Lindsey A. O’Rourke
- Published in print:
- 2018
- Published Online:
- January 2022
- ISBN:
- 9781501730658
- eISBN:
- 9781501730689
- Item type:
- chapter
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9781501730658.003.0003
- Subject:
- History, American History: 20th Century
This chapter explores why states intervene covertly versus overtly during their regime changes. First, it discusses the two major tactical factors weighed by policymakers. It then looks at leaders' ...
More
This chapter explores why states intervene covertly versus overtly during their regime changes. First, it discusses the two major tactical factors weighed by policymakers. It then looks at leaders' broader geostrategic considerations. Afterward, the chapter explains why both tactical and strategic considerations favor covert conduct, and it discusses the conditions under which states will intervene overtly. Next, the five types of covert tactics employed by states during their regime changes are laid out. Finally, the chapter argues that the conduct of a regime change is best thought of as falling along a continuum between truly covert and directly overt action, and it investigates the phenomenon of “pseudo-covert operations,” that is, regime changes where the intervening state officially denies its role even though all parties involved seem to know of its participation.Less
This chapter explores why states intervene covertly versus overtly during their regime changes. First, it discusses the two major tactical factors weighed by policymakers. It then looks at leaders' broader geostrategic considerations. Afterward, the chapter explains why both tactical and strategic considerations favor covert conduct, and it discusses the conditions under which states will intervene overtly. Next, the five types of covert tactics employed by states during their regime changes are laid out. Finally, the chapter argues that the conduct of a regime change is best thought of as falling along a continuum between truly covert and directly overt action, and it investigates the phenomenon of “pseudo-covert operations,” that is, regime changes where the intervening state officially denies its role even though all parties involved seem to know of its participation.
Lindsey A. O’Rourke
- Published in print:
- 2018
- Published Online:
- January 2022
- ISBN:
- 9781501730658
- eISBN:
- 9781501730689
- Item type:
- chapter
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9781501730658.003.0005
- Subject:
- History, American History: 20th Century
This chapter provides a historical overview of America's experience with regime change during the Cold War. Looking at the broad trends in America's regime change policy highlights the shifting ...
More
This chapter provides a historical overview of America's experience with regime change during the Cold War. Looking at the broad trends in America's regime change policy highlights the shifting security interests driving U.S. behavior over this period, the reasons why leaders preferred covert conduct, and the general utility of covert operations. The chapter is split into three sections. These correspond to the three types of security interests motivating these operations: offensive, preventive, and hegemonic. Each section outlines the motives behind that type of regime change, followed by a discussion of how each type of operation fulfilled the two prerequisites for intervention introduced in Chapter 2: namely, that they were in response to a chronic, security-oriented interstate dispute and that the intervening state must have identified a plausible political alternative to the target regime. Although the chapter deals with both covert and overt cases, the six overt cases receive closer individual attention because they pose a stronger challenge to the assertion that states generally prefer to conduct their regime changes covertly.Less
This chapter provides a historical overview of America's experience with regime change during the Cold War. Looking at the broad trends in America's regime change policy highlights the shifting security interests driving U.S. behavior over this period, the reasons why leaders preferred covert conduct, and the general utility of covert operations. The chapter is split into three sections. These correspond to the three types of security interests motivating these operations: offensive, preventive, and hegemonic. Each section outlines the motives behind that type of regime change, followed by a discussion of how each type of operation fulfilled the two prerequisites for intervention introduced in Chapter 2: namely, that they were in response to a chronic, security-oriented interstate dispute and that the intervening state must have identified a plausible political alternative to the target regime. Although the chapter deals with both covert and overt cases, the six overt cases receive closer individual attention because they pose a stronger challenge to the assertion that states generally prefer to conduct their regime changes covertly.
Lindsey A. O’Rourke
- Published in print:
- 2018
- Published Online:
- January 2022
- ISBN:
- 9781501730658
- eISBN:
- 9781501730689
- Item type:
- chapter
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9781501730658.003.0006
- Subject:
- History, American History: 20th Century
This chapter explores the causes, conduct, and consequences of the understudied American covert operations in Eastern Europe and the Soviet Union. It first explains why these cases were selected. ...
