Thoughts, reflections and experiences

icy banner

Month: November 2025

Cybercriminal

Beyond the War/Crime Binary and Why International Security Studies Must Reckon with Cyber Operations

When North Korea’s estimated gains from cybercrime exceeded its total legitimate international trade in 2022, something fundamental shifted in the nature of strategic competition.[1] Pyongyang generated $1.7 billion through cyber operations while earning only $1.59 billion from legal exports. This should not be considered as supplementary revenue or criminal opportunism, but instead it represents a primary mechanism of state finance that funds weapons programmes and regime stability.

Yet this development barely registered in mainstream security studies literature. The reason reveals a deeper problem in how adversaries now compete strategically by deliberately exploiting the boundaries between categories that International Security Studies treats as distinct. Cyber operations succeed precisely because they operate simultaneously as economic extraction, cognitive manipulation, and potential kinetic threat, defying classification within inherited taxonomies of war, crime, espionage, and influence. The field’s failure to recognise this boundary exploitation as a coherent form of strategic competition leaves it unable to analyse how states actually generate and contest power in the digital age.

The Clausewitzian Checkpoint

Thomas Rid performed a valuable service in his 2012 article “Cyber War Will Not Take Place.”[2] He punctured inflated rhetoric around “cyber Pearl Harbors” by demonstrating that cyber operations don’t meet classical Clausewitzian criteria for warfare. They lack intrinsic violence, don’t compel through force, and haven’t fundamentally altered political orders through armed conflict. This deflation of threat inflation was intellectually rigorous and necessary.

But Rid’s framework created an unintended consequence. Many scholars concluded that if cyber operations aren’t war, they aren’t strategically significant. This logic fails when confronted with the evidence. As Lucas Kello argued in his 2013 response, cyber operations are “expanding the range of possible harm and outcomes between the concepts of war and peace” with profound implications for national and international security.[3] The problem isn’t that cyber operations constitute war in the traditional sense. The problem is that adversaries have discovered they can achieve strategic objectives by deliberately operating in the definitional gaps our frameworks create.

Consider what cyber operations actually are: sustained, below-threshold activities that extract resources, manipulate cognition, or degrade systems in ways that cumulatively influence state power and political outcomes without triggering the recognition mechanisms that would mobilise conventional responses. This positive definition reveals why inherited categories often fail and that cyber operations falling between war and crime is no accident. They are designed to exploit that boundary.

Economic Extraction as Strategic Competition

The classification of state-sponsored cyber operations as “cybercrime” represents a fundamental category error. Widely cited estimates place global cybercrime costs at approximately $9.5 trillion annually for 2024.[4] These figures carry methodological challenges and conflate direct losses with indirect economic effects. Yet even treating them as indicative of order of magnitude rather than precise valuations, the scale remains extraordinary. This exceeds Japan’s entire GDP and dwarfs global military spending.

More importantly, conservative estimates suggest that state-sponsored operations account for 15 to 20 percent of total cybercrime costs, representing perhaps $1.5 to $2 trillion in annual state-directed activity.[5] This is roughly double the entire US intelligence budget and comparable to China’s official military spending. These figures indicate systematic extraction at a scale fundamentally incompatible with treating such activity as mere crime.

The real insight concerns returns on investment. Realists pay attention to power and cost ratios. A state gaining billion-dollar effects from million-dollar inputs should trigger theoretical reassessment. North Korea reportedly spends tens of millions to gain billions, producing returns that conventional military operations cannot match. Russia tolerates or directly controls ransomware ecosystems that generate massive revenue while maintaining plausible deniability. China conducts industrial-scale intellectual property theft that allows it to leapfrog decades of research and development investment.

This isn’t “crime” in any meaningful sense and yet neither is it war. It belongs to a family of coercive economic statecraft that includes sanctions, financial leverage, and strategic resource control. The field has conceptual machinery for thinking about these tools. What’s missing is recognition that cyber extraction sits within this lineage. When states systematically extract resources from other states without triggering traditional conflict responses, they’re engaging in economic warfare conducted through digital methodologies. The boundary between legitimate economic competition, sanctions, illicit finance, and cyber theft has been deliberately blurred by adversaries who understand that this ambiguity protects them from response.

