BookPDF Available

Big Data, Emerging Technologies and Intelligence: National Security Disrupted

Authors:

Figures

Content may be subject to copyright.
Drawing on substantial and exclusive access to the Australian Intelligence
Community, this book provides a timely, detailed, and thorough analysis of
the many ways in which big data is transforming intelligence and broader
society. Dr Miah Hammond-Errey brings intelligence studies into the digital
era with this original contribution to the scholarly eld on intelligence and
national security.
Kira Vrist Rønn, Associate Professor, University of Southern Denmark
With this book, Dr Hammond-Errey has produced a path-breaking
empirical analysis of how Big Data is transforming intelligence and the
challenges to which this transformation gives rise. Based on interviews with
around 50 people working in and around the Australian National Intelli-
gence Community, this book oers an invaluable guide to understanding the
impact of the Big Data landscape on intelligence practice in liberal democ-
racies and how this aects the intelligence-state-citizen relationship. It is
essential reading for students of intelligence and for all those working in the
eld of intelligence, including its oversight.
Mark Phythian, University of Leicester, UK
This book is a timely account of the way big data and emerging technology
have been disrupting intelligence and society. Dr Hammond-Errey develops
an innovative framework of the landscape of big data that raises important
questions about legitimacy and public trust in democratic institutions, the
changing role of intelligence analysts, and the tendency to subject surveil-
lance capabilities to greater democratic accountability.
Christian Leuprecht, Royal Military College of Canada and
Queens University, Canada
Big Data, Emerging Technologies and
Intelligence
This book sets out the big data landscape, comprising data abundance, digi-
tal connectivity and ubiquitous technology, and shows how the big data
landscape and the emerging technologies it fuels are impacting national
security.
This book illustrates that big data is transforming intelligence production
as well as changing the national security environment broadly, including
what is considered a part of national security as well as the relationships
agencies have with the public. The book highlights the impact of big data on
intelligence production and national security from the perspective of Aus-
tralian national security leaders and practitioners, and the research is based
on empirical data collection, with insights from nearly 50 participants from
within Australias National Intelligence Community. It argues that big data is
transforming intelligence and national security and shows that the impacts of
big data on the knowledge, activities and organisation of intelligence agencies
is challenging some foundational intelligence principles, including the dis-
tinction between foreign and domestic intelligence collection. Furthermore,
the book argues that big data has created emerging threats to national
security; for example, it enables invasive targeting and surveillance, drives
information warfare as well as social and political interference, and chal-
lenges the existing models of harm assessment used in national security. The
book maps broad areas of change for intelligence agencies in the national
security context and what they mean for intelligence communities, and
explores how intelligence agencies look out to the rest of society, considering
specic impacts relating to privacy, ethics and trust.
This book will be of much interest to students of intelligence studies,
technology studies, national security and International Relations.
Miah Hammond-Errey is the Director of the Emerging Technology Program
at the United States Studies Centre at the University of Sydney. She has a
PhD from Deakin University, Australia.
Studies in Intelligence
General Editors: Richard J. Aldrich, Claudia Hillebrand and
Christopher Andrew
Intelligence Oversight in the Twenty-First Century
Accountability in a Changing World
Edited by Ian Leigh and Njord Wegge
Intelligence Leadership and Governance
Building Eective Intelligence Communities in the 21st Century
Patrick F. Walsh
Intelligence Analysis in the Digital Age
Edited by Stig Stenslie, Lars Haugom, and Brigt H. Vaage
Conict and Cooperation in Intelligence and Security Organisations
An Institutional Costs Approach
James Thomson
National Security Intelligence and Ethics
Edited by Seumas Miller, Mitt Regan, and Patrick F. Walsh
Intelligence Agencies, Technology and Knowledge Production
Data Processing and Information Transfer in Secret Services during
the Cold War
Edited by Rüdiger Bergien, Debora Gerstenberger and Constantin Goschler
State-Private Networks and Intelligence Theory
From Cold War Liberalism to Neoconservatism
Tom Grin
Indias Intelligence Culture and Strategic Surprises
Spying for South Block
Dheeraj Paramesha Chaya
Big Data, Emerging Technologies and Intelligence
National Security Disrupted
Miah Hammond-Errey
For more information about this series, please visit: https://www.routledge.
com/Studies-in-Intelligence/book-series/SE0788
Big Data, Emerging
Technologies and Intelligence
National Security Disrupted
Miah Hammond-Errey
First published 2024
by Routledge
4 Park Square, Milton Park, Abingdon, Oxon OX14 4RN
and by Routledge
605 Third Avenue, New York, NY 10158
Routledge is an imprint of the Taylor & Francis Group, an informa business
© 2024 Miah Hammond-Errey
The right of Miah Hammond-Errey to be identied as author of this work
has been asserted in accordance with sections 77 and 78 of the Copyright,
Designs and Patents Act 1988.
All rights reserved. No part of this book may be reprinted or reproduced
or utilised in any form or by any electronic, mechanical, or other means,
now known or hereafter invented, including photocopying and recording,
or in any information storage or retrieval system, without permission in
writing from the publishers.
Trademark notice: Product or corporate names may be trademarks or
registered trademarks, and are used only for identication and explanation
without intent to infringe.
British Library Cataloguing in Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Cataloging-in-Publication Data
A catalog record has been requested for this book
ISBN: 978-1-032-48558-4 (hbk)
ISBN: 978-1-032-48559-1 (pbk)
ISBN: 978-1-003-38965-1 (ebk)
DOI: 10.4324/9781003389651
Typeset in Times New Roman
by Taylor & Francis Books
Contents
List of illustrations viii
Acknowledgements ix
List of Acronyms and Abbreviations x
Introduction 1
1 Big Data Landscape Fuels Emerging Technologies 22
2 Big Data Landscape Challenges Fundamental Intelligence
Principles and Practices 45
3 Big Data Landscape: New Social Harms and National Security
Threats 65
4 Big Data and Intelligence in Practice 83
5 Data and Privacy 114
6 Ethics and Bias 131
7 Trust, Transparency and Legitimacy 155
Conclusion 181
Appendices 192
Index 198
Illustrations
Figures
0.1 NIC Agencies (ONI 2017) 8
1.1 Features of the Big Data Landscape 24
Tables
0.1 Categories of Interviewees 11
Appendix Table A: Australian NIC Agencies 192
Appendix Table B: Types of Intelligence 195
Acknowledgements
This book is an adaptation of my PhD thesis. Thank you to my primary
supervisor Chad Whelan and secondary supervisor Diarmaid Harkin for all
your support, guidance and friendship throughout both processes. Thank
you, Tom Barrett, for your research and referencing assistance.
A huge thanks to colleagues, friends and family who have supported this
research. I cant name many of you by name, however, am incredibly grateful
for your supportyou made this research possible. I cant thank you enough.
Im grateful to the individuals and agencies who participated in this
research. I feel honoured to be privileged with your insights, experiences and
time. Thank you for sharing of these so willingly. Thank you to the agencies
for entrusting me with this research. This research draws on a variety of
perspectives from within the NIC. I have tried to reect these (sometimes
contradictory!) views and common discourse faithfully. However, this book
contains only a small part of the discussions and is not a comprehensive
reection of all the topics and issues covered.
The research was supported by a National Security Big Data Scholarship
from D2D CRC and a University Postgraduate Research Scholarship from
Deakin University. Additional support was also provided by D2DCRC in the
form of an Applied Research and Collaboration Award (2017) and an
Applied Research Grant (2019).
This book is a contribution towards greater understanding of national
security and big data as well as the ways the big data landscape fuels emer-
ging technologies. Id like to continue this conversation with you. You can
also nd out more by listening to my podcast, Technology and Security.
List of Acronyms and Abbreviations
ACIC Australian Criminal Intelligence Commission
AFP Australian Federal Police
AGO Australian Geospatial-Intelligence Organisation
AIC Australian Intelligence Community
ASIO Australian Security Intelligence Organisation
ASIS Australian Secret Intelligence Service
ASD Australian Signals Directorate
AUSTRAC Australian Transaction Reports and Analysis Centre
HA Department of Home Aairs
IGIS Inspector-General of Intelligence and Security
DIO Defence Intelligence Organisation
NIC National Intelligence Community
SDM Senior Decision-Maker
ONI Oce of National Intelligence
ODM Operational Decision-Maker
TECH Technologist
ISME Independent Subject Matter Expert
Introduction
This book examines the impact of the technological phenomenon big data
on national security intelligence and decision-making. Data is all around us.
Big data has become a prevalent feature in commercial enterprise (Cukier
2010; Manyika et al. 2011; Reinsel, Gantz & Rydning 2017; Yiu 2012) from
shopping to socials, travel to transport and communications to nance. It is
also increasingly used in national security (Landon-Murray 2016; Van Puy-
velde, Coulthart & Hossain 2017). Big data and associated analytics are
presented as oering signicant potential for a safer and more secure nation
(Akhgar et al. 2015; Manyika et al. 2011; Mayer-Schönberger & Cukier
2014) and are being adopted before their impacts are well understood.
Despite the signicant impacts of big data on intelligence activities, empirical
research into its impacts is still in its infancy.
The information age continues to provide an ever-expanding quantity and
variety of information (Degaut 2015, p. 511) that underpins many of the data-
driven technologies impacting national security. In 2014, it was forecast that by
2020 there will be as many bits in the digital universe as stars in the physical
universe (International Data Corporation 2014), and in 2019 this was revised to
forty times the number of bytes than stars in the observable universe (DOMO
2019). According to the International Data Corporation (International Data
Corporation 2022), by 2026 there will be more than 220 Zettabytes (220 billion
Terabytes) of data added annually to the global datasphere the summation of
data we create, capture or replicate. This will be almost three times the 83 Zet-
tabytes produced in 2021 growing at a rate of 21 per cent per year (Interna-
tional Data Corporation 2022). We are also more digitally connected than ever
before. The increasing interconnectedness of our systems and our infra-
structure including our reliance on them is transformative and unprece-
dented. In January 2023, more than 5.4 billion people out of the eight billion
global population (68 per cent) were using a mobile device, with the majority
being smartphones (Kemp 2023). Estimates of the number of devices connected
to the internet vary widely; however, there is consensus (Evans 2011; Gartner
2017) that this number has overtaken the global population Ericsson (2022)
estimated the number of connected devices in 2022 to be 23.6 billion and predict
that by 2028 that number will reach 45.8 billion.
DOI: 10.4324/9781003389651-1
2 Introduction
Increasingly vast amounts of data are captured from and about humans,
machines and the natural environment, challenging political and economic
models (Mayer-Schönberger & Ramge 2018; Sadowski 2020; Schwab 2017;
Zubo 2019). The abundance of data made possible by improvements in data
storage and computational capabilities, combined with digital connectedness
and ubiquity of technology, drive the big data phenomenon. The speed of
technological change has impacted how we store, interpret, analyse and
communicate information in society (boyd & Crawford 2012; Kitchin 2014a).
Intelligence activities are funded by the nation-state, with the express pur-
pose of protecting national interests and keeping citizens safe; however,
information about intelligence agencies and their activities is notoriously
sparse (Andrew 2018; Van Puyvelde 2018, pp. 380381). Lundy et al. (2019,
p. 587) argue that intelligence is essential to modern statecraft in times of
war and peace [and] its vital role deserves and requires better general
comprehension. Empirical research to date on intelligence activities, espe-
cially outside the United States, has been extremely limited (Hughes, Jackson
& Scott 2008; Van Puyvelde 2018; Zegart 2022). There have been very few, if
any, reections on how the Australian intelligence community works, its
contributions, or of its importance to policy and decision-makers across
government (Symon 2018). Whilst the scarcity of information is under-
standable, the growing role of intelligence in society presents a signicant
need for understanding of the public value of intelligence agencies and
ensuring their accountability in liberal democracies. Gill and Phythian (2006)
argue that citizens have been excluded from knowledge of intelligence policies
and practices for too long.
The book shows that big data is transforming what intelligence is, how it is
practised, and the relationships intelligence organisations have with society.
This includes both the collection of information and secret intelligence as
well as the analytical processes used to create intelligence products and
advice to inform decision-making. The book details how big data is trans-
forming aspects of intelligence production specically and the national
security environment more broadly. The book leverages semi-structured
interviews with almost fty senior and operational intelligence ocers and
decision-makers within the Australian National Intelligence Community
(NIC).
1
The NIC represents a unique group of interview participants, and
this research is the rst to access them as a community. The focus of the
research is from the perspective of Australian national security professionals;
however, these perspectives are applicable and relevant internationally to all
states that invest signicantly in intelligence collection technologies.
The introductory chapter examines and denes the key concepts of the
book, providing some background and context as well as oering insight into
how this research contributes to our understanding. First, it looks at big
data, followed by national security and intelligence. It is important to explain
these terms here as they are often used in dierent ways. The inconsistent use
of such concepts can lead to confusion and all three are essential to
Introduction 3
understanding the impact of big data on intelligence and national security.
Furthermore, the book argues that the advent of big data is shaping these
concepts, including what we see as intelligence and expanding the notion of
national security to include new social harms. The book shows how big data
is shaping the activities, knowledge and organisation of intelligence functions
that are intended to support policy makers in developing responses to these
new harms and vulnerabilities.
Big Data, National Security, and Intelligence
Big Data
Big data is an amorphous concept that is used to refer to large, diverse, growing
and changing datasets (Bennett Moses & Chan 2014; Chan & Bennett Moses
2016, 2017; Malomo & Sena 2016). Big data arose from technical advances in
storage capacity, speed and price points of data collection and analysis as well as
by the move towards understanding data as continuously collected, almost-
innitely networkable and highly exible (Metcalf, Keller & boyd 2016, p. 2).
Prior to big data, databases were constrained and unable to simultaneously deal
with the original 3Vs of big data volume, velocity and variety (Kitchin 2014b,
p. 68; Laney 2001). However, increased computational power, new database
design and distributed storage enabled the collection and analysis of big data
(Kitchin 2014b, p. 68). The unprecedented volume and size of data sets that
cannot be manually processed precipitated analytical solutions to analyse data
and derive insights, expanding the term big data from referring solely to the
storage of data (Mayer-Schönberger & Cukier 2014).
The term has evolved from the original 3Vs to include value derived from
understanding data sets as a whole and by drawing insights using new ana-
lytical techniques (boyd & Crawford 2012; Kitchin 2014a; Kitchin & Laur-
iault 2014). Kitchin (2014b) considers big data as ne-grained in resolution
and uniquely indexical in identication; relational in nature, containing
common elds that enable the conjoining of dierent data sets; and exible,
holding the traits of extensionality (new elds can be added easily) and sca-
leability (can be expanded in size rapidly). Importantly, big data is less about
data that is big than it is about a capacity to search, aggregate and cross-
reference large data sets (boyd & Crawford 2012, p. 663). It is this ability to
use the data for some type of decision or action that denes big data. As
others have aptly put, big data are worthless in a vacuum. Its potential value
is unlocked only when leveraged to drive decision-making (Gandomi &
Haider 2015, p. 140). The requirement to consider the veracity of data and
value led to the expansion of the 3Vs denition of big data volume, velo-
city and variety (Kitchin 2014b, p. 68; Laney 2001) to a 5V denition that
includes veracity (certainty and consistency in data) and value (insights into
and from data) (Akhgar et al. 2015; van der Sloot, Broeders & Schrijvers
2016).
4 Introduction
A range of terms are used, sometimes interchangeably, to describe analysis
of big data. These include: big data analytics (Cloud Security Alliance 2013;
Beer 2018; Minelli, Chambers & Dhiraj 2013; Power 2014; Pramanik et al.
2017; Shu 2016), advanced analytics (Babuta 2017; Chawda & Thakur 2016;
Shahbazian 2016), big data computing (Chen, Mao & Liu 2014) and data
mining (Pramanik et al. 2017). Additionally, the terms articial intelligence,
machine learning and algorithms are included in big data analytics for the
purpose of this study. In the book, big data is viewed broadly and refers to
all these components, including the technologies and analytics. Participants
in this research highlighted three key features of big data for national secur-
ity which, the book argues in Chapter 1, come together to form a big data
landscape.
National Security
National security and our conceptualisations of it evolves over time as it
is situationally, culturally and temporally contextual (Katzenstein 1996).
National security is a commonly used concept in international relations and
the analysis of policy decisions; however, its essential meaning is more widely
disputed than agreed upon (Baldwin 1997; Dupont 1990; Liotta 2002).
Maintaining national security is usually posited as the reason for the appli-
cation of intelligence resources. In a foundational text, Arnold Wolfers
characterised security as the absence of threats to acquired values and sub-
jectively, the absence of fear that such values will be attacked (Wolfers 1962,
p. 485). Baldwin (1997, p. 13) subsequently rened the absence of threats as
a low probability of damage to acquired values. Wolfers (1962, p. 150) notes
that the demand for a policy of national security is primarily normative in
character and security points to some degree of protection of values pre-
viously obtained: Security is a value, then, of which a nation can have more
or less and which it can aspire to have in greater or lesser measure. Wolfers
position has not gone unchallenged, as the eld struggles to agree on how
much security is desirable.
Zedner (2003, p. 155) posits that security is both a state of being and a
means to that end. Whelan (2014, p. 310) explains that we can understand
Zedners (2009) conceptualisation of security as an objective state of being
more or less secure and as a subjective condition based on how secure we
feel”’. Gyngell and Wesley (2007, p. 233) see security as a prudential value,
conceived as a condition which must be maintained against others potential
to degrade it. Buzan, Waever and de Wilde (1998) highlight that nation-state
security requires a referent object to make sense. The objective state of
security continues to imply a referent object and an existential threat to that
object and the special nature of security threats justies the use of extra-
ordinary measures to handle them (Buzan, Waever & de Wilde 1998).
Whelan (2014, p. 310) furthers this, noting the referent objects and range of
potential threats have considerably broadened, including the special nature
Introduction 5
of national security threats, among others. Thus, the political context of
national security is an important dimension (Dupont 1990). Wolfers (1952,
p. 500) highlights the challenges for those who bear the responsibility for
choices and decisions, that is, national security decision-makers:
Decision-makers are faced then, with the moral problem of choosing
rst the values that deserve protection the guarantee it may oer
to values like liberty, justice and peace They must decide which
level of security to make their target nally they must choose the
means and thus by scrupulous computation of values compare the
sacrices.
The book argues that big data has created new social harms which are or
need to be considered by decision-makers as national security threats or
vulnerabilities. In the book, national security is considered a state of trust on
the part of the citizen that risks to everyday life, whether from threats with a
human origin or impersonal hazards, are being adequately managed to the
extent that there is condence that normal life can continue (Omand 2010,
p. 9). Omand (2010) sets out three propositions underpinning the modern
approach to national security: psychological safety, citizen-centric view of
threats and hazards, and informed decision-making. This last point is crucial
in the use of big data: the key to good risk management, maintaining that
delicate balance, is to have better informed decision-making by government
and thus place greater weight on the work of the intelligence community
(Omand 2013, p. 21).
2
Symon & Tarapore (2015, p. 9) add that making sense
of complex systems and phenomena creating knowledge is central to
sound national security decision making.
Understanding national security, what it broadly encompasses and how
decisions are made to secure nations is critical to the way that big data
impacts on it and in understanding how intelligence resources are focused.
This research shows that participants see new technologies, like big data, as
expanding notions of national security to include, for example, information
warfare and aspects of how society functions online as infrastructure critical
to national security. Participants perceive that big data impacts on how
intelligence agencies can identify and respond to these increasing, diverse and
diuse national security threats.
Intelligence
Intelligence here is understood through a combination of denitions. Intelli-
gence is information [that] is gathered and analysed, sometimes secretly, and
then used to understand a particular situation and act with advantage in it
(Rolington 2013, p. 17). Intelligence is knowledge vital for national survival
(Kent 1966, p. vii). It is information that has been collected, processed and
narrowed to meet the needs of policy and decision-makers in relation to
6 Introduction
defence, foreign policy, national state aairs (such as diplomacy, trade and
economics) and security (Lowenthal 2012).
Intelligence in practice can be thought of in three ways, sometimes simul-
taneously (Lowenthal 2012, p. 9), as knowledge, as an organisation and as
either an activity (Kent 1966) or product (Lowenthal 2012). Kents classic
characterisation covers the the three separate and distinct things that intel-
ligence devotees usually mean when they use the word: knowledge, the type
of organisation that produces that knowledge and the activities pursued by
that organisation (Scott & Jackson 2004, p. 141).
Omand (2020, p. 472) denes the purpose of intelligence to help improve
the quality of decision-making by reducing ignorance, including reducing the
vulnerability of the decision-maker to uncertainty. Intelligence production is
one of the primary mechanisms for framing information and analysis to
inform national security decision-making (George & Bruce 2014; Kent 1966;
Lowenthal 2012; Omand 2010). The purpose of the intelligence community is
to assist policy makers with national security issues (Gookins 2008).
The relationship between intelligence, policy production and senior
decision-makers is vital in the national security environment (Coyne 2014;
Lowenthal 2012) as intelligence is intended to reduce uncertainty for
decision-makers (Agrell 2012; Betts 2009; Davies, Gustafson & Rigden 2013;
Dupont 2003; Fingar 2011; Kent 1966; Lowenthal 2012; Marrin 2009; Heuer
& Pherson 2015; Spracher 2009). Without use by decision-makers in order
to achieve national security intelligence would be redundant.
