Professional Documents
Culture Documents
(Download PDF) Decision Advantage Intelligence in International Politics From The Spanish Armada To Cyberwar Jennifer E Sims Full Chapter PDF
(Download PDF) Decision Advantage Intelligence in International Politics From The Spanish Armada To Cyberwar Jennifer E Sims Full Chapter PDF
(Download PDF) Decision Advantage Intelligence in International Politics From The Spanish Armada To Cyberwar Jennifer E Sims Full Chapter PDF
https://ebookmass.com/product/artificial-intelligence-game-
theory-and-mechanism-design-in-international-politics-tshilidzi-
marwala/
https://ebookmass.com/product/decision-intelligence-for-
dummies-1st-edition-pam-baker/
https://ebookmass.com/product/coercion-the-power-to-hurt-in-
international-politics-1st-edition-kelly-m-greenhill/
https://ebookmass.com/product/artificial-intelligence-and-
machine-learning-in-the-travel-industry-simplifying-complex-
decision-making-ben-vinod/
Introduction to Prescriptive AI: A Primer for Decision
Intelligence Solutioning with Python Akshay Kulkarni
https://ebookmass.com/product/introduction-to-prescriptive-ai-a-
primer-for-decision-intelligence-solutioning-with-python-akshay-
kulkarni/
https://ebookmass.com/product/from-selfie-to-sealfie-
nature-2-0-and-the-digital-cultural-politics-of-an-
internationally-contested-resource-roberta-hawkins-jennifer-j-
silver/
https://ebookmass.com/product/russophobia-propaganda-in-
international-politics-glenn-diesen/
https://ebookmass.com/product/volatile-states-in-international-
politics-eleonora-mattiacci/
https://ebookmass.com/product/from-party-politics-to-
personalized-politics-party-change-and-political-personalization-
in-democracies-gideon-rahat/
Decision Advantage
Decision Advantage
Intelligence in International Politics from the Spanish
Armada to Cyberwar
JENNIFER E. SIMS
Oxford University Press is a department of the University of Oxford. It furthers the
University’s objective of excellence in research, scholarship, and education by publishing
worldwide. Oxford is a registered trade mark of Oxford University Press in the UK and
certain other countries.
Published in the United States of America by Oxford University Press
198 Madison Avenue, New York, NY 10016, United States of America.
© Oxford University Press 2022
All rights reserved. No part of this publication may be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means, without the prior permission in
writing of Oxford University Press, or as expressly permitted by law, by license, or under
terms agreed with the appropriate reproduction rights organization. Inquiries concerning
reproduction outside the scope of the above should be sent to the Rights Department,
Oxford University Press, at the address above.
You must not circulate this work in any other form and you must impose this same
condition on any acquirer.
Library of Congress Cataloging-in-Publication Data
Names: Sims, Jennifer E., author.
Title: Decision advantage : intelligence in international politics from the
Spanish Armada to cyberwar / Jennifer E. Sims.
Description: New York, NY : Oxford University Press, 2022. |
Includes bibliographical references and index.
Identifiers: LCCN 2021031278 (print) | LCCN 2021031279 (ebook) |
ISBN 9780197508046 (hardback) | ISBN 9780197508060 (epub)
Subjects: LCSH: International relations—Decision making. |
Strategic planning. | Intelligence service. | Military intelligence.
Classification: LCC JZ1253 .S56 2022 (print) |
LCC JZ1253 (ebook) | DDC 327.12—dc23
LC record available at https://lccn.loc.gov/2021031278
LC ebook record available at https://lccn.loc.gov/2021031279
DOI: 10.1093/oso/9780197508046.001.0001
For my husband, Bob Gallucci
Contents
List of Figures
Preface
Acknowledgments
The ambitious task described in the preface to this volume could not
have been accomplished alone. Although equipped with analytical
tools to find intelligence in a complicated past, I am not a historian
by training, and this fact presented problems. I anticipated hunting
through a recovered past full of fine archival work, but a secondary
literature possibly littered with the fancies, mistakes, or biases of
well-meaning interlopers like me. The idea was horrifying. I
remembered the opening of Walter M. Miller Jr.’s science fiction novel
A Canticle for Leibowitz, in which a monk, foraging in a
postapocalyptic landscape of the future, discovers a rare and cryptic
document hidden in a subterranean bunker: “Pound pastrami, can
kraut, six bagels—bring home for Emma,” signed, Leibowitz.1 Awed
by his find and curious about its meaning, the monk scurries to his
abbot, who, equally awed and mystified, wonders if the hand of the
abby’s namesake, the Blessed Leibowitz, was behind it all, working
another miracle. As amusing as Miller’s opening seemed to be, I was
struck by the horror of his topic (nuclear apocalypse) and by his
foraging monk, who unwittingly uncovered and propagated
irrelevancies.