The 2017 NotPetya attack illustrates this boundary exploitation perfectly. Widely attributed to Russian military intelligence, it caused an estimated $10 billion in global damage, disrupted Maersk’s worldwide shipping operations, paralysed pharmaceutical manufacturing, and crippled critical infrastructure across Ukraine.[6] Was this economic warfare? Sabotage? Organised crime? The answer is that it was designed to be all of these simultaneously, making classification impossible and response difficult. Because it operated through exploitation rather than traditional violence, it failed to generate sustained policy response despite extraordinary economic dislocation.

Cognitive Operations and the Active Measures Tradition

The cognitive dimension represents boundary exploitation of a different order. What Andreas Krieg terms “subversion”, or the strategic weaponization of narratives to exploit socio-psychological vulnerabilities and erode sociopolitical consensus, isn’t unprecedented.[7] It builds directly on the Soviet tradition of active measures during the Cold War. The KGB’s disinformation campaigns, front organisations, and cultivation of influence networks were designed to achieve precisely what contemporary information operations attempt: reflexive control whereby adversaries voluntarily make decisions predetermined by the subverting party.

What has changed is scale and effectiveness. The contemporary information environment’s infrastructural vulnerabilities make such operations far more potent than their Cold War predecessors. Russian information operations around the 2016 US election, Brexit-related influence campaigns, and subsequent efforts across European democracies represent sustained attempts to manipulate democratic processes. Whether individually decisive or not, their cumulative effect has been to inject pervasive uncertainty into democratic deliberation.

Krieg’s framework is particularly useful because it recognises that effective subversion requires high levels of both orchestration and mobilisation.[8] Successful operations coordinate across multiple domains: cultivating academic surrogates who provide legitimacy, deploying media networks that amplify messages, and ultimately mobilising real-world activism or policy changes. This isn’t merely spreading disinformation online. It’s cognitive warfare that operates simultaneously in the informational space, the expert-policy nexus, and physical civil society mobilisation.

Here again we see deliberate boundary exploitation. Is this espionage? Influence operations? Public diplomacy? Domestic political activism? The answer is that it’s designed to be all of these, making it impossible to counter with tools designed for any single category. The operations succeed not despite their categorical ambiguity but because of it. International Security Studies has failed not because cyber-enabled cognitive operations are unprecedented, but because the field hasn’t updated its frameworks for thinking about covert influence in an age where scale, speed, and micro-targeting have fundamentally changed the strategic payoff.

Threshold Manipulation as Structural Feature

The attribution problem receives significant attention in cyber security literature, as do the challenges of compressed decision timelines. These are real difficulties. But the more profound challenge is threshold manipulation itself. Adversaries deliberately operate below levels that would trigger Article 5 commitments or justify conventional military responses. Each individual operation seems manageable, falling into the category of crime, espionage, or influence activity rather than warfare. Yet the cumulative strategic effect potentially exceeds many conventional conflicts.

This isn’t an implementation problem. It’s a structural feature of how cyber competition operates. States are competing precisely by exploiting the cognitive thresholds that anchor our definitions of conflict. Russia can conduct NotPetya through proxies with sufficient ambiguity that attribution takes months and response remains constrained. China can exfiltrate terabytes of intellectual property through operations that blend state intelligence services, military contractors, and “patriotic” hackers. North Korea can steal billions through operations routed through multiple jurisdictions with cryptocurrency payouts. Each operation maintains just enough deniability to complicate response, just enough restraint to avoid crossing recognised warfare thresholds.

This threshold manipulation undermines every inherited category of International Security Studies. It’s not that cyber operations are hard to classify. It’s that they’re designed to exploit the classification system itself. The boundaries between war and peace, state and non-state action, economic and military competition, legitimate influence and hostile subversion aren’t natural categories adversaries accidentally fall between. They’re strategic terrain adversaries deliberately occupy because they understand these boundaries constrain Western responses.

