首页 > 最新文献

International Journal of Intelligence and Counterintelligence最新文献

英文 中文
Hunters and Gatherers: The Evolution of Strike and Intelligence Functions in Special Operations Forces 猎人和采集者:特种作战部队打击和情报功能的演变
IF 0.9 Q4 INTERNATIONAL RELATIONS Pub Date : 2023-05-08 DOI: 10.1080/08850607.2023.2197558
J. Hardy
Abstract The rapid expansion of Special Operations Forces (SOF) since the beginning of the twenty-first century is largely seen as a response to the necessity to fight the post–11 September 2001 counterterrorism wars. Strike and intelligence, previously studied as distinct functions for military forces, have been increasingly intertwined in contemporary SOF operations. This study examines the evolution of the strike and intelligence functions of the North Atlantic Treaty Organization and allied SOF in counterterrorism and counterinsurgency campaigns from 2004 to 2017. The coevolution of strike and intelligence functions in SOF operations provides unique insight into the processes of battlefield and doctrinal adaptation in counterterrorism campaigns. Opportunities for further research include links between emerging doctrine and practice in targeting enemy networks.
自21世纪初以来,特种作战部队(SOF)的迅速扩张在很大程度上被视为对2001年9月11日之后反恐战争必要性的回应。打击和情报,以前被研究为军事力量的不同功能,在当代SOF行动中日益交织在一起。本研究考察了2004年至2017年北大西洋公约组织及其盟军SOF在反恐和反叛乱运动中的打击和情报功能的演变。打击和情报功能在特种作战行动中的共同演变为反恐战役中的战场和理论适应过程提供了独特的见解。进一步研究的机会包括针对敌方网络的新兴理论和实践之间的联系。
{"title":"Hunters and Gatherers: The Evolution of Strike and Intelligence Functions in Special Operations Forces","authors":"J. Hardy","doi":"10.1080/08850607.2023.2197558","DOIUrl":"https://doi.org/10.1080/08850607.2023.2197558","url":null,"abstract":"Abstract The rapid expansion of Special Operations Forces (SOF) since the beginning of the twenty-first century is largely seen as a response to the necessity to fight the post–11 September 2001 counterterrorism wars. Strike and intelligence, previously studied as distinct functions for military forces, have been increasingly intertwined in contemporary SOF operations. This study examines the evolution of the strike and intelligence functions of the North Atlantic Treaty Organization and allied SOF in counterterrorism and counterinsurgency campaigns from 2004 to 2017. The coevolution of strike and intelligence functions in SOF operations provides unique insight into the processes of battlefield and doctrinal adaptation in counterterrorism campaigns. Opportunities for further research include links between emerging doctrine and practice in targeting enemy networks.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"2 1","pages":"1143 - 1163"},"PeriodicalIF":0.9,"publicationDate":"2023-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84130594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Muddled Attempt at Surveying a Profession 调查一个职业的混乱尝试
IF 0.9 Q4 INTERNATIONAL RELATIONS Pub Date : 2023-05-08 DOI: 10.1080/08850607.2022.2155028
Darren E. Tromblay
{"title":"Muddled Attempt at Surveying a Profession","authors":"Darren E. Tromblay","doi":"10.1080/08850607.2022.2155028","DOIUrl":"https://doi.org/10.1080/08850607.2022.2155028","url":null,"abstract":"","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"2 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90097894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parliamentary Intelligence Oversight in Romania: Between Consolidation and Controversy 罗马尼亚议会情报监督:在巩固与争议之间
IF 0.9 Q4 INTERNATIONAL RELATIONS Pub Date : 2023-05-08 DOI: 10.1080/08850607.2023.2202344
Valentin Stoian
Abstract Romania represents one of the paradigmatic cases where security sector reform proceeded quickly after the collapse of the communist regime in 1989. The former Securitate was one of the most repressive intelligence services in the communist bloc and drastic reform was necessary in order to establish an efficient and trusted domestic intelligence service. Previous research by Bruneau and Matei highlighted the important steps that Romania has undertaken over the past years and argued that an efficient and robust oversight system has been built. This article addresses contemporary debates on factors triggering reform in parliamentary intelligence and focuses on Romania’s 2017 reforms. These reforms can be analyzed through the application of the “fire alarm/police patrol” model developed by Loch K. Johnson for changes in congressional oversight. By increasing and clarifying the power of the Joint Standing Committee for the Oversight of the Romanian Intelligence Service, the 2017 changes brought more clarity and more accountability to the oversight system. After 2017, the committee reverted to a “police patrol model” focusing on visits to intelligence sites and meetings with high-level intelligence officials.