Still, it is in human nature to dig, find, and make sense of things.
Learning from the past, the best we can do is to seek historians to
help, which poses additional challenges. As a historian has written:
“If contemporary analysis appeals to the authority of history, it
should rely on more rather than less reliable historical scholarship.”2
So I sought out respected historians of the eras in which I would
forage, conducting roundtables to get their input on draft chapters. I
could not have been more fortunate in the help I received. I was
honored and pleased, in particular, to have the help of Professor
Geoffrey Parker, the eminent historian of Philip II, his lineage, his
empire, and his age. Dr. Parker not only patiently helped me to
navigate the overflowing literature on the subject, but also
introduced me to other respected historians for the Civil War and
WWI, many of whom agreed to join political scientists and
intelligence professionals in roundtables on the book held at the
Chicago Council on Global Affairs and the Wilson Center in
Washington, DC. I owe these two institutions and their leaders, the
Hon. Jane Harman and Ambassador Ivo Daalder, a great debt of
gratitude. Besides Geoffrey Parker, core roundtable participants
included Nicholas A. Lambert, Mark Grimsley, Mark Lowenthal,
Christian Ostermann, Burton Gerber, Robert Gallucci, Rodney Faraon,
Brian Hanson, Rachel Bronson, and Greg Treverton. The debates and
criticisms flew; I benefited from all of them.
In addition to these roundtables on the manuscript, I sought
guidance from contemporary experts in diplomacy, military combat,
and intelligence. Together with my colleague and former CIA
operations officer Burton Gerber, I hosted intelligence salons while I
taught first at Johns Hopkins School of Advanced International
Studies and then at Georgetown University. A number of the
Georgetown University salons were funded through a special grant
administered by the Security Studies Program at Georgetown
University’s School of Foreign Service. To the scholars and
practitioners who participated in these salons, manuscript reviews,
and recent online meetings, I owe particular thanks. While there are
too many to mention, a few merit special mention (in no special
order) for years of intellectual engagement and outstanding
contributions: Robert Jervis, Keith Jeffery, Alexander Wendt, Richard
Betts, Hank Crumpton, Michael Hayden, Jim Clapper, George Tenet,
John McLaughlin, John McGaffin, Michael McConnell, Michael Brown,
Loch Johnson, Austin Yamada, David Charney, Ernest R. May, John
Fox, Michael Warner, Ronald Marks, John Moseman, Jim Bruce,
Carmen Medina, Amy Zegart, Robert Wallace, Kathleen Kiernan,
James R. Gosler, Roy Godson, Harvey Rishikof, Toby Gati, Tom
Fingar, Daniel Kurtzer, Daniel Byman, Ellen Laipson, William M. Nolte,
Albert C. Pierce, Elizabeth Stanley, Suzanne Kelly, Suzanne
Spaulding, Nicholas Gallucci, Roger George, Randall M. Fort, Charley
Allen, Christopher Mellon, and Eliot Cohen. And for her expertise as
a prepublication copyeditor, tireless substantive critic, Spanish
translator, cultural expert, and friend, I owe a particular debt of
gratitude to Rosa DeBerry King. She has lived with this manuscript
for over a year, improving it in many ways, including contributing the
translation of a sixteenth-century manuscript in Appendix 2, and
always encouraging me onward. These experts, scholars, and
practitioners, while generously helping me over the years, bear no
blame for any mistakes this volume may still contain despite their
best efforts.
I extend great thanks to my students over many years who,
although too many to name, know who they are and how much they
have contributed. Vincent H. Bridgeman, Matthew Walker, Anand
Prakash, and Megan Jackson deserve special mention for their
enormous contributions, which included active and substantive
engagement in many of the salons and critical contributions to
delimiting the meaning of intelligence itself.
I also thank the prepublication staff of the Office of the Director
of National Intelligence for their careful and efficient review of this
manuscript. As is always the case, such review was solely for issues
of classification and indicates no endorsement of the contents.
As sources of both financial and logistical support there have
been no greater contributors than the Wilson Center, the Chicago
Council on Global Affairs, and, especially, the Smith Richardson
Foundation (SRF), without whose grant this book could not have
started and certainly could not have been completed. SRF officers
Martin Strmecki and Nadia Schadlow have been great motivators.
