter is based on revised excerpts from Eduardo E. Estévez, ‘‘Comparing Intel-
ligence Democratization in Latin America: Argentina, Peru, and Ecuador Cases,’’ paper
delivered at International Political Science Association–European Consortium for Political
Research Joint Conference, Universidade de São Paulo, São Paulo, February 16–19, 2011. It
also draws from ‘‘Intelligence Democratization in Argentina: Achievements and Chal-
lenges,’’ by Eduardo E. Estévez, unpublished, June 2010.
5. Erving Goffman, Asylums: Essays on the Social Situations of Mental Patients and other
Inmates (Garden City, NY: Doubleday, 1961).
6. New institutionalism and path dependence have been applied in comparative studies
of intelligence and security apparatuses. See Priscila Carlos Brandão, Serviços Secretos e
Democracia no Cone Sul: Premissas para uma Convivência Legı́tima, Eficiente e Profissional
(Niterói, Brazil: Editora Impetus 2010); and Lawrence P. Markowitz, ‘‘Unlootable Resources
and State Security Institutions in Tajikistan and Uzbekistan,’’ Comparative Political Studies
44, no. 2 (2011): 156–83. Also see Amy Zegart, Flawed by Design: The Evolution of the CIA,
JCS and NSC (Stanford, CA: Stanford University Press, 1999).
7. E.g., institutional ‘‘lock-in,’’ increasing returns, self-reinforcing and reactive
sequences, and ‘‘mechanisms of reproduction.’’
8. Jürgen Beyer, ‘‘The Same or Not the Same: On the Variety of Mechanisms of Path
Dependence,’’ International Journal of Social Sciences 5, no. 1 (2010): 1.
9. Taylor C. Boas, ‘‘Conceptualizing Continuity and Change: The Composite-Standard
Model of Path Dependence,’’ Journal of Theoretical Politics 19, no. 1 (2007): 33–34; Beyer,
‘‘Same or Not the Same.’’
10. This typology of modes of gradual change also includes mechanisms, e.g., displace-
ment, drift, conversion, and exhaustion. See Wolfgang Streeck and Kathleen Thelen, ‘‘Intro-
duction: Institutional Change in Advanced Political Economies,’’ in Beyond Continuity.
Institutional Change in Advanced Political Economies, edited by Wolfgang Streeck and Kathleen
Thelen (Oxford: Oxford University Press, 2005), 31.
11. Ibid., 23.
12. James Mahoney, ‘‘Conceptualizing and Explaining Punctuated Versus Incremental
Change,’’ paper prepared for annual meeting of the American Political Science Association,
Washington, September 2–5, 2010, 9.
13. John W. Hogan and David Doyle, ‘‘The Importance of Ideas: An A Priori Critical
Juncture Framework,’’ Canadian Journal of Political Science 40, no. 4 (2007): 883–910.
14. Tulia G. Falleti and Julia F. Lynch, ‘‘Context and Causal Mechanisms in Political
Analysis,’’ Comparative Political Studies 42, no. 9 (2009): 1152–59, and table 1.
15. Jeffrey T. Checkel, ‘‘Process Tracing,’’ in Qualitative Methods in International Relations:
A Pluralist Guide, edited by Audie Klotz (New York: Palgrave Macmillan, 2008), 116.
16. According to Aguilar and Hite, authoritarian legacies can condition democratic tran-
sition and even be embedded in certain cultural and institutional practices of the new
regime. See Paloma Aguilar and Katherine Hite, ‘‘Historical Memory and Authoritarian
Legacies in Processes of Political Change: Spain and Chile in Comparative Perspective,’’ in
Authoritarian Legacies and Good Democracies, edited by Paola Cesarini and Katherine Hite
(Notre Dame, IN: University of Notre Dame Press), 191–231.
234 / Eduardo E. Estévez
33. See J. Patrice McSherry, Predatory States: Operation Condor and Covert War in Latin
America (Lanham, MD: Rowman & Littlefield, 2005). According to McSherry, Operation
Condor extended to other South American countries and there were attempts to export it
to Central America.
34. Enrique H. J. Cavallini, ‘‘The Malvinas/Falkland Affair: A New Look,’’ International
Journal of Intelligence and CounterIntelligence 2, no. 2 (1988): 209.
35. For more information, see Eduardo E. Estévez, ‘‘Executive and Legislative Oversight
of Intelligence in Argentina,’’ in Who’s Watching the Spies? Establishing Intelligence Service
Accountability, edited by Hans Born, Loch Johnson, and Ian Leigh (Washington, DC: Poto-
mac Books, 2005), 160–79; and Priscila Carlos Brandão Antunes, ‘‘Establishing Democratic
Control of Intelligence in Argentina,’’ in Reforming Intelligence: Obstacles to Democratic Con-
trol and Effectiveness, edited by Thomas C. Bruneau and Steven C. Boraz (Austin: University
of Texas Press, 2007), 195–218.
36. See Gerardo Young, SIDE: La Argentina Secreta (Buenos Aires: Editorial Planeta,
2006), 70–71.
37. J. Patrice McSherry, Incomplete Transition: Military Power and Democracy in Argentina
(New York: St. Martin’s Press, 1997), 151.
38. The taking of the military infantry regiment of La Tablada by the MTP (Movimiento
Todos por la Patria) took place on January 23, 1989.
39. Decree 83 of January 25, 1989.
40. Decree 327 of March 10, 1989; and Decree 392 of February 26, 1990.
41. For more details, see J. Patrice McSherry, ‘‘National Security and Social Crisis in
Argentina,’’ Journal of Third World Studies 17, no. 1 (2000).
42. Young, SIDE, 103–4.
43. ‘‘La Inteligencia Militar,’’ La Nación (Buenos Aires), July 25,1989.
44. Young, SIDE, 107–8.
45. Ibid., 115, 180.
46. Regulatory Decree 1,273 of 1992, article 10.
47. See ‘‘La Orden para el Espionaje Ideológico,’’ Cları́n (Buenos Aires), July 7, 1993.
48. See La Nación, July 2, 1993.
49. Held in Buenos Aires, December 1–3, 1993; Britt Snider, general counsel, US Senate
Select Committee on Intelligence, and James X. Dempsey, assistant counsel, Subcommittee
on Civil and Constitutional Rights of the US House Committee on the Judiciary, were the
invited international speakers.
50. Argentinean government, ‘‘Report of the Argentine Republic on its Implementation
of Security Council Resolution 1373 (2001),’’ Security Council, United Nations, S/2001/
1340, December 31, 2001, 10–11, www.unhcr.org/refworld/pdfid/46d571621.pdf.
51. Sergio Moreno and Adriana Meyer, ‘‘Espı́as de Muy Corto Vuelo,’’ Página 12, Buenos
Aires, March 6, 2000.
52. ‘‘El Ejército hizo Tareas de Espionaje en Córdoba,’’ La Nación, June 12, 1999.
53. Florencia Fontán Balestra, ‘‘Towards a Democratic Control of Argentina’s Intelli-
gence Community,’’ International Center for Criminal Justice, Harvard Law School, 2000,
24–46. See also ‘‘El Servicio de Inteligencia Estatal,’’ editorial, Cları́n, February 8, 2000.
54. See Laura Zommer, ‘‘La Sindicatura le Apunta a Santibañes,’’ La Nación, October 19,
2000.
55. Jaime Garreta, ‘‘El Diseño de un Nuevo Marco Jurı́dico Regulatorio para la Actividad
de Inteligencia del Estado en la Argentina,’’ Security and Defense Studies Review 2, no. 2
236 / Eduardo E. Estévez
(Winter 2002–3): 270–71. See also Elsa Llenderrozas, ‘‘Del Espionaje Domestico a la Inteli-
gencia Estratégica: Los Caminos hacia una Ley de Inteligencia,’’ paper delivered at REDES
2001, Center for Hemispheric Defense Studies, Washington, May 22–25, 2001.
56. See Eduardo E. Estévez, ‘‘Developments of the Democratization of Intelligence in
Argentina: Trends in Secrecy Policy–Implications for Comparing Transitional Settings,’’
paper prepared for fourth European Consortium for Political Research Conference, Pisa,
September 6, 2007.
57. E.g., see Gustavo Ybarra and Lucas Colonna, ‘‘Sigue en Vigor la Polémica ‘Ley Espı́a,’ ’’
La Nación, May 2, 2005.
58. Halabi, Ernesto c/ P.E.N.–ley 25.873 dto. 1563/04 s/ amparo ley 16.986, Corte
Suprema de Justicia de la Nación (H. 270. XLII), Fallo, Buenos Aires, February 24, 2009.
59. Alejandra Dandan, ‘‘Las Valijas salieron por un Mecanismo Aceitado,’’ Página 12,
Buenos Aires, February 15, 2005.
60. Decree 145 of February 22, 2005.
61. For more details, see Centro de Estudios Legales y Sociales, ‘‘Polı́ticas de Defensa y
Control Civil,’’ chapter 2 in Informe sobre la Situación de los Derechos Humanos en Argentina
2007. Also see Centro de Estudios Legales y Sociales, ‘‘El Efecto, en el Plano Judicial y
Polı́tico, de la Denuncia Penal por la Inteligencia Ilegal en la Base Almirante Zar de Trelew,’’
Centro de Estudios Legales y Sociales, Buenos Aires, March 2007.
62. See Jefatura de Gabinete de Ministros, ‘‘Memoria Anual Detallada del Estado de la
Nación 2008,’’ Buenos Aires, March 1, 2009, 85–94.
63. ‘‘Prosecution for Menem and Cavallo Confirmed,’’ Télam, National News Agency of
Argentina, December 22, 2009, http://english.telam.com.ar/index.php?option⳱com_
content&view⳱article&id⳱8229:prosecution–for–menem–and–cavallo–confirmed&catid
⳱42:politics.
64. Young, SIDE, 5–8, 302.
65. See TOF no. 3 sentence of August 10, 2011, on judicial case no. 95–08 ‘‘Béliz, Gus-
tavo Osvaldo s/inf. art. 222 del C.P.,’’ www.cij.gov.ar/nota-7467-Difundieron-los-funda-
mentos-de-la-sentencia-que-absolvio-a-Gustavo-Beliz.html.
66. Daniel Santoro, ‘‘Exclusivo: La Lista de los Agentes del Batallón 601 de Inteligencia,’’
Cları́n, January 23, 2010.
67. E.g., see Jaime Rosemberg, ‘‘Mucho Misterio y Escasa Actividad en la Comisión que
debe Controlar la SIDE,’’ La Nación, August 11, 2009.
68. For a detailed description of the law and the regulatory decree, see Geneva Centre
for the Democratic Control of Armed Forces, ‘‘Intelligence Legislation Model–Argentina,’’
Toolkit–Legislating for the Security Sector Series, no. 3.5, Aidan Wills (series ed.), Geneva,
2011.
69. This is the successor to the Directorate for Internal Intelligence, created by the Inter-
nal Security Law 24,059 of 1992.
70. Due to reorganization of the executive ministries, since December 2010 the National
Directorate for Criminal Intelligence has been under the jurisdiction of the recently created
Ministry of Security, Decree 2,009 of December 15, 2010.
71. See Estévez, ‘‘Executive and Legislative Oversight,’’ 171–72; and José M. Ugarte,
‘‘Nueva Ley de Inteligencia,’’ La Nación, December 14, 2001.
72. In the context of civil–military relations, Brandão recognized as the critical juncture
the end of the military dictatorship and the impact of the defeat in Malvinas, the period
when the military lost the ability to establish rules of the political game. Brandão, Serviços
Secretos, 78.
Intelligence Community Reforms in Argentina / 237
73. E.g., while analyzing the military intelligence reform in Argentina, Chile, and Peru,
Weeks suggests considering the ‘‘civilian indifference’’ as an element in a rational choice
analysis of such reforms under the span of civil–military relations. Weeks, ‘‘Preference for
Deference,’’ 46–47.
74. Cları́n and La Nación.
75. Ernesto López, ‘‘Nuevos Desafı́os a la Defensa y la Seguridad: El Impacto en las Relaci-
ones Civiles-Militares, el Caso Argentino,’’ paper delivered at REDES 2002, Center for
Hemispheric Defense Studies, Brası́lia, August 7–10, 2002, 10.
76. See ‘‘Escuchas Ilegales y Cultura Polı́tica,’’ Cları́n, December 22, 2007.
77. See Alberto Binder, ‘‘Perversa Inteligencia sin Control,’’ op-ed, Cları́n, November 24,
2009.
78. Garreta, ‘‘Diseño,’’ 281.
79. Antunes, ‘‘Establishing Democratic Control,’’ 215.
80. Peter Gill and Mark Phythian, Intelligence in an Insecure World (Cambridge: Polity
Press, 2006), 178.
This page intentionally left blank
CHAPTER 13
Sweden: Intelligence
the Middle Way
Wilhelm Agrell
I
n many respects the creation, development, and nature of the Swedish
national intelligence institutions is no different from that of a number of
other small states in Northern Europe. The region was deeply affected by
World War II and early in the Cold War became a geostrategic conflict zone
and still to some extent remains one, although in a new European security
context. Sweden, like its Nordic neighbors, is a stable democracy with an inde-
pendent legal system, a free press, and a society built along the ‘‘middle way’’
protected by a long peace. So, judging from the outer appearance, not very
much peculiarity should be expected, not even in such a peculiar domain as
intelligence. However, the outer appearance might in this respect be mislead-
ing, as the Swedish novelist Carl Jonas Love Almqvist let one of his main
characters observe in one of the closing chapters of his classical early-
nineteenth-century novel—quoted above—which was based on the plot to
assassinate King Gustaf III at a masked ball in 1792. Here Almqvist had, as a
gifted writer, grasped one of the Swedish state’s central features, which has to
some extent remained intact for centuries.