{"title":"Parliamentary Intelligence Oversight in Romania: Between Consolidation and Controversy","authors":"Valentin Stoian","doi":"10.1080/08850607.2023.2202344","DOIUrl":"https://doi.org/10.1080/08850607.2023.2202344","url":null,"abstract":"Abstract Romania represents one of the paradigmatic cases where security sector reform proceeded quickly after the collapse of the communist regime in 1989. The former Securitate was one of the most repressive intelligence services in the communist bloc and drastic reform was necessary in order to establish an efficient and trusted domestic intelligence service. Previous research by Bruneau and Matei highlighted the important steps that Romania has undertaken over the past years and argued that an efficient and robust oversight system has been built. This article addresses contemporary debates on factors triggering reform in parliamentary intelligence and focuses on Romania’s 2017 reforms. These reforms can be analyzed through the application of the “fire alarm/police patrol” model developed by Loch K. Johnson for changes in congressional oversight. By increasing and clarifying the power of the Joint Standing Committee for the Oversight of the Romanian Intelligence Service, the 2017 changes brought more clarity and more accountability to the oversight system. After 2017, the committee reverted to a “police patrol model” focusing on visits to intelligence sites and meetings with high-level intelligence officials.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"91 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73600615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Branching Out: Factors Motivating Nondemocratic Use of Commodity Spyware 扩展:促使非民主使用商业间谍软件的因素
IF 0.9 Q4 INTERNATIONAL RELATIONS Pub Date : 2023-05-08 DOI: 10.1080/08850607.2023.2202345
Katharine Palmer
Abstract Utilizing a conceptual framework of branching in—the ability of the state to utilize internal assets and mechanisms—and branching out—the solicitation of external services—this article introduces several criteria that states must fulfill in order to branch in, namely infrastructure control, offensive cyber capability, and sufficient resources. Subsequently, failure to meet one or more of these criteria forces a branch out toward commodity spyware. Nuances in this argument and the inherent features of commodity spyware also highlight the use of such services even by “branch-in capable” states. The findings within this article offer a broad overview of the factors predilecting state use of commodity spyware, with general applications for both nondemocratic and democratic states.
{"title":"Branching Out: Factors Motivating Nondemocratic Use of Commodity Spyware","authors":"Katharine Palmer","doi":"10.1080/08850607.2023.2202345","DOIUrl":"https://doi.org/10.1080/08850607.2023.2202345","url":null,"abstract":"Abstract Utilizing a conceptual framework of branching in—the ability of the state to utilize internal assets and mechanisms—and branching out—the solicitation of external services—this article introduces several criteria that states must fulfill in order to branch in, namely infrastructure control, offensive cyber capability, and sufficient resources. Subsequently, failure to meet one or more of these criteria forces a branch out toward commodity spyware. Nuances in this argument and the inherent features of commodity spyware also highlight the use of such services even by “branch-in capable” states. The findings within this article offer a broad overview of the factors predilecting state use of commodity spyware, with general applications for both nondemocratic and democratic states.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"2013 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74326390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Policy Success or Intelligence Failure? 政策成功还是情报失败?