Recognising What We’re Not Seeing

The policy stakes extend beyond academic taxonomy. We’re not experiencing Pearl Harbor-equivalent events annually in some literal sense. We’re experiencing something potentially more destabilising: systematic strategic competition that bypasses the recognition mechanisms that would trigger mobilisation. Our threat-recognition systems are calibrated to identify territorial aggression, military build-ups, and kinetic attacks. They’re not calibrated to identify systematic resource extraction masquerading as crime, cognitive operations masquerading as activism, or infrastructure compromise masquerading as espionage.

The result is systematic underresponse to strategic challenges of the first order. We’re not mobilising resources, not building institutional capacity, not developing deterrent strategies, not coordinating international responses, because these events don’t trip the conceptual wires that would classify them as national security emergencies. Meanwhile, adversaries conduct what amounts to unrestricted economic and cognitive warfare whilst maintaining that they’re merely engaged in “law enforcement matters,” “intelligence operations,” or “civil society activism.”

We’ve constrained ourselves through definitional conservatism. We’ve accepted that if it’s not “war,” it doesn’t merit war-level responses, while adversaries operate under no such constraints. They’ve discovered they can achieve strategic objectives through boundary exploitation, and our theoretical frameworks leave us unable to recognise, analyse, or respond effectively.

Toward Frameworks Adequate to Strategic Reality

What would it mean for International Security Studies to take cyber operations seriously? It requires recognising that the boundaries between economic, cognitive, and kinetic competition have been deliberately collapsed by adversaries who understand that this collapse protects them from response.

This means developing frameworks that can analyse strategic competition operating across these domains simultaneously. It means recognising that when North Korea funds its regime primarily through cyber theft, when Russia conducts operations that are simultaneously economic warfare and intelligence operations, when China’s influence campaigns blend state direction with autonomous proxy action. They’re exemplars of how strategic competition now operates.

It means accepting that “security” in conditions of radical technological change looks sufficiently different that inherited categories have limited explanatory power. The field needs concepts and metrics for assessing threats that are diffuse, cumulative, and often only apparent in retrospect. It needs frameworks that can recognise systematic resource extraction, cognitive manipulation, and infrastructure compromise as coherent forms of strategic competition rather than unrelated criminal, intelligence, and influence activities.

Most fundamentally, it means understanding that the definitional boundaries the field has inherited are not neutral analytical categories. They’re strategic terrain that adversaries compete by exploiting them. Until International Security Studies recognises boundary exploitation itself as the central feature of contemporary cyber competition, the field will remain unable to provide the analytical guidance policymakers urgently need.


Bibliography

Buchanan, Ben. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics. Cambridge, MA: Harvard University Press, 2020.

“Cost of Cybercrime.” Cybersecurity Ventures, 2024. https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/.

Greenberg, Andy. “The Untold Story of NotPetya, the Most Devastating Cyberattack in History.” Wired, August 22, 2018. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.

Kello, Lucas. “The Meaning of the Cyber Revolution: Perils to Theory and Statecraft.” International Security 38, no. 2 (Fall 2013): 7-40.

Krieg, Andreas. Subversion: The Strategic Weaponization of Narratives. Washington, DC: Georgetown University Press, 2023.

Rid, Thomas. “Cyber War Will Not Take Place.” Journal of Strategic Studies 35, no. 1 (February 2012): 5-32.


Notes

[1] Ben Buchanan, The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics (Cambridge, MA: Harvard University Press, 2020), 47-48.

[2] Thomas Rid, “Cyber War Will Not Take Place,” Journal of Strategic Studies 35, no. 1 (February 2012): 5-32.

[3] Lucas Kello, “The Meaning of the Cyber Revolution: Perils to Theory and Statecraft,” International Security 38, no. 2 (Fall 2013): 8.