/ 239 /
240 / Wilhelm Agrell
With the outbreak of World War II in 1939 and the subsequent Swedish
declaration of neutrality, three new actors entered the intelligence field. The
first was the G-Bureau, later renamed the C-Bureau (Centralbyrån), a unit for
secret intelligence collection that was under the Defense Staff but was kept
separate from the Intelligence Department. The C-Bureau established a large
intelligence network that was never fully documented. However, the permanent
staff of the bureau remained small, and operations were often run personally by
the chief, Major Carl Petersén, who preferred to keep operational matters to
himself. The staff included a number of well-educated academics, among them
Gunnar Jarring, later an ambassador and international negotiator, and Thede
Palm, the holder of a doctorate in the history of religion and later Petersén’s
successor.
The second hastily established intelligence unit dealt with signals intelli-
gence. The Swedish navy had started the first efforts to monitor Soviet radio
communications, and the Cryptographic Department of the new Defense Staff
took on the overall responsibility for decrypting foreign military and diplomatic
communications. This activity started in the autumn of 1939, using mainly
civilian personnel either called in or serving voluntarily; among the latter was
a professor of mathematics, Arne Beurling.3 The Cryptographic Department
scored considerable successes against the Soviet low-level cipher system during
the Finnish–Soviet Winter War, and the results were shared with Finnish radio
intelligence, a liaison arrangement that was politically uncomplicated as Swe-
den had not declared itself neutral in that specific conflict and supported Fin-
land with arms and other supplies.4
The major breakthrough for signals intelligence was, however, provided by
the Germans after the occupation of Denmark and Norway from April to June
1940. One of the Swedish concessions demanded by Germany was the right to
use land lines, which were believed to be more secure than radio communica-
tions, for telecommunications with occupied Norway. The German machine-
crypto was nevertheless successfully solved by Beurling, thanks to inadequate
handling of the system by the German operators. The net result was that the
Cryptographic Department managed to read about 150,000 German telegrams
between the summer of 1940 and the summer of 1942, when the Germans
realized that their cryptography system had been compromised.5
The decrypted German traffic had a vast intelligence potential, which the
Swedish intelligence service could exploit only to a limited degree.6 The most
important aspect was without doubt that of warning, or, to be more precise,
what the telegrams did not contain. Monitoring the build-up in the late spring
of 1941 for Operation Barbarossa, the Defense Staff and the government were
not only fully aware of the coming German attack against the Soviet Union,
they also knew that the German plans did not presuppose an occupation of
Sweden.7 A more direct use was made of the decrypts of the Stockholm–Berlin
242 / Wilhelm Agrell
head of the Security Police informed the prime minister about every sensitive
matter simply to keep his back clean, whereas Palm followed the opposite line
and kept away from the politicians, making all decisions by himself to grant
them solid deniability.17 As a consequence, the weak structure for intelligence
guidance became even weaker, with the government being only partially
informed or not informed at all about what the agencies were up to. One amaz-
ing example is the Swedish participation in the US–British Venona Project
dealing with the deciphering of Soviet radio communications from the 1940s.
The work in Sweden began in 1962 after an initiative from the British General
Command Headquarters, and on the Swedish side was carried out jointly by the
FRA and the Security Police. However, not only military intelligence but also
the government was kept in the dark, and it took until 1973, when the project
was almost terminated, before the chief police commissioner informed the
prime minister, who at that time was Olof Palme.18
The smooth cooperation between the FRA and the Security Police in a
concrete operational matter illustrates another aspect of the ‘‘nonsystem’’ of
Swedish intelligence: the virtually unlimited potential for informal contacts,
information exchange, and mutual support. Although the intelligence structure
as a whole lacked overall guidance, officials within the agencies could cooperate
at an operational level, to a large extent through personal contacts and mutual
trust, employing the Swedish principle of horizontal coordination (samverkan).
This was a fundamental principle in the armed forces and in the huge institu-
tional structure for total defense, established in parallel with the intelligence
agencies during World War II and preserved during the entire Cold War. Even
if intelligence was a closed domain, in some respects extremely closed, it could
nevertheless facilitate joint efforts from this culture of cooperation and coordi-
nation within the ‘‘extended family’’ of intelligence officials in neighboring
agencies. Horizontal cooperation outside the intelligence profession was far
more restricted and one-sided.
One illustrative example of these informal networks and their role in an
intelligence context occurred during a Soviet/Swedish diplomatic controversy
in 1957, initiated by a Soviet note accusing Sweden of clandestine intelligence
operations and infiltration of armed émigrés into the Baltic republics. Many
details about personnel addresses and telephone numbers were subsequently
published by Soviet newspapers, all pointing in the direction of the T-Office,
as Swedish journalists started to discover. To end this investigative journalism,
the Defense Staff gave the military representative on the Board for Psychologi-
cal Defense the task of discreetly approaching the editors in chief of the most
active newspapers, who also had wartime assignments on this board. After this,
the papers promptly stopped their investigations.19
246 / Wilhelm Agrell
event of war between east and west were ruled out. Starting in the early 1970s,
the nonalignment and subsequent self-imposed limitations were jointly
described as a ‘‘Policy of Neutrality’’ (Neutralitetspolitik).33
For Swedish intelligence, the result of this policy drift was a paradox.
Although liaison had to be carried out with discretion in the first postwar years,
it increasingly became a contradiction in terms—an officially denied activity
that, if it became known, would be impossible to defend within the neutrality
doctrine and thus could threaten to undermine the credibility of this doctrine
externally, but perhaps first of all internally, as it was perceived by the Swedish
public. However, instead of producing tight central control and a limited con-
duct of intelligence liaison, the effect became almost the opposite. On the
military operational level, the secret Western contacts were handled by a very
limited number of officials but were nevertheless regarded as so potentially dev-
astating for the Policy of Neutrality that they were gradually phased out and
the key planning documents were destroyed in the 1980s.34
Intelligence liaison in a similar way had to be limited to a small number of
officials within the agencies, and documents received through liaison were given
extremely limited circulation and a special classification, Special Intelligence
(S-underrättelser), the very existence of which was secret. Liaison, in this way,
developed into a closed subculture within the agencies, where it could not only
continue but gradually expand. When the very existence of liaison with foreign
powers finally was disclosed in 1973, the public was thoroughly unprepared, and
the supreme commander, in an attempt to play down the significance, com-
pared the practice with exchanging apples for pears. In the report of a Parlia-
mentary Commission investigating the revelations, Swedish intelligence liaison
was described as something natural and on the whole uncomplicated: The
Swedish intelligence services were comparatively small and could facilitate
exchange with others. The issue of neutrality was avoided by pointing out that
liaison had to be conducted in a way that did not harm ‘‘a third party.’’35 How
this would come about was not specified; no names of countries were men-
tioned, and the types of information exchanged were not described, except for
information concerning Swedish citizens that was not to be forwarded ‘‘except
after review in the individual case.’’36 The commission did, however, highlight
one fundamental weakness in the conduct of liaison: Because each agency
worked on its own, there was not only a lack of coordination but also a lack of
overall assessment of what material was exchanged and what the country actu-
ally received in return. However, not very much changed in the liaison struc-
ture, even if a mostly symbolic oversight body was set up by the parliament, and
it would take another twenty-five years until a small coordinating body was set
up within the Ministry of Defense.
Behind the careful wordings of the report of the 1974 Intelligence Commis-
sion, the first of its kind ever in Sweden, lay a serious structural dilemma. As
Sweden: Intelligence the Middle Way / 249
with all small states entering into nontransparent continuous intelligence coop-
eration with major powers, there was a problem of control and integrity. Thede
Palm had experienced this when he established contact with Reinhardt Gehlen
and the West German foreign intelligence service, the BND. Gehlen was eager
to place a liaison staff in Stockholm, but Palm said no, knowing that the
T-Office was a small organization that could be easily overwhelmed by requests
and initiatives from such a liaison station, which would have degraded Palm’s
staff to the role of subcontractor to BND.37
Another aspect of this structural dilemma was that the Swedish intelligence
agencies, with their limited resources and expertise, could be supplied with
material containing intentionally or unintentionally tainting assessments. It
has been argued that the United States and/or Britain could have been involved
in the alleged submarine intrusions in Swedish waters in the early 1980s.38 The
Western powers, however, had at their disposal far more effective methods for
influencing Swedish threat perceptions and strategic dispositions in the form of
the close intelligence cooperation whereby Swedish intelligence during the
same period was provided with alarming intelligence assessments concerning
Soviet aggressive aspirations in the Far North, assessments that obviously
affected the overall picture of Swedish military intelligence.39
the total defense. Although there were divisions and crossing lines of responsi-
bility among the intelligence agencies, the main divide here was the one
between the Security Police and the various actors in the defense domain.
There was certainly ongoing cooperation in specific concrete matters (samver-
kan), both formalized and informal, but the organizations on each side of the
divide were nevertheless very different in their professional outlook, with the
police being far more legalistic in their approach than military intelligence and
security. These differences, along with the existence of a gray zone of unclear
responsibility, resulted in a cautious and, as it turned out, in some cases hostile
relation at the top, fed by a fair amount of bureaucratic territoriality. An addi-
tional aspect complicating the matter was a distrust on behalf of the Social
Democratic Party organization and labor unions against the police, which was
to some extent deeply rooted in experience from political struggle and strikes
but also influenced by the more recent experience of the wartime General
Security Service, which was not always successful in separating social democrat
sympathizers from Communists and other suspicious left-wing elements. The
incentive to cooperate with the Security Police was thus limited, especially on
the local level.41
In 1951, Lieutenant Birger Elmér was employed by the Intelligence Depart-
ment and assigned the task of monitoring and analyzing Soviet propaganda
broadcasts against Sweden. Elmér had studied psychology and would later write
a doctoral dissertation on propaganda analysis. Two years later, in 1953, another
young reserve lieutenant, Olof Palme, joined the Intelligence Department, pos-
sibly influenced by a contact with Elmér, because they knew each other and
already had cooperated in intelligence-related matters. The close relationship
between the two was to prove decisive for Elmér’s career as well as for the rise
of a new secret intelligence structure.42 Contrary to most senior officers, Elmér
was an outspoken social democrat and later also acquired party membership.
Referring to these party contacts, he soon managed to make himself useful in a
number of ways. With considerable entrepreneurship, he established contacts
far above and beyond his formal position, including the social democrat minis-
ter of defense, Torsten Nilsson, the senior official of the central trade union
(Landsorganisationen), and Social Democrats in Finland, Denmark, Norway, and
Germany.
Through his party and labor union contacts, Elmér became aware of a possi-
ble solution to the problem concerning screening of suspected security risks
without relying on the Security Police. In the struggle against the Communists
for the control over local trade unions, the social democrats established in the
late 1940s a nationwide network, covering about 20,000 workplaces with party
representatives (arbetsplatsombud). Elmér’s innovative idea was to tap this net-
work of often-detailed knowledge about their adversary on the left. However,
neither the police nor the military could approach this semiclandestine party
Sweden: Intelligence the Middle Way / 251
with Elmér as its first director. With the creation of the IB began a brief inter-
lude of close but at the same time extremely nontransparent government–
intelligence relations, mostly handled on a person-to-person basis between
Elmér and Palme. If the wartime General Security Service was little known
and lacked parliamentary consent, the IB was completely detached from any
constitutional or legal framework; it was an officially nonexistent entity without
any outside insight or control and with a nondocumented information channel
directly to Palme, first as minister of education and then, starting in 1969, as
prime minister.48
If Palm was easy to get rid of, the same was not the case for the Security
Police. Thulin’s successor in 1962, P. G. Vinge, described in his memoirs the
shock he experienced when he visited ‘‘AB collector’’ and realized that Elmér
and his organization were operating as a parallel security service outside any
legal framework.49 In 1969, shortly before Erlander left office, the chief police
commissioner, Carl Persson, brought the issue to a decision. At a meeting with
Erlander, where his imminent successor, Palme, also was present, Persson asked
the prime minister if it was the Security Police or the IB that should be
entrusted with the responsibility for the country’s internal security. This was a
rhetorical question, and Erlander had to promise that the domestic intelligence
conducted by the IB would be discontinued. Elmér, furious over the decision,
was forced to comply, but without any external control of his organization, he
could simply reactivate domestic intelligence after a brief interlude.50
All this, however, came to a sudden halt in the spring of 1973, when the
Swedish left-wing magazine Folket i Bild Kulturfront published a feature story
that effectively outed large parts of the organization. As in many similar cases,
the magazine had gotten its information from an insider, an employee who had
been sacked after inventing sources and pocketing their reimbursements. This
was the end for the IB and Elmér as the first (and last) director. The now-not-
so-secret organization was restaffed and placed back under the Defense Staff,
with a role similar to that of the old T-Office. The unit changed its name
several times and finally in the 1990s, under the designation Office for Special
Collection, became a part of the newly formed Military Intelligence Directorate
(Militära Underrättelstjänsten, MUST), as an independent part of the head-
quarters. The IB was formally dissolved in 1974, but Elmér remained in the
shadows as a consultant. As a nonsocialist government entered service in 1976,
the first since the 1930s, the new minister of defense discovered that funding
was still trickling to the nonexistent IB and demanded an immediate stop to
the flow and the removal of Elmér and his old confidants from everything that
had to do with defense intelligence, something that did not stop Elmér from
remaining in the background at least to 1980, after which he retired to his farm
in southern Sweden, incidentally growing apple trees.51
Sweden: Intelligence the Middle Way / 253
reform would have demanded a full parliamentary commission, and would inevi-
tably have upset the relative balance of power that had been established after
the turbulence in the 1960s and 1970s.