The combination of these denitions acknowledges the changing informa-
tion environment, accounts for the impact of big data and open-source
information on intelligence activity, while acknowledging the extant role of
secret intelligence collection as well as decision-makers acting on the
intelligence. Furthermore, as Omand (2020) highlights, it is signicant that
intelligence aims to reduce uncertainty and improve decision-making in
matters of nation-state security.
The relationship between national security and intelligence is noted by Agrell
and Treverton (2015, pp. 325): the essence of intelligence is hardly any longer
the collection, analysis, and dissemination of secret information, but rather the
management of uncertainty in areas critical for security goals for societies.
Additionally, the use of the term in circles outside of government –“commer-
cial intelligence, for example can dilute its meaning, rendering intelligence a
synonym for information(Richardson 2020a, p. 154). The term intelligence is
also used extensively in dierent government domains, such as law enforcement,
criminal, security, domestic, foreign and counterintelligence.
The book looks broadly across national security and intelligence activities
undertaken within the context of the National Intelligence Community,
rather than at a single academic discipline. It includes the intelligence appa-
ratus, but also the policy and political decision-making component essential
to national security. Big data, national security and intelligence are complex
concepts with a variety of meanings. Nevertheless, they can be loosely
Introduction 7
dened. The book argues that the relationship between intelligence producers
and users of intelligence those that make political calculations about
national security is critical and interconnected, especially in a big data era.
Furthermore, the book demonstrates the need to take a holistic view of
intelligence, dened by its purpose rather than eld of application, and to
include policy and decision-makers.
Australian National Intelligence Community
This section provides an overview of the Australian national security archi-
tecture and background to the Australian National Intelligence Commu-
nity including its composite agencies, oversight framework and legislative
foundations for an international readership. It also outlines the methodology
and analytical process of the research. It provides some context, especially
for international readers, to engage with the perspectives that participants
oered. Whilst this research is Australia specic, the themes surfaced here
are expected to apply in many democratic countries.
Ten agencies make up the Governments intelligence enterprise collec-
tively known as the National Intelligence Community (NIC) working to
collect, analyse and disseminate intelligence information and advice in
accordance with Australias interests and national security priorities (ONI
2017). The NIC is a relatively new grouping of agencies, having expanded
from the six agencies known as the Australian Intelligence Community
(AIC): the Oce of National Intelligence (ONI) formerly the Oce of
National Assessments (ONA), the Australian Signals Directorate (ASD), the
Australian Geospatial-Intelligence Organisation (AGO), the Australian
Secret Intelligence Service (ASIS), the Australian Security Intelligence
Organisation (ASIO) and the Defence Intelligence Organisation (DIO). To
these six have been added the Australian Criminal Intelligence Commission
(ACIC) and the intelligence functions of the Australian Federal Police (AFP),
the Australian Transaction Reports and Analysis Centre (AUSTRAC) and the
Department of Home Aairs (Home Aairs).
This expansion followed the 2017 Independent Intelligence Review (IIR),
which argued that the AICs collective tasks were growing more dicult,
given the increasing complexity of Australias geostrategic environment, the
rapid pace of technological change, and the broadening scope of security and
intelligence challenges (Department of the Prime Minister and Cabinet
2017). The IIR found that, while individual agencies were performing very
well, a higher level of collective performance could be achieved by strength-
ening integration across Australias national intelligence enterprise (Depart-
ment of the Prime Minister and Cabinet 2017). The IIR recommended
expansion from the six agencies of the AIC to the current ten agencies,
and the establishment of an Oce of National Intelligence (ONI), incorpor-
ating the Oce of National Assessments, to lead the community (Department
of the Prime Minister and Cabinet 2017).
8 Introduction
The creation of the NIC has been matched by a substantial growth in
budgets for Australian intelligence agencies. AIC budgets quadrupled from
2000 and 2010 to reach AUD$1.07 billion (Richardson 2020a, p. 100). In the
three years between 201819 and 202122 the combined publicly available
budget of NIC agencies has grown by AUD$1.5 billion to AUD$7.1 billion,
and stang grew by 1,000 positions to 25,000 noting this budget is for the
agencies as a whole not just their intelligence functions.
3
The budget for the
six AIC agencies alone (excluding the NIC additions) grew by AUD$400
million from 201819 to 202122, and 1,000 sta positions were added.
4
NIC
agencies also share a joint capability fund, which NIC member agencies pay
into and can apply for larger funding to improve overall NIC capability,
supporting gaps in technological innovation, training and other workforce
developments (Walsh 2021). Figure 0.1 shows the agencies and their primary
functions within the NIC.
Figure 0.1 NIC Agencies (ONI 2017)
Introduction 9
Intelligence Principles and Disciplines
In Australia, each NIC agency has a critical, distinct and enduring function
(Department of the Prime Minister and Cabinet 2017). More detail about
each of the agencies and their intelligence disciplines as well as similar
agencies in the United Kingdom and United States of America are listed in
Appendix A. How emerging technologies impact their activities is specicto
the legal framework, mission, purpose, and technological maturity of each
agency, as well as the kinds of intelligence work they do. Despite these dif-
ferent perspectives, they have a shared interest in improving their capability
to collect, analyse and disseminate information.
Australia has made several deliberate, principled choices to manage the
powers and activities of the NIC agencies (Richardson 2020a, p. 165). These
principles have been considered over time and include, among others, the
separations between security intelligence and law enforcement, and intelli-
gence collection and assessment; and the distinctions between foreign and
security intelligence, onshore and oshore operations, and Australians and
non-Australians (Richardson 2020a, p. 165). These distinctions have been
long discussed and, arguably, blurred with some exceptions and assistance
between functions but ultimately upheld.
The three most signicant distinctions in the context of emerging technologies
are set out here. One of the most important distinctions concerns the jurisdiction
in which intelligence collection or action takes place. Outside of exception by
ministerial authorisation, the distinction between domestic and foreign intelligence
collection is clear in the AIC agencies. This distinction is not as straightforward
with the agencies added for the NIC, because a number have domestic and foreign
missions, they are not intelligence collectors and their activities not jurisdictionally
bound. The second distinction is how agencies are legislatively required to manage
privacy. Three NIC agencies Home Aairs, AFP and AUSTRAC are bound
to the Australian Privacy Principles of The Privacy Act 1988, which governs the
way each agency collects, stores, uses and discloses personal information
(Richardson 2020b, p. 22). The other seven agencies in the NIC are exempt from
The Privacy Act 1988 completely (Richardson 2020b, p. 22).
A third distinction is the ways information can be obtained and what it
contains. Appendix B outlines the various disciplines, types or means of
intelligence collection (Lowenthal 2012). Collection can refer to collection
agencies, or the activity of intelligence collection (Lowenthal 2012).
5
Outside
of one agency ASIO intelligence gathering (collection) and intelligence
assessment functions take place in separate AIC agencies to compartmenta-
lise intelligence. For example, DIO relies on intelligence gathered by ASD
and others to inform its assessments (Hope Royal Commission on Intelli-
gence and Security 197477). However, the four NIC agencies do not t into
this collection and assessment framework. As agencies are not directly
named in interview data, types of intelligence, in Appendix B, are an
important way to understand the activities of the NIC agencies.
10 Introduction
The Study
This research advances our understanding of the impacts of big data on
intelligence agencies and national security in Australia. The principal aim of
the book is to explore the impacts of big data for intelligence production and
decision-making in national security. In doing so it sets out the impacts of
big data for knowledge (the information and data needed for intelligence),
intelligence activities and the organisation of intelligence communities. It
demonstrates that big data has pronounced impacts on many aspects of
national security, and our conception of what it includes, but is especially
signicant for the knowledge, activities and organisation of intelligence
agencies.
The overall aim of the book is to map broad themes relating to transfor-
mations in intelligence agencies and the national security environment. First,
it considers very broad impacts on the national security environment and the
national security threats posed by big data. Second, it moves to examine
more specic impacts for intelligence agencies and the production of intelli-
gence. Third, it explores large themes present in society but with specic
impacts for intelligence, including privacy, ethics and trust. A thread running
through the book is the change that big data brings and its potential to
transform the intelligence community and national security environment.
Interviews: Approach, Participant Selection and Considerations
For an emerging technology trend like big data, where research is limited,
semi-structured interviews provide the most appropriate data collection
method to access primary source data from national security agencies and
personnel. They are ideal when little is known about a phenomenon (Gray
2009; Saunders, Lewis & Thornhill 2007; Whelan & Molnar 2018; Yin 2013)
and act as a means of developing an understanding of social phenomena in
their natural setting. They have been successfully applied to the national
security, intelligence and policing elds where it can be dicult to access
primary source data.
6
Forty-seven participants from across all NIC agencies as well as ve
independent subject matter experts participated in semi-structured inter-
views. Interview questions followed semi-structured interview protocols, such
as including a list of questions that were posed to all interviewees. All parti-
cipants were asked to briey outline their background and then answer a
mixture of common questions, and additional questions that came up
organically.
7
Semi-structured interviews allow for a grounded theory approach which
aims to make patterns visible and understandable (Charmaz 2014, p. 89).
Grounded theory begins with inductive data; it involves going back and
forth between data and analysis, uses comparative methods and keeps you
interacting and involved with your data and emerging analysis (Charmaz
Introduction 11
2014, p. 1). Through coding, the researcher denes what is happening in the
data and begins to grapple with what it means developing an emergent
theory to explain the data (Charmaz 2014, p. 113).
8
Interviewee selection used a purposive sampling design, meaning the pri-
mary focus was to obtain a rich set of data rather than a representative
sample (De Vaus 2014). Participants were identied using snowball sampling,
where the researcher accesses interviewees suggested by other interviewees
and informal networks (Noy 2008). This process varied by agency. In some
cases, agency heads were interviewed rst, and after approval, additional
participants were approached separately. In other cases, agency heads dele-
gated the process to a suitable point of contact and suggested suitable inter-
view participants. In other agencies, informal networks of the researcher, or
the D2DCRC
9
were used. In practice, it essentially became an availability
sample (De Vaus 2014) as subjects self-selected or opted-in to the research.
Interviews were conducted within all ten National Intelligence Community
agencies as well as the oversight body, IGIS. The research involved 47 inter-
viewees, comprising 40 individual interviews and two small groups (one of
four and one of three), identifying as either independent subject matter
experts (ISMEs) or within government agencies as senior decision-makers
(SDMs), operational decision-makers (ODM) or technologists (TECH). The
breakdown can be seen in Table 0.1.
Prior to all interviews, organisational consent was received, and the inter-
viewees were provided with a plain language statement (PLS) and individual
consent form to ensure involvement was voluntary. After the interviews, the
audio was transcribed and provided to participants or agencies for their
approval to ensure against the small possibility that classied or sensitive
material may have been inadvertently disclosed. Minor amendments were
Table 0.1 Categories of Interviewees
Category Number of interviewees
Senior decision-maker (SDM) 20
Heads, deputy heads of agency and agency head
delegates.
10
Operational decision-maker (ODM) 10
Typically, mid-management level employees responsible for
leading operational decision-making and activities with
small or large teams.
11
Technologist (TECH) 12
Those with a technology background.
Independent subject matter expert (ISME) 5
Those with decades of experience in intelligence, national
security elds and academia.
12
12 Introduction
made in many of the transcripts, predominantly to improve the overall ow
of the text, clarify ambiguous points or remove specic references to organi-
sational structure or proprietary technologies. These transcripts were then
entered into QSR NVivo 12 for analysis.
13
Ethics & limitations
This study received ethics approval from Deakin Universitys Faculty of Arts
and Education Ethics Advisory Group and was assessed as negligible risk.
14
As a researcher with experience in the eld, it is possible this impacted the
authors access to participants. It is possible that being perceived as an insi-
der within the broader national security community contributed to this
access. It certainly aected the authors approach to the research and their
perspective. However, authors real or perceived insider understanding and
status enables them to articulate the impact of big data for intelligence
agencies in a manner only possible with an emic understanding of a culture
(Given 2008; Pike 2015).
This research does face limitations. First, due to the purposive sampling
design, the views of participants are not necessarily representative of the NIC
community. Second, their understanding of key questions and terms, such as
big data, could vary. However, the interview process mitigated this by
asking participants how they understood the term and then providing a clear
denition spelling out which technologies were included. Finally, the ndings
of this research may also not be generalisable to other countries although,
the key themes it explores are both relevant and present in other democratic
nations, and it is highly likely that aspects of this research will be relevant
and transferrable to similar democracies.
Book Outline
The book shows that big data fuels emerging technologies and is transform-
ing intelligence production specically as well as changing the national
security environment broadly, including what is considered a part of national
security and the relationships intelligence agencies have with the Australian
people. The book highlights some of the current and future transformational
changes associated with big data in society writ large that have implications
for the intelligence community.
Chapter 1 establishes the big data landscape and shows how it fuels
emerging technologies. It shows that big data has created a new landscape
comprising data abundance, digital connectivity and ubiquitous technology.
This chapter argues that the features of big data need to be considered
together as a landscape to fully understand the impacts on intelligence pro-
duction and national security. In examining each of these features, this
chapter shows how they individually and collectively as a landscape impact
intelligence activity, operations and the community. It then shows how this
Introduction 13
new big data landscape is concentrating information, computation and eco-
nomic power and that this has the potential to challenge ideas of nation-state
security.
Chapter 2 shows how big data challenges some of the longstanding and
foundational principles and practices of intelligence. First, the changing practice
of secrecy in intelligence work and activities. Second, the way the big data
landscape impacts understandings of geographical jurisdiction, aecting the
distinction of between operations that occur onshore and oshore, as well as
what constitutes nationality in the context of data. Third, how emerging tech-
nologies are complicating intelligence as well as challenging the national security
approach to innovation and the way in which intelligence agencies adopt tech-
nologies. Fourth, big data challenges fundamental principles of intelligence sto-
rage and compartmentalisation which agencies rely on to reduce security risks.
This will be further challenged by new approaches to technology. Fifth, the big
data landscape has created national decision-makers outside of government.
Finally, it shows that the big data landscape has exponentially increased security
vulnerabilities and directly challenges existing methods of assessing social harms
and national security threats.
Chapter 3 outlines new social harms and national security threats created
by the big data landscape. First, this chapter charts the impacts of the rapid
growth in data and analytics and shows how it is making these capabilities
accessible to new actors. It shows that big data democratises intelligence
capabilities, making intrusive digital surveillance, proling, inuence, mon-
itoring, tracking and targeting capabilities available to a wider range of
actors (state and non-state). Second, it shows how this is democratising sur-
veillance and creating new vulnerabilities for privacy intrusion. Third, it
highlights the capability for asymmetrical information dominance, enabling a
strategic advantage. It explores how disinformation and misinformation are
challenging intelligence. Fourth, it reveals how big data drives disinformation
and misinformation. Finally, it examines how the big data landscape enables
information warfare as well as social and political harm.
Chapter 4 examines the impact of the big data landscape on intelligence
production. It outlines the impacts on the knowledge, activities and organi-
sation of intelligence agencies. This chapter shows how big data is changing
intelligence as knowledge, including changes to the kinds of knowledge used
for intelligence and gaps in knowledge used for intelligence, requiring a
stronger focus on the purpose of intelligence. This section demonstrates how
big data is changing where the knowledge and data used for intelligence
come from and how knowledge for intelligence is received, digested and
understood. This chapter then demonstrates the impact of big data on intel-
ligence as an activity, showing changes to the intelligence cycle broadly and
specically highlighting three areas that participants articulated as the most
pressing or of the highest priority (collection and analysis as well as data
sharing and communication of intelligence). Finally, it examines the impact
14 Introduction
of big data on intelligence as an organisation, including digital transformation
and a change to the traditional models of intelligence analysis.
Chapter 5 analyses the impacts of big data on data privacy. The big data
landscape has and continues to radically transform privacy across society.
First, it builds on the extensive literature evidencing that big data is changing
privacy norms globally and the perception that in Australia there is a need to
rethink the privacy principles underpinning privacy laws. It looks at the way
in which big data has changed social conceptions of privacy and challenges
the Australian legislative framework for privacy and why this is important
for intelligence agencies. This chapter argues the impact of big data on priv-
acy and privacy regulation in society at large has potential future impli-
cations for the intelligence community. Second, this chapter shows how
privacy is temporal and the impact of anonymisationand aggregation of
data. Chiey that an abundance of data and the capacity to identify, link and
use data quickly have created the potential for privacy intrusion remote from
the individual, in less visible ways and at any point in the future. The vast-
ness of data collectors, sellers and users has led to complex and confusing
privacy landscape. Lastly, this chapter shows that intelligence agencies are
dierently aected by shifts in privacy. However, this research suggests that
currently the direct impacts of big data on privacy in intelligence agencies are
limited and predominately dependent on an agencys role and legislative
mandate, aecting some agencies more than others. Participants highlighted
that the impact of big data on privacy is characterised by one signicant
distinction among the AIC collection agencies that is, whether the agency
has a foreign or domestic mandate. Big data is changing how some agencies
collect, store and analyse data, particularly those subject to a legislative
requirement to determine whether the data relates to an individual who is
Australian.
Chapter 6 examines how the big data landscape impacts ethics in intelli-
gence. It reveals how the big data landscape is changing established ethical
boundaries of intelligence, including where big data will not improve intelli-
gence activities. According to participants, there are aspects of intelligence
where big data and automation will not ever be useful and other situations
where more testing and renement is needed before such systems are intro-
duced. This chapter highlights ethical dilemmas of big data in intelligence
that have not previously been studied. First, ethics at scale’–that some of
the decisions around ethics are being automated and applied at scale in social
contexts by private companies, which would represent a considerable ethical
dilemma if applied to intelligence activities. Second, ethics in intelligence
includes considering bias. This chapter indicates that intelligence practi-
tioners should be aware of the dierence between cognitive bias and data
bias as well as the intelligence challenges of incomplete data sets and the bias
of intelligence collection itself.
Chapter 7 shows how the big data landscape is changing public perception
of trust, transparency, and the legitimacy of intelligence agency operations.
Introduction 15
Interviewees reect on their relationships with the public and how big data
has and will impact that relationship. Emerging strongly from the data was a
sense that trust is signicant in the role of national security agencies in
Australia. Participants indicated that they saw big data and the information
ecosystem it enables as changing the relationships between intelligence
agencies and the public. Furthermore, this chapter argues that big data
impacts trust in the entire system of government and public service agencies
as it is reliant on trust in the way data is collected and used across all
government agencies, not just the national security sector. This chapter
proposes that big data is changing the publics perceptions of the intelligence
community around trust, transparency and the legitimacy of intelligence
agency operations. It unpacks how participants understand trust and the key
concepts of trust, legitimacy and the social contract, which each emerging
from the interview data. This chapter shows that participants perceive that
how trust is built and developed is impacted by big data, with participants
suggesting intelligence agencies need to align big data use with agency values
and purpose, transparency and public engagement.
The Conclusion reects on the ndings throughout the book and highlights
some of the implications for policy and limitations of as well as areas for future
research. The book reveals how the big data landscape is transforming what
intelligence is, how it is practised, and the relationships intelligence organisations
have with society and with each other. It shows that big data has impacts on
many aspects of national security, including our conception of what it constitutes.
The impact of big data is especially signicant for the knowledge, activities and
organisation of intelligence agencies. The book highlights specicimpacts for
intelligence agencies and the production of intelligence, and then examines how
intelligence agencies interact with each other and look out to the rest of society.
The book details how big data is impacting the relationship between intelligence
agencies and citizens, specically in the areas of privacy, ethics and trust.
Notes
1 The NIC is comprised of the original Australian Intelligence Community (AIC)
agencies plus four new ones. The agencies in the AIC are the Oce of National
Intelligence, Australian Security Intelligence Organisation, Australian Secret
Intelligence Service, Defence Intelligence Organisation, Australian Signals Direc-
torate and Australian Geospatial-Intelligence Organisation. The Home Aairs
Portfolio brings together Australias national and transport security, criminal jus-
tice, emergency management, multicultural aairs, and immigration and border-
related functions and agencies. Agencies within the Department of Home Aairs
include the Australian Criminal Intelligence Commission (ACIC) and the Aus-
tralian Transaction Reports and Analysis Centre (AUSTRAC). ACIC is included
in the NIC in its entirety, whereas the other new agencies in Home Aairs
(AUSTRAC and the Department of Home Aairs itself and the AFP) have only
the intelligence functions of their organisations included.
2 While this is a UK-specicdenition, a similar denition from the US denes
national security as the ability of national institutions to prevent adversaries from
16 Introduction
using force to harm Americans or their national interests and the condence of
Americans in this ability, from both the physical and psychological dimensions
(Sarkesian, Williams & Cimbala 2008, p. 4).
3 Richardson 2020a, p. 267; ACIC 2022; AFP 2022; ASD 2022; ASIO 2022;
AUSTRAC 2022; Department of the Prime Minister and Cabinet 2020; 2022;
Department of Home Aairs 2019; 2022. Note: These the budget and stang
gures exclude ASIS, DIO and AGO, as their details are not for publication.
