Defing Intelligence: Between Statecraft, Markets, And Morality

By ROS Sayumphu, Senior Researcher of the Sala Traju Association

I. Introduction

When someone hears the word “intelligence,” it is almost inevitable that they will associate the term with spying and keeping secrets. When they hear this, most people, including the average person,
are likely to think of well-known fiction movies, such as James Bond. This is due to the fact that intelligence is a broad concept that can refer to a wide variety of different activities. It contains elements such as action, thriller, suspense, guns, and others; however, it is unclear to what extent these activities reflect the actual intelligence that exists in reality, and whether or not they reflect
a universal definition of intelligence that may or may not be uniformly practiced by all states and actors on earth.

The current understanding of intelligence activities, it is argued in this article, reflects the western approach the majority of the time and does not provide a definition that is universal and can be utilized in any circumstance. This article will start by taking a look at the current definitions of the topic,
as well as the actors involved. In the following section of the article, an argument will be made suggesting that the degree of intelligence that can be observed in people of various cultures can vary quite a bit from one another.

II. Trying to Define Intelligence

The academic field of intelligence, emerging from international relations, did not emerge until the latter half of the 20th century, just like many other academic subfields did not do so until that time (Dexter, Phythian and Strachan-Morris, 2017: 922). In years gone by, gathering intelligence was synonymous with activities such as espionage and the guarding of secrets (Falode, 2021: 71-72). The implementation of intelligence has developed over the course of time in response to both the natural progression of events and to outside influences such as the advancement of technology (O’Connell, 2005: 146). The efforts that are being made to provide a uniform interpretation of intelligence are complicated as a direct result of the lack of academic literature and due to the evolving of the world that effect the interpretation of the term (Phythian, 2008: 4-5).

The gathering and analysis of intelligence was accorded a significant amount of focus prior and during both of the world wars; however, during the time of the cold war, this focus was elevated to an even higher level (Whitaker, 1992: 113). As a direct consequence of this, intelligence operations can be carried out at any given time through either technological intelligence (also known as TECHINT), collecting information online or through other digital devices, or human intelligence (also known as HUMINT), using human asset to collect intelligence (Whitaker, 1992: 114). Despite the fact that the intelligence community’s attention has gradually shifted to involve itself in TECHINT as a result of the progression of technology, the significance of human intelligence has not decreased (Wilford, 2022: 519). What exactly does it mean to be intelligent now that we’ve arrived at this point? There is a clear distinction between the methods of intelligence collection that rely on TECHINT and those that rely on HUMINT, yet as was mentioned, the discreet nature of intelligence remains essential and protecting people’s or source’s  anonymity while collecting intelligence is an essential part of the process (Kamiński, 2019: 88). That requires either the collection of information that is not readily available to the general public or the extraction of information from sources that is either confidential or protected by employing TECHINT or HUMINT on the information in question (Breakspear, 2013: 686-687). In a similar fashion, there is a debate regarding intelligence operations, which include activities that extent beyond just gathering of information, to include others such as, the evaluation of information, as well as counterintelligence and operation, whether a fulfilled intelligence definition must satisfied all activities above (Breakspear, 2013: 685).

The significance of definition of state espionage, first, will be emphasized further in the following section. The idea that states engage in intelligence operations or activities is not a novel one; rather, it is an idea that has been repackaged and given a new label (Falode, 2021: 72). In order to ensure the safety of the nation, the goal of intelligence is to assist with the defeat of the adversary and emerge victorious which will be accomplished by gaining an advantage over them (Shiraz and Aldrich, 2019: 1317-1318). The intelligence operation has been utilized by states an uncountable number of times, as was mentioned earlier. Since the turn of the previous century, for example, Sun Tzu’s military tactician has also been known to mention it (Graaff, 2020: 1). In both of the world wars, intelligence was used to gain advantages or to win battles; later, during the cold war, it became even vital (Sherr, 1994: 56). The usage in the 21st century has been just as important, if not more so than in previous centuries (Yılmaz, 2017: 31).

