We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure [email protected]
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This chapter examines how the MUST represents terrorism in the estimates. It starts by identifying and discussing how the concept of terrorism is represented over time. The analysis pays special attention to how critical events (such as 9/11) have or have not influenced the understanding and use of the term terrorism. Further, the investigation seeks to identify how the representation of terrorism is used throughout the estimates and whether components of the representation are present in other parts of the assessment under a different name. Lastly, the chapter aims to identify and discuss gaps in relation to the representation of terrorism.
THE EARLY YEARS
In the 1998 estimate, the concept of terrorism is only mentioned on one occasion, which is in the context of the conflicts in the Middle East and Northern Africa. In the assessment, there is a growing concern that these conflicts might eventually influence Sweden and Swedish security: ‘through immigration and the spread of conflict related terrorism stemming from conflicts in the homeland’.
The amount of text on terrorism is too limited to indicate what kind of understanding the estimate connotes to the concept of terrorism.
Under the heading ‘Crises and Conflicts’, the 1999 estimate frames terrorism within the concept of ‘New Threats’. The new threats are framed in a world where the Cold War has ended and, in the aftermath, a number of smaller conflicts have surfaced. The estimate represents the resurfacing of the phenomenon of terrorism as being a consequence of this new type of conflict. It is acknowledged in the estimate that nonstate actors are a part of these emerging conflicts and also claims that they may be categorised as terrorist or criminal organisations. Later in the 1999 estimate, international political development is discussed in respect to how that might influence the threats that might appear in Sweden or in a Swedish context, and under what circumstances Sweden might be subjected to acts of terrorism.
During my six years as an intelligence professional in the Swedish Military and Security Directorate (Militära Underrättelse och Säkerhetstjänsten – the MUST) I produced and consumed intelligence assessments of different scope and focus. During this time my curiosity about the phenomenon of knowledge within intelligence analysis grew. I tried to make sense of and categorise what the contribution of the intelligence service really was to the political policymaking process. At the same time there was (and still is) a vibrant debate among scholars and practitioners over the problems of intelligence analysis. The debate on intelligence analysis is primarily concerned with the issue of why it often comes to ‘wrong conclusions’. Additionally, the debate is concerned with the question of why intelligence services seem ineffective in providing timely intelligence to policy decisions, and what could make the analysis and input to policy more efficient.
My initial curiosity later changed to a more critical reading of intelligence and its special kind of knowledge. The intelligence service – not only in Sweden but also all over the world – produces knowledge on security issues, conflicts, war and complex political processes. The knowledge is often produced within a tight time frame, with only some of the relevant information available, which makes the intelligence analysis task more challenging and difficult. In spite of these difficulties intelligence knowledge is used to contextualise, explain and predict events in the real world. Its fundamental aim is to underpin strategic action and help security policymakers to make informed decisions; consequently it has a great impact on how security issues are understood and how security and foreign policy is shaped. Yet history shows that on numerous occasions intelligence has affected policy outcome in the wrong direction and grave consequences have followed.
In my critical reading of intelligence products, I noticed what seemed like peculiarities. For instance, the text of the assessments seemed to contain a high degree of repetitiveness in wording and substance. Furthermore, the conclusions seemed to be articulated as objective truths. They were formulated with objective truth claims and the arguments and evidence in support of the conclusions were mostly diffuse or hidden in the background of the text.
The analytical work of the intelligence service is directed based on the previously accepted knowledge. Even though parts of the analytical work are directed by the need of the intelligence consumer, many of the choices of prioritising and the scope of the analysis are made by the individual analysts. The chapter examines which facts and arguments are used, how the analysts argue when conceptualising the issues in focus and how choices are made regarding what information to relay for the intelligence analysis. The information and facts used for the assessments are primarily dependent on previous analytical work and therefore are also constrained by the accepted knowledge. Additionally, the chapter examines the literary style of the estimates by investigating how conclusions are presented and substantiated in those estimates. That is, it examines how analysts relate to the possibility of objectivity and value neutrality.
Direction and Prioritisation
There are three different ways for a specific assessment to be written: first through the annually revised production plan, second as a result of something that has happened and direct tasking coming from the intelligence consumers, and third through initiation by the analysts themselves motivated by their insight into changes within their area of expertise.
The first of the ways to initiate an assessment begins with the established production plan of general issues and topics that the intelligence consumers have expressed interest in. Next follows organisa- tional decision making and prioritisation over how and when different assessments should be written. The general topics to which the intelligence service should pay attention are decided by the intelligence consumer, but prioritisation between the different needs is conducted within the intelligence service. The prioritisation choices are usually made after preparation by a specific planning management team and thereafter through a decision made at an organisation-wide weekly production board meeting at which all departmental management is represented. Following this, the question is distributed to the analyst or group of analysts.
States increasingly cooperate to buy expensive defence equipment, but the management and legal aspects of these large collaborative procurement programmes are complex and not well understood. The Law of Collaborative Defence Procurement in the European Union analyses how these programmes are managed, and highlights areas which require improvement. The book addresses the law applicable to these programmes, which is built upon a four-layer 'matryoshka doll' of legal relationships at the crossroads of public international law, EU law and domestic law. Using practical examples, the book makes proposals for clarifying the legal basis and improving the efficiency of defence equipment cooperation among EU member states. By covering a broad scope of legal issues, this analysis goes beyond the defence sector and is relevant to centralised or joint purchasing and procurement activities of international organisations, providing invaluable information for practitioners, policy-makers and academics aiming to analyse or improve these projects.
The repertoire of political participation in democratic societies is expanding rapidly and covers such different activities as voting, demonstrating, volunteering, boycotting, blogging, and flash mobs. Relying on a new method for conceptualizing forms and modes of participation we show that a large variety of creative, expressive, individualized, and digitally enabled forms of participation can be classified as parts of the repertoire of political participation. Results from an innovative survey with a representative sample of the German population demonstrate that old and new forms are systematically integrated into a multi-dimensional taxonomy covering (1) voting, (2) digitally networked participation, (3) institutionalized participation, (4) protest, (5) civic participation, and (6) consumerist participation. Furthermore, the antecedents of consumerist, civic, and digitally networked participation, are very similar to those of older modes of participation such as protest and institutionalized participation. Whereas creative, expressive, and individualized modes appear to be expansions of protest activities, digitally networked forms clearly establish a new and distinct mode of political participation that fits in the general repertoire of political participation.