The Implications of Intelligence Practice Within and Beyond the State: An Analytical Model
Abstract
The study of the democratisation of intelligence in former authoritarian regimes and, more broadly, the relationship between intelligence and democracy, has hitherto concentrated on state intelligence services. The article challenges the utility of this state-centric model and considers the significance of corporate and para-state sectors of intelligence including their multiple interactions with states. ‘Securitism’ is developed as a model of these interactions which can be used in the analysis of contemporary intelligence governance and the profound challenges posed to the possibility of democratic control and oversight.
References
Arias, Enrique. 2010. ‘Understanding Criminal Networks, Political Order, and Politics in Latin America.’ In Ungoverned Spaces: Alternatives to State Authority in an Era of Softened Sovereignty, edited by Anne Clunan and Harold Trinkunas, 115−35. Stanford: Stanford University Press.
Arias, Enrique and Daniel Goldstein. 2010. ‘Violent Pluralism: Understanding the New Democracies of Latin America.’ In Violent Democracies in Latin America, edited by Arias and Goldstein, 1−34. Durham: Duke University Press.
Avant, Deborah. 2005. The Market for Force: The Consequences of Privatizing Security. Cambridge: Cambridge University Press.
Bamford, James. 2012. ‘The NSA is Building the Country’s Biggest Spy Center (Watch What You Say)’. Accessed July 7, 2013. http://www.wired.com/threatlevel/, March 15, 2012.
Bokshi, Alban. 2011, ‘SHIK File’, Periskopi, 6, November, Pristina: Foreign Policy Club.
Bozeman, Adda. 1992. ‘Knowledge and Method in Comparative Intelligence Studies of Non-Western Societies.’ In Strategic Intelligence and Statecraft, edited by Bozeman, 180−212. Washington DC: Brasseys.
Cameron, Iain. 2000. National Security and the European Convention of Human Rights. The Hague: Kluwer Law International.
Cawson, Alan. 1986. Corporatism and Political Theory. Oxford: Blackwell.
Frances, Jennifer et al. 1991. ‘Introduction.’ In Markets, Hierarchies, Networks, edited by Grahame Thompson, Jennifer Frances, Rosalind Levačić and Jeremy Mitchell, 1−19. London: Sage.
Chesterman, Simon. 2008. ‘”We Can’t Spy...If We Can’t Buy!” The privatization of intelligence and the limits of outsourcing “inherently governmental functions”.’ European Journal of International Law, 19(5): 1055−74.
Clunan, Anne L. and Harold A. Trinkunas. 2010. ‘Conceptualizing Ungoverned Spaces: territorial statehood, contested authority, and softened sovereignty,’ In Ungoverned Spaces: alternative to state authority in an era of softened sovereignty, edited by Clunan and Trinkunas, 17−33. Stanford: Stanford UP.
de Jong, Ben, Wies Platje and Robert Steele (eds.) 2003. Peacekeeping Intelligence: emerging concepts for the future. Oakton, VA: OSS International.
de Silva, Desmond. 2012. Patrick Finucane Review: an independent review into any state involvement in the murder of Patrick Finucane. Accessed November 18, 2012. http://www.patfinucanereview.org/index.html
Diamint, Rut. 2007. ‘Military, Police, Politics, and Society; Does Latin America Have a Democratic Model.’ In The Construction of Democracy: Lessons from Practice and Research, edited by Jorge Domínguez and Anthony Jones, 161−89. Baltimore: The Johns Hopkins Press.
Dombrowski, Kenneth. 2007. ‘Transforming Intelligence in South Africa.’ In Reforming Intelligence, edited by Tom Bruneau and Steven Boraz, 241−68. Austin: University of Texas Press.
Edmunds, Timothy. 2008. ‘Intelligence Agencies and Democratisation: Continuity and Change in Serbia after Milošević.’ Europe−Asia Studies, 60 (1): 25−48.
Fry, Michael and Miles Hochstein. 1993. ‘Epistemic Communities; Intelligence Studies and International Relations.’ Intelligence and National Security 8(3) 14−28.
Gill, Peter. 2011. ‘Inquiring into Dirty Wars: a “huge smokescreen of humbug”?’ In Commissions of Inquiry and National Security, edited by Stuart Farson and Mark Phythian, 78−97. Santa Barbara: ABC−Clio.