More
This chapter explores the causes, conduct, and consequences of the understudied American covert operations in Eastern Europe and the Soviet Union. It first explains why these cases were selected. Next, the chapter describes the collective context and objectives of these missions. Third, it asks why the Truman and Eisenhower administrations opted for covert — rather than overt — conduct. The chapter then offers a comparative historical analysis of three cases: Albania, the Ukrainian Soviet Socialist Republic, and Yugoslavia. It considers why the United States intervened in the first two cases, but not in Yugoslavia, even though all were communist regimes. The case studies also address the reasons the missions in Albania and Ukraine failed, and discusses the pros and cons of covert conduct. Finally, the chapter concludes by drawing out the theoretical lessons of these cases.Less
This chapter explores the causes, conduct, and consequences of the understudied American covert operations in Eastern Europe and the Soviet Union. It first explains why these cases were selected. Next, the chapter describes the collective context and objectives of these missions. Third, it asks why the Truman and Eisenhower administrations opted for covert — rather than overt — conduct. The chapter then offers a comparative historical analysis of three cases: Albania, the Ukrainian Soviet Socialist Republic, and Yugoslavia. It considers why the United States intervened in the first two cases, but not in Yugoslavia, even though all were communist regimes. The case studies also address the reasons the missions in Albania and Ukraine failed, and discusses the pros and cons of covert conduct. Finally, the chapter concludes by drawing out the theoretical lessons of these cases.
Timothy Melley
- Published in print:
- 2012
- Published Online:
- August 2016
- ISBN:
- 9780801451232
- eISBN:
- 9780801465918
- Item type:
- chapter
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9780801451232.003.0001
- Subject:
- Literature, American, 20th Century Literature
This introductory chapter discusses the emergence of covert state agencies and the covert sphere. During the Truman administration in 1947, the National Security Act established the Central ...
More
This introductory chapter discusses the emergence of covert state agencies and the covert sphere. During the Truman administration in 1947, the National Security Act established the Central Intelligence Agency (CIA) and placed it under the guidance of a new National Security Council (NSC) within the executive branch. In the next four years, the CIA's covert operations section grew by 2,000 percent. This led to the rise of the covert sphere, a cultural imaginary shaped by both institutional secrecy and public fascination with the secret work of the state. It is an array of discursive forms and cultural institutions such as novels, films, television series, and electronic games, through which the public can discuss or fantasize the covert aspects of the state. This book argues that the covert sphere inspired a large body of narrative and visual culture, generated cynicism about the government, raised skepticism about historical narrative, and contributed significantly to the rise of postmodernism.Less
This introductory chapter discusses the emergence of covert state agencies and the covert sphere. During the Truman administration in 1947, the National Security Act established the Central Intelligence Agency (CIA) and placed it under the guidance of a new National Security Council (NSC) within the executive branch. In the next four years, the CIA's covert operations section grew by 2,000 percent. This led to the rise of the covert sphere, a cultural imaginary shaped by both institutional secrecy and public fascination with the secret work of the state. It is an array of discursive forms and cultural institutions such as novels, films, television series, and electronic games, through which the public can discuss or fantasize the covert aspects of the state. This book argues that the covert sphere inspired a large body of narrative and visual culture, generated cynicism about the government, raised skepticism about historical narrative, and contributed significantly to the rise of postmodernism.
Austin Carson
- Published in print:
- 2018
- Published Online:
- May 2019
- ISBN:
- 9780691181769
- eISBN:
- 9780691184241
- Item type:
- book
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691181769.001.0001
- Subject:
- Political Science, International Relations and Politics
This is the first book to systematically analyze the ways that powerful states covertly participate in foreign wars, showing a recurring pattern of such behavior stretching from World War I to ...
More
This is the first book to systematically analyze the ways that powerful states covertly participate in foreign wars, showing a recurring pattern of such behavior stretching from World War I to U.S.-occupied Iraq. Investigating what governments keep secret during wars and why, the book argues that leaders maintain the secrecy of state involvement as a response to the persistent concern of limiting war. Keeping interventions “backstage” helps control escalation dynamics, insulating leaders from domestic pressures while communicating their interest in keeping a war contained. It shows that covert interventions can help control escalation, but they are almost always detected by other major powers. However, the shared value of limiting war can lead adversaries to keep secret the interventions they detect, as when American leaders concealed clashes with Soviet pilots during the Korean War. Escalation concerns can also cause leaders to ignore covert interventions that have become an open secret. From Nazi Germany's role in the Spanish Civil War to American covert operations during the Vietnam War, the book presents new insights about some of the most influential conflicts of the twentieth century. Parting the curtain on the secret side of modern war, the book provides important lessons about how rival state powers collude and compete, and the ways in which they avoid outright military confrontations.Less
This is the first book to systematically analyze the ways that powerful states covertly participate in foreign wars, showing a recurring pattern of such behavior stretching from World War I to U.S.-occupied Iraq. Investigating what governments keep secret during wars and why, the book argues that leaders maintain the secrecy of state involvement as a response to the persistent concern of limiting war. Keeping interventions “backstage” helps control escalation dynamics, insulating leaders from domestic pressures while communicating their interest in keeping a war contained. It shows that covert interventions can help control escalation, but they are almost always detected by other major powers. However, the shared value of limiting war can lead adversaries to keep secret the interventions they detect, as when American leaders concealed clashes with Soviet pilots during the Korean War. Escalation concerns can also cause leaders to ignore covert interventions that have become an open secret. From Nazi Germany's role in the Spanish Civil War to American covert operations during the Vietnam War, the book presents new insights about some of the most influential conflicts of the twentieth century. Parting the curtain on the secret side of modern war, the book provides important lessons about how rival state powers collude and compete, and the ways in which they avoid outright military confrontations.
