Global Security and Intelligence Studies Volume 2, Issue 1, Fall 2016 | Page 110
Global Security and Intelligence Studies
Hughes-Wilson is particularly adept at fleshing out the historical development
of SIGNIT and IMINT from the most rudimentary technology to the highly advanced
equipment of today. His case study on how signals intelligence was crucial in ensuring
the victory of the U.S. Navy over the Imperial Japanese Navy at Midway is particularly
gripping. It is also enlightening about the organizational pathologies perpetually at
play in contemporary intelligence structures, one aspect of which relates to the vexed
question of the ownership of SIGNET: does it reside with the communicators and
signalers on the one hand or with the intelligence people?
Hughes-Wilson is an engaging writer who brings the reader inside the mind
of the prudent intelligence operative: consistently asking questions and performing
an officious bystander test as he sifts through large amounts of information. He is
very good at guiding the reader through the practical application of the theories
undergirding the intelligence process. This is particularly illuminating in regard to
his summation of the severe deficiencies in the American intelligence apparatus in
1941 on the eve of a war that all knew was coming. For it is the case that the problems
leading up to Pearl Harbor, including those of over compartmentalization and interorganizational
rivalries, are ones of enduring relevance and bring into focus the need
for all-source integration and assessment; an ideal which is difficult to achieve within
any national security establishment.
The choice of case studies tailored to fit a particular theme of the intelligence
process, whether related to failures or successes, provides the basis for a series of
illuminating deconstructions. For instance, the failure of the political leaders of the
Soviet Union and Israel to predict the oncoming onslaughts, respectively, of Operation
Barbarossa in 1941 and Operation Badr in 1973 was due, Hughes-Wilson argues,
not with nonpossession of the correct information predicting enemy intentions but
instead centered on the translation of information into intelligence. In the former
case, it hinged on a developed organizational culture of only reporting information
which the dictator found palatable while the latter was caused by the monopolization
of all-source intelligence by Israeli Military Intelligence. On the issue of protecting
state secrets, he uses the recent high-profile cases of Bradley Manning, Julian Assange,
and Edward Snowden as exemplars explaining the impact of an inadequate security
checking mechanism, the increasing difficulty of securing masses of electronically
collected data in the high-technology age and the eternal dilemma of balancing
national security concerns with that of protecting whistleblowers acting in the public
interest. For deception, the Allied planning of the highly risky, but ultimately successful,
D-Day landings is used while the area dealing with intelligence fiascos considers the
U.S. Special Forces operations in Son Tay, Vietnam and Iran at the time of the hostage
crisis. The author also provides an excoriating analysis of the role played by the leaders
of the British intelligence community in enabling the administration of Tony Blair to
produce a “dodgy dossier” which led the country into a war of dubious legality against
Saddam Hussein’s Iraq in 2003.
The issue of intelligence and the challenges posed to national security by
terrorism and by cyber warfare are also given consideration by the author. He provides
a thoughtful summary on the grievances and “catalysts for conflict” that often form the
104