4 Richardson 2020a, p. 267; ACIC 2022; AFP 2022; ASD 2022; ASIO 2022; AUS-
TRAC 2022; Department of the Prime Minister and Cabinet 2020; 2022;
Department of Home Aairs 2019; 2022.
5 For a thorough outline of collection and collection disciplines see Lowenthal
(2012, pp. 71118).
6 Examples include examinations of data science use in the United States Defense
Intelligence Agency (Knopp et al. 2016), the UK polices use of data (Babuta
2017), and the impact of big data on the production of security in Australia
(Chan & Bennett Moses 2017), which fell short of specically exploring big datas
impact on intelligence production. Additional studies in intelligence, analysis and
national security also utilised qualitative interview methods (Chan & Bennett
Moses 2017; Chen et al. 2017; Coyne 2014; Ratclie 2012; Treverton & Gabbard
2008; Walsh 2011; Whelan 2014).
7 Common questions included: (i) What is your understanding of big data? (ii)
How does big data impact on your organisation? (iii) How would you describe the
current and future challenges and opportunities of big data?
8 Coding was conducted line by line (Charmaz 2014, pp. 124127), followed by
focused coding to draw out larger concepts (Glaser & Strauss 1967, pp. 101117).
The nal stage of the analysis involved the in-built search and frequency query
functionality of QSR NVivo 12 to ensure no categories or data were missed.
9 Data 2 Decisions Cooperative Research Centre provided a scholarship to partially
fund this research.
10 SDMs were SES2 and above in the Australian Public Service context.
11 ODMs were mainly EL1, EL2 and SES1 in the Australian Public Service context.
12 The ve ISMEs were Stephen Merchant PSM, Dennis Richardson AC, Clive
Lines, Ian McKenzie PSM and Dr Lesley Seebeck. In the data their comments are
de-identied as ISME.
13 QSR NVivo is a software designed to help researchers to gain richer insights from
qualitative and mixed-methods data. It stores and organises data as well as
helping researchers to categorise, analyse and visualise their data.
14 This involved submitting a low risk application form, the PLS and consent form
as well as sample interview questions. The two ethical considerations of this study
were ensuring participant anonymity, and the security of the interview data as a
result, all participants are anonymised, and the recordings and transcripts are
only accessible to the author.
References
Agrell, W 2012, The next 100 years? Reections on the future of intelligence,
Intelligence and National Security, vol. 27, no. 1, pp. 118132.
Agrell, W & Treverton, GF 2015, National intelligence and science: beyond the great
divide in analysis and policy, Oxford University Press, Oxford.
Akhgar, B, Saatho, GB, Arabnia, H, Hill, R, Staniforth, A & Bayerl, PS 2015,
Application of big data for national security: a practitioners guide to emerging
technologies, Waltham Elsevier, Amsterdam.
Introduction 17
Andrew, C 2018, The secret world: a history of intelligence, Penguin Books, London.
ACIC 2022, Australian Criminal Intelligence Commission Annual Report 202122,
Commonwealth of Australia, Canberra.
AFP 2022, Australian Federal Police Annual Report 202122, Commonwealth of
Australia, Canberra.
ASIO 2022, Australian Security Intelligence Organisation Annual Report 202122,
Commonwealth of Australia, Canberra.
ASD 2022, Australian Signals Directorate Annual Report 202122, Commonwealth of
Australia, Canberra.
AUSTRAC 2022, AUSTRAC Annual Report 202122, Commonwealth of Australia,
Canberra.
Babuta, A 2017, Big data and policing an assessment of law enforcement requirements,
expectations and priorities, RUSI Occasional Paper, RUSI, London.
Baldwin, DA 1997, The concept of security, Review of International Studies, vol. 23,
no. 1, pp. 526.
Beer, D 2018, Envisioning the power of data analytics, Information, Communication
& Society, vol. 21, no. 3, pp. 465479.
Bennett Moses, L & Chan, J 2014, Using big data for legal and law enforcement
decisions: testing the new tools, University of New South Wales Law Journal, vol.
37, no. 2, pp. 643678.
Betts, R 2009, Analysis, war, and decision, in P Gill, S Marrin & M Phythian (eds),
Intelligence theory: key questions and debates, Routledge, New York, pp. 87111.
boyd, d & Crawford, K 2012, Critical questions for big data, Information,
Communication & Society, vol. 15, no. 5, pp. 662679.
Buzan, B, Waever, O & de Wilde, J 1998, Security: a new framework for analysis,
Lynne Rienner, Boulder, CO.
Chan, J & Bennett Moses, L 2016, Is big data challenging criminology?', Theoretical
Criminology, vol. 20, no. 1, pp. 2139.
Chan, J & Bennet Moses, L 2017, Making Sense of Big Data for Security, The
British Journal of Criminology, vol. 57, no. 2, pp. 299319.
Charmaz, K 2014, Constructing grounded theory, Sage, London.
Chawda, RK & Thakur, DG 2016, Big data and advanced analytics tools [con-
ference presentation], Symposium on Colossal Data Analysis and Networking,
Indore, India, 1819 March.
Chen, D, Fraiberger, SP, Moakler, R & Provost, F 2017, Enhancing transparency
and control when drawing data-driven inferences about individuals, Big Data, vol.
5, no. 3, pp. 197212.
Chen, M, Mao, S & Liu, Y 2014, Big data: a survey, Mobile Networks and
Applications, vol. 19, no. 2, pp. 171209.
Cloud Security Alliance 2013, Big data analytics for security intelligence, Cloud
Security Alliance, Seattle, WA.
Coyne, J 2014, Strategic intelligence in law enforcement: anticipating transnational
organised crime, PhD thesis, Queensland University of Technology.
Cukier, K 2010, Data, data everywhere, The Economist, 27 February, accessed 2 Decem-
ber 2021, https://www.economist.com/special-report/2010/02/27/data-data-everywhere.
Davies, PHJ, Gustafson, K & Rigden, I 2013, The intelligence cycle is dead, long live
the intelligence cycle: rethinking intelligence fundamentals for a new intelligence
doctrine in M Phythian (ed.), Understanding the intelligence cycle, Routledge,
London, pp. 5675.
18 Introduction
De Vaus, DA 2014, Surveys in social research, 6th edn, Routledge, London.
Degaut, M 2015, Spies and policymakers: intelligence in the information age,
Intelligence and National Security, vol. 31, no. 4, pp. 509531.
Department of Home Aairs 2019, Department of Home Aairs 201819,
Commonwealth of Australia, Canberra.
Department of Home Aairs 2022, Department of Home Aairs 202122,
Commonwealth of Australia, Canberra.
Department of the Prime Minister and Cabinet 2017, 2017 Independent Intelligence
Review, Commonwealth of Australia, Canberra.
Department of the Prime Minister and Cabinet 2020, Portfolio Additional Estimates
Statements 201920, Commonwealth of Australia, Canberra.
Department of the Prime Minister and Cabinet 2022, Portfolio Budget Statements
202223: Budget Related Paper No. 1.11, Commonwealth of Australia, Canberra.
DOMO 2019, Data never sleeps 7.0, DOMO, accessed 2 December 2021, https://www.
domo.com/learn/infographic/data-never-sleeps-7.
Dupont, A 1990, Australia and the concept of national security (Working paper no. 206),
Strategic and Defence Studies Centre, Australian National University, Canberra.
Dupont, A 2003, Intelligence for the twenty-rst century, Intelligence and National
Security, vol. 18, no. 4, pp. 1539.
Ericsson 2022, Ericsson Mobility Visualizer Ericcson, November, accessed 17 April
2023, https://www.ericsson.com/en/reports-and-papers/mobility-report/mobility-visua
lizer?f=1&ft=2&r=2,3,4,5,6,7,8,9&t=1,2,3,4,5,6,7&s=4&u=1&y=2022,2028&c=3.
Evans, D 2011, The Internet of Things: How the Next Evolution of the Internet Is
Changing Everything, Cisco, San Jose, accessed 26 May 2023, https://www.cisco.
com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf.
Fingar, T 2011, Reducing Uncertainty: Intelligence Analysis and National Security,
Stanford University Press, Redwood City.
Gandomi, A & Haider, M 2015, Beyond the hype: big data concepts, methods, and
analytics, International Journal of Information Management, vol. 35, pp. 137144.
Gartner 2017, Gartner Says 8.4 Billion Connected Things Will Be in Use in 2017,
Up 31 Percent From 2016, Gartner, 7 February, viewed 25 May 2023, https://www.
gartner.com/en/newsroom/press-releases/2017-02-07-gartner-says-8-billion-connecte
d-things-will-be-in-use-in-2017-up-31-percent-from-2016.
George, RZ & Bruce, JB, eds., 2014, Analyzing intelligence: national security practitioners
perspectives, 2nd edn, Georgetown University Press, Washington, DC.
Gill, P & Phythian, M 2006, Intelligence in an insecure world, Wiley, Hoboken, NJ.
Given, L (ed.) 2008, The Sage encyclopedia of qualitative research methods,Sage,
Thousand Oaks, CA.
Glaser, BG & Strauss, AL 1967, The discovery of grounded theory: strategies for
qualitative research, Aldine, Chicago.
Gookins, AJ 2008, The role of intelligence in policy making, SAIS Review, vol. 28,
no. 1, pp. 6573.
Gray, DE 2009, Doing research in the real world, 3rd edn, Sage, Los Angeles.
Gyngell, A & Wesley, M 2007, Making Australian foreign policy, 2nd edn, Cambridge
University Press, Cambridge.
Heuer, RJ & Pherson, R 2015, Structured analytic techniques for intelligence analysis,
2nd edn, CQ Press, Thousand Oaks, CA.
Hughes, RG, Jackson, P & Scott, L (eds) 2008, Exploring intelligence archives:
enquiries into the secret state, Routledge, London.
Introduction 19
International Data Corporation 2014, The digital universe, International Data
Corporation, Needham, MA.
International Data Corporation 2022, Worldwide IDC Global DataSphere Forecast,
20232027: Its a Distributed, Diverse, and Dynamic (3D) DataSphere,
International Data Corporation, Needham, MA.
Katzenstein, Peter J 1996, The culture of national security: norms and identity in world
politics, edited by Peter J. Katzenstein. Columbia University Press, New York.
Kemp, S 2023, Digital 2023, We are social, 26 January, accessed 5 April 2023, http
s://wearesocial.com/au/blog/2023/01/the-changing-world-of-digital-in-2023-2/.
Kent, S 1966, Strategic intelligence for American world policy, Princeton University
Press, Princeton, NJ.
Kitchin, R 2014a, Big data, new epistemologies and paradigm shifts, Big Data &
Society, vol. 1, no. 1.
Kitchin, R 2014b, The data revolution: big data, open data, data infrastructures & their
consequences, Sage, London.
Kitchin, R & Lauriault, TP 2014, Small data in the era of big data, GeoJournal, vol.
80, no. 4, pp. 463475.
Knopp, BM, Beaghley, S, Frank, A, Orrie, R & Watson, M 2016, Dening the roles,
responsibilities, and functions for data science within the defense intelligence agency,
RAND Corporation, Santa Monica, CA.
Landon-Murray, M 2016, Big data and intelligence: applications, human capital, and
education, Journal of Strategic Security, vol. 9, no. 2, pp. 94123.
Laney, D 2001, 3D data management: controlling data volume velocity and variety,
META Delta, 6 February.
Liotta, PH 2002, Boomerang eect: the convergence of national and human
security, Security Dialogue, vol. 33, no. 4, pp. 473488.
Lowenthal, MM 2012, Intelligence: from secrets to policy, 5th edn, Sage/CQ Press,
Los Angeles, CA.
Lundy, L, OBrien, A, Solis, C, Sowers, A & Turner, J 2019, The ethics of applied
intelligence in modern conict, International Journal of Intelligence and Counter
Intelligence, vol. 32, no. 3, pp. 587599.
Malomo, F & Sena, V 2016, Data intelligence for local government? Assessing the
benets and barriers to use of big data in the public sector, Policy & Internet, vol.
9, no. 1, p. 727.
Manyika, J, Chui, M, Brown, B, Bughin, J, Dobbs, R, Roxburgh, C & Byers, AH
2011, Big data: the next frontier for innovation, competition, and productivity,
McKinsey Global Institute, New York.
Marrin, S 2009, Intelligence analysis and decision-making, in P Gill, S Marrin & M
Phythian (eds), Intelligence theory: key questions and debates, Routledge, New
York, pp. 131150.
Mayer-Schönberger, V & Cukier, K 2014, Big data: a revolution that will transform how
we live, work, and think, Mariner Books, Houghton Miin Harcourt, Boston, MA.
Mayer-Schönberger, V & Ramge, T 2018, Reinventing capitalism in the age of big
data, John Murray Press, London.
Metcalf, J, Keller, EF & boyd, d 2016, Perspectives on big data, ethics, and society,
Council for Big Data, Ethics, and Society.
Minelli, M, Chambers, M & Dhiraj, A 2013, Big data, big analytics: emerging business
intelligence and analytic trends for todaysbusinesses, Wiley CIO, Hoboken, NJ.
Introduction
Agrell, W 2012, ‘The next 100 years? Reflections on the future of intelligence’, Intelligence and
National Security, vol. 27, no. 1, pp. 118–132.
Agrell, W & Treverton, GF 2015, National intelligence and science: beyond the great divide in
analysis and policy, Oxford University Press, Oxford.
Akhgar, B , Saathoff, GB , Arabnia, H , Hill, R , Staniforth, A & Bayerl, PS 2015, Application of
big data for national security: a practitioner’s guide to emerging technologies, Waltham Elsevier,
Amsterdam.
Andrew, C 2018, The secret world: a history of intelligence, Penguin Books, London.
ACIC 2022, Australian Criminal Intelligence Commission Annual Report 2021–22,
Commonwealth of Australia, Canberra.
AFP 2022, Australian Federal Police Annual Report 2021–22, Commonwealth of Australia,
Canberra.
ASIO 2022, Australian Security Intelligence Organisation Annual Report 2021–22,
Commonwealth of Australia, Canberra.
ASD 2022, Australian Signals Directorate Annual Report 2021–22, Commonwealth of Australia,
Canberra.
AUSTRAC 2022, AUSTRAC Annual Report 2021–22, Commonwealth of Australia, Canberra.
Babuta, A 2017, Big data and policing an assessment of law enforcement requirements,
expectations and priorities, RUSI Occasional Paper, RUSI, London.
Baldwin, DA 1997, ‘The concept of security’, Review of International Studies, vol. 23, no. 1, pp.
5–26.
Beer, D 2018, ‘Envisioning the power of data analytics’, Information, Communication & Society,
vol. 21, no. 3, pp. 465–479.
Bennett Moses, L & Chan, J 2014, ‘Using big data for legal and law enforcement decisions:
testing the new tools’, University of New South Wales Law Journal, vol. 37, no. 2, pp. 643–678.
Betts, R 2009, ‘Analysis, war, and decision’, in P Gill , S Marrin & M Phythian (eds), Intelligence
theory: key questions and debates, Routledge, New York, pp. 87–111.
boyd & Crawford, K 2012, ‘Critical questions for big data’, Information, Communication &
Society, vol. 15, no. 5, pp. 662–679.
Buzan, B , Waever, O & de Wilde, J 1998, Security: a new framework for analysis, Lynne
Rienner, Boulder, CO.
Chan, J & Bennett Moses, L 2016, ‘Is big data challenging criminology?', Theoretical
Criminology, vol. 20, no. 1, pp. 21–39.
Chan, J & Bennet Moses, L 2017, ‘Making Sense of Big Data for Security’, The British Journal
of Criminology, vol. 57, no. 2, pp. 299–319.
Charmaz, K 2014, Constructing grounded theory, Sage, London.
Chawda, RK & Thakur, DG 2016, ‘Big data and advanced analytics tools’ [conference
presentation], Symposium on Colossal Data Analysis and Networking, Indore, India, 18–19
March .
Chen, D , Fraiberger, SP , Moakler, R & Provost, F 2017, ‘Enhancing transparency and control
when drawing data-driven inferences about individuals’, Big Data, vol. 5, no. 3, pp. 197–212.
Chen, M , Mao, S & Liu, Y 2014, ‘Big data: a survey’, Mobile Networks and Applications, vol. 19,
no. 2, pp. 171–209.
Cloud Security Alliance 2013, Big data analytics for security intelligence, Cloud Security
Alliance, Seattle, WA.
Coyne, J 2014, ‘Strategic intelligence in law enforcement: anticipating transnational organised
crime’, PhD thesis, Queensland University of Technology.
Cukier, K 2010, ‘Data, data everywhere’, The Economist, 27 February , accessed 2 December
2021 , https://www.economist.com/special-report/2010/02/27/data-data-everywhere.
Davies, PHJ , Gustafson, K & Rigden, I 2013, ‘The intelligence cycle is dead, long live the
intelligence cycle: rethinking intelligence fundamentals for a new intelligence doctrine’ in M
Phythian (ed.), Understanding the intelligence cycle, Routledge, London, pp. 56–75.
De Vaus, DA 2014, Surveys in social research, 6th edn, Routledge, London.
Degaut, M 2015, ‘Spies and policymakers: intelligence in the information age’, Intelligence and
National Security, vol. 31, no. 4, pp. 509–531.
Department of Home Affairs 2019, Department of Home Affairs 2018–19, Commonwealth of
Australia, Canberra.
Department of Home Affairs 2022, Department of Home Affairs 2021–22, Commonwealth of
Australia, Canberra.
Department of the Prime Minister and Cabinet 2017, 2017 Independent Intelligence Review,
Commonwealth of Australia, Canberra.
Department of the Prime Minister and Cabinet 2020, Portfolio Additional Estimates Statements
2019–20, Commonwealth of Australia, Canberra.
Department of the Prime Minister and Cabinet 2022, Portfolio Budget Statements 2022–23:
Budget Related Paper No. 1.11, Commonwealth of Australia, Canberra.
DOMO 2019, Data never sleeps 7.0, DOMO, accessed 2 December 2021 ,
https://www.domo.com/learn/infographic/data-never-sleeps-7.
Dupont, A 1990, Australia and the concept of national security (Working paper no. 206),
Strategic and Defence Studies Centre, Australian National University, Canberra.
Dupont, A 2003, ‘Intelligence for the twenty-first century’, Intelligence and National Security, vol.
18, no. 4, pp. 15–39.
Ericsson 2022, ‘Ericsson Mobility Visualizer’ Ericcson, November, accessed 17 April 2023 ,
https://www.ericsson.com/en/reports-and-papers/mobility-report/mobility-
visualizer?f=1&ft=2&r=2,3,4,5,6,7,8,9&t=1,2,3,4,5,6,7&s=4&u=1&y=2022,2028&c=3.
Evans, D 2011, The Internet of Things: How the Next Evolution of the Internet Is Changing
Everything, Cisco, San Jose, accessed 26 May 2023 ,
https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf.
Fingar, T 2011, Reducing Uncertainty: Intelligence Analysis and National Security, Stanford
University Press, Redwood City.
Gandomi, A & Haider, M 2015, ‘Beyond the hype: big data concepts, methods, and analytics’,
International Journal of Information Management, vol. 35, pp. 137–144.
Gartner 2017, ‘Gartner Says 8.4 Billion Connected “Things” Will Be in Use in 2017, Up 31
Percent From 2016’, Gartner, 7 February , viewed 25 May 2023 ,
https://www.gartner.com/en/newsroom/press-releases/2017-02-07-gartner-says-8-billion-
connected-things-will-be-in-use-in-2017-up-31-percent-from-2016.
George, RZ & Bruce, JB , eds., 2014, Analyzing intelligence: national security practitioners’
perspectives, 2nd edn, Georgetown University Press, Washington, DC.
Gill, P & Phythian, M 2006, Intelligence in an insecure world, Wiley, Hoboken, NJ.
Given, L (ed.) 2008, The Sage encyclopedia of qualitative research methods, Sage, Thousand
Oaks, CA.
Glaser, BG & Strauss, AL 1967, The discovery of grounded theory: strategies for qualitative
research, Aldine, Chicago.
Gookins, AJ 2008, ‘The role of intelligence in policy making’, SAIS Review, vol. 28, no. 1, pp.
65–73.
Gray, DE 2009, Doing research in the real world, 3rd edn, Sage, Los Angeles.
Gyngell, A & Wesley, M 2007, Making Australian foreign policy, 2nd edn, Cambridge University
Press, Cambridge.
Heuer, RJ & Pherson, R 2015, Structured analytic techniques for intelligence analysis, 2nd edn,
CQ Press, Thousand Oaks, CA.
Hughes, RG , Jackson, P & Scott, L (eds) 2008, Exploring intelligence archives: enquiries into
the secret state, Routledge, London.
International Data Corporation 2014, The digital universe, International Data Corporation,
Needham, MA.
International Data Corporation 2022, Worldwide IDC Global DataSphere Forecast, 2023–2027:
It’s a Distributed, Diverse, and Dynamic (3D) DataSphere, International Data Corporation,
Needham, MA.
Katzenstein, Peter J 1996, The culture of national security: norms and identity in world politics,
edited by Peter J. Katzenstein. Columbia University Press, New York.