Lindsey A. O'Rourke
- Published in print:
- 2018
- Published Online:
- January 2022
- ISBN:
- 9781501730658
- eISBN:
- 9781501730689
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9781501730658.001.0001
- Subject:
- History, American History: 20th Century
States seldom resort to war to overthrow their adversaries. They are more likely to attempt to covertly change the opposing regime, by assassinating a foreign leader, sponsoring a coup d'état, ...
More
States seldom resort to war to overthrow their adversaries. They are more likely to attempt to covertly change the opposing regime, by assassinating a foreign leader, sponsoring a coup d'état, meddling in a democratic election, or secretly aiding foreign dissident groups. This book shows us how states really act when trying to overthrow another state. The book argues that conventional focus on overt cases misses the basic causes of regime change. It provides substantive evidence of types of security interests that drive states to intervene. Offensive operations aim to overthrow a current military rival or break up a rival alliance. Preventive operations seek to stop a state from taking certain actions, such as joining a rival alliance, that may make them a future security threat. Hegemonic operations try to maintain a hierarchical relationship between the intervening state and the target government. Despite the prevalence of covert attempts at regime change, most operations fail to remain covert and spark blowback in unanticipated ways. The book assembles an original dataset of all American regime change operations during the Cold War. This fund of information shows the United States was ten times more likely to try covert rather than overt regime change during the Cold War. The dataset allows the book to address three foundational questions: What motivates states to attempt foreign regime change? Why do states prefer to conduct these operations covertly rather than overtly? How successful are such missions in achieving their foreign policy goals?Less
States seldom resort to war to overthrow their adversaries. They are more likely to attempt to covertly change the opposing regime, by assassinating a foreign leader, sponsoring a coup d'état, meddling in a democratic election, or secretly aiding foreign dissident groups. This book shows us how states really act when trying to overthrow another state. The book argues that conventional focus on overt cases misses the basic causes of regime change. It provides substantive evidence of types of security interests that drive states to intervene. Offensive operations aim to overthrow a current military rival or break up a rival alliance. Preventive operations seek to stop a state from taking certain actions, such as joining a rival alliance, that may make them a future security threat. Hegemonic operations try to maintain a hierarchical relationship between the intervening state and the target government. Despite the prevalence of covert attempts at regime change, most operations fail to remain covert and spark blowback in unanticipated ways. The book assembles an original dataset of all American regime change operations during the Cold War. This fund of information shows the United States was ten times more likely to try covert rather than overt regime change during the Cold War. The dataset allows the book to address three foundational questions: What motivates states to attempt foreign regime change? Why do states prefer to conduct these operations covertly rather than overtly? How successful are such missions in achieving their foreign policy goals?
George Perkovich and Toby Dalton
- Published in print:
- 2016
- Published Online:
- August 2016
- ISBN:
- 9780199467495
- eISBN:
- 9780199087112
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199467495.003.0005
- Subject:
- Political Science, International Relations and Politics
This chapter explores whether, how, and to what effect India could concentrate on a more symmetrical covert strategy to deter and counter terrorism from Pakistan by fomenting insurgency and disorder ...
