Skip to main content

Secret Intelligence

  • Chapter
Diplomacy
  • 1107 Accesses

Abstract

The two chief purposes of secret intelligence activity abroad are to provide governments with valuable information unobtainable from open sources and covertly to weaken or eliminate their foreign enemies — be they shipping-lane pirates, serious organized criminal gangs, dissidents living abroad, terrorist organizations, or even hostile governments. However, as the consequences of military and terrorist surprise have become more deadly, secret intelligence has also increased the attention it pays to the allies on which particular reliance is placed — for governments feel the need to be sure of their friends. These objectives have some overlap with those of diplomacy, while intelligence officers have also come to rely more and more on the shelter provided by diplomatic missions and consulates. But diplomacy itself rests on the maintenance of normal relations between even unfriendly governments and operates under a legal regime proscribing espionage, let alone active interference in the internal affairs of other states. In such circumstances, how do the spies and the diplomats coexist? With difficulty, as we shall see — but coexist they do.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Further reading

  • Andrew, Christopher and David Dilks (eds), The Missing Dimension: Governments and intelligence communities in the twentieth century (Macmillan: Basingstoke, 1984): especially the Introduction. This is the book that launched secret intelligence as a serious object of scholarly research and is still worth reading.

    Google Scholar 

  • Aid, M., ‘Eavesdroppers of the Kremlin: KGB SIGINT during the Cold War’, in Karl de Leeuw and Jan Bergstra (eds), The History of Information Security: A comprehensive handbook (Elsevier: Amsterdam, 2007).

    Google Scholar 

  • Andrew, Christopher, ‘Vasili Mitrokhin’, Guardian, 4 February 2004 [www]. An obituary by the British scholar who assisted him with the publication of his archive of KGB records.

    Google Scholar 

  • Andrew, Christopher and Vasili Mitrokhin, The Mitrokhin Archive: The KGB in Europe and the West (Penguin: London, 1999). A work of exceptional interest-extremely long and detailed; a book to be dipped into.

    Google Scholar 

  • Berridge, G. R., British Diplomacy in Turkey, 1583 to the Present: A study in the evolution of the resident embassy (Martinus Nijhoff: Leiden, 2009).

    Book  Google Scholar 

  • Berridge, G. R., The Counter-Revolution in Diplomacy and other essays (Palgrave Macmillan: Basingstoke, 2011): essay 5 (‘Specific reciprocity and the 105 Soviet spies’).

    Book  Google Scholar 

  • Berridge, G. R., Embassies in Armed Conflict (Continuum: New York, 2012).

    Google Scholar 

  • Berridge, G. R. and Lorna Lloyd, The Palgrave Macmillan Dictionary of Diplomacy (Palgrave Macmillan: Basingstoke, 2012): on the numerous variations on the term ‘military attaché’.

    Book  Google Scholar 

  • Bower, Tom, The Perfect English Spy: Sir Dick White and the secret war, 1935–90 (Heinemann: London, 1995).

    Google Scholar 

  • Campbell, Duncan, ‘How embassy eavesdropping works’ (n.d.) [www].

    Google Scholar 

  • Chesterman, Simon, ‘The spy who came in from the Cold War: Intelligence and international law’, Michigan Journal of International Law, 27, 2005–6.

    Google Scholar 

  • Church Committee, Foreign and Military Intelligence. Book I. Final Report of the Select Committee to Study Governmental Operations with respect to Intelligence Activities. United States Senate (U.S. Government Printing Office: Washington, DC, 1976) [www]. A very important source.

    Google Scholar 

  • Corera, Gordon, ‘Spying scandal: Will the ‘five eyes’ club open up? BBC News, 29 October 2013 [www].

    Google Scholar 

  • Farrell, Paul, ‘History of 5-eyes — explainer’, Guardian, 2 December 2013 [www].

    Google Scholar 

  • Guardian, ‘GCHQ intercepted foreign politicians’ communications at G20 summits’, 17 June 2013 [www].

    Google Scholar 

  • Guardian, ‘The NSA files’ [www].

    Google Scholar 

  • Herman, Michael, Intelligence Power in Peace and War (Cambridge University Press: Cambridge, 1996). Written by a former senior member of the staff of GCHQ so to some extent a primary source.

    Book  Google Scholar 

  • Höne, Katharina, ‘Blurred lines and lost trust? Diplomacy and intelligence gathering. Eavesdropping on G20 delegates in 2009’, Diplo blog, 18 June 2013 [www].

    Google Scholar 

  • [ISC] Intelligence and Security Committee, The Mitrokhin Inquiry Report, June 2000, Cm 4764 [www].

    Google Scholar 

  • [ISC] Intelligence and Security Committee of Parliament, Annual Report 2012–2013, 10 July 2013, HC 547 [www].

    Google Scholar 

  • Jeffery, Keith, MI6: The history of the Secret Intelligence Service, 1909–1949 (Bloomsbury: London, 2010). The official history. Long on detail.

    Google Scholar 

  • Kish, John, ed. David Turns, International Law and Espionage (Martinus Nijhoff: The Hague, 1995): ch. 2 (‘Diplomacy and espionage’).

    Google Scholar 

  • LSE Media Policy Project, ‘Online surveillance’ [www]. An excellent portal to online resources.

    Google Scholar 

  • Mazzetti, Mark, ‘How a single spy helped turn Pakistan against the United States’, The New York Times Magazine, 9 April 2013 [www].

    Google Scholar 

  • National Commission on Terrorist Attacks Upon the United States, The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (9/11 Report) (US Government Printing Office: Washington, DC, 2004) [www].

    Google Scholar 

  • Radsan, A. John, ‘The unresolved equation of espionage and international law’, Michigan Journal of International Law, 28, 2006–7. A shrewd and very readable account by a former CIA lawyer of the different views on the possibility of bringing espionage under international law.

    Google Scholar 

  • Schaller, Christian, ‘Spies’, in Rüdiger Wolfrum (ed.), Max Planck Encyclopedia of Public International Law (Oxford University Press: Oxford, 2013).

    Google Scholar 

  • Spiegel Online International, ‘Embassy Espionage: The NSA’s Secret Spy Hub in Berlin’, 27 October, 2013 [www].

    Google Scholar 

  • Talmon, Stefan, ‘Tapping the German chancellor’s cell phone and public international law’, Cambridge Journal of International and Comparative Law, 6 November 2013 [www].

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Copyright information

© 2015 G. R. Berridge

About this chapter

Cite this chapter

Berridge, G.R. (2015). Secret Intelligence. In: Diplomacy. Palgrave Macmillan, London. https://doi.org/10.1057/9781137445520_11

Download citation

Publish with us

Policies and ethics