IF 0.9 Q4 INTERNATIONAL RELATIONS Pub Date : 2023-04-24 DOI: 10.1080/08850607.2023.2195790
Scott A. Moseman
{"title":"Policy Success or Intelligence Failure?","authors":"Scott A. Moseman","doi":"10.1080/08850607.2023.2195790","DOIUrl":"https://doi.org/10.1080/08850607.2023.2195790","url":null,"abstract":"","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"83 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76292492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unwinding the Intelligence Cycle in Denmark 解开丹麦的情报循环
IF 0.9 Q4 INTERNATIONAL RELATIONS Pub Date : 2023-04-17 DOI: 10.1080/08850607.2023.2193133
T. Shakoor
Abstract The intelligence cycle has been the standard model for intelligence processes and national intelligence doctrines in the United States and Europe. However, at the same time, it is seen as theoretical flotsam from the Cold War. This study explores the cycle’s application in the Danish Defence Intelligence Services Middle East analytical department. It is a single-site explorative case study of the Middle Eastern analytic department using multiple sources in the form of formal descriptions, organograms, and qualitative interviews with intelligence and government officials to explore and compare the manifest and assumed organization. The study concludes that the cycle is merely a metaphor for a New Public Management framework in use in the Danish Defence Intelligence Service and across the Danish central administration. This framework is used for setting the annual intelligence requirements. This study is an argument for a closer look at the impact of New Public Management on European intelligence organizations.
摘要在美国和欧洲,情报周期一直是情报过程和国家情报理论的标准模型。然而,与此同时,它被视为冷战时期的理论遗留物。本研究探讨了循环在丹麦国防情报局中东分析部门的应用。这是中东分析部门的单站点探索性案例研究,使用多种来源,以正式描述、组织图和对情报和政府官员的定性访谈的形式,探索和比较明显的和假设的组织。该研究的结论是,这个周期仅仅是丹麦国防情报局和整个丹麦中央政府使用的新公共管理框架的一个隐喻。该框架用于设定年度情报要求。这项研究是为了更深入地研究新公共管理对欧洲情报组织的影响。
{"title":"Unwinding the Intelligence Cycle in Denmark","authors":"T. Shakoor","doi":"10.1080/08850607.2023.2193133","DOIUrl":"https://doi.org/10.1080/08850607.2023.2193133","url":null,"abstract":"Abstract The intelligence cycle has been the standard model for intelligence processes and national intelligence doctrines in the United States and Europe. However, at the same time, it is seen as theoretical flotsam from the Cold War. This study explores the cycle’s application in the Danish Defence Intelligence Services Middle East analytical department. It is a single-site explorative case study of the Middle Eastern analytic department using multiple sources in the form of formal descriptions, organograms, and qualitative interviews with intelligence and government officials to explore and compare the manifest and assumed organization. The study concludes that the cycle is merely a metaphor for a New Public Management framework in use in the Danish Defence Intelligence Service and across the Danish central administration. This framework is used for setting the annual intelligence requirements. This study is an argument for a closer look at the impact of New Public Management on European intelligence organizations.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"1 1","pages":"1085 - 1103"},"PeriodicalIF":0.9,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77309788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Military Intelligence in Support of EU Missions and Operations: Bridging the Strategic Vulnerability Gap 支持欧盟任务和行动的军事情报:弥合战略脆弱性差距
IF 0.9 Q4 INTERNATIONAL RELATIONS Pub Date : 2023-04-12 DOI: 10.1080/08850607.2023.2189847
Artur Gruszczak
Abstract The broad range of European Union (EU) missions and operations sets out the requirement of strategic awareness and situational assessments for effective fulfillment of operational tasks in the areas of EU-led activities. Building on the concept of coercive isomorphism, this article argues that intelligence support for common security and defense policy activities has been limited and contentious because of the vulnerability gap caused by patterns enforced by member states. Priority for national interests and assets hinders the logic of reciprocity. It lowers the value of synergetic links between the intelligence services of member states and relevant EU agencies and bodies. Regardless of numerous obstacles and limitations, the strategic vulnerability gap has been slowly bridged thanks to the development and implementation of more reliable mechanisms of intelligence cooperation within the EU.
