Skip to main content
Top

2020 | OriginalPaper | Chapter

5. Intelligence Dilemmas: Understanding the Complexity of the P5 Relationship

Author : John Michael Weaver

Published in: Intelligence Relations in the 21st Century

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Threats to stability and peace are likely to continue into the foreseeable future. Likewise, since globalization has expanded in recent years, it has made it difficult in knowing whether any particular country could be viewed as a friend or foe; this is a significant challenge to those working in the field of intelligence and to help determine how intelligence relations can vary depending on the situation. Particularly, this is the case when turning to relations among the permanent five (P5) members of the United Nations Security Council (UNSC). This research looks to enhance the scholarship of integration (Boyer 1990). It applies the Federal Qualitative Secondary Data Case Study Triangulation Model and a variant of the York Intelligence Red Team Model (YIRTM) to help perform the analysis. Specifically, this study looks at issues from the US perspective to see the way UNSC permanent members advance their own interests. Accordingly, the chapter shows when nations will likely foster relations to share intelligence with one or more of these actors and when it is in the best interest of a country not to do so.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Alati, Daniel. 2015. Current National Security and Human Rights Issues in the United Kingdom, Canada, and Hong Kong. ILSA Journal of International & Comparative Law 22 (1): 91. Alati, Daniel. 2015. Current National Security and Human Rights Issues in the United Kingdom, Canada, and Hong Kong. ILSA Journal of International & Comparative Law 22 (1): 91.
go back to reference Boyer, E. L. 1990. Scholarship reconsidered: Priorities of teh Professoriate. Carnegie Foundation for the Advancement of Teaching. Boyer, E. L. 1990. Scholarship reconsidered: Priorities of teh Professoriate. Carnegie Foundation for the Advancement of Teaching.
go back to reference Cormack, Rory. 2014. Secret Intelligence and Economic Security: The Exploitation of a Critical Asset. Intelligence and National Security 29 (1): 99–121.CrossRef Cormack, Rory. 2014. Secret Intelligence and Economic Security: The Exploitation of a Critical Asset. Intelligence and National Security 29 (1): 99–121.CrossRef
go back to reference Creswell, J.W. 2008. Research Design; Qualitative, Quantitative, and Mixed Methods Approaches. Thousand Oaks, CA: SAGE Publications. Creswell, J.W. 2008. Research Design; Qualitative, Quantitative, and Mixed Methods Approaches. Thousand Oaks, CA: SAGE Publications.
go back to reference Crosston, Matthew. 2016. Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China. International Journal of Intelligence and Counterintelligence 29 (1): 110–131.CrossRef Crosston, Matthew. 2016. Bringing Non-Western Cultures and Conditions into Comparative Intelligence Perspectives: India, Russia, and China. International Journal of Intelligence and Counterintelligence 29 (1): 110–131.CrossRef
go back to reference Fitzgerald, Chad W., and Aaron F. Brantly. 2017. Subverting Reality: The Role of Propaganda in 21st Century Intelligence. International Journal of Intelligence and Counterintelligence 3 (2): 215–240.CrossRef Fitzgerald, Chad W., and Aaron F. Brantly. 2017. Subverting Reality: The Role of Propaganda in 21st Century Intelligence. International Journal of Intelligence and Counterintelligence 3 (2): 215–240.CrossRef
go back to reference Glassick, Charles E. 2000. Boyer’s Expanded Definitions of Scholarship, the Standards for Assessing Scholarship, and the Elusiveness of the Scholarship of Teaching. Academic Medicine 75 (9): 877–880.CrossRef Glassick, Charles E. 2000. Boyer’s Expanded Definitions of Scholarship, the Standards for Assessing Scholarship, and the Elusiveness of the Scholarship of Teaching. Academic Medicine 75 (9): 877–880.CrossRef
go back to reference Hammond, Brian. 2015. French National Assembly Clears Bill to Expand Government. Cybersecurity Policy Report. Aspen Publishers, Inc. Hammond, Brian. 2015. French National Assembly Clears Bill to Expand Government. Cybersecurity Policy Report. Aspen Publishers, Inc.
go back to reference Honig, Or, and Sarah Zimskind. 2017. The Spy Machine and the Ballot Box: Examining Democracy’s Intelligence Advantage. International Journal of Intelligence and Counterintelligence 3 (3): 431–463.CrossRef Honig, Or, and Sarah Zimskind. 2017. The Spy Machine and the Ballot Box: Examining Democracy’s Intelligence Advantage. International Journal of Intelligence and Counterintelligence 3 (3): 431–463.CrossRef
go back to reference Jervis, Robert. 2010. Why Intelligence and Policymakers Clash. Political Science Quarterly 125 (2): 185–204.CrossRef Jervis, Robert. 2010. Why Intelligence and Policymakers Clash. Political Science Quarterly 125 (2): 185–204.CrossRef
go back to reference Lamy, Steve L., John S. Masker, John Baylis, Steve Smith, and Patricia Owens. 2015. Introduction to Global Politics. New York: Oxford University Press. Lamy, Steve L., John S. Masker, John Baylis, Steve Smith, and Patricia Owens. 2015. Introduction to Global Politics. New York: Oxford University Press.