Gill, Peter and Mark Phythian. 2012. Intelligence in an Insecure World. Cambridge: Polity.
Gill, Peter and Lee Wilson. 2013. ‘Intelligence and Security Sector Reform in Indonesia,’ In, Intelligence Elsewhere: Spies and Espionage Outside the Anglosphere, edited by Philip Davies and Kristian Gustafson, 157−80. Washington DC: Georgetown UP.
Grodsky, Brian. 2009. ‘From Neo-Corporatism to Delegative Corporatism? Empowerment of NGOs During Early Democratization.’ Democratization, 16(5): 898−921.
Hennessy, Peter. 2007. ‘From Secret State to Protective State.’ In The New Protective State: Government, Intelligence and Terrorism, edited by Hennessy, 1−41. London: Continuum.
Hoogenboom, Bob. 2006. ‘Grey Intelligence.’ Crime, Law and Social Change 45(4): 373−81.
Jessop, Bob. 2008. State Power: A Strategic−Relational Approach. Cambridge: Polity.
Huggins, Martha K. 2000. ‘Modernity and Devolution: The making of Police Death Squads in Brazil.’ In Death Squads in Global Perspective, edited by Bruce Campbell and Arthur Brenner, 203−28. Houndmills: Macmillan.
Kahaner, Larry. 1996. Competitive Intelligence: How to Gather, Analyze, and Use Information to Move Your Business to the Top. New York: Touchstone.
Kaldor, Mary. 2003. Global Civil Society: An Answer to War. Cambridge: Polity.
Kinsey, Christopher. 2008. ‘Private Security Companies and Corporate Social Responsibility.’ In, Private Military and Security Companies: Ethics, Policies and Civil-Military Relations, edited Andrew Alexander, Deane-Peter Baker and Marina Caparini, 70−86. London: Routledge.
Kocsis, Kalman. 2008. ‘Bosnia and Herzegovina.’ In PSI Handbook of Global Security and Intelligence, National Approaches, edited by Stuart Farson, Peter Gill, Mark Phythian and Shlomo Shpiro, Vol. 2, 439−55. Westport CT: Praeger Security International.
Krahmann, Elke. 2010. States, Citizens and the Privatization of Security. Cambridge: Cambridge UP.
Landman, Todd. 2010. ‘Violence, Democracy and Human Rights in Latin America.’ In Violent Democracies in Latin America, edited by Enrique Desmond Arias and Daniel Goldstein, 226−241. Durham and London: Duke University Press.
Loader, Ian and Neil Walker. 2007. Civilizing Security. Cambridge: Cambridge University Press.
Lustgarten, Laurence and Ian Leigh. 1994. In From the Cold. Clarendon Press: Oxford.
McDonald, D.C. 1981. Commission of Inquiry Concerning Certain Activities of the RCMP, 2nd report, Volume 1: Freedom and Security Under the Law. Ottawa: Minister of Supply and Services.
Norwitz, Jeffrey. 2009. Pirates, Terrorists, and Warlords: The History, Influence, and Future of Armed Groups Around the World. New York: Skyhorse Publishing.
Lubbers, Eveline. 2012. Secret Manoeuvres in the Dark: Corporate and Police Spying on Activists. London: Pluto Books.
O’Brien, Kevin 2008. ‘South Africa.’ In PSI Handbook of Global Security and Intelligence, National Approaches, edited by Stuart Farson, Peter Gill, Mark Phythian and Shlomo Shpiro, Vol. 2, 619−50. Westport, CT: Praeger Security International.
O’Donnell, Guillermo. 1977. ‘Corporatism and the Question of the State.’ In, Authoritarianism and Corporatism in Latin America, edited by James Malloy, 47−87. University of Pittsburgh Press,
Omand, David. 2010. Securing the State. London: Hurst and Co.
O’Reilly, Conor. 2010. ‘The Transnational Security Consultancy Industry: A Case of State-Corporate Symbiosis.’ Theoretical Criminology, 14 (2): 183−210.
Peeler, John. 2004. Building Democracy in Latin America. 2nd edn., London: Lynne Rienner.
Petrović, Predrag. 2011. Reserved Domains as Obstacles to Normative Regulation of Private Security Sector in Serbia.’ Working Paper 1, Belgrade: Belgrade Centre for Security Policy.
