2,474
Views
3
CrossRef citations to date
0
Altmetric
Research Article

Intelligence under democracy and authoritarianism: a philosophical analysis

Bibliography

  • Andrew, C. “The Mitrokhin Archive.” The RUSI Journal 145, no. 1 (2000): 52–56. doi:10.1080/03071840008446488.
  • Andrew, C. “Intelligence, International Relations and ‘Under-Theorisation’.” Intelligence and National Security 19, no. 2 (2004): 170–184. doi:10.1080/0268452042000302949.
  • Andrew, C., and V. Mitrokhin. The Sword and the Shield: The Mitrokhin Archive and the Secret History of the KGB. New York: Basic Books, 1999.
  • Ayer, A. J. Language, Truth, and Logic. London: Dover Publications, 1952.
  • Ayer, A. J., ed. Logical Positivism. New York: The Free Press, 1959.
  • Banks, W. C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory Law Journal 66, no. 3 (2017): 513–526.
  • Bean, H., P. de Werd, and C. Ivan, eds. “Special Issue: Critical Intelligence Studies.” Intelligence and National Security 36, no. 4 (2021): 467–620. doi:10.1080/02684527.2021.1893068.
  • Belton, C. Putin’s People: How the KGB Took Back Russia and Then Took on the West. New York: Farrar, Straus and Giroux, 2020.
  • Bergo, B. “Emmanuel Levinas.” In The Stanford Encyclopedia of Philosophy (Fall 2019 Edition). edited by E. N. Zalta. https://plato.stanford.edu/cgi-bin/encyclopedia/archinfo.cgi?entry=levinas&archive=fall2019
  • Bernecker, S., and F. Dretske. Knowledge: Readings in Contemporary Epistemology. Oxford: Oxford University Press, 2000.
  • Blackburn, S., ed. “Structuralism.” In Oxford Dictionary of Philosophy. 2nd rev. ed. Oxford: Oxford University Press, 2008.
  • Bohman, J. “Critical Theory.” In The Stanford Encyclopedia of Philosophy (Winter 2019 Edition). edited by E. N. Zalta. https://plato.stanford.edu/cgi-bin/encyclopedia/archinfo.cgi?entry=critical-theory&archive=win2019
  • Bozeman, A. “Political Intelligence in Non-Western Societies: Suggestions for Comparative Research.” In Comparing Foreign Intelligence: The US, the USSR, the UK, and the Third World, edited by R. Godson. Pergamon-Brassey’s, 1988.
  • Buckley, C. “China Takes Aims at Western Ideas.” New York Times, [2013] 2014. Accessed July 4, 2021. https://www.nytimes.com/2013/08/20/world/asia/chinas-new-leadership-takes-hard-line-in-secret-memo.html
  • Carter, Z. D. The Price of Peace: Money, Democracy, and the Life of John Maynard Keynes. New York: Random House, 2020.
  • Chinese Government Website. “Ministry of Public Security.” 2020. Accessed December 22, 2020. http://english.www.gov.cn/state_council/2014/09/09/content_281474986284154.htm
  • Cox, R. W. “Social Forces, States and World Orders: Beyond International Relations Theory.” Millennium 10, no. 2 (1981): 126–155. doi:10.1177/03058298810100020501.
  • Daly, J. C. K. “Russian Government Moves to Assert Increasing Control over Internet.” Eurasia Daily Monitor, 2021. Accessed February 18, 2021. https://jamestown.org/program/russian-government-moves-to-assert-increasing-control-over-internet/
  • David, S. R. “Explaining Third World Alignment.” World Politics 43, no. 2 (1991): 233–256. doi:10.2307/2010472.
  • Davidson, D. “Thought and Talk.” In Inquiries into Truth and Interpretation, 155–170. Oxford: Oxford University Press, 1984.
  • Davies, P. H. J. “Twilight of Britain’s Joint Intelligence Committee?” International Journal of Intelligence and Counterintelligence 24, no. 3 (2011): 427–446. doi:10.1080/08850607.2011.568288.
