Review: Enemies of Intelligence–Knowledge and Power in American National Security

3 Star, Intelligence (Government/Secret)
Enemies
Amazon Page

3.0 out of 5 stars Very Disapointing, Incomplete, Dated, and Annoying

September 19, 2007

Richard K. Betts

Retired Reader is as usual being kind. I agree that the book is useful as a sense of what the insider's want us to think, but it is at best a superficial summary (easily read) that has so many errors (of perception) and omissions (of fact) as to hardly be worthy of the read.

I quickly realized the general shallowness, but out of respect for the author stopped reading and instead went and read every single footnote, every single index entry, and indeed confirmed that this is a mix of old work, draws only on “members of the club” work, and fills in the gaps with Op-Eds and newspaper stories written by people who generally have no clue. Then I read the whole book.

Anyone who cites Deborah Burger's pabulum about “revolution in intelligence affairs” is kissing the institution's ass (pun intended); and anyone who considers the Sims-Gerber book to be transformative (as opposed to useful if you want the status quo), is simply out of touch with reality, with the possibilities, and with the complex pathologies that plague both the intelligence community (see my five images) and our politicians, every one of them, but most especially Dick Cheney and Nancy Pelosi, impeachable for breach of trust. For additional background, see my IJCI commentary on “Intelligence Affairs: Evolution, Revolution, or Reactionary Collapse?”

This is in fact what annoyed me most about this book–it glosses over the high crimes and misdemeanors of the White House but also of the Cabinet, as well as the blatant errors and omissions of virtually every senior intelligence officer. The USS Liberty and USS Pueblo were outrageous acts of war that could have been defended against and also justified retaliation, but instead both Administrations covered up, as they covered up on 9/11 and the Kennedy Assassination. In the case of George Tenet, he screwed up three big things: the clandestine service; the hunt for Bin Laden; and his ignorance in refusing to follow the recommendations made by Boyd Sutton in “The Challenge of Global Coverage,” calling for 1.5B a year against the 95% of the world that we ignore at our peril.

This book gets three stars instead of the two I planned originally because the author is an original, has demonstrated he knows what the higher standard is, and I will simply assume that at this time in his life he too busy to read broadly. He could start with my reviews, which are free.

There are so many books over-looked by the author here that I just shake my head. I link to a few below.

I expected the author to be dismissive of open sources of information, and to ignore my own work despite the fact that he has been a speaker at one of my conferences and knows full well the contents of my varied books. What I was not expecting was what I consider to be an abject superficial apologia, almost a hearts and flowers farewell to the John McLaughlin's of the past.

I was also not expecting the quickly evident lack of familiarity (or lack of time to properly integrate if known) with the wealth of information from many authors on both policy and intelligence failures, and the facts thereof. Nowhere in this book, for example, does the author properly credit Charlie Allen with sending 35 line crossers into Iraq to confirm what we already knew from the defecting son-in-law: keep the cook-books, destroyed the stocks, bluffing for regional sake.

Although acceptable in an academic book of this kind, the author's lack of understanding of the magnitude of the budget (it is $60 to 70 billion, not the loose lips $44 billion that Mary Graham gave us) and his lack of understanding of how what we do now fails to address the ten high level threats to humanity that LtGen Dr. Brent Scowcroft, USAF (Ret) helped identify, fails to help us create the needed four forces after next including the White Hat Peace from the Sea and Peace from Above, relegates this book to the curiosity pile.

I was particularly annoyed by the disingenuous glibness in speaking of the value of an intelligence reserve, when the author knows full well that because of security blinders the secret puppies talk to just 14 of the 1400 Muslim experts in America; and either his obliviousness or naiveté in suggesting that dissent and multiple advocacy channels are worth anything when our young analysts are near idiots (the World Bank official I spoke to says their assumptions about Sudan and elsewhere are so ignorant as to be frightening); have no processing power, not even the analytic desktop that Diane Webb designed in 1985-1986, at which time I discovered we had no fewer than twenty “compartmented” projects to build the same all source fusion station, only each was a sweetheart deal with a different vendor; or access to the 96% of the information that the secret world does not have access to and will never have access to unless we first create a Multinational Information Sharing Activity outside the wire and able to share without restraint.

The book whimpers to an end. For a free and broader grasp of reality and pathology, see my reviews of other books on intelligence (especially the ones the author neglects to integrate), and sign up for the free weekly report, GLOBAL CHALLENGES: The Week in Review. See Earth Intelligence Network.

I won't even touch the lack of serious coverage of education, commercial intelligence, policy-maker ignorance, and all the other small but important details left out of this book. This book comes nowhere near the reality that you cannot create and maintain smart spies in the context of a dumb nation. This is what we get from a community that spends $60B a year creating a President's Daily Brief ($1.2B/week), largely ineffective at all else.

Below are the tip of the iceberg.

On Intelligence: Spies and Secrecy in an Open World
The New Craft of Intelligence: Personal, Public, & Political–Citizen's Action Handbook for Fighting Terrorism, Genocide, Disease, Toxic Bombs, & Corruption
Legacy of Ashes: The History of the CIA
Who the Hell Are We Fighting?: The Story of Sam Adams and the Vietnam Intelligence Wars
Denial and Deception: An Insider's View of the CIA
See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism
Secrets: A Memoir of Vietnam and the Pentagon Papers
Wedge: From Pearl Harbor to 9/11–How the Secret War between the FBI and CIA Has Endangered National Security
Deep Cover: The Inside Story of How DEA Infighting, Incompetence and Subterfuge Lost Us the Biggest Battle of the Drug War

See my many lists for broader recommendations.