More
This chapter explores whether, how, and to what effect India could concentrate on a more symmetrical covert strategy to deter and counter terrorism from Pakistan by fomenting insurgency and disorder in Pakistan itself. After a brief historical overview of covert operations in India and Pakistan, the chapter assesses the benefits and risks of various covert operations, including targeting killing and economic sabotage, as well as the state of Indian capabilities that would be required to execute these operations. The increased use of covert operations also carries risks, including important reputational risks. Still, symmetry and proportionality may enhance the deterrence and compellence effects of this option. Indeed, the threat of symmetrically balancing Pakistan’s longstanding use of sub-conventional operations could open space for bargaining to achieve a more peaceful modus vivendi between the two antagonists.Less
This chapter explores whether, how, and to what effect India could concentrate on a more symmetrical covert strategy to deter and counter terrorism from Pakistan by fomenting insurgency and disorder in Pakistan itself. After a brief historical overview of covert operations in India and Pakistan, the chapter assesses the benefits and risks of various covert operations, including targeting killing and economic sabotage, as well as the state of Indian capabilities that would be required to execute these operations. The increased use of covert operations also carries risks, including important reputational risks. Still, symmetry and proportionality may enhance the deterrence and compellence effects of this option. Indeed, the threat of symmetrically balancing Pakistan’s longstanding use of sub-conventional operations could open space for bargaining to achieve a more peaceful modus vivendi between the two antagonists.
Lindsey A. O’Rourke
- Published in print:
- 2018
- Published Online:
- January 2022
- ISBN:
- 9781501730658
- eISBN:
- 9781501730689
- Item type:
- chapter
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9781501730658.003.0009
- Subject:
- History, American History: 20th Century
This chapter briefly discusses the state of America's attempts at covert regime changes during the Cold War, before turning to the state of covert operations in the post-Cold War era. It shows that ...
More
This chapter briefly discusses the state of America's attempts at covert regime changes during the Cold War, before turning to the state of covert operations in the post-Cold War era. It shows that the vast majority of America's covert and overt regime changes during the Cold War did not work out as their planners intended. Washington launched these regime changes to resolve security-oriented interstate disputes by installing foreign leaders with similar policy preferences. American experiences during the Cold War, however, illustrate that this was often quite difficult in practice. And yet, as the chapter reveals, the end of the Cold War did not mean the end of America's aggressive pursuit of regime change. In the twenty-seven years since the fall of the Soviet Union, Washington has continued to habitually intervene both covertly and overtly throughout the world. Although U.S. policymakers' appetite for regime change has not diminished, America's post-Cold War interventions have taken on new forms.Less
This chapter briefly discusses the state of America's attempts at covert regime changes during the Cold War, before turning to the state of covert operations in the post-Cold War era. It shows that the vast majority of America's covert and overt regime changes during the Cold War did not work out as their planners intended. Washington launched these regime changes to resolve security-oriented interstate disputes by installing foreign leaders with similar policy preferences. American experiences during the Cold War, however, illustrate that this was often quite difficult in practice. And yet, as the chapter reveals, the end of the Cold War did not mean the end of America's aggressive pursuit of regime change. In the twenty-seven years since the fall of the Soviet Union, Washington has continued to habitually intervene both covertly and overtly throughout the world. Although U.S. policymakers' appetite for regime change has not diminished, America's post-Cold War interventions have taken on new forms.
Noam Lubell
- Published in print:
- 2010
- Published Online:
- September 2010
- ISBN:
- 9780199584840
- eISBN:
- 9780191594540
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199584840.003.0007
- Subject:
- Law, Human Rights and Immigration, Public International Law
This chapter delves into the content of the rules applicable to extraterritorial armed conflicts against non-state actors. Detailed attention is given to the status of individuals under international ...
More
This chapter delves into the content of the rules applicable to extraterritorial armed conflicts against non-state actors. Detailed attention is given to the status of individuals under international humanitarian law, and whether members of armed groups should be considered as civilians or combatants. This includes examination of the notions of direct participation in hostilities and unlawful combatants. Following this, the chapter examines challenges in the humanitarian law rules regulating force against non-state actors, in the context of both large scale and small scale operations.Less
This chapter delves into the content of the rules applicable to extraterritorial armed conflicts against non-state actors. Detailed attention is given to the status of individuals under international humanitarian law, and whether members of armed groups should be considered as civilians or combatants. This includes examination of the notions of direct participation in hostilities and unlawful combatants. Following this, the chapter examines challenges in the humanitarian law rules regulating force against non-state actors, in the context of both large scale and small scale operations.
CHI-KWAN MARK
- Published in print:
- 2004
- Published Online:
- January 2010
- ISBN:
- 9780199273706
- eISBN:
- 9780191706240
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199273706.003.0005
- Subject:
- History, World Modern History
This chapter examines the Anglo–American cooperation or conflict over intelligence, propaganda, and covert operations in Hong Kong. It shows that US intelligence and propaganda operations in Hong ...