The report, issued in 1999, was a typical product of the late 1990s security
agenda, stressing the need to transform intelligence from focusing on military
surveillance toward a broader span of possible future national security threats,
including support for peacekeeping operations; the flow of refugees (i.e., the
flow that Sweden had just experienced from the Balkans); transborder organized
crime; and the smuggling of components, raw materials, and the know-how
associated with weapons of mass destruction. Typically for assessments shortly
before the new millennium, international terrorism was just mentioned in pass-
ing but was not regarded as something crucial from an intelligence perspective.54
More than any other part of the Swedish intelligence structure, the FRA
had enjoyed a long period of anonymity and lack of political reform efforts
during the Cold War and beyond. Apart from the downing of a signals intelli-
gence aircraft in 1952 and a prolonged struggle by the relatives of the aircraft’s
lost crew members in the 1980s and 1990s to clarify their fate, the FRA had
remained almost totally unknown in its rural setting outside Stockholm and
monitoring stations in remote parts of the country. In official documents, it was
only mentioned in passing; the 1974 investigation only gave a brief description
of it on a single page but did disclose that its current budget showed that signals
intelligence received about 80 percent of the total share.55
That ‘‘health remains quiet’’ (Hälsan tiger still) is an old Swedish proverb,
and it probably held true for the FRA during the late Cold War. But in the
1990s things began to change on two fronts. First, the need for military surveil-
lance of the Baltic Sea region decreased due to the dismantling of the Soviet
armed forces and the independence of the Baltic states. There were far fewer
targets and activities to monitor, and far less demand from Swedish military
and political intelligence customers. This increased the relative importance of
worldwide communications intelligence, the traditional hallmark of the FRA
ever since the Swedish victory over the Geheimschreiber. This most secret
activity during the Cold War had initially been conducted through monitoring
of radio transmissions, supplemented with the access to telegraphic and telex
cable communications to and from foreign institutions in Sweden. This latter
source had been cut off in 1945, with the termination of the wartime emergency
laws, and the newly appointed foreign minister, Östen Undén, himself a profes-
sor of international law, had opposed such access on legal and ethical grounds.
But in 1948, with the Cold War in full swing, access was nevertheless granted
through a secret government decision.56
This ‘‘cable access’’ remained unknown throughout the Cold War but would
become known after fifty years, if not renewed. The significance for intelligence
Sweden: Intelligence the Middle Way / 255
collection had decreased drastically in the 1970s and 1980s with the introduc-
tion of satellite communications that could be intercepted without physical
access. In the early 1990s, the 1948 government decision was altered and the
access was terminated, an action probably dictated mainly by the government’s
fear of another intelligence scandal. From the perspective of the FRA, this
terminated access did not seem to matter particularly much. Not foreseen at
that time was the coming rapid development of the international network of
fiber-optic cables with the huge transmission capacity needed for Internet traf-
fic. Just a few years later, the FRA suddenly found itself in a situation where it
was increasingly cut off from the large telecommunication flows then moving
back from satellite links to cables. The dilemma this created was considerable.
On the one hand the FRA could continue with business as usual, but then most
likely it would lose important sources, and in the longer run also the cryptologi-
cal competence that was its backbone. On the other hand the FRA could press
the government to renew the cable access, but then risk that the whole Swedish
communications intelligence enterprise would become widely known.
The first attempt to find a way out of this dilemma was a compromise. In
2003, a one-man investigation carried out by the former supreme commander,
General Owe Wiktorin, suggested that the FRA—for the sake of protecting
information security in vital infrastructure, but also for individual citizens—
would be given access to the global telecommunications network through the
operators. The stated purpose was thus not intelligence collection but protec-
tion against hackers and other forms of hostile Internet activities. Article 8 of
the European Convention, which ensures citizens the right to private commu-
nications, was highlighted, not as an obstacle but as an argument for supervision
to protect these rights.57
External events, however, generated a serious crack in the silent consensus
necessary to solve the signals intelligence dilemma in a smooth and, as it was
intended, discreet way. Although not directly affecting Swedish security, the
September 11, 2001, terrorist attacks on the United States nevertheless
increased the threat of terrorism, or rather the perceived scale of a possible
attack. This inevitably reactivated an old controversy in Sweden dating from
the 1930s over the dividing line between the armed forces and the police. Until
then, the armed forces had been ruled out for internal police tasks, even in case
of severe crimes such as terrorist attacks. But terrorists using aircraft or having
at their disposal advanced weapons could not be handled by the police. This
problem was transferred to an investigation (11 September-Utredningen), but
the underlying latent conflict between the defense and the police proved hard
to overcome, even though both sides realized that this had to be done.58 It took
five years until the tug of war was decided, mainly in favor of the police. A law
passed in 2006 mandated that military resources could be employed in extreme
situations, when resources not available to the police were demanded. But in
256 / Wilhelm Agrell
these contingencies, the police would still be in charge and the military support
would be under their command.59
Although not primarily dealing with the intelligence aspects of possible
attacks by international terrorist, the conflict over the ‘‘ownership’’ of the ter-
rorism threat nevertheless rapidly spilled over to the intelligence domain, and
thus it fed underlying structural conflicts within the defense intelligence agen-
cies and between defense intelligence as such and the Security Police, which
since the mid-1990s had been supplemented by Criminal Police Intelligence.
This latter conflict rapidly escalated to the political level, where it caused grow-
ing friction between the Ministry of Defense and the Ministry of Justice.
All this occurred behind the scenes and remained almost completely invisi-
ble to those not directly concerned until the autumn of 2007. There were two
interlinked territorial conflicts. The first concerned the secret intelligence
department, the Office for Special Collection. This was basically the only pro-
ducer of raw intelligence within MUST, besides the service attachés controlled
by the directorate itself. Otherwise, MUST was dependent on other intelli-
gence producers, first of all the FRA and the Ministry of Foreign Affairs. The
FRA had, shortly after World War II, suggested reorganizing to a centralized
collection agency whereby the FRA would take over photo-intelligence (at that
time run by the brother of the FRA director) and the unwanted baby, the
C-Bureau. The High Command had at that time stopped all such plans, but in
the late 1990s they resurfaced, now against the background of a transforming
and widening role for national intelligence, whereby the efforts of the collect-
ing agencies had to become more closely coordinated—or so it was argued. A
less altruistic reason could have been that all the intelligence agencies now had
problems remaining relevant from a customer’s perspective.
The second territorial aspect of this silently prepared reshuffling was the
transformation of secret intelligence, from the traditional Cold War foreign
intelligence collection focused on the East, to a more general intelligence col-
lection agency, with the capacity to run sources and collect information con-
cerning the whole span of transborder threats. But there were two caveats. The
first one was a bill passed in 2000, the first ever regulating defense intelligence,
which—as it soon turned out, rather unfortunately—explicitly limited the
scope of defense intelligence to the surveying of external military threats against
the nation, thereby excluding almost all the new transborder threats, leaving
them to the police, customs, and other civilian agencies. The second obstacle,
once again far more difficult to overcome, was the Security Police.
In 2007, after several years of in-house processing in the Ministry of Defense
and Ministry of Justice, the government was finally prepared to propose a pack-
age solution, containing three interlinked new or rewritten laws.60 The first was
new wording in the Law of Defense Intelligence that replaced ‘‘external military
threats’’ with ‘‘external threats,’’ a seemingly minor change, but as it emerged
Sweden: Intelligence the Middle Way / 257
one with wide-ranging implications. The second part of the package was a
brand-new Law of Signals Intelligence, the first one ever in Sweden. The law’s
text, which was very brief and did not even mention the FRA, nevertheless
contained the important clarification that signals intelligence also could be
collected in all types of transmission, including in cables crossing the national
border. Permission nevertheless had to be given by a new board, but signals
intelligence collection did not like the well-established police wiretapping
court order, because it was a part of Defense Intelligence (as now defined) and
not law enforcement. Finally, the package’s third part was an addendum to a
law on electronic communication, containing an obligation for telecommuni-
cations operators to make their cross-border traffic available at certain tapping
points, an instruction not entirely unlike the 1939 emergency legislation mak-
ing the diplomatic cable traffic available to the Defense Staff’s Cryptographic
Department. The main reasons behind this proposed package of laws were pre-
sented as legalistic ones because Sweden, like the United Kingdom and Ger-
many, had to comply with the European Convention, which stipulated that the
rights of citizens in accordance with Article 8 had to be supported in law.
Although important for its legal rationale, the regained cable access was never-
theless the crucial issue from an intelligence perspective.
In the summer of 2008, the government was finally prepared to present the
bill to Parliament. The tug-of-war had by then burst into the open, with the
chief police commissioner, echoing Carl Persson in 1969, firmly opposing the
bill as a threat to individual integrity and a reopened door to domestic military
intelligence with a resemblance to the IB. On June 18, with the summer holiday
only days away, the Swedish parliament was supposed to pass the bill without
undue delay and lengthy debates. However, what from the beginning had been
presented as a minor technical and legal matter had by now transformed into a
major public controversy, fed by widespread fear of massive eavesdropping and
the reestablishment of the Cold War surveillance system, now in the name of
protection against terrorism. Facing a possible defeat, to persuade rebels on the
government benches to vote in favor, the government had to add a long list of
concessions that proved very difficult to include in a new, modified bill on
tightened procedures for approval, improved control, and limited access to sig-
nals intelligence as a source. One of the concessions was the promise to deprive
the Security Police of the right to file requests for signals intelligence, a decision
that was heavily questioned after the narrowly misfired suicide bomber attack
in central Stockholm on December 11, 2010.61
In July 2008, in the midst of the public and political turmoil over the ‘‘Cable
Law,’’ a group of US antiterrorist officials visited Sweden on a rather delicate
mission. The terrorist-screening information-negotiating team was to negotiate
the terms for Swedish adherence to the US Enhanced Visa Waiver Program,
which in practice meant concluding a formal agreement on the exchange of
258 / Wilhelm Agrell
solid potential for public acceptance, neither of which seemed at hand in the
period after World War II when no imminent security threat had profoundly
altered the underlying premises.
However, being Sweden, there were nearly always ways of muddling through,
also in the face of political confusion, agency rivalry, and more or less wide-
spread mistrust among the public. Even at the height of the conflict between
the IB and the Security Police, the former continued to send its reports from
domestic surveillance to the latter, where they were duly filed in the Central
Registry under the source cover name Erik. Two of Elmér’s key subordinates also
regularly had lunch at an officers’ club in Stockholm with an inspector from
the Security Police, where they informally exchanged information and mutual
requests.64
The outcome of the parliamentary clash over the Cable Law in 2008 was a
typical political compromise where both sides had to make concessions in order
to gain something. From an intelligence perspective, however, the outcome was
disastrously dysfunctional, because it deprived the Security Police of the right
to request (although not receive) signals intelligence material from the FRA.
During the Cold War this would have been of limited importance, given that
the Security Police then relied most on other sources and anyway had their
own Radio Control Department to monitor radio communications associated
with foreign intelligence activities. In the new security environment, however,
the worldwide monitoring of telephone and Internet traffic was an essential
tool, and the lack of this would threaten to virtually blind first of all counterter-
rorism efforts.
In 2009, shortly after the Cable Law controversy, a permanent National
Center for Threat Assessments that was focused on terrorism was established at
the Security Police with representatives from the FRA and MUST. This was the
first attempt ever not only to institutionalize the informal links across agency
boundaries but also to jointly assess and grade threats against Sweden and Swed-
ish interests. But the National Center for Threat Assessments also meant that
analysts for the first time not only met but worked together. Although not
officially admitted, the effort thereby quietly solved the signals intelligence
dilemma. Although the Security Police had been removed from the customer
list, the Intelligence Directorate had remained. With the new definition of
defense intelligence, the directorate was tasked with the monitoring of external
threats, including terrorism on the international scene, with a subsequent need
for signals intelligence coverage that was in principle identical to that of the
Security Police. The overlapping tasks that had so infuriated the chief police
commissioner in 2007 thus, as events unfolded, offered a smooth, informal way
out of the unwanted cul-de-sac of the rewritten Cable Law.
260 / Wilhelm Agrell
Epigraph
Quotation from the English translation of the novel by Yvonne L. Sandstroem (Columbia:
Camden House, 1992), 217.
Notes
1. Probably the most valuable intelligence channel was the Swedish Berlin legation,
where the naval attaché, Captain Forshell, had very close contacts with senior officers in the
German Naval Command. Wilhelm Carlgren, Svensk underrättelsetjänst 1939–1954 (Stock-
holm: Liber, 1985), 26.
2. Ibid., 13–16.
3. On Beurling, see Bengt Beckman, Svenska kryptobedrifter (Stockholm: Bonniers,
1996).