[4] “Cost of Cybercrime,” Cybersecurity Ventures, 2024, https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/. These figures aggregate direct theft, business disruption, and opportunity costs, and should be treated as indicative of order of magnitude rather than precise valuations.

[5] Kello, “Meaning of the Cyber Revolution,” 24-26.

[6] Andy Greenberg, “The Untold Story of NotPetya, the Most Devastating Cyberattack in History,” Wired, August 22, 2018, https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.

[7] Andreas Krieg, Subversion: The Strategic Weaponization of Narratives (Washington, DC: Georgetown University Press, 2023), 89.

[8] Krieg, Subversion, 101-103.

Panorama of Taipei Downtown at Sunset, Taiwan

What Intelligence Failures in the Cuban Missile Crisis Can Tell Us About the US, China, and Taiwan

The Cuban Missile Crisis of October 1962 is typically remembered as a moment when intelligence succeeded. U-2 imagery revealed Soviet missiles in Cuba before they became operational, preserving enough time for Kennedy to impose a naval quarantine and negotiate withdrawal. Yet this success followed weeks of systematic misjudgement. The British Joint Intelligence Committee assessed Soviet activity as defensive aid well into September, even as evidence accumulated of surface-to-air missile sites and unusual construction. American estimates judged a clandestine medium-range ballistic missile deployment ‘unlikely’ until photographic confirmation forced reassessment.[1] The delay was structural rather than accidental, rooted in cognitive shortcuts, institutional caution, and Cold War identity scripts that limited what analysts considered possible.

These patterns matter because they recur. As Washington and Beijing construct competing narratives about Taiwan, with each framing the other as aggressor, each mobilising resources through vocabularies of threat, intelligence communities operate within similar constraints. The question is whether the structural biases that nearly delayed Western recognition of Soviet missiles in 1962 might delay recognition of Chinese preparations today, and whether belief will accelerate quickly enough to preserve decision time.

How Analysts See What They Expect

The JIC’s reporting in autumn 1962 was shaped by anchoring. In August, as Soviet shipping to Cuba intensified, the JIC judged the activity consistent with defensive arms transfers, a framing that persisted even as evidence accumulated of surface-to-air missile sites.[2] Once an initial hypothesis is formed, analysts interpret subsequent information through that lens in what Heuer termed theory-driven thinking.[3] Analysts also treated the scale of Soviet shipments as unproblematic, dismissing missing economic justification and thereby reinforcing a false coherence in their ‘defensive’ narrative.[4]

These cognitive tendencies continue to operate today. Current assessments of Chinese military activity around Taiwan are filtered through established frameworks about deterrence and Beijing’s presumed rationality. Analysts assume that any move against Taiwan would be telegraphed by large-scale mobilisation. Yet Moscow’s deployment to Cuba was itself a deviation from expected patterns, driven by logics of revolutionary identity and prestige that Western analysts struggled to accommodate.[5]

Chinese decision-making may likewise be guided by normative framings that diverge from Washington’s expectations. Beijing’s emphasis on ‘national rejuvenation’ and ‘reunification’ functions as an identity claim structuring what counts as legitimate behaviour and permissible risk.[6] If analysts anchor on Western deterrence logic, they may discount grey-zone escalation, fait accompli strategies, or calculated acceptance of short-term costs.

How Organisations Slow Belief

The JIC’s organisational form shaped how intelligence was used. As a coordination body dependent on service departments, consensus procedures meant to ensure coherence instead diluted confidence.[7] Within Whitehall’s hierarchy, reports were filtered through multiple clearances before reaching ministers, muting urgency.[8] Intelligence was expected to support existing orientations rather than drive policy, aligning with the government’s desire to avoid escalation.[9]

Contemporary intelligence structures face similar pressures. Political sensitivities around Taiwan create incentives for analytic caution. Assessments challenging prevailing assumptions risk dismissal as alarmist. The result is a ‘belief velocity’ problem, where accurate intelligence exists but moves too slowly through institutional filters to affect decision-making.[10]

This temporal gap proved nearly fatal in 1962. Intelligence moved at three speeds: analytical (fast), institutional (slow), and evidentiary (sudden, when U-2 photography forced reassessment).[11] The Taiwan scenario presents a compressed timeline where grey-zone operations might precede kinetic action by narrow margins. If institutional filters slow recognition as in 1962, decision time could evaporate before intelligence forces reassessment.

