New Approaches and Concepts in Intelligence Studies: Actor-Network Theory in the Transformation of Security Intelligence

Authors

  • Ade Mulya Indonesian National Police College, Jakarta, Indonesia

DOI:

https://doi.org/10.70710/sitj.v2i4.78

Keywords:

Actor-Network Theory (ANT), Intelligence Cycle, Intelligence Studies, Non-Human Agency, Security Intelligence

Abstract

This article examines the fundamental transformations in the study and practice of security intelligence driven by technological convergence, the emergence of non-traditional threats, and the shifting ontology of human-technology interaction. Using the theoretical framework of Actor-Network Theory (ANT) developed by Bruno Latour, this study reanalyzes the intelligence cycle, focusing on recognizing the agency of non-human actors. This approach explicitly rejects the traditional, linear model of the intelligence cycle, which is increasingly inadequate to capture the dynamics of contemporary intelligence. Key findings demonstrate that modern intelligence practice operates as a constantly shifting, heterogeneous network, in which human actors (e.g., analysts, field officers) and non-human actors equally have agency (actancy) and "translate" the roles and functions of each other (translation). This transformation, although increasing operational efficiency, however, raises critical governance challenges. This is especially related to the phenomenon of algorithmic black-boxing, which threatens transparency, accountability, and democratic legitimacy in the use of security intelligence. This study concludes that recognizing the agency of non-human actors is crucial for designing adaptive distributed accountability frameworks that address the complexities of contemporary intelligence.

Downloads

Download data is not yet available.

References

Abbas, N., Ahmed, T., Shah, S. H. U., Omar, M., & Park, H. (2019). Investigating the applications of artificial intelligence in cyber security. Scientometrics, 121(2), 927–963. https://doi.org/10.1007/s11192-019-03202-5

Acceldata. (2024). How Does Adaptive AI Work? A Complete Guide to Self-Learning Systems.

AI Agent. (2024).How Agentic AI Is Redefining Human – AI Collaboration.

Ananny, M., & Crawford, K. (2018). The limits of algorithmic transparency. New Media & Society, 20(3), 973–990.

Antony, V. (2024). Swarm Intelligence based algorithms applied to the IoT for solving the main challenges of this technology. Frontiers in the Internet of Things.

Ard, M. J. (2024). Examining the January 6 Capitol attack ‘intelligence failure’: the challenge of domestic security and the role of HUMINT. Intelligence and National Security.

Balzacq, T., & Dunn Cavelty, M. (2016). A theory of actor-network for cyber-security. European Journal of International Security, 1(2), 176–198. https://doi.org/10.1017/eis.2016.8

Beni, G., & Wang, J. (1989). Swarm Intelligence. Proceedings of the NATO ASI on Robots and Biological Systems. Springer.

Berndtsson, J., & Rhinard, M. (2022). Security intelligence and actor-network theory: Rethinking the intelligence cycle. Intelligence and National Security, 37(2), 175-192. https://doi.org/10.1080/02684527.2021.2012992

Clark, R. M. (2003). Intelligence Analysis: A Target-Centric Approach. CQ Press.

Dadhich, A., Gupta, A., & Yadav, S. (2014). Swarm Intelligence based linear cryptanalysis of four-round Data Encryption Standard algorithm. Issues and Challenges in Intelligent Computing Techniques (ICICT).

Dwiartama, A., & Rosin, M. (2014). Actor-Network Theory and Methodology: Just What Does It Mean to Say That Nonhumans Have Agency. The Sociological Review, 62(3), 512–535.

Gill, P., Phythian, M., & Shulsky, A. (2013). The Limits of Intelligence Analysis: A Critique. Routledge.

Gioe, D. V. (2017). ‘The More Things Change’: HUMINT in the Cyber Age.

Henrico, S., & Putter, D. (2024). Intelligence Collection Disciplines—A Systematic Review. Journal of Applied Security Research, 19(1), 1-25. https://doi.org/10.1080/19361610.2023.2291234

Hulnick, A. S. (2006). What's Wrong with the Intelligence Cycle. Intelligence and National Security, 21(6), 959–979.

Huntress. (2024). The Human Side of Intelligence: What Is HUMINT?

IBM. (2024). Dealing with the challenges of black box AI.

Kosinski, M. (2024).The Black Box Dilemma: Understanding Black Box AI.

Kutej, L., & Horák, L. (2025). Emerging Intelligence Paradigms in the Russia–Ukraine War: CROWDINT, CITINT, and the Digital Battlespace. Obrana a strategie (Defence and Strategy), 25(1), 19-32.

Lagerwaard, P. (2020). Flattening the international: producing financial intelligence through a platform. Critical Studies on Security, 8(2), 123-140. https://doi.org/10.1080/21624887.2020.1756672

Latour, B. (2005). Reassembling the Social: An Introduction to Actor-Network-Theory. Oxford: Oxford University Press.

Law, P. S. (2024). Artificial intelligence has a serious transparency problem.

Neto, A. (2024). The new role of the analyst in a world with AI.

OpenText. (2024). Agentic IoT: The future of autonomous enterprise operations.

Sayes, E. (2014). Actor-Network Theory and Methodology: Just What Does It Mean to Say That Nonhumans Have Agency. The Sociological Review, 62(3), 512–535.

Sparrow, R. (2007). The robot that killed: Responsibility gaps in the age of autonomous machines. Naval War College Review, 60(3), 101–114.

Splunk. (2024). What Is Adaptive AI? A Complete Guide to Self-Learning Systems.

Swimlane. (2024). AI Use Cases in Government Nation-State Threats.

UNU (United Nations University). (2024). Addressing the algorithmic problem: Artificial intelligence governance.

USC (University of Southern California). (2020). Perspectives on Intelligence Collection.

Vermesan, O., et al. (2022). Key characteristics of A-IoT systems. Frontiers in the Internet of Things, 3(2), 1-15.

Zilliz. (2024). How does swarm intelligence improve security systems

Downloads

Published

2025-12-06

How to Cite

Mulya, A. (2025). New Approaches and Concepts in Intelligence Studies: Actor-Network Theory in the Transformation of Security Intelligence. Security Intelligence Terrorism Journal (SITJ), 2(4), 414–421. https://doi.org/10.70710/sitj.v2i4.78

Issue

Section

Articles

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.