Their patient commitment to my completion of the task has kept me
going even when the task felt overwhelming. Chris Juby, Ana
Teasdale, and Jennifer Jun of the Chicago Council on Global Affairs
helped with the production of the manuscript, including the
organization of roundtables. In fact, many on the staff of the
Chicago Council and of the Wilson Center in Washington, DC, were
essential to the success of the roundtables.
And in bringing this book from manuscript to publication, my
special appreciation goes to all at Oxford University Press for their
smooth production of this volume and especially to David McBride
for his patience and wise counsel throughout.
Finally, I owe most to the tireless patience of my husband, friend,
editor, and substantive critic, Robert L. Gallucci. A diplomat, scholar,
and professor, he has been a fount of wisdom, as well as a
persistent realist, reminding me often of what his thesis adviser told
him many years ago: “Do not try to write Man, the State, and War,
just do a serious piece of work.”3 And so, I hope, I have.
1
Intelligence and Decision Advantage in
International Politics
Why a Theory?
I will show in this volume that intelligence shapes outcomes in
international politics. It helps leaders know the distribution of power
among states, act more quickly and decisively in countries’ interests,
and so protect them from predation. I will make the case that
intelligence can do so regularly and predictably because the factors
that lead to success (knowing more than your adversary through
purposeful learning) are identifiable, measurable, and buildable. In
this sense intelligence is a form of power not unlike the military kind.
Pessimism or cynicism about this last point persists because we
have lacked an overall theory of how intelligence works in
competitions in general and politics in particular. Getting the practice
of intelligence reliably right, regardless of the foe, requires such a
theory. And while some theorists have tackled the problem, efforts
so far have been disappointingly descriptive rather than explanatory.
For example, intelligence is often described as a cycle: decision-
makers secretly request information; collectors go get it; analysts
discern its meaning and then send it on to the decision-makers.
Failure is defined simply as a breakdown in the cycle. Missing,
however, is any explanation of how the cycle breaks, how
intelligence prevents surprise, or how it helps create it in other
parties. The “cycle” might make a good model, but it is no guide to
troubleshooting after failure occurs. In other words, it offers no
general theory of how intelligence helps decision-making, how
failures arise, or how best to make trade-offs among competing
requirements.8
Intelligence has also been described as keeping secrets or
stealing them from others, as the United States did during the
Cuban Missile Crisis.9 According to this test, which some believe
suffices as theory, the more secrets an intelligence service collects
the better it is; indeed, the more classified the product the better
that product must be. Yet this test identifies and measures what
modern intelligence agencies do rather than explains how
intelligence succeeds and fails. Certainly, it would be unwise for any
competitor to focus on learning only what others choose to hide,
because that would tempt them to hide what is worthless in order to
deceive, tease, or otherwise influence.
It follows that it would be just as unwise to guard most diligently
only knowledge that is most secretly obtained rather than knowledge
that is most advantageous to have, regardless of how it was
obtained. Moreover, defining intelligence as secrets can blind
collectors as well as decision-makers. When al-Qaeda terrorists
surprised the United States on September 11, 2001, they gathered
intelligence on their targets but used none of the secrets closeted
away by the US government. They also acted openly, using their true
names.10 The intelligence they needed to succeed with their plan—
airline schedules, piloting know-how, and target location—was freely
available. Their tradecraft looked nothing like that used by the
United States during the Cuban Missile Crisis, but it worked. So,
clearly, intelligence cannot be just about gathering or keeping
secrets.11
Finally, intelligence is sometimes described as the search for
objective truth. At one level, this idea seems correct. Good
intelligence represents what is, not what one wishes were true or
what is true, relevant but unnecessary for competitive decision-
making. A man surprised by a bear will not be saved by knowing the
precise length of the animal’s incisors. And it is in this sense that an
intelligence provider’s objective but undisciplined search for truth
can be inappropriate and sometimes dangerous. Neglect of utility—
the decision-maker’s dilemma and what she needs to know to win—
can lead practitioners to believe their work is a kind of science, and
its defense almost a religious endeavor. Indeed, one senses the
rather modern idea of “speaking truth to power” reflects a search for
morality in what has long been deemed a shady profession.
