{"id":25539,"date":"2026-03-16T06:23:20","date_gmt":"2026-03-15T23:53:20","guid":{"rendered":"https:\/\/politicsrights.com\/?p=25539"},"modified":"2026-03-16T06:23:22","modified_gmt":"2026-03-15T23:53:22","slug":"cooperation-intelligence-competition","status":"publish","type":"post","link":"https:\/\/politicsrights.com\/es\/cooperation-intelligence-competition\/","title":{"rendered":"C\u00f3mo la cooperaci\u00f3n institucional permite la competencia de inteligencia"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Explaining Success and Failure in Intelligence Operations<\/h2>\n\n\n\n<p>A century of technological progress and economic globalization has expanded the scope and scale of intelligence competition in world politics.<a href=\"#_ftn1\" id=\"_ftnref1\">[1]<\/a> Accordingly, there is a burgeoning of international relations scholarship on political secrecy, intelligence, and covert action.<a href=\"#_ftn2\" id=\"_ftnref2\">[2]<\/a><\/p>\n\n\n\n<p>This new focus on the strategic dynamics of secret statecraft complements and expands the traditional emphasis on the behavior of intelligence organizations and intelligence-policy relations in the intelligence studies field.<a href=\"#_ftn3\" id=\"_ftnref3\">[3]<\/a> Yet there is still little work on the operational conditions that promote success (or failure) in intelligence campaigns, and how this may enable (or undermine) strategic advantage in political competition.<a href=\"#_ftn4\" id=\"_ftnref4\">[4]<\/a> This gap contrasts starkly with the extensive literature on military effectiveness on the battlefield.<a href=\"#_ftn5\" id=\"_ftnref5\">[5]<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Intelligence Depends on Institutions, Not Force<\/h2>\n\n\n\n<p>While traditional warfare is an extreme form of security competition, intelligence contests depend essentially on institutional cooperation. Intelligence works by subverting institutions that improve information and collective action, such as governments, organizations, cultural practices, and software systems.<\/p>\n\n\n\n<p>Spies sneak into foreign societies or hostile organizations by pretending to be legitimate citizens or trusted colleagues. Spyware likewise infiltrates shared information systems by masquerading as legitimate software.<\/p>\n\n\n\n<p>&nbsp;This is one reason why intelligence is not only prevalent in peacetime but also more challenging in war: Institutions thrive in peace but suffer in war.<\/p>\n\n\n\n<p> War is a contest of strength and resolve in political anarchy, which tends to undermine the institutional conditions for intelligence. Intelligence, by contrast, is a contest of wits between deceivers who must cooperate to compete.<a id=\"_ftnref6\" href=\"#_ftn6\">[6]<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerable Institutions and Clandestine Organization<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full\"><a href=\"https:\/\/amzn.to\/3Nj5APL\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" width=\"333\" height=\"500\" src=\"https:\/\/politicsrights.com\/wp-content\/uploads\/2026\/03\/Age-of-Deception.-Cybersecurity-intelligence-as-Secret-Statecraft.webp\" alt=\"Cover of the book Age of Deception. Cybersecurity intelligence as Secret Statecraft\" class=\"wp-image-25542\" srcset=\"https:\/\/politicsrights.com\/wp-content\/uploads\/2026\/03\/Age-of-Deception.-Cybersecurity-intelligence-as-Secret-Statecraft.webp 333w, https:\/\/politicsrights.com\/wp-content\/uploads\/2026\/03\/Age-of-Deception.-Cybersecurity-intelligence-as-Secret-Statecraft-200x300.webp 200w, https:\/\/politicsrights.com\/wp-content\/uploads\/2026\/03\/Age-of-Deception.