4. For the development and result of the signals intelligence, see C. G. McKay and Bengt
Beckman, Swedish Signals Intelligence 1900–1945 (London: Frank Cass, 2003).
5. For the circumstances around the German discovery and countermeasures, see McKay
and Beckman, Swedish Signals Intelligence, 219–22.
6. On the content of the German traffic, see Klaus-Richard Böhme, Kryposektion IV:
Försvarsstaben läser hemliga tyska telegram 1941–42 (Stockholm: Ersatz, 2006). Carlgren,
Svensk underrättelsetjänst, 71, observes that no initiative was taken for a joint Defense Staff–
Foreign Ministry evaluation and that the material, as other types of raw intelligence, was
assumed to speak for itself.
7. Carlgren, Svensk underrättelsetjänst, 71–80.
8. McKay and Beckman, Swedish Signals Intelligence, 163–64, quoting the memoirs of the
undersecretary of state Eric Boheman, relating a case where Boheman could use the decrypts
to check how the German minister had ‘‘improved’’ the outcome of a diplomatic demarche.
9. The Parliamentary Investigative Commission on refugee matters and Security Service
(the Sandler Commission) produced three reports, on refugee matters (Statens Offentliga
Utredningar, or Official Reports of the Swedish Government; hereafter SOU 1946:36), on
information provided Germany on refugees (SOU 1946:93) and finally on the Security Ser-
vice itself (1948:7). Strangely enough there is not a single scholarly work devoted to the
history and operations of the General Security Service, the only overview being a chapter
in a dissertation in criminology on the conduct of the Swedish legal system under emergency
conditions, based mainly on the Sandler Commission. Janne Flyghed, Rättsstat i Kris (Stock-
holm: Federativ, 1992), 265–338.
10. On the reestablishment of secret intelligence, see the memoirs of Thede Palm, Några
studier till T-kontorets historia (Stockholm: Kungl.Samfundet för utgivande av handskrifter
rörande Skandinaviens historia, 1999).
11. The hazards of being too invisible was illustrated in the Wennerstöm case, where the
eventually decisive information from the colonel’s observant cleaning lady was considerably
delayed due to the lack of a ‘‘Säpo’’ entry in the Stockholm telephone directory.
12. It was not until the 1980s that the full extent of the cryptologic achievements against
the German traffic became public. The first summary of the material was given by Carlgren,
Svensk underrättelsetjänst, and a more comprehensive and technical account was given by
Beckman, Svenska kryptobedrifter.
13. Niklas Wikström, Den svenska militära underrättelsetjänsten 1948–1956 (Stockholm:
Swedish National Defense College, 2006), 127–31. In his review of the military intelligence
Sweden: Intelligence the Middle Way / 261
in the first decade of the Cold War, Wikström concludes that the leading members of the
government neither appear to have been particularly informed nor interested in intelligence
matters and formed their opinion independently of intelligence assessments.
14. Palm, Några studier, 97. There are even fewer references in Erlander’s diaries, so far
published up to 1961.
15. On Palme and his early career, see Kjell Östberg, I takt med tiden: Olof Palme 1927–
1969 (Stockholm: Leopard, 2008). For early intelligence contacts as a student politician, see
Karen Paget, ‘‘From Stockholm to Leiden: The CIA’s Role in the Formation of the Interna-
tional Student Conference,’’ Intelligence and National Security 10, no. 2 (2003): 134–67.
16. Prime Minister Erlander commented on the matter in his private diary. Tage Erlander,
Dagböcker 1950–1951, entry 757 (Hedemora: Gidlunds, 2001).
17. Palm, Några studier, 97. As an example, he refers to the decision to invite Reinhard
Gehlen to Sweden on a clandestine visit to establish liaison between the T-Office and BND,
a case where it was better for the government to be kept in the dark.
18. Wilhelm Agrell, Venona: Spåren från ett underrättelsekrig (Lund: Historiska Media,
2003). A shorter version will become available in English.
19. The incident is described in the diary of the chief of the Defense Staff, Major General
Richard Åkerman, September 3, 1957, Richard Åkerman’s personal archive, War Archive,
Stockholm.
20. For a more detailed account of the foreign liaison, see Wilhelm Agrell, ‘‘Sweden and
the Dilemmas of Neutral Intelligence Liaison,’’ and Magnus Petersson, ‘‘The Scandinavian
Triangle: Danish–Norwegian–Swedish Military Intelligence Cooperation and Swedish
Security Policy during the First Part of the Cold War,’’ both in Journal of Strategic Studies 29,
no. 4 (2006): 607–51.
21. Carlgren, Svensk underrättelsetjänst, 15.
22. On the Office of Strategic Services in Scandinavia, see Tore Pryser, USAs hemmelige
agenter: Den amerikanske etteretningstjenesten i Norden under andre verdenskrig (Oslo: Universi-
tetsforlaget, 2010).
23. Wilhelm Agrell, Den stora lögnen (Stockholm: Ordfront, 1991), 126. The arrange-
ment was established on British initiative and approved by the Swedish undersecretary of
state. The Defense Staff, however, when informing the regional military command, did not
mention intelligence collection but described the operation as an experiment carried out by
the air force on a radar station with the support of some British technical experts.
24. For a detailed account on the collection of maritime intelligence in the first postwar
years, see Sam Nilsson, Stalin’s Baltic Fleet and Palm’s T-Office: Two Sides in the Emerging Cold
War 1946–1947 (Stockholm: Swedish National Defense College, 2006).
25. Petersson, ‘‘Scandinavian Triangle,’’ 612–14.
26. Notes from meeting September 25, 1946, signed by Colonel Juhlin-Dannfelt, head of
Section II at the Defense Staff. Former top secret documents of the head of the section,
Royal War Archives (Krigsarkivet), Stockholm.
27. Letter from Major General George C. McDonald, US Air Force, Director of Intelli-
gence to Military Attaché, Stockholm, November 20, 1947, RG 341, entry 214, box 39, US
National Archives (NA), College Park, MD.
28. Memorandum for Record, Lieutenant Colonel Fuller, September 11, 1947, RG 341,
entry 214, box 39, NA, College Park, MD.
29. For the early Swedish aerial reconnaissance missions, see Lennart Andersson and Leif
Hellström, Bortom horisonten: Svensk flygspaning mot Sovjetunionen 1946–1952 (Stockholm:
Freddy Stenboms förlag, 2002).
262 / Wilhelm Agrell
I
n the domain of international intelligence, Finland offers a perspective into
a developing intelligence culture with the potential to facilitate change in
how intelligence is perceived and practiced by a small nation. Finland has
no civilian domestic or foreign intelligence service. The national intelligence
machinery is divided between the Finnish Defense Forces and the Police of
Finland. The Finnish Security Intelligence Service, previously known in
English as the Finnish Security Police (Suojelupoliisi, Supo) is the operational
security authority that has performed the tasks of counterespionage, counterter-
rorism, and security work in Finland since 1949.1 The service is a part of the
Finnish Police. The Finnish Military Intelligence Center (FINMIC, Puolustus-
voimien tiedustelukeskus) is a unit of the Defense Command of Finland and its
Intelligence Division. FINMIC analyzes Finland’s security environment as well
as the operating environment of the Defense Forces. The Finnish Intelligence
Research Establishment (Viestikoelaitos) is the signals intelligence unit of the
Finnish Defense Forces, which functions under the Finnish Air Force. Finland
is a nonaligned country that participates in the NATO Partnership for Peace
program.
/ 265 /
266 / Lauri Holmström
information. This has left the national intelligence agencies that deal with
economic espionage with the difficult challenge of separating normal working
relationships from those that have a potential to turn into a security risk.18 In
the case of high technology, research that is based on international collabora-
tion can make it very hard to determine what specific information should be
protected in projects that stretch over a long period and may involve a number
of people from different organizations. Changes in the post–Cold War global
economy have shifted intelligence priorities toward high-technology industries
and research institutes.19 In Finland this has been significant because of the
large investments in research and development in high technology.
After the Cold War the level of foreign intelligence in Finland increased
from the second half of the 1990s to the early years of the 2000s. In 2006, the
number of foreign intelligence officers grew a little but did not affect the num-
ber of aggressive recruitment cases.20 During recent years both the quantity and
quality of foreign intelligence officers operating in Finland have stayed the
same. The main foreign intelligence offensive in Finland is aimed at key areas
of high-technology research and development and the political system. Lately,
issues such as the international energy questions, which encompass both politi-
cal and technological questions, have also been targets of foreign intelligence.
Scientific and technological intelligence efforts in Finland are characterized by
a very wide gathering of open-source intelligence, with targets ranging from
universities to small companies. Because of the extreme care taken in the selec-
tion of both the desired technology and the key persons connected to it, recruit-
ment efforts have been relatively rare; but a few cases surface each year. In 2010,
Supo conducted an investigation into a few intelligence operations abroad that
had targeted Finnish official representatives, civil servants, and businesspeople
more aggressively than what had been previously observed.21
Foreign intelligence has been particularly interested in high-technology sec-
tors that have dual-use capabilities, such as telecommunications and informa-
tion technology. Other important targets of economic espionage include
nuclear technology, biotechnology, medical science and pharmacy, new materi-
als, nanotechnology, and positioning technology. Constant targets for foreign
military intelligence involve technological purchases that can be considered
interesting from the military perspective as well as assessing Finland’s military
capability, defense policy, and international military cooperation. The foreign
intelligence services operating in Finland prioritized confidential conversations,
situational estimates nearing completion, and plans on which work was still
being done. In addition, foreign intelligence officers have targeted the coopera-
tion between business and research that seeks to produce practical, marketable
applications. The constant level of foreign intelligence in Finland shows that
gathering secret and confidential information through human sources has not
lost its meaning in the modern world. At the same time, organized crime and
Intelligence Culture, Economic Espionage, and the Finnish Security Intelligence Service / 271
intelligence attacks against information systems pose a new and growing threat.
In 2007, about 10 percent of the Finnish companies interviewed by Supo said
that they had been a target of illegal intelligence activity during the last two
years. Similar numbers were reported in a survey conducted by the Central
Chamber of Commerce of Finland and the Helsinki Region Chamber of Com-
merce in 2008.22
The Finnish economy relies increasingly on technological innovations. In
the view of Supo, protecting research, innovations, and other relevant informa-
tion related to the field will become even more significant in the future than it
is today.23 Innovative companies are the main drivers of Finland’s economy, and
technology has become the most important industry in Finland. It constitutes
60 percent of Finnish exports, and 80 percent of research-and-development
investments are directed toward technology.24 Remarkable technological
advances of intellectual property in Finland have been achieved through close
cooperation between the state, the research centers, and the companies. This
has been made possible by the continued emphasis placed on higher education
and by the creation and development of a national innovation system.25 Inno-
vation has been integral in the restructuring of the Finnish economy. During
the past twenty years the research-and-development intensity of Finland has
grown to the second-highest level within the European Union, and the share
of high-technology products in total Finnish exports is among the highest in
the industrial world.26
The international competitiveness of Finland is linked to the rise of high-
technology companies and the emergence of a knowledge-based economy. A
modern technology policy that has been a priority for the political leadership
is responsible for advancing economic growth through technological develop-
ment. Economic espionage corrodes the national investment and innovation
frameworks supported by the state and causes financial and intellectual losses
to companies and research centers. Economic espionage can also act as a deter-
rent to innovation and may in the long run even cause losses to consumers
around the world.27 Both national and international companies look for a stable
and secure environment in which to base their operations. Security can, in this
regard, be viewed as one of the building blocks of Finland’s competitiveness in
the global economy.
The counterespionage and preventive security work of Supo related to the
problem of economic espionage has its starting point in the idea that the entire
national innovation system is protected. The basis for this work is laid out in
threat analyses. The agency builds on this through the consultation and vetting
services that place Supo in cooperation with businesses on a daily basis. In
addition to these means, the operational security work of Supo’s Counterespio-
nage Unit is focused on the intelligence threats aimed at the Finnish economy.
272 / Lauri Holmström
The service also works closely with international security and intelligence ser-
vices and security authorities.28 The challenge for Supo is twofold. First, it needs
to continue to effectively and openly inform and serve companies and other
communities targeted by economic espionage and other security challenges
such as proliferation issues. Second, it needs to secure its own operations against
illegal economic intelligence efforts while performing its overt functions related
to economic security. It is important to note here that Supo does not investigate
instances of corporate espionage where both parties are privately owned compa-
nies. The matter becomes an interest of the agency only when a foreign state is
connected to the case. Countering economic espionage has also been publicly
recognized by Supo’s leadership as one of its main priorities.29 During the years
2003–8, the prevention of illegal intelligence was awarded the most resources
in Supo’s budget. In 2010, a total of 39 percent of the resources allocated to
the agency were assigned to the prevention of illegal intelligence efforts.30
strategy. This is perhaps most clearly visible in the role that preventive security
work has in the day-to-day workings of the agency. Active engagement with
Finnish society and especially the private sector can be seen as an effort to
continue the practices of the Cold War era into the twenty-first century. They
also represent a part of the larger national security culture of Finland, where
the police and armed forces have the monopoly on intelligence matters and
have historically been involved with all segments of society in the name of
national security. An example of this larger engagement from the perspective
of the Finnish Defense Forces is the institution of the National Defense
Courses, where high-ranking military officials and public leaders are invited to
a series of courses at the National Defense University (Maanpuolustuskorkea-
koulu) that focus on Finland’s current and emerging security challenges. The
courses comprise Finnish foreign, security, and defense policies as well as the
capabilities of the Finnish Defense Forces to meet the requirements recognized
by the political leadership. Finland’s integration into Europe since the 1990s
has been largely political and economic. Supo’s role in countering economic
espionage can be seen to connect to that objective in three ways. First, the work
of the agency seeks to secure the competitiveness of the companies deemed
important to Finland. Second, a functioning and secure business life makes it
easier for the government to be a credible political player in the European
Union. And third, Supo’s leadership has ensured that this element of continu-
ity is present in the agency’s strategy.