More
This chapter examines the Anglo–American cooperation or conflict over intelligence, propaganda, and covert operations in Hong Kong. It shows that US intelligence and propaganda operations in Hong Kong, though valuable, were not of such importance that Washington would risk damaging relations with London. Unlike the introduction of export controls during the Korean War, they rarely commanded the attention of top decision-makers; nor did they become a controversial issue in US domestic politics. Consequently, decision-makers in Washington seldom brought pressure to bear on US officials in Hong Kong, whose views might have been closer to the colonial authorities than to their home government's.Less
This chapter examines the Anglo–American cooperation or conflict over intelligence, propaganda, and covert operations in Hong Kong. It shows that US intelligence and propaganda operations in Hong Kong, though valuable, were not of such importance that Washington would risk damaging relations with London. Unlike the introduction of export controls during the Korean War, they rarely commanded the attention of top decision-makers; nor did they become a controversial issue in US domestic politics. Consequently, decision-makers in Washington seldom brought pressure to bear on US officials in Hong Kong, whose views might have been closer to the colonial authorities than to their home government's.
William J. Rust
- Published in print:
- 2016
- Published Online:
- January 2017
- ISBN:
- 9780813167428
- eISBN:
- 9780813167435
- Item type:
- book
- Publisher:
- University Press of Kentucky
- DOI:
- 10.5810/kentucky/9780813167428.001.0001
- Subject:
- History, Political History
This book documents the formulation and execution of US foreign policy in Cambodia during the Eisenhower administration. Based on exhaustive research at the US National Archives, the Eisenhower ...
More
This book documents the formulation and execution of US foreign policy in Cambodia during the Eisenhower administration. Based on exhaustive research at the US National Archives, the Eisenhower Library, and other public and private collections of primary sources, the book is a detailed narrative of the Eisenhower administration’s diplomatic struggle with Norodom Sihanouk. A difficult leader who was, at least initially, pro-Western in his political orientation, Sihanouk offended top US officials with his “neutralism.” For much of Eisenhower’s presidency, national security policy supported those who worked against Sihanouk. The book pays particular attention to US relations with anticommunist Cambodian dissidents, especially Dap Chhuon and Son Ngoc Thanh, and with their patrons in South Vietnam and Thailand. This book argues that covert intervention in the internal political affairs of neutral Cambodia proved to be a counterproductive tactic for advancing US anticommunist goals. A contribution to a still-emerging understanding of covert operations in the cold war, the book contends that the US experience in Cambodia in the 1950s deserves more attention in histories of the Indochinese wars and in assessments of Eisenhower’s performance as president. Although some historians have documented President Eisenhower’s moderation, prudence, and restraint in managing the nation’s foreign affairs, these qualities were often lacking in his administration’s relations with Cambodia, which were largely defined by hostility to Sihanouk’s conception of neutrality, by contempt for the prince personally, and by a covert effort to encourage his overthrow.Less
This book documents the formulation and execution of US foreign policy in Cambodia during the Eisenhower administration. Based on exhaustive research at the US National Archives, the Eisenhower Library, and other public and private collections of primary sources, the book is a detailed narrative of the Eisenhower administration’s diplomatic struggle with Norodom Sihanouk. A difficult leader who was, at least initially, pro-Western in his political orientation, Sihanouk offended top US officials with his “neutralism.” For much of Eisenhower’s presidency, national security policy supported those who worked against Sihanouk. The book pays particular attention to US relations with anticommunist Cambodian dissidents, especially Dap Chhuon and Son Ngoc Thanh, and with their patrons in South Vietnam and Thailand. This book argues that covert intervention in the internal political affairs of neutral Cambodia proved to be a counterproductive tactic for advancing US anticommunist goals. A contribution to a still-emerging understanding of covert operations in the cold war, the book contends that the US experience in Cambodia in the 1950s deserves more attention in histories of the Indochinese wars and in assessments of Eisenhower’s performance as president. Although some historians have documented President Eisenhower’s moderation, prudence, and restraint in managing the nation’s foreign affairs, these qualities were often lacking in his administration’s relations with Cambodia, which were largely defined by hostility to Sihanouk’s conception of neutrality, by contempt for the prince personally, and by a covert effort to encourage his overthrow.
James Lockhart
- Published in print:
- 2019
- Published Online:
- May 2021
- ISBN:
- 9781474435611
- eISBN:
- 9781474465243
- Item type:
- book
- Publisher:
- Edinburgh University Press
- DOI:
- 10.3366/edinburgh/9781474435611.001.0001
- Subject:
- Political Science, International Relations and Politics
This book reinterprets the history of Chile, the CIA and the Cold War. It blends national, regional, and world-historical trends from Chile -- from the appearance of its labor movement in the late ...