-Cybersecurity-intelligence-as-Secret-Statecraft-8x12.webp 8w\" sizes=\"auto, (max-width: 333px) 100vw, 333px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>My recent book, <em><a href=\"https:\/\/amzn.to\/3Nj5APL\" target=\"_blank\" rel=\"noopener\">Age of Deception: Cybersecurity as Secret Statecraft <\/a><\/em>(Cornell 2025), presents an institutional theory of intelligence performance. It argues that the successful operational implementation of secret statecraft (espionage, sabotage, subversion, counterintelligence), in any historical era regardless of the technological state of the art, depends on a combination of <em>vulnerable institution<\/em>s and <em>clandestine organization<\/em>.<\/p>\n\n\n\n<p>The former refers to collective institutional resources that are shared between a deception specialist (i.e., intelligence attacker) and its target, while the latter refers to institutional resources that the deceiver can control autonomously. Vulnerable institutions provide the operating environment that a clandestine organization exploits.<\/p>\n\n\n\n<p>When the monitoring and enforcement vulnerabilities of the institutional environment are exposed and a sophisticated organization can discreetly employ its clandestine capabilities, then persistent intelligence access can be maintained. When institutions are less exposed, however, then operations must become more complex to overcome access barriers, and when organizations are less sophisticated, conversely, there is greater risk of losing control of operations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Technology Does Not Guarantee Intelligence Advantage<\/h2>\n\n\n\n<p>This view challenges a conventional wisdom prevalent in the policy discourse of cybersecurity, namely that technology gives attackers the advantage over defenders (i.e., cyberspace is offense dominant).<a href=\"#_ftn7\" id=\"_ftnref7\">[7]<\/a><\/p>\n\n\n\n<figure class=\"wp-block-pullquote alignleft\"><blockquote><p>The institutional conditions of secret statecraft are both socially and technically constructed. <\/p><\/blockquote><\/figure>\n\n\n\n<p>Consider, for example, two Russian intelligence campaigns conducted nearly a century apart. In the early Cold War, the Soviet Committee for State Security (KGB) recruited a spy ring known as the \u201cCambridge Five,\u201d the most famous of whom was Kim Philby.<\/p>\n\n\n\n<p>Philby rose to the senior ranks of British intelligence, and he relied on good-old-fashioned espionage tradecraft to betray numerous Western intelligence operations to the Soviets. After the Cold War, one of the KGB\u2019s descendants was the Russian Foreign Intelligence Service (SVR).<\/p>\n\n\n\n<p>The SVR hacked the SolarWinds company in 2019, using sophisticated technical methods to gain access to thousands of organizations and infiltrating more than a hundred of them. Yet while SolarWinds was hacked by an advanced persistent threat (APT), the human spy Philby was ultimately less advanced but far more persistent. We need an institutional theory of intelligence performance to explain why technology does not always ensure success.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Institutional Conditions of Intelligence Performance<\/h2>\n\n\n\n<p>If technology determines intelligence performance, then the more sophisticated SolarWinds campaign should have fared better. However, Philby maintained persistent access to his targets for decades, rather than mere months, and inflicted serious damage to Western intelligence operations, rather than simply raising awareness about supply-chain cybersecurity. Institutional conditions, rather than <a href=\"https:\/\/politicsrights.com\/walls-eyes-technology-and-migration-today\/\">technological sophistication<\/a>, determine the quality of intelligence performance.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>Institutional contingency is especially salient in cybersecurity because its enabling institutions are incredibly complex.<\/p><\/blockquote><\/figure>\n\n\n\n<p>The conditions of intelligence performance (summarized in the table below) were relevant long before the internet (e.g., for Kim Philby), and they will be relevant long after the quantum internet (should that ever be built). Kim Philby exploited an overly trusting and thus highly exposed organizational culture in the early years of the Cold War, but a major liability was that he was also vulnerable to compromise due to the antics of other members of the Cambridge Five.