How Identity Scripts Limit Imagination

The JIC assumed Soviet behaviour would reflect Western rational calculus, mirroring British self-understanding as a status-quo power and discounting that Moscow might be guided by different logics of revolutionary identity.[12] In the United States, the Monroe Doctrine functioned as a core identity frame, defining the Western Hemisphere as an exclusive sphere and predisposing analysts to treat Soviet deployments as inherently illegitimate.[13]

Today’s rivalry operates through similar identity scripts. The American framing of China as a ‘pacing challenge’ functions as a securitising move, casting competition as existential and mobilising resources. Between May 2023 and March 2024, the Pacific Deterrence Initiative rose from $6.19 billion to $9.86 billion.[14] Beijing’s narrative of ‘great rejuvenation’ operates symmetrically, with Xi Jinping’s October 2022 report binding national modernisation to political authority.[15] By July 2024, a Central Military Commission directive ordered the PLA to ‘dare to fight and win to realise national rejuvenation’,[16] whilst Beijing launched a ¥344 billion semiconductor fund.[17]

These competing mythscapes create a spiral where each side’s defensive posturing is framed by the other as proof of malign intent, mirroring Jervis’s security dilemma.[18] Yet this is not simple misperception but deliberate political construction, converting structural anxiety into material commitments.[19]

For intelligence communities, assessments about Taiwan operate within politically charged frames. Chinese preparations might be read through Beijing’s lens as defensive reunification but appear in Washington as offensive expansionism. Intelligence will be interpreted through pre-existing scripts rather than allowed to challenge them. In 1962, incontrovertible photographic evidence was required to overcome normative assumptions, yet assessments still underestimated Soviet deployments.[20]

Belief Velocity and Decision Time

Intelligence in the Cuban crisis mattered through synchronicity rather than prediction. The combination of U-2 imagery and Oleg Penkovsky’s provision of R-12 missile manuals provided both confirmation and temporal calibration.[21] Richard Helms said the intelligence bought Kennedy ‘three extra days’, enabling measured response.[22]

Had discovery come only after missiles were operational, Washington’s choice set would have narrowed to a strike or acceptance. Had evidence arrived earlier, the Soviet leadership might have reacted less flexibly. Both scenarios pivot on timing of belief.[23]

This temporal dimension is critical for Taiwan. Chinese preparation would unfold across multiple domains with different observational signatures and lead times. Intelligence must integrate technical collection with political assessment fast enough to preserve decision time, yet the same institutional filters that delayed recognition in 1962 remain operative.

Post-crisis reforms tightened coordination and introduced clearer confidence statements, whilst satellite imagery gained priority.[24] Yet reforms could not resolve the tension that intelligence operates as political activity within political institutions.[25] Contemporary debates might benefit from recognising this constraint: improving tradecraft matters, but if institutional cultures reward consensus, systematic conservatism will persist.

Implications for Taiwan

Three implications emerge. First, analysts must guard against anchoring on assumptions about Chinese rationality or gradualism. Beijing’s decision calculus may be structured by normative commitments to ‘reunification’ that diverge from Western deterrence logic, requiring institutional capacity to question foundational assumptions.

Second, organisational structures must accelerate belief velocity by reducing institutional filters, creating direct channels for urgent assessments, and rewarding analysts who flag outlier scenarios. The Cuban crisis showed that consensus procedures can dilute warnings until events force reassessment. Taiwan’s compressed timeline may not afford that luxury.

Third, intelligence communities must recognise they operate within politically charged normative frames. The competing mythscapes of ‘pacing challenge’ and ‘great rejuvenation’ structure what seems imaginable, influencing which indicators receive attention. Intelligence cannot escape these frames but can work to make them explicit, flagging when assessments reflect identity scripts rather than evidence alone.