Phillips, David. 2010. ‘The Balkans’ Underbelly.’ World Policy Journal, 27(3): 93−98.
Priest, Dana and William M. Arkin. 2011. Top Secret America: The Rise of The New American Security State. New York: Little, Brown and Co.
Ranelagh, John. 1987. The Agency: The Rise and Decline of the CIA. New York: Simon and Schuster.
Rhodes, R.A.W.1997. Understanding Governance: Policy Networks, Governance, Reflexivity and Accountability. Buckingham: Open University Press.
Risse, Thomas. 2005. ‘Global Governance and Communicative Action.’ In Global Governance and Public Accountability, edited by David Held and Mathias Koenig- Archibugi, 164−89. Oxford: Blackwell.
Scahill, Jeremy. 2007. Blackwater: The Rise of the World’s Most Powerful Mercenary Army. London: Serpent’s Tail.
Schaap, L. and M.J.W. van Twist. 1997. ‘The Dynamics of Closedness in Networks.’ In Managing Complex Networks: Strategies for the Public Sector, edited by Walter J.M. Kickert, Erik-Hans Klijn and Joop F.M. Koppenjan, 62−78. London: Sage.
Sharp, Seena. 2009. Competitive Intelligence Advantage: How to Minimize Risk, Avoid Surprises and Grow Your Business in a Changing World. Hoboken, NJ: John Wiley and Sons.
Shorrock, Tim. 2008. Spies for Hire: The Secret World of Intelligence Outsourcing. New York: Simon and Schuster.
Shpiro, Shlomo. 2003. ‘Intelligence, Peacekeeping and Peacemaking in the Middle East.’ In Peacekeeping Intelligence, eds. de Jong, Ben, Wies Platje and Robert Steele, 101−14. Oakton VA: OSS International Press.
Singer, Peter. 2003. Corporate Warriors: The Rise of the Privatized Military Industry. Ithaca: Cornell University Press.
SOCA. 2008. Private Investigators: The Rogue Element of the Private Investigation Industry and Others Unlawfully Trading in Personal Data. Accessed September 3, 2013. http://www.exaronews.com/articles/5062/unredacted-soca-s-confidential- report-on-private-detectives
Tilly, Charles. 2007. Democracy. Cambridge: CUP.
Warner, Michael. 2009 ‘Intelligence as Risk Shifting.’ In Intelligence Theory: Key Questions and Debates, edited by Peter Gill, Stephen Marrin and Mark Phythian, 16−32. London: Routledge.
Woodward, Susan L. 2003. ‘In Whose Interest is Security Sector Reform? Lessons from the Balkans.’ In Governing Insecurity: Democratic Control of Military and Security Establishments in Transitional Democracies, edited by Gavin Cawthra and Robin Luckham, 276−302. London: Zed Books.
Authors retain copyright of the published papers and grant to the publisher the non-exclusive right to publish the article, to be cited as its original publisher in case of reuse, and to distribute it in all forms and media.
The published articles will be distributed under the Creative Commons Attribution 4.0 International License (CC BY). It is allowed to copy and redistribute the material in any medium or format, and remix, transform, and build upon it for any purpose, even commercially, as long as appropriate credit is given to the original author(s), a link to the license is provided and it is indicated if changes were made. / The published articles will be distributed under the Creative Commons Attribution ShareAlike 4.0 International license (CC BY-SA). It is allowed to copy and redistribute the material in any medium or format, and remix, transform, and build upon it for any purpose, even commercially, as long as appropriate credit is given to the original author(s), a link to the license is provided, it is indicated if changes were made and the new work is distributed under the same license as the original.
Users are required to provide full bibliographic description of the original publication (authors, article title, journal title, volume, issue, pages), as well as its DOI code. In electronic publishing, users are also required to link the content with both the original article published in Journal of Regional Security and the licence used.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Authors are permitted to deposit author’s pre-print / author’s post-print (accepted version) / publisher's version (PDF) of their work in an institutional repository, subject-based repository, author's personal website (including social networking sites, such as ResearchGate, Academia.edu, etc.), and/or departmental website prior or during the submission process / at any time after the acceptance of the manuscript / at any time after publication.
Full bibliographic information (authors, article title, journal title, volume, issue, pages) about the original publication must be provided and links must be made to the article's DOI and the license.