In chapter 2, Stephen Welch contrasts the theories of Gabriel Almond and
Robert Tucker that put forward the following ideas about political culture and
its research. In Almond’s view, political culture is at least partly an indepen-
dent variable that correlates with democratic stability. To be further used in
research, political culture must be ‘‘operationalized,’’ for example, in the form
of an attitude survey, which is a quantifiable mode of measurement. Through
operationalization it is possible to separate the concept of political culture
from ‘‘the general culture.’’33 Conversely, Tucker understands the concept of
political culture to be important for helping researchers formulate meaningful
questions, focus on relevant issues, work with data, and approach the study of
society and its political life in general without explaining anything itself.34
Welch also notes that political culture should not be understood to be the
same as public opinion. Whereas political culture can be used to explain larger
issues, such as the continued support for democracy as the means of gover-
nance, public opinion functions inside the political culture of a nation-state,
where it has an effect on, for example, who is elected to power.35 However, as
Philip Davies has noted in his research on intelligence culture and intelligence
failure, theories of culture are complicated to operationalize and test with any
real degree of diligence.36
274 / Lauri Holmström
stable social unit. To study organizational culture one must recognize the special
features of the subject of interest. These features can best be observed through
the past accounts, actions, and personal histories of important figures in the
organization. The study of organizational culture must therefore be viewed as
historical in its nature.39
The idea of leadership as the most intrinsic part of organizational culture is
one of the core themes in Schein’s thinking. In Schein’s view it is important
to understand how the individual intentions of an organization’s founders and
leaders have become a shared and consensually validated set of definitions that
are adopted by the organization and passed on to its new members.40 The role
of leadership in Supo is naturally strong because of its modest size. The effects
of decisions made at the top level are felt quickly, and the director can put his
personal touch on the way most things are run. Supo’s leadership is responsible
for recognizing, upholding, and developing its intelligence culture, which
encompasses both past and present as well as future ideas of what the service
does and how it achieves its goals. This strategic vision is then manifested at
Supo’s operational levels, which can be further acknowledged as embodying the
Finnish conception of security intelligence at work.
However, because behavioral regularities alone cannot inform us if we are
investigating a cultural artifact, it is only by the discovery of deeper cultural
levels that underlie all human interaction that we can begin to distinguish
between what is and what is not an artifact of the culture in question.41 To
solve this problem, here the choice has been made to examine the intelligence
culture of Supo through the dependent variable of security intelligence as it is
understood by the service. Supo defines security intelligence as the ‘‘identifica-
tion of internal and external security threats, the related operational informa-
tion gathering and analysis, and the timely reporting of resulting intelligence
information to support decision making.’’42 Davies has studied intelligence cul-
ture and compared intelligence failure in Britain and the United States. He has
observed that, in comparing national ideas of intelligence, in the American
view information is an element of intelligence, whereas the British understand-
ing is that intelligence is a specific type of information. This is not just a seman-
tic difference, as Davies points out, for it has extensive institutional
implications. The contrast between these two definitions is an example of how
the idea of what we define as intelligence is reflected in the way an intelligence
organization based on that interpretation of the concept is formed and func-
tions.43 In this regard Supo’s definition of security intelligence is closer to the
British than the American concept. In Davies’s view, the British definition of
intelligence points toward an integrative intelligence culture that is prone to
groupthink. The opposite American definition of intelligence would lead
toward a disintegrative culture that is characterized by turf wars.44 However,
276 / Lauri Holmström
Supo’s definition also takes into consideration the process that produces action-
able intelligence for the decision maker. It is therefore more of a description of
the agency’s mode of operation, in which intelligence information plays a role
more than a specific definition of intelligence itself.
Defining security intelligence as the mode of operation can deliver two
changes for Supo. It can be argued that the definition and its implementation
into Supo’s processes can increase the service’s self-understanding, which in
turn can be helpful in achieving its leadership’s strategic goals. The other possi-
ble transformation is related to how the agency is perceived in the international
field of operations by fellow security and intelligence services. This will almost
certainly also have an effect on how Supo will see itself as a part of the interna-
tional intelligence community in the future.45
One of the main arguments presented by Welch in chapter 2 is that the
research of any applied culture, such as intelligence culture, does not require
an understanding of the larger culture in which the intelligence culture is based.
Even when one examines a closed organization or a group such as the intelli-
gence agency of a particular nation, one is still in essence trying to bring into
focus the characteristics of an evolving social unit that is attached to a larger
host culture. In a limited analysis such as this chapter’s, it is not meaningful
or even possible to dig deeply into Finnish strategic culture and examine its
manifestations of norms, values, and practices in public administration in the
past or the present. Welch has further noted that this would likely not be
fruitful anyway, because in many cases the cultural values of a nation are
expressed in situations where, for example, the people of a given agency are
being tasked with comparing their organizational practices with those of other
agencies. He further asserts that the study of intelligence culture can be
advanced somewhat separately from the larger debate on scholarly cultural
analysis and need not wait for its resolution. This can be done by focusing on
things such as the organizational designs, mandates, and customs that all form
a part of the intelligence culture of an agency. Welch also highlights special
‘‘points of friction’’ between different practices and ways of accounting for them
inside an intelligence organization as the most fruitful place to begin research
on intelligence culture. By examining these friction points, ‘‘national,’’ ‘‘intelli-
gence,’’ ‘‘agency,’’ or some other characteristics of behavior will rise to the fore,
depending on the nature of the possible dissent as described by the friction
point.
With regard to Supo, the relationship between its cautious openness and its
security of operational activities and international relations is perhaps the most
visible point of entry for the researcher. Its new and cautiously open policy has
made Supo a visible participant in Finnish public discussions that are related
to its areas of expertise. This change has been felt especially in media inquiries
related to terrorism. The risk is that the media can get lost in the details, take
Intelligence Culture, Economic Espionage, and the Finnish Security Intelligence Service / 277
them out of their original context, and use them to create journalistic products
that can have a negative effect on the public—with Supo left to weather the
possible fallout. The reverse side of this phenomenon is the situation where
media pressures can possibly hamper Supo’s operational activities and attempt
to steer the course of its work.46 As Schein has noted, organizational culture
can also be addressed through the atmosphere that is perceived outside Supo.
According to a recent survey (2011), 78 percent of Finns think that Supo has
performed its duties either very well or somewhat well. In addition, 85 percent
of those interviewed said that their confidence in Supo was either high or rather
high.47 This would put the service in a good position to deal with outside pres-
sures from a cultural point of view.
As was noted above, defining the concept of security intelligence can facili-
tate changes in how Supo reflects on itself and how it is perceived by others.
However, if one tries to impose these ideas on a possible but ultimately hypo-
thetical projection of the future, no tangible results can be expected. In the
case of Supo it can be argued that it has been useful to adopt an actionable
term that in some way illustrates the change in its model of operations from a
security police force to a security service. It is nonetheless an entirely different
idea to attempt to measure the possible effect of a theoretical concept in Supo’s
day-to-day workings. In a bureaucratic organization it will always take time
before new ideas and customs are fully absorbed and adopted.48 The culture of
Supo affects essentially all its functions and has a direct impact on the results
it achieves. One friction point in the evolution of Supo’s intelligence culture
can be thought to be the gradual replacement of the old, unified, and strong
organizational culture by something new in the future. There are two main
reasons for this development: the change in the weight and importance of
Supo’s operational units, and the strategic move made by its leadership toward
more of a security service operational model. One of the special features of
Supo’s culture is the strong traditions of a police organization, which the service
still very much follows. In the international field of operations, Supo is still
thought of as an internal security police force, and this is also reflected in its
culture and customs. Thus, the discrepancy between how Supo views itself and
how it is seen by other services will also influence the development of its intelli-
gence culture—especially on the level of international relations. From the point
of view of organizational culture, Supo’s intelligence culture can thus be under-
stood as the organization’s self-conception as an actor in both the national and
international spheres of operations.49
Conclusion
What, then, is the essence of Finnish intelligence culture as represented by
Supo, and how does it relate to the problem of economic espionage in Finland?
278 / Lauri Holmström
If we take as our starting point the notion that an intelligence culture is pro-
jected in the outcomes of the intelligence system it represents, we can answer
this question in a way that is supported by factual evidence and does not require
an extensive theoretical framework to function. Supo’s work on preventing ille-
gal economic intelligence is based on the concept that the entire national
innovation system is protected. This strategic objective has been on the agenda
of the agency throughout its existence in different forms. The consultation and
vetting services represent a part of the culture of the service that seeks to engage
with the society it serves. The operational security work constitutes another
dimension of the culture of the agency, but recent activities in this area can
only be researched through the perspective of intelligence theory or specific
case studies based on publicly available material.50
The role of leadership and the form and functions of organizational design
also influence Supo’s intelligence culture. Historically, the fact that much
emphasis has been placed on countering economic espionage must be under-
stood to be a product of the continuity in Supo’s work and culture. The legacy
of the Cold War naturally carries a lot of weight for the organizational culture
in Finnish intelligence, but it can be argued that Supo’s management in the
post–Cold War period has fused together elements of the old culture with new
administrative practices and a modern mode of operation that have created a
more international machinery for Finnish security intelligence. It can be fur-
ther asserted that Supo’s intelligence culture, as well as its actions, also reflect
deeper Finnish cultural values and the traditions of Finnish grand strategy. The
future will show how durable the concept of security intelligence will be for
Supo, and how the concept itself will evolve in relation to the agency’s
organization.
It can be argued that both Supo and its intelligence culture are currently in
a period of transition. To a large extent the agency is still acting as it did during
the Cold War. This also applies to Supo’s actions with regard to countering
economic espionage. The position and functions of the service in Finnish soci-
ety, the durability of the old security police force’s philosophy in the workings
of the agency, and the strong role of preventive security work are all proof of
this reasoning. However, the advent of a new culture that is oriented toward
security intelligence, as instigated by the leadership of the service, has placed
the old culture on a collision course with the new culture. How this issue is
resolved will not only be decided inside Supo; it will probably also have an
impact and in turn be influenced by the major trends in Finnish grand strategy
and especially how Finland approaches questions of intelligence and security in
the near future.
It is also entirely feasible that the emergence of a new Supo intelligence
culture will not achieve a lasting impact on the way the agency acts or perceives
itself among international security and intelligence services. In that situation,
Intelligence Culture, Economic Espionage, and the Finnish Security Intelligence Service / 279
the nascent Supo intelligence culture would also have no influence on the evo-
lution of other Finnish intelligence institutions. However, an enduring change
in the development of the Finnish intelligence culture could facilitate broader
transformations in how intelligence is understood and used by the Finnish gov-
ernment to support decision making, how the Finnish national intelligence
actors identify themselves and their tasks, and how the Finnish national intelli-
gence organizations continue to progress as institutions in the future. This
development would also support the Finnish grand strategy. After the Cold
War Finland quickly exchanged its policy of neutrality for rapid political and
economical integration with Europe. The chosen means were different, but the
historical goal of defending republicanism stayed the same. In much the same
way it is possible that in the future new practices and instruments could be used
to drive Finnish strategic aims with regard to intelligence and security.
When setting requirements and priorities for the intelligence process, the
first priority is the definition of intelligence.51 Supo has now taken this step
with its description of security intelligence. The need for efficient intelligence
machinery in Finland will grow in the future. If this challenge is to be met in a
decisive manner, a functioning, specific law on intelligence must be enacted. It
can be argued that one of the roles of an emergent intelligence culture is to
assist the organization it serves to better understand how it can reach its strate-
gic goals in operational terms now and in the future. Without a working culture
of intelligence, a state’s security apparatus is in danger of falling into a situation
of constrained existence while becoming disconnected from the society it is
tasked to protect. Anssi Kullberg has identified this issue in his research on
Finland and terrorism. On the state of intelligence in Finland, he writes: ‘‘The
two basic levels of intelligence, gathering and analysis of information, must not
be overwhelmed by burgeoning bureaucratic processes and coordinating efforts.
Intelligence should not be regarded as spying or as criminal investigation but
rather as a natural part of sophisticated activities carried out by the authorities
of an independent country. Without such intelligence, decision making is based
on vague assumptions, panic reactions, and outside impulses, which all may
lead to miscalculations and, in the worst case, to miscarriages of justice.’’52
Although Supo’s intelligence culture does not necessarily explain anything
by itself, one can use it as a tool for gaining a deeper understanding of specific
intelligence issues by studying the history, organization, and operations of the
agency on a clearly defined field or through a case study on a subject such as
the prevention of economic espionage against high-technology targets.53 For
more relevance and usefulness, this kind of research should also be comparative.
