<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="book-review" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">SDQ</journal-id><journal-title-group><journal-title>Security &amp; Defence Quarterly</journal-title><abbrev-journal-title>SDQ</abbrev-journal-title></journal-title-group><issn pub-type="epub">2544-994X</issn><issn pub-type="ppub">2300-8741</issn><publisher><publisher-name>Akademia Sztuki Wojennej</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">SDQ-54-00476</article-id><article-id pub-id-type="doi">10.35467/sdq/211944</article-id><article-categories><subj-group subj-group-type="heading"><subject>Book Review</subject></subj-group></article-categories><title-group><article-title>Book Review: Bülent Sungur (2025) <italic>The Oversight of Outsourcing US Intelligence after 9/11: Private Intelligence Contractors</italic>. Cham: Palgrave Macmillan, 318 pp., ISBN: 978-3-031-82041-0</article-title></title-group><contrib-group content-type="authors"><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0009-0009-5279-5865</contrib-id><name><surname>Martynova</surname><given-names>Elena</given-names></name><email>elena.martynova@mup.cz</email></contrib><aff id="aff1">Department of International Relations and European Studies, Metropolitan University Prague, Dubečská 900/10, 100 00, Prague, Czech Republic</aff></contrib-group><pub-date pub-type="epub"><day>06</day><month>01</month><year>2026</year></pub-date><volume>54</volume><issue>2</issue><fpage>1</fpage><lpage>4</lpage><product><person-group person-group-type="author"><string-name><surname>Bülent</surname><given-names>Sungur</given-names></string-name></person-group> (<year>2025</year>) <article-title><italic>The oversight of outsourcing US intelligence after 9/11: Private intelligence contractors</italic></article-title>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Palgrave Macmillan</publisher-name>, <comment>318 pp., ISBN: 978-3-031-82041-0</comment>.</product><permissions><copyright-statement>© 2026 E. Martynova published by War Studies University, Poland.</copyright-statement><copyright-year>2026</copyright-year><license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0"><license-p>This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">http://creativecommons.org/licenses/by/4.0/</ext-link>).</license-p></license></permissions></article-meta></front><body><p>Some private military companies (PMCs), such as Blackwater, became infamous following their extensive involvement in American military operations in Iraq and Afghanistan throughout the 2000s (<xref ref-type="bibr" rid="ref5">Scahill, 2008</xref>). Although not raising as much controversy as PMCs with their presence on the battlefield, private sector contractors also increasingly expanded into the intelligence community. Bülent Sungur’s recent book, <italic>The Oversight of Outsourcing US Intelligence After 9/11</italic>, contributes to security privatisation scholarship by providing an analysis of the involvement of private intelligence contractors (PICs) in intelligence activities after 9/11 and the associated oversight considerations arising from this participation. Sungur’s book contributes to the existing scholarship on intelligence outsourcing, such as <xref ref-type="bibr" rid="ref2">Daricili’s (2019)</xref> and <xref ref-type="bibr" rid="ref7">Voelz’s (2009)</xref> examinations of the intelligence roles that have been played by private contractors. Previous literature has also addressed the legal frameworks and compliance responsibilities governing the public and private sectors in intelligence (<xref ref-type="bibr" rid="ref4">Michaels, 2008</xref>) as well as the evolution of contracting relationships. Sungur, however, specifically contributes to theoretical engagement on the subject by employing the principal–agent theory to analyse the relationship between PICs (the primary agent) and the American people (the primary principal), the US intelligence community, the President, and the Congress throughout the war on terror. The main themes that emerge throughout the book pertain to the rationales and consequences associated with outsourcing intelligence functions as well as the politicisation and mismanagement of intelligence by the American executive.</p><p>To argue that the intelligence community’s heavy reliance on PICs after 9/11 created oversight problems, particularly for Congress, Sungur examines the principal–agent relationship using three case studies: the mismanagement of contractors over the Iraqi weapons of mass destruction issue, PIC’s misconduct at Abu Ghraib, and the outsourcing of US covert operations in Pakistan, Yemen, and Somalia. None of these examinations are particularly new, as each intelligence failure has been examined thoroughly, often due to the abundance of the existing investigations and data. For example, the theory employed and the issue of misconduct at Abu Ghraib are also covered in Van Puyvelde’s (2019) book titled <italic>Outsourcing US intelligence: Contractors and Government Accountability</italic>. However, Sungur’s work is in fact different and complementary. Sungur argues that the cases have been selected due to a new argument—each issue represents a “shift” in the evolution of outsourcing intelligence. He suggests that there have been differences throughout the war on terror regarding the types of specific intelligence tasks outsourced; he also highlights the extent to which PICs have become a vital part of the US intelligence community. Sungur effectively demonstrates that the roles of PICs are multifaceted and that the power of contractors has increased in several circumstances.