Kemp, S 2023, ‘Digital 2023’, We are social, 26 January , accessed 5 April 2023 ,
https://wearesocial.com/au/blog/2023/01/the-changing-world-of-digital-in-2023-2/.
Kent, S 1966, Strategic intelligence for American world policy, Princeton University Press,
Princeton, NJ.
Kitchin, R 2014a, ‘Big data, new epistemologies and paradigm shifts’, Big Data & Society, vol. 1,
no. 1.
Kitchin, R 2014b, The data revolution: big data, open data, data infrastructures & their
consequences, Sage, London.
Kitchin, R & Lauriault, TP 2014, ‘Small data in the era of big data’, GeoJournal, vol. 80, no. 4,
pp. 463–475.
Knopp, BM , Beaghley, S , Frank, A , Orrie, R & Watson, M 2016, Defining the roles,
responsibilities, and functions for data science within the defense intelligence agency, RAND
Corporation, Santa Monica, CA.
Landon-Murray, M 2016, ‘Big data and intelligence: applications, human capital, and education’,
Journal of Strategic Security, vol. 9, no. 2, pp. 94–123.
Laney, D 2001, ‘3D data management: controlling data volume velocity and variety’,
META
Delta
, 6 February.
Liotta, PH 2002, ‘Boomerang effect: the convergence of national and human security’, Security
Dialogue, vol. 33, no. 4, pp. 473–488.
Lowenthal, MM 2012, Intelligence: from secrets to policy, 5th edn, Sage/CQ Press, Los
Angeles, CA.
Lundy, L , O'Brien, A , Solis, C , Sowers, A & Turner, J 2019, ‘The ethics of applied intelligence
in modern conflict’, International Journal of Intelligence and Counter Intelligence, vol. 32, no. 3,
pp. 587–599.
Malomo, F & Sena, V 2016, ‘Data intelligence for local government? Assessing the benefits and
barriers to use of big data in the public sector’, Policy & Internet, vol. 9, no. 1, p. 7–27.
Manyika, J , Chui, M , Brown, B , Bughin, J , Dobbs, R , Roxburgh, C & Byers, AH 2011, Big
data: the next frontier for innovation, competition, and productivity, McKinsey Global Institute,
New York.
Marrin, S 2009, ‘Intelligence analysis and decision-making’, in P Gill , S Marrin & M Phythian
(eds), Intelligence theory: key questions and debates, Routledge, New York, pp. 131–150.
Mayer-Schonberger, V & Cukier, K 2014, Big data: a revolution that will transform how we live,
work, and think, Mariner Books, Houghton Mifflin Harcourt, Boston, MA.
Mayer-Schonberger, V & Ramge, T 2018, Reinventing capitalism in the age of big data, John
Murray Press, London.
Metcalf, J , Keller, EF & boyd,d 2016, Perspectives on big data, ethics, and society, Council for
Big Data, Ethics, and Society.
Minelli, M , Chambers, M & Dhiraj, A 2013, Big data, big analytics: emerging business
intelligence and analytic trends for today’s businesses, Wiley CIO, Hoboken, NJ.
Noy, C 2008, ‘Sampling knowledge: the hermeneutics of snowball sampling in qualitative
research’, International Journal of Social Research Methodology, vol. 11, no. 4, pp. 327–344.
Omand, D 2010, Securing the state, Columbia University Press, New York.
Omand, D 2013, ‘Securing the state: national security and secret intelligence’, Prism: A Journal
of the Center for Complex Operations, vol. 4, no. 3, pp. 14–27.
Omand, D 2020, ‘Reflections on intelligence analysts and policymakers’, International Journal of
Intelligence and CounterIntelligence, vol. 33, no. 3, pp. 471–482.
ONI 2017, The national intelligence community, accessed 7 July 2020 ,
https://www.oni.gov.au/national-intelligence-community.
Pike, KL 2015, Language in relation to a unified theory of the structure of human behavior, De
Gruyter Mouton, The Hague.
Power, DJ 2014, ‘Using “big data” for analytics and decision support’, Journal of Decision
Systems, vol. 23, no. 2, pp. 222–228.
Pramanik, MI , Lau, RYK , Yue, WT , Ye, Y & Li, C 2017, ‘Big data analytics for security and
criminal investigations’, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery,
vol. 7, no. 4, art. e1208.
The Privacy Act
1988 (Cwlth), accessed 22 May 2023 ,
https://www.legislation.gov.au/Details/C2022C00361.
Ratcliffe, J 2012, Intelligence-led policing, Taylor and Francis, Hoboken, NJ.
Reinsel, D , Gantz, J & Rydning, J 2017, Data age 2025: the evolution of data to life-critical,
International Data Corporation, Needham, MA.
Richardson, D 2020a, Comprehensive Review of the Legal Framework of the National
Intelligence Community, vol. 1, Commonwealth of Australia, Canberra.
Richardson, D 2020b, Comprehensive Review of the Legal Framework of the National
Intelligence Community, vol. 4, Commonwealth of Australia, Canberra.
Rolington, A 2013, Strategic intelligence for the 21st century: the mosaic method, Oxford
University Press, Oxford.
Royal Commission on Australia’s Intelligence and Security Agencies (Hope Royal Commission
on Intelligence and Security) 1974–77,
Royal Commission on Australia’s Intelligence and
Security Agencies
, Commonwealth of Australia, Canberra.
Sadowski, J 2020, Too smart: how digital capitalism is extracting data, controlling our lives, and
taking over the world, MIT Press, Cambridge, MA.
Sarkesian, SC , Williams, JA & Cimbala, SJ 2008, US National Security: Policymakers,
Processes, and Politics, Lynne Rienner Publishers.
Saunders, M , Lewis, P & Thornhill, A 2007, Research methods for business students, Financial
Times/Prentice Hall, Harlow, UK.
Schwab, K 2017, The fourth industrial revolution, Penguin Books, London.
Scott, L & Jackson, P 2004, ‘The study of intelligence in theory and practice’, Intelligence and
National Security, vol. 19, no. 2, pp. 139–169.
Shahbazian, E 2016, Intelligence analysis: needs and solutions, IOS Press, Amsterdam.
Shu, H 2016, ‘Big data analytics: six techniques’, Geo-spatial Information Science, vol. 19, no.
2, pp. 119–128.
Spracher, WC 2009, ‘National security intelligence professional education: a map of U.S. civilian
university programs and competencies’, Doctor of Education thesis, George Washington
University.
Symon, P 2018, ASIS Director-General launches new book– ‘Intelligence and the Function of
Government’, Australian National University, News and Events, 21 March , accessed 2
December 2021 , https://bellschool.anu.edu.au/news-events/stories/6028/asis-director-general-
launches-new-book-intelligence-and-function.
Symon, PB & Tarapore, A 2015, ‘Defense intelligence analysis in the age of big data’, Joint
Force Quarterly, vol. 79, no. 4, pp. 4–11.
Treverton, GF & Gabbard, CB 2008, Assessing the tradecraft of intelligence analysis,
Intelligence Policy Center, RAND National Security Research Division, Santa Monica, CA.
van der Sloot, B , Broeders, D & Schrijvers, E (eds) 2016, Exploring the boundaries of big data,
Netherlands Scientific Council for Government Policy, The Hague.
Van Puyvelde, D 2018, ‘Qualitative research interviews and the study of national security
intelligence’, International Studies Perspectives, vol. 19, no. 4, pp. 375–391.
Van Puyvelde, D , Coulthart, S & Hossain, MS 2017, ‘Beyond the buzzword: big data and
national security decision-making’, International Affairs, vol. 93, no. 6, pp. 1397–1416.
Walsh, PF 2011, Intelligence and intelligence analysis, Routledge, London.
Walsh, PF 2021, ‘Transforming the Australian intelligence community: mapping change, impact
and challenges’, Intelligence and National Security, vol. 36, no. 2, pp. 243–259.
Whelan, C 2014, ‘Managing dynamic security networks: towards the strategic managing of
cooperation, coordination and collaboration’, Security Journal, vol. 1, no. 18, pp. 310–327.
Whelan, C & Molnar, A 2018, Securing mega-events: networks, strategies and tensions,
Palgrave Macmillan UK, London.
Wolfers, A 1952, '“National security” as an ambiguous symbol’, The Academy of Political
Science, vol. 67, no. 4, pp. 481–502.
Wolfers, A 1962, Discord and collaboration: essays on international politics, Johns Hopkins
Press, Baltimore, MD.
Yin, RK 2013, Case study research: design and methods, Sage, Thousand Oaks, CA.
Yiu, C 2012, The big data opportunity: making government faster, smarter and more personal,
Policy Exchange, London.
Zedner, L 2003, ‘The concept of security: an agenda for comparative analysis’, Legal Studies,
vol. 23, no. 1, pp. 153–175.
Zedner, L 2009, Security, Routledge, London.
Zegart, A 2022, Spies, Lies, and Algorithms: The History and Future of American Intelligence,
Princeton University Press, Princeton.
Zuboff, S 2019, The age of surveillance capitalism: the fight for a human future at the new
frontier of power, Profile Books, London.
Big Data Landscape Fuels Emerging Technologies
Acxiom 2018, ‘Acxiom Data Overview’, Acxiom, September 2018 , access 17 April 2023 ,
https://www.acxiom.com/wp-content/uploads/2018/11/Acxiom_Data_Overview_2018_11.pdf.
Agrell, W 2012, ‘The next 100 years? Reflections on the future of intelligence’, Intelligence and
National Security, vol. 27, no. 1, pp. 118–132.
Akhgar, B , Saathoff, GB , Arabnia, H. , Hill, R. , Staniforth, A. & Bayerl, P.S. 2015, Application
of big data for national security: a practitioner’s guide to emerging technologies, Waltham
Elsevier, Amsterdam.
Amazon 2023, ‘2022 Amazon Annual Report’, Amazon.com Inc., 25 January , accessed 20
April 2023 , https://ir.aboutamazon.com/annual-reports-proxies-and-shareholder-
letters/default.aspx.
Andrejevic, M 2013, Infoglut: how too much information is changing the way we think and know,
Routledge, New York.
Andrew, C 2018, The secret world: a history of intelligence, Penguin Books, London.
ASIO (Australian Security Intelligence Organisation) 2018, Corporate plan 2018–2019,
Commonwealth of Australia, Canberra.
Australian Bureau of Statistics 2023, Government Finance Statistics, Australia, ABS, 28
February , accessed 6 April 2023 ,
https://www.abs.gov.au/statistics/economy/government/government-finance-statistics-
australia/latest-release.
Australian Criminal Intelligence Commission 2012, Australian Criminal Intelligence Management
Strategy 2012–15, Commonwealth of Australia, Canberra.
Australian Government 2017, What is personal information?, Office of the Australian Information
Commissioner, Canberra, Australia.
Australian Government Productivity Commission 2016, Digital disruption: what do governments
need to do?, Australian Government Productivity Commission, Canberra.
Babuta, A 2017, Big data and policing an assessment of law enforcement requirements,
expectations and priorities, RUSI Occasional Paper, RUSI, London.
BBC (British Broadcasting Corporation) 2018, Bridging the world through digital connectivity,
BBC StoryWorks, accessed 2 December 2021 ,
https://www.bbc.com/storyworks/specials/digital-connectivity/.
Beer, D 2018, ‘Envisioning the power of data analytics’, Information, Communication & Society,
vol. 21, no. 3, pp. 465–479.
Bell, G 2018, ‘The character of future Indo-Pacific land forces’, Australian Army Journal, vol. 14,
no. 3, pp. 171–184.
Bennett Moses, L & Chan, J 2014, ‘Using big data for legal and law enforcement decisions:
testing the new tools’, University of New South Wales Law Journal, vol. 37, no. 2, pp. 643–678.
Betts, R 2009, ‘Analysis, war, and decision’, in P Gill , S Marrin & M Phythian (eds), Intelligence
theory: key questions and debates, Routledge, New York, pp. 87–111.
boyd,d & Crawford, K 2012, ‘Critical questions for big data’, Information, Communication &
Society, vol. 15, no. 5, pp. 662–679.
Chan, J & Bennett Moses, L 2016, ‘Is big data challenging criminology?', Theoretical
Criminology, vol. 20, no. 1, pp. 21–39.
Chan, J & Bennet Moses, L 2017, ‘Making Sense of Big Data for Security’, The British Journal
of Criminology, vol. 57, no. 2, pp. 299–319.
Chawda, RK & Thakur, DG 2016, ‘Big data and advanced analytics tools’ [conference
presentation], Symposium on Colossal Data Analysis and Networking, Indore, India, 18–19
March .
Chen, M , Mao, S & Liu, Y 2014, ‘Big data: a survey’, Mobile Networks and Applications, vol. 19,
no. 2, pp. 171–209.
Cloud Security Alliance 2013, Big data analytics for security intelligence, Cloud Security
Alliance, Seattle, WA.
Cohen, JE 2017, ‘Law for the platform economy’, University of California, Davis Law Review vol.
51, pp. 133–204.
Corrigan, J 2019, ‘Spy agencies turn to AI to stay ahead of adversaries’, NextGov, 27 June ,
accessed 2 December 2021 , https://www.nextgov.com/emerging-tech/2019/06/spy-agencies-
turn-ai-stay-ahead-adversaries/158081/.
Coyne, J 2014, ‘Strategic intelligence in law enforcement: anticipating transnational organised
crime’, PhD thesis, Queensland University of Technology.
Coyne, J , Neal, S & Bell, P 2014, ‘Reframing intelligence: challenging the cold war intelligence
doctrine in the information age’, International Journal of Business and Commerce, vol. 3, no. 5,
pp. 53–68.
Crain, M 2016, ‘The limits of transparency: data brokers and commodification’, New Media &
Society, vol. 20, no. 1, pp. 88–104.
Crawford, K & Schultz, J 2014, ‘Big data and due process: toward a framework to redress
predictive privacy harms’, Boston College Law Review, vol. 55, no. 1, pp. 93–128.
Cukier, K 2010, ‘Data, data everywhere’, The Economist, 27 February , accessed 2 December
2021 , https://www.economist.com/special-report/2010/02/27/data-data-everywhere.
Culnane, C , Rubinstein, B & Teague, V 2016, ‘Crime and Privacy in Open Data: Testing the
strength of methods used for protecting privacy in open data shouldn’t be a crime’, Pursuit,
accessed 17 April 2023 , https://pursuit.unimelb.edu.au/articles/crime-and-privacy-in-open-data.
Dahlqvist, F , Patel, M , Rajko, A & Shulman, J 2019, ‘Growing opportunities in the Internet of
Things’, McKinsey & Company, 22 July , accessed 17 April 2023 ,
https://www.mckinsey.com/industries/private-equity-and-principal-investors/our-
insights/growing-opportunities-in-the-internet-of-things.
Davies, PHJ 2004, ‘Intelligence culture and intelligence failure in Britain and the United States’,
Cambridge Review of International Affairs, vol. 17, no. 3, pp. 495–520.
Davies, PHJ 2010, ‘Intelligence and the machinery of government: conceptualizing the
intelligence community’, Public Policy and Administration, vol. 25, no. 1, pp. 29–46.
Davies, PHJ , Gustafson, K & Rigden, I 2013, ‘The intelligence cycle is dead, long live the
intelligence cycle: rethinking intelligence fundamentals for a new intelligence doctrine’ in M
Phythian (ed.), Understanding the intelligence cycle, Routledge, London, pp. 56–75.
Degaut, M 2015, ‘Spies and policymakers: intelligence in the information age’, Intelligence and
National Security, vol. 31, no. 4, pp. 509–531.
Dupont, A 2003, ‘Intelligence for the twenty-first century’, Intelligence and National Security, vol.
18, no. 4, pp. 15–39.
Edward, W 2020, ‘The Uberisation of work: the challenge of regulating platform capitalism. A
commentary’, International Review of Applied Economics, vol. 34, no. 4, pp. 512–521.
El Emam, K , Dankar, FK , Vaillancourt, R , Roffey, T & Lysyk, M 2009, ‘Evaluating the risk of
re-identification of patients from hospital prescription records’, Canadian Journal of Hospital
Pharmacy, vol. 62, no. 4, pp. 307–319.
Ericsson 2022, ‘Ericsson Mobility Visualizer’Ericcson, November, accessed 17 April 2023 ,
https://www.ericsson.com/en/reports-and-papers/mobility-report/mobility-
visualizer?f=1&ft=2&r=2,3,4,5,6,7,8,9&t=1,2,3,4,5,6,7&s=4&u=1&y=2022,2028&c=3.
Fernandez, R , Klinge, TJ , Hendrikse, R & Adriaans, I 2021, ‘How big tech is becoming the
government’, Tribune, 5 February , accessed 22 March 2022 ,
https://tribunemag.co.uk/2021/02/how-big-tech-became-the-government.
Gandomi, A & Haider, M 2015, ‘Beyond the hype: big data concepts, methods, and analytics’,
International Journal of Information Management, vol. 35, pp. 137–144.
Gerstell, GS 2019, ‘I work for N.S.A. We cannot afford to lose the digital revolution’, New York
Times, 10 September , accessed 20 March 2023 ,
https://www.nytimes.com/2019/09/10/opinion/nsa-privacy.html.
Ghahramani, Z 2023, ‘Independent Review of The Future of Compute: Final report and
recommendations’, Department for Science, Innovation & Technology, United Kingdom.
Gill, P 2009, ‘Theories of intelligence’, in P Gill , S Marrin & M Phythian (eds), Intelligence
theory: Key questions and debates, Routledge, New York, pp. 208–226.
Gordo, B 2017, ‘“Big data” in the information age’, City & Community, vol. 16, no. 1, pp. 16–19.
Gordon, S 2017, A conversation with Sue Gordon Principal Deputy Director of National
Intelligence, Walter E. Washington Convention Center, Washington, D.C., 7 September .
Gordon, S 2019, Sue Gordon and Michael Morrell in conversation, CBS, Intelligence Matters
Podcast, https://www.cbsnews.com/news/former-top-dni-official-sue-gordon-discusses-
circumstances-of-her-departure-from-odni-transcript/.
Gordon, S 2020, ‘Former top DNI official Sue Gordon discusses circumstances of her departure
from ODNI’, CBS News, 14 February , https://www.cbsnews.com/news/former-top-dni-official-
sue-gordon-discusses-circumstances-of-her-departure-from-odni-transcript/.
Guoli, C & Li, J 2022, Seeing the Unseen: Behind Chinese Tech Giants’ Global Venturing,
Wiley, Newark,
Hammond-Errey, M 2022, ‘You’re being watched: How Big Data is changing our lives’, The
Sydney Morning Herald, 2 February , accessed 20 May 2023 ,
https://www.smh.com.au/national/you-re-being-watched-how-big-data-is-changing-our-lives-
20220201-p59st0.html.
Herman, M 2001, Intelligence services in the information age: theory and practice, Frank Cass,
London.
Hershkovitz, S 2022, The future of national intelligence: how emerging technologies reshape
intelligence communities, Rowman & Littlefield, Lanham.
Heuer, RJ & Pherson, R 2015, Structured analytic techniques for intelligence analysis, 2nd edn,
CQ Press, Thousand Oaks, CA.
Howell, BE & Potgieter, PH 2020, ‘Politics, policy and fixed-line telecommunications provision:
Insights from Australia’, Telecommunications Policy, vol. 44, no. 7, pp. 1–19.
Hulnick, AS 2006, ‘What’s wrong with the intelligence cycle’, Intelligence and National Security,
vol. 21, no. 6, pp. 959–979.
Intel 2020, ‘A guide to the Internet of Things’, Intel, accessed 29 June 2020 ,
https://www.intel.com/content/www/us/en/internet-of-things/infographics/guide-to-iot.html.
Intel 2014, ‘Intel® Gateway Solutions for the Internet of Things’, Intel, accessed 19 April 2023 ,
https://www.intel.com.tw/content/dam/www/public/us/en/documents/product-briefs/sb-intel-
gateway-iot.pdf.
Johnson, R 2005, Analytic culture in the US intelligence community: an ethonographic study,
Center for the Study of Intelligence, CIA, Washington, DC.
Kahn, D 2009, ‘An historical theory of intelligence’, in P Gill , S Marrin & M Phythian (eds),
Intelligence theory: key questions and debates, Routledge, New York, pp. 4–15.
Kemp, S 2023, ‘Digital 2023’, We are social, 26 January , accessed 5 April 2023 ,
https://wearesocial.com/au/blog/2023/01/the-changing-world-of-digital-in-2023-2/.
Kitchin, R 2014a, ‘Big data, new epistemologies and paradigm shifts’, Big Data & Society, vol. 1,
no. 1.
Kitchin, R 2014b, The data revolution: big data, open data, data infrastructures & their
consequences, Sage, London.
Kitchin, R & Lauriault, TP 2014, ‘Small data in the era of big data’, GeoJournal, vol. 80, no. 4,
pp. 463–475.
Lahneman, WJ 2010, ‘The need for a new intelligence paradigm’, International Journal of
Intelligence and CounterIntelligence, vol. 23, no. 2, pp. 201–225.
Laney, D 2001, ‘3D data management: controlling data volume velocity and variety’, META
Delta, 6 February .
Lee, J 2021, ‘Big data for liberal democracy’, The Australian, 5 March , accessed 12 March
2022 , https://www.theaustralian.com.au/inquirer/big-data-for-liberal-democracy/news-
story/10ed6d4d8b01677955fc468d3751a4b7.