In addition, understanding intelligence requires more than just looking at it from a political or a military angle. It’s possible that this definition doesn’t cover everything. The rise of technology as well as the strengthening of international relations are both factors that contribute to the economic interdependence of countries (Nikoloski, 2016: 46). As a consequence of this, the movement toward neoliberalism in the 21st century suggests that the economy can be a source of power as well as competition. Therefore, it is absolutely necessary to have a comprehensive understanding of the operations of the economic intelligence community. There are a variety of perspectives held among the states regarding this economic intelligence, which relates to the realm of economics. The concept and practice of intelligence, in addition to the activities that are associated with intelligence, are almost entirely a product of colonialism or westernization; as a result, the input has a strong root from western civilization which resulted in neoliberalism (Aldrich and Kasuku, 2012: 1011). The act of stealing trade secrets, information regarding an opponent’s economic position or strategy, or intellectual property rights can all fall under the category of economic espionage (Fraumann, 2017: 304). This practice allows states to gain an economic advantage over a rival which is part of the national interest and survival (Lotrionte, 2015: 452). One holds the belief that the use of economic intelligence for the purpose of ensuring the security of a state is acceptable; however, the use of economic intelligence to support one’s own private markets and tradecraft is considered unacceptable (Lotrionte, 2015: 472). On the other hand, some states consider it to be completely unacceptable that is economic espionage poses comparable threats to the states (Wang, 2016: 550).

In general, the purpose of state intelligence is to achieve and then sustain a position of superiority vis-à-vis one’s adversary or opponent. This is the ultimate goal of state intelligence. It has also been suggested that intelligence is more than just the act of gathering information; rather, it involves critically analyzing the raw data in order to produce an analysis that is more substantial and of higher value (Oyedokun et al., 2022: 52). In response, the information, whether it is raw data or an analysis of the raw data, may then, to some extent, and depending on the actors, conduct counterintelligence or operations that are required to dissuade or gain an advantage over the adversaries (Handel, 1990: 1-2). There is a school of thought that maintains intelligence operations are in a state of constant war even when peacetime is in session (Phythian, 2008: 57). It is important to reemphasize that states relies on intelligence to secure and maintain national security. Everything revolves around the safety and interests of the state.

To circle back around to time as well as other factors, such as advancements in technology, the intelligence industry in the private sector has been steadily growing over the past few decades. Following the collection and examination of the data, it is now possible to use the intelligence to gain a competitive advantage in the business world or on the market by private actors (Crane, 2005: 234). Because the world is ruled by a capitalist system, it is possible to argue that the competition between private companies to amass a great deal of wealth in order to dominate the global market is not irresponsible (Price, 2014: 45). However, this assertion is highly debatable. On the other hand, the private sector must be almost entirely obligated to the law and must operate in conjunction with the law, whereas this may not be the case for the intelligence and operation of the state (Cloutier, 2013: 62). These requirements must be met in order for the private sector to function properly or it would run the risk of coming across a law suit (Crane, 2005: 234). The intelligence community that works in the private sector is well prepared and well trained for a professional career, which may or may not involve fewer covert activities than the intelligence community that works for the state (Robson Morrow, 2022: 412). It is possible to obtain information from both TECHINT and HUMINT, however, access to this information is more restricted, and public information is used more frequently. In other word, it is possible to obtain information from both of these sources, it is more common to use public information (Hou and Wang, 2020: 4). The idea of the business intelligence operation is to collect useful information including the added value skills or operation to further enhance the success of the industry (Crane, 2005: 234). That is, in order for the business, to have an edge over the competitors and to accumulate benefits over its adversary. The collection of the intelligence then proceeded to the analytic procedure and put forward to the decision makers for further steps (Hou and Wang, 2020: 5). It is almost a similar process to the state intelligence, however, the scope, objectives, resources, actors, and pool of information can be limited and much narrower for the business intelligence (Hou and Wang, 2020: 5).