<\/p>\n\n\n\n<p>The SVR had a comparatively more sophisticated clandestine operation for running collection operations compared to the young KGB, but it was also up against a much more robust cybersecurity and counterintelligence ecosystem. The KGB and SVR were able to conduct successful intelligence operations only as long as both conditions were met. Even then, intelligence performance had only an indirect impact on politics. When conditions changed, however, intelligence performance degraded.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td rowspan=\"2\">Espionage Campaign<\/td><td colspan=\"3\">Operational Conditions<\/td><td colspan=\"2\">Intelligence Performance<\/td><\/tr><tr><td>Technology<\/td><td>Institution<\/td><td>Organization<\/td><td>Persistence<\/td><td>Impact<\/td><\/tr><tr><td>Kim Philby<\/td><td>Low<\/td><td>Exposed<\/td><td>Dependent<\/td><td>Decades<\/td><td>Serious<\/td><\/tr><tr><td>SolarWinds<\/td><td>High<\/td><td>Secure<\/td><td>Sophisticated<\/td><td>Months<\/td><td>Moderate<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\"><em>Comparing intelligence performance in cases of Russian espionage<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Operational Constraints in Cyber-Enabled Intelligence<\/h2>\n\n\n\n<p>This comparison of Kim Philby and the SolarWinds hack illustrates why a greater quantity of technical operations does not simply translate into a greater quality of intelligence.&nbsp; Public and private cyber defenses create access barriers and counterintelligence capacity that complicate offensive cyber operations.<\/p>\n\n\n\n<p>Threat actors must deal with many challenges to conduct controlled infiltrations into hostile organizations to achieve specific strategic objectives, all while protecting costly investments in sensitive sources and methods from professional deception detectors. The organizational requirements for managing complex operations with complex risks, moreover, create barriers to entry for sophisticated intelligence operations against complex targets. Cyber-enabled intelligence operations require a lot more than a hacker in a hoodie in the basement. This implies that assumptions about asymmetric advantage in cyberspace are backwards: Nation-state spy agencies like the SVR and NSA have important advantages over relatively less capable targets.<\/p>\n\n\n\n<p>In short, technology does not determine advantage by itself. The institutional conditions of secret statecraft are both socially and technically constructed. They have a path-dependent history, and they change as attackers and defenders make different choices. Institutional contingency is especially salient in cybersecurity because its enabling institutions are incredibly complex. Precisely because offensive advantages in cyberspace are so contingent, threat actors must be more sophisticated to manage contingencies. Because politics in the twenty-first century is constrained and enabled by an increasingly complex institutional environment, of which collective global cyberspace is the foremost symptom, there is more opportunity for deception than ever before.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-foxiz-elements-note gb-wrap note-wrap none-padding yes-shadow\" style=\"--heading-border-color:#88888822;--border-width:0 0 0 0;--desktop-header-padding:15px 30px 15px 30px;--tablet-header-padding:15px 25px 15px 25px;--mobile-header-padding:15px 20px 15px 20px;--desktop-padding:15px 30px 30px 30px;--tablet-padding:15px 25px 25px 25px;--mobile-padding:15px 20px 20px 20px\"><div class=\"note-header gb-header\"><span class=\"note-heading\"><span class=\"gb-heading heading-icon\"><i class=\"rbi rbi-bookmark-fill\"><\/i><\/span><h4 class=\"gb-heading none-toc\">Notes<\/h4><\/span><\/div><div class=\"note-content gb-content\">\n<p><a id=\"_ftn1\" href=\"#_ftnref1\">[1]<\/a> David V. Gioe et al., \u201cIntelligence in the Cyber Era: Evolution or Revolution?,\u201d <em>Political Science Quarterly<\/em> 135, no. 2 (2020): 191\u2013224, https:\/\/doi.org\/10.1002\/polq.13031; Thomas Rid, \u201cA Revolution in Intelligence,\u201d in <em>The New Makers of Modern Strategy: From the Ancient World to the Digital Age<\/em>, ed. Hal Brands (Princeton University Press, 2023); Jon R. Lindsay, <em>Age of Deception: Cybersecurity as Secret Statecraft<\/em> (Cornell University Press, 2025).