The Cuban Missile Crisis succeeded because intelligence preserved enough time for diplomacy, yet that success followed weeks of near-failure when cognitive shortcuts, institutional caution, and normative assumptions nearly foreclosed recognition. The structural biases that shaped 1962 remain operative. Whether intelligence about Taiwan will move fast enough depends on whether institutions can overcome the same filters that nearly delayed belief in October 1962.


Bibliography

Aldrich, Richard J., Rory Cormac, and Michael S. Goodman. Spying on the World: The Declassified Documents of the Joint Intelligence Committee, 1936–2013. Edinburgh: Edinburgh University Press, 2014.

Allison, Graham T., and Philip Zelikow. Essence of Decision: Explaining the Cuban Missile Crisis. 2nd ed. New York: Longman, 1999.

Bell, Duncan S. A. “Mythscapes: Memory, Mythology, and National Identity.” British Journal of Sociology 54, no. 1 (March 2003): 63–81.

Blight, James G., and David A. Welch. “What Can Intelligence Tell Us about the Cuban Missile Crisis, and What Can the Cuban Missile Crisis Tell Us about Intelligence?” Intelligence and National Security 13, no. 3 (1998): 1–17.

Buzan, Barry, Ole Wæver, and Jaap de Wilde. Security: A New Framework for Analysis. Boulder, CO: Lynne Rienner, 1998.

Central Military Commission. Decision on Deeply Advancing Political Training (中央军委印发《关于全面贯彻新时代政治建军方略深入推进军队政治整训的决定》). 10 July 2024. Accessed July 20, 2025. https://www.spp.gov.cn/spp/tt/202407/t20240710_660046.shtml.

Fischer, Beth A. “Perception, Intelligence Errors, and the Cuban Missile Crisis.” Intelligence and National Security 13, no. 3 (1998): 150–72.

Garthoff, Raymond L. “US Intelligence in the Cuban Missile Crisis.” Intelligence and National Security 13, no. 3 (1998): 18–63.

Herman, Michael. Intelligence Power in Peace and War. Cambridge: Cambridge University Press, 1996.

Heuer, Richards J. Psychology of Intelligence Analysis. Washington, DC: CIA, 2021.

Hulnick, Arthur S. “What’s Wrong with the Intelligence Cycle.” Intelligence and National Security 21, no. 6 (2006): 959–79.

Jervis, Robert. Perception and Misperception in International Politics. New Edition. Princeton, NJ: Princeton University Press, 1976.

Reuters. “China Establishes Third Phase of National Integrated Circuit Investment Fund with $47.5 Billion.” May 27, 2024. Accessed August 11, 2025. https://www.business-standard.com/world-news/china-sets-up-third-fund-with-47-5-bn-to-boost-semiconductor-industry-124052700493_1.html.

Scott, Len. “Oleg Penkovsky, British Intelligence, and the Cuban Missile Crisis.” In Learning from the Secret Past: Cases in British Intelligence History, edited by Robert Dover and Michael S. Goodman, 226–48. Washington, DC: Georgetown University Press, 2011.

Scott, L. V. Macmillan, Kennedy and the Cuban Missile Crisis: Political, Military and Intelligence Aspects. Basingstoke: Palgrave Macmillan, 1999.

Standing Committee of the National People’s Congress. Patriotic Education Law of the People’s Republic of China (中华人民共和国爱国主义教育法). Adopted October 24, 2023; effective January 1, 2024. Accessed July 20, 2025. http://www.npc.gov.cn/npc/c2/c30834/202310/t20231024_432535.html.

U.S. Department of Defense, Office of the Under Secretary of Defense (Comptroller). Pacific Deterrence Initiative: FY 2025 Budget Justification. Washington, DC: Department of Defense, March 2024. Accessed July 22, 2025. https://comptroller.defense.gov/Portals/45/Documents/defbudget/FY2025/FY2025_Pacific_Deterrence_Initiative.pdf.