As noted above, the most logical context for this would be the intelligence
agencies of the other Nordic countries or other European nations with the same
type of security intelligence system as Finland. In addition, if Finnish strategic
culture is thought of as a variation of Nordic strategic cultures, this might also
280 / Lauri Holmström
Notes
1. In Finnish, the service still uses its old name, Suojelupoliisi. In English, the acronym
Supo is also in use, despite the new official name of the agency, which has been in use since
August 27, 2010. In this chapter Supo is used in both past and current contexts as instructed
by the service.
2. The author is grateful for the kind and generous cooperation of Supo with regard to
this chapter. The views conveyed here are the author’s own and do not represent the official
position of Supo. The official documents and reports of Supo and the Swedish Security
Police (Säkerhetspolisen, SÄPO) have been made available on the web pages of the respec-
tive services. However, they have also been published as printed sources. The decision has
been made to refer to them as documents authored by the agency in question and by simply
using the title of the source.
3. Finnish Security Intelligence Service, 2011; Finnish Security Intelligence Service Annual
Report 2010; Finnish Security Police 2008–10; Finnish Security Intelligence Service, 2011.
All available at www.suojelupoliisi.fi.
4. Act on Police Administration, section 10. The updated Finnish version of the law is
found on Finlex, 2011, www.finlex.fi/fi/laki/ajantasa/1992/19920110.
5. Kimmo Rentola, ‘‘Suojelupoliisi kylmässä sodassa 1949–1991,’’ in Ratakatu 12: Suojel-
upoliisi 1949–2009 (The Security Police in the Cold War 1949–1991, in Ratakatu 12: The
Security Police 1949–2009), edited by Matti Simola (Hämeenlinna: WSOY, Kariston Kirja-
paino Oy, 2009). The two earlier volumes on the history of Supo are Matti Simola and Jukka
Salovaara, eds., Turvallisuuspoliisi 75 vuotta (Security Police 75 Years) (Helsinki: Painatusk-
eskus Oy, 1994); and Matti Simola and Tuulia Sirvio, eds., Isänmaan puolesta: Suojelupoliisi
50 vuotta (For the Fatherland: The Security Police 50 Years) (Jyväskylä: Gummerus Kirja-
paino Oy, 1999). At the moment there are no major historical sources in English that deal
with Supo.
6. Rentola, ’’Suojelupoliisi kylmässä sodassa,’’ 159.
7. Ibid., 153–58; Kimmo Rentola, ‘‘Cooperation between Enemies: The Finnish Security
Police and the KGB,’’ draft of article presented at Norcencowar Workshop, Seili, Turku
Archipelago, June 28–30, 2010.
8. Matti Simola, ‘‘Suojelupoliisin organisaatio 1992–2009’’ (The Organization of the
Security Police 1992–2009), in Ratakatu 12, ed. Simola. For accounts of earlier organiza-
tional history of Finnish security intelligence, see Matti Simola, ‘‘Toimitiloista ja viimeisten
vuosikymmenien organisaatioista’’ (On the Facilities and Organizations of the Last Decades),
in Turvallisuuspoliisi 75 vuotta, ed. Simola and Salovaara, 189–95; and Matti Simola, ‘‘Suojel-
upoliisin organisaatio ja johto’’ (The Organization and Leadership of the Security Police), in
Isänmaan puolesta, ed. Simola and Sirvio, 213–21.
9. Simola, ‘‘Suojelupoliisin organisaatio,’’ 263; Finnish Security Intelligence Service
Annual Report 2010, 3. Ilkka Salmi is on a four-year leave of absence as the director of the
EU Situation Centre (SitCen) since February 2011. Antti Pelttari was appointed as the new
Intelligence Culture, Economic Espionage, and the Finnish Security Intelligence Service / 281
director of Supo on March 17, 2011. The Finnish government appoints the director of Supo.
Before his appointment to the post of director of Supo, Ilkka Salmi worked as a special
aide to the interior minister, Anne Holmlund (National Coalition Party, in office April 19,
2007–June 22, 2011. Salmi’s successor, Antti Pelttari, also worked previously under Minister
Holmlund as state secretary.
10. Finnish Security Police 2008–10 (2009), 41–45; Simola, ‘‘Suojelupoliisin organisaa-
tio,’’ 264–65, 268. The Regional Unit was fused with the Security Unit in October 2011.
11. Swedish Security Police, 2011, www.sakerhetspolisen.se. Norwegian Police Security
Service, 2011, www.pst.politiet.no. Danish Security and Intelligence Service, 2011, www
.pet.dk. In Iceland the National Commissioner’s National Security Unit (Greiningardeild
Rı́kislögreglustjóra) is responsible for intelligence matters. National Commissioner of the
Icelandic Police, 2011, www.logreglan.is. For an analysis of the evolution of Swedish intelli-
gence institutions, see chapter 13 in the present volume, by Wilhelm Agrell.
12. Danish Defense Intelligence Service, 2011, http://fe-ddis.dk.
13. Simola, ‘‘Suojelupoliisin organisaatio,’’ 266; Estonian Security Police, 2011,
www.kapo.ee.
14. Samuel Porteous defines economic espionage as ‘‘the use of, or facilitation of, illegal,
clandestine, coercive or deceptive means by a foreign government or its surrogates to acquire
economic intelligence. The acquisition of an actual piece of technology, such as physical
examples of technological information or documents, is assumed to be included in this defi-
nition.’’ He further explains industrial espionage to be ‘‘the use of, or facilitation of, illegal,
clandestine, coercive or deceptive means by a private sector entity or its surrogates to acquire
economic intelligence.’’ Where business intelligence explores information that is openly
available, industrial espionage is inherently about stealing corporate secrets. Samuel Por-
teous, Economic Espionage (II) (Canadian Security Intelligence Service, Commentary 46,
1994). For the discussion related to concepts of economic espionage see, e.g., Hedieh Nash-
eri, Economic Espionage and Industrial Spying (Cambridge: Cambridge University Press, 2005);
Phillip C. Wright and Géraldine Roy, ‘‘Industrial Espionage and Competitive Intelligence:
One You Do; One You Do Not,’’ Journal of Workplace Learning 11, no. 2 (1999): 53–59, at
53–55; Ben Rothke, ‘‘Corporate Espionage and What Can Be Done to Prevent It,’’ Informa-
tion Systems Security 2 (November–December 2001); Coskun A. Samli and Laurence Jacobs,
‘‘Counteracting Global Industrial Espionage: A Damage Control Strategy,’’ Business and Soci-
ety Review 108, no. 1 (2003): 95–113, at 96–97; Omid Nodoushani and Patricia A. Nodous-
hani, ‘‘Industrial Espionage: The Dark Side of the ‘Digital Age,’ ’’ Competitiveness Review 12,
no. 2 (2002): 96–101, 96; and Mark McCourt, ‘‘Keeping Up with New Threats,’’ Security 45,
no. 3 (March 2008): 16–18, 16.
15. Finnish Security Intelligence Service (2011), 21; Finnish Security Police 2008–10
(2009), 17. Matti Remes, ‘‘Supo huolestui PK-yritysten tietoturvasta,’’ Prima 5 (2009): 30–
34, 32–34.
16. Michael Herman, Intelligence Power in Peace and War, Royal Institute of International
Affairs, 5th ed. (Cambridge: Cambridge University Press, 1996), 53–56; Forrester Consult-
ing, ‘‘The Value of Corporate Secrets: How Compliance and Collaboration Affect Enterprise
Perceptions of Risk,’’ paper commissioned by Microsoft and RSA, Security Division of EMC,
March 2010; Swedish Security Police, Annual Report 2003, 2004, 25–27.
17. Stockholms Tingsrätt, Rotel 1301, Avd 13, Dom, Mål nr B 7025–02 (Judgment of the
Stockholm District Court in the Ericsson Espionage Case). For more information and analy-
sis of the Ericsson case, see Lauri Holmström, Industrial Espionage and Corporate Security:
282 / Lauri Holmström
The Ericsson Case, Reports of the Police College of Finland 87/2010 (Tampere: Tampereen
yliopistopaino–Juvenes Print Oy, 2010).
18. Lisa A. Kramer and Richards J. Heuer Jr., ‘‘America’s Increased Vulnerability to
Insider Espionage,’’ International Journal of Intelligence and Counter Intelligence 20, no. 1
(2007): 51–52.
19. Julie Anderson, ‘‘The HUMINT Offensive from Putin’s Chekist State,’’ International
Journal of Intelligence and Counter Intelligence 20, no. 2 (2007): 258–316, at 269; Holmström,
Industrial Espionage, 17–20.
20. Finland held the presidency of the Council of the European Union from July to
December in 2006, and it is possible that this might have had some effect on the level of
foreign intelligence activities with regard to the Finnish state.
21. Finnish Security Intelligence Service, Annual Report 2010, 2011, 7–8; Finnish Secu-
rity Police 2008–10 (2009), 14; ‘‘Suojelupoliisi: Suojelupoliisin vuosikertomus 2006’’ (Finn-
ish Security Police, Annual Report 2006) (2007); ‘‘Yrityksiin kohdistuvan ja niitä
hyödyntävän rikollisuuden tilannekuva syksy 2007’’ (Situational Picture of Crime That Uses
and Targets Companies, Fall 2007), 11; ‘‘Suojelupoliisi: Suojelupoliisin vuosikertomus 2007’’
(Finnish Security Police, Annual Report 2007) (2008), 6.
22. Finnish Security Intelligence Service, Annual Report 2010, 7–8; ‘‘Suojelupoliisi: Suo-
jelupoliisin vuosikertomus 2006’’; ‘‘Yrityksiin kohdistuvan ja niitä hyödyntävän rikollisuuden
tilannekuva syksy 2007,’’ 11; ‘‘Suojelupoliisi: Suojelupoliisin vuosikertomus 2007’’ (2008), 6;
‘‘Yritysten rikosturvallisuus 2008: Riskit ja niiden hallinta—Keskuskauppakamari ja Helsin-
gin seudun kauppakamari’’ (The Security of Companies with Regard to Crime: Risks and
Risk Control), 22–30; ‘‘Yrityksiin kohdistuvan rikollisuuden tilannekuva: Tietoturvallisuus
ja maksuteknologia; Keskusrikospoliisi, teematilannekuva 3.4.2009, RTP 164/213/09’’ (Situ-
ational Picture of Crime That Targets Companies: Information Security and Payment Tech-
nology) (2009), 4; ‘‘Yrityksiin kohdistuvan ja niitä hyödyntävän rikollisuuden tilannekuva
syksy 2009: Keskusrikospoliisi/rikostietopalvelu 7.10.2009, Arkistoviite KRP (Keskusrikos-
poliisi) /RTP 5230/213/09’’ (Situational Picture of Crime That Uses and Targets Companies,
Fall 2009) (2009), 17–18; ‘‘Yrityksiin kohdistuvan ja niitä hyödyntävän rikollisuuden tilan-
nekuva syksy 2010, 5.11.2010: Keskusrikospoliisi, arkistoviite KRP/RTP 5969/213/10’’ (Situ-
ational Picture of Crime That Uses and Targets Companies, Fall 2010) (2010), 6, 11–12;
‘‘Yritysten rikosturvallisuus 2010: Taloustaantuman vaikutukset yritysten kilpailukykyyn vai-
kuttavaan rikollisuuteen—Helsingin seudun kauppakamari’’ (The Security of Companies
with Regard to Crime: The Effects of the Economic Downturn on Crime That Affects the
Competitiveness of Companies) (2010), 23–26.
23. Finnish Security Intelligence Service; ‘‘Finnish Security Police 2008–10’’ (2009), 17.
24. Teknologiateollisuus ry (Federation of Finnish Technology Industries), 2011,
www.techind.fi.
25. For a discussion of the Finnish national innovation system, see Osmo Kivinen and
Jukka Varelius, ‘‘The Emerging Field of Biotechnology: The Case of Finland,’’ Science, Tech-
nology & Human Values 28, no. 1 (2003): 141–61. For more on Finnish innovation, see
Ministry of Employment and Economy, ‘‘Finland’s National Innovation Strategy’’ (2008);
Evaluation of the Finnish National Innovation System: Full Report, Taloustieto Oy (on
behalf of the Ministry of Education and the Ministry of Employment and the Economy),
Helsinki University Print (2009), www.evaluation.fi; HighTech Finland, 2011, www.high
techfinland.fi; Finnish innovation system, 2011, www.research.fi/en/innovationsystem. In
the past, the term ‘‘innovation’’ has been used mainly to signify original scientific discoveries,
Intelligence Culture, Economic Espionage, and the Finnish Security Intelligence Service / 283
but in the current technology policy discourse it has expanded to include inventions that
have possible marketable applications. An innovation system is organized action that strives
to create, develop, and exploit innovations. Within the framework of the national innova-
tion system and technology policy, the private and public sectors and universities are
expected to work together transcending institutional boundaries. Knowledge is now consid-
ered intellectual property as well as a potential product that can be exploited in the market.
This reconceptualization can be seen as the industrialization of the production of scientific
knowledge. Timo Räikkönen and Veikko Rouhiainen, Riskienhallinnan muutosvoimat: Kirjalli-
suuskatsaus, VTT Tiedotteita—Research Notes 2208 (Forces of Change in Risk Control. Liter-
ature Review), VTT Technical Research Centre of Finland (Espoo: Otamedia Oy 2003),
31–32; McCourt, ‘‘Keeping Up with New Threats,’’ 16.