<\/p>\n\n\n\n<p><a href=\"#_ftnref2\" id=\"_ftn2\">[2]<\/a> For a review see Allison Carnegie, \u201cSecrecy in International Relations and Foreign Policy,\u201d <em>Annual Review of Political Science<\/em> 24, no. 1 (2021): 213\u201333, https:\/\/doi.org\/10.1146\/annurev-polisci-041719-102430. See also Austin Carson, <em>Secret Wars: Covert Conflict in International Politics<\/em> (Princeton University Press, 2018); Lindsey A. O\u2019Rourke, <em>Covert Regime Change: America\u2019s Secret Cold War<\/em> (Cornell University Press, 2018); Michael Poznansky, <em>In the Shadow of International Law: Covert Intervention in the Postwar World<\/em> (Oxford University Press, 2020); Melissa M. Lee, <em>Crippling Leviathan: How Foreign Subversion Weakens the State<\/em> (Cornell University Press, 2020); Lennart Maschmeyer, <em>Subversion: From Covert Operations to Cyber Conflict<\/em> (Oxford University Press, 2024).<\/p>\n\n\n\n<p><a href=\"#_ftnref3\" id=\"_ftn3\">[3]<\/a> Most of the IR literature on intelligence focuses on institutional interactions within states rather than strategic interactions between them, e.g., Richard K. Betts, <em>Enemies of Intelligence: Knowledge and Power in American National Security<\/em> (Columbia University Press, 2007); Joshua Rovner, <em>Fixing the Facts: National Security and the Politics of Intelligence<\/em> (Cornell University Press, 2011); Robert Jervis, <em>Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War<\/em> (Cornell University Press, 2011); Erik J. Dahl, <em>Intelligence and Surprise Attack: Failure and Success from Pearl Harbor to 9\/11 and Beyond<\/em> (Georgetown University Press, 2013); Keren Yarhi-Milo, <em>Knowing the Adversary: Leaders, Intelligence, and Assessment of Intentions in International Relations<\/em> (Princeton University Press, 2014); Amy B. Zegart, <em>Spies, Lies, and Algorithms: The History and Future of American Intelligence<\/em> (Princeton University Press, 2022).<\/p>\n\n\n\n<p><a href=\"#_ftnref4\" id=\"_ftn4\">[4]<\/a> Important exceptions include Lennart Maschmeyer, \u201cThe Subversive Trilemma: Why Cyber Operations Fall Short of Expectations,\u201d <em>International Security<\/em> 46, no. 2 (2021): 51\u201390; Jennifer E. Sims, <em>Decision Advantage: Intelligence in International Politics from the Spanish Armada to Cyberwar<\/em> (Oxford University Press, 2022); Joshua Rovner, \u201cTheory of Sabotage,\u201d <em>\u00c9tudes fran\u00e7aises de renseignement et de cyber<\/em> (Paris cedex 14) 1, no. 1 (2023): 139\u201353.<\/p>\n\n\n\n<p><a href=\"#_ftnref5\" id=\"_ftn5\">[5]<\/a> Martin Van Creveld, <em>Fighting Power: German and US Army Performance, 1939-1945<\/em> (Greenwood Press, 1982); Allan R. Millett et al., \u201cThe Effectiveness of Military Organizations,\u201d <em>International Security<\/em> 11, no. 1 (1986): 37\u201371; Stephen D. Biddle, <em>Military Power: Explaining Victory and Defeat in Modern Battle<\/em> (Princeton University Press, 2004); Risa A. Brooks and Elizabeth A. Stanley, eds., <em>Creating Military Power: The Sources of Military Effectiveness<\/em> (Stanford University Press, 2007); Caitlin Talmadge, <em>The Dictator\u2019s Army: Battlefield Effectiveness in Authoritarian Regimes<\/em> (Cornell University Press, 2015); Ryan Grauer, <em>Commanding Military Power: Organizing for Victory and Defeat on the Battlefield<\/em> (Cambridge University Press, 2016); Jon R. Lindsay, <em>Information Technology and Military Power<\/em> (Cornell University Press, 2020); Kendrick Kuo, \u201cDangerous Changes: When Military Innovation Harms Combat Effectiveness,\u201d <em>International Security<\/em> 47, no. 2 (2022): 48\u201387, https:\/\/doi.org\/10.1162\/isec_a_00446.