However, business intelligence or industrial intelligence can also be used in conjunction with state intelligence if there is sufficient coordination between the two. One illustration of this would be the dissemination of technical intelligence to state governments for the purpose of empowering those governments to carry out intelligence-related operations (Trim, 2002: 12). Accordingly, to some extent, the operations of both the intelligence unit and the company can be legally sanctioned provided that they comply with the laws, morality, and ethics that are currently in place (Nasheri, 2009: 2). In tandem with this development, there has been a rise in the number of unwelcome business intelligence operations. Theft of a trade secret, theft of critical business information by installing viruses on an adversary’s business competitor, or eavesdropping on or hacking into the system of an adversary’s business competitor in such a way as to violate the law-protected principle of good faith and fair play in commercial competition are examples of actions that may have crossed the line (Fraumann, 2017: 304). In addition, a significant cause for concern is that a commercial organization might provide the government with access to the data of its customers, in addition to vital information that is privately held. In this particular instance, the United States’ companies that are responsible for hosting billions of users has worked together with the government of the United States to provide intelligence to the government (Trim, 2002: 12).

Intelligence gathering is also carried out by a variety of other actors, including well-structured organization such as international organizations or non-governmental organizations (NGOs) or even terrorist groups. It is crucial for that organization, for example, the United Nations, to have adequate resources to gather information, analyze information, and respond in order to fulfill the purposes of the United Nations that is to ensure international peace and security (Ekpe, 2007: 379). To what extent the intelligence that is used  for United Nations is ordinary information/an open source or of a valuable, discrete nature, however, remains uncertain (Abilova and Novosseloff, 2016: 7). In contrast, NGOs typically have fewer resources and expertise, as a result, their operations can be limited to what is feasible, such as open source, and are not as sophisticated as those of large organizations; they typically serve a specific purpose, such as human rights (Blancke, 2010: 165). The terrorist can use intelligence, in also a limited scope, to uncover the target’s vulnerabilities in order to instill fear in them (Richard H. Shultz and Beitler, 2004: 61-62). Due to the fact that the terrorist organization has somewhat access to TECHINT, it is possible that they will combine force with HUMINT in order to achieve their objectives (Richard H. Shultz and Beitler, 2004: 57). By attempting to define intelligence and analyzing how different actors perceive the topic, it is possible to argue that a pattern is forming that gives priority to information, whether open or confidential, that will be used for the benefit of the respective entity.

Two proposed, arguably, universal definitions of intelligence are as follow:

“Intelligence is the capacity for reasoned foresight that enables advantageous action
(Cox,  2022: 205).”

“Intelligence is a corporate capability to forecast change in time to do something about it. The capability involves foresight and insight, and is intended to identify impending change, which may be positive, representing opportunity, or negative, representing threat (Breakspear, 2013: 688).”

The definitions that are presented here capture the development of intelligence activities as well as the practices of actors, which, if all goes well, will eventually evolve into a definition that is more acceptable for all. Despite this, perhaps the situation may not be accurate in reality. For example, both the United States and the United Kingdom gather intelligence in similar way, but their interpretation can be different to one another. The former prioritizes data that has been refined and analyzed, whereas the latter, priority is given to information that has not been processed (Breakspear, 2013: 684).

In addition, the culture and practice of intelligence in the western world do not in any way, shape, or form reflect the culture and practice of the rest of the world. The major states, in terms of the practices that they observe in their respective societies may not acknowledge other existing methods and interpretation on the matter, the argument will be further investigate in the next section. On the other hand, it is not entirely clear whether activities involving intelligence always yield advantages over competitors or whether intelligence can also be used to maintain the status quo and strategic purposes. Some actors are unable or not interested in taking offensive action because they do not have the necessary resources at their disposal or not their nature such as the United Nations. Even if there is an attempt to have a universal definition, there are still gaps and questions that need to be resolved.

III. Distinct Priority Distinct Definition of Intelligence

The definition of intelligence discussed in earlier section demonstrates that there has been various understanding of what intelligence is, resulting from various actors and process involved. In this section of the article, the author will dive into the regimes and priorities that different actors have that causes the different interpretation of the definition of intelligence, particularly states.

