Introduction to Intelligence Studies

Title:                      Introduction to Intelligence Studies

Author:                Carl J. Jensen, III

Jensen, Carl J. III (2013), David H. McElreath, and Melissa Graves. Introduction to Intelligence Studies Boca Raton, FL: CRC Press

LCCN:    2012035911

JK468.I6 .J47 2013


  • “This book covers the essentials for a student with an interest in gaining a basic understanding of the way intelligence “works” (or doesn’t) in today’s rapidly evolving world”– Provided by publisher.


Date Updated:  March 30, 2016

Reviewed by Hayden Peake[1]

While preparing an undergraduate introductory course at the University of Mississippi on intelligence in America; the authors of this book could not find a text that met their needs. Drawing on their extensive backgrounds—military, FBI, law enforcement, consulting, and legal—they wrote this Introduction to Intelligence Studies.

The 15 chapters summarize the basic topics: what intelligence is, its history, the intelligence community’s organization, the intelligence cycle, the principal functions, oversight, writing, current threats, and some comments on the future. There is also a chapter that looks specifically at law-enforcement intelligence and another that considers what the authors term a “barrier to analysis,” for example, security issues and policymaker interactions.

Now, most of these topics are covered by Mark Lowenthal in his book lntelligence from Secrets to Policy.[2] But the similarity stops there. Introduction to Intelligence Studies assumes its readers will have less knowledge of the topic than readers of Lowenthal’s book. Each chapter, therefore, includes discussion topics, a list of key terms, and references for further reading. They do not include source notes, however, so students have every right to ask how the authors know what they assert.

In their preface, the authors encourage readers—and hopefully reviewers—to comment on flaws, an opportunity that should not be overlooked. Three are worth mentioning here. First, the intelligence provided by civil war spies Belle Boyd and Rose Greenhaw was not crucial to any Confederate victories; it was marginal at best. Second, Pinkerton did not “go on to guard Lincoln throughout the Civil War”; (p. 19) his service ended in 1862 (see Edwin Fishel’s The Secret War for the Union[3] for details). Third, Operation Ajax was a joint US-UK endeavor, as Kermit Roosevelt—the CIA man on the scene—pointed out in his memoir[4].

Overall, however, the Introduction to Intelligence Studies is a very good primer indeed.

Reviewed by Joshua Sinai, Ph. D.[5]

This authoritative textbook provides a comprehensive overview of the U.S. intelligence community, its history, evolution and latest developments (for instance, the role of the intelligence component in the Department of Homeland Security and the office of the Director of National Intelligence) and how the various intelligence agencies operate. Also covered are the components of intelligence, such as collection, analytic methods, the intelligence cycle, counterintelligence, and covert operations. The components of military intelligence, as well as criminal intelligence and crime analysis are also covered. The final chapters discuss the nature of national security threats that are addressed by the intelligence community, as well as future challenges, including forecasting future threats.

[1] Peake, Hayden B. in The Intelligencer: Journal of U. S. Intelligence Studies (20, 1, Spring/Summer 2013, pp. 111-112). Hayden Peake is the Curator of the CIA’s Historical Intelligence Collection. He has served in the Directorate of Science and Technology and the Directorate of Operations. Most of these reviews appeared in recent unclassified editions of CIA’s Studies in Intelligence. These and many other reviews and articles may be found on line at

[2] Lowenthal, Mark M. (2009). Intelligence from Secrets to Policy (4th ed.). Washington, DC: CQ Press

[3] Fishel, Edwin C. (1996).The Secret War for the Union: The Untold Story of Military Intelligence in the Civil War. Boston: Houghton Mifflin

[4] See Roosevelt, Kermit (1979). Countercoup: The Struggle for the Control of Iran. New York: McGraw-Hill

[5] Sinai, Joshua in The Intelligencer: Journal of U. S. Intelligence Studies (20, 2, Fall/Winter, 2013, p. 121). These reviews present books which examine national security issues that need to be considered in terrorism and counterterrorism analysis. Joshua Sinai is a Washington, DC-based consultant on counterterrorism studies. He can be reached at: Joshua.sinai@


This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s