Hayden B. Peake
“Counterintelligence” (CI) is a term with multiple meanings—its definitions vary, even when applied to a single nation. Yet it can be understood by identifying the common CI functions in a source. These include: handling double agents, defectors, deception operations, and covert communications; handling and detecting moles or penetrations; and dealing with security threats in general. Antecedent elements of what is today called counterintelligence may be found in various histories of intelligence and warfare. The existence of security services can be traced back to ancient Egypt, Assyria, Persia, Greece, Rome, China, and Muscovy, among others. With the rise of the nation-state, rulers began creating secret political police organizations to safeguard their existence. In the case of the United States, it was not until the Civil War that there was anything like a domestic counterintelligence agency, and even then it was not a statutory organization. After World War I, however, former intelligence officers, agents, defectors, and journalists began publishing accounts of counterintelligence and domestic security operations. These topics were often discussed side-by-side. The number of scholarship on CI grew as World War II and the Cold War followed. In particular, the so-called “Cambridge Five” case—which involved five Cambridge graduates who were recruited as Soviet spies in the 1930s—had generated considerable literature and was furthermore considered an important case study in Western and Soviet intelligence services.
Jennifer D. Kibbe
Covert action presents a potential policy for decision makers who want something quicker or more muscular than diplomacy but less expensive and obtrusive than military force. In contrast with intelligence, which entails collecting and analyzing information, covert action is an active instrument of foreign policy. The three main categories of covert action include propaganda, political action, and paramilitary action. Another separate category is economic action, which involves destabilizing the target state’s economy in some way. Because of the inherent secrecy of covert action, outside scholars have no way of knowing how much they do or do not know about the topic at hand and it also makes it hard to verify the information, since the information comes from a variety of sources. Covert action literature is particularly strong in case studies of particular operations. There is also a well-developed subsection within the field that focuses on covert action since the end of the Cold War, the role that the Office of Strategic Services (OSS) played during World War II, and covert actions undertaken by other states. However, there are several issues in the covert action literature. These issues include the assessment of the success or failure of particular operations and of the policy instrument as a whole, the tangible and intangible costs incurred by covert action, the ethical questions raised by conducting covert actions as well as the particular methods used and its impact on democracy, the oversight of covert action, and the evolution of US law covering covert action.
Critical theory in International Relations originated from the Marxist tradition which, during the mid- to late Cold War, formed the basis of dependency and world systems theory. In the years before and after the Cold War, critical theory became part of a larger post-positivist challenge to the discipline and to the development of critical security studies. At the heart of contestation within the broader arena of critical security is the concept of emancipation, developed by members of the Frankfurt School such as Theodor W. Adorno and Max Horkheimer. Several key debates have been at the center of critical security studies relating to the construction of threats, identity and difference, human security, and emancipation. In particular, critical security analysts have addressed the question of how, given the range of threats or risks that exist in the world, some threats come to have priority over others and become the focus of discourses of security. Also, some scholars have disputed the idea that identity is dependent on difference. The concept of human security shifts attention away from states to individuals, emphasizing human rights, safety from violence, and sustainable development. In the case of emancipation, critical theorists have expressed concern that the concept is too closely linked with modernity, meta-narratives, especially Marxism and liberalism, and the Enlightenment belief that humanity is progressing toward a more perfect future. What is needed is not to avoid emancipation per se, but to pay close attention to its underlying assumptions.
John D. Stempel
There is a potentially serious difference between diplomacy and intelligence. Creative tension between diplomacy and intelligence stems from the involvement of both with questions of strategy and statecraft. Indeed, the source of this conflict is often clandestine or covert activities that become public and adversely affect both relations between states and diplomats’ ongoing work. Early works in the intelligence scholarship focuses basically at the descriptive level and centers on acquiring information. In 1922, studies began considering the political aspects of the intelligence–diplomacy connection, zeroing in on the defects of US intelligence and the adequacy of policies, including those related to intelligence gathering and its impact on diplomacy. Studies about the details of the intelligence–diplomacy connection also began to appear. These studies look at the interplay between intelligence and policy making as well as the morality of clandestine operations. In order to link intelligence goals to policy needs, future studies on the intelligence–diplomacy connection should further assess the impact of culture on intelligence gathering and perception, provide better insight into the characteristics of good versus bad intelligence officers and diplomats, include qualitative estimates of the effectiveness and efficacy of techniques and strategies as well as legal and ethical discussions of control and policy, and explore the strategic interactions between intelligence officers and diplomats and how these are managed in various governing systems.
International relations (IR) and security studies lack a coherent and developed body of inquiry on the issue of empire. The central focus of IR situates discussion of imperialism and hierarchy outside the core of the discipline, and on its fringes where scholars from other disciplines engage with IR and security studies literature. Similarly, security studies focus on major war between great powers, not “small wars” between the strong and the weak. The general neglect of empire and imperialism in IR and security studies can be attributed to Eurocentrism, of the unreflective assumption of the centrality of Europe and latterly the West in human affairs. In IR this often involves placing the great powers at the center of analysis, as the primary agents in determining the fate of peoples. Too easily occluded here are the myriad international relations of co-constitution, which together shape societies and polities in both the global North and South. In 1986, Michael Doyle published Empires, a thoughtful effort to systematize the historiography of empire and imperialism with social science concepts. It is rarely cited, much less discussed, in disciplinary literature. By contrast, the pair of articles he published in 1983 on Kant and the connection between liberalism and peace revived the democratic peace research program, which became a key pillar of the liberal challenge to realism in the 1990s and is widely debated. The reception of Doyle’s work is indicative of how imperialism can be present but really absent in IR and security studies.