Objectively, the western nations may have in mind a definition that emphasizes the foreign policy or international aspects of intelligence gathering (Scott and Jackson, 2004: 152). Making adversarial states weak or gaining a position of strength against opposition states is the primary objective of western nations (Crosston, 2016: 113). To bolster their claims of superiority over the rest of the world, western nations may seek to normalize and universalize their perception of intelligence (Aldrich and Kasuku, 2012: 1011). The reality, however, is that intelligence operations are not always conducted to support foreign policy, but also should be accounted for the survival and development of states for others (Duyvesteyn, 2011: 525). It is not to be deployed to support, for instance, maintaining the liberal system as in the United States and European Unions, but rather to support temporary strategic conditions that each country faces most frequently, such as NATO relevance and expansion for Russia, internal disturbance for China, and Pakistan’s nuclear proliferation for India (Crosston, 2016: 112). Therefore, the idea of intelligence, beside the power western nations, may not necessarily be associated with external advantages, but rather with disturbances that are closer to home.

At the same time, the interpretation or what should constitute as intelligence or information cannot be defined similarly. While western nations to sugar coat their intelligence operation as ethical and discreet sources or a targeted source, while the rest of the world does not have such luxury and can only extract information from any available source, not just intelligence-worthy ones (Aldrich and Kasuku, 2012: 1020). That is, comparing societies can yield varying results concerning their informational sources. Western civilization claims that their intelligence activities an open, technical, and ethical evaluation of informants (Graaff, 2020: 8). Their claims, however, appear inconsistent, as revealed by Edward Snowden’s disclosures, which demonstrated that the U.S. government has systematically violated the rights to privacy of both its own citizens and individuals worldwide through extensive surveillance practices. On the contrary, other society, such as the Arab world, it is unclear to what extent intelligence can be gleaned openly due to different context and culture as the society is not accustomed to it and is not trusted to share or open up on such matters (Rezk, 2016: 227). Intelligence’s problematic definition makes it difficult to distinguish between a secret and information that the western nations prioritized the former (Gill and Phythian, 2018: 20). The latter does not possess a secretive or mysterious nature. When actors ultimately define security or are threatened by various harms, the concern may not be to entice the state besides the first world to utilize mysterious information but rather to utilize all available information, including sources from the media, articles and similar fashion, and any vague information to their advantage (Aldrich and Kasuku, 2012: 1020). Therefore, the intended objectives, purposes, and strategic cultures among states differ and undoubtedly alter the understanding of the term information and intelligence.

Additionally, other aspects of the political system hugely affect defining intelligence. As stated, democratic nations typically choose policies that permit freedom of information and access to information, which satisfies their intelligence needs (Yin and Taylor, 2008: 16). In addition, liberal nations tend to work together, as they did during the cold war, in order to contain communism and diminish its influence (Whitaker, 1992: 125). Therefore, the purpose of intelligence is not limited to obtaining and acquiring information about specific things; it also includes the operation of intelligence that causes chaos in society to destabilize a regime that does not serve the purpose of democracy or does not serve the purpose of liberal world (Sulick, 2015: 49). In contrast, the nature of democracy and other political systems diverges when discussing the target of protection. Democratic nations focus on national interest and security, while other focuses on protecting the safety of the party or the top elites but also the national interest (McDougal et al., 1973: 384-385). The Democratic society works toward keeping in check a foreign threat (Crosston, 2016: 112). With that said, what is defined as threats among societies can be different, what is defined as information and intelligence can be different, and the political system can greatly affect the interpretation and procedures of the conducting intelligence.

IV. Conclusion

To put it succinctly, the intelligence operation in the 21st century has significantly increased since the turn of the century. HUMANINT will, without a doubt, continue to be significant despite the development of technology yet, at the same time, TECHINT will increasingly become critical. In other words, technology has led to an increase in the reliance on HUMINT. The idea of intelligence, which refers to the source of information that can be extracted from both online and offline sources, has also been shaped as a result of this development. The differences of interpretation of the term intelligence can be due to the one-of-a-kind culture, resources, goals, and beliefs that states uphold. These differences have an effect not only on the processes involved in intelligence gathering but also on our understanding of what we mean when we refer to intelligence. At the same time, new actors, such as international organization, private entities and non-governmental institutions, have altered the existing definition and moved beyond the emphasis on states to create the current understanding of intelligence. The current understanding of intelligence is in part shaped by western literature. In the same vein, due to the various security concerns that are placed on different actors, it is extremely difficult to arrive at a unified definition of intelligence. There is little chance of there being a uniform strategic culture across different societies. While this is true, the aftermath of the cold war also plays a role in the division and prioritization of democratic and communist states with regard to the definition of universal terms of intelligence and the procedure for associating them.