  • Davies, P. H. J., and K. C. Gustafson, eds. Intelligence Elsewhere: Spies and Espionage outside the Anglosphere. Georgetown: Georgetown University Press, 2013.
  • Dearlove, R. “Interview with Sir Richard Dearlove.” Hudson Union Society, May 23, 2016. Accessed December 22, 2020. https://www.youtube.com/watch?v=u1vMsSON-SU
  • Dennett, D. C. Consciousness Explained. New York: Little, Brown and Company, 1991.
  • Derrida, J. Positions, Les Editions de Minuit. Translated as Positions, Alan Bass (trans.) Chicago: University of Chicago Press, 1972 [1981].
  • Dorfman, Z. “Beijing Ransacked Data as U.S. Sources Went Dark in China.” Foreign Policy Magazine, 2020. Accessed December 22, 2020. https://foreignpolicy.com/2020/12/22/china-us-data-intelligence-cybersecurity-xi-jinping/
  • Ehrman, J. “What are We Talking about When We Talk about Counterintelligence?” Studies in Intelligence 53 (2009): 2.
  • Einstein, A. Relativity: The Special and General Theory. New York: Crown Publishing, 1961.
  • Emmersen, T., J. M. Hatfield, J. Kosseff, and S. R. Orr IV. “The USNA’s Interdisciplinary Approach to Cybersecurity Education.” IEEE Computer 52, no. 3 (2019): 48–57. doi:10.1109/MC.2018.2883605.
  • Federal Bureau of Investigation. “Game of Pawns.” Video on FBI Website Illustrating the Case of Glenn Duffie Shriver, 2020. Accessed December 23, 2020. https://www.fbi.gov/video-repository/newss-game-of-pawns/view
  • Foucault, M. Histoire de la Folie. Paris: Plon. Translated as Madness and Civilization, (trans.) Richard Howard. New York: Vintage Books, 1965 [1961].
  • Foucault, M. Naissance de la Clinique. Paris: Presses Universitaires de France. Translated as The Birth of the Clinic, Allan Sheridan (trans.), New York: Pantheon, 1973 [1963].
  • Foucault, M. Surveiller et punir. Paris: Gallimard. Translated as Discipline and Punish, Alan Sheridan (trans.), New York: Pantheon, 1977 [1975].
  • Foucault, M. Histoire de la sexualité. 1 (of 3) vols. Paris: Gallimard. Translated as History of Sexuality Vol. 1, Robert Hurley (trans.), New York: Pantheon Books, 1978 [1976].
  • Gaspard, J. J. S. “Intelligence without Essence: Rejecting the Classical Theory of Definition.” International Journal of Intelligence and Counterintelligence 30, no. 3 (2017): 557–582. doi:10.1080/08850607.2017.1263527.
  • Gioe, D. V. “(Former CIA Case Officer, Current Intelligence Studies Scholar at the United States Military Academy at West Point), Interviewed by Joseph M. Hatfield, Annapolis, Maryland.” December 2020, Transcript, Annapolis, Maryland.
  • Godfrey-Smith, P. Theory and Reality: An Introduction to the Philosophy of Science. Chicago: University of Chicago Press, 2003.
  • Godson, R. Comparing Foreign Intelligence: The US, USSR, UK, and the Third World. New York: Macmillan Publishers, 1988.
  • Goodman, M. S. “Learning to Walk: The Origins of the UK’s Joint Intelligence Committee.” International Journal of Intelligence and Counterintelligence 21, no. 1 (2008): 40–56. doi:10.1080/08850600701649163.
  • GCHQ (Government Communications Headquarters). “Cybersecurity.” GCHQ Website, 2020. Accessed December 22, 2020. https://www.gchq.gov.uk/section/mission/cyber-security
  • Groll, E. “A Brief History of Attempted Russian Assassinations by Poison.” Foreign Policy Magazine, 2018. Accessed December 22, 2020. https://foreignpolicy.com/2018/03/09/a-brief-history-of-attempted-russian-assassinations-by-poison/
  • Gustafson, K. C. “Echo of Empires: Russia’s Inheritance of Byzantine Security Culture.” Journal of Slavic Military Studies 23, no. 4 (2010): 574–596. doi:10.1080/13518046.2010.525477.