欧盟(EU)任务和行动的广泛范围规定了战略意识和态势评估的要求,以便在欧盟主导的活动领域有效地履行业务任务。基于强制同构的概念,本文认为,由于成员国强制执行的模式造成的脆弱性差距,对共同安全和国防政策活动的情报支持受到了限制和争议。对国家利益和资产的优先考虑阻碍了互惠的逻辑。它降低了成员国情报部门与欧盟相关机构和机构之间协同联系的价值。尽管存在许多障碍和限制,但由于欧盟内部更可靠的情报合作机制的发展和实施,战略脆弱性差距已经慢慢弥合。
{"title":"Military Intelligence in Support of EU Missions and Operations: Bridging the Strategic Vulnerability Gap","authors":"Artur Gruszczak","doi":"10.1080/08850607.2023.2189847","DOIUrl":"https://doi.org/10.1080/08850607.2023.2189847","url":null,"abstract":"Abstract The broad range of European Union (EU) missions and operations sets out the requirement of strategic awareness and situational assessments for effective fulfillment of operational tasks in the areas of EU-led activities. Building on the concept of coercive isomorphism, this article argues that intelligence support for common security and defense policy activities has been limited and contentious because of the vulnerability gap caused by patterns enforced by member states. Priority for national interests and assets hinders the logic of reciprocity. It lowers the value of synergetic links between the intelligence services of member states and relevant EU agencies and bodies. Regardless of numerous obstacles and limitations, the strategic vulnerability gap has been slowly bridged thanks to the development and implementation of more reliable mechanisms of intelligence cooperation within the EU.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"12 1","pages":"1104 - 1121"},"PeriodicalIF":0.9,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85129436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Counterintelligence Black Swan: KGB Deception, Countersurveillance, and Active Measures Operation 反情报黑天鹅:克格勃欺骗、反监视和积极措施行动
IF 0.9 Q4 INTERNATIONAL RELATIONS Pub Date : 2023-04-12 DOI: 10.1080/08850607.2023.2192374
A. Magee
Abstract In January 1990, a U.S counterintelligence surveillance team supporting a priority counterespionage investigation in Munich, West Germany, became engaged in a hostile encounter that was unlike anything ever experienced. The event was recorded as an “aggressive, hostile countersurveillance effort,” but with the U.S. victory in the Cold War, the dissolution of the Soviet Union, and the dismantlement of the State Committee for Security, the investigative record was inconclusively filed away before the applicable lessons could be captured. After 30+ years, the declassified details of the investigation and the sequence of events leading to this fateful Munich night is examined under an inductive causal analysis to deconstruct the events using a case study methodology. After a comprehensive analysis, it becomes evident that the engagement was mischaracterized, and the hostile operation had much broader implications. While the hostile engagement was a black swan event, the sequence of events in the investigation leading to this final act was a microcosm of the larger Soviet strategic disinformation, misdirection, and manipulation apparatus. Three decades after fading into obscurity under a veil of classification restrictions, counterintelligence professionals, intelligence analysts, and intelligence historians can now benefit from the still-relevant lessons and other insights from this case study.