Lehdonvirta, V 2022, Cloud Empires: How Digital Platforms Are Overtaking the State and How
We Can Regain Control, MIT Press, Cambridge, MA.
Lehdonvirta, V 2023, ‘Behind AI, a massive infrastructure is changing geopolitics’, Oxford
Internet Institute, 17 March , access 10 April 2023 , https://www.oii.ox.ac.uk/news-
events/news/behind-ai-a-massive-infrastructure-is-changing-geopolitics/.
LexisNexis 2023, ‘About’, LexisNexis, accessed 17 April 2023 , https://www.lexisnexis.com/en-
us/about-us/about-us.page.
Lotz, A 2018, ‘“Big tech” isn’t one big monopoly– it’s 5 companies all in different businesses’,
The Conversation, 24 March .
Lowenthal, MM 2012, Intelligence: from secrets to policy, 5th edn, Sage/CQ Press, Los
Angeles, CA.
Malomo, F & Sena, V 2016, ‘Data intelligence for local government? Assessing the benefits and
barriers to use of big data in the public sector’, Policy & Internet, vol. 9, no. 1, p. 7–27.
Marrin, S 2009, ‘Intelligence analysis and decision-making’, in P Gill , S Marrin & M Phythian
(eds), Intelligence theory: key questions and debates, Routledge, New York, pp. 131–150.
Marrin, S 2014, ‘Improving intelligence studies as an academic discipline’, Intelligence and
National Security, vol. 31, no. 2, pp. 266–279.
Marrin, S 2017, ‘Understanding and improving intelligence analysis by learning from other
disciplines’, Intelligence and National Security, vol. 32, no. 5, pp. 539–547.
Mayer-Schönberger, V & Cukier, K 2014, Big data: a revolution that will transform how we live,
work, and think, Mariner Books, Houghton Mifflin Harcourt, Boston, MA.
Mayer-Schönberger, V & Ramge, T 2018, Reinventing capitalism in the age of big data, John
Murray Press, London.
Mazarr, MJ , Bauer, RM , Casey, A , Heintz, S & Matthews, LJ 2019, The emerging risk of
virtual societal warfare: social manipulation in a changing information environment, RAND
Corporation, Santa Monica, CA.
McQueen, M 2018, How to prepare now for what’s next: a guide to thriving in an age of
disruption, Wiley, Milton, Qld.
Metcalf, J , Keller, EF & boyd,d 2016, Perspectives on big data, ethics, and society, Council for
Big Data, Ethics, and Society, https://bdes.datasociety.net/council-output/perspectives-on-big-
data-ethics-and-society/.
Minelli, M , Chambers, M & Dhiraj, A 2013, Big data, big analytics: emerging business
intelligence and analytic trends for today’s businesses, Wiley CIO, Hoboken, NJ.
Moore, M 2016, Tech giants and civic power, King’s College London Policy Institute, London.
Murphy, D & Kuehl, D 2015, ‘The case for a national information strategy’, Military Review,
September-October, pp. 70–83.
Neef, D 2014, Digital exhaust: what everyone should know about big data, digitization and
digitally driven innovation, Dale Neef, Upper Saddle River, NJ.
Odom, WE 2008, ‘Intelligence analysis’, Intelligence and National Security, vol. 23, no. 3, pp.
316–332.
Office of the Director of National Intelligence 2022, Senior Advisory Group Panel on
Commercially Available Information, Office of the Director of National Intelligence, Washington,
DC.
Omand, D & Phythian, M 2018, Principled spying: the ethics of secret intelligence, Oxford
University Press, Oxford.
Pandya, J 2019, ‘The dual-use dilemma of artificial intelligence’, Forbes, 28 January , accessed
20 March 2023 , https://www.forbes.com/sites/cognitiveworld/2019/01/07/the-dual-use-dilemma-
of-artificial-intelligence/?sh=5854d6306cf0.
Power, DJ 2014, ‘Using “big data” for analytics and decision support’, Journal of Decision
Systems, vol. 23, no. 2, pp. 222–228.
Pramanik, MI , Lau, RYK , Yue, WT , Ye, Y & Li, C 2017, ‘Big data analytics for security and
criminal investigations’, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery,
vol. 7, no. 4, art. e1208.
Press, G 2013, ‘A very short history of big data’, Forbes, 9 May , accessed 2 December 2021 ,
https://www.forbes.com/sites/gilpress/2013/05/09/a-very-short-history-of-big-
data/?sh=51c7904065a1.
Ratcliffe, J 2012, Intelligence-led policing, Taylor and Francis, Hoboken, NJ.
Reinsel, D , Gantz, J & Rydning, J 2018, The digitization of the world from edge to core (IDC
White Paper), IDC, Needham, MA.
Richards, NM & King, JH 2013, ‘Three paradoxes of big data’, Stanford Law Review Online, vol.
41, no. 3, pp. 41–46.
Richmond, B 2019, A day in the life of data, Consumer Policy Research Centre, Melbourne.
Rocher, L , Hendrickx, JM & de Montjoye, YA 2019, ‘Estimating the success of re-identifications
in incomplete datasets using generative models’, Nature Communications, vol. 10, no. 1, art.
3069.
Rolington, A 2013, Strategic intelligence for the 21st century: the mosaic method, Oxford
University Press, Oxford.
Rovner, J 2013, ‘Intelligence in the Twitter age’, International Journal of Intelligence and
CounterIntelligence, vol. 26, no. 2, pp. 260–271.
Sadowski, J 2019, ‘When data is capital: datafication, accumulation, and extraction’, Big Data &
Society, vol. 6, no. 1.
Santesteban, C & Longpre, S 2020, ‘How big data confers market power to big tech: leveraging
the perspective of data science’, Antitrust Bulletin, vol. 65, no. 3, pp. 459–485.
Schwab, K 2017, The fourth industrial revolution, Penguin Books, London.
Shahbazian, E 2016, Intelligence analysis: needs and solutions, IOS Press, Amsterdam.
Shu, H 2016, ‘Big data analytics: six techniques’, Geo-spatial Information Science, vol. 19, no.
2, pp. 119–128.
Sweeney, L 2015, ‘Only You, Your Doctor, and Many Others May Know’, Technology Science,
28 September , accessed 17 April 2023 , https://techscience.org/a/2015092903/.
Sweeney, L , Abu, A , & Winn, J 2013, ‘Identifying Participants in the Personal Genome Project
by Name’, Data Privacy Lab, White Paper, Harvard University.
Symon, PB & Tarapore, A 2015, ‘Defense intelligence analysis in the age of big data’, Joint
Force Quarterly, vol. 79, no. 4, pp. 4–11.
Technology and Security
2023, Audio podcast, United States Studies Centre, 24 May ,
https://www.ussc.edu.au/analysis/technology-and-security-ts-podcast-intelligence-ai-and-aukus-
with-former-us-principal-deputy-director-of-national-intelligence-susan-gordon.
Thomas, ST 1988, ‘Assessing current intelligence studies’, International Journal of Intelligence
and CounterIntelligence, vol. 2, no. 2, pp. 217–244.
TikTok 2021, ‘Thanks a billion!’, TikTok News, 28 September , accessed 10 May 2023 ,
https://newsroom.tiktok.com/en-us/1-billion-people-on-tiktok.
Top500 2022, ‘Development over Time’, Top500, 1 November , accessed 20 April 2023 ,
https://www.top500.org/statistics/overtime/.
Treverton, GF & Gabbard, CB 2008, Assessing the tradecraft of intelligence analysis,
Intelligence Policy Center, RAND National Security Research Division, Santa Monica, CA.
Tucker, D 2014, The end of intelligence: espionage and state power in the information age,
Stanford University Press, Stanford, CA.
Unsworth, K 2016, ‘The social contract and big data’, Journal of Information Ethics, vol. 25, pp.
83–97.
van der Sloot, B , Broeders, D & Schrijvers, E (eds) 2016, Exploring the boundaries of big data,
Netherlands Scientific Council for Government Policy, The Hague.
van Dijck, J , Poell, T & de Waal, M 2018, The platform society: public values in a connective
world, Oxford University Press, New York.
Van Puyvelde, D 2018, ‘Qualitative research interviews and the study of national security
intelligence’, International Studies Perspectives, vol. 19, no. 4, pp. 375–391.
Vandepeer, C 2011, ‘Rethinking threat: intelligence analysis, intentions, capabilities, and the
challenge of non-state actors’, PhD thesis, University of Adelaide.
Véliz, C 2021, ‘Privacy and digital ethics after the pandemic’, Nature Electronics, vol. 4, no. 1,
pp. 10–11.
Wall Street Journal 2023a, ‘Alphabet Inc. Cl C’, Wall Street Journal, 6 April , accessed 6 April
2023 , https://www.wsj.com/market-data/quotes/GOOG.
Wall Street Journal 2023b, ‘Microsoft Corp.’, Wall Street Journal, 6 April , accessed 6 April 2023
, https://www.wsj.com/market-data/quotes/MSFT.
Wall Street Journal 2023c, ‘Apple Inc.’, Wall Street Journal, 6 April , accessed 6 April 2023 ,
https://www.wsj.com/market-data/quotes/AAPL.
Wall Street Journal 2023d, ‘Meta Platforms Inc.’, Wall Street Journal, 6 April , accessed 6 April
2023 , https://www.wsj.com/market-data/quotes/META.
Wall Street Journal 2023e, ‘Amazon.com Inc.’, Wall Street Journal, 6 April , accessed 6 April
2023 , https://www.wsj.com/market-data/quotes/amzn.
Watts, T 2020, Democracy and the authoritarian challenge, Lowy Institute, Canberra,
https://myaccount.lowyinstitute.org/events/2020-npc-tim-watts.
Wondracek, G , Holz, T , Kirda, E , & Kruegel, C 2010, ‘A Practical Attack to De-anonymize
Social Network Users’, in 2010 IEEE Symposium on Security and Privacy, Oakland, CA, USA,
pp. 223–238.
World Bank 2023, ‘GDP (current US$)’, The World Bank, accessed 12 April 2023 ,
https://data.worldbank.org/indicator/NY.GDP.MKTP.CD.
Zegart, A 2022, Spies, Lies, and Algorithms: The History and Future of American Intelligence,
Princeton University Press, Princeton.
Zuboff, S 2019, The age of surveillance capitalism: the fight for a human future at the new
frontier of power, Profile Books, London.
Big Data Landscape Challenges Fundamental Intelligence Principles
and Practices
Agrell, W 2012, ‘The next 100 years? Reflections on the future of intelligence’, Intelligence and
National Security, vol. 27, no. 1, pp. 118–132.
Attorney General’s Department 2023, ‘Policy 8: Sensitive and classified information’, Protective
Security Policy Framework, 23 March , accessed 17 May 2023 ,
https://www.protectivesecurity.gov.au/system/files/2023-01/pspf-policy-08-sensitive-and-
classified-information.pdf.
Australian Cyber Security Centre 2023, Information Security Manual (ISM), Australian Signals
Directorate, Canberra, Australia.
Birch, K & Bronson, K 2022, ‘Big Tech’, Science as Culture, vol. 31, no. 1, pp. 1–14.
Capaccio, A 2023, ‘Elon Musk’s SpaceX Wins Pentagon Deal for Starlink in Ukraine’,
Bloomberg, 2 June , accessed 13 June 2023 , https://www.bloomberg.com/news/articles/2023-
06-01/musk-s-spacex-wins-pentagon-deal-for-its-starlink-in-ukraine#xj4y7vzkg.
Couch, N & Robins, B 2013, Big data for defence and security, Royal United Services Institute
(RUSI), London.
Coyne, J , Shoebridge, M & Zhang, A 2020, National security agencies and the cloud: an urgent
capability issue for Australia, ASPI, Barton ACT.
Dahj, JNM 2022, Mastering cyber intelligence: gain comprehensive knowledge and skills to
conduct threat intelligence for effective system defense, Packt Publishing, Birmingham.
Davidson, D 2017, ‘Facebook targets ‘insecure’ young people’, The Australian, 1 May ,
accessed 12 May 2023 , https://www.theaustralian.com.au/business/media/facebook-targets-
insecure-young-people-to-sell-ads/news-story/a89949ad016eee7d7a61c3c30c909fa6.
Department of the Prime Minister and Cabinet 2017, 2017 Independent Intelligence Review,
Commonwealth of Australia, Canberra.
Duffy, K , 2022, ‘A top Pentagon official said SpaceX Starlink rapidly fought off a Russian
jamming attack in Ukraine’, Business Insider, 22 April , accessed 20 May 2023 ,
https://www.businessinsider.com/spacex-starlink-pentagon-russian-jamming-attack-elon-musk-
dave-tremper-2022-4.
Griffin, P 2019, ‘Facebook won’t give up its insidious practices without a fight’, Noted, 22 March.
Hammond-Errey, M 2023, Secrecy, sovereignty and sharing: How data and emerging
technologies are transforming intelligence, United States Studies Centre at the University of
Sydney, Sydney.
Hartcher, P 2021, ‘Huawei? No way! Why Australia banned the world’s biggest telecoms firm’,
Sydney Morning Herald, 21 May , accessed 10 May 2023 ,
https://www.smh.com.au/national/huawei-no-way-why-australia-banned-the-world-s-biggest-
telecoms-firm-20210503-p57oc9.html.
Horlings, T 2023, ‘Dealing with Data: Coming to Grips with the Information Age in Intelligence
Studies Journals’, Intelligence and National Security, vol. 38, no. 3, pp. 447–469.
Janjeva, A , Harris, A & Byrne, J 2022, ‘The Future of Open Source Intelligence for UK National
Security’, Royal United Services Institute for Defence and Security Studies, London.
Kemp, S 2023, ‘Digital 2023’, We are social, 26 January , accessed 5 April 2023 ,
https://wearesocial.com/au/blog/2023/01/the-changing-world-of-digital-in-2023-2/.
Kent, S 1966, Strategic intelligence for American world policy, Princeton University Press,
Princeton, NJ.
Landon-Murray, M 2016, ‘Big data and intelligence: applications, human capital, and education’,
Journal of Strategic Security, vol. 9, no. 2, pp. 94–123.
Lefebvre, S 2018, ‘Why Are State Secrets Protected from Disclosure? The Discourse of Secret
Keepers’, The International Journal of Intelligence, Security, and Public Affairs, vol. 20, no. 3,
pp. 204–229.
Lehdonvirta, V 2023, ‘Behind AI, a massive infrastructure is changing geopolitics’, Oxford
Internet Institute, 17 March , accessed 10 April 2023 , https://www.oii.ox.ac.uk/news-
events/news/behind-ai-a-massive-infrastructure-is-changing-geopolitics/.
Lerman, R & Zakrzewski, C 2022, ‘Elon Musk’s Starlink is keeping Ukrainians online when
traditional Internet fails’, Washington Post, 19 March , accessed 20 April 2023 ,
https://www.washingtonpost.com/technology/2022/03/19/elon-musk-ukraine-starlink/.
Lim, K 2015, ‘Big data and strategic intelligence’, Intelligence and National Security, vol. 31, no.
4, pp. 619–635.
Lowenthal, MM 2012, Intelligence: from secrets to policy, 5th edn, Sage/CQ Press, Los
Angeles, CA.
Lu-YueYang, M 2012, ‘Australia blocks China’s Huawei from broadband tender’, Reuters, 26
March , accessed 18 May 2023 , https://www.reuters.com/article/us-australia-huawei-nbn-
idUSBRE82P0GA20120326.
Lyon, D 2015, ‘The Snowden stakes: challenges for understanding surveillance today’,
Surveillance & Society, vol. 13, no. 2, pp. 139–152.
Manadhata, PK & Wing, JM 2011, ‘An Attack Surface Metric’, IEEE Transactions on Software
Engineering, vol. 37, no. 3, pp. 371–386.
Metz, C 2022, ‘Elon Musk backtracks, saying his company will continue to fund internet service
in Ukraine’, The New York Times, 10 October , accessed 19 April 2023 ,
https://www.nytimes.com/live/2022/10/15/world/russia-ukraine-war-news#musk-ukraine-
internet-starlink.
National Institute of Standards and Technology 2018, ‘vulnerability’, Computer Security
Resource Centre, accessed 17 May 2023 , https://csrc.nist.gov/glossary/term/vulnerability.
Omand, D , Bartlett, J & Miller, C 2012, #Intelligence, Demos, London.
Richardson, D 2020, Comprehensive Review of the Legal Framework of the National
Intelligence Community, Commonwealth of Australia, Canberra.
Santesteban, C & Longpre, S 2020, ‘How big data confers market power to big tech: leveraging
the perspective of data science’, Antitrust Bulletin, vol. 65, no. 3, pp. 459–485.
Sargut, G & McGrath, RG 2011, ‘Learning to live with complexity’, Harvard Business Review,
vol. 89, no. 9, pp. 68–136.
Satariano, A 2023, ‘Elon Musk doesn’t want his satellites to run Ukraine’s drones’, The New
York Times, 9 February , accessed 19 April 2023 ,
https://www.nytimes.com/2023/02/09/world/europe/elon-musk-spacex-starlink-satellite-
ukraine.html.
Scott, L 2007, ‘Sources and methods in the study of intelligence: a British view’, Intelligence and
National Security, vol. 22, no. 2, pp. 185–205.
Shoebridge, M , Coyne, J & Shah, R 2021, Collaborative and Agile. Intelligence Community
Collaboration Insights from the United Kingdom and the United States Australian Strategic
Policy Institute, Canberra.
Technology And Security
2023a, Audio podcast, United States Studies Centre, Sydney, 28
February , accessed 12 May 2023 , https://www.ussc.edu.au/analysis/emerging-technologies-
and-signals-intelligence-with-the-jessica-hunter.
Technology And Security
2023b, Audio podcast, United States Studies Centre, 24 May ,
https://www.ussc.edu.au/analysis/technology-and-security-ts-podcast-intelligence-ai-and-aukus-
with-former-us-principal-deputy-director-of-national-intelligence-susan-gordon.
US Senate Select Committee on Intelligence 2017, ‘ODNI Statement on Declassified
Intelligence Community Assessment of Russian Activities and Intentions in Recent U.S.
Elections’, accessed 20 February 2023 , https://www.intelligence.senate.gov/hearings/open-
hearing-intelligence-communitys-assessment-russian-activities-and-intentions-2016-us.
Vandepeer, C 2011, ‘Intelligence analysis and threat assessment: towards a more
comprehensive model of threat’ [conference presentation], 4th Australian Security and
Intelligence Conference, Perth, 5–7 December.
Vladeck, SI 2014, ‘Big data before and after Snowden’, Journal of National Security Law and
Policy, vol. 7, pp. 333–339.
Vogel, KM , Reid, G , Kampe, C , & Jones, P 2021, ‘The impact of AI on intelligence analysis:
tackling issues of collaboration, algorithmic transparency, accountability, and management’,
Intelligence and National Security, vol. 36, no. 6, pp. 827–848.
Waters, G 2014, Getting it right: integrating the intelligence, surveillance and reconnaissance
enterprise (Kokoda Papers no. 18), Kokoda Foundation, Ashmore, Qld.
Zegart, A 2022, Spies, Lies, and Algorithms: The History and Future of American Intelligence,
Princeton University Press, Princeton.
Zegart, A 2023, ‘Open Secrets: Ukraine and the Next Intelligence Revolution’, Foreign Affairs,
January , accessed 20 February 2023 , https://www.foreignaffairs.com/world/open-secrets-
ukraine-intelligence-revolution-amy-zegart.
Zuboff, S 2019, The age of surveillance capitalism: the fight for a human future at the new
frontier of power, Profile Books, London.
Big Data Landscape
Aaronson, SA 2021, Could Trade Agreements Help Address the Wicked Problem of Cross-
Border Disinformation?, Centre for International Governance Innovation, Ontario.
ACCC (Australian Competition and Consumer Commission) 2020, Digital Advertising Services
Inquiry– interim report, ACCC, Canberra.
Aho, B & Duffield, R 2020, ‘Beyond surveillance capitalism: privacy, regulation and big data in
Europe and China’, Economy and Society, vol. 49, no. 2, pp. 187–212.
Aradau, C & Blanke, T 2015, ‘The (big) data-security assemblage: knowledge and critique’, Big
Data & Society, vol. 2, no. 2, pp. 1–12.
ASPI (Australian Strategic Policy Institute) 2021, The Xinjiang Data Project, ASPI, Canberra,
https://xjdp.aspi.org.au.
Bernot, A 2022, ‘Transnational state-corporate symbiosis of public security: China’s exports of
surveillance technologies’, International Journal for Crime, Justice and Social Democracy, vol.
11, no. 2, pp. 159–173.
Carroll, DR 2021, ‘Chapter 3: Cambridge Analytica’, in GD Rawnsley , Y Ma & K Pothong
(eds.), Research Handbook on Political Propoganda, Edward Elgar Publishing, Cheltenham,
Gloucestershire.
Clarke, R 1988, ‘Information technology and dataveillance’, Communications of the ACM, vol.
31, no. 5, pp. 498–512.
Cohen, JE 2017, ‘Law for the platform economy’, University of California, Davis Law Review vol.