Elizabeth L. Chalecki
The term environment is often used as a short form for the biophysical environment, which refers to the biotic and abiotic surrounding of an organism or population, and consequently includes the factors that have an influence in their survival, development, and evolution. All life that has survived must have adapted to conditions of its environment. On one hand, part of the study of environmental science is the investigation of the effect of human activity on the environment. On the other hand, scholars also examine threats posed by environmental events and trends to individuals, communities, or nations, otherwise known as environmental security. It studies the impact of human conflict and international relations on the environment, or on how environmental problems cross state borders. Environmental security is a significant concept in two fields: international relations and international development. Within international development, projects may aim to improve aspects of environmental security such as food security or water security, along with connected aspects such as energy security. The importance of environmental security lies in the fact that it affects humankind and its institutions anywhere and at anytime. To the extent that humankind neglects to maintain the planet’s life-supporting eco-systems generating water, food, medicine, and clean air, current and future generations will be confronted with increasingly severe instances of environmentally induced changes.
Anthony F. Lang
The concepts of ethics, justice, and security are inextricably linked within the field of International Relations (IR). In IR, three concepts are most often deployed in understanding the ethics of security: norms, rules, and laws. These norms, rules, and laws evaluate security, which is an alternative concept for describing what IR as a discipline has long sought to address: namely, war. Hence, norms, rules, and laws provide a means to evaluate violence and war. Using the first three concepts to evaluate the latter two is the heart of ethics and security. The concept of justice, however, suggests that simple norms, rules, and laws may not be enough. There have been debates about the use of military force since ancient times—the Judeo-Christian, Greco-Roman, and Islamic traditions have their own conceptions of how war and violence ought to be addressed. One of the more prominent ideas drawn from these debates is the concept of the “just war,” which emerged from Christian tradition. The concept of just war has played a role in constructing the international legal tradition. This tradition as an explicit moral one was subsumed into international law during the nineteenth century, but re-emerged in the mid-twentieth century. Today, it has become an influential source of critical reflection upon both legal and practical dilemmas in international security, informing a wide range of debates around the world.
Ellie C. Schemenauer
Much of what goes on in the production of a security state is the over-zealous articulation of the other, which has the effect of reinforcing the myth of an essentialized, unambiguous collective identity called the nation-state. Indeed, the focus on securing a state (or any group) often suggests the need to define more explicitly those who do not belong, suggesting, not only those who do, but where and how they belong and under what conditions. Feminists are concerned with how highly political gender identities often defined by masculinism are implicated in marking these inclusions and exclusions, but also how gender identities get produced through the very practices of the security state. Feminists in the early years critiqued the inadequacy of realist, state-centric notions of security and made arguments for more reformative security perspectives, including those of human security or other nonstate-centric approaches. At the same time, feminist research moved to examine more rigorously the processes of militarism, war, and other security practices of the state and its reliance on specific ideas about women and men, femininity and masculinity. Feminist contributions from the mid-1990s through the first decade of the millennium reveal much about the relationships between gender identities, militarism, and the state. By paying attention to gendered relationships of power, they expose the nuances in the co-constitution of gender identities and the security state.
Priscilla M. Regan
Despite cultural differences, privacy tends to be rather universally viewed as important in protecting some realms of life that are seen as off limits to society more generally. Yet privacy has also been the cause of significant global issues over the years. In the late 1960s and early 1970s, government agencies and private sector organizations increasingly adopted computers to maintain records, precipitating a concern with the rights of the individuals who were subjects of that data and with the responsibilities of the organizations processing the information. During the 1980s, international and regional bodies recognized that domestic laws could affect the flow of personal information into and out of a country, bringing scholarly and policy attention to the issue of transborder data flows. Somewhat paralleling the principally business dominated debate and analyses over transborder data flows was a broader discussion about privacy issues resulting from global communication and information systems, particularly the internet, during the 1990s. The focus in policy and scholarship was less on variations in national laws and more on two features of networked communication systems: first, the technical infrastructure supporting the flow of information; and second, the globalization of communication systems and information flows. Later on, the privacy landscape and discourse changed dramatically throughout the world after the terrorist attacks in the US on September 11, 2001. Concerns about privacy and civil liberties were trumped by concerns about security and identifying possible terrorists.
The historical approach to strategic/security studies is permeated by the belief that the nature of strategy has remained essentially unchanged throughout history. Of course, this strand of thought has come to recognize that changing conditions lead to corresponding changes in tactics. It is also recognized that changes in the nature of tactics are bound to influence strategy as well. Still, it is asserted that grand strategy, military strategy, or even operational art are fundamentally timeless in character, hence a historical approach is essential for their understanding. This was considered self-evident until the aftermath of World War II, which witnessed the emergence of a school of strategic/security studies that was almost completely divorced from history. During this so-called “golden age” of strategic studies, namely the 1950s and 1960s, the historical approach was relatively subdued. The novelty of nuclear weapons was arguably a valid reason for that, although the fascination with the technical aspects of those weapons and the tendency to resort to abstract thinking was carried too far. And as the Cold War was drawing to its close and the Soviet Union was collapsing, it was widely proclaimed that a new era had arrived in domestic and international political affairs, rendering historical experience obsolete. It did not take long for the naivety of such views to be exposed; for better or for worse, the historical approach to strategic/security studies would fully retain its validity in the post-Cold War era.