</p><p>The introductory chapter introduces the analytical framework and plan of the book. In the first chapter, Sungur clearly outlines his sound justifications for examining the United States (the high percentage of US intelligence budget spent on contracts as well as the amount of available and credible information on intelligence oversight) and defines the key concepts used throughout the book, including PICs and intelligence writ large. Sungur casts a wide net regarding the types of contractors he considers to be PICs, making it initially unclear how the term can be distinguished or separated from other private actors examined in other scholarship, such as PMCs. Nonetheless, he clearly links the roles of these contractors to the intelligence cycle and intelligence objectives throughout the empirical chapters. Chapter 2 comprehensively and relevantly examines the evolution of the intelligence mission in the United States as well as the congressional and executive oversight mechanisms, including the legal bases for outsourcing intelligence.</p><p>Chapters 3–5 are the empirical case studies. Each empirical chapter begins with a background on the delegated task and the role of the contractors, followed by an analysis of how the existing monitoring and control mechanisms failed to detect issues related to the role, hiring, and structure of PICs, drawing on the concepts from <xref ref-type="bibr" rid="ref3">McCubbins and Schwartz (1984)</xref> on police-patrol and fire-alarm oversight. The chapters proceed to discuss how an intelligence failure occurred in each case and how third parties noticed and/or informed the principals about taking measures, again using McCubbins and Schartz’s (1984) conceptual framework. The application of both principal–agent theory and oversight concepts is straightforward, but Sungur occasionally conflates his units of analysis. He argues that the American people are the main principal; however, this does not always translate to the analysis in each of the case studies.</p><p>Sungur emphasises the executive’s role in the intelligence failures associated with private sector involvement. Some scholars have also explored this perspective. For example, <xref ref-type="bibr" rid="ref4">Michaels (2008)</xref> conducted a study on public–private intelligence partnerships in the war on terror. He introduces the argument that the executive is motivated to conduct intelligence policy through collaborations with corporations despite potential legal, political, and economic risks in order to gain power and discretion. However, this is not elaborated extensively, as Michaels mainly focuses on how to shift compliance responsibilities away from intelligence officials and onto corporations. Sungur’s work advances scholarship by empirically expanding on the idea that the executive is actively complicit in private intelligence issues and mismanagement. With this focus, the book does occasionally feel slightly conspiratorial, with the author referencing the president’s “hidden agenda” that allegedly facilitates the growing use of PICs. Nonetheless, Sungur convincingly demonstrates that systems of intelligence oversight in the United States are ineffective at best and corrupt at worst.</p><p>Sungur’s book also contributes to foundational work, such as that of <xref ref-type="bibr" rid="ref1">Chesterman (2008)</xref>, which explains issues in the oversight of outsourced intelligence functions. Chesterman argues that challenges stem from the necessary topical secrecy that limits oversight, differing incentives for private versus public employees, and the uncertainty about which functions can be delegated to private actors and which should stay within the government. Sungur’s analysis is innovative in that it not only contributes to explaining oversight issues with his examination of the executive’s role but also explores the downstream consequences of these challenges by examining how the legislative branch tries to address oversight issues. Each of the empirical chapters conclude by discussing executive and legislative principals’ responses to the intelligence failures and whether new reforms were introduced to prevent further violations of the rules.</p><p>From an evidentiary standpoint, Sungur uses data from official documents, including congressional hearings, reports, testimonies, executive branch investigations, and other primary sources. Information from the reports of international organisations, periodicals, and civilian survey agencies is used as a secondary source. Methodologically, Sungur claims to use process-tracing, although this approach is not made overly evident in the book until the concluding chapter, which summarises the findings of the case studies in relation to his hypotheses and provides recommendations for further research in the field. Although he does reference that a specific piece of evidence points to “an indication of hypothesis x being correct,” additional explanation of his use of the methodology would have been valuable, embedded within the empirical chapters. Additionally, Sungur does not adequately address other potential causes of intelligence oversight issues beyond the use of PICs. Although he does not clearly define the types of relationships he is looking for through the investigation, they are at best probabilistic, rather than deterministic.