51, pp. 133–204.
Crain, M 2016, ‘The limits of transparency: data brokers and commodification’, New Media &
Society, vol. 20, no. 1, pp. 88–104.
Crawford, K & Schultz, J 2014, ‘Big data and due process: toward a framework to redress
predictive privacy harms’, Boston College Law Review, vol. 55, no. 1, pp. 93–128.
Culliford, E 2020, ‘How political campaigns use your data’, Reuters, 12 October , accessed 20
May 2023 , https://www.reuters.com/graphics/USA-ELECTION/DATA-VISUAL/yxmvjjgojvr/.
Darczewska, J 2014, ‘The anatomy of Russian information warfare: the Crimean operation, a
case study’, Ośrodek Studiów Wschodnich, Warsaw.
Davidson, D 2017, ‘Facebook targets ‘insecure’ young people’, The Australian, 1 May ,
accessed 12 May 2023 , https://www.theaustralian.com.au/business/media/facebook-targets-
insecure-young-people-to-sell-ads/news-story/a89949ad016eee7d7a61c3c30c909fa6.
Douglas, H , Harris, BA & Dragiewicz, M 2019, ‘Technology-facilitated domestic and family
violence: women’s experiences’, British Journal of Criminology, vol. 59, no. 3, pp. 551–570.
European Commission High-level expert group (HLEG) 2018, ‘A multi-dimensional approach to
disinformation: Report of the independent High level Group on fake news and online
disinformation’, Directorate-General for Communications Networks, Content and Technology,
European Commission, Luxemburg.
Gerstell, GS 2019, ‘I work for N.S.A. We cannot afford to lose the digital revolution’, New York
Times, 10 September , accessed 20 March 2023 ,
https://www.nytimes.com/2019/09/10/opinion/nsa-privacy.html.
Gray, J 2020, ‘Surveillance capitalism vs. the surveillance state’, Noema, 17 June , accessed 2
December 2021 , https://www.noemamag.com/surveillance-capitalism-vs-the-surveillance-
state/.
Greene, T , Martens, D & Shmueli, G 2022, ‘Barriers to academic data science research in the
new realm of algorithmic behaviour modification by digital platforms’, Nature Machine
Intelligence, vol. 4, no. 4, pp. 323–330.
Griffin, P 2019, ‘Facebook won’t give up its insidious practices without a fight’, Noted, 22 March.
Hammond-Errey, M 2016, ‘Information Influence in an Era of Global Insecurity and Digital
Connectivity (Russian Disinformation Strategies and Hybrid War: Implications for Government
and National Security Operations)’, Masters Thesis, Australian National University.
Hammond-Errey, M 2019, ‘Understanding and assessing information influence and foreign
interference’, Journal of Information Warfare, vol. 18, pp. 1–22.
Hammond-Errey, M 2022, Big data and national security: A guide for Australian policymakers,
Lowy Institute, Sydney.
Hecht-Felella, L 2021, Federal agencies are secretly buying consumer data, Brennan Center for
Justice, New York.
IDEA 2018, Digital microtargeting political party innovation primer 1, International Institute for
Democracy and Electoral Assistance, Stockholm.
Jeffreys-Jones, R 2017, We Know All about You: The Story of Surveillance in Britain and
America, Oxford University Press, Oxford.
Jiang, J , 2021 ‘The Eyes and Ears of the Authoritarian Regime: Mass Reporting in China’,
Journal of Contemporary Asia, vol. 51, no. 5, pp. 828–847.
Khalil, L 2020, Digital authoritarianism, China and Covid, Lowy Institute, Sydney.
Kirchgaessner, S , Ganguly, M , Pegg, D , Cadwalladr, C & Burke, J 2023, ‘Revealed: the
hacking and disinformation team meddling in elections’, The Guardian, 15 February , accessed
20 May 2023 , https://www.theguardian.com/world/2023/feb/15/revealed-disinformation-team-
jorge-claim-meddling-elections-tal-hanan.
Kirchgaessner, S , Lewis, P , Pegg, D , Cutler, S , Lakhani, N & Safi, M 2021, ‘Revealed: leak
uncovers global abuse of cyber-surveillance weapon’, The Guardian, 19 July , accessed 20 May
2023 , https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-
cyber-surveillance-weapon-nso-group-pegasus.
Kitchin, R 2014a, ‘Big data, new epistemologies and paradigm shifts’, Big Data & Society, vol. 1,
no. 1.
Kitchin, R 2014b, The data revolution: big data, open data, data infrastructures & their
consequences, Sage, London.
Liang, F , Das, V , Kostyuk, N , & Hussain, MM 2018, ‘Constructing a Data-Driven Society:
China’s Social Credit System as a State Surveillance Infrastructure– China’s Social Credit
System as State Surveillance’, Policy and Internet, vol. 10, no. 4, pp. 415–453.
Lehdonvirta, V 2023, ‘Behind AI, a massive infrastructure is changing geopolitics’, Oxford
Internet Institute, 17 March , access 10 April 2023 , https://www.oii.ox.ac.uk/news-
events/news/behind-ai-a-massive-infrastructure-is-changing-geopolitics/.
Lemieux, F 2018, Intelligence and state surveillance in modern societies: an international
perspective, Emerald Publishing Limited, Bingley, UK.
Ljunggren, D 2022, ‘Ukraine finds a mass grave in recaptured city of Izium’, The Syndey
Morning Herald, 16 September , accessed 15 April 2023 ,
https://www.smh.com.au/world/europe/ukraine-finds-a-mass-grave-in-recaptured-city-of-izium-
zelensky-20220916-p5bijm.html.
Lyon, D 2001, Surveillance society: monitoring everyday life, Open University Press,
Buckingham.
Macnish, K 2016, ‘Government Surveillance and Why Defining Privacy Matters in a Post-
Snowden World’ Journal of Applied Philosophy, Vol. 35, No. 2.
Mazarr, MJ , Bauer, RM , Casey, A , Heintz, S & Matthews, LJ 2019a, The emerging risk of
virtual societal warfare: social manipulation in a changing information environment, RAND
Corporation, Santa Monica, CA.
Mazarr, MJ , Casey, A , Demus, A , Harold, SW , Matthews, LJ , Beauchamp-Mustafaga, N &
Sladden, J 2019b, Hostile social manipulation: present realities and emerging trends, RAND
Corporation, Santa Monica, CA.
McDonald, P (ed.) 2022, The Routledge Companion to Media Industries, Routledge, New York.
Menkveld, C 2021, ‘Understanding the complexity of intelligence problems’, Intelligence and
National Security, vol. 36, no. 5, pp. 621–641.
Moore, M 2016, Tech giants and civic power, King’s College London Policy Institute, London.
Moore, M & Tambini, D 2021, Regulating Big Tech: policy responses to digital dominance,
Oxford University Press, New York, NY.
Neef, D 2014, Digital exhaust: what everyone should know about big data, digitization and
digitally driven innovation, Dale Neef, Upper Saddle River, NJ.
Newman, AL 2018, Protectors of Privacy: Regulating Personal Data in the Global Economy,
Cornell University Press, Ithaca, NY.
Office of the Director of National Intelligence 2022, Senior Advisory Group Panel on
Commercially Available Information, Office of the Director of National Intelligence, Washington,
DC.
Omand, D & Phythian, M 2018, Principled spying: the ethics of secret intelligence, Oxford
University Press, Oxford.
Omand, D , Bartlett, J & Miller, C 2012, ‘Introducing social media intelligence (SOCMINT)',
Intelligence & National Security, vol. 27, no. 6, pp. 801–823.
Pence, M 2018, ‘Remarks by Vice President Pence on the Administration’s Policy Toward
China’, Speech at the Hudson Institute, Washington, DC, 4 October .
Porche, I , Paul, C , York, M , Serena, CC & Sollinger, JM 2013, Redefining information warfare
boundaries for an army in a wireless world, RAND Corporation, Santa Monica, CA.
Prummer, A 2020, ‘Micro-targeting and polarization’, Journal of Public Economics, vol. 188, art.
104210.
Qiang, X 2019, ‘The Road to Digital Unfreedom: President Xi’s Surveillance State’, Journal of
Democracy, vol. 30, no. 1, pp. 53–67.
Reilly, J , Muyao, L & Robertson, M 2021, ‘China’s Social Credit System: Speculation vs.
Reality’, The Diplomat, March 30 , https://thediplomat.com/2021/03/chinas-social-credit-system-
speculation-vs-reality.
Richmond, B 2019, A day in the life of data, Consumer Policy Research Centre, Melbourne.
Rid, T 2020, Active measures: the secret history of disinformation and political warfare, Farrar,
Straus and Giroux, New York.
Rubinstein, IS , Nojeim, GT & Lee, RD 2017, ‘Systematic Government Access to Private-Sector
Data: A Comparative Analysis’, in FH Cate & JX Dempsey (eds.), Bulk Collection: Systematic
Government Access to Private-Sector Data, Oxford University Press, New York.
Sadowski, J 2019, ‘When data is capital: datafication, accumulation, and extraction’, Big Data &
Society, vol. 6, no. 1.
Sadowski, J 2020, Too smart: how digital capitalism is extracting data, controlling our lives, and
taking over the world, MIT Press, Cambridge, MA.
Shephardson, D. 2022, ‘ByteDance finds employees obtained TikTok user data of two
journalists’, Reuters, 22 December , accessed 21 May 2023 ,
https://www.reuters.com/technology/bytedance-finds-employees-obtained-tiktok-user-data-two-
us-journalists-2022-12-22/.
Søe, SO 2021, ‘A unified account of information, misinformation, and disinformation’, Synthese
(Dordrecht), vol. 198, no. 6, pp. 5929–5949.
Solove, DJ 2011, Nothing to hide: the false tradeoff between privacy and security, Yale
University Press, New Haven, CT.
Technology and Security
2023, Audio podcast, United States Studies Centre, 24 May ,
https://www.ussc.edu.au/analysis/technology-and-security-ts-podcast-intelligence-ai-and-aukus-
with-former-us-principal-deputy-director-of-national-intelligence-susan-gordon.
Tene, O & Polonetsky, J 2013, ‘Big data for all: privacy and user control in the age of analytics’,
Northwestern Journal of Technology and Intellectual Property, vol. 11, no. 5, pp. 239–273.
Trish, B 2018, ‘Big data under Obama and Trump: the data-fueled U.S. presidency’, Politics and
Governance, vol. 6, no. 4, pp. 29–38.
US Joint Chiefs of Staff 2014, Joint Publication 3–13 Information Operations, Joint Chiefs of
Staff, United States Department of Defense.
US Senate Select Committee on Intelligence 2017, ‘ODNI Statement on Declassified
Intelligence Community Assessment of Russian Activities and Intentions in Recent U.S.
Elections’, accessed 20 February 2023 , https://www.intelligence.senate.gov/hearings/open-
hearing-intelligence-communitys-assessment-russian-activities-and-intentions-2016-us.
van Buuren, J 2017, Ethical challenges of data surveillance, Boom, Amsterdam.
van Dijck, J , Poell, T & de Waal, M 2018, The platform society: public values in a connective
world, Oxford University Press, New York.
Verdegem P 2022a, ‘Social media industries and the rise of the platform’, in: P McDonald (ed),
The Routledge companion to media industries. Routledge, New York.
Verdegem, P 2022b, ‘Dismantling AI capitalism: the commons as an alternative to the power
concentration of Big Tech’, AI & Society, pp. 1–11.
Yang, Z 2022, ‘China just announced a new social credit law: here’s what it means’, MIT
Technology Review, 22 November , accessed 22 May 2023 ,
https://www.technologyreview.com/2022/11/22/1063605/china-announced-a-new-social-credit-
law-what-does-it-mean.
Wardle, C 2018, ‘The Need for Smarter Definitions and Practical, Timely Empirical Research on
Information Disorder’, Digital Journalism, vol. 6, no. 8, pp. 951–963.
West, DM 2021, How employers use technology to surveil employees, Brookings, 5 January ,
accessed 2 December 2021 , https://www.brookings.edu/blog/techtank/2021/01/05/how-
employers-use-technology-to-surveil-employees/.
Zeng, J 2016, ‘China’s date with big data: will it strengthen or threaten authoritarian rule?’,
International Affairs, vol. 92, pp. 1443–1462.
Zuboff, S 2019, The age of surveillance capitalism: the fight for a human future at the new
frontier of power, Profile Books, London.
Big Data and Intelligence in Practice
Agrell, W & Treverton, GF 2015, National intelligence and science: beyond the great divide in
analysis and policy, Oxford University Press, Oxford.
Akhgar, B , Saathoff, GB , Arabnia, H , Hill, R , Staniforth, A & Bayerl, PS 2015, Application of
big data for national security: a practitioner’s guide to emerging technologies, Waltham Elsevier,
Amsterdam.
Australian Army 2018, Land warfare doctrine 2–0: intelligence 2018, Australian Army, Canberra.
Australian Security Intelligence Organisation Act 1979
(Cwlth) 1979, accessed 20 May 2023 ,
https://www.legislation.gov.au/Details/C2022C00162.
Baldwin, R 2019, The globotics upheaval: globalisation, robotics and the future of work, Orion,
London.
Bearne, S , Oliker, O , O'Brien, KA & Rathmell, A 2005, National security decision-making
structures and security sector reform, RAND Corporation, Santa Monica, CA.
Betts, RK 2007, Enemies of intelligence: knowledge and power in American national security,
Columbia University Press, New York.
Blazquez, D & Domenech, J 2018, ‘Big data sources and methods for social and economic
analyses’, Technological Forecasting and Social Change, vol. 130, pp. 99–113.
Brantly, AF 2018, ‘When everything becomes intelligence: machine learning and the connected
world’, Intelligence and National Security, vol. 33, no. 4, pp. 562–573.
Burnett, M , Wooding, P & Prekop, P 2005, Sense making in the Australian Defence
Organisation (ADO) intelligence community, DSTO, Edinburgh, SA.
Chesterman, S 2011, One nation under surveillance: a new social contract to defend freedom
without sacrificing liberty, Oxford University Press, New York.
Coyne, J 2014, ‘Strategic intelligence in law enforcement: anticipating transnational organised
crime’, PhD thesis, Queensland University of Technology.
Cruickshank, I 2019, ‘On data science and intelligence analysis’, Military Intelligence,
July–September , pp. 29–32.
Davies, PHJ , Gustafson, K & Rigden, I 2013, ‘The intelligence cycle is dead, long live the
intelligence cycle: rethinking intelligence fundamentals for a new intelligence doctrine’ in M
Phythian (ed.), Understanding the intelligence cycle, Routledge, London, pp. 56–75.
Degaut, M 2015, ‘Spies and policymakers: intelligence in the information age’, Intelligence and
National Security, vol. 31, no. 4, pp. 509–531.
Evans, G 2009, ‘Rethinking military intelligence failure– putting the wheels back on the
intelligence cycle’, Defence Studies, vol. 9, no. 1, pp. 22–46.
Friedman, JA & Zeckhauser, R 2018, ‘Analytic confidence and political decision-making:
theoretical principles and experimental evidence from national security professionals’, Political
Psychology, vol. 39, no. 5, pp. 1069–1087.
George, RZ & Bruce, JB , eds., 2014, Analyzing intelligence: national security practitioners’
perspectives, 2nd edn, Georgetown University Press, Washington, DC.
Gill, P & Phythian, M 2006, Intelligence in an insecure world, Wiley, Hoboken, NJ.
Goldman, J 2018, ‘The ethics of research in intelligence studies: scholarship in an emerging
discipline’, International Journal of Intelligence and CounterIntelligence, vol. 31, no. 2, pp.
342–356.
Gookins, AJ 2008, ‘The role of intelligence in policy making’, SAIS Review, vol. 28, no. 1, pp.
65–73.
Gordon, S 2017, A conversation with Sue Gordon Principal Deputy Director of National
Intelligence, Walter E. Washington Convention Center, Washington, D.C., 7 September.
Hammond-Errey, M 2022, Big data and national security: A guide for Australian policymakers,
Lowy Institute, Sydney.
Hammond-Errey, M 2023, Secrecy, sovereignty and sharing: How data and emerging
technologies are transforming intelligence, United States Studies Centre at the University of
Sydney, Sydney.
Herman, M 2001, Intelligence services in the information age: theory and practice, Frank Cass,
London.
Hershkovitz, S 2019, ‘How tech is transforming the intelligence industry’, Tech Crunch, 10
August , https://techcrunch-com.cdn.ampproject.org/c/s/techcrunch.com/2019/08/10/how-tech-
is-transforming-the-intelligence-industry/amp/.
Heuer, RJ 1999, Psychology of intelligence analysis, Center for the Study of Intelligence,
Central Intelligence Agency, Washington, DC.
Hulnick, AS 2006, ‘What’s wrong with the intelligence cycle’, Intelligence and National Security,
vol. 21, no. 6, pp. 959–979.
Hulnick, AS 2010, ‘The downside of open source intelligence’, International Journal of
Intelligence and CounterIntelligence, vol. 15, no. 4, pp. 565–579.
IGIS (Inspector-General of Intelligence and Security) 2018, 2017–2018 annual report,
Commonwealth of Australia, Canberra.
Joint Chiefs of Staff 2017, Joint and national intelligence support to military operations, Joint
Chiefs of Staff, Washington, DC.
Kent, S 1966, Strategic intelligence for American world policy, Princeton University Press,
Princeton, NJ.
Kitchin, R 2014, The data revolution: big data, open data, data infrastructures & their
consequences, Sage, London.
Laney, D 2001, ‘3D data management: controlling data volume velocity and variety’, META
Delta, 6 February.
Laqueur, W 1993, The uses and limits of intelligence, Transaction Publishers, Piscataway, NJ.
Lim, K 2015, ‘Big data and strategic intelligence’, Intelligence and National Security, vol. 31, no.
4, pp. 619–635.
Lowenthal, MM 2012, Intelligence: from secrets to policy, 5th edn, Sage/CQ Press, Los
Angeles, CA.
Mandel, DR 2015, ‘Accuracy of intelligence forecasts from the intelligence consumer’s
perspective’, Policy Insights from the Behavioral and Brain Sciences, vol. 2, no. 1, pp. 111–120.
Marrin, S 2009, ‘Intelligence analysis and decision-making’, in P Gill , S Marrin & M Phythian
(eds), Intelligence theory: key questions and debates, Routledge, New York, pp. 131–150.
Omand, D 2010, Securing the state, Columbia University Press, New York.
Omand, D 2013, ‘Securing the state: national security and secret intelligence’, Prism: A Journal
of the Center for Complex Operations, vol. 4, no. 3, pp. 14–27.
Omand, D 2020, ‘Reflections on intelligence analysts and policymakers’, International Journal of
Intelligence and CounterIntelligence, vol. 33, no. 3, pp. 471–482.
Omand, D , Bartlett, J & Miller, C 2012, #Intelligence, Demos, London.
Phythian, M (ed.) 2013, Understanding the intelligence cycle, Routledge, Abingdon.
Reinsel, D , Gantz, J & Rydning, J 2018, The digitization of the world from edge to core (IDC
White Paper), IDC, Needham, MA.
Scott, L & Jackson, P 2004, ‘The study of intelligence in theory and practice’, Intelligence and
National Security, vol. 19, no. 2, pp. 139–169.
Stout, M & Warner, M 2018, ‘Intelligence is as intelligence does’, Intelligence and National
Security, vol. 33, no. 4, pp. 517–526.
Symon, PB & Tarapore, A 2015, ‘Defense intelligence analysis in the age of big data’, Joint
Force Quarterly, vol. 79, no. 4, pp. 4–11.
Telecommunications (Interception and Access) Act 1979
(Cwlth) 1979, accessed 20 May 2023 ,
https://www.legislation.gov.au/Details/C2020C00092.
US Government 2009, A tradecraft primer: structured analytic techniques for improving
intelligence analysis, US Government, Washington, DC.
van der Sloot, B , Broeders, D & Schrijvers, E (eds) 2016, Exploring the boundaries of big data,
Netherlands Scientific Council for Government Policy, The Hague.
Van Puyvelde, D , Coulthart, S & Hossain, MS 2017, ‘Beyond the buzzword: big data and
national security decision-making’, International Affairs, vol. 93, no. 6, pp. 1397–1416.
Vandepeer, C 2016, ‘Question-asking in intelligence analysis’, ASPJ Africa & Francophonie, 4th
Quarter, pp. 24–43.
Vandepeer, C 2018, ‘Intelligence and knowledge development: what are the questions
intelligence analysts ask?', Intelligence and National Security, vol. 33, no. 6, pp. 785–803.
Vrist Rønn, K & Høffding, S 2013, ‘The epistemic status of intelligence: an epistemological
contribution to the understanding of intelligence’, Intelligence and National Security, vol. 28, no.
5, pp. 694–716.
Westerlund, M , Isabelle, DA & Leminen, S 2021, ‘The acceptance of digital surveillance in an
age of big data’, Technology Innovation Management Review, vol. 11, no. 3, pp. 32–44.
Zegart, A 2022, Spies, Lies, and Algorithms: The History and Future of American Intelligence,
Princeton University Press, Princeton.
Zuboff, S 2019, The age of surveillance capitalism: the fight for a human future at the new
frontier of power, Profile Books, London.