{"title":"Counterintelligence Black Swan: KGB Deception, Countersurveillance, and Active Measures Operation","authors":"A. Magee","doi":"10.1080/08850607.2023.2192374","DOIUrl":"https://doi.org/10.1080/08850607.2023.2192374","url":null,"abstract":"Abstract In January 1990, a U.S counterintelligence surveillance team supporting a priority counterespionage investigation in Munich, West Germany, became engaged in a hostile encounter that was unlike anything ever experienced. The event was recorded as an “aggressive, hostile countersurveillance effort,” but with the U.S. victory in the Cold War, the dissolution of the Soviet Union, and the dismantlement of the State Committee for Security, the investigative record was inconclusively filed away before the applicable lessons could be captured. After 30+ years, the declassified details of the investigation and the sequence of events leading to this fateful Munich night is examined under an inductive causal analysis to deconstruct the events using a case study methodology. After a comprehensive analysis, it becomes evident that the engagement was mischaracterized, and the hostile operation had much broader implications. While the hostile engagement was a black swan event, the sequence of events in the investigation leading to this final act was a microcosm of the larger Soviet strategic disinformation, misdirection, and manipulation apparatus. Three decades after fading into obscurity under a veil of classification restrictions, counterintelligence professionals, intelligence analysts, and intelligence historians can now benefit from the still-relevant lessons and other insights from this case study.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"1 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73792888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Failed Intelligence Reform, State Capture, and Authoritarian Turn in Serbia 塞尔维亚失败的情报改革、国家俘虏和独裁主义转变
IF 0.9 Q4 INTERNATIONAL RELATIONS Pub Date : 2023-04-12 DOI: 10.1080/08850607.2023.2189037
P. Petrović
Abstract Two decades after the overthrow of the autocratic regime of Slobodan Milosevic, security intelligence agencies in Serbia are not only far from being reformed, but they play a central role in democracy decline and what many academics and policy officials describe as state capture. Intelligence agencies are among the first victims of state capture and among the major instruments in further capturing state institutions. This process has been a product of the agreed transition from autocracy to democracy that prevented bloodshed but maintained a clientelist relationship between (new) democratic leadership and the (old) security apparatus. Consequently, thorough intelligence reform never happened, resulting in the survival of agencies’ strongholds of power, which facilitated the return to old secret police practice. It is not uncommon today that among important tasks of security intelligence are regime protection through suppression of political opposition and critical voices, as well as making sure that suspicious deals of those close to the ruling party run smoothly. This article aims to map and analyze events and processes that have led to these outcomes and describe how security intelligence is being instrumentalized by the ruling political party and its leader, Aleksandar Vucic.
{"title":"Failed Intelligence Reform, State Capture, and Authoritarian Turn in Serbia","authors":"P. Petrović","doi":"10.1080/08850607.2023.2189037","DOIUrl":"https://doi.org/10.1080/08850607.2023.2189037","url":null,"abstract":"Abstract Two decades after the overthrow of the autocratic regime of Slobodan Milosevic, security intelligence agencies in Serbia are not only far from being reformed, but they play a central role in democracy decline and what many academics and policy officials describe as state capture. Intelligence agencies are among the first victims of state capture and among the major instruments in further capturing state institutions. This process has been a product of the agreed transition from autocracy to democracy that prevented bloodshed but maintained a clientelist relationship between (new) democratic leadership and the (old) security apparatus. Consequently, thorough intelligence reform never happened, resulting in the survival of agencies’ strongholds of power, which facilitated the return to old secret police practice. It is not uncommon today that among important tasks of security intelligence are regime protection through suppression of political opposition and critical voices, as well as making sure that suspicious deals of those close to the ruling party run smoothly. This article aims to map and analyze events and processes that have led to these outcomes and describe how security intelligence is being instrumentalized by the ruling political party and its leader, Aleksandar Vucic.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"42 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83263215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Looking Back at the Gouzenko Defection 回顾古琴科叛逃事件
IF 0.9 Q4 INTERNATIONAL RELATIONS Pub Date : 2023-04-03 DOI: 10.1080/08850607.2022.2080982
Angela Gendron
Abstract A historical perspective aids our understanding of the present and capacity to anticipate the future. Russia’s invasion of Ukraine in 2022, but particularly its brutality and policy of “constructive destruction,” was shocking and unexpected, but faced with Russia’s relegation from superpower status, it was always a possibility that Putin would emulate Stalin’s determination to maintain Russian influence in the world and challenge the West’s dominance. The risk of recurrent totalitarianism borne of the fear, distrust, and mutual demonization which characterized the ideological rivalry of the early Cold War years has led to a search for historical analogies of relevance to the growing East/West tensions of today that threaten to bring about a second Cold War or limited nuclear conflict. The motivating ideology for Russian expansionism is no longer Communism, but a mythical narrative that promotes Russian nationalism, patriotism, and exceptionalism. Putin’s authoritarian state with its concentration of power and recourse to propaganda, disinformation, and lies is daily looking more Stalinesque and the Cold War question—how to contain Russian ambition—remains to be answered. While the focus has so far been on Stalin’s geopolitical strategy regarding Russia’s near neighbors, two books about the first post–World War II defection in 1945 merit re-visiting for the in-depth analysis and insights they provide into the period and the mindset of participants caught up in that affair. The defector, Igor Gouzenko, a Russian cyber clerk, insisted that Russia was preparing for a Third World War. His revelations precipitated the start of the Cold War.
