ESPIONAGE AND SECURITIZATION IN THE AGE OF GLOBAL CONFLICT: INTELLIGENCE, PERCEPTION, AND PEACEBUILDING
Abstract
Review Paper
DOI: https://doi.org/10.37458/ssj.6.2.5
This study provides a comprehensive analysis of the evolving role of espionage and intelligence sharing through the lens of securitization theory, with a particular focus on contemporary international conflicts. It demonstrates how espionage, especially in its digital and AI-enabled forms, has become a strategic tool for shaping state behavior, influencing threat perceptions, and guiding international discourse, while historically perceived as secretive and destabilizing. Using qualitative methods, including critical discourse analysis and historical comparative case studies, the study illustrates how intelligence diplomacy—intentional, legally informed, and ethically constrained intelligence sharing—can transform espionage into a stabilizing instrument. Evidence from historical reforms in Greece, contemporary intelligence partnerships such as SIGINT and Five Eyes, and emerging cyber operations supports this argument. The study highlights three key implications: the need for modern legal and normative frameworks to regulate AI and cyber espionage; the potential for trust-based intelligence alliances to function as infrastructures for peace; and the reconceptualization of espionage as a strategic signaling mechanism rather than solely a covert threat. These insights offer practical guidance for pre-conflict planning, international security cooperation, and responsible state conduct in the digital age.
References
Aldrich, R. J. (2010). GCHQ: the uncensored story of Britain’s most secret intelligence agency. http://ci.nii.ac.jp/ncid/BB09497532
Amoore, L. (2013). The politics of possibility: Risk and security beyond probability. Duke University Press.
Andrew, C. (2018). The secret world: A history of intelligence. Yale University Press.
Australian Government. (2022). AUKUS: Partnership for the Indo-Pacific. https://www.defence.gov.au
Baker, M. S., Baker, J., & Burkle, F. M., Jr. (2023). Russia’s hybrid warfare in Ukraine threatens both healthcare & health protections provided by international law. Annals of Global Health, 89(1), 1–6.
Balzacq, T. (2011). Securitization theory: How security problems emerge and dissolve. Routledge.
Bauman, Z., Bigo, D., Esteves, P., Guild, E., Jabri, V., Lyon, D., & Walker, R. B. J. (2014). After Snowden: Rethinking the impact of surveillance. International Political Sociology, 8(2), 121–144. https://doi.org/10.1111/ips.12048
Borghard, E. D., & Lonergan, S. (2017). The logic of coercion in cyberspace. Security Studies, 26(3), 452–481. https://doi.org/10.1080/09636412.2017.1306396
Buchanan, B. (2018). The cybersecurity dilemma: Hacking, trust, and fear between nations. Oxford University Press.
Buchanan, B. (2020). The hacker and the state: Cyber attacks and the new normal of geopolitics. Harvard University Press.
Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Lynne Rienner Publishers.
Byman, D. (2023). How to think about state sponsorship of terrorism. Survival, 65(4), 101–121.
Corbett, S., & Danoy, J. (2022, October 31). Beyond NOFORN: Solutions for increased intelligence sharing among allies (Issue Brief). Atlantic Council. https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/beyond-noforn-solutions-for-increased-intelligence-sharing-among-allies/
Danesy, F. (2024). Predicting insider espionage: A five-factor model. Peter Lang. https://doi.org/10.3726/b22175
Deibert, R. (2013). Black code: Surveillance, privacy, and the dark side of the internet. Signal Books.
Devanny, J., Martin, C., & Stevens, T. (2021). On the strategic consequences of digital espionage. Journal of Cyber Policy, 6(1), 1–22. https://doi.org/10.1080/23738871.2021.2000628
Dmytrenko, S. (2024). Espionage counteraction as national security paradigm of 21st century. FOREIGN AFFAIRS, 57–62. https://doi.org/10.46493/2663-2675.34(1).2024.57
Egloff, F. J., & Smeets, M. (2023). Publicly attributing cyber attacks: A framework. Journal of Strategic Studies, 46(3), 502–533. https://doi.org/10.1080/01402390.2021.1895117
Fjäder, C. (2014). The nation-state, national security and resilience in the age of globalisation. Resilience, 2(2), 114–129. https://doi.org/10.1080/21693293.2014.914771
Grabo, C. (2002). Anticipating surprise: Analysis for strategic warning. University Press of America.
Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53(4), 1155–1175. https://doi.org/10.1111/j.1468-2478.2009.00572.x
Harknett, R. J., & Smeets, M. (2022). Cyber campaigns and strategic outcomes. Journal of Strategic Studies, 45(4), 534–567. https://doi.org/10.1080/01402390.2020.1732354
Herman, M. (1996). Intelligence power in peace and war. Cambridge University Press.
Jacobs, B. (2020). Maximator: European signals intelligence cooperation, from a Dutch perspective. Intelligence and National Security, 35(5), 659–668. https://doi.org/10.1080/02684527.2020.1743538
Karyotis, G. (2012). Securitization of migration in Greece: Process, motives, and implications. International Political Sociology, 6(4), 390–408.
Kyriakidis, M. (2025). Military education and professionalization in modern Greece: The Evelpidon Military Academy and the impact of foreign military doctrines (1828–20th century). ISRG Journal of Arts Humanities & Social Sciences (ISRGJAHSS), 3(1), 253–264. https://doi.org/10.5281/zenodo.14738407
Liebetrau, T. (2023). Organizing cyber capability across military and intelligence entities: Collaboration, separation, or centralization. Policy Design and Practice, 6(2), 131–145. https://doi.org/10.1080/25741292.2022.2127551
Lyon, D. (2022). Pandemic surveillance: Privacy, security and public trust. Polity Press.
Monsees, L. (2019). Crypto-Politics. https://doi.org/10.4324/9780429456756
Nasheri, H. (2005). Economic espionage and industrial spying. Cambridge University Press.
Obioha-Val, O., Olaniyi, O., Gbadebo, M., Balogun, A., & Olisa, A. (2025). Cyber espionage in the age of artificial intelligence: A comparative study of state-sponsored campaign. Asian Journal of Research in Computer Science, 18(1), 184–204. https://doi.org/10.9734/ajrcos/2025/v18i1557
Pereira, A., & Silva, C. (2025). The legality of international espionage based on the nature of the target and the perpetrator. Expeditions with MCUP. https://doi.org/10.36304/ExpwMCUP.2025.06
Rauch, E. (1982). Espionage. In Encyclopedia of Public International Law. Elsevier. https://doi.org/10.1016/B978-0-444-86234-1.50064-3
Rid, T. (2020). Active measures: The secret history of disinformation and political warfare. Farrar, Straus and Giroux.
Rosli, W. R. W. (2025). Waging warfare against states: The deployment of artificial intelligence in cyber espionage. AI and Ethics, 5(1), 47–53. https://doi.org/10.1007/s43681-024-00628-x
Schmitt, M. N. (Ed.). (2013). Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press.
Stritzel, H. (2007). Towards a theory of securitization: Copenhagen and beyond. European Journal of International Relations, 13(3), 357–383. https://doi.org/10.1177/1354066107080128
Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: Cyber conflict in the international system. Oxford University Press.
Walsh, J. I. (2010). The international politics of intelligence sharing. Columbia University Press.
Warner, M. (2014). The rise and fall of intelligence: An international security history. Georgetown University Press.
Zegart, A. (2009). Spying blind: The CIA and the origins of 9/11. Princeton University Press.
Zegart, A. B. (2013). Eyes on spies: Congress and the United States Intelligence Community. Hoover Press.
Zuboff, S. (2019). The age of surveillance capitalism: The Fight for a Human Future at the New Frontier of Power: Barack Obama’s Books of 2019. Profile Books.
SSJ conforms to open access (OA) policy. SSJ - Security Science JournalTM