Reference list:

  • Abilova, o. And novosseloff, a. (2016) defining intelligence in un peace operations, international peace institute. Doi: 10.1891/9780826111265.0002.
  • Aldrich, r. J. And kasuku, j. (2012) ‘escaping from american intelligence: culture, ethnocentrism and the anglosphere’, international affairs, 88(5), pp. 1009–1028. Doi: 10.1111/j.1468-2346.2012.01116.x.
  • Blancke, s. (2010) ‘intelligence for human rights? Private intelligence structures in human rights affairs’, sicherheit und frieden (s+f) / security and peace, 28(3), pp. 161–168.
  • Breakspear, a. (2013) ‘a new definition of intelligence’, intelligence and national security, 28(5), pp. 678–693. Doi: 10.1080/02684527.2012.699285.
  • Cloutier, a. (2013) ‘competitive intelligence process integrative model based on a scoping review of the literature’, international journal of strategic management, 13(1), pp. 57–72. Doi: 10.18374/ijsm-13-1.7.
  • Cox, j. (2022) ‘a fundamental re-conceputalization of intelligence: cognitive activity and the pursuit of advantage’, intelligence and national security, 37(2), pp. 197–215. Doi: 10.1080/02684527.2021.2005884.
  • Crane, a. (2005) ‘in the company of spies: when competitive intelligence gathering becomes industrial espionage’, business horizons, 48(3), pp. 233–240. Doi: 10.1016/j.bushor.2004.11.005.
  • Crosston, m. (2016) ‘bringing non-western cultures and conditions into comparative intelligence perspectives: india, russia, and china’, international journal of intelligence and counterintelligence, 29(1), pp. 110–131. Doi: 10.1080/08850607.2015.1083337.
  • Dexter, h., phythian, m. And strachan-morris, d. (2017) ‘the what, why, who, and how of teaching intelligence: the leicester approach’, intelligence and national security, 32(7), pp. 920–934. Doi: 10.1080/02684527.2017.1328821.
  • Duyvesteyn, i. (2011) ‘intelligence and strategic culture: some observations’, intelligence and national security, 26(4), pp. 521–530. Doi: 10.1080/02684527.2011.580605.
  • Ekpe, b. (2007) ‘the intelligence assets of the united nations: sources, methods, and implications’, international journal of intelligence and counterintelligence, 20(3), pp. 377–400. Doi: 10.1080/08850600701249709.
  • Falode, a. (2021) ‘found: a definition of intelligence’, journal of social sciences, iv(1)(april). Doi: 10.52326/jss.utm.2021.4(1).09.
  • Fraumann, e. (2017) ‘economic espionage : security missions redefined’, public administration review, 57(4), pp. 303–308.
  • Gill, p. And phythian, m. (2018) ‘what is intelligence ? Towards a definition of intelligence’, in intelligence in an insecure world, pp. 17–40.
  • Graaff, b. De (2020) ‘intelligence communities and cultures in asia and the middle east’, intelligence communities and cultures in asia and the middle east. Doi: 10.1515/9781626378957.
  • Handel, m. I. (1990) ‘intelligence and military operations’, intelligence and national security, 5(2), pp. 1–95. Doi: 10.1080/02684529008432047.
  • Hou, t. And wang, v. (2020) ‘industrial espionage – a systematic literature review (slr)’, computers and security, 98(2020), p. 102019. Doi: 10.1016/j.cose.2020.102019.
  • Kamiński, m. A. (2019) ‘intelligence sources in the process of collection of information by the u.s. intelligence community’, security dimensions, 32(32), pp. 82–105. Doi: 10.5604/01.3001.0014.0988.
  • Lotrionte, c. (2015) ‘countering state-sponsored cyber economic espionage under international law international law; commercial law; law countering state-sponsored cyber economic espionage under international law’, north carolina journal of international law and commercial regulation, 40(2), pp. 444–538. Available at: https://perma.cc/cm6v-9p6y%0ahttp://scholarship.law.unc.edu/ncilj/vol40/iss2/4.