26. Thomas R. Leinbach and Stanley D. Brunn, ‘‘National Innovation Systems, Firm
Strategy, and Enabling Mobile Communications: The Case of Nokia,’’ Tijdschrift voor Eco-
nomische en Sociale Geografie 93, no. 5 (2002): 489–508, at 491–93; Francesco Daveri and
Olmo Silva, ‘‘Not Only Nokia: What Finland Tells Us about New Economy Growth,’’ Eco-
nomic Policy, April 2004, 117–63, at 129; Kivinen and Varelius, ‘‘Emerging Field,’’ 144.
27. Merril E. Whitey and James D. Gaisford, ‘‘Economic Espionage as Strategic Trade
Policy,’’ Canadian Journal of Economics / Revue canadienne d’Economique 29, special issue: part
2 (April 1996): 627–32, at 632. For more on the discussion on post–Cold War challenges to
economic security and the connections between security, technology, and the economy, see,
e.g., Chris Clough, ‘‘Quid Pro Quo: The Challenges of International Strategic Intelligence
Cooperation,’’ International Journal of Intelligence and Counter Intelligence 17, no. 4 (2004):
607–8; and Ernest R. May, ‘‘Intelligence: Backing into the Future,’’ Foreign Affairs 71, no. 3
(Summer 1992): 64.
28. Finnish Security Intelligence Service, Annual Report 2010, 4, 21–24; Finnish Security
Police, ‘‘Finnish Security Police 2008–10,’’ 17.
29. Remes, ‘‘Supo huolestui PK-yritysten tietoturvasta,’’ 32–33.
30. Simola, ‘‘Suojelupoliisin organisaatio,’’ 269; Finnish Security Police, ‘‘Finnish Secur-
ity Police 2008–10,’’ 45; Finnish Security Intelligence Service, Annual Report 2010, 6.
31. Henrikki Heikka, ‘‘Republican Realism: Finnish Strategic Culture in Historical Per-
spective,’’ Cooperation and Conflict 40, no. 1 (2005): 91–119, at 93. For more on the politics
of postneutrality in Europe, see Christine Agius, ‘‘Transformed beyond Recognition? The
Politics of Post-Neutrality,’’ Cooperation and Conflict 46, no. 3 (2011): 370–95.
32. Heikka, ‘‘Republican Realism,’’ 92, 103.
33. Gabriel A. Almond and Sidney Verba, The Civic Culture: Political Attitudes and Democ-
racy in Five Nations, abridged ed. (London: Sage, 1989). See chapter 2 in the present volume,
by Stephen Welch.
34. Robert C. Tucker, ‘‘Culture, Political Culture, and Communist Society,’’ Political Sci-
ence Quarterly 88, no. 2 (June 1973): 173–90, at 179; chapter 2 by Welch.
35. See chapter 2 by Welch.
36. Philip H. J. Davies, ‘‘Intelligence Culture and Intelligence Failure in Britain and the
United States,’’ Cambridge Review of International Affairs 17, no. 3 (October 2004): 495–520,
at 496.
37. Paul Egon Rohrlich, ‘‘Economic Culture and Foreign Policy: The Cognitive Analysis
of Economic Policy Making,’’ International Organization 41, no. 1 (Winter 1987): 61–92;
Jeremy Richardson, Policy Styles in Western Europe (London: George Allen & Unwin, 1982);
Alan Macmillan and Ken Booth, ‘‘Appendix: Strategic Culture: A Framework for Analysis,’’
284 / Lauri Holmström
in Strategic Cultures in the Asia-Pacific Region, edited by Ken Booth and Russell Trood (Lon-
don: Macmillan, 1999), 363–72.
38. Edgar H. Schein, Organizational Culture and Leadership, A Dynamic View (San Fran-
cisco: Jossey-Bass, 1987), 50.
39. Ibid., ix, 2, 6–8.
40. Ibid., 51.
41. Ibid., 9.
42. Finnish Security Intelligence Service, Annual Report 2010, 6.
434. Davies, ‘‘Intelligence Culture and Intelligence Failure in Britain and the United
States,’’ 500–501.
44. Ibid., 508; Isabelle Duyvesteyn, ‘‘Intelligence and Strategic Culture: Some Observa-
tions,’’ Intelligence and National Security 26, no. 4 (August 2011): 521–39, at 526–27.
45. Confidential interview, 2011.
46. Ibid.
47. A survey concerning the views of Finnish citizens on Supo’s activity is carried out
yearly at the request of the agency. The latest published survey was conducted in February
2011 with a total of 1,000 interviews. The respondents were between fifteen and seventy-
nine years. The confidence interval of the results is plus or minus percentage points. Finnish
Security Intelligence Service, Annual Report 2010, 11.
48. Confidential interview, 2011.
49. Ibid.
50. For more on the challenges of studying economic espionage in practice, see Holm-
ström, Industrial Espionage, 12–16.
51. Duyvesteyn, ‘‘Intelligence,’’ 525.
52. Anssi Kullberg, ‘‘Radikalismi Suomen muslimiyhteisöissä: Ulkomaisten konfliktien ja
kansainvälisen islamismin vaikutus,’’ in Suomi, terrorismi, Supo: Koira joka ei haukkunut—
Miksi ja miten Suomi on välttynyt terroristisen toiminnan leviämiseltä? (Radicalism in Finland’s
Muslim Communities: The Effect of Foreign Conflicts and International Islamism in Finland,
Terrorism, Supo—The Dog That Did Not Bark: Why and How Finland Has Avoided the
Expansion of Terrorist Activity?) edited by Anssi Kullberg (Helsinki: WSOY, 2011), 295.
The translation of the quotation from Finnish is by the author.
53. Isabelle Duyvesteyn has observed that there is empirical evidence that proves how the
perception of geopolitical conditions informs priorities and definitions of intelligence, which
further influence collection mechanisms, assessments, and dissemination in the political
domain. Duyvesteyn, ‘‘Intelligence,’’ 529.
54. Heikka, ‘‘Republican Realism,’’ 109.
PART IV
Conclusion
This page intentionally left blank
CHAPTER 15
Legacies, Identities,
Improvisation, and Innovations
of Intelligence
Philip H. J. Davies and Kristian C. Gustafson
L
ike so many other institutions in human social and political affairs, intelli-
gence is a field characterized by the presence of culture as a medium
through which people both understand and act. As Talcott Parsons
observed, culture may articulate both ends and means, but human action is
‘‘voluntaristic’’—that is, individuals act of their own accord but use culture
rather than being directed by it.1 Culture tells us less what people will do than
how they will go about doing it. Beliefs, concepts, values, and norms are, in the
last analysis, toolkits to help human beings navigate this life individually and
collectively. In this sense those who would try and set cultural explanations
against ‘‘materialist,’’ ‘‘realist,’’ or ‘‘structural’’ accounts have fundamentally
misunderstood not only the explanatory role and value of cultural approaches
but also the actual processes whereby ‘‘realist,’’ ‘‘structural,’’ and ‘‘materialist’’
factors play into institutions, decisions, and actions.
Therefore, those who reduce all human affairs to culture and ideology—
concluding thereby that because something is socially constructed it is nothing
/ 287 /
288 / Philip H. J. Davies and Kristian C. Gustafson
were all things that classical Chinese philosophers of government (and intelli-
gence) mused over, if not in a systematized way. Presaging Donald Rumsfeld by
many centuries, the same Lü-shih Ch’un-ch’iu pointed out: ‘‘Knowing that one
does not know is best. The misfortune of those who are mistaken is not knowing
but thinking that they know. Many things seem to be of the same category but
are not, thus they lose their state and destroy their people.’’6
In no small way this bridge between cultures and across centuries serves
nicely to demonstrate the argument made in the introduction to this book
about the cross-cultural commensurability of intelligence as a core state func-
tion. Intelligence reporting is never self-explanatory and is very rarely com-
pletely trustworthy. It arises from conditions of acute uncertainty, which
typically result from the active denial and deception efforts of those about
whom the intelligence practitioner and their masters would know. And so
where the cognitive task is similar, the resulting formulas resemble each other.
On the operational side, the roles of spies in war in Kautilya, Sun Tze, and
other Chinese political philosophers are largely similar—they classify spies in a
similar way, for instance, and share ideas like the rule of three—but ultimately
they have different intellectual roots. More significantly, there are major institu-
tional differences between ‘‘classical’’ Chinese and Indian society. Though both
were highly stratified between the very top of the social hierarchy and the
bottom, India never displayed the relatively meritocratic social mobility that
China’s secular state machinery offered, and the Chinese never had to navigate
the same rigid divisions created by Hinduism’s caste system. Consequently, in
covert collection it was necessary for Kautilya to posit two different classes of
mendicant female spies, one to deal with Kshatriya and Brahmin women and
the other to reach the women of the Sudras and lower castes below them.
Conversely, far less use, effect, and diversity of religious cover were available to
the increasingly secular and religiously pluralistic polity of imperial China than
in India, where the basic political, military, and economic institutions framed
their authority in terms of religious legitimacy.
Laminated Legacies
Much of what this volume has examined is best understood in terms of the
notion and impact of legacy on communities and institutions. This legacy may
be ancient, profoundly pervasive, and deep; or it may be a shallower and more
recent one to which the members of that community subscribe less comprehen-
sively or completely. And so Sun Tze and his successors have been formative to
the strategic thought not only of the Chinese but also the Japanese, but other
influences have overlaid that deep legacy. Japan, of course, evolved its own
discourse of strategic thought grounded in the inaccurately termed ‘‘feudalism’’
of the yamabushi, the Samurai, with indigenous classics such as the Hagakure
290 / Philip H. J. Davies and Kristian C. Gustafson
we might get the answer ‘‘diplomacy’’—what one scholar has called ‘‘the essen-
tial institution for the conduct of interstate relations.’’13 This word on its own
is often used as shorthand for foreign policy, when using the term ‘‘diplomat’’
is equal to ‘‘statesman,’’ which can be evidenced by the discussions of such
elder statesmen as Henry Kissinger, the late Richard Holbrooke, and Christo-
pher Meyer.14 In different times and places, the duties of the diplomat have
included those actions that might today be called covert action. The Byzantine
diplomat, for instance, was a general agent of the state. In his efforts to avoid
costly and dangerous war, he employed bribery, trickery, covert subsidy,
extraordinary rendition, and even assassination to achieve what his state
needed.15 Likewise, among the primary tasks of Kautilya’s ambassadors was the
establishment of espionage and potential sabotage networks within their host
country and the monitoring and penetration of the host government’s clandes-
tine efforts against the ambassador’s own government. On the Arabian Penin-
sula one sees less evidence of formally constituted diplomatic missions, but that
goes hand in glove with a great reliance on covert surveillance and interven-
tion. One also sees in these precedents a similarly weak differentiation between
state representatives of a nation and private citizens of that nation resident in
a foreign land. Leading members of the expatriate community, who were abroad
for personal or commercial reasons, were often also tasked to represent their
government to the local political leadership as well as economic and status
elites.
Today, however, the Western and Westphalian definition of diplomacy tends
to eschew any act that moves toward violence. One scholar has offered that the
‘‘juxtaposition of diplomacy and war as polar opposites appears as a peculiarly
Western notion not necessarily found in other traditions.’’16 It is within this
globalized Western tradition that we may therefore use the definition of diplo-
macy offered by the Portuguese diplomat José Calvet de Magalhães, where
diplomacy is ‘‘an instrument of foreign policy for the establishment and devel-
opment of peaceful contacts between different states, through the use of inter-
mediaries recognized by the respective parties.’’17 Although it may not always
be the case into the future, at the moment it would be hard to deviate from de
Magalhães’s definition. What one can draw from these discussions about diplo-
macy is that it is the baseline function of interstate relations—that it is about
‘‘getting our way,’’ with peaceful means, inside mutual and consensual mecha-
nisms.18 At the international level, this is normal political interaction, frozen
in place as the norm through the construction of the United Nations and the
rest of the Westphalian framework of global politics. Most Western states thus
may use diplomatic cover for intelligence operations; but they draw a fairly firm
line between intelligence-gathering ‘‘spies’’ (intelligence officers) and diplo-
mats. It is a construct particular to those states whose histories and political
traditions encompass the Thirty Years’ War and its settlement, and perhaps
Legacies, Identities, Improvisation, and Innovations of Intelligence / 293
those that underwent the process of the Reformation and the Enlightenment.
But the argument evident here is that the hard line between the diplomat and
the intelligence officer may be predominantly a Western construct, and other
political traditions—Russo-Byzantine, Subcontinental, Chinese, and Islamic—
may not see such a divide as evident or necessary. And such an approach may
not be purely an archaic approach but also formative of contemporary practice.
Reflections at an Angle
The literature of cultural study takes it as axiomatic that the understanding of
consciousness, individual or collective, is a reflexive undertaking. Ordinarily,
one would take this to mean that one reflects inwardly, being aware of being
aware, as it were, the Kantian notion of a transcendental awareness. In so doing,
one becomes self-aware of the process of understanding, ideally as much to
serve in helping oneself to understand others—the conceptual (often reified)
Others—as much as oneself. One points a cognitive mirror at oneself and then,
obliquely, at oneself regarding the Other. But in this collection we have some-
thing of an opportunity to perceive something of ourselves in the image one
would not ordinarily detect.
