"Glenn Hasedt is Professor of Political Science at James Madison University in Virginia. He has published widely on intelligence." IJI&C 9.3/249 (Fall 1996).
Hastedt, Glenn. "CIA's Organizational Culture and the Problem of Reform." International Journal of Intelligence and Counterintelligence 9, no. 3 (Fall 1996): 249-269.
Hastedt uses Michael Vlahos' four-generations concept to classify organizational cultures within the CIA: Paradigm-Builder, Paradigm-Extender, Paradigm-Mimicker, and Paradigm-Killer. Among his conclusions is the thought that what is needed "is the development of an alternative set of values and experiences to guide [the current generation's] efforts for change." In essence, the old cultural system needs to be "destroyed" and the foundation laid for a new one.
Clark comment: I applaud Professor Hastedt's effort to apply some of the tools of political science to the organizational life of the CIA. I just wish I better recognized the organization in which I spent 25 years in his analysis.
Hastedt, Glenn. "The Constitutional Control of Intelligence." Intelligence and National Security 1, no. 2 (May 1986): 255-271.
The author argues that "constitutional control of intelligence has yet to be fully realized.... By basing control efforts on insights from the civil-military relations literature, existing control mechanisms will have their greatest impact and additional mechanisms can be put into place." In a letter carried in I&NS 2.2, former CIA General Counsel Lawrence K. Houston opines that "the article as a whole shows a total lack of understanding of how the system actually works."
Hastedt, Glenn. "Controlling Intelligence: The Role of the D.C.I." International Journal of Intelligence and Counterintelligence 1, no. 4 (1986): 25-40.
Hastedt, Glenn. "Estimating Intentions in an Age of Terrorism: Garthoff Revisited." Defense Intelligence Journal 14, no. 1 (2005): 47-62.
The author does a fine (if at times strained) job of stretching Raymond Garthoff's "10 common fallacies made in estimating and imputing intentions" during the Cold War to cover the war on terrorism. [See Raymond L. Garthoff, "On Estimating and Imputing Intentions," International Security 2 (Winter 1978): 22-32.]
Hastedt, Glenn. "Foreign Policy by Commission: Reforming the Intelligence Community." Intelligence and National Security 22, no. 4 (Aug. 2007): 443-472.
The author begins his review of intelligence commissions with the first Hoover Commission (1948) and continues through the 9/11 and WMD commissions. His conclusions? The recommendations of intelligence commissions "present a decidedly mixed bag." Although such recommendations were not totally ignored, "it is not possible to speak of linear movement toward improving the quality or management of intelligence anlysis." Nevertheless, "in each instance [commissions] narrowed the range of policy choices receiving serious consideration."
Hastedt, Glenn. "The Intelligence Community and America Foreign Policy: The Reagan and Carter Administrations." In The Presidency and National Security Policy, eds. R. Gordon Hoxie and Ryan J. Barilleaux, 48-74. New York: Center for the Study of Presidency, 1984.
Hastedt, Glenn. "Intelligence Estimates: NIEs vs. the Open Press in the 1958 China Straits Crisis." International Journal of Intelligence and Counterintelligence 23, no. 1 (Spring 2010): 104-132.
"Differences are most stark in discussing the conflict[']s underlying dynamics. Public source reporting ... gave attention to a broader array of factors than did the NIE analysis.... Another area of difference ...involved the nature of the Sino-Soviet relationship, with the NIEs holding to a view that emphasized unity of effort to a much greater degree than did the open source reporting.... The NIEs ... were far more opaque than were open source writings. They did not identify either the source of the analysis ... or the source of the information used for analysis."
Hastedt, Glenn. "Intelligence and U.S. Foreign Policy: How to Measure Success?" International Journal of Intelligence and Counterintelligence 5, no. 1 (Spring 1991): 49-62.
How do you assess the value of intelligence analysis? Hastedt plays around with several measures, and concludes that accuracy alone is not a sufficient basis for evaluation.
Hastedt, Glenn. "Public Intelligence: Leaks as Policy Instruments -- The Case of the Iraq War." Intelligence and National Security 20, no. 3 (Sep. 2005): 419-439.
The author defines public intelligence as "secret intelligence that has become part of the societal debate over the conduct of American foreign policy." As Hastedt notes "[i]t is not enough to simply refer" to public intelligence as "leaked intelligence." He presents a "case study of orchestrated intelligence in the lead-up to the Iraq War," which makes interesting reading.
Hastedt, Glenn. "Seeking Economic Security Through Intelligence." International Journal of Intelligence and Counterintelligence 11, no. 4 (Winter 1998-1999): 385-401.
The author points to a "continued but limited role for the intelligence community" in the area of business intelligence. Nevertheless, there are "two functions that the intelligence community might profitably perform for the private sector that at the same time further government goals. One is to fill in the gaps.... The other is that of educating consumers to changes in macro level circumstances and conditions."
Hastedt, Glenn, and Mildred Vasan. Espionage: A Reference Handbook. Santa Barbara, CA: ABC-CLIO, 2003.
Bullock, Air & Space Power Journal 22.2 (Summer 2008), says that this work "skillfully explores numerous historical examples from the American Revolution to events subsequent to the terrorist attacks of 11 September 2001, tracing the evolution of intelligence-collections capabilities -- particularly human intelligence (HUMINT)."
Hastedt, Glenn P., ed. Controlling Intelligence. London: Frank Cass, 1991.
According to Surveillant 1.2, "[c]hapters cover: the development of the CIA in a historical perspective; a critique of current safeguards against abuse by the CIA; the production of intelligence estimates; controlling intelligence defined as covert action; controlling intelligence defined as counter-intelligence; and the final chapter looks at Canadian government efforts to control intelligence."
For Lowenthal, the book includes "some useful essays on some of the problems related to managing analysis, operations, and counterintelligence." However, a Choice, Dec. 1991, reviewer sees this book as "conceptually and materially flawed," but adds that it "has some value for college libraries." Herman, I&NS 6.4, notes that the book contains "more description than evaluation," and suggests "more dissent and wider coverage" would have been welcome.
Hastedt, Glenn P., ed. Spies, Wiretaps, and Secret Operations: An Encyclopedia of American Espionage. 2 vols. [Vol. 1 (A-J); Vol. 2 (K-Z)] Santa Barbara, CA: ABC-CLIO/Greenwood, 2010.
For Peake, Studies 55.4 (Dec. 2011) and Intelligencer 19.1 (Winter-Spring 2012), these "volumes are colossal examples" of the "failure to check their facts with readily available sources.... There is no excuse for an encyclopedia ... to be so unhampered by scholarship or quality control. No other profession would tolerate it, nor should ours. For these reasons and its $180 price, caveat lector!"
Return to Harta-Has