Vote on Review
Vote on Review

Threat Archives on Public Intelligence (1992-2006)

Threats

2004

NO

Threat Bjorgo Root Causes of Terrorism

2004

US

Threat Kaplan The Saudi Connection to Terrorism

2004

US

Threat Knapp Al Qaeda and the Mass Media (PSYOP Briefing)

2004

US

Threat Knapp Al Qaeda and the Mass Media (Reference)

2004

US

Threat Knapp Distortion in Islam and Jihad

2004

US

Threat Knapp Diversity in Islam

2006

US

Threat Daly Al Qaeda Against Saudi Oil

2006

US

Threat Johnson Battle of Algiers and Its Lessons

2006

US

Threat Seagraves Gold Warriors: New Epilogue, Further of US Theft of WWII Gold Loot

2006

US

Threat Seagraves Gold Warriors New Chapter Seventeen

2006

US

Threat Steele Who Is to Blamce?  The Vice President and Us

2006

US

Threat Stern Al Qaeda Approach to US Muslims

2006

UK

Threat Story Crunch Time for CIA, Banks, and Related Thieves of $742 Trillion

2005

US

Threat Ellis Scenarios for Next Generation Crises in Latin America

2005

US

Threat GAO GAO Report: US Not Addressing Islamic Fundamentalism

2005

US

Threat OSS Somalia Piracy Quick Report

2005

US

Threat OSS Report on Remote Detonation of Improvised Explosive Devices

2005

US

Threat OSS PRC Trade in Latin America

2005

US

Threat Ray & Gross The Perfect Storm

2005

US

Threat Steele Worksheet for Book Review on Crossing the Rubicon

2005

US

Threat Steele Mother Nature as Terrorist

2005

US

Threat Steele 9-11: Who’s To Blame?  One Man’s Opinion

2005

US

Threat Thompson Is the Terrorism Threat Over-Rated?

2004

US

Threat Daly Globalization & National Defense (Ecological Economics)

2004

US

Threat Louisiana Pre-Hurricane Katrina Study and Conclusions

2004

US

Threat Palmer The Real Axis of Evil: 44 Dictators

2004

US

Threat Peters Early Warning of Disease From Pattern Analysis

2004

US

Threat Seagrave Transcript of Video on Stolen Gold Held by US Treasury & Citi-Bank

2004

US

Threat Vlahos Attachment to the Muslim Renovatio Memorandum

2004

US

Threat Vlahos The Muslim Renovatio and U.S. Strategy

2004

US

Threat Vlahos The Muslims Are Coming

2004

US

Threat Vlahos Insurgency Within Islam

2003

US

Threat Danzip Countering Traumatic Attacks

2003

PRC

Threat OSS PRC Treaty & Trade Penetration of Latin America

2002

US

Threat Emerson & Steele American Jihad Map

2002

US

Threat Steele ACFR, 19 Cities: 9-11, U.S. Intelligence, & the Real World

2000

US

Threat Steele Georgetown/AWC: Non-Traditional Threats

1998

US

Threat Steele TAKEDOWN: Targets, Tools, & Technocracy

1994

US

Threat Steele 6th National Threat Symposium: New Directions in Information Sharing

2005

NGO

Threat NGO Changing Face of Global Violence

2005

NGO

Threat NGO Human Security Audit

2004

US

Threat Pelton Robert Young Pelton on Dangerous World

2004

US

Threat Steele Three Book Review Relevant to Global War on Terror (GWOT)

2003

US

Threat Copeland Analysis of the New Paradigm for Terrorism

2003

US

Threat Manwaring Street Gangs: New Urban Insurgency

2003

US

Threat Manwaring War & Conflict: Six Generations

2003

US

Threat Pelton Summary of Presentation on World’s Most Dangerous Places

2002

US

Threat Betts The Next Intelligence Failure: The Limits of Prevention

2002

NL

Threat Jongman World Conflict and Human Rights Map 2001-2002

2002

US

Threat Wheaton Transitions from Authoritarian Rule: A Model

2002

US

Threat Wheaton Virtual Afghanistan: Modeling a Transition from Authoritarian Rule

2001

US

Threat Godson Governments and Gangs

2001

US

Threat Heidenrich Early Warning & Complex Monitoring of Ethnic Genocide (Slides)

2001

US

Threat Heidenrich Early Warning & Complex Monitoring of Ethnic Genocide (Text)

1998

US

Threat Transnational Enemies: Threats Without Names

1998

US

Threat Glaebus Metaphors & Modern Threats: Biological, Computer, Cognitive Viruses

1997

US

Threat Fialka War by Other Means: Economic Espionage In (Against) America

1997

US

Threat Schwartau Information Warfare: The Weapons of the Information Age

1997

US

Threat Tenney Cyber-Law and Cyber-Crime: Spamming Methods and Costs

1996

US

Threat Keuhl School of Information Warfare Threat and Strategy: Shifting Paradigms

1996

US

Threat O’Malley Countering the Business Intelligence Threat

1996

US

Threat Strassmann U.S. Knowledge Assets: The Choice Target for Information Crime

1996

US

Threat Winkler Electronic Industrial Espionage: Defining Ground Zero

1994

US

Threat Whitney-Smith Refugees: Weapon of the Post Cold War World–Counter Offensive: IW