More
This book reinterprets the history of Chile, the CIA and the Cold War. It blends national, regional, and world-historical trends from Chile -- from the appearance of its labor movement in the late nineteenth century to the end of the Pinochet dictatorship in the late twentieth -- into both the inter-American and transatlantic communities. It argues that Chileans made their own history as highly engaged internationalists while reassessing American and other foreign-directed intelligence operations in Chile and southern South America while recontextualizing and reassessing United States, particularly CIA, influence.Less
This book reinterprets the history of Chile, the CIA and the Cold War. It blends national, regional, and world-historical trends from Chile -- from the appearance of its labor movement in the late nineteenth century to the end of the Pinochet dictatorship in the late twentieth -- into both the inter-American and transatlantic communities. It argues that Chileans made their own history as highly engaged internationalists while reassessing American and other foreign-directed intelligence operations in Chile and southern South America while recontextualizing and reassessing United States, particularly CIA, influence.
Eric Pullin
- Published in print:
- 2013
- Published Online:
- May 2014
- ISBN:
- 9780748646272
- eISBN:
- 9780748684496
- Item type:
- chapter
- Publisher:
- Edinburgh University Press
- DOI:
- 10.3366/edinburgh/9780748646272.003.0003
- Subject:
- Political Science, International Relations and Politics
This chapter reviews historians' assessment of the circuitous and exciting story of the relations between the CIA and the Congress for Cultural Freedom (CCF). These historians have been limited in ...
More
This chapter reviews historians' assessment of the circuitous and exciting story of the relations between the CIA and the Congress for Cultural Freedom (CCF). These historians have been limited in their ability to explore the topic fully, because the CIA's documents regarding covert funding of the CCF remain closed. In assessing this connection, historians have divided historiographical considerations into three main categories: first, the question of how to judge the CIA–CCF collaboration; second, the reasons why the CIA and the CCF chose to collaborate with one another; and finally, the degree to which the CIA controlled or influenced the activities of the CCF's intellectuals. Despite lively and substantive disagreements, it appears that these historians' work maintains a high degree of interdependence. Even as one historian challenges the conclusions of another, there is genuine acknowledgement that previous historical work has proved indispensable for moving the study of the CIA's largest covert operation forwards.Less
This chapter reviews historians' assessment of the circuitous and exciting story of the relations between the CIA and the Congress for Cultural Freedom (CCF). These historians have been limited in their ability to explore the topic fully, because the CIA's documents regarding covert funding of the CCF remain closed. In assessing this connection, historians have divided historiographical considerations into three main categories: first, the question of how to judge the CIA–CCF collaboration; second, the reasons why the CIA and the CCF chose to collaborate with one another; and finally, the degree to which the CIA controlled or influenced the activities of the CCF's intellectuals. Despite lively and substantive disagreements, it appears that these historians' work maintains a high degree of interdependence. Even as one historian challenges the conclusions of another, there is genuine acknowledgement that previous historical work has proved indispensable for moving the study of the CIA's largest covert operation forwards.
Dov H. Levin
- Published in print:
- 2020
- Published Online:
- September 2020
- ISBN:
- 9780197519882
- eISBN:
- 9780197519929
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780197519882.003.0001
- Subject:
- Political Science, Comparative Politics, International Relations and Politics
Chapter 1 describes the long historical record of partisan electoral interventions, an attempt by a foreign power to intentionally intervene in an election in another country to help or hinder one of ...
More
Chapter 1 describes the long historical record of partisan electoral interventions, an attempt by a foreign power to intentionally intervene in an election in another country to help or hinder one of the candidates or parties using various costly covert and overt methods, going back to early modern Europe. This description is followed by an introduction of the two key questions, a discussion of their importance, and a summary of the main arguments regarding the causes of such interventions and their effects on election results. The chapter concludes with a description of the scant research on this topic and the limitations of that research and provides a brief outline of the book.Less
Chapter 1 describes the long historical record of partisan electoral interventions, an attempt by a foreign power to intentionally intervene in an election in another country to help or hinder one of the candidates or parties using various costly covert and overt methods, going back to early modern Europe. This description is followed by an introduction of the two key questions, a discussion of their importance, and a summary of the main arguments regarding the causes of such interventions and their effects on election results. The chapter concludes with a description of the scant research on this topic and the limitations of that research and provides a brief outline of the book.
Dov H. Levin
- Published in print:
- 2020
- Published Online:
- September 2020
- ISBN:
- 9780197519882
- eISBN:
- 9780197519929
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780197519882.003.0002
- Subject:
- Political Science, Comparative Politics, International Relations and Politics
Chapter 2 lays out in detail the theoretical arguments on the causes and effects of partisan electoral interventions. It also notes the main theoretical assumptions underlying these theoretical ...