Data and Privacy
ACCC (Australian Competition and Consumer Commission) 2020, Digital Advertising Services
Inquiry– interim report, ACCC, Canberra.
Aerdts, W & de Valk, G 2018, Privacy from an intelligence perspective, Amsterdam University
Press, Amsterdam.
Aho, B & Duffield, R 2020, ‘Beyond surveillance capitalism: privacy, regulation and big data in
Europe and China’, Economy and Society, vol. 49, no. 2, pp. 187–212.
Bao, R , Chen, Z & Obaidat, MS 2018, ‘Challenges and techniques in big data security and
privacy: a review’, Security and Privacy, vol. 1, no. 4.
Barbaschow, A 2020, ‘Nearly 23 million Aussies have a My Health Record, but only 13 million
are using it ', ZDNet, 8 April , accessed 20 May 2023 , https://www.zdnet.com/article/nearly-23-
million-aussies-have-a-my-health-record-but-only-13-million-are-using-it/.
Becker, M 2019, ‘Privacy in the digital age: comparing and contrasting individual versus social
approaches towards privacy’, Ethics and Information Technology, vol. 21, no. 4, pp. 307–317.
Bok, S 1989, Secrets: on the ethics of concealment and revelation, Vintage Books, New York.
boyd,d & Crawford, K 2012, ‘Critical questions for big data’, Information, Communication &
Society, vol. 15, no. 5, pp. 662–679.
Broeders, D , Schrijvers, E , van der Sloot, B , van Brakel, R , de Hoog, J & Hirsch Ballin, E
2017, ‘Big data and security policies: towards a framework for regulating the phases of analytics
and use of Big Data’, Computer Law & Security Review, vol. 33, no. 3, pp. 309–323.
Casanovas, P , De Koker, L , Mendelson, D & Watts, D 2017, ‘Regulation of big data:
perspectives on strategy, policy, law and privacy’, Health and Technology, vol. 7, no. 4, pp.
335–349.
Chesterman, S 2011, One nation under surveillance: a new social contract to defend freedom
without sacrificing liberty, Oxford University Press, New York.
Cohen, JE 2017, ‘Surveillance vs. privacy: effects and implications’, in D Gray & SE Henderson
(eds), The Cambridge handbook of surveillance law, Cambridge University Press, New York,
pp. 455–469.
Consumer Policy Research Centre 2020, CPRC 2020 data and technology consumer survey,
Consumer Policy Research Centre, Melbourne.
Culnane, C , Rubinstein, B & Teague, V 2016, ‘Crime and Privacy in Open Data: Testing the
strength of methods used for protecting privacy in open data shouldn’t be a crime’, Pursuit,
accessed 17 April 2023 , https://pursuit.unimelb.edu.au/articles/crime-and-privacy-in-open-data.
de Montjoye, YA , Hidalgo, CA , Verleysen, M & Blondel, VD 2013, ‘Unique in the crowd: the
privacy bounds of human mobility’, Scientific Reports, vol. 3, art. 1376.
de Montjoye, YA , Radaelli, L , Singh, VK & Pentland, AS 2015, ‘Unique in the shopping mall:
on the reidentifiability of credit card metadata’, Science, vol. 347, pp. 536–539.
Edward, W 2020, ‘The Uberisation of work: the challenge of regulating platform capitalism. A
commentary’, International Review of Applied Economics, vol. 34, no. 4, pp. 512–521.
Etzioni, A 2018, ‘A privacy doctrine for the cyber age’, in B van der Sloot & A de Groot (eds),
The handbook of privacy studies: an interdisciplinary introduction, Amsterdam University Press,
Amsterdam, pp. 295–298.
Farzanehfar, A , Houssiau, F , & de Montjoye, Y-A 2021, ‘The risk of re-identification remains
high even in country-scale location datasets’, Patterns (New York, N.Y.), vol. 2, no. 3, pp.
100204–100204.
Froomkin, M 2000, ‘The death of privacy?’, Stanford Law Review vol. 52, no. 5, pp. 1461–1543.
Gavison, R 1980, ‘Privacy and the limits of law’, Yale Law Journal, vol. 89, no. 3, pp. 421–471.
Houser, KA & Sanders, D 2017, ‘The use of big data analytics by the IRS: efficient solutions or
the end of privacy as we know it?', Vanderbilt Journal of Entertainment & Technology Law, vol.
19, no. 4, pp. 817–872.
IGIS (Inspector-General of Intelligence and Security) n.d., Frequently asked questions, IGIS,
https://www.igis.gov.au/FAQ.
Intelligence Services Act 2001
(Cwlth) 2001, accessed 25 May 2023 ,
https://www.legislation.gov.au/Details/C2022C00294.
Jin, GZ & Wagman, L 2021, ‘Big data at the crossroads of antitrust and consumer protection’,
Information Economics and Policy, vol. 54.
Krasnow Waterman, K. & Bruening, PJ 2014, ‘Big Data analytics: risks and responsibilities’,
International Data Privacy Law, vol. 4, no. 2, pp. 89–95.
Lyon, D 2015, ‘The Snowden stakes: challenges for understanding surveillance today’,
Surveillance & Society, vol. 13, no. 2, pp. 139–152.
McCauley, D 2019, ‘Australians shun My Health Record with only 9 per cent ever logging in’,
The Sydney Morning Herald, 22 December , accessed 6 June 2023 ,
https://www.smh.com.au/politics/federal/australians-shun-my-health-record-with-only-9-per-
cent-ever-logging-in-20191220-p53lz0.html.
Nissenbaum, HF 2010, Privacy in context: technology, policy, and the integrity of social life,
Stanford Law Books, Stanford, CA.
Office of the Australian Information Commissioner 2019, ‘Australian Privacy Principle 2–
Anonymity and pseudonymity’, APP Guidelines, accessed 5 June 2023 ,
https://www.oaic.gov.au/__data/assets/pdf_file/0005/1202/app-guidelines-chapter-2-v1.1.pdf.
Omand, D 2010, Securing the state, Columbia University Press, New York.
ONI (Office of National Intelligence) n.d., Legislation, accountability and privacy, accessed 7
December 2021 , https://www.oni.gov.au/legislation-accountability-privacy.
Pang, PC-I , McKay, D , Chang, S , Chen, Q , Zhang, X & Cui, L 2020, ‘Privacy concerns of the
Australian My Health Record: implications for other large-scale opt-out personal health records’,
Information Processing & Management, vol. 57, no. 6.
Peterson, M & McDonagh, M 2019, ‘Data protection in an era of big data: the challenges posed
by big personal data’, Monash University Law Review, vol. 44, no. 1, pp. 1–31.
Pulver, A & Medina, RM 2017, ‘A review of security and privacy concerns in digital intelligence
collection’, Intelligence and National Security, vol. 33, no. 2, pp. 241–256.
Richards, NM & King, JH 2016, ‘Big data and the future for privacy’, in FX Olleros & M Zhegu
(eds), Research handbook on digital transformations, Edward Elgar, Cheltenham, UK, pp.
272–290.
Richardson, D 2020, Comprehensive Review of the Legal Framework of the National
Intelligence Community, Commonwealth of Australia, Canberra.
Rocher, L , Hendrickx, JM & de Montjoye, YA 2019, ‘Estimating the success of re-identifications
in incomplete datasets using generative models’, Nature Communications, vol. 10, no. 1, art.
3069.
Rosenblat, A 2018, Uberland, University of California Press, Berkeley, CA.
Solove, DJ 2008, Understanding privacy, Harvard University Press, Cambridge, MA.
Solove, DJ 2013, ‘Introduction: privacy self-management and the consent dilemma’, Harvard
Law Review, Vol. 126, No. 7 ( May ), pp. 1880–1903, https://harvardlawreview.org/print/vol-
126/introduction-privacy-self-management-and-the-consent-dilemma.
Strang, KD & Sun, Z 2017, ‘Big data paradigm: what is the status of privacy and security?',
Annals of Data Science, vol. 4, no. 1, pp. 1–17.
Sweeney, L 2015, ‘Only You, Your Doctor, and Many Others May Know’, Technology Science,
28 September , accessed 17 April 2023 , https://techscience.org/a/2015092903/.
Tene, O & Polonetsky, J 2013, ‘Big data for all: privacy and user control in the age of analytics’,
Northwestern Journal of Technology and Intellectual Property, vol. 11, no. 5, pp. 239–273.
The Privacy Act 1988
(Cwlth) 1998, accessed 22 May 2023 ,
https://www.legislation.gov.au/Details/C2022C00361.
Tyler, TR 2006, ‘Psychological perspectives on legitimacy and legitimation’, Annual Review of
Psychology, vol. 57, pp. 375–400.
Vimalachandran, P , Liu, H , Lin, Y , Ji, K , Wang, H & Zhang, Y 2020, ‘Improving accessibility of
the Australian My Health Records while preserving privacy and security of the system’, Health
Information Science and Systems, vol. 8, no. 1, p. 31.
Wolf, G & Mendelson, D 2019, ‘The My Health Record system: potential to undermine the
paradigm of patient confidentiality?', UNSW Law Journal, vol. 42, no. 2, pp. 619–651.
Wyman, K 2017, ‘Taxi regulation in the age of Uber’, New York University Journal of Legislation
and Public Policy, vol. 2, pp. 1–100.
Yu, S 2016, ‘Big privacy: challenges and opportunities of privacy study in the age of big data’,
IEEE Access, vol. 4, pp. 2751–2763.
Ethics and Bias
Angwin, J , Larson, J , Mattu, S & Kirchner, L 2016, ‘Machine bias: there’s software used across
the country to predict future criminals. And it’s biased against blacks’, ProPublica, 23 May ,
accessed 2 August 2017 , https://www.propublica.org/article/machine-bias-risk-assessments-in-
criminal-sentencing.
Bar-Joseph, U 2010, ‘The professional ethics of intelligence analysis’, International Journal of
Intelligence and CounterIntelligence, vol. 24, no. 1, pp. 22–43.
Beard, M & Longstaff, S 2018, Principles for good technology, Ethics Centre, Sydney.
Bellaby, R 2012, ‘What’s the harm? The ethics of intelligence collection’, Intelligence and
National Security, vol. 27, no. 1, pp. 93–117.
Born, H & Wills, A 2010, ‘Beyond the oxymoron: exploring ethics through the intelligence cycle’,
in J Goldman (ed.), Ethics of spying: a reader for the intelligence professional, Scarecrow
Press, Portland, OR, pp. 34–56.
Burton, JW , Stein, MK & Jensen, TB 2019, ‘A systematic review of algorithm aversion in
augmented decision making’, Journal of Behavioral Decision Making, vol. 33, no. 2, pp.
220–239.
Dalins, J , Tyshetskiy, Y , Wilson, C , Carman, MJ & Boudry, D 2018, ‘Laying foundations for
effective machine learning in law enforcement. Majura– A labelling schema for child
exploitation materials’, Digital Investigation, vol. 26, pp. 40–54.
Diderichsen, A & Vrist Rønn, K 2016, ‘Intelligence by consent: on the inadequacy of just war
theory as a framework for intelligence ethics’, Intelligence and National Security, vol. 32, no. 4,
pp. 479–493.
Erskine, T 2001, ‘Assigning responsibilities to institutional moral agents: the case of states and
quasi-states’, Ethics and International Affairs, vol. 15, no. 2, pp. 67–85.
Erskine, T 2004, ‘“As rays of light to the human soul”? Moral agents and intelligence gathering’,
Intelligence and National Security, vol. 19, no. 2, pp. 359–381.
Floridi, L & Taddeo, M 2016, ‘What is data ethics?’, Philosophical Transactions: Mathematical,
Physical and Engineering Sciences, vol. 374, no. 2083.
Goldman, J 2018, ‘The ethics of research in intelligence studies: scholarship in an emerging
discipline’, International Journal of Intelligence and CounterIntelligence, vol. 31, no. 2, pp.
342–356.
Herman, M 2004, ‘Ethics and intelligence after September 2001’, Intelligence and National
Security, vol. 19, no. 2, pp. 342–358.
Heuer, RJ 1999, Psychology of intelligence analysis, Center for the Study of Intelligence,
Central Intelligence Agency, Washington, DC.
Heuer, RJ & Pherson, R 2015, Structured analytic techniques for intelligence analysis, 2nd edn,
CQ Press, Thousand Oaks, CA.
Hulnick, AS & Mattausch, DW 1989, ‘Ethics and morality in United States secret intelligence’,
Harvard Law & Public Policy Review, vol. 12, no. 2, pp. 509–522.
Jones, JM 2009, Is ethical intelligence a contradiction in terms?, Scarecrow Press, Lanham,
MD.
Kitchin, R 2014, ‘Big data, new epistemologies and paradigm shifts’, Big Data & Society, vol. 1,
no. 1.
Livermore, D 2018, ‘Balancing effectiveness and ethics in future autonomous weapons’, Small
Wars Journal, 20 September , accessed 26 May 2023 ,
https://smallwarsjournal.com/jrnl/art/balancing-effectiveness-and-ethics-future-autonomous-
weapons.
Mandel, DR & Tetlock, PE 2018, ‘Correcting judgment correctives in national security
intelligence’, Frontier Psychology, vol. 9, p. 2640.
McConnell, T 2022, ‘Moral Dilemmas’, in EN Zalta & U Nodelman (eds.), The Stanford
Encyclopedia of Philosophy, Stanford University, accessed 10 June 2023 ,
https://plato.stanford.edu/archives/fall2022/entries/moral-dilemmas/.
Mills, K 2019, Big data for qualitative research, Routledge, Abingdon, Oxon.
Omand, D & Phythian, M 2018, Principled spying: the ethics of secret intelligence, Oxford
University Press, Oxford.
Petrauskaitė, A & Šaltenis, L 2018, ‘The interaction between intelligence operations and ethics
in the context of national security: a theoretical review of the problem’, Lithuanian Annual
Strategic Review, vol. 16, no. 1, pp. 401–424.
Psychology Today 2021, Bias, Psychology Today Australia, accessed 2 December 2021 ,
https://www.psychologytoday.com/au/basics/bias.
Ribeiro, MT , Singh, S & Guestrin, C 2016, ‘Why should I trust you?’ [conference presentation],
22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San
Francisco, 13–17 August.
Richards, NM & King, JH 2013, ‘Three paradoxes of big data’, Stanford Law Review Online, vol.
41, no. 3, pp. 41–46.
Saltz, JS & Dewar, N 2019, ‘Data science ethical considerations: a systematic literature review
and proposed project framework’, Ethics and Information Technology, vol. 21, no. 3, pp.
197–208.
Schwartz, R , Vassilev, A , Greene, K , Perine, L , Burt, A & Hall, P 2022, ‘Towards a Standard
for Identifying and Managing Bias in Artificial Intelligence’, NIST Special Publication 1270,
National Institute of Standards and Technology, US Department of Commerce, United States.
Shelton, AM 2011, ‘Framing the oxymoron: a new paradigm for intelligence ethics’, Intelligence
and National Security, vol. 26, no. 1, pp. 23–45.
Taddeo, M & Floridi, L 2018, ‘Regulate artificial intelligence to avert cyber arms race’, Nature,
vol. 556.
Tversky, A & Kahneman, D 1974, ‘Judgment under uncertainty: heuristics and biases’, Science,
New Series, vol. 185, pp. 1124–1131.
Vrist Rønn, K 2016, ‘Intelligence ethics: a critical review and future perspectives’, International
Journal of Intelligence and CounterIntelligence, vol. 29, no. 4, pp. 760–784.
Wells, BJ , Kattan, MW , Nowacki, AS , & Chagin, K 2013, ‘Strategies for Handling Missing Data
in Electronic Health Record Derived Data’, EGEMS (Washington, DC), vol. 1, no. 3, pp.
1035–1035.
Whitesmith, M 2020, ‘Experimental research in reducing the risk of cognitive bias in intelligence
analysis’, International Journal of Intelligence and Counter Intelligence, vol. 33, no. 2, pp.
380–405.
Trust, Transparency and Legitimacy
ASIO 2023a, ‘Speeches and statements’, Australian Security Intelligence Organisation,
accessed 25 May 2023 , https://www.asio.gov.au/resources/speeches-and-statements.
ASIO 2023b, ‘Think before you link’, Australian Security Intelligence Organisation, accessed 25
May 2023 , https://www.asio.gov.au/resources/TBYL.
Australia in the World
2019, Audio podcast, Australian Institute of International Affairs, 24 July ,
accessed 25 May 2023 , https://www.internationalaffairs.org.au/australianoutlook/ep-24-
director-general-asis-first-ever-interview/.
Barbalet, J 2009, ‘A characterization of trust, and its consequences’, Theory and Society, vol.
38, no. 4, pp. 367–382.
Beetham, D 2013, ‘Revisiting legitimacy, twenty years on’, in J Tankebe & A Liebling (eds),
Legitimacy and criminal justice, Oxford University Press, Oxford, pp. 19–36.
Bennett Moses, L & de Koker, L 2017, ‘Open secrets: balancing operational secrecy and
transparency in the collection and use of data by national security and law enforcement
agencies’, Melbourne University Law Review, vol. 41, no. 2, pp. 530–570.
Bottoms, A & Tankebe, J 2012, ‘Beyond Procedural Justice: A Dialogic Approach to Legitimacy
in Criminal Justice’, The Journal of Criminal Law & Criminology, vol. 102, no. 1, pp. 119–170.
Bouckaert, G & Van de Walle, S 2001, ‘Trust building networks– how the government meets
citizen in the post-bureaucratic era: citizen directed government through quality, satisfaction and
trust in government’ [conference presentation], EGPA Annual Conference, Vaasa, Finland, 5–8
September.
Chesterman, S 2011, One nation under surveillance: a new social contract to defend freedom
without sacrificing liberty, Oxford University Press, New York.
Department of the Prime Minister and Cabinet 2017, 2017 Independent Intelligence Review,
Commonwealth of Australia, Canberra.
Diamond, LJ 1990, ‘Three paradoxes of democracy’, Journal of Democracy, vol. 1, no. 3, pp.
48–60.
Diderichsen, A & Vrist Rønn, K 2016, ‘Intelligence by consent: on the inadequacy of just war
theory as a framework for intelligence ethics’, Intelligence and National Security, vol. 32, no. 4,
pp. 479–493.
Dobell, G 2020, ‘The ASIS Interviews’, Australian Strategic Policy Institute, 26 October ,
accessed 26 May 2023 , https://www.aspi.org.au/report/asis-interviews.
Edwards, P 2020, ‘Australia’s intelligence agencies send mixed signals on openness and
transparency’, The Strategist, 12 November , accessed 2 December 2021 ,
https://www.aspistrategist.org.au/australias-intelligence-agencies-send-mixed-signals-on-
openness-and-transparency/.
Encyclopædia Britannica 2019, Social contract, Encyclopædia Britannica, accessed 2
December 2021 , https://www.britannica.com/topic/social-contract.
Fukuyama, F 1995, Trust: the social virtues and the creation of prosperity, Free Press, New
York.
Gough, JW 1978, The social contract: a critical study of its development, Greenwood Press,
Westport, CT.
Hammond-Errey, M 2021, ‘Securing the legal foundation for Australia’s intelligence agencies’,
The Lowy Interpreter, 2 February , accessed 2 December 2021 ,
https://www.lowyinstitute.org/the-interpreter/securing-legal-foundation-australia-s-intelligence-
agencies.
Hillebrand, C & Hughes, RG 2017, ‘The Quest for a Theory of Intelligence’, in R Dover , H Dylan
& MS Goodman (eds.), The Palgrave Handbook of Security, Risk and Intelligence, Palgrave
Macmillan UK, London.
IGIS (Inspector-General of Intelligence and Security) n.d., Public engagement, IGIS, accessed
23 May 2023 , https://www.igis.gov.au/what-we-do/public-engagement.
Institute for Local Government 2012, What is public engagement and why do it?, Institute for
Local Government, Sacramento, CA.
Intelligence Services Act 2001
(Cwlth) 2001, accessed 22 March 2022 ,
https://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/Bills_Search_Results/Result?
bId=r1350.
Irvine, D 2010, ‘Limits of sovereignty and constraints of multilateralism– implications for
domestic security’ [address], National Security College Conference, Canberra, 27 May.
Jackson, J 2018, Norms, normativity and the legitimacy of justice institutions: international
perspectives, London School of Economics and Political Science Law Department, London.
Jackson, J & Gau, JM 2016, Carving up concepts? Differentiating between trust and legitimacy
in public attitudes towards legal authority, Springer, New York.
Lentz, SA & Chaires, RH 2007, ‘The invention of Peel’s principles: A study of policing “textbook”
history’, Journal of Criminal Justice, vol. 35, no. 1, pp. 69–79.
Levi, M & Stoker, L 2000, ‘Political trust and trustworthiness’, Annual Review Political Science,
vol. 3, pp. 475–507.
Loader, I 2014, ‘In search of civic policing: recasting the “Peelian” principles’, Criminal Law and
Philosophy, vol. 10, no. 3, pp. 427–440.
Lomas, DWB & Ward, S 2022, ‘Public Perceptions of UK Intelligence: Still in the Dark?’, The
RUSI Journal, vol. 167, no. 2, pp. 10–22.