  • Hatfield, J. “Immanuel Kant: From Universal Rationality to Perpetual Peace.” In Philosophers on War, edited by E. Patterson and T. J. Demy, 225–237. Newport: Stone Tower Books, 2017.
  • Hatfield, J. “An Ethical Defense of Treason by Means of Espionage.” Intelligence and National Security 32, no. 2 (2018): 195–207. doi:10.1080/02684527.2016.1248571.
  • Human Rights Watch Website. “Russia: Growing Internet Isolation, Control, Censorship.” Human Rights Watch Website, 2020. Accessed December 23, 2020. https://www.hrw.org/news/2020/06/18/russia-growing-internet-isolation-control-censorship#
  • Hunt, E. K. History of Economic Thought. New York: M. E. Sharpe, Inc, 2002.
  • Jackson, P. T. The Conduct of Inquiry in International Relations: Philosophy of Science and Its Implications for the Study of World Politics. 2nd ed. Routledge: New York, 2016.
  • King, G., R. O. Keohane, and S. Verba. Designing Social Inquiry: Scientific Inference in Qualitative Research. Princeton: Princeton University Press, 1994.
  • Kosseff, J. The Twenty-Six Words that Created the Internet. Ithaca: Cornell University Press, 2019.
  • Lefebvre, S., and H. Porteous. “The Russian 10…11: An Inconsequential Adventure?” International Journal of Intelligence and Counterintelligence 24, no. 3 (2011): 447–466. doi:10.1080/08850607.2011.568290.
  • Lowenthal, M. Intelligence: From Secrets to Policy. 8th ed. London: CQ Press, 2020.
  • Lowenthal, M. “Intelligence is NOT about ‘Telling Truth to Power’.” International Journal of Intelligence and Counterintelligence 34, no. 4 (2021): 795–798. doi:10.1080/08850607.2021.1928438.
  • Marx, K. Theses on Feuerbach. Moscow: Progress Publishers, 1969 [1888].
  • Mattis, P. “Assessing Western Perspectives on Chinese Intelligence.” International Journal of Intelligence and Counterintelligence 25, no. 4 (2012a): 678–699. doi:10.1080/08850607.2012.678745.
  • Mattis, P. “The Analytic Challenge of Understanding Chinese Intelligence Services.” Studies in Intelligence 56, no. 3 (2012b): 47–57.
  • Mattis, P., and M. Brazil. Chinese Communist Espionage: An Intelligence Primer. Annapolis: Naval Institute Press, 2019.
  • McNeil, P. P. “The Evolution of the U.S. Intelligence Community—An Historical Overview.” In Intelligence: The Secret World of Spies, edited by L. K. Johnson and J. J. Wirtz, 5–22. Oxford: Oxford University Press, 1996.
  • National Institute of Standards and Technology. “Information Security.” NIST Website, 2020. Accessed December 22, 2020. https://csrc.nist.gov/glossary/term/INFOSEC
  • Parfitt, T. “Vladimir Putin Consoles Exposed Russian Spies with ‘Singalong’.” The Guardian, July 25, 2010. Accessed December 28, 2020. https://www.theguardian.com/world/2010/jul/25/vladimir-putin-russian-spy-ring.
  • Phythian, M. “Intelligence Theory and Theories of International Relations: Shared World or Separate Worlds?” In Intelligence Theory: Key Questions and Debates, edited by P. Gill, S. Marrin, and M. Phythian, 54–72. Abingdon: Routledge, 2009.
  • Phythian, M. “Cultures of National Intelligence.” In Routledge Companion to Intelligence Studies, edited by R. Dover, M. S. Goodman, and C. Hillebrand. Abingdon: Routledge, 2014.
  • Plato. The Republic. London: Penguin Books, 1987.