More
Chapter 2 lays out in detail the theoretical arguments on the causes and effects of partisan electoral interventions. It also notes the main theoretical assumptions underlying these theoretical arguments, some of which are non-obvious in many political science approaches. It then provides a description of the main methods for testing these theoretical arguments. It first describes how the main historical case studies were chosen and how the data for them was collected. It then concludes by briefly explaining how the definition of electoral interventions was operationalized and how the dataset of partisan electoral interventions (PEIG) utilized for the main statistical analyses was constructed.Less
Chapter 2 lays out in detail the theoretical arguments on the causes and effects of partisan electoral interventions. It also notes the main theoretical assumptions underlying these theoretical arguments, some of which are non-obvious in many political science approaches. It then provides a description of the main methods for testing these theoretical arguments. It first describes how the main historical case studies were chosen and how the data for them was collected. It then concludes by briefly explaining how the definition of electoral interventions was operationalized and how the dataset of partisan electoral interventions (PEIG) utilized for the main statistical analyses was constructed.
James Lockhart
- Published in print:
- 2019
- Published Online:
- May 2021
- ISBN:
- 9781474435611
- eISBN:
- 9781474465243
- Item type:
- chapter
- Publisher:
- Edinburgh University Press
- DOI:
- 10.3366/edinburgh/9781474435611.003.0006
- Subject:
- Political Science, International Relations and Politics
This chapter assesses the Frei administration's national and international response to the energy the Cuban Revolution unleashed in Latin America in the 1960s. It presents President Eduardo Frei as ...
More
This chapter assesses the Frei administration's national and international response to the energy the Cuban Revolution unleashed in Latin America in the 1960s. It presents President Eduardo Frei as an independent actor with his own agenda, which included the backing and accelerating of Chileans' developmental project in nuclear science and technology. It also reconstructs and reevaluates the United States, particularly the CIA's, relationship with Frei.Less
This chapter assesses the Frei administration's national and international response to the energy the Cuban Revolution unleashed in Latin America in the 1960s. It presents President Eduardo Frei as an independent actor with his own agenda, which included the backing and accelerating of Chileans' developmental project in nuclear science and technology. It also reconstructs and reevaluates the United States, particularly the CIA's, relationship with Frei.
Brandon Valeriano
- Published in print:
- 2018
- Published Online:
- May 2018
- ISBN:
- 9780190618094
- eISBN:
- 9780190618124
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780190618094.003.0002
- Subject:
- Political Science, International Relations and Politics, Comparative Politics
The central question of this book is: how do states use cyber strategies to influence their rivals? This chapter introduces a theory of cyber coercion that considers the three main types of cyber ...
More
The central question of this book is: how do states use cyber strategies to influence their rivals? This chapter introduces a theory of cyber coercion that considers the three main types of cyber strategies: disruption, espionage, and degradation. As a form of covert action, cyber coercion can represent ambiguous signals designed to probe adversary intentions and manage escalation risks. This chapter dissects the core logic of coercion and coercive diplomacy as they apply to cyber operations. After defining coercion and establishing the expected threshold of concessions based on surveying multiple studies, it then highlights debates about power and resolve in the traditional coercion literature to extract important considerations for empirical investigation. The inherent ambiguity, primacy of signaling, and temporary effects in cyber operations distort power and resolve in the digital domain.Less
The central question of this book is: how do states use cyber strategies to influence their rivals? This chapter introduces a theory of cyber coercion that considers the three main types of cyber strategies: disruption, espionage, and degradation. As a form of covert action, cyber coercion can represent ambiguous signals designed to probe adversary intentions and manage escalation risks. This chapter dissects the core logic of coercion and coercive diplomacy as they apply to cyber operations. After defining coercion and establishing the expected threshold of concessions based on surveying multiple studies, it then highlights debates about power and resolve in the traditional coercion literature to extract important considerations for empirical investigation. The inherent ambiguity, primacy of signaling, and temporary effects in cyber operations distort power and resolve in the digital domain.
Dov H. Levin
- Published in print:
- 2020
- Published Online:
- September 2020
- ISBN:
- 9780197519882
- eISBN:
- 9780197519929
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780197519882.003.0006
- Subject:
- Political Science, Comparative Politics, International Relations and Politics
Chapter 6 begins the analysis of the effects of partisan electoral interventions on election results through a statistical test, using PEIG, of the four main hypotheses developed in Chapter 2. Full ...