  • Mcdougal, m. S. Et al. (1973) ‘the intelligence function and world public order recommended citation’, temple law quarterly, 46(3), pp. 365–448. Available at: http://digitalcommons.law.yale.edu/fss_papers/665.
  • Nasheri, h. (2009) ‘dimensions of economic espionage and the criminalization of trade secret theft’, in economic espionage and industrial spying, pp. 1–29. Doi: 10.1017/cbo9780511610288.002.
  • Nikoloski, k. (2016) ‘technology and economic development: retrospective’, journal of process management. New technologies, 4(4), pp. 45–50. Doi: 10.5937/jouproman4-11468.
  • O’connell, k. M. (2005) ‘the role of science and technology in transforming american intelligence’, the future of american intelligence, pp. 139–174.
  • Oyedokun, t. T. Et al. (2022) ‘information versus intelligence : the legitimate approximation and variability between processed data and evidence-based knowledge’, the journal of information and documentation studies bilgi, 18(december), pp. 51–54. Doi: 10.26650/bba.2022.18.1147851.
  • Phythian, m. (2008) ‘intelligence theory and theories of international relations: shared world or separate worlds?’, in intelligence theory: key questions and debates, pp. 54–72. Doi: 10.4324/9780203892992.
  • Price, d. H. (2014) ‘the new surveillance normal: nsa and corporate surveillance in the age of global capitalism’, monthly review, 66(3), pp. 43–53. Doi: 10.14452/mr-066-03-2014-07_3.
  • Rezk, d. (2016) ‘orientalism and intelligence analysis: deconstructing anglo-american notions of the “arab”’, intelligence and national security, 31(2), pp. 224–245. Doi: 10.1080/02684527.2014.949077.
  • Richard h. Shultz, j. And beitler, r. M. (2004) ‘tactical deception and strategic suprice in al-qa’ida’s operations’, middle east review of international affairs, 8(2), pp. 56–79.
  • Robson morrow, m. A. (2022) ‘private sector intelligence: on the long path of professionalization’, intelligence and national security, 37(3), pp. 402–420. Doi: 10.1080/02684527.2022.2029099.
  • Scott, l. And jackson, p. (2004) ‘the study of intelligence in theory and practice’, intelligence and national security, 19(2), pp. 139–169. Doi: 10.1080/0268452042000302930.
  • Sherr, j. (1994) ‘cultures of spying cultures of spying’, in the national interest, pp. 56–62.
  • Shiraz, z. And aldrich, r. J. (2019) ‘secrecy, spies and the global south: intelligence studies beyond the “five eyes” alliance’, international affairs, 95(6), pp. 1313–1329. Doi: 10.1093/ia/iiz200.
  • Sulick, m. J. (2015) ‘intelligence in the cold war’, journal of u.s. intelligence studies, 21(1), pp. 47–52. Doi: 10.1080/14682745.2014.950248.
  • Trim, p. R. J. (2002) ‘counteracting industrial espionage through counterintelligence: the case for a corporate intelligence unit and collaboration with government agencies’, security journal, 15(4), pp. 7–24. Doi: 10.1057/palgrave.sj.8340001.
  • Wang, x. (2016) ‘china’s alternative roles in countering international economic cyber espionage’, china quarterly of international strategic studies, 2(4), pp. 549–568. Doi: 10.1142/s2377740016500251.
  • Whitaker, r. (1992) ‘security and intelligence in the post-cold war world’, the socialist register, pp. 111–130. Doi: 10.1057/9780230117389_16.
  • Wilford, h. (2022) ‘emotional intelligence: culture, intimacy, and empire in early cia espionage’, intelligence and national security, 37(4), pp. 513–525. Doi: 10.1080/02684527.2022.2065612.
  • Yin, j. And taylor, p. M. (2008) ‘information operations from an asian perspective: a comparative analysis’, journal of information warfare, 7(1), pp. 1–23.
  • Yilmaz, s. (2017) ‘intelligence in the 21st century’, international journal of business perspectives & social science information, 01(1), pp. 30–43.

To cite this article: ROS Sayumphu, DEFINING INTRLLIGENCE: BETWEEN STATECRAFT, MARKET, AND MORALITY, Bulletin Issue 8 (Special Issue) A Collection of Research Articles Dedicated to Khmer Scholars, January 2025.