  • Policy, R. D. “The NTsUO Chief.” Russian Defense Policy Website, 2014. Accessed December 23, 2020. https://russiandefpolicy.com/tag/mikhail-mizintsev/
  • Quine, W. V. Methods of Logic. 4th ed. Cambridge: Harvard University Press, 1982.
  • Rawls, J. A Theory of Justice. Cambridge: Harvard University Press, 1971.
  • Rouse, J. “Power/Knowledge.” In The Cambridge Companion to Foucault, edited by G. Gutting, 92–114. Cambridge: Cambridge University Press, 1994.
  • Ryan, S. “Finding the Right Answer: Adapting Military Intelligence to the Information Age.” The RUSI Journal 160, no. 4 (2015): 50–58. doi:10.1080/03071847.2015.1079053.
  • Sanger, D. E. “Biden Assails Trump over Handling of Russia Hacking.” New York Times, 2020. Accessed December 23, 2020. https://www.nytimes.com/2020/12/22/us/politics/biden-trump-russia-hack.html?action=click&module=Top%20Stories&pgtype=Homepage
  • Schwirtz, M. “Top Secret Russian Unit Seeks to Destabilize Europe, Security Officials Say.” New York Times, 2021. Accessed February 14, 2021. https://www.nytimes.com/2019/10/08/world/europe/unit-29155-russia-gru.html?action=click&module=Top%20Stories&pgtype=Homepage
  • Service of Operational Information. “Part of the 5th Service.” Agentura.ru, 2008. Accessed February 18, 2021. https://web.archive.org/web/20131110205807/http://www.agentura.ru/dossier/russia/fsb/structure/doi/
  • Soldatov, A., and I. Borogan. “Our Special Services are on the Territory of the Former Soviet Union.” Agentura.ru, 2006. Accessed February 18, 2021. http://www.agentura.ru/press/about/jointprojects/novgaz/exussr3/
  • Stanford University. “China’s Great Firewall.” Stanford Computer Science Website, 2020. Accessed December 22, 2020. https://cs.stanford.edu/people/eroberts/cs181/projects/2010-11/FreeExpressionVsSocialCohesion/china_policy.html
  • Sukhankin, S. “Russia’s Offensive and Defensive Use of Information Security.” In Russia’s Military Strategy and Doctrine, edited by G. E. Howard and M. Czekaj, 302–342. Washington, DC: The Jamestown Foundation, 2019.
  • Tang, J. “How Do We Know? What Intelligence Analysis Can Learn from the Sociology of Science.” Intelligence and National Security 32, no. 2 (2017): 663–674. doi:10.1080/02684527.2017.1311473.
  • Taylor, S. A., and D. Snow. “Cold War Spies: Why They Spied and How They Got Caught.” In Intelligence: The Secret World of Spies, edited by L. K. Johnson and J. J. Wirtz, 269–279. Oxford: Oxford University Press, 1997.
  • Turner, M. “A Distinctive U.S. Intelligence Identity.” International Journal of Intelligence and Counterintelligence 17, no. 1 (2004): 42–61. doi:10.1080/08850600490252650.
  • United States Foreign Intelligence Surveillance Court. “About the Foreign Intelligence Surveillance Court.” US Government Website, 2020. Accessed December 22, 2020. https://www.fisc.uscourts.gov/about-foreign-intelligence-surveillance-court
  • Warner, M. “Wanted: A Definition of Intelligence.” Studies in Intelligence 46 (2002): 3.
  • Warner, M. “Building a Theory of Intelligence Systems.” In National Intelligence Systems, edited by G. F. Treverton and W. Agrell. Cambridge: Cambridge University Press, 2009.
  • Warner, M. “Cybersecurity: A Pre-history.” Intelligence and National Security 27, no. 5 (2012): 781–799. doi:10.1080/02684527.2012.708530.
  • Xinhua News Agency. “The General Office of the Central Committee of the Communist Party of China Issued the ‘Opinions on Strictly Cracking down on Illegal Securities Activities in Accordance with the Law’.” Chinese News Website, 2021. Accessed 7 July 2021. http://www.xinhuanet.com/politics/2021-07/06/c_1127628384.htm

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.