More
Chapter 6 begins the analysis of the effects of partisan electoral interventions on election results through a statistical test, using PEIG, of the four main hypotheses developed in Chapter 2. Full support is found for the first three hypotheses. Partisan electoral interventions are found to increase the vote share of the preferred candidate/party by 3% on average—enough in many cases to determine the result. Overt interventions are found to be more effective than covert ones in both the statistical and the substantive sense. However, unlike in later elections, electoral interventions in founding elections usually harm the aided side, reducing its vote share by 6.7% on average. The chapter concludes by examining whether there are any significant differences in the effectiveness of the specific assistance that is provided by the foreign power and/or the overall magnitude of this aid.Less
Chapter 6 begins the analysis of the effects of partisan electoral interventions on election results through a statistical test, using PEIG, of the four main hypotheses developed in Chapter 2. Full support is found for the first three hypotheses. Partisan electoral interventions are found to increase the vote share of the preferred candidate/party by 3% on average—enough in many cases to determine the result. Overt interventions are found to be more effective than covert ones in both the statistical and the substantive sense. However, unlike in later elections, electoral interventions in founding elections usually harm the aided side, reducing its vote share by 6.7% on average. The chapter concludes by examining whether there are any significant differences in the effectiveness of the specific assistance that is provided by the foreign power and/or the overall magnitude of this aid.
Benjamin Tromly
- Published in print:
- 2019
- Published Online:
- November 2019
- ISBN:
- 9780198840404
- eISBN:
- 9780191875984
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198840404.003.0007
- Subject:
- History, World Modern History, Political History
Chapter 7 examines the CIA espionage and psychological-warfare operations against the USSR that involved the most important and most controversial Russian exile organization, the People’s Labor ...
More
Chapter 7 examines the CIA espionage and psychological-warfare operations against the USSR that involved the most important and most controversial Russian exile organization, the People’s Labor Alliance. Operations to infiltrate agents directly into the USSR by plane ended in fiasco due to Soviet counterintelligence, which thwarted the NTS operations and pursued measures to penetrate and subvert the émigré organization from within. In response, the CIA turned to a strategy of utilizing the NTS as an instrument of psychological warfare, spreading disinformation about the exiles in order to incite the Soviet state into costly countermeasures. Such an effort to manipulate the fiction of émigré political influence demonstrated the increasingly complex and marginal-gains nature of Cold War competition between intelligence agencies.Less
Chapter 7 examines the CIA espionage and psychological-warfare operations against the USSR that involved the most important and most controversial Russian exile organization, the People’s Labor Alliance. Operations to infiltrate agents directly into the USSR by plane ended in fiasco due to Soviet counterintelligence, which thwarted the NTS operations and pursued measures to penetrate and subvert the émigré organization from within. In response, the CIA turned to a strategy of utilizing the NTS as an instrument of psychological warfare, spreading disinformation about the exiles in order to incite the Soviet state into costly countermeasures. Such an effort to manipulate the fiction of émigré political influence demonstrated the increasingly complex and marginal-gains nature of Cold War competition between intelligence agencies.
Henri Decoeur
- Published in print:
- 2018
- Published Online:
- June 2018
- ISBN:
- 9780198823933
- eISBN:
- 9780191862649
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198823933.003.0002
- Subject:
- Law, Public International Law, Criminal Law and Criminology
Chapter 1 describes the phenomenon of state organized crime. It analyses the context in which state organized crime occurs, highlighting the criminogenic mechanisms at play in ‘shadow states’ and ...
More
Chapter 1 describes the phenomenon of state organized crime. It analyses the context in which state organized crime occurs, highlighting the criminogenic mechanisms at play in ‘shadow states’ and kleptocratic regimes. It discusses the motives underlying the involvement of state officials in organized crime, showing that state organized crime may be committed not only for the perpetrators’ personal profit, but also in pursuit of state policy or broader ideological objectives such as international terrorism. It further identifies the actors involved in state organized crime and the means through which it is perpetrated, stressing that state organized crime is committed by senior state officials abusing their authority and using the material and human resources of the state for criminal purposes.Less
Chapter 1 describes the phenomenon of state organized crime. It analyses the context in which state organized crime occurs, highlighting the criminogenic mechanisms at play in ‘shadow states’ and kleptocratic regimes. It discusses the motives underlying the involvement of state officials in organized crime, showing that state organized crime may be committed not only for the perpetrators’ personal profit, but also in pursuit of state policy or broader ideological objectives such as international terrorism. It further identifies the actors involved in state organized crime and the means through which it is perpetrated, stressing that state organized crime is committed by senior state officials abusing their authority and using the material and human resources of the state for criminal purposes.