Less of an axiom than simply a common assumption is that there is some
sort of nominally homogenous ‘‘Western’’ episteme and approach to gov-
ernment and governance, which has been shaped across the inheritors of the
European tradition by a common experience of the Enlightenment and mod-
ernization. But two chapters in this collection suggest a more complex narrative,
in which there are two very distinct Western traditions of governance and
therefore of intelligence. It is also a common practice to speak of an ‘‘Anglo-
American’’ tradition that binds the United States and the English-speaking
parliamentary democracies that belong to the Commonwealth. The late, pion-
eering H. Bradford Westerfield was echoing more than just Winston Churchill’s
notion of historically united ‘‘English-speaking peoples’’ when he wrote in 1997
of an Anglo-American intelligence tradition.19 And, indeed, there can be little
doubt that there are profound, even fundamental differences between the politi-
cal and therefore intelligence values, norms, and conduct within the ‘‘Anglo-
sphere’’ liberal tradition and the Continental European notions of governance
rooted in feudal and especially Bourbon Absolutism. It was not mere jingoistic
idiosyncrasy that led the 1923 Secret Service Committee to shudder at the
prospects of a ‘‘Continental system of domestic espionage’’ when it shut down
the overzealous Basil Thompson’s Directorate of Intelligence.20 Micrometer
political surveillance and ‘‘informing’’ on one’s neighbors to ‘‘the authorities’’
continue to have a legitimacy in many nominally democratic European states—
many of which have no history of stable democracy predating World War II—
that they never have had in the ‘‘Anglosphere.’’ Even France’s successive
294 / Philip H. J. Davies and Kristian C. Gustafson
of ‘‘bricolage.’’ The bricoleur interprets and deals with the world by drawing on,
combining, chopping, and changing useful fragments of legacies; in Levi-
Strauss’s words, he or she ‘‘builds up structures by fitting together events or the
remains of events’’ in contrast with science, which ‘‘simply by virtue of coming
into being, creates its means and results in the form of events, thanks to the
structures which it is constantly elaborating and which are its hypotheses and
theories.’’22 Significantly, Levi-Strauss omits the most significant and formative
‘‘events’’ in science, which are those experimental tests that allow its prac-
titioners to choose between alternative competing theories and hypotheses. The
cumulative consequences of experimentation and falsification, of course, com-
pletely undermine the kind of epistemological equivalence between scientific
knowledge and manipulating ‘‘the remains of events’’ that Levi-Strauss would
like to assert.23 But the idea of ‘‘fitting together . . . the remains of events’’ is a
compelling way of visualizing how almost any form of social construction takes
place. After all, what are cultural artifacts like traditions and conventions but
the remains of events? What Levi-Strauss articulates so well—what other think-
ers in what the Germans call the giesteswissenschaften, the spiritual or cultural
studies (‘‘sciences’’ might be the literal translation, but it is a misleading term
for what the activity entails), underestimate—is this: People innovate with tra-
dition. They fabricate ideas, approaches, understandings, and methods that are
both chronologically and substantively new from intellectual matter that is old
and even ancient. In its way, the United Kingdom’s Joint Intelligence Commit-
tee was as new and innovative in the practice of intelligence as the first recon-
naissance satellite, but assembled from conventions and practices rooted in
attitudes and conventions that dated back decades or more rather than shiny,
freshly manufactured, technologically ground-breaking component parts.
In the last analysis, intelligence is about understanding. It feeds into under-
standing and supports understanding without subsuming all that understanding
should entail. The mythopoetic understanding that underpins the idea of brico-
lage assumes and exploits a shared knowledge of the symbols, signs, and codes
that are the ‘‘remains of events.’’ Such artifacts are comprehensible in the lin-
guistic sense, because they rest on communicative competence that can be
acquired, and this comprehension can be articulated, translated, and conveyed
with varying degrees of fidelity to others who might not share these fragments
of legacy. So, in part, the intelligence practitioner seeks to comprehend actions
and institutions that are themselves the consequence of bricolage. In another
part, intelligence institutions and the states where they are located are them-
selves the products of bricolage, and likewise are comprehensible. In the last
analysis what the contributors to this volume have sought to do is achieve, and
convey, just such an understanding of how intelligence has been assembled and
given shape and meaning through very different symbols, signs, codes, and other
296 / Philip H. J. Davies and Kristian C. Gustafson
remnants from those so often taken for granted in the thought and pronounce-
ments of the English-speaking world.
Notes
1. This is the essential message of his seminal book; see Talcott Parsons, The Structure of
Social Action (New York: Basic Books, 1969; orig. pub. 1937).
2. Elton Mayo, Hawthorne and the Western Electric Company: The Social Problems of an
Industrial Civilisation (London: Routledge, 1949).
3. Kautilya, Arthashastra, 21.
4. Ralph Sawyer, The Tao of Spycraft: Intelligence, Theory and Practice in Traditional China
(Boulder, CO: Westview Press, 2004), 297.
5. Ibid., 298.
6. Ibid., 308.
7. Yamamoto Tsunetomo, Hagakure: The Book of the Samurai, translated by William
Scott Wilson (London: Kodansha Europe, 2000).
8. Miyamoto Musashi, The Book of Five Rings, translated by William Scott Wilson (Lon-
don: Kodansha Europe, 2002).
9. Muhammad Haji Salleh, ‘‘Translating Hikayat Hang Tuah,’’ in The Epic of Hang Tuah,
translated by Muhammad Haji Salleh and edited by Rosemary Robson (Kuala Lumpur: Insti-
tut Terjemahan Negara Malaysia, 2011), xlii–xliii.
10. John J. Dziak, Chekisty: A History of the KGB (Lexington, MA: Lexington Books,
1985), 1–5 passim.
11. For a general discussion of the idea of what might be called prototyping in the empire,
see Philip Murphy, ‘‘Creating a Commonwealth Intelligence Culture: The View from Cen-
tral Africa 1945–1960,’’ Intelligence and National Security 17, no. 3 (Summer 2002).
12. See, inter alia, Charles Beitz, ‘‘Covert Action as a Moral Problem,’’ Ethics and Interna-
tional Affairs 3, no. 1 (1989): 45–60; William E. Colby, ‘‘Public Policy, Secret Action,’’ Ethics
and International Affairs 3, no. 1 (1989): 61–71; Loch K. Johnson, ‘‘On Drawing a Bright
Line for Covert Operations,’’ American Journal of International Law 86 (April 1992): 284–309;
and David P. Forsythe, ‘‘Democracy, War, and Covert Action,’’ Journal of Peace Research 29,
no. 4 (November 1992): 385–95.
13. Christer Jönsson, ‘‘Diplomacy, Bargaining and Negotiation,’’ in Handbook of Interna-
tional Relations, edited by Beth A. Simmons, Walter Carlsnaes, and Thomas Risse (London:
Sage, 2002), 212.
14. Keith Hamilton and Richard Langhorne, The Practice of Diplomacy: Its Evolution, The-
ory, and Administration (New York: Routledge, 1995), 1.
15. Ibid., 14–20.
16. Raymond Cohen, ‘‘Reflections on the New Global Diplomacy: Statecraft 2500 BC to
2000 AD,’’ in Innovation in Diplomatic Practice, edited by Jan Melissen (New York: Palgrave,
1999), 4.
17. José Calvet de Magalhães, The Pure Concept of Diplomacy (Westport, CT: Greenwood
Press, 1988), 59.
18. Christopher Meyer, Getting Our Way: The Inside Story of British Diplomacy (London:
Weidenfeld & Nicolson, 2009).
19. H. Bradford Westerfield, ‘‘American Exceptionalism and American Intelligence,’’
Freedom Review 28, no. 2 (Summer 1997).
Legacies, Identities, Improvisation, and Innovations of Intelligence / 297
20. See, e.g., Christopher Andrew, Secret Service: The Making of the British Intelligence
Community (London: Sceptre, 1986), 405.
21. For a comparative analysis of Swedish open government practice with those of the
United Kingdom and the United States, see K. G. Robertson, Public Secrets (London: Mac-
millan, 1984).
22. Claude Levi-Strauss, The Savage Mind (Chicago: University of Chicago Press), 22.
23. Ibid., 15.
This page intentionally left blank
CONTRIBUTORS
Emmanuel Kwesi Aning has taught in several universities around the world,
including in Denmark, South Africa, the United Kingdom, the United States,
Nigeria, Austria, and Ghana. He presently serves as dean and director of the
Faculty of Research and Academic Affairs at the Kofi Annan International
Peacekeeping Training Centre in Accra. Until 2007 he served as the African
Union’s first expert on counterterrorism, peace, and security. He has extensive
publications to his credit and serves on several editorial boards. He was recently
appointed to the World Economic Forum’s Council on Conflict Prevention. He
received his PhD from the University of Copenhagen.
Emma Birikorang is a research fellow and program head for the Regional Part-
nerships for the Peace and Security Programme at the Kofi Annan International
/ 299 /
300 / Contributors
Philip H. J. Davies is the director of the Brunel University Centre for Intelli-
gence and Security Studies and originator of Brunel’s highly innovative MA
program in intelligence and security studies. He recently completed a substan-
tial comparative study of national intelligence in the United Kingdom and the
United States, Intelligence and Government in Britain and the United States: A
Comparative Approach (Praeger Security International, 2012), and he has pub-
lished extensively on the management and organization of intelligence institu-
tions and on the concept of national intelligence cultures. He was a contributor
to the current UK Joint Intelligence Doctrine.
Ken Kotani is a senior fellow of the National Institute for Defense Studies at
the Ministry of Defense in Tokyo. He received his MA in war studies from
King’s College London and his PhD in international history from Kyoto Uni-
versity. He was a visiting fellow of the Royal United Services Institute in Lon-
don in 2008–9 and is now a visiting lecturer of the National Defense Academy
of Japan. His major field of study is the intelligence history of Japan and the
United Kingdom. He is an author of Japanese Intelligence in World War II
(Osprey, 2009) and is the coauthor of the Pacific War Companion (Osprey, 2005).
Ernest Ansah Lartey is the head of the Conflict and Security Programme in the
Research Department of the Kofi Annan International Peacekeeping Training
Centre. His research interests include security-sector reform, postconflict peace
building, and elections security. He has published a number of papers covering
these specific interests. He also provides teaching support to training programs
at the Kofi Annan Centre.
Lee Wilson is a research associate in the School of Political Science and Inter-
national Studies at the University of Queensland. He is the author of a forth-
coming monograph on Indonesian martial arts, Pencak Silat: The Constitution of
a National Martial Art in Indonesia (KITLV Press). He coedited the recent vol-
ume Southeast Asian Perspectives on Power (Routledge, 2012). His current
research focuses on citizen militia groups in newly democratizing Indonesia.
INDEX
/ 303 /
304 / Index
Mufateh, Hojatolislam Mohammed, 142 the United States, the ISI and relations
Mugniyah, Imad, 145, 154n32 with, 115–17, 120–21, 129–31
Muhammad, the Prophet, 90, 97–108, Palm, Thede, 241, 243–46, 249, 251–52
109n4 Palme, Olof, 244–45, 250–51
Mullen, Mike, 115, 120 Parsons, Talcott, 6, 25n19, 287
Mumbai attacks, 119, 122, 128 Pasha, Ahmed Shuja, 116
Al-Munthir, Al-Naman bin, 95 path dependence theory, 220–21, 231–32,
Murai, Jun, 182–83 294
Murphy, Philip, 291 Pelttari, Antti, 280–81n9
Musashi, Miyamoto, 290 Pena, Robert, 223
Musharraf, Pervez, 121, 128–31, 133–34 Peoples Mujahidin Organization, 153n18
Muslim Brothers, 146 Perón, Juan Domingo, 222
Persson, Carl, 252, 257
Nakasone, Yasuhiro, 193 Petersén, Carl, 241, 243
Nasir, Javed, 127 political culture
Nawaz, Shuja, 125, 129 the Almondian positivist paradigm,
Nevala, Seppo, 268 14–18, 273
Newton, Isaac, 18 dialectic of, moving beyond the, 21–23
Nikephoros Phokas, 78
dialectic of approaches to, 20–21
Nilsson, Torsten, 250
the Geertzian interpretive paradigm,
Nkrumah, Kwame, 201–3, 207
17–20
nuclear proliferation, 128–29, 148
intelligence culture and, 13–14, 16, 24,
273–74
Obolensky, Dimitri, 67–70
Russian, Byzantine influence on, 69–71,
Ogata, Taketora, 182
79–80 (see also Russia)
Omori, Yoshio, 189
Popplewell, Richard, 52, 63
organizational culture, 21–22, 274–75
Porch, Douglas, 63
Oros, Andrew, 183
Porteous, Samuel, 281n14
Ostrogorsky, George, 69
postal system, intelligence functions and,
oversight, 169
72–73
Procopius, 72, 76
Pakistan
Psellus, Michael, 73
India and, 116, 118–19, 121–22
Purwopranjono, Muchdi, 164
intelligence activities in (see Inter-
Putin, Vladimir, 68, 70, 82–83
Services Intelligence)
Pye, Lucian W., 17, 20
Iran and, 148
Kashmir, insurgency in, 127–28
Kautilya’s legacy and the sponsorship of al-Qaeda, 116–17, 119
jihadists, 63 Quantson, Kofi, 202–3
laminated forging in, 290–91 Quran, the, 97–98
Index / 311