历史观点有助于我们理解现在和预测未来的能力。俄罗斯在2022年入侵乌克兰,尤其是其暴行和“建设性破坏”政策令人震惊和意外,但面对俄罗斯从超级大国地位上的下降,普京总是有可能效仿斯大林的决心,保持俄罗斯在世界上的影响力,挑战西方的主导地位。恐惧、不信任和相互妖魔化是冷战早期意识形态对抗的特征,极权主义复发的风险导致人们开始寻找与今天日益增长的东西方紧张关系相关的历史类比,这种紧张关系可能会带来第二次冷战或有限的核冲突。推动俄罗斯扩张主义的意识形态不再是共产主义,而是一种促进俄罗斯民族主义、爱国主义和例外论的神话叙事。普京的集权国家依靠宣传、虚假信息和谎言,越来越像斯大林,而冷战时期的问题——如何遏制俄罗斯的野心——仍有待回答。虽然到目前为止,人们关注的是斯大林对俄罗斯邻国的地缘政治战略,但有两本关于1945年第二次世界大战后的第一次叛逃的书值得重新审视,因为它们对那个时期和卷入该事件的参与者的心态进行了深入的分析和洞察。叛逃者Igor Gouzenko是一名俄罗斯网络职员,他坚持认为俄罗斯正在为第三次世界大战做准备。他的揭露加速了冷战的开始。
{"title":"Looking Back at the Gouzenko Defection","authors":"Angela Gendron","doi":"10.1080/08850607.2022.2080982","DOIUrl":"https://doi.org/10.1080/08850607.2022.2080982","url":null,"abstract":"Abstract A historical perspective aids our understanding of the present and capacity to anticipate the future. Russia’s invasion of Ukraine in 2022, but particularly its brutality and policy of “constructive destruction,” was shocking and unexpected, but faced with Russia’s relegation from superpower status, it was always a possibility that Putin would emulate Stalin’s determination to maintain Russian influence in the world and challenge the West’s dominance. The risk of recurrent totalitarianism borne of the fear, distrust, and mutual demonization which characterized the ideological rivalry of the early Cold War years has led to a search for historical analogies of relevance to the growing East/West tensions of today that threaten to bring about a second Cold War or limited nuclear conflict. The motivating ideology for Russian expansionism is no longer Communism, but a mythical narrative that promotes Russian nationalism, patriotism, and exceptionalism. Putin’s authoritarian state with its concentration of power and recourse to propaganda, disinformation, and lies is daily looking more Stalinesque and the Cold War question—how to contain Russian ambition—remains to be answered. While the focus has so far been on Stalin’s geopolitical strategy regarding Russia’s near neighbors, two books about the first post–World War II defection in 1945 merit re-visiting for the in-depth analysis and insights they provide into the period and the mindset of participants caught up in that affair. The defector, Igor Gouzenko, a Russian cyber clerk, insisted that Russia was preparing for a Third World War. His revelations precipitated the start of the Cold War.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"9 1","pages":"613 - 625"},"PeriodicalIF":0.9,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82140633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Intelligence and Counterintelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1