Although the biblical declaration “And ye shall know the truth, and
the truth shall make you free” (John 8:32) is inscribed in the wall of
the foyer of the US Central Intelligence Agency,12 it does not take a
theorist of international politics to know that political leaders rarely
have the luxury or divine connections to build policies on ultimate
truths. In the heat of conflict, decisions often have to be made
before all the facts can be gathered. Policymakers simply want
reduced uncertainty and, ideally, better assessments than those
available to adversaries. Truth-finding, therefore, cannot be an
unfailing guide to intelligence success.
Lacking a sound theory of intelligence, a practical problem arises:
intelligence reform tends to focus not on time-tested principles, but
on the last failure, which can be a poor guide to long-term
success.13 Yet the US government continues to study failures for the
purpose of intelligence reform, risking sensitive interconnected
operations.14 For example, following the treachery of Aldrich Ames,
the CIA mole who in 1985 betrayed agents to Moscow, critics
complained Ames had access to too many secrets. Too much sharing
of sensitive material had cost valuable agents’ lives. After 9/11,
however, critics complained of too much secrecy and too little
sharing of sensitive material. They demanded that intelligence
agencies loosen requirements for “the need to know” and
institutionalize the “need to share.” Those operatives who
remembered the earlier lessons and resisted, having lost sources to
Ames’s treachery years before, were branded as “old school.” Then,
following massive data leaks by Chelsea (Bradley) Manning and
Edward Snowden, both of whom had access to secrets well beyond
their “need to know,” sources were (predictably) jeopardized or lost.
Reformers called, once again, for better secrecy. Intelligence experts
worried that sharing had gone too far, empowering adversaries from
Vladimir Putin to the Islamic State and al-Qaeda.
Regardless of one’s position on secrecy, the seemingly varied
lessons from past failures present a conundrum. If collection and
retention of secrets are not always essential to good intelligence,
and the intelligence cycle is no guide to success, what is? Do
enduring principles of sound intelligence practice exist—ones that
apply to military battles, diplomatic standoffs, and attacks by
terrorist cells regardless of country or historical era? How do we
measure intelligence capabilities before intelligence failure and
optimize our chances for success? How does intelligence relate to
power and political theory writ large? Although intelligence theorists
have worked diligently for years, convincing answers to these
questions remain elusive. This volume aims to provide at least some
of them.
Before doing so, however, I will mention five premises underlying
the theory of intelligence developed in this book.
• First, the mission of intelligence is to help competitors act by illuminating
opportunities for wins through competitive, purposeful learning. Failure and
success in intelligence is therefore always relative to the competitive
performance of others.15
• Second, this study presumes that national intelligence has to be understood
in the context of international politics, which is characterized by conflict,
anarchy, and the currency of power.16 States compete using diplomacy and
force—carrots and sticks—the effective application of which depends on
what they know about each other.
• Third, cooperation for common purpose can only happen when states know
the potential gains. In the absence of such knowledge, states will tend to
augment their power unilaterally, even at the risk of triggering an arms race.
Such spiraling insecurity is known among political scientists as the “security
dilemma.” Intelligence theory may offer an escape from it.
• Fourth, the attributes of repeatedly successful intelligence practices,
discerned from historical examples, can help build a sound theory of
intelligence and guide us to best practices, regardless of any particular
distribution of power or technological context.
• Fifth, competitive learning happens naturally because humans are naturally
curious. Formal intelligence services exist to accelerate matters. And while
natural conditions (e.g., proximity to the English Channel) can make learning
easier for some competitors than others (e.g., British ships versus Spanish
ones navigating in a storm), in this volume, we are principally concerned
with engineered informational advantages, even as we must recognize that
they are helped or hurt by underlying conditions or the varying curiosity of
presidents and kings.
With all these natural advantages, will your dog necessarily win?
No. This is because the practice of “intelligence” allows competitors
to alter any competitive “terrain of uncertainty” for the purpose of
overcoming opening disadvantages of this kind.
For example, as your dog’s trainer, you have some intelligence
assets that, with careful thought and planning, you can leverage.
Although your senses are less sharp, you are taller. This “platform”
advantage means you may, despite inferior eyesight, see farther
down the road than she can. You also have a mobility advantage.
You can scope out the battlefield while keeping her penned up. If
you think ahead and map the terrain before taking her on her walk,
you can choose your route so that your platform advantage can be
used to best effect.
Second, although your decision-making may be less swift than
hers, you can be more focused on the training than she will be. As
she explores the roadside smells and hunts field mice, you can
concentrate on reading signals and remembering the locations of
gates and fences that can help you restrain your dog if another one
comes along. In other words, you can compensate for her faster
instinctual reaction times by using analytical indicators you know and
trust. You might watch herds of horses grazing near the road, for
example, because you know if they suddenly prick their ears at
something approaching, your dog might not notice but you would.