go back to reference Lasconjarias, Guillaume. 2014. ‘Rentrée dans le rang?’ France, NATO and the EU, from the Védrine Report to the 2013 French White Paper on National Security and Defence. Journal of Transatlantic Studies 12 (4): 418–431.CrossRef Lasconjarias, Guillaume. 2014. ‘Rentrée dans le rang?’ France, NATO and the EU, from the Védrine Report to the 2013 French White Paper on National Security and Defence. Journal of Transatlantic Studies 12 (4): 418–431.CrossRef
go back to reference Maftei, Danut. 2015. The Way Several European Countries Use to Achieve Their Strategic and Security Objectives by Involving the National Experts Seconded to International Organizations: Case Study: United Kingdom and The Netherlands. Journal of Criminal Investigations 1 (8): 62–72. Maftei, Danut. 2015. The Way Several European Countries Use to Achieve Their Strategic and Security Objectives by Involving the National Experts Seconded to International Organizations: Case Study: United Kingdom and The Netherlands. Journal of Criminal Investigations 1 (8): 62–72.
go back to reference McCormack, Tara. 2015. The British National Security Strategy: Security After Representation. The British Journal of Politics and International Relations 3 (17): 494–511.CrossRef McCormack, Tara. 2015. The British National Security Strategy: Security After Representation. The British Journal of Politics and International Relations 3 (17): 494–511.CrossRef
go back to reference Remler, D.K., and G.G. Van Ryzin. 2010. Research Methods in Practice: Strategies for Description and Causation. Thousand Oaks, CA: SAGE Publications. Remler, D.K., and G.G. Van Ryzin. 2010. Research Methods in Practice: Strategies for Description and Causation. Thousand Oaks, CA: SAGE Publications.
go back to reference Rudner, M. 2013. Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge. International Journal of Intelligence and Counterintelligence 36 (3): 453–481.CrossRef Rudner, M. 2013. Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge. International Journal of Intelligence and Counterintelligence 36 (3): 453–481.CrossRef
go back to reference Weaver, John M. 2015a. The Perils of a Piecemeal Approach to Fighting ISIS in Iraq. Public Administration Review 75 (2): 192–193.CrossRef Weaver, John M. 2015a. The Perils of a Piecemeal Approach to Fighting ISIS in Iraq. Public Administration Review 75 (2): 192–193.CrossRef
go back to reference Weaver, John M. 2015b. The Department of Defense and Homeland Security Relationship: Hurricane Katrina Through Hurricane Irene. Journal of Emergency Management 12 (3): 265–274.CrossRef Weaver, John M. 2015b. The Department of Defense and Homeland Security Relationship: Hurricane Katrina Through Hurricane Irene. Journal of Emergency Management 12 (3): 265–274.CrossRef
go back to reference Weaver, John M. 2016. Friend or Foe (or Do We Really Know)? Intelligence Community Contemporary Challenges (Chapter). In Globalization: Economic, Political, and Social Issues. Nova Science Publishers. Weaver, John M. 2016. Friend or Foe (or Do We Really Know)? Intelligence Community Contemporary Challenges (Chapter). In Globalization: Economic, Political, and Social Issues. Nova Science Publishers.
go back to reference Weaver, John M. 2017a. Security of Classified Information: One Standard or Many? International Journal of Public Leadership 13 (1): 9–12.CrossRef Weaver, John M. 2017a. Security of Classified Information: One Standard or Many? International Journal of Public Leadership 13 (1): 9–12.CrossRef
go back to reference Weaver, John M. 2017b. Cyber Threats to the National Security of the United States: A Qualitative Assessment (Chapter). In Focus on Terrorism (Volume 15). Nova Science Publishers. Weaver, John M. 2017b. Cyber Threats to the National Security of the United States: A Qualitative Assessment (Chapter). In Focus on Terrorism (Volume 15). Nova Science Publishers.
go back to reference Weaver, John M. 2019. United Nations Security Council Permanent Member Perspectives Implications for U.S. and Global Intelligence Professionals. Peter Lang Publishing. Weaver, John M. 2019. United Nations Security Council Permanent Member Perspectives Implications for U.S. and Global Intelligence Professionals. Peter Lang Publishing.
go back to reference Weaver, John M., and Jennifer Pomeroy, eds. 2016. Intelligence Analysis: Unclassified Area and Point Estimates (and Other Intelligence Related Topics). Hauppauge, NY: Nova Science Publishers. Weaver, John M., and Jennifer Pomeroy, eds. 2016. Intelligence Analysis: Unclassified Area and Point Estimates (and Other Intelligence Related Topics). Hauppauge, NY: Nova Science Publishers.
go back to reference Weaver, John M., and Jennifer Pomeroy, eds. 2018. Intelligence Analysis: Unclassified Area and Point Estimates (and Other Intelligence Related Topics). 2nd ed. Hauppauge, NY: Nova Science Publishers. Weaver, John M., and Jennifer Pomeroy, eds. 2018. Intelligence Analysis: Unclassified Area and Point Estimates (and Other Intelligence Related Topics). 2nd ed. Hauppauge, NY: Nova Science Publishers.
go back to reference Weaver, John M., and Jennifer Pomeroy, eds. 2019. Global Intelligence Priorities (from the Perspective of the United States). Hauppauge, NY: Nova Science Publishers. Weaver, John M., and Jennifer Pomeroy, eds. 2019. Global Intelligence Priorities (from the Perspective of the United States). Hauppauge, NY: Nova Science Publishers.
Metadata
Title
Intelligence Dilemmas: Understanding the Complexity of the P5 Relationship
Author
John Michael Weaver
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-34004-9_5