Skip to main navigation menu Skip to main content Skip to site footer

Vol. 46 No. 4 (2018)

Political institutions

The Role of Agent Intelligence in Combating the Terrorist Threat

DOI: https://doi.org/10.35757/STP.2018.46.4.07
Submitted: April 16, 2025
Published: December 20, 2018

Abstract

Contemporary international terrorism is a serious threat to the security of nation states and is a special challenge for intelligence services. One of the most effective ways to fight the terrorist threat is intelligence gathered by means of interpersonal contact – human intelligence (HUMINT). Its main purpose is to obtain reliable pre-emptive information. The article contains an analysis of the issue of terrorism and the role of human intelligence in combating the terrorist threat. The thesis of the article is the conviction that human intelligence is an indispensable method of obtaining secret information, and its effectiveness results from the involvement of the human factor, which is not subject to the limitations typical of technological methods of obtaining information. Deep infiltration of an organisation or terrorist group enhances the effectiveness of preventive services.

References

  • Arquilla J., Ronfeldt D., Cyber War Is Coming! „Comparative Strategy” 1993, t. 2(2), s. 142–143.
  • Beam L., Leaderless resistance, <https://www.researchgate.net/publication/233097025_’Leaderless_resistance’> [dostęp: 28 sierpnia 2017].
  • Boicu M., Marcu D., Schum D.A., Tecuci G., Intelligence Analysis as Discovery of Evidence, Hypotheses, and Arguments. Connecting the dots, Cambridge University Press, Cambridge 2016, s. 147.
  • Bożek M., Czurek M., Karpiuk M., Kostrubiec J., Służby specjalne w strukturze władz publicznych: Zagadnienia prawnoustrojowe, LEX. Wolters Kluwer Business, Warszawa 2014, s. 100.
  • Deutch J., Fighting Foreign Terrorism (1996), <https://www.cia.gov/news-information/speeches-testimony/1996/dci_speech_090596.html> [dostęp: 4 czerwca 2017].
  • Ekici S., Akdoğan H., Ragab E., Warnes R., Countering Terrorists Recruitment in the Context of Armed Counter – Terrorism Operations, IOS Press, Washington 2016, s. 233.
  • Foust J., Myopia: How Counter-Terrorism Has Blinded Our Intelligence Community, <https://www.theatlantic.com/international/archive/2012/11/myopia-how-counter-terrorism-has-blinded-our-intelligence-community/265130/> [dostęp: 14 lipca 2017].
  • Frey B.S., Dealing with Terrorism: Stick or Carrot? Edward Elgar Publishing Limited, Cheltenham 2004, s. 155.
  • Ganor B., Intelligence Dillemas in the War on Terrorism. A Guide for Decision Makers, Routledge, New York 2017, s. 51, 52.
  • George R.Z., Bruce J.B., Analyzing Intelligence: National Security Practitioners Perspectives, Georgetown University Press 2014, s. 10.
  • Gill P., Phythian M., Intelligence in an Insecure World, Polity Press, Cambridge–Molden 2006, s. 77.
  • Hoffmann B., The Logic of Suicide Terrorism, <https://www.theatlantic.com/magazine/archive/2003/06/the-logic-of-suicide-terrorism/302739/> [dostęp: 2 czerwca 2017].
  • Hughbank R.J., Githens D., Intelligence and Its Role in Protecting against Terrorism, „Journal of Strategic Security” 2010, nr 1(3), s. 33–34.
  • Khan D., Back When Spies Played by The Rules, <http://www.nytimes.com/2006/ 01/13/opinion/back-when-spies-played-by-the-rules.html> [dostęp: 4 lipca 2017].
  • Kilberg J., A Basic Model Explaining Terrorist Group Organizational Structure, „Studies in Conflict & Terrorism” 2012, t. 35 (11), s. 810–811.
  • Kłosowicz R., Mania A., Problem upadku państw w stosunkach międzynarodowych, Wydawnictwo Uniwersytetu Jagiellońskiego, Kraków 2012, s. 62.
  • Knightly P., The Cambridge Spies, <http://www.bbc.co.uk/history/worldwars/coldwar/cambridge_spies_01.shtml> [dostęp: 15 lipca 2017].
  • Laquer W., No End to War: Terrorism in the Twenty-First Century, Continuum, New York 2003, s. 46.
  • Laskowski D., Polskie służby specjalne, Wydawca FNCE, Poznań 2017, s. 74.
  • Machnikowski R., Dżihadyzm jako globalny zbrojny ruch społeczny, w: Ewolucja terroryzmu na przełomie XX i XXI wieku, red. M.J. Malinowski, R. Ożarowski, W. Grabowski, Gdańsk 2009.
  • Machnikowski R., „Globalna wojna z terrorem. Długa wojna” – jej wpływ na ład społeczny XXI wieku, „Zeszyty Naukowe WSOWL” 2013, nr 1(167), s. 36–37.
  • Monaghan M., Prideaux S., State Crime and Immorality: The Corrupting Influence of the Powerful, Policy Press, Bristol 2016, s. 79.
  • Morgan M.J., The Origins of New Terrorism, „Parameters: U.S. Army War College” 2004, t. 34(1), s. 30.
  • Norwitz J.H. (ed.), Armed Groups: Studies in National Security, Counterterrorism and Counterinsurgency, U.S. Naval War College, New Port 2008, s. 126.
  • Posłuszna E., Terroryzm w czasach globalizacji. Przyczynek do rozważań nad wojnami czwartej generacji, „Przegląd Bezpieczeństwa Wewnętrznego”, nr 15, s. 174.
  • Ranstorp M., Understanding Violent Radicalisation. Terrorist and Jihadist Movements in Europe, Routledge Taylor & Francis Group, New York 2010, s. 16.
  • Rapoport D.C., The Four Waves of Modern Terrorism, „Anthropoetics” 2002, VIII, s. 63.
  • Robins J.S., Battlefronts in the War of Ideas, w: Countering Terrorism and Insurgency in XXI Century: International Perspectives, t. 1, ed. J.J.F. Forest, Greenwood Publishing Group, Westport 2007, s. 299–300.
  • Sims J.E., Gerber B., Transforming U.S. Intelligence, Georgetown University Press, Washington 2005, s. 20.
  • Svendsen A.D., Intelligence Cooperation and the War on Terror: Anglo-American Security Relations after 9/11, Routledge, New York 2009, s. 39, 44.
  • Tomaszewicz J., Strategia oporu niekierowanego w wojnie asymetrycznej, „Przegląd Geopolityczny” 2009, nr 1, s. 161.
  • Wasilkow A., Агентурная разведка – надежный заслон терроризму, <http://vpknews.ru/articles/1103> [dostęp: 16 sierpnia 2017].
  • Weinberg L., Pedahzur A., Hoefler S.H., The Challenges of Conceptualizing Terrorism, Terrorism and Political Violence” 2004, t. 16, s. 778–779.
  • Weldon C., Countdown to Terror. The Top-Secret Information That Could Prevent the Next Terrorist Attack on America and How CIA Has Ignored It, Regnery Publishing, Washington 2005, s. 200.

Downloads

Download data is not yet available.

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.