<\/p>\n\n\n\n<p><a href=\"#_ftnref6\" id=\"_ftn6\">[6]<\/a> On the general logic of deception as cooperation subversion see Erving Goffman, <em>Strategic Interaction<\/em> (University of Pennsylvania Press, 1969); David Shulman, <em>From Hire to Liar: The Role of Deception in the Workplace<\/em> (Cornell University Press, 2006); Jon R. Lindsay, \u201cRestrained by Design: The Political Economy of Cybersecurity,\u201d <em>Digital Policy, Regulation and Governance<\/em> 19, no. 6 (2017): 493\u2013514; Lennart Maschmeyer, \u201cSubversion, Cyber Operations and Reverse Structural Power in World Politics,\u201d <em>European Journal of International Relations<\/em> 29, no. 1 (2022): 79\u2013103; Nadiya Kostyuk and Susan Landau, \u201cDueling Over DUAL_EC_DRBG: The Consequences of Corrupting a Cryptographic Standardization Process,\u201d <em>Harvard National Security Journal<\/em> 13, no. 2 (2022): 224\u201384.<\/p>\n\n\n\n<p><a id=\"_ftn7\" href=\"#_ftnref7\">[7]<\/a> Keir Lieber, \u201cThe Offense-Defense Balance and Cyber Warfare,\u201d in <em>Cyber Analogies<\/em>, ed. Emily O. Goldman and John Arquilla (Naval Postgraduate School, 2014); Rebecca Slayton, \u201cWhat Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment,\u201d <em>International Security<\/em> 41, no. 3 (2017): 72\u2013109; Jason Healey, \u201cUnderstanding the Offense\u2019s Systemwide Advantage in Cyberspace,\u201d <em>Lawfare<\/em>, December 22, 2021, https:\/\/www.lawfaremedia.org\/article\/understanding-offenses-systemwide-advantage-cyberspace.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A century of technological progress and economic globalization has expanded the scope and scale of intelligence competition in world politics&#8230;<\/p>","protected":false},"author":192,"featured_media":25549,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":30,"footnotes":""},"categories":[5],"tags":[745],"ppma_author":[1214],"class_list":{"0":"post-25539","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-books","8":"tag-geopolitics"},"pp_statuses_selecting_workflow":false,"pp_workflow_action":"current","pp_status_selection":"publish","authors":[{"term_id":1214,"user_id":192,"is_guest":0,"slug":"jon-r-lindsay","display_name":"Jon R. Lindsay","avatar_url":{"url":"https:\/\/politicsrights.com\/wp-content\/uploads\/2026\/03\/Jon-R.-Lindsay.webp","url2x":"https:\/\/politicsrights.com\/wp-content\/uploads\/2026\/03\/Jon-R.-Lindsay.webp"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/politicsrights.com\/es\/wp-json\/wp\/v2\/posts\/25539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/politicsrights.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/politicsrights.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/politicsrights.com\/es\/wp-json\/wp\/v2\/users\/192"}],"replies":[{"embeddable":true,"href":"https:\/\/politicsrights.com\/es\/wp-json\/wp\/v2\/comments?post=25539"}],"version-history":[{"count":14,"href":"https:\/\/politicsrights.com\/es\/wp-json\/wp\/v2\/posts\/25539\/revisions"}],"predecessor-version":[{"id":25619,"href":"https:\/\/politicsrights.com\/es\/wp-json\/wp\/v2\/posts\/25539\/revisions\/25619"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/politicsrights.com\/es\/wp-json\/wp\/v2\/media\/25549"}],"wp:attachment":[{"href":"https:\/\/politicsrights.com\/es\/wp-json\/wp\/v2\/media?parent=25539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/politicsrights.com\/es\/wp-json\/wp\/v2\/categories?post=25539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/politicsrights.com\/es\/wp-json\/wp\/v2\/tags?post=25539"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/politicsrights.com\/es\/wp-json\/wp\/v2\/ppma_author?post=25539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}