Thus, you could anticipate your dog’s behavior better than she
could.
In sum, by taking deliberate measures, you are engineering
tactical and strategic intelligence advantages designed to overcome
your dog’s natural strengths to gain decision-advantages when
training her. She is thinking tactically about multiple adversaries; you
are thinking strategically about just one—her.
Then it happens: the horses are craning their necks. You can see a distant
movement, which is enough to know that, whatever it is, you are at risk of
being dragged down the road in a few short minutes. You remember the gate
you just passed and turn back before your dog notices that a horse and rider
are about half a mile away, with a loose dog running behind. You have about
fifteen yards to sprint to get behind the fence and control your dog. You get
there in time. As the strangers pass, your dog is surprised, tries to lunge at
them, but cannot. You have won this battle despite your opening competitive
disadvantages.
The idea that competitive learning requires tools derives from the
notion that a decision-maker is, in the first instance, her own
intelligence platform because she is the host for sensors, such as
eyes and ears. These sensors, in turn, communicate through nerve
signals to the brain so the decision-maker can act. She is, in other
words, an integrated collection and sense-making entity. As such,
humans are near-perfect systems for gathering their own
intelligence.
Delegating or expanding the intelligence function to others
involves employing more of each of these essential tools in some
way. Competitors choose to do so because they want to gain better
information on adversaries than their own faculties can provide, or
than adversaries have on them. Most decision-makers feel smart
enough; they just abhor relative uncertainty. They want help getting
access to a competitor, perceiving what he is doing, understanding
his purpose, and knowing how best to respond, given that
competitor’s knowledge and expectations.
The intelligence historian’s task, then, is to identify whether
relative knowledge was crucial to a winning decision, determine how
that knowledge came to be (lucky or deliberate; through better
learning or denial), who provided it, and what platforms, sources,
processors, and communications systems were used. At what point
was the information determined to be relevant to the competition?
Was it protected? If it was not protected, was this due to an
oversight, ignorance, distrust, the intent to deceive, or knowledge
that the adversary was blind? If the latter, was this blinding
engineered or simply exploited? It is important to remember that
even when a formal intelligence process exists, it may not be
effective or connected in any way to decision-making, in which case
it is irrelevant. One then needs to determine what informal system is
connected and how it works.
In actual practice, finding the intelligence function in human
affairs can be tricky. Sometimes one can to do so by finding likely
platforms and tracing forward to decisions or backward to spies.
Professionals know to do this kind of thinking when designing
collection systems, countering spies, or recruiting agents, and the
results are often surprising. For example, after 9/11 the US Federal
Bureau of Investigation (FBI) recognized that libraries were potential
intelligence platforms for terrorists, triggering interest in gathering
information on their use. The public reaction was immediately
hostile, because most people do not think of libraries in this context.
Libraries are held sacrosanct by a culture deeply rooted in the
democratization of knowledge. Librarians collect books, store them
for public use, and safeguard equal access to everyone. Most people
do not think of libraries as part of an intelligence system, and rightly
so. But, from an intelligence perspective, libraries can be intelligence
platforms for learning how to build a bomb, finding maps, or
meeting coconspirators without generating suspicion. From a
counterintelligence standpoint, libraries can be sensor-rich collection
platforms, having reference librarians and security cameras that can
help identify odd behavior and trace networks of coconspirators.
During an insurrection pitting students against a tyrannical
government, the distribution and qualities of libraries, universities,
and internet cafés are part of the terrain of uncertainty. A
government may suspect that revolutionaries are using cell phones
to organize, and so demand that telecommunications companies
help find the leaders or lose lucrative contracts.
Although libraries and internet-capable cell phones constitute a
readily understandable example of civilian “platforms” usable for
intelligence, the historian of intelligence must remain open to finding
less obvious platforms and sensors over centuries of practice and
technological change. Prisons can be platforms hosting an array of
sensors in the form of prisoners or guards. Ships can be platforms
for viewing the vulnerabilities of enemy ports. Horses can be
platforms for helping human eyes and ears cover wider battlefields.
And insects can be platforms for getting nano-sensors inside
buildings. What makes for superior platforms, sensors, and
communications capabilities in any era or competition will vary,
depending on technology, the nature of the competition, and the
creativity of the competitor. What theorists and practitioners need to
discover are the winning attributes common to them all. If we do,
we will have the beginnings of sound intelligence theory.