Wæver, Ole. “Securitization and Desecuritization.” In On Security, edited by Ronnie D. Lipschutz, 46–86. New York: Columbia University Press, 1995.

Weldes, Jutta. Constructing National Interests: The United States and the Cuban Missile Crisis. Minneapolis: University of Minnesota Press, 1999.

Xi Jinping. “全面建设社会主义现代化国家 全面推进中华民族伟大复兴——在中国共产党第二十次全国代表大会上的报告” [Report to the 20th CPC National Congress]. People’s Daily, 4 January 2023. Accessed July 20, 2025. https://www.gov.cn/xinwen/2022-10/25/content_5721685.htm.


[1]: Raymond L. Garthoff, “US Intelligence in the Cuban Missile Crisis,” Intelligence and National Security 13, no. 3 (1998): 20–22.

[2]: Richard J. Aldrich, Rory Cormac, and Michael S. Goodman, Spying on the World: The Declassified Documents of the Joint Intelligence Committee, 1936–2013 (Edinburgh: Edinburgh University Press, 2014), 249–52.

[3]: Richards J. Heuer, Psychology of Intelligence Analysis (Washington, DC: CIA, 2021), 91–92.

[4]: Ibid., 96–99.

[5]: Beth A. Fischer, “Perception, Intelligence Errors, and the Cuban Missile Crisis,” Intelligence and National Security 13, no. 3 (1998): 152–53.

[6]: Fischer, “Perception, Intelligence Errors,” 153.

[7]: Jutta Weldes, Constructing National Interests: The United States and the Cuban Missile Crisis (Minneapolis: University of Minnesota Press, 1999), 30–35, 224–39.

[8]: Duncan S. A. Bell, “Mythscapes: Memory, Mythology, and National Identity,” British Journal of Sociology 54, no. 1 (March 2003): 74.

[9]: Arthur S. Hulnick, “What’s Wrong with the Intelligence Cycle,” Intelligence and National Security 21, no. 6 (2006): 959–63.

[10]: Aldrich et al., Spying on the World, 252–54.

[11]: Hulnick, “What’s Wrong with the Intelligence Cycle,” 959–63.

[12]: Aldrich et al., Spying on the World, 252–54.

[13]: Philip H. J. Davies, MI6 and the Machinery of Spying (London: Frank Cass, 2004), 77–80.

[14]: Aldrich et al., Spying on the World, 10–23.

[15]: Hulnick, “What’s Wrong with the Intelligence Cycle,” 961–62.

[16]: This concept draws on Heuer’s account of how vivid evidence overcomes analytic inertia. Heuer, Psychology of Intelligence Analysis, 91–97.

[17]: James G. Blight and David A. Welch, “What Can Intelligence Tell Us about the Cuban Missile Crisis, and What Can the Cuban Missile Crisis Tell Us about Intelligence?” Intelligence and National Security 13, no. 3 (1998): 1–3.

[18]: Heuer, Psychology of Intelligence Analysis, 91–97.

[19]: Fischer, “Perception, Intelligence Errors,” 153.

[20]: Weldes, Constructing National Interests, 30–35, 224–39.

[21]: Aldrich et al., Spying on the World, 251–54.

[22]: Ole Wæver, “Securitization and Desecuritization,” in On Security, ed. Ronnie D. Lipschutz (New York: Columbia University Press, 1995), 54–55.

[23]: U.S. Department of Defense, Office of the Under Secretary of Defense (Comptroller), Pacific Deterrence Initiative: FY 2025 Budget Justification (Washington, DC: Department of Defense, March 2024), 3.

[24]: Xi Jinping, “全面建设社会主义现代化国家 全面推进中华民族伟大复兴——在中国共产党第二十次全国代表大会上的报告” [Report to the 20th CPC National Congress], People’s Daily, 4 January 2023, 1.

[25]: Central Military Commission, Decision on Deeply Advancing Political Training (10 July 2024), art. 2.

Powered by WordPress & Theme by Anders Norén