</p><p>The methodological structure, approach to content organisation, and theoretical engagement result in the book being mainly for those studying the privatisation of security, rather than a policy-oriented audience. Even while acknowledging some of the issues raised, overall, Sungur’s contribution has significant relevance to the academic field, primarily due to the value of the analytical framework he introduces and employs throughout the book, enabling comprehensive coverage of the principal–agent relationship with potential applicability beyond the actors outlined. Specifically, Sungur’s framework has the potential to address a gap in the literature regarding private intelligence outsourcing outside of the American context. Few authors have explored this topic in other geographic areas, especially in non-Western countries. While much of the private intelligence outsourcing has previously focused on governments as clients, emerging research is exploring outsourcing for corporate risk mitigation (<xref ref-type="bibr" rid="ref6">Tucker and Robson-Morrow, 2025</xref>). Sungur’s theoretical framework could therefore also potentially be tested within private/private sector relationships.</p></body><back><ref-list><ref id="ref1"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chesterman</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2008</year>) <article-title>‘“We can’t spy... if we can’t buy!”: The privatisation of intelligence and the limits of outsourcing “inherently governmental functions”’</article-title>, <source><italic>European Journal of International Law</italic></source>, <volume>19</volume>(<issue>5</issue>), pp. <fpage>1055</fpage>–<lpage>1074</lpage>. doi: <pub-id pub-id-type="doi">10.1093/ejil/chn055</pub-id>.</mixed-citation></ref><ref id="ref2"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Daricili</surname>, <given-names>A.B</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Role of private companies in the future’s intelligence management; analysis of the US intelligency system within this scope’</article-title>, <source><italic>MANAS Sosyal Araştırmalar Dergisi</italic></source>, <volume>8</volume>(<issue>4</issue>), pp. <fpage>3958</fpage>–<lpage>3976</lpage>. doi: <pub-id pub-id-type="doi">10.33206/mjss.524428</pub-id>.</mixed-citation></ref><ref id="ref3"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>McCubbins</surname>, <given-names>M.D</given-names></string-name>. and <string-name><surname>Schwartz</surname>, <given-names>T</given-names></string-name></person-group>. (<year>1984</year>) <article-title>‘Congressional oversight overlooked: Police patrols versus fire alarms’</article-title>, <source><italic>American Journal of Political Science</italic></source>, <volume>28</volume>(<issue>1</issue>), pp. <fpage>165</fpage>–<lpage>179</lpage>. doi: <pub-id pub-id-type="doi">10.2307/2110792</pub-id>.</mixed-citation></ref><ref id="ref4"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Michaels</surname>, <given-names>J.D</given-names></string-name></person-group>. (<year>2008</year>) <article-title>All the president’s spies: Private-public intelligence partnerships in the war on terror</article-title>. <source>California Law Review</source><volume>96</volume>, <fpage>901</fpage>–<lpage>966</lpage>. doi: <pub-id pub-id-type="doi">10.15779/Z38Z11G</pub-id>.</mixed-citation></ref><ref id="ref5"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Scahill</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2008</year>) <chapter-title><italic>Blackwater: The rise of the world’s most powerful mercenary army</italic></chapter-title>, updated paperback edn. <publisher-loc>London</publisher-loc>: <publisher-name>Serpent’s Tail</publisher-name>.</mixed-citation></ref><ref id="ref6"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tucker</surname>, <given-names>K</given-names></string-name>. and <string-name><surname>Robson-Morrow</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2025</year>) <article-title>‘Intelligence outsourcing for non-traditional clients: The rise of private sector intelligence providers’</article-title>, <source><italic>Intelligence and National Security</italic></source>, <volume>40</volume>(<issue>3</issue>), pp. <fpage>412</fpage>–<lpage>431</lpage>. doi: <pub-id pub-id-type="doi">10.1080/02684527.2024.2437958</pub-id>.</mixed-citation></ref><ref id="ref7"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Voelz</surname>, <given-names>G.J</given-names></string-name></person-group>. (<year>2009</year>) ‘<article-title>Contractors and intelligence: The private sector in the intelligence community’</article-title>, <source><italic>International Journal of Intelligence and Counterintelligence</italic></source>, <volume>22</volume>(<issue>4</issue>), pp. <fpage>586</fpage>–<lpage>613</lpage>. doi: <pub-id pub-id-type="doi">10.1080/08850600903143106</pub-id>.</mixed-citation></ref></ref-list></back></article>