Luhmann, N 2017, Trust and power, Polity Press, Cambridge.
Meijer, A 2014, ‘Transparency’, in M Bovens , RE Goodin & T Schillemans (eds), The Oxford
handbook of public accountability, Oxford University Press, Oxford, UK, pp. 507–524.
Mesko, G & Tankebe, J 2015, Trust and legitimacy in criminal justice: European perspectives,
Springer International Publishing, Cham.
Morgner, C 2018, ‘Trust and society: suggestions for further development of Niklas Luhmann’s
theory of trust’, Canadian Review of Sociology, vol. 55, no. 2, pp. 232–256.
OECD (Organisation for Economic Co-operation and Development) 2013, Trust in government,
policy effectiveness and the governance agenda, OECD, Paris.
Omand, D 2010, Securing the state, Columbia University Press, New York.
Ping Li, P 2012, ‘When trust matters the most: the imperatives for contextualising trust
research’, Journal of Trust Research, vol. 2, no. 2, pp. 101–106.
Radio National Breakfast
2019, radio broadcast, Australian Broadcasting Corporation Radio
National, 1 April , Interview with ASD employee Claire [Name changed].
Robinson, SE , Stoutenborough, JW & Vedlitz, A 2017, Understanding trust in government:
environmental sustainability, fracking, and public opinion in American politics, Routledge, New
York.
Rousseau, DM , Sitkin, SB ; Burt, RS & Camerer, C 1998, ‘Not so different after all: a cross-
discipline view of trust’, Academy of Management Review, vol. 23 no. 3, pp. 393–404.
Schafer, JA 2013, ‘The role of trust and transparency in the pursuit of procedural and
organisational justice’, Journal of Policing, Intelligence and Counter Terrorism, vol. 8, no. 2, pp.
131–143.
Sheptycki, J 2009, ‘Policing, intelligence theory and the new human security paradigm’, in P Gill
, S Marrin & M Phythian (eds), Intelligence theory: key questions and debates, Routledge, New
York, pp. 166–185.
Slick, S , Busby, J & Oswal, A 2021, ‘Public Attitudes on US Intelligence 2020 Final Trump-Era
Survey Confirms Broad Popular Support, Reveals Opportunities for Greater Transparency’, The
Chicago Council of Foreign Affairs, May , accessed 20 May 2023 ,
https://globalaffairs.org/research/public-opinion-survey/public-attitudes-us-intelligence-2020.
Treverton, GF 2009, Intelligence for an age of terror, Cambridge University Press, Cambridge.
Treverton, GF , Wollman, M , Wilke, E , & Lai, D 2011, Moving toward the future of policing,
RAND Corporation, Santa Monica, CA.
Tyler, TR 2006, ‘Psychological perspectives on legitimacy and legitimation’, Annual Review of
Psychology, vol. 57, pp. 375–400.
Unsworth, K 2014, ‘Questioning trust in the era of big (and small) data’, Bulletin of the
Association for Information Science and Technology, vol. 41, pp. 12–14.
Unsworth, K 2016, ‘The social contract and big data’, Journal of Information Ethics, vol. 25, pp.
83–97.
Walsh, PF 2011, Intelligence and intelligence analysis, Routledge, London.
Weatherford, MS 1992, ‘Measuring political legitimacy’, American Political Science Review, vol.
86, no. 1, pp. 149–166.
Wraight, CD 2009, Rousseau’s ‘The social contract’: a reader’s guide, Continuum, London.
YouGov 2021, ‘Trust in UK intelligence and security agencies’, The YouGov Study on Spying,
30 September , accessed 20 May 2023 , https://yougov.co.uk/topics/politics/articles-
reports/2021/09/30/part-four-trust-uk-intelligence-and-security-agenc.
Conclusion
Aho, B & Duffield, R 2020, ‘Beyond surveillance capitalism: privacy, regulation and big data in
Europe and China’, Economy and Society, vol. 49, no. 2, pp. 187–212.
Bao, R , Chen, Z & Obaidat, MS 2018, ‘Challenges and techniques in big data security and
privacy: a review’, Security and Privacy, vol. 1, no. 4.
Bar-Joseph, U 2010, ‘The professional ethics of intelligence analysis’, International Journal of
Intelligence and CounterIntelligence, vol. 24, no. 1, pp. 22–43.
boyd,d & Crawford, K 2012, ‘Critical questions for big data’, Information, Communication &
Society, vol. 15, no. 5, pp. 662–679.
Casanovas, P , De Koker, L , Mendelson, D & Watts, D 2017, ‘Regulation of big data:
perspectives on strategy, policy, law and privacy’, Health and Technology, vol. 7, no. 4, pp.
335–349.
Cohen, JE 2017, ‘Surveillance vs. privacy: effects and implications’, in D Gray & SE Henderson
(eds), The Cambridge handbook of surveillance law, Cambridge University Press, New York,
pp. 455–469.
Department of the Prime Minister and Cabinet 2017, 2017 Independent Intelligence Review,
Commonwealth of Australia, Canberra.
Edward, W 2020, ‘The Uberisation of work: the challenge of regulating platform capitalism. A
commentary’, International Review of Applied Economics, vol. 34, no. 4, pp. 512–521.
Etzioni, A 2018, ‘A privacy doctrine for the cyber age’, in B van der Sloot & A de Groot (eds),
The handbook of privacy studies: an interdisciplinary introduction, Amsterdam University Press,
Amsterdam, pp. 295–298.
Floridi, L & Taddeo, M 2016, ‘What is data ethics?’, Philosophical Transactions: Mathematical,
Physical and Engineering Sciences, vol. 374, no. 2083.
Frisk, R & Johansson, L 2021, ‘From samurais to borgs: reflections on the importance of
intelligence ethics’, International Journal of Intelligence and CounterIntelligence, vol. 34, no. 1,
pp. 70–96.
Hammond-Errey, M 2019, ‘Understanding and assessing information influence and foreign
interference’, Journal of Information Warfare, vol. 18, pp. 1–22.
Hammond-Errey, M 2023, Secrecy, sovereignty and sharing: How data and emerging
technologies are transforming intelligence, United States Studies Centre at the University of
Sydney, Sydney.
Herman, M 2004, ‘Ethics and intelligence after September 2001’, Intelligence and National
Security, vol. 19, no. 2, pp. 342–358.
Hershkovitz, S 2019, ‘How tech is transforming the intelligence industry’, Tech Crunch, 10
August , https://techcrunch-com.cdn.ampproject.org/c/s/techcrunch.com/2019/08/10/how-tech-
is-transforming-the-intelligence-industry/amp/.
Hughes, RG , Jackson, P & Scott, L (eds) 2008, Exploring intelligence archives: enquiries into
the secret state, Routledge, London.
Kent, S 1966, Strategic intelligence for American world policy, Princeton University Press,
Princeton, NJ.
Lehdonvirta, V 2023, ‘Behind AI, a massive infrastructure is changing geopolitics’, Oxford
Internet Institute, 17 March , accessed 10 April 2023 , https://www.oii.ox.ac.uk/news-
events/news/behind-ai-a-massive-infrastructure-is-changing-geopolitics/.
Manyika, J , Chui, M , Brown, B , Bughin, J , Dobbs, R , Roxburgh, C & Byers, AH 2011, Big
data: the next frontier for innovation, competition, and productivity, McKinsey Global Institute,
New York.
Mayer-Schonberger, V & Cukier, K 2014, Big data: a revolution that will transform how we live,
work, and think, Mariner Books, Houghton Mifflin Harcourt, Boston, MA.
McDonald, N & Forte, A 2020, ‘The politics of privacy theories: moving from norms to
vulnerabilities’ [conference presentation] Proceedings of the 2020 Conference on Human
Factors in Computing Systems. Honolulu, HI, USA 25–30 April .
Moore, M 2016, Tech giants and civic power, King’s College London Policy Institute, London.
Neef, D 2014, Digital exhaust: what everyone should know about big data, digitization and
digitally driven innovation, Dale Neef, Upper Saddle River, NJ.
Nissenbaum, H 2010, Privacy in context: technology, policy, and the integrity of social life,
Stanford Law Books, Stanford, CA.
Nissenbaum, H 2018, ‘Respecting context to protect privacy: why meaning matters’, Science
and Engineering Ethics, vol. 24, pp. 831–852.
Omand, D 2010, Securing the state, Columbia University Press, New York.
Omand, D 2020, ‘Reflections on intelligence analysts and policymakers’, International Journal of
Intelligence and CounterIntelligence, vol. 33, no. 3, pp. 471–482.
Omand, D & Phythian, M 2018, Principled spying: the ethics of secret intelligence, Oxford
University Press, Oxford.
Richardson, D 2020, Comprehensive Review of the Legal Framework of the National
Intelligence Community, Commonwealth of Australia, Canberra.
Richmond, B 2019, A day in the life of data, Consumer Policy Research Centre, Melbourne.
Rid, T 2020, Active measures: the secret history of disinformation and political warfare, Farrar,
Straus and Giroux, New York.
Savage, A 2016, Leaks, whistleblowing and the public interest the law of unauthorised
disclosures, Edward Elgar Publishing, Northampton, MA.
Scharre, P 2019, ‘Killer apps: the real dangers of an AI arms race’, Foreign Affairs, vol. 98, no.
3, pp. 135–144.
Sloot, BVD & Groot, AD 2018, The handbook of privacy studies: an interdisciplinary
introduction, Amsterdam University Press, Amsterdam.
Strang, KD & Sun, Z 2017, ‘Big data paradigm: what is the status of privacy and security?’,
Annals of Data Science, vol. 4, no. 1, pp. 1–17.
Taddeo, M & Floridi, L 2018, ‘Regulate artificial intelligence to avert cyber arms race’, Nature,
vol. 556.
van Dijck, J , Poell, T & de Waal, M 2018, The platform society: public values in a connective
world, Oxford University Press, New York.
Van Puyvelde, D 2018, ‘Qualitative research interviews and the study of national security
intelligence’, International Studies Perspectives, vol. 19, no. 4, pp. 375–391.
Vandepeer, C 2018, ‘Intelligence and knowledge development: what are the questions
intelligence analysts ask?’, Intelligence and National Security, vol. 33, no. 6, pp. 785–803.
Véliz, C 2021, ‘Privacy and digital ethics after the pandemic’, Nature Electronics, vol. 4, no. 1,
pp. 10–11.
Verdegem, P 2022, ‘Dismantling AI capitalism: the commons as an alternative to the power
concentration of Big Tech’, AI & Society, pp. 1–11.
Vimalachandran, P , Liu, H , Lin, Y , Ji, K , Wang, H & Zhang, Y 2020, ‘Improving accessibility of
the Australian My Health Records while preserving privacy and security of the system’, Health
Information Science and Systems, vol. 8, no. 1, p. 31.
Vrist Rønn, K 2016, ‘Intelligence ethics: a critical review and future perspectives’, International
Journal of Intelligence and CounterIntelligence, vol. 29, no. 4, pp. 760–784.
Walsh, PF 2011, Intelligence and intelligence analysis, Routledge, London.
Watts, T 2020, Democracy and the authoritarian challenge, Lowy Institute, Canberra,
https://myaccount.lowyinstitute.org/events/2020-npc-tim-watts.
Whittaker, M 2021, ‘The steep cost of capture’, Interactions, XXVIII, no. 6, pp. 50–56.
Zuboff, S 2019, The age of surveillance capitalism: the fight for a human future at the new
frontier of power, Profile Books, London.
Chapter
Full-text available
Era transformasi digital membuat kehadiran bisnis digital bukan lagi sekadar pilihan, melainkan menjadi sebuah keharusan bagi entitas bisnis untuk tetap tampil kompetitif. Perkembangan teknologi informasi, perubahan perilaku konsumen, serta meningkatnya penggunaan internet dan perangkat mobile, telah menciptakan lanskap bisnis yang berbeda dibandingkan dengan beberapa dekade yang lalu. Bisnis Digital memungkinkan setiap entitas bisnis untuk memperluas jangkauan pasar, meningkatkan efisiensi operasional, serta memperkuat jejaring dengan pelanggan yang lebih responsif. Adaptasi terhadap teknologi digital memungkinkan optimalisasi sumber daya melalui automasi, integrasi data, serta analisis berbasis kecerdasan buatan dan big data. Dampaknya memberikan entitas bisnis kemampuan untuk membuat keputusan yang lebih akurat dan cepat, yang pada akhirnya berkontribusi pada keunggulan kompetitif. Di sisi lain, perilaku konsumen yang semakin bergantung pada platform digital untuk mencari informasi, melakukan transaksi, dan berinteraksi dengan merek, mendorong pentingnya keberadaan Bisnis Digital. Dengan semakin meningkatnya persaingan global, entitas bisnis yang gagal mengadopsi strategi Bisnis Digital, berisiko akan tertinggal. Oleh karena itu, transformasi digital tidak hanya mendukung inovasi dan efisiensi, tetapi juga memastikan keberlanjutan bisnis di mendatang. Melalui Buku Pengantar Bisnis Digital: Konsep dan Implementasi, para pembaca dan praktisi akan diajak untuk menjawab berbagai permasalahan yang dihadapi terkait Bisnis Digital. Dengan demikian, buku ini bisa menjadi pedoman bagi pelaku bisnis dan pembelajar yang ingin mendalami konsep dan implementasi dari praktik Bisnis Digital. Buku ini dihadirkan sebagai acuan bagi para akademisi, mahasiswa dan praktisi yang ingin memahami konsep dan implementasi Bisnis Digital secara komprehensif. Buku ini juga menyajikan berbagai konseptual, implementasi dan contoh tentang perkembangan Bisnis Digital. Dengan terbitnya buku ini diharapkan dapat memberikan pemahaman kepada para pembaca dan para praktisi perihal perkembangan Bisnis Digital dalam konteks ekonomi digital. Sementara buku ini terdiri dari beberapa bagian yang meliputi: Bab 1. Konsep Dasar Bisnis Digital Bab 2. Internet of Things dalam Ekosistem Bisnis Digital Bab 3. Strategi Pemasaran Digital Bab 4. Social Media Marketing Bab 5. Ekosistem Financial Technology Bab 6. Tata Kelola Komunikasi Bisnis Digital Bab 7. Copywriting dan Konten Kreatif Bab 8. Email Marketing, Website dan Search Engine Optimization Bab 9. Inteligensi Bisnis dalam Ekosistem Bisnis Bab 10. E-commerce dan Social Commerce Bab 11. Online Advertising dan Mobile Advertising Bab 12. Perilaku Konsumen Digital Bab 13. Strategi Riset Pasar dalam Ekonomi Digital Bab 14. Perkembangan UMKM Digital dan Startup Bab 15. Artificial Intelligence dan Ekonomi Digital Bab 16. Blockchain dan Bisnis Digital Bab 17. Social Engineering dan Fraud Digital Bab 18. Pemanfaatan Big Data dalam Bisnis Digital dan Intelegensi Bisnis
Article
Full-text available
Стаття присвячена значенню міжнародного трансферу технологій у зміцненні національної безпеки в умовах зростання глобальних загроз, таких як кіберзлочинність, енергетичні кризи та військові конфлікти. Проаналізовано потребу країн у новітніх технологіях для підвищення обороноздатності та стабільності критичної інфраструктури. Розглянуто ключові міжнародні програми з метою оцінки їхнього впливу на безпеку, кіберстійкість та енергетичну незалежність країн-учасників. Визначено актуальні виклики та можливості трансферу технологій для забезпечення національної безпеки, зокрема у контексті міждержавної співпраці. Окреслено перспективи подальших досліджень для адаптації інноваційних моделей взаємодії, що враховують специфічні потреби окремих країн і регіонів.
Article
Full-text available
Over the last two decades, the emerging Chinese Party-state has used commercial ties with North American and European providers of surveillance technologies to grow national prowess of public security, fostering a transnational state-corporate symbiosis. The exports of surveillance technologies from the Global North to China started in the late 1970s, and now Chinese technology companies are competing with and replacing those suppliers in the globalized neoliberal market. This research explores the two-way dynamic of China’s state and private surveillance capacity underscored by international companies’ profit-seeking behaviors and domestic technological and economic growth. Four case studies of companies from Canada, China, and the US are used to highlight the changing dynamics in the global circulation of surveillance technologies. Particular attention is paid to the cyclical nature of such technologies through which unresolved issues of global governance continue to emerge and, accordingly, support the growth of technology-powered authoritarianism worldwide.
Article
Full-text available
Data science and artificial intelligence are considered to be major forces in dealing with the challenges of the current Information Age. This study examines how Intelligence Studies journals have been dealing with the implications of the Information Age, by reviewing 89 contributions to 12 academic and professional intelligence journals from 2010 to 2021. This paper results in a comprehensive overview of how they cover the intersection of Information Age implications and core intelligence aspects, identifies gaps in the literature, and aims to set out direction towards building a cumulative body of knowledge on dealing with data in the Information Age.
Article
Full-text available
This article discusses the political economy of AI capitalism. It considers AI as a General Purpose Technology (GPT) and argues we need to investigate the power concentration of Big Tech. AI capitalism is characterised by the commodification of data, data extraction and a concentration in hiring of AI talent and compute capacity. This is behind Big Tech’s unstoppable drive for growth, which leads to monopolisation and enclosure under the winner takes all principle. If we consider AI as a GPT—technologies that alter society’s economic and social structures—we need to come up with alternatives in terms of ownership and governance. The commons is proposed as an alternative for thinking about how to organise AI development and how to distribute the value that can be derived from it. Using the commons framework is also a way of giving society a more prominent role in the debate about what we expect from AI and how we should approach it.
Research
Full-text available
Big Data and National Security: A guide for Australian Policymakers Big data has created a complex new information and infrastructure landscape. Big tech companies that have capitalised on its three core features — data abundance, digital connectivity, and ubiquitous technology — are the new oligarchies and are increasingly controlling the capabilities essential for a functioning society. Big data has profound impacts on society. It enables everything from access to knowledge and global communication, to delivery of services and infrastructure. However, big data is exacerbating existing national security threats and creating new and unpredictable ones. It can be weaponised for war, providing information dominance and kinetic targeting capability. Big data has the capacity to enable or eliminate the barriers of entry for surveillance and oppression. It drives information warfare as well as social and political interference. An understanding of the potential harms from the misuse of big data and big tech is beginning to emerge, but much of its impact remains obscure. It is important for Australia to understand and counter the threats enabled by big data at a critical time for regional security.
Book
National intelligence agencies have long adjusted to the opportunities and threats from new technologies, and have created structures, concepts, and practices to best apply new capabilities. But such recent technological developments as artificial intelligence are different in kind. Increasingly affordable to nongovernmental actors, they are powerful enough to overwhelm and marginalize much of what agencies do. In The Future of National Intelligence: How Emerging Technologies Reshape Intelligence Communities, Shay Hershkovitz argues that only with a new paradigm can these agencies take up this fundamentally new technological challenge.
Book
The rise of the platform economy into statelike dominance over the lives of entrepreneurs, users, and workers. The early Internet was a lawless place, populated by scam artists who made buying or selling anything online risky business. Then Amazon, eBay, Upwork, and Apple established secure digital platforms for selling physical goods, crowdsourcing labor, and downloading apps. These tech giants have gone on to rule the Internet like autocrats. How did this happen? How did users and workers become the hapless subjects of online economic empires? The Internet was supposed to liberate us from powerful institutions. In Cloud Empires, digital economy expert Vili Lehdonvirta explores the rise of the platform economy into statelike dominance over our lives and proposes a new way forward. Digital platforms create new marketplaces and prosperity on the Internet, Lehdonvirta explains, but they are ruled by Silicon Valley despots with little or no accountability. Neither workers nor users can “vote with their feet” and find another platform because in most cases there isn't one. And yet using antitrust law and decentralization to rein in the big tech companies has proven difficult. Lehdonvirta tells the stories of pioneers who helped create—or resist—the new social order established by digital platform companies. The protagonists include the usual suspects—Amazon founder Jeff Bezos, Travis Kalanick of Uber, and Bitcoin's inventor Satoshi Nakamoto—as well as Kristy Milland, labor organizer of Amazon's Mechanical Turk, and GoFundMe, a crowdfunding platform that has emerged as an ersatz stand-in for the welfare state. Only if we understand digital platforms for what they are—institutions as powerful as the state—can we begin the work of democratizing them.
Article
The era of behavioural big data has created new avenues for data science research, with many new contributions stemming from academic researchers. Yet data controlled by platforms have become increasingly difficult for academics to access. Platforms now routinely use algorithmic behaviour modification techniques to manipulate users’ behaviour, leaving academic researchers further isolated in conducting important data science and computational social science research. This isolation results from researchers’ lack of access to human behavioural data and, crucially, to both the data on machine behaviour that triggers and learns from the human data and the platform’s behaviour modification mechanisms. Given the impact of behaviour modification on individual and societal well-being, we discuss the consequences for data science knowledge creation, and encourage academic data scientists to take on new roles in producing research to promote (1) platform transparency and (2) informed public debate around the social purpose and function of digital platforms. Behavioural big data and algorithmic behaviour modification technologies controlled by commercial platforms have become difficult for academic researchers to access. Greene et al. describe barriers to academic research on such data and algorithms, and make a case for enhancing platform access and transparency.